Module 1

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

Module 1

INDUSTRIAL SECURITY MANAGEMENT


Industrial Security Management (ISM) is the action and measures taken to create a state
of safe environment for the protection of personnel, properties or assets from various perceived
threats and danger using manpower, electronic devices and other forms of security control
measures. It is the process of developing a comprehensive data protection plan. It takes into
account all potential threats, the existing network environment, the future needs of the
organization, and lays out a multi–level blueprint to integrate the security technology needed to
combat any threats.
Security is really a great concern of all the industrial facility or organization in the world.
Security is needed everywhere, at corporate offices especially multinational companies.
Industrial security is a great concern of all developing countries. Increase of industries will give
more employment opportunities and more will be the growth of the country’s economy. With the
rise of terrorism and other criminal acts, security for industrial facility is a must. Employee can
work only in companies where there is a proper security in place. The management then only
can put their souls and mind together for increasing the productivity. For better growth of the
economy and profit therefore it is the duty of the management to ensure the proper security to
its employee.
Multi-dimensional threats to the industrial facility, corporate world and government
installations have increased in many folds from international terrorism, communalism, gears,
strikes, sabotage, espionage, subversion, pilferages, thefts, cyber & white collar crimes, bomb
threats, natural and manmade disasters. It leads to loss prevention and crisis management.
Industrial security includes asset protection, crime control, intelligence, safety and disaster
management thus preventing all types of losses and adding to productivity, contrary to earlier
notion that all expenditure on security was no return on investment. It is only possible if there is
a healthy and secured environment.
The security management plan of any industrial facility or corporation must include the
thorough threat assessment to eliminate strikes, mob violence and bomb threats and additional
formulation of security plan and organizational security policy, proper selection of security
agency, judicious integration of men and machines for cost effective security, preparations of
standing orders, Standards Operating Procedures (SOP’s) and guidelines, training and
motivation of security personnel, preparation of disaster management plan, security training of
personnel at various levels and periodic security audit for organization. Industrial security should
always be planned at the conceptual or design stage of the plant or industry and much
importance to production or profit by the management.
THREE KINDS OF ASSESSMENT
1. Threat Assessment
2. Vulnerability Assessment
3. Physical Security Surveys
Objective of Assessment
General Objectives of assessments are:
1. To establish a policy for the security of a facility, installation and identified assets.
2. Provide guidance and general procedures to enable security managers and directors the
flexibility to address realistic concerns for the protection of personnel, assets and facility
from typical identified threats.
3. Minimize the loss, pilferage or diversion of company assets ensuring the company
operations capability is maintained.
4. For any crisis contingency operations the facility security manager or director must
provide for adequate protection of employees and property.
Definition of the three kinds of Assessments
1) Threat Assessment – Threat Assessments are completed in liaison with your local law
enforcement agency. Close and effective coordination with the barangay level, local and
national law enforcement agencies may be the most effective deterrent to any threat.
Intelligence information provided by these agencies detects and any perceived threat
information. Follow up action generally consist of the security component of your
organization. Obtaining amplifying details regarding the perceived threat is a common
action.
In evaluating available information, the security component of your facility must
determine the active short, medium and long range threat and the accompany risk.
Threat information must be analyzed together with the existing physical security plan to
determine if weakness exist. The possibility of attempts by criminal and terrorist groups,
activists, saboteurs and deranged employees to penetrate the facility is a matter of
serious concern. It is recommended that a comprehensive and detailed threat
assessment be conducted either by your facility security management or through an
outsourced credible security servicing agency. The details should include particular
information on terrorist, criminal and activist threats in the area.
Note on New Construction of Facilities – All new facilities must be constructed
together with inputs from a security consultant. It is practical to include assessments of a
security consultant prior to the beginning of all new facilities in order to save money.
Security measures must already be emplaced prior to the completion of a facility in order
to integrate mitigating security measures such as CCTV monitoring, biometrics data
base, proximity access cards and critical visitor control equipment like turnstiles and face
recognition programs.
Leased properties pose a clear security concern to your organization. These are
unique situations where physical security issues may occur. Again, outsourcing a
credible security assessor who will address security concerns with the leasers, building
administrator is an essential factor in delineating specific security responsibilities
between your organization and the concerned parties. All in all the protection of lives and
property must be tailored fit to the characteristics of the leased space.
