You are on page 1of 26

SECURITY LOSS

CONTROL
INDUSTRIAL SECURITY
POLICY
In the interest of effectively mitigating the
frequency and severity of company losses
through properly planned assets protection
and risk avoidance, management recognizes its
responsibility for the establishment of a
comprehensive security program, including its
corresponding implementing guidelines and
procedures, pursuant to the provisions of
pertinent codes and decrees of the Republic of
the Philippines.
SECURITY PLAN
The security plan interprets in detail the intent
and purpose of the security side of the company
security policy. This provides the framework for
the security program that management intends
to pursue in line with the company’s goal of
providing the people with safe, adequate and
reliable services which are necessary in our
economic progress.
SECURITY
- The protection of property of all kinds
from loss through theft, fraud, fire and
other forms of damage, and waste.
- the protection of secret processes,
financial data, sales projects and other
information vital to a company’s
interests against loss through what is
described as industrial espionage, is
also a security responsibility.
ROLES IN COMPANY
SECURITY
Management
- Without the full involvement and support of
every grade of management, the
implementation of a company’s security policy
and program can only be partially efficient and
effective
- The driving force must come from the top
Supervisors
- The goodwill and cooperation of senior
management is fundamental in establishing
sound security principles and procedures, but
day-to-day efficient security practice is more
closely dependent on the appreciation and
understanding of the principles and
procedures amongst the workforce.
- Plant and office supervisors have implicit
responsibilities for the protection of their
employer’s property loss.
Workforce Cooperation
- Individuals are the more likely to identify
themselves with the employer’s interests
and appreciate the mutual benefit of an
efficient security system
- Assistance or helpful advice should always
be given when sought and no opportunity
missed to create goodwill. Where
information or advice bearing upon the
safety and well-being of employees can be
given, this should be regarded as a duty.
Complimentary to
each other
COMMON GOAL - “LOSS CONTROL”
Asset is anything of value
• People
• Information
• Equipment
• Facilities
• Activities/Operations
The asset may have value to an adversary, as well as to
the owner, although the values may differ
COMMON GOAL - “LOSS CONTROL”

 Areas of Concern
- Safety – inadvertent or accidental loss
- Security – deliberate or intentional loss
COMMON FUNCTIONS

 Investigation of risks
 Evaluation of risks
 Developing plans to prevent or reduce loss
 Implementing and monitoring the success of the plans
and programs.
 Revision or maintenance of the plans and programs
What is Risk?

• Risk is the potential for damage or loss of an asset


• Risk levels is a combination of two factors

• Impact of Loss: The value placed on an asset by its


owner or the consequence of an undesirable event on
that asset.

• Probability of an undesirable event: The likely hood


that a specific vulnerability will be exploited by a
particular threat.
What is Risk Management?

The process of selecting and implementing


physical countermeasures and or
mitigation strategies to achieve acceptable
level of risk at an acceptable cost
WHAT IS THREAT?

Threat is any indication, circumstance, or event


with the potential to cause loss or damage to an
Asset
• Threats can also be defined as the intention to
undertake action detrimental to assets
• Source of threats:
– Political
– Economic
– Private Interest
– Natural
BASIC ELEMENTS OF SAFETY AND SECURITY
MANAGEMENT

(Application of Professional Management Principles and Practices)


- Identification
- Development
- Communication
- Measurement
Adequate Control of People is
Essential for Thorough Security

- Although any breach of security


could be committed by an
employee or non-employee, during
or after the work day or during the
day or night, such breaches can be
prevented if there is adequate and
conscientious application of
security techniques.
Theft by employees or visitors can be
reduced by eliminating:

TEMPTATION!
CONTROL OF SECURITY THREATS:
THREAT – an implied or expressed intention (potential or real) to injure
or kill personnel or to damage or destroy non-human resources.
- a statement of an intention to inflict pain, injury, damage, or
other hostile action on someone in retribution for something
done or not done.

TERRORISM – the use of overpowering fear, instilled by violent acts, the


magnitude of which exceed the normally expected limits of
criminal activity, to achieve a desired but illegal objective.
TYPES OF VANDALISM – Malicious destruction of private or public
property

Acquisitive – damage to acquire money or property (breaking open


coin boxes or stealing material from construction sites.)

Tactical - damage as a conscious act to advance some other end


(jamming a machine in a factory to gain a rest period).
Ideological - carried out to further an explicit ideological
cause or to deliver a message (graffiti, slogans
on walls).

Vindictive – damage done to get revenge (breaking an


equipment, snarling a process to settle a grudge
with a supervisor.
PLAY - damage done as a part of a game ( to see who can
break the most-windows)

Malicious - damage done as an expression of rage or


frustration (materials).
SECURITY CONTROL METHODS

IN-HIRING
- CHECK REFERENCE THOROUGHLY (medical records,
Mental health services in the workplace (RA 11036)
- CHECK WITH PREVIOUS EMPLOYERS
- CHECK FOR ANY POTENTIAL OR EXISTING HEALTH
PROBLEMS
- EMPLOYMENT CONTRACT FOR AN EMPLOYEE WORKING
WITH CONFIDENTIAL FORMULAE
- REQUIRE SECURITY CLEARANCE (GOV’T)
SECURITY OFFICERS/GUARDS
- COMPETENT, WITH GOOD QUALIFICATIONS
- PROPERLY TRAIN

PASSES (Entry to Company Premises)


- PICTURE ID’S FOR EMPLOYEES
- TEMPORARY PASSES FOR VISITORS
- KEY CARDS FOR EMPLOYEES IN CRITICAL AREAS
- SECURITY GATE
- FINGERPRINT SECURITY
TV MONITORS
- USEFUL IN SURVEILLANCE OF RESTRICTED
AREAS

ALARM SYSTEMS
- USEFUL IN DETECTING FORCED OR
UNAUTHORIZED ENTRY DURING OFF-SHIFTS
AND CONTROLLING PEOPLE ENTERING
RESTRICTED AREAS.

CAMERAS
- TO TAKE PHOTOS OF ANYONE ENTERING A
RESTRICTED AREAS
SIGNS
- PROHIBITING PEOPLE FROM ENTERING
RESTRICTED AREAS

LIGHTING
- INSIDE AND OUTSIDE PLANT/COMPOUND
- PERIMETER
- ENTRANCE, EXITS, PARKING LOTS
- RESTRICTED AND SPECIAL SECURITY AREAS
- EMERGENCY
PUNCH CLOCKS/STATIONS
- LOCATED IN STRATEGIC AREAS
- USE OF CHECK LIST FOR SECURITY OFFICER
MAKING ROUND

ALLOCATION AND CONTROL OF KEYS


- KEYS ISSUED TO PERSONNEL WHEN
ABSOLUTELY NECESSARY
- ALL KEYS TO BE RETURNED WHEN
EMPLOYEES LEAVE COMPANY OR HAS A
CHANGE IN POSITION.
INSURANCE COVERAGE
- THEFT
- FIRE
- VEHICLE
-OTHERS

VEHICLE ACCIDENT – ANY ACCIDENT IN WHICH THE


COMPANY VEHICLE, PERSON, OBJECT, OR ANIMAL, WHICH
RESULTS IN DEATH, PERSONAL INJURY, OR PROPERTY
DAMAGE, REGARDLESS WHO WAS INJURED, WHAT
PROPERTY WAS DAMAGED OR TO WHAT EXTENT, WHERE IT
OCCURRED, OR WHO WAS RESPONSIBLE.

You might also like