0% found this document useful (0 votes)
17 views13 pages

Manuscript Industrial Security

Industrial security

Uploaded by

Ugly Bastard
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views13 pages

Manuscript Industrial Security

Industrial security

Uploaded by

Ugly Bastard
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

INDUSTRIAL SECURITY MANAGEMENT

WHAT IS SECURITY?

 Generally, the meaning of security is a kind of state where people, institution, authority or groups feel fully
secured of feeling, free from any threat or vulnerability from somewhere or someone in his/her life, liberty,
property or activity. It could be in physical, psychological, social or economical form
 It can be summed up as any measures taken to keep an individual or group from dangers or hazards that may
cause harm, injury, loss of life, and or loss or damage to property

WHAT IS MANAGEMENT?

 This term means the “skillful use of means to accomplish a purpose. Management can also be defined as “the
planning, deciding, or exercising of control and supervision on some functions of the organization.

IMPORTANCE OF SECURITY
 Security measures are inevitable or necessary for the attainment of goals and objectives.
 When an individual or organization is exposed to hazards, their productivity is adversely affected

WHAT IS INDUSTIRAL SECURITY MANAGEMENT?


 It is concerned in preparation by utilizing methods and devises to curtail or minimize loss to a company due to
security breach

THREE MAJOR DIVISION OF SECURITY

1. Physical Security - this concern with the physical measures adopted to prevent unauthorized access to equipment,
facilities, material and document and to safeguard them against espionage, sabotage, damage, loss and theft.

2. Personnel Security- this is as important as physical security. Personnel security starts even before the hiring of an
employee and remains to be maintained for as long as the person is employed. Its purpose is to insure that a firm hires
those best suited to assist the firm in achieving its goals and objectives and once hired assist in providing necessary
security to the work force while carrying out their functions.

3. Document and Information Security- this involves the protection of documents and classified papers from loss,
access by unauthorized persons, damage, theft and compromise through disclosure. Classified documents need special
handling. Lack of indoctrination and orientation among the personal handling them can result in the leakage, loss, theft
and unauthorized disclosure of the documents.

Types of SECURITY

 Industrial Security – A form of physical security that is concerned with the physical measures designed to
safeguard personnel and prevent unauthorized access to equipment, facilities, materials, documents, and to protect
them from espionage, sabotage, damage or theft.
 Bank Security – Is the protection resulting from the application of various measures which safeguards cash and
assets which are in storage, in transit and or during transaction.
 Operational Security – Involves the protection of processes, formulas and patents, industrial and manufacturing
activities from espionage, infiltration, loss, compromise or photocopying.
 VIP Security - a type of security applied for the protection of top-ranking officials of the government or private
entity, visiting persons of illustrious standing and foreign dignitaries.
 School Security - a type of security that is concern with the protection of students, faculty members, and school
properties. Security personnel are trained to protect the school property from theft, vandals, handling campus riots
and detecting the use of intoxicated drugs and alcohol by the students.
 Supermarket or Mall Security - a type of security which is concern with the protection of the stores,
warehouses, storage, its immediate premises and properties as well as the supermarket personnel and customers.
Security personnel are trained to detect “shoplifter”, robbery, and bomb detection and customer relation.
BASIC PRINCIPLES OF SECURITY
1. Command Responsibility
-Cannot be delegated but the security tasks can be assigned.
2. Compartmentation
-Need to know basis
3. Balance between security and efficiency
-Security prevails over efficiency
4. General principles of security remain constant
-Specific measures to suit operations
5. Security is the concern of all personnel
-Regardless of rank, position, designation

DIFFERENTIATE:

ACTIVE MEASURES PASSIVE MEASURES

These involve the installation of physical barriers, those that will deter man from committing such act
security lighting, use of vaults, locks and others. of fear of being caught, charge in court or get
dismissed, such as: security education, programs,
investigations, seminars, personnel security check.

