Thanks to visit codestin.com
Credit goes to www.scribd.com

100% found this document useful (1 vote)
641 views132 pages

Fundamentals of Industrial Security

Industrial security management involves securing business operations and industrial establishments through physical, personnel, and information security measures. It aims to protect against threats from human and natural hazards and ensure safety. Some key aspects of industrial security management include perimeter barriers, protective lighting, alarms, locks and key control, guard patrols, and personnel identification systems. The document outlines various security principles, types of threats and hazards, and components involved in implementing a comprehensive industrial security program.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
641 views132 pages

Fundamentals of Industrial Security

Industrial security management involves securing business operations and industrial establishments through physical, personnel, and information security measures. It aims to protect against threats from human and natural hazards and ensure safety. Some key aspects of industrial security management include perimeter barriers, protective lighting, alarms, locks and key control, guard patrols, and personnel identification systems. The document outlines various security principles, types of threats and hazards, and components involved in implementing a comprehensive industrial security program.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 132

FUNDAMENTALS OF

INDUSTRIAL SECURITY
MANAGEMENT
WHAT IS INDUSTRIAL
SECURITY MANAGEMENT?
INDUSTRY
 An activity that
pertains to business
operations.
SECURITY

 a state or condition of being safe or


secured;
 there is freedom from fear, harm,
danger, loss, destruction or damages.
SECURITY VS. SAFETY
 state of being “safe”, the condition
of being protected against physical,
social, spiritual, financial, political,
emotional, etc.
MANAGEMENT
 The skillful use of
means in order to
attain a purpose.
WHAT IS INDUSTRIAL SECURITY
MANAGEMENT?
 “the skillful
handling of the
security and safety
measures of
business
enterprises and
industrial
establishments.”
LAWS RELATED TO
SECURITY MANAGEMENT

R.A. No. 5487 –known as Private Security


Agency Law approved June 13, 1969

R.A. 6975 – “DILG ACT OF 1990”. The law


authorizing the PNP the control and
supervision of the security agencies in the
Philippines. Approved into law December 13,
1990.

WDC
NECESSITY OF SECURITY

 Security measures are inevitable or


necessary for the attainment of
goals and objectives.
 When an individual or organization is
exposed to hazards, their
productivity is adversely affected.
PROBLEMS IN SECURITY
MANAGEMENT

1. Human hazards
2. Natural hazards

WDC
HUMAN HAZARD???

09193359619
WHAT ARE HAZARDS?

 conditions that may cause damage to


property, injury, or loss of life.
 “exposure to the chance of loss or
injury.
SECURITY AND SAFETY
MEASURES
 Active measures
 physical barriers, security lightings,
safes and vaults, locks and other
devices.
 Passive measures
 deter mans from committing acts for
fear of being caught.
 Ex: Security education programs, security
investigation, fire prevention seminars,
safety drills, etc.
TYPES OF INDUSTRIAL
SECURITY
1. Hotel Security
2. Hospital Security
3. School Security
4. Bank Security
5. Commercial Security
6. Mall Security
7. Agriculture Security
8. Mining Security
9. Airport Security
10. Communication Security
- Transmission & Cryptographic
THREE MAJOR DIVISIONS OF
INDUSTRIAL SECURITY
1. Physical Security
 measures taken to prevent physical access or entry
to an installation or area by unauthorized personnel.
2. Personnel Security
 measures applied to insure suitability for
appointment or access to classified matter as well as
the protection of company personnel against
potential harmful acts or conditions.
3. Document and Information Security
 measures designed to safeguard company
documents from unauthorized disclosure of the
information
COMPONENTS OF PHYSICAL
SECURITY

1. Perimeter Barriers
2. Protective Lightings
3. Protective Alarms
4. Protective Locks and Key Control and
5. Protective Cabinets
6. Guard Force and Guard Systems
7. Personnel Identification & Movement
Control
PRINCIPLES OF PHYSICAL
SECURITY Defense in depth
means barrier
after barrier
Surreptitious
versus Non-
Surreptitious Entry

Each Installation is
Different

There is No
Impenetrable
Barrier

Enemy Agents
Must Access
WHAT ARE BARRIERS?

 any physical
structure
whether natural
or man made.
 capable of
restricting,
delaying or
preventing
unauthorized
access
LINE OF PHYSICAL DEFENSE

helps
delay or • First Line - perimeter barriers;
stop
intruders

• Second Line - building exteriors

• Third Line - includes those


. internal control measures
CONCEPT OF PERIMETER
BARRIERS

 medium of structure which defines the


physical limits.
 restrict or impede access.
 any physical barrier used to supplement the
protection of an inside or outside perimeter.
PERIMETER BARRIER
OPENINGS

