FINALS Second Year Flashcards
While keeping people and property safe and secure is serious business, that doesn’t mean a security officer can’t also be friendly and helpful.
CUSTOMER RELATIONS
This gives them a sense of personal contact and helps you mention who is coming and going in your building.
CUSTOMER CONTACT
Being polite and friendly while maintaining professionalism goes a long way toward putting people at ease while still making them feel secure.
COMMUNICATION SKILLS
Offering assistance when you’re able is an effective method of customer service.
ASSISTANCE
Your job likely comes with some specific rules for dealing with many issues, from confrontations to emergencies.
FINDING BALANCE
A type of security applied to business groups engaged in industries like manufacturing assembling research and development, processing, warehousing and even agriculture.
INDUSTRIAL SECURITY
A type of security applied to hotels where its properties are protected from pilferage, loss, damage and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guests themselves. This type of security employs house detectives, uniform guard and supervisor and insures that hotel guests and their personal effects safeguarded.
HOTEL SECURITY
This type of security is concern with bank operations. Its main objective is the protection of bank cash and assets, its personnel are trained to safeguard and properties as well as the supermarket personnel bank and assets while in storage, in transit and during transaction.
BANK SECURITY
A type of security applied for the protection of top-ranking officials of the government of private entity, visiting persons of illustrious standing and foreign dignitaries.
VIP SECURITY
A type of security that is concern with the protection of students, faculty members, and school properties. Security personnel are trained to protect the school property from theft, vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students.
SCHOOL SECURITY
A type of security which is concern with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel are trained to detect shoplifter, robbery, and bomb detection and customer relation.
SUPERMARKET OR MALL SECURITY
It is the total of all physical protection employed or installed to secure assists.
PHYSICAL SECURITY
It is the sum total of procedures followed, inquiries conducted, and criteria applied to determine the work suitable of a particular applicant or retention or transfer of a particular employee.
PERSONNEL SECURITY
Complete or partial background investigation is conducted to determine whether the
Applicant should hire or not, or the same investigation is conducted to determine whether the employee should remain in his present position or to be transferred to less or non-sensitive position.
PROCEDURE
It is a process of determining the loyalty, honesty, integrity, reputation, and others of a particular applicant or employee.
INQUIRY
Enumerated standard, like education, experience, age, citizenship, and family background, potential is being verified if true or not
CRITERIA
It is the sum total of all policies, regulation, practices, enforce to safeguards the contents and integrity of any classified information or document from compromise or loss.
DOCUMENT AND INFORMATION SECURITY
Security document and information are the responsibility of all concerned.
POLICY
Anybody found guilty of violating document and information security shall deal with accordingly.
REGULATION
Access to information is based on the “need to know” and not by position.
DOCTRINE
Authority to have access to classified information is not permanent but can be withdrawn by the originating authority.
PRACTICE
Are being used to defined, protect, and monitor property rights and assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage and theft.
PHYSICAL SECURITY / PHYSICAL SECURITY MEASURES
In most cases espionage, acquisition of information is the ultimate result, and means and form in which information is obtained is merely an operational detail. Normally, information on tapes and film is as usable as the original documents. Therefore, in considering access, one should think not only of current physical access, but also access to the discussion of the matter by the use of clandestine listening device.
ENEMY AGENTS MUST HAVE ACCESS
In an unfriendly government or organization is willing to devote enough time, money, personnel, materials and imagination to passing a barrier, it can do so. So, we attempt to build defense in depth by using then one barrier.
THERE IS NO IMPENETRABLE BARRIER
The possibility of surreptitious entry is the greatest hazard from the standpoint of counterintelligence security because it is usually difficult to neutralize the act of espionage because surreptitious entry is not usually detected.
SURREPTITIOUS VS NON-SURREPTITIOUS
Since each installation is different each will have different problems to overcome. The security procedures will not be adequate for all installations.
EACH INSTALLATION IS DIFFERENT
Refers to any physical structure whether natural or manmade capable or restricting, deterring, delaying or preventing illegal and unauthorized access to an installation.
BARRIERS
Minimum Acceptable Requirements for Fence used as Security Barrier: HEIGHT
8 FEET AT MINIMUM
Minimum Acceptable Requirements for Fence used as Security Barrier: SLACK AT THE BOTTOM
NOT TO EXCEED TWO INCHES
Minimum horizontal dimension of four inches by four inches.
WOODEN FENCE POST
The round type should be at least two inches in diameter and the H-beam type must measurable no less than two inches at the smallest diameter.
STEEL FENCE POST
Should be set in concrete or in firm soil using commercial drive anchors, to a depth of three feet; Maximum distance between posts is ten feet.
FENCE POST
There should be something on the top of the fence to deter persons attempting to go over the fence good example would be the use of barbed wire overhand, holding the stands of barbed wire should be two feet long and should be extended at 45-degree angle in the direction of the expected approach.
FENCE TOP
The area surrounding the fence should be clear of trees and vegetation and debris or other materials which would offer concealment to the intruder or would aid him in scaling.
FENCE AREA
Gates should be limited to the number necessary for efficient and safe operation of the installation.
FENCE GATE
All opening in the fence in excess of 96 inches must be lock, barred, or screened in such way that they may only be unlocked and opened from the inside and only by selected personnel.
FENCE OPENING
If used, it should be at least ten feet apart and the overhang on the top of the inner fence should point inward rather than away from the installation maximum distance any two parallel fences should not exceed 150 feet.
MULTIPLE FENCE
Such as rivers, cliffs, and ravines, etc. which delay or make more difficult the entry of the intruder.
NATURAL BARRIER
Are structural construction like fences walls, floors, roofs, grills, bars, road blocks, or other physical means to deter or impede penetration.
MAN-MADE BARRIER
It includes bodies of waters, mountains, marshes, ravines, desert or other terrain that are difficult to traverse.
NATURAL BARRIER
These are features constructed by man regardless of their original intent that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
STRUCTURAL BARRIER
Persons being used in providing a guarding system or by the nature of their employment and location, fulfil security functions. Examples are guards, office personnel, shop workers, etc.
HUMAN BARRIER
Animals are used in partially providing a guarding system. Dogs are usually trained and utilized to serve as guard dogs. German shepherds are best suited for security functions. Goose and turkeys could also be included.
ANIMAL BARRIER
It is the employment of mechanical, electrical, electric energy imposes a deterrent to entry by the potential intruder or to provide warning to guard personnel. These are protective lightning, alarm system and any electronic devices used as barriers.
ENERGY BARRIER
Perimeter fences / barriers.
FIRST LINE OF DEFENSE
Doors, floors, windows, walls, roofs and grills and other entries to the buildings.
SECOND LINE OF DEFENSE
Storage system like steel cabinets, safes, vaults and interior files.
THIRD LINE OF DEFENSE
A medium or structure which defines the physical limits of an installation or area to restrict or impede access thereto. It is any physical barrier used to supplement the protection of an inside or outside perimeter.
PERIMETER BARRIER
A line adjacent to protected area, and passing through points of possible entry into the area, such as doors, windows, skylights, tunnel or other points of access.
INSIDE PERIMETER
A line of protection surroundings but somewhat removed from a protected area, such as a fence.
OUTSIDE PERIMETER
Can be barbed wire, chain link or concertina.
WIRE FENCE
Type of wire fence used for permanent structure.
CHAIN LINK
Type of wire fence used for semi-permanent.
BARBED WIRE
Type of wire fence used for the least permanent and also can be used as a temporary road block or impediment during strikes and crowd control.
CONCERTINA
Are attractive and low in maintenance cost; they offer less hazard to people because of the absence of barbs, and the openings are small to prevent passage of pilfered article.
WIRE FENCE
Constructed in such a way that visual access through the fence is denied. Its advantage is that it denies the opportunity for the intruder to become familiar with the personnel, activities and the time scheduled of the movements of the guards in the installation.
SOLID FENCE
It prevents the guards from observing the area around the installation and it creates shadow that may be used by the intruder for cover and concealment.
SOLID FENCE
It is constructed in such a way that visual access is permitted through the fence. Its advantages are that it allows the roving patrols and stationary guard to keep the surrounding area of the installation under observation.
FULL-VIEW FENCE
It allows the intruder to become familiar with the guard patrols thereby allowing him to pick the time that is advantageous on his part.
FULL-VIEW FENCE
Walls, Floors, roof or their combination serve also as barriers and they should be of such construction to provide uniform protection just like the wire fencing.