HISTORY OF SECURITY IN THE PHILIPPINES

 The private security business began on March 11, 1933, when the first formally licensed private security agency
“Special Watchman Agency” started operations;

 Later it renamed “Jimenez Security Agency”, founded by brothers Juan and Pedro Jimenez;

 On May 30 1958, the Philippine Association of Detectives and Protective Agency Operations (PADPAO) was
formally organized;

 RA 5487 was passed on June 13, 1969 through the continuous lobbying of the incorporators and officers of
PADPAO, which set the standards and minimum requirements for the operations of security agencies.

 P.D. 11 was passed on October 3, 1972, widening the coverage of RA 5487 to include security guards employed
in logging concessions, agricultural, mining and pasture lands;

 P.D. 100 was issued on January 17, 1973, broadening the coverage of the security industry to include employees
of the national or local government or any agency who are employed to watch or secure government building and
properties.

 On August 1969, the Philippine Constabulary activated the Security and Investigation Supervisory office or
SIASO to supervise and control the organization and operation of private security and detective agencies
nationwide;

 Later it was renamed Philippine Constabulary Supervisory Office for Security and Investigation Agencies or
PCSUSIA.

 With the passage of RA 6975, this unit was absorbed by the Philippine National Police;
 Later it was made into a division of the PNP Civil Security Group and was renamed Security Agencies and Guard
Supervision Division (SAGSD);

 It was renamed to PNP Supervisory Office for Security Investigation Agency (SOSIA).

PADPAO
Philippine Association of Detectives and Protective Agency Operations

PHYSICAL BARRIERS
 A barrier can be defines as any structure or physical device capable of restricting, deterring, delaying, illegal
access to an installation.

PURPOSE OF BARRIERS
1. It defines the physical limits of an area
2. Creates a physical and psychological deterrent to unauthorized entry
3. Prevent penetration therein delay intrusion, thus facilitating apprehension of intruders
4. Assist in more efficient and economical employment of guards
5. Facilitate and improve the control and vehicular traffic

TYPES OF PHYSICAL BARRIER

1. NATURAL BARRIER – include mountains, rivers, seas, desserts or terrain difficult to traverse.
2.STRUCTURAL OR MAN-MADE BARRIER – structural constructions made by man like fences, walls, floors, roofs,
grill or other physical means to deter or impede penetration.
3. HUMAN BARRIERS – person being used on providing a guarding system or by the nature of their employment and
location, fulfil security functions
4.Animal barriers - animals are used in partially providing a guarding system. Dogs are usually trained and utilized to
serve as guard dogs. German shepherds are best suited for security functions. Goose and turkeys could also be included.
5. Energy barriers - it is the employment of mechanical, electrical, electronic energy imposes a deterrent to entry by the
potential intruder or to provide warning to guard personnel. These are protective lighting, alarm system and any electronic
devices used as barriers. :guards ,officer personnel, shop workers etc.

Three Line of Physical Defense

1.First line of Defense- perimeter fences/ barriers


2.Second line of defense- doors, floors, windows, walls, roofs and grills and other entries to the buildings
3. Third line of defense- storage system like steel cabinets, safes, vaults and interior files

FACTORS THAT BRING INSECURE CONDITION:

THREAT HAZARD VULNERABILITY RISK


– An indication of A chance of being Ccapable of being is the potential that a
impending danger or injured or harmed; physically or chosen action or activity
harm; operationally damage (including the choice of
- positive inaction) will lead to a
inimical acts loss (an undesirable
outcome).

DIFFERENCE OF PERSONNEL SECURITY TO PERSONAL SECURITY

PERSONNEL SECURITY focuses on the employees on a establishment . includes all the security measures designed to
prevent unsuitable individuals or persons of doubtful loyalty to the government, from gaining access to classified matter
or to any security facility, and to prevent appointment, or retention as employees of such individuals, That is by
conducting background check for every applicants during the recruitment to ensure that the company or organization wil
hire the most qualified for the particular position while;
PERSONAL SECURITY focuses on giving security to an individual against any threats .
WHAT IS SECURITY HAZARD?
 An act or condition which results in a situation conducive to a breach of the protection system and the subsequent
loss or compromise, or damage to personnel, property or facilities

KINDS OF HAZARD

MAN-MADE HAZARD NATURAL HAZARD


an acts or conditions affecting the safe of operation cause by natural phenomena
of the facility caused by human action, accidental
or intentional.

