0% found this document useful (0 votes)
10 views

Bank Physical Security

The document outlines a course manual for a specialization in Banking Surveillance, covering various areas such as humanistic skills, legal aspects, technical security, emergency management, and teamwork. It emphasizes the importance of leadership, communication, and effective teamwork in achieving organizational goals, while also detailing protocols for surveillance and security in financial institutions. Additionally, it discusses the roles and responsibilities of individuals involved in private security and the legal framework governing these services.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Bank Physical Security

The document outlines a course manual for a specialization in Banking Surveillance, covering various areas such as humanistic skills, legal aspects, technical security, emergency management, and teamwork. It emphasizes the importance of leadership, communication, and effective teamwork in achieving organizational goals, while also detailing protocols for surveillance and security in financial institutions. Additionally, it discusses the roles and responsibilities of individuals involved in private security and the legal framework governing these services.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 102

Banking specialization 1

Course Manual Specialization in Banking Surveillance

HUMANISTIC PARTNER

•Induction
•Leadership and communication
•Skills
development•Teamwork

LEGAL ASPECTS

•Operation protocol for the financial


sector•Law 1010 01/23/2006PRIVATE
SECURITY

PROCEDURES •

Prevention of money laundering in the financial


sector•Risk analysis
•Identification of people
•Design of security plans in financial facilities

TECHNICAL AREA

•Technical
security •Surveillance
and counter-surveillance •Prevention of terrorism
•Information protection

EMERGENCY MANAGEMENT AND FIRST AID

•Emergency management in educational institutions

ARMAMENT AND SHOOTING

•Firearms
knowledge•Practical shooting exercise

SOCIOHUMANISTIC AREA

Leadership

The process of directing


To focus on the topic of communication and leadership, the process of management
cannot be left aside.
Management is the interpersonal aspect of administration, through which subordinates can
understand and contribute effectively and efficiently to the achievement of the institution's
objectives. To achieve this, management makes use of two types of relationships.
1.-Relations with the delegation of work.
Banking specialization 2

No supervisor or coordinator can accomplish all the work for which he or she is
responsible by his or her own efforts; he or she must delegate some of his or her work to
others. Those who are delegated tasks become responsible for the assigned part and the
supervisor ensures that the work is carried out satisfactorily. “Delegation includes giving
the employee the authority necessary to get the job done.” Delegation is
COMMUNICATION with the subordinate.
2.-Relations with the Authority.
It is not always necessary to resort to authority to achieve the fulfillment of the functions
that correspond to each subordinate. Its use on some occasions or opportunities is
appropriate, because the supervisor has the authority to require that subordinates follow
his directions.
The management process involves several important aspects such as: 1. Motivation, 2.
Leadership, 3. Communication, 4. Coordination. During the course we will only cover
Leadership and Communication.

Leadership is synonymous with Management, which is linked to leadership, since a good


manager has to be a leader and be able to get his subordinates to act correctly.
WHAT IS LEADERSHIP?
In the case of effective leadership in the administration of an organization. The primary
task of a manager when executing plans and programs is to integrate human resources in
the institution into a participating, obedient, cooperative, enthusiastic work team to achieve
the proposed objectives.
This fact of transforming human resources into active participants in a complex process
where everyone's participation is achieved is called being an effective manager or leader.
Are effective leaders born or made?
This question has been a source of discussion and controversy.
-According to some theorists, effective leaders are born and no amount of training or
conditioning can transform a bad leader into a good leader.
-Others consider the approach of such a situational theory, effective leadership arises from
a situation that required a leader and that the individual by chance had to exercise it, he
was in the right place at the right time.
This approach has its weaknesses, as emergency situations have arisen and no
spontaneous leader has emerged. The effectiveness of this theory is related to:
-The power of the leader
-The immediate specific task
-And the relationships between leaders and followers. Relationships between leaders and
followers are framed by need satisfaction, meaning that followers may be motivated to
follow a leader because they have physiological, social, and other needs for safety.

Role of a leader in a group


The effective leader must find himself in the middle of the group, showing characteristics of
both extremes but not belonging to either.
A person becomes a leader intoxicated by his or her knowledge or skills, by the group's
purposes, by the pressures that affect the group from outside, or by the relationships that
its members maintain with each other.
A leader executes actions so that the group achieves the desired success. A group may
have as few as one leader or many, depending on the situation, participants, and tasks.
Consequently, it can be said that all members of a group can be leaders, because even
their silences can influence the group. However, there are people who can influence more
than others.
Banking specialization 3

Leadership styles that a leader must exercise

There are various leadership styles, but on this occasion we will only refer to:
Authoritarian, Democratic and Condescending.
The Authoritarian: He is the one who dictates policies, determines tasks, establishes rules
and keeps distance between himself and his group and never allows participation.
The Democratic: Helps and encourages determining policies, delegates responsibilities
and determines the steps to follow to achieve objectives or goals. The leader is objective,
giving freedom to choose, suggesting alternatives and trying to be a member of the group,
instead of putting himself in a privileged position.
The Condescending: Participates very little in the group process, leaves individuals
completely free to act, remains in his position but rarely makes comments, praises or
criticisms about the group members' activities, and his intuition is to let things happen and
not participate.
In conclusion, the democratic style is considered the best for an effective leader and for
most groups, although some creative and entrepreneurial groups function perfectly without
having any leader at all.

Communication
Communication can be defined as the act that allows information to be shared.
Communication occurs in all animal species, although it differs from humans due to the
limited nature of their repertoire. We can also say that communication is the interaction of
two or more people whose objective is to share a meaning.
Effective Communication: It occurs when an expression that corresponds to the reality of a
subject is shared with another, through understanding.
Communicate: It is to share something about ourselves. It is a rational and emotional
quality that arises from a need to get in touch with others, exchanging ideas that acquire
meaning according to common previous experiences.
One of the things we neglect the most, not only in organizations but also on a personal
level, is the communication process. The most common mistake is to confuse
communication with information.
Communication is not about speaking, it is about listening, and this leads us to a totally
different paradigm, because instead of putting ourselves in an ACTIVE position, we
apparently put ourselves in a PASSIVE position and we say apparently, because it takes
much more courage, much more bravery, energy and discipline to listen than to speak.
When we act this way we are leaders; we are creating the foundations for communication,
which is learning to listen.

TEAMWORK
Banking specialization 4

Camaraderie and teamwork.

Teamwork is one of the psychological working conditions that most positively influences
workers because it allows for camaraderie. It can yield very good results, as it usually
generates enthusiasm and produces satisfaction in the recommended tasks.

Companies that foster an atmosphere of harmony among their employees achieve


beneficial results. Camaraderie is achieved when there is work and friendship.

In work teams, rules are drawn up that must be respected by all members of the group.
They are rules of behavior established by team members. These rules provide each
individual with a basis for predicting the behavior of others and preparing an appropriate
response. They include the procedures used to interact with others. The function of norms
in a group is to regulate its situation as an organized unit, as well as the functions of
individual members.

The force that integrates the group and its cohesion is expressed in the solidarity and
sense of belonging to the group that its members manifest. The more cohesion there is,
the more likely it is that the group will share common values, attitudes and standards of
conduct.

Working as a team is beneficial not only for one person but for the entire team involved. It
will bring us more satisfaction and make us more sociable, it will also teach us to respect
the ideas of others and help our colleagues if they need our help.

Advantages of teamwork

Among the essential advantages that camaraderie and teamwork present, both for
individuals and for organizations, are:

For individuals

 There is less stress in working by sharing the hardest and most difficult jobs.
 Responsibility is shared when seeking solutions from different points of view.
 It is more rewarding to be a part of a job well done.
 Economic incentives and professional recognition are shared.
 Others can be better influenced by the individual solutions that each individual has.
 The feeling of a job well done is experienced more positively.
 Decisions made with the participation of the entire team are more widely accepted
than decisions made by a single individual.
 More information is available than any of its members separately.
Banking specialization 5

 Group work allows for different points of view when making a decision. This enriches
the work and minimizes frustrations.
 We can exchange opinions while respecting each other's ideas:
 Achieve greater integration between people in order to understand the skills of the
members.

For companies and organizations and people

 Increases the quality of work by making decisions by consensus.


 The collectivist spirit and commitment to the organization are strengthened.
 Research times are reduced by contributing and discussing solutions in groups.
 Institutional expenses decrease.
 There is greater knowledge and information.
 New ways of approaching a problem emerge.
 Decisions are better understood.
 The points of view are more diverse.
 There is greater acceptance of solutions.
Disadvantages of team problem solving

To form a work team, it is necessary to consider not only the intellectual capacities of its
potential members but also the socio-psychological and personality characteristics of each
component. Some teams are formed to perform specific tasks, others to advise, and
others to manage.

Dysfunctional team participation indicates that something is wrong. A more in-depth


diagnosis of the organization and its conflicts is then necessary. Some examples of
dysfunctional participation are:

 Aggression, in direct forms such as irony, contempt, workplace harassment, hostility


and indifference.
 Blocking from negative attitudes, resistance, continued denial, constant disagreement,
opposition to logic, lack of cooperation, obstruction to prevent the successful
completion of work and diversion of attention to less significant issues.
 Desertion, not being physically or psychologically present, isolating oneself and being
absent without reason.
 Division, excessive attention-seeking, the overwhelming need to attract sympathy and
to display successes.
Banking specialization 6

The role of leaders is important in teamwork and fostering camaraderie. They work to
ensure that there is agreement on the objectives and that these are clear, as well as that
everyone feels committed and involved with the tasks.1

Teamwork is sometimes criticised for having a number of disadvantages that should be


taken into account. These may include the following:

 Making decisions prematurely.


 Let the dominance of a few people prevail, in particular that of a leader.
 Spending a lot of time in meetings discussing solutions and actions, delaying their
implementation.
 That there is pressure on team members to accept solutions.
 Ambiguous responsibility because it is diluted in the group.

LEGAL ASPECTS
OPERATION PROTOCOL FOR SURVEILLANCE IN FINANCIAL INSTITUTIONS
1. Introduction 1
2. Objectives 1
3. Responsibilities Application 2
4. Definitions 2
5. General Conditions for the provision of private surveillance and security services
Financial sector 3
5.1. Staff Selection .3
5.2. Accreditation as a Security Guard (Credential) 4
5.3. Accreditation as a Technological Media Operator (Credential) 4
5.4. Vigilantes Uniform 4
5.5. Functions of the Watchman 5
5.5.1 What a Watcher Should Do 5
5.5.1.1 Opening procedure 5
5.5.1.2 Access control 5
5.5.1.3 Main box opening procedure 5
5.5.1.4 Valuable Transport Collection Operation 6
5.5.1.5 Observation 6
5.5.1.6 Closing procedure 7
5.5.1.7 Interpersonal Relationships. 7
5.5.1.8 Duties of the Watchman 7
5.6. Elements of the Watch Post 8
5.6.1. Minute Book 8
5.6.2. Communication Equipment 9
5.6.3. Armament 9
5.7. Minimum characteristics of Surveillance Post 10
5.8. Customer Service or User Service 11
5.9. General Diagnosis - Security Study 11
6. Technological Media Operation 11
6.1 Alarm Monitoring 11
6.2 CCTV Monitoring 12
Banking specialization 7

6.3. Supervision and Control Points 13


6.4. Support Networks and Citizen Solidarity 13
7. Other particularities for the provision of private surveillance and security services
financial sector 14
7.1 Criminal Modalities 14
7.1.1. ATM theft 14
7.1.2 Card change 14
7.1.3. Box Office Hit 14
7.1.4. Suction cup or tunnel 14
7.1.5. Theft from cash transporters 15
7.1.6. Freight 15
7.2. Procedure for theft within financial institutions 15
7.3 Procedures to follow after the occurrence of an assault 15
7.4. Activities to be carried out to prevent criminal activities within a
financial institution 16
7.5. Activities to be carried out for the prevention of Fleteo 17

SERVICE OPERATION PROTOCOL IN FINANCIAL INSTITUTIONS

1. Introduction
The Superintendency of Surveillance and Private Security is responsible for exercising
control, inspection and surveillance over the industry and services of surveillance and
private security, and therefore, establishing technical and legal criteria, as well as
procedures and policies that standardize the provision of surveillance and private security
services.
Decree Law 356 of 1994, in its article 108 establishes that "The National Government will
issue the operating manuals, uniform inspection manuals and others that are required for
the provision of private surveillance and security services."
The purpose of private surveillance and security services is to prevent, stop, reduce or
deter attacks or threats that may affect the safety of people or property under their care.
2. Objectives
The objectives of this Operating Protocol for the private surveillance and security service in
the financial sector are:
• Improve the quality of private security and surveillance services, ensuring an adequate
technical and professional level.
• Establish the minimum conditions for the provision of physical and electronic surveillance
services, aimed at the financial sector.
• That private security and surveillance services that provide services in the financial
sector adopt appropriate and sufficient prevention and control measures, aimed at
preventing their services from being used as an instrument for carrying out illegal acts, in
any form, or to give the appearance of legality to criminal activities or to provide services to
criminals or to persons directly or indirectly linked to drug trafficking or terrorist activities.
• Contribute to crime prevention by reducing opportunities for criminal activity and
discouraging the actions of criminals, in collaboration with the authorities of the Republic.
• Provide adequate protection to users of private security and surveillance services,
through clear rules for the provision of services, with qualified personnel, seeking to
optimize resources and improve the provision of the service.
3. Responsible Application
The persons responsible for the implementation of the Protocol for the Operation of Private
Surveillance and Security Services for the Financial Sector are:
Banking specialization 8

• The legal representative of private security and surveillance services in the financial
sector
• Director of operations or whoever takes his place
• The supervisor
• Technological Media Operator
• The watchman
4. Definitions
Protocol
It refers to the rules, the set of actions or the procedures established for the development
of an activity.
Security protocol for surveillance services in the financial sector implies, for the private
surveillance and security company or cooperative, the implementation of the minimum
quality standards that must be met and the aspects that must be taken into account in
order to provide a service.
Physical Surveillance of the Financial Sector
The private surveillance and security service of the Financial sector is that which is
provided in financial institutions and which can be provided with or without weapons (lethal
or non-lethal) and technological means.
Vigilant
It is the natural person who, in the provision of the service, has been entrusted with the
task of protecting, guarding, and carrying out identity checks upon access to entities in the
financial sector in order to prevent, stop, reduce or deter attacks or threats that may affect
their security.
Technological Media Operator
It is the natural person who, in the provision of the service, has been entrusted with the
task of interpreting the different signals such as (Openings, Closings, Motion sensors,
Panic buttons, Remote cameras, Magnetic contact break detectors, Glass break sensor,
Vibration sensors)
Electronic Surveillance
Electronic surveillance includes private security and surveillance companies and
cooperatives providing their services through technological means duly authorized by the
Superintendency of Private Security and Surveillance, and can be provided in residential
areas, companies, commercial, financial, and industrial establishments.
Alarm Monitoring
Permanent monitoring of electronic security systems installed in companies, commercial,
financial and industrial establishments and in the residential sector, which emit information
received and attended to by a Monitoring Center.
Closed circuit television CCTV
A closed circuit television is a means of active protection that allows remote and real-time
general control of areas and facilities, making it an effective means of external, perimeter,
internal and specific surveillance.
Closed circuit television CCTV
5. General Conditions for the provision of private surveillance and security services
in the financial sector
5.1. Staff Selection
Staff selection is the set of specific steps used to determine whether the candidate is
suitable to perform the tasks assigned, whether he or she meets the pre-established
profile and whether he or she can reach the performance levels required for each position,
in order to decide which applicants should be hired. The selection process within the
private security and surveillance company and/or cooperative must include:
Banking specialization 9

• Validation and verification of the data and documents provided in the CV (authenticity of
diplomas, work and personal references; review of background and public annotations).
• Security knowledge interview.
• Psychotechnical test.
• Selection interview.
• Companies must include tests of reliability and loyalty to rule out issues such as
participation in illegal activities, links with groups outside the law, possible manipulation to
participate in illegal activities, consumption of alcohol and/or psychotropic substances
within the framework of the Constitution and the law.
For the application of the loyalty and reliability test, there must be prior, voluntary written
authorization from the examinee. The person examined will have an interview with the
professional who administers the evaluation, where he will receive a prior explanation of
how the polygraph works and will be assured that this test will not, under any
circumstances, constitute an attack on his human dignity or fundamental rights.
• Home visit
• Medical examination (visual, auditory and muscular)
5.2. Accreditation as a Security Guard (Credential)
In order to carry out their duties and remain identified, the operational staff of private
surveillance and security services will carry the credentials issued by the Superintendency
of Private Surveillance and Security, in accordance with current regulations.
The credential must be valid and the position specified therein must correspond to the
functions performed, which implies that the guard has taken and passed the training
course in private surveillance and security at a Private Surveillance and Security Training
School or Academy.
5.3. Accreditation as a Technological Media Operator (Credential)
In order to carry out their duties and remain identified, the operational staff of private
surveillance and security services will carry the credentials issued by the Superintendency
of Private Surveillance and Security, in accordance with current regulations.
The credential must be valid and the position specified therein must correspond to the
functions performed, which implies that the Technological Media Operator has taken and
passed the training course in private surveillance and security at a Private Surveillance
and Security Training School or Academy with a License issued by the Superintendency of
Private Surveillance and Security.
5.4. Security Guard Uniform
To provide the service, the security guard must wear the uniform authorized to the
company by the Superintendence of Surveillance and Private Security, which must be in
accordance with the modifications and specifications of Resolution 5351 of 2007 and with
External Circular 25 of 2008.
Under no circumstances may uniforms be similar to those used by members of the Armed
Forces, the National Police, the DAS, the CTI, the Civil Defense, the Official Fire
Department and the International Committee of the Red Cross.
The security guard must wear a clean, complete uniform in good condition.
5.5. Duties of the Watchman
5.5.1 What a Watchman should do:
5.5.1.1 Opening procedure
Check the surroundings and entrance of the financial institution, observing the presence of
suspicious persons, vehicles or other elements that may pose a risk to the property being
monitored.
Upon receiving the job, the security guard must make a general tour of the facilities,
confirm that nothing new has occurred, and check that all the elements of the job are
present.
Banking specialization 10

Fill out the Minutes book.


Verify that the cameras are in optimal working order, either on local or remote CCTV.
5.5.1.2 Access control
Employee entry control.
Compliance with access control at public entrance (At critical control points such as locks,
metal detector arches, and lockers or armoires, a control must be carried out for proper
use).
Under no circumstances should armed personnel be allowed into the facility.
The security guard must not open the door of the financial institution during the additional
hours and during hours when the bank does not provide service to the public.
5.5.1.3 Main box opening procedure
When the manager or director of the office decides to open the main cash register, the
procedure is the temporary closure of the entity.
The security guard must keep the doors closed during the counting and distribution to the
cash registers by the cashier staff, and the handling of the vault or safe. During this
procedure, no one should cross the entrance doors of the entity under any circumstances.
5.5.1.4 Valuable transport collection operation
The security guard must observe the security device by the transport companies, as well
as verify the cards in the list previously left by the transport company.
The guard proceeds to secure the doors, while the process of collecting or delivering the
money takes place.
5.5.1.5 Observation
The security guard in the performance of his duties must:
Strategically located in the financial institution, where you can exercise surveillance over:
• Customer service and money reception windows
• Areas adjacent to the safe
• ATMs (when established within the employment contract)
Be alert and don't be overconfident.
Control the order within the facility.
Verify compliance with non-use of cell phones.
Identify suspicious behavior that may undermine security.
Verify that there are no people impersonating bank officials or making unauthorized
collections.
Managing panic buttons.
Report any activity that represents danger or threat to the police officers in the area and
the Citizen Support and Solidarity Network of the National Police.
Record in the minutes book the reviews carried out by the National Police, which have the
purpose of verifying the internal and external order of the entity.
5.5.1.6 Closing procedure:
After the operations of both collection and payment of securities and closing of the cash
registers, as well as the main cash register, the entity is closed as follows:
Verify that no users or clients of the financial institution are present.
Verify the departure of all personnel working at the financial institution.
Perform electronic closing supported by a monitoring center that confirms the activation of
the alarm in all its zones.
Conduct an off-site inspection.
Check that everything is okay.
Make the report via radio or avantel to the service supervisor.
Complete the delivery or closing minutes of the position, depending on the type of service
provision contract you have with the financial institution.
Banking specialization 11

The closure may be dual or only with the accompaniment of the surveillance company's
reaction group.
Take into account the conditions and/or policy of the Bank or banking establishment, if
any.
5.5.1.7 Interpersonal Relationships.
Security personnel in the financial sector, as in all services, must have an excellent
personal appearance, a respectful, friendly and cordial treatment both with officials and
clients and users.
5.5.1.8 Duties of the Watchman
The duties that the security guard must take into account when providing the security
service in the financial sector are:
• Respect the fundamental rights and freedoms of the community, refraining from engaging
in conduct reserved for the public force.
• Contribute to crime prevention by reducing opportunities for criminal activity and
discouraging the actions of criminals, in collaboration with the authorities of the Republic.
• Observe, in the exercise of their functions, compliance with the legal norms and
procedures established by the Government
National, as well as the orders and instructions issued by the Superintendency of
Surveillance and Private Security.
• Adopt dissuasive or alert attitudes when observing the commission of criminal acts in the
vicinity of the place where they are providing their services, immediately notifying the
authorities so that their effects can be prevented or reduced.
• Personnel comprising private security and surveillance services who are aware of the
commission of punishable offences during or outside their service must immediately inform
the competent authority and provide all the cooperation required by the authorities.
• Provide support when requested by the authorities, in order to address cases of public
calamity.
• Others established in current regulations.
5.6. Elements of the Surveillance Post
The minimum elements that must remain in a private surveillance and security post in the
residential sector are:
• Control or minute book.
• Means of communication (radio, avantel, cell phone, others).
• Armament (if applicable).
• Financial surveillance and private security security protocol.
• List of emergency contact telephone numbers for the coordinator of the respective
quadrant.
• Closed circuit television monitoring (if applicable.)
• Others that contribute to the control and improvement of the surveillance service.
5.6.1. Minute Book
This book should list everything that happens in the workplace on a daily basis, such as:
• Record of receipt and delivery of the position.
• Relate the objects found in the rounds or handed in by people as lost objects.
• Notification of orders issued prior to taking over service.
• New developments found during the surveillance service.
• Notes of incidents that occur in the workplace.
• Records of supervisor visits.
• Records of authorities' journals.
• Prevention instructions given by the security company.
• Record with names and time of maintenance workers entering the financial institution.
Banking specialization 12

