Powerpoint Intro To Industrial Security Concepts

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 208

INTROD U C T IO N T O

INDUSTRI A L S EC UR I T Y
CONCEPTS
IA NA JOY CE M. O RGADO , RCRIM
D
SECURITY

•SECURITY IS A STATE OR QUALITY, CONDITION OF BEING


SECURED, FREEDOM FROM FEAR, HARM, DANGER, LOSS,
DESTRUCTION OR DAMAGES, TO SECURE IS TO MAKE SAFE
OR BE PROTECTED.
SECURITY

•THE SECURITY OF ANY BUSINESS ESTABLISHMENT TODAY IS A


COMPLEX PROCESS. SECURITY WORK INVOLVES ACTIVE AND
PASSIVE MEASURES SO THAT EFFECTIVE DEFENSE CAN BE
STABLISHED AGAINST CRIMES.
SECURITY
• ACTIVE MEASURES ARE THE PHYSICAL BARRIERS, SECURITY LIGHTING USE
OF VAULTS, LOCKS AND OTHERS.
• PASSIVE MEASURES ARE THOSE THAT WILL DATES MAN FROM COMMITTING
SUCH ACTS FOR FEAR OF BEING CAUGHT, CHARGED IN COURT, OR GET
DISMISSED; SECURITY EDUCATION PROGRAMS, INVESTIGATION, FIRE
PREVENTION SEMINARS, PERSONAL SECURITY CHECKS.
LEGAL BASES OF INDUSTRIAL SECURITY
MANAGEMENT
1. NATURAL AUTHORITY
A. THE HIGHEST LAW IS THE LAW OF PRESERVATION;
BY INSTINCT, MAN NATURALLY REACT TO PROTECT HIMSELF, HIS HONOR, FREEDOM, LIBERTY
AND PROPERTY FROM DANGER, THREAT OR HAZARD, HE DOES IT PERSONALLY AND/OR THRU THE
HELP OF OTHERS.
EVEN BEFORE THE COMING OF THE EARLY CHINESE TRADERS WERE ALREADY ORGANIZED
INTO TRIBES. EACH TRIBE HAS HIS OWN CHIEFTAIN BUT ALSO OF THE MEMBERS. THE INHERENT
MECHANISM OF SELF PRESERVATION BECAME THE UNWRITTEN LAW OF THE EARLY FILIPINOS TO
PROTECT THEMSELVES AND THEIR PROPERTY AGAINST THE NATURAL AND MAN MADE HAZARDS.
2. CONSTITUTIONAL AUTHORITY
a. THE PRIME DUTY OF THE GOVERNMENT IS TO SERVE AND PROTECT PEOPLE. THE
GOVERNMENT MAY CALL UPON THE PEOPLE TO DEFEND THE STATE AND IN THE
FULFILLMENT THEREOF; ALL CITIZENS MAY BE REQUIRED, UNDER CONDITIONS PROVIDED
BY LAW, OR TO RENDER PERSONAL MILITARY CIVIL SERVICE. (ART II SEC 4 OF THE 1987
PHILIPPINE CONSTITUTION).
b. NO PERSON SHALL BE DEPRIVED OF LIVE, LIBERTY OR PROPERTY WITHOUT DUE PROCESS
OF LAW, NOR SHALL ANY PERSON BE DENIED THE EQUAL PROTECTION OF LAWS. (ART III
SEC 1 OF THE 1987 PHILIPPINE CONSTITUTION).
2. CONSTITUTIONAL AUTHORITY
C. PRIVATE PROPERTY SHALL NOT BE TAKEN FOR PUBLIC USE WITHOUT JUST COMPENSATION. (ART
III SEC 9 OF THE 1987 PHILIPPINE CONSTITUTION).
D. THE RIGHT OF THE PEOPLE TO BE SECURE IN THEIR PERSONS, HOUSES PAPERS, AND EFFECTS
AGAINST UNREASONABLE SEARCH AND SEIZURES OF WHATEVER NATURE AND FOR ANY PURPOSE
SHALL BE INVIOLABLE, AND NO SEARCH WARRANT OR WARRANT OF ARREST SHALL BE ISSUE
EXCEPT UPON EXAMINATION UNDER OATH OR AFFIRMATION OF THE COMPLAINANT AND THE
WITNESSES HE MAY PRODUCE, AND PARTICULARLY DESCRIBING THE PLACE TO BE SEARCHED AND
THE PERSONS OR THINGS TO BE SEIZED. (ART III SEC 2 OF THE 1987 PHILIPPINE CONSTITUTION).
3. STATUTORY AUTHORITY
a. REVISED PENAL CODE (ACT NO 3815 AS AMENDED)
b. PRIVATE SECURITY AGENCY LAW (RA 5487 AS AMENDED)
c. PRESIDENTIAL DECREE NO 11 (AMENDING RA 5487)
d. PRESIDENTIAL DECREE NO 100 (AMENDING RA 5487 AND PD 11)
e. PRESIDENTIAL DECREE 1919 (AMENDING RA 5487, PD NO 11 AND 100)
MAJOR AREAS OF INDUSTRIAL
SECURITY MANAGEMENT
1. PHYSICAL SECURITY

•IS THE SUM TOTAL OF ALL PHYSICAL PROTECTION


EMPLOYED OR INSTALLED TO SECURE ASSETS.
EXAMPLE: HUMAN GUARDS, PERIMETER
FENCE/BARRIER AND SECURITY DEVICES.
2. PERSONNEL SECURITY
• IS THE SUM TOTAL OF PROCEDURES FOLLOWED, INQUIRIES CONDUCTED, AND CRITERIA
APPLIED TO DETERMINE THE WORK SUITABLE OF A PARTICULAR APPLICANT OR
RETENTION OR TRANSFER OF A PARTICULAR EMPLOYEE.
EXAMPLE:
*PROCEDURE
*INQUIRY
*CRITERIA
3. DOCUMENT AND INFORMATION SECURITY
• IS THE SUM TOTAL OF ALL POLICIES, REGULATION, PRACTICES, ENFORCE TO SAFEGUARDS THE CONTENTS
AND INTEGRITY OF ANY CLASSIFIED INFORMATION OR DOCUMENT FROM COMPROMISE OR LOSS.
EXAMPLE:
*POLICY
*REGULATION
*DOCTRINE
*PRACTICE
TYPES OF SECURITY
1. INDUSTRIAL SECURITY

•A TYPE OF SECURITY APPLIED TO BUSINESS GROUPS


ENGAGED IN INDUSTRIES LIKE MANUFACTURING,
ASSEMBLING, RESEARCH AND DEVELOPMENT,
PROCESSING, WAREHOUSING AND EVEN AGRICULTURE.
2. HOTEL SECURITY
•A TYPE OF SECURITY APPLIED TO HOTELS WHERE ITS PROPERTIES ARE
PROTECTED FROM PILFERAGE, LOSS, DAMAGE AND THE FUNCTION IN THE
HOTEL RESTAURANTS ARE NOT DISTURBED AND TROUBLED BY OUTSIDERS
OR THE GUEST THEMSELVES. THIS TYPE OF SECURITY EMPLOYS HOUSE
DETECTIVES, UNIFORMS GUARD AND SUPERVISOR AND INSURES THAT
HOTEL GUESTS AND THEIR PERSONAL EFFECTS SAFEGUARDED.
3. BANK SECURITY
•THIS TYPE OF SECURITY IS CONCERN WITH BANK OPERATIONS.
ITS MAIN OBJECTIVE IS THE PROTECTION OF BANK CASH AND
ASSETS, ITS PERSONNEL AND CLIENTELE. SECURITY PERSONNEL
ARE TRAINED TO SAFEGUARD BANK AND ASSETS WHILE IN
STORAGE, IN TRANSIT AND DURING TRANSACTIONS.
4. VIP SECURITY

•A TYPE OF SECURITY APPLIED FOR THE PROTECTION OF TOP-


RANKING OFFICIALS OF THE GOVERNMENT OR PRIVATE ENTITY,
VISITING PERSONS OF ILLUSTRIOUS STANDING AND FOREIGN
DIGNITARIES.
5. SCHOOL SECURITY

•A TYPE OF SECURITY THAT IS CONCERN WITH THE PROTECTION OF


STUDENTS, FACULTY MEMBERS, AND SCHOOL PROPERTIES. SECURITY
PERSONNEL ARE TRAINED TO PROTECT THE SCHOOL PROPERTY FROM
THEFT, VANDALS, HANDLING CAMPUS RIOTS AND DETECTING THE USE
OF INTOXICATED DRUGS AND ALCOHOL BY THE STUDENTS.
6. SUPERMARKET OR MALL SECURITY
•A TYPE OF SECURITY WHICH IS CONCERN WITH THE PROTECTION OF
THE STORES, WAREHOUSES, STORAGE, ITS IMMEDIATE PREMISES AND
PROPERTIES AS WELL AS THE SUPERMARKET PERSONNEL AND
CUSTOMERS. SECURITY PERSONNEL ARE TRAINED TO DETECT
“SHOPLIFTER”, ROBBERY AND BOMB DETECTION AND CUSTOMER
RELATION.
ASSIGNMENT
1. PHYSICAL SECURITY
2. BARRIER
3. KINDS OF BARRIER
4. PERIMETER BARRIER
5. TYPES OF PERIMETER BARRIER
6. PROTECTIVE LIGHTING
7. TYPES OF PROTECTIVE LIGHTING
PHYSICAL SECURITY
PHYSICAL SECURITY
• PHYSICAL SECURITY MEASURES ARE BEING USED TO DEFINED, PROTECT,
AND MONITOR PROPERLY RIGHTS AND ASSETS. THESE MEASURES CONSIST
OF BARRIERS AND DEVICES THAT WOULD DETECT, IMPEDE, AND PREVENT
UNAUTHORIZED ACCESS TO EQUIPMENT, FACILITIES, MATERIAL AND
DOCUMENT AND TO SAFEGUARD THEM AGAINST ESPIONAGE, SABOTAGE,
DAMAGE, AND THEFT.
CONCEPTS OF PHYSICAL SECURITY
A. ENEMY AGENTS MUST HAVE ACCESS
• IN MOST CASES ESPIONAGE, ACQUISITION OF INFORMATION IS THE ULTIMATE
RESULT, AND MEANS AND FORM IN WHICH INFORMATION IS OBTAINED IS MERELY
AN OPERATIONAL DETAIL. NORMALLY, INFORMATION ON TAPES AND FILM IS AS
USABLE AS THE ORIGINAL DOCUMENTS. THEREFORE IN CONSIDERING ACCESS, ONE
SHOULD THINK NOT ONLY OF CURRENT PHYSICAL ACCESS, BUT ALSO ACCESS TO
THE DISCUSSION OF THE MATTER BY THE USE OF CLANDESTINE LISTENING DEVICE.
B. THERE IS NO IMPENETRABLE BARRIER

•IN AN UNFRIENDLY GOVERNMENT OR ORGANIZATION IS


WILLING TO DEVOTE ENOUGH TIME, MONEY, PERSONNEL,
MATERIALS AND IMAGINATION TO PASSING A BARRIER, IT
CAN DO SO. SO WE ATTEMPT TO BUILD DEFENSE IN DEPTH
BY USING THEN ONE BARRIER.
C. SURREPTITIOUS VS NON-SURREPTITIOUS ENTRY

•THE POSSIBILITY OF SURREPTITIOUS ENTRY IS THE


GREATEST HAZARD FROM THE STANDPOINT OF
COUNTERINTELLIGENCE SECURITY BECAUSE IT IS USUALLY
DIFFICULT TO NEUTRALIZE THE ACT OF ESPIONAGE BECAUSE
SURREPTITIOUS ENTRY IS NOT USUALLY DETECTED.
D. EACH INSTALLATION IS DIFFERENT

•SINCE EACH INSTALLATION IS DIFFERENT EACH WILL


HAVE DIFFERENT PROBLEMS TO OVERCOME. THE
SECURITY PROCEDURES WILL NOT BE ADEQUATE
FOR ALL INSTALLATIONS.
BARRIERS

•REFERS TO ANY PHYSICAL STRUCTURE WHETHER


NATURAL OR MAN-MADE CAPABLE OR RESTRICTING,
DETERRING, DELAYING OR PREVENTING ILLEGAL AND
UNAUTHORIZED ACCESS TO AN INSTALLATION.
PURPOSE OF BARRIER
1. DEFINE THE PHYSICAL LIMITS OF AN AREA
2. CREATE A PHYSICAL AND PSYCHOLOGICAL DETERRENT TO UNAUTHORIZED ENTRY
3. PREVENT PENETRATION THEREIN OR DELAY INTRUSION, THUS, FACILITATING
APPREHENSION OF INTRUDERS
4. ASSIST IN MORE EFFICIENT AND ECONOMICAL EMPLOYMENT OF GUARDS
5. FACILITATE AND IMPROVE THE CONTROL OF VEHICULAR TRAFFIC
TWO GENERAL TYPES OF PHYSICAL BARRIER

1. NATURAL BARRIER – SUCH AS RIVERS, CLIFFS, AND RAVINES, ETC.


WHICH DELAY OR MAKE MORE DIFFICULT THE ENTRY OF THE INTRUDER.
2.MAN-MADE BARRIER – ARE STRUCTURAL CONSTRUCTION LIKE FENCES
WALLS, FLOORS, ROOFS, GRILLS, BARS. ROAD BLOCKS, OR OTHER
PHYSICAL MEANS TO DETER OR IMPEDE PENETRATION.
KINDS OF BARRIER
1. NATURAL BARRIER – IT INCLUDES BODIES OF WATER, MOUNTAINS, MARSHES, RAVINES, DESERTS, OR OTHER TERRAIN THAT ARE DIFFICULT TO
TRAVERSE.
2. STRUCTURAL BARRIER – THESE ARE FEATURES CONSTRUCTED BY MAN REGARDLESS OF THEIR ORIGINAL INTENT THAT TENDS TO DELAY THE
INTRUDER. EXAMPLES ARE WALLS, DOORS, WINDOWS, LOCKS, FENCES, SAFE, CABINETS OR CONTAINERS ETC.
3. HUMAN BARRIER – PERSONS BEING USED IN PROVIDING A GUARDING SYSTEM OR BY THE NATURE OF THEIR EMPLOYMENT AND LOCATION, FULFILL
SECURITY FUNCTIONS. EXAMPLES ARE GUARDS, OFFICE PERSONNEL, SHOP WORKERS, ETC.
4. ANIMAL BARRIER – ANIMALS ARE USED IN PARTIALLY PROVIDING A GUARDING SYSTEM. DOGS ARE USUALLY TRAINED AND UTILIZED TO SERVE AS
GUARD DOGS. GOOSE AND TURKEYS COULD BE ALSO INCLUDED.
5. ENERGY BARRIER – IT IS THE EMPLOYMENT OF MECHANICAL, ELECTRICAL, ELECTRONIC ENERGY IMPOSES A DETERRENT TO ENTRY BY THE
POTENTIAL INTRUDER OR TO PROVIDE WARNING TO GUARD PERSONNEL. THESE ARE PROTECTIVE LIGHTING, ALARM SYSTEM AND ANY ELECTRONIC
DEVICES USED AS BARRIERS.
THREE LINES OF PHYSICAL DEFENSE
1. FIRST LINE OF DEFENSE – PERIMETER FENCES OR BARRIERS
2.SECOND LINE OF DEFENSE – DOORS, FLOORS, WINDOWS, WALLS,
ROOFS, AND GRILLS AND OTHER ENTRIES TO THE BUILDINGS
3.THIRD LINE OF DEFENSE – STORAGE SYSTEM LIKE STEEL
CABINETS, SAFES, VAULTS, AND INTERIOR FILES
PERIMETER BARRIER
•A MEDIUM OR STRUCTURE WHICH DEFINES THE PHYSICAL
LIMITS OF AN INSTALLATION OR AREA TO RESTRICT OR
IMPEDE ACCESS THERETO. IT IS ANY PHYSICAL BARRIER
USED TO SUPPLEMENT THE PROTECTION OF AN INSIDE OR
OUTSIDE PERIMETER.
CLASSIFICATION OF PERIMETER BARRIER

