You are on page 1of 129

INDUSTRIAL

SECURITY
MANAGEMENT
COURSE DESCRIPTION
• Industrial security management is a study involving the
organizational set-up and operation of security guards
pursuant to the Private Security Agency Law (RA 5487)
and it’s implementing rules and regulations (IRR). The
course covers various security measures and provisions
to include asset protection, loss prevention
management, security surveys and risk assessment.
This is a three-unit course intended for criminology
students inclined to pursue a career as security
professional or protection specialist.
Importance of Security
• Without proper security measures in place,
businesses risk losing their valuable
assets to theft or damage.

• In addition to protecting assets, security is


important for the safety of employees.
Businesses have a responsibility to ensure
the safety of their employees while they
are on the job.
The History of Private
Security
The History of Private Security

The concept of private security can be


traced to thousand of years before the
birth of Christ.
Psalm 127 makes mention of the
security guard, in the phrase, "Except
the Lord build the house, they labor in
vain that built it, except the Lord keep
the city, the watchman waked but in
vain."
Security of communities mostly relied
on military troops.
The History of Private
Security
• Bodyguards were also utilized
to secure travel or transport of
valuable goods from place to
place.
Famous Known Security
Personnel in Ancient times
Praetorian Guards of ancient Rome
Swiss Guard Vatican City Rome
Medjay Egypt
Middles Ages Knights
Shire-Reeves the Norman
period (1066 - 1199)
• The word comes from the two words
'Shire' and 'Reeve'. A Reeve was an
official position which began in
Saxon times, when the reeve
was empowered to hold court and
try local civil and criminal matters.
After the conquest they were
appointed for every shire, and
therefore the name became Shire
Reeve or Sheriff.
Security in the USA
Security in the USA
In the US, in 1850,
Allan Pinkerton
established the
Pinkerton Detective
Agency. They also
served as the
intelligence agents of
the Union Army during
the Civil War.
• In 1889, Brinks,
Incorporated started the
business of protecting
property and payroll of
private companies.

• Local armored
transportation services to
providing corporate
financial logistics and
international secure
transportation.
In 1909, William J. Burns,
Inc. was formed to become
the sole investigating
agency for the American
Banking Association.

Pinkerton and Burns were


the only national
investigation bodies that
investigated non-
specialized crimes, until the
creation of the Federal
Bureau of Investigation.
Security in the Philippines
• The Maharlika (meaning freeman
or freedman) were the feudal
warrior class in ancient Tagalog
society in Luzon, the Philippines.
The Spanish translated the name
as Hidalgos (or libres). They
belonged to the lower nobility class
similar to the Timawa of the
Visayan people.
Guardia Civil - Spanish Era
The Civil Guard (Spanish:
Guardia Civil) of the Philippines
was a local gendarmerie
police force organized under
the Spanish colonial
government.

It was disbanded after the


Spanish–American War and was
replaced by the Philippine
Constabulary.
Philippine Constabulary
The first Filipinos on the
Constabulary were Jose
Velasquez of Nueva Ecija and
Felix Llarento of Manila. The first
Filipino to become chief of the
Philippine Constabulary was
Brigadier General Rafael Crame,
who served with distinction from
December 17, 1917, to January 1,
1927.
• On 01 June 1969, Republic Act 5487
otherwise known as the “Private Security
Agency Law” was enacted making the
Philippine Constabulary as the sole authority
to provide administrative services and
general supervision over the management
and operations of all organize Private
Security Agencies

• Today, the uniformed security guard remains


the most familiar symbol of security in
society.
• JOSE B. MANIWANG PhD, WSO-CSSD,
Registered Criminologist and well known
as the “Father of Philippine Security” first
established as a single proprietor, a
private security agency the National
Intelligence and Security Service, a
business he thought of after World War II,
being a war veteran under the USAFFE
and as the country.
Understanding Industrial
Security
What is Security?

