Introduction to Industrial Security Concepts (LEA 3).pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT (LEA 3) CHAPTER 1 MODULE 1: Concept of Security Security According to Oliver O. Wainwright, security defined as the use of “measures designed to safeguard personnel, to...

INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT (LEA 3) CHAPTER 1 MODULE 1: Concept of Security Security According to Oliver O. Wainwright, security defined as the use of “measures designed to safeguard personnel, to prevent unauthorized access to equipment, facilities, materials, and documents, and to safeguard them against espionage, sabotage, theft, and fraud (Wainwrights,1987). Security is important to everyone especially: ▪ Homeowner ▪ Parent ▪ Employee ▪ Online shopper ▪ Private Companies and ▪ Government Security (by Sir Alviar) - is everybody’s concern. - Quality of being secured - Freedom from danger or harm - The assurance that something of value will not be taken away. - Protection of assets (can be a real or personal properties) The security of any business establishment today is a complex process. Security work involves active measures and passive measure so that effective defense can be established against crimes. Active measures - Physical barriers such as fence, security lighting, use of vaults, locks and others. - Deals with more on physical security. Passive measures - Those that will dates man from committing such acts for fear of being caught, charge in court or get dismissed. - Example: Security education programs, Preventive measures, Investigation, Fire Prevention Seminars and Personal security measure. IMPORTANT TERMS Industrial Defines as, pertaining to engage in industry. Management Skillful use of means to accomplish a purpose or the planning, deciding, or exercising of control and supervision on some functions of the organization. Industrial Security The business of providing security and protection to private individuals, business enterprises, or government and non- government industries. Industrial Security Management The skillful handling of the security and safety measures of industrial establishments. OTHER LAWS R.A. 5487 - Considering the significance of providing security to industries, the Philippine Legislative body enacted this act which governs the organization and management of private security agency, company guard forces and government security forces. - It was enacted on June 13, 1969 - Otherwise known as private security agency law R.A. 10586 - The anti-drunk and drugged driving of 2013 R.A. 9165 - Comprehensive Dangerous Drugs Act of 2002 CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 1 Act No. 3815 - Revised Penal Code - Took effect on January 1, 1932 R.A 6975 - Law gives the PNP the responsibilities in the supervision, control and training, and operations of security agencies and in issuance of license to practice the security profession. - The DILG act of 1990 - Signed into law on December 13, 1990 R.A. 8551 - PNP Reform and Reorganization Act of 1998 - Enacted February 19, 1998 R.A 8553 - Amended Sec. 41 of R.A. 7160 or the Local Government Code R.A. 5487 - An Act to Regulate the Organization and Operation of Private Detective, Watchmen or Security Guards Agencies 1. Philippine National-Security Agencies and Guards Supervision Division (PNP_SAGSD) o The unit of PNP which supervise and control the training and operations of security agencies and issue licenses to operate security agencies, and to security guards and private detectives, for the practice of their profession. o The SAGSD is under the supervision of the Civil Security Group which is one of the Operational Support Unit of the PNP. o Formerly known as Security Office for Security and Investigation Agency (SOSIA) 2. Philippine Association of Detective and Protective Agency Operators, Inc. (PAD-PAO) 3. National Intelligence Coordinating Agency of the Philippine (NICA) o One of the oldest, private security forces in the USA, founded by Allan Pinkerton TYPES OF SECURITY 1. PHYSICAL SECURITY - It is the broadest branch of security which is considered with the physical measures adopted to prevent unauthorized access to equipment, facilities, material, and documents and to safeguard them against espionage, sabotage, damage and theft. 2. COMMUNICATION SECURITY - It is the protection resulting from the application of various measures that prevent or delay the enemy or unauthorized persons in gaining information through the communication system. 3. HOTEL SECURITY - If refers to the protection of assets, guests, personal effects and other properties in hotels, inns, and other similar establishments. 4. BANK SECURITY - A specialized type of physical security protecting the assets, personnel, and operation of a bank, with special emphasis on the precaution and measures the safeguard the cash and assets while the storage, in transit, and during transaction. 5. DOCUMENT SECURITY - It is the physical security involving the protection of documents and classified papers from loss of access by unauthorized persons, damage theft and compromise disclosure. 6. PERSONAL SECURITY - This involves the protection of personnel especially ranking officials from any harm, kidnap, and other acts. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 2 7. CRISIS SECURITY - This is a part of VIP security involved in hostage and kidnapping of VIP’s. 8. INDUSTRIAL SECURITY - This is type of security applied to business groups engaged in industries like manufacturing, assembling research and development, processing warehousing and even agriculture. 9. OPERATIONAL SECURITY - This is a type of security that deals primarily with the protection of processes, formula, patents, and other industrial ad manufacturing activities from espionage, infiltration, loss, compromise, or photocopying. 10. SUPERMARKET SECURITY - This is applied in response to the mushrooming of bazaars, marts, super malls, and the like. 11. SCHOOL SECURITY - This applied in response to the increase of violent crimes committed against students and school personnel, and school properties. 12. PERSONNEL SECURITY - This involved in the background checks of individuals commensurate with the security requirements of their works. This also includes measures designed to protect employees of an organization or business establishment. 3 MAJOR ASPECT OF SECURITY 1. Physical security - as discussed earlier, this is the broadest type of security. As a major division of industrial security, it can be defined as those measures taken to prevent physical access or entry to an installation or area by unauthorized personnel. Physical security covers other types of security to protect equipment, documents, facilities and materials against theft, damage, sabotage or espionage. It also encompasses protection of personnel from any criminal act. 3. Personnel security (the most important aspect) - Also known as second line of Defense/weakest link applied to check the background of the persons as well as the protection of the company personnel against potential harmful acts or conditions. 3. Documentary/Information security - This includes every measures designed to safeguard company documents from unintentional harmful acts or against unauthorized disclosure of the information contained therein. - Involves protection of documents, classified papers and vital records from loss access to unauthorized persons, damage, theft, and compromise through proper storage and procedure. MODULE 2: History of Security History of Security in International Setting Historical roots of private security can be traced back to the thousands of years when the protection of life and personal property were up to the individual and later on pass to tribes and to cities. In pre-historic times man recognize the need to keep himself safe from both unknown and known enemies such as animals, other in habitants and the environment itself. (Man-made and natural hazard) He use different methods himself safe such as crafting weapons out of stone and metals, building fire toward animals, staving in caves or tree houses and even staving in the middle of the lake for protection. THE GREEKS - Ancient Greece and the Polis - The one who organize the first police force in the city states is termed as the Polis. THE ROMANS - Established the Praetorian guards “vigiles” (task to be fire) FRENCH - Created a group of carefully selected men called shires or sheriff to look after the peace and order of the different regions. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 3 The greatest influence in the history of Security came from the England OLIVER CROMWELL, 1655 - Set up in England and whales a police force that operated to capture and punish a criminals. HENRY FIELDING, 1748 - Introduce the concept of crime prevention by organizing citizen patrols or watchmen, that not only chase criminals for felony and misdemeanor but also serve Fielding’s purpose of preventing crime ahead of time. SIR ROBERT PEEL - Formed the first formal police department known as the SCOTLAND YARD. - The police are the public and the public are the police, the police being only members of the public who are paid to give full time attention to duties which are incumbent on every citizen in the interest of community welfare and existence. COLONIAL PERIOD - Immigrants from England, Ireland and Scotland came to America bringing with them British approach to policing. At that time, law enforcement officers had to deal with the rampant crime in the US cities and has little time in resources left to deal with the protection of private properties. Hence, citizens who wanted protection of their private properties had to depend on the armed immigrants who were prepared to deal with the criminals. Watchmen form of security become the early version of private security practices, that endure to this day. HISTORY OF SECURITY IN PHILIPPINE SETTING PRE-COLONIAL PERIOD IN THE PHILIPPINES - Sovereign monarch called DATU and LAKAN had their own servants called ALIPING NAMAMATAY (acted as their watchmen or protector). Types of Slaves ▪ ALIPING NAMAMATAY - they have their own properties ▪ ALIPING SAGUIGUILID - no properties, they are owned SPANISH COLONIAL PERIOD - Spanish colonial government introduced the guardia civil in the Philippines year 1868. “Guardia Civil” o serve as the police force based on the civil guard of Spain o they perform patrol functions in cities and towns o organize operations for the suppression of bandit groups and impose penalties for infringement of laws and local ordinances AMERICAN COLONIAL PERIOD IN THE PHILIPPINES - Became the forebear of the present national police. - During that time, a couple of constable officers were adequate to maintain the peace and order in the town or city. AFTER WORLD WAR II - The Indian national or the Boombay, pioneers as the watchman who protected the specific building of commercial establishment. CURRENT TREND IN SECURITY ETYMOLOGY OF SECURITY “secures” (free from care) Late middle English: from Old French securite or Latin securitas, from securus “free from care” GENERAL PRINCIPLES OF SECURITY 1. Command Responsibility - Cannot be delegated but the security task can be assigned. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 4 - Also known as “Superior Responsibility” - Si superior mag kakaroon lang siya ng liability or responsibility kung meron siyang knowledge sa nangyare, ginagawa, or ginawang krimen tapos walang ginawang action or corrective action before, during or immediately after the crime. Command responsibility is often misunderstood...it is not a form objective liability whereby a superiors could be held criminally responsible for crime committed by subordinates…. Instead, command responsibility is a form of responsibility for omission to act. 2. Compartmentalization - Compartmentalization, in information security whether public or private is the limiting of access to information to persons or other entities on a need-to-know basis to perform certain tasks. - If you tell people something on a need-to-know basis, you only tell them the facts they need to know at the tie they need to know them, and nothing more. - Kahit pa nabigyan yung isang tao ng official approval para iccess yung sensitive info. Hindi niya basta basta pwede makuha yung information unless pumasok siya sa need-to-know basis or restriction na yung info. nay un is kailangan niya para maperform niya yung official function niya. 3. Balance between security and efficiency - Security prevails over efficiency. Efficient - Is defined as “capable or producing desire results with little or no waste (as of time or materials)” Effective - is defined a “produci.ng a decided, decisive, o desired effect”. 4. General Principles of Security remain constant - CIA trial ▪ Confidentiality – to maintain private info. remains confidential. ▪ Integrity – to maintain the data or info. free from any modification. ▪ Availability – to maintain the info. available when it is needed. 5. Security is the concern of all personnel - Security is concern of everyone. CURRENT TREND IN SECURITY History shows how public law enforcement and private security evolved from the same roots eventually took different directions. The police served as the public’s interest while the security force served private interest. As crime became a bigger problem especially in the urban areas, police departments who previously looked down at private security are now beginning to see the benefits of building a partnership with them. Now, police functions that did not involve enforcement, arrest or the use of force inside workspaces are turned over to security. Traffic control around large commercial properties and patrol functions around private neighborhoods are also now often provided by security officers. RULE XVIII DUTIES DURING STRIKES AND LOCKOUTS SECTION 3. Inter-relationship between Private security Personnel and members of the PNP (IRR, RA 5487) Private Security Personnel - are always subordinate to member of the PNP o matters pertaining to law enforcement and crime prevention. They cannot enforce any provision of the law except in executing citizen’s arrest and/or conducting initial investigation of a commission of a crime. In such case, any arrested person shall be turned over immediately to the nearest PNP units/station. - Criminal Investigation is the responsibility of the PNP. All results of initial investigation conducted by private personnel and all evidence gathered by the, hall be over to the unit/station concerned as a matter of course without delay. With the advent of terrorism in the countries around the globe, it becomes more important to build a strong partnership between the police who respond to terrorist acts and security officers who respond on the private premises that they protect. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 5 This collaboration should also involve leaders and enforcers in other fields such as firefighting, disaster management, emergency medical treatment and public health. This, of course, entails a strong support and commitment from the national government. RULE XII UTILIZATION OF PRIVATE SECURITY AGENCIES AD PERSONNEL (IRR, RA 5487) SECTION 1. Powers of city municipal mayors in case of emergency – in case of emergency or in times of disaster or calamity when the service of any security agency/entity and its personnel are needed, the city or municipal mayor may muster or incorporate the member of the agency or agencies nearest the are of such disaster or calamity to help in the maintenance of peace and order, prevention or crime, or apprehension of violators of laws or ordinance, and in the protection of lives and properties. The deputized security guards shall receive direct orders from the chief of police of the city or municipality for the duration of the emergency, disaster or calamity. SECTION 2. Supervision of the PNP. The PNP shall exercise general supervision over the disaster or calamities, the Chief, PNP may deputize any security guard to assist the PNP in the performance of police duties for the duration of such emergency, disaster or calamity. Licensed guards, who are actually assigned to clients with Duty Detail Orders (DDO), shall de deputized by the Chief PNP, and clothed with authority to enforce laws, rules and regulations within his area of responsibility Fast-paced technology, especially in the field of computer and information technology another issue affecting the security industry. Although such technology has become very helpful in the security officer’s work, it also has the negative effect of replacing people. Just as human labor has been displayed by machines in other industries, it also affects individuals security personnel who might become obsolete in the face of computer assisted technologies With the combination of rising technology and the industry’s rapid growth and recognition in organization comes the necessary improvement in the professionalism among security officers SOME TECHNOLOGIES USED FOR SECURITY PURPOSES Biometrics - can be in the form of facial recognition, fingerprint, and the iris of the eye. - For identification and verification. Antivirus - Specifically used for cyber security. Closed-Circuit Television (CCTV) - Footages came from the camera cannot publicly transmitted. - For surveillance - Human CCTV – best CCTV (marites) - LEGAL BASIS OF INDUSTRIAL SECURITY MANAGEMENT 1. Natural Authority The highest law is the law of self-preservation. Man, naturally reacts to protect himself, his family, his honor, freedom, liberty and property from danger, threat or hazard. It became a unwritten law of the early Filipinos to protect themselves and their property against the natural and man-made hazards. Security Hazards - An act or condition which results in a situation conducive to a breach of the protection system and the subsequent loss or compromise, or damage to personnel, property or facilities. Man-made Hazards (caused by man) – an acts or conditions affecting the safe of operation or facility caused by human action, accidental or intentional. Natural Hazards (caused by nature) – cause by natural phenomena which cause damage, disturbance and problems of normal functioning activities, including security. 2. Constitutional Authority The prime duty of the Government is to serve and protect the people. (Article II, Section 4) The government may call upon the people to defend the state and, in the fulfillment thereof, all citizens may be required, under conditions provided by law, or to render personal military service. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 6 No person shall be deprive of life, liberty or property without due process of law, nor shall any person be denied the equal protection of the laws (Art. III, Sec. 1) o Although the defense of the sates is the one contemplated here, people being onw of the elements of the state is directly affected in whatever protection the state will receive from the government and the people. o Take Note: all the citizens who are qualified, including the security guards, may be required by law to render personal military or civil services. The service of the citizens is personal. o This means the life, liberty, freedom and property can only be taken from a person after the observance of due process of law. Due process of law is of two aspects: substantive and procedural. o Daniel Webster, in brief, defines procedural due process as “one which hears before it condemns, which proceed upon inquiry and render judgement only after trial”. But if the taking of life, liberty, freedom or property does not fall within the framework of due process of law, available remedies under the law be resorted to. Private property shall not be taken for public use without just compensation. (Art. III, Sec 9) o The Constitution protects not only ownership but also possession, enjoyment, use and disposition of private property by their rightful owners subject to private property to be taken by the government in its exercise of the power of the eminent domain must satisfy two important conditions, namely: public use and just compensation. The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searched and seizures of whatever nature and for any purpose shall be inviolable, and no search warrant or warrant of arrest shall be issued except upon examination under oath or affirmation of the complainant and witnesses he may produce, and particularly describing the place to be searched, and the persons or things to be seized. (Art. III Sec 2) 3. Statutory Authority Revised Penal Code (Act No. 3815, as amended) o The applicable provisions for the Code on Crime Against Persons, Personal Liberty and Security and Property have bearing on security and protection of one’s liberty and property. Private Security Agency Law (Republic Act 5487, as amended) o This law governs the operation, administration of security agency, and activities, qualification, duties and licensing of security guards, watchmen and private detectives. o In short, it is intention of this law to professionalize the security service in order to upgrade the level of security protection. Hazard - These are the conditions that may cause damage to property, injury, or loss of life. - This is the reason why security was born. To stop these hazards in causing unintentional or intentional damage to property, injury or loss of life. MODULE 3: Principles of Physical Security PRINCIPLES OF PHYSICAL SECURITY 1. Enemy Agents Must Access - Acquisition of information is the ultimate results, and the means and form in which the information is obtained. 