Podcast
Questions and Answers
The formula used in the manufacture of a product is particularly known as?
The formula used in the manufacture of a product is particularly known as?
What is a risk management alternative done through compartmentation and decentralization to limit the impact of the potential loss?
What is a risk management alternative done through compartmentation and decentralization to limit the impact of the potential loss?
The following are exempt from pre-licensing training course, except?
The following are exempt from pre-licensing training course, except?
What is the document issued by the Chief, Philippine National Police recognizing a person to be qualified as private security or training personnel?
What is the document issued by the Chief, Philippine National Police recognizing a person to be qualified as private security or training personnel?
Signup and view all the answers
What happens when company employees rely too much on the assigned security personnel?
What happens when company employees rely too much on the assigned security personnel?
Signup and view all the answers
Who among the following should not have the need to know proprietary information?
Who among the following should not have the need to know proprietary information?
Signup and view all the answers
The act of stealing small items or items of little value is considered as?
The act of stealing small items or items of little value is considered as?
Signup and view all the answers
How many witnesses are needed when a security guard will search a person he arrested?
How many witnesses are needed when a security guard will search a person he arrested?
Signup and view all the answers
Security education programs include the following, except?
Security education programs include the following, except?
Signup and view all the answers
Under the staffing pattern, which security guard is responsible for the entire detail of security officers within a certain establishment?
Under the staffing pattern, which security guard is responsible for the entire detail of security officers within a certain establishment?
Signup and view all the answers
What is a conference similar to an entrance conference done after the completion of the security survey called?
What is a conference similar to an entrance conference done after the completion of the security survey called?
Signup and view all the answers
What pertains to the importance of the firm with reference to the national economy and security?
What pertains to the importance of the firm with reference to the national economy and security?
Signup and view all the answers
New applicants of a license to operate a security agency shall have a minimum capital amounting to?
New applicants of a license to operate a security agency shall have a minimum capital amounting to?
Signup and view all the answers
What type of alarm system projects a visible or invisible beam that emits a signal when disturbed?
What type of alarm system projects a visible or invisible beam that emits a signal when disturbed?
Signup and view all the answers
What type of lighting system is used in emergencies when other systems are inoperative?
What type of lighting system is used in emergencies when other systems are inoperative?
Signup and view all the answers
A written order or schedule issued by a superior officer for private security or detective services is called?
A written order or schedule issued by a superior officer for private security or detective services is called?
Signup and view all the answers
The purpose of document and information security is to protect sensitive information against unauthorized?
The purpose of document and information security is to protect sensitive information against unauthorized?
Signup and view all the answers
The additional protective measure composed of an overhang of barbed wire placed above a perimeter fence is known as?
The additional protective measure composed of an overhang of barbed wire placed above a perimeter fence is known as?
Signup and view all the answers
This law is otherwise known as the Private Security Agency Law of the Philippines?
This law is otherwise known as the Private Security Agency Law of the Philippines?
Signup and view all the answers
A security guard making an arrest may not inform the person to be arrested of his intention if?
A security guard making an arrest may not inform the person to be arrested of his intention if?
Signup and view all the answers
The impact of a loss as measured in financial terms is called?
The impact of a loss as measured in financial terms is called?
Signup and view all the answers
Availing a property or life insurance is actually a risk management alternative commonly known as?
Availing a property or life insurance is actually a risk management alternative commonly known as?
Signup and view all the answers
What will be observed when patrolman Pogi is in pursuit of a criminal and requests SG Lomi to assist?
What will be observed when patrolman Pogi is in pursuit of a criminal and requests SG Lomi to assist?
Signup and view all the answers
What is any formula, pattern, device, or compilation of information used in business for gaining an advantage called?
What is any formula, pattern, device, or compilation of information used in business for gaining an advantage called?
Signup and view all the answers
Study Notes
Risk Management
- Risk Avoidance: A risk management strategy involving completely avoiding any activities that could potentially result in loss.
- Risk Self-assumption: Accepting the potential consequences of a risk by not taking any preventative measures.
- Risk Reduction: Aiming to lessen the negative impact of a potential risk by implementing preventative measures.
- Risk Spreading: Distributing the potential loss across multiple entities, reducing the burden on any single party.
Security Professionals
-
Exempt from pre-licensing training:
- Retired Military Personnel
- ROTC Graduate
- Retired Police Personnel
- College Graduate
- Professional License: Issued by the Chief, Philippine National Police, allowing individuals to legally perform security duties.
Security Threats and Management
- Trade Secret: A formula, practice, or design used in a business that provides a competitive advantage, requiring protection from disclosure.
- Vulnerability: A weakened security posture that exposes a company to potential threats, caused by over-reliance on security personnel.
- Pilferage: Stealing small or insignificant items, often done by employees or insiders.
- Security education programs: Include orientation on employee roles in loss prevention, fire safety programs and drills, and natural disaster drills.
- Duty Detail Order: A written instruction assigning security personnel to specific tasks or locations.
Security Systems and Processes
- Top Guard: Additional perimeter fence security involving barbed wire placed on top of the existing fence.
- Standby lighting: Backup lighting system activated in emergencies or power outages.
- PhotoElectric/Electric Eye Device: Security alarm system triggered when a visible or invisible beam is disturbed.
Legal Framework
- R.A. 5487: The Private Security Agency Law of the Philippines.
- Minimum Capital for Security Agency License: ₱1,000,000 (one million pesos)
Security Measures
- Document and Information Security: This aims to safeguard sensitive information from unauthorized disclosure or access.
-
Arrest with No Information: A security guard can arrest someone without providing the reason for the arrest if:
- The person is escaping.
- The person is resisting arrest forcibly.
- Providing the information would endanger the arrest.
- Criticality: A measure of the importance of a company or asset to national security or economic stability.
- Relative Vulnerability: The susceptibility of an asset to threats and potential losses.
- Risk Transfer: A risk management approach that shifts the potential financial burden of a risk to a third party, such as insurance companies.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on key concepts of risk management, including strategies like risk avoidance, reduction, and spreading. Additionally, explore the requirements and roles of security professionals in the context of threats and licensing. This quiz will help reinforce your understanding of these crucial topics.