Thesis Proposal
Thesis Proposal
Thesis Proposal
A Thesis
Presented to
The Faculty of the Graduate School
Lyceum of the Philippines University - Batangas
In Partial Fulfilment
of the Requirements for the Degree
Master of Science in Criminal Justice Education
with Specialization in Criminology
By
2019
Lyceum of the Philippines University Graduate School 2
Introduction
American Heritage Dictionary in their online database as: freedom from risk or
methods and techniques in their asset protection. The primary and most widely
used in protecting these institutions is the security force which is provided in the
Republic Act 5487 of the Philippines otherwise known as Private Security Agency
Law and provides for its licenses to operate and to exercise profession. However,
every installation cannot yet escape the emerging complicated security problems
like the deteriorating peace and tranquility, the threat of terrorism and the social
and colleges may it private or public are not exempted from the harsh
Educators have come to realize that the foundation of all learning was
for all who use them, including the school workforce, visitors and pupils in a
school because school premises are a valuable resource for local communities
and are increasingly being used for extended services. A highly complex and
prepare all children and youth to achieve their highest potential and contribute to
There are many ways in which schools fail to protect the children
entrusted to their care because the problem is not only with natural disasters and
health and safety within a school [3]. The sources of risk and danger are many
A school is a place for children to study and be educated, as well as the place
where they spend most of their day. For locals in the community, it is expected to
Lyceum of the Philippines University Graduate School 4
be a place for lifelong learning and the base of a regional community, which can
environment for children and those who are concerned to the school. Recently, it
has been required to take further measures to secure the safety of children
Mindoro.
respondents in terms of age, type, total land area, students population, numbers
of employees, annual budget from DBM, annual allocated budget for security
control, fencing and gates, parking and barriers, building envelope, CCTV/Video
between the profile of the respondents and the level of security management
LITERATURE REVIEW
School emergency planning is a necessary but often unfamiliar task for many
As cited in the study of Richards (2017), over the past three decades,
schools across the nation have implemented various practices and policies in an
security cameras, metal detectors, drug-sniffing dogs, and the full-time presence
problematic student behavior. Safer schools with less student misbehavior should
formal policing, there has been an increase in surveillance over students and
METHODS
Design
Lyceum of the Philippines University Graduate School 6
Mindoro and its relationship to the demographic profile. Aguilar (2018) stated that
conditions that occur, belief that are grasped, procedures that are going on,
Participants
The participants of the study will be the private and public schools in
personnel in-charge with the security supervision. In case of the absence of the
from a given population. Each sample was selected solely by coincidence and
each sample from the given population has the same opportunity of being
Instrument
Lyceum of the Philippines University Graduate School 7
identify the profile of the respondents in terms of age, type, total land area,
budget allocation for security services, local government support, proximity to the
common security breaches encountered. Part II will assess the level of security
control, fencing and gates, parking and barriers, building envelope, CCTV/Video
checklist and will make use of the 5-point Likert Scale response set with ratings
To validate the questionnaire, the researcher will seek for suggestions and
recommendations from the experts about the testing of its internal consistency
and reliability. Meanwhile, the researcher would like to conduct pilot testing in
coordinator.
Procedure
With the approval of the adviser, the researcher will secure permission to
study will be asked from the Division Office of the Department of Education of
assessment will be divided into two phases: First, the researcher will be
survey questionnaire; and lastly, the researcher will conduct ocular inspection
with the participants for the physical facilities and equipment provided for security
services. Its purpose and significance will be explained and they will be informed
regarding the purpose of the study. They will be also assured of the
The data gathered will be encoded after the assessment and will be
Data Analysis
To analyze the collected data, the researcher will utilize the descriptive
and inferential statistical tools. Descriptive statistics give a brief summary of data
system of private and public schools in Sablayan, Occidental Mindoro and their
Ethical Considerations
gathered by the researcher shall only be utilized for the attainment of the
objective of the research study. The instructions will be brief and understandable
in the opening words so that participants of the study were completely aware,
considering the cultural and social dissimilarities in relation to the subject of the
The researcher will also secure all information with utmost confidentiality.
Permission will be requested from the respondents upon the collection of data for
various statistical analyses. The identity of the any personnel representing the
acknowledged. In addition, the researcher will request for the honesty of the
participants in answering the given questionnaire. The researcher will request for
the supporting document if available for the questions requiring numerical data
and physical existence or confirmation for the data given may also be solicited
Survey Questionnaire
2. Type
______ Private ______ Public
4. Students population
______ less than 500 ______ 501-1000
______ 1001-1500 ______ 1501-2000
______ 2001-2500 ______ more than 2500
7. Accreditation Level
______ Probationary ______ Level 1
______ Level 2 ______ Level 3
5 – Very High
4 – High
3 – Medium
2 – Low
1 – Very Low
Consideration
s
Very Low Provide training to critical faculty and staff at least at initial
employment and at the beginning of the school year.
Low Provide follow-up training to critical faculty and staff
throughout the year.
Medium Expand training to include all faculty and staff. Train faculty
and staff on appropriate emergency actions regardless of
their location in the school building.
High Provide follow-up training to faculty and staff throughout the
year.
Very High Regularly assess the security and emergency plan(s)
training program to identify and remedy any gaps or
shortfalls. Ensure the completion of all training is accurately
documented.
Question 5 Are students trained on elements of the security and
emergency operations plan(s)?
Very Low The school does not train students on elements of the
plan(s) (e.g., evacuation routes).
Low
Medium The school provides some training to students at the
beginning of each school year. Although students are trained
on the appropriate emergency actions for their primary
locations (e.g., classrooms), they may not be aware of what
to do if an incident occurs when they are somewhere else in
the school building (e.g., gymnasium, hallways).
High
Very High The school provides comprehensive training to students at
the beginning of each school year and recurring training
throughout the year. Students are trained on appropriate
emergency actions regardless of their location in the school
building.
Consideration
s
Very Low Provide training to all students at least at the beginning of
the school year
Low
Medium Evaluate the need to provide more frequent training to
students. Evaluate the completeness of training and provide
additional information as necessary. Train students on
appropriate emergency actions regardless of their location in
the school building.
High
Very High Regularly assess the training program to identify and
Lyceum of the Philippines University Graduate School 17
Very High Train faculty and staff on identifying suspicious activity and
search techniques. Augment existing security plans by
including written inspection procedures. Train all staff and
faculty on that section of the plan and conduct periodic drills
and exercises to validate the plan.
Question 4 Are any members of the security force armed with lethal or
non-lethal weapons?
Very Low The school has no armed personnel (i.e., possessing a
weapon such as handgun, rifle, shotgun) onsite, and law
enforcement response is the only armed response
Low
Medium The security force is armed and receives recurring training.
Alternatively, the security force may have non-lethal
weapons and routine training.
High
Very High The security force is armed (i.e., possesses a weapon such
as handgun, rifle, shotgun) and has restraints. The security
force may have less-than-lethal weapons. The school has
established a formalized, trained threat response team.
Consideration
s
Very Low Security organizations such as ASIS International note that
potential assailants may be dissuaded from attacking a
target if they know they will face armed resistance; however,
the quality and quantity of defensive weapons must be an
obstacle to the potential assailants. Given this, school
officials may wish to consider arming their security force as
part of their broader security strategy. Consider training,
licensing, and arming personnel with lessthan-lethal or lethal
weapons to enable them to protect themselves and others.
Considerations should include not only the threat, but also
law enforcement response times; laws governing licensing
armed security guards; laws concerning the use of force;
training and certification requirements; workplace safety;
liability; cost; and how students, parents, faculty, staff, and
the public will perceive the presence of armed personnel
within the school.
Low
Medium Consider training, licensing, and arming any additional or
nonlaw enforcement security force with lessthan-lethal or
lethal weapons to enable them to protect themselves and
others. Considerations should include not only the threat,
but also law enforcement response times; laws governing
licensing armed security guards; laws concerning the use of
force; training and certification requirements; workplace
Lyceum of the Philippines University Graduate School 29
visitor’s badge.
Low Implement measures to stop visitors from entering the
school beyond the initial main entry. Require visitors to
provide a photo ID. Discontinue the practice of using student
helpers to escort visitors, and use only administration or
security personnel.
Medium Implement measures to further control and delay a visitor’s
initial access to the school, for example, by allowing access
to an initial set of doors only but not the administration area.
Require visitors to provide a governmentissued photo ID.
Explore the option of procuring a visitor management
system capable of screening visitors against databases such
as sex offender lists, banned visitors, etc. Escort visitors at
all times.
High Employ security personnel, not administrative personnel, to
control visitor access. If the school does not have a visitor
management system, explore the option of procuring one.
Implement procedures to print badges for visitors to wear
while at the school.
Very High Continue to implement strict visitor access controls.
Periodically review policies and procedures to assess
whether improvements are needed
Question 9 Are items that students bring into the school inspected (e.g.,
backpacks, bags)?
Very Low The school does not inspect items that students bring into
the school, or it inspects items brought onsite only if there is
cause.
Low
Medium The school randomly inspects items students bring onsite.
High
Very High Items are inspected, and may go through xray screening.
Consideration
s
Very Low Train personnel on potential indicators that a student may be
attempting to bring a weapon onsite. Institute random
inspections.
Low
Medium Inspect all items students bring onsite. Explore options to
provide x-ray screening for all backpacks, bags, etc.
High
Very High Continue to inspect all items brought onsite. Periodically
review policies and procedures to assess whether
improvements are needed.
Question 10 Are bags and packages belonging to visitors (i.e., parents or
Lyceum of the Philippines University Graduate School 41
High
Very High Ensure gates remain in good repair. Explore the option of
providing security camera coverage for all gates.
PARKINGS AND BARRIERS
Question 1 Are vehicles parked at the school screened, monitored,
and/or inspected?
Very Low The school does not screen, monitor, or inspect any vehicles
driven onsite.
Low The school has written policies and procedures for vehicle
searches. Signage warns that any vehicle parked on school
property is subject to search. The school has no way to
identify vehicles parked onsite.
Medium The school has comprehensive vehicle search policies and
procedures. Any vehicle parked on campus is subject to
search. Drivers are required to display their parking permits
or their vehicles will be towed. School personnel do not
patrol parking lots.
High Personnel conduct vehicle searches randomly and when
suspicious activity is reported. Parking permits are required
except in the designated visitor parking area(s). School
personnel patrol parking lots, but the school has no camera
coverage.
Very High The security force conducts vehicle searches randomly and
when suspicious activity is reported. Parking permits are
required. Security patrols the parking lot(s), and the school
has camera coverage for all parking areas.
Consideration
s
Very Low Establish a list of prohibited items, including potential
weapons, if one does not already exist. Post signage waring
that parking on school property is assumed to be consent to
search. Develop policies for searching vehicles.
Low Institute procedure for faculty, staff, and students (if
applicable) to register their vehicles with the school. Issue
numbered and recognizable permits such as mirror hang
tags. Contract with a towing company to check the lot and
tow unpermitted vehicles.
Medium Conduct patrols of parking areas.
High Provide camera coverage and adequate lighting for
videotaping activity in the parking lots.
Very High Keep the camera system in good repair to ensure
continuous coverage of parking areas.
Question 2 Does the school have a policy to address vehicles parked
for an extended period (e.g., reporting to security, local law
enforcement, or tow company)?
Lyceum of the Philippines University Graduate School 46
Very Low The school does not have a policy to address extended-stay
vehicles parked onsite. A vehicle may remain parked on
campus for an indefinite period of time without being
reported.
Low
Medium The school has written policies to address extended-stay
vehicles. These policies have not been reviewed or shared
externally. It is the responsibility of faculty and staff to
identify and report extended-stay vehicles to school
administrators.
High
Very High The school has written policies to address extended-stay
vehicles. They have shared the policy as needed (e.g., with
local law enforcement). Security personnel patrol parking
areas to identify and address extended-stay vehicles.
Consideration
s
Very Low Develop policies to address extended-stay vehicles
Low
Medium Coordinate policies that involve external reporting; for
example, review the policy with local law enforcement or set
up a contract with a towing company.
High
Very High Continue patrols and inspections. Maintain training for
suspicious activity and search techniques.
Question 3 Does the school control vehicular parking and circulation
onsite?
Very Low The school does not control access for any type of vehicle.
Drivers can park any vehicle anywhere close to the school.
Many vehicle access points are available.
Low The school does not control access for any type of vehicle.
School buses have a separate, although wholly
uncontrolled, loading and unloading zone.
Medium Some parking is monitored, but not by security personnel.
School buses have separate loading and unloading zones.
Signs, pavement markings, and/or orange cones are used to
signify this separation, but some education and enforcement
is also needed. Drivers cannot park vehicles closer than 70
feet away from the school.
High Security personnel monitor most parking. School buses
have separate loading and unloading zones, and access to
this area is effectively controlled. Signs, pavement markings,
and/or orange cones are used to signify this separation, and
enforcement is provided. Drivers cannot park vehicles closer
than 70 feet away from the school.
Lyceum of the Philippines University Graduate School 47
Security
Very High Security personnel monitor all vehicle access. School buses
have separate loading and unloading zones, and gates
effectively control access to this area. Signs, pavement
markings, and/or orange cones also may be used to signify
this separation, and enforcement is provided. Drivers cannot
park vehicles closer than 400 feet away from the school.
Consideration
s
Very Low Review the access points to parking areas. Reduce the
number of vehicle access points. Limit access through the
use of curbs, fencing, gates, and a minimum number of
entry points. Designate a separate area for bus traffic.
Low Use signs, pavement markings, and/or orange cones to
signify the separation between bus loading and unloading
zones and other vehicular traffic. Designate separate visitor
parking areas. Identify areas that allow vehicle placement
within 70 feet of the school, and evaluate options to reduce
the school’s exposure to nearby vehicle placement.
Medium Explore ways to employ security personnel to monitor most
parking areas. Provide education and enforcement to restrict
access to bus loading and unloading zones to buses only.
Identify areas that allow vehicle placement within 400 feet of
the school, and evaluate options to reduce the school’s
exposure to nearby vehicle placement.
High Explore ways to increase monitoring capabilities for parking
areas. Use gates to control access to bus loading and
unloading areas, where possible. Identify areas that allow
vehicle placement within 400 feet of the school, and
evaluate options to reduce the school’s exposure to nearby
vehicle placement.
Very High Confirm the effectiveness of vehicle monitoring, and remedy
any gaps or shortfalls. Continue efforts to separate bus
traffic from all other vehicular traffic and to provide a
minimum of 400 feet of standoff distance from the school
building
Question 4 Does the school have a high-speed avenue(s) of approach?
Very Low The school has at least one unmitigated highspeed avenue
of approach. The school has made no efforts to attempt to
mitigate any high-speed approaches.
Low The school has one or more high-speed avenue(s) of
approach and has made some attempt to mitigate at least
one of these vulnerabilities. The results of mitigation are
ineffective. Materials are too weak or ineffective for some
vehicles. No high-speed avenue of approach has been
Lyceum of the Philippines University Graduate School 48
effectively mitigated.
Medium The school has one or more high-speed avenue(s) of
approach and has made some attempt to mitigate at least
one of these vulnerabilities. The results of mitigation are
mixed. Spacing may be too wide, and materials may be too
weak or ineffective for some vehicles. One approach may be
effective in one area but not effective in another.
High The school has mitigated one or more high-speed avenue(s)
of approach using effective and correctly placed bollards,
barriers, or natural materials. Mitigation may include one or
many types and combinations of bollards, barriers, or natural
materials as long as they are effective at mitigating any and
all high-speed avenue(s) of approach.
Very High The school does not have a high-speed avenue of approach
or has mitigated highspeed avenues of approach using
effective and correctly placed bollards, barriers, or natural
materials. Mitigation may include one or many types and
combinations of bollards, barriers, or natural materials as
long as they are effective at mitigating any and all high-
speed avenues of approach.
Consideration
s
Very Low Evaluate parking lots, and determine if long straight lines
facilitate speeding. Consider whether parking lots could be
reconfigured to reduce vulnerabilities. Install speed bumps
to slow traffic.
Low Conduct a barrier survey to evaluate effectiveness. Remedy
large gaps between barriers, and replace barriers made of
weak or ineffective materials
Medium Conduct a barrier survey to evaluate effectiveness. Remedy
large gaps between barriers, and replace barriers made of
weak or ineffective materials. Ensure the most critical high-
speed avenue of approach is mitigated.
High Prioritized unmitigated high-speed avenues of approach,
and begin efforts to mitigate these vulnerabilities, beginning
with the most critical.
Very High Maintain barriers, especially those made of natural
materials. When construction or modification activities take
place onsite, assess and address any new potential
highspeed avenues of approach.
Question 5 What is the minimum standoff distance between the school
and a vehicle?
Very Low The school has an unmitigated standoff distance of less than
70 feet.
Low Some areas have a standoff distance of 70 feet or more, but
Lyceum of the Philippines University Graduate School 49
Consideration
s
Very Low Explore the option of replacing vulnerable glass with solid
doors, which would reduce the opportunity for a person to
defeat doors even when they are locked. In an active-
shooter event, solid doors may provide more protection. In
some cases, it may be possible to retrofit glass doors with
bulletresistant glass or bulletresistant film. If the school has
portable classrooms, available options for improving existing
doors may be limited.
Low
Medium Where possible, replace any glass doors with steel doors. In
some cases, retrofitting glass doors with bulletresistant glass
or bulletresistant film may be possible. If the school has
portable classrooms, available options for improving existing
doors may be limited.
High
Very High If the school has portable classrooms, available options for
improving existing doors may be limited. Evaluate the
security of doors on portable buildings and improve where
feasible. Assess the vulnerabilities inherent to portable
buildings, which provide minimal protection against natural
or manmade hazards. Explore options to reduce or eliminate
the need for portable buildings.
Question 2 Does the construction of interior doors deter or delay an
attack?
Very Low Interior doors are primarily wood with glass windows or all
glass doors. The glass covers about half or more of the
door. The school may have some steel doors.
Low
Medium The school has a mix of interior doors. While many are steel
with minimal glass, some are wood or steel with extensive
glass. The school may have steel doors without glass.
High
Very High All interior doors are steel with at most a small skylight of
reinforced glass.
Consideration
s
Very Low Where possible, eliminate wood doors that have a large
glass opening and all-glass doors. Replace with wood or
steel doors with minimal glass. In some cases, it may be
possible to retrofit glass with bullet-resistant glass.
Low
Medium Where possible, eliminate large glass openings. In some
cases, it may be possible to retrofit with bullet-resistance
Lyceum of the Philippines University Graduate School 51
glass
High
Very High The use of this type of door may aid in protection for certain
attacks but may create a vulnerability by limiting site lines
and observation. Consider the tradeoffs and threats to the
facility.
Question 3 Does the construction of exterior windows deter or delay an
attack?
Very Low Exterior windows are tempered glass and can be opened.
The windows are large enough that an adult could climb
through them when open.
Low
Medium Most exterior windows are small (i.e., a teenager cannot
climb through) and not operational. The school has some
exterior operational windows that are larger.
High
Very High The school has no exterior windows, or the exterior windows
are tall and narrow. They are too small to allow anyone to
pass through them. They cannot be opened and use
reinforced glass.
Consideration
s
Very Low Train faculty, staff, and students to avoid window or glass
areas during an attack. Replacing windows with smaller,
nonoperational windows is an expensive option and may not
be possible. If that is the case, close and lock windows at all
times. If the school requires windows to be open for
ventilation, be sure everyone knows how to close and lock a
door in an emergency. Other possibilities include installing
heavy window coverings that can be lowered or slide on
tracks and that can be positioned quickly or even remotely.
This may provide some concealment from an attacker.
Low
Medium Train faculty, staff, and students to avoid window or glass
areas during an attack. Where possible, replace large
operational windows. If this is not feasible, install heavy
window coverings that can be lowered or slide on tracks and
can be positioned quickly or even remotely. This may
provide some concealment from an attacker. Ensure that
everyone (including staff, faculty, and students) knows how
to close and lock the windows.
High
Very High Train faculty, staff, and students to avoid window or glass
areas during an attack.
Question 4 Are utilities (electric, gas, communications) protected or
Lyceum of the Philippines University Graduate School 52
Consideration
s
Very Low Identify and document hiding areas or areas that have a
poor line of sight and are hard to observe. Establish a
process of routine inspection. When possible, post faculty or
staff near these locations during student class changes.
Watch for unusual activity such as hiding of backpacks,
weapons, and contraband or a cluster of students obviously
concealing activities.
Low
Medium Wherever possible, add electronic surveillance to these
areas (e.g., cameras). Other options include posting faculty
and staff near these locations during student class changes.
Watch for unusual activity such as hiding of backpacks,
weapons, and contraband, or a cluster of students obviously
concealing activities.
High
Very High Continue a high level of surveillance, and watch for unusual
activity and items.
Consideration
s
Very Low To the extent possible, ensure the exterior of the school is
free of objects and areas that allow access to the roof or
other floors of the building. This may require removing trees,
relocating storage sheds or portable buildings, or other steps
to prevent access. In some cases, shrubs or hedges next to
the building or under window openings are acceptable if they
are a thorny type of plant that would discourage anyone
from hiding themselves or contraband. If items cannot be
moved or secured, establish routine observation and
inspection of the area.
Low
Medium To the extent possible, ensure the exterior of the school is
free of objects and areas that allow access to the roof or
other floors of the building. (Note: This type of barren
exterior leaves people fleeing the school building during an
active-shooter incident exposed and without cover, making
them more vulnerable to gunfire.) In some cases, shrubs or
hedges next to the building or under window openings are
acceptable and add to security if they are a thorny type of
plant that would discourage anyone from hiding themselves
or contraband.
High
Very High If present, regularly assess and maintain the shrubs to
ensure their height balances aesthetics with security.
Question 8 Are fire alarm pull stations protected from misuse?
Very Low Fire alarm pull stations are unprotected from misuse, and
there has been no discussion or action regarding ways to
protect this equipment. Activation of the fire alarm system
may be used as a way to move students out of their
classrooms and into open areas as part of an attack.
Low
Medium Fire alarm pull stations have protective covers, but they may
be located in isolated areas.
High
Very High Fire alarm pull stations have protective covers and are
located in areas that allow for unobstructed surveillance
Consideration
s
Very Low Consult with the fire marshal to ensure any changes to the
fire alarm system are permitted by code. If possible, provide
protective covers to deter tampering and reduce the risk of
Lyceum of the Philippines University Graduate School 56
Very Low The camera system typically uses a single fixed camera to
provide coverage for each entrance.
Low
Medium Some cameras may not be effective under some lighting
conditions. Some cameras may not be the best choice for a
given application.
High
Very High An effective mix of camera types is used and accounts for
changes in illumination.
Consideration
s
Very Low Conduct a camera system survey to identify areas where
cameras are ineffective. Based on the results of the survey,
perform system updates.
Low
Medium Conduct a camera system survey to identify areas where
cameras are ineffective. Based on the results of the survey,
perform system updates.
High
Very High Conduct a camera system survey to confirm the
effectiveness of each camera in use. Confirm that area
lighting is compatible with each camera.
Question 3 Is the system monitored?
Very Low No real-time monitoring of the camera system occurs.
Low Untrained staff may look at the CCV/VSS monitors on
occasion or when notified of an incident. They are usually
focused on their other primary duties
Medium Trained staff members monitor the CCV/VSS and do not
have additional duties that could distract them from
monitoring the system. However, they must follow too many
screens at once (typically more than eight). They do not
receive regular breaks, which impacts their ability to monitor
multiple camera feeds effectively.
High Trained, dedicated staff members monitor the CCV/VSS and
are not overwhelmed by too many screens (typically eight or
less). No single person monitors the camera system for an
extended period of time (more than 15 minutes).
Very High Trained, dedicated staff members effectively monitor the
CCV/VSS. Monitoring staff frequently rotate shifts (every 10-
15 minutes), and the number of cameras each staff member
monitors is limited to eight or fewer. The system is equipped
with capabilities that aid in the determination of suspicious
activity.
Consideration
Lyceum of the Philippines University Graduate School 58
s
Very Low Employ staff to monitor the camera system. If possible,
provide a camera monitor in the front office, visible to both
staff and visitors.
Low Provide training to monitoring staff, and reduce or, if
possible, eliminate their other duties.
Medium Explore options to maximize the effectiveness of monitoring
and observation, such as frequently rotating shifts for staff
and limiting the number of cameras each staff member
monitors.
High Explore the feasibility of procuring a software program that
aids in the determination of suspicious activity.
Very High Explore the options of providing local law enforcement with
the capability to access and monitor the camera system.
Law enforcement personnel may easily view Internet
protocol cameras remotely.
Question 4 Is information recorded and reviewed?
Very Low The school does not record information that the CCV/VSS
captures.
Low
Medium Personnel review recorded information only after an
incident. The storage capability is limited to a week or less,
so many events are not available after the fact.
High
Very High The school stores recorded information for at least a month.
Personnel review information for suspicious activity, not only
after an incident.
Consideration
s
Very Low Install video recording and storage systems. Develop a
policy for the review of recorded information (e.g.,
periodically or only after an incident). Recorded information
can support investigations.
Low
Medium Increase the camera system's storage capacity, preferably to
a month.
High
Very High Increase the camera system's storage capacity to a
minimum of 90 days.
Question 5 What is the overall condition of the camera system?
Very Low The CCV/VSS needs maintenance and updates. The
system lacks backup power.
Low
Medium The CCV/VSS is in good condition, but some cameras are
Lyceum of the Philippines University Graduate School 59
High Faculty and staff are strictly governed by policy requiring the
utilization of computer passwords. Majority of faculty and
staff are using password and unique login information to
access electronic files.
Very High Faculty and staff are strictly governed by policy requiring the
utilization of computer passwords. All faculty and staff are
using password and unique login information to access
electronic files.
Question 3 Does the students are required to use passwords and
unique login information to access electronic files?
Very Low The school has no strict policy on the use of computer
passwords and unique login information to access electronic
files for the faculty and staff
Low Selected students are required to use passwords and
unique login information to access electronic files.
Medium Students are strictly governed by policy requiring the
utilization of computer passwords. All students are using
passwords and unique login information to some electronic
files.
High Students are strictly governed by policy requiring the
utilization of computer passwords. Majority of students are
using password and unique login information to access
electronic files.
Very High Students are strictly governed by policy requiring the
utilization of computer passwords. Students are using
password and unique login information to access electronic
files.
Question 4 Does the School established a Security plans for computer
and information systems?
Very Low The school has no security plans for computer and
information system.
Low There is no security plans for computer and information
system. But there is a computer and information system
provided existed in a selected offices.
Medium The school has established a security plans for computer
and information that includes software security only..
High The school has established a comprehensive security plans
for computer and information that includes both hardware
and software security.
Very High The school has established a comprehensive security plans
for computer and information that includes both hardware
and software security. The plans has already implemented
and maintained.
Question 4 Does the School train faculty and staff in safe and secure
computer use
Lyceum of the Philippines University Graduate School 61
Very Low The school does not train faculty and staff in safe and
secure computer use.
Low The school provides some information or training to some,
but not all, faculty and staff at initial employment. The school
may provide refresher training at the beginning of the school
year but no other follow-up throughout the year.
Medium The school provides training to some, but not all, faculty and
staff at initial employment, as well as refresher training at the
beginning of each school year and recurring training
throughout the year.
High The school provides comprehensive training to all faculty
and staff at initial employment. Faculty and staff are trained
on appropriate emergency actions regardless of their
location in the school building. The training may include
refresher training at the beginning of the school year but no
other follow-up throughout the year.
Very High The school provides comprehensive training to all faculty
and staff at initial employment, as well as refresher training
at the beginning of each school year and recurring training
throughout the year. Faculty and staff are trained on
appropriate emergency actions regardless of their location in
the school building.
Question 1 School maintains a well-trained computer security personnel
Very Low The school has no computer security personnel
Low The school has appointed computer security personnel from
faculty/staff whose training is not fitted to his actual duty.
Medium The school has appointed computer security personnel from
faculty/staff trained in computer security but performs his job
in addition to his original function.
High The school has well-trained personnel but also performs
other functions in addition to cyber security management.
Very High The school maintains a well-trained computer security
personnel dedicated to cyber security management.
Question 1 School maintains a well-trained computer security personnel
Very Low The school has no computer security personnel
Low The school has appointed computer security personnel from
faculty/staff whose training is not fitted to his actual duty.
Medium The school has appointed computer security personnel from
faculty/staff trained in computer security but performs his job
in addition to his original function.
High The school has well-trained personnel but also performs
other functions in addition to cyber security management.
Very High The school maintains a well-trained computer security
personnel dedicated to cyber security management.
Lyceum of the Philippines University Graduate School 62