100% found this document useful (1 vote)
311 views22 pages

Procedure in The Opening of The Bank, During and After Banking Hours

The document outlines procedures for security personnel at banks and during armored vehicle services. It discusses the opening and closing of bank branches, the duties of security guards during banking hours, and escort procedures for armored vehicles during deposit pick-ups. Requirements are also provided for private security agencies, including qualifications for operators, managers, and consultants. Security personnel ranks and typical staffing patterns are defined.

Uploaded by

algie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
311 views22 pages

Procedure in The Opening of The Bank, During and After Banking Hours

The document outlines procedures for security personnel at banks and during armored vehicle services. It discusses the opening and closing of bank branches, the duties of security guards during banking hours, and escort procedures for armored vehicles during deposit pick-ups. Requirements are also provided for private security agencies, including qualifications for operators, managers, and consultants. Security personnel ranks and typical staffing patterns are defined.

Uploaded by

algie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Procedure in the Opening of the Bank, during and after

banking hours

Procedure in the Opening of the Bank, during and after banking hours.

1. Opening of the Bank


2. A bank employee ( key custodian) should be accompanied by security guards upon opening of the
branch.
3. Before opening, security guard should inspect the branch vicinity if there is any signs of intrusion.
4. If there is a sign of intrusion, do not open the branch, contain the area, inform the bank security
department and call the nearest police station.
5. If there is no sign of intrusion, one security guard wilm accompany the Bank employee in the opening
of the branch main door and inspect the bank premises.
6. The remaining Security guard shall remain outside of the branch to monitor the area. If there is
untoward incident occurred to the bank employee and security guard while inside the branch, the
guard positioned outside the branch, should immediately call the nearest police station.
7. Security guard should turn over their personal cellular phone to the authorized bank employee before
the start of their tour of duty. The same will be returned to them after the tour of duty.
8. At couple of minutes before banking hours, one security guard should position outside the branch to
monitor the people and vehicles in the area.

During banking hours

1. Security guard should be alert for unsual and suspicious activities at all times.
2. They should not be task to carry money bags, or trays, count money nor run personal errands for
others while on duty.
3. The security guard should conduct proper frisking to all client entering the bank.
4. Security guard should advise clients on firm but courteous manner not use cellular phone while inside
the branch premises. Also they should advise clients wearing dark eyeglasses and cap to remove the
same.
5. Firearms should not be allowed inside the branch, even members of the law enforcement agencies,
except when bank officers authorized the entry of firearms.

1. After Banking hours.


2. if the vault is still open, there should be at least two security guards present at the branch.
3. the security guard should not allow entry of clients or any other persons unless there is instruction
from the bank officer.
4. if the vault is already closed but there is still employee in the branch, one security guard shall remain.
5. the security guard and the last employee before leaving the bank shall ensure that the alarm is
armed, all doors and windows are locked, and all electronic equipment are unplug, except those that
are required to be operational 24/7.
Armored Escorting Procedure during Deposit-Pick UP Services

1. before the start of the tour of duty, escort guards should turn over their personal cellular phone to the
designed employee for safekeeping. The cellular phone shall be returned to them after the tour of
duty.
2. Security escorts should always wear vest and helmet (if possible by the agency)
3. Always observe gun safety rule.
4. Armored crew should observe a couple of minutes before loading and unloading of cash valuable.
5. Upon arrival to the destination, escort guards should observe the area. After ascer taining that the
area is secured, the Team Leader shall be the first man to alight from the armored car .
6. the team leader should also observe people and check the vehicles (tinted, engine running, people on
board) within the bank vicinity.
7. During loading and unloading, the driver should stay inside the armored car and observe the area.
8. If the area is found secured, the Team Leader shall give signal to the escort guards to unload the cash
valuables.
9. The remaining escort guards shall alight from the armored car and positioned themselves in the safe
and advantage position
10. During unloading, the teller (together with cash valuables) shall be the first man to alight from the
armored car, while in loading he (together with cash valuables) shall be the first man to board.
11. During loading and unloading of cash valuables, the armored car and escort should be positioned
near the access door.
12. If the area is found secured, the team leader shall give signal to the teller to load the cash valuables.
13. In case of mechanical problem, or flat tire, etc., do not open the armored vehicle, wait for the rescue
vehicles
14. In case of robbery, the driver should have presence of mind to get out the armored van in the killing
zone immediately
Chapter 8.

Security Management and Administration

Who may organize and maintain Private Security Agency and Private Detective Agency?

Any Filipino citizen or corporation, association, partnership, and one hundred percent of which is
owned and controlled by Filipino Citizens.

