Skip to main content

Posts

Showing posts from 2021

Physical Access Control

Physical access control can be achieved by the intervention of a human for example security monitor, security staff, a receptionist etc. and using mechanical means for example locks and keys. In physical access control a person or vehicle is stopped by a security guard at the access point of premises, checked and either let in or turned away. Physical security mainly focuses on the physical protection of information / data, buildings, personnel, installation, and other material assets. Additionally, physical security covers issues identified with forms earlier criminal activities, surveillance and terrorism. Disadvantages of physical access control process : A slow process. Prone to human error. Difficult to handle large volume to traffic. Blog ,   Facebook ,   Instagram ,   YouTube ,   Google Business ,   WhatsApp

Access Control Operation

Access control is defined as restriction or denial of access to a place or other resource involving physical as well as information security. Access controls give organization the ability to monitor, restrict / limit, exercise control and protect / ensure resource availability, integrity and confidentially within.In the fields of physical security and information security, get to control is the selective / particular restriction of access to a place or other resource. The act of accessing may mean expending, entering or using. Permission to access a resource is called approval. Types of access control :- Physical Access Control Electronic Access Control Turnstiles Bio-metrics Blog ,   Facebook ,   Instagram ,   YouTube ,   Google Business ,   WhatsApp

Postal Mail, Couriers & Suspicious Packages

Every organization has a receipt & dispatch section to deal with each day receipt, kind and dispatch of mail, messenger, courier, documents, packages and many others. However due to access control operations at most of the organization the postman, private courier and other delivery bays have their access till the security gate only. During off working hours, normally mails, packets and parcels are received at the security door. The security then delivers these to the respective departments / particular offices during working hours. Process :- The following process should be followed:- Receive mails, packets and parcels from postman / courier and deliver receipt. Record details of packets, mails and parcels received in the courier register and mail . Distribute mails, packets and parcels to the departments/ offices as required and take receipt on check in / register. Keep record all transactions and display it to the security office. Report to security officer approximately a...

Reporting

In case some discrepancy is noticed by the security guard, the matter be reported to the supervisor or security office and the visitor should be asked to wait. Documents For Material Movement Following records/ registers are generally maintain at the gate to control and monitor the movement of material from In/Out gate :- Incoming material enlist. Outing material register. Returnable material In/Out register. In addition to the above organization may have additional registers as per their arrangement. Points to remember while checking movement of material :- Check date and time mentioned on the material entryway pass. Check same material and quality as mentioned in the gate pass is being brought in or taken out. Check if any other items are being brought in or taken out along with the authorized materials. Check for stamp/ signature of the organization issuing authority. Check any alternation/ forging done in the door pass. Any different viewpoints according to approach for SOP. In cas...

Points to remember while checking proof / authorization documents or vehicle / gate Pass :-

Points to remember while checking proof / authorization documents :- Check and matched the photo of the card holder. Check for any marks for change / producing. Check and verify name of the organization specified on the card. Check the validity / expiry date on the card. Check if the card bears signature of issuing authority. Check if the card carries any serial number. Check for the stamp of the issuing office / organization. Check for any logo on the card. Match the identification marks, if required. Any other special point to check as per policy and instruction. Points to remember while checking vehicle / gate Pass :- Check if vehicle register number matches with the number given on card/ sticker. Check if name of the owner on the card matches. Check validity / expire date on the card. Check signature/ stamp of the issuing authority. Check the logo given on card / sticker. Any other special point to check as per policy and wait. Blog ,   Facebook ,   Instagram ,...

Personal Identification & Authorization Documents

Personal identification & authorization documents should accompany every individual or consignment of stores for smooth access or departure from premises. Confirmation process at the access control point is done by using of the following methods: Manual check – confirmation of an ID card or gate pass by security guard. Bio-metric check and access of personnel, vehicle and material. Manual and technical check and access of personnel, vehicles and material. Type of ID cards and premises :- It is important for a security guard to understand the various identification/ approval documents used for accessing/ exiting a premises. The types of identification/ authorization documents are as under :- Employee photo identity card. Employee temporary identity card. Visitor’s pass. Contractor’s pass. Contractor’s workers pass. Casual labourers temporary pass. Employee vehicle gate pass. Vendor / contractor vehicle gate pass. The design periodicity and issuing authority of such identification...

Access Control

The requirement of access control to any premises depends upon following security factors :- To keep unauthorized persons from the premises. To keep risks and threats away from the premises. To check losses. To maintain order and discipline in the movement of persons, vehicles and material in/out from the premises. The need to identify and confirm persons, vehicles and material before getting to a premises of an organization is very important. A security guard plays a significant role in the process of access control. People, Vehicles and Material   Category of People : The following category of people visit a premises: Own staff – management, staff and works. Outsourced manpower from service providers. Vendors – persons/ agencies supplying manpower and services. Visitors – customers, officials/ inspectors, clients. Category of Vehicles : following category of vehicles visit a premises: Light vehicles – two-wheelers, three-wheelers, cars etc. Medium vehicles – light commercial ...

Types of PA (Public Address) System

Fixed PA system : It is a part of a large network of declaration system connected to speakers in multiple locations, with many microphones located at different places, such as control room. Mobile PA System : It is also called as megaphone. It reduced and portable. It is held close by and hauled around while in use. For crowd control and managing with law and order situations outdoors mobile PA system are very helpful. Main parts of PA (Public Address) system Microphone Amplifier Speakers Operation reassure Main parts of a Hand-held megaphone A hand-held megaphone has in built battery compartment, amplifier and speaker inside the main body. The microphone is attached through a chord. Microphone unit has volume control, on/off switch and PTT (press-to-talk) button. Operating a megaphone Hold the megaphone by the grip and keep it near to your mouth in such a way that its speaker is facing the crowd. Press the PTT button and speak when you need to address the crowd or gathering. Adjust ...

Communication Equipment

Communication set-up is the sensory system of an association. There are different communication equipment that a security guard can used to communicate while releasing his/her duties at the premises. Communication equipment that are basically used in the PSS (Private Security System) are as under :- Telephone : Telephone/Mobile is a communication device for transmitting speech over a long distance. Calls are best for very timely messages, short and urgent messages and direct communications with staff people you know. Calls are additionally an great method to set up a formal meeting or site visit. Intercom or Door Phone : A intercom is internal, independent communication system for offices, buildings, residential societies and premises, in which outside calls can also be connected. Intercom has component like expert station which work as a exchange handset and headset etc. for tow way communication. A entryway telephone is a system that enables you to receive "calls" from yo...

Telephonic Communication

The following should be guaranteed for an effective telephonic conversation :- Receive the telephone immediately after second ring. Say ‘Hello’ and welcome the guest by wishing good morning/ good afternoon/ good evening according to the time of the day. Identify yourself by stating name and appointment. Say ‘may I know who is speaking?’ Say to the guest "may I know to whom you need to address ?" In case the individual to whom caller wants to speak to is unavailable, you may say, ‘may I take a message ?' or then again ‘may I take your name and contact number.’ Whenever needed to stand by, ask the caller to hold on while you take required information. Before placing a caller to briefly wait ask his permission. Do not to make the caller wait for over two minutes. It is better to return a call than to save the caller on hold for a really long time. At the end of the holding up period, offer your thanks for the caller’s understanding to hold on. Make sure to return the call if...

Non-Verbal Communication

Non-verbal communication includes facial expressions, the tone and pitch of the voice, signals showed through body language and the actual distance between the communicators. These non-verbal signs can give hints and additional information and extra data and above spoken (verbal) communication. The Non-Verbal Communication is the way of conveying meaning without the utilization of words either written or spoken. In such any communication made between at least two or more persons through the use of facial expressions, body language, hand movements, postures and signals is called as non-verbal communication. People utilize non-verbals to communicate emotions and relational attitudes, direct rituals like greetings and present one’s personality. The non-verbal communication in the form of signals, expressions add importance over the verbals and assist individuals to communicate more efficiently. The non-verbal communication characterize the distance between the communicators and assists th...

Verbal Communication

The term verbal communication consistently evokes the idea of spoken communication, but written communication is also important for verbal communication. Reading this book you are decoding the writers written verbal communication to learn more about communication. The sharing of information between people by utilizing speech. Verbal communication refers to our utilization of words while nonverbal communication alludes to communication that occurs through means other than words, for example, non-verbal communication, signals and quietness. Both verbal and nonverbal communication can be spoken and composed. Many individuals mistakenly expect that verbal communication alludes only to spoken communication. It includes oral and written communication. Oral Communication : Oral communication is most common form which includes use of words as medium of communication. A security guard needs to learn the oral communication skill for the following purposes :- To handle security related complain...

Modes of Communication

There are a variety of options for delivering a powerful message including emails, telephone calls, formal gatherings, and site visits. The mode you choose should be based on the message and the target group. This document provides a high-level overview of each method to help you to choose the suitable one. Written Communications : An email, a fax, and a letter are three examples of written communication. Sending an email is normally the best option. However, because representatives receive tons of emails, letters or faxes may stand out more. If you need to send a formal letter, consider faxing it instead of mailing it because the mailing process takes much more time. Phone Calls : Phone calls are best for very timely messages, short and urgent messages, and direct communications with staff individuals you know. Phone calls are also a great way to set up a formal meeting or site visit. Formal Meeting : Meetings may be held in meeting room which is usually dependent on the firm. No m...

Effective Communication

Communication is characterized as a process of passing of messages and sharing data/information between two living creatures using different modes and media which cloud be verbal, non-verbal and written. Effective communication takes place when a message is passed and the individual getting it has understood it properly. Communicating in an effective way is a skill. By learning communication skill, a security guard can communicate him better and connect with managers, employees, representatives, visitors and co-workers at the environment. Effective communication is about something exchanging data/information. It's about understanding the emotion and points behind the data/information. Just as have the option to clearly pass a message, you need to also listen in such that gains the full meaning of what’s being said and causes the other individual feel heard and understood. Effective communication helps a security guard understand a situation better and enable him/her to resolve prob...

Type of Patrols

A. Foot Patrol :- It is the most common method of patrolling . It is employed for a small area or where it is not possible to use vehicles or mount electronic surveillance. Essential elements of a foot patrol are :- Internal patrol – there are conducted within the facility/ premises/ building. Security/ fire patrol – these are dispatched to inspect sensors & alarms and causes of other security breaches. B. Mobile Patrol :- Mobile patrols use transport such as bicycles, motorcycles, four wheelers and even animals like horses. There cover a large area or a number of locations such as mines, refineries, pipe lines, airports, sea ports, yards, power plants etc. Major Principles of Patrolling Always be in communication with the supervisor, superior & control. Always vary the route. Always vary the time. Always be properly equipped with torches, communication equipment, weapons etc. Planning Common Sense Readiness For Patrol : - Fallowing are essential activities to ensure readine...

Patrolling

The act of moving about an area especially by an approved and prepared individual or group, for purposes for observation, security or inspection. The duration of a patrol will shift from a few hours to several weeks depending upon the nature of the objective and the kind of units included. An individual or group of persons who perform such a demonstration. What is a patrol ? A patrol is normally a gathering of work force, for example, police officers or military personnel that are assigned to monitor a particular geographic area. A patrolling is a prepared security guard or a group of prepared security guards particularly entrusted to keep a watch over a defined large area by regularly walking or driving around or through it. The basic task of a patrol is to follow a known route with the purpose of investigating some component of interest or in the task of a fighting patrol to find and engage the enemy. What is patrolling ? Patrolling is an act of moving in and around a large area by a...

Observing Activities In The Area

Observing activities in the area of responsibility by day or night there are a number of activities both legal and illegal that could take place in a premises such as visit by people, movement of vehicles & material and attempts to commit crime for which a security guards should remain vigilant in his area of responsibility. Every organization has standard operating procedures (SOP) to ensure foolproof security in their premises by placing an integrated security system comprising the security personnel, infrastructure and technology. Observation is a skill that a security guard must possess. It involves observing, noticing and recording activities taking place in a premises without the knowledge of stakeholders or criminals during any time of the day or night. A security guard is therefore required to be always observant and vigilant when deployed at the following guard post / areas:- a) Gate Control :- to remain alert in observing people for their unusual behavior. Observe people...

Assuming Charge of Designation Post

The continuity of security operations, a guard post should be manned round the clock. As security guards needs to be relieved after some hours of duty a fresh guard assumes the charge of a guard post. Taking over the charge of a guard post is important and both outgoing and incoming security guards should carefully hand over and take over the charge of duties. A security guards taking over the duties should do the following :- Report at least 15 minutes before time. Check duty roster and sign in the attendance register. Check incident register for any security breach that may have happened. Check handing over/taking over register for any remarks by the security supervisor and sign before assuming charge. Report to the supervisor after assuming the charge of the post. Check patrolling register. Check any other register/document of the guard post. Blog ,   Facebook ,   Instagram ,   YouTube ,   Google Business ,   WhatsApp

Incident Reporting

Incident is an event which is not part of the standard operation which causes or may cause disruption in the functioning or business. A security breach can lead to a security incident involving loss of life or property. An incident report is a proper recording of the realities identified with an incident. The report may relate to any unusual event on a worksite, but would normally identify with a accident or injury that has occurred. In a perfect world, the incident report should be finished as soon as possible following the injury. Depending on the severity of the incident, the report may be used solely by the company for future safety planning, or it may go to insurers, the overseeing regulatory body or the police. Categories of Security Incident : Security incident can be categorized as under:- Security incident Safety incident Security Incident :- Against premises : trespass, unauthorized entry, breaking into house etc. Against property : pilferage, theft, robbery, arson, vandalis...

Security Breach

A security breach is primarily a security lapse due to neglect or violation of security instructions and Standard Operating Procedures (SOP). Some common example of security breach are unauthorized entry, trespass, theft, pilferage and any other criminal activity within the secured premises.  A security breach is a matter of serious concern for any organization, since it poses a threat to life and property. It is therefore important for a security guard to be vigilant and alert during duty hours to prevent any security breach.  A security breach should be immediately reported upon to the security supervisor using available means of communication. A security guard must respond to a security breach by exercising full control to prevent any violation. Blog ,   Facebook ,   Instagram ,   YouTube ,   Google Business ,   WhatsApp

Handling of Unusual and Difficult Visitors

A security guard will face a number of situations wherein tact and total professional abilities will have to be exhibited in handling unusual and difficult visitor to the premises. This will enable the situation to get diffused in time, before taking a serious turn. Difficult Visitor : A visitor who behaves erratic, seconds unreasonable, highly demanding and becomes argumentative. This abnormality could be due to personal, physical or some external influence working on him and can happen at any stage during his visit to the premises at the gate, visitors parking lot, reception or during his move to destination inside the premises. Handling by the Security Guard :- Identification of such individuals. Get control of yourself : Never contend with visitors when they are angry, disappointed or complaining. If you allow a visitor to push your buttons and lose control of yourself, you've lost control of the situation. Keep in mind, you can lose a good visitor if you show boredom, disdai...

Importance of Visitor Monitoring & Management

Visitor Management framework perform the significant task of following who is on your premises. More advanced Visitor Management frameworks can follow when visitors arrive, limit where they are permitted to go, control the length of their visit and even screen them against publicly available background data. Basically, Visitor Management frameworks give you most extreme power over the visitors getting to your offices, a key aspect to keeping those offices free from any danger. The system gains significance due to may reasons, a portion of these are as given below :- The security set-up in an organization has little or no knowledge about most of the visitors unless the visitors are very regular. Visitor observing is vital in highly protected and sensitive areas. Escorting a Visitor A visitor in a sensitive or highly protected establishments are mostly escorted. While understanding this duty, a security guard must ensure the following :- Be familiar with the route to be taken to the con...

What is a visitor management system ?

Visitor management system for any organization is very important and sensitive activity, which includes reception of visitors, checking and recording identity and other particulars of the visitor in the visitors register or through electronic means. This is also include detecting and managing any equipment, electronic gadgetry or store item etc. accompanying the visitor as per the laid down policy of the organization. An effective visitor management system in any organization compliments a foolproof physical security measures in place and helps in preventing any security breach, such as unauthorized entry, trespass, intrusion etc. A visitor management system has some in-built advantages as under :- It gives whereabouts of a visitor inside the premises. Such information is useful during inquiry/ investigation. The information can be used as evidence if required in case of a reported security breach. Helps in evacuation during an emergency. Visitors records is available for any data coll...