1. Gates and doors should also be guarded or locked;


2. Windows and similar openings should also be
guarded or grills should be installed;
3. Sidewalks elevators should be locked and guarded;
4. Utilities openings such as sewers, air intakes,
exhaust tunnels should be protected by bars, grills,
etc.;
5. Clear Zone is an unobstructed area maintained on
both sides of the perimeter barrier.
 A clear zone of 20 ft. or more is desirable between the
barrier and extension structures and natural covers
which may provide concealment or assistance to a
person seeking unauthorized entry.
TYPES OF PERIMETER
BARRIERS
1. FENCES - control physical and visual
access between outside areas.
 Solid -visual access is denied.
 Full-View - visual access is permitted
TYPES OF PERIMETER
BARRIERS
2. BUILDING WALLS include walls,
floor, roofs or their combinations
3. BODIES OF WATER like river, lake,
cataract, sea, pond or any bodies of
water
ADDITIONAL PROTECTIVE
MEASURES

1. Top Guard
 additional overhang of barbed wire placed on vertical
perimeter fences facing upward and outward with a 45-
degree angle with three to four strands of barbed wires
spaced 6-inches apart.
2. Guard Control Stations
 provided at main perimeter entrance to secure areas
located out of doors,
3. Towers or “Guard towers”
 are house-like structures above the perimeter barriers.
ADDITIONAL PROTECTIVE
MEASURES…
4. Barrier Maintenance
 Fencing barriers and protective walls should always be
regularly inspected by security.
5. Protection in Depth
 In large open areas or ground where fencing or walling is
impractical and expensive, warning signs should be
conspicuously placed.
6. Signs and Notices or “Control signs”
 controls unauthorized ingress, and preclude accidental
entry.
PROTECTIVE LIGHTINGS

 provides a means of illumination


 a degree of protection maintained during
daylight hours.
 deterrent to thieves and vandals
 an essential element of an integrated physical
security program.
TYPES OF SECURITY
LIGHTINGS
1. Stationary Luminary (Continuous)
2. Stand-by Lighting
3. Movable Lighting
4. Emergency Lighting
TYPES OF SECURITY
LIGHTINGS
1. Stationary Luminary (Continuous)
 fixed luminous to flood a given area
continuously with overlap.

a. Glare–projection type
 focused to the intruder while the guard remains in
the dark.
b. Controlled lighting
 focused on a pile of items rather than on the
background.
TYPES OF SECURITY
LIGHTINGS…
2. Stand-by Lighting
 similar to continuous lighting but
turned on manually or by other
automatic means.
TYPES OF SECURITY
LIGHTINGS…

3. Movable Lighting
 stationary or manually operated search
lights

4. Emergency Lighting
 used in the event of electrical failure
GENERAL TYPES OF
LIGHTING SOURCES
1. Incandescent Lamp
2. Mercury Vapour Lamp
3. Metal Halide
4. Fluorescent Lamp
5. High-Sodium Vapour Lamp
INCANDESCENT LIGHTS

have low initial cost


Mercury Vapor lamps
 emit a purplish-
white color gas.
More efficient
in exterior
lighting.
Metal Halide
 similar in physical
appearance to
mercury vapor,
 but provides a light
source of higher
luminous efficiency
and better color
rendition.
Fluorescent Lamp
 good color
rendition.
 cannot project
light over long
distances
 not desirable as
flood type lights.
High-pressure Sodium Vapor
 exterior lighting of parking areas,
roadways, buildings, and industrial and
commercial installation.
 It emits golden white to pink color.
PROTECTIVE ALARMS

 another safeguard that


complement if not to
supplement physical
security
 alerts security
personnel to
consummated or
attempted intrusion
THREE PARTS OF AN ALARM
SYSTEM
1. Sensor or trigger device
 It detects the aural or visual signals or
both.
2. Transmission line
 a circuit which transmit the message to
the signaling apparatus.
3. Annunciator
 it is the signaling system that activates
the alarm.
TYPES OF ALARM DETECTION SYSTEM

1. Central Station System – monitor of the


central station is located outside the
installation.
2. Proprietary System – functions in the same
way as the central system except that it is
owned and leased by the subscriber.
3. Local Alarm System – ringing up a visual or
audible alarm near the object to be protected.
4. Auxiliary System – installation circuits are
led into local police or fire department.
Data Gathering Panel