Basic requirements of an Operator or Manager of Security Agency.

1. Filipino citizen
2. Not be less than twenty five (25) years of age;
3. College graduate and/or a commissioned officer in the inactive service or retired from the AFP or PNP
4. Has taken a course/seminar on industrial security management and/or must have adequate training or
experience in security business, and
5. Good moral character.

Limitations, Disqualification and Prohibitions

1. No person shall organize or have an interest in more than one agency;


2. Elective or appointive government employees who may be called upon on account of the functions of
their respective offices in the implementation and enforcement of the provisions of RA.5487 as
amended and its implanting rules and regulations, and any person related to such government
employee by affinity or consanguinity in the third civil degree, shall not interest, directly or indirectly,
in any security or watchman agency; and
3. No agency shall offer, render or accept services in gambling dens, or other illegal establishments or
enterprises.

Qualifications of Security Consultant

1. Filipino citizen
2. Physically and mentally fit
3. Holder of Masters Degree in either in criminology, public administration. MNSA, Industrial Security
Administration, or Law and
4. Must have at least ten (10) years experience in the operation and management of security business.

Security Personnel Ranks, Positions, Staffing Pattern and Job Description

1. Security Management Staff


2. Security Director (SD) – agency manager/chief security officer – responsible for the entire operation
and administration/management of the security agency.
3. Security Executive Director (SED). Assistant Agency Manager/Assist. Chief Security Officer – assist
the security director
4. Security Staff Director (SSD). Staff Director for Operation and Staff Director of Administration.

The Staff Director for Operation – assistant of the security manager for the efficient operation of the
agency.

The Staff Director for Administration – is the staff assistant of the agency manager for the effective
and efficient administration and management of the agency

1. Security Staff Director for Training. Staff in charge for Training – responsible for the training of the
Agency’s security personnel

2 .Line Leadership Staff

1. Security Supervisor 3. Detachment commander – is the field area commander of the agency;
2. Security Supervisor 2. Chief inspector – responsible for inspecting the entire area coverage by the
detachment; and
3. Security Supervisor 1. Inspector - responsible for the area assigned by the Chief Inspector or the
Detachment Commander

1. Security Guard
2. Security Guard 3. Post in-charge – responsible for the entire detailed security office within a certain
establishment.
3. Security Guard 2. Shift in-charge – responsible for the security officers who are scheduled in a certain
shift for a particular period.
4. Security Guard 1. Watchman/Guard – the one actually posted as watchman and or guard.

Staffing Pattern
1. The manager is automatically the Security Director who shall be responsible for the entire operation
and administration/management of the security agency. He shall be the authorized signatory to all
Duty Detail Order, and all other documents and communicat ions pertinent to the operation and
management of a security agency.
2. The Security Agency shall appoint a Staff officer as Security Training Officer, who shall be
responsible for the training of the Agency security personnel in accordance with the requireme nts of
RA. 5487 and the IRR. The Training Officer shall be licensed as a Security Officer and likewise
accredited as such by the Training and Education Branch, SOSIA;
3. The Staff Director for Operation is the staff assistant of the security manager for the efficient
operation of the agency. This position includes the responsibility to canvass clientele and the
implementation of contract and agreement. He also responsible for the conduct of investigation and
the conduct of training.
4. The Staff Director for Administration is the staff assistant of the agency manager for the effective and
efficient administration and management of the agency.
5. The Detachment Commander is the field or area commander of the agency. The Detachment shall
consist of several posts.
6. The Chief Inspector shall be responsible for inspecting the entire area covered by the detachment;
7. Security Inspector is responsible for the area assigned by the Chief Inspector of the Detachment
Commander;
8. Post in charge is responsible for the entire detailed security office within a certain establishment;
9. Shift in charge is responsible for the security officers who are scheduled in a certain shift for a
particular period;
10. Security guard is the one actually posted as watchman and or guard.

Note; Security Agency operator/manager/owner can put its own staffing pattern provided it is
considered with the provisions of IRR of RA.5487.

License to Operate (LTO)

1. All licenses to operate have a validity of two (2) years. Temporary License to Operate is aut omatically
cancelled upon expiration.
2. All applications for renewal of License to operate (LTO) shall be filed at least sixty (60) days before
the expiry date of LTO.
3. No application shall be approved unless a certification is issued by FED -CSG to the effect that all
licenses of firearms of the agency are updated during the validation of the renewed License to
Operate.
4. Regular License to Operate – issued to private security agencies having obtained and maintained in
its employ at least two hundred (200) hundred personnel, and to company guard forces and private
detective agencies having obtained and maintained in its employ at least thirty (30) security
personnel and detectives.
5. Temporary License to Operate – initial and conditional issuance to new private security agencies and
to private security agencies holding regular License to operate not able to maintain the minimum
number of security personnel.
6. Renewal applicants/holders of regular license to operate not able to maintain the 200 minimum
numbers of security personnel, shall be reverted to temporary status and will be issued temporary
License to Operate.
Numbers of Security Personnel to be maintained to secure Regular License to Operate.

