Lea 3

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 18

Lea3 Notes

SECURITY GUARD FORCE


Is a group of forces of men selected, trained or grouped into functional unit for the
purpose of protecting operational process from disruption which would impede efficiency or halt
operations at a particular plant, facility, installations, or special activity.

Types of Security Guard forces

1. Private Security Agency- any person, association, partnership, firm or private corporation,
who contracts, recruits, trains, furnishes or post any security guard, to do its functions or
solicit individuals, business firms, or private, public or government-owned or controlled
corporations to engage his\its service or those of his\its security guards, for hire commission
or compensation.
2. Company Security Force- a security force maintained and operated any private company\
corporation for its own security requirements only.
3. Government Security Unit- a security unit maintained and operated by any government
entity other than military and \a police, which is established and maintained for the purpose
of securing the office or compound and or extension such government entity.

Color of Uniforms

1. Private Security Agency –Fast Navy blue (upper and lower)


2. Company Security Forces – light gray for upper and navy blue for lower.
3. Government Security Forces – white for upper and navy blue for lower

SECURITY GUARD FUNCTIONS /GUARDING PROCEDURES

1. Fixed Post
2. Patrol
3. Reserve
4. Administration work
5. Others /Investigation and escorts
6. General Functions

Who may organize security guard, watchmen or detective agency?


Any Filipino citizen or corporation association, partnership, one hundred percent (100%) of
which is owned and controlled by Filipino citizen

Basic age requirements of an operator or manager of Agency

1. Not less than twenty five (25) years old of age


2. New applicant for license to operate: Minimum capitalization of one million
(1,000,000) with minimum bank deposit of five hundred thousand (P500,000.00)
pesos in order to start its business.

Basic qualification of a Security Consultant

1. Filipino Citizen;
2. Physically fit;
3. Holder of MSCrim, MPA, MNSA, Industrial Management or LL.B.
4. Must have at least ten (10) years experience in the operation and management of
security business.

Basic Qualifications of a Security Officer


No person shall be licensed as security officer unless he has the following qualification:

1. Filipino Citizen;
2. Holder of Baccalaureate Degree;
3. Physically and mentally fit; and
4. Has graduated from Security Officers Training Course or its equivalent

Basic Qualifications of a Private Detective


No person shall be licensed as a private detective unless possesses the following qualification:

1. Filipino Citizen;
2. Physically and mentally fit;
3. Holder of a baccalaureate degree preferably LLB, BS Criminology.
4. Graduate of a criminal Investigation Course offered by the PNP or the NBI or any
Police training school, or detective training in any authorized/recognized training
center; and
5. Advance ROTC/CMT graduate or its equivalent

What are the qualifications of a security guard?


No person shall be licensed as security guard unless he possesses the following qualification:

1. Filipino Citizen;
2. High school graduate;
3. Physically and mentally fit;
4. Not less than 18 years of age nor more than 50 years old.(for new applicant and SGs
in supervisory position); and
5. Has undergone a pre-licensing training course or its equivalent

Desirable Qualities of Security Guards

1. Alertness
2. Judgment
3. Confidence
4. Physical fitness
5. Tactfulness
6. Self control
7. Interest, loyalty, responsible and trustworthy, is also important attributes of a
reliable guard.

Qualification of Training Officer

1. Commissioned officer of the PNP/AFP(ret.)


2. Non PNP/AFP officer with 3years continues service.
3. Non PNP/AFP officer with an actual experience in security management for one
year.
4. With teaching experience with enforcement, security administration, etc.
5. Must pass an instructor Job training course at the PNP center for those with non-
teaching.
Licenses in the Security Profession
License to Operate – before a Private Security Agency (PSA) can operate, it has to secure a
License to Operate (LTO) categorized as either Temporary or Regular. A temporary license is
issued by the PNP THRU civil Security Group Directorate after the applicant /licensee should
have complied with all the requirements while it has less than two hundred guards. A regular
license to operate is issued to the PSA once it is qualified of having two hundred (200) or more
license security guard in its employ duly posted. Regular license is renewable every two (2)
years.
The Validity of all LTO is two (2) years

Renewal of license to operate


All applications for renewal of license to operate shall filed at least sixty (60) days before expiry
date of LTO subject of the renewal application Filed/accepted thereafter shall penalized for late
filing.
Licenses in the Security Profession
Security Guard License - before a security guard can practice his profession; he shall possess
valid security license. The use of expired license is not allowed. In case of doubt, licenses may
be verified at the PNP SAGSD whether valid or fake.

