Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 18

INDUSTRIAL SECURITY MANAGEMENT

Security is a state or condition of being secured; there is freedom from fear, harm, danger, loss,
destruction or damages 
3 major areas: 
1. Physical Security - this concern with the physical measures adopted to prevent unauthorized
access to equipment, facilities, material and document and to safeguard them against
espionage, sabotage, damage, loss and theft.
2. Personnel Security- this is as important as physical security. Personnel security starts even
before the hiring of an employee and remains to be maintained for as long as the person is
employed. Its purpose is to insure that a firm hires those best suited to assist the firm in
achieving its goals and objectives.
3. Document and Information Security- this involves the protection of documents and classified
papers from loss, access by unauthorized persons, damage, theft and compromise through
disclosure.

Principles of Physical Security 


1. The type of access necessary will depend upon a number of variable factors and therefore
may be achieved in a number of ways.
2. There is no impenetrable barrier
3. Defense-in depth is barriers after barriers
4. Delay is provided against surreptitious and non-surreptitious entry.
5. Each installation is different.
6. Command Responsibility – Cannot be delegated but the security tasks can be assigned.
7. Compartmentation – Need to know basis
8. Balance between security and efficiency – Security prevails over efficiency
9. General principles of security remain constant – Specific measures to suit operations
10. Security is the concern of all personnel – Regardless of rank, position, designation

Application of protective security:


1. Industrial Security – a type of security applied to business groups engaged in industries
like manufacturing, assembling, research and development, processing, warehousing and
even agriculture. It may also mean the business of providing security.
2. Hotel Security - a type of security applied to hotels where its properties are protected from
pilferage, loss, damage and the function in the hotel restaurants are not disturbed and troubled
by outsiders or the guest themselves.
3. Bank security - this type of security is concern with bank operations. Its main objective is the
protection of bank cash and assets, its personnel and clientele.
4. VIP Security - a type of security applied for the protection of top-ranking officials of the
government or private entity, visiting persons of illustrious standing and foreign dignitaries.
5. School Security - a type of security that is concern with the protection of students, faculty
members, and school properties.
6. Supermarket or Mall Security - a type of security which is concern with the protection of the
stores, warehouses, storage, its immediate premises and properties as well as the supermarket
personnel and customers to detect “shoplifter”, robbery, and bomb detection and
customer relation.

Brief History of Security in the Philippines


 On May 30 1958- Philippine Association of Detectives and Protective Agency Operations
(PADPAO) was formally organized;
 RA 5487 -June 13, 1969 , Private Security Agency Law- which set the standards and
minimum requirements for the operations of security agencies.
 P.D. 11 - widening the coverage of RA 5487 to include security guards employed in logging
concessions, agricultural, mining and pasture lands;
 P.D. 100 - on January 17, 1973, broadening the coverage of the security industry to include
employees of the national or local government or any agency who are employed to watch
or secure government building and properties.
 SIASO Security and Investigation Supervisory office , to supervise and control the
organization and operation of private security and detective agencies nationwide –
 renamed Philippine Constabulary Supervisory Office for Security and Investigation
Agencies or PCSUSIA.
 - RA 6975, this unit was absorbed by the Philippine National Police;
 - Later it was made into a division of the PNP Civil Security Group and
was renamed Security Agencies and Guard Supervision Division (SAGSD);
1
 - It was again renamed to PNP Supervisory Office for Security Investigation Agency
(SOSIA).

TYPES OF SECURITY MEASURES FOR AN EFFECTIVE DEFENSE AGAINST CRIMES:


1. ACTIVE MEASURES – these involve the installation of physical barriers, security lighting, use of
vaults, locks and others.
2. PASSIVE MEASURES – those that will deter man from committing such act of fear of being caught,
charge in court or get dismissed, such as: security education, programs, investigations, seminars,
personnel security check.

FACTORS IN SECURITY CONDITION


FACTORS THAT BRING INSECURE CONDITION:
1. Threat – An indication of impending danger or harm;
- positive inimical acts
2. Hazard – A condition or chance of being injured or harmed;
-passive inimical acts
3. Vulnerability – measure of how open an establishment to intrusion, attack or injury
4. Risk – is the potential that a chosen action or activity will lead to a loss/
-probability of an event to happen that will lead to loss.

SECURITY HAZARD – An act or condition which results in a situation conducive to a breach of


the protection system and the subsequent loss or compromise, or damage to personnel, property or
facilities.

KINDS OF HAZARDS

 1. Man –Made Hazards – an acts or conditions affecting the safe of operation of the facility caused by
human action, accidental or intentional. It includes sabotage, espionage, pilferage and theft.
2. Natural Hazard – cause by natural phenomena which cause damage, disturbance and problems of
normal functioning activities, including security. It includes flood, lighting, storms and volcanic eruptions.
THE EXTENT OF DEGREE OF RISK TO SECURITY WILL BE DEFENDANT ON THE FOLLOWING:
1. RELATIVE CRITICALITY OF OPERATIONS – is the importance of the firm which reference to the
national economy and security.
2. RELATIVE VULNERABILITY – The susceptibility of the plant or establishment to damage, loss,
or disruption of operation due to various hazard.

BARRIER – can be defined as any structure or physical device capable of restricting, deterring,
delaying, illegal access to an installation.
Types of Barriers
1. Natural barriers - it includes bodies of waters, mountains, marshes, ravines, deserts or
other terrain that are difficult to traverse.
2. Structural barriers - these are features constructed by man regardless of their original intent
that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe,
cabinets or containers etc.
3. Human barriers - persons being used in providing a guarding system or by the nature of
their employment and location, fulfill security functions.
4. Animal barriers - animals are used in partially providing a guarding system. Dogs are usually
trained and utilized to serve as guard dogs.
5. Energy barriers - These are protective lighting, alarm system and any electronic devices
used as barriers.

Three Line of Physical Defense 


1. First line of Defense- perimeter fences/ barriers
2. Second line of defense- doors, floors, windows, walls, roofs and grills and other entries to the
buildings
3. Third line of defense- storage system like steel cabinets, safes, vaults and interior files.

TYPES OF PERIMETER BARRIER


1. SOLID FENCE – Constructed in such a way that visual access through the fence is denied.
-advantage is that it denies the opportunity for the intruder to become familiar with the
personnel, activities and the scheduled movements of the security personnel.
-disadvantage is prevents the guards from observing the area around the installation and it
creates shadow that may be used by the intruder for cover and concealment. 

2
WALL – Masonry wall should have the same as the chain linked and surrounded by the barbed wire as
top guard.
 
2. FULL VIEW FENCE – It is constructed in such a way that visuals access is permitted through the
fence. Its advantage is, that it allows the security personnel to keep the surrounding of the installation
under observation. On the other hand, it allows the intruder to become familiar with the movements of
the security personnel.

TYPES OF FULL VIEW FENCE


1. CHAIN LINK FENCE ( 7-9 -2-2)
 - Should be constructed minimum
 height of 7 feet excluding top guard;
 - 9 gauges or heavier;
 - Mesh openings of not larger 2 inches per side; Twisted;
 - Reach within 2 inches of hard ground or paving;
 - On soft ground, it must reach below surface deep enough to compensate for shifting soil
or sand.

2. BARBED WIRE FENCE – is a type of fencing wire constructed with sharp edges or points arranged
at intervals along the strand(s). It is used to construct inexpensive fences.  
 SPECIFICATIONS OF BARBED WIRE FENCE ( 7-6-6-12)
 Barbed wire fencing should not be less than 7 feet high, excluding the top guard;
 Barbed wire fencing must be firmly affixed to post not more than 6 feet apart
 The distance between strands will not exceed 6 inches and at least one wire will be interlock
and midway between posts.
 Standard barbed wire is twisted double strand, 12 gauge wires, with 4 point barb spaced on
equal distant part;

3. Concertina wire fence OR Danert Wire


 Standard concertina barbed wire is commercially manufactured wire coil of high strength
steel barbed wire clipped together at intervals to form a cylinder.
 Opened concertina wire is 50 feet long and 3 feet in diameter.

Perimeter Barrier Opening 


 Gates and Doors - when not in use and controlled by guards, gates and doors in the perimeter
should be locked and frequently inspected by guards.
 Side-walk-elevators - these provide access to areas within the perimeter barrier and should
be locked and guarded.
 Utilities Opening - sewers, air intakes, exhaust tunnels and other utility openings should
be protected by bars, grills, water filled traps or other structural means providing equivalent
protection to that portion of the perimeter barriers.
 Clear Zones - an obstructed area or a “clear zone” should be maintained on both sides of the
perimeter barrier.
a. clear zone of 20 feet or more between the barriers and exterior structures, parking areas,
fences and entry.
b. Clear zone of 50 ft or more between the PB and within protected areas

Additional Protective Measures


 Top Guard - additional overhang of barbed wire placed on vertical perimeter fences upward
and outward with a 45 degree.
 Guard Control stations - this is normally provided at main perimeter entrances to secure
areas located out-of-doors, and manned by guards on full-time basis.
 Tower Guard - this is a house-like structure above the perimeter barriers.
 Barrier Maintenance - fencing barriers and protective walls should always be regularly
inspected by security. Any sign or attempts to break in should be reported for investigation.
 Protection in Depth - in large open areas or ground where fencing or walling is impractical and
expensive, warning signs should be conspicuously placed. The depth itself is protection
reduction of access roads, and sufficient notices to warn intruders should be done. Use of
animals, as guards and intrusion device, can also be good as barriers.
 Signs and notices - “Control signs” should be erected where necessary in the management
of unauthorized ingress to preclude accidental entry. Signs should be plainly visible and
legible from any approach and in an understood language or dialect.

What is protective lightning?


3
 Protective lighting is the single most cost-effective deterrent to crime because it creates a
psychological deterrent to the intruders.
 provides sufficient illumination to areas during hours of darkness. 
 PURPOSES OF SECURITY LIGHTING
It improves visibility so that intruders can be seen, identified and apprehend;
It gives psychological fear, which serves as a deterrent to thieves, pilferers, trespassers, and
sabotage;

TYPES OF SECURITY LIGHTING

1. Stationary Luminary – most common type consisting of fixed series of luminaries. It is commonly
used on entry gates of employees and vehicles.
a. Glare Protection Type – The intensity is focused to the intruder while the observer or the guard
remain in comparative darkness. Lighting focused on background
b.Controlled lighting – The lighting is focused on certain objects than the background.

2. Standby Lighting – similar to continuous lighting but can be turned on manually or by special
device or other automatic means, when there is a suspicion of entry.
-it is designed for reserve or standby use or to supplement continuous systems
3. Emergency Lighting – stand by lighting which can be utilized in the event of electrical failure or
system is inoperative.

TYPES OF LIGHT LAMPS


1. Incandescent Lamps – These are common light bulbs that are found in every home. They have
the advantage of providing instant illumination when the switch is thrown and most commonly used
protective lighting system

2. Gaseous –Discharge Lamp- The use of these in protective lighting is limited since it require a
period of two to five minutes to light when they are cold and even longer period to light, when hot,
after power interruption.
 - It is very economical to use but for industrial security, it is not acceptable due to long time of
lighting.

Mercury Vapor Lamps – It gives a Blue green color light due to the presence of mercury vapor.

Sodium Vapor Lamp – lamps emits yellow light. It is an efficient bulb and due to its color, this light
lamps are used in areas where insect predominate. 
3. Quarts Lamp – It is a lamp that emits very bright white light and instant on almost as rapidly as
the incandescent lamp.
4. Metal halide - it has similar physical appearance to mercury vapor but provides a light source of
higher luminous efficiency and better color rendition
5. Fluorescent - this provides good color rendition, high lamp efficiency as well as long life.
However, it cannot project light over long distance and thus are not desirable as flood type lights.
6. High-pressure sodium vapor - this has gained acceptance for exterior lighting of parking areas,
roadways, buildings and commercial interior installations.

Types of Lighting Equipment


 
1. Floodlights - These can be used to accommodate most outdoor security lighting needs,
including the illumination of boundaries, fences and buildings and for the emphasis of vital
areas or particular buildings.
2. Street lights - This lighting equipment received the most widespread notoriety for its value
in reducing crime. Produced diffused light rather than direction beam. They are widely used
in parking areas.
3. Search lights - These are highly focused incandescent lamp and are designed to pinpoint
potential trouble spots.
4. Fresnel lights - These are wide beam units, primary used to extend the illumination in
long, horizontal strips to protect the approaches to the perimeter barrier.

What are Protective Alarms?


PROTECTIVE ALARMS – is an aural or visual signal given by the annunciator to the security
when intruder actuate certain devices in a protected area.
Basically, alarm system is designed to alert security personnel of a attempted or consummated
intrusion into an area, building or compound
4
Three Basic Parts of Alarm System
1. Sensor or trigger device - it emits the aural or visual signals of the person intruding or both.
Responds to changes
2. Transmission line - a circuit which transmit the message to the signaling apparatus.
3. Enunciator/annunciator - it is the signaling system that activates the alarm.

 Kinds of Alarms
1. Audio Detection Device - it will detect any sound caused by attempted force entry. A
supersonic microphone speaker sensor is installed in walls, ceilings and floors of the
protected area.
2. Vibration Detection Device - it will detect any vibration caused by attempted force entry. A
vibration sensitive sensor is attached to walls, ceilings or floors of the protected area.
3. Metallic foil or wire - it will detect any action that moves the foil or wire. An electrically
charge strips of tinfoil or wire is used in the doors, windows or glass surfaces of the protected
area.
4. Laser Beam Alarm - a laser emitter floods a wall or fencing with a beam so that when this
beam is disturbed by a physical object, an alarm is activated.
5. Photoelectric or Electric Eye Device - an invisible/visible beam is emitted and when this is
disturbed or when an intruder breaks contact with the beam, it will activate the alarm.
 
TYPES OF BANK ALARM

1. Foot rail Activator – They are place on the floor in such a position that tellers may activate the
alarm by placing the front of their foot to foot rail to activate the alarm.
2. Knee or Thigh Buttons – It is installed inside the teller station so that they can be activated by knee
or thigh pressure.
3. Foot Botton – Like the foot rail, it permits alarm activation in relatively safety, while both hands
remain clear in view of the robbers.
4. Double Squeeze Button – It requires pressure on both side of the device , thus the probability of
accidental alarm is reduced.
5. Bill Traps- or Currency Activation Device are usually place on the tellers cash drawer

Types of Protective Alarm System


1. Central Station System - a type of alarm where the control station is located outside the
plant or installation. When the alarm is sounded or actuated by subscriber, the central
station notifies the police and other public safety agencies.
2. Proprietary system - centralized monitor of the proprietary alarm system is located in the
industrial firm itself with a duty operator. In case of alarm, the duty operator calls whatever is
the primary need; firefighters, police, an ambulance or a bomb disposal unit.
3. Local Alarm – This system consist of ringing up a visual or audible alarm near the object to
be protected. When an intruder tries to pry a window, the alarm thereat goes off.
4. Auxiliary alarm - company-owned alarm systems with a unit in the nearest police station so
that in case of need, direct call is possible. Installation circuits are led into the fire or pnp
department.
5. Dial Alarm System – This system is set to dial a predetermined number. When the alarm is
activated, the number selected might be the police station or others. When the phone is
answered, a recording voice will state that an intrusion is in progress
6. Local Alarm by chance System – a local alarm in which a siren or bell is sounded with no
predictable response

FIRE ALARM DEVICES


1. Smoke Detector – a device placed at the ceilings of the floor that detects smoke, typically as an
indicator of fire.
2. Fire Bell -a hollow device made of metal that makes a ringing sound.
 AUTOMATIC SPRINKLER – a type of built in sprinklers which works by the increase of room
temperature and which automatically operates the system to put out the fire. Attached and
distributed in the ceiling of the rooms. These sprinklers will go into action once a fire starts, and
those that will open are those that are directly above the fire and water is delivered where it is
needed.

STAND PIPES

5
 5.G.I. steel or plastic pipes located inside the building from the lowest to the top floor with
water under pressure for use in case of fire. Located near the standpipe is a fire hose usually
enclosed in a glass box. 
 6.FIRE HYDRANT – It is a mechanical device strategically located in an installation or in a
street where a fire hose will be connected so that the water will be available to extinguishe a
fire.
 7.FIRE EXTINGUISHER – is a fire fighting equipment which can is a fire fighting
equipment which can be portable or in cart that is used to put out fire depending on the
contents to extinguish certain types of fire.

CLASSES OF FIRE
1. CLASS A –- involving ordinary combustible materials such as wood, cloth, and paper, requires an
extinguishing agent which cools. 
2. CLASS B – fires involving flammable and combustible liquids, such as solvents, greases,
gasoline, and lubricating oil, require an extinguisher which removes oxygen or cuts the chain reaction. 
3. CLASS C – fires involve energized electrical equipment (live electrical wires, electrical
appliances). A non-conducting extinguishing agent such as carbon dioxide or multi-purpose dry
chemical must be used.
4. CLASS D FIRES – the result of the combustion of certain materials in firely divided forms. These
metals can be magnesium, potassium, powdered aluminum and zinc.

What is a Lock?
A lock is defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry
into a building, room, container or hiding place.
 PADLOCK – a portable and detachable lock having a pivoted or sliding hasp which possess through a
staple ring, or the like and is made fast or secured.

 General Groups of Locks


1. Warded Lock - is a type of lock that uses a set of obstructions, or wards, to prevent the lock from
opening unless the correct key is inserted. Used only to have privacy but not to provide degree of
security
2. Pin Tumbler Lock – is a lock mechanism that uses pins of varying lengths to prevent the lock
from opening without the correct key.
3. Lever Tumbler Lock – lock used in safe deposit box and is for all purposes. It is also used in
desk, lockers and cabinets and are generally less secure than pin tumbler lock.
4. Disc Tumbler Lock – is a lock composed of slotted rotating detainer discs. A specially cut key
rotates these discs like the tumblers of a safe to align the slots, allowing the sidebar to drop into the
slots, thus opening the lock .
 -Disc tumbler lock is commonly designed for automobile industry and general use in car
door today.
Delay afforded is approx. 10 minutes.

5. Combination lock - instead of using the key to align the tumblers, the combination mechanism
uses numbers, letters or other symbols as reference point which enables an operator to align them
manually.
6. Code-operated lock - a type of lock that can be opened by pressing a series of numbered button
in the proper sequence.
7. Electrical lock - a type of lock that can be opened and closed remotely by electrical means.
8. Card-operated lock - a type of lock operated by a coded card.
9. Electromagnetic Lock- enclosed by magnetism

KEY CONTROL – defined as the management of keys in a plant or business organization to


prevent unauthorized individual access to the keys.
 Change Key – a key to a single lock
 Sub-Master Key – a key that can open all locks within a particular area or grouping.
 Master Key – a special key capable of opening a series of locks. It is capable of opening less
number of locks than grand master key.
 Grand Master Key – a key that can open everything in a system involving two or more
master key groups.
 PETERMAN – A term used in England for lock picker, safecrackers, and penetrators of
restricted areas or rooms.
 FALSE KEY – Genuine key stolen from the owner
 Art. 304 of the RPC- Punished the possession of picklocks and similar tools.

6
Restricted Area or Controlled Area – It refers to an area in which personnel or vehicles are controlled
for reasons of security.

Types of Restricted Areas


1. Limited Area – It is a restricted area in which lesser degree of control is required than in an
exclusion area, but which the security interest would be compromised by uncontrolled movement.
2. Exclusion Area – It refers to a restricted area which contains security interest to Top Secret
importance and requires the highest degree of protection. The area should be under surveillance
at all times

Security Clearance – It is a certification by a responsible authority that the person described is cleared
to access to classified matters at appropriate levels.
 Interim Clearance – Effectivity is two years
 Final Clearance – Effectivity is five years.
 MASTER KEYING SYSTEM- a system used in big installation whereby keys can open a group
of locks
Security Education- program given to employee of an installation by lecture and other means of
measure and safeguards to protect the interest of installation from loss.

What is a Security Cabinet?


The final line of defense at any facility is in the high security storage where papers, records, plans or
cashable instrument, precious metals or other especially valuable assets are protected. These security
containers will be of a size and quantity, which the nature of the business dictates.

Three (3) Types of Security Cabinet


1. Safe - a metallic container used for the safekeeping of documents or small items in an office or
installation. Safe can be classified as either robbery or burglary resistance depending upon the
use and need.
a. Its weight must be at least 750 lbs. And should be anchored to a building structure.
b. Its body should at least one inch thick steel.
c. Door should be atleast 1 ½ inch thick
d. Must be fire and burglar resistive

Class A safes are 350 hour fire resistive

Kinds of Safecracking
1. Drilling- knocking off combination dial and drillin holes to expose locking device
2. Burrning- using high acytelane torches or burning bars to cut opening
3. Peeling- attacking the seams of metal plates with pry bars.
4. Ripping- similar to peeling, except it is for metal walled container with thin wall
5. X-ray- reveal the position of mechanism
6. Explosives- use of nitroglycerine and plastic explosives
7. Manipulation- using skills for safe cracking

2. Vault - heavily constructed fire and burglar resistance container usually a part of the building
structure used to keep and protect cash, documents and negotiable instruments. Vaults are bigger than
safe but smaller than a file room.
a. The vault door should be made of steel at least 6 inches in thickness.
b. The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
c. The vault must be fire resistive up to 6 hours.
d. Height should not be more then 5,000 cubic feet
e. Floors should be elevated by 4 inches

3. File room - a cubicle in a building constructed a little lighter than a vault but of bigger size to
accommodate limited people to work on the records inside.
a. The file room should at most be 12 feet high.
b. It must have a watertight door and at least fire proof for one hour.
c. Interior cubage should be not more than 10,000 cubic feet

Some Test for Fire Resistance


1. Fire Endurance Test – A safe should not have any one time a temperature 350 F

7
2. Explain Hazard Test – test to determine is the sudden rise in temperature will not cause the
safe to rupture. If the safe can withstand 2000 F for 30 minutes without cracking or opening then it has
passed the test.
3. Fire and Impact test – Its objective is to determine the strength of a safe to resist the collapse of a
building during fire.

PERSONNEL SECURITY
Personnel Security includes all the security measures designed to prevent unsuitable individuals
or persons of doubtful loyalty to the government, from gaining access to classified matter or to any
security facility, and to prevent appointment, or retention as employees of such individuals,

The Security “Chain”: Personnel Security is the “weakest link” in the security “chain

What is Personnel Security Investigation?


It is an inquiry into the character, reputation, discretion and loyalty of individual in order to
determine a person’s suitability to be given security clearance.

Types of Personnel Security Investigation (PSI)

1. National Agency Check (NAC). – This is an investigation of an individual made upon the basis of
written information supplied by him in response to official inquiry, and by reference to appropriate
national agencies.
 National Intelligence Coordinating Agency (NICA)
 National Bureau of Investigation (NBI)
 ISAAFP or J2 Division, GHQ AFP
 CIDG PNP Camp Crame., etc.

2. Local Agency Check (LAC) – This type of investigation consist of the first type plus written inquiries
sent to appropriate local government agencies, former employees, references and schools listed by
the person under investigation. The local agencies normally check besides the past employment,
schools and references are the following:
 Place of the locality where the individual is a resident.
 Mayor, Police, Fiscal, Judge of the locality where the individual is a resident.

Background Investigation (BI) This is more comprehensive investigation than the NAC and LAC.
A through and complete investigation of all or some of the circumstances or aspects of a
person’s life is conducted.
This type of personnel Security Investigation may either be a complete (CBI) or a partial Background
Investigation (PBI).
1. Complete Background Investigation – Consist of the investigation of the background of a
person, particularly all the circumstances of his personal life. 
2. Partial Background Investigation – Consist of the investigation of the background of an
individual but limited only to some of the circumstances of his personal life which are deemed
pertinent to the investigation. This type of BI is also used to further develop questionable
information contained in another investigation report.

Factors considered in Background Investigation.


1. Loyalty – faithful allegiance to the country, government and its duly constituted authority.
2. Integrity- uprightness in character, soundness of moral principles, freedom from moral
delinquencies, ore more simply stated-honesty.
3. Discretion- the ability of tendency to act or decide with prudence; the habit of wise judgment
or simply stated- good judgment
4. Moral- distinctive identifying qualities which serve as an index to the essential or intrinsic
nature of a person; his outward manifestation, personal traits or moral habits.
5. Character- the sum of the traits that serves as an index of the essential intrinsic nature of a
person. It is the aggregate of distinctive mental and moral qualities that have been impressed by
nature, education and habit upon the individual.
6. Reputation- opinion or estimation in which one is generally held. It is what one reported to
be, whereas character is what a person is.

THE GUARD FORCE AND GUARD SYSTEM


8
The security guard force is the key element in the overall security system of a plant or installation.
Its basic mission is to protect all the property within the limits of the facility boundaries and
protect employees and other persons on the installation. 
 Security Guard Defined  
 Sometimes called private security guard or watchman shall include any person who offers or
renders personal service to watch or secure either a residence or business establishment or
both for hire or compensation, and with a license to exercise profession.

PRIVATE DETECTIVE- ANY PERSON WHO DOES WORK FOR HIRE, COMMISSION OF REWARD
FUNCTIONS OF A PRIVATE DETECTIVE
1. Background Investigation;
2. Locating missing person;
3. Conduct surveillance work;
4. Such other detective work as may become the subject matter of contract between the agency and its
clients.

PRIVATE DETECTIVE- ANY PERSON WHO DOES WORK FOR HIRE, COMMISSION OF REWARD
FUNCTIONS OF A PRIVATE DETECTIVE
1. Background Investigation;
2. Locating missing person;
3. Conduct surveillance work;
4. Such other detective work as may become the subject matter of contract between the agency and its
clients.

Types of Security Guard Forces


1. Private Security Agency - any person, association, partnership, firm or private corporation,
who contracts, recruits, trains, furnishes or post any security guard, to do its functions or
solicit individual s, business firms, or private, public or government-owned or controlled
corporations to engage his/its service or those of his/its security guards, for hire commission or
compensation. Also called BLUE ARMY. (contractual basis);
2. Company Security Force - A security force maintained and operated any private company/
corporation for its own security requirements only.
3. Government Security Unit - a security unit maintained and operated by any government
entity other than military and/a police, which is established and maintained for the purpose of
securing the office or compound and/or extension such government entity.

Validity of Security Guard License – Three (3) years

 Security guard
 Security Guard 1 – Watchman/guard – the one actually posted as watchman and or guard
 Security Guard 2 – Shift-in-charge – responsible for the security officers who are scheduled in a
certain shift for a particular period
 Security Guard 3 – Post-in-charge – responsible for the entire detailed security office within a
certain establishment.

WHO MAY ORGANIZE AND MAINTAIN PRIVATE SECURITY AGENCY AND PRIVATE DETECTIVE
AGENCY
Any Filipino citizen or corporation, association, partnership, one hundred percent of which is
owned and controlled by Filipino citizen.
 
BASIC REQUIREMENT OF AN OPERATOR OR MANAGER OF SECURITY AGENCY
1. Filipino citizen;
2. Not be less than twenty five (25) years of age;
3. College graduate and/or a commissioned officer in the inactive service or retired from the AFP or
PNP;
4. Has taken a course/seminar on Industrial Security Management and/or must have adequate training
or experience in security business,
5. Good moral character;
6. Having no previous record of conviction of crime or offense involving moral turpitude

New Applicant for Private Security Agency


1. Minimum Capitalization of 1 million pesos
2. With a bank deposit minimum of 500 thousand pesos
9
3. Registered to the SEC or Security Exchange Commission.

QUALIFICATIONS OF SECURITY GUARD OR WATCHMAN


1. Filipino citizen;
2. High School graduate;
3. Physically and mentally fit;
4. not less than 21 nor more than 50 years of age;
5. (e) at least 5 feet and 4 inches in height;
6. suffering none of the disqualifications provided for in the preceding section:;
7. Has undergone Pre-Licensing course or its equivalent.

Veterans and retired military/police personnel honorably discharge including graduates of ROTC
advance (or its equivalent in the PNP) are exempted from the required Basic-Licensing Training.

QUALIFICATIONS FOR SECURITY OFFICER

1. Filipino citizen;
2. Holder of a Baccalaureate Degree;
3. Physically and mentally fit;
4. Has graduated from a Security Officer Training Course or its equivalent

QUALIFICATIONS OF SECURITY CONSULTANT

1. Filipino citizen;
2. Physically and mentally fit;
3. Holder of Masters degree either in Criminology, Public Administration, MNSA, Industrial
Security
Administration, or Law
4. Must have at least ten (10) years experience in the operation and management of security
business.

Desirable Qualities of Security Guards


1. Alertness- A good guard must be alert in spotting violators. This can be attained by being
watchful, dedicated and diligence.
2. Judgment- sound and good judgment is more than the use of common sense. It is the arriving
at wise and timely decision.
3. Confidence- it is the state of being sure; a state of the mind free from doubt or misgivings. This
attribute includes faith in oneself and in his abilities, which is attained by job knowledge.
Thorough and proper training plus good supervision instills confidence.
4. Physical fitness- security work is strenuous and demanding. Physical conditioning is essential
if he is to be a dependable guard.
5. Tactfulness- ability of the guard to deal with others successfully without offending. In short, he
can be firm but pleasant.
6. Self-control- ability to take hold of oneself regardless of a provoking situation. With self-control,
the guard will do his work without being angry and the situation will be on hand.
7. Interest, loyalty, responsible and trustworthy, is also important attributes of a reliable guard.

1.License to Operate- before a Private Security Agency (PSA) can operate; it has to secure a License
to Operate (LTO) categorized as either temporary or regular.
a. A temporary license is issued by the PNP thru Civil Security Croup Directorate after the
applicant /licensee should have complied with all the requirements while it has less than two
hundred guards.
– for one hundred guards, an initial of at least (30) thirty licensed firearms.
b. A Regular license to operate -having two hundred (200) or more license security guard in
its employ duly posted.
-at least 70 pieces of licensed firearms.

 Regular license is renewable every two (2) years.


 New PSA – a temporary license to operate good for 1 year.
 License PSA with less than 100 guards shall not be renewed after 1 year of operation.
 PSA with temporary license to operate having posted 100 guards or more but less than 200
guards shall, upon expiration of such license (1 year) be issued
a. extension period to operate good for 6 months.

10
b. However, upon the expiration of such 6 months extension, no additional extension shall
be granted unless post of at least additional 50 guards thereby making a total of 150 guards or
more.
Failure to comply shall serve as a basis for the issuance of a cease operation order

NUMBERS OF SECURITY PERSONNEL TO BE MAINTAINED TO SECURE REGULAR LICENSE


TO OPERATE
1. Private Security Agency – minimum of two hundred (200) licensed private security personnel
and a maximum of one thousand (1,000).
2. Company Guard Force/Private Detective Agency – minimum of thirty (30) and a maximum of
One thousand (1,000)
2. Security Guard License- before a security guard can practice his profession; he shall possess
valid security license. The use of expired license is not allowed..

Validity of Security Guard License – Three (3) years

3. Firearm’s license- all firearms of the security agency should be covered with firearms license issued
by the PNP through its Firearms Explosive Division under the Civil Security Group, renewable every
two years.

POSSESSION OF FIREARMS
1. One (1) firearm for every two (2) security guards;
2. Private security agency/private detective agency/company security force/government security force
shall not be allowed to possess firearms in excess of five hundred (500) units.
3. Shotguns not higher than 12 gauge
4. Weapons with bores not bigger than cal .22 to include pistols and revolvers with bores bigger than
cal .38
5. Ammunitions: 50 Maximum ammo per firearm
Exemptions: in areas where there is an upsurge of lawlessness and criminality as determined by
the Chief PNP, Regional Office or their authorized representative, they may be allowed to acquire,
possess and use high powered firearms.

 LIMITATION IN THE CARRYING OF FIREARMS


1. No firearm shall be borne nor be in the possession of any private security personnel except when in
actual performance of duty, in the prescribed uniform, in the place and time so specified in the Duty
Detail Order (DDO).
2. Shall be carried only within the compound of the establishment where he is assigned to guard.
3. While escorting big amount of cash or valuable outside of its jurisdiction or area of operation, private
security agency shall issue an appropriate Duty Detail Order to the security personnel concerned.

Duty Detail Order (DDO) – is a written order/schedule issued by a superior officer usually the
private security agency/branch manager or operations officer assigning the performance of private
security/detective services duties. DDO for the purpose of post duties not requiring transport of
firearms outside of the physical compound or property of a client or client establishment shall be
issued for not more than a thirty (30) days duration

LICENSE AND FEES


 New applicants to operate shall be required to obtain a minimum capitalization of P1 Million
with minimum bank deposit of P500,000.00 in order to start its business operation. All Private
Security Agencies must be registered at the Security and Exchange Commission (SEC).
 
SURETY BOND
 Agency with 1 -199 guards – P50,000.00
 Agency with 200-499 guards – P100,000.00
 Agency with 500-799 guards – P150,000.00
 Agency with 800-1000 guards – P200,000.00

POWER AND DUTIES OF SECURITY GUARD


1. Territorial Power – A security guard shall watch and secure the property of the person, firm or
establishment with whom he or his agency has a contract for security services. Such services shall not
extend beyond the property or compound of said person, firm or establishment except when required
by the latter in accordance with the terms of their contract, or in hot pursuit of criminal offenders.

11
2. Arrest by Security Guard – A security guard or private detective is not a police officer and is not,
therefore, clothed with police authority. However, he may arrest a person under the circumstances
mentioned in Section 5, Rule 113, Revised Rules of Criminal Procedure.
a. Caught in flagrante delicto
b. Probable cause based on personal knowledge
c. escapee/prisoner
3. Search without Warrant – Any security guard may, incident to the arrest, search the person so
arrested in the presence of at least two (2) witnesses. He may search employees of the firm or
establishment with which he or his agency has a contract, when such search is required by the
very nature of the business of the person, firm or establishment.

DUTIES DURING STRIKES AND LOCKOUTS


1. All private security personnel in direct confrontation with strikers, marchers or demonstrators shall
not carry firearms. They may carry only night sticks (baton) which may or may not be provided with
tear gas canister and dispenser. Security personnel not in direct confrontation with the strikers may
carry in the usual prescribed manner their issued firearm.
2. Private Security personnel shall avoid direct contact either physically or otherwise with the
strikers;
3. They shall stay only within the perimeter of the installation which they are protecting at all times;
4. In protecting and securing the assets and persons of their clients, shall only use sufficient and
reasonable force necessary to overcome the risk or danger posed by strikers or hostile crowds.
5. They shall refrain from abetting or assisting acts of management leading to physical clash of
forces between labor and management.
6. They must at all times be in complete uniform with their names and agency’s name shown on
their shirts above the breast pockets.

SUPERVISION OF THE PNP


In case of emergency or in times of disaster or calamities, the Chief, PNP may deputize any
security guard to assist the PNP in the performance of police duties for the duration of such
emergency, disaster or calamity.

SECURITY SURVEY – A fact finding probe to determine a plant’s adequacy in all aspects of
security, with the corresponding recommendations.
- Refers to checklist, audits, or inventories of security conditions.
- Security Surveys are often called ‘RISK ANALYSIS SURVEYS’ or ‘RISK ASESSMENT
SURVEYS

PURPOSES OF SECURITY SURVEY:


1. To determine the existing state of security;
2. Identifying weaknesses in defense;
3. To determine the degree of protection required;
4. To produce recommendations for a total security systems.

SECURITY INSPECTION
 It is the process of conducting physical examination to determine compliance with establishment
security policies and procedures as a result of security survey.

SECURITY EDUCATION
 It is defined as the exposure and teaching of employees on security and its relevance to their
work. Security education is conducted to develop security awareness among employees of the
company.

PERSONAL SECURITY – Protection of personnel especially ranking official from any harm, kidnap,
and others act. VIP security is type of personnel security;
POLICE SECURITY PROTECTION GROUP (PSPG) - is mandated by law to provide protective
security to government officials, foreign dignitaries, and private individuals authorized to be given
protection and also provide physical security to vital installations, and assist the Presidential Security
Group (PSG) in securing the President and the members of the First Family.

Security in VIP Office/Quarters/Residence.


1. Outer ring- sidewalks, stationed in front of quarters/residence/office, covering all
entrances, front, center, side and rear
2. Middle ring- inside quarters, office/residence, covering all stairways and elevators.
3. Inner ring- immediately outside executive/VIP’S door, or close to Executive/VIP if outside
12
Security Hazard – Is any act or condition, which may result in the compromise of information, loss of
life, loss or destruction of property or disruption of objectives of the installation.

Types of Hazards 
1. Natural Hazard- these are hazards which arise from natural phenomena. The following are
types of natural hazards or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Fire (not caused by human action)
d. Storms (typhoons, cyclones, tornado and hurricane)
 
2. Human-Man made Hazards- These are hazards which are the result of a state of mind,
attitude, weaknesses or character traits of one or more persons. They can be acts of
commission or omission, both overt and covert, which can disrupt operation of a plant or
installation. The following are types of human or man made hazards:
a. Espionage, pilferage and theft
b. Vandalism, etc

Intentional man-made hazards:


 THEFT AND PILFERAGE
 Theft – committed by any person, who with intent to gain but without violence, against, or
intimidation of persons nor force upon things shall take personal property of another without the
latter consent.
 Pilferage- act of stealing small amounts or small articles owned by its company. In inventory
control, it is reduction in inventory caused by shoplifting by outsiders or petty thieves by
employees.
- its one of the most annoying and common hazard in security.
a. Systematic pilferage- steals with predetermined or preconceived plans
b. Casual pilferage- steals due to his inability to resist the unexpected opportunity

Sabotage- destroying of companies properties or performing of explicit activities that results to


disturbances
Saboteur- the most dangerous to deal with planning and implementing measures
Espionage- practice of spying or excessive malicious information gathering
-he is very dangerous because in his skill in deception and cunning.

Risk management alternatives and strategies


1. Risk avoidance- eliminating or removing the risk totally from the institution.
2. Risk reduction- decreasing by minimizing the probability of potential loss
3. Risk spreading- spread through compartmentalization or decentralization
4. Risk transfer- moving the financial impact into the insurance company
5. Risk self-assumption- planned assumption and acceptance of potential risk by:
a. doing nothing about the threat
b. setting aside the resources for use in case of a specific loss incidents.

DOCUMENT AND INFORMATION SECURTY


 The leakage of document and information cost government, business and industry alike, billion
of pesos. A rival company or an enemy agent might use an illegally obtain document and
information for their own advantage. For this reason, a comprehensive and information
security program is very essential to the installation in order to focus freely on the attainment of
its goals and objectives.
 This involves the protection of documents and classified papers from loss, access by
unauthorized persons, damage, theft and compromise through disclosure.

  Document Security Systems


 Documents Security is that aspect of security which involves the application of security
measures for the proper protection and safeguarding of classified information.
 Security Clearance is the certification by a responsible authority that the person described is
cleared for access to classified matter the appropriate level.
 Need-to-know is the principle whereby access to classified matter may only be only given to
those persons to whom it is necessary for the fulfillment of their duties.
It is a requirement that the dissemination of classified matters be limited strictly to persons
whose official duty requires knowledge or possession thereof.
13
Certificated of Destruction is the certification by a witnessing officer that the classified matters
describe therein has been disposed of in his presence, approved destruction methods.
 Classified refers to assign information by one of the four classification categories.
 Compromise means lose of security, which results from an authorized persons obtaining
knowledge of classified matter.
 Compartmentation is the grant of access to classified matter only to properly cleaved persons
in the performance of their official duties.
  Declassify is the removal of security classification from classified matter.
 Reclassify / Re grading is the act of changing the assigned classification of matter.
 Up- grading is the act of assigning to a matter of higher classification to a classified
document.

GENERAL PRINCIPLES

1. The authority and responsibility for the preparation and classification of classified matter rest
exclusively with the originating office;
2. Classified matter should be classified according to content and not the classification of the file in
which they are held or of another document to which they refer;
3. Classification should be made as soon as possible by placing the appropriate marks on the
matter to be classified;
4. Each individual whose duty allows access to classified matter is responsible for the protection of the
classified matter while it is in his/her possession and shall insure that dissemination of such
classified matter is on the “need to know” basis and to “property cleared personnel only”.

CLASSIFICATION OF DOCUMENTS
 Memorandum Circular No. 196, dated 07/19/1968 (Security of Classified Matter in government
offices)

1. TOP SECRET (green)– any information and material, the unauthorized disclosure of which would
cause exceptionally grave damage to the nation, politically, economically or militarily;
 Very important political documents regarding negotiation for major alliances.
 Major governmental projects such as proposal to adjust the nation’s economy.
 Military – Police defense class/plans
 Strategies plan documenting overall conduct of war.

2. SECRET(red)- any information and material, the unauthorized disclosure of which would endanger
national security, cause serious injury to the interest or prestige of the nation or any
governmental activity.
 New designs of aircraft projections, tanks, radar and other devices.
 Troop movement to operational areas.
 Hotel plans and estimates
 Order of battle info.

3. CONFIDENTIAL(blue) – any information and materials, the unauthorized disclosure of which would
be prejudicial to the interest or prestige of the nation or governmental activity or would cause
administrative embarrassment or unwarranted injury.
 Plans of government projects such as roads, bridges, building, etc.
 Routine service reports like operations and exercise of foreign power.
 Routine intelligence reports.
 Certain Personnel records, Staff matters.

4. RESTRICTED (white or no color) – any information and material which requires special protection
other than those determined to be Confidential, Secret, and Top Secret matters.

 
TYPES OF DOCUMENTS
 Class I – Vital Document – This is an irreplaceable records , reproduction of which does not
have the same value as the original;
 Class II – Important Document- This is a record, reproduction of which cause considerable
expense and labor, or considerable delay.
 Class III – Useful Document – This is a record, the loss of which may cause inconvenience
but could be readily replaced and may not present insurmountable obstacle to the prompt
restoration of the business;
14
 Class IV- Non essential Document – This record may include daily files, routine in nature,
lost of which will not affect the organization.

Categories of Document for Security Purposes 


1. Category A
a. Information which contains reportable time sensitive, order of battle and significant
information.
b. It should be given priority because it is critical information.
c. It must be forwarded without delay.
d. It is critical to friendly operations.
e. It requires immediate action. 
2. Category B
a. Anything that contains communications, cryptographic documents, or systems that
should be classified as secret and requires special handling.
b. Higher authorities should declassify it.
3. Category C
a. Other information, which contains something that, could be an intelligence value.
b. Contains exploitable information regardless of its contents.
c. Unscreened materials/documents should be categorized as Category C. 
4. Category D
a. No value, yet lower level will classify documents as category D.
b. No decision must be made at the lower echelon that document has no value. It is the
responsibility of the higher Headquarters.

THREAT TO PROTECTION OF SENSITIVE INFORMATION

Competitive Intelligence – systematic program for gathering and analyzing information about
competitor’s activities and general business trends to further company’s goals.

Types of Competitive Intelligence


1. White – information available from company publication, public records or commercial
reporting sources;
2. Gray – not readily available but which is usually can be obtained without acquiring any
civil/criminal liability in the process.
3. Black – obtained through clearly unethical or illegal means.

OPERATIONAL SECURITY – part of physical security that deals primarily with the protection of
processes, formulas, patents, and other industrial and manufacturing activities from espionage,
infiltration, loss, compromise or photocopying;

Proprietary information is information that in some special way relates to the status or activities of the
possessor and over which the possessor asserts ownership.

Types of Proprietary Information


1. Trade Secrets- this consist of any formula, pattern, device or compilation of information
which is used in one’s business and which gives him an opportunity to gain an advantage
over competitors who do not know or us e it. It may be a formula for a chemical compound a
process of manufacturing, treating or preserving materials, a pattern for machine or device,
or a list of customers. A trade secret is a process or device for continuous use in the
protection of the business.
2. Patents- this is a grant made by the government to an inventor, conveying or securing to him
the exclusive right to make, use, or sell his invention for term of 20 years.

LAW ON INTELLECTUAL PROPERTY


INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES [Republic Act No. 8293]
Approved on June 6, 1997
AN ACT PRESCRIBING THE INTELLECTUAL PROPERTY CODE
AND ESTABLISHING THE INTELLECTUAL PROPERTY OFFICE,
PROVIDING FOR ITS POWERS AND FUNCTIONS, AND FOR OTHER PURPOSES

15
COMMUNICATION SECURITY – is the protection resulting from the application of various measures
which prevent or delay the enemy or unauthorized persons in gaining information through the
communication system. This includes:
 a. Transmission Security – component of communications security which results from all
measures designed to protect transmission from interception.
 b. Cryptographic Security – results from the provisions of technically sound crypto-system
and their proper use.
 c. Physical Security – providing safeguards to equipment and material from access by
unauthorized persons.

THREATS IN COMMUNICATION SECURITY


1. Wiretapping - is the monitoring of telephone conversations by a third party, often by covert
means.
2. Bugging – means to secretly listen to or record a conversation using a hidden electronic device.
3. Eavesdropping (unauthorized listening)- is the unauthorized real-time interception of a private
communication, such as a phone call, instant message, videoconference or fax transmission.  

 RA No. 4200, Approved June 19, 1965 – An Act to prohibit and penalize wiretapping and other
related violations of privacy of communication, and other purposes.
 UNLAWFUL ACTS
 Sec. 1 It shall be unlawful for any person, not being authorized by all the parties to any private
communication or spoken word, to tap any wire or cable, or by using any other device or arrangement,
to secretly overhear, intercept, or record such communication or spoken word by using a device
commonly known as a dictaphone or dictagraph or dictaphone or walkie-talkie or tape recorder.

Sec.3
 Nothing contained in this Act, however, shall render it unlawful or punishable for any
peace officer, who is authorized by a written order of the Court, to execute any of the acts
declared to be unlawful in the two preceding sections in cases involving the crimes of
treason, espionage, provoking war and disloyalty in case of war, piracy, mutiny in the
high seas, rebellion, conspiracy and proposal to commit rebellion, inciting to rebellion,
sedition, conspiracy to commit sedition, inciting to sedition, kidnapping as defined by
the Revised Penal Code.
 AUTHORIZATION
 The authorization shall be effective for the period specified in the order which shall not exceed
sixty (60) days from the date of issuance of the order, unless extended or renewed by the court
upon being satisfied that such extension or renewal is in the public interest.
 The court referred to in this section shall be understood to mean the Court of First Instance
within whose territorial jurisdiction the acts for which authority is applied for are to be executed.
 All recordings made shall be forwarded to the court within 48 hours.

CODES AND CIPHERS


 
Code - a system which uses words as the smallest element like the one below.
Code word Plaintext
 Angel we are ready
 Fox send additional

Cipher - a system that manipulate one, two, or three characters at a time like:

Cipher Plaintext
B 1
C 2
J 3
D 4

Categories of Cipher
 Concealment – is the simplest, which means to hide/hidden. For instance:
 I WILL DO IT. IF NOT TODAY, THEN TRUST ME. SIGNED SMITH.  
 message: ( copy out every third word )  
 Decipher: DO NOT TRUST SMITH  

16
Transposition System – is another category of cipher by shuffling or rumbling the letters. Below is an
example.
 C: NRUTE RAMOH ALKOL ECNAC
 (Everything is written backward)
 (Put into 5 letters)
 Decipher: Return to base – this is the plaintext  
 P: CANCEL LOKLA HOMAR ETURN  
 P: CANCEL OKLAHOMA RETURN – which means  
 P: Return to base.  

Substitution Method - original message elements, letters, numbers or other symbols are replaced with
alternate symbols.

Security Planning- preparing a basic course of action for security objectives.


Contents of Security Planning: (SMEAC)
1. Situation- explain the historical background of organizations security picture
2. Mission- cover what the plan is all about and what it intends to do.
3. Execution – how the plan will be carried out using security aids.
4. Administrative and Logistics- involves listing of security equipments, like devices, alarms,
fire sprinkler, extinguisher etc.
5. Command and Signal- pertains to channel of communication needed in implementing the
project.

DEFINITION OF TERMS:
1. Access List – authenticated list of personnel given to the security allowing entry to a compound
or installation or part thereof;
2. Dry-run – practical test or exercise of plans or any activity to test its validity, an operational
readiness exercise;
3.Duress Code – type of code system so that security personnel or any employee when forced by
armed men intending to enter an installation can five alarm by the use of certain words in casual
conversation with personnel in the installation.

Asset
 Any information, facility, material, information, or activity which has a positive value to its owner
whether it is an individual, private or government entity.

What are Countermeasures?


An action taken or a physical entity used to reduce or eliminate one or more vulnerabilities. The cost of
possible countermeasures may be monetary, but may also include non-monetary cost such as reduced
operational efficiency, adverse publicity unfavorable working conditions, and political consequences.

What is Probability?
It is the chance or likelihood that a loss will take place. Indicated by a mathematical statement
concerning the possibility of an event occurring 

What is Criticality?
It is the impact of a loss as measured in financial terms. How important it is in terms of the survival or
existence of the organization.

Approval, Cancellation, Suspension of LTO


 Chief PNP
-Approval of New Regular LTO
-Cancellation of Regular LTO-Re-instatement of Regular LTO
-Suspension of Regular LTO
 
 Director Civil Security Group
- Renewal of Regular LTO
- Approval of Temporary LTO
- Reversion of Regular to Temporary LTO
- Cancellation of Temporary LTO
- Suspension of Temporary LTO

CLASSIFICATION OF TRAINING AND ITS DURATION

17
1. Basic Security Guard Course (Pre-Licensing Course) – 150 hours;
2. Re-Training Course- 48 hours;
3. Security Officers Training Course – 300 hours
4. Basic Security Supervisory Course – 48 hours

18

You might also like