1. Private Security Agency – minimum of two hundred (200) licensed private security personnel and a
maximum of one thousand
2. Company Guard Force/Private Detective Agency – minimum of thirty (30) and a maximum of one
thousand (1000).

License and Fees

1. New applicants to operate shall be required to obtain a minimum capitalization of P1 million with
minimum bank deposit of P500 thousands in order to start its business operation.
2. All private agencies must be registered at the Security and Exchange Commission (SEC) and
Department of Trade Industry (DTI)

Surety Bond – this bond shall answer for any valid and legal claims against the agency filed by aggrieved
party.

1. Agency with 1-199 guards – P50, 000.00


2. Agency with 200-499 guards – P100, 000.00
3. Agency with 500-799 guards – P150, 000.00
4. Agency with 800-1000 guards – P200, 000.00

Terms use d in VIP Security

Terms use d in VIP Security

1. Protective Custody – it is the state or quality of being secured of freed from danger. It may also
include the various means or device designed to guard a persons and property against a broad range
of security hazard.
2. Threat – it is an indication of something impending and usually undesirable or unpleasant, with an
intention to inflict evil, injury or damage on another, usually as retribution or punishment for
something done or left undone.

It is an expression of an intention to inflict loss or harm on another by illegal means, and especially
by involving coercion or duress over the person or his welfare.

1. Threat Assessment – it is the process of investigation/validating the truthfulness of the existence of


threat to an individual.
2. Emergency Situation – it is a condition or state that danger has already occurred which resulted to
loss of life/liberty and or there is imminent danger or threat to life and property where delay will
endanger or may cause the loss of life/property.
Two types of Barriers in VIP Security

1. Physical
2. Inner –Close in
3. Middle – Military units/Police/other agents of the protective detail
4. Outer – Intel, Medical team, advance team
5. Non-physical screens
6. Barriers for crowd control
7. Barriers around office or residence
8. Technical barriers such as x-rays machine, detector, dog and alarms.
9. ID recognition system

DO’s and DON’T’s in a VIP Security

Do’s

1. Be constantly alert, no matter how monotonous the task


2. Be ready to place yourself between the subject and the threat.
3. Maintain a low-profile, keep your weapons etc. out of sight and remain unobstructive.
4. Do everything possible to resist access to information about the subject to those with a need to
know.
5. Remember, caution is always necessary; for the bodyguard, a problem avoided is much better than a
problem solved, confrontations maybe much, but they are counterproductive to the subjects image
and safety;
6. Learn to watch the hands of anyone near the VIP, eyes can be important too, but hands are the best
indications of hostile intent.;
7. At the first sign of trouble, if possible, get your principal out of the situation.
8. Be aware of any medical conditions suffered by the VIP and members of the VIP’s family, how to
contact his or her doctor, location of the nearest hospital and how to administer any special
medications.
9. Normally, lead the VIP through doors to the building, lifts, toilets, etc.
10. Be particularly alert whenever in the presence of unknown individuals especially in lifts, corridors,
stairway etc. when possible, try to ensure that a lift contains only the VIP, members of his staff, and
protective security;
11. Whenever possible, make the travel reservations, hotel reservations, restaurant reservations, etc. in a
name other than VIP;
12. Work with local police, hotel security personnel, airport police, and others in authority to make travel
smooth as possible.
13. Remember that majority of terrorist incidents occur when the VIP is in a vehicle. Plan accordingly;
14. Try to prevent the VIP’s vehicle from attracting attention.
15. Make contingency plans (e.g. escape routes, routes to a hospital, emergency numbers, etc.
16. Remember that your job is not to protect life of the VIP, but also his or her private image and self
esteem.
17. Display a professional demeanor and your VIP will be much more likely to listen your advice.
18. Remember that you must be ready to give your life to your VIP, it is better to make the attacker give
his or hers. Practice with your individual weapons until you can shoot under trying circumstances.
19. Even though you must do your job, respect the privacy of the VIP;
20. Protective security has the responsibility to anticipate problems or hazards recognize potential
threatening situations and human threats, investigate areas and persons of concern, and solve or
avoid problems.
21. Protective security must observe proper ethical standards when performing duty ; and
22. Protective security does not stand and fight, take revenge or unduly expose the principal to
dangerous situation.