1. INSIDE PERIMETER – A LINE ADJACENT TO PROTECTED AREA, AND


PASSING THROUGH POINTS OF POSSIBLE ENTRY INTO THE AREA, SUCH AS
DOORS, WINDOWS, SKYLIGHTS, TUNNEL OR OTHER POINTS OF ACCESS.
2. OUTSIDE PERIMETER – A LINE OF PROTECTION SURROUNDINGS BUT
SOME WHAT REMOVED FROM A PROTECTED AREA, SUCH AS A FENCE.
TYPES OF PERIMETER BARRIER

A. WIRE FENCES
B.WALLS
C.BODIES OF WATER
A. WIRE FENCE
• WIRE FENCING CAN BE BARBED WIRE, CHAIN LINK OR CONCERTINA. CHAIN LINK ARE
FOR PERMANENT STRUCTURE, BARBED WIRE IS FOR SEMI PERMANENT, AND
CONCERTINA FOR THE LEAST PERMANENT AND ALSO CAN BE USED AS A TEMPORARY
ROAD BLOCK OR IMPEDIMENT DURING STRIKES AND CROWD CONTROL. WIRE
FENCES ARE ATTRACTIVE AND LOW IN MAINTENANCE COST; THEY OFFER LESS
HAZARD TO PEOPLE BECAUSE OF THE ABSENCE OF BARBS, AND THE OPENINGS ARE
SMALL TO PREVENT PASSAGE OF PILFERED ARTICLE.
B. BUILDING WALL
• WALLS, FLOORS, ROOF OR THEIR COMBINATION SERVE ALSO AS BARRIERS AND THEY SHOULD BE OF SUCH
CONSTRUCTION TO PROVIDE UNIFORM PROTECTION JUST LIKE WIRE FENCING.

• MASONRY WALLS AS PERIMETER BARRIER SHOULD HAVE THE SAME HEIGHTS AS THE CHAIN LINK AND SURMOUNTED
BY THE BARBED WIRE TOP GUARDS; IF THE HEIGHT OF THE MASONRY IS LESS THAN THE PRESCRIBED, ADDITIONAL
CHAIN LINK AS “TOPPING”

• WALL CAN BE MADE OF STONE SLABS LIKE ADOBE OR HOLLOW BOUND BY CONCRETE WITH POST AT REGULAR
INTERVALS TO PREVENT THE WALL FROM TOPPLING DUE TO WIND, OR SCOURING FACILITIES, SECURITY MUST SIT
DOWN WITH DESIGN ENGINEERS SO THAT AREA WHERE SENSITIVE ACTIVITY WILL BE DONE SHOULD BE GIVEN
SPECIAL EMPHASIS IN PROTECTIVE WALLS.
C. BODIES OF WATER
•BODIES OF WATER LIKE RIVER, LAKE, MARSH, CATARACT, SEA POND OR
ANY OTHER BODIES OF WATER FORMING A PART OF THE WALL, BUILDING
OR FENCING SHOULD NEVER BE CONSIDERED ADEQUATE NATURAL
PERIMETER BARRIER. ADDITIONAL SECURITY MEASURES LIKE WIRE
FENCE, CONCRETE WALLING, SECURITY PATROLLING AND FLOODLIGHTING
AT NIGHT MAY BE NECESSARY FOR THE PORTIONS OF THE PERIMETER.
TYPES OF FENCE
1. SOLID FENCE – CONSTRUCTED IN SUCH AWAY THAT VISUAL ACCESS THROUGH THE FENCE IS DENIED. ITS ADVANTAGE IS
THAT IT DENIES THE OPPORTUNITY FOR THE INTRUDER TO BECOME FAMILIAR WITH THE PERSONNEL, ACTIVITIES AND THE
TIME SCHEDULED OF THE MOVEMENTS OF THE GUARDS IN THE INSTALLATION. ON THE OTHER HAND, IT PREVENTS THE
GUARDS FROM OBSERVING THE AREA AROUND THE INSTALLATION AND IT CREATES SHADOW THAT MAY BE USED BY THE
INTRUDER FOR COVER AND CONCEALMENT.

ADVANTAGE OF SOLID FENCE

a. DENIES VISUAL ACCESS OF THE INSTALLATION TO THE INTRUDERS.

b. DENIES THE INTRUDER THE OPPORTUNITY TO BECOME FAMILIAR WITH THE PERSONNEL ACTIVITIES, AND TIME
SCHEDULED OF THE MOVEMENT OF THE GUARDS ON THE INSTALLATION.

DISADVANTAGE OF SOLID FENCE

c. IT PREVENTS THE INSTALLATION GUARDS FROM OBSERVING THE AREA AROUND THE INSTALLATION.

d. A SOLID FENCE CREATES SHADOWS WHICH MAY BE USED BY THE INTRUDER FOR COVER AND CONCEALMENT.
TYPES OF FENCE
2. FULL-VIEW FENCE – IT IS CONSTRUCTED IN SUCH AWAY THAT VISUAL ACCESS IS PERMITTED THROUGH THE FENCE. ITS
ADVANTAGES ARE THAT IT ALLOWS THE ROVING PATROLS AND STATIONARY GUARD TO KEEP THE SURROUNDING AREA OF THE
INSTALLATION UNDER OBSERVATION. ON THE OTHER HAND, IT ALLOWS THE INTRUDER TO BECOME FAMILIAR WITH THE
MOVEMENTS AND TIME SCHEDULE OF THE GUARD PATROLS THEREBY ALLOWING HIM TO PICK THE TIME THAT IS ADVANTAGEOUS
ON HIS PART.

ADVANTAGE OF FULL-VIEW FENCE

a. ROVING PATROLS AND STATIONARY GUARDS ARE ABLE TO KEEP THE AREA SURROUNDING THE INSTALLATION UNDER
OBSERVATION

b. IT DOES NOT CREATE SHADOWS WHICH WOULD PROVIDE COVER AND CONCEALMENT FOR THE INTRUDER

DISADVANTAGE OF FULL-VIEW FENCE

c. IT’S ALLOWING VISUAL ACCESS TO THE INSTALLATION, ITS PERSONNEL, ITS GUARDS; AND ITS ACTIVITIES

d. IT ALLOWS THE INTRUDER TO BECOME FAMILIAR WITH THE MOVEMENTS AND THE TIME SCHEDULE OF THE GUARDS
PATROL; THERE AFTER ALLOWING HIM TO PICK THE TIME FOR ATTEMPTING PENETRATION WHICH WOULD BE MOST
ADVANTAGEOUS TO HIM
TYPES OF FULL VIEW FENCE
1. CHAIN LINK FENCE.

a. IT MUST BE CONSTRUED OF 7 FEET MATERIAL EXCLUDING TOP GUARD.

b. IT MUST BE OF 9 GAUGES OR HEAVIER.

c. THE MESH OPENINGS ARE NOT TO BE LARGER THAN 2 INCHES PER SIDE.

d. IT SHOULD BE TWISTED AND BARBED SALVAGE AT TOP AND BOTTOM.

e. IT MUST BE SECURELY FASTENED TO RIGID METAL OR REINFORCED CONCRETE.

f. IT MUST REACH WITHIN 2 INCHES OF HARD GROUND OR PAVING.

g. ON SOFT GROUND, IT MUST REACH BELOW SURFACE DEEP ENOUGH TO COMPENSATE


FOR SHIFTING SOIL OR SAND.
TYPES OF FULL VIEW FENCE
2. BARBED WIRE FENCE
a. STANDARD BARBED WIRE IS TWISTED DOUBLE-STRAND, 12 GAUGE
WIRE WITH 4 POINT BARBS SPACES ON EQUAL DISTANCE APART.
b. BARBED WIRE FENCING SHOULD NOT BE LESS THAN 7 FEET HIGH
EXCLUDING TOP GUARD.
c. BARBED WIRE FENCING MUST BE FIRMLY AFFIXED TO POST HIGH
EXCLUDING TOP GUARD.
d. THE DISTANCE BETWEEN STRANDS WILL NOT EXCEED 6 INCHES AND
MIDWAY BETWEEN PARTS.
TYPES OF FULL VIEW FENCE