BUILDING WALL
Can be made of stone slabs like adobe or hollow bound by concrete with post at regular intervals to prevent the wall from toppling due to wind, or scouring facilities, security must sit down with design engineers so that area where sensitive activity will be done should be given special emphasis in protective walls.
WALL
Like river, lake, marsh, cataract, sea pond or any other bodies of water forming a part of the wall, building or fencing should never be considered adequate natural perimeter barrier.
BODIES OF WATER
When not in use and controlled by guards, gates and doors in the perimeter should be locked and frequently inspected by guards. Lock should be changed from time to time and should be covered under protective locks and key control.
GATES AND DOORS
These provide access to areas within the perimeter barrier and should be locked and guarded.
SIDE-WALK ELEVATORS
Sewers, air intakes, exhaust tunnels and other utility openings which penetrate the barrier and which have cross sectional areas of 96 square inches or more should be protected by bars, grills, water filled traps or other structural means providing equivalent protection to that portion of the perimeter barriers.
UTILITIES OPENING
An obstructed area or a “clear zone” should be maintained on both sides of the perimeter barrier. A clear zone of 20 feet or more is desirable between the barriers and exterior structures and natural covers that may provide seeking unauthorized entry.
CLEAR ZONES
This increases the protective height and prevents easy access.
TOP GUARD
This is normally provided at main perimeter entrances to secure areas located out-of-doors, and manned by guards on full-time basis. Sentry station should be near a perimeter for surveillance at the entrance.
GUARD CONTROL STATIONS
This is a house like structure above the perimeter barriers. The higher the tower, the more visibility it provides. It gives a psychological unswerving effect to violators. By and large guard towers, whether permanent or temporary, must have a corresponding support force in the event of need.
TOWER GUARD
Fencing barriers and protective walls should always be regularly inspected by security. Any sign or attempts to break in should be reported for investigation. Destruction of fence or sections thereof should be repaired immediately and guard vigilance should be increased.
BARRIER MAINTENANCE
In large open areas or ground where fencing or walling is impractical and expensive, warning signs should be conspicuously placed.
PROTECTION IN DEPTH
Should be erected where necessary in the management of unauthorized ingress to preclude accidental entry.
CONTROL SIGNS / SIGNS AND NOTICES
Personal inspection of all guards prior to their starting tour of duty. Periodic checks of guards during their tour by the senior member of each relief or his representative.
PERSONAL SUPERVISION
Guard takes with him on his tour of duty a form which must have the time punched on it at each station.
RECORDED TOUR
This is where the guard sends signals to guard headquarters from each station that he checks.
SUPERVISORY TOUR
Direct line telephone or in some instances radio.
PRIMARY COMMUNICATION
ex. Messengers.
EMERGENCY COMMUNICATION
Is the single most cost-effective deterrent to crime because it creates a psychological deterrent to the intruders.
PROTECTIVE LIGHTING
The most familiar type of outdoor security lighting, this is designed to provide two specific results: glare projection or controlled lighting. It consists of a series of fixed luminaries at range to flood a given area continuously during the hours of darkness.
CONTINUOUS LIGHTING
The intensity is focused to the intruder while the observer or guard remained in the comparative darkness, the lighting is toward of the approach of an entrance to an installation.
GLARE PROJECTION TYPE
The lighting is focused on the pile of items, rather than the background. The width of the lighted strip can be controlled and adjusted to suit the security needs.
CONTROLLED LIGHTING
It is designed for reserve or standby use or to supplement continuous systems. A standby system can be most useful to selectively light a particular area in an occasional basis.
STANDBY LIGHTING
This system is manually operated and is usually made up of movable search or floodlights that can be located in selected or special locations which will require lighting only for short period of time.
MOVABLE OR PORTABLE LIGHTING
This system is used in times of power failure or other emergencies when other system is inoperative.
EMERGENCY LIGHTING
It is the least expensive in terms of energy consumed and has the advantage of providing instant illumination when the switch is on.
INCANDESCENT LAMP
It is considered more efficient that he incandescent and used widespread in exterior lighting. This emits a purplish white color, caused by an electric current passing through a tube of conducting and luminous gas.
MERCURY VAPOR LAMP
It has similar physical appearance to mercury vapour but provides a light source of higher luminous efficiency and better color rendition.
METAL HALIDE
This provides good color rendition, high lamp efficiency as well as long life. However, it cannot project light over long distance and thus are not desirable as flood type lights.
