Industrial Security Management involves developing comprehensive protection plans and security measures to safeguard personnel, property, and assets from threats. It takes a multi-layered approach integrating security technologies. Security is a major concern for all organizations globally due to risks like terrorism, crime, and natural disasters. Comprehensive security management plans include threat assessments, vulnerability analyses, physical security surveys, security policies, personnel training, and audits. The objective is to minimize losses and ensure business continuity. Threat assessments identify potential dangers while vulnerability assessments evaluate risks and impacts. Physical security surveys examine existing protections and weaknesses. Together these help develop appropriate security protocols.
Industrial Security Management involves developing comprehensive protection plans and security measures to safeguard personnel, property, and assets from threats. It takes a multi-layered approach integrating security technologies. Security is a major concern for all organizations globally due to risks like terrorism, crime, and natural disasters. Comprehensive security management plans include threat assessments, vulnerability analyses, physical security surveys, security policies, personnel training, and audits. The objective is to minimize losses and ensure business continuity. Threat assessments identify potential dangers while vulnerability assessments evaluate risks and impacts. Physical security surveys examine existing protections and weaknesses. Together these help develop appropriate security protocols.
Industrial Security Management involves developing comprehensive protection plans and security measures to safeguard personnel, property, and assets from threats. It takes a multi-layered approach integrating security technologies. Security is a major concern for all organizations globally due to risks like terrorism, crime, and natural disasters. Comprehensive security management plans include threat assessments, vulnerability analyses, physical security surveys, security policies, personnel training, and audits. The objective is to minimize losses and ensure business continuity. Threat assessments identify potential dangers while vulnerability assessments evaluate risks and impacts. Physical security surveys examine existing protections and weaknesses. Together these help develop appropriate security protocols.
Industrial Security Management involves developing comprehensive protection plans and security measures to safeguard personnel, property, and assets from threats. It takes a multi-layered approach integrating security technologies. Security is a major concern for all organizations globally due to risks like terrorism, crime, and natural disasters. Comprehensive security management plans include threat assessments, vulnerability analyses, physical security surveys, security policies, personnel training, and audits. The objective is to minimize losses and ensure business continuity. Threat assessments identify potential dangers while vulnerability assessments evaluate risks and impacts. Physical security surveys examine existing protections and weaknesses. Together these help develop appropriate security protocols.
Industrial Security Management (ISM) is the action and measures taken to create a state of safe environment for the protection of personnel, properties or assets from various perceived threats and danger using manpower, electronic devices and other forms of security control measures. It is the process of developing a comprehensive data protection plan. It takes into account all potential threats, the existing network environment, the future needs of the organization, and lays out a multi–level blueprint to integrate the security technology needed to combat any threats. Security is really a great concern of all the industrial facility or organization in the world. Security is needed everywhere, at corporate offices especially multinational companies. Industrial security is a great concern of all developing countries. Increase of industries will give more employment opportunities and more will be the growth of the country’s economy. With the rise of terrorism and other criminal acts, security for industrial facility is a must. Employee can work only in companies where there is a proper security in place. The management then only can put their souls and mind together for increasing the productivity. For better growth of the economy and profit therefore it is the duty of the management to ensure the proper security to its employee. Multi-dimensional threats to the industrial facility, corporate world and government installations have increased in many folds from international terrorism, communalism, gears, strikes, sabotage, espionage, subversion, pilferages, thefts, cyber & white collar crimes, bomb threats, natural and manmade disasters. It leads to loss prevention and crisis management. Industrial security includes asset protection, crime control, intelligence, safety and disaster management thus preventing all types of losses and adding to productivity, contrary to earlier notion that all expenditure on security was no return on investment. It is only possible if there is a healthy and secured environment. The security management plan of any industrial facility or corporation must include the thorough threat assessment to eliminate strikes, mob violence and bomb threats and additional formulation of security plan and organizational security policy, proper selection of security agency, judicious integration of men and machines for cost effective security, preparations of standing orders, Standards Operating Procedures (SOP’s) and guidelines, training and motivation of security personnel, preparation of disaster management plan, security training of personnel at various levels and periodic security audit for organization. Industrial security should always be planned at the conceptual or design stage of the plant or industry and much importance to production or profit by the management. THREE KINDS OF ASSESSMENT 1. Threat Assessment 2. Vulnerability Assessment 3. Physical Security Surveys Objective of Assessment General Objectives of assessments are: 1. To establish a policy for the security of a facility, installation and identified assets. 