Course highlights: proper techniques for securing, protecting, and documenting an incident or crime scene.
Information about this course
Security personnel play a crucial role in preserving an incident scene to ensure proper investigation and evidence integrity. This course provides training on identifying and securing crime scenes, handling evidence, and following legal procedures to avoid contamination. Participants will learn how to identify and detain individuals at the scene, manage witnesses, and document key details to assist law enforcement. The course also covers legal considerations, including the exclusionary rule and the impact of improper evidence handling.
Participants will be provided with an understanding of the following:
Identifying & Securing Evidence
Understanding different types of evidence and their legal relevance
Identifying and documenting key evidence at an incident scene
Preventing contamination and preserving evidence integrity
Managing Witnesses & Perpetrators
Identifying and detaining individuals at the scene safely
Collecting witness statements and key incident details
Understanding legal limitations of security personnel in evidence collection
Crime Scene Protection & Documentation
Establishing and maintaining scene security perimeters
Proper use of notes, reports, and photographic evidence
Legal considerations for securing and handling evidence
Legal Compliance & The Exclusionary Rule
Understanding the impact of improper evidence handling
Following legal procedures to ensure admissibility in court
Avoiding liability and tampering accusations in evidence collection
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.