0% found this document useful (0 votes)
210 views

PDF Document 2

The document provides an overview of industrial security concepts and their origins and development over time. It discusses the historical background of security practices dating back to ancient Rome and their evolution in England and America. Key figures that advanced the security industry are highlighted such as Henry Fielding, Allan Pinkerton, and William J. Burns. The core topics of security, industrial security management, barriers, and perimeter security are defined. Different types of each are also outlined.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
210 views

PDF Document 2

The document provides an overview of industrial security concepts and their origins and development over time. It discusses the historical background of security practices dating back to ancient Rome and their evolution in England and America. Key figures that advanced the security industry are highlighted such as Henry Fielding, Allan Pinkerton, and William J. Burns. The core topics of security, industrial security management, barriers, and perimeter security are defined. Different types of each are also outlined.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 155

Introduction to

INDUSTRIAL
SECURITY
concepts
REMARK GALAN, RCrim
Top 5, CLE
❑ Historical Background of Security

In the christian era, watchman is the


forerunner of the security guard.

During the time that countries governed by


royal families, military bodyguards or
guardsmen picked from elite troops
assigned to royal families. Famous of them
are the Praetorian Guards of Ancient
Rome and Mameluks of Egypt. Today the
only remaining are the Swiss Guard at
Vatican City.
In the history of England, the Normal
Period (1066- 1199) administered by
William of Normandy brought about such
personality of “shire rieves” whose
duties is preservation of peace and
order.

After the Normal period, in 1215 the


“Magna Carta” was signed, which
established the “principle of due
process”
In 1748, author and magistrate Henry
Fielding proposed a permanent,
professional and adequately paid
security force. His most valuable
contribution was the “Foot Patrol”.

In America, security practices in the


early days of colonization followed those
of England. Mutual protection and
accountability characterized the various
groups.
In 1850, Allan Pinkerton a cooper from
Scotland and Chicago Police
Department’s first detective established
one of the oldest, private security forces
in US “Pinkerton’s Private Detective
Agency”.

In 1909, the William J. Burns Inc. was


formed to become a sole investigating
agency for American Banking
Association.
What is Security?
Security came from the Greek word “securos”
which means safe, safety or secured.
The term security connotes safety from harm;
It is the condition of being free from fear, doubt,
apprehension, anxiety and danger. It implies
state of certainty and safety.
Security work involves active and passive
measures so that effective defense can be
established against crimes.
Active Measures are:
physical barriers
security lighting
use of vaults,
locks and others

Passive Measures are:


Those that will deter man from committing such act for fear
of being caught charged in court or get dismissed.
Security education programs, investigation, fire prevention
seminars, personal security checks.
What is Industrial Security
Management?
ISM primarily deals with the industrial plants and business
enterprises where properties, personnel and processes are
safeguarded.
ISM is concerned in preparation by utilizing methods and
devices to curtail or minimize loss to a company due to
security breach.
The underlying philosophy is that threats which may be
categorized as natural or man-made cannot be prevented but
anticipation and careful planning reduces risks and potential
loss.
Diagram to show clear definition of
SECURITY

NATURAL
• Environment HAZARDS
• Information
• Money
• People
• Facility • Efficiency
• Equipment • Stability
• Materials
• Product
SECURITY • Profitability
• Market • Growth
• Reputation • Sustainability
• Time