2. Provide guidance and general procedures to enable security managers and directors the flexibility to address realistic concerns for the protection of personnel, assets and facility from typical identified threats. 3. Minimize the loss, pilferage or diversion of company assets ensuring the company operations capability is maintained. 4. For any crisis contingency operations the facility security manager or director must provide for adequate protection of employees and property. Definition of the three kinds of Assessments 1) Threat Assessment – Threat Assessments are completed in liaison with your local law enforcement agency. Close and effective coordination with the barangay level, local and national law enforcement agencies may be the most effective deterrent to any threat. Intelligence information provided by these agencies detects and any perceived threat information. Follow up action generally consist of the security component of your organization. Obtaining amplifying details regarding the perceived threat is a common action. In evaluating available information, the security component of your facility must determine the active short, medium and long range threat and the accompany risk. Threat information must be analyzed together with the existing physical security plan to determine if weakness exist. The possibility of attempts by criminal and terrorist groups, activists, saboteurs and deranged employees to penetrate the facility is a matter of serious concern. It is recommended that a comprehensive and detailed threat assessment be conducted either by your facility security management or through an outsourced credible security servicing agency. The details should include particular information on terrorist, criminal and activist threats in the area. Note on New Construction of Facilities – All new facilities must be constructed together with inputs from a security consultant. It is practical to include assessments of a security consultant prior to the beginning of all new facilities in order to save money. Security measures must already be emplaced prior to the completion of a facility in order to integrate mitigating security measures such as CCTV monitoring, biometrics data base, proximity access cards and critical visitor control equipment like turnstiles and face recognition programs. Leased properties pose a clear security concern to your organization. These are unique situations where physical security issues may occur. Again, outsourcing a credible security assessor who will address security concerns with the leasers, building administrator is an essential factor in delineating specific security responsibilities between your organization and the concerned parties. All in all the protection of lives and property must be tailored fit to the characteristics of the leased space. The assessment should examine supporting information to evaluate the likelihood of occurrence for each threat. For natural threats, historical data concerning frequency of occurrence for given natural disasters such as tornadoes, floods, fire, or earthquakes can be used to determine the credibility of the given threat. For criminal threats, the crime rates in the surrounding area provide a good indicator of the type of criminal activity that may threaten the facility. In addition, the type of assets and/or activity located in the facility may also increase the target attractiveness in the eyes of the criminal. The type of assets and/or activity located in the facility will also relate directly to the likelihood of various types of accidents. For example, a facility that utilizes heavy industrial machinery will be at higher risk for serious or life-threatening job related accidents than a typical office building. 2) Vulnerability Assessment – Once the credible threats are identified, a vulnerability assessment must be completed. The vulnerability assessment considers the potential impacts of loss from a successful attack as well as the vulnerability of the facility and location to the attack. Impact of loss in the degree to which the mission of the organization is halted by a successful attack from the specific given threat. Ratings for impact loss and vulnerability may be categorized as follows: (will vary from one facility to another) a) Devastating: the facility is damaged beyond use. Most assets are lost and destroyed, or damaged beyond repair/restoration. The number of visitors to other facilities in the organization may be reduced by up to 75% for a limited period of time. b) Severe: the facility is partially damaged. Examples include partial structure breach resulting in weather/water, smoke, impact, or fire damage to some areas. Some items and or assets in the facility are damaged beyond repair, but the facility remains mostly intact. The entire facility may be closed for a period of up to two weeks and a portion of the facility may be closed for an extended period of time (more than one month). Some assets may need to be moved to remote locations to protect them from environmental damage. The number of visitors to the facility and others in the organization may be reduced by up to 50% for a limited period of time. c) Noticeable: the facility is temporarily closed or unable to operate, but can continue without interruption of more than one day. A limited number of assets may be damaged, but the majority of the facility is not affected. The number of visitors to the facility and others in the organization may be reduced by up to 25% for a limited period of time. d) Minor: the facility experiences no significant impact on operations (downtime is less than four hours) and there is no loss of major assets. Vulnerability Assessment Profile As an example in conducting Building VA for possible terrorist attack, a VA Profile should include the following: a) Building Structures and Systems – vulnerability to chemical attacks due to access to building systems (utility and environment