Alarm Annunciation Alarm Assessment


CAS
(Central Alarm Station)

Alarm Sensor Alarm Sensor Alarm Sensor

40
Kinds of Alarms

1. Audio Detection Device- detect sound


caused by attempted force entry
2. Vibration Detection Device- detect any
vibration
3. Metallic foil or wire- it will detect any
action that moves the foil or wire
4. Laser Beam Alarm- a laser emitter floods
a wall or fencing with a beam. If the beam
is disturbed, an alarm is activated.
5. Photoelectric or Electric Eye Device- an
invisible/visible beam is emitted
WHAT IS PERIMETER INTRUDER
DETECTION SYSTEM (PIDS)?

 These are electronic devices that


detects entry or attempted entry
across the external perimeter of a key
point or vital point and signaling an
alarm.
PROTECTIVE LOCKS AND
KEY CONTROL
What is Lock?
 a mechanical, electrical, hydraulic or
electronic device to prevent entry
into a building, room, container or
hiding place

 What is a Key?
 a metal bar with notches or grooves that,
when inserted into a lock and turned,
operates the lock’s mechanism; or
 door or lock opener: a device such as a
plastic card with an encoded magnetic
strip that operates a door or lock
TYPES OF LOCKS
1. Key-operated Lock
2. Padlock
3. Combination lock
4. Code Operated Lock
5. Card-coded Lock
6. Electrical Lock
7. Electromagnetic Lock
Key-operated mechanical lock
 it uses some sort of arrangement of internal
physical barriers (wards tumblers) which
prevent the lock from operating unless they
are properly aligned.
 The key is the device used to align these
internal barriers so that the lock may be
operated.
Three (3) Types of
Key-operated Lock

1. Warded Lock
2. Disc or wafer tumbler mechanism
3. Pin tumbler mechanism
4. Lever tumbler mechanism
Warded lock
Disc tumbler (wafer) lock
Lever Tumbler Lock
Pin Tumbler Lock
Padlock
 a portable and
detachable lock
having a sliding hasp
which passes through
a staple ring and is
then made fasten or
secured.
Combination Locks
it uses numbers,
letters or other
symbols as
reference point
which enable an
operator to align
them manually.
Code Operated Locks
 can be opened by
pressing the series
of numbered
button in the
proper sequence.
Electrical lock
 a type of lock
that can be
opened and
closed remotely
by electrical
means.
Electromagnetic Locks
 devices holding a
door by
magnetism.
 when the power is
secured on the
door, it will resist
pressure of up to
1000 pounds.
TYPES OF KEYS

1. Change Key - a specific key, which


operates the lock and has a particular
combination of cuts, or biting, which match
the tumblers in the lock.
2. Sub-Master Key - could open all the lock
within a particular grouping in a facility.
3. Master Key - capable of opening a series of
locks.
4. Grand Master Key - open everything in a
system involving two or more master key
groups.
 The issued key to open main entrance
gate and office is called _____.
A. Master key C. Master keying System
B. Maison Keying D. Key Control
Change Key (One level)
A key to a single lock within a master keyed
system.
Master Key (Two level)
All levels operated by change key and master
key Master key operates all locks generally of
one building.
Grand Master Key (Three level)
All locks operated by change key, master key
and grand master key.
Great Grand Master Key (Four level)
All locks operated by change key, master key,
grand master key and great grand master
key.
Great Great Grand Master Key (Five level)
All locks operated by change key, master key,
grand master key, great grand master key
and great great grand master key.
PROTECTIVE CONTAINERS
(CABINETS)

 The final line of defense


where papers, records, plans
or cashable instrument,
precious metals or other
especially valuable assets are
protected.
 These security containers will
be of a size and quantity,
which the nature of the
business dictates.
 These could be: SAFE, VAULT
OR A FILE ROOM
SAFE
 a metallic container used
for the safekeeping of
documents or small items
 robbery or burglary
resistance
 must be at least 750 lbs.
 anchored to a building
structure
 body should at least one
inch thick steel.
VAULT
 a heavily constructed fire and burglar
resistance container
 part of the building structure
 bigger than safe
 door should be made of steel at least
6 inches
 walls, ceiling, floor reinforce concrete
at least 12 inches
 must be resistive to fire up to 6
hours.
FILE ROOM
 cubicle in a building
constructed a little
lighter than vault
 12 feet high
 watertight door
 fire proof for one hour.
GUARD FORCE AND GUARD
SYSTEMS
Security Guard
 sometimes called private security
guard or watchman shall include any
person who offers or renders personal
service to watch or secure either a
residence or business establishment
or both for hire or compensation,
 and with a license to exercise security
profession.
GUARD FORCE

 Group of selected men, trained or


grouped into functional unit in order to
protect operational processes from those
disruption which would impede efficiency
or halt operation.
TYPES OF GUARD FORCES
1. Private Security Agency (PSA)
 contracts, recruits, trains, and post security
guard to a business firms
2. Company Security Force (CSF)
 maintained and operated by any private
company or corporation
3. Government Security Unit (GSU)
 operated by any government entity other than
military and / a police
WHAT IS PADPAO?
 THE PHILIPPINE ASSOCIATION OF
DETECTIVE AND PROTECTIVE
AGENCY OPERATORS, INC (PADPAO)
- the national association of all licensed security
agencies and company security forces.
- Established as early as 1958 purposely for the self-
regulation of all security agencies.
WHAT IS LTO?
 LICENSE TO OPERATE

 document issued by the CPNP or his


duly authorized representative
authorizing a person to engage in
security business
REQUIREMENTS FOR NEW PSA
 1M Minimum Capital and 500K Bank
Deposit
 Application to CPNP thru SAGSD or SOSIA
 full name of the applicant;
 his age, civil status; and
 residence and location of his business.
In case of corporation, association or
partnership copies of the following shall be
appended:
 Certificate of Registration with the SEC; and
 BY-Laws and Articles of incorporation.
Graduated Scale of License to
Operate
 200 or more but not exceeding 1000 shall be issued a
regular LTO good for 2 years.
 New PSA shall be issued a temporary LTO good for 1
year.
 PSAs with temporary LTO having posted 100 guards or
more but less than 200 shall upon expiration of such LTO
shall be issued an extension period of 6 mos. However,
upon expiration of the extension period, no extension
shall be granted unless the PSA shall submit a
certification for additional 50 guards posted for a 150
guards total.

 PSAs with cancelled/revoked LTOs shall cease to


operate and within 7 days after having been duly
notified of such cease to operate order, shall
immediately deposit all its firearms with the FED which
shall be receipted, copy furnished, CPNP SOSIA
(SAGSD). Otherwise, the PSA concerned, shall be liable
under PD 1866 (RA 8249).
Who may organize and
maintain a PSA?
 Any Filipino citizen
or corporation,
association,
partnership,
 100% owned and
controlled by
Filipino citizens.
Basic Requirement of an Operator
or Manager of agency

 Filipino citizen
 At least 25 years old
 College graduate and/or
 A commissioned officer in the inactive service or
 Retired from AFP or PNP or
Graduated/taken course in concepts and methods in
industrial Security and Security Management and/or
 Must have and adequate training or experience in
security business
 Good moral character - not having been convicted of any
crime involving moral turpitude; and
Disqualifications
 dishonorably discharged from AFP/PNP or separated
for cause from any government entity or government
owned or controlled corporation;
 Being mentally incompetent;
 Being physically unfit;
 Addicted to the use of narcotic and/or prohibited drugs
and/or substances;
 Habitual drunkard and alcoholic;
 Dummy of any foreigner; and
 Elective or appointive government officials and
employees
Basic requisites for security
guards
 Filipino citizen;
 High school graduate;
 Physically and mentally fit;
 At least 18 years old but not more
than 50 years old;
 Has undergone pre-licensing
training course; and
 Must not possess any of the
disqualifications.
Who are exempted from Pre-
Licensing

1. Veterans and retired or honorably


discharged military/police personnel
possessing all the qualifications
mentioned in the preceding section.
2. ROTC advance/basic graduates,
and/or its equivalent in the AFP, PNP,
CAFGU/CHDF.
Private Detective
 Holder of baccalaureate degree or
Bachelor of Laws; or
 B.S. Criminology graduate; or
 Graduate of Criminal Investigation
Course offered by the then PC/INP or
the PNP or the NBI or any police
training school or detective training with
authorized/recognized training center
for security guard; or
 Advance Reserve Officers Training
Course or Citizen Military Training
(ROTC/CMT) graduate.
Security Officer
 Filipino citizen;
 Holder of Baccalaureate Degree;
 Physically and mentally fit;
 Has graduated from a Security Officer
Training Course;
 Retired personnel of the PNP/AFP; and
 Must not possess any of the disqualification
enumerated in Sec. 2, Rule II.
Security Consultant
 Holder of a Masters degree in either
Criminology, Public Administration, MNSA,
Industrial Administration or Law; or
 Must have at least 10 years experience in
the operation and management of security
business.
 Other Exemptions - Any officer or enlisted
man of the AFP or a uniform member of
the PNP honorably discharged/separated or
retired from the service are exempted from
the requirements.
USE OF FIREARMS AND EQUIPMENT

 After complying all the


requirements, PSAs are
entitled to possess firearms of
any of the ff:
 shotguns, not higher than 12
gauge;
 low-power rifle or revolvers, cal.
.22;
 cal. .38 pistols or revolvers not
exceeding one (1) FA for every
two (2) security guard in its
employ.
 PSA with 100 guards - at least 30 pieces of
licensed firearms. However, after operating
6 mos., the PSA can procure firearms in
proportion to the number of posted guards.
 For regular License to Operate (LTO)
application - at least 70 pieces of firearms.
 Use of firearms for Private Detective
Agency shall be OPTIONAL.
Restrictions
 The total number of the prescribed high-powered
firearms shall not exceed ten (10) percent of the
total numbers of guards employed.
 Private Security Agencies are not allowed to possess
high caliber guns/firearms such as: carbine; M16; Cal
45; center fire magnum cal .41 and .44; and high
caliber firearms, except: when such private PSA/CSF
is operating in areas where there is an upsurge of
lawlessness and criminality.
 Exception is granted by CPNP or Regional Director of
Regional Police Office under the following conditions:
Limitations
1. During his tour of duty when in proper
uniform within the compound of the
establishment, where he is assigned; and
2. Except, when he is escorting big amount of
cash or valuables, and upon prior
coordination with the nearest PNP
units/stations.
 Duty Detail Order or DDO – security personnel
on duties under the circumstances mentioned in
the preceding section must have DDO (SAGSD
Form No. 12-94).
Confiscation of firearms

1. about to be used in the commission of a crime;


2. actually being used in the commission of crime;
3. has just been used in the commission of a crime;
4. is being carried by the SG is unlicensed or not
authorized by law and regulation for his use;
5. confiscated by order of the court;
6. used or carried outside the AOR of the SG without
proper authority; or
7. the SG is unlicensed
Disposition of confiscated FA
 The law enforcement officer who
confiscated the FA shall inform the CPNP
thru CSG within 24 hours after such
confiscation.
 The firearm shall be turned over
immediately to the nearest PNP
Unit/Station who shall immediately turn
over the same to the CSG District Office.
 When the confiscation is by order of the
court, the same shall be turned over to the
court concerned.
Revocation of license to
possess FAs

1. Failure to submit any issued FA for verification as


required by Sec. 897 of RAC;
2. Carrying of FAs by security personnel w/out
appropriate DDO;
3. When its serial number (SN) is duplicated or using
the SN for more than one firearm (FA);
4. Carrying of FAs outside the place stated in the permit
as required by E.O. or carrying FA in places
prohibited under the law;
5. Conviction of the operator or manager of the agency
of any crime involving moral turpitude; or
6. When the firearm was reported lost.
Stocking of ammunitions
 limited and reasonable
quantity that suits the need
of the Agency
 not exceed fifty (50) rounds
of ammunitions per unit of
duly licensed Fas.
 Individual issue to security
guard shall be limited to
twenty-five (25) rounds per
SG.
UNIFORM, EQUIPMENT AND
PARAPHERNALIA

 males - Headgear; service


shirt; service trousers;
service belt; and footwear.

 Light blue and/or white


service shirts for internal
guards for PSA;
 Light gray for company
security force; and
 White for government
security unit.
RANKS AND POSITIONS
 Security Management Staff
 Security Director (SD) - Agency Manager/Chief Security
Officer.
 Security Executive Director (SED) - Asst. Agency
Manager/asst. Chief Security Officer.
 Security Staff Director (SSD) - Staff Director for Operation
and Staff
 Director for Administration.
 Line Leadership Staff
 Security Supervisor 3 - Detachment Commanders
 Security Supervisor 2 - Chief Inspector
 Security Supervisor 1 – Inspector
 Security Guard
 Security Guard 1 - watchman/guard
 Security Guard 2 - Shift-in-charge
 Security Guard 3 - Post-in-charge
PERSONNEL IDENTIFICATION AND
MOVEMENT CONTROL

 In every installation, the use of protective


barriers, security lighting, communication and
electronic hardware provides physical
safeguards but these are insufficient to
maximize the effort of the guard force.
 A control point must be established for positive
personnel identification and check system.
 This is to insure that only those persons who
have the right and authority will be given the
necessary access to the area.
 Two (2) Types of Personnel Identification
1. Personal recognition – familiarity of the person’s
characteristics.
2. Artificial recognition- identification cards, passes,
passwords, etc.
 Use of Pass System
 Single pass system - the badge or pass coded for
authorization to enter specific areas is issued to an
employee who keeps it in his possession until his
authorization is terminates.
 Pass exchange system - an exchange takes place at
the entrance of each controlled area. Upon leaving the
personnel surrenders his badge or passes and retrieve
back his basic identification.
 Multiple pass system - this provides an extra
measure of security by requiring that an exchange take
place at the entrance of each restricted area.
PERSONNEL SECURITY
 designed to prevent unsuitable
individuals from gaining access to
classified matter or to any security
facility, and to prevent appointment,
or retention
Scope of Personnel Security

1. Personnel Security Investigation


(PSI)
2. Security Education
WHAT IS PERSONNEL
SECURITY INVESTIGATION?

 an inquiry into the


character, moral,
reputation, integrity,
discretion and loyalty of
individual in order to
determine a person’s
suitability to be given
security clearance.
Types of Personnel Security
Investigation (PSI)

1. National Agency Check (NAC) – made upon the


basis of written information supplied by him in
response to official inquiry, and by reference to
appropriate national agencies. Ex:NICA, NBI, ISAFP
or CIDG etc.

2. Local Agency Check (LAC) – written inquiries sent


to appropriate local government agencies, former
employees, references and schools listed by the
person under investigation. The local agencies
normally check besides the past employment,
schools and references
General Techniques of PSI
1. Background Investigation (BI)- this technique is
very expensive but necessary in personnel security. It
serves to verify information on the application form
and to obtain other information pertinent to the
decision to employ.
2. Positive Vetting- is the process of inspecting or
examining with careful thoroughness. The essence of
vetting that it is a personal interview conducted under
stress. It is based on information previously given by
the applicant. Other information issued during the
interview, such as those discovered in the BI, which
confirms or denies this given by the applicant.
3. Profiling- is the process whereby a subject’s reaction
in a future critical situation is predicted by observing
his behavior, or by interviewing him, or analyzing his
responses to a questionnaire, such as an honesty test.
The Reid Report is an example of honesty test.
4. Deception Detection Techniques- this a process of
using devices in detecting deception during the
interview stage. This includes the use of a Polygraph,
Psychological Stress Evaluator and Voice Analyzer.
5. Financial and Lifestyle Inquiry- this type of
investigation seeks to gather information on income
and mode of living, sometimes referred to as the
earning-to-debt ratio.
6. Undercover Investigation- this is the
placement of an agent in a role in which the
agent’s true identity and role remains
unknown, in order to obtain information for
criminal prosecution or for recovery or
limitation of asset losses.

7. Exit Interview- this is a valuable tool because


it gives departing employees an opportunity to
list grievances.
SECURITY EDUCATION

 develop security
awareness among
employees of the
company.
 should cover all
regardless of rank
or position.
Phases of Security
Education Program

1. Initial interview- first contact wherein the


interviewer determine the suitability of the
applicant
2. Orientation and Training- detailed
presentation of personnel security policy
3. Refresher Conference- remind
responsibilities, review guidelines and
policies, introduction of new policies
4. Security Reminders- indirect approach of
educating the employees
5. Security Promotion – emphasizing the
importance and role of security
DOCUMENT AND INFORMATION
SECURITY

 plays a significant role


in the daily operations
and activities of an
installation.
 Once the contents of a
company’s document
and information are
divulged the operational
stability is at stake.
DOCUMENT/ INFORMATION CYCLE

1. Creation
2. Classification
3. Storage
4. Retrieval
5. Retention/Purging
6. Transfer
7. Disposition
PERTINENT DEFINITON OF
TERMS
 Classified Information- this includes all
information concerning document,
cryptographic devices developed projects and
materials following on the categories of Top
Secret, Confidential or Restricted.

 Classified Matter- any information or material


in any form or of any nature, the safeguarding
of which is necessary in the interest of security
and which is classified for such purpose by the
responsible classifying authority.
 Classify- this refers to the assigning of
information or material, one of the four
security categories after determination has
been made that the information requires the
security protection as provided.
 Declassify- the act of removing the security
classification from classified information or
matter.
 Reclassifying or Regarding- refers to the act
of changing the assigned classification from
classified information or matter.
 Upgrading- refers to the act of assigning the
information or matter to the higher
classification than that previously assigned to
it.

