You are on page 1of 2

GIGATARAS, REBIE N.

TA180081 - OLTA22N12

1. Illustrate and explain the Document/ Information Cycle.

1. Creation - the action or process of bringing something into existence


2. Classification - the action or process of classifying something according
to shared qualities or characteristics
3. Storage - the action or method of storing something for future use
4. Retrieval - the process of getting something back from somewhere
5. Retention/purging - the continued possession, use, or control of
something
6. Transfer - an act of moving something or someone to another place
7. Disposition - the way in which something is placed or arranged,
especially in relation to other things.

2. What is the operational phase of close protection?


1. Planning phase - The Project Planning Phase is the second phase in
the project life cycle. It involves creating of a set of plans to help guide your
team through the execution and closure phases of the project. The plans
created during this phase will help you to manage time, cost, quality,
change, risk and issues.
GIGATARAS, REBIE N. TA180081 - OLTA22N12

2. Operational phase - The operation phase is the phase when the


product/service (resulting from the project) starts to be used (in other words,
in operation mode). The operation phase is also referred to as the
maintenance phase
3. Post Deployment phase - In the post-deployment phase, active-duty
service members will be ready to return to their normal jobs on the
installation. This phase includes reintegration into family life and the
community, as well as reintegration into regular military duties.

3. What are the different types of Security Hazard?

1. Natural Hazard – which arise from natural phenomena. a. Floods caused


by typhoons b. Earthquakes c. Storms d. Lighting storms e. Extreme
temperature and humidity

2. Man-made hazard –are the result of a state of mind, attitude, weaknesses


or character traits of a person. They can be acts of commission or omission,
both overt or covert which disrupt the operation of the plants or
establishment. a. Carelessness b. Disloyalty c. Espionage, pilferage and
theft d. Vandalism

4. Explain the different kinds of sensitive information?

1. Proprietary information – information related to the status, operations


and activities. In business and industry, it relates to the structure, products
and methods of operations of the organization.

2. Trade Secret – refers to the formula, pattern device or compilation of


information used in one’s business. It gives competitive advantage over
others who do not know about.

You might also like