Don’ts

1. The duties of the protective security shall be confirmed to protective functions and do not include the
use of security details as:
2. security guard, gatekeeper, family driver, errand boy and other similar utility tasks;
3. Employee in the VIP’s business establishment; and
4. An instrument to harass or intimidate other persons
5. The detailed PNP member is prohibited from going with the VIP on a trip outside the country. In such
cases, the security detail shall report back to his/her mother unit within forty eight (48) hours from
the time of departure
6. Protective security must not betray the VIP instead earn his trust.
7. Protective security must not talk to the press, nor give inside information about the VIP.
8. Protective security should make sure that the VIP does not ask them to perform illegal acts.
9. Do not let yourself be distracted from your main mission which is to protect the VIP;
10. Do not leave the VIP unguarded while you are on duty;
11. Do not let your VIP establish a routine that will make him or her easy target;
12. Do your homework, be aware of likely threats to the VIP;
13. Protective security should not forget to pay attention to detail. It is easy to become so wrapped up in
worrying about a terrorist group launching a mass attack that you forget to arrange at the most
secure table in a restaurant;
14. Do not let your guard down no matter how long the threat is;
15. Never sleep or relax when the VIP is in transit. Remember, the risk to a VIP is high while he or she is
in transit;

13 Never bluff with your weapons,

1. Never report for duty unprepared; and


2. Never let your personal problems affect your work. Leave work at work and leave your personal
problems at home.

Bank Security
A type of security deals with the protection of the assets, personnel, and operation of the bank,
particularly in safeguarding cash and assets, during banking hours, while in storage, and in transit.

Security and protection of the bank is being governed by the Bangko Sentral ng Pilipinas (BSP). As such,
BSP issued BSP circular 620 on September 03, 2008, primarily designed to;

1. Promote maximum protection of life and property against crimes (e.g. robbery, hold -up, theft, etc.)
and other destructive causes;
2. Prevent and discourage perpetration of crimes against bank; and
3. Assist law enforcement agencies in the identification, apprehension and prosecution of the
perpetrators of crimes committed against banks.

Required Minimum Security Measures for the Bank

1. Guard System – all banking offices shall be manned by an adequate number of security personnel to
be determined by the bank, taking into consideration its, size, location, costs and overall bank
protection requirement.

Provided, that cash centers shall be manned by an adequate number of security guards as may be
necessary during banking hours.

Cash centers - refers to branches which also handles the cash requirements of the other branches of the
same bank.

1. Security devices - banks shall effect the installation, operation and maintenance, as individually
appropriate, of the following security devices in each banking office.
2. Time delay device in the cash vaults/ safe;
3. Lighting system for illuminating the area around the vault, if the vault is visible from outside the
banking office
4. Tamper-resistant locks on exterior doors and windows
5. Robbery alarm system or other appropriate device for prompt notifying the nearest law enforcement
office either directly or through an intermediary of an attempted, ongoing or perpetrated robbery.
6. Anti-burglary or intrusion system capable of directing promptly an attack on the outer doors,walls
floor or ceiling of the bank premises, including the vaults ;and
7. Such others devices like close circuit television (CCTV) and video recording system appropriate to
deter the commission of bank crimes and assist in the Identification and apprehension of the culprits.

In the installation of CCTV and video recording system, the bank shall consider the
incidence of crime in the area,the amount of currency and other valuable exposed to robb ery, the distance of
banking office from nearest law enforcement office and the cost of security devices. In the event that there is
an ordinance issued by local government fir the installation of CCTV, Bank in that locality is mandated to
install CCTV system.

1. Vaults and Safes - vault walls, ceiling and floors, shall be made of steel-reinforced concrete or such
other equally safe materials specifications.
Vault door shall be made with steel or other drill and torch resistant material, equipped with a dual
combination lock and time-delay devices,and provided with inner and outer grill doors.it shall be also with a
breathing/breathing ventilation's devices and emergency button capable of giving audible and visible signal in
case of accidental lock-up.

Safe should be sufficiently heavy or be securely anchored to the premises where located. The door shall be
equipped with a combination lock with a time-delay devices if used for safekeeping cash and other valuables.
The body shall consist of steel with an ultimate tensile strength of 50,000 pounds per square inch or the
equivalent in metrics system.

