Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Introduction to Industrial Security and Concepts

Module 4: Fundamental of Security Page 1 of 13

Module 4: PERSONNEL SECURITY

Welcome Notes:

WELCOME CRIMINOLOGY STUDENTS

I. INTRODUCTION:

This module introduces the definition of personnel security and its related concepts. There are
many information and tools to help the confronting an organization and its employees set up effective
personnel security measures to protect people, information, and assets, as well as maintain a safe and
secured working environment.
The objective of the personnel security program is to make a reasonable determination that
individuals granted access to classified information or assigned to sensitive positions are and will
remain loyal, trustworthy, and reliable.

II. OBJECTIVES:

At the end of this module, you should be able to:


1. Identify the type of security and its purpose
2. Explain the Pre-employment screening Procedure
3. Determine the reasons why people use false identities

III. PRELIMINARY ACTIVITIES:

Before you proceed to the main lesson, test yourself in this activity.

Direction: Unscramble each group of letter to form a word.


PSNOERNLE _________________________________
YESRUTIC _________________________________
ERP-TMPENYLMO ________________________________
Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 2 of 13

GREAT!!!
You may now proceed to the main lesson.

IV. LESSON PROPER

LET’S BEGIN

Based on the preliminary activities, what did you notice about it?
________________________________________________________
CONGRATULATIONS!
You may now proceed to the lesson.

Among the major threats confronting an organization are employee crime and employee
misconduct, in fact internal theft surpasses the losses that can be attributed to robberies, theft, frauds and
other criminal acts committed by outsiders. At the same time, both substandard job performance and
appropriate behavior of employees can result in potentially devastating lawsuits’ and loss of business.
It is the employer duty to maintain a safe and secure working environment. Employers conduct pre-
employment background checks of job applicants in order to protect existing workers, guests, and the
public from the harmful acts or employees. Harmful acts committed by prospective employees cover a wide
number of criminal acts, such as murder, rape, assault, and drug dealing. As well as safety violations that
injures and kills. Job applicants with a potential to commit harmful acts can be filtered out of the hiring
process through pre-employment investigations.

Personnel Security- Involves those measures taken to safeguard a company’s employees and those
coming to a place of business either for business reasons or as guests
Can further include access control systems that control access in and out of specific premises.

Personnel Security - Various identification card systems, passes, and permits used by companies are
considered personnel control. Probably the most recent concerns classified under personnel security are
executive protection and back- ground investigations.
Interaction of Security Components Alarms & Hardware Reinforcement Utilization Response
Protective (Security) Components Security Personnel Employee Support Safeguards Controls Enforcement
Compliance Security Policy & Procedures
Purpose of Personnel Security
 To identify security measures in proportion to the risk
 To reduce the risk of employing personnel likely to present a security concern
 To establish that applicants and contractors are who they claim to be
 To close down opportunities for abuse of the organization’s assets.
Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 3 of 13

Pre-Employment Screening
Personnel security measures are usually undertaken during the recruitment process. This because
companies believe that it is better to spot dangerous or dishonest individuals before they are hired. This
means that the human resources department should not simply trust the correctness of information written
in a very impressive resume. Hence, a proper background employment screening on job applicants must
be carried out.
Through pre-employment screening the credentials of job applicants and their preconditions for
employment are verified. These checks should establish whether the applicant has concealed important
information or otherwise misrepresented himself. The objective is to collect information and use that
information to identify individuals who present security concerns.
The pre-employment screening should include checks on the following:
 Proof of identity and address
 Details of education and employment
 Criminal records checks
 Checking of at least two character references

Pre-employment screening policy Checklist (CPNI, 2011)


 Make pre -employment screening an integral part of the recruitment process.
 Ensure that applicants are informed in writing that any offer of employment will be subjected
to the satisfactory completion of pre- employment screening checks, whether or not the
individual has already been granted access to the site.
 Involve all the relevant departments in the organization, and ensure they communicate and
share the data effectively.
 Identify the specific office responsible for the pre-employment screening process.
 Incorporate specialist business into your strategy if appropriate.

Interviews
The job interview portion of the application also helps in the screening process because it provides
an opportunity to discuss the candidate’s suitability for employment. This interview is important because.
 Face to face discussions encourage applicants to be honest.
 It allows the employer to clarify information in the application form, ask for other information not
covered in the application form, and probe candidates about their responses.
 It is also provides a good opportunity to add to the overall assessment of the applicants reliability
and integrity.

Identify Verification
Verifying the applicant’s identify is a critical measure in the screening process. In fact, other
measures in the screening process should only come second after the applicant’s identify has been
satisfactory proven. The key is to verify that the individual is not committing fraud by using false identities.
There are four main reasons why individuals use false identities:
Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 4 of 13

 To avoid detection – Individuals like crooks, terrorists or wanted criminals may wish to remain
anonymous or undetected.
 For dishonest financial gain – this involves individuals who have ill intentions to commit credit fraud
or unqualified applicants who falsity educational qualifications to obtain employment.
 To avoid financial liability – this includes individuals who have failed to pay debts and are avoiding
financial liabilities.
 To legally obtain genuine documents such as passports by using false ‘breeder’ documents (i.e.
those documents required to obtain passports, such as birth certificates which can have few or no
security features).

These reasons show how some individuals will claim false qualifications in their resumes and
applications forms, possibly to get unauthorized access into an organization’s assets. These also highlight
the need to authenticate documents submitted by the applicant and verify the information provided.
The purpose of verifying identity is to ascertain the correctness of the information they have given
about themselves:

 Determining that the identity is genuine and relates to a real person.


 Establishing that the individual owns and is rightfully using that identity.

One method of verifying identity’ which is called the paper-based approach, involves requesting
original documents such as those that corroborate the applicant’s full name, signature, date of birth and full
permanent address. Ideally, such documents should possess the following characteristics.

 Issued by a trustworthy and reliable source


 Difficult to forge
 Dated and current
 Contains the owner’s name, photograph and signature
 Requires evidence of identity before being issued

A second method called the electronic approach involves checking the applicant’s personal
details against external databases. This method requires checking and cross-referencing information from
databases such as criminal records or credit reference agencies. By searching for records associated with
the name, date of birth and address provided, it is possible to build a picture of that individuals past and
current life. Tracking such history indicates that the identity is more likely to be genuine. On the other hand,
if searches result in a history that lacks detail or depth, it is possible that the identity is false.
When such database checks are able to confirm that the identity does exist, it would also be
necessary test whether the individual truly owns this identity by asking questions that could corroborate
information about the identity. Testing the individual’s knowledge of identity is as important as establishing
that the identity exists to prevent the hiring of an applicant who simply stole the identity of someone who is
actually qualified to perform an important position in the organization.

Qualification and Employment Checks


Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 5 of 13

A qualification check involves the verification of information regarding educational or professional


qualification, while an employment check involve the verification of the applicant employment history in
term of dates of employment and position . The purpose of such information on the applicant qualification
and previous employment is to help the employer in evaluating the candidates reliability and integrity. It
also help to discover whether applicants are hiding negative information such as a criminal record or
dismissal from previous employment for suspicious reasons.

The qualification check should confirm the following information

 The establishment attended


 Course dates
 Title of the course
 Grades / marks awarded

The employment check should verify the following information

 Dates of employment
 Positions held
 Duties
 Salary
 Reason for leaving
 Any employment gaps

Media Searches
Media searches involve the evacuation of an individual based on their online reputation. It includes
searching for what they say or what others say about them on the internet. This could be a useful tool if the
position to be filled up involves access to sensitive material that the applicant might compromise. For
example, if the position requires working closely with several to and movie personalities, it would not be
ideal to hire an individual who enjoys heavy gossiping in social media sites.
Media searches can also help verify identity, confirm or resolve concern about suspicious
behavior, or establish how security aware the applicant is. An individual who posts photo of drunkenness in
parties and allows public viewing of such photos could indicate poor judgment, especially if the position
being applied for involves working in a religious foundation or a prominent conservative’s politician.
Potential conflicts of interest may also be identified, such as being personally related to the owner of a
competing business.
There are risks, however, in using media searches. Employers might obtain information about
someone with the same name as the applicant. It is also possible that the positive information available
online staged by the applicant in order to appear qualified. Third party views or opinions about the applicant
are also not completely reliable, especially if these cannot be verified to be true.

Ongoing Personnel Security during Employment


Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 6 of 13

Personnel security is a system of policies and procedures that manages the risk of staff or
contractors exploiting legitimate access to an organization’s assets or premises for unauthorized purposes.
It is important to distinguish between this and personal security, which seeks to reduce the risks to the
safety or well-being of individual employees.
Purpose of Ongoing Personnel Security (CPNI, 2010):

 To minimize the likelihood of employees becoming a security concern.


 To implement security measures in a way that is proportionate to the risk.
 Ro reduce the risk of insider activity, protect the organization’s assets and, where necessary, carry
out investigations to resolve suspicions or provide evidence for disciplinary procedures.

Importance of Ongoing Personnel Security


Insider activities are those that exploit an employee’s legitimate access to an organization’s that could
have possibly hired terrorists, intelligence service agents, discontented

We had just finished the discussion on Fundamental of


Security. Let’s move on to the next higher level of activity/ies or
exercise/s that demonstrate your potential skills/knowledge of
what you have learned.
Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 7 of 13

V. ANALYSIS, APPLICATION AND EXPLORATION

ACTIVITY 1
Name: ______________________________ Grade & Section: __________________
Direction: Choose the best and correct answer.

Direction: encircle the correct answer.


1. It is measures taken to safeguard a company’s employees and those coming to a place of business
either for business reasons or as guests
A. Personnel Security
B. Pre-Employment Screening
C. Interviews
D. Identify Verification
2. The job ___________portion of the application also helps in the screening process because it provides
an opportunity to discuss the candidate’s suitability for employment.
A. Personnel Security
B. Pre-Employment Screening
C. Interviews
D. Identify Verification
3. It is various identification card systems, passes, and permits used by companies are considered
personnel control.
A. Personnel Security
B. Interviews
C. Pre-Employment Screening
D. Identify Verification
4. It is individuals like crooks, terrorists or wanted criminals may wish to remain anonymous or undetected.
A. To avoid financial liability
B. To avoid detection
C. For dishonest financial gain
D. None of these
5. It includes individuals who have failed to pay debts and are avoiding financial liabilities.
A. To avoid financial liability
B. To avoid detection
C. For dishonest financial gain
D. Identify Verification
Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 8 of 13

ACTIVITY 2
DIRECTION: Fill in blank by choosing the correct answer inside the box.

Employment Credentials Applicants

Preconditions Checks Important

Information Collect Individuals

Security

Through pre-_____________ screening the _____________of job ____________ and their


___________________ for employment are verified. These _____________should establish whether the
applicant has concealed _______________ ________________ or otherwise misrepresented himself.
The objective is to____________ information and use that information to identify_____________ who
present ____________ concerns.

Finally, let us summarize the lesson of what we had discussed


today.
Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 9 of 13

VI. GENERALIZATION
DIRECTION: Answer the question below by giving 50-word explanation.
Question: Why is pre-employment screening is important?
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________

10 POINT RUBRIC*
Level Description Score
 Writes fairly clear.
 Good grammar mechanics.
OUTSTANDING 9-10
 Good presentation and organization.
 Sufficient effort and detail
 Minimal effort.
 Good grammar mechanics.
GOOD 7-8
 Fair presentation.
 Few supporting details.
 Minimal effort.
 Good grammar mechanics.
FAIR 6
 Fair presentation.
 Few supporting details.
 Somewhat unclear.
 Shows little effort.
POOR  Poor grammar mechanics. 5
 Confusing and choppy, incomplete sentences.
 No organization of thoughts.
TOTAL POINTS: ___________
Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 10 of 13

KUDOS!
You have come to an end of Module 4.
OOPS! Don’t forget that you have still an assignment to do.
Here it is….

VII. ASSIGNMENT

Name: ________________________________________ Year and Sec.: _________________
Direction: Put a check  on the box if the statement is a reason why individuals use false identities and an
"X" mark if it’s not.

□ To avoid detection or when individuals like crooks, terrorists or wanted criminals may wish to remain
anonymous or undetected.
□ For dishonest financial gain, which involves individuals who have ill intentions to commit credit fraud
or unqualified applicants who falsity educational qualifications to obtain employment.
□ For generous purposes once their real identities are found and determined especially through media
coverage
□To avoid financial liability, which includes individuals who have failed to pay debts and are avoiding
financial liabilities.
□ To be popular with the new flatform like tiktok or facebook and youtube on a chance to become a
celebrity
□ To legally obtain genuine documents such as passports by using false ‘breeder’ documents (i.e.
those documents required to obtain passports, such as birth certificates which can have few or no
security features).

After your long journey of reading and


accomplishing the module, let us now challenge your
mind by answering the evaluation part of this module.

VIII. EVALUATION

Name: ______________________________ Grade & Section: ________________


Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 11 of 13

DIRECTION: Choose the letter of the correct answer.


1. He/She has the duty to maintain a safe and secure working environment.
A. Employer
B. Employee
C. Applicant
D. Working Environment
ANSWER:
2. It Involves those measures taken to safeguard a company’s employees and those coming to a place of
business either for business reasons or as guests
A. Pre-employment Screening
B. Security Personnel
C. Interaction of Security Components
D. Interview
ANSWER:
3. All are Purpose of personnel Security EXCEPT
A. To identify security measures in proportion to the risk.
B. To close down opportunities for abuse of the organization’s assets.
C. To reduce the risk of employing personnel likely to present a security concern.
D. None of these
ANSWER:
4. It measures are usually undertaken during the recruitment process.
A. Security Personnel
B. Personnel Security
C. Interview
D. Interaction of Security Components
ANSWER:
5. It is a face to face discussions encouraging applicants to be honest.
A. Security
B. Verification
C. Interview
D. None of these
ANSWER:
6. There are _____ main reasons why individuals use false identities.
A. 2
B. 3
C. 4
Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 12 of 13

D. 5
ANSWER:
7. All are the qualification check should confirm the following information EXCEPT
A. Course dates
B. Salary
C. Title of the course
D. Grade/marks awarded
ANSWER:
8. It includes searching for what they say or what others say about them on the internet.
A. Media Surveillance
B. Media Searches
C. Online stalking
D. Online Security
ANSWER:
9. One method of verifying identity that involves requesting original documents such as those that
corroborate the applicant’s full name, signature, date of birth and full permanent address. Ideally, such
documents should possess the following characteristics.
A. Electronic Approach
B. Employment Checks
C. Paper-based Approach
D. None of these
ANSWER:
10. Under ______________________ screening the credentials of job applicants and their preconditions
for employment are verified.
A. Pre-Employment
B. Job hiring
C. Personnel Security
D. Interview
ANSWER:
Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 13 of 13

CONGRATULATIONS on reaching the end of this module!


You may now proceed to the next module.
Don’t forget to submit all the exercises, activities and portfolio
on ___________________.
KEEP UP THE GOOD WORK.
Well Done!!!

You might also like