The information and records recorded in the aforementioned book may be taken as
evidence in disciplinary and criminal actions in cases duly stipulated by the authorities.
State requires it.
5.6.2. Communications Equipment
• Every workplace must have a means of communication such as: radio, avantel, cell
phone, etc.
• The equipment must remain with the battery charged and enabled so that the guard can
request immediate support when required.
5.6.3. Armament
Security personnel carrying weapons must have the following documents:
• Current identification card, issued by the Superintendency of
Private Surveillance and Security.
• Legible photocopy of the permit for possession or carrying.
• Possession or carrying in places other than those where surveillance is provided by
virtue of a contract or the respective main office, branch or agency or outside the exercise
of the contracted functions, generates the seizure of the weapon without prejudice to any
applicable criminal sanctions.
• The weapon must remain at the workplace or be transported to authorized gun cabinets.
• The permit or safe-conduct pass must be valid, in the form of ownership in the name of
the company. Weapons with a personal use permit are not permitted for security services.
• To provide the contracted service, weapons of war or weapons for the exclusive use of
the public force, weapons of restricted use and prohibited weapons or accessories must
not be used. 2
• There must be an updated record of the location of firearms according to the signed
contracts.
• Under no circumstances should you lend your service weapon to another person.
5.6.3.1 Please note the following decalogue for the provision of firearms surveillance
services:
• Treat all weapons as if they were loaded.
• Keep the barrel of the gun pointed in a safe direction.
• When displaying or examining weapons, make sure they are unloaded.
• Make sure the barrel is not clogged and use suitable ammunition.
• When not in use, keep weapons unloaded.
• Do not pull the trigger until you are ready to do so.
• Never point a gun at anyone.
• Do not shoot at flat surfaces, water or hard bodies.
• Do not drink alcoholic beverages or use psychotropic or narcotic substances when
handling weapons.
• Store weapons separately from ammunition.
5.7. Minimum characteristics of the surveillance post
The workplace must have the minimum housing or sanitary resources so that permanent
or mobile security personnel can carry out their work in conditions that do not threaten
their own safety and dignity.
The workplace must remain clean, organized, and have lighting, access to a bathroom,
and some means of communication.
5.8. Customer Service or User Service
The procedure adopted by the private security and surveillance company and/or
cooperative to promptly resolve and address the client's concerns, needs or complaints,
which in some cases are considered to be affected by the operation of a private security
and surveillance service or by its operational personnel.
5.9. General Diagnosis - Security Study
Banking specialization 13

The aim is to create a direct link between the company and the client, and to carry out a
security study, risk assessment, and the client's needs and vulnerabilities, which aim to
establish the risks to which the contractor is exposed and to identify the threats.
Once the risks and threats have been identified, the means to be used in the provision of
the service and the required control points, as well as the service provision policies, must
be established.
The service provision contract must establish what the company and/or cooperative is
committed to and the means to be used for its development, such as:
• Closed circuit television CCTV
• Alarms
• Access controls
6. Operation of Technological Media
6.1 Alarm Monitoring
The main function of the technological media operator in the monitoring center is to
process the signals coming from the alarm systems, analyze them and classify them as
follows:
Alarm signals (panic, forced opening, sabotage, battery failure)
Verification signs (irregular opening, lack of closure)
Non-operational signals (opening, closing)
Once the signal has been qualified, the technological media operator proceeds according
to the established service protocol.
Confirm the alarm or verification signal via telephone with the assigned contact. Report the
incident to the supervisor so that he/she can confirm the event and appear at the financial
institution.
Report the event to the police officers in the corresponding quadrant and to the National
Police Citizen Support and Solidarity Network.
The supervisor evaluates the event and makes the report.
In the case of irregular openings, the technological media operator reports to the
supervisor so that he can appear on site and verify whether the security system has been
violated.
In the event that the financial institution does not close at the established time, the
technological media operator communicates with the financial institution's contact person
to corroborate the information and confirm that no irregular action is taking place.
When the opening and closing signals are made within the established schedule, they do
not generate any action on the part of the technological means operator of the monitoring
center.
6.2 CCTV Monitoring
This type of system is a complement to detectors or sensors, alarm monitoring, perimeter
fencing, security lighting, access controls and, in general, electronic systems and
surveillance, in relation to minimizing threats of theft and sabotage, by common crime,
subversion or employees.
The primary function of a technology operator at a CCTV monitoring center is to be alert
and identify suspicious behavior that may undermine security, and alert the physical
surveillance staff.
If criminal activity occurs within the establishment, you must immediately report the event
to the police officers in the corresponding quadrant and the Citizen Support and Solidarity
Network of the National Police.
Circular 52 of 2007 issued by the Financial Superintendence establishes that financial
institutions must have video cameras, which must cover at least the main entrance and the
areas of attention to the public.
Banking specialization 14

In financial institutions, records must be kept of the images taken during the 24 hours,
indicating the dates and times, as well as the custody and conservation of the media
containing the images for a minimum of one (1) year, for the purposes of future
investigations or requests from authorities.
Film recordings, photographs, videos or any other advanced means made by surveillance
cameras in closed areas or in public spaces, become probative material or physical
evidence in the case of events or crimes that are the subject of investigation or inquiry by
the State authorities.
6.3. Supervision and Control Points
In order to carry out adequate supervision by the private security and surveillance
company, the following must be taken into account:
• Check how the position is operating.
• Verify that the financial institution's ATMs do not have electronic devices installed, such
as magnetic stripe readers and wireless cameras, that facilitate card cloning.
• If the control book is kept properly.
• Determine whether there are unmet security needs encountered by the guard in the
course of his duties, or whether any irregularities or new developments occurred in relation
to the service.
• Carry out continuous inspection and verification through surveillance video, in
the event that the stand has closed circuit television.
• Hold a monthly meeting with the contractor to evaluate the provision of the service, as
well as the complaints and/or concerns expressed by residents.
• Check the security guard's emotional and service status.
• Verify that the service elements found in the workplace correspond to those assigned
and registered by the company (weapons, radio, among others).
6.4. Support Networks and Citizen Solidarity
Citizen Support and Solidarity Networks are understood as the set of activities organized,
channeled and led by the National Police, with the purpose of gathering information about
events, crimes or behaviors that affect or may affect peace and security, taking advantage
of the technical and human resources possessed by natural or legal persons who provide
the services referred to in Decree Law 356 of 1994, as established by the
Decree 3222 of 2002, article 2.
These networks are distributed in the Metropolitan Police Commands and in Police
Departments, where there are private security and surveillance services, under the
supervision of officers and non-commissioned officers coordinating this program, who
interact permanently with the delegates of the supervised services.
Its operation is simple and effective: when an event occurs that alters or may alter public
safety, the guards who are at the service posts must immediately communicate with the
radio operator of their security company, who validates the information and communicates
with the Police Headquarters (CAD), sending police patrols as a priority to deal with the
case.
With the implementation of the National Plan for Community Surveillance by Quadrants
(PNVCC), the guard must identify the quadrant to which he belongs, providing information
to the police personnel in the quadrant about events, behaviors or crimes that allow the
prevention or deterrence of crimes that affect citizen security in his sector.
7. Other particularities for the provision of private surveillance and security services
in the financial sector
7.1 Criminal Modalities
7.1.1. ATM Theft:
The criminal takes advantage of the excessive trust of card users. Manoeuvres such as
card swapping, open option and retention of plastic with acetates or through the
Banking specialization 15

installation of electronic devices, such as magnetic stripe readers and wireless cameras,
are carried out, illegally obtaining information that facilitates the donation of the card.
Another form of criminal activity is when a person enters the ATM and tells the previous
user that their transaction has been left open. The user then suggests that they enter their
PIN again and gives them instructions to press certain buttons until the screen displays
digits with zeros. The unsuspecting person leaves without knowing that what they did at
that moment was leave their account open to make a withdrawal.
7.1.2 Card Change:
The person is tricked into entering the ATM, where the criminals have previously installed
a device that makes it difficult to use the card, and they get the person to enter the PIN
again, which they carefully observe.
7.1.3. Box office hit:
Financial institutions, due to the amount of money they have in their cash registers or teller
windows, become targets for organised crime groups, who are looking for a contact who
can provide information on the different money movements carried out by the bank. As it is
a quick operation, they avoid confrontation with the police authorities as much as possible.
7.1.4. Suction cup or tunnel:
Using hydraulic tools, among others, holes are made in the wall or ceiling of financial
institutions to bypass security systems and enter mainly during non-working hours and
days.
7.1.5. Theft from cash transporters:
It is carried out by highly dangerous criminal organisations with availability of weapons,
means, logistics, communications, using violence and even explosives.
7.1.6. Freight:
In this modality, criminals use high-cylinder vehicles and motorcycles, taking advantage of
the cash withdrawals made by people and then surprising them when they arrive at their
residence or destination.
7.2. Procedure for theft within financial institutions
• Stay calm and observe descriptively, preserving the life and integrity of the people
present as much as possible.
• Avoid arguing with criminals, do not provoke them or make movements that may cause
aggressive or dangerous reactions.
• Activate the alarm or panic buttons without being seen by criminals.
• Identify the number of criminals, detail the physical characteristics and modus operandi
of the bandits.
• As soon as possible, notify the National Police (123, 112) and the Citizen Support and
Solidarity Network.
• Provide a detailed report of the events to the authorities handling the case, in order to
help the authorities identify the attackers and conduct investigations.
• Observe the direction in which they are fleeing, the description and, if possible, the
license plate of the vehicles used.
7.3 Procedures to follow after the occurrence of an assault
• Stay calm. In the event of violations of physical and moral integrity, specialized help must
be requested immediately.
• Immediately after the criminals leave the office, the alarms must be activated and the
police authorities must be notified of the bank robbery, if this has not been done.
• The office must be closed immediately and await the arrival of the authorities, avoiding,
as far as possible, the exit of clients and users of the entity, and the entry of curious
people and strangers.
• A temporary notice must be posted informing the public that service will be restored once
the situation is under control.
Banking specialization 16

• Upon arrival of the first police unit, they must be allowed to enter and be provided with
information related to the assault, such as physical characteristics, clothing, number of
assailants, class or type of weapons, vehicles and any details that may help the authorities
identify the criminals and conduct investigations.
• Cash areas must be protected in order to preserve fingerprints and other traces that may
help direct investigations by the authorities.
• After closing the office, accompany the authorities in monitoring
Judicial Police or Prosecutor's Office, the audit of the safes and the vault, safe or main
chest only in the areas affected by the robbery, to quantify the amount of money and other
stolen goods.
• Under no circumstances should tellers or bank employees leave the office once the
robbery has occurred, until the authorities allow it. Cases of force majeure and fortuitous
events are excepted.
• Officials, clients and users of the financial institution that was attacked have the duty to
collaborate with the authorities in those aspects that help to conduct the investigation of
the events (complaints, testimonies, spoken profiles and special characteristics).
• Entry must be permitted to the entity's control bodies (security chief, security analysts,
audit, comptroller) and the station commander of the respective area, the surveillance
officer, the bank reaction patrol officer, the Judicial Police authorities and the Prosecutor's
Office, after detailed identification.
• If the office that was attacked has a closed-circuit television, the head of security of the
entity must provide the Judicial Police and Prosecutor's Office authorities, after carrying
out the respective analysis, with a copy of the recorded videos, within the following three
business days.
• In all events, the private security and surveillance company must report the incident to
the Superintendency of Private Security and Surveillance.
7.4. Activities to be carried out to prevent criminal activities within a financial
institution
7.4.1. Carry out prevention campaigns with the National Police, officials from the financial
institution and its security company, where users are informed to observe the following
measures:
• Once you receive your password from the bank, memorize it and destroy the envelope
containing the information.
• Do not leave your card anywhere, always keep it in your possession, to prevent it from
being changed or stolen.
• Do not lend your card to anyone to carry out transactions.
• Do not leave the ATM until your transaction has been closed and completely cancelled.
• Do not allow assistance from strangers inside the ATM.
• If your card is blocked, do not leave the ATM until you recover it.
• Cover the keyboard with your hand when entering your password.
• When making purchases with a card, make sure that your own card is returned to you.
7.4.2 During verification rounds, carefully observe any strange elements installed in the
ATM, such as cameras, objects that hinder the normal entry of the card or the exit of
money.
7.4.3 Periodically check with those responsible for monitoring the cameras to see if those
installed correspond to what was contracted.
7.4.4. Make recommendations to the banking entity to improve security systems, reporting
any deficiencies found.
7.5. Activities to be carried out to prevent theft
Banking specialization 17

7.5.1 Carry out prevention campaigns with the National Police, officials from the financial
institution and its security company, where users are informed to observe the following
measures:
• Inform the entity's users not to tell anyone about the banking transaction they are going
to carry out.
• Carefully observe the people in your environment inside and outside the financial
institution.
• When you receive your money, keep it in a safe place and try to change its location on
the way to your destination.
• When leaving the bank, use main routes where there is police presence.
• When completing documents at the bank, write the address of the company or a family
member.
• When withdrawing large amounts of cash, ask the ATM for the escort service provided
free of charge by the National Police.
7.5.2. Do not allow the use of cell phones in the bank, whether for calls or messaging.
7.5.3 Keep under observation those individuals who suddenly begin to receive or make
cell phone calls.
7.5.4 Do not allow vehicles to park in front of the financial institution; request support from
the National Police.

LAW 1010 OF 2006 (January 23) WORKPLACE HARASSMENT LAW

through which measures are adopted to prevent, correct and sanction workplace
harassment and other forms of harassment within the framework of employment
relationships.

THE CONGRESS OF COLOMBIA,

DECREES:

Article 1°. Purpose of the law and the rights protected by it. The purpose of this law is to
define, prevent, correct and punish the various forms of aggression, mistreatment,
harassment, inconsiderate and offensive treatment and, in general, any outrage against
human dignity that is exercised against those who carry out their economic activities in the
context of a private or public employment relationship.

The legal rights protected by this law are: work in decent and fair conditions, freedom,
privacy, honor and mental health of workers and employees, harmony among those who
share the same work environment and a good atmosphere in the company.

Paragraph: This law shall not apply in the area of civil and/or commercial relations arising
from contracts for the provision of services in which there is no relationship of hierarchy or
subordination. It does not apply to administrative contracts either. Underlined text
declared CONSTITUTIONAL by the Constitutional Court, through Ruling C-960 of
2007, on the understanding that if there is actually an employment relationship, Law 1010
of 2006 will apply.

Article 2. Definition and types of workplace harassment. For the purposes of this law,
workplace harassment shall be understood as any persistent and demonstrable conduct
Banking specialization 18

exercised on an employee or worker by an employer, a boss or immediate or indirect


superior, a co-worker or a subordinate, aimed at instilling fear, intimidation, terror and
anguish, causing workplace harm, generating demotivation at work, or inducing
resignation from work.

In the context of the first paragraph of this article, workplace harassment may occur,
among others, under the following general modalities:

1. Workplace abuse. Any act of violence against the physical or moral integrity, physical or
sexual freedom and property of someone who works as an employee or worker; any
insulting or abusive verbal expression that harms the moral integrity or the rights to privacy
and good name of those who participate in a work-related relationship or any behavior that
tends to undermine the self-esteem and dignity of someone who participates in a work-
related relationship.

2. Workplace harassment: any conduct whose characteristics of repetition or evident


arbitrariness allow us to infer the purpose of inducing the employee or worker to resign,
through disqualification, excessive workload and permanent changes in schedules that
may produce work demotivation.

3. Modified by art. 74, Law 1622 of 2013, Labor discrimination: any differential treatment
based on race, gender, family or national origin, religious creed, political preference or
social situation or that lacks any reasonableness from a labor point of view.

4. Obstruction of work: any action tending to hinder the performance of work or make it
more burdensome or delay it to the detriment of the worker or employee. Actions that
impede work include, among others, the deprivation, concealment or rendering useless of
supplies, documents or instruments for work, the destruction or loss of information, the
concealment of correspondence or electronic messages.

5. Labor inequality: Assignment of functions to the detriment of the worker.

6. Lack of job protection: Any conduct that tends to put the integrity and safety of the
worker at risk through orders or assignment of functions without complying with the
minimum requirements for protection and safety for the worker.

Article 3. Mitigating conduct. The following are mitigating conducts of workplace


harassment:

a) Having observed good previous conduct.

b) Acting in a state of excusable emotion or passion, or intense fear, or in a state of anger


and intense pain.

c) Voluntarily try, after the conduct has been carried out, to reduce or eliminate its
consequences.

d) Repair, at its discretion, the damage caused, even if not in full.


Banking specialization 19

e) Conditions of psychic inferiority determined by age or by organic circumstances that


have influenced the performance of the conduct.

f) UNENFORCEABLE. Family and emotional ties. Constitutional Court Judgment C-898 of


2006

g) When there is manifest or veiled provocation or defiance on the part of a superior,


colleague or subordinate.

h) Any circumstance of similar significance to the above.

Paragraph. The state of excusable emotion or passion shall not be taken into account in
the case of violence against sexual freedom.

Article 4. Aggravating circumstances. The following are aggravating circumstances:

a) Repetition of the conduct;

b) When there are concurrence of causes;

c) Carrying out the conduct for a vile, futile reason or for a price, reward or promise of
remuneration,

d) By concealment, or taking advantage of the conditions of time, manner and place, which
make it difficult for the injured party to defend themselves, or to identify the participating
author;

e) Deliberately and inhumanly increase the psychological and biological damage caused to
the passive subject;

f) The predominant position that the author occupies in society, due to his position,
economic rank, education, power, occupation or dignity;

g) Carry out the conduct using a third party or an unaccountable person;

h) When the conduct displayed by the active subject causes harm to the physical or
mental health of the passive subject.

Article 5. Graduation. The provisions of the two preceding articles shall apply without
prejudice to the provisions of the Single Disciplinary Code for the classification of offences.

Article 6. Subjects and scope of application of the law. The following may be active
subjects or perpetrators of workplace harassment:

The natural person who serves as a manager, chief, director, supervisor or any other
position of direction and command in a company or organization in which there are labor
relations governed by the Substantive Labor Code;
Banking specialization 20

The natural person who serves as a hierarchical superior or has the status of head of a
state agency;

The natural person who works as a worker or employee. They are passive subjects or
victims of workplace harassment;

Workers or employees linked to an employment relationship in the private sector;

Public servants, both public employees and official workers and public servants with a
special regime who work in a public agency;

Immediate bosses when harassment comes from their subordinates. The following are
involved in workplace harassment:

The natural person who, as an employer, promotes, induces or favors workplace


harassment;

Any natural person who fails to comply with the requirements or warnings issued by Labor
Inspectors in accordance with the terms of this law.

Paragraph: The situations of workplace harassment that are corrected and sanctioned in
this law are only those that occur in a context of relationships of dependency or
subordination of a labor nature.

Article 7. Conduct that constitutes workplace harassment. It shall be presumed that there
is workplace harassment if the repeated and public occurrence of any of the following
conducts is proven:

a) Acts of physical aggression, regardless of their consequences;

b) Insulting or insulting expressions about a person, using foul language or referring to


race, gender, family or national origin, political preference or social status;

c) Hostile and humiliating comments that disqualify the employee professionally expressed
in the presence of co-workers;

d) Unjustified threats of dismissal expressed in the presence of co-workers;

e) Multiple disciplinary complaints from any of the active subjects of harassment, whose
recklessness is demonstrated by the result of the respective disciplinary processes;

f) The humiliating disqualification of work proposals or opinions in the presence of co-


workers;

g) public teasing about physical appearance or clothing;

h) Public reference to facts pertaining to the privacy of the person;


Banking specialization 21

(i) The imposition of duties that are clearly unrelated to work obligations, clearly
disproportionate demands on the performance of the assigned work and the abrupt
change of the workplace or the contracted work without any objective basis relating to the
technical needs of the company;

j) The requirement to work excessive hours in relation to the contracted or legally


established working day, unexpected changes in work shifts and the permanent
requirement to work on Sundays and holidays without any objective basis in the needs of
the company, or in a discriminatory manner with respect to other workers or employees;

k) The notoriously discriminatory treatment with respect to other employees regarding the
granting of labor rights and prerogatives and the imposition of labor duties;

l) Refusal to provide materials and information absolutely essential for the performance of
the work;

m) The clearly unjustified refusal to grant permits, sick leave, ordinary leave and vacations,
when the legal, regulatory or conventional conditions for requesting them are met;

n) Sending anonymous messages, phone calls and virtual messages containing insulting,
offensive or intimidating content or subjecting someone to a situation of social isolation.

In other cases not listed in this article, the competent authority will assess, depending on
the circumstances of the case and the seriousness of the reported conduct, the
occurrence of workplace harassment described in article 2.

Exceptionally, a single hostile act will be enough to prove workplace harassment. The
competent authority will assess such circumstances according to the seriousness of the
reported conduct and its capacity to offend human dignity, life and physical integrity,
sexual freedom and other fundamental rights.

When the conduct described in this article occurs in private, it must be demonstrated by
the means of proof recognized in civil procedural law.

Article 8. Conduct that does not constitute workplace harassment. The following do not
constitute workplace harassment in any of its forms:

a) The requirements and orders necessary to maintain discipline in the bodies that make
up the Public Forces in accordance with the constitutional principle of due obedience;

b) Acts intended to exercise the disciplinary power that legally corresponds to hierarchical
superiors over their subordinates;

c) The formulation of reasonable demands for job loyalty or business and institutional
loyalty;

d) The formulation of service circulars or memoranda aimed at requesting technical


requirements or improving work efficiency and the work evaluation of subordinates
according to objective and general performance indicators;
Banking specialization 22

e) The request to perform extra duties of collaboration with the company or institution,
when they are necessary for the continuity of the service or to solve difficult situations in
the operation of the company or institution;

f) Administrative actions or procedures aimed at terminating the employment contract,


based on a legal cause or just cause, provided for in the Substantive Labor Code or in the
legislation on the public service.

g) The request to fulfill the duties of the person and the citizen, as referred to in Article 95
of the Constitution.

h) The requirement to comply with the obligations or duties referred to in articles 55 to 57


of the CST, as well as not to incur the prohibitions referred to in articles 59 and 60 of the
same Code.

i) The requirements to comply with the stipulations contained in the regulations and
clauses of employment contracts.

j) The requirement to comply with the obligations, duties and prohibitions set forth in the
disciplinary legislation applicable to public servants.

Paragraph. The technical requirements, efficiency requirements and requests for


collaboration referred to in this article must be justified and based on objective and non-
discriminatory criteria.

Article 9. Preventive and corrective measures against workplace harassment.

1. The work regulations of companies and institutions must provide mechanisms for
preventing workplace harassment and establish an internal, confidential, conciliatory and
effective procedure to overcome harassment that occurs in the workplace. Bipartite works
councils, where they exist, may assume functions related to workplace harassment in the
work regulations.

2. The victim of workplace harassment may inform the Labour Inspector with jurisdiction in
the place of the incident, the Municipal Police Inspectors, the Municipal Ombudsmen or
the Ombudsman's Office, as a precaution, of the occurrence of a continued and obvious
situation of workplace harassment. The complaint must be submitted in writing, detailing
the reported facts and attaching summary evidence of the same. The authority that
receives the complaint in such terms will preventively order the employer to start the
confidential procedures referred to in numeral 1 of this article and to schedule educational
activities or group therapies to improve relations between those who share an employment
relationship within a company. To adopt this measure, the accused party will be heard.

3. Anyone who considers himself or herself to be the victim of workplace harassment


under any of the modalities described in Article 2 of this law may request the intervention
of a legally authorized conciliation institution in order to amicably overcome the situation of
workplace harassment.

Paragraph 9 .p.1 1°. Corrected by National Decree 231 of 2006. Employers must adapt
the work regulations to the requirements of this law within three (4) months following its
Banking specialization 23

promulgation, and non-compliance will be administratively sanctioned by the Substantive


Labor Code. The employer must open the stage for listening to the opinions of the workers
in the adaptation referred to in this paragraph, without such opinions being obligatory and
without eliminating the power of labor subordination. See the Resolution of the Ministry.
Protection 734 of 2006.

Paragraph 2°. Failure by the employer or senior management to adopt preventive and
corrective measures in the situation of workplace harassment will be understood as
tolerance of the same.

Paragraph 3°. The complaint referred to in paragraph 2 of this article may be


accompanied by a request for transfer to another department of the same company, if
there is a clear option in this regard, and will be suggested by the competent authority as a
corrective measure when possible.

