The Minister of Education, The Executive  Secretary NUC, The Vice Chancellor FUOYE, The Registrar FUOYE and the Senior Security Officer

    FUOYE during the First Matriculation Ceremony of the Institution


    The Senior Security Officer of FUOYE with other University Security Chiefs at International Institute of Professional Security (IIPS) Conference at Abuja


    Bomb presented in a food flask form. Be Security conscious, be vigilant!


    Bomb components on display

We are working!

VIP ProtectionIIPS ConferenceBomb disguised as food flaskBomb Components2

Have knowledge of Security


People regularly mention intelligence in the in the news or as they discuss amongst themselves. However, most of them are not conversant or even know its nature and role in National Security, industrial Security, Law enforcement or Security policy formulation, implementation.

Its indispensability touches areas like national security, defence, foreign policy, business activity, law enforcement etc. in Law enforcement, intelligence function helps to guide investigative activities; just as it is imperative in assets protection, executive protection and general industrial security operations. This is by analyzing crime trends and activities that threaten the protection or general security of the Institution.

The effectiveness of any Institution Security Services depends largely on the number of its sources of information, the more diverse the sources of information, the better the position of the Security Unit in gathering intelligence report, verifying and comparing the validity and reliability. Security operation can never take place without a sound intelligence. Any decision, policy formulation and implementation short of sound intelligence is doomed for failure.


Information according to Advanced Learners Dictionary means fact told, heard or discovered about somebody/something or knowledge acquired in respect of something or someone. Information therefore comprises facts, knowledge or news, as an item of knowledge may be factual or hearsay. It can come from any sources and may be collected at a random or systematically, over a long period of time by a number of people. In order to be effective for intelligence purpose, information must be collated accurately and systematically and be properly analysed, recorded, evaluated and interpreted. It is subsequently transferred or converted to intelligence after it has undergone the forging mental processes. It is finally disseminated as intelligence.


It may be defined as the substance made out of information. In other words, information may or may not carry intelligence hence, intelligence is regarded as the product resulting from the collection, evaluation, analysis, integration and interpretation of all available information concerning a target or pertinent issue which is of security significance. Target such as campus cult groups, examination fraud gang, production of fake result and illegal academic transcript on campus, sponsorship of campus violence and other social vices.


Attributes of Intelligence

It is important to highlight the attributes which useful information intelligence should possess.

  1. Accuracy: It must be useful, accurate, embracing all relevance facts and detail.
  2. Relevance: It must be relevant to the subject in issue of facts, relevant to the target under surveillance.
  3. Timely: It must come at the time it is needed to forestall or counter perceived threats to internal security of life and property
  4. Factual: It must be tested and its accuracy validated
  5. Reliability: It must provide material evidence of its reliability
  6. Source Utilization: To avoid underutilization of sources of information, such as informants, contacts, etc., they should be systematically exploit by adequate planning based on thorough knowledge of their capabilities and vulnerabilities. Where technical information is required, efforts must be made to recruit sources with technical knowledge and who has access to the information or data.
  7. Objectivity: Objectivity must never be compromised. Intelligence must resist preconception and temptation to distort information at any stage of information processing.
  8. Accessibility: Intelligence is a product of information through collection, collation, evaluation, integration, interpretation, and dissemination. Comparison is indispensable in the process; hence, both must be easily accessible. They should be stored in such a way that they are easily retrievable. Intelligence must be timely to meet policy formulation, operational plans, security operation or policy execution or implementation. Timeliness is central to the usefulness of intelligence.
  9. Security of Sources of Information: Every source of information must not be compromised. It should be protected from exposure. Unnecessary dissemination of information or intelligence may endanger sources or agency. Agency may also loose that channel of information.
  10. Review: Intelligence forecast must be reviewed constantly taking cognizance of new information. Effect review where necessary.


Temporary file

From Security Unit

From Security UnitSECURITY UNIT

There has been a significant development in the practice of security in the decade. This is in view of the increasing rate of theft, pilfering and criminal tendencies within our society today.

When security first started, emphasis was laid on the gate control and it was not uncommon to find big Institutions with few security men manning the front and the back gates. Today, the story is quite different. Any Institution does not play with security functions, the dimension of which has been amplified. Security men have a place in many Universities today and their roles are quite challenging.

However, it should be borne in mind that their role is more profitable to the University when they prevent bad things from happening rather than detecting them. Security men are faced with a lot of problems and temptations which they must resist as not to commit professional misconduct that can lead to their dismissal.

An average human being is security conscious, for effective running of either Public or Private Institution a good security network must be in place this will guarantee the lives and properties within such an institution.


Security is the degree of protection against danger, damage loss and Crime, while crime in a simple definition is an act that is illegal and can be punished by law.


Below are the key functions of a Security Unit

  1. 1.Regulation of influx of visitors into the premises
  2. 2.Documentation of movement of staff, vehicles, equipment etc.
  3. 3.Prevention of theft and pilfering through gate or across fence
  4. 4.Detection of theft and fraud attempts
  5. 5.Handling criminal acts
  6. 6.Arresting violence
  7. 7.Cross checking materials/goods issuance and movement
  8. 8.Access control and reception
  9. 9.Patrolling and reporting
  10. 10.Searching and gate control
  11. 11.Traffic control
  12. 12.Protection of life and properties



A lot of Officers time could be wasted by intrusion of unwanted visitors and this is bound to affect the productivity the Institution. Security men therefore have a role to play in regulating and controlling the influx of visitors into the premises.



This is often necessary as a control mechanism and to assist Top Management in taking decisions. Records of this type of movement should be kept.



This is one of the major roles of Security men. He is to make sure that University properties and equipment and the like are not stolen. In preventing theft and pilferage, security should carry out regular check at intervals to discover illegal routes leading in or out of the premises, most especially where the entire University premises is not fenced with walls. Such checks should also be kept on stores and laboratories where valuable items are kept.


It is a primary objective of Security Guards to demonstrate good alertness and evolve effective strategies needed to achieve this important objective. Fraud and theft detection calls for a sound frame of mind and a good sense of intuitive judgment. An all time state of physical and mental fitness is a great asset for the Security man. This will sharpen his sense organs and enable him perform efficiently well in his responsibilities.



Although, this may not be frequent, when it happens, it is the responsibility of the Security men to ensure that the culprit is well handed over to the law enforcement agents with the right report on the incident.



If someone is creating nuisance to the work environment, such persons or groups are quickly called to order to forestall further spread and escalation. The Security is to bring such situation under control and note in his report.



The movement of items within and outside the University constitute a major activity in every Institution. It is one of the major responsibilities of the Security men to ensure that proper documentation is used to back-up items movement in the Institution. Such items are physically counted to make sure it tallies with what is written or recorded on paper.

The Security men should also ensure that the proper authorization is made for every item being issued. Records are then kept on these items for reference purposes. He is to certify that this is done accurately.


Since the security post is the first point of contact by visitors to the University. The Security man has the role of according visitors the right reception, build reputable human/public relations and project a very good image of the Institution. He should ensure that visitors are not unduely delayed.

Rather, they should receive the right response for the hosts, where access cannot be granted for one reason or the other. A good security service serves a great image building role for the Institution as a whole. He is to ensure that visitors receive prompt and cordial treatment and they are well directed.



This is yet another paramount function of the Security men designed to scare bad elements and detect attempts. Though some marked locations can be used by Security men. Except where security video monitor is installed, regularity of patrol is an important means of detecting mishaps and threats to the Institution environment.

Security patrol should be backed up with reports stating observations and time when such observations were made. This serves as a sign post for future occurrence of events.



The Security men should search vehicles and workers and ensure that items found are fully documented and or authorized. This particular art is done with utmost care diplomacy to achieve desirable results while at the same time maintaining good relations with those being searched. Where some members of staff pose a threat to proper security check then it should be clearly made a management policy for visitors, staff and other people entering or leaving the Institution to subject themselves to regular and timely check on request by the Security men.


Just as the human traffic is properly regulated, greater care should be taken in allowing vehicles in and out of the Institution premises. Vehicle registration numbers should be taken with special recognition marks noted. Tallys and chips bearing numbers are equally issued to such vehicle drivers on entry and recollected on exit. This will ensure that the rightful/authorized owners of such vehicles are the ones taking them out.

Designated parking spaces should be made known to the various visitors or drivers to avoid haphazard packing which will constitute obstruction to other users. He is to use his initiative to direct traffic in the right manner.



A Security man must try to understand the system and operation in any section to which he is posted so that he can develop strategies of preventing bad events from happening. For instance, he needs to identify Institution’s properties as distinct from personal effects.

In conclusion therefore, it should be noted that the reason for employing Security men is to make sure that a lot of bad practices are prevented.

Latest News

Open Positions

Featured Articles

Copyright © 2020. Security Unit. Designed by ICT Directorate