 Compartmentation- refers to the grant of


access to the classified matter only to properly
cleared person when such classified
information is required in the performance of
their official duties.
 Need to know- is the dissemination of classified
information or matter to be limited strictly to those
person whose duties requires knowledge or possession
thereof.
 Unauthorized- refers to person not authorized to have
access on classified matters.
 Compromise- this takes place through the loss of
security, which results from unauthorized persons
obtaining knowledge of classified matters.
 Damage to National Security- refers to the prejudice,
embarrassment or injury to the country resulting from
act or omission.
Purpose of Protecting
Classified Materials

1. Deter and impede potential spy


2. Assist in security investigations by
keeping accurate records of the
moments of classified materials.
3. Enforce the use of “Need to Know”
principle
 Three (3) Security Concepts
1. Personnel are the weakest link in the
security chain.
2. Training is important to make
security personnel conscious and
realize the value of document.
3. Training is necessary for the practice
of “Need to Know” principle.
Four (4) Types of Classified
Matters

1. TOP SECRET (green color code) – is any


information and materials, the unauthorized
disclosure of it would cause exceptionally grave
damage to the nation, politically, economically
and military operation.
2. SECRET (red color) – is any information and
material, the unauthorized disclosure of it
would endanger national security, causes
serious injury to the interest and prestige of
the nation of any government activity, or of
great advantage to a foreign country.
3. CONFIDENTIAL (blue color code) – is any
information or material, the unauthorized
disclosure of it would be prejudicial to the
interest and prestige of the national or
governmental activity or would cause
administrative embarrassment or unwanted
injury to and be of advantage to a foreign
country.
4. RESTRICTED (white or no color) - is any
information and material which requires special
protection other than those determines
confidential, secret and top secret.
TYPES OF BUSINESS RECORDS

1. Class I (Vital Records) – liable records of which


reproduction does not have the same value as the original,
records needed to recover cash to replace buildings,
equipment, raw materials, finished products and records
needed to avoid delay in restoration of production, sales and
services.
2. Class II (Useful Records) - loss might cause inconvenience
but could be readily replaced and which would not in the
meantime present an insurmountable obstacle to the prompt
restoration of the business.
3. Class III (Important Records) – reproduction of which will
involve considerable expense and labor, or considerable delay.
Operating and statistical records belong to this class as well as
those to maintain check on efficiencies, operating costs, etc.
4. Class IV (Non-Essential Records) – These are the daily
files, routine in nature so that even if lost or destroyed, will
not affect operation or administration.
Rules for Classification of Documents

1. Documents shall be classified according to their


content.
2. The overall classification of a file or of a group
of physically connected therein. Pages,
paragraphs, sections or components thereof
may bear different classifications. Documents
separated from file or group shall be handled in
accordance with their individual classification.
3. Transmittal of documents or endorsements
which do not contain classified information or
which contain information classified lower than
that of the preceding element or enclosure
shall include a notation for automatic
downgrading.
4. Correspondence, Indexes, receipts, reports of
possession transfer or destruction, catalogs, or
accession list shall not be classify if any
reference to classified matter does not
disclosed classified information.
5. Classified matter obtained from other
department shall retain the same original
classification.
WHAT IS SECURITY
CLEARANCE?

 certification by a responsible authority that


the person described is cleared for access
to classified matter the appropriate level
 the administrative determination that an
individual is eligible for access to classified
matter.
 Need-to-know is the principle whereby
access to classified matter may only be
only given to those persons to whom it is
necessary for the fulfillment of their duties.
PROTECTION OF SENSITIVE
INFORMATION

