Personnel Security: Welcome Criminology Students
Personnel Security: Welcome Criminology Students
Personnel Security: Welcome Criminology Students
Welcome Notes:
I. INTRODUCTION:
This module introduces the definition of personnel security and its related concepts. There are
many information and tools to help the confronting an organization and its employees set up effective
personnel security measures to protect people, information, and assets, as well as maintain a safe and
secured working environment.
The objective of the personnel security program is to make a reasonable determination that
individuals granted access to classified information or assigned to sensitive positions are and will
remain loyal, trustworthy, and reliable.
II. OBJECTIVES:
Before you proceed to the main lesson, test yourself in this activity.
GREAT!!!
You may now proceed to the main lesson.
LET’S BEGIN
Based on the preliminary activities, what did you notice about it?
________________________________________________________
CONGRATULATIONS!
You may now proceed to the lesson.
Among the major threats confronting an organization are employee crime and employee
misconduct, in fact internal theft surpasses the losses that can be attributed to robberies, theft, frauds and
other criminal acts committed by outsiders. At the same time, both substandard job performance and
appropriate behavior of employees can result in potentially devastating lawsuits’ and loss of business.
It is the employer duty to maintain a safe and secure working environment. Employers conduct pre-
employment background checks of job applicants in order to protect existing workers, guests, and the
public from the harmful acts or employees. Harmful acts committed by prospective employees cover a wide
number of criminal acts, such as murder, rape, assault, and drug dealing. As well as safety violations that
injures and kills. Job applicants with a potential to commit harmful acts can be filtered out of the hiring
process through pre-employment investigations.
Personnel Security- Involves those measures taken to safeguard a company’s employees and those
coming to a place of business either for business reasons or as guests
Can further include access control systems that control access in and out of specific premises.
Personnel Security - Various identification card systems, passes, and permits used by companies are
considered personnel control. Probably the most recent concerns classified under personnel security are
executive protection and back- ground investigations.
Interaction of Security Components Alarms & Hardware Reinforcement Utilization Response
Protective (Security) Components Security Personnel Employee Support Safeguards Controls Enforcement
Compliance Security Policy & Procedures
Purpose of Personnel Security
To identify security measures in proportion to the risk
To reduce the risk of employing personnel likely to present a security concern
To establish that applicants and contractors are who they claim to be
To close down opportunities for abuse of the organization’s assets.
Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 3 of 13
Pre-Employment Screening
Personnel security measures are usually undertaken during the recruitment process. This because
companies believe that it is better to spot dangerous or dishonest individuals before they are hired. This
means that the human resources department should not simply trust the correctness of information written
in a very impressive resume. Hence, a proper background employment screening on job applicants must
be carried out.
Through pre-employment screening the credentials of job applicants and their preconditions for
employment are verified. These checks should establish whether the applicant has concealed important
information or otherwise misrepresented himself. The objective is to collect information and use that
information to identify individuals who present security concerns.
The pre-employment screening should include checks on the following:
Proof of identity and address
Details of education and employment
Criminal records checks
Checking of at least two character references
Interviews
The job interview portion of the application also helps in the screening process because it provides
an opportunity to discuss the candidate’s suitability for employment. This interview is important because.
Face to face discussions encourage applicants to be honest.
It allows the employer to clarify information in the application form, ask for other information not
covered in the application form, and probe candidates about their responses.
It is also provides a good opportunity to add to the overall assessment of the applicants reliability
and integrity.
Identify Verification
Verifying the applicant’s identify is a critical measure in the screening process. In fact, other
measures in the screening process should only come second after the applicant’s identify has been
satisfactory proven. The key is to verify that the individual is not committing fraud by using false identities.
There are four main reasons why individuals use false identities:
Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 4 of 13
To avoid detection – Individuals like crooks, terrorists or wanted criminals may wish to remain
anonymous or undetected.
For dishonest financial gain – this involves individuals who have ill intentions to commit credit fraud
or unqualified applicants who falsity educational qualifications to obtain employment.
To avoid financial liability – this includes individuals who have failed to pay debts and are avoiding
financial liabilities.
To legally obtain genuine documents such as passports by using false ‘breeder’ documents (i.e.
those documents required to obtain passports, such as birth certificates which can have few or no
security features).
These reasons show how some individuals will claim false qualifications in their resumes and
applications forms, possibly to get unauthorized access into an organization’s assets. These also highlight
the need to authenticate documents submitted by the applicant and verify the information provided.
The purpose of verifying identity is to ascertain the correctness of the information they have given
about themselves:
One method of verifying identity’ which is called the paper-based approach, involves requesting
original documents such as those that corroborate the applicant’s full name, signature, date of birth and full
permanent address. Ideally, such documents should possess the following characteristics.
A second method called the electronic approach involves checking the applicant’s personal
details against external databases. This method requires checking and cross-referencing information from
databases such as criminal records or credit reference agencies. By searching for records associated with
the name, date of birth and address provided, it is possible to build a picture of that individuals past and
current life. Tracking such history indicates that the identity is more likely to be genuine. On the other hand,
if searches result in a history that lacks detail or depth, it is possible that the identity is false.
When such database checks are able to confirm that the identity does exist, it would also be
necessary test whether the individual truly owns this identity by asking questions that could corroborate
information about the identity. Testing the individual’s knowledge of identity is as important as establishing
that the identity exists to prevent the hiring of an applicant who simply stole the identity of someone who is
actually qualified to perform an important position in the organization.
Dates of employment
Positions held
Duties
Salary
Reason for leaving
Any employment gaps
Media Searches
Media searches involve the evacuation of an individual based on their online reputation. It includes
searching for what they say or what others say about them on the internet. This could be a useful tool if the
position to be filled up involves access to sensitive material that the applicant might compromise. For
example, if the position requires working closely with several to and movie personalities, it would not be
ideal to hire an individual who enjoys heavy gossiping in social media sites.
Media searches can also help verify identity, confirm or resolve concern about suspicious
behavior, or establish how security aware the applicant is. An individual who posts photo of drunkenness in
parties and allows public viewing of such photos could indicate poor judgment, especially if the position
being applied for involves working in a religious foundation or a prominent conservative’s politician.
Potential conflicts of interest may also be identified, such as being personally related to the owner of a
competing business.
There are risks, however, in using media searches. Employers might obtain information about
someone with the same name as the applicant. It is also possible that the positive information available
online staged by the applicant in order to appear qualified. Third party views or opinions about the applicant
are also not completely reliable, especially if these cannot be verified to be true.
Personnel security is a system of policies and procedures that manages the risk of staff or
contractors exploiting legitimate access to an organization’s assets or premises for unauthorized purposes.
It is important to distinguish between this and personal security, which seeks to reduce the risks to the
safety or well-being of individual employees.
Purpose of Ongoing Personnel Security (CPNI, 2010):
ACTIVITY 1
Name: ______________________________ Grade & Section: __________________
Direction: Choose the best and correct answer.
ACTIVITY 2
DIRECTION: Fill in blank by choosing the correct answer inside the box.
Security
VI. GENERALIZATION
DIRECTION: Answer the question below by giving 50-word explanation.
Question: Why is pre-employment screening is important?
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
10 POINT RUBRIC*
Level Description Score
Writes fairly clear.
Good grammar mechanics.
OUTSTANDING 9-10
Good presentation and organization.
Sufficient effort and detail
Minimal effort.
Good grammar mechanics.
GOOD 7-8
Fair presentation.
Few supporting details.
Minimal effort.
Good grammar mechanics.
FAIR 6
Fair presentation.
Few supporting details.
Somewhat unclear.
Shows little effort.
POOR Poor grammar mechanics. 5
Confusing and choppy, incomplete sentences.
No organization of thoughts.
TOTAL POINTS: ___________
Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 10 of 13
KUDOS!
You have come to an end of Module 4.
OOPS! Don’t forget that you have still an assignment to do.
Here it is….
VII. ASSIGNMENT
‘
Name: ________________________________________ Year and Sec.: _________________
Direction: Put a check on the box if the statement is a reason why individuals use false identities and an
"X" mark if it’s not.
□ To avoid detection or when individuals like crooks, terrorists or wanted criminals may wish to remain
anonymous or undetected.
□ For dishonest financial gain, which involves individuals who have ill intentions to commit credit fraud
or unqualified applicants who falsity educational qualifications to obtain employment.
□ For generous purposes once their real identities are found and determined especially through media
coverage
□To avoid financial liability, which includes individuals who have failed to pay debts and are avoiding
financial liabilities.
□ To be popular with the new flatform like tiktok or facebook and youtube on a chance to become a
celebrity
□ To legally obtain genuine documents such as passports by using false ‘breeder’ documents (i.e.
those documents required to obtain passports, such as birth certificates which can have few or no
security features).
VIII. EVALUATION
D. 5
ANSWER:
7. All are the qualification check should confirm the following information EXCEPT
A. Course dates
B. Salary
C. Title of the course
D. Grade/marks awarded
ANSWER:
8. It includes searching for what they say or what others say about them on the internet.
A. Media Surveillance
B. Media Searches
C. Online stalking
D. Online Security
ANSWER:
9. One method of verifying identity that involves requesting original documents such as those that
corroborate the applicant’s full name, signature, date of birth and full permanent address. Ideally, such
documents should possess the following characteristics.
A. Electronic Approach
B. Employment Checks
C. Paper-based Approach
D. None of these
ANSWER:
10. Under ______________________ screening the credentials of job applicants and their preconditions
for employment are verified.
A. Pre-Employment
B. Job hiring
C. Personnel Security
D. Interview
ANSWER:
Introduction to Industrial Security and Concepts
Module 4: Fundamental of Security Page 13 of 13