2. Surreptitious versus Non-Surreptitious - The possibility of surreptitious entry is the greatest hazard from the standpoint of counterintelligence security because it is usually difficult to determine that the information has been compromised. No action is taken to neutralize the act of espionage because surreptitious entry is not usually detected. 3. There is No Impenetrable Barrier - For the unfriendly government or organization, they are willing to devote enough time, money, personnel, materials, and imagination in passing barriers. So physical security attempts to build defense by using a certain barrier. 4. Each Installation is Different - Since each installation is different, each will have different problems to overcome. The security procedures will not be adequate for all installations. 5. Defense in Depth means Barrier after Barrier - In order that barrier could prevent unauthorized access and serve its purpose very well, there should be an integration of all barriers adopted in the installation. Barriers - It refers to any physical structure whether natural or man-made capable of restricting, deterring, delaying or preventing illegal and unauthorized access to an installation. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 7 TWO GENERAL TYPES OF PHYSICAL SECURITY Natural barriers Man-made barriers SPECIFIC TYPES OF PHYSICAL SECURITY BARRIERS 1. Natural Barriers - Include mountains, cliffs, canyons, ravines, seas, marshes, desserts, or terrain difficult to traverse. - Iwahig Penal Colony 2. Structural Barriers - Are those constructed by man regardless of their original intent that tend to delay the intruder. Examples: walls, ceilings, door, and fences ect. 3. Human Barriers - Include guards charges of quarters office and shop workers, who stand between the intruder and the matter to be protected. 4. Animal Barriers - Are usually shepherd dogs trained for and used as guards, aside from dogs there are other animals that can be used also, like a goose. - Dogs kin sense is 10 million times than a man. - Goose is popular as a animal barriers in England 5. Energy Barriers - Are usually electrical and electronic devices that could assist security personnel in detecting intrusions. - Examples: protected lighting, and anti-intrusion devices. - CCTV, protective lighting - Singapore monitors their surrounding with CCTV LEVELS OF PHYSICAL SECURITY 1. Minimum Security - It is a system designed to impede unauthorized external act such as simple intrusion to armed attack. o Putting simple locks, fences or perimeter barriers. 2. Low Level Security - It is a system designed to impede and detect some unauthorized external activity such as on small retail store, storage warehouses. o Need to upgrade the security. 3. Medium Level Security - It is designed to impede, detect, and assess most external activity and some unauthorized internal activity that range rom simple shoplifting to conspiracy to commit sabotage. This includes the following: o Use of advance intrusion alarm system o Establishments of perimeter and perimeter barriers o Use of unarmed guards 3. High Level Security - It is a system designed to impede detect, and assess, most unauthorized external and internal activities of certain prisons, defense contractors’ pharmaceutical companies and sophisticated electronic manufacturers. This includes of the following: o Close circuit television CCTV o Perimeter alarm system o High security lighting o Highly trained armed guards o Control designs 4. Maximum Security includes the application of following: - Sophisticated alarm system (Highly sensitive alarm) - On-site response force CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 8 PERIMETER BARRIER A medium or structure, which defines the physical limits of an installation or area to restrict or impede access thereto. If refers to any physical barrier used to supplement the protection of an inside perimeter. Inside Perimeter - A line protection adjacent to protected area and passing through points of possible entry into the area such as doors, windows, skylights or other points of access. Outside Perimeter - A line of protection surrounding but somewhat removed from a protected area, such as fence. - Bakod outside the protected area. LINE OF PHYSICAL DEFENSE 1ST line of defense includes all perimeter barriers such as fences, bodies of water, gates, etc. 2nd line of defense includes walls, doors, windows, roof, etc. 3rd line of defense includes those internal control measures especially protective cabinets. PROTECTIVE CABINETS 1. Safe - It is a metallic container used for the safekeeping of documents or small items in an office or installation. Safe can be classifies as either robbery or burglary resistance depending upon the use and need. 2. Vault - This is heavily constructed fire and burglary resistance container usually a part of the building structure used to keep and protect cash, documents and negotiable documents. Vaults are bigger than safe but smaller than a security file room. 3. File room - It is a cubicle in a building constructed a little higher than a vault but bigger size to accommodate limited people to work on the records inside. PERIMETER BARRIER OPENINGS The following are some types of perimeter barrier opening which needed to be given consideration in physical security control: 1. Gates and Doors o When not in active use and controlled by guards, gates and doors in the perimeter should be locked and frequently inspected by guards. Lock should be changed from time to time. o Point of entry and exit. 2. Sidewalks Elevators o These provide access to areas within the perimeter barrier and should be locked or guarded. 3. Utilities Opening o Sewers, air intakes, exhaust tunnels and other utility openings which have cross sectional area of ninety-six square inches or more should be protected by bars, grills, water-filled traps or their structural means providing equivalent protection to that portion of the perimeter barrier. 4. Clear Zones o An unobstructed are a “clear zone” should be maintained on both sides of the perimeter barrier. a. A clear zone of twenty(20) feet or more is desirable between the barrier and exterior structure and natural covers which may provide concealment or assistance to a person seeking unauthorized entry. b. Whenever possible a clear zone of at least fifty (50) feet should be maintained between the barrier and the structure within the perimeter. TYPES OF PERIMETER BARRIER Fences - Are independent structure designed to physical and visual access between outside areas. o Solid Fence o Full View Fence CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 9 TYPES OF FULL VIEW FENCES Chain Link Fence Barbed Wire fence Concertina Wire Fence 1. Building Walls - Walls, floors, roofs or their combination serve also as barriers and they should be of such construction to provide uniform protection just like the wire fencing. Masonry walls as perimeter barrier should have the same height as the chain-link and surmounted by the barbed wire top guard. If the height of masonry is less than the prescribed, additional chain-link as “topping” is placed to attain the minimum height requirement. 2. Bodies of Water - A river, lake, marsh, cataract, sea, pond, or any bodies of water forming a part of the wall, building or fencing should never be considered adequate natural perimeter barrier. Additional security measures like wire-fence, concrete walling, roving guards, and floodlighting at night may be necessary for the portions of the perimeter. ADDITIONAL PROTECTIVE BARRIERS 1. TOP GUARD - An additional overhang or barbed wire placed on vertical perimeter fences facing upward and outward with a 45- degree angle with three to four strands or barbed wires spaced 6-inches apart and must be stalled on the supporting arms. 2. GUARD CONTROL STATIONS - Normally provided at main perimeter and entrance to secure areas located out of doors and manned by guards on a full-time basis. 3. TOWERS OR GUARD TOWERS - House-like structures above the perimeter barriers. MODULE 4: Protective Lighting PROTECTIVE LIGHTING It provides a means o continuing illumination during hours of darkness. It is the single most cost-effective deterrent to crime because it creates a psychological deterrent to the intruders. o Darkness is an ale of intruders. TYPES OF PROTECTIVE LIGHTING 1. CONTINUOUS LIGHTING - It is otherwise called as stationary luminary. o the most familiar type of outdoor security lighting. - This is designed to provide two specific results: glare projection or controlled lighting. - It consists of a series of fixed luminaries at range to flood a given area continuously during hours of darkness. 2. GLARE PROJECTION TYPE - The intensity is focused to the intruder while the observer or guard remains in the comparative darkness. - It is being used in prisons and correctional institutions to illuminate walls and outside barriers. 3. CONTROLLED LIGHTING - It is generally employed where, due to surrounding property owners, nearby highways or their limitations, it is necessary for the light to be more precisely focused. 4. STANDBY LIGHTING - It is designed for reserve or standby use or to supplement continuous systems. - It can be most useful to selectively light a particular area in an occasional basis. 5. MOVABLE OR PORTABLE LIGHTING - This system is manually operated and is usually made up of floodlights than can be located or special locations which will require lighting only for short period of time. 6. EMERGENCY LIGHTING - This system is used in times of power failure or other emergencies when other systems are inoperative CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 10 GENERAL TYPES OF LIGHTING SOURCES 1. INCANDESCENT LAMP - It is the least expensive in terms of energy consumed and has the advantage of providing instant illumination when the switch is on. 2. MERCURY VAPOR LAMP - It is considered more efficient than the incandescent and used widespread in exterior lighting. - It limits purplish-white color caused by an electric current passing through a tube of conducting and luminous gas. 3. METAL HALIDE - It has similar physical appearance to mercury vapor but provides a light source of higher luminous efficiency and better color rendition. 4. FLOURESCENT - This provides good color rendition, high lamp efficiency as well as long life. - It cannot project light over long distance and thus are not desirable as flood type lights. 5. HIGH PRESSURE SODIUM VAPOR LAMP - This has gained acceptance for exterior lighting of parking areas, roadways, building and commercial interior installations. TYPES OF LIGHTING EQUIPMENT 1. FLOODLIGHTS - These can be used to accommodate most outdoor security lighting needs, including the illumination of boundaries, fences and buildings and for the emphasis of vital areas or particular buildings. 2. STREETLIGHTS - This lighting equipment received the most widespread notoriety for its value in reducing crime. 