You are on page 1of 11

CINDISECON ➢ Data are available from the manufactures of

WEEK 8 - Protective Lighting lighting equipment and from the Army Corps of
➢ Protective Lighting provides a means of continuing, during Engineers, which will assist in designing a
hours of darkness, a degree of protection approaching that lighting system.
maintained during daylight hours. This safeguard also has ➢ Included in these data are: Descriptions,
considerable values as a deterrent to thieves and vandals characteristics, and specification of various
and may make the job of the saboteur more difficult. It is incandescent, arc, and gaseous discharge lamps.
an essential element if an integrated physical security Lighting patterns of the various luminaries.
program. Typical layouts showing the most efficient height
➢ Depending on the nature of the facility, protective lighting and spacing of equipment.
is designed to emphasize the illumination of the perimeter. ➢ Minimum protective lighting intensities required
In the case, it produces sufficient light to create a for various applications.
psychological deterrent to intrusion as well as to make
detection virtually certain in the event an entry is made. It Principles of Protective Lighting
must avoid glared that would reduce the visibility of ➢ Protective lighting should enable guard force personnel to
security personnel, while creating glared to detect intruder. observe activities around or inside an installation without
This is particularly important where the facility is within disclosing their presence.
streets, highways or navigable waterways.
➢ Adequate lighting for all approaches to an installation not
➢ The system must be reliable and designed with only discourages attempted unauthorized entry, but also
overlapping illumination to avoid creating unprotected area reveals persons within the area. However, lighting should
in the event of individual light failure. It must be easy to not be used alone.
maintain and it must secure itself against attack. Poles
should be within the barrier power lines and the switch box
➢ It should be used with other measures such as fixed
security posts or patrols, fences, and alarms.
must be protected.
➢ Other principles of protective lighting are listed next:
Requirements a. Good protective lighting as achieved by adequate,
a. Protective or security lighting needs at installation and even light upon bordering areas, glaring lights in the
facilities depend upon each situation and the areas to be eyes of the intruder, and relatively little light on
protected. Each situation requires careful study to provide security patrol routes. In addition to seeing long
the best visibility practicable for such security duties as distances, security forces must be able to see low
identification of badges and people at gate inspection of contrasts, such as indistinct outlines of silhouettes,
vehicles, prevention of illegal entry, detection of intruders and must be able to spot an intruder who may be
outside and inside buildings and other structures, and exposed to view for only a few seconds. Higher levels
inspection of unusual or suspicious circumstances. of brightness improve all of these abilities.
b. When such lightning provisions are impractical, additional b. In planning protective lighting, high brightness
security posts, patrols, entry dog patrols, or other security contrast between intruder and background should be
means will be necessary. the first consideration. With predominantly dark dirty
surfaces or camouflage types painted surfaces, more
c. Protective lighting should not be used as psychological
light is needed to produce the same brightness
deterrent only. It should be used on a perimeter fence line
around installations and buildings than when clean
only where the fence is under continuous or periodic
concrete, light brick, and grass predominate. When
observation. Protective lighting may be unnecessary
the same amount of light falls on an object and its
where the perimeter fence is protected by a central alarm
background, the observer must depend on contrasts
system.
in the amount of light reflected. The ability of the
d. Protective lighting maybe desirable for those sensitive observer to distinguish poor contrasts is significantly
areas or structures within the perimeter, which are under improved by increasing the level of illumination.
specific observation. Such areas or structures include pier
c. When the intruder is darker than his background, the
and dock areas, vital buildings, storage areas, and
observer sees primarily the outline or silhouette.
vulnerable control points in communications, power, and
Intruders who depend on dark clothing and even
water distribution systems. In interior areas where night
darkened face and hands may be foiled by using light
operations are conducted, adequate lighting of the area
finishes on the lower parts of buildings and structures.
facilitates detection of unauthorized persons approaching
Stripes on walls have also been used effectively, as
or attempting malicious acts within the area
they provide recognizable breaks in outlines or
silhouettes. Providing broad lighted areas around and
Characteristics
within the installation, against which intruders can be
a. Lighting is expensive to maintain and, when properly seen, can also create good observation conditions.
employed, may reduce the need for security forces.
d. Two basic systems or a combination of both may be
b. It may also provide personal protection for forces by used to provide practical and effective protective
reducing the advantages for concealment and surprise for lighting. The first method is to light the boundaries
a determined intruder. Security forces thus relieved maybe and approaches. The second is to light the area and
used to better advantages elsewhere. structures within the general boundaries of the
c. Protective lighting usually requires less intensity than property.
working light, except for identification and inspection at e. To be effective, protective lighting should:
authorized portals and in emergencies.
i. Discourage or deter attempts at entry by
d. Each area of an installation or facility presents its intruders. Proper illumination may lead a
particular problems based in physical layout, terrain, potential intruder to believe detection is
atmospheric and climactic conditions, and the protective inevitable
requirements.
ii. Make detection likely if entry is attempted. C. MOVABLE LIGHTING- this consists of stationary or
Types of Protective Lighting portable, manually operated searchlights. The searchlights
A. Stationary Luminary- this is a common type consisting may be lighted continuously during the hours of darkness
of a series of fixed luminaries to continuously flood a given or only as needed, and are usually supplementary to other
area. Types of Stationary Lighting types of secure lighting.
1. Glare Projection Type D. EMERGENCY LIGHTING- this may be duplicative of
➢ the intensity is focused to the intruder while the existing systems. This is at standby, which can be utilized
observer or guard remained in the comparative in the event of electronic failure, either due to local
darkness. The lighting is toward the entrance to equipment or commercial power failure.
an installation. Types of Light Lamps
➢ The glare projection lighting method is useful a. Incandescent Lamp- these are common light bulbs of the
where the glare of lights directed across type found in the home. They have the advantages of
surrounding territory will not be annoying nor providing illumination when in the home. They have the
interfere with adjacent operations. It is a strong advantages of providing illumination when the switch is
deterrent to a potential intruder because it makes thrown and are thus most commonly used protective
it difficult for him to see the inside of the area. It lighting system.
also protects the guard by keeping him in b. Gaseous discharge lamp- the use of gaseous discharge
comparative darkness and enabling him to lamps in protective lighting is somewhat limited since they
observe intruders at considerable distance require a period from two to five minutes to light when they
beyond the perimeter. are cold and even longer to relight when hot or after a
a. Glare projection or other protective perimeter power interruption. This is very economical to use but for
lighting may not be appropriate in some industrial security, it is not acceptable due to long time in
instances. In combat tactical perimeter the lighting in case it is turned off by accident or by low
security considerations are given first priority voltage or brown-out.
over security against pilferage. Generally, Types of Gaseous Discharge Lamps
the tightening of tactical perimeter security a. Mercury Vapor Lamps- these lamps give a blue-
strengthens other physical security efforts. A green color light due to the presence of mercury
blending of tactical and physical security vapor. Its initial cost is higher than the
principles is required especially true with incandescent lamps of the same voltage but is
regards to perimeter lighting. more efficient and gives more light. This is widely
b. Glare projection is not appropriate where used for interior and exterior lighting.
security troop emplacements may be b. Quartz Lamps- these lamps emit a very bright
silhouetted or illuminated for the enemy to white light and snap on almost as rapidly as the
see from the enemy’s approach to the incandescent lamp. They are frequently used at
secured site. Where glare projection is very high voltage, and they are excellent for use
desired, security troops placed in front of the along the perimeter barrier and in troublesome
perimeter fence should be moved, but still be areas.
able to take up effective fields of fire for
defense of the perimeter. If such blending of General Types of Lighting Sources
protective lighting and tactical security 1. Incandescent Lamp- it is the least expensive in terms of
cannot be accomplished, perimeter lighting energy consumed and has the advantage of providing
should not be used. Floodlights that provide instant illumination when the switch is on.
a band of light with great horizontal angular
dispersal and which directs the glare at a
2. Mercury Vapor Lamp- it is considered more efficient than
the incandescent and used widespread in exterior lighting.
possible intruder while restricting the
This emits a purplish-white color, caused by an electronic
downward beam, is preferred in this
current passing through a tube of conducting and
application.
luminous gas.
2. Controlled Lighting
3. Metal Halide- it has similar physical appearance to
➢ the lighting is focused on the pile of items rather mercury vapor but provides a light source of higher
than the background. The width of the lighted luminous efficiency and better color rendition.
strip can be controlled and adjusted to suit the
security needs.
4. Fluorescent- this provides good color rendition, high lamp
efficiency as well as long life. However it cannot project
➢ Controlled lighting is best when it’s necessary to light over long distance and thus, are not desirable as
limit the width of the lighted strip outside the flood type lights.
perimeter because of adjoining property or
nearby highways, railroads, navigable waters, or 5. High Pressure Sodium Vapor- this has gained
airports. In controlled lighting, the width of the acceptance for exterior lighting of parking areas,
lighted strip can be controlled roadways, buildings and commercial interior installations.
and adjusted to fit the particular need, such as Constructed on the same principles as mercury vapor
illumination of a wide strip inside a fence and a lamps, they emit a golden white to light pink color and this
narrow strip outside; or floodlighting a wall or provide high lumen efficiency and relatively good color
roof. This method of lighting often illuminates or rendition.
silhouettes security personnel as they patrol their
routes. Types of Lighting Equipment
B. STANDBY LIGHTING- this system is similar to 1. Floodlights- these can be used to accommodate most
continuously lighting but it is turned on manually or by a outdoor security lighting needs, including the illumination
special device or other automatic means. of boundaries, fences and buildings and for the emphasis
of vital areas or particular buildings. These are wide beam  Alarms are not meant to prevent criminal acts. Each
units, primarily used to extend the illumination in long, type of alarm is activated in the event that an intruder
horizontal strips to protect the approaches to the perimeter tapers the circuity, a beam or radiated waves. In short,
barrier. intrusion alarms are either electrical, mechanical, or
2. Street lights- this lighting equipment received the most electronic.
widespread notoriety for its value in reducing crime. These
produce diffused rather than directional beam. They are  Supplemental physical barriers in a form of sound that
directly used in parking areas. cause alarm installed indoors or outdoors in an
3. Search lights- these are highly focused incandescent installation.
lamp and are designed to pinpoint potential trouble spots.
4. Fresnel lights- these are wide beam units, primarily used Alarm systems can be broadly divided into two types:
to extend the illumination in long, horizontal strips to 1. A perimeter (or external) intrusion detection system
protect the approaches to the perimeter barrier. Fresnel (PIDS) or alarm.
projects a narrow, horizontal beam that is approximately 2. An internal security alarm system (SAS).
180 degrees in the horizontal and from 15 to 30 degrees in 3. Purpose of Protective Alarm System
the vertical plane.
• To economize.
General Considerations in Protective Lighting • To substitute in place of other security measures.
1. The determination of lighting needs must be depending • To supplement by providing additional control.
upon the threat, perimeter extremities, surveillance Function of the Alarm System
capabilities, and available guard forces • Detect fire or intrusion;
2. Protective lighting must be designed to discourage • Emergency Notification; and,
unauthorized entry and to facilitate detection of intruders • Monitoring equipment
approaching or attempting to gain entry into protected
areas. Between 95-98% of all alarm activation are said to be false. The
3. The protective lighting must be continuously operates most common causes of false alarm are:
during periods of reduced visibility, and that standby a) user negligence;
lighting is maintained and periodically tested for used b) poor installation or servicing; and,
during times of emergency and mobilization alerts.
c) faulty equipment
4. Cleaning and replacement of lamps and luminaries,
particularly with respect to costs and means required and
Kinds of Alarm Protection
available
There are three basic types of alarm systems providing for a
5. The effects of local weather conditions may be a problem security system:
in cases where fluorescent units are used. 1. Intrusion alarms signal the entry of persons into a
6. Fluctuating or erratic voltages in the primary power facility or an area while the system is in operation.
sources. Intrusion alarms signal the entry of persons into a
7. Requirements for grounding fixtures and the use of facility or an area while the system is in operation.
common ground on an entire line to provide a stable 2. Fire alarms operate in a number of ways to warn of
ground potential. fire dangers in various stages of development of a fire
or to respond protectively by announcing the flow of
WEEK 9 - Protective Alarms water in a sprinkler system. Fire alarms operate in a
Alarm is synonymous to warning of imminent danger. It can also number of ways to warn of fire dangers in various
be defined as a security device fitted to property, especially a stages of development of a fire or to respond
house or car, to make a warning sound if a break-in or theft is protectively by announcing the flow of water in a
attempted, sprinkler system.
It is a safeguard used to assist security to complement if not to 3. Special-use alarms warn of a process reaching a
supplement physical security is an array of alarms. These
dangerous temperature (either too high or too low),
alarms of various types and cost can be installed indoors or
of the presence of toxic fumes, or that a machine is
outdoors.
running too fast. Although such alarms are not,
A security alarm is a system designed to detect intrusion –
strictly speaking, security devices, they may require
unauthorized entry – into a building or other area. Security
the immediate reaction of security personnel for
alarms are used in residential, commercial, industrial, and
remedial action. Special-use alarms warn of a
military properties for protection against burglary (theft) or
process reaching a dangerous temperature (either
property damage, as well as personal protection against
too high or too low), of the presence of toxic fumes,
intruders.
or that a machine is running too fast. Although such
Alarm systems are also known as burglar alarm systems, security
alarms are not, strictly speaking, security devices,
protection systems or intrusion detection systems. All
they may require the immediate reaction of security
common alarm systems work based on the same technical
personnel for remedial action.
principle. They use a number of different sensors to detect a
break-in into a building or security area.
Three Common Elements or Parts of an Alarm System
Basic Concepts of Protective Alarms 1. Alarm Sensor or Trigger Device - a device that is
designed to respond to certain change in condition,
 Basically, alarms systems are designed to alert security
such as opening of a door, movement within a room,
personnel to consummated or attempted intrusion into
or rapid rise in heat.
an area, building or compound.
2. Circuit or sending device which carries messages
to the signaling apparatus - a sending device that
sends a signal about whatever is sensed to some 1. Foot Rail Activator – They are place on the floor in
other location that transmit the alarm signal such as such a position that tellers may activate the alarm by
electrical circuit (telephone), fiber optic lines, placing the front of their foot engage the activation bar.
through air waves.
3. Signaling system or a device sometimes called the
enunciator - a sounding or signaling device that
alerts someone that the sensor has detected a
change in condition. The device may be a light, a
bell, a horn, a self-dialing phone, or a punch tape. It 2. Foot or Rail Button – Like the foot rails it permits alarm
is a visual or audible-signaling device, which initiates activation in relatively safety while both hands remain
condition of associated circuits. clear in view of the robbers.
3. Bill Traps – bill traps or currency activation devices are
Types of Alarm Sensors
usually placed in the teller’s cash drawer and connected
1. Electromechanical Devices
to the alarm system using a wire connector. When
Metallic foil or wire – in building or compound, all point of
currency is removed from the devices, the alarm is
entry can be wired by using electrically charge strips of
activated. The advantage of these devices is that the
tinfoil wire. Any actions that will move the foil or wire
robbers frequently remove the currency and activate the
break the circuit and activate an alarm. Metallic foil or
alarm. This is particularly helpful when the employees
wire is used in window or glass surfaces. Doors and
are immediately forced to leave their station without
windows can be equipped with magnetic, or spring
having an opportunity to activate the alarm safely.
activated contacts, which will sound and alarm when
the door or window is opened. 4. Knee or Thigh Button – these are installed inside the
2. Photoelectric or electric eye desk or teller station so they can be activated by knee
A light beam is transmitted at a frequency of several or thigh pressure. They are commonly found in location
thousand per second. It is connected by a wire to a where personnel usually perform their duties from a
control station and when an intruder crosses the beam, seated position.
he makes contact with the photo electronic coil which 5. Double squeeze buttons – pressure is required on
thus activates the alarm. both side of the device and therefore the probability of
3. Sonic Alarm Systems accidental alarm is reduced. The design makes it
Audio detective device – it is a supersensitive microphone almost impossible to trip an alarm by accident.