See District Decree 515 of 2006, See art. 14, Min. Resolution. Protection 2646 of 2008

Article 10. Sanctioning treatment of workplace harassment. Workplace harassment,


when duly proven, shall be sanctioned as follows:

1. As a very serious disciplinary offence in the Single Disciplinary Code, when its author is
a public servant.

2. As termination of the employment contract without just cause, when it has led to the
resignation or abandonment of work by the worker governed by the Substantive Labor
Code. In such case, compensation is applicable under the terms of article 64 of the
Substantive Labor Code.

3. With a fine of between two (2) and ten (10) legal minimum monthly wages for the person
who does it and for the employer who tolerates it.

4. With the obligation to pay Health Care Providers and Professional Risk Insurers fifty
percent (50%) of the cost of treatment for occupational diseases, health problems and
other consequences arising from workplace harassment. This obligation is the
responsibility of the employer who has caused or tolerated the workplace harassment,
without prejudice to the timely and proper care provided to the affected worker before the
competent authority determines whether his or her illness was a consequence of
workplace harassment, and without prejudice to other actions enshrined in social security
regulations for administrative entities against employers.

5. With the presumption of just cause for termination of the employment contract by the
individual worker and exemption from paying notice in the event of resignation or
withdrawal from work.

6. As a just cause for termination or non-renewal of the employment contract, depending


on the seriousness of the facts, when the workplace harassment is exercised by a co-
worker or a subordinate.
Banking specialization 24

Paragraph 1. The money from fines imposed for workplace harassment will be allocated
to the budget of the public entity whose authority imposes it and may be collected through
coercive jurisdiction with the appropriate value update.

Paragraph 2. During the disciplinary investigation or prosecution for conduct constituting


workplace harassment, the official conducting the investigation may, with justification,
order the provisional suspension of the public servant, in accordance with Article 157 of
Law 734 of 2002, provided that there are serious indications of retaliatory attitudes against
the potential victim.

Article 11. Guarantees against retaliatory attitudes. In order to avoid acts of retaliation
against those who have made requests, complaints and reports of workplace harassment
or who serve as witnesses in such proceedings, the following guarantees shall be
established:

1. The unilateral termination of the employment contract or the dismissal of the victim of
workplace harassment who has exercised the preventive, corrective and sanctioning
procedures established in this Law, will have no effect when issued within six (6) months
following the petition or complaint, provided that the competent administrative, judicial or
control authority verifies the occurrence of the facts brought to its attention.

2. The filing of a complaint of workplace harassment in a state agency may trigger the
exercise of preferential power in favor of the Public Prosecutor's Office. In such a case,
disciplinary jurisdiction over the whistleblower may only be exercised by the said
supervisory body while the labour action in which the situation is being discussed is being
decided. This guarantee will not apply when the accused is an official of the Judicial
Branch.

3. Other rights granted by the Constitution, the law, collective bargaining agreements and
collective pacts.

The above guarantees will also cover those who have served as witnesses in the
disciplinary and administrative proceedings covered by this law.

Paragraph. The guarantee referred to in paragraph one shall not apply to dismissals
authorized by the Ministry of Social Protection in accordance with the law, to disciplinary
sanctions imposed by the Public Prosecutor's Office or the Disciplinary Chambers of the
Superior or Sectional Councils of the Judiciary, or to disciplinary sanctions issued as a
result of proceedings initiated prior to the complaint or claim of workplace harassment.

Article 12. Jurisdiction. It is the responsibility of the labour judges with jurisdiction in the
place where the incident occurred to adopt the disciplinary measures provided for in Article
10 of this Law, when the victims of the harassment are private workers or employees.

When the victim of workplace harassment is a public servant, the jurisdiction to hear the
disciplinary offence corresponds to the Public Prosecutor's Office or to the Disciplinary
Jurisdictional Chambers of the Superior and Sectional Councils of the Judiciary, in
accordance with the powers indicated by law.
Banking specialization 25

Article 13. Sanctioning procedure. The following procedure shall be followed for the
imposition of the sanctions referred to in this Law:

When the authority to impose sanctions falls to the Public Prosecutor's Office, the
procedure provided for in the Single Disciplinary Code shall apply.

When the sanction falls within the jurisdiction of the Labor Judges, a hearing will be held,
which will take place within thirty (30) days following the presentation of the request or
complaint. The accused of workplace harassment and the employer who has tolerated it
will be personally notified of the initiation of the procedure within five (5) days following
receipt of the request or complaint. The tests will be carried out before or during the
hearing. The decision will be issued at the end of the hearing, which may only be attended
by the parties and witnesses or experts. An appeal may be filed against the judgment that
terminates this action, which will be decided within thirty (30) days following its filing. In all
matters not provided for in this article, the Labor Procedural Code shall apply.

Article 14. Recklessness of the complaint of workplace harassment. When, in the opinion
of the Public Prosecutor or the competent labor judge, the complaint of workplace
harassment lacks any factual or reasonable basis, the person who filed it shall be fined
between one-half and three legal monthly minimum wages, which shall be successively
deducted from the remuneration earned by the complainant, during the six (6) months
following its imposition. Underlined text declared UNCONSTITUTIONAL by the
Constitutional Court through Judgment C-738 of 2006.

The same sanction will be imposed on anyone who files more than one complaint or claim
of workplace harassment based on the same facts.

The money collected from such fines will be allocated to the public entity to which the
authority that imposed the fine belongs.

Article 15. Summons to the guarantee. In proceedings relating to nullity and restoration of
rights in which legal defects of false motivation or abuse of power are discussed, based on
facts that could constitute workplace harassment, the defendant may, within the term of
posting on the list, summon the perpetrator of the harassing conduct to the guarantee.

Article 16. Suspension of the evaluation and rating of work performance. Following a
report from the health promotion entity (EPS) to which the subject of workplace
harassment is affiliated, the performance evaluation will be suspended for the time
determined by the medical report.

Article 17. Procedural subjects. The person under investigation and his/her defense
attorney, the passive subject or his/her representative, the Public Prosecutor's Office, may
intervene in disciplinary proceedings brought for workplace harassment when the
proceedings are brought before the Superior or Sectional Council of the Judiciary or before
the Congress of the Republic against the officials referred to in Article 174 of the National
Constitution.

Article 18. Expiration. Actions arising from workplace harassment will expire six (6)
months after the date on which the conduct referred to in this law occurred.
Banking specialization 26

Article 19. Validity and repeal. This law shall enter into force upon its promulgation and
shall repeal or modify all laws that are contrary to or incompatible with it. intermediate or
final levels of the organization.

PRIVATE BANKING SECURITY PROCEDURES

MONEY LAUNDERING PREVENTION

What is money laundering and how can you be involved?

Money laundering is the set of operations aimed at hiding


or disguising the illicit origin of goods or resources. It is also known as money laundering,
money laundering, money legitimization or recycling of dirty money, hot money, or
legalization or concealment of assets from illicit activities.

In Colombia, this conduct is classified in Law 599 of 2000, Penal Code, article 323
(Money laundering): “Anyone who acquires, safeguards, invests, transports, transforms,
guards or manages assets that have their immediate or indirect origin in extortion, illicit
enrichment, extortionate kidnapping, rebellion, arms trafficking, crimes against the financial
system, public administration, or linked to the proceeds of crimes that are the subject of a
conspiracy to commit a crime, related to the trafficking of toxic drugs, narcotics or
psychotropic substances, or gives the assets derived from such activities the appearance
of legality or legalizes them, hides or conceals the true nature, origin, location, destination,
movement or rights over such assets, or performs any other act to hide or conceal their
illicit origin.”

Money and goods of illicit origin will never be legal, even if multiple transactions are made
with them to hide or conceal their origin.

As a business owner, how can you become involved in money laundering cases?

Suppliers case: Natural or legal persons who informally sell products, materials or inputs
below market prices, without apparent profit margin.

Client case: Natural or legal persons who purchase all of a company's production or
several goods that are paid for strictly in cash with illicit resources.

Companies that manage all resources in cash: Companies or commercial


establishments that handle large volumes of cash that are not consistent with their activity,
do not have the necessary supporting documents for their operations or falsify them.
Banking specialization 27

Investor case: Natural or legal persons who select companies with financial difficulties
and offer themselves as investors (new partner who capitalizes the company) or as
lenders (in charge of paying the company's debts) with resources of illicit origin.

Companies or businesses legally established for the logistical support and


management of criminal organizations: These organizations require the supply of
various goods and services (food, fuel, transportation, medicines) for whose provision they
use businesses legally established in the area of influence. These goods or services are
paid for in cash and are ordered to be delivered or provided to the persons indicated,
either in the same location or in different parts of the country.

How can I prevent the risk of money laundering?

- Know the market and detect warning signs and unusual


operations- Report any unusual and suspicious activity to the competent authorities

Superintendency of Companies
www.supersociedades.gov.
co Toll-free number: 018000 114319

Financial Information and Analysis Unit – UIAFwww


.uiaf.gov.
co Toll-free number: 01 8000 11 11 83

Office of the Attorney General of the Nation


www.fiscalia.gov.
co Toll-free number: 018000 916111

Colombian
National Police www.policia.gov.
co Anti-corruption line: 018000 910600

Find out which are the most common typologies in the real sector:

1- “Peso Broker”
Refers to the use of an “informal intermediary” in the capital and currency market who is
responsible for relocating part of the profits of illicit origin obtained in the international
market to the local market.

A company can be a victim of this operation and be used without its consent in a money
laundering operation if it exchanges currencies through this mechanism, without verifying
the source of said resources.
Banking specialization 28

2- Acquisition of smuggled
goodsA supplier not sufficiently known to the company ends up supplying smuggled
goods, such that the company may be involved in a money laundering operation, without
realizing it.

3- Use of front companies to become clients or suppliers of companies with legal


activities. A criminal organization, in order to develop and maintain its activities, requires
different goods and services, some of which due to their characteristics can be provided by
the local economy (area of greater presence).
- A legitimate commercial activity ends up supporting the logistics for the commission of
illicit activities or giving the organization's money an appearance of legality.
- Through a legitimate commercial activity, the handling or transfer of resources from illicit
activities is carried out.

4- Use of front companies through indirect distribution channelsThis may


occur when companies use indirect distribution channels without having proper
knowledge of them and these turn out to be front companies for drug trafficking or terrorist
organizations.

5- Use of the stock marketA


company, when turning to the stock market to satisfy its liquidity requirements through, for
example, a bond issue, is exposed to the risk that some of these securities may be
acquired by front organizations or companies or persons linked to criminal or terrorist
organizations with money of illicit origin. In this way, the money launderer would hand over
illicit money and receive legal money from the company (the return on the bond and its
redemption value).

IDENTIFICATION OF PERSONS AND SUSPECTS:

In seconds, you can't confiscate it, you have to be clever.

External signs:
Intuition is a guide in many cases, but we must try to identify the reason that motivated that
feeling. To do this, it is important to study the external signs or body language in the
following parts: head, hands, legs.

Signs of nervousness:
- In the head: presence of sweat (abnormal), movement of the head and appropriate
blinking, tendency to touch the face a lot or touch the lips with the tongue, exaggerated
paleness, nerves (anxiety from fear is triggered).
- In the hands: he bites his nails, cannot find a position for his hands, closes his fists, does
exercises with his hands.
- In the legs: shaking.

Signs of lies:
- In the head: he lowers his gaze and does not hold it, he touches his lower lip repeatedly,
he makes unnecessary turns.
- In the hands: there is nothing to do with them.
Banking specialization 29

- On the legs: reflects discomfort and itching.

Signs of not belonging:


- On the head: changes in direction of gaze, communication or signals with the eyes,
moves the jaw muscles, touches the ears repeatedly.
- On the hands: excessive sweating.
- Personal appearance: Different appearance or physiognomy, clothing is not appropriate.
- Nervousness: carries suspicious implements, tries to blend in with the environment.

How to recognize suspicious behavior


Prevention is the best weapon to reduce crime

- If you hear the sound of breaking glass, gunshots, or dogs barking insistently, someone
may be trying to break into a property to rob you

. - If you hear terrifying screams, or someone calling for help: it may be a robbery on the
street or inside a home, or a physical or sexual assault.

- If you notice the presence of individuals circulating either on foot, on a motorcycle or in a


car, looking inside vehicles parked on the street: they may be looking for valuable objects
to steal.

- If you hear someone pushing “your” front door, or the handle being moved, or water or
smoke coming in from under the door, or you see suspicious people walking around the
street checking door to door trying to open them (trying to open the door): they may be
trying to enter a house with the intention of robbing you.

- If you notice that strangers pass by your block repeatedly on foot or in vehicles, or you
find parked vehicles with people inside who are not from the neighborhood (men and
women), they may be choosing a house, business, or vehicle to rob.

- If you see a person running around carrying valuable items, appliances, electronics, etc.
without proper packaging, it is possible that they have been stolen from a house or vehicle
in the area.

- If you notice unknown people hanging around schools or driving around in vehicles,
especially when students are leaving school: they may be drug dealers or sex offenders.

- If you see merchandise being taken out of a store through half-open shop windows or
shutters, at unusual times: possible theft or looting of a business.

- If you see people riding high-powered motorcycles, they may be well dressed, wearing
helmets, hanging around banking areas, riding in the wrong direction, or riding on
sidewalks, in squares or in public places: they may be “jaladores” (motorcycle thieves) in
action.

- If you are surprised to see workers working on a holiday with heavy tools, on the dividing
wall of an appliance store, or a bank branch, or removing large amounts of dirt: you may
be in the presence of “burglars.”
Banking specialization 30

- If you notice objects such as wallets, briefcases or weapons being thrown from a moving
vehicle: a possible attempt to dispose of evidence of a crime.

- If you see a person lying on the street with altered mental or physical symptoms: possibly
injured or under the influence of strong drugs. Ask for help from whoever is appropriate
(police, public assistance, etc.).

- If you find any abandoned bags, suitcases or packages in your garden or on the street,
DO NOT TOUCH THEM; they may have been forgotten, but they may also contain
dangerous items such as explosives, narcotics or products of illegal activities.

If you notice any activity like this, call the police immediately, stay in
communication with the operator by answering all their questions, and help when
the patrol car arrives by providing all the information you have memorized about the
suspects and their actions, such as:

- Description as complete as possible of the suspects, height, age, clothing, tattoos,


whether they were carrying weapons (and if so, describe them).

- Description of the vehicle that was transporting them: make, color and license plate
number.

- Time and direction of escape.

- If you heard abnormal sounds: gunshots, screams, the sound of broken glass, indicate
where they came from.

- If they were transporting any wounded.

- Any other information that may be provided to help quickly clarify a criminal act.

Remember, prevention is the best weapon to reduce crime. Reporting any possible
commission of a crime is an effective action to reverse the feeling of risk and begin
to awaken insecurity in crime, given that the control of illicit acts by citizens
prevents the constant repetition of criminal acts of any kind.

ACCESS CONTROL TO BANKING FACILITIES

Generalities:

In banking facilities, the personnel in charge of Access Control form the first circle of
security in the system with the support of physical barriers and electronic elements
designed to prevent, delay or delay the access of hostile elements or unauthorized
persons, who could violate the system, partially or totally altering it with their actions.

From the above, it follows that the proper functioning of the scheme provided for Access
Control to a facility will depend on its complete security and the degree of protection
provided to people, property or facilities.
Banking specialization 31

For all the above reasons, effective Access Control must be based on a study that clearly
determines the following stages:

a) Identity Verification.
b) Authorization.
c) Confirmation of authorization.
d) Access and registration.
e) Destination verification.
f) Departure

Each stage must be aimed at limiting the possibility of access by unauthorized persons
and channeling visitors through pre-established control points, which allow for the
examination of their need to enter the area they intend to visit.

The personnel in charge of Access Control must base their actions on the principle of
“never deviating from the establishment procedure”. Improvising often leads to confusing
and potentially dangerous situations.

The general mission of the staff in an Access Control must be framed within the following
basic purposes:

1.- Identification Systems:

Access control points for people must have a way of recognizing each person who intends
to enter, has authorization to do so and at the same time must have a means of identifying
those people.

To optimize access control for people, it is advisable to design an identification card that is
as difficult to falsify as possible and combine its use with internal controls within each area,
based especially on the recognition of people.

Any type of ID card can be forged, but there are still many advantages to using them.

2.- Access authorization system:

Once their trustworthiness has been determined, those persons who perform their duties
or who need to enter certain areas for reasons of their activities are allowed to pass
through the established protective barriers.

The authorization to enter that is granted to a person must be limited only to those areas
where their presence is necessary to perform their duties or satisfy the specific needs that
justify their presence in that place.

Authorization systems cannot base their effectiveness solely on electronic means,


however complete and advanced they may be, since the information on which they
operate can be modified or adulterated. It is therefore essential that Security Guards be
provided with appropriate procedures that allow them to satisfactorily complete the various
stages of the electronic system.
Banking specialization 32

3. Stages of Access Control

a) Identity verification:

As its name indicates, its purpose is to identify the person who wishes to enter the
premises. This must be done when the client enters the internal administrative offices of
the bank facility.

Identity verification is carried out by means of a physical inspection of the official identity
document, or failing that, the credential that accredits the person's civil service status,
depending on whether the person is a visitor or an employee of the company, respectively.

This verification is the first line of action in the access control process, therefore reliable
identity instruments will be those that contain at least a photograph of the bearer.

b) Authorization/Confirmation:

Its purpose is to verify internally whether the person is authorized to enter the premises. In
certain cases, it is done through computerized or manual lists, memorandums or other
documents. The alternative is to resort to an executive or person who is empowered to
authorize or confirm the entry authorization.

This step defines whether the income proceeds or not. It should be noted that if access is
denied to a particular person, this does not imply that the applicant will be detained or that
his or her personal effects, materials or belongings will be confiscated.

Each Security Office must determine the procedure to follow in the event that a person is
caught trying to enter with false identity documents or authorization credentials, which
must comply with the legal regulations related to the deprivation of liberty.

c) Access / Registration:

Once the previous steps have been carried out in the internally established manner, a
badge (credential, pass or card) will be issued, which must expressly indicate the area to
which the visitor has access (floors, sectors, dependencies, etc.)

Subsequently, your personal data must be recorded in the respective Registration Book,
indicating the time of entry and exit, as well as the name and position of the person who
issued the authorization/confirmation, if applicable. In the latter case, it is advisable that
said official sign the record or certify such authorization using a document or standard form
intended for that purpose.

d) Verification of destination:

Once the visitor has entered the premises, the destination must be verified. This
verification can be carried out through various procedures, including:

- Making a call via intercom or intercom, from the Access Control to the destination office.
Banking specialization 33

- Using a standard form in which the destination interlocutor notes the time when the visitor
left his office, signing it as a sign of agreement.

e) Departure:

Once the visit is over, the person passing through will return the access credential,
receiving their personal credential or the corresponding document.

The actual departure time from the facility will be recorded in the logbook.

4. Types of Access Control:

There are three types of Access Control. These are:

- Manual.
- Semi-annual.
- Automatic.

a) Manual Controls:

These systems base their actions on people, whether they are security guards,
administrative staff and/or receptionists.

For this system to work efficiently, a high percentage of effort, planning and adequate
distribution of restricted areas are required, in addition to full compliance with the criteria
defined by management to allow or deny access to specific areas and zones.

Since this system bases its efficiency on visual observation carried out by the participants
in the process, the best method would be for the personnel in charge to know all the
people authorized to enter, but such a method would only work properly when the
authorized group is very small and the control personnel never changes.

b) Semi-manual controls:

A semi-manual Access Control uses electromechanical equipment or elements to support


staff in evaluating the access request and in making the decision to allow or deny entry.

These equipment or elements are incorporated at any stage of the process. The most
commonly used elements or devices are digital button panels.

However, the role played by the people who carry out this control is relevant, because no
stage can fail, since if a component or stage fails, it will affect the others and ultimately, the
entire system will fail.

c) Automatic controls:
Banking specialization 34

These are those in which the verification and access stages are carried out entirely by
electronic equipment or systems, which are preprogrammed to make decisions when
someone requires them.

These systems use, among others, the following equipment:

- Magnetic cards with additional secret code.


- Signature verifiers.
- Fingerprint verifiers.
- Pupil identifiers.

IDENTIFICATION SYSTEMS

- Passes or credentials:

Passes or credentials are a means of identification given to certain persons to indicate


their right to be admitted behind protective barriers, to have access to certain places, to be
given certain privileges, or to indicate that they have a right to certain information. Any type
of credential can be forged, but despite this, there are many advantages to using them.

To optimize access control for people, it is advisable to design a credential or card that is
as difficult to counterfeit as possible and combine its use with internal controls, based
especially on the recognition of people.

ACCESS AUTHORIZATION SYSTEMS.

The systems in place must ensure that only authorized persons are admitted into a facility,
and that unauthorized persons who may evade controls and are caught wandering in
restricted areas or zones are excluded from them as quickly as possible, or are kept under
security control while inside the facility or facility.

The extent of controls will vary in each particular case and authorization to access one
place does not necessarily imply that access will be permitted to others. It is also
necessary to make it clear that access or entry to a building does not mean that a person
has unlimited access to the entire interior of the building.

The entry authorization granted to a person must be limited only to those areas and/or
zones where their presence is necessary to perform their duties or satisfy their needs that
justify their presence in that place.

Access authorization systems cannot base their effectiveness solely on electronic means,
however complete and advanced they may be, since the information on which they
operate can be modified or adulterated. It is therefore essential that security personnel be
provided with appropriate procedures that allow them to satisfactorily complete the various
stages of the electronic system.

STATES OF CONTROL

1.All persons holding an approved credential or pass must be allowed access by security
personnel at each entrance or checkpoint.
Banking specialization 35

Every checkpoint must be equipped with specific instructions and have facsimiles of each
type of credential or pass approved and valid, which must not be visible to the public.

2.It is important that no security officer authorizes a person to leave or pass through a
checkpoint without being in possession of an approved pass. You should never assume
that anyone inside a facility has been authorized to be there.

3. When a person is caught inside the facility or in a restricted area or zone, without having
credentials or a pass and trying to leave, he or she should be politely prevented from doing
so by requesting the authorization document. If you do not present it, you should be asked
for your official identification document and asked in polite terms to explain and/or justify
your presence at that location. If such explanations are not satisfactory, you may be asked
to wait for the police to clarify the situation. Under no circumstances may he be forced to
remain against his will.

4. Access Controls will keep a record of all persons entering or leaving a building or
facility. The data to be considered will vary depending on whether it concerns employees,
clients or visitors, but in all cases the full name, time of entry and exit must be noted.

ACCESS AUTHORIZATION ASSIGNMENT CRITERIA.

A facility or enclosure in which there is a technically planned Access Control must also
have a classification of these based on the importance of the activities carried out there or
the nature of the materials used, which will determine the level of access for people,
whether employees, clients, visitors or contractors. For this purpose, the site is divided into
areas.

These areas can be identified as follows:

- Public Areas.

- Employee Areas.

Each area in turn must be subdivided into Zones, which according to their operational
and/or strategic importance, are classified as:

- General areas.

- Restricted areas.

- Sensitive areas.

Public Areas:

a) General Zones:

General areas are those in which no authorization is required for entry. These are usually
the offices for sales of merchandise, payment of customer bills, etc.
Banking specialization 36

b) Restricted Areas:

These are those in which the public can use the facilities, but they must first consult with
an employee to see if it is possible to use them. Ex. the bathrooms.

c) Sensitive Areas:
These are those facilities that only certain members of the public, duly qualified by a pre-
established procedure, can enter, but always in the company of an employee. Access to
this area must be recorded both upon entry and exit. Ex. Managers' offices, vault areas or
safe deposit boxes, etc.