THE EXTENT OF DEGREE OF RISK TO SECURITY WILL BE DEFENDANT ON THE FOLLOWING:

1. RELATIVE CRITICALITY OF OPERATIONS- Is the importance of the firm which reference to the national
economy and security.
2. RELATIVE VULNERABILITY – The susceptibility of the plant or establishment to damage, loss, or disruption of
operation due to various hazard.

WHAT IS SECURITY GUARDS?


 any person who offers or render personal service to watch or secure either a residence or business establishments
or both for hire w/ a license to exercise profession.
Security Supervisor – Is charged with directing the work and observing the behavioral performance of the guard under his
unit.

Republic Act 5487, as amended – The Private Security Agency Law, approved on June 13, 1969.

2003 Revised Implementing Rules and Regulations (IRR) of RA 5487, as amended,

PNPSOSIA – Philippine National Police Supervisory Office for Security Investigation Agency
office under the Civil Security Group which is charged with the supervision, direction and control of all security
agencies in the Republic.

BASIC REQUIREMENT OF AN OPERATOR OR MANAGER OF SECURITY AGENCY

1. Filipino citizen;
2. Not be less than twenty five (25) years of age;
3. College graduate and/or a commissioned officer in the inactive service or retired from the AFP or PNP;
4. Has taken a course/seminar on Industrial Security Management and/or must have adequate training or experience in
security business,
4. Good moral character;
5. Having no previous record of conviction of crime or offense involving moral turpitude.

QUALIFICATIONS OF SECURITY GUARD OR WATCHMAN

1. Filipino citizen;
2. High School graduate;
3Physically and mentally fit;
4. At least eighteen (18) years of age but not more than fifty (50) years old;
5.Has undergone Pre-Licensing course or its equivalent.
Veterans and retired military/police personnel honorably discharge including graduates of ROTC advance (or its
equivalent in the PNP) are exempted from the required Basic-Licensing Training.

QUALIFICATIONS FOR SECURITY OFFICER

1. Filipino citizen;
2. Holder of a Baccalaureate Degree;
3. Physically and mentally fit;
4. Has graduated from a Security Officer Training Course or its equivalent

QUALIFICATIONS OF SECURITY CONSULTANT

1. Filipino citizen;
2. Physically and mentally fit;
3. Holder of Masters degree either in Criminology, Public Administration, MNSA, Industrial Security
Administration, or Law
4. Must have at least ten (10) years experience in the operation and management of security business.

PRIVATE DETECTIVE

Any person who does detective work for hire, reward or commission, other than members of the AFP, BJMP, PNP or any
other law enforcement agencies.

QUALIFICATIONS OF A PRIVATE DETECTIVE

1.Filipino citizen;
2.Physically and mentally fit;
3.Holder of baccalaureate degree, preferably Bachelor of Laws or Bachelor of Science in Criminology;
4.Graduate of a Criminal Investigation Course offered by the PNP or NBI or any police training school, or a detecIive
training in any authorized/recognized training center;
5.Advance ROTC/CMT graduate or its equivalent

DISQUALIFICATIONS

1. Having previous record of any conviction of any crime;


2. Having previous record of any conviction of any offense involving moral turpitude;
3. Having been dishonorably discharged or separated from employment or service;
2. Being a mental incompetent;
3. Being addicted to the use of narcotic drug or drugs, and
4. Being a habitual drunkard
5. Dummy of a foreigner

FUNCTIONS OF A PRIVATE DETECTIVE


1. Background Investigation;
2. Locating missing person;
3. Conduct surveillance work;
4. Such other detective work as may become the subject matter of contract between the agency and its clients. Except not
contrary to law, public order, public policy morale and good custom.

TYPES OF SECURITY GUARD FORCE


1. Company Guard Force – security force maintained and operated by any private company/corporation utilizing any of
its employees to watch secure and guard its establishment.
2. Security Agency service – security guard belonging to privately licensed agency (contractual basis);
3. Government Guard Forces –security unit maintained and operated by any government entity other than military or
police.