1. Armored car operation - all armored vehicles shall be built with bullet-resistant materials capable of
withstanding the firepower of high-powered firearms. Ex. M16, M14 rifles

Armored vehicles shall be equipped with a vault or safe or a partition wall with a combination lock designed
to prevent retrieval of the cargo while in the transit. When in used the armored vehicles shall be provided
with at least two (2) armed guards and its operation must be supervised by at least two officers of the bank.

All canvass bags that contain cash and other items of value shall be provided with padlock for security and
control purposes.

Communication, VIP and Bank Security

Chapter 7

Communication, VIP and Bank Security

Communication Security

It is the protection resulting from the application of various measures which prevent or delay the enemy
or unauthorized persons in gaining information through the communication system. This includes

1. Transmission Security - component of communication security which results from all measures
designed to protect transmission of information from interception.
2. Cryptographic Security - results from the provisions of technical sound crypto-system ans their
proper used.
3. Physical Security - providing safeguard to equipment and material from access by unauthorized
persons.
Threats in communication security

1. Wiretapping - is the monitoring of telephone conversation by a third party, often by covert means.
2. Bugging - means to secretly listen to or record a conversation using a hidden electronic device.
3. Eavesdropping ( unathorized listening) - is the unauthorized real-time interception of a private
communication, such as phone call, instant message, videoconference or fax transmission.

Law That Prohibit Wiretapping

Republic Act 4200, approved on June 19, 1965

An act to prohibit and penalize wiretapping and other related violations of privacy of communication,
and other purposes.

Unlawful Acts under Republic Act no. 4200

1. To tap any wire or cable, or by using any other device or arrangement, to secretly overhear, intercept,
or record any private communication or spoken word by using a device commonly known as a
Dictaphone or dictagraph or walkie-talkie or tape recorder.
2. To knowingly possess any tape record, wire record, disc record, or any other such record, or copies
thereof, of any communication or spoken word secured or to reply the same for any other person or
persons; or to communicate the contents thereof, either verbal or in writing, or to furnish
transcriptions thereof, whether complete or partial, to any other person.

Provided: that the use of such record or any copies thereof as evidence in any civil, criminal
investigation or trial of offenses mentioned in section 3 hereof, shall not be covered by this prohibition.

Section 3 of Republic Act no. 4200

Nothing contained in this Act, however, shall render it unlawful or punishable for any peace officer, who
is authorized by a written order of the court, to execute any of the acts declared to be unlawful in the two
preceding sections in cases involving the crimes of treason, espionage, provoking war and disloyalty in case of
war, piracy, mutiny in the high seas, rebellion, conspiracy and proposal to commit rebellion, inciting to
rebellion, sedition, conspiracy to commit sedition, inciting to sedition, kidnapping as defined by the Revised
Penal Code, and violations of Commonwealth Act no. 616, punishing espionage and other offenses against
national security.

Authority to Conduct Wiretapping


The authorization shall be effective for the period specified in the order which shall not exceed sixty (60)
days from the date of issuance of the order, unless extended or renewed by the court upon being satisfied
that such extension or renewal is in the public interest.

Authorization government agency to issue order to conduct Wiretapping

The court referred to in this section shall be understood to mean the court of first instance(Regional
Trial Court) within whose territorial jurisdiction the acts for which authority is applied for are t o be executed.

Very Important Person Security Operations

Principles of Protection

There must be plans and measures for the purpose of anticipating, preventing, or limiting any action or
situation which might

Endanger the life of the person being protected.

Basic Concept

The establishment of security screen around the subject has an optimum protection for the safety of the VIP.

Philippine National Police – Police Security Protection Group (PSPG)

It is a group of the PNP mandated by law to provide protection security to government officials,
foreign dignitaries, and private individuals authorized to be given protection and also provide physical security
to vital installations, and assist the Presidential Security Group (PSG) in securing the President and the
members of the family first.

Man-made Hazard

. Man-made Hazard – an act or condition affecting the safe operation of a facility caused by human actions,
accidental or intentional. It may be crimes against person or property.
Measures to eliminate or mitigate the full range of potential hazard;

1. Building and protection by means of barrier, fences, walls, and gadgets, protected openings, lighting
and surveillance.
2. Intrusion and access control by means of door and window security, locks and keys, security
containers, visitor and employees identification program, package control, parking security and traffic
control, inspections and security posts and patrol.
3. Alarm and surveillance system to detect unauthorized intrusion attempts and irregularities.
4. Fire prevention and control including evacuation and response programs.
5. Emergency response, crisis management and disaster recovery planning.
6. Prevention of theft and pilferage by means of selecting employees through the use of personnel
screening, pre-employment background investigation, procedural control, screening promotions and
positions of fiduciary responsibilities.
7. Accident prevention and safety program.

