answersLogoWhite

0

YOU say they have no reason. If the guard is employed by Albertsons they are simply doing their duty on their employers property. If you are not doing anything unlawful or improper, you should not have anything to worry about.

HOWEVER - if the guard approaches you in an improper manner (e.g.: desires social or sexaul contact), report them to the store manager or local law enforcement.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

While rehearsing observer can compromise the entire operation which site placement criterion considers this concern?

A well placed observer can compromise the entire operation is security. The site must be secure from attack and from observation.


While rehearsing a well placed observer can compromise the entire operation?

security


Supreme Court justices are allowed to serve for .?

They are allowed to serve on the Supreme Court for the entire time they are alive. In other words, a lifetime.


What is the job description of a mall security director?

A mall security director is responsible for overseeing the entire security team. They will also hire new employees as well as make schedules.


Are buses allowed on garden state parkway?

Yes for the entire length. There are spots where "Commercial Vehicles" over 7000 LBS are not allowed but Buses are


How long are Supreme Court justices allowed to serve for?

They are allowed to serve on the Supreme Court for the entire time they are alive. In other words, a lifetime.


A computer that serves as a router a format translator or a security filter for an entire network?

gateway


What country allowed Germany to take over Poland?

The entire world, so to speak.


Do you get Security by access specifiers in Java?

No, because there is no such thing as an access specifier in Java. There are access modifiers, and security is their entire purpose, so of course you get it when you use them.


What is the difference between operating system security and network security?

operating system security concerns about vulnerabilities on specific operating system network system security concerns about vulnerabilities of the entire network regrdless how diverse or complex the network is.


What virtual private network security model uses tunneling to protect private data?

Transport Layer Security (SSL/TLS) can tunnel an entire network's


Who in an organization should decide where in the organizational structure the information security function should be locatted?

The entire organization must decide how to position and name the security function