NOTA BENE : POSSESSION OF FIREARMS


1. One (1) firearm for every two (2) security guards;
2. Private security agency/private detective agency/company security force/government security force shall not be
allowed to possess firearms in excess of five hundred (500) units.
3. Shotguns not higher than 12 gauge
4. Weapons with bores not bigger than cal .22 to include pistols and revolvers with bores bigger than cal .38
Exemptions: in areas where there is an upsurge of lawlessness and criminality as determined by the Chief PNP, Regional
Office or their authorized representative, they may be allowed to acquire, possess and use high powered firearms.

NUMBERS OF SECURITY PERSONNEL TO BE MAINTAINED TO SECURE REGULAR LICENSE TO


OPERATE

1. Private Security Agency – minimum of two hundred (200) licensed private security personnel and a maximum
of one thousand (1,000).

2. Company Guard Force/Private Detective Agency – minimum of thirty (30) and a maximum of One thousand (1,000)

LIMITATION IN THE CARRYING OF FIREARMS

1. No firearm shall be borne nor be in the possession of any private security personnel except when in actual performance
of duty, in the prescribed uniform, in the place and time so specified in the Duty Detail Order (DDO).
2. Shall be carried only within the compound of the establishment where he is assigned to guard.
3. While escorting big amount of cash or valuable outside of its jurisdiction or area of operation, private security agency
shall issue an appropriate Duty Detail Order to the security personnel concerned

Duty Detail Order (DDO) – is a written order/schedule issued by a superior officer usually the private security
agency/branch manager or operations officer assigning the performance of private security/detective services duties.

DDO for the purpose of post duties not requiring transport of firearms outside of the physical compound or
property of a client or client establishment shall be issued for not more than a thirty (30) days duration

CLASSIFICATION OF TRAINING AND ITS DURATION


1. Basic Security Guard Course (Pre-Licensing Course) – 150 hours;
2. Re-Training Course- 48 hours;
3. Security Officers Training Course – 300 hours
4. Basic Security Supervisory Course – 48 hours

NOTA BENE!!
 All Licenses to Operate have a validity of Two (2) years;
 All applications for renewal of License to operate (LTO) shall be filed at least sixty (60) days before the expiry
date of LTO;
 No application shall be approved unless a certification is issued by FED-CSG to the effect that all licenses of
firearms of the agency are updated/renewed for at least one (1) year forthcoming during the validity of the
renewed LTO.

WHAT IS A RESTRICTED AREA?


 A restricted area is any area in which personnel or vehicles are controlled for reasons of security. Restricted area
is established to provide security for installation or facilities and to promote efficiency of security operations and
economy in the use of security personnel.

Limited Area Control includes the following:

A.Interior Area Control - Interior area control is generally affected in two ways. The first method is the system which is
initiated and terminated at the outer limits of the area to determine the movements of a visitor within the area. A second
somewhat less means of accomplishing the same thing is time travel. This system provides for checking the actual time
used by the visitor against known time requirements for what the visitor is to accomplish.
B.Visitor Identification and Movements Control - Processing and control of movements of visitor shall be included in
the PASS SYSTEM. The control of movements of visitor will depend on the installation. A visitor register shall be
maintained to include the name of the visitor, date of visit, purpose of visit, which may be filed for the future reference.
C.Key Control- A system of controlling keys shall be advised and regulations covering the disposal, storage or
withdrawals, shall be issued and imposed.
D.Fire Prevention- fire is so potentially destructive without human assistance, with assistance it can be caused to
devastate those things you are attempting to secure and, professionally accomplished, often in a way that does not leave
recognizable evidence of sabotage.

Types of Fences

SOLID FENCE FULL-VIEW FENCE


constructed in such away that visual access through - it is constructed in such away that visual access is
the fence is denied. Its advantage is that it denies permitted through the fence. Its advantages are that
the opportunity for the intruder to become familiar it allows the roving patrols and stationary guard to
with the personnel, activities and the time keep the surrounding are of the installation under
scheduled of the movements of the guards in the observation. On the other hand, it allows the
installation. On the other hand, it prevents the intruder to become familiar with the movements
guards from observing the area around the and time schedule of the guard patrols thereby
installation and it creates shadow that may be used allowing him to pick the time that is advantageous
by the intruder for cover and concealment. on his part.