Security – freedom from danger, risk, etc.;


- freedom from care or doubt;
- protection or defense
Important Terms
• Security- protection against any
type of crime to safeguard life and
assets by various methods and
device

• Security Guard- is any natural


person who offers and render
personal service to watch or guard
residential, or business of both,
government buildings, establishment
and or their premises for hire and
compensation
• Security supervisor-
charged with directing
the work and
observation the
behavioral
performance of the
guard under his unit
• Private Detective- any natural
person, not a member of the
regular police force or the AFP,
who does detective work for hire
reward or commission
• Security Guard Force-
group of forces of men
selected trained or organized
into functional group for the
purpose of protecting
operational processes from
those disruption which
impede efficiency or halt
operation at a particular plant,
facility, institution or special
activity
• Security supervisor- charged with directing the work and
observation the behavioral performance of the guard
under his unit.
• Security Education program- program given to
employees of an installation by means of lecture
pertaining to measures and safeguards to be taken.
• Assets protection Program- sum total of protection
scheme encompassing the entire security spectrum,
designed to eliminate, reduce or control threats, hazards
or dangers to company
• Security Planning- it involves knowing the objectives of the
security and the means and the method to reach these
objectives or goal must then evolved

• Security Survey- the process of conducting an exhaustive


physical examination and thorough inspection of all operation
system and procedures of a facility

• Security Inspection- the process of conducting physical


examination to determine compliance with establishment
security policies as a result of security survey

• Security hazard- any act or condition which may result in the


compromise of information, loss of life, loss or destruction of
property or disruption of the objectives of the installation
INTRODUCTION TO
SECURITY

By: Gerald Kevin P. Hernandez, RCrim, MSCJ, CST, CSSP


THE THREE DIMENSIONS OF
SECURITY

• Physical Security – Focus more on the


structure/designed of a building
• Personnel Security – focus on the
employment, training and deployment
• Information Security – protection against
espionage
PHYSICAL SECURITY

• Physical security refers to a barrier or


system of barriers placed between the
potential intruder and the matter to be
protected. It could also refer to any
protective device against hazards, threat,
vulnerability and risks.
Principles of Physical Security
• There is no such thing as an impenetrable
barrier.
• An intruder must be able to acquire access
to the property in order to benefit.
• Delays provide defense against
surreptitious and non-surreptitious entry.
• Each installation is different and will
require its own unique physical security
system.
Reason for Establishing
Physical Security

• Freedom from unauthorized intrusion.


• Freedom from theft, damage and arson.
• Freedom from outside interruption.
Coverage of Physical Security
 Perimeter – fence, wire, wood, brick, design,
construction, etc.
 Exit/ Entrance – description, quantity, location,
fireproofing, locking devices, fire protection,
precaution, safety measures, and vulnerable spots.
 Offices/ Rooms – layout, location
 Personnel – staff, visitors, contracted personnel,
maintenance, ID system, etc.
 Lighting - movable, emergency, stationary, standby.
 Equipment/ Supplies – package control
 Doors and Windows
Coverage of Physical Security
• Alarms – CCTVs, detectors, etc.
• Communication – telephones, radios, etc.
• Internal Open Premises – structure,
vulnerable spots, fire protection, etc.
• Locks/ Keys – padlocks, electronic locks,
combination locks, etc.
Perimeter Barrier
(1st Line of Defense)

Main purpose –
to deny or
impede
access or exit
of
unauthorized
persons.
Perimeter Barrier
(1st Line of Defense)
Secondary purposes:
1.It defines the boundary of the property to be
secured.
2.It creates a physical and psychological
deterrent to unauthorized entry.
3.It delays intrusion, thus, facilitating
apprehension of intruders.
Perimeter Barrier
(1st Line of Defense)
Secondary purposes:

4.It assists in a more efficient and


economical employment of guards.
5.It facilitates and improves the control of
pedestrians and vehicular traffic.
Important Terms
 Physical – Any facility, equipment, material, building,
or document
 Security – Freedom from loss and damages
 System – Defense plan or protective operating
procedure
 Physical Security System – Measures adopted to
prevent unauthorized access to facilities, equipment,
material, and documents to safeguard them against,
loss, damage, and pilferage.
 Barriers – Structures capable of restricting, preventing
or delaying illegal access.
Factors That Bring About
Insecure Condition
• THREATS – Positive inimical acts.

