FINALS Second Year Flashcards

1
Q

While keeping people and property safe and secure is serious business, that doesn’t mean a security officer can’t also be friendly and helpful.

A

CUSTOMER RELATIONS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This gives them a sense of personal contact and helps you mention who is coming and going in your building.

A

CUSTOMER CONTACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Being polite and friendly while maintaining professionalism goes a long way toward putting people at ease while still making them feel secure.

A

COMMUNICATION SKILLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Offering assistance when you’re able is an effective method of customer service.

A

ASSISTANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your job likely comes with some specific rules for dealing with many issues, from confrontations to emergencies.

A

FINDING BALANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A type of security applied to business groups engaged in industries like manufacturing assembling research and development, processing, warehousing and even agriculture.

A

INDUSTRIAL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of security applied to hotels where its properties are protected from pilferage, loss, damage and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guests themselves. This type of security employs house detectives, uniform guard and supervisor and insures that hotel guests and their personal effects safeguarded.

A

HOTEL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This type of security is concern with bank operations. Its main objective is the protection of bank cash and assets, its personnel are trained to safeguard and properties as well as the supermarket personnel bank and assets while in storage, in transit and during transaction.

A

BANK SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of security applied for the protection of top-ranking officials of the government of private entity, visiting persons of illustrious standing and foreign dignitaries.

A

VIP SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of security that is concern with the protection of students, faculty members, and school properties. Security personnel are trained to protect the school property from theft, vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by the students.

A

SCHOOL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of security which is concern with the protection of the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel are trained to detect shoplifter, robbery, and bomb detection and customer relation.

A

SUPERMARKET OR MALL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is the total of all physical protection employed or installed to secure assists.

A

PHYSICAL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

It is the sum total of procedures followed, inquiries conducted, and criteria applied to determine the work suitable of a particular applicant or retention or transfer of a particular employee.

A

PERSONNEL SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Complete or partial background investigation is conducted to determine whether the
Applicant should hire or not, or the same investigation is conducted to determine whether the employee should remain in his present position or to be transferred to less or non-sensitive position.

A

PROCEDURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is a process of determining the loyalty, honesty, integrity, reputation, and others of a particular applicant or employee.

A

INQUIRY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enumerated standard, like education, experience, age, citizenship, and family background, potential is being verified if true or not

A

CRITERIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

It is the sum total of all policies, regulation, practices, enforce to safeguards the contents and integrity of any classified information or document from compromise or loss.

A

DOCUMENT AND INFORMATION SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Security document and information are the responsibility of all concerned.

A

POLICY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Anybody found guilty of violating document and information security shall deal with accordingly.

A

REGULATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Access to information is based on the “need to know” and not by position.

A

DOCTRINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Authority to have access to classified information is not permanent but can be withdrawn by the originating authority.

A

PRACTICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Are being used to defined, protect, and monitor property rights and assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage and theft.

A

PHYSICAL SECURITY / PHYSICAL SECURITY MEASURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In most cases espionage, acquisition of information is the ultimate result, and means and form in which information is obtained is merely an operational detail. Normally, information on tapes and film is as usable as the original documents. Therefore, in considering access, one should think not only of current physical access, but also access to the discussion of the matter by the use of clandestine listening device.

A

ENEMY AGENTS MUST HAVE ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In an unfriendly government or organization is willing to devote enough time, money, personnel, materials and imagination to passing a barrier, it can do so. So, we attempt to build defense in depth by using then one barrier.