FLUORESCENT
This has gained acceptance for exterior lighting of parking areas, roadways, buildings and commercial interior installations. Constructed on the same principle as mercury vapour lamps, they emit a golden white to light pink color and this provide high lumen efficiency and relatively good color rendition.
HIGH PRESSURE SODIUM VAPOR
These can be used to accommodate most outdoor security lighting needs, including the illumination of boundaries, fences and buildings and for the emphasis of vital areas or particular buildings.
FLOODLIGHTS
This lighting equipment received the most widespread notoriety for its value in reducing crime.
STREET LIGHTS
These are highly focused incandescent lamp and are designed to pinpoint potential trouble spots.
SEARCH LIGHTS
These are wide beam units, primary used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier. It projects a narrow, horizontal beam that is approximately 180 degrees in the horizontal and from 15 to 30 degrees in the vertical plane.
FRESNEL LIGHTS
Should be lighted about 25 feet on either side of the gate if possible and the range for vehicular gates should be twice that of street lighting is recommended in these applications, but floodlights can also be used if glare is strictly controlled.
PEDESTRIAN GATE
Normally manned by guards inspecting credentials, as well as inspecting for contraband or stolen property, it is critical that the area to be lighted to at least one-foot candle.
VEHICULAR GATE
This include vital building, storage depots, and vulnerable control points in communication power, light and were distribution system.
PARKING AREA
Used for pedestrian, vehicles or forklift should be lighted to 0.01 candles for security purpose.
THOROUGHFARE
Large opened working areas, piers, docks, and other sensitive areas
STORAGE
Is an aural or visual signal given by the annunciator to security when intruder actuates device in a protected area. An annunciator is a visual or audible signaling device which initiates conditions of associated circuits.
ALARM
Are designed to alert security personnel to consummated or attempted intrusions into an area, building or compound. Each type of alarm is activities in the event that an intruder tempers with the circuitry, a beam or radiated waves.
ALARM SYSTEM
It assists the security in detecting, impeding or deterring potential security threat in the installation. Basically, its function is to alert the security personnel for any attempt of intrusion into a protected area, building or compound.
PROTECTIVE ALARM
It emits the aural or visual signals or both.
SENSOR OR TRIGGER DEVICE
A circuit which transmit the message to the signaling apparatus.
TRANSMISSION LINE
It is the signaling system that activates the alarm.
ENUNCIATOR
A type of alarm where the control station is located outside the plant or installation. When the alarm is sounded or actuated by subscriber, the central station notifies the police and other public safety agencies.
CENTRAL STATION SYSTEM
Centralized monitor of the proprietary alarm system is located in the industrial firm itself with a duty operator. In case of alarm, the duty operator calls whatever is the primary need; fire fighters, police, an ambulance or a bomb disposal unit.
PROPRIETARY SYSTEM
This system consists of ranging up a visual or audible alarm near the object to be protected. When an intruder tries to pry a window, the alarm thereat goes off.
LOCAL ALARM
Company-owned alarm systems with a unit in the nearest police station so that in case of need, direct call is possible. The company maintains the equipment and lines both for the company and those in the police, fire and other emergency agencies by special arrangement. The auxiliary system can be availed of by radio, landlines, or cell phones.
AUXILIARY ALARM
This is local alarm system in which a bell or siren is sounded with no predictable response. These systems are used in residence or small retail establishment which affords a respond system. The hope is that a neighbor or passing patrol car will reach to the alarm and call for police assistance, but such a call is purely a matter of chance.
LOCAL ALARM BY CHANCE SYSTEM
This system is set to dial a predetermined number or numbers when the alarm activates. The number selected might be the police or the subscriber’s home number, or both. When the phone is answered, a recording states that an intrusion in progress at the location so alarmed.
DIAL ALARM SYSTEM
It will detect any sound caused by attempted force entry. A supersonic microphone speaker sensor is installed in walls, ceilings and floors of the protected area.
AUDIO DETECTION DEVICE
It will detect any vibration caused by attempted force entry. A vibration sensitive sensor is attached to walls, ceilings or floors of the protected area. This is economical and easily installed, high salvage value, and flexible in application.
VIBRATION DETECTION DEVICE
It will detect any action that moves that fail or wire. An electrically charge strips of tinfoil or wire is used in the doors, windows or glass surfaces of the protected area. This is consistent trouble-free service, and causes few nuisance alarms.
