1. NATIONAL SECURITY
2. REGIONAL / LOCAL SECURITY
3.COMPANY PHYSICAL SECURITY
Threat:
- To inflict harm or imminent danger;
- A person or thing that is regarded as
dangerous and likely to inflict harm.
National Security:
State or condition of people’s way of life,
territory, Integrity, Sovereignty, Welfare &
Well being are protected and enhance by the
government.
Company Physical Security:
Describes security measures that are designed to deny
unauthorized access to facilities, equipment and
resources, and to protect personnel and property
from damage or harm (such as espionage, theft,
Pilferage, Tampering and/or terrorist attacks).
It involves the use of multiple layers of interdependent
system which includes CCTV surveillance, security 
guards, protective barriers, locks, access control 
protocols, and many other techniques. 
PEOPLE
GOVERNMENT
TERRITORY
SOVEREIGNTY
ELEMENTS OF THE STATEELEMENTS OF THE STATE
NATIONAL SECURITY
NATIONAL SECURITY PARADIGM
CONCERNS OF NATIONAL SECURITY
CONCERNS OF NATIONAL SECURITY
CONCERNS OF NATIONAL SECURITY
External Threats – Claimant of Spratly Island like;
China, Vietnam, Taiwan, Malaysia and Brunei.
Transnational Threats – TERRORISM
Internal Threats – Communist Party of the Phil.
(CPP-NPA)/National Development Front (NDF),
TERRORISM, ILLEGAL DRUGS & CRIMINALITY.
CONCERNS OF NATIONAL SECURITY
EMPLOYEE
MANAGEMENT
INFRASTRUCTURE
POLICY
ELEMENTS OF THE COMPANY
COMPANY PHYSICAL SECURITY
1. INFRASTRUCTURE SECURITY
2. PHYSICAL ACCESS CONTROL
3. PERSONNEL SECURITY
4. INFORMATION SECURITY
5. INTERNAL CONSPIRACY
CONCERNS OF COMPANY SECURITY
WHO IS AT THE CENTRE OF
SEC ITY
U-R
UR
• Security - is a degree of protection against danger,
damage, loss, and crime.
• Security - is a Common Responsibility
• 3D’s OF SECURITY
1. Defense
2. Development
3. Diplomacy
• 2 TYPES OF SECURITY
1. Proactive Security – Preventive measures against unlawful
activity in the company.
2. Reactive Security – Response / reaction or course of action
in the event of danger, damage, loss and crime.
WHAT IS SECURITY ?
1. Proactive Security –
2. Reactive Security –
• SIGNIFICANT ROLES OF EMPLOYEES
• Employees should immediately report:
– Damage to exterior fencing, lighting and the building
structure;
– Defective locking devices and signs of tampering or forcing
locks in the building or along the fence line;
– Missing keys and access cards or the use of keys and cards
by unauthorized personnel;
– Any damage to the alarm systems or video surveillance
systems.
INFRASTRUCTURE SECURITY
INFRASTRUCTURE SECURITY - is the security provided to
protect the basic physical and organizational structure needed
for the operation of a society or enterprise.
• IMPORTANT AREA OF EMPLOYEE’S PARTICIPATION
– Employees should know fellow co-workers and
challenge unauthorized personnel to identify
themselves when seen on the premises.
– Employees should notify the head of security
about any unauthorized personnel on premises.
• (follow reporting chain for each facility)
PHYSICAL ACCESS CONTROL
PHYSICAL ACCESS CONTROL - are mechanisms that are
designed to minimize the risk of the company.
• Employees must wear badges at all times
and should report cases where:
–Visitors and delivery personnel are not
wearing identifying badges while in the
facility/ premises
–Any proposed break in procedure
• “I just need to drop something off….”
• (follow reporting chain for each facility)
PHYSICAL ACCESS CONTROL
• Personnel Security – is a system of policies and
procedures which seek to manage the risk of staff
(permanent, temporary or contract staff) exploiting, or
intending to exploit, their legitimate access to an
organization's assets or premises for unauthorized
purposes.