MAN-MADE
HAZARDS
Origins and Development of Security
World Setting:
Henry Fielding – a magistrate who proposed a permanent,
professional and adequately paid security force.
Allan Pinkerton – a copper from Scotland and Chicago Police
Department’s first detective, established what was to become one
of the oldest and largest private security operations in the United
States, The Pinkerton Agency. He is also credited with hiring the
first woman detective.
Wells and Fargo Company – a freight transportation company,
employed their own detectives and security personnel, known as
shotgun riders. This is owned by Henry Wells and William
Fargo.
Brinks, Inc. – pioneered the armoured car and courier
service. This is owned by Washington Perry Brink.
Edwin Holmes – he offered the first burglar alarm service in
the US in 1858.
William J. Burns – a former Secret Service investigator and
head of the Bureau of Investigation (forerunner of FBI),
started the Burns Detective Agency in 1909 which became the
sole investigating agency for the American Bankers’
Association.
Baker Industries – initiated a fire control and detection
equipment business.
American Society for Industrial Security International – it is
the first security professional organization. It was formed in
1955 and this also signifies the modern age of security.
Philippines Setting:
Jimenez Security Agency (formerly the Special Watchman
Agency) –
the first formally licensed private security agency in the
Philippines dated March 1, 1933.
This was owned, managed and operated in the City of Manila by
brothers Juan and Pedro Jimenez.
Philippine Association of Detective and Protective Agency
Operators (PADPAO) –
on May 30, 1958, it was formally organized in accordance of RA
5487 in setting the standards and minimum requirements for the
operation of the security agency.
June 13, 1969, Philippine Congress
enacted RA 5487 (Private Security
Agency Law). This law assigned the
most important role of security guard
force in assisting the police in
safeguarding lives and properties.
August 4, 1969, PC issued Staff Memo creating the
PCSIASO (PC Security and Investigation Agency
Supervisory Office). After barely 2 months another
Staff Memo was issued renaming PCSIASO to
PCSOSIA.

On June 29, 1970, it was again renamed as


PCSUSIA (PC Supervisory Unit Security and
Investigation Agencies).
Despite the enactment of RA 5487 and the formation
of PADPAO, flaws and defects in the administration
and operation of private security agencies remained.
To rectify these flaws and defects Pres. Marcos
issued PD. 11 on October 3, 1972, enlarging the
coverage of Private Security Law to include those
security guards employed in logging concessions,
agricultural mining or pasture land.
January 17, 1973, PD 100 was issued to
broaden the coverage of industry to include
employee of the national or local government,
or any agency that is employed to secure or
watch government building, premises or
compounds.
January 1, 1991 creation of PNP pursuant to
RA 6975 PCSUSIA became PCSOSIA (PC
Supervisory Office for Security and
Investigation Agencies) and on January 1,
1995, it was renamed as PNP SAGSD (PNP
Security Agencies and Guards Supervision
Division). This unit of the PNP was given they
same functions to PCSOSIA but a more
challenging and expanding tasks.
❑ T YPES OF SECURITY

1. Physical Security
It is the broadest branch of security.
It is the physical measures adopted to
prevent unauthorized access to
equipment, facilities, materials, documents,
and to safeguard them against espionage,
sabotage damage and theft.
2. Communication Security

It is the protection resulting from various


application of various measures that prevent
or delay the enemy or unauthorized persons in
gaining information through the
communication system.
3. Hotel Security

It refers to the
protection of
guests, assets,
personal effects and
other properties in
hotels, inns and other
similar
establishments.
4. Bank Security

A specialized type of
physical security
protecting the assets,
personnel and
operation of a bank.
5. Operational Security

It deals primarily with the protection of


processes, formula, patents and other
industrial and manufacturing activities from
espionage, infiltration, loss, compromise, or
photocopying.
6. VIP Security

It is applied for the


protection of top
ranking officials of the
government or private
entity, visiting persons of
illustrious standing and
foreign dignitaries.
7. Industrial Security

This is a type of security applied to


business groups engaged in industries like
manufacturing, assembling research and
development, processing, warehousing and
even agriculture.
8. Document Security

It is a physical security involving the


protection of documents and classified
papers from loss of access by unauthorized
persons, damage, theft and compromise.
❑ Types of Documents

1. Vital Documents – records that are


irreplaceable, records of which reproduction
does not have the same value as the original.
2. Important Document – records which
reproduction will cause considerable expense
and labor, or considerable delay.
3. Useful Documents – records whose loss might
cause inconvenience but could be readily
replaced.
4. Non- essential Documents – records are daily
files, routine in nature even if lost or destroyed,
will not affect operation.
❑ Barriers

Refers to any physical structure whether


natural or man made capable of
restricting, deterring, delaying, preventing
illegal and unauthorized access to an
installation.
❑ Kinds of Barrier

1. Natural barrier
2. Structural barrier
3. Human barrier
4. Animal barrier
5. Energy barrier
❑ Perimeter barrier

It is a medium or structure which defines


the physical limits of an installations or area
to restrict or impede access.

