Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
66 views9 pages

FINALS Partial Study Notes

The document discusses security surveys, inspections, and investigations. It provides details on the purpose and phases of security surveys, inspections, and investigations. It also includes formats for security surveys and inspections.

Uploaded by

Kemuel Juadiong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views9 pages

FINALS Partial Study Notes

The document discusses security surveys, inspections, and investigations. It provides details on the purpose and phases of security surveys, inspections, and investigations. It also includes formats for security surveys and inspections.

Uploaded by

Kemuel Juadiong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

FINALS STUDY NOTES

Security Survey and Inspection

Security Survey
A security survey is a fact-finding process whereby the assessment team
gathers data that reflect the WHO, WHAT, HOW, WHERE, WHEN and WHY of an
organization’s existing operation and facility.
The purpose of this includes checklists, audits, or inventories of security
conditions.

Importance of Security Surveys


Security surveys are an essential tool for any organization that wants to
protect its valuable assets, data, and reputation. By proactively identifying and
addressing security weaknesses, you can significantly reduce your risk of security
breaches and ensure the continued success of your organization.

Security Inspection
Security inspection is a tool to determine the possible risks in a facility to
control or prevent possible loss or damage to company assets. This thorough
assessment of what is happening from a security point of view ensures that risks are
recognized and cost-effective countermeasures are in place.

Purpose of Security Inspection


1. To determine compliance with security policies
2. To detect weaknesses in the existing security measures
3. To assess assets and the probability of risk or the likelihood that a loss will
take place.

Phases of Security Inspection:


1. Detection of company policy violations.
2. Detection of possible defects in protective devices and other security aids.
3. Detection of conditions of properties being protected.
4. Detection of security hazards.
Safety Inspection
A safety inspection is used to prevent or detect an abnormal condition that
can endanger people, property, or the enterprise.

Phases of Safety Inspection:


1. Detection of obvious hazards
2. Detect factors that could contribute to an accident.
3. Detection of employees' performance not within standard practice.
4. Detection of employees' performance that can create hazards directly of a
contributory manner.

Security Survey Format

HEADING

To :
From :
Subject : (Name of Installation Surveyed)

A. INTRODUCTION
1. Authority for the Survey
2. Date and Hours Survey was Made
3. Surveying Personnel
4. Escort

B. NAME AND MISSION OF INSTALLATION/ACTIVITY


1. Description of Surveyed Unit (Use map showing installation)
2. Mission
3. Relationship with Other Higher Organizations

C. PHYSICAL SECURITY
1. Perimeter Barriers
a. Situation(s)
b. Recommendation(s)
2. Guard Force and Guard System
a. Situation(s)
b. Recommendation(s)
3. Personnel Identification and Movement
a. Situation(s)
b. Recommendation(s)
4. Protective Lighting
a. Situation(s)
b. Recommendation(s)
5. Alarms and Communication System
a. Situation(s)
b. Recommendation(s)
6. Restricted Areas
a. Situation(s)
b. Recommendation(s)
7. Storage Security
a. Situation(s)
b. Recommendation(s)
8. Utilities
a. Situation(s)
b. Recommendation(s)
9. Emergency Plan
a. Situation(s)
b. Recommendation(s)

D. PERSONNEL SECURITY
1. Data Concerning Key Personnel
2. Clearance Program
3. Security Education Program
4. Morale of Employees
5. Absentee Rate and labor Turnover

E. DOCUMENT AND INFORMATION SECURITY


a. Situation(s)
b. Recommendation(s)

F. OTHER SITUATIONS
a. Situation(s)
b. Recommendation(s)

G. ENCLOSURE AND EXHIBIT


a. Situation(s)
b. Recommendation(s)

________________
Chief, Survey Team
Security Inspection Format

HEADING

To :
From :
Subject : (Name of Installation Surveyed)

A. INTRODUCTION
1. Authority for the Survey
2. Date and Hours Conducted
3. Date of Last Inspection
4. Identity of Inspecting Agents(s)
5. Escorts of Inspecting Agents(s)

B. RESULT OF INSPECTION
1. List of Facility Inspected
2. Remarks on Effective and Extent of Compliance with Established
Security Measures
3. Actions Taken on Recommendation made during the previous

C. RECOMMENDATION

________________
Chief, Inspection Team
Security Investigation

Security Investigation is one of the major functions of a security


organization. Most security officers and supervisors are called upon to
conduct preliminary investigations on theft, injury, or any other kind of
untoward incident.

