Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
22 views5 pages

Lea 3 Module

The document outlines the procedures and criteria for personnel security, including investigations to determine employee suitability and retention. It details various types of background checks, investigative standards, and the importance of security surveys and planning to ensure organizational safety. Additionally, it defines key terms related to security, such as threat assessment and protective custody.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views5 pages

Lea 3 Module

The document outlines the procedures and criteria for personnel security, including investigations to determine employee suitability and retention. It details various types of background checks, investigative standards, and the importance of security surveys and planning to ensure organizational safety. Additionally, it defines key terms related to security, such as threat assessment and protective custody.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

PERSONNEL SECURITY

Refers to the procedure followed, inquiries conducted, and criteria applied to determine the work
suitability of a particular application or the retention of a particular employee.
PURPOSE
1. To ensure the hired employees are best suited to assist the organization in achieving its mission
and vision;
2. To assist in providing the necessary security to the employees while they carry out their
functions.
PERSONNEL SECURITY INVESTIGATION (PSI) – It is an inquiry into the character, reputation,
discretion, integrity, morals, and loyalty of an individual in order to determine a person’s suitability for
appointment or access to classified matter.
TYPES OF PSI
1. National Agency Check
2. Local Agency Check
3. Partial Background Investigation
4. Complete Background Investigation
BACKGROUND INVESTIGATION (BI) - It is an inquiry which aims to verify applicant's information
written at the applicant’s form, to ascertain his/her past employment experiences and to obtain other
information pertinent to the decision to employ.
FACTORS TO BE CONSIDERED IN THE CONDUCT OF BI
Loyalty - faithful allegiance to the Philippine government and its duly constitutional authorities;
Integrity - uprightness in character, soundness of moral principle, freedom from moral delinquencies.
Discretion - the ability or tendency to act or to decide with prudence, the habit of wise judgment;
Morals - distinctive identifying qualities which serve as an index to the essential or intrinsic nature of
a person
Character - the sum of traits that have been impresses by nature, education and habit upon the
individual
Reputation - opinion or estimation in which one is generally held. It is what a person is reported to
be whereas character is what a person is.
Components of Complete Background Investigation
1. Applicants Name
2. Date of Birth
3. Present residence address
4. Personal History
5. Marital history
6. Residence History
7. Citizenship
8. Physical Data
9. Educational History -
10. Organizational Membership
11. Neighborhood Investigation
12. Character Reference
13. Employment History
14. Military History
15. Foreign travel history
16. Criminal record -
17. Credit records
18. Applicant’s signature
19. Date of application

TYPE OF LOCAL AGENCY CHECK (LAC)


A. Barangay Clearance
B. City of Municipal Clearance
C. Local Police Clearance
D. Court Clearance
TYPES OF NATIONAL AGENCY CHECK (NAC)
a. NBI Clearance
b. PNP Directorate for Intelligence (DI) Clearance
c. Intelligence Service, AFP (ISAFP) Clearance

