Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Security Law and Methods -  James Pastor

Security Law and Methods (eBook)

(Autor)

eBook Download: EPUB
2006 | 1. Auflage
632 Seiten
Elsevier Science (Verlag)
978-0-08-046593-7 (ISBN)
Systemvoraussetzungen
61,61 inkl. MwSt
(CHF 59,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Security Law and Methods examines suggested security methods designed to diminish or negate the consequence of crime and misconduct, and is an attempt to understand both the legal exposures related to crime and the security methods designed to prevent crime. The clear and concise writing of this groundbreaking work, as well as its insightful analysis of specific cases, explains crime prevention methods in light of legal and security principles.

Divided into five parts, Security Law and Methods discusses the topics of premises liability and negligence, intentional torts and claims, agency and contract based claims, legal authority and liability, and the subject of terrorism. It also offers an evocative look at security issues that may arise in the future. The book serves as a comprehensive and insightful treatment of security, and is an invaluable addition to the current literature on security and the law.

* Contains clear explanations of complicated legal concepts
* Includes case excerpts, summaries, and discussion questions
* Suggests additional research and relevant cases for further study
Security Law and Methods examines suggested security methods designed to diminish or negate the consequence of crime and misconduct, and is an attempt to understand both the legal exposures related to crime and the security methods designed to prevent crime. The clear and concise writing of this groundbreaking work, as well as its insightful analysis of specific cases, explains crime prevention methods in light of legal and security principles. Divided into five parts, Security Law and Methods discusses the topics of premises liability and negligence, intentional torts and claims, agency and contract based claims, legal authority and liability, and the subject of terrorism. It also offers an evocative look at security issues that may arise in the future. The book serves as a comprehensive and insightful treatment of security, and is an invaluable addition to the current literature on security and the law. - Contains clear explanations of complicated legal concepts- Includes case excerpts, summaries, and discussion questions- Suggests additional research and relevant cases for further study

Front cover 1
Contents 8
Preface 12
Acknowledgments 18
Part One Premises Liability and Negligence 20
1 Introduction 22
SECURITY LAW AS A DISCIPLINE 22
HISTORICAL PERSPECTIVES 24
CRIME, CRIMINOLOGY, AND SECURITY LAW 29
CONTEMPORARY CIRCUMSTANCES 35
NEGLIGENCE ELEMENTS AND PRINCIPLES 39
PRE-INCIDENT ASSESSMENTS 54
POST-INCIDENT ASSESSMENTS 60
LEGAL DEFENSES AND THEORIES 66
2 Negligent Employment Claims 78
NEGLIGENT HIRING 78
NEGLIGENT SUPERVISION, TRAINING, AND RETENTION 89
NEGLIGENT ENTRUSTMENT 110
3 Investigative Cases and Methods 124
NEGLIGENT INVESTIGATIONS 124
Part Two Intentional Torts and Claims 162
4 Torts of Physical Nature 170
A. ASSAULT AND BATTERY 170
B. FALSE ARREST, FALSE IMPRISONMENT, AND MALICIOUS PROSECUTION 175
C. TRESPASS 201
5 Torts of a Personal Nature 208
A. DEFAMATION 208
B. INVASION OF PRIVACY 223
6 Workplace Violence Cases and Methods 242
CAUSE OF ACTION AND STATISTICS 242
7 Sexual Harassment 292
CAUSE OF ACTION AND ELEMENTS 292
Part Three Agency and Contracts 318
8 Agency and Related Theories 328
CASES 328
DISCUSSION QUESTIONS 373
9 Contracts 374
A. INSURANCE 374
ASSAULT AND/OR BATTERY 385
B. SECURITY SERVICES CONTRACTS 396
C. LANDLORD-TENANT 414
AGENCY AND RESPONDEAT SUPERIOR 318
Part Four Legal Authority and Liability 430
10 Off-Duty Police 450
CASE COMMENT 479
DISCUSSION QUESTIONS 480
11 Special Police/Private Security 482
CASE COMMENT 532
DISCUSSION QUESTIONS 532
ARREST POWERS 431
CONSTITUTIONAL PROTECTIONS 432
PUBLIC AND PRIVATE POLICING PRINCIPLES 439
EXCEPTIONS TO THE FOURTH AMENDMENT 441
USE OF FORCE PRINCIPLES 442
ARREST POWER STANDARDS 443
LICENSING STANDARDS 445
ACCOUNTABILITY STANDARDS 446
Part Five Terrorism and Future Issues 534
12 Terrorism Cases 538
13 Terrorism Statutes and Indicators 592
STATUTES 592
TERRORISM INDICATORS 598
14 Conclusions and Future Issues 606
TERRORISM ISSUES AND IMPLICATIONS 534
TERRORISM DEFINITIONS 535
Index 614

Preface

This book represents a growing area of the law—both in its sophistication as a legal discipline and of its importance to this society. The sophistication relates to the diverse and wide ranging legal disciplines which form around the notion of security. The term security can apply to a wide ranging set of issues, from crime to terrorism, and other forms of less violent—but nonetheless inappropriate—behavior, such as theft and sexual harassment. In this way, the theme of this book focuses on crime and misconduct. This theme is coupled with certain suggested security methods designed to negate, or at least diminish, its consequence.

In post 9/11 America, the issue of security has taken on new implications. While crime has plagued American society for generations, there is a new, much more deadly threat associated with terrorism. This is not to imply that “normal” crime does not matter. Indeed, crime in any form can be debilitating to society—and deadly to unfortunate victims. This book is an attempt to understand both the legal exposures related to crime, and the security methods designed to prevent crime. In this way, this book breaks new ground. It is designed to explain crime prevention methods in light of legal and security principles. To my knowledge, the combination of these principles—at least in terms of this overall substance—is unprecedented.