A

THERE IS NO IMPENETRABLE BARRIER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The possibility of surreptitious entry is the greatest hazard from the standpoint of counterintelligence security because it is usually difficult to neutralize the act of espionage because surreptitious entry is not usually detected.
SURREPTITIOUS VS NON-SURREPTITIOUS
26
Since each installation is different each will have different problems to overcome. The security procedures will not be adequate for all installations.
EACH INSTALLATION IS DIFFERENT
27
Refers to any physical structure whether natural or manmade capable or restricting, deterring, delaying or preventing illegal and unauthorized access to an installation.
BARRIERS
28
Minimum Acceptable Requirements for Fence used as Security Barrier: HEIGHT
8 FEET AT MINIMUM
29
Minimum Acceptable Requirements for Fence used as Security Barrier: SLACK AT THE BOTTOM
NOT TO EXCEED TWO INCHES
30
Minimum horizontal dimension of four inches by four inches.
WOODEN FENCE POST
31
The round type should be at least two inches in diameter and the H-beam type must measurable no less than two inches at the smallest diameter.
STEEL FENCE POST
32
Should be set in concrete or in firm soil using commercial drive anchors, to a depth of three feet; Maximum distance between posts is ten feet.
FENCE POST
33
There should be something on the top of the fence to deter persons attempting to go over the fence good example would be the use of barbed wire overhand, holding the stands of barbed wire should be two feet long and should be extended at 45-degree angle in the direction of the expected approach.
FENCE TOP
34
The area surrounding the fence should be clear of trees and vegetation and debris or other materials which would offer concealment to the intruder or would aid him in scaling.
FENCE AREA
35
Gates should be limited to the number necessary for efficient and safe operation of the installation.
FENCE GATE
36
All opening in the fence in excess of 96 inches must be lock, barred, or screened in such way that they may only be unlocked and opened from the inside and only by selected personnel.
FENCE OPENING
37
If used, it should be at least ten feet apart and the overhang on the top of the inner fence should point inward rather than away from the installation maximum distance any two parallel fences should not exceed 150 feet.
MULTIPLE FENCE
38
Such as rivers, cliffs, and ravines, etc. which delay or make more difficult the entry of the intruder.
NATURAL BARRIER
39
Are structural construction like fences walls, floors, roofs, grills, bars, road blocks, or other physical means to deter or impede penetration.
MAN-MADE BARRIER
40
It includes bodies of waters, mountains, marshes, ravines, desert or other terrain that are difficult to traverse.
NATURAL BARRIER
41
These are features constructed by man regardless of their original intent that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
STRUCTURAL BARRIER
42
Persons being used in providing a guarding system or by the nature of their employment and location, fulfil security functions. Examples are guards, office personnel, shop workers, etc.
HUMAN BARRIER
43
Animals are used in partially providing a guarding system. Dogs are usually trained and utilized to serve as guard dogs. German shepherds are best suited for security functions. Goose and turkeys could also be included.
ANIMAL BARRIER
44
It is the employment of mechanical, electrical, electric energy imposes a deterrent to entry by the potential intruder or to provide warning to guard personnel. These are protective lightning, alarm system and any electronic devices used as barriers.
ENERGY BARRIER
45
Perimeter fences / barriers.
FIRST LINE OF DEFENSE
46
Doors, floors, windows, walls, roofs and grills and other entries to the buildings.
SECOND LINE OF DEFENSE
47
Storage system like steel cabinets, safes, vaults and interior files.
THIRD LINE OF DEFENSE
48
A medium or structure which defines the physical limits of an installation or area to restrict or impede access thereto. It is any physical barrier used to supplement the protection of an inside or outside perimeter.
PERIMETER BARRIER
49
A line adjacent to protected area, and passing through points of possible entry into the area, such as doors, windows, skylights, tunnel or other points of access.
INSIDE PERIMETER
50
A line of protection surroundings but somewhat removed from a protected area, such as a fence.
OUTSIDE PERIMETER
51
Can be barbed wire, chain link or concertina.
WIRE FENCE
52
Type of wire fence used for permanent structure.
CHAIN LINK
53
Type of wire fence used for semi-permanent.
BARBED WIRE
54
Type of wire fence used for the least permanent and also can be used as a temporary road block or impediment during strikes and crowd control.
CONCERTINA
55
Are attractive and low in maintenance cost; they offer less hazard to people because of the absence of barbs, and the openings are small to prevent passage of pilfered article.
WIRE FENCE
56
Constructed in such a way that visual access through the fence is denied. Its advantage is that it denies the opportunity for the intruder to become familiar with the personnel, activities and the time scheduled of the movements of the guards in the installation.
SOLID FENCE
57
It prevents the guards from observing the area around the installation and it creates shadow that may be used by the intruder for cover and concealment.
