0% found this document useful (0 votes)
26 views146 pages

Edited

Security and Safety Seminar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views146 pages

Edited

Security and Safety Seminar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 146

COMPONENTS OF PHYSICAL

SECURITY

 Perimeter Barriers
 Protective Lightings
 Protective Alarms
 Protective Locks and Key Control and
 Protective Cabinets
 Guard Force and Guard Systems
What is a Guard System?
 It is a system for logging the
rounds of employees in an variety
of situations such as, security
guards patrolling property,
technicians monitoring the alarms or
guards checking every facility.
PRINCIPLES OF PHYSICAL
SECURITY

 There is No Impenetrable Barrier


 Defense in depth means barrier after
barrier
 Surreptitious versus Non-Surreptitious
Entry
 Each Installation is Different
WHAT ARE BARRIERS?

 any physical
structure
whether natural
or man made.
 capable of
restricting,
delaying or
preventing
unauthorized
access
Types of Barriers

1. Natural barriers - it includes bodies


of waters, mountains, marshes,
ravines, deserts or other terrain that
are difficult to traverse
2. Structural barriers - constructed by
man regardless of their original intent
that tends to delay the intruder. Ex.
walls, doors, windows, locks, fences,
safe, cabinets or containers etc
3. Human barriers - persons being
used in providing a guarding system
or by the nature of their employment
and location, fulfill security functions.
Examples are guards, office
personnel, shop workers, etc.
4. Animal barriers - animals are used
in partially providing a guarding
system. Dogs are usually trained and
utilized to serve as guard dogs.
German shepherds are best suited for
security functions. Goose and
turkeys could also be included.
5. Energy barriers - it is the
employment of mechanical,
electrical, electronic energy
imposes a deterrent to entry by the
potential intruder or to provide
warning to guard personnel. These
are protective lighting, alarm
system and any electronic devices
used as barriers.
CONCEPT OF PERIMETER
BARRIERS

 medium of structure which defines the


physical limits
 restrict or impede access
 any physical barrier used to supplement the
protection of an inside or outside perimeter.
LEVELS OF PHYSICAL SECURITY

1. Low Level Security


- fenced area
2. Minimum Security
-walled area
3. Medium Security :
-Use of advance intrusion alarm system;
- Use of an unarmed guard.
4. High Level Security
 Close Circuit Television (CCTV);
 Perimeter alarm system;
 High security lighting;
 Highly trained armed guards;
 Control designs; and
 Coordination with local law enforcement
agencies.
5. Maximum Security includes the application of
the following:
 Sophisticated alarm system; and
 On-site response force.
Three Line of Physical
Defense
1. First line of Defense/outer layer- perimeter
fences/ barriers
2. Second line of defense/middle layer- doors,
floors, windows, walls, roofs and grills and
other entries to the buildings
3. Third line of defense/inner layer- storage
system like steel cabinets, safes, vaults and
interior files.
PERIMETER BARRIER OPENINGS

1. Gates and doors – can be protected by:

- having one entrance with multiple interior


routes for several outside entrances (gate).

- Entrance should be planned with guard post


and access control systems and procedures
in mind.

- Reception desk, barriers and other controls


should be planned from the start.
Gates and Doors
- accessibility of entrances for
individuals with disabilities
must also be considered.

-Plan for locking devices or


controls at perimeter doors.
- provide for effective key
control.
Gates and Doors
- Plan for protective, cleaning,
and maintenance forces.

- Determine hours, locations,


level of access for such
personnel.
2. Windows and similar openings
-should also be guarded or grills
should be installed.

3. Utilities openings
- such as sewers, air intakes,
exhaust tunnels should be protected
by bars, grills, etc.;
4. Clear Zone is an unobstructed area
maintained on both sides of the
perimeter barrier. A clear zone of 20 ft.
or more is desirable between the barrier
and extension structures and natural
covers which may provide concealment
or assistance to a person seeking
unauthorized entry.
TYPES OF PERIMETER BARRIERS
1. FENCES
 Solid -visual access is denied.
 Full-View - visual access is permitted
2. BUILDING WALLS include walls,
floor, roofs or their combinations
3. BODIES OF WATER like river, lake,
sea, pond or any bodies of water
Types of Full-View Fence

1. Chain link fence



1. Chain link fence
 It must be constructed of 7 feet material excluding
top guard.
 It must be of 9 gauges or heavier.
 The mesh openings are not to be larger than 2
inches per side.
 It must be securely fastened to rigid metal or
reinforced concrete.
 It must reach within 2 inches of hard ground or
paving.
2. Barbed wire fence
2. Barbed wire fence
 Standard barbed wire is twisted,
double-strand, 12-gauge wire with 4
point barbs spaces in an equal
distance apart.
 Barbed wire fencing should not be less
than 7 feet high excluding top guard.
 must be firmly affixed to posts not
more than 6 feet apart
3. Concertina wire fence
3. Concertina wire fence

 Standard concertina barbed wire is


commercially manufactured wire
coil of high strength steel barbed
wire clipped together at
intervals to form a cylinder.
 Opened concertina wire is 50 feet
long and 3 feet in diameter
ADDITIONAL PROTECTIVE
MEASURES

1. Top Guard - additional overhang of barbed wire


placed on vertical perimeter fences facing upward
and outward with a 45-degree angle with three
to four strands of barbed wires spaced 6-inches
apart.
1. Guard Control Stations - provided at main
perimeter entrance to secure areas located out of
doors,
2. .
1.Towers or “Guard towers” are house-like
structures above the perimeter barriers.
2..
1.Signs and Notices or “Control signs” controls
unauthorized ingress, and preclude accidental entry.
What is a Restricted Area?

 A restricted area is any area in which


personnel or vehicles are
controlled for reasons of security.
PURPOSE:
1. TO permit different degrees of
security within the same installation
2. TO economize the use of security
personnel
Types of Restricted Areas

1. Exclusion Area- is a restricted area which


contains a security interest to TOP
SECRET importance, and which requires
the highest degree of protection.
2. Limited Area Control- is a restricted area
in which a lesser degree of control is
required but which the security
interest would be compromised by
uncontrolled movement.
Limited Area Control
includes :
A. Interior Area Control

Is generally effected in two ways:

1. The first method is the system


which is initiated and terminated at
the outer limits of the area to
determine the movements of a visitor.
2. A second is time travel. This system
provides for checking the actual time
used by the visitor.
Limited Area Control
includes :
B. Visitor Identification and Movement
control

- A visitor register shall be maintained


to include the following:
Name of the visitor,
Date of visit,
Purpose of visit,
Limited Area Control
includes :
C. Key Control

- A system of controlling keys including


the regulations covering the
disposal, storage or withdrawals,
shall be issued and imposed.
Limited Area Control
includes :
D. Fire Prevention- System that is
imposed to avoid the possibility of fire
hazards like the imposition of no
smoking policy on the area,
implementation of fire drill, etc.
What is Perimeter Security?

- It is the protection of the


installation’s inner and the
immediate vicinity.

- What is the difference between


Inner Vicinity and Immediate
Vicinity?
 Inner Vicinity –The area within
the installation.

 Immediate Vicinity - The outer


area usually
20 ft away
from the
gate.
What is Protective Lighting?

 The idea that lighting can provide


improve protection for people and
facilities is as old as civilization.
 Protective lighting is the single most
cost-effective deterrent to crime
because it creates a
psychological deterrent to the
intruders.
PURPOSE OF PROTECTIVE
LIGHTINGS

 provides a means of illumination


 a degree of protection maintained
during daylight hours.
 deterrent to thieves and vandals
 an essential element of an
integrated physical security program.
Types of Protective Lighting:
1. Stationary Luminary
(Continuous Lighting)

- It is used in Photo session


and considered as most
common security lighting
system.
Stationary Luminary
(Continuous Lighting)
- It is consist of a series of fixed
lights arranged to flood the
given area continuously with
overlapping cones of light
during darkness.
Stationary Luminary
(Continuous Lighting)

– the light intensity of the lighting


system can be adjusted to create the
desired effect.