Employee Areas.

a) General Zones:

These are all those that an employee can enter simply by being an employee. Ex. casinos,
bathrooms, etc.

b) Restricted Areas:

These are those in which the employee requires prior authorization for entry. Eg-
Accounting Offices, Archives, Senior Executive Offices.

c) Sensitive Areas:

These are those whose stoppage causes interruption of the facility's activities. Ex.
Computer Centers, Electrical Panels, etc.

Access levels are the responsibility of management, which must determine them in
accordance with the general security policies applied by the company.

THE SURVEILLANCE SERVICE

Its mission is to direct, coordinate, execute and control everything related to the protection
and defense of the company's personnel and assets.

In order to carry out this mission, the Surveillance Service is responsible for preparing the
necessary plans for the effective protection and defense of the company's assets and
personnel; it will be in charge of directing the actions leading to the aforementioned
defense, when appropriate; it must coordinate the established plans and procedures
internally and externally; it will be responsible for monitoring compliance with said plans
and the rules dictated by the company for their effective implementation; it will also be in
charge of investigating losses and taking steps to recover them.

General Rules:
Banking specialization 37

a) It is the obligation of all members, regardless of their position, that their actions be
surrounded by the greatest guarantee of equity, justice and correctness. Therefore, all
observations made must be made in correct, clear language, observing the strictest
standards that education imposes, without phrases that undermine the personality of the
person receiving them.
b) Consequently, under no circumstances should language be used that could irritate or
humiliate, since such conduct only provokes resistance, arouses antipathy and hostile
feelings, not only from the affected person but also from all the people who witnessed it.
c) Management will be much more meritorious when the consummation of a crime or
infraction is prevented than when the person who committed it is caught, since the main
function is to prevent rather than repress. It is an inherent right of the position to demand
respect and consideration, but all within correctness, avoiding falling into untimely
attitudes.
d) In his relationships, both in his private life and in his work sphere, he must adhere to
ethical standards, in accordance with the functions he performs; consequently, he must
maintain in all his acts an invariable rule of conduct that makes him invulnerable to
criticism.

Punctuality

He must attend his duties punctually, not miss his service without having previously
obtained leave, nor abandon his post before being relieved or receiving express orders to
do so.

Presentation

Your personal appearance will always be impeccable. Short hair, shaved, clean hands and
nails, neat and ironed clothes. You must use only the garments provided without modifying
their appearance or shape. You may not use them for any purpose other than providing
services to the company. In general and permanently, your appearance will be an example
of neatness and correctness.

Booking

He/she must keep confidential the orders and instructions given to him/her for the
fulfillment of his/her duties, as well as all circumstances that come to his/her attention in
the exercise of his/her functions. Also, as a general rule, all company operations must be
kept strictly confidential, and providing information on matters of any nature is absolutely
prohibited.

Instructions for security personnel.

Below are some examples of general and specific instructions for security personnel at
different posts, taking as a guide the circumstances that normally occur in a typical
industrial company.

General Instructions.

- Observe and enforce all Company regulations.


Banking specialization 38

- Avoid familiarity with the Company's staff and act correctly and firmly.
- Be informed of all the latest developments in the Service.
- Be convinced that the principle of discipline lies in compliance with one's superior and
mutual respect.
- Do not disagree with or criticize the orders received.
- Do not provide Company reports, of facts that are known to you, to persons outside the
Company and without being authorized to do so.
- Do not leave your post without first being relieved.

Loss prevention

- Repress the theft or robbery of products, tools, merchandise and/or items from the
establishment or from third parties stored therein.
- Control the tools, materials, etc., of contractors entering and leaving the plant, verifying
quantities, qualities and condition.
- Strict control of people or visitors who come to the plant for different reasons.
- Strict control of general vehicles entering and leaving the plant.
- Check the loading sectors of all products or materials and make the necessary
verifications.
- Adopt all measures aimed at clarifying, preventing and avoiding damage or losses,
irregularities or anomalies that harm the company's assets.

Accident Prevention.

- The attempt or carrying of weapons of any kind.


- Obstructions, excavations, unmarked or poorly marked wells.
- Defective floors.
- Violations of traffic regulations within the facility.
- Absence of caution signs in dangerous places or in places under repair.
- Lack of or poor lighting systems at emergency exits or perimeter barriers, access points,
etc.
- Materials obstructing corridors, forced passages that may contribute to accidents or
obstruct the normal emergency exit of the facility.

Fire prevention.

- violation of the ban on smoking in established places.


- Existence of cigarette butts.
- Deficiency of extinguishing elements.
- Closed or clogged sprinkler valves, motors or electrical equipment operating abnormally,
emitting smoke, etc.
- Improper storage of fuel elements.

General Prevention.

- Permanent losses of water, gases, steam, fuels, etc.


- High voltage rooms, poorly closed fuel pumps.
- Unprotected merchandise or equipment.
- Windows with broken locks, poor perimeter fences or barriers.
Banking specialization 39

- Blockages or impediments on streets where ambulances or firefighters must travel.


- Emergency lights not working.
- Raw materials, merchandise, equipment abandoned or stowed in such a way that they
may deteriorate.

Private instructions.

The following model of private lockers has been developed based on a typical
establishment, where there is a main entrance covered by two guards. As in the previous
cases, these guidelines must be adjusted to the structural characteristics of each
establishment and to the specific needs arising from its specific vulnerabilities.

Main entrance.
Security staff.

Tasks:

a) For the Guard who remains inside the Access Control:

- He/she will be responsible for examining the documentation proving the identity of the
persons who must enter the facility.
- Will collect from whoever is authorized to grant permission for people and vehicles to
enter the facility.
- Record the entry of people and vehicles on the corresponding form.
- Provide the identification card corresponding to the entry and exit of people and vehicles.
- Keep the job log up to date.
- Operate the door opening and closing systems and alarm.
- Will collaborate in the general surveillance of the access area.

b) For the guard who remains outside.

- He will be in charge of observing and monitoring the area.


- Drivers of vehicles that must enter will be required to provide entry and exit
documentation, which will be handed over to the Guard at the gate for verification.
- He/she will be responsible for the inspection of people and vehicles in accordance with
established standards.
- Maintain order in the area, avoiding crowds of people, and regulate the entry and exit of
vehicles.
- Provide guidance to individuals and drivers regarding entry procedures and enforce the
provisions governing visitors and vehicles.

Order Service.

It is advisable to provide in writing the special instructions that will govern the procedures
of the Security personnel in various situations that arise daily with employees and workers,
so that their actions are coherent and in accordance with legal regulations. This will
prevent conflicts with plant personnel that may arise from abuse or arbitrary actions
attributable to the security service.

Special procedures for Security Service personnel.


Banking specialization 40

Disputes among staff.

a) Proceed to stop the act immediately.


b) Normalize the situation at the place where the incident occurred.
c) Verify the existence of injuries.
d) Inform the Supervisor or person in charge.
e) Comply with the contact's instructions regarding police procedures.

Staff in a state of intoxication.

- Prohibit the entry of intoxicated personnel into the Facility.


- It will prevent them from bringing in alcoholic beverages.
- If this occurs, the Personnel Office will be informed.
- If you are detected during working hours, you will be terminated from your duties and
sent home, and the Personnel Office will be informed.

Robberies or thefts.

- He will arrest the perpetrators wherever he finds them.


- The company will proceed to recover the items or merchandise owned by the company,
which will remain at its disposal according to the company's instructions.
- If the company so decides, the perpetrators of the crime will be brought to justice.
- If the person is handed over to the courts, the corresponding record will be drawn up.
- Record everything done in the logbook.

Damage and/or sabotage.

- The perpetrator will be arrested at the scene of the crime.


- Urgent measures will be taken to prevent the damage from spreading.
- Protect the scene of the incident so that its characteristics are not altered.
- Request the presence of specialized personnel to standardize the installation or system.
- Police intervention will be requested.

Summary of the procedure in general.

You should keep in mind when acting:

a) Thoroughness in the description of the event.


b) Importance of the accumulation of evidence.
c) Need for qualified witnesses, that is, those who are not dependent on, have family ties
or interests with the person responsible.
d) Try to certify the identity of all persons with identification documents when they are not
from the company and card number and area where they carry out their tasks when it
comes to personnel of the facility.
e) Avoid unnecessary explanations, holding discussions and using expressions that may
be hurtful or irritating during the intervention and even when reporting the fact of contact.

CONTROL OF PEOPLE, VEHICLES AND MERCHANDISE.


Banking specialization 41

One of the most important tasks of the Security Service is the control of access to people,
vehicles and merchandise.

Below are the rules that generally apply in these cases and that may be adjusted or
modified according to the characteristics and modality of each company.

Considering the importance of Access Controls, it is necessary that the rules established
in this regard are known by all the staff at the facility.

People Control.

The security service will be in charge of controlling access to the Plant, of all persons,
whether or not they are part of the facility, having primary responsibility for everything
related to the control, entry and exit of persons and vehicles.

Own staff.

- It will ensure that this personnel complies with the established regulations for their entry
and exit.
- Presentation of the identification card will be required upon entering the facility.
- The employee will proceed to search bags, packages, bundles, etc., upon entering the
establishment, in order to prevent the introduction of alcoholic beverages or items of any
kind unrelated to the employee's activity.
- Inspect bags, packages, bundles, etc., belonging to staff upon leaving the facility, in
accordance with current legal regulations.

Personnel from subsidiaries or other plants of the Company.

Upon entering the facility, the Security Service will request the identification card, which
will prove the identity of the person and will inquire about the reasons for the visit.

- If the employee is a senior employee, the security employee will identify him/her and
accompany him/her to the office he/she wishes to visit.
- The plant's senior staff will be informed of the reason for the visit and its identity, for
subsequent authorization.
- The following must be recorded on the respective form: name and surname, identification
document number, company code, reasons for the visit, who is being interviewed, and
time of entry and exit.

Regular Visits.

People outside the establishment who visit it frequently for collection, maintenance and
other reasons.

- With prior authorization from the appropriate person, the Security Service staff will
provide the named persons with an identification card.
Banking specialization 42

- They must identify those named each time they visit the facility.
- In order to keep track of visits, the Security Service will have forms, recording every day
all the visits and their personal data, number of documents, name and surname, reason for
the visit, company they represent, who they will meet with and the time of entry and exit.

Unusual Visits.

The Security Service will proceed to identify the visitor, verify the reasons for the visit and,
with the prior consent of the Plant's senior staff, will grant access, accompanying them to
the area or department that authorized their entry.

The named persons will be provided with an identification card, which they will make
without omitting any data, and once the process is completed, they must hand it in to the
Security Office upon discharge. The document proving personal identity will not be
retained.

The Surveillance Service will use the same type of form mentioned above, observing the
same instructions.

Protocol Visits.

The Security Service, attentive to what the authorities decide in due course, will take the
precautions that circumstances advise, observing personal hygiene, education, courtesy
as a rule, and will ensure the proper sanitation of the building.

These visits will be communicated in a timely manner to the Security Service, indicating
the day and time of their entry, names and the executive who will accompany them.
Security personnel must ensure that they have easy access to the plant, carrying out only
visual controls on these people.

Visits by delegations.

With the prior consent of the facility authorities, you will observe the instructions given to
you from time to time.

Prohibitions, Restrictions and Procedures.

The entry of promoters or agents of AFPs, Isapres, Financial Institutions, Insurance


Companies, etc., to carry out collections or sales, as well as all types of sellers, is strictly
prohibited from entering the company's facilities.

These people will be politely informed of the prohibition and told that they can wait for their
potential clients at the exit of the premises.

The entry of recruiters or sellers will be permitted when they need to meet with an
executive and the latter expressly authorizes it, in which case a written record will be kept.
Banking specialization 43

Exceptionally, the entry of promoters or agents of AFPs, Isapres or Financial Institutions


will be authorized, individually, to serve clients (not to recruit). Authorization must be
made by the Personnel Department.

People who solicit public charity, people who are drunk or under the influence of alcohol or
drugs, or people who engage in political proselytism or religious preaching are also strictly
prohibited from entering the premises.

Access Control for Authorities, Public Officials, Carabineros or Investigations.

Authorities: If any authority (Ministers, Mayors, Senators, Deputies, Mayors, etc.) carrying
out tasks related to their position, appears at the gate, the corresponding authority of the
facility will be immediately informed according to the instructions received, indicating their
name, position and reason for their visit.

The authority will be treated with the utmost deference and will be granted entry (in their
vehicle). It will be the concern of the Guards that your departure be expeditious.

Public Officials: When any public official (Labor Inspectors, Health Service Inspectors,
Internal Revenue Service, Municipal Inspectors, Customs Service Inspectors, etc.) needs
to enter the plant in the performance of their duties, the Group Leader will inform the
General Management. You will be treated kindly and once your entry is authorized, you
will be given the facilities to ensure that it is expedited, without having to hold your
Credential or Identity Card at the Gate.

During non-working hours and days, the shift manager will be informed and will be asked
to attend to them. The above is without prejudice to the request for the credential that
accredits his/her status as such.

Carabineros: As a general rule, Carabineros personnel on duty (or those who identify
themselves as such with their card) will have the facilities granted to them by the higher
levels of the Company.

Investigations: When this staff needs to enter to carry out judicial procedures (summons,
notifications, etc.) during administrative hours, they will be assisted by the Group Leader
who will request the corresponding credential. Once they have been properly identified,
they will be asked the reason for their visit.

When it comes to delivering summons or notification orders (from a Court), the Group
Leader will accompany you to reception, where the required person will assist you.

If arrest warrants are required, the appropriate contact or Security Chief will be informed
and must go to Access Control to deal with them.

Exceptions and Procedures.

According to current legal regulations, Carabineros and Investigations personnel are


authorized to enter a closed premises without authorization from its owner or
administrator and without an order from the competent court, when there is a
Banking specialization 44

reasonable suspicion that a flagrant criminal is staying or hiding inside that


premises.

In such case, the officer in charge of the investigation has the obligation, at the end of the
same, to draw up a report stating the circumstances that motivated it, a list of the damages
caused to the property during the same (if any), identification of the officer in charge
(Name, rank and Police Unit to which he belongs), Party number and Court to which the
action will be reported.

When Carabineros or Investigations must enter a closed area by virtue of this legal power
(regardless of the time), the Surveillance Service Personnel must not oppose it and will
limit themselves to requesting the respective Institutional Credential from the police
officers.

Access Control for Firefighters and Public Assistance.

Entry into the Fire and Public Assistance facilities will be necessary when an emergency
occurs, for which reason the Shift Manager and the Guards must provide all necessary
facilities to ensure that their entry and exit is as expeditious and rapid as possible.
No special authorization will be required and they will not be identified.

Identification Credentials.

They are an important link in the security system, in order to be able to effectively control
the access and exit of personnel to plants, warehouses or other company facilities.

The availability of a computer with the lists of personnel allows for the quick preparation of
credentials and they will only be completed with the photograph and signature of the
bearer.

The Human Resources Department, together with the Security Service, has primary
responsibility for everything related to the preparation, authorization, delivery and control
of the same.

The following identification credentials or passes are valid:

Normal or definitive.
Temporary.
Contractors.
Visits.

Normal or definitive.

They will be awarded to staff working under a permanent contract.


When any employee ceases his or her duties for any reason, the Personnel Office, after
liquidating his or her assets, must retain the corresponding credential.

Temporary.

It will be delivered to newly hired personnel while their normal or definitive credential is
being prepared.
Banking specialization 45

Visits
The Security Service, after complying with the provisions of current rules and procedures,
will provide visitors with the corresponding credentials.

At the end of the procedures, the credential must be collected when leaving the Plant.

The Security Service will verify that all personnel at the facility use the corresponding
credential, requesting it upon entry of personnel.

It will ensure that all personnel, whether or not they are part of the company, use the
credential in a visible place during hours of activity or when they are on the premises.

Contractors.

These credentials will be provided to persons outside the Company who must enter the
Company for service reasons.

The Security Service will provide credentials upon entry, which will be withdrawn upon exit
for better control.

After delivery, the Plant Surveillance Service will request the personal records of the
persons responsible for registering them.

All areas of the Company that, for work reasons, require the services of external
personnel, will indicate in writing to the Surveillance Service who are the persons or
Companies authorized to enter the Plant and the tasks to be performed.

The credential for contractors will be granted to persons with whom there is a service
contract for a period of more than 14 days or whose presence on a regular basis occurs at
least twice a week.

Vehicle Control.

The entry and exit of vehicles will be adjusted as follows:

Company owned vehicles:

It will identify the driver and passengers.


The driver's name and surname, passengers, vehicle make, license plate, and time of
entry and exit will be recorded on the form.

Vehicles owned by Company personnel.

It will control their entry and exit.


It will identify the driver and passengers.
Banking specialization 46

The driver's name and surname, passengers, vehicle make, license plate, entry and exit
time will be recorded on the form.

Third party vehicles.

Strict control will be exercised over their entry and exit to the plant.
It will identify the driver and passengers.
It will indicate parking, loading, etc. locations and speed limits.
It will control the loading sectors of merchandise or any other product.
The driver and passengers must be entered into the form with their full name, document
number, vehicle make, license plate, reasons for entry, who authorizes entry, time of entry
and exit.
He will inspect all the vehicles mentioned above in any place in the facility and by surprise,
checking specifications, receipts, merchandise, packages, tools, etc.

Rules for the review of persons.

Object:

Establish the procedure to be followed by Company personnel upon leaving the Plant to
comply with the review. This obligation must be indicated in the Internal Regulations.

Establish the procedure to be followed by the Security Personnel for the purpose of
inspecting the facility's personnel, their briefcases, packages and bags. To do so, it is
essential to prepare an Operations Manual.

Entry of packages and elements not necessary to the Installation.

Procedure for the exit of elements from the Company.

- Procedure to be followed by security personnel for the inspection of personnel,


briefcases, packages, bags, etc.

Company personnel who are to undergo an inspection, in accordance with internal


regulations known to all, must go to the inspection room, adapted for this purpose. The
inspection will be carried out in private, with the door closed and always in the presence of
a witness, who may be a member of the union, a co-worker, and if there is no other person
present, it will be carried out in the presence of a Security Guard.

This inspection must be carried out in accordance with existing legal regulations, which
means that the person carrying out this work may not, under any circumstances, touch the
person's body with their hands; any packages, bags or briefcases carried by the person
being checked must be checked. The contents of the aforementioned items must be
removed in their entirety in order to inspect everything. It is not enough to look inside the
package or bag. In this case, the person being inspected is asked to remove the items
inside.

When the person inspected carries any element belonging to the Company or its property
that should not have entered the Plant, it will be removed and deposited at the gate,
unless there is an exit authorization signed by authorized personnel. In this situation, the
Banking specialization 47

signatures must be compared with the register of authorized signatures. It should be clear
that each area at the supervisory level authorizes the exit of elements from its sector.

Entry of unnecessary packages and items.

Unnecessary items are understood to be anything that does not correspond to the function
that the personnel entering the facility is to perform, for example: gifts, photos, clothing that
is not normal (newly purchased, bags containing sports items), radios, personal stereos,
records, etc., or for sale within the plant. Any unnecessary items must be deposited at the
Guard under a control number and removed upon leaving the facility.

Control must be carried out upon entry of personnel to avoid problems upon exit, with
security personnel paying attention to those carrying unusual packages, limiting
themselves to clarifying that they should not bring in unnecessary items and if they insist
on bringing them in, recording it in the logbook with the time, complete identification of the
subject and any other clarifications regarding the package that may be pertinent, and
informing their Supervisor.

Portable radios, pocket calculators, personal stereos, etc., will be authorized by the heads
of each area through written communication to the Surveillance Service. The removal of
these items will be through the corresponding authorization and if their removal is
necessary every day, the authorization must include in block letters the legend “In Transit.”

Photographic equipment, as well as any other equipment that must be brought in for use in
the facility, will only be authorized through the Security Service and will be indicated in the
logbook, with the number and brand of the equipment. The exit of these will be done with
the corresponding authorization with the legend “Your Property”.

Procedures for the exit of Company elements and others.

Every element of the Company or another must be accompanied by the corresponding


authorization, for which each sector must have its corresponding receipt book.

This will be confronted with the sector responsible for the element that comes out, E.g.: the
workshop sends an engine from the installation for repair. Although the engine belongs to
the facility, it is the workshop that sends it for repair, therefore the workshop prepares the
document in question.

This authorization must contain the person to whom it is addressed, complete details of
the item being sent, equipment number, brand, type, quantity, especially the quality in
which it is being sent (on loan, for repair, return or whatever is appropriate), and the
signature of the authorized person that appears in the register intended for this purpose.
Items that come in and out every day, such as suitcases, pocket calculators, etc., must
have the corresponding authorization with complete details and the legend in transit, thus
avoiding the need to carry them out every day.

Any item that is not authorized must be deposited in the security office.

Metal detector.
Banking specialization 48

It is an extremely useful element for the inspection of people, offering great advantages
over the manual palpation system, which should be reserved for the case of control over
non-metallic elements, such as fabrics, plastics, etc.

It is best to use a battery-powered metal detector, as this allows it to be used in any area
of the plant, regardless of the electrical connections to the general network.

Its use must be made known to all staff. Legally, it should never touch the body of the
person being searched.
In order to ensure that all personnel are properly informed and instructed about the metal
detector, its characteristics and use, it is recommended to strictly comply with the following
rules:

Upon entering, staff must bring the minimum number of essential metal items (watch,
keys, coins).
All personnel who carry out tasks bringing items for personal use must report this to the
security staff.

Upon discharge, if any person is detected as carrying metallic elements, he or she will be
invited to go to the examination room in order to establish his or her situation.

Archive of documentation of the Surveillance Service.

A significant amount of information is recorded daily by the surveillance service regarding


the entry and exit of people, vehicles, products and materials, the careful filing of which is
necessary in order to be able to use it in the investigation or clarification of illicit activities
and/or control with other records kept by other sectors of the plant and warehouse.
Therefore, the following concept is established regarding its safekeeping and archiving.

Visiting ticket.

It is filed daily in a consecutive manner according to its number and is kept in the
surveillance service for two calendar months. After this period, it is sent to security for
central archiving for twelve months.

Daily movement sheet.

It is filed daily in a consecutive manner for three calendar months. After this period, it is
sent to Security for central archiving for twelve months.

Company vehicle registration.

It is archived under surveillance for one calendar month, at the end of which it remains
archived at the plant for twelve months.
Visitor log.

The same procedure as that indicated for the visit ticket applies.
Banking specialization 49

Entry permit with car.

The original is delivered to the authorizer and the copy is filed in the Bank Facility
Management.

Exit permit.

The original is sent to the personnel office the following day or the first business day after
holidays.

Quarterly report.

Security will send Plant Management a quarterly statistical report on the number of people
received at the plants, the time spent serving them, vehicles entered, as well as other data
of interest arising from the analysis of surveillance documentation.

RISK ANALYSIS

INTRODUCTION

The number of incidents related to the security of information systems that


compromise company assets is increasing every day.

What was once fiction, in many cases today, becomes reality. Threats have always
existed, the difference is that now, the enemy is faster, harder to detect and much more
daring. This is why every organization must be alert and know how to implement security
systems based on a risk analysis to avoid or minimize unwanted consequences.

However, it is important to emphasize that before implementing security, it is


essential to know in detail the environment that supports the business processes of
organizations in terms of their composition and criticality in order to prioritize security
actions for the most critical key business processes and those linked to achieving the
organization's objectives.

WHAT IS RISK ANALYSIS?

Risk analysis (also known as process hazards analysis or PHA) is the study of the
causes of potential threats and the damage and consequences they may produce.

This type of analysis is widely used as a management tool in financial and security
studies to identify risks (qualitative methods) and others to assess risks (generally of a
quantitative nature).

