0% found this document useful (0 votes)
170 views37 pages

CCCCCTV Module CCTV 1

Cctv for eim student

Uploaded by

gumagadaniel09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
170 views37 pages

CCCCCTV Module CCTV 1

Cctv for eim student

Uploaded by

gumagadaniel09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 37

SPECIAL CCTV OPERATOR TRAINING

MODULE I: INTRODUCTIONS AND HISTORY

Scope:

● Historical Development of CCTV

● Personal Development as CCTV Operator

● CCTV Concepts, Functions and Objectives

● Advantages and Disadvantages Of CCTV Camera

Objectives: AT THE END OF MY PRESENTATION, PARTICIPANTS MAY:

√ Become more knowledgeable in history, aspects and its purpose applications, in the development
behind Closed Circuit Television OPERATORS (CCTV);

√ Personal development as CCTV operator

I. Historical Development of CCTV

● CCTV (Closed Circuit Television) Is Use of video cameras to transmit a specific place on a
limited set of monitors
● It differs from broadcast TV wherein , that signal is not openly transmitted, though it may
employ point to point (PTP), point to multipoint or mesh wireless links;
● 1942- 1st CCTV installed by Siemens for observing the launch of V-2 rockets in GERMANY

● 1949- 1st commercial CCTV (Vericon) became available in US.

● 1968- New York: 1st city in US to install CCTV in public streets

● 1969- 1st public building in US to use CCTV IS THE New York Municipal Building

● 1970s- Introduction of VCR technology for recording

● 1973- NYPD installed CCTV in Times Square, New York


● 1975- CCTV was installed in London, England at four major underground train stations and
highways
● 1980s- Spread of CCTV in US and UK in public areas

● Mid 1990s to present- CCTV became available to almost everyone

● Walter Bruch German Electrical Engineer and Pioneer of German television is the Inventor of
CCTV. In 1942 during world war II.

II. PERSONAL DEVELOPMENT AS CCTV OPERATOR

• Personal Development refers to those activities that improve a person’s talents, potential,
employability, consciousness and ability to realize dreams and create wealth. In short, what you do
to improve yourself and your prospects in life.
• Personal development is a lifelong process. It is a way for people to assess their skills and qualities,
consider their aims in life and set goals in order to realize and get the most out of their potential.
• Personal Development begins with the following,

✔ Appearance

✔ Demeanor

✔ Manner of speaking

✔ Professionalism

✔ Attitude

SMART GOAL: Specific, Measurable, Achievable, Realistic, Timely

What are the Feature of Personal Development Plan?

✔ Where I am now?

✔ Identifying Skills and Qualifications

✔ Identifying Strengths

✔ Identifying Weaknesses

K EEP

E DUCATION

Y OURSELF (Believed in Yourself)


III. CCTV Concept, Functions and Objectives

OBJECTIVES;

Crimes Prevention and Security Purposes

• CCTV (Closed Circuit Tele-Vision) is a TV system in which signals are not publicly distributed but
are monitored, primarily for surveillance and security purposes. CCTV relies on strategic
placement of cameras, and observation of the camera’s input on monitors somewhere.

CCTV is commonly used for a Variety of Purposes, including:

• Maintaining perimeter security in medium- to high-secure areas and installations.

• Observing behavior of incarcerated inmates and potentially dangerous patients in medical


facilities.
• Traffic monitoring.

• Overseeing Locations that would be hazardous to a human, for examples, highly radioactive or
toxic industrial environments.
• Building and Grounds Security.

• Obtaining a Visual Record of activities in situations where it is necessary to maintain proper


security or access controls (for example, in a diamond cutting or sorting operation; in banks,
casinos, or airports).

Why do we use CCTV?

• Is to records image of people in certain public places including town centers, roads,
airports, and on public transport. CCTV image CAN BE USED AS EVIDENCE IN COURT.
• Close Circuit Tele- Vision (CCTV ) as a crime Prevention Measure

• The crime prevention attraction of CCTV lies with its capacity for constant surveillance of
potentially hazardous spaces, as well as being a sour of evidence when an incident does
occur.
• CCTV will often be used around public space in urban centers and on public housing
estates; in retail malls, individual shops and banks (particularly around Automatic Teller
Machines); on public transport (including station, train, buses and taxis ); and in car
parks.

But just how effective are CCTV system as a crime prevention measure?

• It depends on what type of CCTV system is considered, the location used, management
and operation, and what crimes are targeted. In other words, like any other crime
prevention measure,
• The best available research consistently suggest that CCTV has no effect on effect on
violent crime.
• Better results have been found for its ability to prevent property crime,

(Reference: Australian Institute of Criminology)

IV. Purpose; Functions; Applications

1. Observation

● Where physical observation may pose danger

● In environments not suitable for humans

● Need for monitoring of multiple locations at the same time in one location

2. Office and Plant Management

● Personnel Work Efficiency

● Plant Process Monitoring

3. Traffic Management

● Traffic Flow Monitoring

● Better Traffic Emergency Response

● Traffic Advisories
4. Special Events

● Special Occasions

● Event Recording

5. Safety Monitoring

● Minimize Accidents and/or Injuries in a Hazardous Areas

● Quick Response to Emergency Situations

● Security Monitoring

6. Monitoring and Surveillance

● Sustained observation through long periods

● Profiling

● Criminal Deterrent

V. ADVANTAGES AND DISADVANTAGES OF CCTV CAMERAS

Advantages of CCTV Cameras

€ The primary advantages is that it acts as a crime deterrent. Potential criminals


who see the camera may be dissuaded from following through with their planned
criminal activities for fear of being caught on tape. This leads to another
advantage of CCTV – increased safety. Increased safety for you, your
employees and your customers is likely a top priority, and a CCTV camera can
help achieve that.
€ If a crime does occur, the CCTV camera can provide evidence needed to catch
and convict the criminal. This can be especially useful if there are no witnesses
to a crime or if witnesses are unreliable sources, since a camera records what
actually happens. Another advantage is that you can monitory your business
from anywhere. Technology allows you to watch the camera feed on your
smartphone or via the internet. That means you can check in on your business
during off-hours, on weekends or when you’re on vacation.

Disadvantage of CCTV Camera


While they do have a lot of advantages, there are also some disadvantages to CCTV
Camera.

€ The issue of intrusion of privacy, your employees and customers may objects
filmed under constant surveillance.
€ It may cause employees to feel like you don’t trust them, which is never a good
dynamic. If you do opt for CCTV cameras, let your employees know about them
and explain that they were installed to increase their safety.
€ Another disadvantage of CCTV cameras is the cost. It is expensive to purchase
cameras and other equipment needed for a CCTV system. It can also be
expensive to keep the technology upgraded. If you have a small business, this
cost should be factored into your annual budget.

Advantages and Disadvantages of CCTV Cameras RATIONALE…

If you are debating adding security to your business, weigh the advantages and disadvantages of a CCTV
system to determine if it’s right for you. It is a major investment to install CCTV cameras. But the
investment typically pays for itself, especially if it means you won’t need to employ security guards to
monitor your business premises.

References

⮚ A 1 SECURITY CAMERAS: ADVANTAGES AND DISADVANTAGES OF USING SECURITY CAMERAS

⮚ UNLIMITED SECURITY: THE PROS AND CONS OF VIDEO SURVEILLANCE CAMERAS

⮚ GRAINGER: PROS AND CONS OF SECURITY CAMERAS IN THE WORKPLACE

⮚ BRICK HOUSE SECURITY: WHAT IS CCTV?

⮚ NATIONAL INSTITUTE OF JUSTICE: CLOSE CIRCUIT TELEVISION (CCTV) SURVEILLANCE

SPECIAL CCTV OPERATOR TRAINING

MODULE II: TECHNICAL ASPECTS AND SYSTEM


Scope:

❑ BASIC CCTV SYSTEM

❑ CCTV OPERATIONS

❑ CCTV BASIC TROUBLESHOOTING

Objectives: AT THE END OF PRESENTSTION, PARTICIPANTS MAY:

❑ BECOME MORE KNOWLEDGEABLE IN CCTVs BASIC SYSTEM

❑ PERFORM CCTVs BASIC CONFIGURATION AND TROUBLE SHOOTING

I. Structure

II. Components

1. CCTV Camera
2. Camera Lens
3. Power Source
4. Transmission Medium
5. Control Equipment
6. Recording Equipment
7. Storage
8. Monitor
9. Accessories

1. CCTV Camera
Image Sensor and or Camera Chip

❑ Type of Image Sensor:

● CCTV (Change Coupled Device)

● CMOS ( Complementary Metal Oxide Semiconductor)

❑ Camera Types:

● Box Type/Conventional

▪ High resolution at cheap prices

▪ Most with build-in audio

▪ Easy to install and replace lens

▪ Dual power (12VDC or 24VAC)

▪ With available heated enclosures for low temperature environment

● Dome Type

▪ Versatile (can be installed on ceiling, wall or diagonally)

▪ With or without IR (Infrared)

▪ With indoor and outdoor models

▪ Fixed lens up to 12mm

● Bullet Type

▪ Versatile bracket

▪ Ideal for outdoor

▪ Typically manufactured with IR

▪ Comes with fixed lens, varifocal and long range

● PTZ Type (Pan-Tilt-Zoom)

▪ Camera that can be controlled remotely


▪ Turns left to right, up and down

▪ Some have a feature that automatically follows moving objects

● Covert Type

▪ Also known as spy cameras

▪ Installed in everyday items

2. Camera Lens

❑ Fixed Lens:

▪ 2.8mm to 100mm

▪ Focus cannot be adjusted

▪ Lens needs to be replace for different application

❑ Fish Eye View Lens:

▪ Very wide angle lens

▪ Up to 120-180 degree viewing

❑ Varifocal Lens (Various Focus Lens):

▪ Focus can be adjusted manually

▪ Available range: 2.8mm-12mm, 6-60mm, 5-10mm

3. Power Source

❑ Direct Current/DC (Typically 12V)

❑ Active Current/AC (Typically 24V to 48V)

4. Transmission Medium

❑ Wired

▪ Coaxial Cable (Coax) Up to 300mm

▪ Twisted Pair (Up to 1km)


o UTP ( Unshielded Twisted Pair)
o STP (Shielded Twisted Pair)
✔ FOC ( Fiber Optic Cable) September 2012 – NTT Japan (1Pb at 50km)

❑ Wireless

✔ Outdoor/Indoor

5. Control Equipment

❑ Mouse

❑ Keyboard

❑ Pan-Tilt-Zoom Controller/Joystick

❑ Front Panel

6. Recording Equipment

❑ VCR (Video Cassette Recorder)

✔ Analog audio and video

✔ Uses magnetic tape video cassette

❑ DVR (Digital Video Recorder)

✔ Digital Audio and Video

✔ Uses Hard Disk Drive

❑ NVR (Network Video Recorder)

✔ Purely digital recording

✔ With embedded OS (Operating System), Windows or Linux

✔ Utilizes data network

❑ PC (Personal Computer)

✔ Multiple function

7. Storage Equipment
❑ VHS (Video Home System)
1. Magnetic cassette tape
2. Developed by JVC (Victor Company of Japan)
❑ HDD (Hard Disk Drive)
1. Data Storage/Digital Storage
2. Made of Rotating Magnetic Discs

8. Monitoring Equipment

❑ Cathode Ray Tube (CRT)

❑ Liquid Cristal Display (LCD)

❑ Light Emitting Diode (LED)

9. Accessories

❑ Camera Enclosure/Housing

✔ Protects the camera from outdoor elements

❑ Connectors

✔ BNC (Bayonet Neill-Concelman) Used with Coaxial Cables

✔ RJ45 Modular Plug Use with Twisted Pairs

❑ Brackets

✔ Wall mount, ceiling mount, pole mount

✔ Heavy duty

❑ Video Balun/Transceiver

✔ Passive Video Balun – does not require power

✔ Active Video Balun – requires power

✔ Combination:

✔ Passive – Passive = 300m

✔ Passive – Active = 500m

✔ Active – Active = 1km


10. Equipment Protection

✔ AVR (Automatic Voltage Regulator) – regulates main power line

✔ UPS (Uninterruptible Power Supply) – provides a few minutes back-up power

✔ Surge Protector – blocks sudden surges in power

III. Basic Video Concept

1. Camera Resolution

● TVL (TV Lines)

● Pixels

2. Frame Rate

● Frame Rate per Seconds (FRS)

IV. Main Classifications of CCTV System

1. Analog System 1
2. Analog System 2
3. Internet Protocol (IP) System
4. Combination of Analog and IP/Hybrid CCTV System
Technical Terminology

1. Pb –Petabyte= one quadrillion

2. Cladding- covering or coating/ thermal insulation

3. Registered Jack (RJ 45) number of the interface with 8 pins- means cables
contain 8 separates wire

4. PoE- Power Over Ethernet

5. LAN – Local Area Network

6. CAT5 – Category 5 cable high speed LAN Cable intended for single building or
group

7.CAT 6 – Category 6 cable – twisted pair cable standard used specifically in (Gb)

8.Gb – Gigabyte- one Billion Bytes

9TB-Terabyte-Thousand bigger than Gb

10 UTP-Unshielded twisted pair – is a ubiquitous(everywhere) type of copper


cabling used in telephone wiring and local area network (LANs) twisted pair
cables are widely used in transmitting information especially across great
distances

11. STP – shield twisted pair – interference cancelling capability

V. CCTV Operation

A. Live View

1. calling cameras for viewing

2. Analog PTZ camera control

3. IP PTZ camera control

B. Recording

C. Playback

D. Backup

VI. Basic trouble shooting

1. No Monitor Output
2. Specific camera video loss

3. Multiple camera video loss

4. No recording

5. No mouse control

6. No keyboard control

7. No joystick control

MODULE III: SECURITY AND SAFETY ASPECTS

Scope:

1. DEFINITION OF TERMS
2. BASIC ROLE AND BEST PRACTICES OF SECURITY & SAFETY
PRACTISIONER
3. CCTV FUNCTIONS IN SECURITY & SAFETY
4. IMPORTANCE OF OBESERVATION, DESCRIPTION, IDENTIFICATION
ANDITS PROCESS IN INVESTIGATION
5. BASIC RADIO COMMUNICATION WITH PROTOCOLS
6. IMPORTANCEOF RECORDING
7. REPORT WRITING

Objectives: AT THE END OF PRESENTATION, PARTICIPANTS MAY:


● DETERMINE CCTV OPERATORS ROLE AND FUNCTIONS IN
SECURITY AND SAFETY
● IMPORTANCE OF OBSERVATION, DESCRIPTION, IDENTIFICATION
AND ITS PROCESSES AS PART OF INVESTIGATION FOR CCTV
OPERATORS
● RELATIONSHIP OF BASIC RADIO COMMUNICATION AND ITS
PROTOCOLS OR CCTV OPERATORS
● AND IMPORTANCE OF RECORDING AND REPORT WRITING FOR
CCTV OPERATORS

I.DEFINITIONS

● CCTV: CLOSE CIRCUIT TELEVISION/SURVEILLANCE CAMERA


● OPERATOR: A PERSON WHO USES OR CONTROLS SOMETHING (SUCH

AS A MACHINE, DEVICE OR BUSINESS)/ SOMEONE WHO OPERATES


SOMETHING

● SURVIELLANCE: ACT OF ‘CAREFULLY WATCHING” SOMEONE OR

SOMETHING ESPECIALLY IN ORDER TO PREVENT AND DETEC CRIME.

✔ Operator shall be define as: A shrewd (having or showing an ability to

understand things and make good judgment) and skillful person who
knows how to circumvent restriction or difficulties

❑ SECURITY: FREEDOM FROM DANGER OR RISK;

FREEDOM FROM SCARE OR DOUBT; PROTECTION OR


DEFENSE

❑ SAFETY: STATE OF BEING FREE FROM HARM,

DANGER, INJURY OR DAMAGE

❑ According to Merriam-Webster, the primary definition of

safety is “The condition of being free from harm risk.”


Which essentially the same as the primary definition of
security,” which is the quality or state of being free from
danger”. However there is another definition for security;
that is, measures taken, to guard against espionage or
sabotage, crime attack or escape,” and this is generally
the definition we are using when we refer to industrial
security and law enforcement.

❑ Use those definitions we can better understand the

relationship between safety and security. The relationship


is such that a weakness in security creates increased in
risk, which in turn creates a decrease in safety. So safety
and security are directly PROPORTIONAL. While this may
all seem elementary, understanding the relationship
between safety and security is very important to
understanding how to INTEGRATE the two. Those that
own operate industrial facilities, especially those that many
governments have defined as critical infrastructures;
certainly understand the meaning and importance of safety
and security relative to their operations.

SECURITY CONCERNS

✔ Theft

✔ Fire

✔ Damage

✔ Fraud and malpractice amongst employees,

✔ Theft of sensitive information

✔ Terrorism or extortion

✔ Protection of property

Security hazards are conditions or factors that may expose a facility to risk
or threats. Security hazards vary from one facility to another.

II. THE ROLE SECURITY AND SAFETY

The Role of security and safety normally involves the following:

1. Access Control
2. Patrolling of Premises
3. Fire Prevention and Control
4. Hazard Identification and Control
5. Employee and Vehicle Searches
6. Traffic Control
7. Supervision of Electronic Alarm and Surveillance Equipment
8. Administration of First Aid,
9. Emergency Response and
10. Enforcement of Rules and Regulations.

III. CCTV Aides the Security Personnel in the Following


Circumstances:

● Early detection of inappropriate acts

● Recording activities and events for reviewing purposes

● Detection of irregularities in security and safety

● It provides details in aid of investigation

● It provides lead it enhances security and safety awareness

● Augment security and safety operation

However, CCTV alone cannot stop crime to happen, it only detect and record
it. There should be coordination with security and law enforcement.

IV. OBSERVATION, DESCRIPTION AND IDENTIFICATION (ODI)

IMPORTANCE OF OBSERVATION, DESCRIPTION AND IDENTIFICATION

1. Basic requirement intelligence work


2. Counter-surveillance
3. Help judge authenticity of an agent’s report
❑ Observation – is the individual’s complete and accurate

awareness of his surroundings and is achievement through the


maximum employment of his senses.

❑ Description- is the factual reporting of what has been observed

or noticed. A detailed account of what is perceived by the sense.

❑ Identification – is an act of judging and accurate knowing of

what has been perceived.

OBJECT OF PERCEPTION (POPE)

APPLIED IN A PERSON:

✔ General Characteristics focus on the person’s gender, height, built,

race or color of the skin.

✔ Specific Characteristics focus on person’s age (young/old), shape,

mannerism, tone of voice, language, gesture, posture.

✔ Peculiar or Unique Characteristics focus on person’s style

clothing< physical deformity, things carried, brand of cigarettes, type


of shoes, etc.

OBSERVING AN OBJECT

● Identify what the object is, its shape or form.

● Determine what the object is made up, what it is used for, its

brand, color and common feature.

● Look for any distinctive characteristics inherent to the object.

● Determine the condition at time the object was observed.


ON OBSERVING A PLACE

● General location, determine if it is located indoor or outdoor

● Determine its proximity to outstanding feature, condition of

the place, of what purpose, details of the surroundings.

● If indoor, determine exact location such as room number, signs

or any distinctive features.

ON OBSERBING AN EVENT

❑ What is the nature of the event or occasion?

❑ Location, scope of coverage

❑ Sequence of action, time occurring

❑ Objects or group of people involved

❑ Resultant effects.

V. BASIC RADIO COMMUNICATION

RADIOS AND RADIO PROTOCOL

● Hand-held radios are assigned daily to Security Personnel

(Bantay-Banyan) and officers (Ex-O/ Team Leaders) and


individuals with an acknowledged need to keep in touch.

● Radios need to be re-changed frequently.

● Each track will have “course channel”, plus other channels for

special use.

GENERAL RULES FOR RADIO USE


1. Stay on the channel to which you have been assigned.
2. Never put your radio down.
3. Do not lose your radio. Use proper harness.
4. You are responsible for your radio until you return it by signing it back
in the radio room.
5. Report all lost or stolen radios to your supervisor immediately.
6. Report all maintenance problems to your supervisor immediately.
7. Never give confidential information over the radio. Use a telephone.

RADIO ETIQUETTE

1. Never use profanity.


2. Be professional. Radios are a tool to help you do your job, NOT to make
social commentary.
3. Only one person can talk on the radio at a time.
4. Remember there are many other radio users who will hear you talking
and would like to use the radio.
5. Think about what you want to say before you press the talk button.
6. Be brief. Five second is the target.
7. Speak slowly and clearly. Be concise and give complete information.
8. Keep the volume at an easy level for you to hear but not disturb others
near you.
9. Volume down in QUIET ZONES.

10.“Don’t step on” others. Make sure another person’s conversation is


over before you break in.

RADIO OPERATIONS

1. Turn radio in.


2. Set assigned channel.
3. Adjust volume for easy listening.
4. To talk, hold radio up to your face in a vertical position.
5. Place microphone opening about two inches from your mouth.
6. Press the push-to-talk button throughout your transmission, then
release to listen.
7. Speak in a normal tone, do not yell.

RADIO PROTOCOL

1. LISTEN before you talk. Consider your priority in relation to what is


being communicated.
2. To make a radio call, say the person’s name you are calling, your
name, and then their name again
Example:”Joe this Sally, Joe”, or “Alpa-Delta-Alpha”
3. To respond, say “Go for Your Name at your Location” Example: “Go for
Joe top of Weasel” or “This is Tremblay Tower II Garbanzo Chair.”
4. To end a radio call, say the word OUT or CLEAR so others know its okay
to begin their call.
5. To cut in on a less urgent transmission for a call of GREAT URGENCY,
use the “BREAK ….. BREAK” transmission

PHONETIC ALPHABET AND CODES:

A- Alpha B - Bravo C - Charlie D - Delta E - Echo F - Foxtrot G – Golf

H –Hotel I – India J – Juliet K – Kilo L – Lima M – Mike N- November

O – Oscar P – Papa Q – Quebec R- Romeo S - Sierra T – Tango U – Uniform

V – Victor W– X- X-ray Y - Yankee Z – Zulu - (Hyphen)


Whiskey
Dash
FREQUENTLY USED TEN CODES

10-4 = Acknowledge/Roger 10-5 = Relay message to 10-6 = Busy, please stand


by
10-7 = Out of service, Leaving the 10-8 = in service, subject
air to 10-9 = Repeat message

10-10 = Over & Out call 10-12 = Stand By

10-14 =Escort 10-11 = Query, inquiry 10-16 = Problem or Trouble

10-17 = Request 10-15 = Back – up 10-19 = Return to base

10-20 = Location or Area 10-18 = Record or Log 10-22 = disregard / Cancel

10-23 = Arrived at Scene 10-21 = Call by telephone 10-33 = Emergency/Urgent

10-26 =Victim / Subject 10-24 = Follow-up/Make 10

34 = Riot / crime in progress Report 10-37 = Fuel / Food

10-38 = Local / Police 10-29 = Check, Verify 10-42 = Ending tour of duty

10-45 = Cars, Mobile/Vehicle


10-43 = Info/News/Status 10-36 = Correct / Time
10-50 = Accident 10-62 = Reply to message
10-41 = Operatives /
10-63 = Assignment Completed 10-66 = Need or necessary
Members
10-65 = Awaiting next message 10-74 = Negative
10-44 = Request

permission to leave

10-60 = Hospital
10-64 = Message

10-70 = Five alarm

VI . LOGBOOK RECORDING

LOGBOOK

● Is a kind of notebook kept by a security guard (adopted by CCTIV

Operator) while rendering duty.

● On the left side of every page, a vertical line in red color is found

measuring at leas one inch. On this portion the military time is


entered when activities or incident happened.

● After this line, from left going to right direction the space is reserved

for the recording of events that transpired in the area of


responsibilities.

MILITARY TIME

AM: 1200H 12:00 NN


PM:
0000H 12:00 AM 1:00PM 1300H
0100H 1:00 AM 2:00PM 1400H
0200H 2:00 AM 3:00PM 1500H
0300H 3:00 AM 4:00PM 1600H
0400H 4:00 AM 5:00PM 1700H
0500H 5:00 AM 6:00PM 1800H
0600H 6:00 AM 7:00PM 1900H
0700H 7:00 AM 8:00PM 2000H
0800H 8:00 AM 9:00PM 2100H
0900H 9:00 AM 10:00PM 2200H
1000H 10:00 AM 11:00PM 2300H
1100H 11:00 AM 12:00PM 2400H

Events to be recorded:

● Movment of people

● Transfer of properties both internal or external (if any)

● Accidents

● Incidents like theft, shooting, robbery and others.

● Personal tour of duty

Proper Procedure in Logbook Entry

❑ Penmanship must be legible.

❑ Hours must be chronologically arranged.

❑ Facts must be entered accurately.

❑ It must be concise.

Importance of Logbook

● It serves as an evidence

● It serves as a guide

● It serves as a reminder

● It serves as a daily journal


Proper Method of Handling Logbook

● It must be kept clean and covered

● No unnecessary entry must be made

● No page must be removed or detached

● No person must be allowed to read the contents of for the purpose of

preserving the confidentiality of the information except those


authorized one.

● It must be kept in a safe place once consumed.

VII. REPORT WRITING Note taking & Report Writing:

❑ NOTE TAKING - is the process of jotting down important matters

and events of a certain incident or activities.

❑ REPORT WRITING – is the process of finalizing note taking wherein

the six important elements reports writing is present.

ELEMENTS OF GOOD REPORT WRITING

Six Basic Investigative Question: Who? What? When? Where? Why? How?
(Five Wives & One Husband)

CARDINAL PRINCIPLES OF GOOD REPORT WRITING

✔ Accuracy - the investigator must conform to the truth.

✔ Brevity - eliminate all irrelevant, unessential and unnecessary

materials.
✔ Completeness - requires the inclusion of all relevant, pertinent and

material information.
o (KISS = Keep It Short & Simple)

✔ Fairness - the investigator and/or person making a report should

take the facts as he finds them and if these are his theories, it must be
consistent with the facts.

✔ Form and Style - Use the prescribed format based on company

practice.

PURPOSE

✔ To preserve knowledge

✔ To provide accurate details

✔ To aid other personnel and agencies

✔ To coordinate activities within the organization

SAMPLE FORMAT

CCTV MONITORING REPORT FORM


FOR MR. JEMEUL P. MARAHAY
SECURITY OPERATION MANAGER
SUBJECT SUSPICIOUS LOOKING PERSON

DATE AND TIME OF OCCURRENCE 15 0700H APRIL 2019

PLACE OCCUR/CAMERA NR.: 3RD FLOOR HALLWAY CAMERA 12


ACTION TAKEN:

REPORTED TO ROVING SECURITY PERSONNEL SG JUAN DELA CRUZ VIA RADIO


ABOUT THE PRESENCE OF THE SAID SUSPICIOUS LOOKING PERSON, FOR
VERIFICATION.

FYI AND REFERENCE.

SUBMITTED/REPORTED BY:

LG MARIA CLARA IBARRA


CCTV OPERATOR (NIGHT SHIFT)

References

⮚ Textbook on SECURITY AND SAFETY MANAGEMENT (Author EDC)

⮚ PSSPAI, Basic CCTV System Training Manual

⮚ MFI Polytechnic Institute Inc. Electronic Technology Training Manual

⮚ PSIS Advance Security Management Training Manual

⮚ www.google.com//youtube

SPECIAL CCTV OPERATOR TRAINING

MODULE IV: COMMOND CENTER OPERATION AND CCTV LEGAL ASPECTS


Scope:

● Basic Principle of CCTV Operations

● CCTV Command Center Operations and Management

● CCTV Operations Legal Basis

Objectives: AT THE END OF PRESENTATION, PARTICIPANTS MAY:

✔ Become more knowledgeable in Basic Principle in CCTV Operations

✔ May have an overview in Command Center Operations and CCTV Operations legal aspect

I. Principles of CCTV Operations

How CCTV Aims to Prevent Crime?

€ A CCTV system is not a physical barrier

€ The primary preventative utility is to trigger a perceptual mechanism in a potential offender.

€ CCTV aims to increase the perceived risk of capture

● For this crime prevention process to succeed, two elements must exist: The offender must
be aware of the camera’s presence.
● The offender must believe the cameras present enough risk of capture to negate the
rewards of the intended crime.
● The offender must believe the cameras present enough risk of capture to negate the
rewards of the intended crime.

Other Benefits

▪ Reduced fear of crime

▪ Aid to police investigations

▪ Provision of medical assistance

▪ Place management
▪ Information gathering

▪ Diffusion of benefits

WHAT DOES THE ROLE OF A CCTV OPERATOR INVOLVE?

✔ The basis of a CCTV operator’s role is to safeguard the public, protect property, and ensure the
security of data.
✔ Operating and monitoring banks of screens, reporting incidence, and potentially contacting the
police and emergency services as and when required.
✔ CCTV operator needs to be exceedingly observant with a high level of concentration, and be
able to divide their attention in order to monitor multiple occurrences taking place at a single
setting
✔ They will have to have a good understanding of body language in order to monitor crowds,
intercept trouble before it occurs, and track specific people.
✔ Strong communication skills are also needed when interacting with the police and other
enforcement agencies, and the ability to work without supervision for long periods of time is
absolutely essential to the role.
✔ CCTV operator must be quick thinking, using their initiative whilst reacting quickly and calm
during emergencies.

CCTV SURVEILLENCE STRATUM

Two Themes:

▪ Overarching aims of CCTV (Relating to why the CCTV System was in place)

▪ Functions of CCTV(features relating to CCTV procedures and processes conducted)

CCTV Surveillance Overarching Aim

€ Feeling of safety, safe environment, sense of security for patrons and staff undertaking their
work
€ Protection of Assets, the operational level considered CCTV as a method of “keeping a close eye
on the important stuff”.
€ Monitoring money, people and procedures within the complex, in line with the mid-level

Legal Compliance for the Use of CCTV


€ CCTV Surveillance Functions Audit and Ensure Compliance, CCTV surveillance ensures that
employees are compliant with organizational procedures
€ Performance Management, CCTV enables managers to review and audit how employees
conduct procedures
€ Investigation, the process of identifying ineffective or faulty procedures also falls under the use
of CCTV in investigations.
€ Monitor and Evidence, the operational level had a short time frame of CCTV, where evidence
supported daily security operations
€ Deterrence

II. COMMOND CENTER OPERATIONS AND MANAGEMENT

What is a Command Center?

-A central location to provide command, coordination and decision-making in support of the


incident response

What is the Purpose of a Command Center?

-To gather and process all of the information required to manage incident(s) and situational
awareness, quickly and effectively.

What Makes the Command Center Work? Good Function and Good Form

FUNCTION: A Closer Look Communication and Intelligence

1. Intelligence To optimize decision-making, incoming message and information must be :

● Gathering

● Evaluated/verified

● Analyzed

● Categorized

● Displayed
2. Communication To optimized situational awareness, ongoing communication is necessary with:

● Command and General staff

● Executive leadership

● Staff through the organization

● External partners (local and regional)

3. Command: The act of directing, ordering, or controlling by virtue of explicit statutory, regulatory, or

▪ Manage by objectives, relying on an Incident Action Plan

▪ Adhere to chain of command and unity of command principles

▪ Establish and maintain a common operating picture

▪ Make decisions and assign tasks

▪ Prioritize, deploy, and track critical resources

▪ Transfer command when appropriate

SO what makes the function of a Command Center effective?

Use of basic management principles ICS (Incident Command System)

▪ A good concept of operations

▪ Objective-based incident action planning

▪ Trained staff

▪ Delegation

▪ Unity of command (report to only one supervisor)

▪ Span of control (3 to 7 subordinates; 5 is optimal)

▪ Support staff

▪ Good use of technology

▪ Adequate space
▪ Other?

Command Center Location

The Command Center location is driven by many factors:

€ Space availability

€ Political decision

€ Accessibility

€ Proximity to hazards

€ Others?

Design Considerations Survivability

▪ Command Center remains operational during incident

▪ Backup Command Center is pre-designated and able to be activated and operational when
needed

Design Considerations Redundancy closely aligned to survival

▪ Linked to the number of redundant systems that support the Command Center (IT,
communications, utilities, generator power, etc.)
▪ Generator powered, BUT…..a backup to the generator (One thing you can count on in a
power outage is that generators will fail.)

Design Considerations Security

▪ Access control (card readers, security checkpoints, etc.)

▪ Limit extra bodies

▪ Reduce chaos

▪ Away from media access

Form follows function Regardless of the space and setup you have, always remember that FUNCTION is
more important than form

Command Center Facility Considerations


▪ Back-up power

▪ Portable water

▪ Seating

▪ Computers

▪ Break-out room Telephones (multiple lines in and out)

▪ Alternate communications

▪ Video

▪ Large screen display/ multiple display

▪ Meeting space

▪ Food

▪ “Chill-out” space

▪ Other? Space Challenges Noise

▪ Distraction

▪ Clutter

▪ Additionally, when sharing space, consider: Conflicts

▪ Set-up time

▪ Storage

Command Center Interactions

▪ Monitoring and incident, change and problem management are very tightly intertwined and
must work closely together to ensure issues are prevented or corrected as quickly as possible,
and that they do not recur.
▪ Monitoring process Monitoring should be proactive, not reactive. Its purpose is to sound an
alert when something has the potential for failing, not to notify when something breaks. It alerts
the right people that a failure may occur if an action is not taken to correct the event that just
occurred.

Do’s and Don’ts


✔ Do have well-documented procedures for the command center’s role in monitoring, change
management, disaster recovery, escalation, incident management, security management, event
management, and problem management. Those procedures must be followed by everyone.
There should be no exceptions, unless specifically accounted for in the procedures.
✔ Do have well-documented guidelines for the different severity levels. They will determine how
each outage is treated, the types and frequency of notifications, and the escalations leading to
extended delays in resolving a major problem. Frequent reviews should be performed to make
sure the guidelines are properly implemented.
✔ Do centralize all of your monitoring. All systems and applications that are critical to the
operation of the businesses and divisions supported should be monitored should be centrally by
the command center. That allows the command center to quickly determine whether a problem
is global in nature and speeds up the recovery process. Knowing which alerts are outstanding
when a major problem occurs helps to identify the proper support teams to engage and reduces
the length of the problem.
✔ Do standardize your monitoring tools and create best practices profiles so that certain functions
can be fully automated, such as the addition of monitoring on a new production server.
✔ Do act on every alert. Every alert that the command center receives should be acted upon. If a
support staff member says to ignore an alert for whatever reason, the response should always
be no. The support teams must correct the alerting system so that the alert is triggered only
when there is an actionable issue.

❖ Don’t ignore alerts. Ignoring alerts is a sure way of getting into trouble. At some point a
mistakes will be made and someone will ignore the wrong alert. Avoid the problem altogether
by making sure non-actionable alerts are not even seen.
❖ Don’t let the monitoring screens get flooded with alerts. A monitoring screen that’s flooded
with alerts makes it very easy to miss a critical alert. Alerts need to be acted upon and
corrected as soon as possible. It is not acceptable to let alerts sit in the queue until the
support teams’ regular work hours. If the condition is acceptable during off-hours, then the
alert should only be generated when it is not acceptable and when someone is available to
work on the problem. Alerts that don’t get addressed within a specific timeframe should get
escalated to the next level of management.

IV. LEGAL BASIS


Can any person take pictures of your home without your consent? Can your neighbor install a CCTV
that would pry to your property? Answer is: NO

a. The installation this cameras, however, should not cover place where there is reasonable expectation
of privacy, unless the consent of the individual, whose right to privacy would be affected was obtained.
Nor should these cameras be used to pry into privacy of another’s residence or business office as it
would be no different from eavesdropping, which is a crime under Republic Act No. 4200 or the Anti-
Wiretapping Law. Hing v. Choachuy, G.R. No. 179736).

b. The right to privacy is the right to be let alone.

C. It is the defined as “the right to be free from unwarranted exploitation of one’s person or from
intrusion into one’s private activities in such a way as to cause humiliation to a person’s ordinary
sensibilities.

d. It is the right of an individual “to be free from unwarranted publicity, or to live without unwarranted
interference by the public in matters in which the public is not necessarily concerned.

e. The Bill of Rights guarantees the people’s right to privacy and protects them against the State’s abuse
of power. In this regard, the state recognizes the right of the people to be secure in their houses.

f. The right to privacy under Article 26(1) of the Civil Code covers business offices where the public are
excluded therefrom and only certain individuals are allowed to enter.

g. Article 26(1) of the Civil Code, on the other hand, protects an individual’s right to privacy and provides
a legal remedy against abuses that may be committed against him by other individuals. It states:

h. Art. 26. Every person shall respect the dignity, personality, privacy and peace of mind of his
neighbours and other persons. The following and similar acts, though they may not constitute a criminal
offense, shall produce a cause of action for damages, prevention and other relief:

i. (1) Prying into the privacy of another’s residence;

j. This provision recognizes that a man’s house is his castle, where his right to privacy cannot be denied
or even restricted by others. It includes “ any act of intrusion into, peeping or peering inquisitively into
the residence of another without the consent of the latter.” The phrase” prying into the privacy of
another’s residence,” however, does not mean that only the residence is entitled to privacy.

k. This does not mean, however, that only the residence is entitled to privacy, because the law covers
also “similar acts.” A business office is entitled to the same privacy when the public is excluded there
from and only such individuals as are allowed to enter may come in

CCTV PRIVACY AND CONSENT NOTICES

The Data Privacy Act of 2012 requires that individuals be informed and provide their consent to the
processing of their personal information. The Closed-Circuit Television (CCTV) cameras used in UP
Diliman buildings and premises conduct this type of processing of personal information by capturing and
storing the identities of individuals.

CCTV Privacy Notice in UP Diliman buildings and premises with CCTV cameras, a Privacy Notice must
be posted in the following areas:

(1) Entry points in and around the building; and

(2) Receiving areas where security guards or receptionists visitors to log in.

The suggested notice to be posted is as follows:

CCTV Privacy Notice

● For security purposes, this building and its surroundings premises are monitored by Close Circuit
Television (CCTV) cameras which capture, record for thirty (30) days, and share to relevant units
footages which determine your identity, actions, and whereabouts. Your footage may be
recorded for a longer duration and processed in other means if it involved in or of use to a
security matter.
● By entering these premises, you consent to the capture, recording, processing, and sharing of all
information directly and indirectly obtained by CCTV cameras.
● The “thirty (30) days” stated in the notice may be changed to the actual number of days your
unit stores CCTV recordings in accordance with your security needs.

CCTV Consent Notice

● All receiving areas where visitors log their information with a security guard or receptionist, the
following Consent Notice is suggested to be to be posted near or on the logbook or e-logbook:
● CCTV Consent Notice

● By indicating your details in this logbook or by entering these premises, you undertake to have
read, understood, and consented to our CCTV Privacy Notice.

You might also like