The extent of degree Risk to Security is dependent on the following:

1. Relative criticality of Operations – the importance of the firm with reference to the national economy
and security
2. Relative Vulnerability – the susceptibility of the plant or establishment to damage, loss, or disruption
of operation due to various hazards.

Risk Analysis - Is the process of defining and analyzing the dangers to individuals, business, and
organizations posed by potential natural and human-caused adverse event.

Purpose of Risk Analysis

1. Establish a risk picture


2. Compare different solutions and options in terms of risk;
3. Identify factors, conditions, activities, systems, components, that are important with respect to risk
and;
4. Demonstrates, that are important measures on risk.

Risk Options

1. Risk avoidance – it is the first choice of action to be considered. The possibility of eliminating the
existence of criminal opportunity or avoiding the creation of such opportunity is always the best
solution.
2. Risk reduction – when avoiding or eliminating the criminal opportunity conflicts with the ability to
conduct business, the next step is the reduction of the opportunity and potential loss to the lowest
level consistent with the function of the business.
3. Risk spreading – assets that remain exposed after the application of reduction and avoidance are the
subjects of risk spreading. This is the concept that limits loss of potential losses by exposing the
perpetrator to the probability of detection and apprehension prior to the consummation of the crime
through the application of the various security measures.
4. Risk transfer – transfer risks to other alternatives when those risks have not been reduced to
acceptable levels. The two primary methods of accomplishing risk transfer are to insure the assets or
raise prices to cover the loss in the event of a criminal act.
5. Risk acceptance – all remaining risks must simply be assumed by the business as a risk of doing
business. Included with these accepted losses are deductibles which have been made as part of the
insurance coverage.

Chapter 6

Security survey, inspection and investigation

Security Survey

This is a critical on- sight investigation and analysis of a place,which may be an industrial plant,
business,home, public or private institution to ascertain the present security status, identify deficiencies or
excesses, determine the protection needed,and make recommendation to improve the overall security.

In the conduct of security survey, the external and internal complex must be included,as well as the
identification of threats, identify control,level of risk and competed risk assessment.

Purpose of the security survey

1. To determine the existing state of security


2. To determine the weakness in the defense.
3. To determine the degree of protection required
4. To create solution to identified weakness.

Security survey in done on the following circumstances

1. When starting to a business


2. When putting up a new facility
3. When transferring to a new facility or location
4. When there is a major change in organization structure or business direction.
Do' s and don't s in developing survey report

Do's

1. Be honest with your recommendations. You are the expert


2. Call the shots as you see them. Considered the use of simple language-short are best.
3. Be critical, physically tear the property part in your mind as part of the process; and
4. Keep it as simple as possible, but not simpler

Don'ts

1. Don't ever exaggerate your reports. They are too important;


2. Don't inflate the report with maps and floor plans, however, if these plans illustrate vulnerabilities
then they can be very useful ; and
3. Don't repeat your statements

Security Inspection

It is the process of conducting physical examination to determine compliance with the establishment
issued security policies and procedures as a result of security survey.

Security Investigation

It is one of the main functions of any security organization. In case of theft, injury or any incident
occurrence , security officers and supervisor ate called to conduct preliminary Investigations. These
Investigation are usually internal in nature but still important, since it may be used in civil litigation if
necessary.

Security Investigation is an inquiry into allegations or circumstances in order to acquire factual


information.

Tools of Investigation ( three I's)

1. Information - is the knowledge Which the Investigator had gather and acquired from person, place,
and things. It is classified According to sources as:
2. Regular source - records, files from the government and non-government agencies, news items.
3. Cultivate source - information upon gather's initiative of the Investigator from the informants,
vendor's, taxicab driver, GRO, and others.

C. Grapevines source - these are information

Types of Records/Documents

Types of Records/Documents

1. Class 1 – Vital Records/Documents – these are records/documents which are irreplaceable, although
can be reproduced, but reproduction of the same does not have the same value of the original.
2. Class II – Important Records/Documents – these are records which reproduction of the same will
cause considerable cost, labor and delay.
3. Class III – Useful Records/documents – these are records/documents which if lost, might cause
inconvenience to the owner or company, but could be replaced and may not give insurmountable
difficulty to the timely restoration of the company’s operation;
4. Class IV – Non-Essential Records/Documents – these are records/documents which compromise of
daily files and which are routine in nature, which if lost or destroyed, will not affect the operation of
the company.

Responsibility for Protection

1. Security is command responsibility. It is the duty of the head of the department or agencies to have
assurance of the loyalty and integrity of every personnel assigned in their department.
2. The security of the classified documents should be the paramount concern of all personnel in the
department or agencies.