3. SEARCH LIGHTS - These are highly focused incandescent lamp and are designed to pinpoint potential trouble spots. 4. FRESNEL LIGHTS - These are wide beam units, primarily used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier. - Fresnel projects a narrow, horizontal beam that is approximately 180 degrees in the horizontal and from 15 to 30 degrees in the vertical plane. MODULE 5: Protective Alarms PROTECTIVE ALARMS It assists the security in detecting, impeding, or deterring potential security threat in the installation. Its function is to alert the security personnel for any attempt of intrusion into a protected area, building or compound. BASIC PARTS OF AN ALARM SYSTEM 1. Sensor or Trigger device - It emits aural or visual signals or both. 2. Transmission line - Circuit which transmits the message to the signaling apparatus. 3. Annunciator/Enunciator - It is the signaling system that activates the alarm TYPES OF ALARM SYSTEM 1. CENTRAL STATION SYSTEM - Type of protective alarm system where the central station is located outside the installation. - It can be located in an agency and the installation is one of the subscribers. - When alarm is sounded, central station notifies police and other agency. 2. PROPRIETARY SYSTEM\ - This function in the same way as central system except that is owned by, operated and located in the facility. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 11 - Response to all alarms is by facility’s own security or fire personnel. 3. AUXILLARY ALARM - In this system installation circuits are led into local police or fire department by lease telephone lines. 4. LOCAL ALARM BY CHANCE SYSTEM - This is a local alarm system in which a bell or siren is sounded with no predictable response. - These systems are used in residence or small retail establishment, which cannot afford a respond system. The hope is that a neighbor or passing will reach to the alarm an call for police assistance, but such a call is purely a matter f chance 5. DIAL ALARM SYSTEM - This system is a set to dial a predestined number when the alarm is activated. - The number selected might be the police or the subscriber’s home number, or both. - When the phone is answered, a recording states that an intrusion is in progress at the location so alarmed. KINDS OF ALARM 1. VIBRATION DETECTION DEVICE - The vibration sensitive sensor is attached to walls, ceiling or floors of the protected areas. - The sensor detects any vibration caused by attempted forced entry. 2. METALLIC FOIL OR WIRE - In building or compound, all point of entry can be wired by using electrically charge strips of tin foil wire. - Any actions that will move the foil or wire break the circuit and activate an alarm. - Metallic foil or wire is used in window or glass surfaces. 3. BILLS TRAPS - It is usually placed in the teller’s cash drawer and connected to a alarm system using a wire connector. - When currency is removed from the device, the alarm is activated. - The advantage of these devices is that the robbers frequently remove the currency and activate the alarm. 4. DOUBLE SQUEEZE BUTTONS - Pressure is required on both side of the device and therefore the probability of accidental alarm is reduced. 5. LASER BEAM ALARM - A laser emitter floods a wall or fencing with a beam so that when this beam is disturbed by a physical object, an alarm is activated. 6. FOOT RAIL ACTIVATOR - It is activated by placing the front of their foot to engage the activation bar placed on the floor in such a position that tellers may activate the alarm. - Para siyang foot pedal na tinatapakan para ma activate yung alarm system. 7. PHOTOELECTRIC EYE DEVICE - A light beam is transmitted at a frequency of several thousand per second. - It is connected by a wire to a control station and when an intruder crosses the beam he makes contact with the photo electronic coil which this activates the alarm. 8. AUDIO DETECTION DEVICE - Supersensitive microphone speaker sensor is installed in walls; ceiling and floors of the protected area of any sound caused by attempted forced entry inspected by the sensor. 9. KNEE OR THIGH BUTTON - Installed inside the desk or teller station so they can be activated by knee or thigh pressure. - Commonly found in location where personnel usually perform their duties from a seated position. MODULE 6: Protective Locks and Keys PROTECTIVE LOCKS AND KEYS 1. LOCKS - One of the most widely used physical security devices in the asset protection program of an installation. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 12 2. PADLOCK - A portable and detachable lock having a sliding hasp which passes through a staple ring or the like and is then made fast or secured. PETERMAN - An English term used to describe a lock picker. 3. WARDED LOCK - Offer very little security. - This type of lock must therefore be used only to have privacy but not to provide a high degree of security. 4. DISC TUMBLER LOCK - Designed for the use of automobile industry and are in general used in car doors today. - Because this lock is easy and cheap to be expanded to other areas such as desks, files and padlocks. - The delay afforded is approximately ten minutes. 5. LEVEL TUMBLER LOCK - These are difficult to define in terms of security since they vary greatly in their effectiveness. - They are used in safe deposit boxes and are for all practical purposes, pick-poof. 6. COMBINATION LOCK - These are difficult to defeat, since they cannot be picked because few experts can manipulate the device to discover the combination. - Most of these locks have three dials, which must be aligned in the ;proper order before the lock will open. 7. CARD OPERATED LOCK - These are electronically or more usually magnetic. Coded card notched, embossed or containing an embedded pattern of copper locks are used to operate such locks. These are frequently fitted with recording device, which registers time of use and the identity of the user. 8. CODE-OPERATED LOCK - These are combination-type locks and that no key is used. - Pressing the series of numbered button in the proper sequence opens them. Some of them are equipped to alarm if wrong sequence is pressed - These are high security locking device KEY CONTROL It is the management of keys in a plant or business organization to prevent unauthorized individuals access to the keys. KEY - Instrument for locking and unlocking. - A metal bar with notches or grooves that, when inserted into a lock and turned operates the lock’s mechanism. TYPES OF KEYS 1. CHANGE KEY - It is a specific key, which operates the lock and has a particular combination of cuts, or battings, which match the tumblers of the tumblers in the lock. - Isang lock lang ang kayang buksan. 2. SUB-MASTER KEY - It is a key that could open all the particular lock within a particular area or grouping in a particular facility. 3. MASTER KEY - Is a special key that is capable of opening series of locks. 4. GRAND MASTER KEY - It is a type of key that will open everything in a system involving two or more master key groups. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 13 CHAPTER 3 MODULE 8: Personnel Security Define Purpose of Personnel Security - To ensure that a firm hires those employees best suited for the firm in achieving its goals; and o Hiring of employees to make sure na yung mga employees na kukunin is mapagkakatiwalaan. - Once hired, to assist in proving the necessary security to them. o Every employees have the right to be protected, so ang isang purpose ng ng personnel security is to provide protection to their employees. Key Functions of Personnel Security It serves as a screening device in hiring suitable employees. o Siya yung nag screening kung sino ba ang qualified and disqualified na magtrabaho sa isang company. It provides background investigation service of both potential and present employees, for possible assignment to sensitive areas and susceptibility of wrongdoing. o By the use of background investigation, they will able to determine the job performance of the employees. It develops security awareness among employees. o The personnel will develop security consciousness. o It is conducted every 6 month or twice a year. It handles investigation of employees. o Inquiry – other term of investigation in Industrial Security Management It attempts to ensure the protection of employees for discriminatory hiring or terminating procedures as well as unfounded allegations of illegal or unethical activities and conduct. o Tinitignan nila kung meron bang mali sa pag terminate ng isang employee. Comprehensive Personnel Security Program Elements: To determine if there is adequate job specification. o like for example you are employed as a driver sa isang company, meaning yung trabaho mo is to transport goods, person etc, but kapag nakita ka ng isang security advisor sensitive yun kasi baka mamaya nag ka conduct kana ng industrial snionage. Appropriate recruitment and selection criteria. o Sa isang company ang mga personnel security is dapat inter dependent sila sa HR and dpat yung HR must know the appropriate recruitment and selection criteria. Conduct of applicant screening o Dapat ang isang company ay merong background applicant screening procedure and standard. Conduct of Background Investigative Standard o Background checking or fact check Truth Verification Standard o Lie Detection Test, Honest Test and such Criteria for Employee Conduct o Intelligence IQ Test Investigation Questionable Employees Conduct Disciplinary Procedure o Kung pano didisimplinahin yung mga employees kayang may ginagawang mali. Termination Procedure Scope of Personnel Security Personnel Security Investigation (PSI) Basic Consideration o The Responsibility of the Appointing Authority – dapat pipiliin yung pinaka suitable sa isang position and dapat loyal. o Possession of Classified Matters – “Need-to-know Principle” (dapat pinipili mo kung sino tao lang ang nakakaalam sa isang sensitive info). o Give Eligibility for Required Clearance – Job Specification Security Manager (sila yung nag bibigay ng security clearance) Security Education CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 14 Personnel Security Investigation (PSI) - it is a process of inquiry into the character, reputation, discretion, integrity, morals and loyalty of an individual to determine the suitability for appointment or access to classified matter. o Recruiting the right person by means of inquiry o PSI is important bcs it was approximately 5% of employees lied in their declare info. and approximately 85% to 87% employees if considered as real threat of the company. Applicant Screening - This refers to the process of selecting the most appropriate persons for a particular job. o Most of the effective tools in employee selection is the application form and interview conducted. o Application form – also known as Information collection tool o Interview – also known as the heart of personnel selection Take Note: Whole-Man Rule is a system of evaluating the suitability of an applicant. Governing Rule/Standard: o The need of the company o Fairness to the applicants Red Flags in Screening Process Application form not signed Application date not filled up Application name and possible aliases Guts in employment history Use of self-employed Inability to remember the names of former colleagues Inadequate references Guts in residence Lack of job stability Signs of instability relation Not filling the salary history Signature is stamp Criminal record left blank Military service left blank Inconsistences of the educational background GENERAL TECHNIQUES OF PERSONNEL SECURITY INVESTGATION 1. Background Investigation - The most expensive but necessary in security personnel. - Serve as a verification information. 