PERSONNEL SECURITY .PSIS. powerpoint presentation

markperdon1 8 views 66 slides May 07, 2025
Slide 1
Slide 1 of 66
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66

About This Presentation

Personnel Security Powerpoint Presentation


Slide Content

Personnel SecurityPersonnel Security
Dir Arturo B. Bringas CSP, CSMSDir Arturo B. Bringas CSP, CSMS

SCOPE OF THE LECTURESCOPE OF THE LECTURE
IntroductionIntroduction
PurposePurpose
ScopeScope
Key FunctionsKey Functions
Elements of a Comprehensive Personnel Elements of a Comprehensive Personnel
Security ProgramSecurity Program

SCOPE OF THE LECTURESCOPE OF THE LECTURE
Basic ConsiderationsBasic Considerations
Applicant ScreeningApplicant Screening
Red Flags in a Screening ProcessRed Flags in a Screening Process
Personnel Security InvestigationPersonnel Security Investigation
Background InvestigationBackground Investigation
Positive VettingPositive Vetting
ProfilingProfiling

SCOPE OF THE LECTURESCOPE OF THE LECTURE
Deception Detection TechniquesDeception Detection Techniques
Financial and Lifestyle InquiryFinancial and Lifestyle Inquiry
Undercover InvestigationsUndercover Investigations
Exit Interview as a Loss Prevention Exit Interview as a Loss Prevention
TechniqueTechnique
Anti-Competitive ClauseAnti-Competitive Clause
Security EducationSecurity Education

IntroductionIntroduction
Of the three key security processes, Of the three key security processes,
personnel security is considered the personnel security is considered the
most important simply because security most important simply because security
involves people, both as assets to be involves people, both as assets to be
protected, and as sources of security protected, and as sources of security
threats. threats.

PurposePurpose
To insure that a firm hires those To insure that a firm hires those
employees best suited to assist the firm employees best suited to assist the firm
in achieving its goals; and,in achieving its goals; and,
Once hired, assist in providing the Once hired, assist in providing the
necessary security to them.necessary security to them.
Scope of Personnel SecurityScope of Personnel Security
Personnel security investigationPersonnel security investigation
Security EducationSecurity Education

Key Functions of Key Functions of
Personnel SecurityPersonnel Security
It serves as a screening device to assist It serves as a screening device to assist
the organization in hiring suitable the organization in hiring suitable
employees.employees.
It conducts background investigation on It conducts background investigation on
employees.employees.
It handles investigation of employees It handles investigation of employees
suspected of wrongdoing. suspected of wrongdoing.

Key Functions of Key Functions of
Personnel SecurityPersonnel Security
It develops security awareness among It develops security awareness among
employees.employees.
It attempts to ensure the protection of It attempts to ensure the protection of
employees from discriminatory hiring or employees from discriminatory hiring or
terminating procedures as well as terminating procedures as well as
unfounded allegations of illegal or unfounded allegations of illegal or
unethical activities and conduct.unethical activities and conduct.

Elements of a Comprehensive Elements of a Comprehensive
Personnel Security ProgramPersonnel Security Program
Adequate job specifications and Adequate job specifications and
performance standards.performance standards.
Appropriate recruitment and selection Appropriate recruitment and selection
criteria.criteria.
Background applicant screening Background applicant screening
procedures and standards.procedures and standards.
Background investigative standards.Background investigative standards.

Elements of a Comprehensive Elements of a Comprehensive
Personnel Security ProgramPersonnel Security Program
Truth verification standards.Truth verification standards.
Criteria for employee conduct.Criteria for employee conduct.
Investigation of questionable employees Investigation of questionable employees
conduct.conduct.
Disciplinary procedures.Disciplinary procedures.
Termination procedures.Termination procedures.

Basic ConsiderationsBasic Considerations
It is the responsibility of the appointing authority to determine It is the responsibility of the appointing authority to determine
the suitability and loyalty of the person he is appointing.the suitability and loyalty of the person he is appointing.
No person is entitled solely by virtue of his grade or position to No person is entitled solely by virtue of his grade or position to
knowledge or possession of classified matter.knowledge or possession of classified matter.

Basic ConsiderationsBasic Considerations
All personnel whose duties require access to All personnel whose duties require access to
classified matter shall be subjected to a security classified matter shall be subjected to a security
investigation to determine eligibility for the investigation to determine eligibility for the
required security clearance.required security clearance.
All personnel shall undergo security education.All personnel shall undergo security education.

Basic ConsiderationsBasic Considerations
Security Managers and other key officers Security Managers and other key officers
responsible for personnel clearance responsible for personnel clearance
investigations should keep abreast of investigations should keep abreast of
changes in the law.changes in the law.
An employee has the right to review his An employee has the right to review his
pre-employment investigation file and pre-employment investigation file and
reasonably challenge any findings.reasonably challenge any findings.

Basic ConsiderationsBasic Considerations
There are virtually no restrictions on what There are virtually no restrictions on what
can be asked of an applicant once an can be asked of an applicant once an
offer of employment has been made.offer of employment has been made.
Applicant ScreeningApplicant Screening
The most effective tools in employee selection The most effective tools in employee selection
are:are:
the application form; and,the application form; and,
the interviewthe interview..

““Whole Man Rule”Whole Man Rule”
Act of weighing all elements of a person’s Act of weighing all elements of a person’s
background in determining his suitability.background in determining his suitability.
A system for evaluating the suitability of A system for evaluating the suitability of
an applicant.an applicant.
Governing standards;Governing standards;
Needs of the companyNeeds of the company
Fairness to the applicant.Fairness to the applicant.

Pointers in Screening Pointers in Screening
ProcessProcess
In screening an applicant for a position, In screening an applicant for a position,
the most expensive techniques should be the most expensive techniques should be
used last. That is why, a background used last. That is why, a background
investigation shall only be conducted investigation shall only be conducted
after the applicant has already after the applicant has already
undergone interview.undergone interview.

““Red Flags” in a Screening Red Flags” in a Screening
ProcessProcess
Application form not signed.Application form not signed.
Application date not filled up.Application date not filled up.
Applicant’s name and possible aliases.Applicant’s name and possible aliases.
Gaps in employment history or use of Gaps in employment history or use of
term “self-employed”.term “self-employed”.
Inability to remember names of former Inability to remember names of former
colleagues or bosses.colleagues or bosses.

““Red Flags” in a Screening Red Flags” in a Screening
ProcessProcess
Gaps in residenceGaps in residence
Inadequate referencesInadequate references
Lack of job stabilityLack of job stability
Signs of instability of personal relationsSigns of instability of personal relations
Indications of over-qualificationsIndications of over-qualifications
Declining salary historyDeclining salary history
Signature is stampedSignature is stamped

““Red Flags” in a Screening Red Flags” in a Screening
ProcessProcess
Criminal record left blank.Criminal record left blank.
Military service left blank.Military service left blank.
Never accept a resume from an applicant Never accept a resume from an applicant
in lieu of the company’s application form, in lieu of the company’s application form,
as it does not contain the various legal as it does not contain the various legal
clauses nor is there a space for a signed clauses nor is there a space for a signed
declaration.declaration.

““Red Flags” in a Screening Red Flags” in a Screening
ProcessProcess
Never accept a resume from an applicant Never accept a resume from an applicant
in lieu of the company’s application form, in lieu of the company’s application form,
as it does not contain the various legal as it does not contain the various legal
clauses nor is there a space for a signed clauses nor is there a space for a signed
declaration.declaration.

Personnel Security Personnel Security
Investigation (PSI)Investigation (PSI)
Definition - An inquiry into the character, Definition - An inquiry into the character,
reputation, discretion, integrity, morals reputation, discretion, integrity, morals
and loyalty of an individual in order to and loyalty of an individual in order to
determine a person’s suitability for determine a person’s suitability for
appointment or access to classified appointment or access to classified
matter.matter.

Personnel Security Personnel Security
Investigation (PSI)Investigation (PSI)
PSI has 3 General TechniquesPSI has 3 General Techniques
Background Investigation (BI)Background Investigation (BI)
Positive VettingPositive Vetting
ProfilingProfiling

Background Investigation Background Investigation
(BI)(BI)
The BI serves to:The BI serves to:
verify information on the application form;verify information on the application form;
ascertain past employment experiences; ascertain past employment experiences;
and,and,
 obtain other information pertinent to the obtain other information pertinent to the
decision to employ.decision to employ.

Background Investigation Background Investigation
(BI)(BI)
Factors to consider in a BI:Factors to consider in a BI:
LoyaltyLoyalty
IntegrityIntegrity
DiscretionDiscretion
MoralsMorals
CharacterCharacter
ReputationReputation

Motives That Cause People Motives That Cause People
to be Disloyalto be Disloyal
RevengeRevenge
Material GainMaterial Gain
Personal PrestigePersonal Prestige
FriendshipFriendship
Ideological BeliefsIdeological Beliefs

Weaknesses that Make Weaknesses that Make
People Susceptible to People Susceptible to
PressurePressure
Close relatives in foreign landsClose relatives in foreign lands
Heavy investments in foreign landsHeavy investments in foreign lands
JealousyJealousy
GullibilityGullibility
Weakness of CharacterWeakness of Character

Weaknesses that Make Weaknesses that Make
People Susceptible to People Susceptible to
PressurePressure
Heavy indebtednessHeavy indebtedness
Addiction to narcotics and drugsAddiction to narcotics and drugs
Guilty PastGuilty Past
Moral depravityMoral depravity

Types of Local Agency Types of Local Agency
CheckCheck
Police ClearancePolice Clearance
City / Municipal clearanceCity / Municipal clearance
Mayor’s clearanceMayor’s clearance
Regional Trial CourtsRegional Trial Courts

National Agency CheckNational Agency Check
National Bureau of Investigation
Intelligence Service, AFP, ISAFPIntelligence Service, AFP, ISAFP
DI Clearance (PNP)DI Clearance (PNP)

Components of a Complete Components of a Complete
Background InvestigationBackground Investigation
Applicant’s NameApplicant’s Name
Date of BirthDate of Birth
Present Residence AddressPresent Residence Address
LACLAC
NACNAC
Personal HistoryPersonal History
Marital HistoryMarital History

Components of a Complete Components of a Complete
Background InvestigationBackground Investigation
Residence HistoryResidence History
Citizenship historyCitizenship history
Physical dataPhysical data
Educational HistoryEducational History
Organization membershipOrganization membership
Neighborhood investigationNeighborhood investigation
Character referencesCharacter references

Components of a Complete Components of a Complete
Background InvestigationBackground Investigation
Employment historyEmployment history
Military historyMilitary history
Foreign travel & connection historyForeign travel & connection history
Criminal recordCriminal record
Credit recordsCredit records
Applicant’s SignatureApplicant’s Signature
Date of ApplicationDate of Application

Investigative CoverageInvestigative Coverage
Prior employment for at least 7 years Prior employment for at least 7 years
should be verified.should be verified.
Claimed education should be checked.Claimed education should be checked.
Claimed residence should be verified.Claimed residence should be verified.
If the candidate indicates a criminal If the candidate indicates a criminal
record, then details should be checked.record, then details should be checked.

Investigative StandardsInvestigative Standards
Information sought should be relevant to Information sought should be relevant to
the hiring decision.the hiring decision.
Information should be reliable.Information should be reliable.
Unfavorable information should be Unfavorable information should be
confirmed by at least two sources.confirmed by at least two sources.

Investigative ReviewInvestigative Review
All completed investigations should be All completed investigations should be
reviewed by a responsible supervisor so reviewed by a responsible supervisor so
that all applicants are measured that all applicants are measured
according to the same standards.according to the same standards.
Positive VettingPositive Vetting
It is a personal interview conducted under It is a personal interview conducted under
stress. Vetting is defined by Webster stress. Vetting is defined by Webster
Dictionary as the process of inspecting or Dictionary as the process of inspecting or
examining with careful thoroughness.examining with careful thoroughness.

ESSENCE OF VETTINGESSENCE OF VETTING
1.1.A personal interviewA personal interview
2.2.Conducted under stressConducted under stress
3.3.The interview is based upon answers The interview is based upon answers
previously give by the applicantpreviously give by the applicant
4.4.Other information is used during the Other information is used during the
interview, which confirms or denies interview, which confirms or denies
that given by the applicant.that given by the applicant.

BASIC REASONS FOR AN BASIC REASONS FOR AN
INTERVIEW DURING VETTINGINTERVIEW DURING VETTING
1.1.Challenge the applicant on the basis Challenge the applicant on the basis
of any false statements.of any false statements.
2.2.To observe the applicants behavior To observe the applicants behavior
under stress.under stress.
3.3.To open areas for exploration which To open areas for exploration which
have until now remain hidden.have until now remain hidden.
4.4.To provide new investigative leads.To provide new investigative leads.

ProfilingProfiling
The process whereby a subject’s reaction The process whereby a subject’s reaction
in a future critical situation is predicted in a future critical situation is predicted
by observing his behavior, by by observing his behavior, by
interviewing him, or by analyzing his interviewing him, or by analyzing his
response to a questionnaire.response to a questionnaire.

REID REPORT REID REPORT
Is an example of an honesty testIs an example of an honesty test

Deception Detection Deception Detection
TechniquesTechniques
The PolygraphThe Polygraph
The Psychological Stress EvaluatorThe Psychological Stress Evaluator
The Voice AnalyzerThe Voice Analyzer

Financial and Lifestyle Financial and Lifestyle
InquiryInquiry
This type of investigation seeks to gather This type of investigation seeks to gather
information on income and mode of living. information on income and mode of living.
This is done when the employee: This is done when the employee:
is to be promoted;is to be promoted;
is to be assigned to more sensitive duties; is to be assigned to more sensitive duties;
and,and,
when it is already part of SOP for those when it is already part of SOP for those
assigned to sensitive positions.assigned to sensitive positions.

Undercover InvestigationsUndercover Investigations
The placement of an agent in a role where The placement of an agent in a role where
his true identity is unknown, in order to his true identity is unknown, in order to
obtain information for criminal obtain information for criminal
prosecution or for recovery or limitation of prosecution or for recovery or limitation of
asset losses.asset losses.

Exit Interview as a Loss Exit Interview as a Loss
Prevention TechniquePrevention Technique
It gives departing employees an opportunity to list It gives departing employees an opportunity to list
grievances.grievances.
It offers security managers an opportunity to learn of It offers security managers an opportunity to learn of
problems.problems.
Utilizing a checklist has resulted in reducing losses.Utilizing a checklist has resulted in reducing losses.
Allows for debriefing of departing employees.Allows for debriefing of departing employees.

How to Conduct an How to Conduct an
Adequate Security Exit Adequate Security Exit
InterviewInterview
The security manager must choose an issue to be investigated.The security manager must choose an issue to be investigated.
The interview should be conducted face-to-face, impersonally and objectively. The interview should be conducted face-to-face, impersonally and objectively.
Questions should be specific.Questions should be specific.
Interview should be conducted on the last day of employment.Interview should be conducted on the last day of employment.
Must have adequate preparation by the questioner.Must have adequate preparation by the questioner.

How to Conduct an How to Conduct an
Adequate Security Exit Adequate Security Exit
InterviewInterview
It should be conducted regardless of rank of the departing employee.It should be conducted regardless of rank of the departing employee.
It should be periodically evaluated, at least once a year.It should be periodically evaluated, at least once a year.
Interview should be structured and standardized so that generally all employees are Interview should be structured and standardized so that generally all employees are
asked the same question. Procedures should be established for the analysis, asked the same question. Procedures should be established for the analysis,
interpretation and feedback of information in the appropriate manner.interpretation and feedback of information in the appropriate manner.

Anti-Competitive ClauseAnti-Competitive Clause
An effective method to prevent former An effective method to prevent former
employees from competing against the employees from competing against the
company. company.

SECURITY EDUCATION is SECURITY EDUCATION is
conducted…………conducted…………
To develop security awareness To develop security awareness
among employees of the among employees of the
company.company.
To emphasize the importance To emphasize the importance
and role of security in achieving and role of security in achieving
the company’s goals among the the company’s goals among the
top brass.top brass.

Security Awareness results Security Awareness results
in:in:
Better understanding of the relationship Better understanding of the relationship
between security and successful between security and successful
operations;operations;
Knowledge of one’s personal obligations Knowledge of one’s personal obligations
under the security program;under the security program;
Understanding between security Understanding between security
objectives and measures;objectives and measures;

Security Awareness results Security Awareness results
in:in:
Familiarity with sources of help in Familiarity with sources of help in
carrying out personal and departmental carrying out personal and departmental
responsibilities under the security responsibilities under the security
program; and,program; and,
Compliance with statutory and regulatory Compliance with statutory and regulatory
requirements and contractual obligations.requirements and contractual obligations.

Security Education may be Security Education may be
Conducted During:Conducted During:
The Initial Interview:The Initial Interview:
Overview of company security Overview of company security
policiespolicies
employee accountability and employee accountability and
corresponding penaltiescorresponding penalties

Security Education may be Security Education may be
Conducted During:Conducted During:
Training and Orientation:Training and Orientation:
Detailed presentation of personnel Detailed presentation of personnel
security policiessecurity policies
If possible, give handouts.If possible, give handouts.

Security Education may be Security Education may be
Conducted During:Conducted During:
Refresher Conference:Refresher Conference:
Review Guidelines and policies.Review Guidelines and policies.
Explain/ Introduce new policies.Explain/ Introduce new policies.
Determine if employee has problems.Determine if employee has problems.
Try to gather information of probable Try to gather information of probable
violations of company policies.violations of company policies.
Ask for recommendations or comments Ask for recommendations or comments
about existing policies.about existing policies.

Security Education may be Security Education may be
Conducted During:Conducted During:
Security Reminders:Security Reminders:
Indirect ApproachIndirect Approach
Use of posters and fliers.Use of posters and fliers.
Must be replaced periodically.Must be replaced periodically.

Security Education may be Security Education may be
Conducted During:Conducted During:
Security Promotion:Security Promotion:
Market security within company.Market security within company.
Get support among employees.Get support among employees.
Promote importance of security, Promote importance of security,
especially among top brass.especially among top brass.

Security Education may be Security Education may be
Conducted During:Conducted During:
Special Interviews: Special Interviews:
Used to augment regular refresher Used to augment regular refresher
conferences.conferences.
Used as an investigative tool.Used as an investigative tool.

Security Education may be Security Education may be
Conducted During:Conducted During:
DebriefingDebriefing
- is required whenever a person who has - is required whenever a person who has
access to classified information leaves access to classified information leaves
the company or is assigned to other the company or is assigned to other
duties.duties.

How To Conduct How To Conduct
DebriefingDebriefing
Debriefing should be established as a Debriefing should be established as a
formally conducted procedure.formally conducted procedure.
Procedures must be established for the Procedures must be established for the
analysis, interpretation and feedback of analysis, interpretation and feedback of
information.information.
Obtain a signed statement indicating that Obtain a signed statement indicating that
he is aware of his continuing security he is aware of his continuing security
responsibility.responsibility.

End of PresentationEnd of Presentation
THANK YOU……………THANK YOU……………

REVIEW QUESTIONSREVIEW QUESTIONS

The National Agency The National Agency
Check includes…Check includes…
a.a.National Bureau of InvestigationNational Bureau of Investigation
b. C-2 PNP Clearanceb. C-2 PNP Clearance
c. Intelligence Service AFPc. Intelligence Service AFP
d. All of the aboved. All of the above

Reminding an individual of his Reminding an individual of his
responsibility to protect classified responsibility to protect classified
information is done during…information is done during…
a.a.DebriefingDebriefing
b.b.Exit InterviewExit Interview
c.c.Background InvestigationBackground Investigation
d.d.Personnel Security InvestigationPersonnel Security Investigation

Its give an employee an Its give an employee an
opportunity to list opportunity to list
grievances.grievances.
a.a.DebriefingDebriefing
b.b.Exit InterviewExit Interview
c.c.Background InvestigationBackground Investigation
d.d.Personnel Security InvestigationPersonnel Security Investigation

Management learns of problems not Management learns of problems not
previously known during this previously known during this
process…process…
DebriefingDebriefing
Exit InterviewExit Interview
Background InvestigationBackground Investigation
Personnel Security InvestigationPersonnel Security Investigation

Security exit interview Security exit interview
should be conducted…should be conducted…
a.a.In privateIn private
b.b.On the last day of employmentOn the last day of employment
c.c.With adequate interview preparation by the With adequate interview preparation by the
questionerquestioner
d.d.All of the aboveAll of the above

Which of the following could not be Which of the following could not be
considered a weakness that makes considered a weakness that makes
people susceptible to pressurepeople susceptible to pressure
a.a.Heavy indebtednessHeavy indebtedness
b.b.StressStress
c.c.Moral depravityMoral depravity
d.d.Ideology beliefsIdeology beliefs
Tags