A crowd is a group of people gathered in one place with a common focus or purpose. Such gatherings may require preventive actions by security personnel to ensure public safety and maintain law and order. Situations like demonstrations, disasters, riots, or sporting events are common examples that demand effective crowd control and basic security guard procedures.
Types of Crowds
Understanding the different types of crowds is essential for performing crowd control security duties. Each type behaves differently, and knowing how to manage them can reduce risks.
1. Acquisitive Crowd
These individuals are motivated by the desire to obtain something—such as during sales, auctions, or when supplies are limited. They usually act independently and have no leader.
2. Expressive Crowd
This group gathers to express emotions or protest, such as in political rallies, peace marches, or conventions. They can become agitated if not properly managed.
3. Spectator Crowd
They gather out of curiosity, entertainment, or instruction—such as during parades, sporting events, or performances. Though initially calm, the mood may change quickly based on external factors.
4. Sightseer Crowd
These people come to witness an event like a fire, accident, or disaster. While some may offer help, others may simply stand and watch, creating obstructions.
5. Hostile Crowd
A dangerous crowd with aggressive intentions—such as during strikes, violent protests, or mob situations. These are the most challenging for security guard crowd control efforts and often require police intervention.
Crowd Control – What It Means
Crowd control security is the organized method of managing large groups to prevent disorder and ensure safety. Crowds behave differently than individuals; they are unpredictable and often harder to manage. If not controlled, they may force their way out, causing damage or injury.
Key Crowd Control Security Duties
As part of your crowd control security duties, a security guard must:
Remain calm and alert at all times
Be friendly but firm
Never attempt to control a large crowd alone
Request assistance when the situation escalates
Maintain safe distances and monitor crowd behavior constantly
Essential Crowd Control Equipment
To carry out security guard crowd control, the following tools can be used:
Barriers and barricades
Ropes or tapes
Loudspeakers or megaphones to give instructions
How to Control a Crowd as a Security Guard
Learning how to control a crowd as a security guard requires practice, planning, and situational awareness. Follow these general guidelines:
Approach the crowd with a calm and confident attitude
Use loudspeakers to give clear instructions
Isolate aggressive or disruptive individuals
Divide the crowd into smaller, manageable groups
Use rational crowd members to calm others
Ensure exit paths are clear to avoid panic
Provide first-aid support to children, the elderly, and injured persons
Avoid reacting to verbal abuse—only act if there’s a physical threat
Inform the police if the crowd shows signs of aggression
Security Guard Crowd Control in Hostile Situations
Hostile crowds are dangerous. If you believe the situation is getting out of control:
Do not engage alone
Call for immediate security backup
Notify the local police
Observe the crowd from a safe distance
In extreme cases, proper crowd control security depends on the quick response of trained personnel and cooperation with law enforcement.
Conclusion
Every security guard should be well-versed in crowd control and basic security guard strategies to handle unpredictable situations confidently. Whether dealing with peaceful gatherings or aggressive protests, your crowd control security duties are vital in preventing chaos, protecting lives, and maintaining order.
An emergency in security refers to any unexpected and serious situation that requires immediate action to protect life, property, and health.
These emergencies can occur without warning and demand a quick and organized response. Common emergencies at a worksite may include fire outbreaks, bomb threats, medical emergencies, equipment failure (such as lift malfunctions), floods, earthquakes, or disease outbreaks.
Types of Emergency Situations:
Man-made Emergencies:
Accidents
Major crimes
Equipment failure (e.g., escalator/lift issues)
Natural Emergencies:
Floods
Earthquakes
Public health emergencies (e.g., disease outbreaks like a plague)
Impact of Emergencies:
Danger to life (e.g., heart attack, stroke)
Danger to health
Damage to property
Role of Security Guard in Case of Emergency
The role of a security guard in case of emergency is crucial from the moment an incident begins until it is resolved. Security guards must respond immediately and effectively to reduce harm to people and minimize property damage. You should:
Remain calm and focused during emergencies. Panic spreads quickly, so staying composed reassures others.
Ask for help by contacting the supervisor, control room, emergency services, or police.
Use all available resources, such as guiding people to shelter areas or assembly points.
Follow emergency plans specific to the site and lead others accordingly.
Know the evacuation routes, safe exits, and procedures.
Prepare in Advance: Be familiar with the site’s emergency plan. Practice evacuation procedures regularly and ensure everyone on site knows what to do.
Know Your Role: Understand your specific responsibilities during emergencies. Set up the assembly area and lead people to safety.
Know How to Respond: You may need prior training and emergency drills to know how to handle different scenarios effectively.
Know What Happens: After evacuation, conduct a headcount to ensure everyone is safe.
Expect the Unexpected: Have backup plans in place in case usual exits or routes are blocked. Always keep fire doors unlocked and emergency exits clear.
