Definition of Terms
Definition of Terms
OF TERMS
LEA 2
INDUSTRIAL
SECURITY
1. ACCESS LIST – an authenticated list personnel given to security guard allowing
entry to compound or installation or part thereof.
3. Active measures - are the physical barriers, security lighting use of vaults,
locks and others.
4. Advance Security – this are the advanced security at the place of engagement
before the arrival of the VIP. - Sanitize the engagement area.
6. agriculture.
8. Ambush Attack – the kidnapper will attempt to stop the victim’s car with in a
zone he established by blocking the roadway or by shooting the driver.
10. Animal Barriers – Usually German Shepherd, dog trained for and used as
guards.
13. Asset – any information, facility, material information, or activity which has a
positive value to its owner whether it is an individual, private r government
entity.
14. Audio Detection Device – it will detect any sound caused by attempted force
entry. A supersonic microphone speaker sensor is installed in walls, ceilings and
floors of the protected area.
17. Auxiliary alarm – company-owned alarm systems with a unit in the nearest
police station so that in case of need, direct call is possible. The company
maintains the equipment and lines both for the company and those in the police,
fire and other emergency agencies by special arrangement. The auxiliary system
can be availed of by radio, landlines, or cellphones.
19. BADGE SYSTEM – a system for personnel movement and control whereby
badges or identification are issued to personnel upon entering and an
installation. Visitors are also issued temporary badges when entering the
installation.
20. Bank Security – this type of security is concern with bank operations. Its main
objective is the protection of bank cash and assets, its personnel and clientele.
Security personnel are trained to safeguard bank and assets while in storage, in
transit and during transactions.
21. Barrier Maintenance –Fencing barriers and protective walls should always be
regularly inspected by security. Any sign or attempts to break in should be
reported for investigation. Destruction of fence or sections thereof should be
repaired immediately and guard vigilance should be increased.
24. Casual Pilferer – one who steals due to his inability to resist the unexpected
opportunity and has little fear of detection is no plan or premeditation and he is
usually a “loner” on the job. The temptation to pick up the article is basically due
to poor security measure. The implication of causal pilfering is the big cumulative
cost if it remains unchecked.
25. Central Station System – a type of alarm where the control station is located
outside the plant or installation. When the alarm is sounded or actuated by
subscriber, the central station notifies the police and other public safety
agencies.
26. Change key – a specific key, which operates the lock and has a particular
combination of cuts, or biting, which match the arrangement of the tumblers in
the lock.
28. Classified Matter – any information or material in any form or of any nature,
the safeguarding of which is necessary in the interest of security and which is
classified for such purpose by the responsible classifying authority.
29. Classify – this refers to the assigning of information or material, one of the four
security categories after determination has been made that the information
requires the security protection as provided.
30. Close-in Security – Accompanies the VIP where ever he goes, maximum of 4
members.
32. COMBINATION LOCK – instead of using the key to align the tumblers, the
combination mechanism uses numbers, letters or other symbols as reference
point which enables an operator to align them manually.
33. Communication- The transfer of thought from the mind of one person the
mind of another thought a common be from oral, written and other forms.
34. Compartmentation – refers to the grant of access to the classified matter only
to properly cleared person when such classified information is required in the
performance of their official duties.
35. Compromise – this takes place through the loss of security, which results from
unauthorized persons obtaining knowledge of classified matters.
37. CONFIDENTIAL (blue color code) – Information and material (matter) the
unauthorized disclosure of which, while not endangering the national security,
would be prejudicial to the interest or prestige of the nation or any governmental
activity, or would cause administrative embarrassment or unwarranted injury to
un individual or would be of advantage to a foreign nation.
38. Continuous Inspection - To keep pace with the constant changes in the
organization, changes in our security terms of attitudes, life-style and moral
values, and the rapid advancement of technological modifications are all around
us, the inspection must be ad on-going and never-ending activity.
39. Continuous Lighting –the most familiar type of outdoor security lighting, this
is designed to provide two specific results: glare projection or controlled lighting.
It consists of a series of fixed luminaries at range to flood a given area
continuously during the hours of darkness.
40. CONTROLLED AREA – an area near the adjacent to limited or exclusive areas
where entry is restricted.
41. Controlled Areas – Are those areas where access is restricted as to entrance or
movement by all authorized personnel and vehicles. It should additionally be
marked by a fence or other barrier, and access to it should limited to as few
guests as possible;
42. Controlled lighting – The lighting is focused on the pile of items, rather than
the background. The width of the lighted strip can be controlled and adjusted to
suit the security needs.
45. COVERAGE FACTOR – The minimum number of directions from which each
point in the area should be lighted depending upon the use of the area.
46. Critically – the impact of a loss as measured in financial terms. How important
it is in terms of the survival or existence of the organization.
