The Private Security Industry: a Review of the Definitions, Available Data Sources, and Paths Moving Forward

Total Page:16

File Type:pdf, Size:1020Kb

The Private Security Industry: a Review of the Definitions, Available Data Sources, and Paths Moving Forward The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: The Private Security Industry: A Review of the Definitions, Available Data Sources, and Paths Moving Forward Author: Kevin Strom, PhD; Marcus Berzofsky, MS; Bonnie Shook-Sa, MAS; Kelle Barrick, PhD; Crystal Daye, MPA; Nicole Horstmann, BS; Susan Kinsey, BS Document No.: 232781 Date Received: December 2010 Award Number: 2009–BJ–CX–K045 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. RTI Project Number 0212315.001.001 The Private Security Industry: A Review of the Definitions, Available Data Sources, and Paths Moving Forward Literature Review and Secondary Data Analysis Prepared by Kevin Strom, PhD Marcus Berzofsky, MS Bonnie Shook-Sa, MAS Kelle Barrick, PhD Crystal Daye, MPA Nicole Horstmann, BS Susan Kinsey, BS RTI International 3040 Cornwallis Road Research Triangle Park, NC 27709 This document was prepared by RTI International under Cooperative Agreement Number 2009–BJ–CX–K045 from the Bureau of Justice Statistics (BJS). Lynn Langton and Brian Reaves, BJS Statisticians, were the program managers. The Bureau of Justice Statistics (BJS) is a component of the Office of Justice Programs. BJS is an official statistical agency of the U.S. government. The Office of Justice Programs also includes the Bureau of Justice Assistance; the Office of Juvenile Justice and Delinquency Prevention; the Community Capacity Development Office; the National Institute of Justice; the Office for Victims of Crime; and the Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking (SMART). This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Contents Section Page 1. Executive Summary 1-1 2. Background 2-1 2.1 Defining Private Security ........................................................................... 2-2 2.2 Structure of the Industry ........................................................................... 2-3 2.2.1 Distinctions Between Contract and Proprietary Security ....................... 2-4 2.2.2 Types of Security ........................................................................... 2-4 3. Overview of Secondary Data Sources and Survey Methodologies 3-1 3.1 Sources of Secondary Data ........................................................................ 3-1 3.1.1 Survey Methodologies Used by Secondary Data Sources ..................... 3-6 4. Trends and Employee Characteristics in Private Security 4-1 4.1 Private Security Contract Firms .................................................................. 4-1 4.2 Private Security Employment ..................................................................... 4-3 4.3 Services Performed by Private Security Organizations ................................... 4-6 4.3.1 Guard Services .............................................................................. 4-8 4.3.2 Alarm Monitoring ............................................................................ 4-9 4.3.3 Investigation ................................................................................. 4-9 4.3.4 Armored Transport ......................................................................... 4-9 4.3.5 Correctional Facilities Management ................................................. 4-10 4.3.6 Systems Integration and Management ............................................ 4-10 4.3.7 Security Consulting ...................................................................... 4-11 4.3.8 Pre-Employment Screening ........................................................... 4-11 4.3.9 Information Technology Security .................................................... 4-11 4.4 Markets for Private Security ..................................................................... 4-11 4.4.1 Critical Infrastructure.................................................................... 4-13 4.4.2 Commercial ................................................................................. 4-14 4.4.3 Institutional ................................................................................. 4-14 4.4.4 Residential .................................................................................. 4-15 4.4.5 Government ................................................................................ 4-15 4.5 Demographics ........................................................................................ 4-15 4.6 Revenue ............................................................................................... 4-21 iii This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. 4.7 Expenditures ......................................................................................... 4-24 5. The Relationship between Private Security and Law Enforcement 5-1 5.1 History of Collaboration: Private Security and Law Enforcement ..................... 5-2 5.2 Issues and Challenges for Cooperation ........................................................ 5-5 5.3 Private Security–Law Enforcement Partnerships ........................................... 5-6 5.4 Private Security‘s Policing Roles and Powers ................................................ 