Podcast
Questions and Answers
What is a risk management alternative done through compartmentation and decentralization to limit the impact of potential loss?
What is a risk management alternative done through compartmentation and decentralization to limit the impact of potential loss?
The formula used in the manufacture of a product is particularly known as?
The formula used in the manufacture of a product is particularly known as?
What document is issued by the Chief, Philippine National Police to recognize a person qualified to perform duties as private security or training personnel?
What document is issued by the Chief, Philippine National Police to recognize a person qualified to perform duties as private security or training personnel?
Which of the following are exempt from pre-licensing training courses, except?
Which of the following are exempt from pre-licensing training courses, except?
Signup and view all the answers
What happens when company employees rely too much on assigned security personnel?
What happens when company employees rely too much on assigned security personnel?
Signup and view all the answers
Who among the following should not have the need to know proprietary information?
Who among the following should not have the need to know proprietary information?
Signup and view all the answers
The act of stealing small items or items of little value is considered as?
The act of stealing small items or items of little value is considered as?
Signup and view all the answers
How many witnesses are needed when a security guard will search a person he arrested?
How many witnesses are needed when a security guard will search a person he arrested?
Signup and view all the answers
Security education programs include the following, except?
Security education programs include the following, except?
Signup and view all the answers
Under the staffing pattern, which security guard is responsible for the entire detail of security officers within a certain establishment?
Under the staffing pattern, which security guard is responsible for the entire detail of security officers within a certain establishment?
Signup and view all the answers
A conference similar to an entrance conference done after the completion of the security survey is called?
A conference similar to an entrance conference done after the completion of the security survey is called?
Signup and view all the answers
This pertains to the importance of the firm with reference to the national economy and security, like gasoline depots, communication transmission lines, and power plants.
This pertains to the importance of the firm with reference to the national economy and security, like gasoline depots, communication transmission lines, and power plants.
Signup and view all the answers
New applicants for a license to operate a security agency shall have a minimum capital amounting to?
New applicants for a license to operate a security agency shall have a minimum capital amounting to?
Signup and view all the answers
What type of alarm system projects a visible or invisible beam that emits a signal when disturbed?
What type of alarm system projects a visible or invisible beam that emits a signal when disturbed?
Signup and view all the answers
What type of lighting system is used in times of power failure or emergencies when other systems are inoperative?
What type of lighting system is used in times of power failure or emergencies when other systems are inoperative?
Signup and view all the answers
A written order or schedule issued by a superior officer assigning the performance of private security or detective services/duties is called?
A written order or schedule issued by a superior officer assigning the performance of private security or detective services/duties is called?
Signup and view all the answers
The primary purpose of document and information security is to protect sensitive information against unauthorized?
The primary purpose of document and information security is to protect sensitive information against unauthorized?
Signup and view all the answers
The additional protective measure composed of an overhang of barbed wire placed above a perimeter fence is known as?
The additional protective measure composed of an overhang of barbed wire placed above a perimeter fence is known as?
Signup and view all the answers
This law is otherwise known as the Private Security Agency Law of the Philippines?
This law is otherwise known as the Private Security Agency Law of the Philippines?
Signup and view all the answers
A security guard making an arrest may not inform the person to be arrested of his intention if?
A security guard making an arrest may not inform the person to be arrested of his intention if?
Signup and view all the answers
The impact of a loss as measured in financial terms is called?
The impact of a loss as measured in financial terms is called?
Signup and view all the answers
Availing a property or life insurance is actually a risk management alternative commonly known as?
Availing a property or life insurance is actually a risk management alternative commonly known as?
Signup and view all the answers
Patrolman Pogi is in pursuit of a criminal while requesting SG Lomi for assistance. Which circumstance will be observed?
Patrolman Pogi is in pursuit of a criminal while requesting SG Lomi for assistance. Which circumstance will be observed?
Signup and view all the answers
What is the term for any formula, pattern, device, or compilation of information used in business for competitive advantage?
What is the term for any formula, pattern, device, or compilation of information used in business for competitive advantage?
Signup and view all the answers
Study Notes
Risk management
- Risk avoidance is a risk management alternative where you avoid the risk completely.
- Example: A company might choose to avoid the risk of a fire by not storing flammable materials in their building.
Trade Secrets
- A trade secret is a formula, pattern, device, or compilation of information used in business that gives the business an advantage over competitors.
- Example: The formula for Coca-Cola is a trade secret.
Security Personnel
- Retired Military Personnel, ROTC Graduates, and Retired Police Personnel are exempt from pre-licensing training courses for security guards.
- College Graduates are not exempt.
Security Licensing
- Professional License: A document issued by the Chief, Philippine National Police, that recognizes a person's qualification to work as a private security or training personnel.
Vulnerability
- Companies that rely too heavily on security personnel can become vulnerable to security hazards.
Proprietary Information
- Proprietary Information: Information that is confidential and owned by a company.
- Janitors should not have access to proprietary information.
Pilferage
- Pilferage is the act of stealing small items or items of little value.
Security Searches
- Two or more witnesses are required to be present when a security guard searches a person they have arrested.
Security Training Programs
-
Security education programs include:
- Orientation on the employee's role in loss prevention.
- Fire Prevention Programs and Drills
- Natural Disaster/Calamity Drills
Security Staffing
- Officer in Charge: A security guard responsible for the entire security force within a certain establishment.
Security Surveys
- Exit Conference: A meeting held at the end of a security survey, similar to an entrance conference.
Criticality
- Criticality refers to the importance of a company or facility to the national economy and security.
- Examples: Gasoline depots, communication transmission lines, and power plants are considered critical.
Security Agency Licensing
- The minimum capital requirement for a new applicant for a license to operate a security agency is PHP 1,000,000.
Alarm Systems
- Photoelectric or Electric Eye Device: An alarm system that projects a visible or invisible beam which emits a signal when disturbed.
Lighting Systems
- Emergency Lighting: A backup lighting system used in emergencies when other systems are inoperative.
Security Orders
- Duty Detail Order: A written order assigning a security guard to a specific task or location.
Document and Information Security
- The purpose of document and information security is to protect sensitive information from unauthorized disclosure.
Perimeter Security
- Top Guard: An additional protective measure composed of an overhang of barbed wire placed above a perimeter fence.
Philippine Private Security Agency Law
- R.A. 5487 (The Private Security Agency Law of the Philippines)
Security Guard Arrests
- A security guard can arrest someone without informing them of the reason for the arrest if:
- The person to be arrested flees.
- The person to be arrested forcibly resists the arrest.
- Giving such information would imperil the arrest.
Vulnerability & Criticality
- Criticality is the importance of a company or facility.
- Vulnerability is the susceptibility to loss or damage.
Risk Management
-
Risk Transfer: A risk management alternative where the responsibility for a risk is transferred to another party.
- Example: Purchasing property or life insurance is a form of risk transfer.
Peace Officer Assistance
- A security guard can assist a peace officer within their area of duty.
Law Enforcement
- Security guards are not law enforcement officers.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers essential concepts of risk management, including risk avoidance and trade secrets, as well as the specifics of security personnel licensing. Learn how different factors influence security measures in business operations, and understand the importance of protecting trade secrets.