Professional Documents
Culture Documents
VISION
Bestlink College of the Philippines is committed to provide and promote quality education with a
unique, modern and research-based curriculum with delivery systems geared towards
excellence.
MISSION
To produce self-motivated and self-directed individual who aims for academic excellence, God-
fearing, peaceful, healthy and productive successful citizens.
CRIMINOLOGY DEPARTMENT
SECOND SEMESTER: A.Y. 2021-2022
LEA 3 – INDUSTRIAL SECURITY
WEEK 7 - 11
This module introduces the information that has value and should be protected. These include the
propriety business and technical information as well as personal data concerning applicants, employees,
and former employees. Sensitive information is data that must be guarded from unauthorized access
and unwarranted disclosure in order to maintain the information security of an individual or
organization.
Information Security is that aspect or means of security that prevents the destruction, loss, distortion or
disclosure of classified, critical and sensitive proprietary information to unauthorized individuals
Propriety information
This is an information that in some special way related to the status or activities of the posessor
and over which the possessor asserts ownership.
Information is considered propriety when it is not readily accessible to others; it was created by
the owner through the expenditure of considerable resources; or the owner actively protects the
information from disclosure ( Fay, 2006 ). This can include secret formulas, processes, and method used
in production; or it could be the company’s business and marketing plans, salary structure, customer
lists, and contracts and detail of its computer system.
1
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
Propriety information includes intellectual properties that are recognized and granted varying
degrees of protections by governments such as the following:
1. Patents – grant issued by a national government conferring the right to exclude others from making,
using, selling the invention within the country. Patents may be given for new products or processes.
Violation of patent right are known as infringement or piracy.
2. Trademarks – words, names, symbols, device, or combination thereof used by the manufacturers or
merchants to differentiate their goods and distinguish them from the products that are
manufactured or sold by others. Counterfeiting and infringement constitute violations of trademark
rights.
3. Copyright - protection given by the government to creators of original literary, dramatic, musical,
and certain other intellectual works. The owner of a copyright has the exclusive right to reproduce
the copyrighted work, prepare derivative works based on it, distribute copies, and perform or
display it publicly. Copyright violations are also known as infringement and piracy.
4. Trade Secret – is a process or device for continuous use in the protection of the business. Formulas,
patterns, compilations, programs, devices, methods, techniques, and processes that derive
economic value from not being generally known and not ascertainable except by illegal means. A
trade secret violation I the vocabulary of the law is a misappropriation resulting from improper
acquisitions or disclosure. The key elements in a trade secret are the owner’s maintenance of
confidentiality, limited distribution, and the absence of a patent.
Security Screening
Job applicants, current employee’s contactors and other individuals who could be sharing
sensitive information with the organizations may have their backgrounds checked for affiliation with
known activist or dissident groups or for any potential for insider activity. For individuals in posts that
are considered critical or vulnerable within the company structure, screening may involve an
investigation of their criminal history or interviews with the family, friends and works colleagues in order
to identify any possible concerns. In some cases, covert methods of security clearance may be
employed.
2
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
Pilferage - Act of stealing small things or items of little value, especially habitually.
TYPES OF PILFERAGE
1) Casual pilferer - one who steals due to his inability to resist the unexpected opportunity and
has little fear of detection.
2) Systematic pilferer - one who steals with preconceived plan and takes away any or all types of
items or supplies for economic gain.
3
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
An organization can consult with the security expert to determine if a security survey is
necessary. They can also seek information about their crime related losses. They can use the security
survey to determine if they need to be concerned about certain security issues such as theft , fraud,
forgery , arson, burglary , robbery, malicious , damage, personnel screening and investigation , theft of
trade secrets industrial espionage , executive protection , kidnap, extortion , bomb threats, bombing and
emergency/ disaster planning.
If there were security no plan, the security survey will be useful in determining the need for it,
as well as determine the security measures that should be included in the plan. A comprehensive survey
of the facility’s entire operations and procedures will enable the organization’s decision-makers to
identify critical security factors in the facility. The survey will also be useful in analyzing vulnerabilities
and evaluating cost-effective countermeasures for protection of assets. The survey should also
recommend the establishment of policies and procedures regarding the following security services
(Sennewald, 2003)
Protection against internal and external, theft, including embezzlement, fraud, burglary, robbery,
industrial espionage, and the theft of trade secrets and property information.
Development of access control procedures to protect the facility perimeter as well as the
computer facilities and executive offices located inside.
Establishment of lock and key-control procedures.
Installation of anti-intrusion and detection systems.
Establishment of a workplace violence program to help corporate personnel deal with internal
and external threats.
Control over the movement and identification of employees, customers and visitors on company
property
Selection, training, and deployment of security personnel .
Establishment of emergency and disaster plans and guidelines.
Identification of internal resources available and needed for the establishment of an effective
security program.
Development and presentation of instructional seminars for management and operations
personnel.
The above lists includes the most frequently encountered programs and systems reviewed or
developed as a result of a security survey, but security expert may add to it depending on the needs of
the facility.
The Value of a Security Professional
Organization face huge due to security elated concerns that a security survey could have
eliminated, prevented, or controlled. Security professional are equipped with expertise to handle such
matters. Cherles A. Sennewald the value of the security professional in preventing such loss (Sennewald,
2003).
By employing services of security professionals who can facilitate the installations of appropriate
installation of security measures in a facility’s an organization will be able to reduce disruption in the
facility operations, minimize loss and, ultimately, improve net profits.
Security Inspections
Security inspection is a tool determines the possible risk in a facility in order to control or
prevent possible loss or damage of company assets. This through assessment of what assessment of
4
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
what is happening from a security point of view ensures that the risk is recognized and cost effective
countermeasure are in place.
Security inspection deals with the protection any person, facility material, information, activity
and other assets that have a positive value to the organization. These assets may also have value to an
adversary, possibly in a different nature and magnitude to how the owners value them.
Security inspection also deals with the prevention of risk by taking action or using physical
entities to reduce or eliminate one or more vulnerabilities. Vulnerabilities are weakness that can be
exploited by an adversary to gain an asset. They include structural, procedural electronic, human, and
other elements that provide opportunities to attack assets
Purpose Security Inspection
1. To determine compliance of security policies.
2. To detect weaknesses in the existing security measures
3. To assess assets and the probability of risk or the likelihood that loss will take place.
Safety Inspection
Safety is generally defined as the state of being certain that adverse effects will not be caused by
some agent under fined conditions. It means freedom from danger, risk or injury. It involves measure
(people, procedures or equipment) used to prevent or defect an abnormal condition that can endanger
people, property, or the enterprise. These abnormal conditions include accidents caused by human
carelessness, alternativeness, and lack of training or other unintentional events.
Purpose of Safety Inspection
5
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
6
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
This module of Security and risk analyses are the reasons for all security activities whatever
problems are involved, be it cash, negotiable instruments, permanent assets and fixture or even
intangible assets like trade secrets.
Unless actual assessment of threats to assets is dine, precautions and countermeasures cannot
be presumed. The significance of a security program depends not only upon the excellence of the
resources, but upon their appropriateness and relevance. In this process, determination of the problem
must be initially done followed by formulation of countermeasures.
Security Analysis
Risk Assessment – this is the process of determining and rating the degree of risk that threatens the
organizations’ resources
When an organization makes a decision to protect its assets, it is necessary to clearly
understand the actual threats to assets through effective security plan. Without the security plan,
decision-makers will have to rely on guesswork in choosing the precautions and countermeasures
against threats.
Defining the Problem
Defining a security problem involves an accurate assessment of three factors (POA Publishing
LLC, 2003)
1. Loss Event Profile - the kinds of threats or risk affecting the assets to be safeguarded.
This is the first step dealing with asset vulnerability. it requires recognizing individual
loss events that might occur by conditions, circumstances, objects, activities and relationships
that can produce the loss events.
2. Loss Event Probability- the probability of those threats becoming actual loss events.
P= f/n
Where:
P- is the probability that a given event will occur
f – is the number of outcomes or results favorable to the occurrence of that event.
N – is the total number of equally possible outcomes or result.
Probability Ratings
Upon gathering of available data and factual circumstances in each risk, it is right to assign a
probability rating. Ratings will not consider any precaution or countermeasures that may be taken later
to reduce or eliminate the risk.
7
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
Usually, five categories of probability are established to indicate the probability rating. With the
amount of information available concerning each risk, plus the skill on the protection specialist in
assessing the probability impact of the factual circumstances surrounding it. The ratings may be given as
follows:
a.Virtual Certain- given no changes, the event will occur.
b.Very Probable- The likelihood of occurrence
c. Average Probability- the event is more likely to occur than not to occur.
d.Less Probable – The event is less likely to occur than not to occur.
e.Very Improbable- Insufficient data are available for an evaluation.
3. Loss Event Criticality – the effect in the assets or on the enterprise responsible for the assets if the
loss occurs.
Loss event criticality is the impact of a loss as measured in financial terms. How important it is in
terms of the survival or survival or existence of the organization.
High probable risks may not require countermeasures if the overall damage is little. However,
moderately probable risks will require attention if the size of the loss they produce is great.
Assessing the criticality is the third step vulnerability assessment. It is first considered on occurrence
basis. For events with high recurrence probability, cumulative considerations must also be done.
Criticality includes the following cost considerations:
K= (Cp +Ct + Cd) – (I- a)
Where:
K = critically cost of the loss
Cp = Cost of permanent replacement
Ct = Cost of temporary replacement
Cr = Related cost
Cd = Discounted cash
I = Insurance a =allocable insurance premium
Critically Known or Unknown Percentage of Impact
100% = Fatal
75% = Very Serious
50% = Average
25% = Less Serious
0% = Unimportant
Security Hazards
Every organization has the responsibility of protecting lives and property by means of disaster
preparedness and emergency management. It helps minimize loss and ensure the continuity of
production that is vital to the recovery of an area after the occurrence of disaster. A disaster may be in
the form of destructive storm, fire, explosion, sabotage, civil disturbances, nuclear incident or even an
earthquake.
In this kind of scenario, managers should do planning coordination with the local authorities to
make certain that corporate and community resources would be used to their fullest advantage in an
emergency
8
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
Types of Hazards
1. Natural Hazards
These are risk arising from natural phenomena. Nobody can do anything to prevent this
kind of occurrences, but there are measures that can placed or installed to minimize the
damage or destruction of property, injury, or loss of life . Since it is part of physical
security, security plans must be coordinated with the installation’s emergency and disaster
plans.in the design of security plan, emergency situations and disasters must be fully
considered so that in the event of their occurrences, immediate course of action can be
made thus preventing or minimizing the loss of property and lives.
- Flash floods cause by typhoons and monsoon rains - Earthquakes - Fires - Storms -
Volcanic eruptions - Lightning storms - Extreme temperature and humidity - Landslides
2. Man-made Hazards
It is the result of a state of mind, attitude, and weakness of character traits. One can be
due to an act of omission or commission, either overt or covert, which can disrupt the
operation of an organization.
- Carelessness - Accidents - Sabotage - Espionage - Pilferage - Theft - Disloyalty –
Vandalism
Risk refer to the degree of loss in a threat. A probability or threat of damage, injury, liability, loss, or any
other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided
through preemptive action. It is also defined the potential damage or loss of an asset. It is in fact a
combination of two factors:
1. The value placed on that asset by its owner and the consequence, impact adverse effect of loss
or damage to that asset.
2. The livelihood that a certain weakness will be exploited by particular threat.
Risk analysis involves the security of specific vulnerability, probability and significance of potential
threats including natural and man-made.
Risk Management – this is a function of security that provides the guidelines to identify all the possible
risk that may threaten the organization, assess the impact of these risks to the business and determine
the likelihood of their occurring and their impact
Major Risks
Some of the major categories or risk s are arranged according to its seriousness:
- Nuclear attack - Natural catastrophe - Industrial disaster - Civil disturbances and malicious destruction -
Other crimes
Risk Assessment is a thorough look at your workplace to identify those things, situations, processes that
may cause harm, particularly to people. After identification is made, you evaluate how likely and severe
the risk is, and then decides what measures should be in place to effectively prevent or control the harm
from happening. The aim of the risk assessment process is to remove a hazard or reduce the level of its
risk by adding precautions or control measures, as necessary. By doing so, you have created a safer and
healthier workplace. Assessments should be done by a competent team of individuals who have a good
9
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
working knowledge of the workplace. Staff should be involved always include supervisors and workers
who work with the process under review as they are the most familiar with the operation.
In general, to do an assessment, you should:
• Identify hazards.
• Evaluate the likelihood of an injury or illness occurring, and its severity.
• Consider normal operational situations as well as non-standard events such as shutdowns,
power outages, emergencies, etc.
• Review all available health and safety information about the hazard such as MSDSs,
manufacturers literature, information from reputable organizations, results of testing, etc.