The assessment should examine supporting information to evaluate the
likelihood of occurrence for each threat. For natural threats, historical data concerning
frequency of occurrence for given natural disasters such as tornadoes, floods, fire, or
earthquakes can be used to determine the credibility of the given threat. For criminal
threats, the crime rates in the surrounding area provide a good indicator of the type of
criminal activity that may threaten the facility. In addition, the type of assets and/or
activity located in the facility may also increase the target attractiveness in the eyes of
the criminal. The type of assets and/or activity located in the facility will also relate
directly to the likelihood of various types of accidents. For example, a facility that
utilizes heavy industrial machinery will be at higher risk for serious or life-threatening job
related accidents than a typical office building.
2) Vulnerability Assessment – Once the credible threats are identified, a vulnerability
assessment must be completed. The vulnerability assessment considers the potential
impacts of loss from a successful attack as well as the vulnerability of the facility and
location to the attack. Impact of loss in the degree to which the mission of the
organization is halted by a successful attack from the specific given threat. Ratings for
impact loss and vulnerability may be categorized as follows: (will vary from one facility to
another)
a) Devastating: the facility is damaged beyond use. Most assets are lost and destroyed, or
damaged beyond repair/restoration. The number of visitors to other facilities in the
organization may be reduced by up to 75% for a limited period of time.
b) Severe: the facility is partially damaged. Examples include partial structure breach
resulting in weather/water, smoke, impact, or fire damage to some areas. Some items
and or assets in the facility are damaged beyond repair, but the facility remains mostly
intact. The entire facility may be closed for a period of up to two weeks and a portion of
the facility may be closed for an extended period of time (more than one month). Some
assets may need to be moved to remote locations to protect them from environmental
damage. The number of visitors to the facility and others in the organization may be
reduced by up to 50% for a limited period of time.
c) Noticeable: the facility is temporarily closed or unable to operate, but can continue
without interruption of more than one day. A limited number of assets may be damaged,
but the majority of the facility is not affected. The number of visitors to the facility and
others in the organization may be reduced by up to 25% for a limited period of time.
d) Minor: the facility experiences no significant impact on operations (downtime is less
than four hours) and there is no loss of major assets.
Vulnerability Assessment Profile
As an example in conducting Building VA for possible terrorist attack, a VA Profile
should include the following:
a) Building Structures and Systems – vulnerability to chemical attacks due to access to
building systems (utility and environment systems)
b) Structural Components – foundation weight load (for IED’s)
Walls can bear weight and the stability if placed at right angled connections. Column
allow structure to be opened up while still safely distributing the weight load.
c) Building Shells – high rise cellular construction is a box type construction with solid
walls in a fixed repeated pattern supporting the load to the foundation (Where is the
devastating effect of the bomb if IED is employed to destroy such structure?)
d) Building System – Interrelated systems such as air conditioning, plumbing, electrical,
fire protection and communication. In adhering to international standards, vulnerability
assessments are recommended to be done every three years or when a change in
security management occurs, whichever comes first. This kind of assessment is
competed for facilities with 300 employees or more. Assessments must consider the
range of identified threats to the facility against a specific personality, locations and
assets. Vulnerabilities must be identified and solutions for the enhancement of protection
of employees and assets shall be conducted at least once every three years.
Assessments shall be conducted by a qualified security assessor (neutral party) to
ensure unbiased recommendations.
For facilities with fewer than 300 employees and in house security team shall
conduct the assessment using a pre–approved vulnerability assessment checklist every
three years. Outsourcing of qualified security assessors may be an option to augment
the in house security team. VA must be tailored fit ti your organizations industry.
3) Physical Security Surveys – Physical Security Surveys must not be treated as
inspections. Instead they must be considered as an in–house formal security
assessment for your organization’s physical security programs. The intent of these
surveys is to update your security management on what needs protection. It is a
complete analysis of your facility loss prevention program, physical security procedures
and security protection of your personnel and property. The result is a basis for
determining security priorities and prerogatives. The key to a successful survey is a
good review of the facility physical security and loss prevention program. The surveys
need to be kept updated so that the assessment process is current, accurate and
complete.