Regular Duties That Support Emergency Preparedness:
Check that fire doors are always unlocked
Test emergency lighting and alarms regularly
Ensure emergency equipment is in working condition
Keep contact lists up to date
Know where first aid kits and fire extinguishers are located
Assist disabled, elderly, or young individuals during evacuation
Assembly Area
An assembly area is a pre-determined safe location where everyone gathers after evacuation. It is crucial for headcounts and receiving further instructions.
Important Notes on Emergency Situations:
Search and rescue operations should only be performed by trained professionals.
Never re-enter a damaged or evacuated building unless authorized by emergency officials.
In Summary
What is an emergency in security? It is a serious, unexpected situation needing immediate action to protect life, health, and property.
Emergency types include both natural and man-made incidents.
People react differently in emergencies—shock, disbelief, panic. A calm and prepared security guard can save lives.
The role of a security guard in case of emergency includes keeping calm, helping people, using site resources, and following proper procedures.
The most effective security guard emergency response procedures involve planning, preparation, clear communication, and leadership.
By following these guidelines, a security guard can play a vital role in ensuring safety during any emergency.
Dubai is one of the world’s fast-growing city. It has changed from desert to ultra-high town and has been growing continuously in the last 20years. Together with its development, there is a technology boom in many sectors, the result for that, thousands of It company in Dubai have arisen.
Information technology is one of the most demanded job areas in Dubai as well as all over the United Arab Emirates. Since the thriving of the IT company in Dubai, the demand for the IT professional remained high at all times.
In this post, I give you a list of the top information technology company in Dubai and you can look for the available position on their official website.
The IT professionals are including;
computer & information and research scientists,
systems managers,
hardware and software engineers,
programmers,
database administrators,
network systems and data communications analysts,
systems analysts,
network and computer systems administrators,
and computer support specialists.
Numerous organizations that specialize in IT in Dubai are located in Dubai Internet City. You can use this link to reach the names of an IT company or all the IT companies in Dubai http://www.dic.ae/business-partners/.
Although finding a job in Top IT company in Dubai is a tough task, some great ways can help you to find a job with a good company those are as follows;
In the first place, the Dubai government created an information technology park is called DIC (Dubai Internet City) and the second place allows the company 100% foreign ownership until 50yrs.
Because of the taxation and customs related benefit, most of the top international companies moved their regional headquarters to Dubai.
The topmost high-tech companies such as Facebook, LinkedIn, Google, Dell, Intel, Huawei, Samsung, SAP, Microsoft, IBM, Oracle Corporation, Tata Consultancy, 3M, Sun Microsystems, Cisco, HP, Nokia, Cognizant and Accenture have a regional headquarters in Dubai.
There are not less than 5000 IT companies in UAE and not less than thousands of companies are located in DIC (Dubai Internet City). We have chosen only hundreds of companies out of thousands for our listing because these companies are well known in UAE and have a good reputation among the public.
The salary variation has existed among the companies even though a similar nature of business. Companies from western countries willing to pay higher than local companies. On the other hand, companies of Asian national remain less payer.
Remember that salary depends on your negotiation skills in the interview because the UAE has not minimum wage policy.
When you talk about the scope of this occupation still remained strong and have lots of change to the expats. The UAE nationals are not sufficient to fill the vacuum of the demand in the IT sector.
Literally, government or non-government organizations love to hire the westerner first, and Asians come to second for employing the IT company in Dubai.
To get a job in the information technology sector in Dubai, Either you should apply online or drop your CV to the company office. Other vital players in the UAE job market are recruitment agencies here is the full list of the top recruitment agencies in the UAE visit now
Conclusion: Dubai is the regional hub of the IT companies and there are a lot of chances for the IT professional to be employed. Nowadays Dubai has become the number one to attract IT professionals around the world. If you want to work with top It companies in Dubai always visit their website for getting the information about available vacancies.
Bomb threats may be rare, but they are hazardous situations that must be handled with care and professionalism.
Even if the majority of threats turn out to be hoaxes or pranks, any explosive device has the potential to cause death, injury, and significant damage. Therefore, every security guard must be trained in how to deal with a bomb threat in the workplace.
Who Makes Bomb Threats and Why?
Understanding the potential source of a bomb threat can help prevent and respond. Bomb threats may come from:
Disgruntled co-workers or family members – Those who wish to cause harm to someone they blame for personal issues.
Unhappy customers – People dissatisfied with products or services who feel ignored or mistreated.
Angry employees – Especially those recently terminated or mistreated by management.
Protestors – Individuals with political, social, or religious motivations.
Pranksters – People who enjoy causing panic without any real intention of harm.
Where Can a Bomb Threat Occur?
A bomb threat can be made in or against any location where public fear can be triggered. Common targets include:
Offices
Schools
Government buildings
Malls and markets
Events and gatherings
Vehicles and parking areas
Common Methods of Making Bomb Threats
Threats may be received through:
In person
Telephone calls
Emails
Letters or suspicious packages
How to Deal with a Bomb Threat in the Workplace
1. If You Receive a Threat In Person:
Remain calm and composed to prevent panic.