- The lights direction can also be


adjusted as well.
Two Primary Methods of using
Continuous Lighting:
1. Glare Projection security Lighting

- is used when glare of the lights


are directed across the surrounding
terrain of perimeter, making difficult
for the intruder to see the inside
area.
Two Primary Methods of using
Continuous Lighting:
2. The Controlled Lighting

- is done when the width of the


lighted strip is controlled and
adjusted to fit the particular
need.
Two types of Continuous lights
1. Tungsten Lighting
- It generates lots of heat
2. Fluorescent Lighting
- It has far more life span.
2. Stand-by Lighting

- it is designed for reserve or


standby use or to supplement
continuous systems.
3. Movable Lighting
- this system is manually operated
and is usually made up of movable
search which will require lighting
only for short period of time.

4. Emergency Lighting – used in the


event of electrical failure
What are Protective Alarms?

 Protective alarm is a device used to


detect or impede any intruder.
The purpose is to alert the security
personnel for any attempt of intrusion
into a protected area, building or
compound.
THREE PARTS OF AN ALARM
SYSTEM
1. Sensor or
Triggering Device
2. Transmission Line
– circuit that
carries message
3. Enunciator –
signaling system
TYPES OF ALARM DETECTION SYSTEM

1. Central Station System – the control


station is located outside the installation.
2. Proprietary System – functions in the
same way as the central system except that
the control station is located within the
installation.
3. Local Alarm System – ringing up a visual
or audible alarm near the object to be
protected
4. Auxiliary System – installation circuits are
led into local police or fire department
Data Gathering Panel

Alarm Annunciation Alarm Assessment


CAS
(Central Alarm Station)

Alarm Sensor Alarm Sensor Alarm Sensor

52
What is a Ported coaxial cable?
 A buried cable outdoor detection
sensor system.
 The entire area where the cable is
buried will be filled with Radio
frequency Signals (RF)
 The RF signals shall form an invisible
electromagnetic detection field that
can locate and detect intruder.
What is Bestatic Microwave?
 It is a humidity based density sensor
 It detects and measures the amount
of moisture in the air
Exterior Bistatic Microwave
(Range of 100 Meters)
What is a Pyroelectric Infrared
(PIR)?
 It is a sensor that detects motion.
 It is able to detect minute of vibration
human being could never notice.
Exterior PIR Motion Detector
WHAT IS PERIMETER INTRUDER
DETECTION SYSTEM (PIDS)?

 These are electronic devices that


detects entry or attempted entry
across the external perimeter /
immediate vicinity . It serves as a
key point or vital point in signaling an
alarm.
Kinds of Alarms

1. Audio Detection Device - it will detect any


sound caused by attempted force entry. A
supersonic microphone speaker sensor is
installed in walls, ceilings and floors of
the protected area.

2. Vibration Detection Device - it will detect


any vibration caused by attempted force entry.
A vibration sensitive sensor is attached
to walls, ceilings or floors of the
protected area.
3. Metallic foil or wire - it will detect
any action that moves the foil or
wire. An electrically charge strips of
tinfoil or wire is used in the doors,
windows or glass surfaces of the
protected area.
4. Laser Beam Alarm - a laser emitter
floods a wall or fencing with a visible
beam so that when this beam is
disturbed by a physical object, an alarm
is activated.
5. Photoelectric or Electric Eye Device -
an invisible beam is emitted and when
this is disturbed or when an intruder
breaks contact with the beam, it will
activate the alarm.
What is the first developed lock
in history?

 Warded lock
What is an electrical device ?
 Electrical
Device
- takes energy of
electrical current
and transform it
in simple ways
like: heat, light
and motion
What is an electronic device ?
 Electronic device
manipulate the
electric current In
a way that adds
meaningful
information such
as cellphone or
video devices
with the use of
circuitry.
What is a warded lock?
- A type of lock
that uses
obstruction or
ward to prevent
the lock from
opening unless
the correct key
is inserted.
Warded lock