It is the first line of defense of an installation.


❑ Depth of Defense

1. First line of defense – located in the


outermost area of an installation like fence.
2. Second line of defense – doors, floors,
windows, walls and grills.
3. Third line of defense – storage system like
safe, vaults and file room.
❑ Types of Perimeter Barrier

1. Fences
2. Walls
3. Bodies of Water
❑ FENCE

It is an independent structures
designed to control physical and
visual access between outside areas.
❑ Types of Fence

1. Solid Fence – It is constructed in


such a way that visual access is
denied.

2. Full view/ Wire fence – It is


constructed in such a way that a
visual access is permitted through
the fence.
❑ Types of Wire Fence

1. Chain Link Fence

a. It must be
constructed at least
7 feet tall excluding
top guard.
b. It must be of 9
gauge or heavier.
c. The mesh openings
are not be larger
than 2 inches per
side.
e. It should be twisted and barbed salvage at
top and bottom.
f. It must be securely fastened to rigid metal or
reinforced concrete.
g. It must reach within 2 inches of hard ground
or paving.
h. On soft ground, it must reach below surface
deep enough to contemplate for shifting soil
and sand.
2. Barbed Wire Fence

a. Standard barbed wire should be twisted,


double strand, 12 gauge wire with 4 point
barbs, spaced on equal distant apart.
b. Barbed wire fencing should not be less than
7 feet high excluding top guard.
c. Barbed wire fencing must be firmly affixed to
post not more than 6 feet apart.
d. The distance between strands should not
exceed 6 inches and at least one wire will
be interlaced vertical and midway between
posts.
3. Concertina Wire
Fence

a. Standard concertina
barbed wire is
commercially
manufactured wire
coil of high strength
steel barbed wire
clipped together at
intervals to form
cylinder.
b. Opened concertina
wire is 50 ft. long
and 3 ft. in
diameter.
❑ Building walls

Includes walls, floors, roofs, or their


combination serve also as barriers and they
should be of such construction as to provide
uniform protection just like the wire fencing.
❑ Bodies of water

Like rivers, lake, sea, pond or any bodies


of water forming a part of the wall, building
or fencing should never be considered
adequate natural barriers.
❑ Additional Protective Measures

1. Top guard
2. Guard Control Stations
3. Tower
4. Barrier maintenance
5. Signs and Notices
6. Cellar guard
1. Top guard

Is an additional
overhang of barbed
wire fence placed on
vertical perimeter
fences facing upward
and outward with a
45 degree angle with
3 to 4 strands of
barbed wires spaced
6 inches apart.
2. Guard Control
Stations

Normally provided
at main perimeter
entrance to secure
areas located out of
doors and manned
by guards on full time
basis .
3. Tower

Are house-like
structures above
the perimeter
barriers.
4. Barrier maintenance

Fencing barriers and protective walls should


be regularly inspected. Any sign or attempts
of entry should be reported and repaired.
5. Signs and Notices

Control signs
should be erected
where necessary in
the management of
unauthorized
ingress to preclude
accidental entry.
What is a Pass System?
A pass or badge is issued by security for
personnel to be admitted in the installation.
This system precludes those visitors with
escorts and personal use and not for the
restricted areas like exclusive, limited and
controlled areas.
Recommended pass systems:
Single Pass or Badge System- the badge or pass coded for
authorization to enter specific areas is issued to an employee
who keeps it in his possession until his authorization is
terminated.
Pass or Badge Exchange System- an exchange takes place at
the entrance of each controlled area. Upon leaving the
personnel surrenders his badge or passes and retrieve back his
basic identification.
Multiple pass system- this provides an extra measure of
security by requiring that an exchange take place at the
entrance of each restricted area.
❑ Protective lighting