METALLIC FOIL OR WIRE
A laser emitter floods a wall or fencing with a beam so that when this beam is disturbed by a physical object, an alarm is activated.
LASER BEAM ALARM
An invisible/visible beam is emitted and when this is disturbed or when an intruder break contact with the beam, it will activate the alarm.
PHOTOELECTRIC OR ELECTRIC EYE DEVICE
A pattern of radio waves is transmitted and partially reflected back to an antenna. If they strike a moving object, they return at a different frequency which results in initiating an alarm signal. Very effective for protection of interior areas. This have a good Coverage, and Not affected by air current noise sound.
MICROWAVE MOTION DETECTION DEVICE
Are place on the floor in such a position that tellers may activate the alarm by placing the front of their foot to engage the activation bar.
FOOT RAIL ACTIVATOR
Are usually place in the teller’s cash drawer and connected to the alarm system using a wire connector. When currency is removed from the devices, the alarm is activated.
BILL TRAPS OR CURRENCY ACTIVATION DEVICES
These are installed inside the desk or teller station which can be activated by knee or thigh pressure. They are commonly found in location where personnel usually perform their duties from seated position.
KNEE OR THIGH BUTTONS
Like the foot rail permit alarm activation in relatively safety while both hands remain clear in view of the robbers.
FOOT BUTTON
Required pressure on both side of the device and therefore the probability of accidental alarm is reduced.
DOUBLE SQUEEZE BUTTON
Is one of the most widely used physical security devices in the asset protection program of an installation. It complements other physical safeguards if the installation against any possible surreptitious entry.
LOCK
Defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry into a building, room, container or hiding place.
LOCK
A term in England for lock picker, safecracker, and penetrator or restricted areas or room.
PETERMAN
It uses some sort of arrangement of internal physical barriers (wards tumblers) which prevent the lock from operating unless they are properly aligned. The key is the device used to align these internal barriers so that the lock may be operated.
KEY OPERATED MECHANICAL LOCK
Designed for the use of the automobile industry and are in general use in car doors today, because this lock is easy and cheap to be manufactured, its use has expanded to other areas such as desk, files and padlocks. The delay afforded is approximately ten minutes.
DISK TUMBLER LOCK
Are difficult to define in terms of security, since they vary greatly in their effectiveness. These locks are used in safe deposit boxes and are for all practical purposes, pick proof. The least of these locks are used in desk, lockers and cabinets and are generally less secure than pin tumbler lock.
LEVER TUMBLER LOCK
Offer very little security, this type of lock must therefore be use only to have privacy, but not to provide a degree of security.
WARDED LOCK
A portable and detachable lock having a sliding hasp which passes through a staple ring and is then made fasten or secured.
PADLOCK
Instead of using the key to align the tumblers, the combination mechanism uses numbers, letters or other symbols as reference point which enables an operator to align them manually.
COMBINATION LOCK
A type of lock that can be opened by pressing a series of numbered button in the proper sequence.
CODE-OPERATED LOCK
A type of lock that can be opened and closed remotely by electrical means.
ELECTRICAL LOCK
A type of lock operated by coded card.
CARD-OPERATED LOCK
A specific key, which operates the lock and has a particular combination cuts, or biting, which match the arrangement of the tumblers in the lock.
CHANGE KEY
A key that will open all the lock within a particular area or grouping in a given facility.
SUB-MASTER KEY
A special key capable of opening a series of lock.
MASTER KEY
A key that will open everything in a system involving two or more master key groups.
GRAND MASTER KEY
Once an effective key control has been installed, positive control of all keys must be gained and maintained. This can be accomplished only if it is established in conjunction with installation of new locking devices.
KEY CONTROL
A well-constructed cabinet will have to be produced. The cabinet will have to be procured. The cabinet will have to be of sufficient size to hold the original key to every lock in the system. It should be secured at all times.
KEY CABINET
Some administrative means must be set up to record code numbers and indicates to whom keys to specific locks have been issued.
KEY RECORD
Periodic inventories will have to be made of all duplicate and original keys in the hands of the employees whom they have been issued.
INVENTORIES
In addition to periodic inventory, an unannounced audit should be made of all key control records and procedures by a member of management.