Try to keep the reporting person nearby if safe to do so.
Gather full details about what was seen or heard.
Note their physical appearance, behavior, and timing.
Write a detailed report of the incident immediately.
2. If You Receive a Threat Over the Telephone:
Use a bomb threat checklist to ask the caller important questions:
Bomb Threat Telephone Checklist:
When is the bomb going to explode?
Where is the bomb right now?
What does it look like?
What type of bomb is it?
What will trigger it to explode?
Did you place the bomb? Why?
What is your name?
What is your location?
Are there others involved?
While on the call:
Signal someone discreetly to listen from another line.
Stay calm and focus on collecting information.
Listen for background noise (sirens, machines, voices).
Try to identify the caller’s accent, tone, or emotional state.
Notify the emergency contact and follow site procedures immediately.
3. If You Receive a Threat by Letter or Package:
Check for the following signs:
Feel: Is it lumpy, stiff, or unusually heavy?
Appearance: Poorly written or typed, unfamiliar sender, vague recipient like “Manager” or “Director.”
Smell: Explosives may smell like almonds or fuel.
Packaging: Reused or unprofessional-looking, with excessive tape or stamps.
Sound: Listen for ticking, sloshing, or mechanical noises.
Do not open or handle the package. Report it to your supervisor and evacuate the area if needed.
Bomb Threat Security Response: Five Key Principles
Have a Prepared Plan – Follow the emergency plan provided for your site.
Evacuation Priorities – Assist elderly people, children, women, and those with special needs first.
Emergency Response Coordination – Alert your emergency response team and external agencies.
Consult Building Experts – They understand exit routes, structure, and hidden areas.
A CCTV system (Closed-Circuit Television) is one of the most essential tools in modern security. It involves using video cameras to transmit footage to a limited set of monitors. These systems monitor and secure sensitive locations such as banks, stores, offices, warehouses, and industrial zones.
For every CCTV security guard, having solid knowledge and proper security guard CCTV training is essential to operating and managing the surveillance system effectively.
Why CCTV Is Important in Security
A properly installed CCTV system helps security guards:
Monitor large or sensitive areas.
Detect and prevent criminal activity.
Record footage that can be used as legal evidence.
Ensure the safety of employees and customers.
Monitor high-risk or remote zones.
With effective security guard CCTV training, guards become skilled in surveillance operations and proactive response to incidents.
Where CCTV Is Commonly Used
Retail stores to reduce theft and shoplifting.
Banks and ATMs for 24/7 monitoring.
Parking areas to track vehicle movement.
Industrial plants to observe hazardous processes.
Offices to ensure employee safety and productivity.
Public events for crowd monitoring and incident control.
Types of CCTV Cameras and Equipment
A trained CCTV security guard must be familiar with the types of equipment:
Stationary Camera – Mounted in one direction permanently.
PTZ Camera – Pan, tilt, and zoom control for better tracking.
Dome Camera – Used indoors; discreet and tamper-proof.
Bullet Camera – Long-range outdoor surveillance.
Monitor – Displays real-time or recorded video.
Joystick – Used to control PTZ cameras.
DVR (Digital Video Recorder) – Records, stores, and manages footage.
Core Components of a CCTV System
1. Security camera
Cameras are the eyes of the CCTV system. Common types include dome, bullet, PTZ, and covert cameras. They transmit footage to the DVR for storage or live monitoring.
2. DVR
The DVR captures and stores video from each camera. It allows playback, backup, and configuration of the cameras. DVR systems typically support 4, 8, or 16 camera channels.
3. CCTV cable
Power Cable: Supplies electricity to the camera.
Signal Cable: Transmits footage to the DVR system.
4. BNC Connectors
These connectors link the CCTV cables to the DVR and allow secure signal transmission.
5. CCTV Power Supply
Converts high voltage to suitable camera power (usually 12VDC or 24VAC). It ensures stable operation and protects against power surges.
How Security Guards Use CCTV
Security guard CCTV training involves understanding procedures such as:
Monitoring live footage from multiple cameras.
Reporting unusual or suspicious activity.
Identifying individuals or incidents using footage.
Controlling PTZ cameras to follow a person or area.
Documenting incidents based on recorded footage.
Communicating with supervisors or police with evidence.
Legal and Ethical Considerations
Security guards must follow local laws when using CCTV:
Always protect and restrict access to recorded footage.
Footage should only be shared with authorized personnel or police.
Understand and respect privacy rights.
Daily CCTV Maintenance Checklist
Task
Status
Clean camera lenses
✅
Check the camera angle and focus
✅
Ensure all cameras are online
✅
Test DVR recording
✅
Inspecting cables and connectors
✅
Confirm timestamp accuracy
✅
Common Surveillance Challenges
Camera blind spots
Power failure or voltage fluctuation
Storage full on DVR
Night vision issues
Camera tampering
Guards must report technical issues immediately and follow up on maintenance requests.
Sample Incident Report Based on CCTV
Date: 13/04/2025 Time: 21:45 Camera #03 – Parking Lot Incident: An individual was seen attempting to open parked vehicles. The subject appeared suspicious and left the area upon noticing the camera. The footage was saved and reported to the supervisor. Action Taken: Alerted on-duty staff, saved recording, and prepared report for management.
Benefits of CCTV for Security
More cost-effective than hiring multiple guards.
Prevents crimes through visible surveillance.
Reduces employee theft or misuse of resources.
Provides reliable legal evidence.
Boosts employee and customer confidence.
Encourages professional behavior.
Enables efficient remote monitoring.
Conclusion
The CCTV system is a powerful surveillance tool for every security professional. Through security guard CCTV training, guards can maximize its benefits to protect people and property, detect suspicious behavior, and respond effectively to incidents. Every CCTV security guard must be confident in camera operations, legal handling of footage, and use of the system in daily security tasks.
A security alarm system is critical in detecting emergencies and notifying authorities or responsible personnel. From ancient methods like bells or barking dogs to modern digital systems, alarms have evolved to improve alarm response security in workplaces and residences.
Today’s systems monitor:
Unauthorized entry
Fire or smoke
Equipment failure
Hazardous conditions (toxic gas, temperature changes, etc.)
Types of Alarm Systems
Intrusion Alarms – Triggered by unauthorized access.
Fire Alarms – Detect fire, smoke, and heat levels.
Distress Alarms – Alert emergencies such as personal threats or medical conditions.
Transmitter: Sends the signal to the control panel.
Annunciator (Control Panel): Processes the signal and triggers a suitable alarm response.
Types of Alarm Monitoring
Local Alarm: Audible alarm alerts people nearby.
Central Station Monitoring: Alerts go to a centralized control room.
Remote Monitoring: Sends alerts directly to responsible individuals.
Alarm Response Procedures for Security Guards
Alarm response security is critical for any security guard because Proper alarm response procedures can prevent damage, reduce risk, and ensure safety.
Best Alarm Response Practices:
Always treat all alarms as genuine.
Have a response plan ready and know the site layout.
If possible, observe the situation before approaching.
Respond with at least one other security personnel.
If a weapon is visible, do not engage directly—report from a safe distance.
Use your communication device to update the control room or authorities.
Understanding False Alarms
Even though many alarms are false, guards must apply the same alarm response procedures as for a real incident.
Types of False Alarms:
Technical Issues – Faulty installation or malfunction.
Accidental Triggers – By wind, pets, or operator error.
Power Surges – May reset the system and trigger an alert.
Alarm Activation Statistics:
Genuine intrusion: ~0.01%
Malfunction: ~19.69%
Human error: ~45.80%
Unknown causes: ~34.50%
Distress Alarms
A distress alarm signals trouble or an emergency for people or equipment.
Examples:
Panic buttons in banks or offices
Medical alarms in hospitals
Equipment alarms in industrial settings
These systems improve alarm response security by allowing quicker action in critical situations.
Control Room and Its Functions
The control room is the command center for handling all alarms.
Control Room Tasks:
Monitor CCTV systems
Record and review surveillance footage
Announce emergency instructions
Receive alerts from fire and intrusion systems
Coordinate with external emergency services
The control room ensures a coordinated and professional alarm response during emergencies.
Maintaining Professional Alarm Response Security
Security personnel must maintain a clean, organized control room and ensure only authorized access. The professionalism of the space reflects the organization’s alarm response procedures and readiness.
Communication Protocols During Alarm Response
Effective communication is essential for a timely and coordinated alarm response.
Essential Protocols:
Always report to the control room first.
Use two-way radios or an intercom to update status.
Speak in clear, short, professional codes (e.g., “All Clear,” “Code Red Intrusion at Zone 3”).
Use the phonetic alphabet if needed (e.g., “Zone B like Bravo”).
During False Alarms:
Calmly inform the control room it’s a false alarm.
Do not reset the system unless authorized.
Personal Safety of Security Guards
Security guards must prioritize their safety during alarm response.
Key Safety Measures:
Never engage directly with armed suspects.
Do not enter confined areas alone during an alarm investigation.
Stay visible and communicate location at all times.
Wear protective gear when available.
Use flashlights, batons, or whistles for signaling.
Retreat and report if danger is imminent.
Summary
Use a security alarm system to detect threats early.
Understand key components: sensor, transmitter, and control panel.
Follow proper alarm response procedures to handle emergencies effectively.
Distress and intrusion alarms require immediate attention and action.
The control room plays a central role in coordinating alarm response security.
