The document discusses the document/information cycle which includes creation, classification, storage, retrieval, retention/purging, transfer, and disposition. It also discusses the operational phase of close protection which refers to when a product/service starts to be used, also called the maintenance phase. Additionally, it outlines different types of security hazards including natural hazards like floods and earthquakes, and man-made hazards resulting from human traits like carelessness and disloyalty. Finally, it defines sensitive information such as proprietary information related to business operations and status, and trade secrets which are compilations of information giving a competitive advantage.
The document discusses the document/information cycle which includes creation, classification, storage, retrieval, retention/purging, transfer, and disposition. It also discusses the operational phase of close protection which refers to when a product/service starts to be used, also called the maintenance phase. Additionally, it outlines different types of security hazards including natural hazards like floods and earthquakes, and man-made hazards resulting from human traits like carelessness and disloyalty. Finally, it defines sensitive information such as proprietary information related to business operations and status, and trade secrets which are compilations of information giving a competitive advantage.
The document discusses the document/information cycle which includes creation, classification, storage, retrieval, retention/purging, transfer, and disposition. It also discusses the operational phase of close protection which refers to when a product/service starts to be used, also called the maintenance phase. Additionally, it outlines different types of security hazards including natural hazards like floods and earthquakes, and man-made hazards resulting from human traits like carelessness and disloyalty. Finally, it defines sensitive information such as proprietary information related to business operations and status, and trade secrets which are compilations of information giving a competitive advantage.
1. Illustrate and explain the Document/ Information Cycle.
1. Creation - the action or process of bringing something into existence
2. Classification - the action or process of classifying something according to shared qualities or characteristics 3. Storage - the action or method of storing something for future use 4. Retrieval - the process of getting something back from somewhere 5. Retention/purging - the continued possession, use, or control of something 6. Transfer - an act of moving something or someone to another place 7. Disposition - the way in which something is placed or arranged, especially in relation to other things.
2. What is the operational phase of close protection?
1. Planning phase - The Project Planning Phase is the second phase in the project life cycle. It involves creating of a set of plans to help guide your team through the execution and closure phases of the project. The plans created during this phase will help you to manage time, cost, quality, change, risk and issues. GIGATARAS, REBIE N. TA180081 - OLTA22N12
2. Operational phase - The operation phase is the phase when the
product/service (resulting from the project) starts to be used (in other words, in operation mode). The operation phase is also referred to as the maintenance phase 3. Post Deployment phase - In the post-deployment phase, active-duty service members will be ready to return to their normal jobs on the installation. This phase includes reintegration into family life and the community, as well as reintegration into regular military duties.
3. What are the different types of Security Hazard?
1. Natural Hazard – which arise from natural phenomena. a. Floods caused
by typhoons b. Earthquakes c. Storms d. Lighting storms e. Extreme temperature and humidity
2. Man-made hazard –are the result of a state of mind, attitude, weaknesses
or character traits of a person. They can be acts of commission or omission, both overt or covert which disrupt the operation of the plants or establishment. a. Carelessness b. Disloyalty c. Espionage, pilferage and theft d. Vandalism
4. Explain the different kinds of sensitive information?
1. Proprietary information – information related to the status, operations
and activities. In business and industry, it relates to the structure, products and methods of operations of the organization.
2. Trade Secret – refers to the formula, pattern device or compilation of
information used in one’s business. It gives competitive advantage over others who do not know about.