3. CONCERTINA WIRE FENCE


a. STANDARD CONCERTINA BARBED WIRE IS COMMERCIALLY
MANUFACTURED WIRE COIL OF HIGH STRENGTH STEEL
BARBED WIRE CLIPPED TOGETHER AT INTERVALS TO FORM A
CYLINDER.
b. OPENED CONCERTINA WIRE IS 50 FEET LONG AND 3 FEET IN
DIAMETER.
PERIMETER BARRIER OPENING
1. GATES AND DOORS – WHEN NOT IN USE AND CONTROLLED BY GUARDS, GATES AND DOORS IN THE PERIMETER SHOULD BE LOCKED AND
FREQUENTLY INSPECTED BY GUARDS. LOCK SHOULD BE CHANGED FROM TIME TO TIME AND SHOULD BE COVERED UNDER PROTECTIVE
LOCKS AND KEY CONTROL.
2. SIDE-WALK ELEVATORS – THESE PROVIDE ACCESS TO AREAS WITHIN THE PERIMETER BARRIER AND SHOULD BE LOCKED AND
GUARDED.
3. UTILITIES OPENING – SEWERS, AIR INTAKES, EXHAUST TUNNELS AND OTHER UTILITY OPENINGS WHICH PENETRATE THE BARRIER AND
WHICH HAVE CROSS SECTIONAL AREAS OF 96 SQUARE INCHES OR MORE SHOULD BE PROTECTED BY BARS, GRILLS, WATER FILLED
TRAPS OR OTHER STRUCTURAL MEANS PROVIDING EQUIVALENT PROTECTION TO THAT PORTION OF THE PERIMETER BARRIERS.
4. CLEAR ZONES – AN OBSTRUCTED AREA OR A “CLEAR ZONE” SHOULD BE MAINTAINED ON BOTH SIDES OF THE PERIMETER BARRIER. A
CLEAR ZONE OF 20 FEET OR MORE IS DESIRABLE BETWEEN THE BARRIERS AND EXTERIOR STRUCTURES AND NATURAL COVERS THAT
MAY PROVIDE CONCEALMENT FOR ASSISTANCE TO A PERSON SEEKING UNAUTHORIZED ENTRY.
ADDITIONAL PROTECTIVE MEASURES
1. TOP GUARD – ADDITIONAL OVERHANG OF BARBED WIRE PLACED ON VERTICAL PERIMETER FENCES
UPWARD AND OUTWARD WITH A 45 DEGREE ANGLE WITH 3 TO 4 STRANDS OR BARBED WIRES
SPACES 6 INCHES APART. THIS INCREASES THE PROTECTIVE HEIGHT AND PREVENTS EAST ACCESS.
2. GUARD CONTROL STATIONS – THIS IS NORMALLY PROVIDED AT MAIN PERIMETER ENTRANCES TO
SECURE AREAS LOCATED OUT-OF-DOORS, AND MANNED BY GUARDS ON FULL-TIME BASIS. SENTRY
STATION SHOULD BE NEAR A PERIMETER FOR SURVEILLANCE AT THE ENTRANCE.
3. TOWER GUARD – THIS IS A HOUSE-LIKE STRUCTURE ABOVE THE PERIMETER BARRIERS. THE HIGHER
THE TOWER, THE MORE VISIBILITY IT PROVIDES.
ADDITIONAL PROTECTIVE MEASURES
4. BARRIER MAINTENANCE – FENCING BARRIERS AND PROTECTIVE WALLS SHOULD ALWAYS BE REGULARLY INSPECTED
BY SECURITY. ANY SIGN OR ATTEMPTS TO BREAK IN SHOULD BE REPORTED FOR INVESTIGATION. DESTRUCTION OF
FENCE OR SECTIONS THEREOF SHOULD BE REPAIRED IMMEDIATELY AND GUARD VIGILANCE SHOULD BE INCREASED.
5. PROTECTION IN DEPTH – IN LARGE OPEN AREAS OR GROUND WHERE FENCING OR WALLING IS IMPRACTICAL AND
EXPENSIVE, WARNING SIGNS SHOULD BE CONSPICUOUSLY PLACED. THE DEPTH ITSELF IS PROTECTION REDUCTION OF
ACCESS ROADS, AND SUFFICIENT NOTICES TO WARN INTRUDERS SHOULD BE DONE.
6. SIGNS AND NOTICES – “CONTROL SIGNS” SHOULD BE ERECTED WHERE NECESSARY IN THE MANAGEMENT OF
UNAUTHORIZED INGRESS TO PRECLUDE ACCIDENTAL ENTRY. SIGNS SHOULD BE PLAINLY VISIBLE AND LEGIBLE FROM
ANY APPROACH AND IN AN UNDERSTOOD LANGUAGE OR DIALECT.
PROTECTIVE LIGHTING
•THE IDEA THAT LIGHTING CAN PROVIDE IMPROVE
PROTECTION FOR PEOPLE AND FACILITIES IS AS OLD AS
CIVILIZATION. PROTECTIVE LIGHTING IS THE SINGLE MOST
COST-EFFECTIVE DETERRENT TO CRIME BECAUSE IT
CREATES A PSYCHOLOGICAL DETERRENT TO THE INTRUDERS.
PURPOSE OF PROTECTIVE LIGHTING
1. IT PROVIDES SUFFICIENT ILLUMINATION TO THE AREAS DURING
HOURS OF DARKNESS.
2.LIGHTING CAN HELP IMPROVE VISIBILITY SO THAT INTRUDER
CAN BE SEEN AND IDENTIFIED AND IF POSSIBLE APPREHENDED.
3.IT SERVES AS DETERRENT TO WOULD BE THIEVES.
TYPES OF PROTECTIVE LIGHTING
1. CONTINUOUS LIGHTING – THE MOST FAMILIAR TYPE OF OUTDOOR SECURITY LIGHTING, THIS IS DESIGNED TO
PROVIDE TWO SPECIFIC RESULTS: GLARE PROJECTION OR CONTROLLED LIGHTING. IT CONSIST OF A SERIES
OF FIXED LUMINARIES AT RANGE TO FLOOD A GIVEN AREA CONTINUOUSLY DURING THE HOURS OF DARKNESS.
a. GLARE PROJECTION TYPE – THE INTENSITY IS FOCUSED TO THE INTRUDER WHILE THE OBSERVER OR GUARD
REMAINED IN THE COMPARATIVE DARKNESS, THE LIGHTING IS TOWARD OF THE APPROACH OF AN ENTRANCE
TO AN INSTALLATION.
b. CONTROLLED LIGHTING – THE LIGHTING IS FOCUSED ON THE PILE OF ITEMS, RATHER THAN THE BACKGROUND.
THE WIDTH OF THE LIGHTED STRIP CAN BE CONTROLLED AND ADJUSTED TO SUIT SECURITY NEEDS.
TYPES OF PROTECTIVE LIGHTING
2. STANDBY LIGHTING – IS IS DESIGNED FOR RESERVE OR STANDBY USE OR TO SUPPLEMENT
CONTINUOUS SYSTEMS. A STANDBY SYSTEM CAN BE MOST USEFUL TO SELECTIVELY LIGHT A
PARTICULAR AREA IN AN OCCASIONAL BASIS.
3. MOVABLE OR PORTABLE LIGHTING – THIS SYSTEM IS MANUALLY OPERATED AND IS USUALLY
MADE UP OF MOVABLE SEARCH OR FLOODLOGHTS THAT CAN BE LOCATED IN SELECTED OR SPECIAL
LOCATIONS WHICH WILL REQUIRE LIGHTING ONLY FOR SHORT PERIOD OF TIME.
4. EMERGENCY LIGHTING – THIS SYSTEM IS USED IN TIMES OF POWER FAILURE OR OTHER
EMERGENCIES WHEN OTHER SYSTEM ARE INOPERATIVE.
GENERAL TYPES OF LIGHTING SOURCE
1. INCANDESCENT LAMP – IT IS THE LEAST EXPENSIVE IN TERMS OF ENERGY CONSUMED AND HAS
THE ADVANTAGE OF PROVIDING INSTANT ILLUMINATION WHEN THE SWITCH IS ON.
2. MERCURY VAPOR LAMP – IT IS CONSIDERED MORE EFFICIENT THAT HE INCANDESCENT AND
USED WIDESPREAD IN EXTERIOR LIGHTING. THIS EMITS A PURPLISH-WHITE COLOR, CAUSED BY
AN ELECTRIC CURRENT PASSING THROUGH A TUBE OF CONDUCTING AND LUMINOUS GAS.
3. METAL HALIDE – IT HAS SIMILAR PHYSICAL APPEARANCE TO MERCURY VAPOR BUT PROVIDES A
LIGHT SOURCE OF HIGHER LUMINOUS EFFICIENCY AND BETTER COLOR RENDITION.
GENERAL TYPES OF LIGHTING SOURCE
4. FLUORESCENT – THIS PROVIDES GOOD COLOR RENDITION, HIGH LAMP EFFICIENCY AS WELL AS
LONG LIFE. HOWEVER, IT CANNOT PROJECT LIGHT OVER LONG DISTANCE AND THUS ARE NOT
DESIRABLE AS FLOOD TYPE LIGHTS.
5. HIGH PRESSURE SODIUM VAPOR – THIS HAS GAINED ACCEPTANCE FOR EXTERIOR LIGHTING OF
PARKING AREAS, ROADWAYS, BUILDINGS, AND COMMERCIAL INTERIOR INSTALLATIONS.
CONSTRUCTED ON THE SAME PRINCIPLE AS MERCURY VAPOR LAMPS, THEY EMIT A GOLDEN WHITE TO
LIGHT PINK COLOR AND HIS PROVIDE HIGH LUMEN EFFICIENCY AND RELATIVELY GOOD COLOR
RENDITION.
TYPES OF LIGHTING EQUIPMENT
1. FLOODLIGHTS – THESE CAN BE USED TO ACCOMMODATE MOST OUTDOOR SECURITY LIGHTING NEED, INCLUDING THE
ILLUMINATION OF BOUNDARIES, FENCES AND BUILDINGS AND FOR THE EMPHASIS OF VITAL AREAS OR PARTICULAR
BUILDINGS.
2. STREET LIGHTS – THIS LIGHTING EQUIPMENT RECEIVED THE MOST WIDESPREAD NOTORIETY FOR ITS VALUE IN
REDUCING CRIME.
3. SEARCH LIGHTS – THESE ARE HIGHLY FOCUSED INCANDESCENT LAMP AND ARE DESIGNATED TO PINPOINT POTENTIAL
TROUBLE SPOTS.
4. FRESNEL LIGHTS – THESE ARE WIDE BEAM UNITS, PRIMARY USED TO EXTEND THE ILLUMINATION IN LONG, HORIZONTAL
STRIPS TO PROTECT THE APPROACHES TO THE PERIMETER BARRIER.
GENERAL CONSIDERATION IN PROTECTIVE LIGHTING
1. THE DETERMINATION OF LIGHTING NEEDS MUST BE DEPENDENT UPON THE THREAT, PERIMETER EXTREMITIES, SURVEILLANCE CAPABILITIES, AND
AVAILABLE GUARD FORCES.
2. PROTECTIVE LIGHTING MUST BE DESIGNED TO DISCOURAGE UNAUTHORIZED ENTRY AND TO FACILITATE DETECTION OF INTRUDERS APPROACHING
OR ATTEMPTING TO GAIN ENTRY IN TO PROTECTED AREAS.
3. THE PROTECTIVE LIGHTING MUST BE CONTINUOUSLY OPERATES DURING PERIODS OF REDUCE VISIBILITY, AND THAT STANDBY LIGHTING IS
MAINTAINED AND PERIODICALLY TESTED FOR USED DURING TIMES OF EMERGENCY AND MOBILIZATION ALERTS.
4. CLEANING AND REPLACEMENT OF LAMPS AND LUMINARIES, PARTICULARLY WITH RESPECT TO CAUSE AND MEANS REQUIRED AN AVAILABLE.
5. THE EFFECTS OF LOCAL WEATHER CONDITIONS MAY BE A PROBLEM IN CASES WHERE FLUORESCENT UNITS ARE USED.
6. FLUCTUATING OR ERRATIC VOLTAGES IN THE PRIMARY POWER SOURCES.
7. REQUIREMENTS FOR GROUNDING OF FIXTURES AND USED OF COMMON GROUND ON AN ENTIRE LINE TO PROVIDE A STABLE GROUND POTENTIAL.
AREAS TO BE LIGHTED
1. PERIMETER FENCE
2. BUILDING FACE PERIMETER
3. PEDESTRIAN GATE - SHOULD BE LIGHTED ABOUT 25 FT ON EITHER SIDE OF THE GATE IF POSSIBLE AND THE RANGE FOR VEHICULAR GATES SHOULD BE TWICE
THAT OF THE STREET LIGHTING IS RECOMMENDED IN THESE APPLICATION, BUT FLOODLIGHTS CAN ALSO BE USED IF GLARE IS STRICTLY CONTROLLED
4. VEHICULAR GATE - NORMALLY MANNED BY GUARDS INSPECTING CREDENTIALS, AS WELL AS INSPECTING FOR CONTRABANDS OR STOLEN PROPERTY, IT IS
CRITICAL THAT THE AREA TO BE LIGHTED TO AT LEAST 1 FOOT CANDLE
5. PARKING AREA - THIS INCLUDE VITAL BUILDING, STORAGE DEPOTS, AND VULNERABLE CONTROL POINTS IN COMMUNICATION POWER, LIGHT AND WERE
CONTRIBUTION SYSTEM.
6. THOROUGHFARE – USED FOR PEDESTRIAN, VEHICLES OR FORKLIFT SHOULD BE LIGHTEN TO 0.01 CANDLES FOR SECURITY PURPOSE
7. STORAGE, LARGE OPEN WORKING AREAS, FIERCE, DOCKS, AND OTHER SENSITIVE AREAS.
ALARM
• AN ALARM IS AN AURAL OR VISUAL SIGNAL GIVEN BY THE ANNUNCIATOR TO SECURITY WHEN
INTRUDER ACTUATES DEVICE IN A PROTECTED AREA. AN ANNUNCIATOR IS A VISUAL OR AUDIBLE
SIGNALING DEVICE WHICH INITIATES CONDITIONS OF ASSOCIATED CIRCUITS.

• BASICALLY ALARM SYSTEMS ARE DESIGNED TO ALERT SECURITY PERSONNEL TO CONSUMMATED OR


ATTEMPTED INTRUSIONS INTO AN AREA, BUILDING OR COMPOUND. EACH TYPE OF ALARM IS
ACTIVITIES IN THE EVENT THAT AN INTRUDER TEMPERS WITH THE CIRCUITY, A BEAM OR RADIATED
WAVES. INTRUSION ALARM CAN BE ELECTRICAL, MECHANICAL OR ELECTRONICS. ALARMS ARE ALSO
USED FOR FIRE, SMOKE OR OTHER EMERGENCIES AND PRESENCE OF OTHER HAZARDS.
PROTECTIVE ALARM
• IT ASSISTS THE SECURITY IN DETECTING, IMPEDING OR DETERRING POTENTIAL SECURITY THREAT
IN THE INSTALLATION. BASICALLY, ITS FUNCTION IS TO ALERT THE SECURITY PERSONNEL FOR ANY
ATTEMPT OF INTRUSION INTO A PROTECTED AREA, BUILDING OR COMPOUND. EACH TYPE OF ALARM
ACTIVATED IN THE EVENT THAT AN INTRUDER TAMPER CIRCUITRY, A BEAM OR RADIATED WAVES,
IN SHORT INTRUSION ALARMS CAN BE ELECTRICAL, MECHANICAL OR ELECTRONICS.

• ON THE OTHER HAND, THE USE OF COMMUNICATION EQUIPMENT IN THE INSTALLATION HELPS
SECURITY IN UPGRADING ITS OPERATIONAL EFFICIENCY AND EFFECTIVENESS.
THREE BASIC PARTS OF ALARM SYSTEM

1. SENSOR OR TRIGGER DEVICE – IT EMITS THE AURAL OR VISUAL SIGNALS


OR BOTH.
2. TRANSMISSION LINE – A CIRCUIT WHICH TRANSMIT THE MESSAGE TO THE
SIGNALING APPARATUS.
3. ENUNCIATOR – IT IS THE SIGNALING SYSTEM THAT ACTIVATES THE ALARM.
TYPES OF PROTECTIVE ALARM SYSTEM
1. CENTRAL STATION SYSTEM
•A TYPE OF ALARM WHERE THE CONTROL STATION IS
LOCATED OUTSIDE THE PLANT OF INSTALLATION. WHEN THE
ALARM IS SOUNDED OR ACTUATED BY SUBSCRIBER, THE
CENTRAL STATION NOTIFIES THE POLICE AND OTHER PUBLIC
SAFETY AGENCIES.
2. PROPRIETARY SYSTEM
•CENTRALIZED MONITOR OF THE PROPRIETARY ALARM
SYSTEM IS LOCATED IN THE INDUSTRIAL FIRM ITSELF WITH
A DUTY OPERATOR. IN CASE OF ALARM, THE DUTY OPERATOR
CALLS WHATEVER IS THE PRIMARY NEED; FIREFIGHTERS,
POLICE, AN AMBULANCE OR A BOMB DISPOSAL UNIT.
3. LOCAL ALARM

•THIS SYSTEM CONSIST OF RINGING UP A VISUAL OR


AUDIBLE ALARM NEAR THE OBJECT TO BE PROTECTED.
WHEN AN INTRUDER TRIES TO PRY A WINDOW, THE
ALARM THEREAT GOES OFF.
4. AUXILIARY ALARM
• COMPANY-OWNED ALARM SYSTEMS WITH A UNIT IN THE NEAREST POLICE
STATION SO THAT IN THE CASE OF NEED, DIRECT CALL IS POSSIBLE. THE
COMPANY MAINTAINS THE EQUIPMENT AND LINES BOTH FOR THE
COMPANY AND THOSE IN THE POLICE, FIRE AND OTHER EMERGENCY
AGENCIES BY SPECIAL ARRANGEMENT. THE AUXILIARY SYSTEM CAN BE
AVAILED OF BY RADIO, LANDLINES, OR CELLPHONES.
5. LOCAL ALARM BY CHANCE SYSTEM
•THIS IS LOCAL ALARM SYSTEM IN WHICH A BELL OR SIREN IS SOUNDED
WITH NO PREDICTABLE RESPONSE. THESE SYSTEMS ARE USED IN
RESIDENCE OR SMALL RETAIL ESTABLISHMENT WHICH AFFORDS A
RESPOND SYSTEM. THE HOPE IS THAT A NEIGHBOR OR PASSING PATROL
CAR WILL REACH TO THE ALARM AND CALL FOR POLICE FOR ASSISTANCE,
BUT SUCH A CALL IS PURELY A MATTER OF CHANCE.
6. DIAL ALARM SYSTEM
• THIS SYSTEM IS SET TO DIAL A PREDETERMINED NUMBER OR NUMBERS WHEN THE
ALARM ACTIVATE. THE NUMBER SELECTED MIGHT BE THE POLICE OR THE SUBSCRIBER’S
HOME NUMBER, OR BOTH. WHEN THE PHONE IS ANSWERED, A RECORDING STATES THAT
AN INTRUSION IN PROGRESS AT THE LOCATION SO ALARMED.
• THIS SYSTEM IS RELATIVELY INEXPENSIVE TO INSTALL AND OPERATE, BUT, SINCE IT IS
DEPENDENT ON GENERAL PHONE CIRCUITS, IT COULD FAIL IF LINE WERE BUSY OR IF THE
PHONE CONNECTION WERE CUT.
KINDS OF ALARM
1. AUDIO DETECTIVE DEVICE

•IT WILL DETECT ANY SOUND CAUSED BY ATTEMPTED FORCE


ENTRY. A SUPERSONIC MICROPHONE SPEAKER SENSOR IS
INSTALLED IN WALLS, CEILINGS, AND FLOORS OF THE PROTECTED
AREA.
2. VIBRATION DETECTION DEVICE
•IT WILL DETECT ANY VIBRATION CAUSED BY ATTEMPTED FORCE
ENTRY. A VIBRATION SENSITIVE SENSOR IS ATTACHED TO WALLS,
CEILINGS OR FLOORS OF THE PROTECTED AREAS.
•THIS IS ECONOMICAL AND EASILY INSTALLED, HIGH SALVAGE
VALUE, AND FLEXIBLE IN APPLICATION.
3. METALLIC FOIL OR WIRE
•IT WILL DETECT ANY ACTION THAT MOVES THAT FOIL OR WIRE. AN
ELECTRICALLY CHARGE STRIPS OF TINFOIL OR WIRE IS USED IN
THE DOORS, WINDOWS, OR GLASS SURFACES OF THE PROTECTED
AREA. THIS IS CONSISTENT TROUBLE FREE SERVICE, AND CAUSES
FEW NUISANCE ALARMS.
4. LASER BEAM

•A LASER EMITTER FLOODS A WALL OR FENCING WITH A BEAM SO


THAT WHEN THIS BEAM IS DISTURBED BY A PHYSICAL OBJECT,
AN ALARM IS ACTIVATED.
5. PHOTOELECTRIC OR ELECTRIC EYE DEVICE

•AN INVISIBLE/VISIBLE BEAM IS EMITTED AND WHEN THIS IS


DISTURBED OR WHEN AN INTRUDER BREAK CONTACT WITH THE
BEAM, IT WILL ACTIVATE THE ALARM.
6. MICROWAVE MOTION DETECTION DEVICE

•A PATTERN OF RADIO WAVES IS TRANSMITTED AND PARTIALLY


REFLECTED BACK TO AN ANTENNA. IF THEY STRIKE A MOVING OBJECT,
THEY RETURN AT A DIFFERENT FREQUENCY WHICH RESULTS IN
INITIATING AN ALARM SIGNAL. VERY EFFECTIVE FOR PROTECTION OF
INTERIOR AREAS. THIS HAVE A GOOD COVERAGE, AND NOT AFFECTED BY
AIR CURRENTS NOISE SOUND.
FOOT RAIL ACTIVATOR
• FOOT RAIL ACTIVATORS ARE PLACE ON THE FLOOR IN SUCH A POSITION THAT TELLERS
MAY ACTIVATE THE ALARM BY PLACING THE FRONT OF THEIR FOOT TO ENGAGE THE
ACTIVATION BAR.