• HR is responsible for verifying previous employment,
background checks, termination procedures
– Remove access keys, cards, IT passwords
– Follow all written procedures
• Employees should immediately report if terminated
employees try to access the facility premises.
– “Most Wanted” wall
PERSONNEL SECURITY
Information security - is the practice of
protecting information from unauthorized access,
use, disclosure, disruption, modification, perusal,
inspection, recording or destruction.
INFORMATION SECURITY
Significant Role of the Employees are as follows:
1.Classified document should be safeguarded and
stored accordingly
2.Classified information should not be divulge to
anybody else.
3.Classified materials must be thrown in a classified
waste box.
Why is it ?
• The Company brings the responsibility for
Security & Safety to each and individual.
• All COMPANY XXXXXXXXXXXX employees
should participate in keeping their part of the
Security & Safety as strong as possible at
their facility.
SECURITY AWARENESS & YOU
It is Because;
Personal Hazard To Security …such as:
Faith – (Belief/ Trust)
Conceit – (Excessive Pride)
Enthusiasm – (Something Inspiring/Exciting)
Ignorance – (Lack of Knowledge/ Awareness)
• Always be aware of potential security threats
• Follow procedures
• Report suspicious behavior & unlawful activity
SECURITY AWARENESS & YOU
• Is a Transgression: a violation of law,
command or duty.
• Theft
• Fraud/Dishonesty
• Pattern of disregarding the rules and regulations of
the Company.
• Robbery
• Physical Assault
• Sexual Abuse
Unlawful Activity
• Exploitation or
mistreatment of others
through intimidation or
abuse of power or
position.
• Other disruptive
workplace behavior
that resists supervisory
direction or counseling.
Unlawful Activity
• Inability to control
anger—throwing
things, acts of
violence.
• Threats or
attempts to get
something even
with work
associates, acts of
unkindness.
Unlawful Activity
• Deliberate omission
or falsification of
documents, materials
and information.
(e.g.) background
when applying for
employment
processing.
Unlawful Activity
• Visual
harassment,
Derogatory or
offensive
posters,
cartoons,
publications or
drawing.
Unlawful Activity
• Possessing
Prohibited items
such as Firearms,
switchblade knives
or knives with
blades longer than
four inches; any
object for the
purpose of injuring
or intimidating.
Unlawful Activity
• Use of
illegal/illicit
substances.
• Misuse of
prescription
medication (use
other than as
prescribed).
Unlawful Activities
DRUG INVOLVEMENT
DRUGS DESCRIPTIONS
DRUGS DESCRIPTIONS
• A person running and looking about secretly, as if
he or she were being watched or hunt.
• A stranger carrying property at an unusual hour or
location, especially if the items are stereo
equipment, office machineries or a valued one.
• A person going door-to door in an office building or
resident area.
• Any person forcibly entering a locked door.
• Transactions being conducted from vehicles,
especially near the building or parks.
SUSPICIOUS ACT & BEHAVIOR
• Argumentative or
insulting behavior
toward work
associates or family
to the extent that
this has generated
workplace discussion
or has disrupted the
workplace
environment.
SUSPICIOUS BEHAVIOR
• Be wary of suspicious
packages and letters.
They can contain
explosives, chemical
or biological agents.
Be particularly
cautious at your
place of
employment.
SUSPICIOUS PACKAGES & LETTERS
SUSPICIOUS PACKAGES & LETTERS
• The design and placement
of an IED is up to the
imagination of the
bomber. First and
foremost it is an object,
regardless of its disguise,
that is not supposed to be
there.
• The best and most
effective defense is to be
aware of your
surroundings. Based on
your threat, if you think it
does not belong in your
area, consider it
WARNING:
If an object is considered
suspicious, do not touch
it or move it. Evacuate
the area and notify
authorities, any
movement, however
slight, may cause it to
function.
IMPROVISE EXPLOSIVE DEVICES (IED)
IMPROVISE EXPLOSIVE DEVICES (IED)
• IED - is a term
for an explosive
device that is
constructed in
an improvised
manner
designed to kill,
hurt, or destroy
property.
• IED can be contained in
almost anything. The item
must be carried or driven
to where it will be placed,
so concealment or
masking of the device will
be necessary. The outer
container can be, but not
limited to:
• Pipe Bombs—steel or PVC
pipe section with end caps
in nearly any configuration
are the most common type
of containers.
IED – EXTERNAL APPEARANCE
IED – EXTERNAL/INTERNAL APPEARANCE
• Vehicle Bombs —
By far the most
demoralizing, vehicle
bombs can be the easiest
to hide. Indicators may
include inappropriate label
or an unfamiliar vehicle
parked in your area. The
device can be placed
anywhere in the vehicle. A
vehicle bomb is intended
to create mass casualties
or cause extensive
property damage.
IED – EXTERNAL APPEARANCE
Should mind my own business and not get
involved.
Someone else will report it. I don’t have time.
Why i report it, they’ll either ignore it or go off
the deep end about it. They won’t take me
seriously.
It is not my job. I don’t have all the facts. It’s
just not my problem.
It is not right to tell on someone.
IRRATIONAL REASON FOR NOT
REPORTING
• “Safe” room
• What to do if there is a Hazmat situation
• Where to meet outside the facility in case of
an evacuation
• Numbers to call: (posted in ______)
• When to call: (posted in _________)
YOUR FACILITY: EMERGENCY
1. Anticipate all possible situations which can assume crisis proportion
unique to the site.
2. Organize a Crisis Management Team (CMT)
3. Write down specific plans as general guidelines to address each
possible situation separately, plan should be general enough to
accommodate variations in the situation but specific enough such that
implementors of the plan know generally what should be done.
4. Assign responsibilities to each team members for every plan.
5. Do a dry-run as often as reasonable to ensure that the CMT and the
implementors of the plan continually get a feel for a real crisis before it
occurs.
6. Review each written plan at least once a year to ensure that the plan is
still up-to-date and relevant to changing situations.
HOW TO DEAL WITH CRISIS
Legal and Documentation Team
Public/Media Relations Team
Intel. & Investigation Team
Medical and Evacuation Team
Personnel & Logistics Team
Support Services Team
NGO’SNGO’S
NBINBILGU/NGULGU/NGU
PNP/AFPPNP/AFP
CMT ORGANIZATIONAL CHART
1. INDUSTRIAL/ COMPANY
ACCIDENTS:
– Fire
– Chemical Spills
– Waste disposal/ Waste Seepage
Problems
– Personal injury-type accident
SITUATION WHICH CAN BE ASSUMED
CRISIS PROPORTION
2. CRIMINAL ORIENTED SITUATIONS:
– Bomb Threat/ explosions
– Kidnapping & Extortions
– Extortion Letters/ Threats
– Hostage Barricade
– Terrorist Attack
SITUATION WHICH CAN BE ASSUMED
CRISIS PROPORTION
3. LABOR ORIENTED SITUATIONS:
– Lay-offs
– Internal Labor Unrest
– Strike within company, Within
AYALA, Outside AYALA affecting
the company operations
SITUATION WHICH CAN BE ASSUMED
CRISIS PROPORTION
4. PUBLIC SECTOR ORIENTED SITUATIONS:
– Utility (Electrical Power, Gas, Water &
Chemical) disruptions
– Civil Unrest such as :
– Mass Demonstration/ Riots
– Coups/ Political Upheaval/Disturbance
– Assault vs. High Government Officials
SITUATION WHICH CAN BE ASSUMED
CRISIS PROPORTION
5. NATURAL CALAMITIES:
– Earthquake and Tsunami
– Typhoon and Floods/ Storm Surge
– Tornado or Twister/
– Etc.
SITUATION WHICH CAN BE ASSUMED
CRISIS PROPORTION
• It takes a minute to follow a safety and security
command;
• It takes an hour to hold a safety and security meeting;
• It takes a day to write a safety and security rules;
• It takes a week to plan a safety and security programs;
• It takes a month to put it into operations;
• It takes a year to win a safety and security award;
• It takes a lifetime to have a safety and security
workers;
• But it takes only a split second to destroy it all with one
accident.