A security patrol is an important part of the security guard duty. In which a guard tours to keep watch over the area, which makes you more visible and deters crime. Staying in a post you can not observe a large portion of the site but go for patrol you can cover more area and can observe what is going on in the surroundings.
The security guard is hired to protect people, property, and information. A uniformed guard deters crime against people or property by being there. When you patrol on as regular basis the widened area can protect you.
The main purpose of the patrol is to maintain security in the premises under your authority. The patrol helps you to identify the situation around your site and take action if it requires.
PURPOSE OR RESPONSIBILITY OF PATROL;
detect hazards:- like housekeeping, hazards (garbage pile and recycle bin). Maintenancehazards ( leaks, burnt-out lights). The equipment hazard (sparkling electrical wire, overheated boiler, sprinkler system), etc.
detect emergencies such as floods, fires snow melting, etc.
For keeping the site safe reporting injuries, giving first aid, and escorting them if they feel unsafe.
To make sure the area is secured from intrusion. such as vandalism, break, and entry theft, shoplifting, and assault etc.
Reporting the machinery that not working properly such as heating and cooling systems.
Check for damaged property
and protect information by ensuring only authorized people are in controlled areas.
Check the unusual sound and their sources
Check for unusual conditions and improve community relations by giving help and information to the public.
Report and record It is very important to record in your notebook the thing that was found unusual in the process of patrol and report to the supervisor.
The 5 types of Patrol;
Reactive: patrol after the incident happened
Proactive: You do Patrol to prevent the incidents. (You think and you do)
Control area: Patrol for dominating or controlling the area. (you do patrol as post order)
Random: You do the patrol randomly. (not fixed time or route)
Directed: Someone asked or directed you to do patrol. (Sometimes control room or supervisor directs you go patrol to check something.)
Method of security patrol;
Foot patrol
Bicycle
Vehicle
Visual (CCTV/Mirror)
What senses will you use a security patrol?
Sight:
Be observant
Check for unusual conditions
Hearing:
Check for unusual sounds and investigate their sources
Examples include running water, smashing glass, and malfunctioning equipment.
Smell:
Examples include smoke, gas, and overheated machinery
Touch:
Air Currents
Temperature change
Taste:
Use with caution
What should you check and do while on patrol?
The security guard generally performs their duty on the day and night shifts. Either shift you work it does not matter. You have to go for a patrol as per the circumstances around you. The security guards who work on a holiday, have to patrol constantly even it is daylight.
Patrol at the night time is more sensitive than patrol at the daytime. Because of poor illumination, the criminals generally make a plan for the night. But, you can take advantage of the dark to observe closely what is going around you without being visible. Here are important things you should do in the patrol.
Security guards carry out a protective search on their site if the site policy is required. The protective search conducts in two situations;
Search for the weapon and evidence after detaining the person.
search the employees, visitors, vendors, and the public as well as their belongings when entering and exiting the premises.
There are four reasons for the search;
To keep essential things in
To keep potential problems out
To control access to an area
To know what is in a specific area
Your client hires you for keeping himself and his property safe from any problems. So, the security guards apply the access control policy for all people who want to enter the site.
A search is also part of the access control which allows only authorized people, vehicles, and material in and out of the site.
The protective search procedure may include in your post order if not, you should suggest the client and your supervisor.
Sometimes your client can be suspicious that the employees may steal the goods from the company.
For that reason, you may be asked to search for the employees’ bags and other belongings while leaving the company.
What things need to search on the site?
Dangerous items
stolen items
prohibited items
The search can contemplate finding the above items either people in or out of the company.
If the people come in with dangerous items such as a weapon or other tools that can use a weapon. They may have the intention to hurt or injure someone already inside the premises.
Search for prohibited items for instance drugs, marijuana, and other items which are not allowed to carry with them.
Any goods stolen from the company also need to conduct a protective search.
Providing security permission you may require to search the people, packages, and vehicles in different kinds of investigation which are;
Visual search ( search through your eyes)
A request search ( you made a request for a search)
Agreed search (someone came to you and asked for a search)
When do you search for a vehicle?
Required by your post order
When vehicles enter the site (to search for weapons/equipment)
While vehicles are out from your site (to avoid theft)
Vehicle search tools;
You have to use the different types of equipment to search for a vehicle that is available on your worksite. But, here are the general tools that, you may utilize on searching for a vehicle in many places.
Your eyes
Flashlights
X-ray
mirror
dog
When to search for people or packages?
Required by your site order
When a person enters an area and is carrying something that could conceal (hide)
If a person leaves a high-security area
When a person enters an area could be carrying something dangerous.
Remember, the most important tool for any kind of search is your EYES.
Tools to use search for persons or packages;
Eyes
Metal detector
X-ray
Hand search
When you conduct the protective search you shouldn’t do your own because it can be a violation of the person’s rights and you have to do hard to prove it in court.
