Professional Documents
Culture Documents
REview Industrial Management
REview Industrial Management
A.Hazards in General
As earlier defined, hazard could mean exposure to the chance of loss or injury; or
the term is synonymous to risk and or peril. In the field of industrial security, any
hazardous situation or conditions are called security hazards.
B.Types of Hazards
1.Natural hazards
-These are hazards which arise from Natural phenomena.
b. Earthquakes
c. Fire (not caused by human action) such as those cause by lightning
e. Lightning Storms
f. Extreme temperature and humidity
a. Sabotage
b. Espionage
- it is describes as the activity of spying or the use of spying or spies to gather secret
information.
c. Pilferage
- the act of stealing small things or items of little value, especially habitually.
- Both acts involved the taking of another property with intent to gain without the
owner’s consent. Theft is committed without violence against or intimidation of person
nor force upon things while robbery involves intimidation of persons or force upon things.
e. Disloyalty
f. Disaffections
g. Subversive Activities
1. Faith- In the sphere of security operation, faith can be a questionable virtue. Those
person in which trust of their fellowmen is an abiding instinct.
2. Conceit – it is the desire to satisfy the ego or empress someone, provides the enemy
agents with his best source of information.
3. . Enthusiasm and pride – these are common causes of indiscretion. Anyone who is
truly interested in his job find it difficult not to talk and write about it.
4. Ignorance – many people compromise vital information simply because they do not
realize its value and do not know the methods by which intelligence agencies operate.
Security education
Security Education can be described as a learning initiative that is aimed at reducing the total
number of security loopholes that are likely to occur due to a lack of employee awareness.
Concept
A. Security education
When a loss or damage of property occurs, company management puts the blame on the
security personnel. One thing is always forgotten, “security is everybody’s business.”
It has been stated previously that human barriers includes shop workers, utility workers, rank-
and-file employees, and management staff of companies and business establishments.
With these, company employees should be educated and made aware of their roles in the
security of their own company. The ultimate purpose is to make everybody “ security
conscious.”
1. Guidance for all supervisory indoctrination and executive levels of the organization.
2. A mandatory indoctrination on security for all new personnel before their assignment to their
respective jobs.
3. Development of high degree of security consciousness among the selected supervisors and
other key personnel in the program that should be containing and supported by the top of the
management.
6. To develop discipline, loyalty and belongingness. These attribute fully imbued will result in
the effectiveness and efficiency.
Security education program to be effective must have the support and personnel on the
reasons, the main thrust being to acquaint all personnel on the reasons for the security
measures.
This program should be given to all personnel from the work group that has no access to
classified endeavours to the super and executives handling sensitive plans and policies of the
industrial firm. The program is given a “ follow-through” which will be continuing and tailored
to the specific group levels depending on their access to restricted work and activity.
Security managers or company security coordinators design program that will enhance the
security consciousness of the employees, in addition, identification of hazards and handling of
crises should also be taught. The security education programs includes:
g. g. Proper waste disposal- this prevent chances of pilferage; espionage by the proper
disposal of documents (shredding of the waste documents); and destructive fire by
segregating flammable waste substances;
Uniform shall made of fast navy thick fabric “the trouser for daily security officer wear”
“Service shirt of field of perimeter guards
It is consist of:
Head gear – any covering for the head, especially a hat, a cap, bonnet , ETC.
Government Security-white
Further the following shall be observed as part of the uniform of security unit
Pershing cup which is fast navy blue with gold strap, black visor octagonal nylon net top
and prescribe SGSD metal cap device. For ceremonial purposes, use it with the black strap.
1. Service Uniform
3. Gala Uniform
For ceremonial purpose only and the expense of the establishments conducting the
ceremonies .
1. Pershing cap
2. Blouse
3. Buttons
4. Shirt
5. Necktie
6. Trousers
7. A. Service Trouser
A. Service Trouser
Fast navy blue, straight cut, slanted pockets and two back pockets without flaps.
B. Service Belt
C. Footwear
1. Service Shoes –black leather shoes and with rubber hills and sole.
It shall be made of thick fabric and it shall consist of a modified overseas cap two (2) ply
similar to the women police service, service skirts or (palda) on blouse, service belt, and black
leather shoes.
A. Head gear
FAST NAVY BLUE (2ply) cup with piping but with regulation cap device.