47. Daily report – a daily report should be made to the person responsible for key
control from the personnel department indicating all persons who have left or will
be leaving the company. In the event that a key has been issued, steps should
be initiated to ensure that the key is recovered.
50. Declassify – the act of removing the security classification from classified
information or matter.
51. Disc tumbler lock – Designed for the use of the automobile industry and are in
general use in car doors today, because this lock is easy and cheap to be
manufactured, its use has expanded to other areas such as desk, files and
padlocks. The delay afforded is approximately ten minutes.
52. Disposal of Items – there is a need for “fences” “brokers” or “clearing houses”
for these “hot” items.
54. Document Security – this involves the protection of documents and classified
papers from loss, access by unauthorized persons, damage, theft and
compromise through disclosure.
55. DOPPLER EFFECT – a physical phenomenon that causes frequency shift if an
objects move in the area permeated by radio frequency signals. This change in
a certain type of alarms activates a signaling unit.
56. DRY RUN – practical test or exercise of a plan of any activity to test its validity,
an operational readiness exercise.
57. DURESS CODE – a type of code system so that security personnel when forced
by armed men enter an installation can give alarm by the use of certain words
in casual conversational with other personnel in the installation.
58. ELECTRICAL LOCK – a type of lock that can be opened and closed remotely by
electrical means.
59. Emergency lighting – this system is used in times of power failure or other
emergencies when other systems are inoperative.
65. Exit Interview – this is a valuable tool because it gives departing employees an
opportunity to list grievances. It offers security managers an opportunity to learn
of problems not previously known. Incorporating a checklist of company-issued
property and confronting a departing employee of this has resulted in reducing
losses of company property. Debriefing an employee is also incorporated in to
the exit Interview to remind employees of their continuing legal obligation to
safeguard confidential company information.
66. FALL SAFE – a term applied to a device or system that in the event of failure of
a components the incapacity will be signaled.
67. File room – a cubicle in a building constructed a little lighter than a vault but of
bigger size to accommodate limited people to work on the records inside.
68. Financial and Lifestyle inquiry – this type of investigation seeks to gather
information on income and mode of living, sometimes referred to as the earning-
to-debt ratio.
70. Floodlights - These can be used to accommodate most outdoor security lighting
needs, including the illumination of boundaries, fences and buildings and for the
emphasis of vital areas or particular buildings.
71. Fluorescent – this provides good color rendition, high lamp efficiency as well as
long life. However, it cannot project light overlong distance and thus are not
desirable as flood type lights.
73. Fresnel lights – These are wide beam units, primary used to extend the
illumination in long, horizontal strips to protect the approaches to the perimeter
barrier. Fresnel projects a narrow, horizontal beam that is approximately 180
degrees in the horizontal and from 15 to 30 degrees in the vertical plane.
74. Full-View fence – It is constructed in such away that visual access is permitted
through the fence. Its advantages are that it allows the roving patrols and
stationary guard to keep the surrounding area of the installation under
observation. On the other hand, it allows the intruder to become familiar with
the movements and time schedule of the guard patrols thereby allowing him to
pick the time that is advantageous on his part.
75. Glare projection type – The intensity is focused to the intruder while the
observer or guard remained in the comparative darkness, the lighting is toward
of the approach of an entrance to an installation.
76. Government Security Personnel – shall be natural persons which include
government security guards, detective, security consultant, security officers and
others that may be classified later except those of the AFP, PNP, BJMP, Municipal
or City Jail guards rendering / performing security and/or detective services as
employed by government entities.
77. Grand Master Key – a key that will open everything in a system involving two
or more master key groups.
79. High pressure sodium vapor – this has gained acceptance for exterior lighting
of parking areas, roadways, buildings and commercial interior installations.
Constructed on the same principle as mercury vapor lamps, they emit a golden
white to light pink color and this provide high lumen efficiency and relatively
good.
80. Hotel Security – a type of security applied to hotels where its properties are
protected from pilferage, loss, damage and the function in the hotel restaurants
are not disturbed and troubled by outsiders or the guest themselves. This type of
security employs house detectives, uniforms guard and supervisor and insures
that hotel guests and their personal effects safeguarded.
81. Human Barriers – guards, charges of quarters, office and shop workers, etc.
who stand between the intruder and the matter to be protected.
84. Informal Inspection is usually the result of a long and firmly entrenched
inspection program, understood by all and accepted as part of the organizational
life. The inspection has been stripped of all external trappings of importance, but
their functional importance has not been lessen in any manner. They are
seriously and quietly executed in a spirit of understanding and cooperation.
85. Initial Interview – it is the first contact of eh prospective employee wherein
the interviewer determines the suitability of the applicant for employment
through his give answers on the different type of questions being conducted. It
is in this stage where; the interviewer may start providing the necessary
information as to the overview of company security policies and at the same time
on the employee accountability and corresponding penalties that could result
from violation there from.
87. Inventories – periodic inventories will have to be made of all duplicate and
original keys in the hands of eh employees whom they have been issued.
88. Its purpose is to insure that a firm hires those best suited to assist the
firm in achieving its goals and objectives and once hired assist in providing
necessary security to the work force while carrying out their functions.
89. Key Cabinet – a well-constructed cabinet will have to be procured. The cabinet
will have to be of sufficient size to hold the original key to every lock in the
system. It should be secured at all times.
92. Key record – some administrative means must be set up to record code
numbers and indicates to whom keys to specific locks have been issued.
93. Laser Beam Alarm – a laser emitter floods a wall or fencing with a beam so
that when this beam is disturbed by a physical object, an alarm is activated.
94. Lever tumbler lock – Are difficult to define in terms of security, since they vary
greatly in their effectiveness. These locks are used in safe deposit boxes and are
for all practical purposes, pick proof. The least of these locks are used in desk,
lockers and cabinets and are generally less secure than pin tumbler lock.
95. Limited Areas – Are used only for handling and storage of high value cargo
and classified documents. The number of people authorized to enter this area
should be strictly limited, and the area should be under surveillance at all times.
96. Local Alarm – this system consists of ringing up a visual or audible alarm near
the object to be protected. When an intruder tries to pry a window, the alarm
thereat goes off.
99. MAISON KEYING – the issue of key to open main entrance gate and office.
105. Metal halide – it has similar physical appearance to mercury vapor but
provides a light source of higher luminous efficiency and better color rendition.
are used for general lighting purposes both indoors and outdoors, such as
commercial, industrial, and public spaces, parking lots, sports arenas, factories,
and retail stores, as well as residential security lighting; automotive and specialty
applications are further fields of usage.
106. Metallic foil or wire – it will detect any action that moves that foil or
wire. An electrically charge strips of tinfoil or wire is used in the doors, windows
or glass surfaces of the protected area.
109. Moving Attacks – the approach will usually be made from the left or
passing side, and the attacker will attempt to move over into the path of the
victim’s vehicle, forcing it to stop. Approach, would be from the right in the left
side drive countries. The ideal location for abduction is where cross street or turn
off is available to allow the attacker an easy quick way to escape. If two vehicles
are used to attack, one wills cut-off the victim’s vehicles, forcing it to stop. The
second may be then, move up on the left side. The abductor will make the
attack, take the victims from his vehicles and escape as quickly as possible.
110. Multiple pass system – this provides and extra measure of security by
requiring that an exchange take place at the entrance of each restricted area.
111. Natural Barriers – GOD created barrier such as, river, mountains and
others.
113. Natural Hazards – these are hazards which are the result of a state of
mind, attitude, weaknesses or character traits of one or more persons. They can
be acts of commission or omission, both overt and covert, which can disrupt
operation of a plant or installation.
115. Official – orders, manuals, letters, overlays, maps and magazines. You
may be careful and follow the chain of command.
116. Orientation and Training – it is in this stage where new employees
receive detailed presentation of personnel security policy. Usually, handouts or
employee’s manual are being distributed for reference. New employees also
requested to sign acknowledgement that they have been aware of the exiting
company policies and will abide the same.
117. PADLOCK – a portable and detachable lock having a sliding hasp which
passes through ha staple ring and is then made fasten or secured.
120. Passive measures - are those that will dates man from committing such
acts for fear of being caught, charged in court, or get dismissed; Security
education programs, investigation, fire prevention seminars; personal security
checks are examples of passive security.
127. PETERMAN – a term used in England for lock pickers, safecracker and
penetrators of restricted rooms or areas.
131. Pin tumbler lock- The pin tumbler lock is a lock mechanism that uses
pins of varying lengths to prevent the lock from opening without the correct key.
The outer casing of the pin tumbler has a cylindrical hole in which the plug or
metal pin is housed. The lock mechanism uses pins of varying lengths to prevent
the lock from opening. To open the lock, the plug must rotate, this is done by
using the correct key.
133. Private Detective – shall mean any person who does detective work for
hire, reward or commission, other than members of the AFP, Guard of the
Bureau of Jail Management Penology, Municipal or city jail guards, and members
of the PNP or of any other Law Enforcement agency of the government.
134. Private Detective Agency (PDA) – shall mean any person association,
partnership, firm or private corporation, who contracts, recruits, trains, furnishes
or post any private detective, to perform its functions or solicits individuals,
firms, or private, public or government-owned.
135. Private Security Agency (PSA) – shall mean any person association,
partnership, film or private corporation, who contracts, recruits, trains, furnishes
or post any security guard, to perform its functions or solicits individuals,
business, firms, or private, public or government-owned or controlled corporation
to engage his/its security guards, for hire, commission or compensation thru
subscription or as consultant/trainer to any private or public corporation whose
business or transaction involve national security or interest like the operation
and/or management of domestic or ocean vessels, airplanes, helicopters,
seaports, airports, landing strips etc., or as consultant on any security related
matter. Or to provide highly specialized security, detective and investigation
services like gangway security, catering security, passenger profiling, baggage
examination, providing security on board vessels or aircraft, or other security
needs that PNPSAGSD – CSG may approve.
136. Private Security Industry – shall cover those in the legitimate business
of providing private security and detective services.
137. Private Security Personnel – shall be natural persons which include
private security guards, private detectives, security consultant, security officers
and others that may be classified later, rendering performing security and/or
detective services as employed by private security agencies and/or private firms.
138. Probability – the chance of likelihood that a loss will take place.
Indicated by a mathematical statement concerning the possibility of an even
occurring.
140. Protection in Depth –In large open areas or ground where fencing or
walling is impractical and expensive, warning signs should be conspicuously
placed. The depth itself is protection reduction of access roads, and sufficient
notices to warn intruders should be done. Use of animals as guards and intrusion
device can also be good as barriers.
147. Recorded tour – guard takes with him on his tour of duty a form which
must have the time punched on it at each station.
149. Removal of item – this can be done as wearing the stolen shoes or
shorts, concealment in body or vehicles, use of false documents, etc. driver may
conceal pilfered items in his vehicle.
154. Risk Avoidance – eliminating or removing the risk totally from the
business, government, or industrial environment for which the risk manager has
responsibility.
156. Risk Reduction – decreasing the risk by minimizing the probability of the
potential loss. The reduction of criminal opportunity is often accomplished by
situational crime prevention strategies to discourage, deter, or deny criminal
incidents.
158. Risk Transfer – moving the financial impact of the potential loss-over to
an insurance company.
159. Risks – is the potential damage of loss of an asset. The level of risk is a
combination of two factors: the value placed on that asset by its owner and the
consequence, impact adverse effect of the loss or damage to that asset and; the
likelihood that a specific vulnerability will be exploited by a particular threat.
161. Routine Security – Neutralize the possible route of the VIP party.
162. Safe – a metallic container used for the safekeeping of documents or small
items in an office or installation. Safe can be classified as either robbery or
burglary resistance depending upon the use and need.
163. School Security – a type of security that is concern with the protection
of students, faculty, members, and school properties. Security personnel are
trained to protect the school property from theft, vandals, handling campus riots
and detecting the use of intoxicated drugs and alcohol by the students.
164. Search lights – These are highly focused incandescent lamp and are
designed to pinpoint potential trouble spots.
165. SECRET (red color) – is any information and material, the unauthorized
disclosure of it would be prejudicial to the interest and prestige of the national or
governmental activity or would cause administrative embarrassment or unwanted
injury to and be of advantage to and be of advantage to a foreign country.
171. SEP – the exposure and teaching of employees on security and its
relevance to their work.
172. Signs and notices – “Control signs” should be erected where necessary
in the management of unauthorized ingress to preclude accidental entry. Signs
should be plainly visible and legible from any approach an in an understood
language or dialect.
173. Single pass system – the badge or pass coded for authorization to
enter specific areas is issued to an employee who keeps it in his possession until
his authorization is terminated.
174. Solid Fence – Constructed in such away that visual access through the
fence is denied. Its advantage is that it denies the opportunity for the intruder to
become familiar with the personnel, activities and the time scheduled of the
movements of the guards in the installation. On the other hand, it prevents the
guards from observing the area around the installation and it created shadow
that may be used by the intruder for cover and concealment.
176. Street lights – This lighting equipment received the most widespread
notoriety for its value in reducing crime.
179. Sub-master Key – a key that will open all the lock within a particular
area or grouping in a given facility.
181. Supervisory Tour – This is where the guard sends signals to guard
headquarters from each station that he checks.
182. SURVEY – term to the first detailed “look see” conducted by a term.
183. Systematic Pilferer – one who steals with preconceived plans and takes
away any or all types of items or supplies for economic gain. Pilferers of this kind
can be employees or outsiders of the establishment.
186. Time traveled – If there is a long delay or time lapse between the
departure and arrival, the visitors may be required to show cause for the delay.
188. TOP SECRET (green color code) – is any information and materials the
unauthorized disclosure of it would cause exceptionally grave damage to the
nation, politically, economically and military operation.
195. Vault – heavily constructed fire and burglar resistance container usually a
part of the building structure used to keep and protect cash, documents and
negotiable instruments. Vaults are bigger than safe but smaller than a file room.
197. VIP Security – a type of security applied for the protection of top-
ranking officials of the government or private entity, visiting persons of illustrious
standing and foreign dignitaries.
198. Visitor’s entrances – separate access for visitors and employees of the
establishment should be provided.