Manual for Security Officer

The manual is maintained by the Security Supervisor, who is responsible for its prerogative of directing a security officer to take specific action (such as.
Table of contents

Personnel security screening processes: As CSO , you must promptly report any changes in behaviour of your screened personnel by emailing ssidivisiondesenquetes. All individuals are required to report information related to a change of personal circumstances that may affect the reliability status or security clearance they have been granted.

Physical security

The CSO or the employee must promptly report on any changes of circumstances by emailing ssidivisiondesenquetes. Persistent or unusual contact from another individual to obtain access to sensitive information, assets or a facility without proper authorization must be documented, investigated and reported.

As CSO , you must ensure that access to information and assets is limited to employees who:. If an organization has sensitive government information or assets at any of its worksites, the CSO or ACSO must remain even more aware of suspicious behaviours and be ready to report these to Public Services and Procurement Canada's Contract Security Program.

Security Officer Memo Template | EMB500-3

Most attempts to collect sensitive information or intelligence are subtle and often appear harmless. These can occur during social events, over the internet or during official meetings held domestically or abroad. Find out how, when and where to report security incidents. A terminated reliability status or security clearance will expire if the reactivation period has passed.

As CSO , you must ensure the employee holds a valid reliability status or security clearance before requesting a transfer or duplication. Upon termination of employment, individuals with a reliability status or a security clearance must receive a formal debriefing. This is to remind them of their responsibilities to maintain the confidentiality of the sensitive information to which they have had access.

Security Officer Manual

It can be used as a guide to perform the formal debriefing. The title of the image is " Reference sheet: The Public Services and Procurement Canada corporate signature appears at the top of the image. A disclaimer the reads "Note: Subject to change based on program updates" appears at the top of the image. Public Services and Procurement Canada PSPC ensures that information and assets that are transferred or exchanged as part of a sensitive Government of Canada GC contract, whether in Canada or abroad, are safeguarded throughout the process.

Aftercare comprises of a formal planned security briefing to personnel and the reporting of changes in circumstances, unusual incidents and behaviours. Do not hesitate to report any suspicious behaviour, circumstances, or incidents by sending an email to: Upon termination of employment, engagement or assignment, all individuals must receive a formal debriefing.

Log into the online industrial security services OLISS portal to fill out and e-sign all personnel screening forms. If an employee already holds a screening with another government department or private sector company, you can simply transfer that screening to your organization. Please note that fingerprints and credit checks are required for all new, update and upgrade personnel screening applications.

Organizations must report any corporate changes as soon as they occur to PSPC. To upgrade an organization clearance to a higher level clearance, a GC -approved source must sponsor the organization. The Public Services and Procurement Canada security agreement contains the terms and conditions that the organization agreed to comply with at all times during the contract.

Tall fencing, topped with barbed wire, razor wire or metal spikes are often emplaced on the perimeter of a property, generally with some type of signage that warns people not to attempt to enter. Barriers are typically designed to defeat defined threats. This is part of building codes as well as fire codes. Apart from external threats, there are internal threats of fire , smoke migration as well as sabotage.

Being a security officer

The National Building Code of Canada, as an example, indicates the need to defeat external explosions with the building envelope , where they are possible, such as where large electrical transformers are located close to a building. High-voltage transformer fire barriers can be examples of walls designed to simultaneously defeat fire, ballistics and fragmentation as a result of transformer ruptures, as well as incoming small weapons fire. Similarly, buildings may have internal barriers to defeat weapons as well as fire and heat. An example would be a counter at a police station or embassy, where the public may access a room but talk through security glass to employees in behind.

If such a barrier aligns with a fire compartment as part of building code compliance, then multiple threats must be defeated simultaneously, which must be considered in the design. An example would be decreasing the amount of dense, tall vegetation in the landscaping so that attackers cannot conceal themselves within it, or placing critical resources in areas where intruders would have to cross over a wide, open space to reach them making it likely that someone would notice them.

Security lighting is another effective form of deterrence. Intruders are less likely to enter well-lit areas for fear of being seen. Doors, gates, and other entrances, in particular, should be well lit to allow close observation of people entering and exiting. When lighting the grounds of a facility, widely distributed low-intensity lighting is generally superior to small patches of high-intensity lighting, because the latter can have a tendency to create blind spots for security personnel and CCTV cameras.


  • Physical security - Wikipedia.
  • Hungry for Answers - Straight Talk on Americas Misguided Diet.
  • You may also like…!
  • Search and menus.
  • Understanding the Social Economy: A Canadian Perspective.

It is important to place lighting in a manner that makes it difficult to tamper with e. Alarm systems can be installed to alert security personnel when unauthorized access is attempted. Alarm systems work in tandem with physical barriers, mechanical systems, and security guards, serving to trigger a response when these other forms of security have been breached. They consist of sensors including motion sensors , contact sensors, and glass break detectors. However, alarms are only useful if there is a prompt response when they are triggered. In the reconnaissance phase prior to an actual attack, some intruders will test the response time of security personnel to a deliberately tripped alarm system.

By measuring the length of time it takes for a security team to arrive if they arrive at all , the attacker can determine if an attack could succeed before authorities arrive to neutralize the threat. Loud audible alarms can also act as a psychological deterrent, by notifying intruders that their presence has been detected. Surveillance cameras can be a deterrent [15] when placed in highly visible locations, and are also useful for incident verification and historical analysis. For example, if alarms are being generated and there is a camera in place, the camera could be viewed to verify the alarms.

In instances when an attack has already occurred and a camera is in place at the point of attack, the recorded video can be reviewed. Although the term closed-circuit television CCTV is common, it is quickly becoming outdated as more video systems lose the closed circuit for signal transmission and are instead transmitting on IP camera networks.

Video monitoring does not necessarily guarantee that a human response is made to an intrusion. A human must be monitoring the situation in real time in order to respond in a timely manner. Otherwise, video monitoring is simply a means to gather evidence to be analyzed at a later time. However, advances in information technology are reducing the amount of work required for video monitoring, through automated video analytics.

Access control methods are used to monitor and control traffic through specific access points and areas of the secure facility. Mechanical access control systems include turnstiles, gates, doors, and locks. Key control of the locks becomes a problem with large user populations and any user turnover.

Navigation menu

Keys quickly become unmanageable, often forcing the adoption of electronic access control. Electronic access control manages large user populations, controlling for user lifecycles times, dates, and individual access points. For example, a user's access rights could allow access from h to h Monday through Friday and expires in 90 days.


  1. Roles and responsibilities of a company security officer.
  2. Outlook 2007 All-in-One Desk Reference For Dummies.
  3. Language selection.
  4. Memoirs of Napoleon — Volume 02!
  5. Security Officer Manual;
  6. Site Security Instructions.
  7. Henry IV, Part II!