• Identify actions necessary to eliminate or control the risk.
• Monitor and evaluate to confirm the risk is controlled.
• Keep any documentation or records that may be necessary. Documentation may include
detailing the process used to assess the risk, outlining any evaluations, or detailing how
conclusions were made.
• The methods and procedures used in the processing, use, handling or storage of the substance,
etc.
• The actual and the potential exposure of workers.
• The measures and procedures necessary to control such exposure by means of engineering
controls, work practices, and hygiene practices and facilities.
By determining the level of risk associated with the hazard, the employer and the joint health and
safety committee can decide whether a control program is required.
It is important to remember that the assessment must take into account not only the current state of
the workplace but any potential situations as well.
10
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
X. Security Investigation
This module of security investigation is one of the major functions of a security
organization. Most security officers and supervisors are called upon is conduct preliminary
investigation on theft, injury or any other kind of incident. This investigation is usually non-
criminal in nature but still important since they may result in civil litigation
Investigation
• Process of discovering, collecting, preparing, identifying and presenting evidence to determine
what happened and who is responsible.
• An art or process which deals with the identity, location and arrest of a person who commits a
crime and simultaneously identify, collect, preserve and evaluate evidence for the purpose of
bringing criminal offender to justice.
• It is an art, which deals with the identity and location of the criminal offender and the
gathering and providing evidence of his guilt in criminal proceedings.
11
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
knowledge or facts which an investigator acquired from records or persons, which are pertinent
or relevant concerning the commission of a criminal activity.
Sources of Information
a. Regular Sources – is acquired from open sources, records, files.
b. Cultivated Course are information furnished by informants/informers.
c. Grapevine Source – are information given by the underworld characters such as prisoners
or criminals.
2. Interrogation – The skillful questioning of witnesses as well as suspect.
a. Interview Defined – it is the simple and systematic questioning of a person who
cooperates with the investigator
b. Interrogation defined – is the process of obtaining and admission or confession from
those suspects to have committed a crime. It is forceful and confrontational in nature.
c. Field Inquiry defined – it is the general questioning of all persons at the crime scene
conducted by the investigator
3. Instrumentation – it is the application of instruments and methods of physical sciences to the
detection of crimes. In other words, the summation of the application of all sciences in crime
detection known as criminalistics.
Purpose of Investigation
1. To identify the offender
2. To locate the offender
3. To provide evidence of his guilt
The primary job of the investigator is to answer the Cardinal points of Investigation;
12
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
13
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
14
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
b. Interrogation
c. Instrumentation
Investigation Report
Reporting writing is a crucial part of the investigation. The most diligent and professionally
conducted investigation loses its value if the effort is not properly reported. An investigative report is a
written document in which the investigator records the activity in the investigation and the evidence
gathered. A competent investigator writes a report so that a reader can readily understand what the
investigator did, why it was done and the results of the action.
Purpose of Investigation Report
The following are the rationale of an investigation report.
1. To provide a permanent official record of the investigation.
2. To provide other investigators with information necessary to further advance the
investigation.
3. To uphold the statements as facts on which designated authorities may base a
criminal corrective or disciplinary action.
15
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
16
JUAN PAOLO A. AGUIRRE Rcrim
BESTLINK COLLEGE OF THE PHILIPPINES
investigation is based on. It ends when the last piece of physical, testimonial or directly
observed date has been collected. The investigative process then moves to analysis and report
writing process.
2. A systematic approach to investigation applied.
C. The Investigative Analysis
Preliminary analysis of the investigative steps to be taken is made by someone who assigns and
reviews investigation as well as by the investigator. This results to a note or list of the investigative
steps to be taken and some instances the sequences. The investigator determines in advance the
precise location and availability of persons or premises to be interviewed or viewed. Other
preliminary observations include:
1. Is the prime or another informant a member of the bargaining unit? If so, what is the policy
should the informant request representation during the investigative interview?
2. Have all the persons, events and locations mentioned in the complaint been checked through
security investigative indexes and the results noted?
3. Should any operating or executive management personnel be notified of the initiation of this
investigation before further steps are taken?
4. Does it appear that recording or photographic equipment will be needed? If so, is it in
serviceable condition?
5. Is there a need for more than one security investigator for the case?
17
JUAN PAOLO A. AGUIRRE Rcrim