Untitled



Feb 17

Format of TQM Paper

Title:Security System of FEU

Background:

Far Eastern University (FEU)  in the City of Manila, West Sampaloc, University Belt area is a nonsectarian, private university in the Philippines. Created by the merger of Far Eastern College and the Institute of Accounts, Business and Finance, FEU became a university in 1934 under the guidance of first president Nicanor Reyes, Sr. It soon became the leading proprietary, for-profit university in the Philippines FEU’s campus is noted for a number of historical buildings preserved from the first half of the 20th century.

History

Far Eastern University was founded in 1934 when the Far Eastern College and the Institute of Accounts, Business and Finance (IABF) merged. Far Eastern College, founded in 1919, had been a liberal arts college in Quiapo; the IABF had been established (originally under the name Institute of Accountancy) by Nicanor Reyes, Sr., head of the Department of Economics of the University of the Philippines, with a number of other prominent educators in 1928. IABF had been originally predominately used by night students, and the new university, which was supported by the tuition provided by its students rather than government grants, soon demonstrated that a private university was financially sustainable in the Philippines.

In its earliest days, FEU was housed in a converted tobacco factory already present on the four hectare (nearly 10 acre) plot which would eventually host the current campus.  Reyes Sr. was appointed the first president of the University, which spent its early years establishing several of its institutes, including those of Law and Technology. Reyes commissioned Pablo Antonio, who would later be titled National Artist of the Philippines, to construct a building for the school. In 1939, the Nicanor Reyes Hall, which would later house the library and Institute of Accounting, Business and Finance, opened. Two other buildings by Antonio, the Girls’ High School Building and Boys High School Building, followed in 1940 and 1941, by which year FEU had 10,000 registered students, with an international student population of 400.

During World War II, the campus was occupied by the Imperial Japanese Army, who left only its shell unharmed. Dr. Nicanor Reyes having been killed during the occupation, Dr. Hermenigildo B. Reyes was appointed the second president of the University when it reopened in 1945.

Thereafter, FEU continued to expand, with the opening of a Science Building and the establishment of the Institute of Medicine and the School of Nursing. In 1955, the FEU hospital was opened. Humanities were introduced in 1959, and in 1970 the Institute of Architecture and Fine Arts opened. Also in 1970, the for-profit status of the Institute of Medicine, School of Medical Technology, FEU Hospital and the Student Health Service Clinic was altered, when these were converted in the FEU Dr. Nicanor Reyes Medical Foundation, a non-stock, non-profit educational foundation.

1989 introduced substantial revitalization to FEU that took place over a number of years, with renovation and modernization of facilities and grounds and upgrading of the University’s educational standard. This resulted in the accreditation of the Institute of Arts and Sciences, the Institute of Education, and the Institute of Accounts, Business and Finance, and, in the mid-1990s, the deregulation of the University by the Commission on Higher Education. The auditorium was upgraded to accommodate modern stage productions and the new twice-monthly presentations by local and international artists established by the President’s Committee on Culture. The University also prioritized publication, launching a number of scholarly journals, and began networking with other institutions nationally and abroad.

http://en.wikipedia.org/wiki/Far_Eastern_University

VISION – MISSION STATEMENT:

Far Eastern University aims to be a private university choice of Asia.Committed to the highest moral and cultural standards, it strives to produce principled and competent graduates. It nurtures the service oriented community which seeks to contribute to the advancement of global society.

Security is the degree of protection against danger, loss, and criminals.

Security has to be compared and contrasted with other related concepts: Safety, continuity, reliability. The key difference between security and reliability is that security must take into account the actions of people attempting to cause destruction.

Security as a form of protection are structures and processes that provide or improve security as a condition. The Institute for Security and Open Methodologies (ISECOM) in the OSSTMM 3 defines security as “a form of protection where a separation is created between the assets and the threat. This includes but is not limited to the elimination of either the asset or the threat. In order to be secure, either the asset is physically removed from the threat or the threat is physically removed from the asset.

Perceived security compared to real security

Perception of security may be poorly mapped to measureable objective security

For example, the fear of earthquakes has been reported to be more common than the fear of slipping on the bathroom floor although the latter kills many more people than the former.  

The presence of security protections may be taken for security itself. For example, two computer security programs could be interfering with each other and even cancelling each other’s effect, while the owner believes s/he is getting double the protection.

Security theater is a critical term for deployment of measures primarily aimed at raising subjective security in a population without a genuine or commensurate concern for the effects of that measure on—and possibly decreasing—objective security. For example, some consider the screening of airline passengers based on static databases to have been Security Theater and Computer Assisted Passenger Prescreening System to have created a decrease in objective security.

Perception of security can also increase objective security when it affects or deters malicious behavior, as with visual signs of security protections, such as video surveillance, alarm systems in a home, or an anti-theft system in a car such as a LoJack, signs.

Since some intruders will decide not to attempt to break into such areas or vehicles, there can actually be less damage to windows in addition to protection of valuable objects inside. Without such advertisement, a car-thief might, for example, approach a car, break the window, and then flee in response to an alarm being triggered. Either way, perhaps the car itself and the objects inside aren’t stolen, but with perceived security even the windows of the car have a lower chance of being damaged, increasing the financial security of its owner(s).

However, the non-profit, security research group, ISECOM, has determined that such signs may actually increase the violence, daring, and desperation of an intruder   This claim shows that perceived security works mostly on the provider and is not security at all   .

It is important, however, for signs advertising security not to give clues as to how to subvert that security, for example in the case where a home burglar might be more likely to break into a certain home if he or she is able to learn beforehand which company makes its security system.

  

 Security concepts

Certain concepts recur throughout different fields of security:

  • Assurance - assurance is the level of guarantee that a security system will behave as expected
  • Countermeasure - a countermeasure is a way to stop a threat from triggering a risk event
  • Defense in depth - never rely on one single security measure alone
  • Exploit - a vulnerability that has been triggered by a threat - a risk of 1.0 (100%)
  • Risk - a risk is a possible event which could cause a loss
  • Threat - a threat is a method of triggering a risk event that is dangerous
  • Vulnerability - a weakness in a target that can potentially be exploited by a threat

http://en.wikipedia.org/wiki/Security

School safety services:

Ken Trump and his team have 25 years of national and international experience:

  • Creating "peace of mind" for school superintendents, school boards, principals, and their community partners on school safety and crisis preparedness issues

  • Helping school administrators get control of school safety and emergency preparedness planning in their schools and school-community

  • Making school boards and administrators heroes with their parents, community, and media on school safety and preparedness issues

We accomplish this through our School Safety Services:

School emergency planning evaluations and consultation services to help school leaders evaluate school emergency and crisis plans, district and building school crisis teams, school safety drills and exercises, school training on emergency and crisis plans, school crisis communications, and related school emergency planning components.

Facilitated school emergency/crisis tabletop exercises for building and district crisis teams, and their community agency partners, in a half or full-day professional development type setting to help schools learn whether their written school emergency / crisis plans might work in a real emergency.

School security assessments provide proactive, practical, and cost-effective recommendations for school safety and crisis preparedness planning, heightened school security for terrorist threats, school gang prevention and intervention, school security and school police staffing, school security and crisis procedures, physical security, special event management, school crime prevention and school crisis training, school-community collaboration, transportation security, linking security with prevention and intervention programs, and more.

Proactive school security and emergency preparedness training helps schools with improving school staff emergency management and emergency response capacity, lockdown and evacuation procedures, crisis media and communications issues, best practices in security and school crime prevention, understanding national trends in school deaths and violence, managing and assessing student threats, school safety assessment processes, heightened security during national terror alerts, and related school safety trends and hot topics.

Training on managing media and school community communications on school safety and crisis issues helps school leaders learn how to effectively communicate school safety and crisis issues with parents, media, and their school community.

School gang training helps school officials and community partners develop sound gang prevention, intervention, and enforcement strategies.

School bus security and emergency training helps school transportation managers and school bus drivers prevent and manage violence and emergencies on school buses.

School terrorism preparedness training helps school officials identify practical, cost-effective, and common sense best practices for “heightened security” and school emergency preparedness during times of national terrorism and security alerts.

Post-crisis school safety consulting support services help school board members, superintendents, and principals address parent and school-community concerns about school security and emergency preparedness issues after a crisis.

http://www.schoolsecurity.org/

<!— /* Font Definitions */ @font-face {font-family:”Trebuchet MS”; panose-1:2 11 6 3 2 2 2 2 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:647 0 0 0 159 0;} @font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:”“; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:”Times New Roman”;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} —>

About our group:

Group 2

Our group are composed of eight persons namely:

Leader:

Noelhynne Guevarra

A 19 years old 2nd year Internal Auditing Student who loves to surf the net, watch television and read books.

Motto:

“Everything happens for a reason and that reason is unknown.”

 Asst. Leader:

Kathrina Leonzon

A 3rd year Management student. She loves to sing and watch koreanovelas. She also loves purple and she likes the saying “One word is enough.”

 

Secretary:

Mark Jeron Uson

 

Members:

Ramil Balistoy

A 3rd year Marketing Management student who loves Airsoft Wars, having a movie marathon and surfing the net.

 

Karlo George Palmero

A 19 years old Marketing Management student born in Jubail, Saudi Arabia. He’s fond of playing musical instruments and playing basketball. He believes in the saying “ Stand tall when they think you cannot.”

 

Lee Sace

Eat, play, pray and study. These is what this 3rd year Management student is fond of.

 And “Everything and anything about me is a secret”.

 

Lady Lyn Mayuga

According to her “I am very flexible and can adjust to any situations. Inconsiderate people annoys me .

 

We worked as a team and we help each other to create this paper. We make sure that each of us are doing what is assigned to us. Everytime that there is a problem in our paper we talked each other and try to solve this so that we can fix it easily.

Problem Statement:

The following are the problems encountered regarding the security system:

-The students without ID entering other gates  of the university has to go to Gate 2 to be able to enter the premises.

-The students not wearing their uniform entering other gates  of the university has to go to Gate 2 to be able to enter the premises.

-Visitors entering other gates has to go to the Technology Building to get their gate pass.

Root Causes of the problem:

Manpower:

-Misinformed students

-Lack of training for the security personnels

-Centralized authority

Machine:

-Lack of equipment necessary for a faster response on the students’, parents’ and other people’s needs

Procedures:

At present, the University implements the following with regards to its security:

Entering the University:

Bags are being inspected as students enter the university.

ID:

Upon entering the school,the students are required to swipe their ID.

In case the student has no ID, he/she can enter his/her student number in the computer.

University Uniform Policy:

The University Uniform Policy shall be enforced whenever a student enters the campus and while inside the campus, whether she/he has classes or not and regardless of the day of the week.

PE uniforms and institute-approved uniforms shall also be considered proper uniform.

The ID’S OF students with classes not in their uniform are confiscated and they’re given notice of confiscation and this is treated as a minor offense.

Exemption:

-Students taking supplemental subjects,CTE

-Cross-enrolled

-Pregnant

-Disabled

-Athlete

Special Temporary Uniform Exemption:

-Working Students Coordinator

-Students on On-the-Job-Training by the Practicum Coordinator

-Students that are required to wear corporate attires because of reports,defense,etc., must obtain a letter from their professor or institute and must be presented to OSACS and have it approved.Then the OSACS will forward this to the security staff so that they would know.

Inside the University:

There are security guards found inside the campus. There are roaming guards in the campus.

There are also guards assigned in different buildings.

There are also guards in the library, electronic library, administration building and in the office of the Dean of different institutes.

Visitors:

Visitors are required to go to the Technological Building and surrender an ID in exchange of a visitor’s pass.

Laptops:

When laptops are being brought to the school, the owner must obtain a gate pass for it. In the gate pass, you would see the serial number of the laptop, the brand and the name of the owner. This is done to ensure the safety of the laptop when it is lost.

Leaving the University:

In leaving the university, bags are again inspected to make sure that the students did not stole anything specially a laptop.

<!— /* Font Definitions */ @font-face {font-family:”Trebuchet MS”; panose-1:2 11 6 3 2 2 2 2 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:647 0 0 0 159 0;} @font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:”“; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:”Times New Roman”;} p {mso-style-noshow:yes; mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; font-size:12.0pt; font-family:”Times New Roman”; mso-fareast-font-family:”Times New Roman”;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} —>

Offenses inside the University:

Wearing slippers inside the university.

Not wearing the school id inside the university.

Not wearing the proper uniform and shoes.

Recommendation and Benefits:

1.

Present:

Gate 4 is the only gate in which students without ID can enter the university by entering their student number in the computer.

Proposed:

All gates of the university must have the same system with that of Gate 4 that students without ID can enter the university by entering their student number in the computer.

2.

Present:

Students with or without classes, not wearing their uniform, can enter the school but their ID will be confiscated and they will be given a confiscation slip and this is treated as an offense.

Proposed:

Students without classes can enter the campus as long as they have an ID.

<!— /* Font Definitions */ @font-face {font-family:”Trebuchet MS”; panose-1:2 11 6 3 2 2 2 2 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:647 0 0 0 159 0;} @font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:”“; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:”Times New Roman”;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} —>

Tools:

Check Sheets- Check sheets are data collection forms that facilitate the interpretation of data. Quality-related data are of two general types- attribute and variable. Attribute data are obtain by counting or from some type of visual inspection: the number of invoices that contain errors, the number of parts that conform to specifications, and the number of surface defects on an automobile panel, for example. Variable data are collected by numerical measurement on a continuos scale. Dimensional characteristics such as distance, weight, volume, and time are common examples.

 

Example of a Check Sheet for Attribute Data: Airline Complaints

Type

week 1

week 2

week 3

week 4

lost baggage

I

 

II

I

Baggage delay

IIIIII

IIII

IIIIIIII

IIIII

Missed connection

II

I

III

I

Poor cabin service

III

IIIII

III

III

Ticketing error

I

 

 

I

 

Tree Diagram- Tree diagram maps out tha paths and task that need to be accomplished to complete a specific project or to reach a specified goals. A planner uses this technique to seek answers to such questions as “What sequence of tasks needs to be completed to address the issue?” or “What are all of the factors that contribute to the existence of the key problem?” This technique brings the issues and problems disclosed by the affinity diagram and the interralationship digraph down to the operational planning stage. A clear statement of the problem or process must be specified. From this general statement, a team can be estableshed to recommend steps required to solve the problem or implement the plan.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Establishing Quality Security System

 

Responsible Departments

 

Date Collection

 

Intangible Cost

 

OSACS

 

Estimation of Costs

Coordination with the OSACS and Security Department

 

Example of a Tree Diagram

 

 

 

 

 

 

 

 

 

 

Implementation Plan 

Activity

Unit/Person Responsible

 

Target Date

Estimated Budget

 

 

 

 

 

Allow students to enter the school

Security and Osacs

 

Monday-Sunday

none

premises even w/out school uniform

 

 

 

 

and or id.

 

 

 

 

 

 

 

 

 

Don’t allow activists to protest in front

Security

 

Everytime that there

none

of school.

 

 

is a rally

 

 

 

 

 

 

Make sure that the security guards check

Security

 

Everyday

none

the bags of the students.

 

 

 

 

 

 

 

 

 

Guards must check the rooms assigned to

Security

 

Everyday

none

them.

 

 

 

 

 

 

 

 

 

Let the student allow to stay in vacant room.

Security and Osacs

 

Everyday

none

 

 

 

 

 

All gates inside the school university must have

Security

 

Everyday

20,000

the same system.

 

 

 

 

 

 

 

 

<!— /* Font Definitions */ @font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:”“; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:Calibri; mso-bidi-font-family:”Times New Roman”;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} —>

 

Feb 07

bears!!

Feb 07

Life is simple, its just not easy. ~Author Unknown

Feb 07

Love has no desire but to fulfill itself. To melt and be like a running brook that sings its melody to the night. To wake at dawn with a winged heart and give thanks for another day of loving. ~Kahlil Gibran

Feb 06

Security in the university

These are the procedures that I noticed about the security in our campus:

- As you enter the university, the guards have to check your bag.

-Then, you would have to swipe your ID to be able to enter the university.

-When you are not in your uniform, you have to write in a log book and this will be reported in the OSACS department.

-There are also some guards assigned in different parts of the campus such as the library, electronic library, etc.

-There are also some guards that roam around the campus.

-When you leave the university, they also check your bag.

Feb 06

Security

Security is the degree of protection against danger, loss, and criminals.

Security has to be compared and contrasted with other related concepts: Safety, continuity, reliability. The key difference between security and reliability is that security must take into account the actions of people attempting to cause destruction.

Security as a form of protection are structures and processes that provide or improve security as a condition. The Institute for Security and Open Methodologies (ISECOM) in the OSSTMM 3 defines security as “a form of protection where a separation is created between the assets and the threat. This includes but is not limited to the elimination of either the asset or the threat. In order to be secure, either the asset is physically removed from the threat or the threat is physically removed from the asset.

School safety services include:

School emergency planning evaluations and consultation service to help school leaders evaluate school emergency and crisis plans, district and building school crisis teams, school safety drills and exercises, school training on emergency and crisis plans, school crisis communications, and related school emergency planning components. 

Facilitated school emergency/crisis tabletop exercises for building and district crisis teams, and their community agency partners, in a half or full-day professional development type setting to help schools learn whether their written school emergency / crisis plans might work in a real emergency.

School security assessments provide proactive, practical, and cost-effective recommendations for school safety and crisis preparedness planning, heightened school security for terrorist threats, school gang prevention and intervention, school security and school police staffing, school security and crisis procedures, physical security, special event management, school crime prevention and school crisis training, school-community collaboration, transportation security, linking security with prevention and intervention programs, and more.

Proactive school security and emergency preparedness training helps schools with improving school staff emergency management and emergency response capacity, lockdown and evacuation procedures, crisis media and communications issues, best practices in security and school crime prevention, understanding national trends in school deaths and violence, managing and assessing student threats, school safety assessment processes, heightened security during national terror alerts, and related school safety trends and hot topics.

Training on managing media and school community communications on school safety and crisis issues helps school leaders learn how to effectively communicate school safety and crisis issues with parents, media, and their school community.

School gang training helps school officials and community partners develop sound gang prevention, intervention, and enforcement strategies.

School bus security and emergency training helps school transportation managers and school bus drivers prevent and manage violence and emergencies on school buses.

School terrorism preparedness training helps school officials identify practical, cost-effective, and common sense best practices for “heightened security” and school emergency preparedness during times of national terrorism and security alerts.

Post-crisis school safety consulting support services help school board members, superintendents, and principals address parent and school-community concerns about school security and emergency preparedness issues after a crisis.

Source:http://en.wikipedia.org/wiki/Security, http://en.wikipedia.org/wiki/School#School_security

Feb 03

cute little puppies..love it!

Feb 03

Most people would rather die than think; in fact, they do so.
— Bertrand Russell

Feb 03

Research plans

*What are the things that we will ask:*

-Is the security department handled by OSACS?

-What are the new policies of the security department?

-Who is the head of the security department?

-What are the students’ impression regarding the security guards on how they implement the security system?

-Under what agency do our security department belongs?

*Who are the persons that we will ask?*

-security guards

-OSACS

-students

*What are the schedules?*

-3rd week of February

-4th week of February

-1st week of March

Feb 03

Policies of Group 2

1. Each member should cooperate in every activity.

2. Every member is free to express what they want for the project.

3. Whenever there is a meeting everyone should be on time.

4. Make sure to finish the project slowly but surely.

5. Everyone should finish what is assigned to them.

6. Finish the report on time.

Older Entries