• FOOT RAIL DO NOT ACQUIRE ANY OBVIOUS USE OF THE TELLER’S HAND AND THEIR
HANDS MAY KEPT IN FULL VIEW OF THE ROBBERS FOR REASON OF SAFETY, BECAUSE
FOOT RAIL CAN BE ACTIVATE VERY OBTRUSIVELY AND SAFELY THEN WILL FREQUENTLY
BE FOUND IN THE BANKS WHERE TELLERS NORMALLY OPERATE WHILE STANDING UP.
DISADVANTAGE

•TELLERS WITH FLATFORM SHOES, ITCHY FEET, OR USING


BROOMS AND OTHER ARTICLES WILL OFTEN
INADVERTENTLY CAUSE A FALSE ALARM.
BILL TRAPS
• BILL TRAPS OR CURRENCY ACTIVATION
DEVICES ARE USUALLY PLACE IN THE
TELLER’S CASH DRAWER AND
CONNECTED TO THE ALARM SYSTEM
USING A WIRE CONNECTOR. WHEN
CURRENCY IS REMOVED FROM THE
DEVICES, THE ALARM IS ACTIVATED.
ADVANTAGE
•THE ROBBERS THEMSELVES FREQUENTLY REMOVE THE
CURRENCY AND ACTIVATE THE ALARM. THIS IS PARTICULARLY
HELPFUL WHEN THE EMPLOYEES ARE IMMEDIATELY FORCE TO
LEAVE THEIR STATION WITHOUT HAVING HAD AN OPPORTUNITY
TO ACTIVATE THE ALARM SAFETY.
KNEE OR THIGH BUTTON
•THESE ARE INSTALLED INSIDE THE DESK OR TELLER STATION
WHICH CAN BE ACTIVATED BY KNEE OR THIGH PRESSURE.
THEY ARE COMMONLY FOUND IN LOCATION WHERE
PERSONNEL USUALLY PERFORM THEIR DUTIES FROM
SEATED POSITION.
FOOT BUTTON

•LIKE THE FOOT RAIL PERMIT ALARM ACTIVATION IN


RELATIVELY SAFETY WHILE BOTH HANDS REMAIN
CLEAR IN VIEW OF THE ROBBERS.
DOUBLE SQUEEZE BUTTONS

•REQUIRED PRESSURE ON BOTH SIDE OF THE DEVICE AND


THEREFORE THE PROBABILITY OF ACCIDENTAL ALARM IS
REDUCE.
UTILIZATION OF ALARM DEVICES
•THE SELECTION OF PROPER ALARM SYSTEM IS NOT A SIMPLE
MATTER, BECAUSE THE NEEDS OF EACH INSTALLATION IS
DIFFERENT, LIKE A SET OF FINGERPRINTS. SOME FACTORS THAT
DETERMINE THE REQUIREMENTS OF THE INSTALLATION WILL
INCLUDE:
UTILIZATION OF ALARM DEVICES
1. NATURE OF THE AREA OR INSTALLATION
2. CRITICALLY OF THE AREA OR COMPLEX
3. VULNERABILITY OF THE AREA OR COMPLEX
4. ACCESSIBILITY
5. LOCATION OF INSTALLATION AND AREAS TO BE PROTECTED
6. CONSTRUCTIONS AND TYPES OF BUILDINGS
UTILIZATION OF ALARM DEVICES
7. HOURS OF NORMAL OPERATIONS
8. AVAILABILITY OF OTHER TYPES OF PROTECTION
9. INITIAL AND RECURRING COST OF INSTALLED ALARM SYSTEM
10. DESIGN AND SALVAGE VALUE DESIRED EQUIPMENT
11. RESPONSE TIME OF THE SECURITY FORCE AND LOCAL POLICE
12. SAVINGS IN MAN POWER AND MONEY FOR A PERIOD OF TIME IF ALARM IS USED
DESIRABLE CHARACTERISTICS OF INTRUSION ALARM
SYSTEM

• INTRUSION ALARM DEVICES ARE DESIGNED TO DETECT AND NOT TO


PREVENT CRIMINAL ACTS AND SHOULD BE USED NORMALLY AS AN
ADJUNCT AND NOT A REPLACEMENT OF THE HUMAN GUARD FORCES. THE
PRIMARY CONSIDERATION ON THE CHOICE OF A PARTICULAR ALARM
SYSTEM INCLUDES STABILITY, DURABILITY AND RELIABILITY. DESIRABLE
CHARACTERISTICS FURTHERMORE SHOULD INCLUDE:
DESIRABLE CHARACTERISTICS OF INTRUSION ALARM
SYSTEM
1. A DETECTION UNIT SHOULD INITIATE THE ALARM UPON INTRUSION OF A HUMAN BEING IN THE AREA OR VICINITY
UPON INTRUSION OF A HUMAN BEING IN THE AREA OR VICINITY TO THE PROTECTED AREA OR OBJECT.
2. PANEL BOARD CENTRAL ENUNCIATOR OPERATING CONSOLE – MONITORING ACTIVITIES SHOULD BE MANNED AT ALL
TIMES.
3. AN ENUNCIATOR CONSOLE INDICATING THE AUDIBLE AND/OR AURAL SIGNAL AND THE SPECIFIC LOCATION OF
INCIDENT SO THAT PROPER ACTION CAN BE MADE BY SECURITY AND OTHER UNITS.
4. FAIL-SAFE FEATURES WHICH GIVE ALARM IN THE ANNUNCIATOR WHEN SOMETHING IS WRONG WITH THE SYSTEM.
5. SYSTEM SHOULD BE DIFFICULT TO TAMPER OR RENDER INEFFECTIVE BY OUTSIDERS, COMPETITORS OR
SABOTEURS.
SUMMING UP PROTECTIVE ALARM DEVICES
1. ALARM DEVICES ARE PHYSICAL SAFEGUARDS USED TO ASSIST SECURITY BUT NOT A
REPLACEMENT IN THE PROTECTION OF ASSETS AND LIVES IN THE INSTALLATION.
2. IT ASSISTS THE GUARDS TO EXTEND THEIR HEARING AND VISION EVEN IN AREAS WHERE
THEY ARE NOT PHYSICALLY PRESENT.
3. THE ALARM SYSTEM WHETHER A LOCAL, A CENTRAL, PROPRIETARY, OR AN AUXILIARY
TYPE ARE TO INFORM THE GUARD EITHER VISUALLY OR AURALLY OF AN ATTEMPT OR A
BREAK-IN WITHIN THE PREMISES BEING PROTECTED.
SUMMING UP PROTECTIVE ALARM DEVICES

4. MAINTENANCE OF ALARM SYSTEM MUST BE REGULARLY MADE, THE SIGNAL


LINE MUST BE PROTECTED, AND THERE MUST BE ALTERNATE SOURCE OF POWER.
5. NEW AND IMPROVE INTRUSION HARDWIRES ARE BEING DEVELOPED AND
PLACED IN THE MARKET BUT AGAIN, THE HUMAN GUARD IS IRREPLACEABLE IN
SPITE OF COMPUTERIZATION AND THE ARRIVAL OF SUPER SOPHISTICATED
DEVICES IN SECURITY ALARM SYSTEMS.
PROTECTIVE LOCKS AND KEY CONTROL
• LOCK IS ONE OF THE MOST WIDELY USED PHYSICAL SECURITY DEVICES IN THE ASSET
PROTECTION PROGRAM OF AN INSTALLATION. IT COMPLEMENTS OTHER PHYSICAL SAFEGUARDS
OF THE INSTALLATION AGAINST ANY POSSIBLE SURREPTITIOUS ENTRY. HOWEVER, THE OWNER OF
THE INSTALLATION OR HIS SECURITY OFFICER NEEDS TO UNDERSTAND THE WEAKNESSES AND
STRENGTH OF EACH TYPE OF LOCK INCLUDING THE DOOR, WINDOW OR WALLS TO BE USED TO
ACHIEVE MAXIMUM BENEFIT FROM IT APPLICATION. THIS IS BECAUSE HIGHLY SKILLED
BURGLARS MORE OFTEN CONCENTRATE ON THE LOCK AND ITS SURROUNDING MECHANISM IN
ORDER TO MAKE A FORCIBLE ENTRY.
PROTECTIVE LOCKS AND KEY CONTROL
• IT IS OBVIOUS REASONS THAT LOCKS ARE CONSIDERED AS DELAYING DEVICES
WHICH CAN NOT REALLY TOP A DETERMINE INTRUDER FROM DESTROYING THE
LOCK JUST TO LAUNCH AN ATTACK. HENCE, KNOWLEDGE OF THE BASIC
PRINCIPLES OF LOCKING SYSTEMS WILL ENABLE THE INSTALLATION OWNER OR
THE SECURITY OFFICER TO EVALUATE ANY LOCK AND DETERMINE ITS QUALITY
AND EFFECTIVENESS IN A PARTICULAR APPLICATION.
LOCK

•A LOCK IS DEFINED AS A MECHANICAL, ELECTRICAL,


HYDRAULIC OR ELECTRONIC DEVICE DESIGNED TO
PREVENT ENTRY INTO A BUILDING, ROOM, CONTAINING OR
HIDING PLACE.
PETERMAN

•A TERM IN ENGLAND FOR LOCK PICKER, SAFECRACKER,


AND PENETRATOR OF RESTRICTED AREAS OR ROOM.
TYPES OF LOCK
1. KEY OPERATED MECHANICAL LOCK
•IT USES SOME SORT OF ARRANGEMENT OF INTERNAL
PHYSICAL BARRIERS (WARDS TUMBLERS) WHICH PREVENT
THE LOCK FROM OPERATING UNLESS THEY ARE PROPERLY
ALIGNED. THE KEY IS THE DEVICE USED TO ALIGN THESE
INTERNAL BARRIERS SO THAT THE LOCK MAY BE OPERATED.
FOUR GENERAL GROUPS AND KEY CONTROL
a. DISC TUMBLER LOCK – DESIGNED FOR THE USE OF THE AUTOMOBILE INDUSTRY AND ARE IN GENERAL USE IN CAR
DOORS TODAY, BECAUSE THIS LOCK IS EASY AND CHEAP TO BE MANUFACTURED, ITS USE HAS EXPANDED TO
OTHER AREAS SUCH AS DESK, FILES AND PADLOCKS. THE DELAY AFFORDED IS APPROXIMATELY TEN MINUTES.
b. PIN TUMBLER LOCK
c. LEVEL TUMBLER LOCK – ARE DIFFICULT TO DEFINE IN TERMS OF SECURITY, SINCE THEY VARY GREATLY IN THEIR
EFFECTIVENESS. THESE LOCKS ARE USED IN SAFE DEPOSIT BOXES AND ARE FOR ALL PRACTICAL PURPOSES, PICK
PROOF. THE LEAST OF THESE LOCKS ARE USED IN DESK, LOCKERS AND CABINETS AND ARE GENERALLY LESS
SECURE THAT PIN TUMBLER LOCK.
d. THE WARDED LOCK – OFFER VERY LITTLE SECURITY, THIS TYPE OF LOCK MUST THEREFORE BE USE ONLY TO HAVE
PRIVACY, BUT NOT TO PROVIDE A DEGREE OF SECURITY.
2. PADLOCK

•A PORTABLE AND DETACHABLE LOCK HAVING A SLIDING


HASP WHICH PASSES THROUGH A STAPLE RING AND IS
THEN MADE FASTEN OR SECURED.
3. COMBINATION LOCK

•INSTEAD OF USING THE KEY TO ALIGN THE TUMBLERS, THE


COMBINATION MECHANISM USES NUMBERS, LETTERS OR OTHER
SYMBOLS AS REFERENCE POINT WHICH ENABLES AN OPERATOR
TO ALIGN THEM MANUALLY.
4. CODE-OPERATED LOCK

•A TYPE OF LOCK THAT CAN BE OPENED BY PRESSING A


SERIES OF NUMBERED BUTTON IN THE PROPER SEQUENCE.
5. ELECTRICAL LOCK

•A TYPE OF LOCK THAT CAN BE OPENED AND CLOSED


REMOTELY BY ELECTRICAL MEANS.
6. CARD-OPERATED LOCK

•A TYPE OF LOCK OPERATED BY CODED CARD.