Provides a means of continuing


illumination during hours of darkness, a
degree of protection that is maintained
during daylight hours.
❑ Purpose of Protective Lighting

1. Provides sufficient illumination during hours


of darkness.
2. Lighting can help improve visibility so that
intruders could be seen and identified, or if
possible apprehended.
3. It serves as deterrent to thieves.
❑ Types of Protective Lighting

1. Stationary or Continuous Lighting


2. Standby Lighting
3. Movable or Portable Lighting
4. Emergency Lighting
1. Stationary or
Continuous Lighting

It consist of a series
of fixed luminaries at
range to flood a
given area
continuously during
hours of darkness.
It is the most familiar
type of security
lighting.
A. Glare Projection

Intensity is
focused to the
intruder while the
observer remains in
comparative
darkness.
B. Controlled lighting

Lighting is
focused on the
pile of items rather
than the
background.
2. Standby Lighting
Similar to continuous lighting but is turn on
manually or by special device or other
automatic means, when there is suspicion of
entry.

3. Movable/ Portable Lighting


This consist of stationary or portable,
manually operated searchlights which may be
lighted continuously during the hours of
darkness or only as needed.
4. Emergency
Lighting

Used in times of
power failure or
other emergencies
when other systems
are inoperative.
❑ Types of Lighting
Equipment

▪ Floodlights
Used for outdoor
security lightning
including the
illumination of
boundaries, fences,
and buildings.
▪ Searchlights

Used to pinpoint
potential trouble
spots.
▪ Fresnel lights

Used to extend the


illumination in
long, horizontal
strips to protect the
approaches to the
perimeter barrier.
▪ Street lights

Is a raised source of
light on the edge of a
road or path.
Produce diffused
light rather than
directional beam.
❑ Alarm

Security device
fitted to property,
usually a house or
a car, to make
warning sound if
break- in or theft is
attempted.
❑ Protective Alarms

It is an aural or visual signal given by


the enunciator to security guard when
intruder actuates device in a protected
area.
❑ Terms used in Alarm Detection System

❖ Actuator – button, magnetic switch or


thermostat that cause system to alarm.

❖ Enunciator – visual or audible signalling device


which initiates condition of associated circuits.

❖ Microwave sensor – a radio/ radar frequency


transreceiver having a frequency of billion cycles
per seconds which detects movements.
❖ Capacitance – property of two or more objects
which enables to store electrical energy.

❖ Control unit – terminal box for all sensors.

❖ Fail safe – a term applied to a system when a


component fails to function properly.

❖ False/ Nuisance alarm – activation of sensors


for which no cause can be determined.
❖ Motion sensor – detects movement inside the area
to be protected.

❖ Passive ultrasonic sensor – it detects the sound of


forced entry through walls, ceiling and doors.

❖ Photoelectric system – an interruption of a light


beam transmitted to the receiver causes an alarm.
❖ Ultrasonic – frequency range of sound that is
above the capabilities of normal hearing.

❖ Vibration sensor – it detects forced entry


through metal barriers placed over windows
and ventilators.
❑ Types of Protective Alarm

1. Foot Rail Activator


2. Bill Traps
3. Knee or Thigh Buttons
4. Foot Button
5. Double Squeeze Buttons

❑ Types of Alarm Detection System

1. Central Station System


2. Propriety System
3. Local Alarm System
4. Auxiliary System
5. Local Alarm-by-Chance System
6. Dial Alarm System
1. Central Alarm System

A type of protective alarm system where


the central station is located outside the
installation. When the alarm is sounded,
central station notifies the police and other
agency.
2. Proprietary System

This functions they same way as the central


station system except it is owned, operated
by the facility.
Response to all alarms is by the facilities own
security or fire personnel.
3. Local Alarm System

Consist of ringing up a visual or audible


alarm near the object to be protected.