When key is Notches in the key


The key enters fully inserted; align with the
the lock cavity in the tip obstructions,
through a of key fits over allowing it to
keyhole. a cylindrical rotate freely;
post inside; this rotating, the key
provides a pivot may then activate
point about a lever or sliding
which the key bolt to open the
can rotate. lock.
Combination Locks
 it uses
numbers, letters
or other symbols
as reference point
which enable an
operator to align
them manually.
Code Operated Locks
 can be opened by
pressing the series
of numbered
button in the
proper sequence.
TYPES OF KEYS

1. Change Key - a specific key, which


operates the lock and has a particular
combination of cuts, or biting, which match
the tumblers in the lock.
2. Sub-Master Key - could open all the lock
within a particular grouping in a facility.
3. Master Key - capable of opening a series of
locks.
4. Grand Master Key - open everything in a
system involving two or more master key
groups.
Electromagnetic Locks
 devices holding a
door by magnetism.
 when the power is
secured on the
door, it will resist
pressure of up to
1000 pounds.
PROTECTIVE CONTAINERS

 secured and usually


fire proof containers.
 The final line of
defense where
papers, records,
plans or cashable
instrument, precious
metals or other
especially valuable
assets are protected.
This is how SAFE looks like:
SAFE
 a metallic container used for the
safekeeping of documents or small items
 robbery or burglary resistance
 must be at least 750 lbs. or 339 kg
 anchored to a building structure
 body should at least one inch thick
steel.
 must be resistive to fire up to 3
hours.
VAULT
 a heavily constructed fire and
burglar resistance container
 part of the building structure
 bigger than safe
 door should be made of
steel at least 6 inches
 walls, ceiling, floor reinforce
concrete at least 12 inches
 must be resistive to fire up
to 6 hours.
FILE ROOM
 cubicle in a building constructed a
little lighter than vault
 12 feet high
 watertight door
 fire proof for one hour.
What is a Security Guard?
- Is sometimes called watchman, or any
person who renders personal service
to watch or secure either a residence
or business or both for hire or
compensation, with a license to
practice such profession.
WHAT IS A GUARD FORCE?

 selected men,
trained or grouped
into functional unit
 men assigned for
protecting
operational
processes from
those disruption
which would
impede efficiency
or halt operation
TYPES OF GUARD FORCES
1. Private Security Agency (PSA)-
contracts, recruits, trains, and post security
guard to a business firms
2. Company Security Force (CSF) -
maintained and operated by any private
company or corporation
3. Government Security Unit (GSU)-
operated by any government entity other
than military and / a police
REQUIREMENTS FOR NEW PSA
 1M Minimum Capital and 500K Bank
Deposit
 Application to CPNP thru SAGSD
 full name of the applicant;
 his age, civil status; and
 residence and location of his business.
In case of corporation, association or
partnership copies of the following shall be
appended:
 Certificate of Registration with the SEC; and
 BY-Laws and Articles of incorporation.
SAGSD
 Security Agencies and
Group Supervision
Divison
SEC
 Securities and
Exchange commission
Graduated Scale of License to
Operate
 200 or more but not exceeding
1000 shall be issued a regular
LTO good for 2 years.

 New PSA with 100 or more but


less than 200 shall be issued a
temporary LTO good for 1
year.
 PSAs with temporary LTO having
posted 100 guards or more but less
than 200 shall upon expiration of
such LTO shall be issued an
extension period of 6 mos. However,
upon expiration of the extension
period, no extension shall be granted
unless the PSA shall submit a
certification for additional 50 guards
posted for a 150 guards total.
 PSAs with cancelled/revoked LTOs
shall cease to operate and within 7
days after having been duly notified
of such cease to operate order,
shall immediately deposit all its
firearms with the FED which shall be
receipted, copy furnished, CPNP
SOSIA (SAGSD). Otherwise, the PSA
concerned, shall be liable under PD
1866 .
What is the acronym SOSIA of
the Philippine national Police?