The three I’s of Investigation (also called “Methods of Investigation”)

1. Information: Information refers to the collection and analysis of all relevant


facts and details surrounding the case. This includes witness statements,
physical evidence at the scene, crime reports, and background checks on
suspects.

Process: Gathering information involves:

 Reviewing existing reports and documentation.


 Conducting interviews with witnesses and potential victims.
 Following leads and investigating alibis.
 Consulting with experts in relevant fields (forensics, ballistics,
etc.)

2. Interrogation: Interrogation is the structured questioning of individuals who


may possess knowledge about the case. This could be suspects, witnesses,
or anyone who might have relevant information.

Process: Interrogation techniques involve:

 Asking open-ended and specific questions to gather details and


assess credibility.
 Employing active listening skills to pick up on inconsistencies or
nonverbal cues.

3. Instrumentation: Instrumentation refers to the use of specialized tools and


technologies to collect and analyze evidence. This can include fingerprint
dusting kits, DNA analysis equipment, digital forensics tools for examining
electronic devices, and lie detector tests (although the latter's accuracy is
debated).

Process: Utilizing instrumentation involves:

 Selecting the appropriate tools based on the nature of the evidence


and the crime scene.
 Working with forensic experts to analyze and interpret the data
collected from the tools.
Content of the Investigation Format
1. AUTHORITY
2. MATTERS TO BE INVESTIGATED
3. FACTS OF THE CASE
4. DISCUSSION
5. CONCLUSION
6. RECOMMENDATION

11 GENERAL ORDERS
1. TO TAKE CHARGE OF MY POST AND ALL COMPANY PROPERTIES IN VIEW
AND PROTECT/PRESERVE THE SAME WITH UTMOST DILIGENCE;

2. TO WALK MY POST IN A MILITARY MANNER, KEEPING ALWAYS ON THE


ALERT AND OBSERVING EVERYTHING THAT TAKES PLACE WITHIN SIGHT
OR HEARING;

3. TO REPORT ALL VIOLATIONS OF ORDERS I AM INSTRUCTED TO


ENFORCE;

4. TO RELAY ALL CALLS FROM POST MORE DISTANCE FROM THE GUARD
HOUSE WHERE I AM STATIONED;

5. TO QUIT MY POST ONLY WHEN PROPERLY RELIEVED;

6. TO RECEIVE, OBEY, AND PASS UNTO THE RELIEVING GUARD ALL


ORDERS FROM THE COMPANY OFFICERS OR OFFICIAL, SUPERVISOR,
POST-IN-CHARGE, AND OR SHIFT LEADERS;

7. TO TALK TO NO ONE EXCEPT IN LINE OF DUTY;

8. TO SOUND OR CALL THE ALARM IN CASE OF FIRE OR DISORDER;

9. TO CALL MY SUPERIOR OFFICER IN ANY CASE NOT COVERED BY


INSTRUCTIONS;

10. TO SALUTE ALL COMPANY OFFICIALS, SUPERVISORS IN THE AGENCY,


RANKING PUBLIC OFFICIALS, ALL OFFICERS OF THE PNP, AND ALL
COMMISSION OFFICERS OF THE AFP;
11. TO BE SPECIALLY WATCHFUL AT NIGHT AND DURING THE TIME OF
CHALLENGING TO CHALLENGE ALL PERSON ON OR NEAR MY POST AND
TO ALLOW NO ONE TO PASS OR LOITER WITHOUT PROPER AUTHORITY.
Basic Equipment of a Security Guard

1. Prescribed Basic Uniform

2. Nightstick/baton

3. Whistle

4. Timepiece (synchronized)

5. Writing pen

6. Notebook and duty checklist (electronic or not)

7. Flashlight

8. First Aid Kit

9. Service Firearms (as required)

Four (4) Types of Classified Matters

1. TOP SECRET (green color code) – is any information and materials, the
unauthorized disclosure of it would cause exceptionally grave damage to the
nation, politically, economically, and military operation.

2. SECRET (red color) – is any information and material, the unauthorized


disclosure of it would endanger national security, cause serious injury to the
interest and prestige of the nation of any government activity, or be of great
advantage to a foreign country.

3. CONFIDENTIAL (blue color code) – is any information or material, the


unauthorized disclosure of it would be prejudicial to the interest and prestige
of the national or governmental activity or would cause administrative
embarrassment or unwanted injury to and be of advantage to a foreign
country.

4. RESTRICTED (white or no color) - is any information and material that


requires special protection other than those determined confidential, secret,
and top secret.

You might also like