Security of People, Property and Information

dalryschool's version from 2015-09-22 15:38


This page will help you learn about security of people, property and information

Security of People

Question Answer
Staff BadgesNo staff should be allowed access to the premises without the correct ID badge so no unauthorised people can gain entry.
Visitor BadgesNo visitors should enter the premises until they have been issued with a badge so staff know person has permission to be there.
CCTV A closed circuit system should be set up to monitors and record all visitors in and around the premises and so deter troublemakers or burglars.
Intercom/Entry Phone/Buzzer SystemVisitors should only be allowed entry after identifying themselves through the entry system so ensuring only authorised people gain access.
Visitors’ BookDetails of all visitors must be made on entry so a record is kept of who is in the premises at any time.
Staff In/Out BookDetails of all staff who enter or leave must be made so a record is kept of who is in the premises at any time.
Swipe Cards/Combination LocksSpecial cards or codes must be inserted into machines so only authorised staff gain access.
Locked DoorsKeys and padlocks can be used to restrict access to certain areas of the premises or the main entrance.
Staff UniformStaff may be asked to wear specific clothes so they can be easily identified and security know they are entitled to be there.

Security of Property

Question Answer
BoltsComputers and valuable equipment can be attached to the floor or desks with chains and so make it difficult for thieves to steal them.
UV PensValuable equipment can be marked with ultra violet pens so they can be traced back to the business if they are stolen.
Security CablesPlace steel cables round portable equipment like netbooks and laptops and store in locked metal cabinets so there is less chance of theft.
Security AlarmsInstall and put on alarm systems connected to police or security firm at night when the premises are empty so intruders can be detected.
Security GuardsEmploy security people to patrol round the premises at night and so deter burglars from breaking into the premises.
Security BlindsInstall strong shutters to pull down over doors and windows and so prevent burglars entering the premises.
Security LightsInstall special lights which switch on/off if anyone is moving around the premises at night and so deter burglars.
Locks and PadlocksInstall special window locks and secure padlocks on main entry and exit points to the building to make it more difficult for anyone to break into the premises.

Security of Manual Information

Question Answer
Locked Filing CabinetsInstall metal cabinets with locks to store away any hard copies and printouts of confidential information.
Locks and PadlocksDoors to rooms with confidential information must be locked and bolted at night to ensure confidential information is kept secure.
Swipe Cards/Entry SystemsAreas with confidential information must be accessed using entry cards or codes so only authorised staff gain access.
ShreddersOnce confidential information is no longer required it must be shredded to ensure it does not fall into the wrong hands.

Security of Electronic Information

Question Answer
Username and PasswordUnique names and passwords must be issued to ensure only authorised staff gain access to files.
Access RightsICT co-ordinator can set up files so that only authorised staff can gain access to them using the correct passwords.
Read-only FilesCertain files may be locked so that changes cannot be made to them.
ScreensaversPassword protected patterns can come onto computers so prying eyes cannot see confidential information.
Shut Down ProceduresComputer operators can shut down files and the computer when finished so confidential information is shielded from prying eyes.
Locked Drawer/CabinetStorage media like pen drives, CDs etc must be labelled and locked away in a secure drawer/cabinet so they do not fall into the wrong hands.
Encryption SoftwareSpecial software can be used which codes data so hackers cannot read confidential information stored on computers or pen drives.
Anti Virus SoftwareSpecial software that can be installed onto computers to stop viruses corrupting the data.