This book is built around a collection of cases and laws from different state and federal jurisdictions. The cases were researched from various on-line data bases. I selected cases based on the following criteria. First, I sought new cases. Since this discipline is still rather new and necessarily dynamic, selecting recent cases will better illustrate the current principles and parameters of the law. Sometimes, however, more established cases have obtained a good deal of precedent and historical value. In order to account for such, I selected a few older but key cases. These older cases are useful because the decisions are particularly well written, and because they provide a comprehensive analysis of the particular area of the law.

Second, I also sought cases that were factually interesting, sometimes even controversial. For example, there is a growing body of cases surrounding security issues after 9/11. These cases are instructive, in that the delicate balance between security and liberty (i.e., rights or conveniences) is being flushed out—often within private environments or by private parties. Unlike the myriad number of cases involving this balance within policing, these cases are now being addressed within leases, contracts, and large semiprivate forums, such as shopping malls and “trophy buildings” like the Empire State Building. Indeed, the litigation related to the first World Trade Center bombings are likely to be cited and analyzed for years to come.

Finally, while most of the cases involve private parties, there is some focus on private-public policing, and on governmental employees. In this sense, security law is broader than security versus police. Indeed, the line is increasingly being blurred. Hence, the book is broader than private security because private security is now a broader topic. Particularly since 9/11, private security is not just confined to the property lines of the business. Now it is part of the public safety apparatus. Security personnel are intimately involved in the protection of critical infrastructure, mass private property (also considered semi-public environments such as shopping malls, concert and sport facilities), and even within public streets, parks and business districts. One of the strengths of this book is that these factors are currently taking shape. Hopefully it will provide insightful and useful guidance as we go forward under an uncertain legal and security environment.

Once the cases were selected, I liberally edited the court decision in order to craft the language around certain objectives. First, I omitted most of citations from the case. Most citations were deemed inappropriate due to the nature and purpose of the book (see below discussion). Second, most of the procedural aspects of the case were omitted. Since this book is geared toward security studies by law/graduate students and professionals, the use of excessive citations and procedural language does little to further the study of security law. Such procedural niceties are only useful for attorneys crafting research, or litigation tactics and strategies. They are not useful in the body of security law. For those attorneys and law students who use this book, they have ample opportunity to study civil procedure in other legal books and disciplines.

Instead, I sought to present the key factual and legal principles related to security law. This is the key benefit of this book. These cases, if critically examined, are instructive at the factual and principal level. Since no two cases are factually alike, the presentation of factual scenarios coupled with sound legal reasoning will enable the reader to understand the exposure he or she may face as a security practitioner. For attorneys, these cases will provide the framework for a niche “public safety” practice, as a personal injury litigator, or as a counsel for a large corporation. In any event, the cases focus on substance, not procedure.

The third editing objective was to commence with a brief overview of the case and the decision. In this way, the reader will know from the outset what the case is about and who won. Hopefully, this will help to focus the reader, particularly those who are unfamiliar with case law. The intention is to get a quick understanding in order to fully understand the reasoning of the decision.

Fourth, the cases were organized around certain subjects. Subjects include defamation, invasion of privacy, negligence, and the like. Sometimes there will be overlap in these areas. For example, a case listed under defamation may involve several other legal theories, such as wrongful discharge, battery, and intentional infliction of emotional distress. When this occurs, I tried to classify the case into the dominant subject. Admittedly, this was not a perfect exercise. For those cases that seem to be better served in another subject, you can attribute this error to my editing process—and to the diverse nature of security law. Hopefully it will be attributed more to the latter than the former.

Following the presentation of the cases, I provide a brief case comment. Sometimes the comment will emphasize principles derived from the case. Other times, I will focus on specific facts that turned the decision. The case may also be contrasted with another case, to illustrate differences in how the case was approached, or the decision of the court. In addition to these techniques, discussion questions are presented at the end of the section in order to facilitate classroom discourse and individual analysis. Using these techniques, the goal is to get the reader to think critically about the case—and the relevant principles and facts contained in these cases.

In each section or chapter, I introduce the elements of the particular cause of action. Since each legal theory has particular elements, I highlight these prior to presenting the case. At appropriate points, certain suggested security methods which relate to the particular cause of action are presented. In this way, the reader should have a grasp of the legal theory, its elements and principles, and of the security methods designed to reduce the likelihood of its occurrence—or at least to limit the liability exposure if it does occur.

Part One provides an overview of Premises Liability and Negligence. Chapter 1 serves as an introduction to the key cause of action in security law: negligence. In this chapter the elements are presented in some detail. In addition, the notion of premises liability, which is based on negligence, is analyzed from historical to contemporary times. Included in this analysis, a chart listing premises liability standards in each state is presented. The benefit of this chart is to provide a handy resource for research and comparative analysis. Chapter 2 presents various Negligent Employment based causes of action, such as Negligent Hiring, Negligent Supervision and Training, and Negligent Entrustment. Chapter 3 presents Investigative Cases and Methods.

Part Two provides an overview of Intentional Torts and Claims. Chapter 4 presents Torts of Physical Nature. These causes of action range from assault and battery, false arrest/false imprisonment and malicious prosecution, and trespass. Chapter 5 focuses on Torts of Personal Nature, such as defamation and invasion of privacy. Chapter 6 delves into Workplace Violence, with an explanation of its definitions, risk factors, implications and illustrative cases. Chapter 7 presents Sexual Harassment, with definitions, principles, defenses, and illustrative cases.

Part Three shifts to Agency and Contract based claims. Cases in this section include...

EPUBEPUB (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich