Professional Documents
Culture Documents
Are those devices installed to help detect fires or detect anything that causes fire such as
smoke or unusual riding of temperature.
b. Dry pipe system – the pipes are filled with air under pressure
2. Fire pumps – are mechanical device of supplying water which can be manual or motor
driven.
3. Stand pipes – are galvanized iron steel or plastic pipes located inside a building from the
lowest to the top floor with water under pressure for cause in case of fire.
Portable fire extinguisher – this fire is a fire fighting equipment which can be portable or in a cart
that is used to put out ifre depending on the contents to extinguish certain types.
Alarm system in buildings may also be equipped with detection system that will transmit
alarm. Some detectors are designed to respond to smoke and others to heat.
This system provides sensors in fire prone areas in a building whereby smoke or heat will actuate
these strategically located sensors or automatic fire detectors.
D. SMOKE DETECTORS
Smoke detectors offer some advantages over fire detectors because fire gets big, there will
be smoke.
These detectors trigger an alarm ahead of the heat –actuated device or detector.
Ionization device or Radio-active device – this contains small radioactive source for ionizing
the air molecules between a pair of electrodes, permitting a very small current to flow
between the pair.
Smoke detector – this uses a photoelectric cell. Some of these detectors, smoke that can
enters obscures a steady beam light, in others the smoke scatters a light ray from diode so
that cell can detect it.
Lock is one of the most widely used physical security devices in the asset protection program
of an installation. It complements other physical safeguards of the installation against any possible
surreptitious entry.
What is a LOCK?
Types of Locks
2. Padlock
3. Combination Lock
4. Code-operated lock
5. Electrical lock
6. Card-operated lock
it use some sort of arrangement of internal physical barriers (wards tumblers) which prevent
the lock from operating unless they are properly aligned. The key is the device used to align these
internal barriers so that the lock may be operated.
Padlock
a portable and detachable lock having a sliding hasp which passes through a staple ring and
is then made fasten or secured.
Combination lock
instead of using the key to align tumblers, the combination mechanism uses numbers,
letters or other symbols as reference point which enables an operator to align them manually.
Code-operated lock
a type of lock that can be opened by pressing a series of numbered button in the proper
sequence.
Electrical lock
a type of lock that can be opened and closed remotely by electrical means.
Card-opened lock
What is a KEY?
is a device which is used to open a door. Consists of two parts: the blade which is inserted
into the lock, and the bow, left protruding so that the torque can be applied. The blade of a key is
normally designed to open one specific lock, although master keys are designed to open sets of
similar locks.
Types of Keys
1. Change key
2. Sub-master key
3. Master key
Change key
a specific key, which operates the lock and has a particular combination of cuts which match
the arrangement of the tumblers in the lock.
Sub-master key
a key that will open all the lock within a particular area or grouping in a given facility.
Master key
a key that will open everything in a system involving two or more master key groups.
KEY CONTROL
once an effective key control has been installed, positive control of all keys must be gained
and maintained . This can be accomplished only if it is established in conjunction with the installation
of new locking devices.
1. Key cabinet
2. Key record
3. Inventories
4. Audits
5. Daily report
Key cabinet
a well-constructed cabinet will have to be procured. The cabinet will have to be of sufficient
size to hold the original key to every lock in the system. It should be secured at all times.
Key record
some administrative means must be set up to record code numbers and indicates to whom
keys to specific locks have been issued.
Inventories
periodic inventories will have to be made of all duplicate and original keys in the hands of
the employees whom they have been issued.
Audits
Daily report
should be made to the person responsible for key control from the personnel department
indicating all persons who have left or will be leaving the company. In an event that a key has
been issued, steps should be initiated to insure that the key is recovered.
Security Cabinet
The final line of defense at any facility is in the high security storage where papers, plans
or cashable instrument, precious metals or other specially valuable assets are protected.
1. Safe – a metallic container used for the safekeeping of documents or small items in an
office or installation. Safe can be classified as either robbery or burglary resistance
depending upon the use and need.
Its weight must be at least 750 lbs. And should be anchored to a building structure.
2. Vault – heavily constructed fire and burglar resistance container usually a part of the
building structure used to keep and protect cash, documents and negotiable instruments. Vaults
are bigger than safe but smaller than a file room.
The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
3. File room – a cubicle in a building constructed a little lighter than a vault but of bigger size to
accommodate limited people to work on the records inside.
It must have a watertight door and at least fire proof for 1 hour.
The most practical and generally accepted system of personnel identification is the used
of identification cards badges or passes. This system designates when and where and how
identification cards should be displayed.
1. Personnel recognition
1. Single pass system – the badge or pass coded for authorization to enter specific areas is
issued to an employee who keeps it in his position until his authorization is terminates.
2. Pass exchange system – an exchange takes place at the entrance of each controlled area.
Upon leaving the personnel surrenders his badge or passes and retrieve back his basic
identification.
3. 3. Multiple pass system – this provides an extra measure of security by requiring that an
exchange take place at the entrance of each restricted areas.
PROFESSIONAL CONDUCT AND ETHICS OF SECURITY GUARDS- are stipulated in Secs. 1-3,
Rule VIII of the R.A. 5487
1. Security Guard Creed, Code of ethics, and Code of Conduct- All members of
PSA and private detective gency/CSF/GSU shall strictly observe
their creed, Code of Ethics and Code of Conduct.
As a security guard my fundamintal duty is to protect lives and property and maintain
order within the vicinity/ my place of duty; protect the interest of my employer and our clients
and the security and stability of our government and country without compromise and prejudice,
honest in my action, words and thought; and do my best to uphold the principle: MAKADIOS,
MAKABAYAN, at MAKATAO.
GENERAL ORDERS
To walk during his tour of duty in a military manner, keeping always on the alert and
observing everything that takes place within sight or hearing.
To repeat all calls from post more distant from the guardhouse where I am sationed.
To received, obey and pass on to the relieving guard all orders from company officers or
officials, supervisors, post in charge or shift leaders.
To salute all company officials, superiors, in the agency ranking public officials and
commissioned officers of the integrated national police; and
To be espicially watchful at night and during the time of challenging, to challenge all
persons on or near my post and to allow no one to pass or loiteer without proper
authority.
ETHICAL STANDARDS
CODE OF CONDUCT
A. PERSONNEL SECURITY
1. Definition -includes all the security measures designed to prevent unsuitable individuals or
persons of doubtful loyalty to the government, from gaining access to classified matter or to
any security facility, and to prevent appointment, or retention as employees of such
individuals.
2. Scope and Purpose -holding such security measures as personnel security investigation,
security orientation and indoctrination and security education as will ensure the prevention of
unsuitable individuals.
3. Principle -just any other control technique, security must start from a given foundation or
basis and this basis shall referred to as the principles of security.
4. The Security “Chain” - Personnel ssecurity is the “weakest link” in the security “chain”.
B. CONTROL PERSONNEL
2. to develop the necessary and proper security discipline among the applicants and employee
as well as protect and preserve the security interest of the organization.
3. inculcate the desirable security attitudes and habits among the applicants and employee.
2. All personnel whose duties require access to classified matter shall be subject to security
investigation to determine eligibility for the required security clearance.
3. All personnel shall undergo security orientation, indoctrination and security education.
a. Personnel recognition
b. Artificial recognition
a. The system should have a complete record of all badges and identifications cards issued, return,
mutilated or lost by serial number and cross-index alphabetically.
b. The supervisor from time to time for its accuracy and authenticity should check the lists.
c. Passes and badges reported lost should validated and security at entrance be informed through
conspicuous posting
• 1. Visitor's logbook
• 2. Photograph
• 3.Escort
• 4.Visitors entrances
• 5.Time-traveled
• 6.Access List
1. Types of (PSI)
• K. BACKGROUND INVESTIGATION
• 1. Types of BI -
• a. Loyalty
• b. Integrity
• c. Discretion
• d. Moral
• e. Character
• f. Reputation
DOCUMENT AND INFORMATION SECURITY
RATIONALE
-Document and information in whatever form plays a significant role in the daily operations and
activities of installation. Once the contents of a company’s document and information are
divulged and reached the hands of an adversary, the business on the company’s assets that could
lead to its total closure.
-On the part of government, “security of documents and information is based on the premise that
the government has the right and duty to protect official papers from unwarranted and
indiscriminate disclosure.
-on the other hand, private individuals and private business establishments stand on the
constitutional provisions on the “right of privacy “ where it is stated that “the right of a person to be
free from unwarranted publicity, or disclosure and as the right to live without unwarranted
interference by the public in matters with which necessarily concerned.
-In government and non-government organizations, classified matters are protected for the
following purposes:
-This is the aspect of security which involves the application of security measures for proper
protection and safeguarding of classified information.
-In the business establishments, documents and records are classified to determine the degree of
security needed. The classification are :
1. Class I(Vital Records)-these include records that liable records of which reproduction does
not have the same value as the original, records needed to recover cash replace buildings,
equipment, raw materials finished products and records needed to avoid delay in
restoration of production , sales and sevices.
-In the business establishments, documents and records are classified to determine the degree of
security needed. The classification are :
1. Class I(Vital Records)-these include records that liable records of which reproduction does
not have the same value as the original, records needed to recover cash replace buildings,
equipment, raw materials finished products and records needed to avoid delay in
restoration of production , sales and sevices.
-In the business establishments, documents and records are classified to determine the degree of
security needed. The classification are :
1. Class I(Vital Records)-these include records that liable records of which reproduction does
not have the same value as the original, records needed to recover cash replace buildings,
equipment, raw materials finished products and records needed to avoid delay in
restoration of production , sales and sevices.
-these includes records which lost might cause inconvenience but could be readily replace and
which would not in the meantime present insurmountable obstacle to the prompt restoration of
business.
these include records the reproduction of which will involve considerable expense and
labor, or considerable delay.
these are the daily files, routine in nature so that even if lost or destroyed, will not affect
operation or administration.
F. SECURITY CLEARANCE
-security clearance is the certification by a responsible authority that the person described is cleared
for access to classified matter the appropriate determination level, or Security Clearance refers to
the administrative determination that an individual is eligible for access to classified matter.
G. CERTIFICATE OF DESTRUCTION
-This is the certification by a witnessing officer that the classified matters describe therein has been
disposed of in hid presence in an approved destruction methods.
H.OTHER TERMINOLIGIES
-The following are the other terminologies relative to documents and information security.
Compromise means lose of security, which results from an authorized persons obtaining
knowledge of classification matter.
Compartmentation is the grant of access to classified matter only to properly cleaved persons
in the performance of their official duties.
5. Classified matter obtained from other department shall retain the same original
classification.
Whenever classified matter are discussed, the following shall be taken into consideration:
Indiscreet discussion or conversation involving classified matter shall not be engaged in within
the presence of or with unauthorized persons.
When a lecture, address or information talk to a group includes classified matter, the speaker
shall announce the classification at the beginning and end of the period.
All personnel leaving the government service or in cases of private institution, those who resign
shall be warned against unlawful disclosure of classified matter.
-In addition, documents and information could be protected by proper storage like using steel
cabinets, safes, vaults, and file rooms as discussed in earlier lessons.
b. Class 2. Commercial money safes designed for robbery and burglary protection.
b.Explosion Hazard Test is done to determine if the sudden rise in temperature will not cause
the safe to repute.
c. Fire , then Impact Test is aimed at determining the strength of a safe to withstand the
collapse of a building during a fire.
A.RATIONALE
-In every organization, there are materials or information that is considered sensitive. Sensitive
is synonymous to secret or confidential. Thus maximum security is also needed because
unauthorized disclosure of this kind of materials certainly causes adverse affect to the
concerned organization or business establishement.
B.PROPRIETARY INFORMATION
-This is information that in some special way relates to the status or activities of the possessor
asserts ownership. In the business community, proprietary information relates to the structure,
products or business methods of the organization. It is usually protected in some way against
casual or general disclosure.
1.Trade Secret- This consist of any formula, pattern, device or complication of information which
is used in one’s business and which gives him an opportunity to gain an advantage over
competitors who do not know or use it.
-Under the law, patents and trade secrets are distinguished by the following characteristics:
1. Requirements for obtaining a patents are specific . To qualify for a patent the invention must
be more than novel and useful. It must represent a positive contribution beyond the skill of
the average person.
3. A trade secret remains secret as long as it continues to meet trade secret tests while the
exclusive right to patent protection expire after 17 years.
- Realizing that the most serious threat to trade secrets is the employee, a measure of protection
is often realized through the use of employee agreement which restrict the employee’s ability
to disclose information without specific authorization to the company, The following
countermeasure may be adopted:
1. Policy and procedure statements regarding all sensitive information- this involves the setting
of a clear cut policy concerning the secrecy and propose handling of all sensitive
information.
2. Pre and post employment screening and review- this is done to prevent the hiring of
unwanted personnel.
3. Non-disclosure agreements from employees, vendors, contractors and visitor- this is done to
emphasize to all concerned individuals that the patent or trade secret is the heart of the
business establishment or organization.
5. Awareness programs- this involves the education of all concerned company personnel which
emphasizes that disclosure of company secret is detrimental to the cause of the company.
6. Physical security measures- this is the use of protective containers (as discussed earlier).