• HAZARDS – Passive inimical conditions.

• VULNERABILITY – Measure of how open is an


establishment to intrusion, attack or injury.

• RISK – Probability of an event to happen that


will lead to losses.
Barriers Defined
• Refers to any physical structure whether
natural or man made capable of
restricting, deterring, delaying or
preventing illegal and unauthorized access
to an installation.
Reasons for Establishing Barriers

• Control of vehicular and


pedestrian flow
• Checking of identification
of personnel entering or
departing
• Defines a zone for
restricted areas
TYPES OF PHYSICAL BARRIER
1. Natural barrier- like cliffs, terrain, ocean, or body of
water
2. Structural/Manmade barrier- fences, walls, grill,
etc
3. Human barrier- security guards and employees
4. Animal barrier- dogs, geese, etc
5. Energy barrier- electronic devise
• Natural Barriers – these are
offered by nature which could
obstruct or delay the passage
way of potential intruders. These
also refer to natural structures
that serve as deterrents or
obstructions to intruders such as
high cliff, canyon, desert or
bodies of water.
• Man-made Barriers –
these are structural
constructions like
fences, walls, floors,
roofs, grills, bars,
roadblocks, or other
physical means to
deter or impede
penetration.
Animal Barrier

• animal used in
partially providing
a guarding system
Energy Barrier

Usually electrical or electronics devices used to provide


assistance to guard personnel. ex. protective lightnings,
anti intrusion devices.
Structural Barriers
Barriers are manmade
and
include landscaping,
ditches, fences, and
walls. A structural barrier
physically and
psychologically deters or
discourages the
undetermined, delays
the determined, and
channels the flow of
authorized traffic through
proper entrances
Human Barrier
Human being
used in providing
security or
partially providing
a guarding
system.
Level of Physical Security
• Also varies on the type and location of
facility and other factors needing security.
Levels of physical security could be any of
the following:
• Low Level Security – is a system designed to impede
and detect some unauthorized external activity such as
on small retail store, storage warehouses.

• Medium Security – is designed to impede, detect and


access most external activity and some unauthorized
internal activity that range from simple shoplifting to
conspiracy to commit sabotage. This include:
- Use of advance intrusion alarm system
- Establishment of perimeter and perimeter
barriers and
- Use of an unarmed guard.
• High level Security – is designed to impede, detect and access
most unauthorized external and internal activities of certain prisons,
defense contractors, pharmaceutical companies and sophisticated
electronic manufacturers. This include the following
- Close Circuit Television (CCTV);
- Perimeter alarm system;
- High security lighting;
- Highly trained armed guards
- Control designs; and
- Coordination with local law enforcement
agencies
Perimeter Barriers Openings
• In determining the appropriate perimeter
barriers, security manager should not
overlook the necessary of monitoring
perimeter openings that could be used by
intruders. These openings are:
• Gates and Doors –
should be guarded or
locked as much as
possible.
• Window and Similar
Openings – should also
be guarded or grills
should be installed so as
not to be used by
intruders. Whenever
possible, window and
openings less than 18 ft.
above grounds, roof and
ledges or less than 14 ft.
• Utilities Openings – such
as sewers, air intakes,
exhaust tunnels which
penetrate the barriers and
which have cross-
sectioned area of 96 sq.
inches or more should be
protected by bars, grills,
etc.
• Clear zone – is an
unobstructed area maintained
on both sides of the perimeter
barriers. A clear zone of 20 ft.
or more is desirable between
the barrier and extension
structures and natural covers
which may provide
concealment or assistance to
a person seeking
unauthorized entry.
Types of Perimeter Barriers
• Fences - are independent structures
designed to control physical and visual
access between outside areas. Types of
fences include:
• Solid fence – is made of
opaque material in such a
way visual access through the
fence structure is
denied. Solid fences are
constructed with heavy
materials such as bricks,
stone and concrete, and
usually extended down
into the ground to a point
view below the frost line.
Advantage of Solid Fence
• Denies visual access of the installation to
the intruder.
• Denies the intruder the opportunity to
become familiar with the personnel,
activities and the schedule of the
movement of the guards.
Disadvantages of Solid Fence
• Prevents the guards from observing the
area around the installation.