 Supervisory Office for Security and


Investigation Agency
What is PD 1866?
 LAWS ON ILLEGAL/UNLAWFUL
POSSESSION, MANUFACTURE, DEALING
IN, ACQUISITION OR DISPOSITION, OF
FIREARMS, AMMUNITION OR EXPLOSIVES
OR INSTRUMENTS USED IN THE
MANUFACTURE OF FIREARMS,
AMMUNITION OR EXPLOSIVES, AND
IMPOSING STIFFER PENALTIES FOR
CERTAIN VIOLATIONS THEREOF AND FOR
RELEVANT PURPOSES
What is R.A. 5487?
 AN ACT TO REGULATE
THE ORGANIZATION AND
OPERATION OF PRIVATE
DETECTIVE, WATCHMEN
OR SECURITY GUARDS
AGENCIES.
Organizations involved in
Security industry:

PNP SEC
SAGSD – SOSIA – FED -

PADPAO
PSA – CGF – GSU
What is the umbrella
Organization PSA and CGF
nationwide?

 (PADPAO)
- PHILIPPINE ASSOCIATION OF
DETECTIVE AND PROTECTIVE
AGENCY OPERATORS, INC
What is the purpose of PADPAO
 – undertakes regional visits and
identifies whether security
agencies and companies comply
with rules and regulation of SOSIA
What is the acronym SOSIA of
the Philippine national Police?

 Supervisory Office for Security and


Investigation Agency
What is the purpose of SOSIA?

 With the responsibility of regulating


and harnessing the potential of
hundreds of security guards and
their reputable agencies.
Regulating and monitoring
includes the following:

 Monitoring the needs of the guard,


agency or company. Ex. Benefits

 Airing their complaints. Ex. Delayed


salary
 Listening to their concerns. Ex. Guns
not renewed
WHAT IS LTO?
 LICENSE TO OPERATE (LTO)
 document issued by the CPNP or his
duly authorized representative
authorizing a person to engage in
security business through SAGSD.
 What organization issues LTO
a security agency through the
CPNP?
(SAGSD) – SECURITY AGENCIES AND
GUARDS SUPERVISION DIVISON
 Who may organize and maintain a
PSA and Private Detective
Agency (PDA)?
 Any Filipino citizen or corporation,
association, partnership, 100%
owned and controlled by Filipino
citizens.
Basic Requirement of an Operator or
Manager of agency

Filipino citizen
At least 25 years old
College graduate and/or
A commissioned officer in
the inactive service or
 Retired from AFP or PNP or
Graduated/taken course in concepts and
methods in industrial Security and
Security Management and/or
 Must have and adequate training or
experience in security business
 Good moral character - not having been
convicted of any crime involving moral
turpitude; and
Disqualifications
 dishonorably discharged from
AFP/PNP or separated for cause
from any government entity or
government owned or controlled
corporation;
 Being mentally incompetent;
 Being physically unfit;
 Addicted to the use of narcotic
and/or prohibited drugs and/or
substances;
 Habitual drunkard and alcoholic;
 Dummy of any foreigner; and
 Elective or appointive government
officials and employees
Basic requisites for security guards
 Filipino citizen;
 High school graduate;
 Physically and mentally fit;
 At least 18 years old but not more
than 50 years old;
 Has undergone pre-licensing
training course; and
 Must not possess any of the
disqualifications.
Exemptions from Pre-
Licensing
 The following need not undergo pre-
licensing training for security guards:
1. Veterans and retired or honorably
discharged military/police personnel
possessing all the qualifications
mentioned in the preceding section.
2. ROTC advance/basic graduates,
and/or its equivalent in the AFP, PNP,
CAFGU.
CAFGU
-Citizen Armed force
Geographical Unit
Qualifications of a Private
Detective
 Holder of baccalaureate degree or
Bachelor of Laws; or
 B.S. Criminology graduate; or
 Graduate of Criminal Investigation Course
offered by the then PC/INP or the PNP or
the NBI or any police training school or
detective training with
authorized/recognized training center for
security guard; or
 Advance Reserve Officers Training Course
or Citizen Military Training (ROTC/CMT)
graduate.
Qualifications for Security
Officer
 Filipino citizen;
 Holder of Baccalaureate Degree;
 Physically and mentally fit;
 Has graduated from a Security Officer
Training Course;
 Retired personnel of the PNP/AFP; and
 Must not possess any of the
disqualification enumerated in Sec. 2, Rule
II.
Qualifications of Security
Consultant
 Holder of a Masters degree in either
Criminology, Public Administration, MNSA,
Industrial Administration or Law; or
 Must have at least 10 years experience in
the operation and management of security
business.
 Other Exemptions - Any officer or enlisted
man of the AFP or a uniform member of
the PNP honorably discharged/separated or
retired from the service are exempted from
the requirements.
MNSA
 Master in National Security
Administration.
 The Master in National Security
Administration (MNSA) Program is the main
academic program of the NDCP or National
defense College of the Philippines
 . The MNSA is open to military officers,
government officials and private sector leaders..
Civilian graduates are commissioned
Lieutenant Colonels or Commanders in the AFP
Reserve Force.
USE OF FIREARMS AND EQUIPMENT

