Professional Documents
Culture Documents
ALL NOTES)
1. Access control - are used to monitor and control traffic through specific access
points and areas of the secure facility.
2. Access right - the rights granted to an authorize person that specify how they
are able to access a document.
3. Accountability - the ability to hold an individual accountable for their actions.
4. Active rights management - digital rights may be managed in a number of
ways.
5. Addressing weaknesses - most employees will have some weaknesses in their
workplace skills.
6. Administrative - security officers typically write reports about their daily
observations and actions.
7. Administration - refers to the group of individuals who are in charge of creating
and enforcing rules and regulations.
8. Advantages of PSA - in case of company strikes, agency guards will be on duty
of carry out their duties.
9. Advantages of CSA and GSA - company guards are more familiar with
facilities they protected.
Alarm systems and sensors - can be installed to alert security personnel when
unauthorized access is attempted.
10. Asset - is a resource with economic value that an individual, corporation or
country owns or control with the expectation that it will provide a future
benefit.
11.
12. Audit - the provision of a separate means of verifying the correctness of
financial records.
13. Authorization - permission to do something. In DRM, permission may be
given by the owner of the rights or by an administrator.
14. Background Investigation - a through and complete investigation of all or
some of the circumstances or aspects of a person’s life is conducted.
15. Budgeting - time and money are scarce resources to all individuals and
organizations.
16. Chief of Marketing Officer No. 6-2018 - set the foundations of Bachelor of
Science in Industrial Security Management as new program under Criminal
Justice Education.
17. Complete Background Investigation - consist of the investigation of the
background of a person, particularly all the circumstances of his personal life.
18. Combination barriers - are typically designed to defeat defined threats.
19. Company Security Force - a security force or unit maintained and operated by
private company/corporation for its own security requirements only.
20. Compliance - the full compliance inspection is generally conducted for
enforcement purpose.
21. Confidentiality - keeping the content of a document secret from anyone who is
not authorized to see it.
22. Controlling/Monitoring - checking current outcomes against forecast plans and
making adjustments when necessary so that goals are achieved.
23. Control/Safeguards - that are in-place at the time the risk analysis is done.
24. Countermeasures - an asset’s level of vulnerability to the threat population is
determined solely by countermeasures.
25. Copyright - quite literally, the right to control the making of copies of a work.
26. Cryptography - a means of making information inaccessible to those without
the authority to read it.
27. Cloud Security Alliance - shall be organized and conform substantially to the
organizational structure prescribed for security agencies.
28. Close-out - a close-out self-inspection is accomplished immediately prior to
the action to administratively terminate an authorized to secret control station.
29. Deterrence methods - is to convince potential attackers that a successful attack
is unlikely due to strong defense.
30. Digital Leakage - this is a term used by some DRM providers to mean the
transfer of the contents of electronic documents.
31. Digital Rights Management - the management method by which controls are
implemented over digital documents.
32. Disadvantages of PSA - security guards is not familiar with facilities they
protect.
33. Disadvantages of CSA and GSA - security guards may be required joining
union
34. Document Control - the application of restrictions on the use of a document.
35. Document Revocation - this usually means stopping people from being able to
use documents that were previously available.
36. Duty Detail Order - is a written instruction issued by the agency to its guard to
perform lawful order.
37. Duty of Security Guards in Making Arrest - to turn over the arrested person to
the nearest police officer unit or station without necessary delay and with the
time prescribes in Article 125 of RPC.
38. Encryption - scrambling information in such a way that only those who have
the correct key are able to return it to its original form.
39. Enterprise DRM - a term used by some RM product providers to suggest that
the controls over documents.
40. Evaluation - the evaluate of fact finding inspection is generally positive in tone
and promotes liaison and security awareness.
41. Expected Loss - to the asset is estimated by examining various combinations
of threats and vulnerability areas.
42. Factor Authentication - issued to a security personnel of the agency shall be
carried by the security guard during his tour of duty while in proper uniform.
43. Follow-up - another form of compliance inspection is the follow-up
inspection, conducted to ensure that facility officials.
44. General Security Agreement - shall be organized and conform with the
organizational structure of the said government firm but only contrary to the
organizational structure.
45. Government Security Force - a security force or unit maintained by any
government entity other than AFP and PNP.
46. Intellectual Property Rights (IPR) - these are rights, recognized in
international law and by international treaties that creators have in those things
made by use of their own intellect.
47. Leading/directing - determining what needs to be done in a situation and
getting people to do it.
48. License Control - this is the control that grants a license to one or more
authorized users of a document or a computer program.
49. License to Exercise Profession - shall mean any document issue by the CPNP
or his duly authorized representative recognizing a person to be qualified to
perform his duties.
50. License to Operate - a document issued by the CPNP or his duly authorized
representative authorizing a person to engage in the occupation.
51. Management - must then decide on whether to accept the residual risk or to
implement the recommended actions.
52. Method of Arrest - when making an arrest, the SG shall inform the person to
be arrested of the intention to arrest him and the cause of the arrest.
53. Motivating - motivation is a basic function of management because without
motivation, employees may feel disconnected from their work.
54. Natural Surveillance - another major form of deterrence that can be
incorporated into the design of facilities is natural surveillance.
55. National Agency Check - this is an investigation of an individual made upon
the basis of written information supplied by him in response to official inquiry.
56. Organizing - implementing a pattern of relationships among workers and
making optimum use of the resources.
57. Partial Background Investigation - consist of the investigation of the
background of an individual but limited only to some of the circumstances of
his personal life.
58. Passive Rights Management - whilst active rights management deals with
situations where the owner of a documents.
59. Patent - this is a form of IPR that gives the holder the absolute right to
exploitation of the intellectual property for a fixed period of time.
60. Planning - deciding what needs to happen in the future and generating plans
for action.
61. PDF Security - this term refers to the portable document format that was
developed by Adobe Systems Incorporated.
62. Personnel Security - all personnel shall undergo security orientation,
indoctrination and security education.
63. Personnel Security Investigation - it is an inquiry into the character, reputation,
discretion and loyalty of individual in order to determine a person’s suitability.
64. Pre-Licensing Training Course - is an orientation of an incoming security
personnel as security guards regarding the nature of the security profession.
65. Principle - just any other control technique, security must start from a given
foundation or basis and this basis shall be referred to as the principles of
security.
66. Private Detective - any person who does detective works for hire, reward or
commission other than members of the PNP an the AFP.
67. Private Security Agency - any person, association, partnership, firm or private
corporation who contracts, recruits, trains, furnishes or posts.
68. Private Security Authority - organized to operate with an initial requirement of
at least 100 security guards during the first year of operations.
69. Private Security Authority License - its issuance requires that applicant should
obtain a minimum capitalization.
70. Program Implementation - is about making a program work. It includes who,
what, where, and how a program is set up and run.
71. Philippine National Police - is hereby, established, initially consisting of the
members of the police forces who integrated into the Integrated National
Police (INP).
72. Philippine Supreme Court - has rendered leading or landmark decisions
interpreting an expounding on the meaning and scope of the constitutionally
guaranteed rights.
73. Physical Barriers - such as fences, walls and vehicle barriers act as the
outermost layer of security.
74. Physical Security - describes security measures that are designed to deny
unauthorized access to facilities, equipment and resources and to protect
personnel and property from damage or harm.
75. Republic Act 6975 - it is hereby declared to be the policy of the state to
promote peace and order, ensure public safety and further strengthen local
government capability.
76. Republic Act 8551 - an act providing for the reform and reorganization of the
Philippine National Police and for other purposes.
77. Revise Penal Code - criminalizes a whole class of acts that are generally
accepted as criminal.
78. Risk - is a probability or threat of damage, injury, loss or any other negative
occurrence.
79. Risk Analysis Process - should be conducted with sufficient regularity to
ensure that each agency’s approach to risk management is a realistic.
80. Scope and Purpose - personnel security generally embraces such security
measures as personnel security investigation.
81. Security - refers to all the measures that are taken to protect a place or to
ensure that only people with permission enter it or leave it.
82. Security Agency - shall be authorized on a limited and reasonable quantity of
ammunitations that will suit.
83. Security Chain - personnel is the weakest link in the security chain.
84. Security Inspection - it is a check of how well existing security measures and
regulations are being carried out within a command.
85. Security Investigation - the objective of an investigation is to get the facts so
that a resolution of the complaint and situation can be achieved.
86. Security Lighting - is another effective form of deterrence.
87. Security Risk Analysis - is a procedure for estimating the risk to assets an loss
because of manifested threats.
88. Security Survey - is a thorough physical examination of a facility and its
operations with respect to personnel and company assets.
89. Secure Access Rights - this term is used by some DRM product providers to
suggest that the access rights conferred are secure in some way.
90. Self Inspection - this is initiated by the security officer of facility manager to
evaluate his/her own security program.
91. Staffing - job analysis, recruitment, and hiring of people with the necessary
skills for appropriate jobs.
92. Staffing and Administration - is the managerial function of recruitment,
selection, training, developing, promotion and compensation of personnel.
93. Supervisory Roles - it also includes the study and practice of the means of
protecting resources from loss and damages.
94. Survey Process - begins by listening to a key stakeholders and setting
objectives.
95. Territorial Power - security guards shall watch, secure the property of the
person, firm or establishment with whom he or this agency has a contact for
security services.
96. Threat - A statement of an intention to inflict pain, injury, damage or other
hostile action.
97. Universal Declaration - begins by recognizing that the inherent dignity of all
members of the human family.
98. Universal Declaration of Human Rights - articulates fundamental rights and
freedoms for all.
99. Vulnerability - refers to the inability to withstand the effects of a hostile
environment.