SECURITY AND SAFETY QUOTES
“It is a doctrine of war not to assume the
enemy will not come,
but rather to rely on one's readiness to
meet him;
not to presume that he will not attack,
but rather to make one's self invincible”
-- Sun TzuSun Tzu
QUOTES
w Far Can You Go?w Far Can You Go?

SECURITY AWARENESS

  • 2.
    1. NATIONAL SECURITY 2.REGIONAL / LOCAL SECURITY 3.COMPANY PHYSICAL SECURITY
  • 3.
    Threat: - To inflictharm or imminent danger; - A person or thing that is regarded as dangerous and likely to inflict harm. National Security: State or condition of people’s way of life, territory, Integrity, Sovereignty, Welfare & Well being are protected and enhance by the government.
  • 4.
    Company Physical Security: Describessecurity measures that are designed to deny unauthorized access to facilities, equipment and resources, and to protect personnel and property from damage or harm (such as espionage, theft, Pilferage, Tampering and/or terrorist attacks). It involves the use of multiple layers of interdependent system which includes CCTV surveillance, security  guards, protective barriers, locks, access control  protocols, and many other techniques. 
  • 5.
    PEOPLE GOVERNMENT TERRITORY SOVEREIGNTY ELEMENTS OF THESTATEELEMENTS OF THE STATE NATIONAL SECURITY
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
    External Threats –Claimant of Spratly Island like; China, Vietnam, Taiwan, Malaysia and Brunei. Transnational Threats – TERRORISM Internal Threats – Communist Party of the Phil. (CPP-NPA)/National Development Front (NDF), TERRORISM, ILLEGAL DRUGS & CRIMINALITY. CONCERNS OF NATIONAL SECURITY
  • 11.
  • 12.
    1. INFRASTRUCTURE SECURITY 2.PHYSICAL ACCESS CONTROL 3. PERSONNEL SECURITY 4. INFORMATION SECURITY 5. INTERNAL CONSPIRACY CONCERNS OF COMPANY SECURITY
  • 13.
    WHO IS ATTHE CENTRE OF SEC ITY U-R UR
  • 14.
    • Security -is a degree of protection against danger, damage, loss, and crime. • Security - is a Common Responsibility • 3D’s OF SECURITY 1. Defense 2. Development 3. Diplomacy • 2 TYPES OF SECURITY 1. Proactive Security – Preventive measures against unlawful activity in the company. 2. Reactive Security – Response / reaction or course of action in the event of danger, damage, loss and crime. WHAT IS SECURITY ? 1. Proactive Security – 2. Reactive Security –
  • 15.
    • SIGNIFICANT ROLESOF EMPLOYEES • Employees should immediately report: – Damage to exterior fencing, lighting and the building structure; – Defective locking devices and signs of tampering or forcing locks in the building or along the fence line; – Missing keys and access cards or the use of keys and cards by unauthorized personnel; – Any damage to the alarm systems or video surveillance systems. INFRASTRUCTURE SECURITY INFRASTRUCTURE SECURITY - is the security provided to protect the basic physical and organizational structure needed for the operation of a society or enterprise.
  • 16.
    • IMPORTANT AREAOF EMPLOYEE’S PARTICIPATION – Employees should know fellow co-workers and challenge unauthorized personnel to identify themselves when seen on the premises. – Employees should notify the head of security about any unauthorized personnel on premises. • (follow reporting chain for each facility) PHYSICAL ACCESS CONTROL PHYSICAL ACCESS CONTROL - are mechanisms that are designed to minimize the risk of the company.
  • 17.
    • Employees mustwear badges at all times and should report cases where: –Visitors and delivery personnel are not wearing identifying badges while in the facility/ premises –Any proposed break in procedure • “I just need to drop something off….” • (follow reporting chain for each facility) PHYSICAL ACCESS CONTROL
  • 18.
    • Personnel Security– is a system of policies and procedures which seek to manage the risk of staff (permanent, temporary or contract staff) exploiting, or intending to exploit, their legitimate access to an organization's assets or premises for unauthorized purposes. • HR is responsible for verifying previous employment, background checks, termination procedures – Remove access keys, cards, IT passwords – Follow all written procedures • Employees should immediately report if terminated employees try to access the facility premises. – “Most Wanted” wall PERSONNEL SECURITY
  • 19.
    Information security -is the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. INFORMATION SECURITY Significant Role of the Employees are as follows: 1.Classified document should be safeguarded and stored accordingly 2.Classified information should not be divulge to anybody else. 3.Classified materials must be thrown in a classified waste box.
  • 20.
    Why is it? • The Company brings the responsibility for Security & Safety to each and individual. • All COMPANY XXXXXXXXXXXX employees should participate in keeping their part of the Security & Safety as strong as possible at their facility. SECURITY AWARENESS & YOU
  • 21.
    It is Because; PersonalHazard To Security …such as: Faith – (Belief/ Trust) Conceit – (Excessive Pride) Enthusiasm – (Something Inspiring/Exciting) Ignorance – (Lack of Knowledge/ Awareness) • Always be aware of potential security threats • Follow procedures • Report suspicious behavior & unlawful activity SECURITY AWARENESS & YOU
  • 23.
    • Is aTransgression: a violation of law, command or duty. • Theft • Fraud/Dishonesty • Pattern of disregarding the rules and regulations of the Company. • Robbery • Physical Assault • Sexual Abuse Unlawful Activity
  • 24.
    • Exploitation or mistreatmentof others through intimidation or abuse of power or position. • Other disruptive workplace behavior that resists supervisory direction or counseling. Unlawful Activity
  • 25.
    • Inability tocontrol anger—throwing things, acts of violence. • Threats or attempts to get something even with work associates, acts of unkindness. Unlawful Activity
  • 26.
    • Deliberate omission orfalsification of documents, materials and information. (e.g.) background when applying for employment processing. Unlawful Activity
  • 27.
  • 28.
    • Possessing Prohibited items suchas Firearms, switchblade knives or knives with blades longer than four inches; any object for the purpose of injuring or intimidating. Unlawful Activity
  • 29.
    • Use of illegal/illicit substances. •Misuse of prescription medication (use other than as prescribed). Unlawful Activities DRUG INVOLVEMENT
  • 30.
  • 31.
  • 32.
    • A personrunning and looking about secretly, as if he or she were being watched or hunt. • A stranger carrying property at an unusual hour or location, especially if the items are stereo equipment, office machineries or a valued one. • A person going door-to door in an office building or resident area. • Any person forcibly entering a locked door. • Transactions being conducted from vehicles, especially near the building or parks. SUSPICIOUS ACT & BEHAVIOR
  • 33.
    • Argumentative or insultingbehavior toward work associates or family to the extent that this has generated workplace discussion or has disrupted the workplace environment. SUSPICIOUS BEHAVIOR
  • 34.
    • Be waryof suspicious packages and letters. They can contain explosives, chemical or biological agents. Be particularly cautious at your place of employment. SUSPICIOUS PACKAGES & LETTERS
  • 35.
  • 36.
    • The designand placement of an IED is up to the imagination of the bomber. First and foremost it is an object, regardless of its disguise, that is not supposed to be there. • The best and most effective defense is to be aware of your surroundings. Based on your threat, if you think it does not belong in your area, consider it WARNING: If an object is considered suspicious, do not touch it or move it. Evacuate the area and notify authorities, any movement, however slight, may cause it to function. IMPROVISE EXPLOSIVE DEVICES (IED)
  • 37.
    IMPROVISE EXPLOSIVE DEVICES(IED) • IED - is a term for an explosive device that is constructed in an improvised manner designed to kill, hurt, or destroy property.
  • 38.
    • IED canbe contained in almost anything. The item must be carried or driven to where it will be placed, so concealment or masking of the device will be necessary. The outer container can be, but not limited to: • Pipe Bombs—steel or PVC pipe section with end caps in nearly any configuration are the most common type of containers. IED – EXTERNAL APPEARANCE
  • 39.