 Possession of Firearms (FA) by PSA –


After complying all the requirements,
PSAs are entitled to possess firearms of
any of the following:
 shotguns, not higher than 12 gauge;

 low-power rifle or revolvers, cal. .22;

 cal. .38 pistols or revolvers not


exceeding one (1) FA for every two (2)
security guard in its employ.
 PSA with 100 guards - at least 30
pieces of licensed firearms. However,
after operating 6 mos., the PSA can
procure firearms in proportion to the
number of posted guards.
 For regular License to Operate (LTO)
application - at least 70 pieces of
firearms.
 Use of firearms for Private
Detective Agency shall be
OPTIONAL.
Restriction to possess certain
caliber of firearms
 The total number of the prescribed high-powered
firearms shall not exceed ten (10) percent of the
total numbers of guards employed.
 Private Security Agencies are not allowed to
possess high caliber guns/firearms such as:
carbine; M16; Cal 45; center fire magnum cal .41
and .44; and high caliber firearms, except: when
such private PSA/CSF is operating in areas where
there is an upsurge of lawlessness and
criminality.
 Exception is granted by CPNP or Regional Director
of Regional Police Office under the following
conditions:
Limitations in the carrying of
firearms
 The issued firearm shall be carried only by
the security guard (SG):
1. During his tour of duty when in proper
uniform within the compound of the
establishment, where he is assigned; and
2. Except, when he is escorting big amount of
cash or valuables, and upon prior
coordination with the nearest PNP
units/stations.
 Duty Detail Order or DDO – security personnel
on duties under the circumstances mentioned in
the preceding section must have DDO (SAGSD
Form No. 12-94).
Confiscation of firearms

1. about to be used in the commission of a crime;


2. actually being used in the commission of
crime;
3. has just been used in the commission of a
crime;
4. is being carried by the SG is unlicensed or not
authorized by law and regulation for his use;
5. confiscated by order of the court;
6. used or carried outside the AOR of the SG
without proper authority; or
7. the SG is unlicensed
Disposition of confiscated
Firearms
 The law enforcement officer who
confiscated the FA shall inform the CPNP
thru Civil Security Group (CSG) within 24
hours after such confiscation.
 The firearm shall be turned over
immediately to the nearest PNP
Unit/Station who shall immediately turn
over the same to the CSG District Office.
 When the confiscation is by order of the
court, the same shall be turned over to the
court concerned.
Reasons for revocation of
license to possess FAs - :

1. Failure to submit any issued FA for


verification as required by Sec. 897 ;
2. Carrying of FAs by security personnel
w/out appropriate DDO;
3. When its serial number (SN) is
duplicated or using the SN for more
than one firearm (FA);
.
4.Carrying of FAs outside the place
stated in the permit as required by
E.O. or carrying FA in places
prohibited under the law;
5.Conviction of the operator or
manager of the agency of any
crime involving moral turpitude; or
6.When the firearm was reported lost
Stocking of ammunitions
 limited and reasonable quantity that suits
the need of the Agency
 not exceed fifty (50) rounds of
ammunitions per unit of duly licensed Fas.
 Individual issue to security guard shall be
limited to twenty-five (25) rounds per SG.
UNIFORM, EQUIPMENT AND
PARAPHERNALIA