100. Video surveillance - can be a deterrent when placed in highly visible
locations, and are also useful for incident verification and historical analysis.
1. Abu Sayyaf Group - is a radical islamic terrorist group active in the southern
philippines and malaysia.
2. Advisers - these are experts in a purely advisory capacity, who may be
appointed by the executive committee and confirmed by the general assembly.
3. Adolf Hitler of Germany - subjugated and exterminated more than six million
jews into gas chambers.
4. Affiliations - Al-Qaeda serve as an umbrella organization for a worldwide
network that includes many sunni-islamic extremist groups.
5. Akyat-Bahay Gang - is the most common robbery scheme in the philippines.
6. Alvin Flores/Ultra-Violent Gang - other than being the leader of the ultra-
violent gang that bears his name.
7. Ambush - this is a well-planned, well though-out properly rehearsed and
precisely executed operation.
8. Assassination - the oldest but the commonly used terrorist tactics where targets
are often police or military officials.
9. Asset recovery - a highlight of the convention is the inclusion of a specific
chapter on asset recovery.
10. Ativan Gang - ativan perpetrators commonly victimize foreigners who roam
alone in public places.
11. Arson - this is use to destroy or to disrupt public utilities political HQs and
industrial facilities.
12. Authority of Police - comes from the people their laws and institutions. Police
agencies are not only part of the community but also part of the government.
13. Baraha Gang - members of this gang are typically waiters and cashiers who
target credit card users in business establishments.
14. Besfren Gang - this gang targets shoppers who check out items sold in stalls
such as jewelries, watchers, mobile phones, and other electronic gadgets.
15. Bombing -delivery to target is done through vehicle bomb-body traps with
attached devices.
16. Budol-Budol Gang - is a transaction scam principally involving a supposed
bundle or budol of cash.
17. Bukas Kotse Gang - spotting a potential victim driving a car with unlocked
doors, a pair will force their way into an occupied parked car.
18. Blue Notice - collect additional information person identity intelligence
19. China - is another model of singular coordinated centralized police force.
20. Competition - survival in the new global business market calls for improved
productivity and increased competition.
21. Cultural - growth of cross-cultural contacts; advent of new categories of
consciousness and identities which embodies cultural diffusion.
22. Cybercrimes - are generally defined as any type of illegal activity that makes
use of the internet.
23. Dura Boys - this tactic is usually carried out by a group of three.
24. Drug Trafficking - involves selling drugs and drug paraphernalia, whether it is
a local exchange between a user and a dealer or a major international
operation.
25. Ecological - the advent of global environmental challenges that might be
solved with international cooperation.
26. Economic - realization of a global common market, based on the freedom of
exchange of goods and capital.
27. Emilio Changco Syndicate - one of the most infamous pinoy pirates of all
time.
28. Estribo Gang - attackers prey on passengers inside a bus or jeepney by
positioning themselves near the estribo or vehicle’s exit.
29. Executive
30. France - is a typical example of a police force with multiple coordinated
centralized force.
31. General Assembly -is composed of delegates appointed by each member
country.
32. Global Policing - policing plays an increasingly important role in United
Nations peacekeeping and this looks set to grow in the years ahead.
33. Green Notice - provide warning about person criminal offenses.
34. Grepor “Butch” Belgia - although he may be known today as a born-again
pastor.
35. Hijacking/Skyjacking - are commonly used by terrorist. The hijacking supply,
ammunitions, fuel cargoes, and vehicles to provide them to gain entry to a
close military area.
36. Hostage Taking - confronts the authorities and openly holds the victims for
ransom.
37. Human Trafficking - is the illegal trade in human beings for the purposes of
commercial sexual exploitation or forced labor.
38. India - indian model of police organization is an example for a multiple
unorganized decentralized policing.
39. Industrial - emergence of worldwide production markets and broader access to
a range of foreign products for consumers and companies.
40. Informational - increase in information flows between geographically remote
locations.
41. Interpol - their role is to enable police around the world to work together to
make the world a safer place.
42. International Cooperation - countries are bound by the convention to render
specific forms of mutual legal assistance in gathering and transferring
evidence.
43. International Terrorist - terrorist who are controlled by, and whose actions
represent the national interest of a sovereign state.
44. Ipit Gang - ipit gang members shove or push a prospective victim to distract
him or her.
45. Jemaah Islamiyah - is a militant islamist group active in southeast asian
countries that seeks to establish a pan-islamic state across much pof the
region.
46. Kidnapping - for ransoms is the most common form of this tactic.
47. Kotong - the common victims of this MO are foreigners, balikbayans and their
dependents.
48. Laslas Bag/Laslas Bulsa - perpetrators of this crime usually target victims in
crowded areas.
49. Laglag-Barya Gang - member of this gang drop coins or small bills near their
victim.
50. Leonardo “Nardong Putik” Manecio - was involved in several felonies ranging
from murder, abductions, robberies.