Prowling
Is the process whereby a subject's reaction in a future critical situation is predicted by observing
his behavior or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty
test.
Deception Detection Techniques
This process of using devices in detecting deception during the interview stage. This includes
the use of a polygraph, Psychological Stress Evaluator and Voice Analyzer.
Financial and lifestyle inquiry
This type of investigation seeks to gather information of income and mode of living, sometimes
referred to as the earning-to-debt ratio.
Undercover Investigation
This is the placement of an agent in a role in which the agent's true identity and role remains
unknown, in order to obtain information for Criminal persecution or for recovery or limitation of asset
losses.
INVESTIGATIVE COVERAGE
1. Prior Employment;
2. Claimed education;
3. Claimed residence for the period covered in the employment and educational institutes;
4. If the candidate indicates a criminal record, then the details should be checked.
INVESTIGATIVE STANDARDS
1. Information sought should be relevant;
2. Information should be reliable;
3. If unfavorable, the information should be confirmed by at least two sources.
SECURITY SURVEY
- A fact-finding probe to determine a plant's adequacy in all aspects of security, with the
corresponding recommendations.
- Refers to checklist, audits, or inventories of security conditions.
- -often called 'RISK ANALYSIS SURVEYS' or 'RISK ASESSMENT SURVEYS
PURPOSES OF SECURITY SURVEY:
1. To determine the existing state of security;
2. Identifying weaknesses in defense;
3. To determine the degree of protection required;
4. To produce recommendations for a total security systems.
Note: The survey should be undertaken by trained staff security personnel, or a independent security
specialist. No universal checklist can be applied to all sites for survey purposes, as no two facilities are
alike.
Phases of Security Education Program
1. Initial Interview - it is the first contact of the prospective employee wherein the interviewer
determines the suitability of the applicant for employment through his given answers on the different
type of questions being conducted. It is in this stage in where the interviewer may start providing the
necessary information as to the overview of company security policies and at the same time on the
employee accountability and corresponding penalties that could result from violation there from.
2. Orientation and Training - it is in this stage where new employees received detailed presentation
personnel security policy. Usually, handout employees manual is distributed for reference. New
employees also requested to sign acknowledgement that they have been aware of the existing company
policies and will abide the same.
3. Refresher Conference - it is designed to remind employees of the company about their
responsibilities, review the guidelines and policies, introduction of new policies and regulations and a
movement of getting employees feedback about the company policies that is being implemented.
4. Security Reminders - this employed as an indirect approach of educating the employees, such as
posting security poster and distributing fliers.
5. Security Promotion - it is the act of emphasizing the importance and role of security achieving
the company goals and objectives. It involves security employee cooperation and support.
BEFORE COMMENCING A SECURITY SURVEY
1. Written authority should be obtained from proper authority.
2. Previous surveys should be reviewed;
3. An orientation tour should be made;
4. Photographs should be taken of things which will be difficult to describe in a report.
After completing the survey an immediate review of the findings should be undertaken with the plant
supervisor so that urgent deficiencies can be addressed.
• A follow-up survey should always be conducted to ensure improvements.
• Any survey report including lists of recommendations is incomplete without including a cost-
benefit analysis.
Cost-Benefit Analysis- a direct comparison of the cost of operation of the security unit and all the
existing security measures with the amount of the corporate assets saved or recovered as well as
reduction of losses caused by injuries and lost production and recommendations have been made"
PLANNING-Process of developing methods or procedures or an arrangement of parts intended to
facilitate the accomplishment of a definite objective.
-The process of setting goals, developing strategies, and outlining tasks and schedules to accomplish
the goals.
SECURITY PLANNING
It is PRE-DETERMINING a course of action;
It is deciding IN ADVANCE what to do, how to do it, and who is to do it.
GOALS OF SECURITY PLANNING
• To minimize effects of any incident upon plant and personnel;
• To keep property and equipment loss at a minimum;
• To ensure cooperation of all plant departments charged with specific activities of an emergency;
• To ensure appropriate cooperative action by and with outside civic and government agencies.
KEY STEPS IN PLANNING
1. Get in touch/coordinate with your Local Civil Authorities. (Tie your programs with theirs and
standardize equipment with them thus creating compatibility.);
2. Visit neighboring Plants/offices (coordinate your activities with theirs.);
3. Survey your plant for possible hazards and take immediate action to lessen or eliminate them;
4. Appoint a disaster Director or Disaster coordinator;
5. Early in the planning stage, present the Program to your Employees and enlist their active support;
6. Call an organization meeting of Heads of services, employee representatives and key personnel. (out
line purpose of the program and explain how the plant should organize for protection;
7. Define the Program.
TESTING THE PLAN
Benefits in testing the plan
• Deficiencies will be uncovered
• People involved in the implementation of the plan will receive valuable training.
TWO TYPES OF TESTING THE PLAN
• Partial (be elements);
• Complete (entire organization)
KEEPING THE PLAN UP TO DATE
• Changes in Personnel and Facilities
SECURITY EDUCATION- defined as the exposure and teaching of employees on security and its
relevance to their work. Security education is conducted to develop security awareness among
employees of the company. It should cover all employees, regardless of rank or position.
PERSONAL SECURITY - Protection of personnel especially ranking official from any harm, kidnap,
and others act. VIP security is type of personnel security;
POLICE SECURITY PROTECTION GROUP (PSPG) - is mandated by law to provide protective
security to government officials, foreign dignitaries, and private individuals authorized to be given
protection and also provide physical security to vital installations, and assist the Presidential Security
Group (PSG) in securing the President and the members of the First Family.
PROTECTIVE CUSTODY - state or quality of being secured or freed from danger. It may also includes
the various means or device designed to guard a persons and property against a broad range of security
hazard.
THREAT -an indication of something impending and usually undesirable or unpleasant, with an
intention to inflict evil, injury or damage on another. It is an expression of an intention to inflict loss or
harm on another by illegal means.
THREAT ASSESSMENT - the process of investigation/validating the truthfulness of the existence of
threat to an individual.
EMERGENCY SITUATION - condition or state that danger has already occurred which resulted to
loss of life/liberty and/or there is imminent danger or threat to life and property where delay will
endanger or may cause the loss of life/property
OTHER DEFINITION OF TERMS
1. Access List - authenticated list of personnel given to the security allowing entry to a compound
or installation or part thereof;
2. Controlled Area - an area near or adjacent to limited or exclusive areas where entry is
restricted;
3. Dry-run - practical test or exercise of plans or any activity to test its validity, an operational
readiness exercise;
4. Duress Code - type of code system so that security personnel or any employee when forced by
armed men intending to enter an installation can fire alarm by the use of certain words in casual
conversation with personnel in the installation.
5. Exclusion Area - a restricted area containing materials or operation of security interest;
6. Restricted area - any area access to which is subject to special restriction control;
7. Security Hazard - Is any act or condition, which may result in the compromise of information,
loss of life, loss or destruction of property or disruption of objectives of the installation.

You might also like