5-7 5.4.1 Officers Moonlighting in Private Security.......................................... 5-10 6. Regulation and Training of Private Security Sectors 6-1 6.1 Legislation ............................................................................................... 6-1 6.2 Licensure and Certification ........................................................................ 6-1 6.3 Hiring and Background Check Practices ....................................................... 6-7 6.4 Training for Private Security ...................................................................... 6-8 7. Safety 7-1 8. Conclusion 8-1 References R-1 iv This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Figures Number Page 1. Distribution of Company Security Functions Between Internal and External Providers, 2005 ............................................................................................. 2-5 2. Number of Contract Security Firms in the United States by Data Source, 1967–2009 ................................................................................................... 4-2 3. Distribution of Establishments and Employees by Size of Firm (Number of Employees) .................................................................................................. 4-3 4. Total Number of Private Security Officers and Contract Security Officers in the United States by Data Source, 1980–2009 ....................................................... 4-4 5. Percentage of Private Security Officers Who Work Part Time, 1969–2008 ............. 4-6 6. Percentage of Companies Outsourcing Security Services by type of Service, 2005 ............................................................................................................ 4-7 7. Percentage of Companies That Have Purchased or Plan to Purchase Security- Related Technology, 2005 .............................................................................. 4-8 8. Number of Proprietary Security Officers per Employee by Industry Sector, 2009 .......................................................................................................... 4-12 9. Number of Employees per Security Officer by Industry Sector, 2009 .................. 4-13 10. Distribution of Security Officers by Race, 2008 ................................................ 4-16 11. Distribution of Security Officers by Highest Level of Education Obtained, 2008 .... 4-17 12. Percentage of Total Private Security Officers and Contract Security Officers Who Are Female, 2003–2008 ........................................................................ 4-18 13. Median Hourly Wage by Data Source, 1997–2008 ............................................ 4-19 14. Median Hourly Wage by Gender, 2003–2008 ................................................... 4-20 15. Annual Revenue Earned Among Contract Security Firms by Data Source (in Billions), 1980–2009 .................................................................................... 4-22 16. Average Annual Revenue per Contract Security Firm by Data Source (in Thousands), 1980–2009 ............................................................................... 4-23 17. Annual Revenue (in millions) by Largest Contract Security Firms, 2003 .............. 4-24 18. Spending on Security as a Percentage of Revenue
Recommended publications
  • PROMOTION REQUIREMENTS for CAP Members
    PROMOTION REQUIREMENTS for CAP Members BY JOHN W. TALBOTT, Lt Col, CAP NEBRASKA WING Developed on 03/15/02 Update on 26 February 2006 AIR FORCE OFFICER RANKS Colonel (O-6) (Col) Second Lieutenant (O-1) (2nd Lt) st Brigadier General (O-7) (Brig Gen) First Lieutenant (O-2) (1 Lt) Captain (O-3) (Capt) Major General (08) (Maj Gen) Major (O-4) (Maj) Army Air Corps Lieutenant Colonel (O-5) (Lt Col) AIR FORCE NCO RANKS Chief Master Sergeant (E-9) (CMsgt) Senior Master Sergeant (E-8) (SMsgt) Master Sergeant (E-7) (Msgt) Technical Sergeant (E-6) (Tsgt) Staff Sergeant (E-5) (Ssgt) CAP Flight Officers Rank Flight Officer: Technical Flight Officer Senior Flight Officer NOTE: The following is a compilation of CAP Regulation 50-17 and CAP 35-5. It is provided as a quick way of evaluating the promotion and training requirements for CAP members, and is not to be treated as an authoritative document, but instead it is provided to assist CAP members in understanding how the two different regulations are inter-related. Since regulations change from time to time, it is recommended that an individual using this document consult the actual regulations when an actual promotion is being evaluated or submitted. Individual section of the pertinent regulations are included, and marked. John W. Talbott, Lt Col, CAP The following are the requirements for various specialty tracks. (Example: promotion to the various ranks for senior Personnel, Cadet Programs, etc.) members in Civil Air Patrol (CAP): For promotion to SFO, one needs to complete 18 months as a TFO, (See CAPR 35-5 for further details.) and have completed level 2: (Attend Squadron Leadership School, complete Initially, all Civil Air Patrol the CAP Officer course ECI Course 13 members who are 18 years or older are or military equivalent, and completes the considered senior members, (with no requirements for a Technician rating in a senior member rank worn), when they specialty track (this is completed for join Civil Air Patrol.