TYPES OF KEY
1. CHANGE KEY

•A SPECIFIC KEY, WHICH OPERATES THE LOCK AND HAS A


PARTICULAR COMBINATION OF CUTS, OR BITING, WHICH
MATCH THE ARRANGEMENT OF THE TUMBLERS IN THE
LOCK.
2. SUB-MASTER KEY

•A KEY THAT WILL OPEN ALL THE LOCK WITHIN A


PARTICULAR AREA OR GROUPING IN A GIVEN
FACILITY.
3. MASTER KEY

•A SPECIAL KEY CAPABLE OF OPENING A SERIES OF


LOCK.
4. GRAND MASTER KEY

•A KEY THAT WILL OPEN EVERYTHING IN A SYSTEM


INVOLVING TWO OR MORE MASTER KEY GROUPS.
KEY CONTROL

•ONCE AN EFFECTIVE KEY CONTROL HAS BEEN INSTALLED, POSITIVE


CONTROL OF ALL KEYS MUST BE GAINED AND MAINTAINED. THIS CAN
BE ACCOMPLISHED ONLY IF IT IS ESTABLISHED IN CONJUNCTION
WITH THE INSTALLATION OF NEW LOCKING DEVICES. THE FOLLOWING
METHODS CAN BE USED TO MAINTAIN EFFECTIVE KEY CONTROL;
1. KEY CABINET

•A WELL CONSTRUCTED CABINET WILL HAVE TO BE


PROCURED. THE CABINET WILL HAVE TO BE OF SUFFICIENT
SIZE TO HOLD THE ORIGINAL KEY TO EVERY LOCK IN THE
SYSTEM. IT SHOULD BE SECURED AT ALL TIMES.
2. KEY RECORD

•SOME ADMINISTRATIVE MEANS MUST BE SET UP TO


RECORD CODE NUMBERS AND INDICATES TO WHOM
KEYS TO SPECIFIC LOCKS HAVE BEEN ISSUED.
3. INVENTORIES

•PERIODIC INVENTORIES WILL HAVE TO BE MADE OF


ALL DUPLICATE AND ORIGINAL KEYS IN THE HANDS
OF EMPLOYEES WHOM THEY HAVE BEEN ISSUED.
4. AUDITS

•IN ADDITION TO PERIODIC INVENTORY, AN


UNANNOUNCED AUDIT SHOULD BE MADE OF ALL KEY
CONTROL RECORDS AND PROCEDURES BY A
MEMBER OF MANAGEMENT.
5. DAILY REPORT

•A DAILY REPORT SHOULD BE MADE TO THE PERSON RESPONSIBLE


FOR KEY CONTROL FROM THE PERSONNEL DEPARTMENT INDICATING
ALL PERSONS WHO HAVE LEFT OR WILL BE LEAVING THE COMPANY. IN
THE EVENT THAT A KEY HAS BEEN ISSUED, STEPS SHOULD BE
INITIATED TO INSURE THAT THE KEY IS RECOVERED.
PRINCIPLE OF KEY CONTROL

•THE ESSENCE OF KEY CONTROL IN A SECURITY SYSTEM CAN


NEVER BE OVEREMPHASIZED, KEY CONTROL MANAGEMENT
WILL ASSIST PROTECTIVE SYSTEM IN USE. THE FOLLOWING
POINTERS WILL BE HELPFUL IN ANY SYSTEM.
PRINCIPLE OF KEY CONTROL
1. A KEY DEPOSITOR FOR SECURING KEYS DURING NON-WORKING SHOULD BE CENTRALLY LOCATED, LOCKED AND KEPT
UNDER SUPERVISION OF SECURITY PERSONNEL.
2. KEY ISSUED ON DAILY BASIS, OR THIS ISSUED FOR A SPECIFIC ON TIME PURPOSE, SHOULD BE ACCOUNTED FOR DAILY.
3. KEY SHOULD BE COUNTED AND SIGNED FOR BY SECURITY SUPERVISOR AT THE BEGINNING OF EACH WORKING DAY.
4. WHEN THE KEY IS LOST, THE CIRCUMSTANCES SHOULD BE INVESTIGATED AND SET FORTH IN WRITING. IN SOME
INSTANCE, IF THE LOST KEY PROVIDES ACCESS TO SENSITIVE AREA, LOCK SHOULD BE CHANGE.
5. ALL KEYS SHOULD BE PHYSICALLY INSPECTED PERIODICALLY TO ENSURE THAT THEY HAVE NOT BEEN LOST THROUGH
UNREPORTED AS SUCH.
PRINCIPLE OF KEY CONTROL
6. CAREFUL RECORD SHOULD BE KEPT OF SUCH INSTANCE. THE LIST SHOULD BE REVIEWED PERIODICALLY TO
DETERMINE WHETHER ALL THOSE AUTHORIZED SHOULD CONTINUE TO HOLD SUCH KEY.
7. MASTER KEY SHOULD BE IN MINIMUM. IF POSSIBLE SUB-MASTER KEY SHOULD BE USED, AND THEY SHOULD BE
ISSUED ONLY TO LIMITED LIST OF PERSONNEL ESPECIALLY SELECTED BY MANAGEMENT.
8. KEY SHOULD NOT BE MARKED OR SHOULD NOT IDENTIFY DOORS OF LOCKS THEY OPEN. CODE SHOULD BE MADE TO
THIS EFFECT.
9. MASTER KEY SHOULD NOT BE MARK IDENTIFYING THEM AS A MASTER KEY.
10. KEY AND LOCKS SHOULD BE CHANGE AT LEAST ONCE IN 12 MONTHS.
ART 304 (REVISED PENAL CODE) POSSESSION OF
PICKLOCKS OR SIMILAR TOOLS
• ANY PERSON WHO SHALL WITHOUT LAWFUL CAUSE HAVE IN POSSESSION OF
PICKLOCKS OR SIMILAR TOOLS ESPECIALLY TO THE COMMISSION OF THE CRIME OR
ROBBERY, SHALL BE PUNISHED BY ARRESTO MAYOR IN ITS MAXIMUM PERIOD TO
PRISON CORRECCIONAL IN ITS MINIMUM PERIOD.

• THE SAME PENALTY SHALL BE IMPOSED UPON ANY PERSON WHO SHALL MAKE SUCH
TOOL. IF THE OFFENDER IS A LOCKSMITH, SHALL SUFFER THE PENALTY OF PRISON
CORRECCIONAL IN ITS MEDIUM AND MAXIMUM PERIOD.
ART 305 (REVISED PENAL CODE) FALSE KEY

•THE TERM “FALSE KEY” SHALL BE DEEMED TO INCLUDE:


a.THE TOOL MENTIONED IN THE NEXT PROCEEDING ARTICLES.
b.GENUINE KEYS STOLEN FROM THE OWNER.
c.ANY KEY OTHER THAN THOSE INTENDED BY THE OWNER FOR USE
IN THE LOCK FORCIBLY OPENED BY THE OFFENDER.
SECURITY CABINET
• THE FINAL LINE OF DEFENSE AT ANY FACILITY IS IN THE HIGH SECURITY STORAGE WHERE PAPERS,
RECORDS, PLANS OR CASHABLE INSTRUMENT, PRECIOUS METALS OR OTHER ESPECIALLY VALUABLE
ASSETS ARE PROTECTED. THESE SECURITY CONTAINERS WILL BE OF A SIZE AND QUANTITY, WHICH
THE NATURE OF THE BUSINESS DICTATES.

• IN PROTECTING PROPERTY, IT IS ESSENTIAL TO RECOGNIZE THAT PROTECTIVE CONTAINERS ARE


DESIGNED TO SECURE AGAINST BURGLARY OR FIRE. EACH TYPE OF EQUIPMENT HAS A SPECIALIZED
FUNCTION AND IT WILL DEPEND ON THE OWNER OF THE FACILITY WHICH TYPE THAT IS GOING TO
USE.
THREE (3) TYPES OF SECURITY CABINET
1. SAFE
A METALLIC CONTAINER USED FOR THE
SAFEKEEPING OF DOCUMENTS OR
SMALL ITEMS IN AN OFFICE OR
INSTALLATION. SAFE CAN BE
CLASSIFIED AS EITHER ROBBERY OR
BURGLARY RESISTANCE DEPENDING
UPON THE USE AND NEED.
1. SAFE
• AT LEAST 750 LBS ANCHORED
• ANY SAFE THAT WEIGH LESS THAN 750 LBS SHOULD BE ANCHORED TO A
BUILDING STRUCTURE
• ITS BODY SHOULD AT LEAST ONE INCH THICK STEEL OR EQUAL
• SAFE AS A GENERAL RULE, REQUIRE THE DOOR TO BE MADE OF STEEL AND AT
LEAST 11/2 THICK
SOME TEST FOR SAFE FIRE RESISTANCE
a. FIRE ENDURANCE – A SAFE SHOULD NOT HAVE AT ANY ONE TIME A TEMPERATURE ABOVE 350
DEGREES FAHRENHEIT
b. EXPLAIN HAZARD TEST – TEST TO DETERMINE IF SUDDEN RISE IN TEMPERATURE WILL NOT
CAUSE THE SAFE TO RUPTURE. IF THE SAFE CAN WITHSTAND 2000 DEGREES FAHRENHEIT FOR
30 MINUTES AND WILL NOT CRACK OR OPEN, THEN IT HAS PASSED THE EXPLOSION TEST.
c. FIRE AND IMPACT TEST – AIMED AT DETERMINING THE STRENGTH OF A SAFE TO WITHSTAND
THE COLLAPSE OF A BUILDING DURING FIRE.
2. VAULT
• HEAVILY CONSTRUCTED FIRE AND
BURGLAR RESISTANCE CONTAINER
USUALLY A PART OF THE BUILDING
STRUCTURE USED TO KEEP AND PROTECT
CASH, DOCUMENTS AND NEGOTIABLE
INSTRUMENTS. VAULTS ARE BIGGER THAN
SAFE BUT SMALLER THAN A FILE ROOM.
2. VAULT
• THE VAULT DOOR SHOULD BE MADE OF STEEL AT LEAST 6 INCHES IN THICKNESS
• VAULT WALLS, CEILING, FLOOR REINFORCE CONCRETE AT LEAST 12 INCHES IN THICKNESS
• ELECTRICAL CONDUITS INTO THE VAULTS SHOULD NOT EXCEED 11/2 IN DIAMETER
• VAULT FLOOR SHOULD BE HIGHER BY FOUR INCHES WITH THE SURROUNDING FLOORS AND IF IN LEVEL WITH THE
FLOOR BUTTONS, STORAGE CONTAINER SHOULD BE RAISED AT LEAST 4 INCHES ABOVE THE FLOOR

• VAULT SHOULD NOT BE MADE PART OF THE WALL DUE TO MOISTURE AND CONDENSATION CAUSED BY TEMPERATURE
• STANDARD VAULTS, TO REDUCE DESTROYING OF TOO MUCH RECORD, SHOULD NOT BE MORE THAN 5, 000 CUBIC FEET
• THE VAULT MUST BE RESISTIVE UP TO 6 HOURS
3. FILE ROOM

• A CUBICLE IN A BUILDING
CONSTRUCTED A LITTLE
LIGHTER THAN A VAULT BUT OF
BIGGER SIZE TO ACCOMMODATE
LIMITED PEOPLE TO WORK ON
THE RECORDS INSIDE.
3. FILE ROOM
• THE FILE ROOM SHOULD AT MOST BE 12 FEET HIGH
• THE INTERIOR CUBAGE SHOULD NOT MORE THAN 10, 000 CUBIC FEET
• THE VENTILATION SHOULD BE THROUGH THE DOOR
• IT MUST HAVE A WATERTIGHT DOOR AND AT LEAST FIRE PROOF FOR ONE HOUR
• THE SUPPORTING STRUCTURE, THE WALLS, FLOOR AND ROOF SHOULD BE MADE
FIREPROOF
PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL

• IN EVERY INSTALLATION, THE USE OF PROTECTIVE BARRIERS, SECURITY LIGHTING,


COMMUNICATION AND ELECTRONIC HARDWARE PROVIDES PHYSICAL
SAFEGUARDS BUT THESE ARE INSUFFICIENT TO MAXIMIZE THE EFFORT OF THE
GUARD FORCE. A CONTROL POINT MUST BE ESTABLISHED FOR POSITIVE
PERSONNEL IDENTIFICATION AND CHECK SYSTEM. THIS IS TO INSURE THAT ONLY
THOSE PERSONS WHO HAVE THE RIGHT AND AUTHORITY WILL BE GIVEN THE
NECESSARY ACCESS TO THE AREA.
PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL

• THE MOST PRACTICAL AND GENERALLY ACCEPTED SYSTEM OF PERSONNEL


IDENTIFICATION IS THE USE OF IDENTIFICATION CARDS BADGES OR PASSES.
GENERALLY SPEAKING, THIS SYSTEM DESIGNATES WHEN AND WHERE AND HOW
IDENTIFICATION CARDS SHOULD BE DISPLAYED, AND TO WHOM. THIS HELPS
SECURITY PERSONNEL ELIMINATE THE RISK OF ALLOWING THE ACCESS OF
UNAUTHORIZED PERSONNEL WITHIN THE ESTABLISHMENTS.
TYPES OF PERSONNEL IDENTIFICATION