• Creates shadow which may be used by


the intruder for cover and concealment.
• Full-View fence – is
constructed in such
a manner that visual
access is permitted
such as wire fence,
through the fence
structure. It is
designed purely to
control physical
access between two
areas.
Advantage of Full-view Fence
• Guards are able to keep the area
surrounding the installation under
observation.
• Does not create any shadow
Disadvantages of Full-view Fence
• Allows visual access to the installation.
• Allows the intruder to get familiar with the
movements and the time schedule of the
guard patrol.
Top Guard

A top guard is an overhang of


barbed wire or tape along the
top of a fence, facing outward
and upward at about a 45-
degree angle. Placing barbed
wire or tape above it can further
enhance the top guard.
Concertina wire serving as additional
perimeter barrier.
Concertina wire serving as topguard.
Different types of razor wire.
Animal Barrier
Energy Barrier
Structural Barriers
Human Barrier
ADDITIONAL PROTECTIVE MEASURES
1. Top Guard- an additional overhang of barbed wire placed on
vertical perimeter fences facing upward and outward with 45
degree with three to four strands of barbed wires, 6 inches apart
and must be stalled on the supporting arms.
2. Guard control system- this is normally provided at main
perimeter entrance to secure arrears located out of doors, and
manned by guard on a full-time basis.
3. Towers- guard tower are house like structures above the
perimeter barriers.
4. Barrier Maintenance- regular inspection of fencing barriers and
protective walls.
5. Protection in Depth
6. Signs and Notices
PROTECTIVE
ALARMS SYSTEM
• Security Alarm System - combination of
compatible intrusion and detection device
so arranged and wired as to support one
another
THREE BASIC PARTS OF ALARM
SYSTEM

– Sensor or trigger device


– Transmission line
– Enunciator/annunciator
TYPES OF ALARM SYSTEM
1. Metallic foil or wire- all possible [point of entry
can be wired by using electrically charge strips
of tinfoil or wire. Any action that will move the
foil or wire breaks the circuit and activate an
alarm, metallic foil or wire are used in window or
glass surface.
2. Photoelectric or Electric Eye Device - A light
beam is transmitted at a frequency of several
thousand vibrations per second. It is connected
by a wire a control station and when an intruder
crosses the beam, he break the contract with
the photoelectric coil which thus activates the
alarm.
3. Audio detection device - supersensitive
microphone speaker sensor or installed
in walls ceilings and floors of the
protected area of any sound caused by
attempted forced entry is detected by the
sensor.

4. Vibration detection device- vibration


sensitive sensor are attached to walls,
ceilings or floors of the protected area.
Any vibration caused by attempted force
entry is detected by the sensor. Can be
effective to safeguard enclose areas in
sound detection system.
OTHER TYPES OF PROTECTIVE ALARMS
1. Foot rail activator- placed on the floor in such a position that
tellers may activate the alarm by placing the front of their foot to
engage the activation bar.
2. Bill traps or currency activation devices- are usually placed in
tellers top, cash drawer and connected to the alarm system
using a wire connector. When currency is removed from the
devices, the alarm is activated.
3. Knee or thigh buttons- installed inside the desk or teller station
so they can be activated by knee or thigh pressure. They are
commonly found in location where personnel usually perform
their duties from seated position.
4. Foot button- permits alarm activation in relatively safety while
both hands remain clear in view of the robbers.
5. Double squeeze buttons- re4quires pressure on both side of
the device and therefore the probability of accidental alarm is
reduced.
TYPES OF ALARM DETECTION SYSTEM
1. Central Station System- when alarm is sounded,
central station notifies police and other agency.
2. Propriety system - this function in the same way as
a central station system except the company owns
that.
3. Local alarm system- in this case the sensor
activates circuit, which in turn activates a horn or
siren or even flashing light, located in the immediate
vicinity of the alarmed area.
4. Auxiliary system- in this system installation circuits
are led into local police or fire department by lease
telephone lines.
PROTECTIVE
LIGHTING
Security lighting- providing of sufficient illumination
to areas during hours of darkness to ensure
visibility ant to act ads deterrent to intruders
PURPOSES OF PROTECTIVE LIGHTING
1. Provides sufficient illumination to the areas during
hours of darkness
2. Lightning can help improve visibility so that
intruder can be seen and identified and, if possible
apprehended.
3. Lighting also gives that psychological fear and that
serve as a deterrent to thieves, pilferer,
trespassers and saboteurs.
TYPES OF PROTECTIVE LIGHTING
1. Stationary luminary- series of fixed luminaries to
flood given area-continuously overlap
2. Standby lighting- turn on manually or physically
as needed
3. Movable lighting- searchlight; supplementary top
other types of lighting.
4. Emergency light - This can be utilized in an event
of electric failure.
TYPES OF LIGHTING EQUIPMENT
1. Floodlights- these light project light in concentrated beams.
They are appropriate for use in instances, which call for
illumination of boundaries, building or fences.

2. Searchlight- these are highly focused incandescent lamps used


to pinpoint potential trouble spots.
3. Fresnel light- wide beam units, primary used to extend
the illumination in long, horizontal strips to protect the
approaches to the perimeter barrier.Horizontal beam
which is approximately 180 degrees in the horizontal
and from 15-30 degrees in the vertical.

4. Street light- this produces diffused rather than


directional beam. They are widely used in parking
areas.
PROTECTIVE
LOCKS AND KEYS
• LOCK – A mechanical, electrical,
hydraulic, or electronic device designed to
prevent entry into a building, room, and
container or hiding place.
• KEY – A device that is use to open a lock.
TYPES OF LOCK

1. Key Operated Mechanical Lock


2. Padlock
3. Combination Lock
4. Code-Operated Lock
5. Electrical Lock
6. Card Operated Lock
TYPES OF KEY

1. Change Key
2. Sub Master Key
3. Master Key
4. Grand Master Key
• SECURITY CABINET – The final line of defense at
any facility that is used in the storage of papers,
records, plans or cashable instrument, precious
metal or other specially valuable assets.
TYPES OF SECURITY CABINET
1. Safe
2. Vault
3. File Room
Safe
– a metallic container used for
the safekeeping of documents
or small items in an office or
installation. Safe can be
classified as either robbery or
burglary resistance depending
upon the use and need.
- weight must be at least 750
lbs. and should anchored to a
building structure.
Vault
heavily constructed fire
and burglar resistance
container usually a part of the
building structure used to
keep and protect cash,
documents and negotiable
instruments. Vaults are bigger
than safe but smaller than a
file room.
The vault must be
resistive up to 6 hours.
File room
A cubicle in a building
constructed a little lighter than
a vault but of bigger size to
accommodate limited people
to work on the records inside.
file room must at most
12 feet high.
it must have a water
weight door and at least fire
proof for one hour.
LAYERS OF SECURITY
Three Lines of Defense
• 1st Line – Perimeter
• 2nd Line – Building Walls, Doors &
Windows
• 3rd Line – Interior Barriers
Four D’s of DEFENSE

• Deter
• Detect
• Delay
• Detain
PERSONNEL AND
INFORMATION SECURITY
PERSONNEL SECURITY
Introduction
• Personnel Security covers policies and procedures that
seek to manage the risk of people who have legitimate
access to an organization’s assets and possibly using
those assets for unauthorized purposes.
• It is about securing a company or a firm from insiders
or employees.
Areas covered by
personnel security
• Personnel screening
• Background checks and lifestyle checks
• Security Education – includes:
– whistleblower programs,
– employee surveillance, and
– employee loyalty programs
• Security clearance system
Some Principles Regarding
Internal Theft
• Failure to focus on the laxity, carelessness or deliberate
negligence is also a major threat to one’s business.
• No security expert can anticipate all situations relating
to internal losses.
• One cannot be protect against everything, but, if
attention is given to basics and details, then losses can
be greatly hindered, if not minimized.
Personnel Screening
• The objective of personnel screening is to prevent theft
by employees.
• A goal of personnel screening is convince employees
that they would be caught if they steal from the
company.
• Basic to the effectiveness of any personnel security
program is the cooperation of the employees.
• The best place to start any personnel security program is
the screening of applicants.
Personnel Screening
• SCREENING – is the process of finding the best-
qualified person for the job, in terms of both skills AND
personal integrity.
• Rejection of job applicants with dubious characters, or
those considered as “BAD RISKS”, must be on the basis
of carefully established standards.
• Standards must be met in every particular case, and not
on a selective basis.
“Red flags” in an applicant’s
background
• Instability in personal relations;
• Lack job stability;
• Declining salary history, or are taking a cut in pay from
the previous job;
• Unexplained gaps in employment history;
• Clearly overqualified;
• Unable to recall or are hazy about relevant information in
the recent past.
Background and Lifestyle
Checks
• Many employees turn bad only once they are already
employed.
• A LIFESTYLE CHECK is a system of checking the
lifestyle of certain employees and to determine whether
or not changes in lifestyle are explainable by legitimate
sources of income.
Background and Lifestyle
Checks
• Continuous background check is important in order not
only to keep tabs on an employee’s personal information
(residence, marital status, etc.), but also for purposes of
determining changes in lifestyle, that may be a result of
illegal activities.
• Background checks should also be done if an employee
is a candidate for promotion to a more responsible or
sensitive position.
Personnel Security Policies
SEARCH POLICY
• Theft is reduced if there is a possibility that people
will be challenged and searched.
• Management has a right to impose search policies
within company premises.
• Searches should be approached from a
consensual point of view.
• Company rules should be acknowledged in writing
by each employee at the time of employment.
• Make sure everyone is informed.
Personnel Security Policies
Tips in Implementing a Search Policy:
• Check with your attorneys.
• Make sure ALL employees are aware of the policy.
Signatures may be required as evidence of notification.
• Inform all visitors openly that a search policy exists and
they are subject to it while on company premises.
Vehicles are also subject to the same policy.
• All employees, at all levels, including executives, are
subject to this policy.
Exit Interviews and Debriefing
• Exit interviews allow you to find out the real reason why
employees resign.
• It also gives you an opportunity to get information or
feedback regarding how the company is run.
• Exit interviews can be used to gather information of
illegal practices being done within the company.
Developing Security
Awareness Among

Employees
Staff vigilance is key to your protective
measures.
• Staff must have the confidence to report
anything suspicious.
• Training is important.
• Staff should be briefed to look out for packets,
bags or other items in odd places, carefully
placed (rather than dropped) items in rubbish
bins and unusual interest shown by strangers in
less accessible places.
Undercover Operations
• The key is the secrecy of the agents’ true intentions and
identity.
• More than one agent is usually employed.
• The ability of the agent to successfully infiltrate the
organization without standing out is very important.
• Undercover operations are costly and need some time in
order to succeed.
INFORMATION
SECURITY
Protection of Sensitive
Information

Information security is all about protecting


information that a company considers vital or
important to its business and not readily accessible
by outsiders.
Protection of Sensitive
Information
Some of the basic principles :

• Information need not be lost in order to be


compromised or “stolen”.
• Information needs to be known in order to be
useful.
Definition of Terms
Proprietary Information – Is information, which
in some special way, is related to the status,
operations or activities of the possessor over
which the possessor asserts ownership.