Types of Full-View Fence

1. Chain link fence


 It must be constructed of 7 feet material  It must be securely fastened to rigid metal or
excluding top guard. reinforced concrete.
 It must be of 9 gauges or heavier.  It must reach within 2 inches of hard ground or
 The mesh openings are not to be larger than 2 paving.
inches per side.  On soft ground, it must reach below surface
 It should be twisted and barbed selvage at top deep enough to compensate for shifting soil or
and bottom sand.

2. Barbed wire fence


 Standard barbed wire is twisted, double-strand,  Barbed wire fencing should not be less than 7
12-gauge wire with 4 point barbs spaces in an feet high excluding top guard.
equal distance apart.  Barbed wire fencing must be firmly affixed to
posts not more than 6 feet apart.

3.Concertina wire fence


 Standard concertina barbed wire is commercially  Opened concertina wire is 50 feet long and 3
manufactured wire coil of high strength steel feet in diameter.
barbed wire clipped together at intervals to form
a cylinder.

Perimeter Barrier Opening

 Gates and Doors - when not in use and controlled by guards, gates and doors in the perimeter should be locked
and frequently inspected by guards. Locks should be changed from time to time and should be covered under
protective locks and key control.
 Side-walk-elevators - these provide access to areas within the perimeter barrier and should be locked and
guarded.
 Utilities Opening - sewers, air intakes, exhaust tunnels and other utility openings which penetrate the barrier and
which have cross sectional areas of 96 square inches or more should be protected by bars, grills, water filled traps
or other structural means providing equivalent protection to that portion of the perimeter barriers.
 Clear Zones - an obstructed area or a “clear zone” should be maintained on both sides of the perimeter barrier. A
clear zone of 20 feet or more is desirable between the barriers and exterior structures and natural covers that may
provide concealment for assistance to a person seeking unauthorized entry.
Additional Protective Measures
connected to security headquarters or office to
 Top Guard - additional overhang of barbed call for reserves in the event of need.
wire placed on vertical perimeter fences upward  Barrier Maintenance - fencing barriers and
and outward with a 45 degree angle with 3 to 4 protective walls should always be regularly
strands of barbed wires spaced 6 inches apart. inspected by security. Any sign or attempts to
This increases the protective height and prevents break in should be reported for investigation.
easy access. Destruction of fence or sections thereof should
 Guard Control stations - this is normally be repaired immediately and guard vigilance
provided at main perimeter entrances to secure should be increased.
areas located out-of-doors, and manned by  Protection in Depth - in large open areas or
guards on full-time basis. Sentry station should ground where fencing or walling is impractical
be near a perimeter for surveillance at the and expensive, warning signs should be
entrance. conspicuously placed. The depth itself is
 Tower Guard - this is a house-like structure protection reduction of access roads, and
above the perimeter barriers. The higher the sufficient notices to warn intruders should be
tower, the more visibility it provides. It gives a done. Use of animals, as guards and intrusion
psychological unswerving effect to violators. By device, can also be good as barriers.
and large guard towers, whether permanent or  Signs and notices - “Control signs” should be
temporary, must have a corresponding support erected where necessary in the management of
force in the event of need. Towers as well as unauthorized ingress to preclude accidental
guard control stations should have telephones, entry. Signs should be plainly visible and legible
intercoms, and if possible two-way radios from any approach and in an understood
language or dialect.

PROTECTIVE LIGHTING

The idea that lighting can provide improve protection for people and facilities is as old as civilization. Protective lighting
is the single most cost-effective deterrent to crime because it creates a psychological deterrent to the intruders.