1. PERSONAL RECOGNITION
2.ARTIFICIAL RECOGNITION – IDENTIFICATION CARDS,
PASSES, PASSWORDS, ETC.
USE OF PASS SYSTEM
1. SINGLE PASS SYSTEM – THE BADGE OR PASS CODED FOR AUTHORIZATION TO ENTER SPECIFIC AREAS
IS ISSUED TO AN EMPLOYEE WHO KEEPS IT IN HIS POSSESSION UNTIL HIS AUTHORIZATION IS
TERMINATES.
2. PASS EXCHANGE SYSTEM – AN EXCHANGE TAKES PLACE AT THE ENTRANCE OF EACH CONTROLLED
AREA. UPON LEAVING THE PERSONNEL SURRENDERS HIS BADGE OR PASSES AND RETRIEVE BACK HIS
BASIC IDENTIFICATION.
3. MULTIPLE PASS SYSTEM – THIS PROVIDES AN EXTRA MEASURE OF SECURITY BY REQUIRING THAT AN
EXCHANGE TAKE PLACE AT THE ENTRANCE OF EACH RESTRICTED AREA.
BADGE AND PASS CONTROL
1. THE SYSTEM SHOULD HAVE A COMPLETE RECORD OF ALL BADGES AND IDENTIFICATION
CARDS ISSUED, RETURN, MUTILATED OR LOST BY SERIAL NUMBER AND CROSS-INDEXED
ALPHABETICALLY.
2. THE SUPERVISOR FROM TIME TO TIME FOR ITS ACCURACY AND AUTHENTICITY SHOULD
CHECK THE LISTS.
3. PASSES AND BADGES REPORTED LOST SHOULD BE VALIDATED AND SECURITY AT
ENTRANCE BE INFORMED THROUGH CONSPICUOUS POSTING.
TYPES OF CONTROLLED AREA
1. CONTROLLED AREA – ARE THOSE AREAS WHERE ACCESS IS RESTRICTED AS TO ENTRANCE OR
MOVEMENT BY ALL AUTHORIZED PERSONNEL AND VEHICLES. IT SHOULD ADDITIONALLY MARKED BY A
FENCE OR OTHER BARRIER, AND ACCESS TO IT SHOULD LIMITED TO AS FEW GUEST AS POSSIBLE.
2. LIMITED AREA – ARE THOSE WITHIN THE CONTROLLED ARE WHERE A GREATER DEGREE OF SECURITY IS
REQUIRED.
3. EXCLUSION AREA – ARE USED ONLY FOR HANDLING AND STORAGE OF HIGH VALUE CARGO AND
CLASSIFIED DOCUMENTS. THE NUMBER OF PEOPLE AUTHORIZED TO ENTER THIS AREA SHOULD BE
STRICTLY LIMITED, AND THE AREA SHOULD BE UNDER SURVEILLANCE AT ALL TIMES.
TRAFFIC CONTROL SYSTEM
• CONTROLLING TRAFFIC IN AND OUT WITHIN A FACILITY IS ESSENTIAL TO
ITS SECURITY PROGRAM. PERIMETER BARRIERS, LOCKED DOORS AND
SCREENED WINDOWS PREVENT OR DETER THE ENTRY OF AUTHORIZED
VISITORS, BUT SINCE SOME TRAFFIC ESSENTIAL TO EVERY OPERATION, NO
MATTER HOW HIGHLY, CLASSIFIED IT MAYBE, PROVISION MUST BE MADE
FOR THE CONTROL OF THIS MOVEMENT.
TRAFFIC CONTROL SYSTEM
• SPECIFIC SOLUTION WILL DEPEND UPON THE NATURE OF THE BUSINESS, OBVIOUSLY
RETAIL ESTABLISHMENT, WHICH ENCOURAGE HIGH VOLUME TRAFFIC AND WHICH
REGULARLY HANDLE A GREAT DEAL OF MERCHANDISE BOTH IN AND OUT, HAVE A
PROBLEM OF A DIFFERENT DIMENSION FROM THE INDUSTRIAL OPERATION WORKING
ON A HIGHLY CLASSIFIED GOVERNMENT PROJECT. BOTH, HOWEVER, MUST WORK
FROM THE SAME GENERAL PRINCIPLE TOWARDS PROVIDING THE GREATEST POSSIBLE
SECURITY WITHIN THE EFFICIENT AND EFFECTIVE OPERATION OF THE JOB AT HAND.
PERSONNEL IDENTIFICATION
• THE MOST PRACTICAL AND GENERALLY ACCEPTED SYSTEM IS THE USE OF BADGES
AND IDENTIFICATION CARDS. GENERALLY SPEAKING, THIS SYSTEM DESIGNATES
WHEN AND WHERE AND HOW PASSES SHOULD BE DISPLAYED, AND TO WHOM, WHAT
IS TO BE DONE IN CASE OF THE LOSS OF THE PASS; PROCEDURE FOR TAKING THE
PASS FROM TERMINATING EMPLOYEES; AND A SYSTEM IN CANCELLATION AND
REISSUE OF ALL PASSES; EITHER AS A SECURITY REVIEW OR WHEN A SIGNIFICANT
NUMBER OF BADGE HAVE REPORTED LOST OR STOLEN.
PERSONNEL IDENTIFICATION
TO BE EFFECTIVE:
1. BADGE MUST BE TAMPER-RESISTANT, WHICH MEAN THAT THEY SHOULD BE PRINTED OR EMBOSSED ON A
DISTINCTIVE STOCK WITH A SERIES OF DESIGN DIFFICULT TO REPRODUCE
2. THEY SHOULD CONTAIN A CLEAR AND RECENT PHOTOGRAPH OF THE BEARER, PREFERABLY IN THE COLOR
3. THE PHOTOGRAPH SHOULD BE AT LEAST ONE INCH SQUARE AND SHOULD BE UPDATED EVERY TWO OR THREE
YEARS OR WHEN THERE IS ANY SIGNIFICANT CHANGE IN FACIAL APPEARANCE
4. SHOULD ADDITIONALLY CONTAIN VITAL STATISTIC SUCH AS DATE OF BIRTH, HEIGHT, WEIGHT, COLOR OF HAIR
AND EYES, SEX AND THUMBPRINTS.
VISITORS MOVEMENT CONTROL
•SECURITY SHOULD ESTABLISH PROPER METHODS OF
ESTABLISHING THE AUTHORITY FOR ADMISSION OF VISITORS AS
WELL AS THE LIMITATION THEREAT. THIS SECURITY MEASURE
WOULD DEPEND ON THE SENSIBILITY OF THE INSTALLATION, BUT
COULD INCLUDE THE FOLLOWING:
1. VISITOR’S LOGBOOK

•ALL VISITORS TO ANY FACILITY SHOULD BE REQUIRED TO


IDENTIFY THEM AND SHOULD BE GIVEN A VISITOR’S ID BY THE
SECURITY. VISITOR’S LOGBOOK SHOULD BE FILLED UP WITH THE
NAMED OF VISITORS, NATURE AND DURATION OF VISIT.
2. PHOTOGRAPH
•TAKING OF PHOTOGRAPHS SHOULD ALSO BE CONSIDERED. EXTREME
CAUTION MUST BE EXERCISED IN AREAS WHERE CLASSIFIED
INFORMATION IS DISPLAYED TO PRECLUDE UNAUTHORIZED TAKING OF
PICTURES OF THE INSTALLATION. IF A VISITOR HAS CAMERA AND IT IS
PROHIBITED TO TAKE PICTURE, SAID CAMERA SHOULD BE LEFT IN THE
CARE OF SECURITY WITH CORRESPONDING RECEIPT.
3. ESCORT

•IF POSSIBLE VISITORS SHOULD BE ESCORTED BY THE SECURITY


TO MONITOR THEIR ACTIVITY WITHIN THE ESTABLISHMENT AND
GUIDE THEM WHERE TO GO.
4. VISITOR ENTRANCES

•SEPARATE ACCESS FOR VISITORS AND EMPLOYEES OF THE


ESTABLISHMENT SHOULD BE PROVIDED.
5. TIME TRAVELED

•IF THERE IS A LONG DELAY OR TIME, LAPSE BETWEEN THE


DEPARTURE AND ARRIVAL, THE VISITORS MAYBE REQUIRED TO
SHOW THE CAUSE FOR THE DELAY.
PACKAGE MOVEMENT CONTROL
• EVERY FACILITY MUST ESTABLISH A SYSTEM FOR THE CONTROL OF PACKAGE ENTERING OR
LEAVING THE PREMISES. HOWEVER, DESIRABLE IT MIGHT SEEM IT IS SIMPLY UNREALISTIC TO
SUPPOSE THAT A BLANKET RULE FORBIDDING PACKAGES EITHER IN OR OUT WOULD BE
WORKABLE. SUCH A RULE WOULD BE DAMAGING TO THE EMPLOYEE MORALE AND, IN MAY CASES,
WOULD ACTUALLY WORK AGAINST THE EFFICIENT OPERATION IN THE FACILITY. THEREFORE,
SINCE THE TRANSPORTING OF PACKAGES THROUGH THE PORTALS IS A FACT OF LIFE, THEY MUST
BE DEALT WITH IN ORDER TO PREVENT THEFT AND MISAPPROPRIATION OF COMPANY
PROPERTIES.
PACKAGE MOVEMENT CONTROL
1. NO PACKAGES SHALL BE AUTHORIZED TO BE BROUGHT INSIDE THE INDUSTRIAL INSTALLATION, OFFICES, AND
WORK AREA WITHOUT PROPER AUTHORITY. THIS BASIC PRECEPT HELP REDUCE IF NOT ELIMINATE PILFERAGE,
INDUSTRIAL ESPIONAGE OR SABOTAGE.
2. OUTGOING PACKAGES CARRIED BY PERSONNEL SHOULD BE CLOSELY INSPECTED AND THOSE IN VEHICLES SHOULD
ALSO BE CHECKED AS MANY PILFERED ITEMS ARE HIDDEN IN THE SURFACE OF THE VEHICLES LEAVING THE
COMPOUND.
3. ANY PERSONNEL/VISITOR ENTERING THE INSTALLATION WITH A PACKAGE SHOULD DEPOSIT THE SAME TO THE
SECURITY AND IN RETURN RECEIVES A NUMBERED TAG, WHICH HE/SHE WILL USE IN CLAIMING HIS/HER PACKAGE
UPON DEPARTING.
VEHICULAR MOVEMENT CONTROL AND IDENTIFICATION

•VEHICULAR TRAFFIC WITHIN THE BOUNDARIES OF ANY FACILITY


MUST BE CAREFULLY CONTROLLED FOR SAFETY AS WELL AS TO
CONTROL THE TRANSPORTING OF PILFERED GOODS FROM THE
PREMISES.
VEHICULAR MOVEMENT CONTROL AND IDENTIFICATION
1. PRIVATELY OWNED VEHICLE OF PERSONNEL/VISITOR SHOULD BE REGISTERED AND ARE SUBJECT TO THE IDENTIFICATION AND
ADMITTANCE PROCEDURE.
2. VEHICLES SHOULD BE SUBJECTED FOR SEARCH AT THE ENTRANCE AND EXIT OF EACH INSTALLATION.
3. ALL VISITORS WITH VEHICLE SHOULD PROVIDE THE SECURITY AS TO THE COMPLETE DETAILS OF THEIR DURATION OF STAY,
PERSON TO BE VISITED, AND OTHER INFORMATION.
4. ALL VEHICLES OF VISITORS SHOULD BE GIVEN A SIGN/STICKER TO BE PLACED ON THE WINDSHIELD.
5. TRAFFIC WARNING SIGNS SHOULD BE INSTALLED IN ALL ENTRANCES IN ORDER TO GUIDE THE VISITORS IN THEIR DESTINATION
AS WELL TO PROVIDE THEM WITH THE NECESSARY SAFETY PRECAUTIONS WHILE THEY ARE INSIDE THE INSTALLATION.
6. SECURITY PERSONNEL MUST CONSTANTLY SUPERVISE PARKING AREAS AND MAKE FREQUENT SPOTS SEARCHES OF VEHICLES
FOUND THERE.
BUILDING ACCESS CONTROL
•AT ANY PHYSICAL BARRIER, A SECURITY SYSTEM MUST POSSESS
THE ABILITY TO DISTINGUISH AMONG AUTHORIZED PERSONS,
UNAUTHORIZED VISITORS, AND OTHER UNAUTHORIZED PERSONS.
THIS IS TO ASSIST THE SECURITY PERSONNEL PROTECTS
SENSITIVE AREA AND INFORMATION WITHIN THE INSTALLATION.
BUILDING ACCESS CONTROL

•APPROPRIATE WARNING SIGNS SHOULD BE POSTED AT THE


BUILDING PERIMETER. SPECIAL RESTRICTED ENTRY FACILITIES TO
PUBLIC ACCESS SHOULD BE PROVIDED. THIS WILL BE DEPENDENT ON
THE DEGREE OF SECURITY NEEDED FOR THE PROTECTION OF
PROPERTY, ACTIVITY AND OTHER PROCESSES WITHIN THE BUILDING.
BUILDING ACCESS CONTROL
• THE ACCESS TO THE RESTRICTED AREA SHALL BE LIMITED TO AUTHORIZE
PERSONNEL WHO HAVE THE DIRECT INVOLVEMENT WITH THE INSTALLATION,
CONSTRUCTION AND OPERATION AND MAINTENANCE OF EACH EQUIPMENT AND
SYSTEMS AND/OR USE OF EACH MATERIALS CONTAINED WITHIN THE
RESTRICTED AREA. A CLEAR-CUT POLICY ON THE ACCESS CONTROL SHOULD BE
DISSEMINATED TO ALL PERSONNEL OF THE INSTALLATION.
ACTIVITY # 1

1. WHAT IS PERSONNEL SECURITY


2.WHAT ARE THE PURPOSE OF PERSONNEL SECURITY
3.WHAT IS PERSONNEL SECURITY INVESTIGATION
4.WHAT IS SECURITY EDUCATION
PERSONNEL SECURITY
PERSONNEL SECURITY

• OF THE THREE MAJOR ASPECTS OF SECURITY, PERSONNEL SECURITY IS CONSIDERED AS THE MOST
IMPORTANT. THIS IS FOR THE SIMPLE REASON THAT SECURITY INVOLVES PEOPLE, BOTH AN ASSETS TO
BE PROTECTED AND AS SOURCE OF SECURITY THREATS. IT IS AN ACKNOWLEDGE FACT THAT LOSSES ARE
ATTRIBUTED MAINLY TO NEGLIGENCE OR ACTIVE PARTICIPATION OF EMPLOYEES, EITHER THROUGH
THEFT AND SABOTAGE. THIS EMPHASIZES THE NEED TO SET UP A SYSTEM OF HIRING THE PEOPLE FOR THE
COMPANY.
PURPOSE OF PERSONNEL SECURITY
1. TO INSURE THAT A FIRM HIRES THOSE EMPLOYEES BEST SUITED
FOR THE FIRM; AND
2.ONCE HIRED, TO ASSIST IN PROVIDING THE NECESSARY
SECURITY TO THESE EMPLOYEES WHILE THEY ARE CARRYING
OUT THEM FUNCTIONS.
SCOPE OF PERSONNEL SECURITY

1.PERSONNEL SECURITY INVESTIGATION (PSI)


2.SECURITY EDUCATION
KEY FUNCTIONS OF PERSONNEL SECURITY
1. IT SERVES AS A SCREENING DEVICE IN HIRING SUITABLE EMPLOYEES.
2. IT PROVIDES BACKGROUND INVESTIGATION SERVES OF BOTH POTENTIAL AND PRESENT EMPLOYEES, FOR
POSSIBLE ASSIGNMENT TO SENSITIVE POSITION.
3. IT HANDLES INVESTIGATION OF EMPLOYEES SUSPECTED OF WRONG DOING.
4. IT DEVELOPS SECURITY AWARENESS AMONG EMPLOYEES.
5. IT ATTEMPTS TO ENSURE THE PROTECTION OF EMPLOYEES FROM DISCRIMINATORY HIRING OR TERMINATING
PROCEDURES AS WELL AS UNFOUNDED ALLEGATIONS OF ILLEGAL OR UNETHICAL ACTIVITIES AND CONDUCT.
PERSONNEL SECURITY INVESTIGATION
•PERSONNEL SECURITY INVESTIGATION (PSI) IS A PROCESS
OF INQUIRY INTO THE CHARACTER, REPUTATION,
DISCRETION, INTEGRITY, MORALS AND LOYALTY OF AN
INDIVIDUAL TO DETERMINE THE SUITABILITY FOR
APPOINTMENT OR ACCESS TO CLASSIFIED MATTER.
GENERAL TECHNIQUES OF PSI
1. BACKGROUND INVESTIGATION (BI)