  • 40.
    • Vehicle Bombs— By far the most demoralizing, vehicle bombs can be the easiest to hide. Indicators may include inappropriate label or an unfamiliar vehicle parked in your area. The device can be placed anywhere in the vehicle. A vehicle bomb is intended to create mass casualties or cause extensive property damage. IED – EXTERNAL APPEARANCE
  • 41.
    Should mind myown business and not get involved. Someone else will report it. I don’t have time. Why i report it, they’ll either ignore it or go off the deep end about it. They won’t take me seriously. It is not my job. I don’t have all the facts. It’s just not my problem. It is not right to tell on someone. IRRATIONAL REASON FOR NOT REPORTING
  • 42.
    • “Safe” room •What to do if there is a Hazmat situation • Where to meet outside the facility in case of an evacuation • Numbers to call: (posted in ______) • When to call: (posted in _________) YOUR FACILITY: EMERGENCY
  • 43.
    1. Anticipate allpossible situations which can assume crisis proportion unique to the site. 2. Organize a Crisis Management Team (CMT) 3. Write down specific plans as general guidelines to address each possible situation separately, plan should be general enough to accommodate variations in the situation but specific enough such that implementors of the plan know generally what should be done. 4. Assign responsibilities to each team members for every plan. 5. Do a dry-run as often as reasonable to ensure that the CMT and the implementors of the plan continually get a feel for a real crisis before it occurs. 6. Review each written plan at least once a year to ensure that the plan is still up-to-date and relevant to changing situations. HOW TO DEAL WITH CRISIS
  • 44.
    Legal and DocumentationTeam Public/Media Relations Team Intel. & Investigation Team Medical and Evacuation Team Personnel & Logistics Team Support Services Team NGO’SNGO’S NBINBILGU/NGULGU/NGU PNP/AFPPNP/AFP CMT ORGANIZATIONAL CHART
  • 45.
    1. INDUSTRIAL/ COMPANY ACCIDENTS: –Fire – Chemical Spills – Waste disposal/ Waste Seepage Problems – Personal injury-type accident SITUATION WHICH CAN BE ASSUMED CRISIS PROPORTION
  • 46.
    2. CRIMINAL ORIENTEDSITUATIONS: – Bomb Threat/ explosions – Kidnapping & Extortions – Extortion Letters/ Threats – Hostage Barricade – Terrorist Attack SITUATION WHICH CAN BE ASSUMED CRISIS PROPORTION
  • 47.
    3. LABOR ORIENTEDSITUATIONS: – Lay-offs – Internal Labor Unrest – Strike within company, Within AYALA, Outside AYALA affecting the company operations SITUATION WHICH CAN BE ASSUMED CRISIS PROPORTION
  • 48.
    4. PUBLIC SECTORORIENTED SITUATIONS: – Utility (Electrical Power, Gas, Water & Chemical) disruptions – Civil Unrest such as : – Mass Demonstration/ Riots – Coups/ Political Upheaval/Disturbance – Assault vs. High Government Officials SITUATION WHICH CAN BE ASSUMED CRISIS PROPORTION
  • 49.
    5. NATURAL CALAMITIES: –Earthquake and Tsunami – Typhoon and Floods/ Storm Surge – Tornado or Twister/ – Etc. SITUATION WHICH CAN BE ASSUMED CRISIS PROPORTION
  • 50.
    • It takesa minute to follow a safety and security command; • It takes an hour to hold a safety and security meeting; • It takes a day to write a safety and security rules; • It takes a week to plan a safety and security programs; • It takes a month to put it into operations; • It takes a year to win a safety and security award; • It takes a lifetime to have a safety and security workers; • But it takes only a split second to destroy it all with one accident. SECURITY AND SAFETY QUOTES
  • 51.
    “It is adoctrine of war not to assume the enemy will not come, but rather to rely on one's readiness to meet him; not to presume that he will not attack, but rather to make one's self invincible” -- Sun TzuSun Tzu QUOTES
  • 52.
    w Far CanYou Go?w Far Can You Go?