Firearm’s license – all firearms of the security agency should be covered with firearms license
issued by the PNP through its Firearms Explosive Division under the Civil Security Group,
renewable every two years. No duplication of two or more firearms with the same make and
serial number shall be covered by one license.

The Ranks and Position of the Security Personnel

Security Officer:
Chief Security officer- He shall be the highest ranking security officer, security director,
manager or chief of a security unit/organization in given PSA/CSA or
government entity.
Senior Security officer- He shall perform the duties and responsibilities of an executive
officer to coordinate the activities of the unit and take over the duties of the
chief Security officer in the latter's absences or when incapacitated.
Security Guard Officer – He shall occupy the position equivalent to a unit staff officer , Private
detective, Inspector or chief investigator, Detachment Commander of not less than 30 security
guards.
Guard Supervisor –he/she shall perform the duties of supervising not more than 15 posted
guards, or other commensurate task within the unit.

Inspection

1. Pre-licensing Inspection – Conducted prior to the release of regular license, conducted on


the applicant agency.
2. Post-licensing Inspection – conducted after the issuance of LTO to determine or ascertain
that the provision of RA 5487 and its implemented rules and regulation are complied with by
agency.

Authority to conduct – PNPSOSIA/CSFDO or authorized representative.

Firearms and Weapons Authorized for Used of the Security Guard while on Duty
Handguns/Low-powered (cal. 22 and cal. 38) not exceeding one FA for every two guards
employed.

1. Shotguns (not bigger than 12 gauge)


2. High-powered –when the agency is operating in areas where there is upsurge of lawlessness
and criminality as determined by the Chief PNP.

Possession of Firearm:
Ratio: 1 firearm for every two (1:2) security guard in its employ.
No PSA/CSF/GSU shall be allowed to possess firearms in excess of 500 units.

What are the restrictions in the carrying of firearms by security guards. Watchman or
private detective?
1. Firearms to be carried only during tour of duty while in proper uniform;
2. Within the compound of the establishment;
3. When escorting big amount of cash or valuables.

Restriction to possess high powered firearms:


The firearm first be registered with the FED before issuance and shall not be used or transferred
in places other than those specially authorized by the Director, CSG.
The total number of high-powered firearms that an agency or security force/unit is authorized to
possess shall not exceed ten percent (10%) of the total number of security guards of watchmen in
its employ.
Under what circumstances where the firearms issued to any security guard on duty be
confiscated by proper authorities?

PSA shall not exceed fifty (50) rounds of ammunition per unit of duly licensed firearms.
Individual issue to each security guard shall be limited to one half of such basic load or twenty
five (25) rounds for every security guard.

When firearm is to be used or being used in the commission of crime.

1. If carried while guard is not on tour of duty.


2. There is written court order.
3. Firearms is carried outside the property, compound or establishment serviced by the agency
without proper authority

What is a mission order?


It is a written instructions issued by the agency to its guards to perform lawful activity at
specific time, place and date. It shall include the make, model and serial no. of the firearm issued
to the guard and the name of the operation officer or manager of the agency

What is Duty Detail Order


Agencies detailing their security personnel on duties or while escorting big amount of
cash or valuables outside its jurisdiction or area of operation, shall issue an appropriate duty
detail order to the security personnel concerned.
SAMPLE: https://twitter.com/sosia_csg/status/656327910895194112/photo/2
What is Security Service Contract
Private Security agencies shall render services to their clients only after a service contract is duly
notarized shall have been executed between them. Such contract must stipulated among other
things, the money consideration to be paid by the client to the agency, the number of hours of
security services per guard per day which the guard himself shall render to the clients and the
salary each individual security guard shall received from the agency.

Limitation, Disqualification and Prohibitions

1. No person shall organize or even have an interest in more than one agency
2. Elective or appointive government employees who may be called upon on account of the
functions of their respective offices in the implementation and enforcement of the provisions
of RA 5487, and any person related to such government employee by affinity or
consanguinity in the third civil degree, shall not hold an interest directly or indirectly, in any
security or watchman agency.
3. No agency shall offer, render or accept services in gambling dens or other illegal business
establishments or enterprises.
4. The extent of the security guard service being furnished by the security agency shall not go
beyond the compound and/or property of the person or establishment contracting the security
service except when the security guards is escorting big amount of money or valuables.
5. All agencies shall maintain a main office in their registered addresses. Branch offices may
be established and maintained in other provinces or cities where the security agency has
deployed security guard.
6. All applicants for license to operate shall be required to attend a private security agency or
company guard force operators and management seminar or workshop.