2. Positive Vetting - Process of inspecting or examination. - Personnel interview conducted under stress. - The question being asked are based on the information given by the applicant 3. Profiling - It focuses whereby the subject reaction in future criminal situation is predicted. Additional Techniques according to other authors of PSI 4. Read Report - A form or employing examination to test the attitude of applicant. - By the use of Honest test. 4 Major Factors o Self-punitiveness factor – it contains items of individual which indicate the extent to which they hold themselves t high standard of conduct. o Other punitiveness factor – involves question of individuals whether they are harsh to other people. o Self-projection factor – incorporate individual item kung i-aadmit niya ba or i-deny niya yung isang personal fantasies about dishonest behavior. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 15 o Other projection factor – response indicates the extent to which they see dishonest intention or behavior in others. 5. Deception detection techniques - It is process of using device in detection deception during the stage. - By the use of polygraph machine, lie detector test, psychological stress evaluator, voice analyzer etc,. Take note: the large degree of success of polygraph examination will depend on the professional capability of the investigator. 6. Financial and Lifestyle Inquiry - Focuses on the investigation of gathered info as to regards to the income and mode of living. 7. Undercover Investigation - Employing of agent in which agent through identity is unknown. 8. Exit Interview - It is very valuable, bcs it gives a departing employee an opportunity to least grievances. - During the exit interview, bago umalis yung interviewee is pinag sisign muna ng anti-competitive clause or non- disclosure clause (means hindi niya pwedeng sabihin sa iba kung ano ang mga nalaman niya about the company and hindi niya pwedeng gamitin yung mga yun para mag tayo ng sarili niyang company). Module 9: Security Investigation - it is a planned and organized determination of facts concerning specific loss or damage of assets due to threats, hazards or unsecured conditions. Law enforcement Investigation – design to prosecute offender Security Investigation - it is the area of security discipline that requires of high level of understanding of the different concept in its view as to protected in nature Incident investigation Company infringement Conducting administrative inquiries COVERAGE OF SECURITY INVESTIGATION 1. Background Check/Investigation - includes the pre-employment, during employment, lifestyle, reliability check. - should be completed prior to starting work. - verify the accuracy and completeness of the applicant statement. - obtain any additional relevant info. - determine asses suitability for initial or continued employment. Take Note: as a general rule, background checks/investigation should be conducted to an applicant before he is considered for employment in the company. What must be the contents of application form for it to reveal important information pertinent to the investigation? Applicants full name and variation (includes alias, married name) Reference to verify gaps of employment (security clearance, security education, date of attendance, degree or cert. awards, other form major study, employement history) Friend and relative currently employed in the company Contact person Organization affiliation Address history Take note: It is imperative that the applicant should sign a statement attesting to the veracity of the furnished information and authorizing its investigation. What are the factors in the conduct of Background Investigation? Loyalty – quality of faithfulness to the org. Integrity - uprightness of your character Discretion – ability to decide Morals – distinctive identifying qualities Character – traits that impress by nature Reputation – emphasize the which one is generally held CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 16 Components of Complete Background Investigation Applicant’s Name Date of Birth Present Residence Address Personal History Marital History Residence History Citizenship Physical Data Educational History Date of Application Organizational membership Neighborhood Investigation Character reference Employment History Military History Foreign Travel History Criminal Record o Local check o National agency check Credit Records Applicants signature Take note: In the investigative coverage of background we will consider the prior employment prior at least 7 years should be verified. 2. Lifestyle (financial) Investigation - it is inquiry about the life existence of the subject, conducted to established a guide for estimating or determining the sources and amount of income available to the subject of the investigation. - Checking ng istado ng kanyang pamumuhay When does lifestyle check should be conducted? - when the employees are going to be promoted - when the employee is suspected for a crime - it is conducted in every 18 months for a sensitive position (accountant, purchasing staff, tenders, board members) Take note: Routine lifestyle checks should be conducted with permission and should be a pre-requisites for the post. It is usual for the applicants for the post to sign an agreement for the checks to be carried out at regular intervals, and to authorize checks with banks, credit institution etc. 3. Claims Investigation - accident and incident claim investigation is an organization are important for main reasons: o to gather in all the information and present facts to the company’s insurer; i.e. to be seen and acting in a proper and speedy manner. o to provide such information which may limit the employing company’s liability and identity false claims or claims which might be exaggerated, for compensation. - Para malaman kung yung mga info ba na prenipresent sa company is totoo or hindi. What are the important elements of claims investigations? Report of the accident (Photograph) All coverage Information Report from the authorities (Police report, investigation report, medical and death cert.) Take Note: Interview very important in claims investigation, the result obtained as to regard the statement whether it is narrative or questioned and answer. 4. Employee Misconduct Investigation - Another are for internal investigation is employee misconduct, and some of the difficulties facing the investigator are that other employees may be reluctant to talk, and many supervisors tend not to want to get involved. - Conducted to determine if there is rules and regulation of the company is violated as well as the law of the country has been violated. - They use 5W’s and 2H (what, when, where, who, why, how and how much) CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 17 Techniques in conducting Employee Misconduct Investigation Interview Search to locate the preserve physical evidence Physical surveillance Use for confidential sources Checking pertinent record (para malaman kung totoo ba or sabi sabi lang) Common Misconduct commonly by the employee Falsification Fraudulent accident claim 5. Espionage Investigation - Art.117. Espionage – is the offense of gathering, transmitting, or losing information respecting the national defense with intent or reason to believe that the information is to used to the injury of the Republic of the Philippines or the advantage of a foreign nation. What are the categories of information or data in most businesses that is always keep confidential? Research and development Pricing Product promotion Expansion or Relocation Style Changes Management Changes Competitive Bidding Finance National Defense Matters What are the methods employed to conduct industrial espionage? Burglary Infiltration Electronic methods (using electronic device) Bean searches (trash documents) Bribery What are the practices that may minimized the leaks of internal information? Carefully screening Screening of the sub-contractor staff and outside personnel. Train the company employees for security awareness and security education. 6. Sabotage Investigation - Sabotage – is refers to the destruction of property or obstruction of public service to undermine a government, police, or military effort. - Covers any willful act designed to hinder or obstruct the purpose of the company as regard to its operation - Motivation for Sabotage o Disgruntled employee - impleyado na may galit sa isang company. o Dissatisfied outside contractor o Penetration by the organized crime o Foreign manipulation Take note: The most common method of sabotage is Arson 7. Theft Investigation - Art.308. Theft – refers to the taking of personal property of another without the latter’s consent, with intent to gain but without violence against or intimidation of persons nor force upon things. - An effective loss control programing will much prevent internal theft. Effective ways in order to prevent internal theft There should be careful safeguard design and preventive aid. There must be a prompt report of the missing items. Conduct immediate action for investigation To have remedial action to stop the loopholes What is the theft triangle? Means Opportunity CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 18 Desire Take note: the reason a person to steal is bcs the opportunity is present. When conducting Theft Investigations, the following points should be considered: A complete description of missing items (serial, model and other ID numbers, distinctive marks. Obtain all shipping document). Ownership data Date loss noted Who loss reported to Area in which loss occurred If theft, note circumstances (e.g. forced entry) Extent of search Internal security measures which contributed to theft 8. Undercover Investigation - Undercover work has in the past been known as “Roping”. During these types of investigations, the investigators must be cautions not to engage in activities that may violate the