Standard Rules in Document Security

1. the authority and responsibility for the preparation and classification of classified matter rest
exclusively with the originating office.
2. classified matter should be classified according to the content and not in the classification of the file
in which they are held or of another document to which they refer.
3. Classification should be made as soon as possible by placing the appropriate marks on the matter to
be classified.
4. Each individual whose duty allows access to classified matters is responsible for the protection of the
classified matter while it is in his/her possession and shall insure that dissemination of such classified
matter is on the ‘ need to know’ basis and to ‘ properly personnel only’.

Protection of Sensitive Information


1. Proprietary Information – it is a sensitive information owned by a company and which gives a
company certain competitive advantages. Generally , it is a document classified by the owner as
proprietary limits to who can view it or know about its contents.

In the business community, it is information concerned on the structure, products, or


methods of the organization which are protected from espionage or copying.

Types of proprietary Information

1. Trade Secrets – any formula, process, design, instrument, pattern or compilation which is not
generally known or reasonably ascertainable by which a business can obtain an economic advantage
over competitors.

Trade secret is information that;

1. not generally known to the public


2. confers some sort of economic benefit to the holder; and
3. the subject of reasonable efforts to maintain its secrecy.

Trade and secret protection

1. complete background investigation to prospective employee;


2. issuance of company policy and procedures regarding the handling of trade secrets
3. issuance of non-disclosure agreement to be signed by the employees; or agreement that employees
in shall not reveal his employers proprietary information from other parties like vendors or license
4. an employee may also require to surrender or assign to his employer the right to his own intellectual
work produced during the course of his employment

1. Patents - A grant given by the government to an inventor, conveying and securing to him the
exclusive rights to make, use and sell his invention for a term of twenty (20) years.\

Significant provisions of Republic Act no. 8293

(Intellectual Property Code of the Philippines-enacted on June 06, 1997)


Patentable Inventions – any technical solutions of a problem in any field of human activity which is
new, involves an inventive step and is industrially applicable.

Right to a patent – the right to a patent belongings to the inventor, his heirs, or assigns. When two
(2) or more persons have jointly made an invention, the right to patent shall be belong to them jointly.

First to file rule – if two (2) or more person have made the invention separately and independently
of each other, the right to the patent shall belong to the person who filed an application for such invention, or
where two or more applicants are filed for the same invention, to the applicant who has the earliest filing date
or, the earliest priority date.

Rights Conferred by Patent – a patent shall confer on its owner the following exclusive rights;

(A). where the subject matter of a patent is a product, to restrain, prohibiting and prevent any
unauthorized person or entity from making, using, offering for sale, selling or importing that product;

(B). where the subject matter of a patent is a process, to restrain, prevent or prohibit any unauthorized
person or entity from using the process, and from manufacturing, dealing in , using, selling or offering for
sale, or importing any product obtained directly or indirectly from such process.

Patents owners shall also have the right to assign, or transfer by succession the patent,
and to conclude licensing contracts for the same.

1. Competitive Intelligence.

It is the action of defining, gathering, analyzing, and distributing intelligence about products, customers,
competitors, and any aspects of the environment needed to support executives and managers in making
strategic decision for an organization.

Types of Competitive Intelligence

1. White – information available for the company publication, public records or commercial reporting
sources;
2. Gray – not readily available but which usually can be obtained without acquiring any civil/criminal
liability in the process
3. Black – obtained through clearly unethical or illegal means.
III. Information Security

Aspect of security which ensures that no classified, sensitive, or critical information proprietary to the
company are disclosed to unauthorized individuals, distorted, destroyed, or lost.

Information is the lifeblood of the organization. As such, if were lost, disclosed to the competitor or
distorted, the organization would find it difficult, if not fail, to achieve its goal,

Computer technology has grown rapidly and computer use has become widespread. Today in most
instances, computers are accessible by most users, and the technology is common knowledge. As a result, it
is more difficult to protect computers from accidental and intentional damage.

1. Computer Vulnerability

A computer’s system vulnerability to compromise increase as more people receive legitimate access
to it,, and as more people without legitimate access to it become aware of its existence, contents, and
location.

1. Protecting Information

Today, most information is stored in the computers and processed by the computers. Therefore,
controlling the access to the computer is essential, as is controlling access to information within the computer.

If the information stored in the computer is confidential, the computer should be located in a
second place, allowing employees access to the computer system in a controlled manner. Access to the
computer system must be restricted to only those whose job responsibilities require the use of the computer
system.