The first step in analysis is to identify the assets to be protected or evaluated. Risk
assessment involves comparing the level of risk detected during the analysis process with
previously established risk criteria.
Banking specialization 50

The function of evaluation is to help achieve a reasonable level of consensus


around the objectives in question, and to ensure a minimum level that allows the
development of operational indicators from which to measure and evaluate.

The results obtained from the analysis will allow the application of some of the
methods for risk treatment, which involves identifying the set of options that exist for
treating the risks, evaluating them, preparing plans for this treatment and executing them.

How to conduct a risk analysis in your workplace


Following the 5 steps below:
1. Identify the hazards
2. Deciding who can be harmed and how
3. Assess the risks and decide on precautions
4. Record your findings and implement them
5. Review your analysis and update if necessary

There is no need to overcomplicate the process; in many organizations the risks


are well known and the necessary control measures are easy to apply.

For example, you probably already know that if your operators move heavy loads
so their backs could be affected or there is a chance of slipping on their way, then you
have to take reasonable precautions to avoid these accidents.
When thinking about a risk analysis remember:
a) A hazard is anything that can cause harm, such as chemicals, electrical, working at
heights, etc.
b) Risk is the chance, high or low, that someone could be harmed by this or other
hazards, together with an indication of how serious this harm may be.

Step 1
Identify the hazards
Inspect the work site and see what might be expected from tasks that could cause
harm.

Talk to your employees or your representatives about what they think, they may
have noticed things that are not immediately obvious to you.

Check with local safety associations for practical guidelines on where hazards
occur and how to control them.

Check manufacturers' instructions or data sheets for chemicals and equipment in


general. These can be very helpful in detailing the dangers and putting them into
perspective.

Review your accident and health records, they often help identify less obvious
hazards.

Remember to think about dangers and health damage that can occur in the long
term, for example: high noise levels, or exposure to hazardous substances.

Step 2
Deciding what could be damaged and how
Banking specialization 51

For each hazard you need to be clear about who could be harmed, this will help you
identify the best way to manage the risk.

Remember:
Some workers have particular requirements, for example: new and young workers,
people with reduced abilities may be at particular risk. Extra efforts will be necessary for
some hazards.

Cleaning staff, visitors, contractors, maintenance staff etc., who may not be on site
all the time.

If you share your workplace, you will need to think about how your work affects
others present, talk to your people and ask them if they can tell you about anything you
have forgotten.

Step 3
Evaluate the risks and decide on precautions
Having noted the dangers, one must then decide what to do about them.

The laws require you to do everything reasonably practicable to protect workers


from hazards. It is possible to work with the analysis alone, but it is advisable as a better
path to compare the results with similar “best practices”. These can be consulted at
security institutes or associations.

So, after comparing your results with “best practices” see if there are more and
better things you can do to bring your work up to standard.

Ask yourself this:


Can I get rid of the danger completely?
If not, how can I control the risks so that damage is unlikely?

When proceeding to control risks, apply the following principles:


1. Try a less risky option (example: switching to a less risky chemical)
2. Prevent access to hazards (e.g. by placing guards)
3. Organize work to reduce exposure to hazards (e.g. placing fences between
pedestrians and traffic)
4. Provide personal protective equipment (safety glasses, safety shoes, hearing
protectors, etc.)

5. Provide first aid and cleaning supplies (first aid kit, eye wash, emergency showers,
etc.).

Improving health and safety does not need to be expensive. For example, installing
a mirror on a dangerous corner helps prevent a vehicle accident. The cost is low
considering the risks
Involve all staff in these practices

Step 4
Record your findings and implement them
Putting the results of your risk analysis into practice will make a difference as you
look after your people and your business.
Banking specialization 52

Write down your findings and share them with the staff.

The analysis does not have to be perfect but it must be appropriate and sufficient.

It is necessary to show that:


1. An appropriate review has been made
2. 2. Those who could be affected were investigated
3. 3 All significant hazards were assessed, taking into account the number of people
who could be involved.
4. Precautions are reasonable and the remaining risk is low
5. All staff and/or their representatives were involved in the process

If you find that many changes and improvements need to be made to tasks, do not
try to do them all at once, make an action plan with the most important things done first.

A good action plan often has a mix of different things such as:
1. Some low-cost and easy-to-implement tasks, perhaps as a temporary solution until
a more reliable one can be performed
2. Long-term solutions for those risks with a higher probability of accident and/or
damage to health
3. Long-term solutions for those risks that potentially have the worst consequences
4. Training plan for employees on the main risks and how they can be controlled
5. Regular checks to ensure that control measures are in place
6. Clear responsibilities of who leads the action and when

Remember to prioritize the most important things first

Step 5
Review the risk analysis and perform an update if necessary
Few workplaces do not change over time; sooner or later new equipment,
substances and procedures will be introduced that could generate new hazards, etc. This
therefore makes it necessary to review them again.

Each year, you should formally review where you are with the analysis, to ensure
continuous improvement.

Have there been any changes? Are there any improvements that still need to be
made? Have workers identified a problem? Have you learned everything about accidents?

These are some questions we should ask ourselves to ensure that the risk analysis
is up to date.

When you are working, it is very easy to forget to review the risk analysis, until
something happens and it is too late. So why not do the analysis now? Put in writing that
risk review is an annual event.

During the year, if there is a significant change, then don't wait, check the risks and
make the necessary adjustments.
Banking specialization 53

If possible, it is much better to perform the risk analysis when changes are being
planned rather than afterward.

Benefits of comprehensive risk management


 Better awareness of risks. 9
 More effective management of risks and the crisis.
 Proactive identification and exploitation of opportunities.
 Rapid response to changes in the 9 environment.
 Efficient allocation of resources 9 for risk management.
 Establishing a common basis for understanding and managing risks.
 Safer decision making. 9
 Better prediction of potential impacts. 9
 Better targeting of commercial actions 9.
 Better communication of the value that the company creates.
 Increased credibility and 9 trust.
 Improving corporate reputation. 9
 Greater likelihood of success in 9 strategy implementation.

Key objectives of a risk analysis process:


1.- Identify the risks that arise in the strategic plans.
2.- Help Management and Directors (Board of Directors) determine the level of risk
acceptable for the organization.
3.- Develop activities to mitigate risks, or failing that, manage them at the levels
determined and accepted by the organization.
4.- Develop permanent monitoring activities periodically, in order to evaluate risks and the
effectiveness of the controls related to them.
5.- Prepare informative reports with the results of the risk management process.

Some risk factors:


- Staff turnover.
- Management and staff morale.
- Complexity of operations.
- Quality of manual operations.
- Daily transaction volume.
- Low performance and/or behavior indicators.
- Program design - formal developments.
- Date of the last Audit.

Some universal business risks:


1.- Excessive costs.
2.- Poor or inadequate quality.
3.- Loss of customers.
4.- Losses in sales.
5.- Unacceptable principles.
6.- Erroneous information in reports.
7.- Destruction or loss of assets.
8.- Erroneous management policies / decisions.
9.- Danger to the safety of the public or employees.
10.- Fraud or conflicts of interest.
Banking specialization 54

CONCLUSION

The results of the risk analysis once the risk analysis is carried out, the organization has in
its hands a powerful tool for the treatment of its vulnerabilities and a general diagnosis of
the security status of its environment as a whole. From this point on, it is possible to
establish policies for the correction of problems already detected, and the security
management of them over time, to ensure that previously found vulnerabilities are no
longer sustained or maintained, thus managing the possibility of new vulnerabilities that
may arise over time.

As technological innovations become more frequent, a number of new opportunities arise


for malicious individuals to take advantage of them and carry out inappropriate actions in
the human, technological, physical and process environments.

Once the recommendations are received, actions are taken to distribute them in order to
correct the environment and reduce the risks to which the human, technological, process
and physical infrastructure that supports one or more business processes of an
organization is subject. In this way, it is possible to implement corrective measures and
treatment of vulnerabilities in the assets analyzed, and also in assets with the same
characteristics as those analyzed.

Once the results are tracked and scored in relation to their criticality and relevance, one of
the final products of the risk analysis, the criticality matrix, indicates through qualitative and
quantitative data the security situation of the analyzed assets, by listing the vulnerabilities,
potential threats and respective security recommendations for correcting the
vulnerabilities.

Key concept Risk analysis results in security recommendation reports, so that the
organization can assess the risks to which it is subject and know which business process
assets are most susceptible to threats to the confidentiality, integrity and availability of the
information used to achieve the objectives.

DESIGN OF SECURITY PLANS FOR FACILITIES

It is not difficult to design a security plan. Here is the process outlined in just a few steps:

1. The components of the plan. The purpose of the safety plan is to reduce your risk.
Therefore, you will have at least three objectives, based on your risk assessment:

Reduce the level of threat you are experiencing; Reduce your vulnerabilities; Expand
your capabilities.

It would be helpful if your plan also included:

Preventive plans or protocols to ensure that daily work is carried out under safety
standards (for example, how to prepare a public complaint or visit a remote area).
Emergency plans to deal with specific problems, such as an arrest or a disappearance.

2. Responsibilities and resources to implement the plan. To ensure that the plan is
implemented, we must integrate safety into daily work activities:
Banking specialization 55

Regularly include an assessment of the context and security points in work agendas;
Record and analyse security incidents; Assign security responsibilities; Allocate
resources, i.e. time and funds, for security.

3. Design the plan – where to start. If you have performed a risk assessment of a
defender or organization, you will likely have a long list of vulnerabilities, various types of
threats, and a number of capabilities. It is practically impossible to cover everything at the
same time. So where to start? It's very simple:

Select some threats. Prioritize the threats you've listed, whether current or potential,
using one of the following criteria: Most serious threat – death threats, for example; OR
Most serious and likely threat – if other organizations similar to yours have been
attacked, this represents a clear potential threat to your facility; OR The threat that most
closely matches your vulnerabilities – because you are at greatest risk from that specific
threat.

Make a list of vulnerabilities that correspond to the threat list. You should focus on these
vulnerabilities first, and remember that not all vulnerabilities are related to all threats. For
example, if you receive a death threat, it won't be very practical to start upgrading the
doors to your downtown office (unless you can be easily attacked in the office, which is
usually not the case). It may be more practical to reduce your exposure during your
commute or on weekends. It's not that upgrading your doors isn't important, but this
particular action probably won't reduce your vulnerability to a death threat.

Make a list of the capabilities you possess that match the list of threats.

You are now in a position to focus on the threats, vulnerabilities, and capabilities selected
in your security plan, and you can be reasonably confident that you can reduce your risk
by starting in the right place.

Remember that this is an ad hoc system for designing a security plan. There are other
“formal” methods to do this, but this method is simple and makes you focus on the most
urgent security issues – as long as your risk assessment is correct – and get a “active”
and “real” plan, and that is the important part of security.

GENERAL SECURITY RECOMMENDATIONS IN BANKING ENTITIES AND THE


FINANCIAL SECTOR

PROLOGUE

The security of financial institutions is a complex, novel and highly responsible issue, since
it involves ensuring the physical integrity of clients and bank officials, as well as
safeguarding the assets of the corresponding entity. However, this task is made difficult by
the absence of legislation that adequately defines the range of economic crimes to which
financial institutions are exposed due to their line of business (robbery, fraud and
kidnapping, among others), and by the absence of a framework that guides these entities
in terms of risk reduction within their facilities.
Banking specialization 56

This established security manual seeks to prevent the different risks that arise, in a
complex group with a high volume of activity, in the different areas of the banking facility,
where the offices are located, adopting the appropriate security measures that guarantee
the security of processes, facilities and, more importantly, of people, both employees and
customers.

In line with the above, the mission of banking security, seeking to assist in the
development of the financial system, and channeling the deep concern of its members on
the issue of banking security, and mainly that of its clients, has compiled the following
sound practices in terms of banking security, which constitute recommendations for
financial institutions to take into consideration and seek, to the extent possible and
reasonable, according to the nature and conditions of each entity, to put them into practice
in their security functions.
Since these are recommendations, they cannot be considered imperative mandates
whose compliance can be demanded, but rather, they are suggestions derived from the
experiences of officials in charge of the security function, both at national and international
level, with the intention that they can be used in a generalized manner by institutions, as a
technical input within their scope of self-organization.

FROM THE SECURITY DEPARTMENT

Recommendation 1. Mission of the Department of Security.

Due to the importance of banking security in financial institutions, it is recommended that


the Security Department report directly to the General Management, since it is the
fundamental pillar of information and the proper functioning of any financial, governmental,
etc. system.
The mission of the Security Department is to control and minimize security risks in all its
areas. At a minimum, it is considered that said department must seek to provide the
means and determine the procedures, in coordination with other sectors of the entity, to
physically and electronically protect the assets of the financial entity, the staff and the
clients, in order to avoid criminal acts and accidents or to minimize the damages in case of
occurrence, understanding as assets money, checks, securities, bonds and, in general,
documentation, as well as movable and immovable property.

It is recognized that the responsibility of the Security Department, with regard to the
personnel of the financial institution, is limited to safeguarding their integrity in the event of
crimes and accidents occurring in the facilities of the same, based on the premise that the
main function is the security of the Officials, Clients and the assets of the Banking Entity.

Recommendation 2. Functions of the Department of Security.

In accordance with sound security practices, it is considered that in order to efficiently fulfill
the mission of the Security Department, the functions that it should perform are, at least,
the following:

General
Banking specialization 57

a. Adopt measures aimed at compliance with banking security regulations and other
security-related regulations imposed by existing legislation, internal policies, and
the commitments assumed in insurance policies contracted by the financial
institution.
b. Propose standards, techniques and procedures for incorporation into the entity's
Security Policies and Procedures Manual, in accordance with the regulations of this
manual.

Specific

a. Implement standards, techniques and procedures that enable compliance with the
security requirements set forth in the Laws, regulations, Circulars and
Communications of the Central Bank of Paraguay and the national supervisory
bodies, as well as the provisions of the entity's own Administration.

b. Raise the proposals to the corresponding hierarchical authority, including the


measures necessary to comply with the commitments arising from the contracted
insurance.

c. Train the financial institution's personnel in the security standards, techniques and
procedures related to their functions, as appropriate, and supervise the level of
training of external and internal security personnel.

d. Develop plans to study the security conditions against theft, assault and fire of all
assets, both movable and immovable, of the financial institution (with particular
attention to the Computing Centers, the places where money is deposited and the
cash rooms, vaults and safe deposit boxes, among others), and implement the
corresponding protection measures.

e. Provide advice on the acquisition of security systems, equipment and devices (new
and improved technologies), as well as dictate rules for the use and operation of
this equipment to all user personnel, and monitor its proper maintenance. Likewise,
preserve or archive all information about it, in accordance with internal policies.

f. Coordinate the administrative investigation of criminal acts, both internal and


external, in which the assets of the financial institution were affected, through an
internal administrative body specialized in the field.

g. Coordinate with national authorities the judicial investigation, relative to any


criminal act that occurred in the Banking Entity.

h. Supervise the service provided to the financial institution by companies related to


the security area in the following areas:

• Private Security.
• Radio alarms.
• Closed Circuit Television.
Banking specialization 58

• Maintenance and repair of security facilities and equipment (vaults, room


equipment, ATMs, locks, etc.
• Transporters of valuables and
• Alarm Monitoring.

i. Develop security procedures and draft the functions that security personnel, both
private and internal, must perform to ensure proper performance in each of the
assigned positions. Disseminate these procedures and functions among the
financial institution's staff and officials.

j. Monitor and control the contracts of companies that provide security-related


services; analyze their performance and cost and propose the renewal or
termination of services.

k. Check the existence of insurance contracted by the financial institution, if any,


regarding civil liability, theft, assault, fidelity or other policies, if necessary.

l. Maintain liaison and good relations with officials from the Ministry of Public
Security, the Judicial Investigation Agency, the Public Prosecutor's Office and other
authorities, as well as with the Security Chiefs of other financial institutions.

m. Plan, in the medium and long term, the renewal of security means and the
acquisition of new technologies, and raise them to the corresponding authority.

n. Keep track of the assignment of combinations, codes and keys to the buildings,
premises and facilities of the financial institution and establish cross-controlled
entry policies.

o. Implement an Emergency Plan (contingencies, accidents, evacuations and others),


which includes the corresponding training of personnel (emergency brigades).

p. Plan and carry out safety audits, evaluate their results and prepare and distribute
inspection reports at least every six months.

q. Investigate the personnel who will enter the financial institution, in accordance with
the provisions of each Entity's policy.

r. Collaborate in the review of occupational health and safety programs.

s. Collaborate with other areas of the financial institution in the supervision of internal
and external services, provided that this does not interfere with the priority mission
of Security.

t. Maintain updated identification records for maintenance personnel, contracted


security, messaging, transportation of valuables, applications in external contracts,
Banking specialization 59

etc., safeguarding these for a minimum period of one year after any of the officials
are terminated from their duties.

u. Carry out a building digitalization program, which includes structures, divisions,


security mechanisms, etc., which allows immediate access in special cases; also,
keep track of the personnel assigned to each building.

v. Issue the corresponding policies and procedures and ensure that security
personnel are not used for functions other than those for which they were hired.

w. Prepare a Security Policies and Procedures Manual and ensure its proper
compliance.

Recommendation 3. General Policies and Procedures.

In line with the previous recommendation, it is advisable that the institution assigns to the
Security Department the creation and control of specific procedures related to the following
aspects, but not limited to these:

a. The opening and closing of facilities.

b. The entry and permanence of officials, suppliers, and clients within them.

c. Weapons handling.

d. Transport of valuables.

e. The investigations.

f. The Emergency Plan.

g. Civil risk.

h. The Security Program.

i. Crisis situations.

j. The contingency plan

k. The restricted areas policy.

l. The annual training program for security and administrative staff on security
matters.

m. The policy of preventing internal or external criminal actions.

n. Collection of questionable banknotes.


Banking specialization 60

o. Cases of robbery and assault.

p. The Policy on the Management of Security Vaults.

Recommendation 4. External Contracts.


With regard to external contracts, it is recommended that the Department
Security Department is responsible for creating and monitoring compliance with specific
procedures, in the field of security, related to the outsourcing of services for other areas
and for the Department itself, such as:

a. Hiring technical advisors.


b. Hiring physical security services.
c. Hiring alarm monitoring.
d. Hiring CCTV monitoring.
e. Hiring of armed response and support services.
f. Hiring maintenance services.
g. Hiring training.

Recommendation 5. Safety Standards and Procedures Manual.

It is recommended that financial institutions develop a Security Standards and Procedures


Manual that establishes the functions, duties and procedures that Security Officers, in
general, and those in charge of the Department, in particular, must comply with in
accordance with the position and the place where they perform their work. Such a Manual
could include aspects related to the following topics:

a. Professional ethics.
b. Weapons handling.
c. Job definition.
d. Availability.
e. Procedures for handling critical situations, which should not differ from those used
by police forces in terms of general principles and objectives.
f. Control to be implemented for public and vehicle access and
g. Behavior in the face of natural disasters and criminal events, among others.

For such purposes, it is recommended that a safety study be carried out by specialized
personnel prior to issuing the Manual.

Recommendation 6. Security Manager Profile.

The most important recommendation is that it be under the direction of the General
Management, an essential requirement for the fulfillment of the mission and in
attention to the functions and responsibilities that are incumbent on the person in
charge of the security department, it is considered convenient that it meets, at least,
the following requirements:

a. Have a bachelor's degree in a related field, or have a wealth of training and


experience that makes you suitable for the position.

b. Have a minimum of 5 years of experience in the area.


Banking specialization 61

c. Have extensive knowledge of banking activity and everything related to the field of
security.

d. Have the ability to plan, organize, direct and control systems, procedures and
programs related to security, fraud and other issues, both in central and regional
offices.

e. Have the ability to prepare work plans and draft budgets.

f. Have the ability to develop regulations, provisions and administrative procedures in


the area of institutional security.

g. Have the capacity to review and analyze the institution's operating systems in its
monetary transactions, as well as the operation of electromechanical equipment in
order to guarantee preventive security against crime and order changes based on
the security of the institution, employees and clients.

h. Have excellent police and judicial references.

i. Have the ability to work under pressure in the midst of crises.

j. Ability to work as a team with the administrative and commercial authorities of the
Institution, with its own officials, with officials of other national or international
entities related to security, with members of the Ministry of Public Security, and the
Judicial Investigation Agency and the Public Prosecutor's Office.

Recommendation 7. Functions of the Security Manager.


It is considered advisable that the minimum functions that should correspond to the person
in charge of the Security Department are:

a. The organization, management and inspection of security personnel and services,


whether private or internal.

b. The analysis of risk situations, the planning and programming of the actions
required to ensure that banking security is carried out in accordance with best
practices.

c. The proposal of the relevant security services, as well as the supervision of their
use, operation and maintenance.

d. Control of the ongoing security training that depends on them, proposing to the
bank's Administration the adoption of appropriate measures or initiatives to achieve
this purpose.

e. The coordination of the various security services under their responsibility


(investigations, physical security, electronic security, civil protection, etc.).

f. Coordination with the different police entities in the country.


Banking specialization 62

g. Coordinate with the Ministry of Public Security and the Public Prosecutor's Office
on training related to crisis situations (assaults, kidnappings, hostage-taking,
counterfeit currency, electronic crimes, etc.).

h. In general, ensure compliance with the security regulations applicable to entities.

BASIC PHYSICAL SECURITY MEASURES IN BANKING INSTITUTIONS

ROUTINE PROCEDURES

Recommendation 8. Opening of the Office.


It is mandatory that the person responsible for opening the Branch be accompanied by
security personnel. The security personnel will provide coverage for the official who
performs the opening. Once inside, the Security Personnel will supervise the entrance
door to the branch, to allow the entry of the Officials as they arrive, not allowing the entry
of any person who is not part of the staff until the Branch opens.

Coerced or Forced Access Key: This key will be used if the Official in charge of opening it
does so under threat

Recommendation 9. Access controls


It is recommended as a healthy practice to have lock doors or revolving doors with metal
detectors in High-risk Branches.

All access control systems and support equipment (panic buttons, communication
equipment, weapons) must be in perfect working order at the start of the day.

Recommendation 10. Authorized reserves/cash/money


It is recommended that financial institutions try to reduce the amount of cash in the ATM,
in the ATM drawer, in the ATM mailbox and in the vault.
A sound recommendation is to regulate the authorized reserves.

Recommendation 11. Staff Procedure During Opening to the Public


This is the moment when the Security staff will put all their knowledge and attention to
avoid any type of situation that could endanger the Officials, Clients and assets of the
Entity.

It is also essential to have communication equipment, panic buttons, weapons, etc. in


perfect working order.

Recommendation 12. Office closure to the public


Minutes before closing to the public, security personnel will check the internal and external
area in search of suspicious persons or vehicles.
Once the area is closed to the public, the guard will check all the areas where people
could remain inside the area.

Recommendation 13. Office Closure


Before closing the office, all valuables will be deposited in the custody and monitoring
equipment, and windows and doors will be closed.
Banking specialization 63

At the time of closing, the Security Personnel will provide the necessary coverage to the
Officer Responsible for the closing, the Officer will activate the alarm system and the total
closure of the Branch.

EMERGENCY PROCEDURES
These are situations that are not part of the daily routine, in which people's lives are
normally in danger. Use all means at your disposal to avoid or mitigate the event.
As a first measure, it is important to use the panic or emergency button.

Recommendation 14. Fire-Fire:

 Use fire extinguishers only if the fire is small.


 Communicate to all Public Security Departments or systems (Security Manager,
Monitoring Management Center, National Police, Firefighters, etc.).
 Be careful not to get trapped, exit route always accessible.
 If there is a barrier of dense smoke, crouch down and cover your nose and mouth
with a handkerchief.
 If your clothes catch fire, throw yourself on the ground and roll over.