employees rights created by National Labor Relations Law particularly those pertaining to collective bargaining activities. Take note: In the undercover investigation the greatest failure of the undercover operation is through four extraction techniques. What is Undercover Assignment? - It is an investigative technique in which agent conceal his official identity and obtain information from the target organization. How to plan an Undercover assignment Determine the level on which the investigation is intended Develop appropriate cover and cover story Selection of qualified personnel Briefing, coaching and rehearsal Two uses of undercover Use interdependent to get firsthand information about the subject of investigation o The undercover agent and the personnel of the company is dapat ay nagtutulongan sila. Supplement other investigative techniques Types of Undercover Assignment Dwelling Work Assignment Social Assignment Multiple Assignments Personal Contact Assignment or “Rope Job” Module 11: Security Education - It is conducted to develop security awareness among employees of the company. It should cover all employees, regardless of rank or position. - A mandatory indoctrination before sila mabigyan ng assignment or bago mapunta sa isang position. - It is conducted to develop security awareness among employees of the company. It should cover all employees regardless of rank or position. - A mandatory indoctrination on security for all new personnel before their assignments to their respective jobs. - A down the line security program aimed at instilling consciousness and the dedication through demonstration, lectures, motivations and suggestions. Take Note: ✓ When conducting a security awareness in a company, we prevent the hazardous events in the future within the company. ✓ Employees will understand the reason why the company doing and requiring such things in them. ✓ Understanding between the security objective, measures and the likes. ✓ Familiarity with its individual to achieve the mission, vision and objection of the company. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 19 5 Phase of Security Education SECURITY ORIENTATION - It consists of initial briefing made upon the new personnel and employees in security. And in various aspects and its importance. - Familiarized and acquit themselves in security rules, security regulations and rules and regulation of the company. - Having an overview in the security company policies - Corresponding penalties in security violation. SECURITY INDOCTRINATION - It is a form of program design to meet the security needs of a security or units. - Its aim is to train all personnel so that each shall possess skills and vigilance in the performance of their security responsibilities. SECURITY REMINDERS - This program used security poster, slogan, signs and sticker. - This is an indirect approach in security. SECURITY PROMOTION - It is positively effort to sell security. - By means of promotion we can get support among the employees. - We can promote the importance of security within the company especially with the help of high ranking official or top brass. SECURITY SEMINARS - It is a form of attending lectures and discussion. - Through this we can able to know the guidelines and the likes. Chapter 4 Module 12: Document and Information Security Document Any recorded information regardless of its physical form or characteristics, including but not limited to the following: a. written matters whether handwritten, printed or typed; b. all painted, drawn or engraved matters; c. all sound and voice recordings; d. all printed photographs and exposed or printed films, still or moving; and e. All productions of the foregoing for whatever purpose. Document and Information Security This involves the protection of documents and classified papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure Classified Information It includes all information concerning document, cryptographic devices developed projects and materials following on the categories of Top Secret, Confidential, Restricted, Secret, Unclassified. Classify This refers to the assigning of information or material, one of the four security categories after determination has been made that the information requires the security protection as provided. Document Security Classification 1. Top Secret o Information and materials that the unauthorized disclosure of which would cause exceptionally grave damage to the nation, politically, economically, or from a security aspect. o Covered with legal size bond paper line with 1-inch green border. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 20 2. Secret o Information and material that the unauthorized disclosure of which would endanger national security, case serious injury to the interest or prestige of the nation or of any governmental activity or would be of great advantage of foreign land. o Covered with legal bond size paper line with one half inch red border. 3. Confidential o The unauthorized disclosure of which would be prejudicial to the interest or prestige of the nation or any government activity or would cause administrative embarrassment or unwarranted injury to an individual or would be of advantage to foreign nation. o Covered with legal size bond paper line with one half inch blue border. o It can be a personal information of an individual. 4. Restricted o Information and material which requires special protection other that determine to be Top Secret, Secret, or Confidential. o Cover sheet is not necessary, what is important is a bold “RESTRICTED” word at the top and at the bottom of the bond paper. Types of Business Record and Categories 1. Class A – Vital Records ▪ Includes records that contain liable records, which reproduction does not have the same value. ▪ A record needed to recover cash, replace building, equipments, raw materials etc., 2. Class B – Useful Records ▪ Include records which loss might cost inconvenience. ▪ Records na pwedend palitan kapag Nawala. 3. Class C – Important Records ▪ Includes contract, costumer credits files, sale records etc., 4. Class D – Non – Essential Records Other important terms: Declassify o The act of removing the security classification from classified information or matter. Reclassify o It refers to the act of changing the assigned classification from classified information or matter. Upgrading o It refers to the act of assigning the information or matter to the higher classification than that previously assigned to it. Need to Know o It is the dissemination of classified information or matter to be limited strictly to those people whose duties requires knowledge or possession thereof. Compartmentation o It refers to the grant of access to the classified matter only to properly cleared person when such classified information is required in the performance of their official duties. Compromise o This takes place through the loss of security which results from unauthorized persons obtaining knowledge of classified matters Purging o The process of destroying a document which is no longer significant in the organization Protection of Sensitive Materials In the business community it is seldom heard about the protection of such information which we believe should be given enough protection. In the security protection, a security professional should deal with this squarely and fairly as in other security aspects like physical security and personnel. In our discussion, we will try to understand why this should be and what kind of information should be given ample protection and distinguish them from one another. Also, why and in what way we are losing them. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 21 What is Proprietary Information? Information which in some special way relates to the status of activities of the possessor and over which the possessor asserts ownership. o Domain names, trade secrets, copyright, techniques, formulas Module 13: Protection of Sensitive Materials WHAT IS SECRET? - This question is taken up first because it is relevant even in cases where the data involved are not trade secrets but merely simple facts. If information is not novel or secret, it is not entitled to any protection; it is the property of everyone and it is domain Trade Secret A Trade secret may consist of any formula, pattern, device or compilation of information which is used in one's business and which gives one an opportunity to gain an advantage over competitors who do not know or use it. It may be a formula for a chemical compound, a process of manufacturing, treating or preserving materials, a pattern for a machine or other device, or a list of customers. o Protects secret Information Trade Secret means information including a formula, pattern, compilation, program, device, method, technique or process that: 1. Derives independent economic value, actual or potential To being generally known to, and not being readily ascertainable by proper means, by other persons who can obtain economic value from its disclosure or use, and 2. is the subject of efforts that are reasonable under the circumstances to maintain its secrecy. The definition of "trade secret" contains a reasonable departure from the Restatement of Torts definition which required that a trade secret be "continuously used in one's business". The broader definition in the proposed Act extends protection to a plaintiff who has not yet had an opportunity or acquired the means to put a trade secret to use Trademarks o It is a word, phrase, symbols, design that identifies and distinguishes the source of that particular goods of one party those others. o Protects brands Copyright o It is a legal concept, enacted by most government, giving the creator of an original work exclusive right to it, usually for a limited time. o Protects work of authorship What is Patent? Patent is grant made by government to an inventor, conveying and securing to him the exclusive rights to make, use and sell his invention for a term of 20 years. o Protect functional or ornamental features DISCLOSURE MUST KNOW THE INFORMATION IS CONFIDENTIAL Any company may require employees not to disclose any information about the company not already known outside, whether such information is a trade secret or not. INADVERTENT DISCLOSURE Inadvertent Disclosure usually occurs in one of its following context: Sales Presentations; Trade Association Meetings/Shows; Discussion with Suppliers Off Premises Statements by Employees; and Press & Public Relations. INTENTIONAL THEFT BY INSIDERS In addition to theft by a current employee, there is also the problem that a former employee may obtain a better CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 22 position with a competitor and, once there, expose the former employer's sensitive data. This typically arises in the trade secrets situation and, as