When the computer serves as the storage for classified information or other information that
requires protection, the following principles should be observed;

1. Availability – when in use, user must protect the system from attacks ( e.g. hacking, cracking, etc.)
that could render it inaccessible or inoperative;
2. Data confidentiality – only authorized personnel must have knowledge and access to the information
within the computer. When transferring information between storages sites via disk, or network, it is
important to secure the information so that an unauthorized third party cannot steal the data, or
comprehend the content of the data by means of encryption
3. Integrity –the computer must consistent provide the exact, unchanged information to each user.
Users or a third party may not modify information without proper authorization.

1. Cryptography in Information Security

Cryptography

- It is the practice and study of techniques for secure communication in the presence of third parties
(called adversaries)

More generally, it is about constructing and analyzing protocols overcome the influence of adversaries
and which are related to various aspects in information security such as data confidentiality, data, integrity,
authentication, and non-repudiation

When it becomes necessary to transmit those secrets from one point to another, it is important to
protect the information while it is transit. Cryptography presents various methods for taking legible, readable
data, and transforming it into unreadable data for the for the purpose of secure t ransmission, and then using a
key to transform it back into readable data when it reaches its destination.

The goal of cryptography extends beyond merely making data unreadable; it also extends into user
authentication, which is providing the recipient with assurance that the encrypted message originated from
trusted source.

Chapter 5

Security Hazards And Risk Analysis

Security hazard

- it is an act or condition which results in a situation conducive to a breach of the protection system and
the subsequent loss or compromise, or damage to personnel, property or facilities.

Factors that bring insecure condition

1. Threat – an indication of impending danger or harm; positive inimical acts


2. Hazard – a chance of being injured or harmed; passive inimical acts.
3. Vulnerability – inability to withstand the effects of a hostile environment, measure of how open an
establishment to intrusion, attack or injury.
4. Risk – is the potential that a chosen action or activity (including the choice of inaction) will lead to a
loss ( an undesirable outcome). Probably of an event to happen this might lead to loss.

Modes of Hazards

1. Dormant mode – a hazard is in dormant mode when it merely has the potential to be hazardous. No
person, property or environment is affected by this condition. A volcano in an isolated and
uninhabited island is an example. Should the volcano erupt, there are no people and properti es that
could be affected due to its location.
2. Potential mode – hazard is on potential mode when it is in position or a situation to harm a person or
destroy properties or environment. Hazards in this mode need to be assessed to determined the risks
it could bring.
3. Active mode – Hazard is in active mode when it is certain to cause harm as no intervention can be
made before the incident

Kinds of Hazards

1. Natural Hazard – acts of nature that could result in disruption or damage to the enterprise or
organization such as to cause building collapse, equipment failure, accidents, safety hazards, and
other events that interrupt normal business process causing work delays, stoppage and loss of
revenue, it includes but not limited to the following:
2. Storm – in can damage or destroy vehicles, buildings, bridges, and other outside objects, turning
loose debris into deadly flying projectile. It also often knocks out power supply, preventing vital
communication and hampering rescue efforts.
3. Flood – the primary effects of flooding include loss of life, damage to a building and structure,
including bridges, sewage systems, roadways, and canals. It also damages power transmission and
sometimes power generation, which has knock-on effects cause by the loss of power. This includes
loss of drinking water treatment and water supply, which may result in loss of drinking water or
severe water contamination.
4. Lightning- humans or animals struck by lightning may suffer severe injury or even death due to
internal organ and nervous system damage. Building or tall structures hit by lightning may be
damaged as the lightning seeks unintended paths to ground. By safely conducting a lightning strike
to ground, a lightning protection system can greatly reduce the probability of severe property
damage.
5. Volcanic eruption – erupting volcanoes can pose many hazards, not only in the immediate vicinity of
the eruption. Volcanic ash can be a threat to aircraft, in particular those with jet engines where ash
particles can be melted by the high operating temperature; the melted particles then adhere to the
turbines blades and alter shape, disrupting the operation of the turbine. Large eruptions can affect
temperature as ash and droplets of sulfuric acid obscure the sun and cool the Earths lower
atmosphere or troposphere.
6. Earthquake – earthquakes can cause fires by damaging electrical power or gas lines. It can also cause
tsunamis, which are long-wavelength, long period sea waves produced by the sudden or abrupt
movement of large volumes of water. Tsunami can also travel thousands of kilometers across open
oceans and wreak destruction on far shores hours after the earthquakes that generated them.

Earthquake may cause injury and loss of life, road and bridge damage, general property
damage, and collapse or destabilization of a buildings. The aftermath may bring disease, lack of basic
necessities, and higher insurance premiums

You might also like