When some people do not agree with you about searching for them or their personal belonging.
In that situation, you shouldn’t force them to do so, because you don’t have a right to compel someone for help. Explain to them why it is needed. and what you are going to search for.
In the first place, try to gain co-operation. Still, they don’t allow you then inform the supervisor or the client representative.
GAINING COOPERATION
Be polite and speak with authority: Talk to people first, don’t just take their bag from them and begin searching. Remember that your job does not be afraid to speak to someone.
Ask for Cooperation: Ask “do you mind if I search your bag?” rather than telling them they have to be.
Tell people why: People always want to know why?. You should tell them valid reason before they ask (company policy/special instruction by your client)
Find something prohibited: Don’t accuse people, be polite in telling someone that an item cannot be brought in.
Thank people for their cooperation
What personal property do you store for security purposes:
Storing shopping bags: (in a retail shop): in order to prevent theft
mobile phone: In the high-security area (provide a safe facility to keep)
storing vehicles: park the vehicle in a secured area
Storing identification: keep personal and return them when they are out.
IN SUMMARY
Searching is part of the role of providing protection
There are 4 main reasons to conduct a protective search
Searches are conducted for items that are dangerous, stolen, or prohibited
The vehicle is generally searched as required by site orders, when they enter a site, and when they leave a site
People and packages are generally searched as required by site orders.
People can carry something with them a stolen item when they leave a high-security area, and when they enter your duty place can bring something dangerous.
Know how to use search equipment available at your worksite
A person should only be searched as required by your site orders
If a person must be searched, it should only be done by someone of the same gender male-male or female-female
Always try and gain cooperation when conducting a protective search
You may be required to check identification at the same time as conducting a protective search
If you store personal property as a result of a protective investigation, always provide someone with a receipt for their property.
What is access control in security guard? it is a method used to control and monitor the entry of people, vehicles, and goods to a specific site. It ensures that only authorized individuals are in the right place and at the right time.
The access control mechanism is used everywhere, including your house, car, and office. For example, you close doors, windows, and gates when leaving the house, lock your car after parking, and secure doors and windows after office hours. All these activities are performed to prevent unauthorized entry and ensure safety.
What is the Purpose of access control:
There can be many reasons why the access control mechanism
Controlling the flow of people – control and monitor the movement of people.
Prevent unauthorized access – Ensures only authorized personnel can access specific locations.
Manage vehicle flow – Controls the entry and exit of vehicles.
Prevent unauthorized vehicles – Stop unauthorized vehicles from leaving or entering the premises.
Monitor goods movement – Prevents unauthorized goods from entering or exiting the site.
Create a secure environment – Enhances safety and security in the workplace.
Aim of the access control in Security:
Access control is a key duty of security guards. It aims to prevent unauthorized individuals, vehicles, and materials from accessing the property. By controlling the movement of people, vehicles, and goods in and out of the site, security guards ensure the safety and protection of the premises.
What is the level of access control for security guards?
The level of access control may vary depending on the site and what it needs to protect. But, in common, there are three categories of access control as following;
1. Minimum access control:
Minimum access control applies to areas where general permission is granted to everyone, such as shopping malls, public parks, bus stations, and railway stations. In these places, it is assumed that all individuals entering have a lawful purpose.
However, as a security guard, you must restrict access to anyone who violates the law or regulations to maintain order and safety.
2. Mediam access control :
Medium access control usually applies to residential buildings and offices. Security guards manage access by using intercom systems to verify visitors. They record visitor information, issue visitor passes, and record the person being visited along with the purpose of the visit in their log book.
Guards allow individuals to enter the premises only after having permission from the concerned person.
3. Maximum access control:
The maximum level of access control is found in sensitive sites, such as military bases, government offices, labs software manufacturers, etc. The access controls here combine both the security guard and alarm system.
Security guards are responsible for searching vehicles, baggage, and even individuals as required by the site’s security protocols.
Rules of Access Control:
Access control rules depend on the site’s specific requirements.
Allow public access during specific times: Some areas allow the general public to enter at specific times and days. For example, people can access the lobby or waiting area during office hours, but security guards restrict entry after hours.
Control parking area access: Security personnel manage access to parking areas, applying rules based on time and purpose.
Update rules based on security needs: Top management reviews security matters and updates access control rules as needed.
Restrict employee movement: In large organizations, employees cannot enter other departments unless they have a valid reason.
Apply rules to everyone: Security guards enforce these rules for both employees and the public to maintain safety and order.
What does access control determine?
Need of the clients:
The clients who do business with a company always are concerned about the safety of the products that they have bought, or that they have stored.
Sometimes the clients need different types of entry and egress mechanisms. The result for that the policy can be changed as per the client’s requirement.
2. The owner of the property:
The property owner may set all rules of the access control. He instructs the security guard who can access the building or area. And, what needs to search before entering and exiting the property.
