This document outlines various security devices, systems, and processes used to protect assets. It groups these into 7 categories: [1] protective alarms and detection devices; [2] locks and access controls; [3] key and master key systems; [4] storage facilities like vaults and file rooms; [5] personnel security screening and verification processes; [6] ongoing personnel security management; and [7] relevant laws. The document provides concise descriptions of common security equipment, protocols, and legal considerations across these different aspects of asset protection.
This document outlines various security devices, systems, and processes used to protect assets. It groups these into 7 categories: [1] protective alarms and detection devices; [2] locks and access controls; [3] key and master key systems; [4] storage facilities like vaults and file rooms; [5] personnel security screening and verification processes; [6] ongoing personnel security management; and [7] relevant laws. The document provides concise descriptions of common security equipment, protocols, and legal considerations across these different aspects of asset protection.
This document outlines various security devices, systems, and processes used to protect assets. It groups these into 7 categories: [1] protective alarms and detection devices; [2] locks and access controls; [3] key and master key systems; [4] storage facilities like vaults and file rooms; [5] personnel security screening and verification processes; [6] ongoing personnel security management; and [7] relevant laws. The document provides concise descriptions of common security equipment, protocols, and legal considerations across these different aspects of asset protection.
- It is a security device that is - Is an aural or visual signal given commonly known as a warning device. by the enunciator to security when an intruder actuates a device in a protective 1. SENSOR OR TRIGGER DEVICE area. - It is responsible for detecting the AUDIO DETECTION DEVICE aural or visual signals or it can be both. - It will detect any sound caused by 2. TRANSMISSION LINE an attempted force of entry. - A device responsible to deliver VIBRATION DETECTION DEVICE the message to the signaling device. - It will detect any vibration caused by an attempted force of entry. 3. ENUNCIATOR METALLIC FOIL OR WIRE -A signaling system that activates - It will detect any action that the alarm especially when there is danger. moves the foil or wire. CENTRAL STATION SYSTEM LASER-BEAM ALARM - A protective system in which the - A laser emitted floods walls or operation of protection devices and fencing with a beam. circuits is automatically signaled to a ELECTRIC EYE DEVICE commercial agency. - An invisible/visible beam is emitted. PROPRIETARY SYSTEM MICROWAVE MOTION DETECTION - It responds to all alarms by the DEVICE facility’s own security or by the fire - A pattern of radio waves. department. FOOT RAIL ACTIVATOR LOCAL ALARM SYSTEM - Is placed on the floor in such a - It is a warning device that can be position. aural or visual installed in a protected BILL TRAPS area. - Is usually placed in the teller’s cash drawer. AUXILIARY SYSTEM KNEE OR THIGH BUTTONS - The installations circuits are - can be activated by knee or thigh connected to the local police or any pressure. concerned department. FOOT BUTTON - relative safety while both hands LOCAL ALARM remain clear in view of the robbers. - It is an alarm system installed and applied in the establishment. INTRUSION SYSTEM - monitors network traffic for DIAL ALARM SYSTEM suspicious activity and alerts when such -This is a type of alarm system in activity is discovered. which there is a hotline number being set to dial when the alarm is activated. (GROUP 3) (GROUP 4) LOCKS KEY CABINET - A mechanical, electrical, and - The cabinet will have to be of hydraulic or electronic device to prevent sufficient size to hold the original key. entry into a building. KEY RECORDS PADLOCKS - Set up to record code numbers of - A portable and detachable lock the locks and who received keys to having a sliding hasp. specific locks. KEY-OPERATED MECHANICAL INVENTORIES LOCK. - Periodic accounts must be made - It prevents the lock from of all duplicates and original keys. operating unless they are properly AUDITS aligned. - made of all the key control records and procedures by a member of WARDED LOCKS the management. - This type of lock does not provide DAILY RECORD high-level degree of security. - A regular report must be made to the person responsible for the key control from DISC TUMBLER LOCKS the personnel department. - Is a flat metal tumbler with an CHANGE KEY open center fitted into slots. - A specific key, which operates the LEVER TUMBLER LOCKS lock, and has a particular combination of -Each lever in the lock hinges on a cuts. fixed point. SUB-MASTER KEY PIN TUMBLER LOCK - A key that could open all the locks - a number of round pin or within a particular area. tumblers operating a cylinder. GRAND MASTER KEY - A key that will open everything COMBINATION LOCKS in a system involving two or more master - The combination mechanism uses key groups. numbers, letters or symbols. MASTER KEYING SYSTEM CODE OPERATED LOCKS - keys can open a group or groups - It is a combination type of lock of locks. that has no key needed. - Interchangeable cylinder cores in the locks. ELECTROMAGNETIC LOCKS KEYING - These are devices holding a door - Used to operate an expensive lock by magnetism. by moving it in a keyhole. CARD OPERATED LOCKS MASTER KEYING - These are electronically operated - Development of interchangeable by utilizing a systematic card to open. cylinder cores. (GROUP 4) VAULT MASON KEYING - It is a robustly built fire-resistant - The use of a key to open the main storage facility. entrance and the office. FILE ROOM ONE LEVEL (CHANGE KEY) - is made lighter than a vault. - can be operated by change key - 10,000 cubic meters, At least 12 only and keyed differently or alike or feet tall. required. TWO-LEVEL (MASTER KEY) (GROUP 6) - All levels are operated by the PERSONNEL SECURITY change key and master key. - Is a system of policies and THREE-LEVEL (GMK) procedures that seek to manage the risk of - All locks are operated by change staff. keys, master keys, and grand master keys. PRE-EMPLOYMENT SCREENING FOUR-LEVEL (GGMK) - Personnel security measures are - All locks operated similarly to usually undertaken during the three levels. recruitment process. FIVE-LEVEL (GGMK) APPLICATION FORM - All locks operated similarly to - Job applicants require to provide four levels. all relevant information and confirm its ARTICLE 304 of the Revised Penal Code. correctness with a signature. Possession of Picklock or Similar Tools INTERVIEW - Similar tools especially to the - provides an opportunity to commission of crime or robbery. discuss the candidate’s suitability for ARTICLE 305 of the Revised Penal Code. employment. False Key. The term “false key” IDENTITY VERIFICATION - Genuine keys were stolen from - Verifying the applicant’s identity the owner. is a critical measure in the screening SECURITY CABINET process. - It is the final line of defense of THE PAPER-BASED APPROACH any facility. - It is the first method of verifying identity. (GROUP 5) MEDIA SEARCHES PROTECTIVE CABINETS - Involve the evaluation of an - High-security storage facility individual based on their online where papers, plans, money, and other reputation. negotiable items are held. SAFE - It is a metallic container. - Weigh at least 750 lbs. (GROUP 7) Ongoing Personnel Security Useful Document - manages the risk of staff or - a record, that could be readily contractors exploiting legitimate access to replaced and may not present an an organization’s assets or premises for insurmountable obstacle to the prompt unauthorized purposes. restoration of the business Security Training and Awareness Non-essential Document - to gain the necessary skills to - a record that may include daily perform their responsibilities within the files, routine in nature, the loss of which organization’s security network. will not affect the organization’s Addressing Behaviors of Concern operation. - addressing negative behavior and Creation ensuring that security measures are - information is discovered and followed. developed. Controlling Employee Access Use - Organizations usually use access - Undoubtedly, information is controls as physical security measures created for use. against outsiders. Storage and Retrieval EXIT PROCEDURES - Used information should be put - A formal and thorough away for future use. procedure for all staff and contractor Transfer departures to ensure appropriate actions - This involves the transfer of are taken to protect the organization information from active to inactive The Exit Interview storage. - The employee’s experiences and Information is expansive reasons for leaving may suggest needed - It is unlike other business changes and open the eyes of the resources because it can easily expand to management. cover a wider scope. Information requires barriers - assets were stored in computer (GROUP 8) systems. DOCUMENT AND INFORMATION Information is costly and important SECURITY - Organizations should protect - Protecting crucial documents has information assets because it is costly to become progressively more critical in this acquire and maintain. age of fast-growing technology. Information is coveted Vital Document - someone wants an opportunity to - an irreplaceable record. take it away Information has a limited life Important Document - certain information can lose all - a record of considerable expense or most of its value. and labor or considerable delay.