Trade Secret – may consist of any formula,


pattern, device or compilation of information which
is used in one’s business and which gives him an
opportunity to gain an advantage over competitors
who do not know or use it.
Definition of Terms
• Information – Means any knowledge that can be
communicated or documentary material.
• Control – Means the authority of the agency that
originates information, or its successor in function, to
regulate access to the information.
• Classified information – Means information that has
been determined to require protection against
unauthorized disclosure.
Definition of Terms
• Unauthorized disclosure – Means a
communication or physical transfer of classified
information to an unauthorized recipient.
• Proprietary Information –Is information, which in some
special way, is related to the status, operations or
activities of the possessor over which the possessor
asserts ownership.
Areas where Sensitive
information may be Lost:
• Fake proposals for • Targets for Industrial
mergers, joint ventures, etc. Espionage
• Fake job interviews • Romantic partners
• Plant tours
• Personnel who can be
• Irresponsible sales reps
tempted to change
• Areas where SI may be
careers
Lost
• Unauthorized access
• Suppliers
• Consultants
• Trash cover
• Company in-house • Connivance with insiders
publications • Phishing
• Employees • Social engineering
Policies and Procedures
Regarding Sensitive Information
• Pre-employment • Non-competitive
screening and agreements.
employee interviews • Physical security
• Security awareness measures.
programs • Notice to new
• Non-disclosure employers of former
agreements. employee access and
• Documented records of responsibility.
exposure. • Continuous and
• Protective informed monitoring of
Countermeasures routine activities.
DOCUMENT/INFO SECURITY

 SECURITY CLEARANCE – is an COMPARTMENTATION –


administrative determination that an the grant of access to
individual is eligible from a security classified matter only to
standpoint for access to classified matter
of a specific category.
cleared persons when such
classified information is
required in the performance
of their official duties, and
restricting it to specific
physical confine when
feasible.
DOCUMENT/INFO SECURITY
NEED TO KNOW – the requirement that the
dissemination of classified matters be limited
strictly to persons whose official duties require
knowledge thereof.

CLASSIFIED MATTERS
 TOP SECRET (Code Green) - information, the unauthorized disclosure of
which would cause exceptionally grave damage to the nation politically,
economically, or military.
 SECRET (Code Red) – information, the unauthorized disclosure of which
would endanger national security, causes serious injury to the interest or
prestige of the nation or any government activity.
DOCUMENT/INFO SECURITY
CLASSIFIED MATTERS

 CONFIDENTIAL (Code Blue) - Any information


and materials, the unauthorized disclosure of which
would be prejudicial to the interest or prestige of the
nation or government activity or would cause
administrative embarrassment or unwarranted injury.

 RESTRICTED (Code Black) - Any information and


material which requires special protection other than
those determined to be confidential, secret and top
secret.
METHOD OF
TRANSMISSIO
N METHOD OF
DOCUMENT/INFO SECURITY
CLASSIFICATION
1. By direct 1. Upgrade
contact of 2. Downgrade
officer or 3. Reclassify
personnel 4. Declassify
concerned.
2. By official METHOD OF
DESTRUCTION
courier
1. Burning
3. Electrical 2. Shredding
means in
cryptographic
Suggested Security Measures
• Responsibility for information security must be defined,
assigned and announced.
• Security audits should be regularly performed, and
where deficiencies are noted, corrected.
• Employees should be continuously reminded of their
continuing responsibility to protect the company’s SI.
End of Presentation.

You might also like