Index 383
electronic burglary systems
communicators and keypads,
185
control panels, 185
door contacts, 186
glass break detectors, 187–188
motion sensors, 186–187
spot detectors, 188
window contacts, 186
equipment for, 22
fire systems, 204–205
implementation of, 227–229
integration of, 206
justifying of, 230, 261
layering of, 209
lighting, 203–204
locks, 203
management buy-in, 223–226, 261
needs
determination of, 208–210
product matched to, 210–211
request for proposal to meet,
210–211
perimeter security, 200–202
policies and procedures integrated
with, 207–208
security personnel and, 207–208
selection of, 217–223
service considerations, 221–222
specialized systems, 205–206
standardization of, 220–221
technology and trade shows to
view, 219–220
vendor considerations, 223
Plaintiffs theories, 272
Police data. See Law enforcement
data
Police officers. See Law enforcement
officers
Policies and procedures
description of, 170, 173–174
importance of, 174
physical security countermeasures
integrated with, 207–208
security plan, 176–179
Post orders, 243–247
Precincts, 71
Premises security liability
causation, 267–268
duty
breach of, 267
description of, 266–267
forensic security consulting,
297–298
foreseeability element, 269–270
General Security Risk Assessment
Guideline, 279–282
injury, 267
lawsuits for, 72, 265, 286
negligent hiring, 273–275
plaintiffs theories, 272
principles of, 265–266
prior similar crime rule, 269
reducing the risk of, 275
in return on security investment,
262
risk factors for, 270–271
totality of circumstances, 269–270
Preparation measures, 115
Prevention. See Crime prevention
Prevention measures, 115, 170–171
Preventive controls, 144, 152–155
Prior similar crime rule, 269
Privacy, 153
Procedural control, 151
Project
implementation strategy for,
253
quality level of, 252
success of, 252
Project close-out, 252
Project management
conclusion phase of, 252
definition of, 13, 252
development phase of, 252
execution phase of, 252
financial management, 259–260
phases of, 252
planning phase of, 252
resource management, 259–260
return on security investment,
261–263

Get Strategic Security Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.