 males - Headgear;
service shirt; service
trousers; service belt;
and footwear.
 Light blue and/or white
service shirts for
internal guards for PSA;
 Light gray for company
security force; and
 White for government
security unit.
RANKS AND POSITIONS
 Security Management Staff
 Security Director (SD) - Agency Manager/Chief Security
Officer.
 Security Executive Director (SED) - Asst. Agency
Manager/asst. Chief Security Officer.
 Director for Administration.
 Line Leadership Staff
 Security Supervisor 3 - Detachment Commanders
 Security Supervisor 2 - Chief Inspector
 Security Supervisor 1 – Inspector
 Security Guard
 Security Guard 1 - watchman/guard
 Security Guard 2 - Shift-in-charge
 Security Guard 3 - Post-in-charge
PERSONNEL SECURITY
 designed to prevent unsuitable
individuals from gaining access to
classified matter or to any security
facility, and to prevent appointment,
or retention
Two (2) Types of Personnel
Identification

 Personal recognition – familiarity of the


person’s characteristics.

 Artificial recognition- identification cards,


passes, passwords, etc.
USE OF PASS SYSTEM:
 Single pass system - the badge or pass
coded for authorization to enter specific
areas is issued to an employee who
keeps it in his possession until his
authorization is terminates.
 Pass exchange system - an exchange
takes place at the entrance of each
controlled area. Upon leaving the
personnel surrenders his badge or passes
and retrieve back his basic identification.
 Multiple pass system - this provides an
extra measure of security by requiring
that an exchange take place at the
entrance of each restricted area.
WHAT IS PERSONNEL SECURITY
INVESTIGATION?

 an inquiry into the


character,
reputation,
discretion and loyalty
of individual in order to
determine a person’s
suitability to be
given security
clearance.
Types of Personnel Security
Investigation (PSI)

1. National Agency Check (NAC). – made upon the basis


of written information supplied by him in response to
official inquiry, and by reference to appropriate
national agencies. Ex:NICA, NBI, ISAFP or CIDG etc.

2. Local Agency Check (LAC) – written inquiries sent to


appropriate local government agencies, former
employees, references and schools listed by the
person under investigation. The local agencies
normally check besides the past employment,
schools and references
BACKGROUND INVESTIGATION

 A thorough and complete investigation of


all or some of the circumstances or aspects
of a person’s life is conducted.
 Types of BI
 Complete Background Investigation – all the
circumstances of his personal life.
 Partial Background Investigation – limited only
to some of the circumstances of his personal life
which are deemed pertinent to the
investigation.
WHAT IS ASECURITY
EDUACTION PROGRAM?

 It is an internal marketing campaign


to raise awareness about security
risks and promote corresponding
good practices across the
organization.
GOALS OF SECURITY EDUCATION

 develop security
awareness among
employees of the
company.
 should cover all
regardless of rank
or position.
Phases of Security
Education Program

1. Initial interview- first contact wherein the


interviewer determine the suitability of the
applicant
2. Orientation and Training- detailed
presentation of personnel security policy
3. Refresher Conference- remind
responsibilities, review guidelines and
policies, introduction of new policies
4. Security Reminders- indirect approach of
educating the employees
5. Security Promotion – emphasizing the
importance and role of security
HOW IMPORTANT DOCUMENT
AND INFORMATION ARE IN
SECURITY?

 plays a significant role


in the daily operations
and activities of an
installation.
 Once the contents of a
company’s document
and information are
divulged the operational
stability is at stake.
DOCUMENT/ INFORMATION CYCLE

1. Creation
2. Classification
3. Storage
4. Retrieval
5. Retention/Purging
6. Transfer
7. Disposition
What is matter?
 includes everything, regardless of its physical
character,in which information is recorded or
embodied.
 Documents, equipment, projects, books,
reports, articles, notes, letters, drawings,
drawings, sketches, plans, photographs,
recordings, machinery, models, apparatus,
devices, and all other products or substances
fall within the general term “matter”
 Information, which is transmitted orally, is
considered “matter” for purposes of security.
WHAT IS SECURITY
CLEARANCE?