was pointed out earlier, is then important for the original owner to establish a proprietary position and also to establish the former employee's breach of trust. o Litigating trade secret cases involving former employees now working for a competitor poses three serious threats. COUNTERMEASURE TO PROTECT SENSITIVE INFORMATION Effective Programs of information security involve considerations on physical, personnel, end communications countermeasures. COMPETITIVE INTELLIGENCE COLLECTION A. Collection and analysis of information about a competitor occurs daily. Legal and ethical techniques are usually employed A.1. Society of Competitive Intelligence Professionals (SCIP) B. The most important function of competitive intelligence is to alert senior management to marketplace changes in order to prevent surprise. A single element of information may mean little, but the compilation and analysis of many elements of many sources can provide an astonishingly accurate portrait of a highly sensitive proprietary process. ELECTRONIC EAVESDROPPING Knowingly and without lawful authority: A. Entering into a private place with intent to listen surreptitiously to private conversations or to observe the conduct of any other person or persons therein, or B. Installing or using outside a private place any device for hearing, recording or amplifying, or broadcasting sounds originating in such place, which sounds would not ordinarily be audible or comprehensible outside, without the consent of the or persons entitled to privacy therein; C. Installing or using any device or equipment for the interception of any telephone, telegraph, or other wire communication without the consent of the person in possession or control of the facilities for such wire communication. EAVESDROPPING TACTICS & EQUIPMENT The term eavesdropping includes wiretapping and bugging. WIRE TAPPING It is the interception of communications over a wire without the consent of the participants and requires physical entry into the communication circuit. Some devices however use induction as a means of intercepting the signal and therefore do not need physical entry into the circuit. In most states you only need the consent of one of the parties. BUGGING Is the interception of communications without the consent of the parties by means of electronic devices without penetration of the circuit WIRED MICROPHONES A. Carbon Microphone o simple device to turn sound waves into an electronic signal (use in telephone, radio broadcast, et.,) B. Crystal Microphone o Use in telephone and sound system C. Dynamic Microphones o Convert sound into an electrical signal by means of electromagnetism. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 23 D. Pneumatic Cavity Device o Pickup sound with high gain from the from and side, but poorly from the rear. E. Condenser Microphone F. Electret Microphone G. Cardioid Microphone H. Parabolic Microphone o Uses parabolic reflector or plate that collect and focus sound within microphone. I. Shotgun Microphone o Use for talks, meetings, conference, lecture, etc., WIRELESS MICROPHONES o A radio frequency (RF) device consisting of a microphone, transmitter, power supply, antenna and in some applications a receiver as well (BUG). CURRENT CARRIER DEVICES o Can audio signals over virtually every type of wire path (e.g. wireless home intercom system). Signal is usually blocked by power transformers. LIGHT TRANSMISSION o Laser beam focused on a window pane, the vibrating glass modulates the reflected beam and the sound signal is extracted from the reflected light signal. ELECTROMAGNETIC RADIATIONS o Detectable electromagnetic energy is generated by electronic Information processing devices. Detection of the energy and extracting the information is possible over several hundred feet. SPEAKERS o Ordinary speakers in TV's, radios, PA systems, intercoms, etc., can be used in reverse to pick up sounds from the room they are located. TELEPHONE EAVESDROPPING o Interceptions from the line. Information is acquired from the line and includes voice, fax, teletype and other data. PHYSICAL SCIENCE o Detailed, time consuming, and an expensive task conducted in special areas only. It is required for a complete counter measures survey. TELEPHONE SEARCH o This task is carried out by a technician who is familiar with the telephone equipment used. ELECTRONIC SEARCH o No electronic sweeping equipment (scanners etc.) or techniques can guarantee to find a well installed device installed by an experienced technician. 1) Time Domain Reflectometry ▪ it is a test device that generate the energy pulse on the cable to determine the location, and magnitude of cable faults, breaks, or other events along the length of conductive cable. ▪ Use in installing fiber lines. 2) Telephone Analyzer ▪ Detects and locate elicit tampering security vulnerabilities on digital, analog and telephone system. ▪ Pwede niyang madetect yung mga illegal tampering. 3) Field Strength Meter ▪ To measure the electric field strength sa isang transmitter. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 24 4) Countermeasures Radio Receiver ▪ A wireless device receives radio waves, and coverts the information carried by them to a usable form. 5) Spectrum Analyzer ▪ Measure the magnitude of an input signal versus frequency within the instrument. ▪ To measure the power of spectrum of the known and unknown signals. 6) Non-linear Junction Detector ▪ detects the presence of electronics regardless of whether they are radiating, hardwire or even turned off. 7) Metal Detectors ▪ To detect the presence of a metal. 8) A Pen-Register ▪ Electronic device that records all the dialed number from a particular telephone line. AUDIO MASKING o The generation of noise at the perimeter of the secure area to cover or mask conversations. Music is not used, as it is easy to filter out from a recording, best to use white' or 'pink' noise. POST SEARCH SECURITY o After a search is completed, the room must be kept very secure, or else survey cannot guarantee the room to clean when next used. If a device, or wiring alteration is found, then a decision is needed on what action is to be taken: removal or use to provide dis information SAFES, VAULT & STORAGE CONSIDERATIONS o Safes are designated either fire resistive or burglary resistive. There is no federal or state law or code mandating the rating of safes, and two organizations currently rate safes in the US: ✓ Safe Manufacturers National Association (SMNA); and ✓ Underwriters Laboratories (UL) Fire Resistant Safes Fire Resistant Safes offer very little protection against the safe cracker and once exposed to a fire the original degree of protection offered is lost, and it must be replaced. Burglar Resistant Safes They are available in the market for the purpose of storing VAULTS Defined as enlarged safes, usually made of high quality reinforced concrete, except the door. The five sides should be twice as thick as the door but never less than 12". The vault door is usually made of high grade steel and normally 6" thick. Vaults are normally installed at or below ground level because of their heavy weight. It is also usual to have a clear sterile walkway around the five above base sides when installed below a buildings foundations. Ratings for vaults are established by the Insurance Services Office (ISO). Security Clearance It is an administrative determination by a competent authority that an individual is eligible, from a security standpoint, for access to security classified information’s. Security Clearance Certificate The certification by a responsible authority that the person described is cleared for access to classified matter at the appropriate level. Two types of Security Clearance A. Final – It is valid for five years unless sooner revoked by the issuing authority. B. Interim – It is valid for two years unless sooner revoked by the issuing authority. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 25 Module 14: Risk Management Risk o It is the potential damage or loss of an asset. The level of risk is a combination two factors: the value placed on that asset by its owner and the consequence, impact adverse effect of the loss or damage to that asset and the likelihood that a specific vulnerability will be exploited by a particular threat. Risk Management o A process of selecting and implementing security countermeasures to achieve an acceptable level of risk at an acceptable cost. Risk Analysis o The analysis of risk includes examinations of the vulnerability, probability and criticality of potential threats and includes natural and manmade risk. Adversary o It refers to any individual, group, organization, or government that conducts activities or has the intention and capability to conduct activities detrimental to the individual, private or government entity. Asset o Any information, facility, material, , or activity which has a positive value to its owner whether it is an individual, private or government entity. Countermeasures o An action taken or a physical entity used to reduce or eliminate one or more vulnerabilities. The cost of possible countermeasures maybe monetary, but may also include non – monetary cost such as reduced operational efficiency, adverse publicity unfavorable working conditions, political consequences. Probability o It is the chance or likelihood that a loss will take place. Criticality o The impact of a loss as measured in financial terms. Vulnerability o Any weaknesses that could be exploited by an adversary to gain access to an asset. Risk Management, Alternatives and Strategies Risk Avoidance o Eliminating or removing the risk totally from the business, government or industrial environment for which the risk manager has responsibility. Risk Reduction o Decreasing the risk by minimizing the probability of the potential loss. Risk Spreading o Spreading the risk through compartmentation or decentralization to limit the impact of potential loss. Risk Transfer o Moving the financial impact of the potential loss over to an insurance company. Risk- Assumption o Planned assumption acceptance of the potential risk by making a deliberate managerial decision of doing nothing about the threat, or setting aside resources for use in case of a specific loss incident. Relative Criticality o This pertains to the importance of the firm with reference to the natural economy and security. ❖ Example is gasoline depots, communication transmission lines, and power plants. Relative Vulnerability o This is the susceptibility of the plant or establishment to damage, loss, or disruption of operation due to various hazards. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 26 ❖ Example is the location of the building, the machines, or presence of possible poisons. Security Hazards o Any acts or conditions which may result in the compromise of information, loss of life, loss or destruction of property or disruption of the objective of the installation. Pilferage o Act of stealing small things or items of little value, especially habitually. Two types of Pilferer o Casual Pilferer o Systematic Pilferer Sabotage o Deliberate destruction or the deliberate damaging or destroying of property or equipment. Espionage o The activity of spying or the use of spying or spies to gather secret information. It is a hazard because people may come to know the confidential processes or procedures of a certain organization or business establishment. Subversive Activities o These are activities designed to overthrow the government or intended or likely to undermine or overthrow a government or other institutions. It results to the disruption of the normal operations of an institution or organization Security Investigation o This is conducted to check on the degree of compliance with the recommended countermeasures and to determine the effectiveness and adequacy of the countermeasures which are in effect. Security Survey o The basic instrument for determining security vulnerability. Critical on-site examination and analysis of an industrial plant, business, a home or public or private institution done to ascertain the facility's current security status. This complements security survey in its attempt to prevent losses of company properties. Two types of Security Survey Conference o Entrance Conference o Exit Conference CHAPTER 5 SALIENT FEATURES OF R.A 5487 Republic Act No. 5487 “The Private Security Agency Law” ❖ Brief History of Security in the Philippines ❖ Salient Features of R.A 5487 History of Security in the Philippines The private security business began on March 11, 1933, when the first formally license private security agency “Special Watchman Agency” started operations. Take note: During this time there’s no law as R.A 5487. Ang kailangan lang nila humingi ng permit from the City/Municipal Mayor to hire a security guard or even to operate security agency. CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 27 Renamed by Jimenez Security Agency It is founded by Juan and Pedro Jimenez Philippine Association of Detectives and Protective Agency Operations (PADPAO) was organized in 1958. o Ito ay samahan or association of all licensed security agencies and company security forces. PAD-PAO PADPAO is a self-governing, self-regulatory, and self-policing organization. It promotes and adopts a high standard of moral and ethical conducts in the operation and management of security services, observes strictly the tenets of truth, accuracy and prudence and conduct itself at all times in a manner conducive to public trust and confidence. o There intention is to professionalized security profession in our country. PADPAO has been protecting and securing security agencies for over 60 years when the association saw the need of guidance and protection during the end of World War II and the private security agencies played a significant role that time. PADPAO took the initiative in promulgating ordinances to regulate the organization and operation of Private Security Agencies in their respective jurisdiction. o Provide access to solutions. o Transform their businesses to improve their service security operations. o PADPAO was the reason why R.A 5487 was enacted. The R.A 5487 was passed on June 13, 1969. It was passed because of cooperation and determination of PADPAO. o Ito ang nagbigay ng mga standards and requirements para sa operation ng mga security agencies o Batas para mabigyan ng license to operate ang mga natural and juridical person. o During this time only Philippine Constabulary has right to give administrative services and supervision to the management and operation of private security agency, company security guard forces and government security units or forces. o During this time din natanggal na ang jurisdiction at supervision ng PSA, CGF, GSF sa NICA or National Intelligence Coordinating Agency nalipat ito sa Philippine Constabulary. PD 11 was passed in October 3, 1972. o Amended some of the provision of R.A 5487 o Pinalawak ang coverage ng R.A 5487 na ang mga SG ay pwedi na iemploy sa mga Agricultural, Mining and Pasture Land and Logging concession. PD 100 was issued on January 17, 1973 broadening the coverage of the security industry to include the employees of National and Local Government or any agency who are employed to watch or secure government building and properties. o Nagbigay ng specific number as to the minimum membership sa mga agencies. On August 1969, the Philippine Constabulary activate one Supervisory Office for Security and Investigation Agencies or SOSIA. It was later renamed to PC Supervisory Office for Security and Investigation Agencies (PCSOSIA) And later in 1970 under the Pursuant order number 404, it was renamed again to Philippine Constabulary Supervisory for Security and Investigation Agencies ( PCSUSIA) With the passage of R.A 6975, the PCSUSIA was absorbed by the Philippine National Police. o R.A 6975 created the Philippines National Police. o PNP has a power to supervise and control the training and operations of security agencies because they are the one who issue the license to operate of security agencies, private security, security guard and private detectives. Pursuant to memorandum no. 07 series of 1996 the PCSUSIA was made into the division of PNP Civil Security Group and was renamed Security Agencies and Guard Supervision Division (SAGSD); and o SAGSD created as one of the major division of PNP Civil Security Group at sila na ang mayroong supervisory security pagdating sa Private security agencies at sila na ang nag iimplement ng rules and regulation ng R.A 5487. In 2009, It was again renamed to PNP Supervisory Office for Security Investigation Agency (SOSIA) by virtue of General Order of DPL-09-10. What is the Mission of PNP CSG? ✓ The CSG’s mission, “To efficiently and effectively administer regulatory services on firearms, explosives and private security industries” has the following core functions: ✓ Responsible for issuance of permits and licenses for firearms, explosives and private security agencies. ✓ Exercises command and control of its subordinates’ officers (FEO and SSOSIA CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 28 What is the Role of PNP-CSG? The Philippines National Police- Civil Security Group (CSG) tasked to exercise administrative and operational control in the regulation of firearms, explosive, and security agency industries has three major division namely the Supervisory Office for Security and Investigation Agencies (SOSIA) and Firearms Explosives Office (FEO) and Law Enforcement Training Affairs Division (LETAD) What is the Role of PNP-SOSIA? ▪ The SOSIA administer and supervises the organization, operation, training, business and activities of all stakeholders of the private security industry in the country”. ▪ It provides administrative services in the issuance of licenses for private security agencies, private detective agencies, company guard forces and government security forces. Maintains and updates records of security consultants, security officers, protection agents, private detectives, watchmen, security guards, security agencies a company guard forces SOSIA SEAL/LOGO ✓ Sun (BRIGHTNESS) ✓ Shield (PROTECTIVE NATURE) ✓ Steadfast (LOYALTY & UNWAVERING DEVOTION TO DUTY); ✓ 3 stars (3 MAIN ISLANDS OF THE PHILIPPINES); and ✓ LAUREL (PEACE) SALIENT FEATURES of Republic Act No. 5487 and its Implementing Rules and Regulations (IRR) o To strengthen the security services in the country and to uplift the security profession and protection. License Necessary: a. No person shall engage in the business of or act as a private detective agency or engage in the occupation, calling or employment of security personnel or in the business of private security/training agency without first having obtained the permit from the Chief of the Philippine National Police which permit as approved is prerequisite in obtaining a license certificate. b. License is likewise necessary for any person operating, managing, directing or conducting a licensed private security/detective/training agency. Any person having any participation in the management or operation thereof except those employed solely for clerical or manual work, shall also secure a license. (Sec. 2, IRR, RA 5487) License to Exercise Profession & License to Operate: License to Exercise Profession – shall mean any document issued by the Chief, Philippine National Police or his duly authorized representative recognizing a person to be qualified to perform his duties as private security or training personnel. (par. K, Section 1, Rule III, IRR, RA 5487) License to Operate (LTO) – is a License Certificate document, issued by the Chief, Philippine National Police or his duly authorized representative, authorizing a natural person to engage in employing security guard or detective, or a juridical person to establish, engage, direct, manage or operate an individual or a private detective agency or private security agency/company security force after payment of the prescribed dues or fees as provided in the Rules and Regulations of RA 5487. (par. L, Section 1, Rule III, IRR, RA 5487) o Hindi lahat ng tao ay pwedi mag apply ng license to operate dahil merong prohibition pagdating sa license certificate at merong disqualification for license prohibition like for example yung nag aapply ay na convict to any crime or offense regarding moral fortitude. Moral fortitude ay tumataliwas sa mga good conduct and good moral. Also, kapag siya ay dishonorably discharge sa kaniyang employment and service. o Hindi din pwedi mabigyan ng license certificate and mga may mental disorder or mental incompetent. Also, drug and alcohol addicts. o Even foreigners ay hindi pwedi mabigyan, dahil ang mga 100% Filipino lang ang pwedi mabigyan. Who may organize and maintain a Private Security? Agency and Private Detective Agency: (Sec. 1, Part 1, Rule IV, IRR, RA 5487) CRDTS: R.DAQUIGAN “LAKANBISIG CLASS OF 2024” 29 Any Filipino citizen or corporation, association, partnership, one hundred percent (100%) of which is owned and controlled by Filipino citizens, may organize and maintain a Private Security Agency or Private Detective Agency. What is the qualification of the operator or manager of the Agency: (Sec. 2 (par. A), Part 1, Rule IV, IRR, RA 5487) Basic requirement of an operator or manager of agency – a. The operator or manager of an agency including, managers of branch offices, must be: 1. Filipino citizen; 2. Not be less than twenty-five (25) years of age; 3. College graduate and/or a commissioned officer in the inactive service or retired from the Armed Forces of the Philippines or the Philippine National police; 4. Has taken a course/seminar on industri

Use Quizgecko on...
Browser
Browser