    [Show full text]
  • Full Performance Police Officer in a Non-Competetive Promotion the First Day of the Payperiod Following Academy Completion
    City of Bellingham Classification Specification CLASS TITLE Police Officer (Full Performance) DEPARTMENT Police UNION: POLICE GUILD SG: 29 CS: Y FLSA: Y EE04CODE: PS NATURE OF WORK: This position performs fully responsible, professional general duty police work in the protection of life and property through the enforcement of laws and ordinances. After a period of formal and on-the-job training, employees in this class are responsible for independent law enforcement duties ranging from average to considerable difficulty and performed under general supervision of a sergeant or other ranking officer. Work normally involves patrolling in an unaccompanied automobile, motorcycle, bicycle or foot patrol, and/or conducting detailed criminal investigations, traffic regulation, or community policing activities in a designated area on an assigned shift. Work involves a substantial element of danger and requires the responsible exercise of appropriate judgment in meeting critical emergency situations. Employees are sworn to act on behalf of the Police Department and the City of Bellingham and carry firearms in the performance of their duties. Employees may be directed to work on, lead, or plan special projects or assignments which call upon specialized abilities and knowledge attained through experience as a uniformed officer. Work of this class may be reviewed by superior officers via personal inspection, reviews of reports and/or oral discussion. ESSENTIAL FUNCTIONS: 1. Patrols a designated area of City on foot, bicycle, or in an automobile, motorcycle or small watercraft to investigate, deter and/or discover possible violations of criminal and vehicle (and/or boating) traffic laws, codes and/or ordinances. Maintains radio contact with the dispatch center.
    [Show full text]
  • EDUCATION in CHINA a Snapshot This Work Is Published Under the Responsibility of the Secretary-General of the OECD
    EDUCATION IN CHINA A Snapshot This work is published under the responsibility of the Secretary-General of the OECD. The opinions expressed and arguments employed herein do not necessarily reflect the official views of OECD member countries. This document and any map included herein are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. Photo credits: Cover: © EQRoy / Shutterstock.com; © iStock.com/iPandastudio; © astudio / Shutterstock.com Inside: © iStock.com/iPandastudio; © li jianbing / Shutterstock.com; © tangxn / Shutterstock.com; © chuyuss / Shutterstock.com; © astudio / Shutterstock.com; © Frame China / Shutterstock.com © OECD 2016 You can copy, download or print OECD content for your own use, and you can include excerpts from OECD publications, databases and multimedia products in your own documents, presentations, blogs, websites and teaching materials, provided that suitable acknowledgement of OECD as source and copyright owner is given. All requests for public or commercial use and translation rights should be submitted to [email protected]. Requests for permission to photocopy portions of this material for public or commercial use shall be addressed directly to the Copyright Clearance Center (CCC) at [email protected] or the Centre français d’exploitation du droit de copie (CFC) at [email protected]. Education in China A SNAPSHOT Foreword In 2015, three economies in China participated in the OECD Programme for International Student Assessment, or PISA, for the first time: Beijing, a municipality, Jiangsu, a province on the eastern coast of the country, and Guangdong, a southern coastal province.
    [Show full text]
  • Police Corporal - Patrol Department: Police Rev 03/14
    City of Winder Job Description: Police Corporal - Patrol Department: Police Rev 03/14 EEO Function: Pay Grade: PD-6 EEO Category: Professional Status: Non-Exempt Pay Type: Hourly Position Number: 6346 I. Chain of Command/ Reports To Police Sergeant or through the Chain of Command to the Chief of Police II. Job Summary The functions of a Police Corporal are similar to that of a Police Officer with additional duties as an assistant supervisor or as a shift commander in the absence of a Sergeant. While incumbents are normally assigned to a specific geographic area for patrol, all functional areas of the law enforcement field, including investigation, administration, and training are included. A Police Corporal is also expected to perform field duties relating to response to emergencies, general and directed patrol, investigation of crimes and other non- criminal incidents, traffic enforcement and control, assisting in crime prevention activities, and other law enforcement services and duties as required. A significant degree of initiative, independent judgment, and discretion is required of incumbents to develop, maintain, and successfully perform supervisory tasks in a community oriented, problem solving approach to policing. III. Essential Duties and Functions • Follow and promote Policy & Procedures of the City of Winder. • Ensures that laws and ordinances are enforced and that the public peace and safety is maintained. • Responds to and resolves difficult and sensitive citizen inquiries and complaints. • Ensures the compliance of quality customer services to the public and internal City departments and employees. • Develops and maintains effective working relationships with the community. • Ensures that the department offers and maintains an effective and positive Community Oriented Policing philosophy for the purpose of maintaining the highest possible credibility level within the City.