systems) b) Structural Components – foundation weight load (for IED’s) Walls can bear weight and the stability if placed at right angled connections. Column allow structure to be opened up while still safely distributing the weight load. c) Building Shells – high rise cellular construction is a box type construction with solid walls in a fixed repeated pattern supporting the load to the foundation (Where is the devastating effect of the bomb if IED is employed to destroy such structure?) d) Building System – Interrelated systems such as air conditioning, plumbing, electrical, fire protection and communication. In adhering to international standards, vulnerability assessments are recommended to be done every three years or when a change in security management occurs, whichever comes first. This kind of assessment is competed for facilities with 300 employees or more. Assessments must consider the range of identified threats to the facility against a specific personality, locations and assets. Vulnerabilities must be identified and solutions for the enhancement of protection of employees and assets shall be conducted at least once every three years. Assessments shall be conducted by a qualified security assessor (neutral party) to ensure unbiased recommendations. For facilities with fewer than 300 employees and in house security team shall conduct the assessment using a pre–approved vulnerability assessment checklist every three years. Outsourcing of qualified security assessors may be an option to augment the in house security team. VA must be tailored fit ti your organizations industry. 3) Physical Security Surveys – Physical Security Surveys must not be treated as inspections. Instead they must be considered as an in–house formal security assessment for your organization’s physical security programs. The intent of these surveys is to update your security management on what needs protection. It is a complete analysis of your facility loss prevention program, physical security procedures and security protection of your personnel and property. The result is a basis for determining security priorities and prerogatives. The key to a successful survey is a good review of the facility physical security and loss prevention program. The surveys need to be kept updated so that the assessment process is current, accurate and complete. INDUSTRIAL SECURITY SYSTEM In the current situation that includes stringent security requirements, government compliance and guidelines, and the ever – present possibility of both domestic and international terrorism, the role of industrial and corporate security systems in ensuring the security of the facility and personnel is a paramount concern of the management. In addition to basic industrial site security, effective industrial or plant security systems should provide incident management functionality to preserve structural integrity. They must also deliver the tools necessary to ensure the security and safety of the employees by developing security protocols and making sure all employees are accounted for in case of emergency situations. Industrial security should never be an afterthought; ideally it should always be included at the conceptual or design stage of any industrial plant or facility, and treated with the same importance as production or profit. It is therefore imperative that security is regarded as a fundamental to a business. The security should have the resources and expertise to carry out an in depth security analysis. As part of the comprehensive security management plan, the organization should undertake detailed security reviews, of their industrial installation, to clearly determine potential threats and recommend cost effective and user friendly security measures to strengthen or harden the security of the facility. Whether it be losses due to thefts, pilferages of finished goods and other assets, encroachments, uncontrolled access, strikes, sabotage, fire, computer, financial and white collar crimes, kidnapping, transport mismanagement and other potential threats to your business, officers and employees can sleep easy and relax knowing that the management have an effective and efficient security measures in place that protect the facility. INDUSTRIAL SECURITY PROGRAM The security program of the facility shall be in writing, duly approved by the management or the president of the corporation. In addition, the security program shall define measures and procedures to detect and prevent the commission of any industrial and corporate crimes. It is the security manual that the Corporate Security Director or managers should have at their fingertips. It provides the security manager with checklists and synopsis of common sense approaches for handling crimes and emergency events; proven action tasks and responses; proactive procedures that are simple and easy to use; and routine, day to day security operational guidelines. In addition, the manual contains or provides a quick, handy resource for solving almost any problem faced by the security manager. The program provides procedures for managers, supervisor and employees to response properly in case of emergency in simple, easy to use guidelines and procedures for other personnel to be implemented immediately, before and during crisis or emergency. CORPORATE SECURITY MANAGEMENT As the world moves on to higher complexity and higher inter connectedness. Disruption of business can arise from serious threats, major accidents, or terrorism even calamities. Emergencies and crises challenge the organizations or the management far beyond the normal level of business activity. Corporate Security Management (CSM) describes an ongoing and systematic process to minimize the effects of natural disasters, man-made disasters and intentional threats to tangible and intangible assets of organizations. Identifies and effectively mitigates or manages, at an early stage, any developments that may threaten the resilience and continued survival of a corporation. It is a corporate function that oversees and manages the close coordination of all functions within the company that are concerned with security, continuity