•THIS TECHNIQUE IS VERY EXPENSIVE BUT NECESSARY IN


PERSONNEL SECURITY. IT SERVES TO VERIFY INFORMATION
ON THE APPLICATION FORM AND TO OBTAIN OTHER
INFORMATION PERTINENT TO THE DECISION TO EMPLOY.
FACTORS TO CONSIDER IN THE CONDUCT OF BI

a. LOYALTY
b. INTEGRITY
c. DISCRETION
d. MORALS
e. CHARACTER
f. REPUTATION
COMPONENTS OF COMPLETE BI
j. ORGANIZATION MEMBERSHIP
a. APPLICANTS NAME
k. NEIGHBORHOOD INVESTIGATION
b. DATE OF BIRTH
l. CHARACTER REFERENCE
c. PRESENT RESIDENCE ADDRESS m. EMPLOYMENT HISTORY
d. PERSONAL HISTORY n. MILITARY HISTORY
e. MARITAL HISTORY o. FOREIGN TRAVEL HISTORY
f. RESIDENCE HISTORY p. CRIMINAL RECORD
g. CITIZENSHIP q. CREDIT RECORDS
h. PHYSICAL DATA
r. APPLICANT’S SIGNATURE
s. DATE OF APPLICATION
i. EDUCATIONAL HISTORY
TYPES OF LOCAL AGENCY CHECK (LAC)
a.BARANGAY CLEARANCE
b.CITY OF MUNICIPAL CLEARANCE
c.LOCAL POLICE CLEARANCE
d.COURT CLEARANCE
TYPES OF NATIONAL AGENCY CHECK (NAC)

a.NATIONAL BUREAU OF INVESTIGATION (NBI) CLEARANCE


b.PNP DIRECTORATE FOR INTELLIGENCE (DI) CLEARANCE
c.INTELLIGENCE SERVICE, AFP (ISAFP) CLEARANCE
2. POSITIVE VETTING
• IS THE PROCESS OF INSPECTING OR EXAMINING WITH CAREFUL
THOROUGHNESS. THE ESSENCE OF VETTING IS A PERSONAL INTERVIEW
CONDUCTED UNDER STRESS.IT IS BASED ON INFORMATION PREVIOUSLY
GIVEN BY THE APPLICANT. OTHER INFORMATION ISSUED DURING THE
INTERVIEW, SUCH AS THOSE DISCOVERED IN THE BI, WHICH CONFIRMS OR
DENIES WHICH GIVEN BY THE APPLICANT.
3. PROWLING
•IS THE PROCESS WHEREBY A SUBJECT’S REACTION IN A FUTURE
CRITICAL SITUATION IS PREDICTED BY OBSERVING HIS
BEHAVIOR, OR BY INTERVIEWING HIM, OR ANALYZING HIS
RESPONSES TO A QUESTIONNAIRE, SUCH AS AN HONEST TEST.
THE REID REPORT IS AN EXAMPLE OF HONESTY TEST.
4. DECEPTION DETECTION TECHNIQUES

•THIS PROCESS OF USING DEVICES IN DETECTING


DECEPTION DURING THE INTERVIEW STAGE. THIS
INCLUDES THE USE OF A POLYGRAPH, PSYCHOLOGICAL
STRESS EVALUATOR AND VOICE ANALYZER
5. FINANCIAL AND LIFESTYLE INQUIRY

•THIS TYPE OF INVESTIGATION SEEKS TO


GATHER INFORMATION ON INCOME AND MODE
OF LIVING, SOMETIMES REFERRED TO AS THE
EARNING-TO-DEBT RATIO.
6. UNDERCOVER INVESTIGATION
•THIS IS THE PLACEMENT OF AN AGENT IN A ROLE IN WHICH
THE AGENT’S TRUE IDENTITY AND ROLES REMAINS
UNKNOWN, IN OTHER TO OBTAIN INFORMATION FOR
CRIMINAL PROSECUTION OR FOR RECOVERY OR
LIMITATION OF ASSET LOSSES.
7. EXIT INTERVIEW
• THIS IS A VALUABLE TOOL BECAUSE IT GIVES DEPARTING EMPLOYEES AN
OPPORTUNITY TO LIST GRIEVANCES. IT OFFERS SECURITY MANAGER AN
OPPORTUNITY TO LEARN OF PROBLEMS NOT PREVIOUSLY KNOWN. INCORPORATING
A CHECKLIST OF COMPANY ISSUED PROPERTY AND CONFRONTING A DEPARTING
EMPLOYEE IS ALSO INCORPORATED INTO THE EXIT INTERVIEW TO REMIND
EMPLOYEES OF THEIR CONTINUING LEGAL OBLIGATION TO SAFEGUARD
CONFIDENTIAL COMPANY INFORMATION.
SECURITY EDUCATION

•SECURITY EDUCATION IS CONDUCTED TO DEVELOP


SECURITY AWARENESS AMONG EMPLOYEES IN THE
COMPANY. IT SHOULD COVER ALL EMPLOYEES,
REGARDLESS OF RANK OR POSITION.
SECURITY EDUCATION PROGRAM

•THE BASIC GOALS OF SECURITY EDUCATION


PROGRAM IS TO ACQUAINT ALL THE EMPLOYEES THE
RATIONALE BEHIND THE SECURITY MEASURES AND
TO INSURE THEIR COOPERATION AT ALL TIMES.
OBJECTIVES OF SECURITY EDUCATION
1. GUIDANCE OF ALL SUPERVISORY AND EXECUTIVE LEVELS OF THE ORGANIZATION.
2. A MANDATORY INDOCTRINATION ON SECURITY FOR ALL NEW PERSONNEL BEFORE THEIR ASSIGNMENT
TO THEIR RESPECTIVE JOBS.
3. DEVELOPMENT OF A HIGH DEGREE OF SECURITY CONSCIOUSNESS AMONG THE SELECTED
SUPERVISORS AND OTHER KEY PERSONNEL IN A PROGRAM THAT SHOULD BE CONTINUING AND
SUPPORTED BY TOP MANAGEMENT.
4. A DOWN-THE-LINE SECURITY PROGRAM AIMED AT INSTILLING CONSCIOUSNESS AND DEDICATION
THROUGH DEMONSTRATION, LECTURES, MOTIVATIONS AND SUGGESTIONS.
5. TO LET ALL EMPLOYEE FORCE BE INFORMED THAT THEY ALL BELONG TO THE ORGANIZATION AND THAT
NON-AWARENESS TO THE SECURITY PROGRAM IS TANTAMOUNT TO DISLOYALTY.
6. THAT THE PROGRAM IS ALSO TO DEVELOP DISCIPLINE, LOYALTY AND BELONGINGNESS.
PHASE OF SECURITY EDUCATION PROGRAM
1. INITIAL INTERVIEW
• IT IS THE FIRST CONTACT OF THE PROSPECTIVE EMPLOYEE WHEREIN THE
INTERVIEWER DETERMINES THE SUITABILITY OF THE APPLICANT FOR EMPLOYMENT
THROUGH HIS GIVEN ANSWERS ON THE DIFFERENT TYPE OF QUESTIONS BEING
CONDUCTED. IT IS IN THIS STAGE WHERE, THE INTERVIEWER MAY START PROVIDING
THE NECESSARY INFORMATION AS TO THE OVERVIEW OF COMPANY SECURITY
POLICIES AND AT THE SAME TIME ON THE EMPLOYEE ACCOUNTABILITY AND
CORRESPONDING PENALTIES THAT COULD RESULT FROM VIOLATION THERE FROM.
2. ORIENTATION AND TRAINING
•IT IS IN THIS STAGE WHERE NEW EMPLOYEES RECEIVE DETAILED
PRESENTATION OF PERSONNEL SECURITY POLICY. USUALLY HANDOUTS
OR EMPLOYEES MANUAL ARE BEING DISTRIBUTED FOR REFERENCE. NEW
EMPLOYEES ALSO REQUESTED TO SIGN ACKNOWLEDGEMENT THAT THEY
HAVE BEEN AWARE OF THE EXISTING COMPANY POLICIES AND WILL
ABIDE THE SAME.
3. REFRESHER CONFERENCE
•IT IS DESIGN TO REMIND EMPLOYEES OF THE COMPANY ABOUT
THEIR RESPONSIBILITIES, REVIEW THE GUIDELINES AND
POLICIES, INTRODUCTION OF NEW POLICIES AND REGULATIONS
AND A MOVEMENT OF GETTING EMPLOYEES FEEDBACK ABOUT
THE COMPANY POLICIES THAT IS BEING IMPLEMENTED.
4. SECURITY REMINDERS

•THIS EMPLOYED AS AN INDIRECT APPROACH OF


EDUCATING THE EMPLOYEES, SUCH AS POSTING
SECURITY POSTERS AND DISTRIBUTING FLIERS.
5. SECURITY PROMOTION

•IT IS THE ACT OF EMPHASIZING THE IMPORTANCE


AND ROLE OF SECURITY ACHIEVING THE COMPANY
GOALS AND OBJECTIVES. IT INVOLVES SECURITY
EMPLOYEE COOPERATION AND SUPPORT.
QUIZ # 1
1. IT IS IN THIS STAGE WHERE NEW EMPLOYEES RECEIVE DETAILED PRESENTATION OF PERSONNEL
SECURITY POLICY.
2. IS THE PROCESS OF INSPECTING OR EXAMINING WITH CAREFUL THOROUGHNESS.
3. THIS IS THE PLACEMENT OF AN AGENT IN A ROLE IN WHICH THE AGENT’S TRUE IDENTITY AND ROLES
REMAINS UNKNOWN.
4. CONDUCTED TO DEVELOP SECURITY AWARENESS AMONG EMPLOYEES IN THE COMPANY.
5. THIS TECHNIQUE IS VERY EXPENSIVE BUT NECESSARY IN PERSONNEL SECURITY.
QUIZ # 1
6. IS A PROCESS OF INQUIRY INTO THE CHARACTER, REPUTATION, DISCRETION, INTEGRITY, MORALS AND LOYALTY OF AN
INDIVIDUAL TO DETERMINE THE SUITABILITY FOR APPOINTMENT OR ACCESS TO CLASSIFIED MATTER.
7. THIS IS A VALUABLE TOOL BECAUSE IT GIVES DEPARTING EMPLOYEES AN OPPORTUNITY TO LIST GRIEVANCES.
8. IT IS THE FIRST CONTACT OF THE PROSPECTIVE EMPLOYEE WHEREIN THE INTERVIEWER DETERMINES THE SUITABILITY OF
THE APPLICANT FOR EMPLOYMENT THROUGH HIS GIVEN ANSWERS ON THE DIFFERENT TYPE OF QUESTIONS BEING
CONDUCTED.
9. IT IS THE ACT OF EMPHASIZING THE IMPORTANCE AND ROLE OF SECURITY ACHIEVING THE COMPANY GOALS AND
OBJECTIVES.
10.IS THE PROCESS WHEREBY A SUBJECT’S REACTION IN A FUTURE CRITICAL SITUATION IS PREDICTED
ANSWERS
1. ORIENTATION AND TRAINING
2. POSITIVE VETTING
3. UNDERCOVER INVESTIGATION
4. SECURITY EDUCATION
5. BACKGROUND INVESTIGATION
6. PERSONNEL SECURITY INVESTIGATION
7. EXIT INTERVIEW
8. INITIAL INTERVIEW
9. SECURITY PROMOTION
10.PROWLING
DOCUMENT AND INFORMATION SECURITY
DOCUMENT AND INFORMATION SECURITY
• IN EVERY INSTALLATION, DOCUMENT AND INFORMATION ARE INDISPENSABLE FOR THEIR DAILY
OPERATIONS AND ACTIVITIES, BE IT IN THE FORM OF THE PAPER, FILM, AND MAGNETIC MEDIA OR IN THE
COMPUTER SYSTEM. ONCE THERE IS A LEAKAGE IN THE CONTENTS OF A COMPANY’S DOCUMENT AND
INFORMATION, THE BUSINESS OPERATIONAL STABILITY IS AT STAKE. IT MAY BE A START OF BANKRUPTCY
THAT WOULD LEAD TO ITS TOTAL DISCLOSURE. THE LEAKAGE OF DOCUMENT AND INFORMATION COST
GOVERNMENT; BUSINESS AND INDUSTRY ALIKE, BILLION OF PESOS. A RIVAL COMPANY OR AN ENEMY
AGENT MIGHT USE AN ILLEGALLY OBTAIN DOCUMENT AND INFORMATION FOR THEIR OWN ADVANTAGE.
FOR THIS REASON, COMPREHENSIVE AND INFORMATION SECURITY PROGRAM IS VERY ESSENTIAL TO THE
INSTALLATION IN ORDER TO FOCUS FREELY ON THE ATTAINMENT OF ITS GOALS AND OBJECTIVES.
DOCUMENT AND INFORMATION SECURITY
• PROTECTION OF DOCUMENT AND INFORMATION ENTAILS A MAMMOTH TASK ON THE
PART OF THE EXECUTIVES AND THE STAFF OF THE INSTALLATION. THERE SHOULD BE A
CLEAR UNDERSTANDING ON ALL THE TYPES OF DOCUMENTS AND INFORMATION OF
THE ORGANIZATION. SECURITY MEASURES IN THE CLASSIFICATION, HANDLING, CARE,
AND PROPER DISPOSITION OF CLASSIFIED DOCUMENTS AND INFORMATION MUST BE
A PRIMARY CONCERN IN ORDER TO PRESERVE THE CONFIDENTIALITY AND INTEGRITY
OF DOCUMENT AND INFORMATION THROUGH OUT ALL PHASES OF ITS EXISTENCE.
PURPOSE OF PROTECTING CLASSIFIED MATERIALS

1. DETER AND IMPEDE POTENTIAL SPY.


2.ASSIST IN SECURITY INVESTIGATIONS BY KEEPING ACCURATE
RECORDS OF THE MOMENTS OF CLASSIFIED MATERIALS.
3.ENFORCE THE USE OF “NEED TO KNOW” PRINCIPLE.
2 KINDS OF DOCUMENT
1. PERSONAL – LETTERS, DIARY AND NOTEBOOKS. THERE SHOULD
BE TREATED USUALLY THE SAME WITH OFFICIAL DOCUMENT.
2.OFFICIAL – ORDERS, MANUALS, LETTERS, OVERLAYS, MAPS AND
MAGAZINES. YOU MAY BE CAREFUL AND FOLLOW THE CHAIN OF
COMMAND.
DOCUMENT/INFORMATION CYCLE
• EACH DOCUMENT OR INFORMATION HAS A LIFE CYCLE IN THE SENSE THAT ITS USEFULNESS HAS A BEGINNING AND AN END. IT PASSES
VARIOUS STAGES FROM THE TIME IT IS CREATED UNTIL IT IS FINALLY DISPOSED. THIS CYCLE CONSIST OF THE FOLLOWING:
1. CREATION
2. CLASSIFICATION
3. STORAGE
4. RETRIEVAL
5. RETENTION/PURGING
6. TRANSFER
7. DISPOSITION
CATEGORIES OF THE DOCUMENT
1. CATEGORY A
• INFORMATION WHICH CONTAINS REPORTABLE TIME SENSITIVE, ORDER OF BATTLE
AND SIGNIFICANT INFORMATION.
• IT SHOULD BE GIVEN PRIORITY BECAUSE IT IS CRITICAL INFORMATION.
• IT MUST BE FORWARDED WITHOUT DELAY.
• IT IS CRITICAL TO FRIENDLY OPERATIONS.
• IT REQUIRES IMMEDIATE ACTION.
2. CATEGORY B