    [Show full text]
  • Standard Review Plan 13.6.2 Physical Security
    NUREG-0800 U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN 13.6.2 PHYSICAL SECURITY - DESIGN CERTIFICATION REVIEW RESPONSIBILITIES Primary – Office of Nuclear Security and Incident Response Secondary – None I. AREAS OF REVIEW For design certification (DC) applications, the review involves the evaluation of the physical security program design, to include those physical protection and mitigative measure elements identified to be within the scope of an applicant’s design. The review must include the required physical security elements of a DC application and may also include a review of the voluntarily submitted physical protection and mitigative measure elements. DRAFT - August 2007 USNRC STANDARD REVIEW PLAN This Standard Review Plan, NUREG-0800, has been prepared to establish criteria that the U.S. Nuclear Regulatory Commission staff responsible for the review of applications to construct and operate nuclear power plants intends to use in evaluating whether an applicant/licensee meets the NRC's regulations. The Standard Review Plan is not a substitute for the NRC's regulations, and compliance with it is not required. However, an applicant is required to identify differences between the design features, analytical techniques, and procedural measures proposed for its facility and the SRP acceptance criteria and evaluate how the proposed alternatives to the SRP acceptance criteria provide an acceptable method of complying with the NRC regulations. The standard review plan sections are numbered in accordance with corresponding sections in Regulatory Guide 1.70, "Standard Format and Content of Safety Analysis Reports for Nuclear Power Plants (LWR Edition)." Not all sections of Regulatory Guide 1.70 have a corresponding review plan section.
    [Show full text]
  • For Law Enforcement's Response to Railroad Incidents
    MICHIGAN’S ENFORCEMENT GUIDE FOR LAW ENFORCEMENT’S RESPONSE TO RAILROAD INCIDENTS This guide is dedicated to the memory of retired Norfolk Southern Railroad Special Agent and Michigan Operation Lifesaver Assistant State Coordinator David H. Cornelius. (1949-2015) NOTES OF INTEREST Collisions between vehicles and trains New Penalties for CDL Vehicle Operators Convicted of Railroad Crossing Violations: at highway-rail intersections and October 1, 2002 P.A. 534 trespassers and trains along railroad Persons convicted of any railroad crossing violation while operating a commercial rights-of-way are PREVENTABLE.. motor vehicle (CMV) will be subject to the following CDL suspensions: • A 60-day suspension for the first railroad crossing violation while operating a CMV. Strict Enforcement of highway-rail • A 120-day CDL suspension for a second railroad crossing violation within 36-months while operating a CMV. statutes, combined with Education and • A 1-year CDL suspension for three or more railroad crossing violations Engineering initiatives in a community, within 36-months while operating a CMV. reduce the loss of life and property New Employer Penalty damage related to highway-rail crashes MCL 257.319g establishes new civil infractions that could include a fine up and trespassing. to $10,000 for employers who knowingly allow their drivers to operate a commercial motor vehicle in violation of the Federal Railroad-Highway Grade Crossing requirements referenced or adopted by the Michigan Vehicle Code, Pupil Transportation Act, Motor Carrier Safety Act or the Motor Bus Transportation This guide has been prepared to assist Act. law enforcement officers in their Railroad Grade Crossing Stopping Requirements community highway-rail enforcement P.A.
    [Show full text]
  • Systems Security Engineering – Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems, Was Chosen to Appropriately Convey
    NIST Special Publication 800-160 Systems Security Engineering Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems RON ROSS MICHAEL McEVILLEY JANET CARRIER OREN This publication contains systems security engineering considerations for ISO/IEC/IEEE 15288:2015, Systems and software engineering — System life cycle processes. It provides security-related implementation guidance for the standard and should be used in conjunction with and as a complement to the standard. This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-160 NIST Special Publication 800-160 Systems Security Engineering Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems RON ROSS Computer Security Division National Institute of Standards and Technology MICHAEL McEVILLEY The MITRE Corporation JANET CARRIER OREN Legg Mason This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-160 November 2016 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Willie May, Under Secretary of Commerce for Standards and Technology and Director Special Publication 800-160 Systems Security Engineering A Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems ________________________________________________________________________________________________ Authority This publication has been developed by NIST to further its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems.
