Legal Risks That Involves Searching An Individual At Employers Premises Essay

PAGES
2
WORDS
718
Cite

Private Security Law of searching an individual at Employers' Premises In the United States and many part of the world, it may be necessary to search an individual at an employer's premise to prevent the person stealing an item from a store or carrying a dangerous weapon into the employer's premises. Sometimes, it may become essential to search a person if the person is being suspected of shoplifting. While some employers employ some plain-clothes agents to apprehend, detect and arrest shoplifters, however, employers are to understand the legal risks of searching a person indiscriminately. Before searching anyone at employers' premises, there should be a probable possible cause. Typically, it is very critical to establish a solid base for a probable search to prevent a false arrest claim.

Objective of paper is to explore the legal risks of searching an individual at an employer's premises.

Legal Risks of Searching an individual at Employers' Premises

While it may necessary to search a suspected individual at an employer's premise, however, there are still some legal risks that might occurred when deciding to carry out a search. It...

...

(FindLaw, 2015). It is probably possible to search an individual if there is proof that the person has stolen some items from the premises. The issue is always the case in many retail stores where it may be difficult to monitor the activities of all people in the stores. It is very critical to have a probable cause in order to justify the action. For example, it is very crucial for employers to lay an objective cause of action in case the search leads to a legal battle. However, it is advisable to have a strong evidence that the person has stolen an item before carrying out a search. Moreover, it is very crucial to understand that it is illegal to simply stop and search a person because you think that the person may be suspicious or carrying an offensive look. However, an employer may ask a suspicious looking individual to consent to a search, if the person refuses to a search, it is advisable not to detain the person without a probable cause in order not to provoke a legal risk. A major strategy to avoid a legal risk is to carry out…

Sources Used in Documents:

Reference

Police Scotland. (2015). Know Your Right. UK.

FindLaw (2015). Illegal Search and Seizure FAQs. Thomson Reuters.


Cite this Document:

"Legal Risks That Involves Searching An Individual At Employers Premises" (2016, January 15) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/legal-risks-that-involves-searching-an-individual-2157658

"Legal Risks That Involves Searching An Individual At Employers Premises" 15 January 2016. Web.25 April. 2024. <
https://www.paperdue.com/essay/legal-risks-that-involves-searching-an-individual-2157658>

"Legal Risks That Involves Searching An Individual At Employers Premises", 15 January 2016, Accessed.25 April. 2024,
https://www.paperdue.com/essay/legal-risks-that-involves-searching-an-individual-2157658

Related Documents

Liaison The security industry has in the recent past experienced a shift towards the Hybrid approach in which contractual agency and the client create a synergy. This approach has gained considerable attention in the recent past and is commonly known as engaged liaison. Engaged liaison is defined as a security system in which the client company and the contractual agency work in collaboration to meet specific security goals and objectives

In the event that the analysis of records of telephone, e-mail and internet use was considered to amount to an interference with respect for private life or correspondence, the Government contended that the interference was justified. First, it pursued the legitimate aim of protecting the rights and freedoms of others by ensuring that the facilities provided by a publicly funded employer were not abused. Secondly, the interference had a

Security Department Policy
PAGES 5 WORDS 1426

Many states, such as Virginia, are training private security officers in order to ensure smooth cooperation and coordination between security companies without police powers and the police and sheriff's departments. In Washington D.C., the municipal police department requires private security officers to be licensed as "special police" officers in order to legally search or arrest people. Cooperation can reach significant proportions, as in the case of the Minneapolis Police

Managing All Stakeholders in the Context of a Merger Process Review of the Relevant Literature Types of Mergers Identifying All Stakeholders in a Given Business Strategic Market Factors Driving Merger Activity Selection Process for Merger Candidates Summary, Conclusion, and Recommendations The Challenge of Managing All Stakeholders in the Context of a Merger Process Mergers and acquisitions became central features of organizational life in the last part of the 20th century, particularly as organizations seek to establish and

OH&S Taking human health and safety requirements into consideration is an important element of organizational management. It is not only important to assure employees that the organization is concerned with their health and safety in order to keep them motivated, but it is also an important aspect of organizational ethics. It is essential that any and every organization must take all the health and safety measures concerning employees into account which

Risk, Risk Management Strategies, and Benefits in Cloud Computing SITUATIONAL ANALYSIS PREMISE STATEMENT KEY DEFINITIONS SERVICE AND DEPLOYMENT MODELS BENEFITS OF CLOUD COMPUTING SECURITY ASPECTS Storage Reliability Virtualization Trust Physical Security Legal Compliance CLOUD COMPUTING RISKS RISK Management STRATEGIES Vendor Evaluation Centralized Information Governance Other Organization-Level Measures Individual-Level Security Measures Cloud computing model Cloud computing service and deployment models ISO/IEC broad categories The emergence of cloud computing has tremendously transformed the world of computing. Today, individuals, organizations, and government agencies can access computing resources provided by a vendor on an on-demand basis.