Recommendation 15. Behavior during robbery

When an individual/s enters the office and threatens us, we must:

 Act naturally and try to remain calm.

 Do not speak, except to answer questions asked by the robber.

 Explain that there is no immediate access to the money due to the blocking of the
delay systems, and try to show the robbers the signs that exist in the premises that
warn of this.

 Obeying the orders of the aggressors, not trying to confront them.

 Pay attention to the robber's features and characteristics that may help the police
and to the getaway vehicle (model, license plate, etc.).

 Activate the alarm only when there is no danger.

 Never chase criminals, watch their escape from the inside.

 Before making any type of complaint, consult the methodology with the Security
Department.

As a healthy security practice, it is recommended to have the following systems and


equipment for a greater guarantee of Security

Recommendation 16. Alarm systems:


The alarm system must be monitored, with own or contracted equipment, with response
service.
Banking specialization 64

Alarm systems must have two communication channels, a ground line and a backup line,
either GPRS or radio.

Recommendation 17. CCTV (closed circuit television) system


As a healthy security practice, it is recommended to have monitoring of the camera
system, whether your own or contracted.

It is recommended to have digital recorders that record in real time; cameras with good
day/night definition.

Recommendation 19. Chest/Safe or Vault Door


They must be resistant to all types of breaking and entering, fireproof and have delayed
locks.

Recommendation 20. Indicator signs


Use signs at the branch entrances, ATMs and teller windows. Indicators that say that
officials do not have immediate access to money, protected by delay, and remote
monitoring.
Recommendation 21. Security for ATMs

a) If possible, supply from inside the Branch


b) Have image recording systems
c) Have a continuous maintenance program for the access doors to said ATMs, and
d) Have devices and procedures that allow the identification of the user and the operation
carried out through ATMs.

Recommendation 22. Physical Measurements


• Safety deposit box with 15 min. of resistance to physical attack
• Reinforcement in hinges, fascia structure
• Minimum empty weight of 750 lbs or its equivalent in kilograms
• Anchoring the safety box to the floor
• Vandal-proof keyboard, Privacy filter screen and vandal-proof
• Electronic lock with threat signal
• Foreign object detection in cash dispenser
• Open door detectors
• Temperature and vibration detectors in the chest
• Landslide detector

Recommendation 23. Electronic Measurements


• Prevention against forced card retention (Anti-lebaness loop)
• Cash door blocking sensors, cash delivery sensors
• Central server/Security center failure alarms

SECURITY MEASURES AGAINST BANK ROBBERIES


ONLINE BANKING - SECURITY MEASURES:
 Memorize your passwords and do not share them with anyone.
Banking specialization 65

 Change your Internet Banking Password periodically


 Check the date of the last entry to the channel
 Whenever you finish your transactions in Internet Banking, close your session using the
“Exit” button located at the top right of your browser window.
 Whenever you carry out transactions over the Internet, do so from personal computers
(home or office). Do not use computers in computer rooms, Internet cafes or other similar
public places to carry out these operations, in order to prevent strangers from having
access to your secret keys.
 Do not open email messages that are suspicious or from unknown sources.
 To visit our website, type directly into the address bar of your browser. Do not enter
through suspicious links or those sent by email.
 Keep your Antivirus updated and Vaccinate your computer periodically.
 will never ask you for personal information via email. If you have any questions, please
contact Telephone Banking immediately in Bogotá: 2417560 or in the rest of the country
018000515872
 Make sure the websites you visit are secure, these are identified by the image of a closed
padlock at the bottom of your browser window.
 Avoid accessing suspicious pop-up windows that appear on your computer screen offering
you discounts, promotions, prizes, they may be spy practices on the web.
 When you access Internet Banking, do not leave your computer unattended.
 Never send confidential information (such as account numbers of any kind, username, ID
number, among other data) via email.

TELEPHONE BANKING - SECURITY MEASURES:


 Telephone Banking advisors will never ask you to reveal your passwords
 Memorize your passwords and do not share them with anyone, do not write them down
anywhere, or carry them with your card.

ATMS - SECURITY MEASURES:


 Memorize your passwords and do not share them with anyone, do not write them down
anywhere, or carry them with your card.
 Do not accept help from strangers, even if they present themselves as bank officials.
 When entering your password, prevent other people from seeing you by covering the
keyboard.
 If the ATM is malfunctioning, cancel the transaction and leave the ATM.
 Never allow pressure from people in line, wait until the cashier tells you that your
transaction has finished.
 Always make sure to finish your transaction by pressing the CANCEL key, before leaving
the ATM.
 Never insert your card if you see that the ATM is out of service
 Do not use an ATM that has foreign materials in the card slots, on the screen, on the
keyboard and/or in the cash dispenser.
 Inside an ATM you will never find posters, signs, notices, etc. where the entity requests
personal information, or information about your cards.
 Make sure the ATM door is properly closed before making any transaction, use the door
latches for greater privacy and security.
 If the ATM screen does not ask you for your PIN, do not enter it.
 Make sure that the devices to enter the ATMs are in good condition, do not use the strip of
your card if you see something strange.
Banking specialization 66

 If the ATM does not give you the money or retains your card, report it immediately to the
Telephone Banking numbers: in Bogotá at 2417560 or in the rest of the country 0 18000
515872
 Avoid ATMs that have messages or signs posted on them indicating that the instructions
on the screen have changed.
 Try to use ATMs during the day and in crowded places.

CREDIT AND DEBIT CARDS - SECURITY MEASURES:


 Memorize your passwords and do not share them with anyone, do not write them down
anywhere, or carry them with your card.
 Keep your card number and contact phone numbers with the Bank in a safe place, so that
you can notify them as soon as possible in case of theft or loss.
 Always block your card in case of theft, loss and/or if it is retained by an ATM.
 Verify that the information on the voucher generated with your card payments matches the
amount paid.
 If you are going to make purchases over the phone using your card, make sure that the
selling company is reputable. Additionally, request information about the delivery
conditions of the requested product or service, dates of charging to your card, conditions
for clarification and return, guarantees and the place where these are carried out.
 When you receive a new card, sign it and frequently check that the card you carry
corresponds to yours.
 Never allow your card to be swiped through devices other than those designated for this
purpose. (ATMs, Dataphones)
 Whenever you use your card, make sure it is swiped in your presence (don't lose sight of
it) and that they only do it once.
 Always check before leaving the store that you have stored your card in the usual place
and that you have not left anything on the counters.

CHECKBOOKS - SECURITY MEASURES:


 Constantly check your checkbook and verify the existence of all the checks that you have
not yet used.
 If you detect that checks are missing from your checkbook, contact Telephone Banking
and report the situation; this will prevent improper payment of checks.
 When you receive your checkbook, verify before activating it that all the checks you
requested are there.
 Never keep blank checks with your signature on them.

OFFICES - SECURITY MEASURES:


 Do not give money to people other than bank tellers.
 For your safety, do not talk on your cell phone inside the Bank's facilities.
 Do not disclose information to third parties about the transactions you are going to carry
out.
 When filling out forms to carry out transactions within the offices, delete the blank spaces

GENERAL RECOMMENDATIONS - SAFETY MEASURES:


 No entity or other organization will request your secret keys for any reason and by any
means (telephone, in person, etc.)
 Never reveal your secret passwords or your account numbers to people who request them
under the pretext of participating in contests, prizes or any type of offer.
 Never give your money or card to strangers under any circumstances.
Banking specialization 67

 Never carry or write down your secret key, memorize it


 Prevent your secret key from being seen by entering it anywhere, when you do so, verify
that your privacy is not being violated.
 For your security, change your password frequently. If you suspect that someone knows
your passwords, change them immediately.
 Do not ask third parties to carry out your operations, do them personally
 Always withdraw or claim the receipt of proof of the transaction
 Keep, for a reasonable period of time, the receipts of transactions and payments made at
ATMs, establishments and offices, they are important for your accounts and to resolve
possible claims.
 Never assign birth dates, document numbers, telephone numbers, address numbers, etc.,
for your secret keys
 Never assign the same password for different products (Savings, Current Account, Credit
Card, etc.) or means (Audio, Internet, ATMs, etc.)

TECHNICAL AREA

TECHNICAL SECURITY

ATM Security

ATM

ATM.

An ATM or redbanc is a vending machine used to withdraw


moneyhttp://es.wikipedia.org/wiki/Dinero using a plastic card with a magnetic strip or chip
(debit card or credit card for example), without the need for bank staff. It is also known as
"ATM" for its initials in English Automated Teller Machine. In Puerto Rico they are called
"ATH" (At All Hours). It was invented by the American electronics company NCR in
1967http://es.wikipedia.org/wiki/1967http://es.wikipedia.org/wiki/NCR.

They usually have a small dot matrix or thermal printer to print transaction receipts and
update savings books.
Banking specialization 68

ATMs usually perform the following operations:

 Cash withdrawal from bank or debit account


 Savings book update.
 Obtaining and changing forgotten online or telephone banking passwords.
 Purchase and collection of tickets.
 Recharge your phone card or transport voucher.
 Recharge wallet card.
 Depositing money into the account using an envelope, normally provided by the teller,
into which the money is placed in bills or a check.
 Recharge prepaid mobile phone.
 Obtaining the list of transport voucher usage.
 Obtaining the movements of an account or debit
 Send money abroad.
 Payment of public services.

Using the ATM means savings for the bank, because it saves on staff who do not have to
serve customers to offer basic services. For this reason, many people find it abusive that
banks charge an annual fee for ATM cards.

Types of ATMs]

ATMs vary depending on the needs of each bank. They are mainly divided into two types:
full and cash.

Full ATMs are those that allow you to withdraw money as well as make deposits (usually
using envelopes). These ATMs are usually located inside banks, either alone or with
another ATM, another full or cash machine, but this is usually the main ATM at the branch.

How an ATM works


Banking specialization 69

Automated teller machines (ATMs) are electronic devices that allow bank customers to
withdraw cash and view their account statements, deposit cash or checks, transfer money
between different bank accounts, use a chip-based card, or even buy time for your cell
phone at any time of day, 365 days a year, without having to go to the bank.

The world's first ATM was produced by NCR and installed in London on June 27, 1967, by
Barclays Bank. The invention is attributed to John Shepherd Barron, but there is a record
of George Simjian filing for patent in New York as early as the 1930s. At first, the process
took a long time and did not require a special code, which was prone to fraud, which is
why current ATMs must authenticate customers using a numeric code called a PIN.
Banking specialization 70

How it works A

card reader captures the credit or debit card and reads the customer information
contained on the magnetic stripe on the back. The data is sent to a central computer.

With the receipt slot you have the option of printing or not the receipt of the operation. The
display informs you of each step of the process: Some ATMs use CRT monitors, others
use an LCD screen. Some have a speaker. It repeats instructions when a key is pressed
and also gives information concerning the bank. The on-screen buttons are what tell the
bank what type of transaction is required.

Electronic Eye. It is the mechanism that gives the cash. It has a built-in sensor that counts
each bill once the desired amount is requested. Another sensor evaluates the thickness of
each banknote: if the banknotes are stuck together or torn, they are retained. This count
and transaction data are recorded in an electronic journal.

Practical points for using ATMs.

1. When possible, use ATMs you are familiar with. Make sure you use well-lit ATMs in
good locations where you feel comfortable.
2. Take a close look at your surroundings before approaching an ATM. Do not use
the ATM if you see any suspicious individuals or if the area is very isolated or
dangerous.
3. Have your card ready in your hand before approaching the ATM.
4. Look for anything unusual or suspicious about the ATM indicating that it may have
been tampered with. Never use an ATM that has foreign materials in the card slots,
on the screen, keypad, and/or cash dispenser.
Banking specialization 71

5. If you suspect that someone has tampered with your ATM, go to another ATM and
inform the bank.

Avoid ATMs that have messages or signs posted on them indicating that the instructions
on the screen have been changed. You will never find posters, signs, notices, etc. from the
bank inside an ATM asking for personal or card information.
Never accept help from anyone who offers to assist you if the ATM malfunctions. If this
happens to you, cancel your transaction before withdrawing by pressing the Cancel key.
You should not let anyone distract you while you are at the ATM.

6. Make sure there is a safe distance between you and other people in line. Never
allow pressure from people in line and make sure they do not see your PIN
(secret code) when you enter it into the system. Wait until the cashier tells you that
your transaction has been completed.
7. Follow the instructions on the display screen, for example, do not enter your PIN
until the cashier tells you to.
8. Always make sure to finish your transaction by pressing the CANCEL key before
leaving the ATM.
9. If you feel that the ATM is not working properly, press the CANCEL key, remove
your card and go to another ATM. Please report this anomaly to your bank.
10. Never reveal your secret key, it is personal and non-transferable.
11. Never carry or write down your secret code, memorize it.
12. For your security, change your PIN frequently or immediately if you suspect that
someone has known it or that the ATM is retaining it.
13. Don't rush through the transaction and put your card and cash away carefully
before leaving the ATM. Always check before leaving the premises that you
have stored your card in the usual place and that you have not left any items on the
counters.
14. Never forget to withdraw or claim the receipt for proof of the transaction.
15. Never insert your card if the ATM is out of service.
16. Never assign dates of birth, document numbers, telephone numbers, addresses,
etc., for your secret code.
17. Check the ATM withdrawal limits authorized by your bank, these are defined by the
type of product (BIN) you have.
18. Check your account balance and statements regularly. By keeping receipts for
transactions and payments made at ATMs, establishments and offices for a
reasonable period of time, you will be able to resolve potential claims with your
financial institution more easily.
19. If you use an indoor ATM, which requires your card to open the door, avoid letting
anyone you don't know enter with you. If possible, never use your card to open
ATM doors.
20. Whenever the occasion warrants it, check that the ATM door is properly closed
before making any transaction; use the door latches that allow you to have privacy
and security when making your transactions.
21. Protect your cards as if they were cash. Keep your cards and/or personal
identification documents in a safe place and never leave them unprotected at
home, work, in your car or in public places.
22. Keep your wallet or purse containing your cards in sight in public places.
23. Prepare a list of your account numbers, cards and phone numbers to report if any
are lost or stolen. Keep the list in a safe place. Check your cards periodically to
make sure none are missing.
Banking specialization 72

24. Please read and make sure you understand the terms and conditions for using the
card issued by your financial institution. Please contact customer service if you do
not understand any of the terms.

Techniques used to carry out ATM fraud.

1. Card jam. An ATM card reader is tampered with to capture the customer's card.
The criminal removes the card once the customer has walked away from the ATM.
2. Card cloning. An electronic card skimming device is used to copy the card's
security information onto its magnetic stripe so that the information can be
reproduced on a counterfeit card.
3. Card exchange. The customer's card is swapped for another card without their
knowledge during the ATM transaction.
4. Look over your shoulder. An individual stands nearby to watch as the customer
types his PIN into the keypad.
5. Expose the PIN number. The customer's PIN is observed by looking over the
shoulder or through binoculars or the PIN is illegally recorded by means of a
hidden camera.
6. Vandalism. The ATM machine is deliberately damaged and/or the card reader
becomes jammed, preventing the customer from inserting the card.
7. Physical attacks. The ATM machine is physically attacked to withdraw cash.
8. Distractions. Criminals use messages and signs attached to ATMs to make the
modifications they have made to the ATM appear less suspicious or to direct
customers to another nearby ATM that they have altered.
9. Robberies and/or assaults. People are confronted and robbed, usually by force.

Scams and tricks on Internet sites. A criminal sets up a fictitious website on the Internet,
which appears authentic to the user. This may come attached to an email with a link to the
fictitious site. The victim is asked for their card number, PIN, and other identifying
information which is used to replicate the card for use at ATMs.

BANK CARDS

What parts make up a debit or credit card?


Banking specialization 73

The front of the card must contain:


-The name of the issuing entity at the top (a financial institution).
-Brand and acceptance logos on the right side (4B, Maestro, Euro 6000).
-The chip (if any).
The Personal Account Number (PAN), or card number.
-The expiration date of the card.
-The name of the holder.
- The back of the card will contain:
o The magnetic stripe: contains the cardholder's data and alphanumeric characters that
make ATMs and terminals act in a certain way.
o The signature panel.
o Special character CVV (security number)
o Signature.
Banking specialization 74

Since January 2011, Spanish financial institutions have had to change their cards
from magnetic stripe technology to chip technology, all in order to achieve:
- Greater security, because by requesting the PIN to be entered in
operations, it eliminates the risk of fraud in case of theft or loss
- Faster, as you do not have to sign receipts or verify the purchase price
- Greater future applications, as the chip will be able to store information to
perform more services with the cards.

SURVEILLANCE AND COUNTER-SURVEILLANCE TECHNIQUES

THE SURVEILLANCE. CONCEPT. ELEMENTS FOR SURVEILLANCE. OBJECT.


PURPOSE. IMPORTANCE. CONDITIONS THAT THE WATCHMAN MUST MEET.
1. SURVEILLANCES
to. CONCEPT
It is a method that consists of keeping people, objects or places under
observation, to obtain information for a specific purpose. Surveillance is a
technique and an art, because to monitor, especially one or more people, without
them realizing it requires skill and a lot of creative imagination; therefore, there
are no fixed rules and those that are going to be explained doctrinally guide the
practical actions of the security guard.
b. ITEMS:
- The watchman is the person who exercises surveillance.
- Surveillance is the act or application of the surveillance technique carried out
by the security guard.
- The target is the person, object or thing that is subject to surveillance.
- The convoy or bell is the accomplice of the subject who tries to expose the
surveillance.
c. OBJECT, PURPOSE AND IMPORTANCE:
Surveillance is an old way of obtaining data, with the aim of knowing as
much as possible the activities and contacts of one or more people under
suspicion. Depending on the purpose of surveillance, which are numerous,
this technique serves to:
- Protect people.
- Obtain evidence or proof of a crime.
- Locate the subject, monitoring hiding places of family, friends or related
accomplices.
- Locate the subject's residence or residences.
- Determine the subject's activity and/or contacts.
- Discover the identity of all those involved in a criminal act.
- Locate booties.
- Obtain evidence necessary to obtain a search warrant.
- Obtain photographs, films.
- Prevent a suspect from fleeing the country.
- Locate witnesses.
- Verify information provided by the victim, complainant, informant or confidant.
- Prevent the commission of a crime.
- Obtain data that serves as a basis for an interrogation.
- Arrest those who are committing it.
d. CONDITIONS THAT THE WATCHMAN MUST MEET:
Banking specialization 75

- The police officer (guard) must have a regular appearance, not outstanding in
any way. Any physical characteristic that stands out from the ordinary, such
as excessive height, short stature, obesity, etc., can attract the subject's
attention. The agent must have the ability to act naturally under all
circumstances, as if he belonged in the place where he is.
- The police officer (guard) must be very alert and must be able to respond
quickly to unexpected events that occur despite all preliminary planning. You
must have a good memory and be a good observer, because many times you
cannot write down all the events, descriptions of contacts, or the time they
occurred.
- Finally, the police officer (guard) must have patience and perseverance.

TYPES OF SURVEILLANCE. FOR THE POSITION. FIXED SURVEILLANCE. MOBILE


SURVEILLANCE. COMBINED SURVEILLANCE. BY THE MEANS EMPLOYED. FOOT
SURVEILLANCE. VEHICLE SURVEILLANCE. BY THE SHAPE. CLOSE
SURVEILLANCE. REMOTE SURVEILLANCE. STAGE-BY-STAGE SURVEILLANCE
GUYS
(1) By Position
Fixed Surveillance.- When observation is carried out from one or
more fixed points, to know what is happening in the area under surveillance.
Mobile Surveillance.- It is the monitoring with displacement of the
observed subject, it is carried out on foot or by vehicle.
Combined Surveillance.- It is the combined use of the two previous
surveillances.
(2) By the Means Used
Foot Surveillance.- Carried out by one or more police officers.
Vehicle Surveillance.- On land, the automobile is the most commonly
used; on air, the helicopter is the most adaptable; on sea, boats and gliders
are the most maneuverable.
(3) By the Form
Close Surveillance.- The subject is kept under constant surveillance and
the fact that surveillance is discovered or not depends on the purpose of the
investigation. If the subject being monitored is a person, monitoring should
not exceed 48 hours.
Remote or Lax Surveillance.- This is classic surveillance, where the
tracking must be as concealed as possible and losing sight of the subject is
not a problem. It is used in important police fields.
Stage-by-Stage Surveillance or Frog Leap.- It consists of monitoring the
subject's activities part by part, until finally finding out all of their movements.
Thus, one moment he will be monitored at home, another moment at his office,
another moment while he is travelling, etc., and then all the information about the
subject will be gathered.

SURVEILLANCE TECHNIQUES. PREPARATORY PHASE. SPECIFIC


RECOMMENDATIONS. IN CASE OF FIXED SURVEILLANCE. IN CASE OF FOOT
SURVEILLANCE. IN CASE OF VEHICLE SURVEILLANCE
SURVEILLANCE TECHNIQUES
1. PREPARATORY PHASE
a. Of General Character
Banking specialization 76

Specify the purpose of surveillance and this comes from studying the details of the
subject-crime interrelationship.
Conduct a preliminary inspection of the areas where surveillance is to be carried out,
taking into account the layout of the streets (possible escape routes), degree of traffic
and/or people congestion, ease of communication and transportation, that is, assess
the terrain in general.
Decide the type or combination of surveillance.
Obtain a photo or as much description of the subject as possible.
Provide yourself with the necessary equipment
Explain to the personnel involved the details of the surveillance, using plans,
sketches or photographs for this purpose, and in this act, you must:
(to) Provide a photograph or description of the subject.
(b) Make known the location of the surveillance posts or areas, mobile
surveillance posts and the communication post; the role of the security service, the
type of appropriate clothing to be worn, the circumstances in which a firearm should
or should not be carried and the way in which technical equipment should be used.
(c) Agree on how communications will be established. It can be by telephone,
radio transceiver (it is risky due to the interference that it can be subject to or also
due to the possibility that it exposes surveillance) or by the simplest means
through sign language, such as with handkerchiefs, hands, newspapers or others.
(d) Make sure that staff have a notebook to record surveillance updates, have a
watch, and have a clear understanding of instructions and responsibilities.
(and) Advise staff to be alert, as the person under surveillance may conduct
counter-surveillance, to be prepared to give a reasonable explanation for their
presence in the area if intercepted, and to be able to make an arrest or seizure of
property at any time during surveillance.
(F) Provide instructions regarding whether to continue or discontinue
surveillance upon discovery
b. Of Specific Character
(to) Fixed surveillance
- Prepare a place as a surveillance post, it can be a room, a warehouse, a house
under construction, etc. If there is no closed space, use a cover, such as a street
vendor's stand.
- Conduct direct research on the owner of the site or location to find out their
reputation and whether they can be trusted.
- Occupy the lookout post, preferably at night and discreetly.
- Draw up an emergency plan for cases where surveillance must be lifted without
leaving traces
- Use binoculars and/or preferably a camera "A photograph is worth a thousand
words"
- Check the operation of equipment, means of communication and transport
(b) Surveillance on foot
- Using teams of (3) men is best when personnel are available. At least one of them
must be an experienced guard.
- Dress conservatively and appropriately for the surveillance area; no flashy or out-
of-the-ordinary clothing should be worn.
- Change your appearance with simple variations in suit, tie, wearing or not wearing
glasses, etc.
- Try as much as possible to make the physical appearance of the guards similar to
the majority of the locals in the surveillance area; that is, to blend in.
(c) Vehicle Surveillance
Banking specialization 77

- Using public vehicles that do not have the official seal, that
are not conspicuous or easy to identify.
- Carry extra gasoline to supply the vehicle in case of
emergency.
- Assign an experienced driver who is knowledgeable about
traffic rules, and the watchmen must also have the same conditions.
- Equip your vehicle for emergencies such as fires, accidents
or severe weather.
- Designate at least two officers, one at the wheel and one as
a guard, who can get out of the vehicle if it is necessary to continue surveillance on
foot.
- Have at least two vehicles available, so you can change
them during surveillance, and if you have one, use your creativity to change its
appearance. For example, in night surveillance, a special multi-contact switch can be
used to dim or eliminate any of the headlights, giving the appearance of being
several cars. These precautions are necessary to prevent surveillance from being
discovered. Have a shortwave radio transceiver in each vehicle to communicate
surveillance updates.
Preparatory Phase.- General and specific recommendations. In case of fixed
surveillance. In case of surveillance on foot. In case of vehicle surveillance.
Investigators who have conducted surveillance can confirm that it takes great
perseverance to wait for a suspect to appear and then follow him every day as he
completes the same routine.
Before starting a surveillance, all investigators participating in the operation will be
responsible for the following activities: A study of all files related to the subjects, their
activities and crimes, their work and residence environment, vehicles involved in the
suspects.
Investigators should focus on the names and aliases of all suspects or those involved in
the case. Investigators must know the place where they will be conducting surveillance,
concentrating on aspects such as: type of people, manner of dress and speech.
The equipment that surveillance agents will use is at the discretion of each agent; as part
of their preparations to carry out surveillance, agents must study their own appearance;
these preparations and equipment must include cameras, binoculars, telescopes and
recorders, among others, when these are applicable.
Surveillance on foot by an agent. This type of surveillance is one of the most difficult and
should be avoided as much as possible due to the limitations faced by the agent carrying
out the surveillance. There are situations where an officer is forced to initiate surveillance
suddenly, but the distance between the officer and the subject is almost entirely dictated
by the number of people in the location.
Surveillance on foot by two officers. With this type, the chances of success are greatly
increased because the second agent has greater flexibility. When you have two agents,
the position of the agent immediately behind the subject can be varied frequently, allowing
the agent to be positioned relatively close to the subject.
Surveillance on foot by three agents or ABC method. This type is considered to be the
best and most common for foot surveillance. This method should be used whenever
possible because with three officers there is much less risk of losing sight of the subject
and there is greater security against the possibility of being discovered. This is because
agents have the ability to change position, allowing whoever is discovered to withdraw
without affecting surveillance.
Banking specialization 78

In the use of vehicles in surveillance


Vehicles to be used for surveillance must correspond to this function in appearance and
speed. Vehicles are used for surveillance of locations, but their primary use is to monitor
other vehicles. Foot surveillance can only accompany the subject to a certain point and if
the subject moves from there, the agent follows him in a vehicle.
It is important to note that, as effective as a vehicle is in surveillance, in the long run some
form of surveillance on foot is required. When this is the case, it helps a lot to have an
observer.
A factor that greatly contributes to successful surveillance is that the driver of the vehicle
can drive well in any circumstance or type of traffic.
Although officers always follow a suspect closer at night, surveillance vehicles should
preferably have separate switches for headlights, taillights and brake lights as this is very
useful. When used properly, this equipment allows the vehicle to change its appearance,
either by turning off its lights or changing their intensity.

PROCEDURE FOR EXECUTING SURVEILLANCE. FIXED SURVEILLANCE. FOOT


SURVEILLANCE. THREE-WAY SURVEILLANCE. SURVEILLANCE IN TWO. ONE BY
ONE SURVEILLANCE.
EXECUTION PHASE
a. FIXED SURVEILLANCE
- Write down in a notebook all the details observed in relation to the purpose of the
surveillance, in order to prepare the Report giving an account of the new
developments.
- Avoid intimacies with neighbors.
- Prohibit entry to the guardhouse to unauthorized persons.
- Talk only as much as necessary so as not to distract surveillance or call your
family.
- Be careful that observations made from the window are not noticed by those
outside; to do this, the guards must observe behind the curtains or blinds.
- Avoid being between the light and the window at night so as not to outline your
silhouette, making yourself noticeable to those outside.
- Avoid leaving the post unattended; there must always be a guard on duty and if it
is necessary to temporarily leave the guard post, all equipment must be moved.
- Bundle leftover papers and materials to burn outside the booth; never burn them
inside.
- Avoid noises and movements that arouse suspicion. You have to act naturally.
- Before the operation, carefully remove anything that serves as evidence of the
surveillance carried out.
b. SURVEILLANCE ON FOOT
Three-a-side surveillance
Known as "ABC". It consists of guard "A" standing behind the subject, "B" behind "A",
and "C" walking in line with the subject, that is, on the opposite sidewalk more or less
at his height.
This is currently the best foot surveillance technique because:
- They work in rotation, so the same guard is not on the subject for long, making it
more difficult to detect the surveillance.
- "B" has the mission of discovering the convoys or bells.
- At corners, guard "C" gives the signal to "A" and "B" when the subject has turned
a corner and even when he has immediately entered a building.
Banking specialization 79

- When the subject suddenly takes a taxi, each guard must try to follow him on
their own.
- The team develops its own code of signals to communicate, such as touching
their ears, holding their lapels, looking at their watches, etc.
Surveillance in pairs
"A" is placed behind the subject and "B" behind of "A", which allows some
mobility, as:
- Switch positions alternately between "A" and "B" so as not to arouse suspicion in
the subject.
- Depending on the subject's attitude, "B" may place himself on the opposite
sidewalk and at his height to notify "A" of the subject's movement when turning
corners and, if they deem it necessary, change positions; that is, "B" behind the
subject, "A" after "B" or in line with the subject.
- If the subject throws a paper or stops suddenly on purpose to see if he is being
watched, "A" walks past and "B" takes charge of picking up the paper or
continuing to follow him.
- If the subject makes contact, surveillance is split, with one guard following each
subject.
- If the subject enters a place to make a phone call, "B" must enter and pretend to
be making a call in order to listen to the subject.
- If the subject enters a restaurant "B" he must enter cautiously and pay the bill
before the person under surveillance, to avoid surprises.
- When the subject enters the mail, "B" must follow him and pretend to write a
telegram and try to obtain the content of the message from the person under
surveillance or, otherwise, obtain the blank sheet of paper next to the one used
by the subject; there may be traces of the writing to reproduce them in the
laboratory.
- When the subject approaches a ticket office "B" he must try to see what it says,
and see what ticket he buys.
Surveillance of one and valid for the previous cases
- Avoid losing sight of the subject in crowded places, you should keep it about 3 to
5 meters away
- The guard should not stare at the subject, as this could attract his or her
attention. If this happens, you should not believe that you have been discovered,
but should react by behaving naturally, for example, buying a newspaper, looking
at shop windows, asking the time, etc.
- The security guard during his work should not be static, he should always be
pretending to do something other than surveillance.
- The guard must be ready at all times to anticipate the subject's movements.
- The guard has to adapt to the pace of the guard's walk.
- If the subject commits a misdemeanor or crime and what is being investigated is
more important, he or she should not intervene, but the incident must be
recorded.
- When the guard has lost sight of the subject, he must inform his immediate
superior and stop inventing movements that the subject has not made. They
would deviate or fail the course of the investigation.
- If the subject enters a public vehicle, the guard must enter through the door and
sit three seats back, without losing sight of him.
- The security guard should not follow the subject if he gets off a vehicle
immediately after boarding, but should instead get off at the next stop and wait to
Banking specialization 80

board the same public transportation line; he will probably locate the subject
again.
- When the subject enters an elevator and chooses the floor number, the guard
must remain silent and follow the subject as he exits. If the person under
surveillance does not indicate or mark the floor, the guard must request the floor
and follow the subject when he leaves.
- Protect yourself during nighttime surveillance by avoiding standing on corners
with lights or in open doorways. Be careful when crossing dark alleys, turning
corners, and any type of stalking.
- Identify the subject's way of walking, arm movement and other peculiarities to
facilitate tracking, especially in congested places.
- Security guards should not rush to end a surveillance quickly, as this could distort
the nature of the operation; rather, they should consider that it may last several
months.
- Finally, in one-man surveillance, he will follow the subject, secretly taking
notes of everything he has observed, such as the people he speaks to, the
places he visits, the time he spends in each place, the routes he follows, etc.

PROCEDURES FOR CAR SURVEILLANCE. IN THE CITY. IN THE COUNTRYSIDE


SURVEILLANCE WITH CAR
- The distance to be kept must be:
- In the city, the surveillance vehicle must be on the same block as the one being
watched.
- In the field, it is preferable to leave some intermediate cars
- If the subject's convoy or bell is identified, one must position oneself behind the
convoy.
- Once the route to be followed by the subject is known, the security guard can go ahead
and follow him through the rearview mirror.
- Do not operate the radio at excessive volume.
- Carry out guard changes without arguments or much conversation, that is, without
drawing attention to yourself.
- When you have to park the vehicle, do so normally.
- Make the following changes when monitoring vehicles, parking locations, and positions
within the vehicle.
- The driver of the vehicle must drive at a normal speed, avoiding unnecessary
maneuvers in order to go unnoticed.
- When the subject gets out of the vehicle, the guard does the same and follows him on
foot.
- If two cars are used in surveillance, "A" remains in front and "B" behind the subject's
vehicle. When turning a corner, "B" informs "A" about the subject's maneuver, to return
to the surveillance formation and in case, "B" places himself in front and "A" behind the
vehicle being monitored.

COUNTER SURVEILLANCE. CONCEPT. COUNTER SURVEILLANCE TACTICS. IN


FIXED SURVEILLANCE. ON FOOT SURVEILLANCE. IN CAR SURVEILLANCE. SOME
TECHNIQUES TO RESTORE LOST SURVEILLANCE
1. CONCEPT
Banking specialization 81

It is when the subject and/or convoy or campaign, adopts a series of actions in order to
expose surveillance. It must be taken into account that professional criminals always
act aware that they are being watched.
When subjects realize that they are being watched, they react in different ways
against the guard; thus we have:
to. The most serious thing is attacking their physical integrity.
b. Threaten you, harass you or report you for police harassment.
c. They usually act by preferring a known guard over an unknown one.
2. COUNTER SURVEILLANCE TACTICS
to. Under fixed surveillance.
The subject openly observes the surroundings and pretends to have noticed the
surveillance, in order to provoke the guards to expose themselves.
He appears to be waiting for someone at the entrance door in order to check if he
is being observed.
While the subject acts naturally, the convoy or bell is responsible for discovering
the surveillance:
(1) Posting counter-observation personnel at strategic points in the area under
surveillance.
(1) Making inquiries among the neighborhood about strange people they have
seen recently in the area.
b. On foot surveillance
(1) The subject suddenly stands up and appears to tie his shoes.
(2) The subject, turning the corner, suddenly stops.
(3) He throws down a piece of paper and turns to see if anyone picks it up.
(4) He walks around looking at the display cases and observes the reflection of the
moons.
(5) go back one or more times to see who does the same.
(6) Enter a dead end street.
(7) He walks through deserted streets and looks back.
(8) Get on and off a public vehicle.
(9) Uses various forms of transport, switching from one to another.
(10) The subject may suddenly intercept the guard to ask him about the reason for his
presence at that place.
c. In car surveillance
(1) The subject violates traffic regulations, that is, he runs a red light or drives against
traffic to see who is following him.
(2) It moves too fast or too slowly, or both.
(3) It stops from one moment to the next.
(4) Makes a sudden U-turn.
(5) Turn around a block.
(6) It disappears after a climb and then waits for the one following it.
3. SUBJECT TACTICS TO EVADE SURVEILLANCE
to. In fixed surveillance
(1) The subject enters or leaves the area under surveillance in disguise.
(2) He enters or leaves confused among conveniently instructed people.
(3) Enters or exits hidden inside a box or something similar.
(4) Using third parties, he causes an incident, such as a traffic accident, a street
fight, etc., to distract attention and enter or leave the surveillance area.
b. On foot surveillance
(1) Enter a building or commercial premises with several exits.
Banking specialization 82

(2)
Get on a public vehicle and get off at the moment it leaves or get on at the
last moment of the departure.
(3) Enter a building immediately after turning a corner.
(4) He immediately enters and exits a movie theater or hides in the bathroom.
(5) Take the only taxi available in the area.
(6) It moves around in various means of transport.
(7) Look for busy streets to disappear into the crowd.
(8) Use the convoy or bell to intercept and distract the guard under any pretext.
c. In car surveillance
(1) It disappears at high speed.
(2) Look for places with a lot of traffic congestion and place several vehicles in
front of the guard at a time.
(3) He tries to momentarily get out of the guard's sight to change vehicles.
(4) Violates traffic rules such as going against traffic, running red lights, making
U-turns or turning left or right on two-way streets when it is prohibited.
(5) Use the convoy or bell to intercept or distract the guard under any pretext.
4. SOME TECHNIQUES TO RESTORE LOST SURVEILLANCE
a. Simultaneously monitor the places frequented by the subject.
b. Locate the subject based on an intelligent assumption.
c. Make a phone call to the subject's home and also ask about him, in the places
where you think he may be.
d. Allow some time to pass if the investigation is not urgent, so that the subject
becomes confident and returns to his or her usual activity.

TERRORISM
http://es.wikipedia.org/wiki/Terrorismo - cite_note-1
Terrorism is the systematic use of terror1 to coerce societies
or governments, used by a wide range of political organizations in the promotion of their
objectives, both by nationalist and non-nationalist political parties, right and left, as well as
by corporations, religious groups, racists, colonialists, independentists, revolutionaries,
conservatives and governments in power.2

Terrorism, as a tactic, is a form of violence that is distinguished from state terrorism by the
fact that in the latter case its perpetrators belong to government entities. It is also
distinguished from acts of war and war crimes in that it occurs in the absence of
war.http://es.wikipedia.org/wiki/Terrorismo - cite_note-3
3 The presence of non-state actors in armed conflicts
has created controversy regarding the application of the
http://es.wikipedia.org/wiki/Leyeslaws ofhttp://es.wikipedia.org/wiki/Guerra war.

The word "terrorism" has strong political connotations and is highly charged with emotions,
which makes it difficult to agree on a precise definition.

It is common for governments to use the word to accuse their


http://es.wikipedia.org/wiki/Terrorismo - cite_note-penelopes-5http://es.wikipedia.org/wiki/Terrorismo - cite_note-4
opponents. 4 5 It is also
Banking specialization 83

common for organizations and individuals who practice it to reject the term as unfair or
imprecise.http://es.wikipedia.org/wiki/Terrorismo - cite_note-6
6 Both tend to confuse the concept with the
legitimacy or illegitimacy of their own motives or those of their antagonist. At the academic
level, the decision is made to focus exclusively on the nature of the incidents without
speculating on the motives or judging the perpetrators.
State terrorism consists of the use of illegitimate methods by governments aimed at
inducing fear or terror in the http://es.wikipedia.org/wiki/Poblaci%C3%B3n_civilcivilian
population in order to achieve their objectives or encourage behaviour that would not occur
on its own. Such actions are justified on grounds of State.
State terrorism has been considered to take one or more of the following forms:

1. Use of coercion or unlawful persecution, kidnapping, forced disappearances,


torture, http://es.wikipedia.org/wiki/Asesinatomurder or extrajudicial execution.
2. Creation, usually in secret, of conventional clandestine terrorist organizations - real
or simulated -, support for them or deliberate negligence in their pursuit. These
organisations present themselves as extremists of the opposition forces, which
justifies their promoters in the eyes of public opinion.
3. Instruction or induction of one's own troops to act in such a way as to cause terror
in the enemy's civilian population, or refusal to introduce measures that limit or
prosecute such actions. The School of the Americas (a US Army school) has been
criticized because it trained numerous Latin American military personnel, including
later members or organizers of death squads.
4. Open conduct of military operations with the same objective, which are usually
called "aimed at breaking the enemy's morale", normally through the use of
strategic weapons or other weapons whose characteristics produce a serious state
of insecurity and fear in the civilian population. Today, these operations are often
disguised as collateral damage, attacks against legitimate military targets, the
significance of which, however, turns out to be insignificant compared to the harm
or fear suffered by the population.
5. Creation of an emigration policy that prevents the population itself from leaving the
country, under penalty of imprisonment or death, or the promotion of the exile of
people who are dissatisfied with and critical of the government.

EMERGENCY MANAGEMENT

Environmental and social conditions in the workplace make it necessary and convenient to
be well prepared to successfully deal with possible emergency situations that may arise in
companies.
Emergency prevention and response plans are designed to minimize the consequences
and severity of potential catastrophic events that may occur for various reasons.

The effectiveness of an emergency plan does not depend exclusively on the level of
technical and professional training of those who execute it, but on teamwork and the
Banking specialization 84

willingness of each employee to put the established standards into practice. You, as a
security leader, have a very important role to play before, during and after each
emergency, therefore, it is very important that you know the basic concepts and
procedures outlined below:

1. HOW TO ACT IN CASE OF MASS GATHERINGS?

• Reassure those around


you• Leave the area calmly and orderly. Leaving in a hurry can cause harm to you and
others
• Avoid shouting or encouraging violence
• If possible, help control outbreaks of violence
• Control panic2

. HOW TO ACT IN CASE OF RIOTS?

• Stay away from crowds


• Avoid getting close to demonstrations. You may be attacked
• Stay away from doors and windows that face the street
• Increase surveillance at critical
points• Security guards must close gates and protective doors and maintain strict control
over people entering
• In the event of evacuation, act according to the established procedure3

. HOW TO ACT IN THE EVENT OF A FLOOD?

• Stay calm and collected


• Turn off the power to avoid short circuits in the sockets
• Prevent water from reaching the most critical areas; use barriers with bags, sawdust and
sand, among others
• Place electronic and mechanical equipment in high
areas• Help with the evacuation of important material (files, raw materials, finished
products, etc.)•
If the area is very flooded, proceed to evacuate it4

. HOW TO ACT IN CASE OF FIRE?

• Immediately call the internal


emergency telephone number. • If you cannot use a fire extinguisher, evacuate the area.
Do not try to put out the fire if you do not know how to use the fire extinguisher
correctly. • Try to remove any objects that could fuel the fire
. • Control your panic, walk quickly and avoid causing confusion. Use the stairs or ladders,
never the elevator
• Do not stay in bathrooms, cafeterias or rest
areas• If the place is full of smoke, get out crouching, cover your nose and mouth with a
wet
handkerchief• If your clothes catch fire, do not run, throw yourself on the ground and roll
over. If you see someone with their clothes on fire, wrap them in a blanket, quilt or thick
cloth over their body
• Avoid jumping from upper floors, wait for help
Banking specialization 85

• If you find a hot door in your evacuation route, do not open it, look for another exit5

. HOW TO ACT IN CASE OF A THREAT CALL?

• Try to prolong it as long as possible


• If you have a recording mechanism, activate it immediately
• If you can establish intercommunication with the alarm room or the prevention and risk
area, do so
• Try to obtain information: who is calling?, where are they calling from?, when will it
happen?, where will it happen?, why are they doing it?
• Try to capture significant details: voice, background noise, accents, idioms, interference,
repetitive phrases and names
• Avoid hanging up until the caller has done
so• Provide the information only to the emergency group or authorities6

. HOW TO ACT IN CASE OF ROBBERY - TERRORISM?

• Stay calm
• Observe the robber's most prominent features such as height, age, approximate weight,
hair color, eyes, scars and types of weapons
• Do not touch anything in the robbery area to avoid hindering the collection of evidence
• Obey the robber's instructions slowly and calmly
• Do not confront the robber, especially if he is armed
7. HOW TO ACT IN CASE OF SEISMIC MOVEMENT?
• If you are on public roads, go to green areas or parks where there is no danger from
electrical cables or collapsing
structures• If you are in a car, stop immediately and remain inside or underneath it if there
are no other moving
cars• In churches, stadiums, theatres and cinemas, do not rush to look for the exit, many
other people will want to do the same, hindering evacuation
• If you are near rivers or ravines, move away from the banks, seek refuge in a high place
with a slight slope
• Turn off equipment, machinery and systems before leaving
• Stay calm and avoid running
• Stay away from windows, lamps, air ducts, shelves and bookcases
• Take cover under desks or door frames8

. WHAT TO DO IN CASE OF EVACUATION?

• When you hear the alarm, disconnect all electrical and mechanical
devices. • Stop all activity
. • Leave immediately, avoid crowds
. • Follow the main route marked on the evacuation plan, do so without running but as
quickly as possible
. • Always use the stairs
. • Go to the meeting
place. • Do not shout, make unnecessary
noise or comments. • Pay attention to and strictly follow the orders of the evacuation
coordinators. • If a colleague is missing, notify the evacuation
coordinator. • Do not return under any circumstances once the evacuation has begun.
Banking specialization 86

INFORMATION SECURITY

SUMMARY
A brief description of information security is provided, exploring problems in systems, both
at the software level and at the network level. An introduction to systems auditing is also
provided, indicating its typical processes and presenting some information security
standards at the end.