    [Show full text]
  • Pakistan's Nuclear Weapons
    Pakistan’s Nuclear Weapons Paul K. Kerr Analyst in Nonproliferation Mary Beth Nikitin Specialist in Nonproliferation August 1, 2016 Congressional Research Service 7-5700 www.crs.gov RL34248 Pakistan’s Nuclear Weapons Summary Pakistan’s nuclear arsenal probably consists of approximately 110-130 nuclear warheads, although it could have more. Islamabad is producing fissile material, adding to related production facilities, and deploying additional nuclear weapons and new types of delivery vehicles. Pakistan’s nuclear arsenal is widely regarded as designed to dissuade India from taking military action against Pakistan, but Islamabad’s expansion of its nuclear arsenal, development of new types of nuclear weapons, and adoption of a doctrine called “full spectrum deterrence” have led some observers to express concern about an increased risk of nuclear conflict between Pakistan and India, which also continues to expand its nuclear arsenal. Pakistan has in recent years taken a number of steps to increase international confidence in the security of its nuclear arsenal. Moreover, Pakistani and U.S. officials argue that, since the 2004 revelations about a procurement network run by former Pakistani nuclear official A.Q. Khan, Islamabad has taken a number of steps to improve its nuclear security and to prevent further proliferation of nuclear-related technologies and materials. A number of important initiatives, such as strengthened export control laws, improved personnel security, and international nuclear security cooperation programs, have improved Pakistan’s nuclear security. However, instability in Pakistan has called the extent and durability of these reforms into question. Some observers fear radical takeover of the Pakistani government or diversion of material or technology by personnel within Pakistan’s nuclear complex.
    [Show full text]
  • An Article About Security Management
    Cite as www.jha.ac/articles/a060.pdf BEYOND SECURITY PLANNING: TOWARDS A MODEL OF SECURITY MANAGEMENT COPING WITH THE SECURITY CHALLENGES OF THE HUMANITARIAN WORK Luis Enrique Eguren © July 2000 SUMMARY The challenges faced by humanitarian agencies working in violent scenarios pose the need for comprehensive and dynamic systems to cope with the security requirements. Security planning cannot answer all the questions: we must take a step further and discuss a model for security management. In this paper we propose an overall framework for a security management process and an incremental approach to security management. Both topics should allow agencies and practitioners to better undertake strategies for coping with the security challenges of humanitarian work. SECURITY MANAGEMENT VERSUS SECURITY PLANNING Some of the most effective humanitarian agencies have a Security Plan carefully stored in the fifth drawer of the senior manager desk (of course in many agencies that fifth drawer is full with other documents, and there is no a drawer for security plans). Even that Security Plan may consist of a series of protective measures, contingency plans and safety rules, which may be useful as security guidelines but do not grasp the fact that that security requires an adequate overall management, and it means much more than a security plan. Security cuts through all aspects of an agency´s work in a conflict scenario: it has to do with operations (as any targeting the agency may suffer can be consequence of its operations), with assessing a changing context (and conflict scenarios can change quickly), with flows of information (recording and assessing security incidents), with personnel (from recruiting to training and team building), with budgeting and funding and so on (for an in depth analysis of security management see Koenraad van Brabant´s manual1 and other relevant initiatives2).
    [Show full text]
  • Duties: the Incumbent Serves As a Bodyguard in the Execution of Protective Security Operations for the U.S
    U.S. Mission AMERICAN EMBASSY, NEW DELHI, INDIA Announcement Number: New Delhi-2019-084 Position Title: Bodyguard Regional Security Office (RSO) Opening Period: October 30, 2019 – November 5, 2019 Series/Position/Grade: LE-0701 /DLA-562042/05 Salary: Rs. 466,405 (annual salary) *Starting salary will be determined on the basis of qualifications and experience, and/or salary history. For More Info: Human Resources Office Mailing Address: Human Resources Office (Recruitment Team) C/o U.S. Embassy, Shantipath, Chanakyapuri, New Delhi – 110021. E-mail Address: [email protected] Who may apply: All Interested Candidates/All Sources Security Clearance Required: Local Security Certification Duration Appointment: Indefinite - subject to successful completion of probationary period Marketing Statement: We encourage you to read and understand the Eight (8) Qualities of Overseas Employees before you apply. Summary: The U.S. Embassy in New Delhi is seeking an individual for the position of Bodyguard in the Regional Security Office (RSO). The work schedule for this position: Full Time; 40 hours per week Start date: Candidate must be able to begin working within a reasonable period of time of receipt of agency authorization and/or clearances/certifications or their candidacy may end. Supervisory Position: No Duties: The incumbent serves as a Bodyguard in the execution of protective security operations for the U.S. Ambassador/Chief of Mission (COM), and other designated or visiting U.S. Government officials as directed. The incumbent will be under the supervision of the Bodyguard Supervisor and will be managed by the Regional Security Officer (RSO) to U.S. Embassy New Delhi in order to protect COM from harm and embarrassment.