Prohibition on “KABIT SYSTEM” operators:

1. No licensed security agency shall operate, promote and enter into an agreement of merger or
“kabit system” with any person or group of persons for the purpose of organizing a branch
unit or subsidiary under separate control and ownership. Merger of security and detective
agencies shall not be recognized without prior approval from the Securities and Exchange
Commission with respect to their Articles of Incorporation and the Department of Trade and
Industry, with regards their business name.
2. Any of the following circumstance or a combination thereof shall be considered prima-facie
evidence of the existence of “Kabit System”.
3. Maintaining a separate branch, unit or subsidiary office aside from the main office of the
agency situated within the same locality.
4. Receiving direct payments from the agency’s clientele and issuing official receipt of their
own distinct from that issued by the agency concerned.
5. Remitting directly Social Security System premiums, Medicare contributions and other
premium for other policy insurance benefits by the aforementioned branch, unit or subsidiary
office.
6. Keeping or maintaining separate payrolls for the branch employees signed and/approved by
the branch manager only.
7. Absence of record of monthly income remittance to the main office when said branch is
authorized to make collections from the clients of the licensee.
8. All other similar acts tending to show separate and distinct relationship or personality or
ownership or management.

On Membership

1. No regular license shall be granted to any private security agency unless it has a minimum of
two hundred (200) licensed private security personnel under its employ.
2. No regular license shall be granted to any company guard force or private detective agency
unless it has a minimum of thirty (30) licensed private security personnel under its employ.
3. The maximum number of private security personnel that a PSA/CGF/PDA may employ shall
be one thousand (1000) including the branch and the subsidiary.

Republic Act No. 5487


Congress of the Philippines
21 June 1969
Section 1. Short Title of Act.— This Act shall be known as “The Private Security Agency Law.”
Section 2. Scope of this Act.— The organization, operation, business and activities of private
detectives, watchmen or security guards agencies shall be governed by the provisions of this Act.
Section 3. Definition of Terms.— (a) Person. As used in this Act, person shall include not only
natural persons but also juridical persons such as corporation, partnership, company or
association duly registered with the Securities and Exchange Commission and/or the Bureau of
Commerce. (b) Private Detective Agency.
MALACAÑANG
MANILA

PRESIDENTIAL DECREE No. 11


AMENDING CERTAIN SECTIONS OF REPUBLIC ACT NUMBERED FIFTY-FOUR
HUNDRED EIGHTY-SEVEN OTHERWISE KNOWN AS, “THE PRIVATE SECURITY
AGENCY LAW.”
WHEREAS, there were pending before Congress prior to the promulgation of Proclamation No.
1081, dated September 21, 1972, certain priority measures vital to the law enforcement program
of the Government and to the restoration and maintenance of peace and order throughout the
land, which were duly certified by the President as urgent measures;
PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL
In every installation, the use of protective barriers, security lighting, communication and
electronic hardware provides physical safeguards but these are insufficient to maximize the effort
of the guard force. A control point must be established for positive personnel identification and
check system. This is to insure that only those people who have the right and authority will be
given the necessary access to the area.
What is personnel identification?
The use of identification cards badges or passes. Generally speaking, this system
designates when and where and how identification cards should be displayed, and to whom.
This helps security personnel eliminate the risk of allowing the access of unauthorized personnel
within the establishments.

Types of Personnel Identification

1. Personal recognition
2. Artificial recognition

Ex. Duress Code – a type of code system so that security personnel when forced by armed men
enter an installation can give alarm by the use of certain words in casual conversation with other
personnel in the installation.
ACCESS LIST- an authenticated list personnel given to security guard allowing entry to
compound or installation or part thereof.
PASS SYSTEM- a method used by security to screen visitors or person admitted into building
premises.
Uses of Pass System

1. Single pass system– the badge or pass coded for authorization to enter specific areas is issued
to an employee who keeps it in his possession until his authorization is terminated.
2. Pass exchange system – an exchange takes place at the entrance of each controlled area.
Upon leaving the personnel surrender his badge or pass and retrieve back his basic
identification.
3. Multiple pass system– this provides an extra measure of security by requiring that an
exchange take place at the entrance of each restricted area.