1. INFORMATION SECURITY
Many of today's companies, as well as many of the people involved in the digital world,
have sought ways to develop information systems, focusing on software and hardware that
enable communications from various parts of the world.
The emergence and evolution of information systems is such that on average 97 out of
100 families have communications via the Internet, and it is not only the World Wide Web
that allows us to see these great changes, but also the technology that is involved such as
televisions, wireless communication systems, CPUs, laptops, among others.
It is therefore important to highlight the importance that these information systems give to
society and therefore the importance that is given to them within governmental, political,
business or educational environments; this is how to ensure that information flows from
one place to another without problems, there is security and data custody, and to explain
this we will talk about information security and systems auditing.
According to [1], security can be understood as a state of any system (computer or not)
that indicates that the system is free of danger, damage or risk. Danger or damage is
understood as anything that may affect its direct operation or the results obtained from it.
For most experts, the concept of computer security is utopian because there is no 100%
secure system. For a system to be defined as secure it must have these four
characteristics:
Integrity: The information can only be modified by someone who is authorized, that is,
no modifications are made by unauthorized persons to the data, information or
processes, no unauthorized modifications are made by authorized personnel to the
data, information or processes and the data or information is consistent both
internally and externally.
Confidentiality: The information must only be readable by authorized persons, this
implies seeking to prevent unauthorized access to the information, whether
intentional or unintentional.
Availability: Data, information, or resources must be available to the appropriate
personnel when needed.
 Irrefutability: (Non-Rejection or Non-Repudiation) That authorship cannot be
denied.
Depending on the threat sources, security can be divided into logical security and physical
security.
It is also important to take into account certain terms that clarify what can be taken into
account when talking about computer security, such as:
Asset: resource of the information system or related to it, necessary for the
organization to function correctly and achieve the proposed objectives.
 Threat: is an event that can trigger an incident in the organization, causing material
damage or immaterial losses to its assets.
 Impact: measuring the consequences when a threat materializes.
 Risk: The possibility that a specific impact will occur on an asset, domain, or entire
organization.
 Vulnerability: possibility of a threat materializing on an asset.
Banking specialization 87

 Attack: event, successful or not, that threatens the proper functioning of the
system.
 Disaster or Contingency: interruption of the ability to access and process
information through computers necessary for the normal operation of a business.
Don't forget that risk and vulnerability are different concepts, because vulnerability is linked
to a threat and risk to an impact.
Taking into account the above, it can be noted that among the most important assets for
an organization is information and therefore its custody, this is how information security is
the set of methodologies, practices and procedures that seek to protect information as a
valuable asset, in order to minimize the continuous threats and risks to which it is exposed,
in order to ensure business continuity, minimize damage to the organization and maximize
the return on investments and business opportunities. And in the case of each individual to
protect identity and privacy [2].
The difference that information security can make for both organizations and individuals is
clear. This means that organizations seek to protect the organization's resources such as
information, communications, hardware and software that belong to it. To achieve this,
appropriate controls are selected and established. Information Security helps the
organization's mission by protecting its physical and financial resources, reputation, legal
position, employees and other tangible and intangible assets, the other point of view exists
for individuals whose purpose is to protect their privacy and identity by preventing their
information from falling into the wrong hands and being used inappropriately.
Please note that many companies use powerful antivirus software to prevent access to
your information and any damage that may be caused to it. This allows the user to detect
and eradicate viruses. The user should only consider which one is the most appropriate to
use and which one meets their needs.
So in conclusion, security describes the policies, procedures and technical measures that
are employed to prevent unauthorized access, alteration, theft and physical damage to
information systems.
1.1. Problems in the systems
Please note that many problems in information systems are caused by errors within the
systems themselves, which allow access in violation of established rules. This means, for
example, programming errors, because as the system is very large, errors are sometimes
not fully corrected and may create instability in the system in the future. According to [3]
studies show that approximately 60% of errors are detected during testing and are the
result of omitted, ambiguous, erroneous or non-perceptible specifications in the design
documentation.
Another reason why information systems can be unstable is maintenance, since it is the
most expensive phase of any project, and because almost half of the time is spent making
adjustments and maintaining the systems.
Therefore, the quality certification process is essential for the development process of an
information system, since it can prevent errors during data capture.
And this is where we start talking about controls for the custody of information; it is
important to detail that a control according to Laudon in his book [3] are all the methods,
policies and procedures that ensure the protection of the organization's assets, the
accuracy and reliability of its records and the adherence of its operations to the standards
defined by the administration. Thus, the control of an information system must be an
integral part of its design. Users and system builders must pay close attention to controls
throughout the life of the system.
But not only control is important, it should also be noted that there are two types of
controls, general and application controls. The former govern the design, security and use
of computer programs and the security of data files throughout the information technology
Banking specialization 88

infrastructure; application controls are more specific to each computer application. Please
note that general controls include software controls, physical hardware controls, computing
operations controls, data security controls, controls over the system implementation
process, and administrative controls.
With this in mind, there are currently managed service providers (MSPs) that provide
networks, systems, storage and security administration for their subscriber clients.
This is why, in addition to the security that must be taken into account for software
applications, the security of hardware components must also be taken into account. For
this purpose, intrusion detection systems were created, which are tools to monitor the
most vulnerable points in a network, to detect and stop unauthorized intruders.
Continuing with the concepts, it can also be taken into account that when information is
handled by several people it is important to keep it intact, so in search of this concept,
encryption was created, which has been working since the Arab era and has been applied
to current computing systems, this consists of coding for messages to prevent
unauthorized reading or access.
In this sense, we must also talk about another type of security implemented for
organizations and in terms of their senior management or specific areas of the company,
that is, the application of digital certificates that can be used to establish the identity of
people or electronic assets, and they also protect online transactions by providing secure
and encrypted communication. Currently, these information security methods are used by
financial institutions that transmit important information to other controlling entities, as well
as by companies where the information is valuable and can only be known by certain
people.
1.2. System assurance techniques
As previously mentioned, there are currently several methods used to ensure security
within a system, such as:
 Encrypt information: Using cryptography, passwords are difficult to guess from
the individual's personal data.
 Network monitoring.
 Repellent or protective technologies: Manage firewalls, antispyware or intrusion
detection systems, antivirus. Keys for software protection, etc. Maintain information
systems with the updates that have the greatest impact on security.
1.3. Software Considerations
A person or company should have only the necessary software installed on the machine
as this helps reduce risks. Likewise, having the software under control ensures the quality
of its origin (pirated software or software without guarantees increases the risks).
In any case, a software inventory provides a sound method of ensuring reinstallation in the
event of a disaster. Software with quick installation methods also facilitates reinstallation in
case of contingency.
Please note that there are currently a large number of pages on the Internet that warn
about security and show risky viruses, existing antivirus programs and procedures for
safeguarding important information.
1.4. Network Considerations
Entry points into the network are generally email, web pages and file entries from disks or
from other computers, such as laptops.
Keeping the number of network resources in read-only mode as high as possible prevents
infected computers from spreading viruses. In the same way, user permissions can be
reduced to a minimum.
Data can be centralized so that batch mode virus scanners can work during machine
downtime.
Banking specialization 89

Controlling and monitoring Internet access can detect, in recovery phases, how the virus
was introduced.
At this point it is important to emphasize that every person and/or company is vulnerable in
their security because, as was mentioned from the beginning, there is still no 100% secure
and reliable system.

HANDLING OF FIREARMS

38L CAL REVOLVER


The revolver, its operation and its parts

The first examples of this type of weapon date back to the 16th century. Its operation is based
on a system of repeating rotating chambers, in this way multi-barrel weapons were
manufactured whose system was a set of barrels around an axis. Their main objective was to
manufacture firearms that could fire several shots without having to be loaded each time they
were fired.
After their success as short defensive weapons, they went from a set of barrels around an axis,
known as the "Pepperbox" or also "wasp's nest" system, to being a single piece with several
holes. But the true success of the revolver began in 1835 when Samuel Colt in North America
and Adams in England patented their revolver models.

Both revolvers are based on a similar operation, the chambers are loaded from the front and
use the piston system to initiate the shot. Samuel Colt, the undisputed leader for several years,
had a competitor, the Dean Adams revolver, patented in 1851. In 1855, Beaumont's selective
double action system was patented in Great Britain and applied to the Adams system.
Almost in the middle of the century, with the emergence of rimfire metal cartridges, the revolver
would adopt them and become a breech-loading weapon with an essential change in the
feeding system. It was in 1857 when the Smith & Wesson company introduced the first
revolver designed to fire . 22 short. Smith & Wesson bought the patent from Rollin White,
which prevented any other American company from selling a large-caliber pistol that used a
metal cartridge until 1873, when the patent expired.
Banking specialization 90

Internal parts of the 38l cal revolver

External parts of the 38l cal revolver

PARTS, MECHANISMS AND OPERATING MECHANICS

The revolver is a repeating, multi-chamber weapon, and can be double action or single action.
There are different mechanisms used in oscillating revolvers, whose differences with the others
we will see later.

The parts and mechanisms that make up the revolver are:


Banking specialization 91

1.- The armor or frame It


is the fundamental part that brings together the different mechanisms of the weapon and also
serves to wield it.

Inside it we can distinguish the following parts:

- Grip - Trigger
guard
- Flat mechanism
box - Rectangular cylinder window.

2.- Cylinder Set of chambers around an axis where the cartridges

are housed. 3.- The barrel It is the part of the weapon through which the projectile runs at the
moment of firing. It faces the upper chamber of the drum or cylinder. The barrel's bore has a
series of grooves, which give the projectile a direction of rotation as it moves through it, and
which begin a few millimetres from the rear end of the barrel. These millimetres of barrel are
slightly widened with respect to the rest of the barrel, so that the projectile, when it comes off
the case and hits the grooves in the barrel, does not do so abruptly, as this kind of funnel
facilitates the entry of the bullet.

3. Opening and closing mechanism It allows the shooter to access the different chambers of
the cylinder to insert the cartridges in them and close it firmly to prevent it from opening
accidentally when fired.

It is composed of:
Banking specialization 92

- The bolt -
The bolt

latch -. Classification of revolvers according to their opening and closing system.

According to their opening and closing system related to the feeding system, we can classify
revolvers as follows:

- Side-action.
- Tilting.
- Oscillating.

4. Feeding

mechanism It consists of the following parts:

- Cylinder
- Cylinder stop
- Cylinder
cam or connecting rod - Cylinder toothed crown
Banking specialization 93

5. Firing and percussion mechanismIt

consists of the following parts:

- Trigger, trigger rod, slide and recoil spring.


- The firing hammer with its lift, pressure regulating ring and firing pin rod with its main spring,
- The firing pin and its return

spring For the firing and percussion actions to occur, the firing hammer and the trigger must
come into contact, varying depending on whether the shot is fired in single action or double
action.

- Single-action operation: When the hammer spur is pulled, the hammer moves back,
overcoming the force of the mainspring and dragging the trigger and, consequently, the tail
along its path. Once its travel has finished, the firing hammer is held in its rearmost position
(cocking) by a trigger edge, called the firing tooth, located in the contact area between the
hammer and the firing pin. When the trigger is pressed, the trigger moves, breaking the contact
between the two pieces, releasing the hammer, which is driven forward with force by the
compressed mainspring.

- - Double action operation: When the hammer is at rest


(forward position) and the trigger is pressed, the upper part of the trigger moves and pushes a
piece, which is attached to the hammer, called the lift, which, as its name indicates, moves the
hammer backwards a few millimetres, after which a notch in the trigger engages directly with a
Banking specialization 94

projection on the hammer, pushing it the rest of the way, until, at a certain point, the hammer
and trigger separate abruptly, with the hammer falling, driven by the force of the mainspring.
The lifting piece is therefore only useful to put the hammer and the trigger in direct contact,
since when the hammer is in its most forward position both pieces (hammer and trigger) are
separated. Regarding the needle, it can be inside a hole in the closing plane as in the pistol, or
be attached to the hammer by a pin.

6. Extraction

mechanism It consists of:

In side-action revolvers: Ram


- In the remaining cases, by the ejector with: Star:
- Piece where the cartridge cases fit. Stem.
- Rod on which we press manually. Dock.

The star returns to its original position once we stop pressing on the stem to extract the pods. It
is located inside the cylinder.

7. Safety Systems Today's conventional revolvers lack manual safeties, that is, all the safeties
they have are automatic. A manual safety is understood to be one that acts according to the
shooter's will, and an automatic safety is understood to be the opposite. The risk with a
revolver is that when it is fully loaded it always has a cartridge facing the firing pin, so a knock
or fall could cause percussion. To avoid this risk, revolvers use various safety devices, the best
known of which are:

a. Interposition of masses safety It consists of interposing one or more metal masses


between the hammer and the anvil of the firing pin. While firing, the safety is disconnected, as
it is attached to the slide, and when the trigger is released to the rest position, the safety
moves back in front of the hammer.

b. Slide safety The upper part of the slide has a small projection or plateau that coincides with
and is superimposed by the lower projection of the hammer. When the weapon is at rest, they
are in contact, preventing the hammer from advancing and striking the firing pin anvil.

c. Eccentric safety Safety device used in some revolvers, which due to the eccentricity of the
Banking specialization 95

hammer's axis of rotation prevents the hammer from facing the firing pin while the hammer is
at rest, making accidental firing impossible.

d. Incomplete cylinder locking failsafe


This operates when the cylinder is not fully housed in its position, meaning that the opening
bolt does not move back under pressure from the cylinder axis. The hammer cannot be
mounted in this way, as this is prevented by a protrusion at the rear.

8. Aiming elements They are composed of:

a. Front sight The front sight is usually fixed and located near the end of the muzzle.

b. Rear sight The rear sight is located on the bridge of the frame at the rear and is frequently
adjustable in laterality and height.

The gun, how it works and its parts


Banking specialization 96

Often, and it could not be otherwise, terms such as slide, frame, percussion system,
breechblock and a long etc. appear in this blog. But do we really know anything about these
terms? To a greater or lesser extent, we all know what a pistol is, but do we know its origin?
How is it different from other firearms? What is a striker lock? I hope that with this post I will
answer these and other questions, which will undoubtedly help us to increase our knowledge
about the weapon.
We'll start at the beginning. A pistol is any short weapon with one or more repeating shots or
semi-automatic, except those with a rotating chamber system, which we classify in the revolver
group. The history of the pistol is closely related to the evolution of mechanics, cartridges,
military and civilian use and sport. The most important factors for the adoption of handguns
were, in addition to mobility and ease of use, concealment and ease of transport. The
achievement of the repeating weapon was not enough for the gun manufacturers who sought
to transform the repeating system, which was merely manual, into a semi-automatic one.
The origin of the pistol dates back to the 19th century. In 1892, Joseph Laumann, an Austrian
engineer, created the first semi-automatic pistol that used smokeless powder ammunition. It
was called Schonberger. In 1893, Andreas Wilhelm Schwarzlose designed a pistol that was
operated by the movement of the barrel, and in 1898 he manufactured a semi-automatic pistol
that, like the previous one, also bore his name. The first weapon of this type to achieve
commercial success was the one invented by the American Hugo Borchardt, also known by the
name of its inventor. This made its appearance in 1893 and was the first to use a magazine
that could be separated from its housing in the grip. This pistol can be considered the
precursor to the Luger, and was designed so that a stock could be attached to it and it could be
used as if it were a carbine. Borchardt used a mechanism similar to the joint of a human knee,
so that when it was extended and locked it was practically impossible to move, but once it was
moved slightly upwards, it opened easily and simply.
From 1906, names such as John M. Browning and the Colt company in the USA, the Fabrique
Nationale d'Armes de Guerre in Herstal (Belgium), and Mauser and Walther in Germany,
combined the various locking systems with differentiating qualities between the types of pistols,
beginning a race towards perfection of operation that has been achieved today.
Banking specialization 97

Slide and frame of a Walther P38

OPERATING
SYSTEMS Among the best known operating systems are the following:

1. Fixed

cannon a/. Fixed barrel system with recoil breech (Mauser System) In this system, once the
shot has been fired, the barrel remains motionless attached to the frame while the breech is
moved backwards by the force of the gases. This system is used, with exceptions, with low-
power cartridges. Examples of this system are the Hacker & Koch P9S pistol, in which the
locking is produced by a system of rollers that do not allow the opening until the chamber
pressure drops. Another pistol worthy of mention is the P7, also from H&K, in which the delay
in the opening of the bolt is produced by a gas intake in the barrel, that is, a portion of the
Banking specialization 98

gases produced in the combustion of gunpowder pass through a hole into a cylinder whose
piston is integral with the slide, preventing the opening of the slide until the projectile leaves the
barrel and the pressure drops.

B/. Articulated locking system and fixed barrel


(Borchardthttp://historiadelasarmasdefuego.blogspot.com/2008/12/luger-p08.htmlhttp://
historiadelasarmasdefuego.blogspot.com/2008/12/pistola-borchardt.html and Luger systems)

2. Mobile

cannon a/. Long recoil movable barrel system The barrel recoils a distance greater than the
length of the cartridge. The barrel-lock assembly moves forward together, undergoing a turning
movement thanks to helical grooves in the frame, into which lugs provided for the lock are
inserted. When the barrel-lock assembly reaches the end of its travel, the barrel is unlocked to
return to its initial position, and then the lock is returned, which in its movement drags a new
cartridge inside the chamber.

B/. Short recoil mobile gun system.


- Tilting barrel system (Browning-Colt System) In this type, the barrel and slide move back
together to a stop where the barrel moves downwards, locking itself and leaving the bolt free.
- Straight barrel system The breech assembly is articulated in its middle part, and when the
shot is fired the breech-barrel assembly move back together until the two cylinders that carry
the joint hit against a ramp located in the frame, forcing this articulated part to make an upward
movement and thus breaking the rigidity of the assembly, separating the barrel from the breech
and the latter continuing its movement alone until its stop.
- Barrel turning system The barrel lock assembly is held in place by lugs on the latter, which
are inserted into the slide and when they start moving together, driven by the force of the
gases, the barrel starts a turning movement, breaking free from its anchor and the slide
continuing the movement alone.

Different types of frame

PARTS OF A GUN They


are divided into three groups:

1. Barrel and recoil spring.

-Barrel:
This is a special steel tube with strong walls, designed to allow the projectile to flow through it,
Banking specialization 99

propelled by the gases produced by the deflagration of the gunpowder.


Parts: - Bore. - Chamber. - Access ramp. - Clutch. - Support planes. - Eyelets.

-Recoil spring The


recoil spring is responsible for bringing the slide to its most forward part once the shot has
been fired. It consists of the recovery spring and its guide rod.

2 Sliding: Mobile
piece located above the frame or armature, to which it is attached by means of channels or
rails that allow longitudinal movement-displacement. The barrel is housed in the front recess,
and there are two holes at the front: one for the barrel to exit when the weapon is assembled,
and another for the recoil spring guide.
Parts. - Closing block. - Clutches. - Ejection window. - Extractor claw - Aiming elements. -
Recesses.

3. Frame.
The frame of a pistol is usually made of aluminum, steel, alloys and even high-impact plastic
such as Bloc, which helps the entire assembly to maintain a lighter weight. It is used to house
the different parts that form part of the firing, ejection, automation, feeding, disassembly and
gripping mechanisms, with their corresponding grips, which are usually made of a hard rubber
similar to neoprene, mother-of-pearl or wood. Among the parts it houses are: - Percussion
mechanism frame - Trigger - Magazine compartment - Closing latch.

Sliding, also called "carriage"

MECHANISMS AND THEIR OPERATION.


We can divide the gun mechanisms into five groups:

1.- Feeding mechanism It


is responsible for supplying the chamber with cartridges. It consists of the light sheet metal
loader, which consists of the loader tube, lifting tile, lifting spring, loader plug and its coupling. It
has variable capacity and is housed inside the grip.

2.- Closing mechanismIt


consists essentially of the closing block, whose main mission is to close the chamber. As the
block advances forward, it draws a cartridge from the magazine, engages it with the extractor
claw, presses it against the firing grain and pushes it into the chamber. This perfect locking is
ensured by the barrel and slide clutches.
Banking specialization 100

3.- Firing and percussion

mechanisma) Firing mechanism: There are two possibilities: .-

Double action: When pressure is applied to the trigger, the force is transmitted to the
connecting rod, which with its central rear part presses on the firing pin latch, which, due to its
eccentric shape, begins to move backwards until it reaches a stop where the connecting rod
takes an inclined plane, separating abruptly from the firing pin latch, which, due to the action of
the mainspring and its guide, falls violently, hitting the anvil or rear part of the firing pin. .

- Single action: When the hammer is in its most rearward position, it is engaged by the sear.
The connecting rod, in turn, is set back and held by the firing pin latch. When pressure is
applied to the trigger, the connecting rod presses on the sear, which releases the firing pin,
causing it to strike the firing pin.

Firing pin
b) Percussion mechanism:

In this mechanism the element or piece that plays the most important role is the so-called firing
pin. We call the percussion system launched percussion because its operation is based on the
inertial launch of the firing pin. The firing pin is smaller than the housing where it is located,
being held in place by a return spring. When struck by the firing pin, it is propelled through the
bore until its tip emerges through the firing grain and strikes the cartridge piston. Then, by
means of its antagonist spring, it is hidden again inside the locking block. This system allows
the hammer to rest directly on the needle, without danger, since the needle does not protrude
through the hearth grain.

4.- Extraction and ejection mechanismThis

is the mechanism responsible for extracting the cartridge case once fired and expelling it
through the window to the outside of the weapon. It is made up of two fundamental parts:
- The extractor claw and the ejector. Once the shot has been fired, and in a matter of
milliseconds, the action of the projectile exiting the barrel, pushed by the gases, produces a
reaction in the weapon's mechanisms in such a way that the slide begins to recoil, guided by
the rails that hold it to the frame. The case, engaged by the extractor and attached to the
breech block, moves with the slide in its backward movement until it hits the ejector, which
pivots the case, preparing it to be disengaged from the extractor while making it take the
precise angle that directs it towards the ejection window, through which it exits to the outside.
This ejector has the particularity of being foldable, in order to aid in the assembly and
disassembly of the weapon, and is placed in its optimal operating position by the action of the
loader when feeding the weapon.

5.- Safety mechanisms They generally consist of a manually operated safety device and two
automatic ones.
Banking specialization 101

- Manual safety

: This is formed by the levers located on both sides of the slide and their purpose is to hide the
firing pin inside the breech block, so that it is not exposed to the action of the firing pin, while
blocking it inside, preventing the needle from accidentally falling and its own inertia causing it
to come out through the grain. Stove and strike the piston, always of course with a cartridge in
the chamber.
- Locking safety: This safety activates when the weapon is incompletely locked due to multiple
causes. This consists of the switch, located on the right side of the trigger cassette, not fitting
perfectly into the crescent-shaped recess in the slide, causing the connecting rod to move
downwards and not to contact the sear pin, thus preventing the firing pin from being released,
resulting in a lack of firing.
-Automatic magazine safety: This consists of disabling the firing mechanism while the
magazine is not in its housing, or is incorrectly placed.
-Drop safety: This is a safety device that works automatically in the event of the firing pin
accidentally falling, as long as the trigger is not pressed, preventing the firing pin from hitting
the firing pin, leaving it at a point further back and closer to it.

Summary

Slide (Solid): It is the carriage or mobile assembly that moves on the guides or rails of the
frame, allowing firing. In the vast majority it serves as a location for the sighting devices
(rear sight and front sight), in others, it only carries the rear sight. It also houses the
extractor (of the vassels), the firing pin and in some cases the devices for the automatic
needle safety, cocking mechanism indicator, chambered cartridge indicator and the flipper
safety, when this is located on the slide.
Frame: It is the chassis, armor or container of the firing mechanism, which can be made of
steel or very hard plastic or alloy, which supports the structure of the weapon. It houses
the trigger, transfer rod, sear, disconnector and magazine catch with their respective
springs and pins. Also to the ejector or ejector and mainspring with its guide, especially in
designs that have a hammer, regardless of whether it acts hidden or visible. The frame
may also include the flipper safety, the grip safety and the magazine safety, as well as the
slide catch, as applicable.
Magazine: This is the device that houses the cartridges that will be fed into the pistol
during operation. It can be located on the grip (most) or in front of the trigger guard, and be
removable or fixed. There are double-row and single-row chargers.
Barrel: A steel tube, movable or fixed, which may have conventional (striped) or
polygonal rifling on its interior (bore).
Recoil spring: This is the spring that returns the slide, which when moving forward will
drag a new cartridge, presented by the magazine lift plate, feeding the chamber. They are
generally helical type, but there are also flat strap models. It can be located under, around
or on the barrel. The guide on which it moves in some cases protrudes from in front of the
slide and serves as a housing for the recoil buffer and the “unloading” ramp.
Sear: This is the piece that holds the hammer when it is mounted or in the intermediate
position, in models that have this type of safety. In the case of shuttle percussion, the firing
pin is retained by hooking it by its lower lug. When the trigger is pulled, the intermediate
rod will push or pull the sear, releasing the hammer or firing pin, retained as the case may
be.
Disconnector (Disconnector): Its function is to disconnect or interrupt the contact
Banking specialization 102

between the sear and the trigger transfer rod, during the recoil of the slide, keeping them
isolated until the former completes its return forward. Its performance is crucial, preventing
burst discharge and acting as a closing lock.
Ejector or ejector (Ejector): Releases the sleeve from the extractor claw, ejecting it
through the open window in the slide during recoil.
Slide stop: Not all pistols have it. They hold the slide back after the last shot, leaving the
action open and serving as an indicator of depleted charge.
Thumb safety: A thumb-friendly control mobilizes the mechanical safety device, which
when placed on the frame, can block the trigger or hammer and/or sear, preventing
accidental firing. When it appears on the slide, it locks and/or protects the firing pin. There
are slide locks, grip locks, trigger locks, magazine locks, etc., according to the
particularities of each brand or model.
Firing pin safety: Does not release the firing pin until the trigger is fully depressed. Very in
vogue today.
Magazine safety: Does not enable the firing system until the magazine is seated in its
place. This is a very useful security scheme for laymen and the absent-minded.
Hand safety: Puts the trigger into battery when its button or lever is pressed when
gripping. It can be on the front or back of the grip.

You might also like