•ANYTHING THAT CONTAINS COMMUNICATIONS,


CRYPTOGRAPHIC DOCUMENTS, OR SYSTEMS THAT SHOULD
BE CLASSIFIED A SECRET AND REQUIRES SPECIAL HANDLING.
•HIGHER AUTHORITIES SHOULD DECLASSIFY IT.
3. CATEGORY C
•OTHER INFORMATION, WHICH CONTAINS SOMETHING THAT, COULD BE
AN INTELLIGENCE VALUE.
•CONTAINS EXPLOITABLE INFORMATION REGARDLESS OF ITS CONTENTS.
•UNSCREENED MATERIALS/DOCUMENTS SHOULD BE CATEGORIZED AS
CATEGORY C.
4. CATEGORY D
•NO VALUE, YET LOWER LEVEL WILL NEVER CLASSIFY
DOCUMENTS AS CATEGORY D.
•NO DECISION MUST BE MADE AT THE LOWER ECHELON THAT
DOCUMENT HAS NO VALUE. IT IS THE RESPONSIBILITY OF THE
HIGHER HEADQUARTERS.
3 SECURITY CONCEPTS
1. PERSONNEL ARE THE WEAKEST LINK IN THE SECURITY CHAIN.
2.TRAINING IS IMPORTANT TO MAKE SECURITY PERSONNEL
CONSCIOUS AND REALIZE THE VALUE OF DOCUMENT.
3.TRAINING IS NECESSARY FOR THE PRACTICE OF “NEED TO
KNOW” PRINCIPLE.
4 TYPES OF CLASSIFIED MATTER
1. TOP SECRET (GREEN COLOR CODE)

•IS ANY INFORMATION AND MATERIALS THE


UNAUTHORIZED OF IT WOULD CAUSE EXCEPTIONALLY
GRAVE DAMAGE TO THE NATION, POLITICALLY,
ECONOMICALLY AND MILITARY OPERATION.
2. SECRET (RED COLOR CODE)
•IS ANY INFORMATION AND MATERIALS THE UNAUTHORIZED
DISCLOSURE OF IT WOULD ENDANGER NATIONAL SECURITY
CAUSE SERIOUS INJURY TO THE INTEREST OR PRESTIGE OF
THE NATION OR ANY GOVERNMENTAL ACTIVITY OR
ADVANTAGE TO A FOREIGN NATION.
3. CONFIDENTIAL (BLUE COLOR CODE)

•IS ANY INFORMATION OR MATERIAL, THE UNAUTHORIZED


DISCLOSURE OF IT WOULD BE PREJUDICIAL TO THE INTEREST AND
PRESTIGE OF THE NATIONAL OR GOVERNMENTAL ACTIVITY OR
WOULD CAUSE ADMINISTRATIVE EMBARRASSMENT OR UNWANTED
INJURY TO AND BE OF ADVANTAGE TO A FOREIGN COUNTRY.
4. RESTRICTED (WHITE OR NO COLOR)

•IS ANY INFORMATION AND MATERIAL WHICH


REQUIRES A SPECIAL PROTECTION OTHER THAN
THOSE DETERMINES CONFIDENTIAL, SECRET AND
TOP SECRET.
RULES OF CLASSIFICATION OF DOCUMENTS
1. DOCUMENTS SHALL BE CLASSIFIED ACCORDING TO THEIR CONTENT.
2. THE OVERALL CLASSIFICATION OF A FILE OR A GROUP OF PHYSICALLY CONNECTED THEREIN. PAGES PARAGRAPHS, SECTIONS OR
COMPONENTS THEREOF MAY BEAR DIFFERENT CLASSIFICATIONS. DOCUMENTS SEPARATED FROM FILE OR GROUP SHALL BE HANDLED
IN ACCORDANCE WITH THEIR INDIVIDUAL CLASSIFICATION.
3. TRANSMITTAL OF DOCUMENTS OR ENDORSEMENTS WHICH DO NOT CONTAIN CLASSIFIED INFORMATION OR WHICH CONTAIN
INFORMATION CLASSIFIED LOWER THAN THAT OF THE PRECEDING ELEMENT OR ENCLOSURE SHALL INCLUDE A NOTATION FOR
AUTOMATIC DOWNGRADING.
4. CORRESPONDENCE, INDEXES, RECEIPTS, REPORTS OF POSSESSION TRANSFER OR DESTRUCTION, CATALOGS OR ACCESSION LIST
SHALL NOT BE CLASSIFY IF ANY REFERENCE TO CLASSIFIED MATTER DOES NOT DISCLOSED CLASSIFIED INFORMATION.
5. CLASSIFIED MATTER OBTAINED FROM OTHER DEPARTMENT SHALL RETAIN THE SAME ORIGINAL CLASSIFICATION.
PROTECTION OF SENSITIVE INFORMATION

• PROPRIETARY INFORMATION IS INFORMATION THAT IN SOME SPECIAL WAY RELATES TO THE STATUS OR
ACTIVITIES OF THE POSSESSOR AND OVER WHICH THE POSSESSOR ASSERTS OWNERSHIP. IN THE
BUSINESS COMMUNITY, PROPRIETARY INFORMATION RELATES TO THE STRUCTURE, PRODUCTS OR
BUSINESS METHODS OF THE ORGANIZATION. IT IS USUALLY PROTECTED IN SOME WAY AGAINST CAUSAL
OR GENERAL DISCLOSURE. ALL PROPRIETARY INFORMATION IS CONFIDENTIAL, BUT NOT ALL
CONFIDENTIAL INFORMATION IS PROPRIETARY, FOR EXAMPLE, CONFIDENTIAL PERSONNEL DATA IN
EMPLOYEE FILES IN NOT CONSIDERED AS PROPRIETARY ALTHOUGH THE COMPANY TREATS IT AS
CONFINDENTIAL.
TYPES OF DOCUMENTS
• CLASS I – VITAL DOCUMENTS: IN THIS CATEGORY THESE ARE RECORDS THAT ARE IRREPLACEABLE, RECORDS OF
WHICH REPRODUCTION DOES NOT HAVE THE SAME VALUE AS THE ORIGINAL; RECORDS NEEDED TO RECOVER CASH,
TO REPLACE BUILDING, EQUIPMENTS, RAW MATERIALS, FINISHED PRODUCTS, AND WORK IN PROCESS AND RECORDS
NEEDED TO AVOID DELAY IN RESTORATION OF PRODUCTION, SALES AND SERVICES.

• CLASS II – IMPORTANT DOCUMENTS: THIS INCLUDES RECORDS THE REPRODUCTION OF WHICH WILL CLOSE
CONSIDERABLE EXPENSE AND LABOR, OR CONSIDERABLE DELAY.

• CLASS III – USEFUL DOCUMENTS: THIS INCLUDES RECORDS WHOSE LOSS MIGHT CAUSE INCONVENIENCE BUT COULD
BEV READILY REPLACED AND WHICH WOULD NOT IN THE MEANTIME PRESENT AN INSURMOUNTABLE OBSTACLE TO
THE PROMPT RESTORATION OF THE BUSINESS.
TYPES OF DOCUMENTS

• CLASS IV – NON-ESSENTIAL DOCUMENTS: THIS RECORDS ARE DAILY FILES, ROUTINE IN NATURE EVEN IF
LOST OR DESTROYED, WILL NOT AFFECTS OPERATION OR ADMINISTRATION. THIS CLASS REPRESENT THE
BULK OF RECORDS WHICH SHOULD NOT BE EVENT OF DISASTERS, THEY SHOULD, HOWEVER, BE KEPT IN
ORDINARY FILES READY FOR REFERENCE, IF NEEDED, AND USUALLY DISCARDED AFTER SOME PERIOD OF
TIME.
BASIC CONSIDERATION IN DOCUMENT AND
INFORMATION SECURITY
1. SECURITY OF INFORMATION IS BASED ON THE PREMISE THAT THE GOVERNMENT HAS THE RIGHT AND DUTY TO PROTECT
OFFICIAL PAPERS FROM UNWARRANTED AND INDISCRIMINATE DISCLOSURE;
2. THE AUTHORITY AND RESPONSIBILITY FOR THE PREPARATION AND CLASSIFICATION OF CLASSIFIED MATTERS REST
EXCLUSIVELY WITH THE ORIGINATING OFFICE;
3. CLASSIFIED MATTERS SHALL BE CLASSIFIED ACCORDING TO THEIR CONTENTS AND NOT TO THE CLASSIFICATION OF FILES IN
WHICH THEY ARE HELD OR ANOTHER DOCUMENT TO WHICH THEY ARE REFERRED;
4. CLASSIFICATION SHALL MADE AS SOON AS POSSIBLE BY PLACING APPROPRIATE MARKS ON THE MATTER TO BE CLASSIFIED;
5. EACH INDIVIDUAL WHOSE DUTIES ALLOW ACCESS TO CLASSIFIED MATTER OR EACH INDIVIDUAL WHO POSSESS KNOWLEDGE
OF CLASSIFIED MATTER WHILE IT IS IN HIS POSITION SHALL INSURE THAT DISSEMINATION OF SUCH CLASSIFIED MATTER IS
ON “NEED TO KNOW” BASIS AND TO PROPERLY CLEARED PERSONS ONLY.
TYPES OF PROPRIETARY INFORMATION
1. TRADE SECRETS – THIS CONSIST OF ANY FORMULA, PATTERN, DEVICE OR COMPILATION OF INFORMATION
WHICH IS USED IN ONE’S BUSINESS AND WHICH GIVES HIM AN OPPORTUNITY TO GAIN AN ADVANTAGE OVER
COMPETITORS WHO DO NOT KNOW OR USE IT. IT MAY BE A FORMULA FOR A CHEMICAL COMPOUND A
PROCESS OF MANUFACTURING, TREATING OR PRESERVING MATERIALS, A PATTERN FOR MACHINE OR DEVICE,
OR A LIST OF CUSTOMERS. IT DIFFERS FROM OTHER SECRET INFORMATION AS TO SINGLE OR EPHEMERAL
EVENTS. A TRADE SECRET IS A PROCESS OR DEVICE FOR CONTINUOUS USE IN THE PROTECTION OF THE
BUSINESS.
2. PATENTS – THIS IS A GRANT MADE BY THE GOVERNMENT TO AN INVENTOR, CONVEYING OR SECURING TO HIM
THE EXCLUSIVE RIGHT TO MAKE, USE, OR SELL HIS INVENTION FOR TERM OF YEARS.
PRIMARY DISTINCTIONS BETWEEN PATENTS AND
TRADE SECRETS

1. REQUIREMENTS FOR OBTAINING A PATENT ARE SPECIFIC; TO QUALIFY FOR A PATENT


THE INVENTION MUST BE MORE THAN NOVEL AND USEFUL. IT MUST REPRESENT A
POSITIVE CONTRIBUTION BEYOND THE SKILL OF THE AVERAGE PERSON.
2. A MUCH LOWER OF NOVELTY IS REQUIRED OF A TRADE SECRET.
3. A TRADE SECRET REMAINS SECRET AS LONG AS IT CONTINUES TO MEET TRADE SECRET
TESTS WHILE THE EXCLUSIVE RIGHT TO PATENT PROTECTION EXPIRES AFTER 17 YEARS.
PROPRIETARY INFORMATION PROTECTION PROGRAM

• REALIZING THAT THE MOST SERIOUS THREAT TO TRADE SECRETS IS THE


EMPLOYEE, A MEASURE OF PROTECTION IS OFTEN REALIZED THROUGH THE
USE OF EMPLOYEE AGREEMENTS WHICH RESTRICT THE EMPLOYEE
AGREEMENTS WHICH RESTRICT THE EMPLOYEE’S ABILITY TO DISCLOSE
INFORMATION WITHOUT SPECIFIC AUTHORIZATION TO THE COMPANY. THE
FOLLOWING COUNTER MEASURES MAY BE ADOPTED:
PROPRIETARY INFORMATION PROTECTION PROGRAM
1. POLICY AND PROCEDURE STATEMENTS REGARDING ALL SENSITIVE INFORMATION.
2. PRE AND POST EMPLOYMENT SCREENING AND REVIEW.
3. NON DISCLOSURE AGREEMENTS FROM EMPLOYEES, VENDORS, CONTRACTORS AND VISITORS.
4. NON COMPETITIVE AGREEMENTS WITH SELECTED EMPLOYEES.
5. AWARENESS PROGRAMS.
6. PHYSICAL SECURITY MEASURES.
7. INFORMED MONITORING OF ROUTINE ACTIVITIES.
QUIZ # 2
1. CONSIST OF ANY FORMULA, PATTERN, DEVICE OR COMPILATION OF INFORMATION WHICH IS USED IN ONE’S BUSINESS AND
WHICH GIVES HIM AN OPPORTUNITY TO GAIN AN ADVANTAGE OVER COMPETITORS WHO DO NOT KNOW OR USE IT.
2. IS ANY INFORMATION AND MATERIAL WHICH REQUIRES A SPECIAL PROTECTION OTHER THAN THOSE DETERMINES
CONFIDENTIAL, SECRET AND TOP SECRET.
3. COLOR CODE OF TOP SECRET.
4. ANYTHING THAT CONTAINS COMMUNICATIONS, CRYPTOGRAPHIC DOCUMENTS, OR SYSTEMS THAT SHOULD BE CLASSIFIED A
SECRET AND REQUIRES SPECIAL HANDLING.
5. IS ANY INFORMATION AND MATERIALS THE UNAUTHORIZED DISCLOSURE OF IT WOULD ENDANGER NATIONAL SECURITY CAUSE
SERIOUS INJURY TO THE INTEREST OR PRESTIGE OF THE NATION OR ANY GOVERNMENTAL ACTIVITY OR ADVANTAGE TO A
FOREIGN NATION.
QUIZ # 2
6. LETTERS, DIARY AND NOTEBOOKS. THERE SHOULD BE TREATED USUALLY THE SAME WITH OFFICIAL DOCUMENT.
7. ORDERS, MANUALS, LETTERS, OVERLAYS, MAPS AND MAGAZINES. YOU MAY BE CAREFUL AND FOLLOW THE
CHAIN OF COMMAND.
8. IMPORTANT DOCUMENTS: THIS INCLUDES RECORDS THE REPRODUCTION OF WHICH WILL CLOSE
CONSIDERABLE EXPENSE AND LABOR, OR CONSIDERABLE DELAY.
9. COLOR CODE OF SECRET.
10. COLOR CODE OF RESTRICTED
ANSWERS
1. TRADE SECRETS
2. RESTRICTED
3. GREEN
4. CATEGORY B
5. SECRET
6. PERSONAL
7. OFFICIAL
8. CLASS II
9. RED
10.WHITE OR NO COLOR

You might also like