Types of Protective Lighting

1. Continuous lighting - the most familiar type of outdoor security lighting, this is designed to provide two specific
results: glare projection or controlled lighting. It consists of a series of fixed luminaries at range to flood a given area
continuously during the hours of darkness.
a. Glare projection type- it is being used in prisons and correctional institutions to illuminate walls and outside barriers.
b. Controlled lighting- it is generally employed where, due to surrounding property owners, nearby highways or other
limitations, it is necessary for the light to be more precisely focused.
2. Standby lighting - it is designed for reserve or standby use or to supplement continuous systems. A standby system can
be most useful to selectively light a particular area in an occasional basis.
3. Movable or Portable lighting - this system is manually operated and is usually made up of movable search or
floodlights that can be located in selected or special locations which will require lighting only for short period of time.
4. Emergency lighting - this system is used in times of power failure or other emergencies when other systems are
inoperative.

Types of Lighting Equipment

Three types of lighting equipment are generally used or associated with security lighting. These are:

1. Floodlights - These can be used to accommodate most outdoor security lighting needs, including the illumination of
boundaries, fences and buildings and for the emphasis of vital areas or particular buildings.
2. Street lights - This lighting equipment received the most widespread notoriety for its value in reducing crime.
3. Search lights - These are highly focused incandescent lamp and are designed to pinpoint potential trouble spots.
4. Fresnel lights - These are wide beam units, primary used to extend the illumination in long, horizontal strips to protect
the approaches to the perimeter barrier. Fresnel projects a narrow, horizontal beam that is approximately 180 degrees in
the horizontal and from 15 to 30 degrees in the vertical plane.
PROTECTIVE ALARMS

 Protective alarm is one of the important barriers in security. It assists the security in detecting, impeding or
deterring potential security threat in the installation. Basically, its function is to alert the security personnel for
any attempt of intrusion into a protected area, building or compound. Once an intruder tampers the circuitry, the
beam or radiated waves of the alarm system, it will activate an alarm signal.

Three Basic Parts of Alarm System (REMEMBER THE ACRONYM “SET”)


1.Sensor or trigger device Transmission line Enunciator/annunciator
-it emits the aural or visual a circuit which transmit the it is the signaling system that
signals or both. message to the signaling activates the alarm.
apparatus.

Types of Protective Alarm System

1.Central Station System - a type of alarm where the control station is located outside the plant or installation. When the
alarm is sounded or actuated by subscriber, the central station notifies the police and other public safety agencies.
2.Proprietary system - centralized monitor of the proprietary alarm system is located in the industrial firm itself with a
duty operator. In case of alarm, the duty operator calls whatever is the primary need; firefighters, police, an ambulance or
a bomb disposal unit.
3.Local Alarm – This system consist of ringing up a visual or audible alarm near the object to be protected. When an
intruder tries to pry a window, the alarm thereat goes off.
4.Auxiliary alarm - company-owned alarm systems with a unit in the nearest police station so that in case of need, direct
call is possible. The company maintains the equipment and lines both for the company and those in the police, fire and
other emergency agencies by special arrangement. Radio, landlines, or cell phones can avail of the auxiliary system.

Kinds of Alarms

1. Audio Detection Device - it will detect any sound caused by attempted force entry. A supersonic microphone speaker
sensor is installed in walls, ceilings and floors of the protected area.
2. Vibration Detection Device - it will detect any vibration caused by attempted force entry. A vibration sensitive sensor
is attached to walls, ceilings or floors of the protected area.
3. Metallic foil or wire - it will detect any action that moves the foil or wire. An electrically charge strips of tinfoil or
wire is used in the doors, windows or glass surfaces of the protected area.
4. Laser Beam Alarm - a laser emitter floods a wall or fencing with a beam so that when this beam is disturbed by a
physical object, an alarm is activated.
5. Photoelectric or Electric Eye Device - an invisible/visible beam is emitted and when this is disturbed or when an
intruder breaks contact with the beam, it will activate the alarm.

What is a Lock?

 A lock is defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry into a
building, room, container or hiding place.

