Module II Security Laws, Education, Investigation and Training
Lesson I Three Major Types of Security
Communication System
- In any plant or industrial complex, inter and intra communications is indispensable not only in security work
but also in the plant operation itself. It is a good management policy that security should have its own communication
lines to the officers within the installations and to the outside.
-The security force needs a communication landline to call local law enforcement agencies, the fire
departments, ambulance, mobile patrol and other governmental agencies, the telephone is also needed to contact the
agency main office or security force outposts. The following are some means of communication that can be a useful part
of the protective system.
1. Local telephone exchange
2. Commercial telephone service
3. Inter-communications
4. Two-way radios for security
5. Security supervising system
6. Paging and recall system
7. Megaphones
8. Loudspeaker system
Document and Information Security -Security involving the protection of documents and information from loss, access
by unauthorized persons -prescribes the policies and establishes the standard basic procedures governing the
classification and security of official matter.
General Principles
1. The authority and responsibility for the preparation and classification of classified matter rest exclusively with the
originating office.
2. Classified matter should be classified according to content and not the classification of the file in which they are held
or of another document to which they refer.
3. Classification should be made as soon as possible by placing the appropriate marks on the matter to be classified.
4. Every individual whose duty allows access to classified matter is responsible for the protection of the classified matter
while it is in his/her possession and shall insure that dissemination of such classified matter is on the “need to know”
basis and to “property cleared personnel only.
Definition of Terms:
Document- Any material that contains marks, symbols, or signs, either visible, partially visible or completely invisible that
may be presently or ultimately convey a meaning or message to someone.
Document Security- it involves the protection of documents and classified papers from loss, access by unauthorized
persons, damage, theft and compromise through disclosure.
Classify – refers to the act of assigning to information or material one of the four security classification categories after
determination has been made that the information requires the security protection as provided for in the regulation.
Classified Information- in includes all information concerning document, cryptographic devices developed projects and
materials following on the categories of Top secret, confidential, restricted, secret, and unclassified.
Classified Matter- It refers to any information or material in any form or of any nature, the safeguarding of which is
necessary in the interest of security, and which is classified for such purpose by the responsible classifying authority.
Declassify- the act of removing the security classification from classified information or matter.
Reclassifying or Regarding- it refers to the act of changing the assigned classification from classified information or
matter.
Upgrading- it refers to the act of assigning the information or matter to the higher classification than that previously
assigned to it.
Unauthorized- it refers to any person not authorized to have access on classified matters.
Compromise- this takes place through the loss of security which results from unauthorized persons obtaining knowledge
of classified matters.
Damage to National Security- it refers to the prejudice, embarrassment or injury to the country resulting from act or
omission.
Security clearance – Is an administrative determination that an individual is eligible from a security standpoint for access
to classified matter of a specific category.
Compartmentation – Refers to the grant of access to classified matter only to properly cleared persons when such
classified information is required in the performance of their official duties and restricting it to specific physical confine
when feasible.
Need to know – term given to the requirement that the dissemination of classified matters be limited strictly to those
persons whose official duties require knowledge thereof.
Classification of Documents:
•Memorandum Circular No. 196, dated 07/19/1968 (Security of Classified Matter in government offices.)
1. Top secret – any information and material, the unauthorized disclosure of which would cause exceptionally grave
damage to the nation, politically, economically, or militarily.
2. Secret- any information and material, the unauthorized disclosure of which would endanger national security, cause
serious injury to the interest or prestige of the nation or any governmental activity.
3. Confidential – any information and materials, the unauthorized disclosure of which would be prejudicial to the
interest or prestige of the nation or governmental activity or would cause administrative embarrassment or unwarranted
injury.
4. Restricted – any information and material which requires special protection other than those determined to be
Confidential, Secret, and Top-Secret matters.
Method of Transmission:
1. By direct contact of officer or personnel concerned.
2. By official courier.
3. Electrical means in cryptographic form
4. Registered Mail
Destruction:
1. Burning
2. Shredding
Storage - shall be in a safe, steel filing cabinet with built in dial type combination lock of such weight, size and
construction as to minimize the possibility of physical theft or damage to fire.
Operational Security – part of physical security that deals primarily with the protection of processes, formulas, patents,
and other industrial and manufacturing activities from espionage, infiltration, loss, compromise, or photocopying.
Information Cycle:
1. The Creation – Information is discovered and develop.
2. Classification
3. Used – Some action is taken with the information.
4. Storage
5. Retrieval – Stored for future use.
6. Transfer – transferring of information from active to inactive use.
7. Disposition – decision may be made to retain the information indefinitely.
Purpose of Protecting Classified Matters:
1. Deter and impede potential spy.
2. Assist in security investigations by keeping accurate records of the moments of classified materials.
3. Enforce the use of “need to know” principle.
Two kinds of documents:
1. Personal- letters, diary, and notebooks. They should be treated usually the same with official document.
2. Official- orders, manuals, letters, overlays, maps, and magazines. You may be careful and follow the chain of command.
Records and Documents Protection
A. Categories of Documents
1. Class I- vital records- includes records that are liable records of which reproduction does not have the same value as
the original, records needed to recover cash to replace buildings, equipment, raw materials, finished products and
records needed to avoid delay in restoration of production, sales, and services.
2. Class II- Useful records-includes records which loss might cause inconvenience but could be readily replaced and
which would not in the meantime present an obstacle to the prompt restoration of the business.
3. Class III-Important records- includes record of the reproduction of which will involve considerable expense and labor
or considerable delay. Operating and statistical records belong to this class as well as those to maintain checking on
efficiencies, operating costs, etc. Also included are contracts, customer credit files, sales records, designs in process
development, records of experiments in progress etc.
4. Class IV- Non-Essential Records- this are the daily files, routine in nature so that even if it lost or destroyed, it will not
affect the operation or the administration.
Three Document Security Concepts:
1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel conscious and realize the value of document.
3. Training is necessary for the malpractice of the “need to know” principles.
Categories of Storage Containers
1. Class 1. Commercial records safes designed form fire protection.
2. Class 2. Commercial money safes designed for robbery and burglary protection.
3. Class 3. Security cabinets designed to meet specifications for safeguarding.
Rules for Classification of Documents:
1. Documents shall be classified according to their content.
2. The overall classification of a file or of a group of physically connected therein. Pages, paragraphs, sections, or
components thereof may bear different classification. Documents separated from file or group shall be handled in
accordance with their individual classification.
3. Transmittal of documents or endorsements which do not contain classified information, or which contain information
classified lower than that of the preceding element or enclosure shall include a notation for automatic downgrading.
4. Correspondence, indexes, receipts, reports of possession transfer or destruction, catalogs or accession list shall not be
classified if any reference to classified matter does not disclose classified information.
5. Classified matter obtained from other department shall retain the same original classification.
Protection of Sensitive Information
-Propriety information is information that in some special way relates to the status or activities of the
possessor and over which the possessor asserts ownership. In the business community, propriety information relates to
the structure, products, or business methods of the organization. It is usually protected in some way against causal or
general disclosure.
-All propriety information is confidential, but not all confidential information is propriety. For example,
confidential personnel data in employees file is not considered a propriety although the company treats it as
confidential.
Proprietary Information - information which some special way is related to the status, operations, or activities of the
possessor over which the possessor asserts ownership.
Kinds of Sensitive Information:
Trade Secrets - It may consist of any formula, pattern, device, or compilation of information which is used in one’s
business and which gives one opportunity to gain an advantage over competitors who do not know or use it.
Patent -A grant given by the government to an inventor, conveying and securing to him the exclusive rights to make, use
and sell his invention for term of twenty (20) years.
Propriety Information Protection Program
- Realizing that the most serious threats to trade secrets is the employee, a measure of protection is often
realized using employee agreements which restricts the employee’s ability to disclose information without specific
authorization to the company. The following countermeasure may be adopted:
1. Policy and procedures statements regarding all sensitive information.
2. pre-and post-employment screening and review.
3. non-disclosure agreements from employees, vendors, contractors, and visitors.
4. Non-competitive agreements with selected employees
5. Awareness programs
6. Physical security measures
7. Informed monitoring of routine activities.
Threat to Protection of Sensitive Information
Competitive Intelligence – systematic program for gathering and analyzing information about competitor’s activities and
general business trends to further company’s goals.
Types of Competitive Intelligence:
1. White – information available from company publication, public records, or commercial reporting sources.
2. Gray – not readily available but which is usually can be obtained without acquiring any civil/criminal liability in the
process.
3. Black – obtained through clearly unethical or illegal means.
Communication Security – is the protection resulting from the application of various measures which prevent or delay
the enemy or unauthorized persons in gaining information through the communication system. This includes:
a. Transmission Security – component of communications security which results from all measures designed to protect
transmission from interception.
b. Cryptographic Security – results from the provisions of technically sound crypto-system and their proper use.
c. Physical Security – providing safeguards to equipment and material from access by unauthorized persons.
Threats in Communication Security:
1. Wiretapping - is the monitoring of telephone conversations by a third party, often by covert means.
2. Bugging – means to secretly listen to or record a conversation using a hidden electronic device.
3. Eavesdropping (unauthorized listening)- is the unauthorized real-time interception of a private communication, such
as a phone call, instant message, videoconference, or fax transmission.
Personal Security - Protection of personnel especially ranking official from any harm, kidnap, and others act. VIP
security is type of personnel security.
Police Security Protection Group (PSPG) - is mandated by law to provide protective security to government officials,
foreign dignitaries, and private individuals authorized to be given protection and provide physical security to vital
installations and assist the Presidential Security Group (PSG) in securing the President and the members of the First
Family.
Protective Custody - state or quality of being secured or freed from danger. It may also include the various means or
device designed to guard a persons and property against a broad range of security hazard.
Bank Security - a specialized type of physical security protecting the assets, personnel, and operation of a bank, with
special emphasis on the precaution and measures to safeguard the cash and assets while in s storage, in transit, and
during transaction.