AUDITS
Should be made to the person responsible for key control from the personnel department indicating all person who have left or will be leaving the company. In the event that a key has been issued, steps should be initiated to ensure that the key is covered.
DAILY REPORT
Any person who shall without lawful cause have in possession of picklocks or similar tools especially to the commission of the crime or robbery, shall be punished by arresto mayor in its maximum period to prison correctional in its minimum period. The same penalty shall be imposed upon any person who shall make such tool. If the offender is a locksmith, shall suffer the penalty of prison correctional in its medium and maximum period.
ARTICLE 304 REVISE PENAL CODE
The term “False Key” shall be deemed to include:
a) The tool mentioned in the next proceeding articles.
b) Genuine keys stolen from the owner.
c) Any key other than those intended by the owner for used in the lock forcibly opened by the offender.
ARTICLE 305 REVISE PENAL CODE
The final line of defense at any facility is in the high security storage where papers, records, plans or cashable instrument, precious metals or other especially valuable assets are protected. These security containers will be of a size and quality, which the nature of the business dictates.
SECURITY CABINET
A metallic container used for the safekeeping of documents or small items in an office or installation. Can be classified as either robbery or burglary resistance depending upon the use and need.
SAFE
A safe should not have at any one time a temperature above 350 degrees Fahrenheit.
FIRE ENDURANCE
Test to determine if sudden rise in temperature will not cause the safe to rupture. If the safe can withstand 2000 degrees Fahrenheit for 30 minutes and will not crack or open, then it has passed the explosion test.
EXPLAINS HAZARD TEST
Aimed at determining the strength of a safe to withstand the collapse of a building during fire.
FIRE AND IMPACT TEST
Heavily constructed fire and burglar resistance container usually a part of the building structure used to keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but smaller than a file room.
VAULT
A cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited people to work on the records inside.
FILE ROOM
Identification cards, passes, passwords, etc.
ARTIFICIAL RECOGNITION
The badge or pass coded for authorization to enter specific areas is issued to an employee who keeps it in his possession until his authorization is terminates.
SINGLE PASS SYSTEM
An exchange takes place at the entrance of each controlled area. Upon leaving the personnel surrenders his badge or passes and retrieve back his basic identification.
PASS EXCHANGE SYSTEM
This provides an extra measure of security by requiring that an exchange take place at the entrance of each restricted area.
MULTIPLE PASS SYSTEM
Are those areas where access is restricted as to entrance or movement by all authorized personnel and vehicles. It should additionally mark by a fence or other barrier, and access to it should limited to as few guests as possible.
CONTROLLED AREA
Are those within the controlled area where a greater degree of security is required.
LIMITED AREA
Are used only for handling and storage of high value cargo and classified documents. The number of people authorized to enter this area should be strictly limited, and the area should be under surveillance at all times.
EXCLUSION AREA
Controlling traffic in and out within a facility is essential to its security program. Perimeter barriers, locked doors and screened windows, prevent or deter the entry of unauthorized visitors, but since some traffic essential to every operation, no matter how highly, classified it maybe, provision must be made for the control of this movement.
TRAFFIC CONTROL SYSTEM
The most practical and generally accepted system is the use of badges and identification cards. Generally speaking, this system designates when and where and how passes should be displayed, and to whom, what is to be done in case of the loss of the pass; procedure for taking a pass from terminating employees; and a system in cancellation and re-issue of all passes; either as a security review or when a significant number of badges have reported lost or stolen.
PERSONNEL IDENTIFICATION
Security should establish proper methods of establishing the authority for admission of visitors as well as the limitation thereat.
VISITORS MOVEMENT CONTROL
All visitors to any facility should be required to identify them and should be given a visitor’s ID by the security. Should be filled up with the named of visitors, nature and duration of visit.
VISITOR’S LOGBOOK
Taking of photographs should also be considered. Extreme caution must be exercised in areas where classified information is displayed to preclude unauthorized taking of pictures of the installation. If a visitor has camera and it is prohibited to take picture, said camera should be left in the care of security with corresponding receipt.
PHOTOGRAPH
If possible, visitors should be escorted by the security to monitor their activity within the establishment and guide them where to go.
ESCORT
Separate access for visitors and employees of the establishment should be provided.
VISITOR ENTRANCES
If there is a long delay or time lapse between the departure and arrival, the visitors may be required to show cause for the delay.
TIME TRAVELED
Every facility must establish a system for the control of package entering or leaving the premises. However, desirable it might seem it is simply unrealistic to suppose that a blanket rule.
PACKAGE MOVEMENT CONTROL
Of the three major aspects of security, this is considered as the most important. This is for the simple reason that security involves people, both an asset to be protected and as source of security threats.
PERSONNEL SECURITY
This technique is very expensive but necessary in personnel security. It serves to verify information on the application form and to obtain other information pertinent to the decision to employ.
BACKGROUND INVESTIGATION
Is the process of inspecting or examining with careful thoroughness. Is a personal interview conducted under stress. It is based on information previously given by the applicant. Other information issued during the interview, such as those discovered in the BI, which confirms or denies which given by the applicant.
POSITIVE VETTING
Is the process whereby a subject’s reaction in a future critical situation is predicted by observing his behaviour, or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test. The Reid Report is an example of honesty test.
PROWLING
This process of using devices in detecting deception during the interview stage. This includes the use of a Polygraph, Psychological Stress Evaluator and Voice Analyzer.
DECEPTION DETECTION TECHNIQUES
This type of investigation seeks to gather information on income and mode of living, sometimes referred to as the earning to debt ratio.
FINANCIAL AND LIFESTYLE INQUIRY
This is the placement of an agent in a role in which the agent’s true identity and role remains unknown, in order to obtain information for criminal prosecution or for recovery or limitation of asset losses.
UNDERCOVER INVESTIGATION
This a valuable tool because it gives departing employees an opportunity to list grievances. It offers security managers an opportunity to learn of problems not previously known. Incorporating a checklist of company issued property and confronting a departing employee of this has resulted in reducing losses of company property. Debriefing an employee is also incorporated into the exit interview to remind employees of their continuing legal obligation to safeguard confidential company information.
EXIT INTERVIEW
Is conducted to develop security awareness among employees in the company. It should cover all employees, regardless of rank or position.
SECURITY EDUCATION
Are to acquaint all the employees the rationale behind the security measures and to insure their cooperation at all times.
SECURITY EDUCATION PROGRAM
It is the first contact of the prospective employee wherein the interviewer determines the suitability of the applicant for employment through his given answer on the different type of questions being conducted. It is in this stage where; the interviewer may start providing the necessary information as to the overview of company security policies and at the same time on the employee accountability and corresponding penalties that could result from violation there from.
INITIAL INTERVIEW
It is in this stage where new employees receive detailed presentation of personnel security policy. Usually handouts or employee’s manual are being distributed for reference. New employees also requested to sign acknowledgement that they have been aware of the existing company policies and will abide the same.
ORIENTATION AND TRAINING
It is design to remind employees of the company about their responsibilities, review the guidelines and policies, introduction of new policies and regulations and a movement of getting employees feedback about the company policies that is being implemented.
REFRESHER CONFERENCE
This employed as an indirect approach of educating the employees, such as posting security posters and distributing fliers.
SECURITY REMINDERS
It is the act of emphasizing the importance and role of security achieving the company goals and objectives. It involves security employee cooperation and support.
SECURITY PROMOTION
Letters, diary and notebooks. These should be treated usually the same with official document.
PERSONAL DOCUMENT
Orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain of command.
OFFICIAL DOCUMENT
Each document or information has a life cycle in the sense that its usefulness has a beginning and an end. It passes various stages from the time it is created until it is finally disposed.
DOCUMENT/INFORMATION CYCLE
Is any information and materials the unauthorized disclosure of it would cause exceptionally grave damage to the nation, politically, economically and military operation.
TOP SECRET (GREEN COLOR CODE)
Is any information and material, the unauthorized disclosure of it would endager national security cause serious injury to the interest or prestige of the nation or any governmental activity or advantage to a foreign nation.
SECRET (RED COLOR CODE)
Is any information or material, the unauthorized disclosure of it would be prejudicial to the interest and prestige of the national or governmental activity or would cause administrative embarrassment or unwanted injury to and of advantage to and be of advantage to a foreign country.
CONFIDENTIAL (BLUE COLOR CODE)
Is any information and material which requires special protection other than those determines confidential, secret and top secret.
RESTRICTED (WHITE OR NO COLOR CODE)
In this category these are records that are irreplaceable, records of which reproduction does not have the same value as the original; records needed to recover cash, to replace building, equipment’s, raw materials, finished products, and work in process and records needed to avoid delay in restoration of production, sales and services.
CLASS I - VITAL DOCUMENTS
This includes records the reproduction of which will close considerable expense and labor, or considerable delay.
CLASS II - IMPORTANT DOCUMENTS
This includes records whose loss might cause inconvenience but could be readily replaced and which would not in the meantime present restoration of the business.
CLASS III - USEFUL DOCUMENTS
This record are daily files, routine in nature even if lost or destroyed, will not affect operation or administration. This class represent the bulk of records which should not be even attempted to be protected in the event of disasters. They should, however, be kept in ordinary files ready for reference, if needed, and usually discarded after some period of time.
CLASS IV - NON-ESSENTIAL DOCUMENTS
This consist of any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who don’t know or use it. It may be a formula for a chemical compound a process of manufacturing, treating or preserving materials, a pattern for a machine or device, or a list of customers. It differs from other secret information as to single or ephemeral events. A trade secret is a process or device for continuous use in the protection of the business.
TRADE SECRETS
This is a grant made by the government to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of years.
PATENTS
Any act or condition which may result in the compromise of information, loss of life, and loss or destruction of property or disruption of the activity of the installation.
SECURITY HAZARD
These are hazards which arise from natural phenomena. The following are types of natural hazard or disasters
NATURAL HAZARD
These are hazards which are the result of a state of mind, attitude, weaknesses or character traits of one or more persons. They can be acts of commission or omission, both overt and covert, which can disrupt operation of a plant or installation.
HUMAN OR MAN-MADE HAZARD
Aims to protect people from physical violence, whether from the state or external states, from violent individuals and sub- state actors, from domestic abuse, or from predatory adults. For many people, the greatest source of anxiety is crime, particularly violent crime.
VIP SECURITY
Very important Person
VIP
One or more persons accompanying another to give guidance or protection or to pay honor.
ESCORT
A person or a grouped of persons usually armed and responsible for the physical safety of one or more specific person.
BODY GUARD
Covers the surrounding areas of engagement. conducts prophylactic (neutralize the area), operations in the area of engagement.
AREA SECURITY
Secures the immediate areas surrounding the place of engagement. Usually these are the uniformed men.
PERIMETER SECURITY
This are the advanced security at the place of engagement before the arrival of the VIP. Sanitize the engagement area.
ADVANCE SECURITY
Accompanies the VIP where ever he goes. Maximum of four (4) persons.
CLOSE-IN SECURITY
On standby for possible back- up / re- enforcement.
RESERVE SECURITY
Neutralize the possible route of the VIP party.
ROUTINE SECURITY
Is a decisive point of a condition, improper handling on which immediately places under threat or danger of one’s life, limbs, freedom and property.
CRISIS
Is the totality of action of handling or responding to a given crisis situation.
CRISIS MANAGEMENT
Is a complete and comprehensive plan of actions designed to protect life, limbs, freedom and property, before, during, and after any given crisis situation.
CRISIS MANAGEMENT PLAN
Events caused by force of nature
NATURAL CRISIS
Events caused through instrumentality of men.
MAN-MADE CRISIS
Is a condition of an enterprise whereby normal work operation is stopped as a result of a strike and lockout.
WORK STOPPAGE
Is a temporary stoppage of work by concerned action or employees as a result of a current labor industrial dispute.
STRIKE
Is the temporary refusal of any employer to furnish work.
LOCKOUT
The transfer of thought from the mind of one person to the mind of another thought a common medium or channel.
COMMUNICATION
The exchange of thoughts or opinions by conversations, or seminar. The exchange could be from oral, written and other forms.
CONFERENCE
Refers to the common language known for two or more individuals who want to exchange thought or ideas with each other.
MEDIUM COMMUNICATION
Is the common medium of communication in Baguio City
ILOCANO
Is the process of sending and receiving messages to achieve understanding.
COMMUNICATION
refers to the equipment’s being used to transfer thoughts or ideas.
CHANNEL OF COMMUNICATION
Communication on electromagnetic waves transmitted through the space.
HAND HELD RADIO OR WALKIE TALKIE
For hobby and emergency purposes type of radio.
AMATEUR RADIO
For business purposes type of radio.
COMMERCIAL RADIO