INDUSTRIAL SECURITY SYSTEM
In the current situation that includes stringent security requirements, government
compliance and guidelines, and the ever – present possibility of both domestic and international
terrorism, the role of industrial and corporate security systems in ensuring the security of the
facility and personnel is a paramount concern of the management. In addition to basic industrial
site security, effective industrial or plant security systems should provide incident management
functionality to preserve structural integrity. They must also deliver the tools necessary to
ensure the security and safety of the employees by developing security protocols and making
sure all employees are accounted for in case of emergency situations.
Industrial security should never be an afterthought; ideally it should always be included
at the conceptual or design stage of any industrial plant or facility, and treated with the same
importance as production or profit. It is therefore imperative that security is regarded as a
fundamental to a business. The security should have the resources and expertise to carry out
an in depth security analysis. As part of the comprehensive security management plan, the
organization should undertake detailed security reviews, of their industrial installation, to clearly
determine potential threats and recommend cost effective and user friendly security measures
to strengthen or harden the security of the facility.
Whether it be losses due to thefts, pilferages of finished goods and other assets,
encroachments, uncontrolled access, strikes, sabotage, fire, computer, financial and white collar
crimes, kidnapping, transport mismanagement and other potential threats to your business,
officers and employees can sleep easy and relax knowing that the management have an
effective and efficient security measures in place that protect the facility.
INDUSTRIAL SECURITY PROGRAM
The security program of the facility shall be in writing, duly approved by the management
or the president of the corporation. In addition, the security program shall define measures and
procedures to detect and prevent the commission of any industrial and corporate crimes. It is
the security manual that the Corporate Security Director or managers should have at their
fingertips. It provides the security manager with checklists and synopsis of common sense
approaches for handling crimes and emergency events; proven action tasks and responses;
proactive procedures that are simple and easy to use; and routine, day to day security
operational guidelines. In addition, the manual contains or provides a quick, handy resource for
solving almost any problem faced by the security manager.
The program provides procedures for managers, supervisor and employees to response
properly in case of emergency in simple, easy to use guidelines and procedures for other
personnel to be implemented immediately, before and during crisis or emergency.
CORPORATE SECURITY MANAGEMENT
As the world moves on to higher complexity and higher inter connectedness. Disruption
of business can arise from serious threats, major accidents, or terrorism even calamities.
Emergencies and crises challenge the organizations or the management far beyond the normal
level of business activity.
Corporate Security Management (CSM) describes an ongoing and systematic process to
minimize the effects of natural disasters, man-made disasters and intentional threats to tangible
and intangible assets of organizations.
Identifies and effectively mitigates or manages, at an early stage, any developments that
may threaten the resilience and continued survival of a corporation. It is a corporate function
that oversees and manages the close coordination of all functions within the company that are
concerned with security, continuity and safety.
CORPORATE SECURITY
For many years corporate security has been dominated by a defensive approach,
focused on protection and loss prevention. The head security was seen as little more than the
guard at the gate like the “No ID, No Entry policy, someone whose actions invariably stopped
people doing their jobs instead of enabling the business to function more effectively. Typically,
heads of security came from a narrow talent pool, namely police, armed forces, intelligence or
any law enforcement agency.
There are many reasons companies tend to recruit security managers from these
backgrounds. The police and armed forces churn out individuals with intensive training in the
practice of security and protection, and have hands on experience that is rarely available
elsewhere. There are a number of reasons and greater diversity which is essential within
corporate security function.
There is a growing recognition of the strategic importance of security and as a result
security departments need to operate at a much more senior level. Organizations require a
particular approach to management and leadership, which can be antithetical to those with
police or armed services backgrounds. In today’s corporate environment, the impact of the
security department is proportionate to its ability to persuade individuals and teams all over the
company to collaborate and cooperate. This means that dialogue between security specialists
and non – specialists is essential.
Traditional security skills are associated with an approach where security is perceived as
a “dis – enabler” of business. Those with formal security training can tend to be risk averse,
while business need to take calculated risk to stay ahead of competitors, break into new
markets and maximize profits. The corporate security functions needs people who are happy
breaking rules, innovating and thinking outside the box. Studies of security related professions
such as the police, the ambulance service and local authority emergency planning departments
have suggested that too much experience in a traditional security context can inhibit people
from making innovative responses to security incidents.
Heads of security consistently rated qualities such as independent thinking, willingness
to challenge assumptions and behavior and innovation as being ones they value most in their
team. One said: I’m looking for people who push the boundaries and constantly challenge the
way we work.
There is a growing recognition of the value of the human element. According to experts,
many security professionals are typically trained to address security incidents and emergencies
in ways that fail to factor in the human dynamics of such situations, including the impact of
emotions, perceptions and fear on people’s behavior. Emotional intelligence is critical to
effective alignment, but the human element of security and risk management is routinely
overshadowed by the emphasis on technical security skills. For security to be aligned with the
business, security managers must understand the business and how they contribute towards its
objectives.
THE CORPORATE SECURITY MANAGER/ DIRECTOR
The Corporate security manager or director shall be responsible for the administration,
implementation, and compliance of the organization’s corporate security vision, strategy and
programs. Limit exposure in all areas of financial, physical and personal risk. Hence, in the
performance and execution of his duties and responsibilities he must be discharge the same
considering the following purposes:
1. To provide a continuous, efficient wide security program geared towards minimizing risk
exposure and gaining officer’s and employee’s support to attain common objectives.
2. To provide for the installation, maintenance and operations of security devices for the
facility
3. To supervise and control the security department and maintain an effective security
control system with the aim of providing an acceptable standard of protection for the
facility, its clientele and employee’s
4. To provide and develop an overall employee security training, re – orientation and
periodic training program that meets the standard requirements of the management.
5. To assist in the investigation and prosecution of fraud and other relevant cases involving
the management, its clientele or employee and to keep and maintain an efficient
recording system pursuant thereto
6. To assist the Human Resources Department, whenever possible, in conducting
background investigation for newly hired employees as well as of employees assigned to
sensitive areas or position
7. To report directly and in a timely manner to the President or its equivalent all security
hazards or danger discovered or reported whether actual or potential and to make
appropriate recommendations or actions.
SECURITY DEPARTMENT
At present the security has a higher profile in the corporate world compared in the past.
Companies are looking for new ways to manage the risk and portfolio of the company. The
security department has widened to include shared responsibility for things such as reputation,
corporate governance and regulation.
The principal role of security department is to convince colleagues across the business
to deliver security through their everyday actions and decisions. The department is in the
business of change management rather than enforcement and works through trusted social
network of influence. The department is there to help the company to take risk rather than
prevent them and should therefore be at the forefront of new business development. The
department should never stand still or become fixed entities. In other multinational companies
its role is more concerned with the overall corporate resilience than traditional security.
SECURITY THREATS
Multi – dimensional threats to the National Security, corporate world and industrial
organizations have increased in many folds from international terrorism, communalism, thefts,
cyber and white collar crimes, bomb threats, natural and manmade disaster management thus
preventing all types of losses and adding to productivity, contrary to earlier notion that
expenditure on security was no return on investment.
To ensure security at industrial establishment, it’s very important to formulate a standard
security plan and organizational security policy. Proper selection of security agency and careful
integration of men and machines are the basic steps in ensuring ideal and all round security.
Industrial security should be planned at the conceptual or design stage of the plant or
establishment. There should be effective and strict rules for access of different regular sensitive
areas inside the industrial establishment. There should be a proper classification of different
department and access control systems with different level of access control should be installed
to prevent unauthorized entry of any unwanted persons. CCTV cameras at all entry and exit
points help security in keeping track the people moving in and out.
Along with all these preparation and security implementation, there should be a regular
security check and sudden audits to ensure the effectiveness of security facilities and devices.
Any mistakes or weakness in security system should be reported immediately to the security
department or management to deal with all such issues.
WHITE COLLAR CRIME
Emergence of white–collar crime, industrial espionage, sabotage, and computer crime
has made the task of protecting the assets intricate. Security is no longer an easy job but an all–
pervasive management functions of assets protection, crisis management and generation of
profit through loss prevention. In this scenario, there is urgent need to upgrade the knowledge
and skills of top level managers and the security professionals by familiarizing them with the
latest advances in the art of security technology and management.
A GREAT CONCERN
Security is of great concern for all the people in this world. Security is needed
everywhere at home, offices and at every small, medium or large enterprise. Industrial security
is great concern for all developing countries. Industrial growth generates more revenue and
employment opportunities. They are of great importance for overall progress of every country’s
economy.
However, with the rise of criminal activities, theft and terrorism the need for better
security is required. Employees working at these industries can give their best performance only
in completely secured environment. Therefore, for better growth of industry and economy, it is
the duty of the organization to ensure proper security to all its employees. Then only, employees
put his soul and mind together for increasing their productivity. It is only possible when there is
secure and healthy working environment.
LEGAL BASIS OF INDUSTRIAL SECURITY IN THE PHILIPPINES
1. Natural Authority – the highest is the law of self-preservation. By instinct, man naturally
reacts to protect himself, his family, his honor, freedom, liberty and property from
danger, threat or hazard. He does it personally and/or thru the help of others.
The Filipinos even before the coming of early Chinese traders were already
organized into tribes. Each tribe has its own chieftain but also of the members. The
inherent mechanism of self – preservation became the unwritten law of the early
Filipino’s to protect themselves and their property against the natural and manmade
hazards.
2. Constitutional Authority
a) The prime duty of the Government is to serve and protect people. The Government
may call upon the people to defend the State and, in the fulfillment thereof, all
citizens may be required, under constitutions provided by law, or to render personal
military or civil service. (Art. II Sec. 4 of the 1987 Philippine Constitution).
Although the defense of the State is the one contemplated here people being one
of the elements of the State is directly affected in whatever protection the state shall
receive from the government and the people. Take note also that all citizens who are
qualified, including the security guards, may be required by law to render personal
military or civil service. The service required of the citizen’s is personal.
b) No person shall be deprive of life, liberty and property without due process of law nor
shall any person be denied the equal protection of the laws. (Art. III Sec. 1 of the
1987 Philippine Constitution).
This means the life, liberty, freedom and property can only be taken from a
person after the observance of due process of law. Due process of law are of two
aspects: substantive and procedural. Daniel Webster in brief defines procedural due
process as “one which hears before it condemns, which proceeds upon inquiry, and
render judgment only after trial”. But if taking of life, liberty, freedom or property does
not fall within the framework of due process of law, available remedies under the law
should be resorted.
c) Private Property shall not be taken for public use without just compensation. (Art. III
Sec. 9 of the 1987 Philippine Constitution).
The Constitution protects not only ownership but also possession, enjoyment,
use and disposition of private property by their rightful owners subject to such
limitations imposed by law. In this regards, private property to be taken by the
government in its exercise of the power of the eminent domain must satisfy two
important conditions, namely: public use and just compensation.
d) The right of the people to be secure in their persons, houses, papers, and effects
against unreasonable searches and seizures of whatever nature and for any purpose
shall be inviolable, and no search warrant or warrant of arrest shall be issue except
upon probable cause to be determined personally by the judge after examination
under oath or affirmation of the complainant and the witness he may produce, and
particularly describing the place to be searched and the persons or things to be
seized. (Art. III Sec. 2 of the 1987 Philippine Constitution)
3. STATUTORY AUTHORITY
a. The Revised Penal Code – (Act no. 3815, as amended)
The applicable provisions of the Code on Crime against persons, Personal
Liberty and Security and Property have bearing on the security and protection of
one’s life, liberty, and property
b. Private Security Agency Law. (Republic Act. 5487 as amended)
This law governs the operation, administration of security agency, and activities,
qualifications, duties and licensing of security guards, watchmen and private
detectives. In short, it is the intention of this law to professionalize the security
services in order to upgrade the level of security protection.
c. Presidential Decree no. 11 (Amending R.A. 5487)
Presidential Decree no. 11 amended the Sec. 3 (d) which define Watchman or
Security Guard Agency, Sec. 4 who may organize a security or watchman agency
and the Sec. 18 of the penal provisions of Republic Act no. 5487.
d. Presidential Decree no. 100 (Amending R.A. 5487 and P.D. 11)
The following are amended by Presidential Decree no. 100. Further amended the
Sec. 3 (d) of R.A. 5487 which further defines the watchman or security guard or
Watchman or Security Guard Agency;
Further amended Sec. 4 by adding as the last paragraph thereof;
Amended the Sec. 5 and 8 of Private Security Agency Law by inserting before
the final proviso thereto;
Amended the Sec. 9 that provides employees need not be licensed;
Amended the Sec. 11 by adding as the second paragraph thereof; and amended
the Sec. 16 paragraph one, which provides for limitations and prohibitions.
e. Presidential Decree no. 1919 (Amending R.A. 5487, P.D. no. 11 and 100).
The following Sections are further amended:
Sec. 3 (d) of R.A. 5487as amended is further amended to expand the definition
of Watchman or Security Guard, Watchman or Security Guard Agency;
Sec. 18 of the Private Security Agency Law as amended is further amended by
providing a third paragraph thereof;
Paragraph 3 of Sec. 8 of R.A. 5487, as amended is further amended the fees to
be paid and bonds; and
Paragraph 1 of Sec. 16 of the Private Security Agency Law as amended is
further amended which provide the limitations and prohibitions of security agency
f. 2003 Implementing Rules and Regulations of R.A. 5487
DEFINITION OF TERMS
1. Security – Protection against any type of crime to safeguard life and assets by
various method and device.
2. Person – shall include not only natural but also juridical person such as single
proprietorships, partnership, corporations, companies, or associations, duly
organized and registered with the Securities and Exchange Commission and/or
the Department of Trade and Industry.
3. Private Security Services – shall include the act of providing or rendering
services to watch an establishment whether public or private, building,
compound/area or property, to conduct access control/denial in any form whether
physically, manually or scientifically by electronic monitoring systems, for the
purpose of securing such area/ property and at the same time ensuring safety
and protection of persons within such areas, to maintain peace and order within
such areas, to conduct private security training and/or to conduct investigation. It
shall also include the act of contracting, recruiting, training, furnishing or posting
any security guard, to do its functions or solicit individuals, businesses, firms or
private, public or government – owned or controlled corporations to engage
his/its service or those of his/its security guards, for hire, commission or
compensation thru subscription or as a consultant/trainer to any private or public
corporation.
4. Private Detective Services – shall include among others the act of providing
personal security protection, inquiry and information gathering, pre-employment
verification and individual background profiling, providing assistance in civil
liability and personal injury cases, insurance claims and fraud, child custody and
protection cases, for the purpose of assisting in gathering information leading to
determination and/or prevention of criminal act and/or resolution of legal,
financial and personal problems.
5. Private Security Industry – shall cover those in the legitimate business of
providing private security and detective services.
6. Private Security Guard (PSG) – sometimes called private security guard or
watchman shall include any person who offers or renders personal service to
watch or secure either a residence, business establishment or buildings,
compounds, areas or property, inspects/monitors bodily checks/searches
individual and/or baggage and other forms of security inspection,
physically/manually or scientifically electronic, including but not limited to, logging
concessions and agricultural, mining or pasture lands, transportation, for hire, or
compensation, or as an employee thereof, including any employee of the national
or local governments or agencies or instrumentality’s thereof and/or government
owned or controlled firm or corporations who is employed to watch or secure
government buildings, compounds, premises and other properties, other than
member of the Armed Forces of the Philippines, guards of the Bureau of Jail
Management and Penology, Municipal or City Jail guards and members of the
Philippine National Police or of any other law enforcement agency of the
government.
7. License to Operate (LTO) – is a License Certificate document, issued by the
Chief, Philippine National Police or his duly authorized representative,
authorizing a person to engage in employing security guard or detective, or a
juridical person to establish, engage, direct, manage or operate an individual or a
private detective agency or private security agency/ company security force after
payment of the prescribed dues or fees as provided in these Rules and
Regulations.
8. Company Guard Force (CGF) – a security force maintained and operate by any
private company/ corporation utilizing any of its employees to watch, secure or
guard its business establishment premises, compound or properties.
9. Government Guard Unit (GGU) – a security unit maintained and operated by
any government entity other than military or police, which is established and
maintained for the purpose of securing the office or compound and/or extension
of such government entity:
a. PNP as used herein shall mean the Philippine National Police, which was
organized pursuant to the provision of RA 6975 otherwise known as the
National Police Act of 1991.
b. SAGSD has used herein shall refer to the current PNP Civil Security Group
Security Agency and Guard Supervision Division or any other PNP Office that
may be designated later as the primary office for supervision of the
implementation of these rules and regulations.
c. PADPAO refers to the Philippine Association of Detective and Protective
Agency Operators, Inc., which is an association of all license security
agencies and company security forces.
10. Duty Detail Order – is a written order/ schedule issued by a superior officer
usually the private security agency/ branch manager or operations officer
assigning the performance of private security/ detective service duties.
11. Private Detective – shall mean any person who does detective work for hire,
reward or commission, other than members of the Armed Forces of the
Philippines, guards of the Bureau of Jail Management and Penology, municipal
or jail guards and members of the Philippine National Police or of any other law
enforcement agency of the government.
12. Private Security Personnel – shall be natural persons which private security
guards, private detectives, security consultants, security officers and others that
may be classified later, rendering/ performing security and/ or detective services
as employed by private security agency and/ or private firms.
13. Government Security Personnel – shall be natural persons which include
government security guards, detectives, security consultants, security officers
and others that may be classified later, except those of the Armed Forces of the
Philippines, Philippine National Police, Bureau of Jail Management and
Penology, Municipal or City Jail guards rendering/ performing security and/ or
detective services as employed by government entities.
14. Private Security Agency – shall mean any person association, partnership, firm
or private corporation, who contracts, recruits, trains, furnishes or posts any
security guard, to perform its functions or solicit individuals, businesses, firms or
private, public or government – owned or controlled corporations to engage his/
its services or those of his/ its security guards, for hire, commission or
compensation thru subscription or as a consultant/ trainer to any private or public
corporation whose business or transactions involve national security interest like
the operation and/or management of domestic or ocean vessels, airplanes,
helicopters, seaports, airports, heliports, landing strips etc., or as consultant on
any security related matter or to provide highly specialized security detective and
investigation services like gangway security, catering security, passenger
profiling, baggage examination, providing security on board vessels aircraft, or
other security needs that PNP SAGSD may approve.
15. Private Detective Agency – shall mean any person association, partnership,
firm or private corporation, who contracts, recruits, trains, furnishes or posts any
private detective, to perform its functions or solicit individuals, business, firms or
private, public or government – owned or controlled corporations to engage his/
its service or those of his/ its detectives, for hire, commission or compensation
thru subscription or as a consultant/ trainer to any private or public corporation or
as consultant on any detective related matter, or to provide highly specialized
detective and investigation services, or other detective needs that SAGSD –
CSG may approve.
16. License to Exercise Profession – shall mean any document issued by the
Chief, Philippine National Police or his duly authorized representative recognizing
a person to be qualified to perform his duties as private security or training
personnel.
17. Security Supervisor – is charged with directing the work and observing the
behavioral performance of the guard under his unit.
18. Security Guard Force – as a group of forces of men selected, trained or
organized into functional group for the purpose of protecting operational
processes from those disruption which impede efficiency or halt operation at a
particular plant, facility, institution or special activity.
19. Security Planning – is a corporate and executive responsibility. It involves
knowing the objectives of the security and the means and the method to reach
these objective or goal must then evolve.
20. Security Survey – is the process of conducting an exhaustive physical
examination and thorough inspection of all operation system and procedures of a
facility.
21. Security Inspection – is the process of conducting physical examination to
determine compliance with establishment security policies and procedures as a
result of security survey.
22. Security Hazard – is any act or condition which may result in the compromise of
information, loss of life, loss or destruction of property or disruption of the
objectives of the installation.
23. Security Education Program – a program given to employees of an installation
by lecture and other means pertaining to measures and safeguards to be taken
to protect the interest of the installation from loss, damage, sabotage, pilferage,
and other criminal acts.
24. Assets Protection Program – it is the sum total of protection scheme
encompassing the entire security spectrum, designed to eliminate, reduce or
controls threats, hazard, risk or dangers to company assets.
25. Security Cabinet – added protection of important vital papers, plans, data,
special correspondence, cash and other essential documents. Such as vault,
safe and file room
26. Security Alarm System – combination of compatible intrusion and detection
device so arranged and wired as to support one another
27. Security Lighting – the providing of sufficient illumination to areas during hours
of darkness to insure visibility and to act as a deterrent to the intruders
28. Physical Barrier – any physical means to impede, delay, or prevent intrusion
into a protected area.
29. Master Keying System – a system use in big installation whereby keys can
open groups of locks. This is possible by the use of interchangeable cylinder
cores in the locks
30. Remote Station System – a system where the alarm signal is transmitted to a
remote location manned and operated by an independent party or police
department.

You might also like