and safety. CORPORATE SECURITY For many years corporate security has been dominated by a defensive approach, focused on protection and loss prevention. The head security was seen as little more than the guard at the gate like the “No ID, No Entry policy, someone whose actions invariably stopped people doing their jobs instead of enabling the business to function more effectively. Typically, heads of security came from a narrow talent pool, namely police, armed forces, intelligence or any law enforcement agency. There are many reasons companies tend to recruit security managers from these backgrounds. The police and armed forces churn out individuals with intensive training in the practice of security and protection, and have hands on experience that is rarely available elsewhere. There are a number of reasons and greater diversity which is essential within corporate security function. There is a growing recognition of the strategic importance of security and as a result security departments need to operate at a much more senior level. Organizations require a particular approach to management and leadership, which can be antithetical to those with police or armed services backgrounds. In today’s corporate environment, the impact of the security department is proportionate to its ability to persuade individuals and teams all over the company to collaborate and cooperate. This means that dialogue between security specialists and non – specialists is essential. Traditional security skills are associated with an approach where security is perceived as a “dis – enabler” of business. Those with formal security training can tend to be risk averse, while business need to take calculated risk to stay ahead of competitors, break into new markets and maximize profits. The corporate security functions needs people who are happy breaking rules, innovating and thinking outside the box. Studies of security related professions such as the police, the ambulance service and local authority emergency planning departments have suggested that too much experience in a traditional security context can inhibit people from making innovative responses to security incidents. Heads of security consistently rated qualities such as independent thinking, willingness to challenge assumptions and behavior and innovation as being ones they value most in their team. One said: I’m looking for people who push the boundaries and constantly challenge the way we work. There is a growing recognition of the value of the human element. According to experts, many security professionals are typically trained to address security incidents and emergencies in ways that fail to factor in the human dynamics of such situations, including the impact of emotions, perceptions and fear on people’s behavior. Emotional intelligence is critical to effective alignment, but the human element of security and risk management is routinely overshadowed by the emphasis on technical security skills. For security to be aligned with the business, security managers must understand the business and how they contribute towards its objectives. THE CORPORATE SECURITY MANAGER/ DIRECTOR The Corporate security manager or director shall be responsible for the administration, implementation, and compliance of the organization’s corporate security vision, strategy and programs. Limit exposure in all areas of financial, physical and personal risk. Hence, in the performance and execution of his duties and responsibilities he must be discharge the same considering the following purposes: 1. To provide a continuous, efficient wide security program geared towards minimizing risk exposure and gaining officer’s and employee’s support to attain common objectives. 2. To provide for the installation, maintenance and operations of security devices for the facility 3. To supervise and control the security department and maintain an effective security control system with the aim of providing an acceptable standard of protection for the facility, its clientele and employee’s 4. To provide and develop an overall employee security training, re – orientation and periodic training program that meets the standard requirements of the management. 5. To assist in the investigation and prosecution of fraud and other relevant cases involving the management, its clientele or employee and to keep and maintain an efficient recording system pursuant thereto 6. To assist the Human Resources Department, whenever possible, in conducting background investigation for newly hired employees as well as of employees assigned to sensitive areas or position 7. To report directly and in a timely manner to the President or its equivalent all security hazards or danger discovered or reported whether actual or potential and to make appropriate recommendations or actions. SECURITY DEPARTMENT At present the security has a higher profile in the corporate world compared in the past. Companies are looking for new ways to manage the risk and portfolio of the company. The security department has widened to include shared responsibility for things such as reputation, corporate governance and regulation. The principal role of security department is to convince colleagues across the business to deliver security through their everyday actions and decisions. The department is in the business of change management rather than enforcement and works through trusted social network of influence. The department is there to help the company to take risk rather than prevent them and should therefore be at the forefront of new business development. The department should never stand still or become fixed entities. In other multinational companies its role is more concerned with the overall corporate resilience than traditional security. SECURITY THREATS Multi – dimensional threats to the National Security, corporate world and industrial organizations have increased in many folds from international terrorism, communalism, thefts, cyber and white collar crimes, bomb threats, natural and manmade disaster management thus preventing all types of losses and adding to productivity, contrary to earlier notion that expenditure on security was no return on investment. To ensure security at industrial establishment, it’s very important to formulate a standard security plan and organizational security policy. Proper selection of security agency and careful integration of men and machines are the basic steps in ensuring ideal and all round security. Industrial security should be planned at the conceptual or design stage of the plant or establishment. There should be effective and strict rules for access of different regular sensitive areas inside the industrial establishment. There should be a proper classification of different department and access control systems with different level of access control should be installed to prevent unauthorized entry of any unwanted persons. CCTV cameras at all entry and exit points help security in keeping track the people moving in and out. Along with all these preparation and security implementation, there should be a regular security check and sudden audits to ensure the effectiveness of security facilities and devices. Any mistakes or weakness in security system should be reported immediately to the security department or management to deal with all such issues. WHITE COLLAR CRIME Emergence of white–collar crime, industrial espionage, sabotage, and computer crime has made the task of protecting the assets intricate. Security is no longer an easy job but an all– pervasive management functions of assets protection, crisis management and generation of profit through loss prevention. In this scenario, there is urgent need to upgrade the knowledge and skills of top level managers and the security professionals by familiarizing them with the latest advances in the art of security technology and management. A GREAT CONCERN Security is of great concern for all the people in this world. Security is needed everywhere at home, offices and at every small, medium or large enterprise. Industrial security is great concern for all developing countries. Industrial growth generates more revenue and employment opportunities. They are of great importance for overall progress of every country’s economy. However, with the rise of criminal activities, theft and terrorism the need for better security is required. Employees working at these industries can give their best performance only in completely secured environment. Therefore, for better growth of industry and economy, it is the duty of the organization to ensure proper security to all its employees. Then only, employees put his soul and mind together for increasing their productivity. It is only possible when there is secure and healthy working environment. LEGAL BASIS OF INDUSTRIAL SECURITY IN THE PHILIPPINES 1. Natural Authority – the highest is the law of self-preservation. By instinct, man naturally reacts to protect himself, his family, his honor, freedom, liberty and property from danger, threat or hazard. He does it personally and/or thru the help of others. The Filipinos even before the coming of early Chinese traders were already organized into tribes. Each tribe has its own chieftain but also of the members. The inherent mechanism of self – preservation became the unwritten law of the early Filipino’s to protect themselves and their property against the natural and manmade hazards. 2. Constitutional Authority a) The prime duty of the Government is to serve and protect people. The Government may call upon the people to defend the State and, in the fulfillment thereof, all citizens may be required, under constitutions provided by law, or to render personal military or civil service. (Art. II Sec. 4 of the 1987 Philippine Constitution). Although the defense of the State is the one contemplated here people being one of the elements of the State is directly affected in whatever protection the state shall receive from the government and the people. Take note also that all citizens who are qualified, including the security guards, may be required by law to render personal military or civil service. The service required of the citizen’s is personal. b) No person shall be deprive of life, liberty and property without due process of law nor shall any person be denied the equal protection of the laws. (Art. III Sec. 1 of the 1987 Philippine Constitution). This means the life, liberty, freedom and property can only be taken from a person after the observance of due process of law. Due process of law are of two aspects: substantive and procedural. Daniel Webster in brief defines procedural due process as “one which hears before it condemns, which proceeds upon inquiry, and render judgment only after trial”. But if taking of life, liberty, freedom or property does not fall within the framework of due process of law, available remedies under the law should be resorted. c) Private Property shall not be taken for public use without just compensation. (Art. III Sec. 9 of the 1987 Philippine Constitution). The Constitution protects not only ownership but also possession, enjoyment, use and disposition of private property by their rightful owners subject to such limitations imposed by law. In this regards, private property to be taken by the government in its exercise of the power of the eminent domain must satisfy two important conditions, namely: public use and just compensation. d) The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures of whatever nature and for any purpose shall be inviolable, and no search warrant or warrant of arrest shall be issue except upon probable cause to be determined personally by the judge after examination under oath or affirmation of the complainant and the witness he may produce, and particularly describing the place to be searched and the persons or things to be seized. (Art. III Sec. 2 of the 1987 Philippine Constitution) 3. STATUTORY AUTHORITY a. The Revised Penal Code – (Act no. 3815, as amended) The applicable provisions of the Code on Crime against persons, Personal Liberty and Security and Property have bearing on the security and protection of one’s life, liberty, and property b. Private Security Agency Law. (Republic Act. 5487 as amended) This law governs the operation, administration of security agency, and activities, qualifications, duties and licensing of security guards, watchmen and private detectives. In short, it is the intention of this law to professionalize the security services in order to upgrade the level of security protection. c. Presidential Decree no. 11 (Amending R.A. 5487) Presidential Decree no. 11 amended the Sec. 3 (d) which define Watchman or Security Guard Agency, Sec. 4 who may organize a security or watchman agency and the Sec. 18 of the penal provisions of Republic Act no. 5487. d. Presidential Decree no. 100 (Amending R.A. 5487 and P.D. 11) The following are amended by Presidential Decree no. 100. Further amended the Sec. 3 (d) of R.A. 5487 which further defines the watchman or security guard or Watchman or Security Guard Agency; Further amended Sec. 4 by adding as the last paragraph thereof; Amended the Sec. 5 and 8 of Private Security Agency Law by inserting before the final proviso thereto; Amended the Sec. 9 that provides employees need not be licensed; Amended the Sec. 11 by adding as the second paragraph thereof; and amended the Sec. 16 paragraph one, which provides for limitations and prohibitions. e. Presidential Decree no. 1919 (Amending R.A. 5487, P.D. no. 11 and 100). The following Sections are further amended: Sec. 3 (d) of R.A. 5487as amended is further amended to expand the definition of Watchman or Security Guard, Watchman or Security Guard Agency; Sec. 18 of the Private Security Agency Law as amended is further amended by providing a third paragraph thereof; Paragraph 3 of Sec. 8 of R.A. 5487, as amended is further amended the fees to be paid and bonds; and Paragraph 1 of Sec. 16 of the Private Security Agency Law as amended is further amended which provide the limitations and prohibitions of security agency f. 2003 Implementing Rules and Regulations of R.A. 5487 DEFINITION OF TERMS 1. Security – Protection against any type of crime to safeguard life and assets by various method and device. 2. Person – shall include not only natural but also juridical person such as single proprietorships, partnership, corporations, companies, or associations, duly organized and registered with the Securities and Exchange Commission and/or the Department of Trade and Industry. 3. Private Security Services – shall include the act of providing or rendering services to watch an establishment whether public or private, building, compound/area or property, to conduct access control/denial in any form whether physically, manually or scientifically by electronic monitoring systems, for the purpose of securing such area/ property and at the same time ensuring safety and protection of persons within such areas, to maintain peace and order within such areas, to conduct private security training and/or to conduct investigation. It shall also include the act of contracting, recruiting, training, furnishing or posting any security guard, to do its functions or solicit individuals, businesses, firms or private, public or government – owned or controlled corporations to engage his/its service or those of his/its security guards, for hire, commission or compensation thru subscription or as a consultant/trainer to any private or public corporation. 4. Private Detective Services – shall include among others the act of providing personal security protection, inquiry and information gathering, pre-employment verification and individual background profiling, providing assistance in civil liability and personal injury cases, insurance claims and fraud, child custody and protection cases, for the purpose of assisting in gathering information leading to determination and/or prevention of criminal act and/or resolution of legal, financial and personal problems. 5. Private Security Industry – shall cover those in the legitimate business of providing private security and detective services. 6. Private Security Guard (PSG) – sometimes called private security guard or watchman shall include any person who offers or renders personal service to watch or secure either a residence, business establishment or buildings, compounds, areas or property, inspects/monitors bodily checks/searches individual and/or baggage and other forms of security inspection, physically/manually or scientifically electronic, including but not limited to, logging concessions and agricultural, mining or pasture lands, transportation, for hire, or compensation, or as an employee thereof, including any employee of the national or local governments or agencies or instrumentality’s thereof and/or government owned or controlled firm or corporations who is employed to watch or secure government buildings, compounds, premises and other properties, other than member of the Armed Forces of the Philippines, guards of the Bureau of Jail Management and Penology, Municipal or City Jail guards and members of the Philippine National Police or of any other law enforcement agency of the government. 7. License to Operate (LTO) – is a License Certificate document, issued by the Chief, Philippine National Police or his duly authorized representative, authorizing a person to engage in employing security guard or detective, or a juridical person to establish, engage, direct, manage or operate an individual or a private detective agency or private security agency/ company security force after payment of the prescribed dues or fees as provided in these Rules and Regulations. 8. Company Guard Force (CGF) – a security force maintained and operate by any private company/ corporation utilizing any of its employees to watch, secure or guard its business establishment premises, compound or properties. 9. Government Guard Unit (GGU) – a security unit maintained and operated by any government entity other than military or police, which is established and maintained for the purpose of securing the office or compound and/or extension of such government entity: a. PNP as used herein shall mean the Philippine National Police, which was organized pursuant to the provision of RA 6975 otherwise known as the National Police Act of 1991. b. SAGSD has used herein shall refer to the current PNP Civil Security Group Security Agency and Guard Supervision Division or any other PNP Office that may be designated later as the primary office for supervision of the implementation of these rules and regulations. c. PADPAO refers to the Philippine Association of Detective and Protective Agency Operators, Inc., which is an association of all license security agencies and company security forces. 10. Duty Detail Order – is a written order/ schedule issued by a superior officer usually the private security agency/ branch manager or operations officer assigning the performance of private security/ detective service duties. 11. Private Detective – shall mean any person who does detective work for hire, reward or commission, other than members of the Armed Forces of the Philippines, guards of the Bureau of Jail Management and Penology, municipal or jail guards and members of the Philippine National Police or of any other law enforcement agency of the government. 12. Private Security Personnel – shall be natural persons which private security guards, private detectives, security consultants, security officers and others that may be classified later, rendering/ performing security and/ or detective services as employed by private security agency and/ or private firms. 13. Government Security Personnel – shall be natural persons which include government security guards, detectives, security consultants, security officers and others that may be classified later, except those of the Armed Forces of the Philippines, Philippine National Police, Bureau of Jail Management and Penology, Municipal or City Jail guards rendering/ performing security and/ or detective services as employed by government entities. 14. Private Security Agency – shall mean any person association, partnership, firm or private corporation, who contracts, recruits, trains, furnishes or posts any security guard, to perform its functions or solicit individuals, businesses, firms or private, public or government – owned or controlled corporations to engage his/ its services or those of his/ its security guards, for hire, commission or compensation thru subscription or as a consultant/ trainer to any private or public corporation whose business or transactions involve national security interest like the operation and/or management of domestic or ocean vessels, airplanes, helicopters, seaports, airports, heliports, landing strips etc., or as consultant on any security related matter or to provide highly specialized security detective and investigation services like gangway security, catering security, passenger profiling, baggage examination, providing security on board vessels aircraft, or other security needs that PNP SAGSD may approve. 15. Private Detective Agency – shall mean any person association, partnership, firm or private corporation, who contracts, recruits, trains, furnishes or posts any private detective, to perform its functions or solicit individuals, business, firms or private, public or government – owned or controlled corporations to engage his/ its service or those of his/ its detectives, for hire, commission or compensation thru subscription or as a consultant/ trainer to any private or public corporation or as consultant on any detective related matter, or to provide highly specialized detective and investigation services, or other detective needs that SAGSD – CSG may approve. 16. License to Exercise Profession – shall mean any document issued by the Chief, Philippine National Police or his duly authorized representative recognizing a person to be qualified to perform his duties as private security or training personnel. 17. Security Supervisor – is charged with directing the work and observing the behavioral performance of the guard under his unit. 18. Security Guard Force – as a group of forces of men selected, trained or organized into functional group for the purpose of protecting operational processes from those disruption which impede efficiency or halt operation at a particular plant, facility, institution or special activity. 19. Security Planning – is a corporate and executive responsibility. It involves knowing the objectives of the security and the means and the method to reach these objective or goal must then evolve. 20. Security Survey – is the process of conducting an exhaustive physical examination and thorough inspection of all operation system and procedures of a facility. 21. Security Inspection – is the process of conducting physical examination to determine compliance with establishment security policies and procedures as a result of security survey. 22. Security Hazard – is any act or condition which may result in the compromise of information, loss of life, loss or destruction of property or disruption of the objectives of the installation. 23. Security Education Program – a program given to employees of an installation by lecture and other means pertaining to measures and safeguards to be taken to protect the interest of the installation from loss, damage, sabotage, pilferage, and other criminal acts. 24. Assets Protection Program – it is the sum total of protection scheme encompassing the entire security spectrum, designed to eliminate, reduce or controls threats, hazard, risk or dangers to company assets. 25. Security Cabinet – added protection of important vital papers, plans, data, special correspondence, cash and other essential documents. Such as vault, safe and file room 26. Security Alarm System – combination of compatible intrusion and detection device so arranged and wired as to support one another 27. Security Lighting – the providing of sufficient illumination to areas during hours of darkness to insure visibility and to act as a deterrent to the intruders 28. Physical Barrier – any physical means to impede, delay, or prevent intrusion into a protected area. 29. Master Keying System – a system use in big installation whereby keys can open groups of locks. This is possible by the use of interchangeable cylinder cores in the locks 30. Remote Station System – a system where the alarm signal is transmitted to a remote location manned and operated by an independent party or police department.