B. Service shirt
PSA - fast navy blue and etc. two breast pocket with cover flaps and navy blue front
buttons, tucked in.
CSF- similar manner with PSA light gray in color shall fabric.
C. Service trouser
Fast navy blue, thick fabric, straight cut with slanted side pocket, two back pocket
without cover flaps.
D. Service skirt
E. Service belt
F. Footwear
A. National Badge
D. Collar Device
The collar device is four golden attached bars.
E. Name Cloth
A holder for carrying a hand gun or other fire arm, typically made of leather and worn
on a belt under a arm.
Lanyard
Same style use by AFP or PNP personnel, shall be worn security agency officer and
security guard.
Footwear
Black leather shoes with rubber hills and soles, Plain top, low cat black shoes, worn with
plain black sacks.
Ball cap
B. Uniform ( female)
It shall consist of an over see cup two (2) ply, service bush jacket, service blouse,
service belt, lanyard and black leather shoes.
Bush Cap
Past navy blue (2 ply) without piping but with regulation cup device.
White in color and shall be sewn in same style as that of security agency officer.
Service Shirt
White ramie polyester fabric and shall be sewn short sleeves or long sleeves as the
case maybe, shoulder straps, two breast pockets with cover flaps and navy blue front buttons.
Service belt
These adhesives cannot be used to bond tire cords to rubber, as the service
temperature of the belt is very high.
Lanyard
Lanyard is a cord or strap worn around the neck, shoulder, or wrist to carry such
item as keys or identification cards.
Service Skirts
Aline skirts with two front slide pockets. It shall be worn when posted indoors.
Footwear
Plain black leather shoes, low-cut rubber shoes sales and heel ( maximum of five cm)
and black shoe laces.
C. Paraphernalia
The proposed special set of uniform for security shall be prescribed or authorized to be
issued only on a case to case basis at the areas as herein authorized upon prior request of the
clients concerned
All employers owners operators of PSA/CSF shall provide at least one (1)
set of the prescribed uniform free of charge to their respective security guard for every year of
service with them. Likewise, all licensed security guard shall provide themselves with one (1)
set of uniform once a year unless their employers provide it for free.
PROTECTIVE ALARMS
3. The disadvantage of Photo-Cell include the beam can be bypassed by crawling underneath
or climbing over it.
9. Bill Traps
C. Multiplex system
D. Digital communicator
E. Telephone dialler
G. Video verification
2. Proprietary System-This functions in the same way as the central system except that it is
owned and leased by the subscriber, operated and located in the facility.
3. Local alarm system –Consists of rigging up a visual or audible alarm near the object to be
protected, a bell or light indicates an attempted or successful intrusion.
4. Auxiliary system-In this system installation circuits are led into local police or fire dept. by
leased telephone lines usually by special arrangements.
5. Local alarm –By-Chance System- A local alarm system in w/c a bell or siren is sounded w/
no predictable response.
6. Dial Alarm System- This system is set to dial a predestined number when the alarm is
activated.
2. An enunciator console indicating the audible or aural signal for specific location of incident.
PERIMETER PROTECTION
1. Door Switches
2. 2. Metallic Foil (window tape
3. 3.Glass break detectors
4. Wooden Screens
5. . Window Screens
6. 6.Lace and Panelling
This involves detection of intrusions inside the building or w/in an area w/ the use of
Indoor Detection Devices.
Infrared Rays
Ultrasonic
Video
These are electronic devices for detecting entry , or in some cases , attempted
entry of an intruder and signalling an alarm.
It used for detecting entry or attempted entry across the external perimeter of
a key point and signalling an alarm.
PROTECTION OF SENSITIVE
MATERIALS AND INFORMATION
CONCEPT
A. RATIONAL
B. PROPRIETARY INFORMATION
This information that in some special war relates to the status or activities of the
possessors and over which the possessor asserts ownership. In the business community,
proprietary information relates to the structure, produce or business methods of the
organization. It is usually protected in some way against casual or general disclosure.
Proprietary pertains to anything used with exclusive legal right or anything used,
manufactured or sold by a person or company with an exclusive property right, for example a
patent or trademark.
1. Trade Secrets- This consist formula, pattern, device or compilation of information which is
used in one’s business and which gives him an opportunity to gain an advantage over
competitions who do not know or use it. It may be a formula for a chemical compound a
process of manufacturing, treating or preserving materials a pattern for machine or device, or a
list of costumers.
It differs from other secrets information as to single or ephemeral events. A trade secret is
a process or device for continuous use in the protection of the business.
2.Patents- This a grant made by the government to an inventor, conveying or securing or
securing to him the exclusive right to make, use, or sell his invention for terms of years.
Under the law, patents and trade secrets are distinguished by the following
characteristics:
1. Requirements for obtaining a patent are specific. To qualify for a patent the invention
must be more than novel and useful. It must represent a positive contribution beyond the skill
of the average person.
3. A trade secrets remains secret as long as it continues to meet trade secret tests while the
exclusive right to patent protection expires after 17 years.
Realizing that the most serious threats to trade secrets is the employee , a measure of
protection is often realized through the use of employee agreements which restrict the
employee’s ability to disclose information without specific authorization to the company. The
following countermeasures may be adopted:
1. Policy and procedure statements regarding all sensitive information- this involves the setting
of a clear-cut policy concerning the secrecy and proper handling of all sensitive information.
2. Pre and post employment screening and review – this is done to prevent the hiring of
unwanted personnel.
3. Non-disclosure agreements from employees, vendors, contractors and visitors- this is done
to emphasize to all concerned individual that the patent or trade secrets is the heart of the
business establishment or organization.
5. Awareness programs – this involves the education of all concerned company personnel which
emphasized that disclosure of company secrets is detrimental to the cause of company.
6. Physical security measures- this is the use of protective containers (as discussed earlier).
7. Informed monitoring of routine activities.
PHYSICAL SECURITY
OVERVIEW
The various types of physical security will be discussed in this lesson alongside with barriers that
are placed between the potential intruder and the matter to be protected
PHYSICAL SECURITY as earlier discussed, is the broadest branch of security which is actually a
system of barriers placed between potential intruders and the matters to be protected. It is
concerned with the physical measures adopted to prevent unauthorized access to equipment,
facilities, materials, and documents, and to safeguard them against espionage, sabotage
damage and theft.
Physical security covers other types of security to protect equipment, documents, facilities and
materials against theft damage, sabotage or espionage. It also encompasses protection of
personnel from any criminal act.
Acquisition of information is the ultimate results, and the means and form in which the
information is obtained.
It also varies depending on the type and location of facility, and other factors needing security.
The levels of physical security could be any of the following:
1. Minimum Security
2. Low Level Security
3. Medium Security
Is designed to impede, detect and assess most external activity and some
unauthorized internal activity that range from simple shoplifting to conspiracy to commit
sabotage. This includes the:
5. Maximum Security
Definition of Terminologies
Security is all about reducing or eliminating the impact or effect of potential risk or
hazard. Security managers normally conduct security surveys and security inspections to
determine the needed security measures. The following terms are defined to guide
security managers in determining the appropriate security measures in response to
potential risks or hazard.
2.SECURITY HAZARDS- any act or condition which may result in the compromise of
information. Loss of life, loss or destruction of property or desruption of the objective of
the installation. It can also be defined as an act or condition affecting the safe operation
of the facility caused by human action accidental or intentional.
3.RISK- It is the potential damage or loss of an asset. The level of risk is a combination of
two factors. The value placed on that asset by its owner and the consequence impact
adverse effect of the loss or damage to that asset and; the likelihood that aspecific
vulnerability will be exploited by a particular treat.
5.RISK ANALYSIS- it is the analysis of risk which includes examination of the vulnerability,
probability and criticality of potential threats and include natural and man made risk.
7.ASSET- any information, facility, material, information or activity which has a positive
value to its owner.
10.CRITICALITY- It is the impact of the loss as an measured in the finacial terms. How
important it is in terms of the survival or existence of the organization.
To lessen or eliminate the effect of risks or hazards, the following are the alternatives
and strategies that are commonly applied by industrial security managers:
1. RISK AVOIDANCE- this is the eliminating removing the risk totally from the
business, government, or industrial environment for which the risk manager has
responsibility. A good example of this is the proper disposal of inflammable substances.
2. RISK REDUCTION- this is the decreasing the risk by minimizing the probability of
the potential loss. The reduction of criminal opportunity is often accomplished by
situational crime prevention strategies to discourage ,deter, or denied criminal
incidents. A good example is the construction of fences and similar physical barriers.