Badge and Pass Control

1. The system should have a complete record of all badges and identification cards issued,
returned, mutilated or lost by serial number and cross-indexed alphabetically.
2. The supervisor from time to time for its accuracy and authenticity should check the lists.
3. Passes and badges reported lost should be validated and security at entrance be informed
through conspicuous posting.

Visitor’s Movement Control

1. Visitor’s logbook – all visitors to any facility should be required to identify them and should
be given a visitor’s ID by the security. Visitor’s logbook should be filled up with the name
of visitors, nature and duration of visit.
2. Photograph – taking of photographs should also be considered. Extreme caution must be
exercised in areas where classified information is displayed to preclude unauthorized taking
of pictures of the installation. If a visitor has camera and it is prohibited to take picture, said
camera should be left in the care of security with corresponding receipt.
3. Escort – if possible visitors should be escorted by the security to monitor their activity within
the establishment and guide them where to go.
4. Visitor’s entrance – separate access for visitors and employees of the establishment should
be provided.
5. Time-traveled – if there is a long delay or time lapse between the departure and arrival, the
visitors maybe required to show cause for the delay.

Package Management Control

1. No packages shall be authorized to be brought inside and outside the industrial installation,
offices and work area without proper authority. This basic precept help reduce if not
eliminate pilferage, industrial espionage or sabotage.
2. Outgoing packages carried by personnel should be closely inspected and those in vehicles
should also be checked as many pilfered items are hidden in the surface of the vehicles
leaving the compound.
3. Any personnel or visitor entering the installation with a package should deposit the same to
the security and in return receives a numbered tag, which he or she will use in claiming his or
her package upon departing.

Vehicular Movement Control and Identification

1. Privately owned vehicle of personnel or visitor should be registered and are subject to the
identification and admittance procedure.
2. Vehicles should be subjected for search at the entrance and exit of the installation.
3. All visitors with vehicle should provide the security as to the complete details of their
duration of stay, person to be visited, and other information.
4. All vehicles of visitors should be given a sign or sticker to be placed on the windshield.
5. Traffic warning signs should be installed in all entrances in order to guide the visitors in their
destination as well as to provide them with the necessary safety precautions while they are
inside the installation.
6. Security personnel must constantly supervise parking areas and make frequent spots searches
of vehicles found there.

Building Access Control


At any physical barrier, a security system must posses the ability to distinguish among
authorized persons, unauthorized visitors, and other unauthorized persons. This is to assist the
security personnel protects sensitive are and information within the installation.
Appropriate warning signs should be posted at the building perimeter. Special restricted
entry facilities to public access should be provided. This will be dependent on the degree of
security needed for the protection of property, activity and other processes within the building.
The access to the restricted area shall be limited to authorized personnel who have the
direct involvement with the installation, construction and operation and maintenance of the
equipment and systems and/or use of the materials contained within the restricted area. A clear-
cut policy on the access control should be disseminated to all personnel of the installation.
Types of controlled Areas

1. Controlled Areas – Are those areas where access is restricted as to entrance or movement
by all authorized personnel and vehicles. It should additionally marked by a fence or other
barrier, and access to it should limited to as few guest as possible;
2. Limited Areas – Are those within the controlled area where a greater degree of security is
required.
3. Exclusion Areas – Are used only for handling and storage of high value cargo and classified
documents. The number of people authorized to enter this area should be strictly limited, and
the area should be under surveillance at all times.

Personnel Security
Personnel security is considered as the most important. This is for the simple reason that
security involves people, both an assets to be protected and as source of security threats. It is an
acknowledge fact that losses are attributed mainly to negligence or active participation of
employees, either through theft and sabotage.
Purpose and Importance of Personnel Security

1. To insure that a firm hires those employees best suited for the firm; and
2. Once hired, to assist in providing the necessary security to these employees while they are
carrying out their functions.

Personnel Security Investigation


Personnel Security Investigation (PSI) is a process of inquiry into the character, reputation,
discretion, integrity, morals and loyalty of an individual to determine the suitability for
appointment or access to classified matter.

