Glossary of Terms
This glossary provides a simple overview of terms commonly used in private security and investigation.
Access Control - The practice of regulating or restricting access to a property, building, or area to authorised individuals only. It often involves the use of electronic systems such as key cards or biometric scanners.
ACS (SIA Approved Contractor Scheme) - A voluntary scheme for private security companies in the UK, demonstrating their commitment to quality and professionalism by meeting standards set by the Security Industry Authority (SIA).
ACT (Action Counters Terrorism) - A national counter-terrorism awareness campaign launched by the UK government to encourage the public to report any suspicious activity or behaviour that may be related to terrorism.
Alarm Response - Services provided by security companies to respond promptly to alarm activations at client premises. This typically involves an immediate on-site investigation to assess potential security breaches and take appropriate action.
BSI PAS 1192 - British Standard for information management during the capital/delivery phase of construction projects utilising Building Information Modelling (BIM), which includes considerations for security throughout the project lifecycle.
BS7858 - British Standard for security screening of individuals employed in security environments. It encompasses vetting procedures, background checks, and verification of employment history to ensure personnel integrity and reliability.
CCTV (Closed-Circuit Television) - A surveillance system utilising video cameras to monitor and record activities within a specific area. Unlike broadcast television, CCTV footage is not publicly distributed and is used for security purposes.
Close Protection Officer (CPO) - A highly trained security professional responsible for providing close protection and security to individuals, often high-profile or at-risk individuals such as executives, celebrities, or dignitaries.
Conflict Management - Conflict management involves strategies and techniques for resolving disputes and de-escalating potentially violent situations. It aims to prevent conflicts from escalating into physical confrontations.
Coordination and Communication - Establishing communication channels and protocols for coordinating activities among security personnel, investigative teams, clients, and relevant stakeholders.
Counter-Terrorism - Counter-terrorism refers to measures taken to combat and prevent terrorism, including intelligence gathering, surveillance, law enforcement activities, and security measures to protect against terrorist attacks.
Data Protection Act (DPA) - UK legislation governing the processing and protection of personal data. It imposes requirements for security measures to safeguard sensitive information and ensure compliance with data protection principles.
Door Supervisor - A type of security guard specifically trained to provide security and manage entry at licensed premises such as pubs, clubs, and bars. They ensure compliance with licensing laws and maintain a safe environment for patrons.
Event Security - Event security involves planning and implementing security measures for public events to ensure the safety and security of attendees, performers, and staff. It includes crowd control, access control, and emergency response planning.
Fraud Investigation - Examination of evidence and gathering information to uncover fraudulent activities such as embezzlement, identity theft, or financial scams. It aims to identify perpetrators and prevent further fraudulent behaviour.
Incident Response - Organised approach taken by security personnel to address and mitigate security incidents such as breaches, thefts, or disturbances. It involves prompt action to minimise damage and restore normal operations.
Keyholding - Service provided by security companies where they hold keys to client premises and respond to alarm activations or emergencies on behalf of the property owner. It ensures a rapid and secure response to security incidents.
Manned Security - Manned security refers to security personnel physically present at a location to monitor and protect against security threats. It provides a visible deterrent and immediate response to security incidents.
Mobile Patrol - Regular patrols conducted by security personnel in vehicles to monitor and inspect client premises for signs of intrusion, vandalism, or other security issues. They provide a visible security presence and deter criminal activity.
NATO Phonetics - Also known as the NATO phonetic alphabet or the International Radiotelephony Spelling Alphabet, NATO Phonetics is a standardised phonetic alphabet used to spell out letters and numbers over voice communication systems.
NCSC (National Cyber Security Centre) - UK government organisation responsible for providing cybersecurity guidance, support, and advice to businesses and organisations. It assists in enhancing cyber resilience and protecting against cyber threats.
Operational Planning - The systematic process of developing detailed strategies, tactics, and procedures to achieve specific security objectives or investigative goals. Key components include, Risk Assessment, Resource Allocation, Strategy Development, Tactical Planning and Coordination and Communication.
Personal Protection Officer (PPO) - Similar to a Close Protection Officer (CPO), a Personal Protection Officer (PPO) provides close protection and security to individuals, often high-profile or at-risk individuals such as executives, celebrities, or dignitaries.
Private Investigator (PI) - A professional trained in conducting investigations for individuals, businesses, or legal entities. They specialise in areas such as surveillance, background checks, or fraud investigations to uncover information and evidence.
Resource Allocation - Determining the allocation of personnel, equipment, and resources required to implement security measures or conduct investigations effectively.
Risk Assessment - Identifying potential threats, vulnerabilities, and risks to individuals, assets, or property.
RST (Residential Security Team) - A Residential Security Team (RST) provides security services tailored for residential properties, including estates, mansions, or high-value residences. RSTs ensure the safety and security of occupants and property through physical presence and surveillance.
Security Audit - A security audit involves a systematic examination of an organisation's security policies, procedures, and practices to assess their effectiveness and identify areas for improvement. It helps enhance security measures and mitigate risks.
Security Clearance - Authorisation granted to individuals after a thorough background investigation, allowing access to classified information or restricted areas. It ensures individuals are trustworthy and reliable to handle sensitive information.
Security Industry Authority (SIA) - Regulatory body responsible for licensing and regulating the private security industry in the UK. It ensures standards of professionalism and competence among security personnel and companies.
Security Risk Assessment - Evaluation of security risks and vulnerabilities at a specific location or within an organisation. It helps identify potential threats and recommend security measures to mitigate risks effectively.
SOP (Standard Operating Procedures) - SOPs are documented procedures that outline the steps to be followed in various security-related situations. They provide guidance to security personnel on how to respond to incidents, carry out tasks, and maintain security standards.
Strategy Development - Formulating overall strategies and approaches to address security challenges or investigative tasks, considering factors such as threat level, legal requirements, and client needs.
Surveillance - Monitoring of activities, behaviour, or other changing information for the purpose of influencing, managing, directing, or protecting people or assets. It helps gather intelligence and detect security threats.
Tactical Planning - Planning specific actions and procedures to be carried out in response to security incidents or investigative activities, including contingency plans for emergencies.
Technical Surveillance Counter-Measures (TSCM) - TSCM refers to the process of detecting and mitigating electronic surveillance devices or technical vulnerabilities used for eavesdropping or espionage purposes. It helps protect against covert surveillance threats.
Undercover Operation - Covert activities undertaken by security or investigative personnel to gather information or evidence without revealing their true identity or purpose. It aids in gathering intelligence and uncovering criminal activities.
VIP Protection - VIP protection involves providing close protection services to Very Important Persons (VIPs). Highly trained security personnel and specialised security measures are employed to ensure the safety and security of VIPs in various environments.