In case of alarm, response be made by local


guards and other personnel within sight or
hearing.
4. Auxiliary System

In this system, installation circuits are led into


local police or fire department by leased
telephone lines.
5. Local Alarm by Chance System

This is a local alarm system in which a bell or


siren is sounded with no predictable
response.

The hope is that a neighbour or passing patrol


car will reach the alarm and call for police
assistance, but such a call is purely a matter
of chance.
6. Dial Alarm System

This system is set to dial a predetermined


numbers when the alarm is activated.
❑ Locks

A mechanical, electrical, hydraulic or


electronic device designed to prevent entry
into a building, rooms and etc.
❑ Types of Locks

1. Warded Locks

It offers very little


security.
This type of lock must
therefore be used only
to have privacy, but
not to provide a degree
of security.
It is the simplest form
of lock.
2. Disc Tumbler
Locks

It is designed for
the use of the
automobile
industry and are
general use in car
doors today.
The delay afforded
is approximately 5
to 10 minutes.
3. Lever Locks

This lock are used


in safe deposit
boxes and for all
practical purposes,
pick-proof.
4. Code-operated Locks

These are the


combination type of
locks in that no key
are used.
They are opened by
pressing a series of
numbered buttons in
the proper sequence.
Some of them are
equipped to alarm if
the wrong sequence
was pressed
5. Electromagnetic Locks

These are devices


holding a door closed
by magnetism. These
are electrical units
consisting of the
electromagnetic on
metal holding plate.
When the power is on
and the door secured,
they will resist a
pressure of up to 1,000
pounds.
6. Card-operated Locks

Coded- cards, either


notched, embossed,
or containing an
embedded pattern of
copper locks, are
used to operate such
locks.
These are frequently
fitted with a recording
device which register
time of use and
identity of the user.
❑ Keys

A metal bar with notches or grooves


that when inserted into a lock and turned
operates the locks mechanism.
❑ Types of Keys

1. Change Key – A key to a single lock.


2. Sub-master Key – A key that will open all
locks within a particular area or grouping.
3. Master Key – A special key capable of opening
a series of lock.
4. Grand Master Key – A key that will open
everything in a system.
❑ Protective Cabinets

High security storage area where papers,


records, plans or cashable instrument,
precious jewelries or other especially valuable
assets are protected.
The final line of defense at any facility.
❑ Types of Security
Cabinets

1. Safe
A metallic container
used for safekeeping of
documents or small
items in an office or
installation.
Its weight must be at
least 750 lbs.
Walls should be at least
1 inch thick.
Doors should be made
of steel and at least 1 ½
thick.
Safe Cracking Methods

1. Drilling or punching – accomplished by knocking


off combination dial and drilling hole to expose
locking device.
2. Burning – process of using oxyacetylene torches
or burning bars.
3. Peeling – process of attacking the seams of
metal plates with pry bars to peel back layers of
metal and thus exposing either lock mechanism or
interior.
4. X-ray – it is utilized to reveal position of the
combination and mechanism necessary to open
safe.
5. Use of Explosives – a nitro-glycerine
and plastic explosives.
6. Use of Power tools – examples are
use of rotary devices, hydraulic tools
and power drills.
7. Manipulation – a very few safe
crackers have skill to use this technique.
2. Vault
It is a
heavily-constructed
fire and burglar
resistant container,
usually a part of the
building structure,
used to keep and
protect cash,
documents, and
negotiable
instrument.
Door should be made of steel at least 6
inches in thickness.
Walls, ceiling and floor should made out
of reinforced concrete at least 12 inches
in thickness. Vault floor should be higher
by 4 inches which the surrounding
floors.
Electrical conduits into the vaults should
exceed 1 ½ in diameter.
Vaults should not be more than 5,000
cubic feet.
Fire- resistive up to 6 hours.
3. File Room

