You are on page 1of 8

PERSONNEL SECURITY – refers to the procedure followed, inquiries conducted, and criteria

applied to determine the work suitability of a particular applicant or the retention of a particular
employee.

PURPOSE OF PERSONNEL SECURITY


1. To ensure that hired employees are best suited to assist the organization in achieving its
mission and vision;
2. To assist in providing the necessary security to the employees while they carry out their
functions.

PERSONNEL SECURITY INVESTIGATION (PSI) – It is an inquiry into the character,


reputation, discretion, integrity, morals, and loyalty of an individual in order to determine a
person’s suitability for appointment or access to classified matter.

TYPES OF PSI
1. National Agency Check (NAC) – It consists of Local Agency Check supplemented by
investigation of the records and files of the following agencies: PNP, ISAFP, NBI, CSC, Bureau
of Immigration and other agencies.
2. Local Agency Check (LAC) – Refers to the investigation of the records and files of agency in
the area of principal residence of the individual being investigated like clearances from Mayor,
Police, Prosecutor and Courts.

BACKGROUND INVESTIGATION (BI) – It is an inquiry which aims to verify applicant’s


information written at the applicants’ form, to ascertain his/her past employment experiences and
to obtain other information pertinent to the decision to employ.
- A check made on an individual usually seeking employment through subjects’ records in the
police, educational institutions, place of residence, and former employers.

Kinds of Background Investigation


1. Complete background Investigation (CBI) – a type of BI which is more comprehensive,
particularly all the circumstance of his personal life.
2. Partial Background Investigation (PBI) – Investigation of the background of the individual
but limited only to some circumstances of his personal life.

FACTORS TO BE CONSIDERED IN THE CONDUCT OF BI


1. Loyalty – faithful allegiance to the Philippine government and its duly constitutional
authorities;
2. Integrity – uprightness in character, soundness of moral principle, freedom from moral
delinquencies.
3. Discretion – the ability or tendency to act or to decide with prudence, the habit of wise
judgment;
4. Morals – distinctive identifying qualities which serve as an index to the essential or intrinsic
nature of a person;
5. Character – the sum of traits that have been impresses by nature, education and habit upon
the individual;
6. Reputation – opinion or estimation in which one is generally held. It is what a person is
reported to be whereas character is what a person is.

INVESTIGATIVE COVERAGE
1. Prior Employment;
2. Claimed education;
3. Claimed residence for the period covered in the employment and educational institutes;
4. If the candidate indicates a criminal record, then the details should be checked.

INVESTIGATIVE STANDARDS
1. Information sought should be relevant;
2. Information should be reliable;
3. If unfavorable, the information should be confirmed by at least two sources.

SECURITY EDUCATION
It is defined as the exposure and teaching of employees on security and its relevance to
their work. Security education is conducted to develop security awareness among employees of
the company. It should cover all employees, regardless of rank or position.

PERSONAL SECURITY – Protection of personnel especially ranking official from any harm,
kidnap, and others act. VIP security is type of personnel security.

DOCUMENT AND INFORMATION SECURITY – Security involving the protection of


documents and information from loss, access by unauthorized persons
> prescribes the policies and establishes the standard basic procedures governing the
classification and security of official matter.

GENERAL PRINCIPLES
1. The authority and responsibility for the preparation and classification of classified matter rest
exclusively with the originating office;
2. Classified matter should be classified according to content and not the classification of the file
in which they are held or of another document to which they refer;
3. Classification should be made as soon as possible by placing the appropriate marks on the
matter to be classified;
4. Each individual whose duty allows access to classified matter is responsible for the protection
of the classified matter while it is in his/her possession and shall insure that dissemination of
such classified matter is on the “need to know” basis and to “property cleared personnel only”.
CLASSIFY – refers to the act of assigning to information or material one of the four security
classification categories after determination has been made that the information requires the
security protection as provided for in the regulation;

SECURITY CLEARANCE – Is an administrative determination that an individual is eligible


from a security standpoint for access to classified matter of a specific category;

COMPARTMENTATION – Refers to the grant of access to classified matter only to properly


cleared persons when such classified information is required in the performance of their official
duties and restricting it to specific physical confine when feasible.

NEED TO KNOW – term given to the requirement that the dissemination of classified matters
be limited strictly to those persons whose official duties require knowledge thereof.

SECURITY OF CLASSIFIED MATTER

CLASSIFICATION OF DOCUMENTS
Memorandum Circular No. 196, dated 07/19/1968 (Security of Classified Matter in
government offices)
1. TOP SECRET – any information and material, the unauthorized disclosure of which would
cause exceptionally grave damage to the nation, politically, economically or militarily;
2. SECRET- any information and material, the unauthorized disclosure of which would
endanger national security, cause serious injury to the interest or prestige of the nation or any
governmental activity.
3. CONFIDENTIAL – any information and materials, the unauthorized disclosure of which
would be prejudicial to the interest or prestige of the nation or governmental activity or would
cause administrative embarrassment or unwarranted injury.
4. RESTRICTED – any information and material which requires special protection other than
those determined to be Confidential, Secret, and Top-Secret matters.

METHOD OF TRANSMISSION
1. By direct contact of officer or personnel concerned;
2. By official courier;
3. Electrical means in cryptographic form
4. Registered Mail

DESTRUCTION
1. Burning
2. Shredding

STORAGE shall be in a safe, steel filing cabinet with built in dial type combination lock of such
weight, size and construction as to minimize the possibility of physical theft or damage to fire.

OPERATIONAL SECURITY – part of physical security that deals primarily with the
protection of processes, formulas, patents, and other industrial and manufacturing activities from
espionage, infiltration, loss, compromise or photocopying;

INFORMATION CYCLE
1. The Creation – Information is discovered and develop;
2. Used – Some action is taken with the information;
3. Storage and Retrieval – Stored for future use;
4. Transfer – transferring of information from active to inactive use;
5. Disposition – decision may be made to retain the information indefinitely.

CYBER CRIMES
ACTS IN VIOLATIONS OF ELECTRONIC COMMERCE ACT (RA 8792 Approved on
June 14, 2000)
1. Any acts of hacking or cracking or unauthorized access into or interference in a computer
system/server or information and communication system; or any access in order to corrupt, alter,
steal, or destroy using a computer or other similar information and communication devices
including the introduction of computer viruses and the like, resulting in the corruption,
destruction, alteration, theft or loss of electronic data messages or electronic documents.
2. Any act of Piracy or the unauthorized copying, reproduction, dissemination, or distribution,
importation, use, removal, alteration, substitution, modification, storage, uploading,
downloading, communication, making available to the public or broadcasting of protected
materials, electronic signature or copyrighted works including legally protected sound recording
or phonograms or information material on protected works, through the use of
telecommunication networks, such as, but not limited to, the internet, in a manner that infringes
intellectual property rights.
3. The access is without the knowledge and consent of the owner of the computer or information
and communications system.
4. Other analogous acts.

PENALTIES
(a) Hacking or crackling or any access in order to corrupt, alter, steal, or destroy using a
computer or other similar information and communication devices, without the knowledge and
consent of the owner of the computer or information and communications system, including the
introduction of computer viruses and the like, resulting in the corruption, destruction, alteration,
theft or loss of electronic data messages or electronic documents shall be punished by a
minimum fine of One Hundred Thousand pesos (P 100,000.00) and a maximum
commensurate to the damage incurred and a mandatory imprisonment of six (6) months to
three (3) years;
b) Piracy or the unauthorized copying, reproduction, dissemination, or distribution, importation,
use, removal, alteration, substitution, modification, storage, uploading, downloading,
communication, making available to the public, or broadcasting of protected material, electronic
signature or copyrighted works including legally protected sound recording or phonograms or
information material on protected works, through the use of telecommunication networks, such
as, but not limited to, the internet, in a manner that infringes intellectual property rights shall be
punished by a minimum fine of One Hundred Thousand pesos (P 100,000.00) and a maximum
commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three
(3) years;

KINDS OF SENSITIVE INFORMATION


PROPRIETARY INFORMATION – information which some special way is related to the
status, operations or activities of the possessor over which the possessor asserts ownership.
TRADE SECRETS – It may consist of any formula, pattern, device or compilation of
information which is used in one’s business and which gives one opportunity to gain an
advantage over competitors who do not know or use it.
PATENT – A grant given by the government to an inventor, conveying and securing to him the
exclusive rights to make, use and sell his invention for term of twenty (20) years.

LAW ON INTELLECTUAL PROPERTY


INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES [Republic Act No. 8293]
Approved on June 6, 1997 AN ACT PRESCRIBING THE INTELLECTUAL PROPERTY
CODE AND ESTABLISHING THE INTELLECTUAL PROPERTY OFFICE,
PROVIDING FOR ITS POWERS AND FUNCTIONS, AND FOR OTHER PURPOSES

THREAT TO PROTECTION OF SENSITIVE INFORMATION


Competitive Intelligence – systematic program for gathering and analyzing information about
competitor’s activities and general business trends to further company’s goals.

Types of Competitive Intelligence


1. White – information available from company publication, public records or commercial
reporting sources;
2. Gray – not readily available but which is usually can be obtained without acquiring any
civil/criminal liability in the process.
3. Black – obtained through clearly unethical or illegal means.

TYPES OF DOCUMENTS
Class I – Vital Document – This is an irreplaceable record, reproduction of which does not have
the same value as the original;
Class II – Important Document- This is a record, reproduction of which cause considerable
expense and labor, or considerable delay.
Class III – Useful Document – This is a record, the loss of which may cause inconvenience but
could be readily replaced and may not present insurmountable obstacle to the prompt restoration
of the business;
Class IV- Nonessential Document – This record may include daily files, routine in nature, loss
of which will not affect the organization.

You might also like