speaker sensor is installed in walls, ceiling, and floors
of the protected area of any sound caused by Types of Alarm Detection System
attempted forced entry inspected by the sensor. 1. Central Station Alarm System – a type of protective
4. Vibration detection device – the vibration sensitive alarm system where the central station is located
sensor is attached to walls, ceiling, or floors of the outside the installation. It can be located in an agency
protected areas. The sensor detects any vibration and the installation is one of the subscribers. When
caused by attempted forced entry. In this system, a alarm is sounded, central station notifies police and
specialized type of contact microphone is attached to other agency. A system in which the alarm signal is
objects such as works of arts, safes, or files, or to relayed to remote panel located at the facilities of
surface such as walls or ceilings. Any attack on, or private owned protection. Service Company manned by
movement of, these objects or surfaces causes some its personnel.
vibration. This vibration is picked up by microphones, 2. Proprietary Alarm System – this function in the same
which in turn activate alarms. way as central system except that is owned by,
5. Motion-Detection Alarms operated, and located in the facility. Response to all
Operates by radio frequency or ultrasonic wave alarms is by facility’s own security or fire personnel.
transmission. The radio frequency (or microwave) Since this system is monitored locally, the response
motion detector transmits waves throughout the time to an alarm is considerably reduced.
protected area from a transmitting to a receiving
antenna.
3. Local Alarm System – in this case, the sensor
activates the circuit, which in turn activities a horn or
6. Capacitance Alarm System Are used to protect metal
siren or even flashing light located in the immediate
containers of all kinds. This alarm’s most common use
vicinity of the alarmed area. Only guard within sound or
is to protect a high-security storage area within a
hearing can respond to such alarms, so their use is
fenced enclosure.
restricted where guards are so located that their
7. Pressure Devices
response is assured.
Foot or Rail Button – placing the front of their foot to
engage the activation bar places foot rail activator on 4. Auxiliary Alarm System – in this system installation
the floor in such a position that tellers may activate the circuits are led into local police or fire department by
alarm. Foot rails do not acquire any obvious use of the lease telephone lines. The dual responsibility for
teller’s hand and their hands may be kept in full view of circuits and the high incidence of false alarms have
the robbers for reason of safety. Because of foot rail made this system unpopular with public fire and police
can be activated very obtrusively and safety, it is personnel.
frequently found in the banks where tellers normally 5. Local Alarm-By-Chance Alarm System – this is a
operate while standing up. local alarm system in which a bell or siren is sounded
8. Foot button – like the foot rail permit alarm activation with no predictable response. These systems are used
safety while both hands remain clear in view of the in residence or small retail establishments, which
robber. cannot afford a respond system. The hope is that a
neighbor or passing will reach to the alarm and call for
Types of Bank Intrusion Alarm System police assistance, but such a call is purely a matter of
chance.
6. Dial Alarm System – this system is set to dial a ➢ The overall classification of a file or of a group of
predestined number when the alarm is activated. The physically connected therein. Pages, paragraphs,
number selected might be the police or the subscriber’s sections, or components thereof may bear different
home number, or both. When the phone is answered, a classification. Documents separated from file or group
recording states that an intrusion is in progress at the shall be handled in accordance with their individual
location so alarmed. This system is relatively classification.
inexpensive to install and operate, but since it is
dependent on general phone circuit, it could fail if line
were busy or if the phone connection were cut.

Week 10
Document and Information Security ➢ Transmittal of documents or endorsements which do
Document and Information Security - This involves the not contain classified information, or which contain
protection of documents and classified papers from loss, information classified lower than that of the preceding
access by unauthorized persons, damage, theft, and element or enclosure shall include a notation for
compromise through disclosure. Classified documents need automatic downgrading.
special handling.
➢ Correspondence, indexes, receipts, reports of
OFFICE OF THE PRESIDENT OF THE PHILIPPINES possession transfer or destruction, catalogs, or
Memorandum Circular No. 78, s. 1964 (August 14, 1964) accession list shall not be classified if any reference to
classified matter does not disclose classified
A. DOCUMENT SECURITY information.
The aspect of security which deals with measures to prevent ➢ Classified matter obtained from other department
the unauthorized disclosure of classified information. shall retain the same original classification.
It prescribes the policies and establishes the standard basic ➢ Everyone whose duty allows access to classified
procedures governing the classification and security of matter is responsible for the protection of the classified
official matters. matter while it is in his/her possession and ensure that
It stresses the need to exercise extreme care in handling dissemination of such classified mater is on the “NEED
classified documents to preclude any serious TO KNOW” basis and to PROPERLY CLEARED
consequences for the organization. PERSONNEL ONLY.
➢ The security of classified matter should be the primary
concern of everyone employed in the government
Promulgating Rules Governing Security Matters in
service. It should be emphasized that it is the duty of all
Government Offices Objective of Document Security
personnel to be discreet in the use and handling of any
➢ Document Security prescribes the policies and information obtained in official capacity
establishes the basic procedures governing the
classification and security of official matter in the interest Definition of Terms
of any organization.
o Department – The term used to cover any Philippine
➢ To familiarize the personnel in the organization with Government Department, Service, or Instrumentality.
the proper safeguarding of classified documents from
disclosure to unauthorized persons. o Matter – includes everything, regardless of its physical
character, on, or in which information is recorded or
➢ To present the concepts that brings about safeguarding embodied. Documents, equipment, projects, books,
of classified documents by exercising extreme care in
reports, articles, notes, letters, drawings, sketches,
the use and handling of documents.
plans, photographs, recordings, machinery, models,
apparatus, devices, and all other products or substances
Responsibility for Protection
fall within the general term “matter”. Information which is
➢ Security is command responsibility. It is the duty of transmitted orally is considered as “matter” for purposes
all in-charge to assure themselves of the integrity and of security.
loyalty of personnel belonging to their offices. Effective
security is dependent on the character and loyalty of the
o Officer – includes any Government or Armed Forces
personnel having access to classified matter. official, or officer permanently or temporarily employed in
a department.
➢ The security of classified matter should be the primary
concern of everyone employed in the government o Document – Covers any form of recorded information,
service. It should be emphasized that it is the duty of all including printed, written, drawn or painted matter, sound
personnel to be discreet in the use and handling of any recordings, films, etc., and all their reproduction for
information obtained in official capacity. whatever purposes. “Documents” are included in
“matter.”
General Principles o Equipment – includes machinery, apparatus, devices,
➢ The authority and responsibility for the preparation supplies, ammunition, etc.
and classification of classified matter rest exclusively o Security Clearance – Is the certification by a
with the originating office. responsible authority that the person described is
➢ Classified matter should be classified according to cleared for access to classified matter at the appropriate
content and not the classification of the file in which level.
they are held. o Need to know – Is the principle whereby access to
➢ Classification should be made as soon as possible classified matter may only be given to those persons to
by placing appropriate marks on the matter to be whom it necessary for the fulfillment of their duties.
classified.
o Persons are nothing to have access to classified matter against unauthorized disclosure. Notification of
solely by virtue of their stat [document unclear] cognizant authorities is part of the process.

o Custodian – Is an individual who has possession of or is o Reclassifying or Regarding – This refers to the act of
otherwise charged with the responsibility for changing the assigned classification of a classified
safeguarding and accounting of classified material. matter. Notification of cognizant authorities is part of the
process.
o Certificate of Destruction – Is the certification by a
witnessing officer that the classified matter described
o Upgrading and Downgrading – This refers to the act of
therein has been disposed of, in his presence, by assigning to a matter a higher classification than that
approved destruction methods. previously assigned to it or in the other hand, the act of
assigning to a matte a lower classification than
o Physical Security – Is the safeguarding by physical previously assigned to it. Notification of interested offices
means, such as guards, fire protection measures and is part of the process.
other similar means, of information, personnel, property,
utilities, facilities and installations against compromise, Purpose of Protecting Classified Materials
trespass, sabotage, pilferage, theft, espionage or any
other dishonest or criminal act.
1. Deter and impede potential spy.
o Security Officers – A properly trained and cleared
2. Assist in security investigation by keeping accurate
records of the moments of classified materials.
Security Officer shall be appointed in every Department
of the Government which handles classified matter. He 3. Enforce the use of “Need to Know” principle.
shall undergo training to be conducted by the National
Intelligence Coordinating Agency or Armed Forces of the Two Kinds of Documents
Philippines intelligence agencies. 1. Personal – letters, diary, and notebooks. These
He shall be responsible to the Head of the should be treated usually the same with official
Department for the implementation and enforcement of document.
these regulations and the necessary action on breaches 2. Official – orders, manuals, letters, overlays, maps, and
of security. magazines. You may be careful and follow the chain of
Before appointment as a Security Officer, an officer command.
must first be cleared by the Head of the Department for
access to the highest classified matter the Department is Document and Information Cycle
authorized to handle. In providing this clearance, the
Head of the Department may coordinate with the 1. Creation
National Intelligence Coordinating Agency or the 2. Classification
Department of National Defense. 3. Storage
o Classify – Refers to the act of assigning to information 4. Retrieval
or material one of the four security classification
categories after determination has been made that the 5. Retention/Purging
information requires the security protection as provided 6. Transfer
for in these regulations. 7. Disposition
o Classified Matter – Is any information and in any form
or of any nature, the safeguarding of which is necessary Three Security Concepts
in the interest of national security, and which is classified 1. Personnel are the weakest link in the security chain.
for such purpose by the responsible classifying authority.
It includes all information concerning documents,
2. Training is important to make security personnel
development, projects, and materials falling in the conscious and realize the value of document. 3.
categories of TOP SECRET, SECRET, CONFIDENTIAL, Training is necessary for the practice of the “Need to
OR RESTRICTED. Know” principle.

o Compromise – Compromise takes place through loss of Four (4) Categories of Classified Matters
security which results from unauthorized person 1. TOP SECRET
obtaining knowledge of classified matter. As used in this Information and material (matter) the unauthorized disclosure
manner, the term “unauthorized person” means any of which would cause exceptionally grave damage to the
person not authorized to have access to classified nation, politically, economically, or from a security
matter. aspect.
o Unauthorized – It refers to any person not authorized to This category is reserved for the nation's closest secrets and
have access on classified matters. is to be used with great reserve.
Classification Authority: Rests exclusively with Head of
o Compartmentation – It refers to the grant of access to Department but this power may be delegated to
classified matter only to properly cleared persons when authorize officials in instances where the necessity for
such classified information is required in the such arises.
performance of their official duties and restricting it to
physical confine when feasible. 2. SECRET
o Damage to the Organization – This refers to the Information and material (matter) the unauthorized disclosure
prejudice, embarrassment or injury to the Republic of the of which would endanger national security, cause
Philippines resulting from any act or omission. serious injury to the interest or prestige of the nation or
o Declassify – This is the act of removing or canceling the of any governmental activity or would be of great
advantage to a foreign nation.
designation of security classification from a classified
Classification Authority: same as top secret
matter since it longer requires any degree of protection
3. CONFIDENTIAL modification, recording, and any disruption or
Information and material (matter) the unauthorized disclosure destruction.
of which, while not endangering the national security, The goal is to ensure the safety and privacy of critical data
would be prejudicial to the interest or prestige of the such as customer account details, financial data, or
nation or any government activity, or would cause intellectual property.
administrative embarrassment or unwarranted injury to
an individual or would be of great advantage to a foreign 1. Proprietary Information
nation. Information which in some special way relates to the status of
Classifying Authority: Any officer is authorized to assigned activities of the possessor and over which the possessor
confidential or restricted classification to any matter in asserts ownership.
the performance of their official duties. • In business community, proprietary information relates to
the structure, products, or business methods of the
4. RESTRICTED organization. It is usually protected in some way against
Information and material (matter) which requires special casual or general disclosure.
protection (other than that determined to be TOP
SECRET, SECRET or CONFIDENTIAL) and should not • It is usually protected in some way against casual or
be published or communicated to anyone except for general disclosure.
official purposes shall be classified "Restricted. “ • All proprietary information is confidential, but not all
Classification Authority: Same as confidential matter. confidential information is proprietary.
• For example, confidential personnel data in employee
Preparation of classified matter for transmission files is not considered as proprietary although the
outside a department company treats it as confidential.
a. Classified documents for transmission by
Philippine registered mail or diplomatic pouch Types of Proprietary Information
shall be prepared as follows: 1. Proprietary information can include secret formulas,
➢ The Documents shall be enclosed in two processes, and methods used in production.
opaque envelopes or covers. 2. It can also include a company's business and
➢ A receipt shall be enclosed with the
marketing plans, salary structure, customer lists, contracts,
and details of its computer systems.
document as appropriate.
3. In some cases, the special knowledge, and skills that an
➢ The inner envelope or cover shall be employee has learned on the job are considered to be a
addressed and sealed with sealing wax. The company's proprietary information.
return address should likewise be written in
the inner envelope. a. Trade Secret
➢ The classification on the front and back of the Trade secrets are intellectual property (IP) rights on confidential
inner envelope shall be marked in such a way information which may be sold or licensed.
that the markings will be easily seen when It includes a formula, pattern, compilation, program, device,
the outer cover is removed. Special markings method, technique, or process that:
required shall be placed on the front of the Essential Elements of a Trade Secret
inner envelope. • It is not generally known to others; and
➢ The inner envelope shall be enclosed in the • Some advantages are gained by the user from its use
opaque outer envelope or cover. The or possession.
classification marking of the inner envelope
must not be detectable through the outer What is SECRET?
envelope. Facts of information not generally known to anyone or to the
public which entitled to some sort of protection.
➢ The outer envelope with the inner envelope
To be secret, information must generally meet the following
will then be forwarded. Classification or other tests:
special markings shall not appear on the
outer envelope. • It must be identifiable;
• It must not be already available in public sources;
b. Classified documents for transmission • It must be disclosed by the owner only to persons who
through specifically authorized couriers shall be are under some duty to protect its secrecy;
prepared as follows: • Persons to whom it is disclosed must know it is a
➢ The documents shall be enclosed in an secret; and
opaque sealed envelope. ➢ The document • There must be some objective indication that the owner
shall be covered by a receipt as appropriate. is attempting to prevent its unauthorized disclosure.
➢ The envelope shall be addressed and
FIDUCIARY - A trusted person who is under the of a duty to
provided with a return address. No safeguard-fiduciaries (as the law term them) and must first be
classification or other markings shall appear shown the existence of a secret in order to know that the
on the envelope. information was secret (there must be an agreement either
expressed or implied).
B. INFORMATION SECURITY
Information security protects sensitive information from
unauthorized activities, including inspection,
EMPLOYEES - Under common laws employees are presumed credentials, typically to steal information for financial or
to be fiduciaries to the extent that they may disclose the personal incentives.
secrets of their employers without authorization.
As a class, the employees are largest group of persons bound Litigating trade secret cases involving former employees now
to secrecy because of their status or relationship. In general, working for a competitor poses three serious threats:
employees are bound to protect their employer’s secret. 1. The original owner may have to expose the very
trade secret data he or she wishes to protect in order to
The owner of the secret information must be able to show that prove ownership.
he or she undertakes measures to protect the
information, sch as: 2. Secrecy precautions invoked in court may not safeguard
the owner against further compromise.
• Restricting non-employee access to places
containing trade secret information. 3. Legal action may be much costlier that protective steps
properly taken. The owner may lose the litigation
• Placing warning signs and instructions to alert because the new employer in the course of the new
employees to the sensitivity of certain things or employment relationship is better achieved by requiring
places. non-competitive covenants from key employees.
• Informing employees and visitors that information
obtained, or things seen in certain locations within Countermeasure to Protect Sensitive Information
the facility are secret. 1. Competitive Intelligence Collection
• Storing sensitive documents separately in
containers for which security precautions are taken. • Collection and analysis of information about a
• Imposing area controls within a facility among competitor occurs daily.
different classes of employees with respect to • Legal and ethical techniques are usually
certain information or operations. employed.
• The most important function of competitive
b. Patent intelligence is to alert senior management to
A Patent is a grant given by the government to marketplace changes in order to prevent surprise.
inventors/applicants in return for disclosing an Invention.
• It is a legal right to exclusively exploit the invention 2. Social Engineering
for the life of the patent. • In telephone conversations with company
• The term of protection for a Patent is (20) years employees, the intelligence collector/s will
from the date of filing in the Philippines, with no frequently use this method.
possibility of renewal. • This is the subtle elicitation of information without
revealing the true purpose of the call.
The main differences between a Trade Secret and a Patent
are: In general, complete programs of data protection include the
The requirements for obtaining a patent are specific. following elements:
• To qualify for a patent, the invention must represent • Policy and procedural statements which cover the
positive contribution beyond the skill of the average recognition classification, and handling of sensitive
person, whereas the trade secret needs a much information.
lower novelty.
• Pre-employment screening techniques and
• A trade secret can remain a secret as long as it incumbent employee review procedures to assure
continues to meet the “trade secret test”, whereas that persons entrusted with sensitive data do not
an exclusive right patent expires after a period of have any ascertainable motive of reason to exploit
20 years. such data and are basically stable.
• Since anyone can purchase a patent, they are not • Awareness programs in which all employees are
industrial espionage target, whereas trade secrets made aware of the existence of sensitive data in
are. the company, their responsibilities in protecting it,
and the required procedures.
Vulnerabilities of Sensitive Data
Inadvertent Disclosure - When a data controller (a person, • Nondisclosure agreements from employees to
company, or other body which collects and uses personal data) whom significant kinds and amounts of sensitive
accidentally discloses personal data to another individual. data are released. These records may also include
Inadvertent Disclosure usually occurs in one of the following periodic affirmations of non-disclosure
contexts: During Sales Presentations, Trade Associations responsibility.
Meetings/Shows (social gatherings), Discussion with • Non-competitive agreements from specified
Suppliers (regular or potential suppliers), Off Premises classes of personnel to prevent their taking
Statements by Employees and Press and Public Relations employment with defined competitor within a stated
future period.
Intentional Theft by Insiders - In addition to theft by current • Physical measures such as area and
employee, there is also the problem that a former employee access controls, admittance controls, identification
may obtain a better position with a competitor and, once devices and routines, secure storage containers,
there, expose the former employer’s sensitive data (typical regulated reproduction facilities, controlled trash
occurrence in trade secret situation). disposal, and restrictions on use of
communications media to minimize probability that
Malicious insider—also known as a “Turn cloak,” someone
who maliciously and intentionally abuses legitimate
unauthorized persons will gain access to sensitive Types of Personnel Identification
data on or off the premises. 1. Personal recognition – familiarity of the person’s
• Follow-up effort with new employers of former characteristics
employees who were exposed to sensitive data but 2. Artificial recognition – identification cards, passes,
who were not required to execute non-competitive passwords, etc.
agreements. • Such programs include notices to
new employer of the former employee’s exposure Pass/badge system - a pass or badge is issued by security
and responsibility to protect. for personnel to be admitted in the installation.
• Continuous and informed monitoring of routine The purpose of this is to ensure that only those persons who
activities in the field to detect appearances of one’s have the right and authority will be given the necessary
sensitive data. access to the area.
The system should have a complete record of all badges and
3. Anti-Competitive Clause identification cards issued, returned, mutilated, or lost by
An effective method to prevent employees from competing serial number and cross-indexed alphabetically.
against the company.
4. Policy Statement Single pass system – the badge or pass coded for
The model policies utilize two familiar principles of military authorization to enter specific areas is issued to an
security, those of classification and need to know. employee who keeps it in his possession until his
5. Pre-Employment Screening authorization is terminated.
Refers to the process of investigating the backgrounds of The least expensive and the least secure.
potential employees and is commonly used to verify the
accuracy of an applicant's claims as well as to discover Pass exchange system – an exchange of one-color
any possible criminal history, workers compensation coded pass that takes place at the entrance of each
claims, or employer sanctions. controlled area issued to an employee who keeps it in
his possession until his authorization or until he
6. Model Agreements terminates.
A model agreement, in labor law, is a collective bargaining Upon leaving the personnel surrender his badge or pass
agreement sometimes recommended by an employee and retrieve back his basic identification.
organization to its locals to serve as a standard
agreement for a certain geographic area or industry. It 1. Multiple pass system – this provides an extra
merely a model and not an adhesive text. measure of security by requiring that an exchange take
7. Non-competitive Covenants place at the entrance of each restricted area.
In contract law, a non-compete clause (often NCC), or Multiple copies of passes are issued to an individual with the
covenant not to compete (CNC), is a clause under which same photograph.
one party (usually an employee) agrees not to enter into The individual exchange his badge for another color or
or start a similar profession or trade in competition markings at the entrance. Once inside, if he needs to enter
against another party (usually the employer). a restricted area, he exchanges it for another color
acceptable in that area.
Designing a Proprietary Information Protection Program
• There is no such thing as a permanent secret of Security Controls
nature. Security controls are safeguards or countermeasures to avoid,
• Research and development (R&D) cannot be detect, counteract, or minimize security risks to physical
property, information, computer systems, or other assets.
envisioned without communication of the results of
that effort. This principle applies to most forms of
Security controls are parameters implemented to protect
competitive business information as well.
various forms of data and infrastructure important to an
• The printed word, particularly in the form of organization.
complete reports or documents, has ceased to be
the principal of communicating information. More Security controls exist to reduce or mitigate the risk to those
and more data are being processed and analyzed assets. They include any type of policy, procedure,
electronically. technique, method, solution, plan, action, or device
designed to help accomplish that goal. Recognizable
Amount of Information Loss According to Sources examples include firewalls, surveillance systems, and
➢ Inadvertent Disclosure – 95% antivirus software.
➢ Competitive Intelligence – 3%
Three Categories of Security Controls
➢ Industrial Espionage – 2%
1. Management security is the overall design of
Week 11 your controls. Sometimes referred to as administrative
Personnel Identification and Movement Control controls, these provide the guidance, rules, and
procedures for implementing a security environment.
The Personnel Movement Control System (PMCS) is the only 2. Operational Security is the effectiveness of your
system that is based on the intent of a person's access controls. Sometimes referred to as technical controls,
and the timeframe required for that access, controlling these include access controls, authentication, and
and monitoring movement through a series of secure security topologies applied to networks, systems, and
access points in accordance with either a pre-defined or applications.
custom time-based trip plan. 3. Physical security is the protection of personnel, data,
hardware, etc., from physical threats that could harm,
damage, or disrupt business operations or impact the 4. Visitor’s entrance – separate access for visitors
confidentiality, integrity, or availability of systems and employees of the establishment should be
and/or data. provided.
Types of Controlled Areas 5. Time-traveled – if there is a long delay or time
Controlled Areas – Access is restricted to entrance or lapse between the departure and arrival, the visitors
movement by only authorized personnel and vehicles. may be required to show cause for the delay.
Any area or space for which the organization has 6. Access List – Record of pre-determined visitors.
confidence that the physical and procedural
protections provided are sufficient to meet the Package Management Control
requirements established for protecting the information Every facility must establish a system for the control of
and/or information system. package entering or leaving the premises. However,
desirable it may seem, it is simply unrealistic to
Limited Areas (LA) – Located within the controlled area suppose that a blanket rule forbidding packages either
where a greater degree of security is required. in or out would be workable.
An LA is a Security Area that protects classified matter. 1. No packages shall be authorized to be brought
LAs are defined by physical barriers encompassing the inside and outside the industrial installation, offices,
designated space and have access controls to ensure and work area without proper authority. This basic
only authorized personnel enter and exit the LA. precept help reduce if not eliminate pilferage, industrial
Limited Area means an area restricted at certain times, in espionage, or sabotage.
certain areas, and/ or to certain vehicular use. These
restrictions may be of any type but can generally be 2. Outgoing packages carried by personnel should
accommodated. be closely inspected and those in vehicles should also
be checked as many pilfered items are hidden in the
Exclusion or Restricted Areas – Used for handling and surface of the vehicles leaving the compound.
storage of high value cargo and classified documents. 3. Any personnel or visitor entering the installation with a
package should deposit the same to the security and
The number of people authorized to enter should be strictly in return receive a numbered tag, which he or she will
limited, and the area should be under surveillance at use in claiming his or her package upon departing.
all times.
Vehicular Movement Control and Identification
Badge and Pass Control
1. The system should have a complete record of all Vehicular Traffic within the boundaries of any facility must
badges and identification cards issued, returned, be carefully controlled for safety as well as to control
mutilated, or lost by serial number and cross-indexed the transporting of pilfered goods from the premises,
alphabetically. thus:
2. The supervisor from time to time for its accuracy 1. Privately owned vehicle of personnel or visitor should
and authenticity should check the lists. be registered and are subjected to the identification
and admittance procedure.
3. Passes and badges reported lost should be validated
and security at entrance be informed through 2. Vehicles should be subjected for search at the
conspicuous posting. entrance and exit of the installation.
3. All visitors with vehicle should provide the
Visitor’s Movement Control security as to the complete details of their duration of
Whichever entry control method you use, people should only stay, person to be visited, and other information.
be given unescorted entry if they: 4. All vehicles of visitors should be given a sign or
• Show a suitable form of identification sticker to be placed on the windshield.
• Have a legitimate need for unescorted entry to 5. Traffic warning signs should be installed in all
the area entrance in order to guide the visitors in their
• Have the appropriate security clearance. destination as well as to provide them with the
necessary safety precautions while they are inside the
Keeping a visitor register as follows: installation.
1. Visitor’s logbook – all visitors to any facility 6. Security personnel must constantly supervise parking
should be required to identify them and should be areas and make frequent spots of vehicles found
given a visitor’s ID by the security. Visitor’s logbook there.
should be filled up with the name of visitors, nature and
duration of visit. Building Access Control
2. Photograph – taking of photographs should also 1. At any physical barrier, a security system must
be considered. Extreme caution must be exercised in possess the ability to distinguish among authorized
areas where classified information is displayed to persons, unauthorized visitors, and other unauthorized
preclude unauthorized taking of pictures of the persons. This is to assist the security personnel protect
installation. If a visitor has camera and it is prohibited sensitive are and information within the
to take picture, said camera should be left in the care 2. Appropriate warning signs should be posted at
of security with corresponding receipt. the building perimeter. Special restricted entry facilities
3. Escort – if possible, visitors should be escorted to public access be provided. This will be dependent
by the security to monitor their activity within the on the degree of security needed for the protection of
establishment and guide them where to go.
property, activity, and other processes within the
building.
3. The access to the restricted area shall be limited to
authorized personnel who have the direct involvement
with the installation, construction and operation and
maintenance of the equipment and systems and/or
use of the materials contained within the restricted
area. A clear-cut policy on the access control should
be disseminated to all personnel of the installation.

You might also like