ACCESS CONTROL IN ELEVATOR AND ESCALATOR
If you are working in a shopping mall or a residential building where the elevator or escalator facilities are available. You are responsible for supervising the elevator operation. Make sure the following things go well in the operation of the elevator.
Notify the maximum load to the passengers.
Encourage the passenger to move to the rear of the elevator and face to the front.
Make sure the people’s clothing and personal belongings are away from the door on closer.
Know the emergency system such as a stop button, bell, and telephone numbers.
METHOD OF ACCESS CONTROL IN A SITE.
Access Control Method:
The access control method may vary depending on the site, but it generally follows three main layers: the outer perimeter, inner perimeter, and central core area.
Outer Perimeter: This is the outer boundary of the property, such as fences, gates, or surrounding areas.
Inner Perimeter: This includes the building’s walls, doors, and windows, which act as barriers to control entry.
Central Core: This is the most secure interior part of the building or site, where sensitive operations or assets are located.
Controlling the movements of people
Security guards control the movement of people across various parts of the site through three phases of defense:
Perimeter
Inner Circle:
Center Core:
Security personnel must manage and monitor the movement of people at all three layers to ensure effective protection and prevent unauthorized access.
How to control access at the perimeter?
Fences and walls
Gates and other openings
Infrared beam perimeter security systems
Cameras
Lighting
How to control access to the inner perimeter?
Entry through the security guard
Enter through the mechanical and electrical devices.
Entry through the security guard;
You may ask to do duty at the entrance of the building and be responsible for checking the personal identity and determining whether a person to allowed in or not. The following way you should allow the person to access the building.
personal recognition:
(you know the person personally) is only useful for small businesses. Also, it applies in an area where the less movement of the people. Such as regular vendors, visitors, and employees who only come for work.
ID system:
(check the person has a valid ID card) these are things you should make sure of while checking the ID.
a colored photo and physical description of the holder
the full name and signature of the holder
the company’s name and an issuing authority’s signature
an expiry date
A serial number and employee number
Special passes:
In a high-security area, the person requires a special pass to access there. If the person is a temporary worker he needs a special pass from the security guard. He provides you driving license, national ID card, or any other government-issued identity, and you provide a special pass.
At the exiting time, you should return your ID and get back the special passes. You should record all the details in the logbook including entry/exit time and description of the work he has done.
Entry through the mechanical/electrical device;
It is used in the medium level of access where a security guard does not need to check everything about the employees. They can go in by using pre-approval electrical and mechanical cards, keys, and storage data.
Controlling vehicle movement is as important as managing people on the site. As a security guard, you must take specific measures to enforce access control rules effectively. Your main responsibilities include:
Allowing only authorized vehicles: Ensure that only vehicles with proper authorization can enter the site.
Preventing unauthorized equipment and material removal: Check vehicles to stop unauthorized equipment or materials from being taken out of the premises.
Maintaining a vehicle log: Record details of all vehicles entering and leaving the site to keep an accurate log for security purposes.
Tools to use for vehicle control:
Gate
Barrier
Traffic cone
Sign and symbol
When controlling vehicle movement, ensure that only pre-approved vehicles enter the site. Employees must obtain approval from company management to bring their cars, and you must verify that the vehicle has the approved company label or sticker.
You should log vehicles in and out of the premises and register the driver’s details in the access control book. Additionally, check the vehicle’s size and height. If a vehicle exceeds the site’s size or height limits, immediately inform your supervisor.
Your task on controlling the delivery vehicle
check vehicle license numbers and driver’s name
Only the proper authorized delivery is given and received
receive the delivery by post orders
Check the vehicle is sealed and that the “seal” is not broken or tempered.
Verify the vehicle when leaving the premises to make sure it has loaded only authorized items and has waybills and any other supporting documents.
Check the vehicle cabs to discover the prohibited items that may be concealed.
3. Controlling the movement of the material
Controlling the material access is the most sensitive task a security guard performs on duty. In the course of your duty, you may deal with the illegal removal of the material from your site either through the employees or the service vendor.
Routinely employees leave the site with things like a laptop, computer, computer parts, full briefcase with goods, or the vehicle.
As your part of the duty, you should allow only the legitimate material in and out of the premises. If you find anything without approval taken out, then ask for the gate pass from the responsible person.
There is no doubt in today’s world, industrial espionage is increasing day by day. Hence, the security guard has to prevent accessing sensitive material and removing it from the company.
Shipping and receiving controls
In some instances, the client may ask the security guard to sign some documents for shipping and receiving the goods. The clear client’s instruction requires or your post order includes these tasks to do on your duty.
You should comply with the client’s wishes when you control the movement of the material. You may be required to do, as follows, with the shipping and receiving items.
Fill out the special form for the receiving packages if available.
complete the logbook of the shipping and receiving of goods
Delivery sign-out and sign-in
Make arrangements for the delivery and recipient of goods.