    [Show full text]
  • CS/HB 489 Railroad Police Officers SPONSOR(S): Criminal Justice Subcommittee; Stone and Others TIED BILLS: IDEN./SIM
    HOUSE OF REPRESENTATIVES STAFF ANALYSIS BILL #: CS/HB 489 Railroad Police Officers SPONSOR(S): Criminal Justice Subcommittee; Stone and others TIED BILLS: IDEN./SIM. BILLS: REFERENCE ACTION ANALYST STAFF DIRECTOR or BUDGET/POLICY CHIEF 1) Criminal Justice Subcommittee 11 Y, 0 N, As Cunningham Cunningham CS 2) Justice Appropriations Subcommittee 13 Y, 0 N McAuliffe Jones Darity 3) Judiciary Committee SUMMARY ANALYSIS The Criminal Justice Standards and Training Commission (CJSTC) establishes uniform minimum standards for the employment and training of law enforcement officers (LEOs). Currently, CJSTC certifies a person for employment as an LEO if: The person complies with s. 943.13(1)-(10), F.S.; and The employing agency complies with s. 943.133(2) and (3), F.S. Section 943.10, F.S., defines the term “law enforcement officer” to include only those elected, appointed, or employed full time by any municipality, the state, or any political subdivision of the state. Similarly, the definition of the term “employing agency” only includes agencies or units of government, municipalities, the state, or any political subdivision of the state that has the authority to employ officers. Section 354.01, F.S., authorizes the Governor to appoint “special officers,” which are persons employed by railroads for the protection of the railroad’s employees, passengers, freight, equipment, and properties. Special officers are required to meet the law enforcement qualifications and training requirements of s. 943.13(1)-(10), F.S., but they are not certified law enforcement officers because they do not work for an “employing agency.” Railroads and common carriers that employ special officers are not considered employing agencies because they are not governmental entities.
    [Show full text]
  • Capitalism, Social Marginality, and the Rule of Law's Uncertain Fate in Modern Society
    University of Colorado Law School Colorado Law Scholarly Commons Articles Colorado Law Faculty Scholarship 2005 Capitalism, Social Marginality, and the Rule of Law's Uncertain Fate in Modern Society Ahmed A. White University of Colorado Law School Follow this and additional works at: https://scholar.law.colorado.edu/articles Part of the Criminal Law Commons, Law and Economics Commons, Rule of Law Commons, and the Social Welfare Law Commons Citation Information Ahmed A. White, Capitalism, Social Marginality, and the Rule of Law's Uncertain Fate in Modern Society, 37 ARIZ. ST. L.J. 759 (2005), available at https://scholar.law.colorado.edu/articles/429. Copyright Statement Copyright protected. Use of materials from this collection beyond the exceptions provided for in the Fair Use and Educational Use clauses of the U.S. Copyright Law may violate federal law. Permission to publish or reproduce is required. This Article is brought to you for free and open access by the Colorado Law Faculty Scholarship at Colorado Law Scholarly Commons. It has been accepted for inclusion in Articles by an authorized administrator of Colorado Law Scholarly Commons. For more information, please contact [email protected]. +(,121/,1( Citation: 37 Ariz. St. L.J. 759 2005 Provided by: William A. Wise Law Library Content downloaded/printed from HeinOnline Sun Apr 30 18:05:56 2017 -- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and Conditions of the license agreement available at http://heinonline.org/HOL/License -- The search text of this PDF is generated from uncorrected OCR text. -- To obtain permission to use this article beyond the scope of your HeinOnline license, please use: Copyright Information CAPITALISM, SOCIAL MARGINALITY, AND THE RULE OF LAW'S UNCERTAIN FATE IN MODERN SOCIETY Ahmed A.
    [Show full text]