Security Department Policy Term Paper

Length: 5 pages Sources: 5 Subject: Criminal Justice Type: Term Paper Paper: #45140883 Related Topics: Miranda V Arizona, Security, Miranda Rights, Exclusionary Rule
Excerpt from Term Paper :

Many states, such as Virginia, are training private security officers in order to ensure smooth cooperation and coordination between security companies without police powers and the police and sheriff's departments. In Washington D.C., the municipal police department requires private security officers to be licensed as "special police" officers in order to legally search or arrest people. Cooperation can reach significant proportions, as in the case of the Minneapolis Police Department's "SafeZone" program, which place private security officers downtown who now outnumber Minneapolis Police Department officers there 13 to 1.

4. Industries and organizations that use special and/or commissioned officers and for what purposes

a. There is a truly broad range of industries and organizations which use special police officers. These organizations tend to have significant financial resources, large premises, and sensitive security needs which they believe cannot be met by the existing public police force. These often involve the need to have an officer permanently standing guard on the premises who have the authority to investigate potential criminal situations and detain individuals.

b. The reasons for unmet security needs often arise because of limitations in resources and manpower or limitations created by the particular policing strategy of the private organization. For example, department stores hire private security officers for loss prevention purposes because most police departments will not commit their limited manpower to stand guard at a store. Private residential communities often hire private security officers with police power because of the increased risk of property crime faced by rich private communities.

c. Even local governments themselves hire private security forces to assist the public police department in patrolling broader areas. This is particularly true of those local governments which lack the resources to increase their police forces. These government often receive help in funding the hiring of these private security forces from interested private parties themselves. For example, Target and other Minneapolis companies paid for a wireless video camera system in Downtown Minneapolis which private security forces share with the Minneapolis...


Miranda Rights

a. The 4th Amendment requires arresting agents to read an arrested individual the individual's Constitutional Rights within a reasonable period after formally arresting the individual. These are the right to remain silent, the right to an attorney, and a caveat that anything the arrestee says can be used against him in a court of law. These rights are collectively known as Miranda rights after the Supreme Court case Miranda v. Arizona.

b. Among hospital staff, the only persons who would have to read Miranda rights to an arrestee would be a private security officer with valid police powers who is arresting the individual pursuant to the powers and responsibilities vested in him by the appropriate authority. Also, the private security officer should also be exercising his powers in pursuance to the job duties and directions provided to the officer by the employer, both in employment contract as well as through less formal communications.

6. Detention of individuals by private security officers and the circumstances in which individuals are detained

7. Generally, individuals in custody are given court procedural justice protections by the Sixth Amendment in addition to the search and seizure protections they enjoy under the 4th and 5th Amendments. The Sixth Amendment protections guarantee a right to representation by an attorney and the right to a speedy trial. Search and seizure law protects individuals from undue coercion and harassment of an arrested individual by an officer after the individual has entered the custody of the officer. These protections strengthen if an individual exercises the Miranda Right to remain silent and the right to an attorney.

8. Evidentiary issues in the investigation of crime and arrest of individuals.

a. The exclusionary rule prohibits the government from profiting from its own misconduct in violating the 4th, 5th 6th, Amendments. Illegally obtained evidence cannot be used to prove the guilt of the defendant. Furthermore, the "Fruit of the Posionous Tree" doctrine extends the exclusionary rule to all evidence derived from the exploitation of the illegally obtained evidence. Illegally obtained evidence of the fruits thereof, however, may be admitted for the limited use of impeaching the defendant's testimony in a criminal trial.


U.S. Constitution

Amy Goldstein, Washington Post, the Private Arm of the Law…

Sources Used in Documents:


U.S. Constitution

Amy Goldstein, Washington Post, the Private Arm of the Law January 2, 2007

Cite this Document:

"Security Department Policy" (2011, March 31) Retrieved May 19, 2022, from

"Security Department Policy" 31 March 2011. Web.19 May. 2022. <>

"Security Department Policy", 31 March 2011, Accessed.19 May. 2022,

Related Documents
Security Policy Document: Global Distributions, Inc. The
Words: 1891 Length: 7 Pages Topic: Education - Computers Paper #: 62769095

Security Policy Document: Global Distributions, Inc. The purpose of this document is to establish key security parameters and guidelines for Global Distributions, Inc. (GDI) in order to protect the interests of the company and its clients. Scope These policies apply to all operations managed by GDI, including interactions and interfaces with client companies that are managed by GDI. All communication networks, database systems, and servers full under the purview of this policy. Policies Definition of

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Pages Topic: Business Paper #: 25262390

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Security Awareness the Weakest Link
Words: 8202 Length: 30 Pages Topic: Education - Computers Paper #: 52504223

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Policy Recommendation for TSA Privatization and Collaboration
Words: 8019 Length: 27 Pages Topic: Political Science Paper #: 71841725

Policy Recommendation for Collaboration and TSA Privatization The objective of this study is to evaluate the benefits of collaboration between the federal government and non-profit organizations. The study cites different examples of collaborations across the world and their achievements. Moreover, the paper investigates whether it is beneficial to privatize the TSA (Transportation Security Administration) since the organization has performed below the international standards in the last few years. Finally, the study

Security Plan Target Environment Amron International Inc.
Words: 2339 Length: 6 Pages Topic: Careers Paper #: 80195487

Security Plan Target Environment Amron International Inc. Amron International Inc. is a division of Amtec and manufactures ammunition for the U.S. military. Amron is located in Antigo, Wisconsin. Amron also manufacturer's mechanical subsystems including fuses for rockets and other military ammunitions as well as producing TNT, a highly explosive substance used in bombs. Floor Plan Target Environment The target environment in this security plan is the manufacturing operation located in Antigo, Wisconsin, a

Security Programs Implementation of Information Security Programs
Words: 1415 Length: 4 Pages Topic: Education - Computers Paper #: 50736542

Security Programs Implementation of Information Security Programs Information Security Programs are significantly growing with the present reforms in the United States agencies, due to the insecurity involved in the handling of data in most corporate infrastructure systems. Cases such as independent hackers accessing company databases and computerized systems, computer service attacks, malicious software such as viruses that attack the operating systems and many other issues are among the many issues experienced