Summary:
What is access control in security guard? Access control is a security measure for managing the movement of people, vehicles, and materials when in and out of the site.
There are many reasons why access is controlled and it can be controlled by
Physical systems (such as barriers, gates and doors, etc.)
The man guarding (security guard controls the movement) or
Combination of both
Guard should be familiar with their site policies regarding access and be aware of their response to common access control situations
The 2 basic requirements of personnel access are
Determining to identify and
Determining the level of access.
Identification shown to you by a visitor/co-rep may not necessarily be in the form of an ID card.
Guards may be required to make sure there is a sign-in/sign-out log at their site
In handling unauthorized access, guards should make sure that they know their site policies and remain policy at all times.
There are 3 main responsibilities in controlling vehicle access:
Only authorized vehicles are permitted
Unauthorized equipment and material removal
and maintain a log of a vehicle entering and leaving
The guard should be aware of the approved vehicle at their site
The guard should be aware of the height and size limitations of a vehicle access point
Ensure that vehicle access points are clear for approaching emergency vehicles.
Integrity is the most important quality a professional security guard can possess. It is an internal guideline that guides how you react positively to the outside world. A person who possesses integrity is respectful, reliable, honest, and principled.
Key Elements of Integrity
The most important elements of integrity as follows influence your daily duties and how you interact with others.
Respectful
Reliable
Honest
Principled
When are you respectful:
When you exercise the following four points on your duty. It brings positive responses and respect from co-workers, employers, and the general public.
Like yourself and treat yourself well: being respectful of yourself and your job influences how you carry yourself and how others perceive you.
Treat others as you would treat yourself: Show courtesy, kindness, and helpfulness to build positive relationships.
Understand the importance of following laws and orders: Adhere to official rules and regulations it demonstrates professional conduct.
Respect the property of others: Protecting and caring for the belongings of others is a key part of security work.
When are you Reliable:
A security guard holds one of the most trusted positions in any organization. You are responsible for protecting valuable property, VIPs, and sensitive information. To be seen as reliable, you should:
Perform your duties to the best of your ability: Always do your job to the highest standard.
Take control of situations and stay calm in emergencies: Responding appropriately under pressure builds trust and confidence.
Be punctual when arriving and leaving: Reliability includes respecting time commitments.
Share information with guards on other shifts: Good communication ensures continuous and consistent security coverage.
When you are honest:
Honesty is another crucial quality for a security guard. If you are honest, everyone believes in you and expects positive outcomes from your actions. You show honesty by:
Telling the truth: Always tell the truth because untrustiness undermines professional relationships.
Taking responsibility for your actions instead of blaming others: Be accountable for what you have done it is essential for personal and organizational integrity.
Keeping information to yourself when necessary: maintain confidential information rather than leakage.
Being sincere with others: When you interact genuinely fosters respect.
When you are principled?
If You are a principled person you have a moral of speaking about the right and wrong with either junior or senior position in an organization. These things show you are principled;
You believe in treating everyone fairly
You speak out if you see someone being treated unfairly.
Additionally, a professional security guard also has self-control and discipline. Some people may criticize you because of your uniform which represents authority.
If you are angry at that point the situation would go worse beyond the horizon. So, you should stay calm in an emergency that’s the reason the other people who are frightened turn to your guidance.
If you are disciplined.
1. Show strong self-control, even when challenged
Remain calm under stress
Follow procedures with little or no supervision
You are well-organized a carry out your duties with care
Do not become involved in any gossip in your workplace
6. Enforce the rules and procedures at your site no matter who is involved
ACCEPTING FAVORS
“Accepting favor or a security courtesy” means a security guard obtains something from a third party free of charge.
Someone or businesses out of your company can offer you gifts, money, food, goods, or other property for partisan services.
Consequences of Accepting Favour
Harms your decision-making ability:
Accepting anything from a third party will damage the security guard’s decision-making ability when it comes to the individual or business from whom they had received the gift or any other things.
May compromise your impartiality and create bias:
This can make it very difficult for the security guard to act with impartiality without the favor of someone or bias.
Damages public trust in the security industry:
Cause of that public trust and support toward the entire security industry can be affected in general.
Reflects poorly on you, and your colleagues:
A wrong decision not only blames the particular security officer but also your fellow officer, your company, and the whole security industry in the eyes of the public.
Hence, stay away from these types of activities in your workplace which can cause the damaging reputation of the security industry as a whole.
Summary
A security guard demonstrates integrity by doing the following:
Obeying all work-site rules and regulations.
Respecting all laws (federal and provincial/state).
Being reliable, punctual, and professional at all times.
Carrying out all duties in a professional manner.
Completing assigned tasks on time.
Upholding these standards will help ensure you represent yourself, your employer, and the security profession with dignity and professionalism