Types of Locks

1. Key-operated mechanical lock - it uses some sort of arrangement of internal physical barriers (wards tumblers) which
prevent the lock from operating unless they are properly aligned. The key is the device used to align these internal barriers
so that the lock may be operated.
2. Padlock - a portable and detachable lock having a sliding hasp which passes through a staple ring and is then made
fasten or secured.
3. Combination lock - instead of using the key to align the tumblers, the combination mechanism uses numbers, letters or
other symbols as reference point which enables an operator to align them manually.
4. Code-operated lock - a type of lock that can be opened by pressing a series of numbered button in the proper
sequence.
5. Electrical lock - a type of lock that can be opened and closed remotely by electrical means.
6. Card-operated lock - a type of lock operated by a coded card.( MODERN TYPE OF LOCK)

TYPES OF KEYS
CHANGE KEY - SUB-MASTER KEY MASTER KEY GRAND MASTER
KEY -
a specific key, which a key that will open all - a special key capable a key that will open
operates the lock and the lock within a of opening a series of everything in a system
has a particular particular area or lock involving two or more
combination of cuts grouping in a given master key groups.
which match the facility.
arrangement of the
tumblers in the lock.

Key Control

1.Key cabinet- a well-constructed cabinet will have to be procured. The cabinet will have to be of sufficient size to hold
the original key to every lock in the system. It should be secured at all times.
2.Key record- some administrative means must be set up to record code numbers and indicates to whom keys to specific
locks have been issued.
3.Inventories- periodic inventories will have to be made of all duplicate and original keys in the hands of the employees
whom they have been issued.
4.Audits- in addition to periodic inventory, an unannounced audit should be made of all key control records and
procedures by a member of management.
5.Daily report- a daily report should be made to the person responsible for key control from the personnel department
indicating all persons who have left or will be leaving the company. In the event that a key has been issued, steps should
be initiated to insure that the key is recovered.

DOCUMENT AND INFORMATION SECURITY


STANDARD RULES:
The authority and responsibility for the preparation and classification of classified matter rest exclusively with the
originating office.
Classified matter should be classified according to their content and not to the file In which they are held or of another
document to which they refer, except radiograms or telegrams referring to previously classified radiograms or
telegrams .Each individual whose duties allow access to classified matter, or each individual who possesses knowledge of
classified matter while it is in his possession and shall insure that dissemination of such classified matter is on the “need to
know” basis to properly cleared person

DOCUMENT AND INFORMATION SECURITY –


 Security involving the protection of documents and information from loss, access by unauthorized persons
 prescribes the policies and establishes the standard basic procedures governing the classification and security of
official matter.

TYPES OF DOCUMENTS
Class I – Vital Document – This is an irreplaceable records , reproduction of which does not have the same value as the
original;
Class II – Important Document- This is a record, reproduction of which cause considerable expense and labor, or
considerable delay.
Class III – Useful Document – This is a record, the loss of which may cause inconvenience but could be readily
replaced and may not present insurmountable obstacle to the prompt restoration of the business;
Class IV- Non essential Document – This record may include daily files, routine in nature, lost of which will not affect
the organization.

SECURITY OF CLASSIFIED MATTER


TOP SECRET – any information and material, the unauthorized disclosure of which would cause exceptionally grave
damage to the nation, politically, economically or militarily;
SECRET-any information and material, the unauthorized disclosure of which would endanger national security, cause
serious injury to the interest or prestige of the nation or any governmental activity.
CONFIDENTIAL – any information and materials, the unauthorized disclosure of which would be prejudicial to the
interest or prestige of the nation or governmental activity or would cause administrative embarrassment or unwarranted
injury.
RESTRICTED – any information and material which requires special protection other than those determined to be
Confidential, Secret, and Top Secret matters.

 CLASSIFY – refers to the act of assigning to information or material one of the four security classification
categories after determination has been made that the information requires the security protection as provided for
in the regulation;

 SECURITY CLEARANCE – Is an administrative determination that an individual is eligible from a security


standpoint for access to classified matter of a specific category;

 COMPARTMENTATION – Refers to the grant of access to classified matter only to properly cleared persons
when such classified information is required in the performance of their official duties, and restricting it to
specific physical confine when feasible.

 NEED TO KNOW – term given to the requirement that the dissemination of classified matters be limited strictly
to those persons whose official duties requireknowledge thereof.