 Proprietary information is information that in


some special way relates to the status or
activities of the possessor and over which the
possessor asserts ownership. In the business
community, proprietary information relates to
the structure, products or business methods of
the organization. It is usually protected in
some way against causal or general disclosure.
Types of
Proprietary
Information
 Patents- grants issued by a national
government conferring the right to
exclude others from making, using, or
selling the invention within that
country. Patents may be given for
new products or processes. Violations
of patents right are known as
infringement or piracy.
 Trademarks- words, names,
symbols, devices or combinations
thereof used by manufacturers or
merchants to differentiate their goods
and distinguish them from products
that are manufactured or sold by
others. Counterfeiting or infringement
constitute violations of trademark
rights.
 Copyrights- protections given by a
national government to creators of
original literary, dramatic, musical, and
certain other intellectual works. The
owner of a copyright has the exclusive
right to reproduce the copyrighted
works based on it, distribute copies,
and perform or display it publicly.
Copyright violations are also known as
infringement and piracy.
 Trade Secrets- formulas, patterns,
compilations, programs, devices,
methods, techniques and processes
that derive economic value from not
being generally known and not
ascertainable except by illegal means.
RISKS ANALYSIS AND
SECURITY HAZARDS
What is Risk Analysis?
 the analysis of risk which includes
examinations of the vulnerability,
probability and criticality of potential
threats and include natural and man made
risk.
 Risk - potential damage or loss of an asset
 Vulnerability - weaknesses
 Probability - chance or likelihood that a loss will
take place.
 Criticality - impact of a loss as measured in
financial terms.
What is Security Hazard?
 act or condition which may result in
the compromise of information, loss
of life, loss or destruction of property
or disruption of the objective of the
installation.
 act or condition affecting the safe
operation of the facility caused by
human action accidental or
intentional.
What is Risk Management?
 a process of selecting and
implementing security
countermeasures to achieve an
acceptable level of risk at an
acceptable cost.
 Countermeasures - An action taken or a
physical security used to reduce or
eliminate one or more vulnerabilities.
RELATIVITY OF RISK AND SECURITY

 The extent and degree of risks to security is


dependent on the following:
 Relative criticality of operation – importance of
the firm with reference to the natural economy and
security. Ex: gasoline depots, communication
transmission lines, and power plants.
 Relative vulnerability – susceptibility of the plant
or establishment to damage, loss or disruption of
operation due to various hazards. A good example is
the location of the building; the machines; or
presence of possible poisons.
RISK MANAGEMENT ALTERNATIVES AND
STRATEGIES

1. Risk Avoidance – removing the risk totally from the


business. Ex: proper disposal of inflammable substances.
2. Risk Reduction – minimizing the probability of the
potential loss. Ex: construction of fences and similar
physical barriers.
3. Risk Spreading – spreading the risk through
decentralization to limit the impact (criticality) of the
potential loss. Ex: use of vaults or safes
4. Risk Transfer – moving the financial impact of the
potential loss-over to an insurance company. This is done
by availing of property and life insurances. Hiring security
agencies is also a good example of this.
5. Risk Self-assumption – planned assumption and
acceptance of the potential risk by making a deliberate
managerial decision of doing nothing about the threat, or
setting aside resources for use in case of loss
Pilferage as a Business
Hazard

 Pilferage is one of the most annoying and


common human hazards which security has to
deal with. This activity if uncontrolled can
become financial drain if not a menace to
smooth and orderly operation.
 Failure to detect shortage and inaccurate
inventories will cause inventory losses, which
may be labeled as pilferage.
Types of Pilferers

1. Casual Pilferer- one who steals due to his inability to


resist the unexpected opportunity and has little fear of
detection is no plan or premeditation and he is usually a
“loner” on the job. The temptation to pick up the article
is basically due to poor security measure. The
implication of causal pilfering is the big cumulative cost if
it remains unchecked.
2. Systematic Pilferer- one who steals with preconceived
plans and takes away any or all types of items or
supplies for economic gain. Pilferers of this kind can be
employees or outsiders of the establishment.
SECURITY SURVEY AND INSPECTION
 SECURITY SYSTEM – This is the set of policies,
procedures and rules and regulations designed to
reduce to an absolute minimum the possibility of
espionage, sabotage and compromise of classified
information of an office or a whole establishment.

 SECURITY SURVEY – This is also known as security


audit which is actually a fact-finding probe to
determine a plant’s adequacy and deficiency in all
aspects of security, with the corresponding
recommendations.
SECURITY INSPECTION
 – This is a check of how well existing
security measures and regulations
are being carried out within a
detachment or establishment. A
security inspection may also include
an investigation of alleged or
suspected security violations.
TYPES OF SECURITY
INSPECTIONS
1. Continuous Inspection-an on-going and
never ending activity.
2. Formal or Informal
 Formal Inspection - preceded by an
announcement
 Informal Inspection - understood by all and
accepted as part of the organizational life.
3. Structured or Unstructured Inspection
 Structured Inspection is one that moves
systematically from one area to the next and so
on.
 Unstructured inspection is conducted in a
random manner.

You might also like