It is a cubicle in a
building constructed
little lighter than a vault
but of bigger size to
accommodate limited
people to work on the
records inside.
File room should at
most be 12 feet high.
Must have a watertight
doors and at least one
(1) hour fire proof.
❑ RA 5487 (Private Security Agency Law)

The act that regulates the organization and


operation of private detective, watchman,
and security guard agencies in the
Philippines.
This act was approved on June 13, 1969.
Who may organize a Security Force?
1. Individual Filipino Citizen (100% of
capital is owned by him)

2. Juridical (Corporation, Partnership,


Association = 100% of capital is owned by
them.
❑ Basic Requirement for an Operator or
Manager of an Agency
1. Filipino citizen
2. At least 25 years old.
3. College graduate and/or commissioned
officer in the inactive service or retired from
AFP or PNP.
4. Has taken a course/seminar on Industrial
Security Management and must have an
adequate training and experience on security
business.
5. Good moral character.
❑ Application of License

New applicants for License to Operate shall


be required to obtain a minimum
capitalization of one million pesos
(P1,000,000. 00) and with a minimum bank
deposit of five hundred thousand pesos
(P500,000.00) in order to start its security
business operation.
❑ License to Operate

A License Certificate document, issued by


the Chief, PNP or his duly authorized
representative, authorizing a person to
engage in employing security guard or
detective.
Kinds of License to Operate (LTO)

1. Regular LTO – renewable every after 2


years; 200-1000 guards for PSA and 30
guards for CGF.

2. Temporary LTO – valid for 1 year; less


than the number of guards for Regular
LTO
❑ Graduated Scale of License to Operate

a. PSAs with temporary LTO having 200 or more


but not exceeding 1,000 guards shall be
issued a regular LTO good for 2 years.

b. PSAs with temporary LTO having posted 100


guards but less than 200 shall upon
expiration of such LTO shall be issued an
extension period of 6 months. However,
upon expiration of the extension period, no
extension shall be granted unless the PSA
shall submit a certification for additional 50
guards posted for a 150 guards total.
a. PSAs with temporary LTOs, upon
expiration still fail to comply with the 200
guards requirement, shall be granted
another 6 mos. period. However, failure to
comply shall serve a basis for the issuance
of cease to operate order.

b. LTO of PSAs with less than 100 guards


after one year shall not be renewed.
❑ Possession of Firearms by PSA

a. Shotguns, not higher than 12 gauge


b. Low- power rifle or revolvers, cal.22
c. Cal. 38 pistols or revolvers not exceeding
one firearm for every two security guard
in its employment.
d. Minimum number of firearms.

1. PSA with 100 guards – at least 30


pieces of licensed firearms.

2. For application Regular License to


Operate – at least 70 pieces of
firearms.
❑ Limitations in carrying of firearms

1. During his tour of duty when in proper


uniform within the compound of the
establishment where he is assigned.

2. Except, when he is escorting big amount


of cash or valuables, and upon prior
coordination with the nearest PNP
units/stations.
❑ Stocking of ammunitions shall be on limited
and reasonable quantity that suits the need of
the Agency.

a. It shall not exceed 50 rounds of ammunitions


issued per unit of licensed firearm.
b. Individual issue to security guard shall be
limited to 25 rounds of ammunition per
security guard.
❑ Security Guard

Any person who offers or renders personal


service to watch or secure either a residence
or business establishment or building for hire
and compensation.
❑ Qualifications of Security Guard

a. Filipino citizen;
b. High school graduate;
c. Physically and mentally fit;
d. Not less than eighteen (18) years of age
nor more than fifty (50) years of age;
e. Has undergone a pre-licensing training
course.
❑ Exemptions from Pre- Licensing Training

a. Veterans and retired or honorably


discharged military/police personnel
possessing a qualification mentioned.

b. ROTC advance/ basic graduates.


❑ The 3 Security Guard Forces

1. Private Security Guard

A guard hired by company belonging privately


in licensing security guards. Agency guards
are provided to a plant of facility in a
contractual basis. Security guards and
supervisor are paid by the private security
agency.
2. Company Guard Force

Is a security force maintained and


operated by any private company or
corporation for its own security requirements.
3. Government Guard Unit

A security unit maintained and operated by


any government entity other than military or
police, which is established and maintained for
the purpose of securing the office or
compound and/or extension of such
government entity.
❑ Security Officer

One who is charged with directing the


work, observing the behavioral
performance of the guard under his unit.
❑ Qualification of Security Officer

a. Filipino citizen;
b. Holder of Baccalaureate Degree;
c. Physically and mentally fit; and
d. Has graduated from a Security Officer
Training Course.
❑ Security Consultant

Adviser, guide, design and implement


the best security solutions for an
organization's needs.
❑ Qualifications for Security Consultants

a. Filipino citizen;
b. Physically and mentally fit;
c. Holder of Masters Degree in Criminology,
Public Administration, Industrial Security
Administration and or Law;
d. Must at least ten (10) years experience in
the operation and management of security
business.
Definition of Terms:

❖ License to Exercise Profession – any


document issued by the Chief, PNP or
his duly authorized representative
recognizing a person to be qualified to
perform his duties as private security or
training personnel.
❖ SAGSD – refers to the current PNP Civil
Security Group, Security Agency and Guard
Supervision Division, which is the primary
office for supervision of the rules and
regulations.

❖ PADPAO (Philippine Association of


Detective and Protective Agency
Operators) – an association of all licensed
security agencies and company security
forces.
❖ Duty Detail Order – written order/ schedule
issued by a superior officer assigning the
performance of duties.

❖ Master Keying System – a system used in


big installation whereby keys can open a
group of locks.
❑ Types of Sensitive Areas

1. Controlled Areas
Areas which access is restricted as to
entrance or movement by all authorized
personnel and vehicles.
It should be additionally marked by a
fence.
Access to it should be limited.
2. Limited Areas
Are those within the controlled area where a
greater degree of security is required.

3. Exclusion Areas
Used only for handling and storage of high
valued cargo and classified documents.
The area should be under surveillance at all
times.
❑ Kinds of Sensitive Information

1. Trade Secret
Consist of any formula, pattern, device, or
compilation of information which is used
in one’s business and which gives him an
opportunity to gain an advantage over
competitors who do not know or use it.
2. Patent
It is a grant made by the government to
an inventor, conveying, and securing to
him the exclusive rights to make, use,
and sell his invention for a term of 20
years.
❑ Threats in Protection of Sensitive
Information

i. Eavesdropping
Unauthorized listening.
Entering into a private place with intent to
listen surreptitiously to private conversation
or to observe to conduct of any other person.
ii. Wiretapping

Method of
collecting
information
through
interception of
telephone
conversation.
ii. Bugging

Placing of
hidden
microphone to a
target installation
to collect
information.
❑ Seven Phases of Security Education
Program

1. Initial Interview – the individual’s first


contact should be formal and professional.
▪ It must leave an impression on the individual
of the seriousness of security.
▪ It should stress the importance of security of
the company and individual.
▪ To explain the penalties that could result
from violations.
2. Training Conference

It should be held during the initial


processing or training period of an
individual.
It should be reiterated that security is part of
the job not an additional burden imposed upon
the job.
The conference will last from 2 to 4 hours.
3. Refresher Conference
Purpose:
• It reminds individuals of their responsibilities.
• It can be used as forum to resolve
problems that have arisen since the last
conference.
• To explain new regulations, changes in
regulations and new requirement that may
have been levied by the company.
• Ask for recommendations and comments
about existing policies.
4. Security Reminders – this in an
indirect approach or passable approach.
The most common approach is the use
of posters.

5. Security Promotion – the act of


emphasizing the importance and role
of security in achieving company’s
objectives.
6. Special Interview – this is intended to
augment refresher conference.

7. Debriefing – a procedure wherein the


employee, who has been given access
to sensitive information, to reminded of
his continuing accountability and
responsibility to safeguard information
entrusted to him in connection with his
job.
❑ Risk
It is the potential damage or loss of an
asset.

Major Risk:
1. Nuclear Attack
2. Natural Catastrophe
3. Civil Disturbances and Malicious
Destruction
❑ Risk Analysis – examination of the
vulnerability, probability, and criticality of
potential threats.

❑ Risk Management – process of


selecting and implementing security
countermeasure to achieve an
acceptable level of risk at an acceptable
cost.
❑ Risk Management/Risk Mitigation Program
Methods:
• Risk Avoidance – removing the problem by
eliminating the risk
• Risk Reduction – decreasing the potential ill effects
of safety and security problems when it is impossible
to avoid them
• Risk Segregation/Spreading – decentralizing a
procedure or operation so that a security problem at
one location will not cause complete loss.
• Risk Transfer – removing the risk to the company by
paying for the protection of an insurance policy.
• Risk Acceptance or Self Assumption – planning
for an eventual loss without benefit of insurance
❑ Hazards

It is an act or conditions that may


result in compromise of life,
information or property.
Exposure to the chance of loss or
injury.
Hazards are either caused by nature or
by man itself.
❑ Types of Hazards

1. Natural Hazards – these are hazards


which arise from natural phenomena.

2. Man-made Hazards – these are


hazards caused by state of mind,
attitude, weakness, or character traits
of one or more persons.
Intentional Man-made Hazards

I. Pilferage
It is the act of stealing of small items.
It is one of the most common and
annoying hazards which security has to
deal with.
❑ Types of Pilferer

a. Casual Pilferer

One who steals due to his inability to


resist the unexpected opportunity
and has little fear of detection.
b. Systematic Pilferer

One who steals with preconceived


plans and takes away any or all types of
items or supplies for economic gain.
Factors considered in Pilferage

▪ Location of the items to be pilfered.


▪ Access to the items.
▪ Removal of the items.
▪ Disposal of the items.
II. Sabotage
An act of malicious damage, deliberately
poor workmanship intended to cause damage,
obstruction of plans, aims, etc.

❑ Saboteur
One who destroy company properties or
perform other explicit activities which would
result to disturbance, to cause financial drain,
postponement of operation, threaten, or to
attach negative impression.
III. Espionage
The practice of spying, excessive or
offensive spying.

❑ Espionage agent or spy


One who has allegiance to another
company, oftentimes rival, whose
primordial mission is to obtain
information useful in company’s
operation.
❑ Security Survey

It is a fact- finding probe to determine


plants adequacy and deficiency in all
aspects of security, with the corresponding
recommendations.

Also known as Security Audit, Risk


Assessment.
❑ Purpose of Security Survey

1. To determine existing state of security.


2. To detect weakness in defense.
3. To determine degree of protection
required.
4. To produce recommendations.
❑ Security Inspection

It is an important part of security


management process which insures
that risks are recognized and covered
in security programs, and that programs
are necessary and cost- effective.
❑ Types of Security Inspection

1. Continuous Inspection
2. Formal Inspection
3. Informal Inspection
4. Structured Inspection
5. Unstructured Inspection
2. Formal Inspection
Preceded by an announcement and
the unit under inspection prepares for
events.

3. Informal Inspection
Executed in a spirit of understanding
and cooperation.
4. Structured Inspection
There is a format or logical sequence.

5. Unstructured Inspection
Conducted in random manner. There is
no format and logical sequence.
❑ Emergency – It is a sudden,
unexpected occurrence or set of
circumstances demanding immediate
action.
❑ Disaster – Unscheduled event that
usually caused by emergency.
❑ Crisis – It is the turning point of a
disaster or emergency.
END

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy