You are on page 1of 13

FIRE ALARM SYSTEM

 Are those devices installed to help detect fires or detect anything that causes fire such as
smoke or unusual riding of temperature.

PRIVATE FIRE PROTECTION SYSTEM

1. AUTOMATIC SPRINKLING SYSTEM – An integrated network of hydraulically designed piping


installed in a building structure or area with outlets which automatically discharges water
when activated by heat. Can be classified by two:

a. Wet pipe system – the piping has a water with pressure

b. Dry pipe system – the pipes are filled with air under pressure

2. Fire pumps – are mechanical device of supplying water which can be manual or motor
driven.

3. Stand pipes – are galvanized iron steel or plastic pipes located inside a building from the
lowest to the top floor with water under pressure for cause in case of fire.

4. Fire hydrant – is a mechanical device strategetically located in an installation or street where


fire hose is connected so that water with pressure will be available to extinguish fire.

Portable fire extinguisher – this fire is a fire fighting equipment which can be portable or in a cart
that is used to put out ifre depending on the contents to extinguish certain types.

 Alarm system in buildings may also be equipped with detection system that will transmit
alarm. Some detectors are designed to respond to smoke and others to heat.

FIRE ALARM DETECTION SYSTEM

This system provides sensors in fire prone areas in a building whereby smoke or heat will actuate
these strategically located sensors or automatic fire detectors.

D. SMOKE DETECTORS

 Smoke detectors offer some advantages over fire detectors because fire gets big, there will
be smoke.

 These detectors trigger an alarm ahead of the heat –actuated device or detector.

Types of Smoke Detector

 Ionization device or Radio-active device – this contains small radioactive source for ionizing
the air molecules between a pair of electrodes, permitting a very small current to flow
between the pair.

 Smoke detector – this uses a photoelectric cell. Some of these detectors, smoke that can
enters obscures a steady beam light, in others the smoke scatters a light ray from diode so
that cell can detect it.

Protective Locks and Key Control and Protective Cabinet

Lock is one of the most widely used physical security devices in the asset protection program
of an installation. It complements other physical safeguards of the installation against any possible
surreptitious entry.
What is a LOCK?

is defined as a mechanical, electrical, hydraulic or electronic device designed to event entry


into a building, room, container or hiding place .

Types of Locks

1. Key operated mechanical lock

2. Padlock

3. Combination Lock

4. Code-operated lock

5. Electrical lock

6. Card-operated lock

Key operated mechanical lock

it use some sort of arrangement of internal physical barriers (wards tumblers) which prevent
the lock from operating unless they are properly aligned. The key is the device used to align these
internal barriers so that the lock may be operated.

3 Types of Key-operated lock

Ω Disk or water tumbler mechanism

Ω Pin tumbler mechanism

Ω Lever tumbler mechanism

Padlock

a portable and detachable lock having a sliding hasp which passes through a staple ring and
is then made fasten or secured.

Combination lock

instead of using the key to align tumblers, the combination mechanism uses numbers,
letters or other symbols as reference point which enables an operator to align them manually.

Code-operated lock

a type of lock that can be opened by pressing a series of numbered button in the proper
sequence.

Electrical lock

a type of lock that can be opened and closed remotely by electrical means.

Card-opened lock

a type of lock operated by coded card.

What is a KEY?
is a device which is used to open a door. Consists of two parts: the blade which is inserted
into the lock, and the bow, left protruding so that the torque can be applied. The blade of a key is
normally designed to open one specific lock, although master keys are designed to open sets of
similar locks.

Types of Keys

1. Change key

2. Sub-master key

3. Master key

4. Grand Master key

Change key

a specific key, which operates the lock and has a particular combination of cuts which match
the arrangement of the tumblers in the lock.

Sub-master key

a key that will open all the lock within a particular area or grouping in a given facility.

Master key

a special key capable of opening a series of lock.

Grand Master key

a key that will open everything in a system involving two or more master key groups.

KEY CONTROL

once an effective key control has been installed, positive control of all keys must be gained
and maintained . This can be accomplished only if it is established in conjunction with the installation
of new locking devices.

Methods can be used to maintain effective key control;

1. Key cabinet

2. Key record

3. Inventories

4. Audits

5. Daily report

Key cabinet

a well-constructed cabinet will have to be procured. The cabinet will have to be of sufficient
size to hold the original key to every lock in the system. It should be secured at all times.
Key record

some administrative means must be set up to record code numbers and indicates to whom
keys to specific locks have been issued.

Inventories

periodic inventories will have to be made of all duplicate and original keys in the hands of
the employees whom they have been issued.

Audits

in an addition to poeriodic inventory, an unannounced audit should be made of all key


control records and procedures by a member of management .

Daily report

should be made to the person responsible for key control from the personnel department
indicating all persons who have left or will be leaving the company. In an event that a key has
been issued, steps should be initiated to insure that the key is recovered.

Security Cabinet

 The final line of defense at any facility is in the high security storage where papers, plans
or cashable instrument, precious metals or other specially valuable assets are protected.

 Protective containers are designed to secure against burglary or fire.

Three types of security Cabinet

1. Safe – a metallic container used for the safekeeping of documents or small items in an
office or installation. Safe can be classified as either robbery or burglary resistance
depending upon the use and need.

 Its weight must be at least 750 lbs. And should be anchored to a building structure.

 Its body should at least one inch thick steel.

2. Vault – heavily constructed fire and burglar resistance container usually a part of the
building structure used to keep and protect cash, documents and negotiable instruments. Vaults
are bigger than safe but smaller than a file room.

 The vault door should be made of steel at least 6 inches in thickness.

 The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.

 The vault must be resistive up to 6 hours.

3. File room – a cubicle in a building constructed a little lighter than a vault but of bigger size to
accommodate limited people to work on the records inside.

 The file room should at most be 12 ft. high.

 It must have a watertight door and at least fire proof for 1 hour.

Personnel Identification and Movement Control


 In every installation, the used of protective barriers, security lightings, communication and
electronic hardware provides physical safeguards but these are insufficient to maximize
the effort of the guard force.

 The most practical and generally accepted system of personnel identification is the used
of identification cards badges or passes. This system designates when and where and how
identification cards should be displayed.

2 Types of Personnel Identification

1. Personnel recognition

2. Artificial recognition- identification cards, passes, passwords, etc.

Use of Pass System

1. Single pass system – the badge or pass coded for authorization to enter specific areas is
issued to an employee who keeps it in his position until his authorization is terminates.

2. Pass exchange system – an exchange takes place at the entrance of each controlled area.
Upon leaving the personnel surrenders his badge or passes and retrieve back his basic
identification.

3. 3. Multiple pass system – this provides an extra measure of security by requiring that an
exchange take place at the entrance of each restricted areas.

PROFESSIONAL CONDUCT AND ETHICS

 PROFESSIONAL CONDUCT AND ETHICS OF SECURITY GUARDS- are stipulated in Secs. 1-3,
Rule VIII of the R.A. 5487

1. Security Guard Creed, Code of ethics, and Code of Conduct- All members of
PSA and private detective gency/CSF/GSU shall strictly observe
their creed, Code of Ethics and Code of Conduct.

SECURITY GUARDS CREED

As a security guard my fundamintal duty is to protect lives and property and maintain
order within the vicinity/ my place of duty; protect the interest of my employer and our clients
and the security and stability of our government and country without compromise and prejudice,
honest in my action, words and thought; and do my best to uphold the principle: MAKADIOS,
MAKABAYAN, at MAKATAO.

GENERAL ORDERS

 To take charge of the post and all company properties in view.

 To walk during his tour of duty in a military manner, keeping always on the alert and
observing everything that takes place within sight or hearing.

 To repeat all calls from post more distant from the guardhouse where I am sationed.

 To report all violations of orders I am instructed to enforce.


 To quit my post only when properly relieved.

 To received, obey and pass on to the relieving guard all orders from company officers or
officials, supervisors, post in charge or shift leaders.

 To talk to one except in line of duty.

 To sound or call the alarm in case of fire or disorders.

 To call the officer in any not covered by instructions.

 To salute all company officials, superiors, in the agency ranking public officials and
commissioned officers of the integrated national police; and

 To be espicially watchful at night and during the time of challenging, to challenge all
persons on or near my post and to allow no one to pass or loiteer without proper
authority.

PROFESSIONAL CREED, CODE OF ETHICS AND CODE OF CONDUCT OF AGENCY PROPRIETOR


AND PSA/CSF AND GSU

“SECURITY AGENCY OPERATORS CREED”

As a security agency proprietor my fundamental duty is to serve the interest of my


clientele and my security guard; protect the interest of the govrenment; adhere professionally
in the conduct of my business without prejudices and compromises to human rights and
uphold the law and abide the rules and regulations set by the conduct of my business.

ETHICAL STANDARDS

As a licensed PSA/CSF, it shall be prime concern to share with other


licensed agencies and company security forces, the burden of responsibilty in upholding the
integrity and trust of the private security profession at all times.

CODE OF CONDUCT

A. PERSONNEL SECURITY

1. Definition -includes all the security measures designed to prevent unsuitable individuals or
persons of doubtful loyalty to the government, from gaining access to classified matter or to
any security facility, and to prevent appointment, or retention as employees of such
individuals.

2. Scope and Purpose -holding such security measures as personnel security investigation,
security orientation and indoctrination and security education as will ensure the prevention of
unsuitable individuals.

3. Principle -just any other control technique, security must start from a given foundation or
basis and this basis shall referred to as the principles of security.

4. The Security “Chain” - Personnel ssecurity is the “weakest link” in the security “chain”.

B. CONTROL PERSONNEL

 Access to “Restricted Areas” .


 Practicing the “need to know” concept.

 No person is entitled to knowledge or possession of classified information solely by his


rank , office, or position. Such matter is entrusted only to individuals whose official duties
require knowledge or possession.

 SOME ACCES TO ENTER IN RESTRICTED AREA

enter- turnstile gate used by personnel to enter the restricted area.

C. OBJECTIVES OF PERSONNEL SECURITY

1. To provide the standards and procedures necessary to ensure the appointment,


employment of retention of suitable and loyal individuals.

2. to develop the necessary and proper security discipline among the applicants and employee
as well as protect and preserve the security interest of the organization.

3. inculcate the desirable security attitudes and habits among the applicants and employee.

D. BASIC POLICIES IN PERSONNEL SECURITY

1. No person is entitled solely by virtue of his grade or position to knowledge or possession of


classified matter.

2. All personnel whose duties require access to classified matter shall be subject to security
investigation to determine eligibility for the required security clearance.

3. All personnel shall undergo security orientation, indoctrination and security education.

E. CONTROL OF PERSONNEL IN THE PHYSICAL FACILITY

“SYSTEM OF PERSONNEL IDENTIFICATION”

1. Two types of of personnel identification:

a. Personnel recognition

b. Artificial recognition

2. Use of Pass System:

a. Single pass system

b. Pass exchange system

c. Multiple pass system

3. Badge and Pass Control:

a. The system should have a complete record of all badges and identifications cards issued, return,
mutilated or lost by serial number and cross-index alphabetically.

b. The supervisor from time to time for its accuracy and authenticity should check the lists.

c. Passes and badges reported lost should validated and security at entrance be informed through
conspicuous posting

BIOMETRIC ACCESS READER USING FINGERPRINTS


F. VISITORS MOVEMENT CONTROL

• 1. Visitor's logbook

• 2. Photograph

• 3.Escort

• 4.Visitors entrances

• 5.Time-traveled

• 6.Access List

• J. PERSONNEL SECURITY INVISTIGATION

1. Types of (PSI)

a. National Agency Check (NAC) -

• 1. National Intelligence Coordinating Agency (NICA)

• 2. National Bureau of Investigation (NBI)

• 3. ISAAFP or J2 Division, GHQ AFP

• 4. CIDG PNP Camp Crame., etc.

b. Local Agency Check (LAC)

• 1) Place of the locality where the individual is a resident.

• 2) Mayor, Police, Fiscal, Judge of the locality where the individual is a


resident.

• K. BACKGROUND INVESTIGATION

• 1. Types of BI -

• a. Complete Background Investigation(CBI)

• b. Partial Background Investigation (PBI)

• 2. Factors considered in background Investigation.

• a. Loyalty

• b. Integrity

• c. Discretion

• d. Moral

• e. Character

• f. Reputation
DOCUMENT AND INFORMATION SECURITY

RATIONALE

-Document and information in whatever form plays a significant role in the daily operations and
activities of installation. Once the contents of a company’s document and information are
divulged and reached the hands of an adversary, the business on the company’s assets that could
lead to its total closure.

B. BASIS OF DOCUMENT AND INFORMATION SECURITY

-On the part of government, “security of documents and information is based on the premise that
the government has the right and duty to protect official papers from unwarranted and
indiscriminate disclosure.

-on the other hand, private individuals and private business establishments stand on the
constitutional provisions on the “right of privacy “ where it is stated that “the right of a person to be
free from unwarranted publicity, or disclosure and as the right to live without unwarranted
interference by the public in matters with which necessarily concerned.

C. PURPOSE OF PROTECTING CLASSIFIED MATTER

-In government and non-government organizations, classified matters are protected for the
following purposes:

1. Deter and impede potential spy or prevent espionage;

2. Assist in security investigation by keeping accurate records of the moment of classified


materials; and

3. Enforce the use of “Need To Know” principle.

D. DOCUMENT SECURITY SYSTEM

-This is the aspect of security which involves the application of security measures for proper
protection and safeguarding of classified information.

E. TYPES OF BUSINESS RECORDS

-In the business establishments, documents and records are classified to determine the degree of
security needed. The classification are :

1. Class I(Vital Records)-these include records that liable records of which reproduction does
not have the same value as the original, records needed to recover cash replace buildings,
equipment, raw materials finished products and records needed to avoid delay in
restoration of production , sales and sevices.

E. TYPES OF BUSINESS RECORDS

-In the business establishments, documents and records are classified to determine the degree of
security needed. The classification are :

1. Class I(Vital Records)-these include records that liable records of which reproduction does
not have the same value as the original, records needed to recover cash replace buildings,
equipment, raw materials finished products and records needed to avoid delay in
restoration of production , sales and sevices.

E. TYPES OF BUSINESS RECORDS

-In the business establishments, documents and records are classified to determine the degree of
security needed. The classification are :

1. Class I(Vital Records)-these include records that liable records of which reproduction does
not have the same value as the original, records needed to recover cash replace buildings,
equipment, raw materials finished products and records needed to avoid delay in
restoration of production , sales and sevices.

2.Class II-(useful Records)

-these includes records which lost might cause inconvenience but could be readily replace and
which would not in the meantime present insurmountable obstacle to the prompt restoration of
business.

Class III (Important Record)

 these include records the reproduction of which will involve considerable expense and
labor, or considerable delay.

Class IV (Non-Essential Records)-

 these are the daily files, routine in nature so that even if lost or destroyed, will not affect
operation or administration.

F. SECURITY CLEARANCE

-security clearance is the certification by a responsible authority that the person described is cleared
for access to classified matter the appropriate determination level, or Security Clearance refers to
the administrative determination that an individual is eligible for access to classified matter.

G. CERTIFICATE OF DESTRUCTION

-This is the certification by a witnessing officer that the classified matters describe therein has been
disposed of in hid presence in an approved destruction methods.

H.OTHER TERMINOLIGIES

 -The following are the other terminologies relative to documents and information security.

Classified refers to assign information by one of the four classification categories.

Compromise means lose of security, which results from an authorized persons obtaining
knowledge of classification matter.

Compartmentation is the grant of access to classified matter only to properly cleaved persons
in the performance of their official duties.

Declassify is the removal of security classification from classified matter.

Reclassify/Re-grading is the act of changing the assigned classification of matter.

Upgrading is the act of assigning to a matter of higher classification to a classified.


Dissemination – Dissemination of classified matter shall be restricted to properly cleared
persons whose official duties required knowledge or possession thereof.

Purging is the process of destroying a documents which is no longer significant in the


organization.

I. RULES FOR CLASSIFICATION OF DOCUMENTS

- Private institution adopt the rules applied by government organizations in classification


of documents such as:

1. Documents shall be classified according to their content.

2. The overall classification of a file or of a group of physically connected therein such as


pages, paragraphs, section or components thereof may bear different classification.

3. Transmittal of documents or endorsements which do not contain classified information or


which contain information classified lower than that of the preceding element or enclosure
shall include a notation for automatic downgrading.

4. Correspondence, indexes, receipts, report of possession, receipt of transfer or destruction,


catalogs, or accession list shall not be classified if any reference to classified matter does not
disclosed classified information.

5. Classified matter obtained from other department shall retain the same original
classification.

J. DISCUSSION INVOLVING CLASSIFIED MATTER

Whenever classified matter are discussed, the following shall be taken into consideration:

Indiscreet discussion or conversation involving classified matter shall not be engaged in within
the presence of or with unauthorized persons.

When a lecture, address or information talk to a group includes classified matter, the speaker
shall announce the classification at the beginning and end of the period.

All personnel leaving the government service or in cases of private institution, those who resign
shall be warned against unlawful disclosure of classified matter.

K.RECORDS AND DOCUMENTS PROTECTION

-In addition, documents and information could be protected by proper storage like using steel
cabinets, safes, vaults, and file rooms as discussed in earlier lessons.

1. Categories of Storage Containers- Storage containers too are categories or classified


according to what should be stored.

a. Class 1. Commercial records safes designed for fire protection

b. Class 2. Commercial money safes designed for robbery and burglary protection.

c. Class 3. Security cabinets designed to meet specifications for safeguarding classified


materials.
2. Tests for Safe’s Fire Resistance – Documents are at risk not only against unauthorized
disclosures but also against destruction that may be caused by fire or explosion. Hence safes
usually undergo the following tests:

a. Fire Endurance Test is done at a temperature above 350 degree Fahrenheit.

b.Explosion Hazard Test is done to determine if the sudden rise in temperature will not cause
the safe to repute.

c. Fire , then Impact Test is aimed at determining the strength of a safe to withstand the
collapse of a building during a fire.

PROTECTION OF SENSITIVE MATERIALS AND INFORMATION

A.RATIONALE

-In every organization, there are materials or information that is considered sensitive. Sensitive
is synonymous to secret or confidential. Thus maximum security is also needed because
unauthorized disclosure of this kind of materials certainly causes adverse affect to the
concerned organization or business establishement.

B.PROPRIETARY INFORMATION

-This is information that in some special way relates to the status or activities of the possessor
asserts ownership. In the business community, proprietary information relates to the structure,
products or business methods of the organization. It is usually protected in some way against
casual or general disclosure.

C. TYPES OF PROPERTY INFORMATION

-In the business world, propriety matters are classified into:

1.Trade Secret- This consist of any formula, pattern, device or complication of information which
is used in one’s business and which gives him an opportunity to gain an advantage over
competitors who do not know or use it.

2. Patents-this a grant made by the government to an inventor, conveying or security to him


the exclusive right to make, use , or sell his invention for term of years.

D.DISTINCTION BETWEEN PATENTS AND TRADE SECRETS

-Under the law, patents and trade secrets are distinguished by the following characteristics:

1. Requirements for obtaining a patents are specific . To qualify for a patent the invention must
be more than novel and useful. It must represent a positive contribution beyond the skill of
the average person.

2. A much lower of novelty is required of a trade secret.

3. A trade secret remains secret as long as it continues to meet trade secret tests while the
exclusive right to patent protection expire after 17 years.

E. PROPRIETARY INFORMATION PROTECTION PROGRAM

- Realizing that the most serious threat to trade secrets is the employee, a measure of protection
is often realized through the use of employee agreement which restrict the employee’s ability
to disclose information without specific authorization to the company, The following
countermeasure may be adopted:

1. Policy and procedure statements regarding all sensitive information- this involves the setting
of a clear cut policy concerning the secrecy and propose handling of all sensitive
information.

2. Pre and post employment screening and review- this is done to prevent the hiring of
unwanted personnel.

3. Non-disclosure agreements from employees, vendors, contractors and visitor- this is done to
emphasize to all concerned individuals that the patent or trade secret is the heart of the
business establishment or organization.

4. Non-competitive agreement with selected employees- this is to avoid employees from


getting into a business or extra job that in conflict with the interest of the company.

5. Awareness programs- this involves the education of all concerned company personnel which
emphasizes that disclosure of company secret is detrimental to the cause of the company.

6. Physical security measures- this is the use of protective containers (as discussed earlier).

7. Informed monitoring of routine activities.

You might also like