Three (3) Types of Security Cabinet


SAFE VAULT FILE ROOM
a metallic container used for the . heavily constructed fire and a cubicle in a building
safekeeping of documents or burglar resistance container constructed a little lighter than a
small items in an office or usually a part of the building vault but of bigger size to
installation. Safe can be structure used to keep and protect accommodate limited people to
classified as either robbery or cash, documents and negotiable work on the records inside
burglary resistance depending instruments. Vaults are bigger
upon the use and need. than safe but smaller than a file
room.
 Its weight must be at  The vault door should be  The file room should at
least 750 lbs. And should made of steel at least 6 most be 12 feet high.
be anchored to a building inches in thickness.  It must have a watertight
structure.  The vault walls, ceiling, door and at least fire
 Its body should at least floor reinforce concrete proof for one hour.
one inch thick steel. at least 12 inches in
thickness.
 The vault must be
resistive up to 6 hours.

COMMUNICATION SECURITY
a. Transmission Security – component of communications security which results from all measures designed to protect
transmission from interception.
b. Cryptographic Security – results from the provisions of technically sound crypto-system and their proper use.
c. Physical Security – providing safeguards to equipment and material from access by unauthorized persons.
THREATS IN COMMUNICATION SECURITY
1. Wiretapping - is the monitoring of telephone conversations by a third party, often by covert means.
2. Bugging – means to secretly listen to or record a conversation using a hidden electronic device.
3. Eavesdropping (unauthorized listening)- is the unauthorized real-time interception of a privatecommunication, such
as a phone call, instant message, videoconference or fax transmission

PERSONNEL SECURITY
refers to the procedure followed, inquiries conducted, and criteria applied to determine the work suitability of a particular
applicant or the retention of a particular employee. Includes all the security measures designed to prevent unsuitable
individuals or persons of doubtful loyalty to the government, from gaining access to classified matter or to any security
facility, and to prevent appointment, or retention as employees of such individuals,

WHAT IS PERSONNEL SECURITY INVESTIGATION?


It is an inquiry into the character, reputation, discretion and loyalty of individual in order to determine a person’s
suitability to be given security clearance.

Types of Personnel Security Investigation (PSI)


A. National Agency Check (NAC). – This is an investigation of an individual made upon the basis of written
information supplied by him in response to official inquiry, and by reference to appropriate national agencies
B. Local Agency Check (LAC) – This type of investigation consist of the first type plus written inquiries sent to
appropriate local government agencies, former employees, references and schools listed by the person under
investigation
C. Background Investigation (BI) This is more comprehensive investigation than the NAC or the NAC and LAC.
A through and complete investigation of all or some of the circumstances or aspects of a person’s life is
conducted.

This type of personnel Security Investigation may either be a complete (CBI) or a partial Background Investigation (PBI).

1.Complete Background Investigation – Consist of the investigation of the background of a person, particularly all the
circumstances of his personal life.

2. Partial Background Investigation – Consist of the investigation of the background of an individual but limited only to
some of the circumstances of his personal life which are deemed pertinent to the investigation

THEFT AND PILFERAGE

Theft – committed by any person, who with intent to gain but without violence, against, or intimidation of persons
nor force upon things shall take personal property of another without the latter consent.

PSYCHOLOGICAL EXPLANATIONS ON THEFT

1. The need or desire . An individual may need or desire to commit the act because of financial problem, inadequate
income, extravagant living, gambling.
2. The psychological need (Kleptomania) -is an irresistible urge to steal items of trivial value. People with this disorder
are compelled to steal things, generally, but not limited to, objects of little or no significant value.
3. The criminal tendency. The individual with such tendency may be more tempted to steal if security control are
inadequate.
THE CASUAL AND SYSTEMATIC PILFERER
Casual Pilferer Systematic Pilferer
One who steals due to his inability to resist the One who steals with preconceived plans and takes
unexpected opportunity and has a little fear of away any or all types of items or supplies for
detection. economic gain

POLICE SECURITY PROTECTION GROUP (PSPG) - is mandated by law to provide protective security to
government officials, foreign dignitaries, and private individuals authorized to be given protection and also provide
physical security to vital installations, and assist the Presidential Security Group (PSG) in securing the President and the
members of the First Family.

You might also like