TYPES OF PERSONNEL SECURITY INVESTIGATION (PSI):

1. Local Agency Check (LAC) – Investigation of the records and files of agencies in the area
of the principal residence of the individual being investigated. This includes check with the
local PNP, MTC/RTC, Provincial/City Prosecutor’s Office and the CI.
2. National Agency Check (NAC)-consist of LAC supplement by investigation of the records
and the files of the following agencies: DI, DIDM, CIDG including alias nickname and
fingerprints.
3. Partial Background Investigation (PBI) – is an inquiry into specific phases of an
individuals life history including as a minimum, NA, contact with references and former
employers, contacts with individuals whose names are taken from the reference or former
employers interviewed but not given as reference of the subject, and such other investigation
as maybe deemed necessary by the investigating agency.
4. Complete Background Investigation (CBI) – is a complete inquiry or investigation into all
important aspects of an individual’s life history.

AUTHORITY FOR INVESTIGATION


The authority for personnel security investigation emanates from the commander who is
responsible for the achievement and maintenance of sound security in his unit, security being a
command responsibility.

SECURITY CLEARANCE
It refers to a certification given by responsible authority that the person described is
cleared for access to classified matters at appropriate level. This includes assignments to
sensitive positions

Types of Security Clearance

1. Interim Clearance – is good for two (2) years from the date of issuance.
2. Final clearance – is good for (5) years from the date of issuance.

RENEWAL OF SECURITY CLEARANCE

1. Final clearance already granted will remain valid for a period of five (5)
years from date of issue. Thereafter, a new security clearance will be issued
after a satisfactory NAC has been conducted.

1. Interim clearance already granted will remain valid for a period of two (2) years from the
date of issue . in case final clearance cannot be granted in accordance with the minimum
standards provided, anew interim clearance will be issued after a satisfactory completion of
the required investigation

Security Education Program


Security Education is conducted to develop security awareness among employees of the
company. It should cover all employees, regardless of rank or position.
The basic goal of security education program is to acquaint all the employees the rationale
behind the security measures and to insure their cooperation at all times.

Phases of Security Education Program

1. Initial Interview – it is the first contact of the prospective employee wherein the interviewer
determines the suitability of the applicant for employment through his given answers on the
different type of questions being conducted.
2. Orientation and Training – it is in this stage where new employees receive detailed
presentation of personnel security policy. Usually handouts or employees manual are being
distributed for reference. New employees also requested.
3. Refresher conference – it is design to remind employees of the company about their
responsibilities, review the guidelines and policies, introduction of new policies and
regulations and a movement of getting employees feedback about the company policies that
is being implemented.
4. Security Reminders – This employed as an indirect approach of educating the employees,
such as posting security posters and distributing fliers.
5. Security promotion – it is the act of emphasizing the importance and role of security
achieving the company goals and objectives. It involves security employee cooperation and
support.
Definition of Terms:
Risk – it is the potential damage or loss of an asset.
The level of risk is a combination two factors: the value placed on that asset by its owner
and the consequence, impact adverse effect of the loss or damage to that asset and the likelihood
that a specific vulnerability will be exploited by a particular threat.
Hazards – “exposure to the chance of loss or injury. It is synonymous to risk or peril.
Conversely, Microsoft Encarta describes hazard as a “potential danger or something that is
potentially very dangerous”
Security Hazards – any act or condition which may result in the compromise of information,
loss of life, loss or destruction of property or disruption of the objective of the installation. It can
also be defined as an act or condition affecting the safe operation of the facility caused by human
action accidental or intentional.
Risk Management- is a process of selecting and implementing security countermeasures to
achieve an acceptable level of risk at an acceptable cost.
Risk Analysis- the analysis of risk include examinations of the vulnerability, probability and
criticality of potential threats and include natural and manmade risk.
Adversary- it refers to any individual, group, organization, or government that conducts
activities or has the intention and capability to conduct activities detrimental to the individual,
private or government entity.
Asset – any information, facility, material, information, or activity which has a positive value to
its owner whether it is an individual, private or government entity.
Vulnerability – any weakness that can be exploited by an adversary to gain access to an asset.
Countermeasures – an action taken or a physical entity used to reduce or eliminate one or more
vulnerabilities. The cost of possible countermeasures may be monetary, but may also include
non-monetary cost such as reduced operational efficiency, adverse publicity unfavorable
working conditions, and political consequences.
Probability – it is the chance or likelihood that a loss will take place.
Criticality – the impact of a loss as measured in financial terms.
Relative Criticality of operation – this pertains to the importance of the firm with reference to
the natural economy and security. Example is gasoline depots, communication transmission
lines, and power plants.
Relative Vulnerability – this is the susceptibility of the plant or establishment to damage, loss
or disruption of operation due to various hazards. A good example is the location of the
building, the machines, or presence of possible poisons.
Risk Management Alternatives and Strategies
Risk Avoidance – eliminating or removing the risk totally from the business, government, or
industrial environment for which the risk manager has responsibility.
Risk Reduction – decreasing the risk by minimizing the probability of the potential loss. The
reduction or criminal opportunity is often accomplished by situational crime (prevention
strategies to discourage, deter, or deny criminal incidents.
Risk Spreading – spreading the risk through compartmentation or decentralization to limit the
impact (criticality) of the potential loss.
Risk Transfer –moving the financial impact of the potential loss-over to an insurance company.
Risk Self-assumption- planned assumption and acceptance of the potential risk by making a
deliberate managerial decision of doing nothing about the threat, or setting aside resources for
use in case of a specific loss incident.