 certification by a responsible authority that


the person described is cleared for access
to classified matter the appropriate level
 the administrative determination that an
individual is eligible for access to classified
matter.
 Need-to-know is the principle whereby
access to classified matter may only be
only given to those persons to whom it is
necessary for the fulfillment of their duties.
Classification level of
document or Information:

1. Top Secret Information – most


sensitive information requiring
highest level of protection. Ex.
Compromise could lead to widespread
loss of life, or threatened the
economic wellbeing of the country or
friendly nations.
2. Secret Information – where
compromise could seriously
damage the military capabilities,
international relations, or
investigation of serious
organized crime.
3. Restricted Information – it is
“notice-triggering”, meaning , we
need to notify the proper authority if
there has been a leak of this
information.
Leak of this information will lead to:
reputational damage, identity
theft.
4. Confidential information – Not
“notice-triggering” this information
needs to be protected from
unauthorized access. Ex. Home
address, phone, birth date, grades,
sexual orientation, evaluations and
letters.
RISKS ANALYSIS AND SECURITY
HAZARDS
What is Risk Analysis?
 the analysis of risk which includes
examinations of the vulnerability,
probability and criticality of potential
threats and include natural and man made
risk.
 Risk - potential damage or loss of an asset
 Vulnerability - weaknesses
 Probability - chance or likelihood that a loss will
take place.
 Criticality - impact of a loss as measured in
financial terms.
What is Security Hazard?
 act or condition which may result in
the compromise of information, loss
of life, loss or destruction of property
or disruption of the objective of the
installation.
 act or condition affecting the safe
operation of the facility caused by
human action accidental or
intentional.
What is Risk Management?
 a process of selecting and
implementing security
countermeasures to achieve an
acceptable level of risk at an
acceptable cost.
 Countermeasures - An action taken or a
physical security used to reduce or
eliminate one or more vulnerabilities.
RELATIVITY OF RISK AND SECURITY

 The extent and degree of risks to security is


dependent on the following:
 Relative criticality of operation –
importance of the firm with reference to
the national economy and security. Ex:
gasoline depots, communication transmission
lines, and power plants.
 Relative vulnerability – susceptibility of
the plant or establishment to damage, loss or
disruption of operation due to various hazards.
A good example is the location of the building;
the machines; or presence of possible poisons.
RISK MANAGEMENT ALTERNATIVES AND
STRATEGIES

1. Risk Avoidance – removing the risk totally from the


business. Ex: proper disposal of inflammable substances.
2. Risk Reduction – minimizing the probability of the
potential loss. Ex: construction of fences and similar
physical barriers.
3. Risk Spreading – spreading the risk through
decentralization to limit the impact (criticality) of the
potential loss. Ex: use of vaults or safes
4. Risk Transfer – moving the financial impact of the
potential loss-over to an insurance company. This is done
by availing of property and life insurances. Hiring security
agencies is also a good example of this.
5. Risk Self-assumption – planned assumption and
acceptance of the potential risk by making a deliberate
managerial decision of doing nothing about the threat, or
setting aside resources for use in case of loss
SECURITY SURVEY AND INSPECTION
 SECURITY SYSTEM – This is the set of policies,
procedures and rules and regulations designed to
reduce to an absolute minimum the possibility of
espionage, sabotage and compromise of classified
information of an office or a whole establishment.

 SECURITY SURVEY – This is also known as security


audit which is actually a fact-finding probe to
determine a plant’s adequacy and deficiency in all
aspects of security, with the corresponding
recommendations.
SECURITY INSPECTION
 – This is a check of how well existing
security measures and regulations
are being carried out within a
detachment or establishment. A
security inspection may also include
an investigation of alleged or
suspected security violations.
TYPES OF SECURITY
INSPECTIONS
1. Continuous Inspection-an on-going and
never ending activity.
2. Formal or Informal
 Formal Inspection - preceded by an
announcement
 Informal Inspection - understood by all and
accepted as part of the organizational life.
3. Structured or Unstructured Inspection
 Structured Inspection is one that moves
systematically from one area to the next and so
on.
 Unstructured inspection is conducted in a
random manner.

You might also like