SOLID FENCE
58
It is constructed in such a way that visual access is permitted through the fence. Its advantages are that it allows the roving patrols and stationary guard to keep the surrounding area of the installation under observation.
FULL-VIEW FENCE
59
It allows the intruder to become familiar with the guard patrols thereby allowing him to pick the time that is advantageous on his part.
FULL-VIEW FENCE
60
Walls, Floors, roof or their combination serve also as barriers and they should be of such construction to provide uniform protection just like the wire fencing.
BUILDING WALL
61
Can be made of stone slabs like adobe or hollow bound by concrete with post at regular intervals to prevent the wall from toppling due to wind, or scouring facilities, security must sit down with design engineers so that area where sensitive activity will be done should be given special emphasis in protective walls.
WALL
62
Like river, lake, marsh, cataract, sea pond or any other bodies of water forming a part of the wall, building or fencing should never be considered adequate natural perimeter barrier.
BODIES OF WATER
63
When not in use and controlled by guards, gates and doors in the perimeter should be locked and frequently inspected by guards. Lock should be changed from time to time and should be covered under protective locks and key control.
GATES AND DOORS
64
These provide access to areas within the perimeter barrier and should be locked and guarded.
SIDE-WALK ELEVATORS
65
Sewers, air intakes, exhaust tunnels and other utility openings which penetrate the barrier and which have cross sectional areas of 96 square inches or more should be protected by bars, grills, water filled traps or other structural means providing equivalent protection to that portion of the perimeter barriers.
UTILITIES OPENING
66
An obstructed area or a “clear zone” should be maintained on both sides of the perimeter barrier. A clear zone of 20 feet or more is desirable between the barriers and exterior structures and natural covers that may provide seeking unauthorized entry.
CLEAR ZONES
67
This increases the protective height and prevents easy access.
TOP GUARD
68
This is normally provided at main perimeter entrances to secure areas located out-of-doors, and manned by guards on full-time basis. Sentry station should be near a perimeter for surveillance at the entrance.
GUARD CONTROL STATIONS
69
This is a house like structure above the perimeter barriers. The higher the tower, the more visibility it provides. It gives a psychological unswerving effect to violators. By and large guard towers, whether permanent or temporary, must have a corresponding support force in the event of need.
TOWER GUARD
70
Fencing barriers and protective walls should always be regularly inspected by security. Any sign or attempts to break in should be reported for investigation. Destruction of fence or sections thereof should be repaired immediately and guard vigilance should be increased.
BARRIER MAINTENANCE
71
In large open areas or ground where fencing or walling is impractical and expensive, warning signs should be conspicuously placed.
PROTECTION IN DEPTH
72
Should be erected where necessary in the management of unauthorized ingress to preclude accidental entry.
CONTROL SIGNS / SIGNS AND NOTICES
73
Personal inspection of all guards prior to their starting tour of duty. Periodic checks of guards during their tour by the senior member of each relief or his representative.
PERSONAL SUPERVISION
74
Guard takes with him on his tour of duty a form which must have the time punched on it at each station.
RECORDED TOUR
75
This is where the guard sends signals to guard headquarters from each station that he checks.
SUPERVISORY TOUR
76
Direct line telephone or in some instances radio.
PRIMARY COMMUNICATION
77
ex. Messengers.
EMERGENCY COMMUNICATION
78
Is the single most cost-effective deterrent to crime because it creates a psychological deterrent to the intruders.
PROTECTIVE LIGHTING
79
The most familiar type of outdoor security lighting, this is designed to provide two specific results: glare projection or controlled lighting. It consists of a series of fixed luminaries at range to flood a given area continuously during the hours of darkness.
CONTINUOUS LIGHTING
80
The intensity is focused to the intruder while the observer or guard remained in the comparative darkness, the lighting is toward of the approach of an entrance to an installation.
GLARE PROJECTION TYPE
81
The lighting is focused on the pile of items, rather than the background. The width of the lighted strip can be controlled and adjusted to suit the security needs.
CONTROLLED LIGHTING
82
It is designed for reserve or standby use or to supplement continuous systems. A standby system can be most useful to selectively light a particular area in an occasional basis.
STANDBY LIGHTING
83
This system is manually operated and is usually made up of movable search or floodlights that can be located in selected or special locations which will require lighting only for short period of time.
MOVABLE OR PORTABLE LIGHTING
84
This system is used in times of power failure or other emergencies when other system is inoperative.
EMERGENCY LIGHTING
85
It is the least expensive in terms of energy consumed and has the advantage of providing instant illumination when the switch is on.
INCANDESCENT LAMP
86
It is considered more efficient that he incandescent and used widespread in exterior lighting. This emits a purplish white color, caused by an electric current passing through a tube of conducting and luminous gas.
MERCURY VAPOR LAMP
87
It has similar physical appearance to mercury vapour but provides a light source of higher luminous efficiency and better color rendition.
METAL HALIDE
88
This provides good color rendition, high lamp efficiency as well as long life. However, it cannot project light over long distance and thus are not desirable as flood type lights.
FLUORESCENT
89
This has gained acceptance for exterior lighting of parking areas, roadways, buildings and commercial interior installations. Constructed on the same principle as mercury vapour lamps, they emit a golden white to light pink color and this provide high lumen efficiency and relatively good color rendition.
HIGH PRESSURE SODIUM VAPOR
90
These can be used to accommodate most outdoor security lighting needs, including the illumination of boundaries, fences and buildings and for the emphasis of vital areas or particular buildings.
FLOODLIGHTS
91
This lighting equipment received the most widespread notoriety for its value in reducing crime.
STREET LIGHTS
92
These are highly focused incandescent lamp and are designed to pinpoint potential trouble spots.
SEARCH LIGHTS
93
These are wide beam units, primary used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier. It projects a narrow, horizontal beam that is approximately 180 degrees in the horizontal and from 15 to 30 degrees in the vertical plane.
FRESNEL LIGHTS
94
Should be lighted about 25 feet on either side of the gate if possible and the range for vehicular gates should be twice that of street lighting is recommended in these applications, but floodlights can also be used if glare is strictly controlled.
PEDESTRIAN GATE
95
Normally manned by guards inspecting credentials, as well as inspecting for contraband or stolen property, it is critical that the area to be lighted to at least one-foot candle.
VEHICULAR GATE
96
This include vital building, storage depots, and vulnerable control points in communication power, light and were distribution system.
PARKING AREA
97
Used for pedestrian, vehicles or forklift should be lighted to 0.01 candles for security purpose.
THOROUGHFARE
98
Large opened working areas, piers, docks, and other sensitive areas
STORAGE
99
Is an aural or visual signal given by the annunciator to security when intruder actuates device in a protected area. An annunciator is a visual or audible signaling device which initiates conditions of associated circuits.
ALARM
100
Are designed to alert security personnel to consummated or attempted intrusions into an area, building or compound. Each type of alarm is activities in the event that an intruder tempers with the circuitry, a beam or radiated waves.
ALARM SYSTEM
101
It assists the security in detecting, impeding or deterring potential security threat in the installation. Basically, its function is to alert the security personnel for any attempt of intrusion into a protected area, building or compound.
PROTECTIVE ALARM
102
It emits the aural or visual signals or both.
SENSOR OR TRIGGER DEVICE
103
A circuit which transmit the message to the signaling apparatus.
TRANSMISSION LINE
104
It is the signaling system that activates the alarm.
ENUNCIATOR
105
A type of alarm where the control station is located outside the plant or installation. When the alarm is sounded or actuated by subscriber, the central station notifies the police and other public safety agencies.
CENTRAL STATION SYSTEM
106
Centralized monitor of the proprietary alarm system is located in the industrial firm itself with a duty operator. In case of alarm, the duty operator calls whatever is the primary need; fire fighters, police, an ambulance or a bomb disposal unit.
PROPRIETARY SYSTEM
107
This system consists of ranging up a visual or audible alarm near the object to be protected. When an intruder tries to pry a window, the alarm thereat goes off.
LOCAL ALARM
108
Company-owned alarm systems with a unit in the nearest police station so that in case of need, direct call is possible. The company maintains the equipment and lines both for the company and those in the police, fire and other emergency agencies by special arrangement. The auxiliary system can be availed of by radio, landlines, or cell phones.
AUXILIARY ALARM
109
This is local alarm system in which a bell or siren is sounded with no predictable response. These systems are used in residence or small retail establishment which affords a respond system. The hope is that a neighbor or passing patrol car will reach to the alarm and call for police assistance, but such a call is purely a matter of chance.
LOCAL ALARM BY CHANCE SYSTEM
110
This system is set to dial a predetermined number or numbers when the alarm activates. The number selected might be the police or the subscriber’s home number, or both. When the phone is answered, a recording states that an intrusion in progress at the location so alarmed.
DIAL ALARM SYSTEM
111
It will detect any sound caused by attempted force entry. A supersonic microphone speaker sensor is installed in walls, ceilings and floors of the protected area.
AUDIO DETECTION DEVICE
112
It will detect any vibration caused by attempted force entry. A vibration sensitive sensor is attached to walls, ceilings or floors of the protected area. This is economical and easily installed, high salvage value, and flexible in application.
VIBRATION DETECTION DEVICE
113
It will detect any action that moves that fail or wire. An electrically charge strips of tinfoil or wire is used in the doors, windows or glass surfaces of the protected area. This is consistent trouble-free service, and causes few nuisance alarms.
METALLIC FOIL OR WIRE
114
A laser emitter floods a wall or fencing with a beam so that when this beam is disturbed by a physical object, an alarm is activated.
LASER BEAM ALARM
115
An invisible/visible beam is emitted and when this is disturbed or when an intruder break contact with the beam, it will activate the alarm.
PHOTOELECTRIC OR ELECTRIC EYE DEVICE
116
A pattern of radio waves is transmitted and partially reflected back to an antenna. If they strike a moving object, they return at a different frequency which results in initiating an alarm signal. Very effective for protection of interior areas. This have a good Coverage, and Not affected by air current noise sound.
MICROWAVE MOTION DETECTION DEVICE
117
Are place on the floor in such a position that tellers may activate the alarm by placing the front of their foot to engage the activation bar.
FOOT RAIL ACTIVATOR
118
Are usually place in the teller’s cash drawer and connected to the alarm system using a wire connector. When currency is removed from the devices, the alarm is activated.
BILL TRAPS OR CURRENCY ACTIVATION DEVICES
119
These are installed inside the desk or teller station which can be activated by knee or thigh pressure. They are commonly found in location where personnel usually perform their duties from seated position.
KNEE OR THIGH BUTTONS
120
Like the foot rail permit alarm activation in relatively safety while both hands remain clear in view of the robbers.
FOOT BUTTON
121
Required pressure on both side of the device and therefore the probability of accidental alarm is reduced.
DOUBLE SQUEEZE BUTTON
122
Is one of the most widely used physical security devices in the asset protection program of an installation. It complements other physical safeguards if the installation against any possible surreptitious entry.
LOCK
123
Defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry into a building, room, container or hiding place.
LOCK
124
A term in England for lock picker, safecracker, and penetrator or restricted areas or room.
PETERMAN
125
It uses some sort of arrangement of internal physical barriers (wards tumblers) which prevent the lock from operating unless they are properly aligned. The key is the device used to align these internal barriers so that the lock may be operated.
KEY OPERATED MECHANICAL LOCK
126
Designed for the use of the automobile industry and are in general use in car doors today, because this lock is easy and cheap to be manufactured, its use has expanded to other areas such as desk, files and padlocks. The delay afforded is approximately ten minutes.
DISK TUMBLER LOCK
127
Are difficult to define in terms of security, since they vary greatly in their effectiveness. These locks are used in safe deposit boxes and are for all practical purposes, pick proof. The least of these locks are used in desk, lockers and cabinets and are generally less secure than pin tumbler lock.
LEVER TUMBLER LOCK
128
Offer very little security, this type of lock must therefore be use only to have privacy, but not to provide a degree of security.
WARDED LOCK
129
A portable and detachable lock having a sliding hasp which passes through a staple ring and is then made fasten or secured.
PADLOCK
130
Instead of using the key to align the tumblers, the combination mechanism uses numbers, letters or other symbols as reference point which enables an operator to align them manually.
COMBINATION LOCK
131
A type of lock that can be opened by pressing a series of numbered button in the proper sequence.
CODE-OPERATED LOCK
132
A type of lock that can be opened and closed remotely by electrical means.
ELECTRICAL LOCK
133
A type of lock operated by coded card.
CARD-OPERATED LOCK
134
A specific key, which operates the lock and has a particular combination cuts, or biting, which match the arrangement of the tumblers in the lock.
CHANGE KEY
135
A key that will open all the lock within a particular area or grouping in a given facility.
SUB-MASTER KEY
136
A special key capable of opening a series of lock.
MASTER KEY
137
A key that will open everything in a system involving two or more master key groups.
GRAND MASTER KEY
138
Once an effective key control has been installed, positive control of all keys must be gained and maintained. This can be accomplished only if it is established in conjunction with installation of new locking devices.
KEY CONTROL
139
A well-constructed cabinet will have to be produced. The cabinet will have to be procured. The cabinet will have to be of sufficient size to hold the original key to every lock in the system. It should be secured at all times.
KEY CABINET
140
Some administrative means must be set up to record code numbers and indicates to whom keys to specific locks have been issued.
KEY RECORD
141
Periodic inventories will have to be made of all duplicate and original keys in the hands of the employees whom they have been issued.
INVENTORIES
142
In addition to periodic inventory, an unannounced audit should be made of all key control records and procedures by a member of management.
AUDITS
143
Should be made to the person responsible for key control from the personnel department indicating all person who have left or will be leaving the company. In the event that a key has been issued, steps should be initiated to ensure that the key is covered.
DAILY REPORT
144
Any person who shall without lawful cause have in possession of picklocks or similar tools especially to the commission of the crime or robbery, shall be punished by arresto mayor in its maximum period to prison correctional in its minimum period. The same penalty shall be imposed upon any person who shall make such tool. If the offender is a locksmith, shall suffer the penalty of prison correctional in its medium and maximum period.
ARTICLE 304 REVISE PENAL CODE
145
The term “False Key” shall be deemed to include: a) The tool mentioned in the next proceeding articles. b) Genuine keys stolen from the owner. c) Any key other than those intended by the owner for used in the lock forcibly opened by the offender.
ARTICLE 305 REVISE PENAL CODE
146
The final line of defense at any facility is in the high security storage where papers, records, plans or cashable instrument, precious metals or other especially valuable assets are protected. These security containers will be of a size and quality, which the nature of the business dictates.
SECURITY CABINET
147
A metallic container used for the safekeeping of documents or small items in an office or installation. Can be classified as either robbery or burglary resistance depending upon the use and need.
SAFE
148
A safe should not have at any one time a temperature above 350 degrees Fahrenheit.
FIRE ENDURANCE
149
Test to determine if sudden rise in temperature will not cause the safe to rupture. If the safe can withstand 2000 degrees Fahrenheit for 30 minutes and will not crack or open, then it has passed the explosion test.
EXPLAINS HAZARD TEST
150
Aimed at determining the strength of a safe to withstand the collapse of a building during fire.
FIRE AND IMPACT TEST
151
Heavily constructed fire and burglar resistance container usually a part of the building structure used to keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but smaller than a file room.
VAULT
152
A cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited people to work on the records inside.
FILE ROOM
153
Identification cards, passes, passwords, etc.
ARTIFICIAL RECOGNITION
154
The badge or pass coded for authorization to enter specific areas is issued to an employee who keeps it in his possession until his authorization is terminates.
SINGLE PASS SYSTEM
155
An exchange takes place at the entrance of each controlled area. Upon leaving the personnel surrenders his badge or passes and retrieve back his basic identification.
PASS EXCHANGE SYSTEM
156
This provides an extra measure of security by requiring that an exchange take place at the entrance of each restricted area.
MULTIPLE PASS SYSTEM
157
Are those areas where access is restricted as to entrance or movement by all authorized personnel and vehicles. It should additionally mark by a fence or other barrier, and access to it should limited to as few guests as possible.
CONTROLLED AREA
158
Are those within the controlled area where a greater degree of security is required.
LIMITED AREA
159
Are used only for handling and storage of high value cargo and classified documents. The number of people authorized to enter this area should be strictly limited, and the area should be under surveillance at all times.
EXCLUSION AREA
160
Controlling traffic in and out within a facility is essential to its security program. Perimeter barriers, locked doors and screened windows, prevent or deter the entry of unauthorized visitors, but since some traffic essential to every operation, no matter how highly, classified it maybe, provision must be made for the control of this movement.
TRAFFIC CONTROL SYSTEM
161
The most practical and generally accepted system is the use of badges and identification cards. Generally speaking, this system designates when and where and how passes should be displayed, and to whom, what is to be done in case of the loss of the pass; procedure for taking a pass from terminating employees; and a system in cancellation and re-issue of all passes; either as a security review or when a significant number of badges have reported lost or stolen.
PERSONNEL IDENTIFICATION
162
Security should establish proper methods of establishing the authority for admission of visitors as well as the limitation thereat.
VISITORS MOVEMENT CONTROL
163
All visitors to any facility should be required to identify them and should be given a visitor’s ID by the security. Should be filled up with the named of visitors, nature and duration of visit.
VISITOR'S LOGBOOK
164
Taking of photographs should also be considered. Extreme caution must be exercised in areas where classified information is displayed to preclude unauthorized taking of pictures of the installation. If a visitor has camera and it is prohibited to take picture, said camera should be left in the care of security with corresponding receipt.
PHOTOGRAPH
165
If possible, visitors should be escorted by the security to monitor their activity within the establishment and guide them where to go.
ESCORT
166
Separate access for visitors and employees of the establishment should be provided.
VISITOR ENTRANCES
167
If there is a long delay or time lapse between the departure and arrival, the visitors may be required to show cause for the delay.
TIME TRAVELED
168
Every facility must establish a system for the control of package entering or leaving the premises. However, desirable it might seem it is simply unrealistic to suppose that a blanket rule.
PACKAGE MOVEMENT CONTROL
169
Of the three major aspects of security, this is considered as the most important. This is for the simple reason that security involves people, both an asset to be protected and as source of security threats.
PERSONNEL SECURITY
170
This technique is very expensive but necessary in personnel security. It serves to verify information on the application form and to obtain other information pertinent to the decision to employ.
BACKGROUND INVESTIGATION
171
Is the process of inspecting or examining with careful thoroughness. Is a personal interview conducted under stress. It is based on information previously given by the applicant. Other information issued during the interview, such as those discovered in the BI, which confirms or denies which given by the applicant.
POSITIVE VETTING
172
Is the process whereby a subject’s reaction in a future critical situation is predicted by observing his behaviour, or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test. The Reid Report is an example of honesty test.
PROWLING
173
This process of using devices in detecting deception during the interview stage. This includes the use of a Polygraph, Psychological Stress Evaluator and Voice Analyzer.
DECEPTION DETECTION TECHNIQUES
174
This type of investigation seeks to gather information on income and mode of living, sometimes referred to as the earning to debt ratio.
FINANCIAL AND LIFESTYLE INQUIRY
175
This is the placement of an agent in a role in which the agent’s true identity and role remains unknown, in order to obtain information for criminal prosecution or for recovery or limitation of asset losses.
UNDERCOVER INVESTIGATION
176
This a valuable tool because it gives departing employees an opportunity to list grievances. It offers security managers an opportunity to learn of problems not previously known. Incorporating a checklist of company issued property and confronting a departing employee of this has resulted in reducing losses of company property. Debriefing an employee is also incorporated into the exit interview to remind employees of their continuing legal obligation to safeguard confidential company information.
EXIT INTERVIEW
177
Is conducted to develop security awareness among employees in the company. It should cover all employees, regardless of rank or position.
SECURITY EDUCATION
178
Are to acquaint all the employees the rationale behind the security measures and to insure their cooperation at all times.
SECURITY EDUCATION PROGRAM
179
It is the first contact of the prospective employee wherein the interviewer determines the suitability of the applicant for employment through his given answer on the different type of questions being conducted. It is in this stage where; the interviewer may start providing the necessary information as to the overview of company security policies and at the same time on the employee accountability and corresponding penalties that could result from violation there from.
INITIAL INTERVIEW
180
It is in this stage where new employees receive detailed presentation of personnel security policy. Usually handouts or employee’s manual are being distributed for reference. New employees also requested to sign acknowledgement that they have been aware of the existing company policies and will abide the same.
ORIENTATION AND TRAINING
181
It is design to remind employees of the company about their responsibilities, review the guidelines and policies, introduction of new policies and regulations and a movement of getting employees feedback about the company policies that is being implemented.
REFRESHER CONFERENCE
182
This employed as an indirect approach of educating the employees, such as posting security posters and distributing fliers.
SECURITY REMINDERS
183
It is the act of emphasizing the importance and role of security achieving the company goals and objectives. It involves security employee cooperation and support.
SECURITY PROMOTION
184
Letters, diary and notebooks. These should be treated usually the same with official document.
PERSONAL DOCUMENT
185
Orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain of command.
OFFICIAL DOCUMENT
186
Each document or information has a life cycle in the sense that its usefulness has a beginning and an end. It passes various stages from the time it is created until it is finally disposed.
DOCUMENT/INFORMATION CYCLE
187
Is any information and materials the unauthorized disclosure of it would cause exceptionally grave damage to the nation, politically, economically and military operation.
TOP SECRET (GREEN COLOR CODE)
188
Is any information and material, the unauthorized disclosure of it would endager national security cause serious injury to the interest or prestige of the nation or any governmental activity or advantage to a foreign nation.
SECRET (RED COLOR CODE)
189
Is any information or material, the unauthorized disclosure of it would be prejudicial to the interest and prestige of the national or governmental activity or would cause administrative embarrassment or unwanted injury to and of advantage to and be of advantage to a foreign country.
CONFIDENTIAL (BLUE COLOR CODE)
190
Is any information and material which requires special protection other than those determines confidential, secret and top secret.
RESTRICTED (WHITE OR NO COLOR CODE)
191
In this category these are records that are irreplaceable, records of which reproduction does not have the same value as the original; records needed to recover cash, to replace building, equipment’s, raw materials, finished products, and work in process and records needed to avoid delay in restoration of production, sales and services.
CLASS I - VITAL DOCUMENTS
192
This includes records the reproduction of which will close considerable expense and labor, or considerable delay.
CLASS II - IMPORTANT DOCUMENTS
193
This includes records whose loss might cause inconvenience but could be readily replaced and which would not in the meantime present restoration of the business.
CLASS III - USEFUL DOCUMENTS
194
This record are daily files, routine in nature even if lost or destroyed, will not affect operation or administration. This class represent the bulk of records which should not be even attempted to be protected in the event of disasters. They should, however, be kept in ordinary files ready for reference, if needed, and usually discarded after some period of time.
CLASS IV - NON-ESSENTIAL DOCUMENTS
195
This consist of any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who don’t know or use it. It may be a formula for a chemical compound a process of manufacturing, treating or preserving materials, a pattern for a machine or device, or a list of customers. It differs from other secret information as to single or ephemeral events. A trade secret is a process or device for continuous use in the protection of the business.
TRADE SECRETS
196
This is a grant made by the government to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of years.
PATENTS
197
Any act or condition which may result in the compromise of information, loss of life, and loss or destruction of property or disruption of the activity of the installation.
SECURITY HAZARD
198
These are hazards which arise from natural phenomena. The following are types of natural hazard or disasters
NATURAL HAZARD
199
These are hazards which are the result of a state of mind, attitude, weaknesses or character traits of one or more persons. They can be acts of commission or omission, both overt and covert, which can disrupt operation of a plant or installation.
HUMAN OR MAN-MADE HAZARD
200
Aims to protect people from physical violence, whether from the state or external states, from violent individuals and sub- state actors, from domestic abuse, or from predatory adults. For many people, the greatest source of anxiety is crime, particularly violent crime.
VIP SECURITY
201
Very important Person
VIP
202
One or more persons accompanying another to give guidance or protection or to pay honor.
ESCORT
203
A person or a grouped of persons usually armed and responsible for the physical safety of one or more specific person.
BODY GUARD
204
Covers the surrounding areas of engagement. conducts prophylactic (neutralize the area), operations in the area of engagement.
AREA SECURITY
205
Secures the immediate areas surrounding the place of engagement. Usually these are the uniformed men.
PERIMETER SECURITY
206
This are the advanced security at the place of engagement before the arrival of the VIP. Sanitize the engagement area.
ADVANCE SECURITY
207
Accompanies the VIP where ever he goes. Maximum of four (4) persons.
CLOSE-IN SECURITY
208
On standby for possible back- up / re- enforcement.
RESERVE SECURITY
209
Neutralize the possible route of the VIP party.
ROUTINE SECURITY
210
Is a decisive point of a condition, improper handling on which immediately places under threat or danger of one’s life, limbs, freedom and property.
CRISIS
211
Is the totality of action of handling or responding to a given crisis situation.
CRISIS MANAGEMENT
212
Is a complete and comprehensive plan of actions designed to protect life, limbs, freedom and property, before, during, and after any given crisis situation.
CRISIS MANAGEMENT PLAN
213
Events caused by force of nature
NATURAL CRISIS
214
Events caused through instrumentality of men.
MAN-MADE CRISIS
215
Is a condition of an enterprise whereby normal work operation is stopped as a result of a strike and lockout.
WORK STOPPAGE
216
Is a temporary stoppage of work by concerned action or employees as a result of a current labor industrial dispute.
STRIKE
217
Is the temporary refusal of any employer to furnish work.
LOCKOUT
218
The transfer of thought from the mind of one person to the mind of another thought a common medium or channel.
COMMUNICATION
219
The exchange of thoughts or opinions by conversations, or seminar. The exchange could be from oral, written and other forms.
CONFERENCE
220
Refers to the common language known for two or more individuals who want to exchange thought or ideas with each other.
MEDIUM COMMUNICATION
221
Is the common medium of communication in Baguio City
ILOCANO
222
Is the process of sending and receiving messages to achieve understanding.
COMMUNICATION
223
refers to the equipment’s being used to transfer thoughts or ideas.
CHANNEL OF COMMUNICATION
224
Communication on electromagnetic waves transmitted through the space.
HAND HELD RADIO OR WALKIE TALKIE
225
For hobby and emergency purposes type of radio.
AMATEUR RADIO
226
For business purposes type of radio.
COMMERCIAL RADIO