SECURITY HAZARD
Any act or condition which may result in the compromise of information, loss of life, loss or
destruction of property or disruption of the objective of the installation
The extent and degree of risk to security will dependent

1. Relative criticality of operation – is the importance of the firm with reference to the natural
economy and security.
2. Relatively vulnerability- is the susceptibility of the plant or establishment to damage loss or
disruption of operation due to various hazards.

Types of Hazards
1. Natural Hazards – these are hazards which arise from natural phenomena. The following
are types of natural hazards or disasters:
2. Human-man made Hazards – These are hazards which are the result of a state of mind,
attitude, weaknesses or character traits of one or more persons. They can be acts of
commission or omission, both overt and covert, which can disrupt operation of a plant or
installation. The following are types of human or man made hazards:

Carelessness – accidents and dissatisfaction

Disloyalty –subversion and sabotage espionage, pilferage and theft vandalism, etc.

Possible Targets of Saboteur

1. Armed Forces Installation


2. Natural resources – mines, forests, farms and farm products
3. Industries – buildings, power sources, machinery, fuel, etc.
4. Warehouses depots, communications, public utilities, etc.

Pilferage
This is one of the most annoying and common human hazards which security has to deal
with. This activity it uncontrolled can become a financial drain if not a menace to smooth and
orderly operation. Due to this, security force has to concentrate large number men to check this
nefarious and disconnecting activity. Petty pilferage is frequent, hard to detect, difficult to prove
and win conviction but definitely dangerous to ignore

Types of Pilferers

1. Casual Pilferer – one who steals due to his inability to resist the unexpected opportunity and
has little fear of detection is no plan or premeditation and he is usually a “loner” on the job.
The temptation to pick up the article is basically due to poor security measure. The
implication of causal pilfering is the big cumulative cost if it remains unchecked.
2. Systematic Pilferer – one who steals with preconceived plans and takes away any or all
types of items or supplies for economic gain. Pilferers of this kind can be employees or
outsiders of the establishment.

Security Survey
Security Survey is defined as a critical on-site examination and analysis of an industrial plant,
business, a home or public or private institution done to ascertain the facility’s current security
status, to identify deficiencies or excess in current practices, to determine what protection is
needed and to make recommendations for improving the overall level of security at that
installation.
Objectives of Security Survey

1. To determine existing vulnerabilities to injury, death, damage or destruction by natural


causes.
2. To determine existing vulnerabilities of corporate assets due to outside criminal activity.
3. To determine existing vulnerabilities of corporate assets due to criminal activity within the
organization.
4. To determine existing conditions of physical security of corporate property.
5. To measure compliance of employees to security.

Security Inspection
Security inspection is conducted for two reasons: to check on the degree of compliance with the
recommended countermeasures and to determine the effectiveness and adequacy of the
countermeasures which are in effect.
Types of Security Inspection

1. Continuous Inspection

 It is an on-going and never ending activity.

2. Formal Inspection

 It is usually preceded by an announcement, and the unit under inspection “prepares” for
events, including some housekeeping activities that would not otherwise happen at that point
in time.

3. Informal Inspection

 It is usually the result of a long and firmly entrenched inspection program.


 It is seriously and quietly executed in a spirit of understanding and cooperation.

4. Structured Inspection
 It is one that moves systematically from one area to the next and so on.
 There is a format or a logical sequence to the process.

5. Unstructured Inspection

 It is conducted in a random manner.


 There is no formal or logical sequencing.

Security Investigation
It is a planned and organized determination of facts concerning specific loss or damage of
assets due to threats, hazards or unsecured conditions

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy