Physical Security
Physical Security
Physical Security
SECURITY
MANAGEMENT
COURSE DESCRIPTION
• Industrial security management is a study involving the
organizational set-up and operation of security guards
pursuant to the Private Security Agency Law (RA 5487)
and it’s implementing rules and regulations (IRR). The
course covers various security measures and provisions
to include asset protection, loss prevention
management, security surveys and risk assessment.
This is a three-unit course intended for criminology
students inclined to pursue a career as security
professional or protection specialist.
Importance of Security
• Without proper security measures in place,
businesses risk losing their valuable
assets to theft or damage.
• Local armored
transportation services to
providing corporate
financial logistics and
international secure
transportation.
In 1909, William J. Burns,
Inc. was formed to become
the sole investigating
agency for the American
Banking Association.
Main purpose –
to deny or
impede
access or exit
of
unauthorized
persons.
Perimeter Barrier
(1st Line of Defense)
Secondary purposes:
1.It defines the boundary of the property to be
secured.
2.It creates a physical and psychological
deterrent to unauthorized entry.
3.It delays intrusion, thus, facilitating
apprehension of intruders.
Perimeter Barrier
(1st Line of Defense)
Secondary purposes:
• animal used in
partially providing
a guarding system
Energy Barrier
1. Change Key
2. Sub Master Key
3. Master Key
4. Grand Master Key
• SECURITY CABINET – The final line of defense at
any facility that is used in the storage of papers,
records, plans or cashable instrument, precious
metal or other specially valuable assets.
TYPES OF SECURITY CABINET
1. Safe
2. Vault
3. File Room
Safe
– a metallic container used for
the safekeeping of documents
or small items in an office or
installation. Safe can be
classified as either robbery or
burglary resistance depending
upon the use and need.
- weight must be at least 750
lbs. and should anchored to a
building structure.
Vault
heavily constructed fire
and burglar resistance
container usually a part of the
building structure used to
keep and protect cash,
documents and negotiable
instruments. Vaults are bigger
than safe but smaller than a
file room.
The vault must be
resistive up to 6 hours.
File room
A cubicle in a building
constructed a little lighter than
a vault but of bigger size to
accommodate limited people
to work on the records inside.
file room must at most
12 feet high.
it must have a water
weight door and at least fire
proof for one hour.
LAYERS OF SECURITY
Three Lines of Defense
• 1st Line – Perimeter
• 2nd Line – Building Walls, Doors &
Windows
• 3rd Line – Interior Barriers
Four D’s of DEFENSE
• Deter
• Detect
• Delay
• Detain
PERSONNEL AND
INFORMATION SECURITY
PERSONNEL SECURITY
Introduction
• Personnel Security covers policies and procedures that
seek to manage the risk of people who have legitimate
access to an organization’s assets and possibly using
those assets for unauthorized purposes.
• It is about securing a company or a firm from insiders
or employees.
Areas covered by
personnel security
• Personnel screening
• Background checks and lifestyle checks
• Security Education – includes:
– whistleblower programs,
– employee surveillance, and
– employee loyalty programs
• Security clearance system
Some Principles Regarding
Internal Theft
• Failure to focus on the laxity, carelessness or deliberate
negligence is also a major threat to one’s business.
• No security expert can anticipate all situations relating
to internal losses.
• One cannot be protect against everything, but, if
attention is given to basics and details, then losses can
be greatly hindered, if not minimized.
Personnel Screening
• The objective of personnel screening is to prevent theft
by employees.
• A goal of personnel screening is convince employees
that they would be caught if they steal from the
company.
• Basic to the effectiveness of any personnel security
program is the cooperation of the employees.
• The best place to start any personnel security program is
the screening of applicants.
Personnel Screening
• SCREENING – is the process of finding the best-
qualified person for the job, in terms of both skills AND
personal integrity.
• Rejection of job applicants with dubious characters, or
those considered as “BAD RISKS”, must be on the basis
of carefully established standards.
• Standards must be met in every particular case, and not
on a selective basis.
“Red flags” in an applicant’s
background
• Instability in personal relations;
• Lack job stability;
• Declining salary history, or are taking a cut in pay from
the previous job;
• Unexplained gaps in employment history;
• Clearly overqualified;
• Unable to recall or are hazy about relevant information in
the recent past.
Background and Lifestyle
Checks
• Many employees turn bad only once they are already
employed.
• A LIFESTYLE CHECK is a system of checking the
lifestyle of certain employees and to determine whether
or not changes in lifestyle are explainable by legitimate
sources of income.
Background and Lifestyle
Checks
• Continuous background check is important in order not
only to keep tabs on an employee’s personal information
(residence, marital status, etc.), but also for purposes of
determining changes in lifestyle, that may be a result of
illegal activities.
• Background checks should also be done if an employee
is a candidate for promotion to a more responsible or
sensitive position.
Personnel Security Policies
SEARCH POLICY
• Theft is reduced if there is a possibility that people
will be challenged and searched.
• Management has a right to impose search policies
within company premises.
• Searches should be approached from a
consensual point of view.
• Company rules should be acknowledged in writing
by each employee at the time of employment.
• Make sure everyone is informed.
Personnel Security Policies
Tips in Implementing a Search Policy:
• Check with your attorneys.
• Make sure ALL employees are aware of the policy.
Signatures may be required as evidence of notification.
• Inform all visitors openly that a search policy exists and
they are subject to it while on company premises.
Vehicles are also subject to the same policy.
• All employees, at all levels, including executives, are
subject to this policy.
Exit Interviews and Debriefing
• Exit interviews allow you to find out the real reason why
employees resign.
• It also gives you an opportunity to get information or
feedback regarding how the company is run.
• Exit interviews can be used to gather information of
illegal practices being done within the company.
Developing Security
Awareness Among
•
Employees
Staff vigilance is key to your protective
measures.
• Staff must have the confidence to report
anything suspicious.
• Training is important.
• Staff should be briefed to look out for packets,
bags or other items in odd places, carefully
placed (rather than dropped) items in rubbish
bins and unusual interest shown by strangers in
less accessible places.
Undercover Operations
• The key is the secrecy of the agents’ true intentions and
identity.
• More than one agent is usually employed.
• The ability of the agent to successfully infiltrate the
organization without standing out is very important.
• Undercover operations are costly and need some time in
order to succeed.
INFORMATION
SECURITY
Protection of Sensitive
Information
CLASSIFIED MATTERS
TOP SECRET (Code Green) - information, the unauthorized disclosure of
which would cause exceptionally grave damage to the nation politically,
economically, or military.
SECRET (Code Red) – information, the unauthorized disclosure of which
would endanger national security, causes serious injury to the interest or
prestige of the nation or any government activity.
DOCUMENT/INFO SECURITY
CLASSIFIED MATTERS