Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 30

INDUSTRIAL SECURITY MANAGEMENT

By:

PROF. OSCAR GATCHALIAN SORIANO, RC


BSCrim, MSBA, MACrim, PhDCrim

===========================================================

Introduction

Security from a layman’s point of view refers to the


security guards whose main function is to protect an office,
building, installation or equipment against trespass, theft,
arson, and other inimical acts. As a security officer, the
job includes the implementation of a viable security
education program which will sell security measures to the
customer-clientele of the private policing activities. It
is also a must to improve the knowledge, and adopt an open
mind regarding the many faceted problems involved in
industrial security management.

What is a Security?

It is the state of quality of being secure; freedom


from fear or danger; assurance of certainty. To secure is to
make safe or be protected.

Types of Security

1. Physical Security

Is the broadest branch of security which is concerned


with the physical measures adopted to prevent unauthorized
access to equipment, facilities, materials and document and
to safeguard it from espionage, sabotage, damage and theft.
Physical security does not only cover types of security to
protect equipment, document, facilities and materials
against damage, sabotage or espionage. It also encompasses
protection of personnel from criminal act.
2

2. Communications Security

Is the protection resulting from the application of


various measures which prevent or delay the enemy or
unauthorized persons in gaining information through the
communication system.

3. Hotel Security

It is the protection of assets, guests, personal effect


and other properties in a hotel.

4. Bank Security

A specialized type of physical security in protecting


the assets, personnel and operation of a bank, with special
emphasis on the precaution and measures to safeguard the
cash and assets while in storage; in transit, and during
transactions.

5. Document Security

Is a physical security involving the protection of


documents and classified matters from loss or access by
unauthorized persons, damages, theft and compromise through
disclosure.

6. Personal Security

It is the protection of personnel, especially the


ranking officials of the company from any harm, kidnapping
and other criminal acts. VIP security is also a type of
personal security.

7. Crises Security

A part of VIP security involving hostage taking and


kidnapping of VIPs.

8. Industrial Security

It is a physical security applied to business groups


engaged in industries like manufacturing, assembling,
research and development, processing, warehousing and even
agriculture. It is a form of physical security involving
3

industrial plant and business enterprises where the


personnel, processes, properties and operations are
safeguarded. Use of protective barriers, and security
lighting, personnel movement control, locks and key
management, guard forces, communications and electronic
hardware are essential, aside from fire prevention and
control programs, emergency plans, industrial safety and
security education programs.

9. Operational Security

It is part of physical security that deals primarily


with the protection of processes, formulas, patents, and
other industrial and manufacturing activities from
espionage, infiltration, loss, compromise, or photocopying.

10. Other Special Types

This consists of air Cargo security, school security,


supermarket security, and personnel security.

What is a Security Hazard?

Is an act or conditions which results in a situation


conducive to a breach of the protection system and the
subsequent loss or compromise of defense information,
company secrets, or damage to personnel, property or
facilities.

Kinds of Security Hazards

1. Human Hazard

Are the acts or conditions affecting the safe operation


of the facility caused by human action, accidental or
intentional. It includes sabotage, espionage, pilferage and
theft, disloyalty, disaffection and subversive activity.

2. Natural Hazards

Are those caused by natural phenomena which cause


damage, disturbance and problems of the normal functioning
of human activities, including security. It includes floods,
4

typhoons, earthquakes, lighting storms, volcanic eruptions,


high-velocity winds, tidal waves, etc. It should be noted
that the real problems actually in industrial plants are the
human or man-made hazards, the most common of which are
pilferage, theft, arson, accidents through carelessness, and
sabotage.

Extent and Degree of Risks to Security will be Dependent on


the Following

1. Relative Criticality

It is the importance of the firm with reference to the


national economy and security.

2. Relative Vulnerability

It is the susceptibility of the plant or establishment


to damage, loss or disruption of operation due to various
hazards.

Types of Pilferers

1. Casual Pilferer

One who steals due to his inability to resist the


unexpected opportunity and has little fear of detection.

2. Systematic Pilferer

One who steals with preconceived plans and takes away


any of all types of items or supplies for economic gain.

What is a Perimeter Barrier?

It is a medium or structure which defines the physical


limits of an installations or area to restrict or impede
access thereto. It is any physical barrier used to
supplement the protection of an inside or outside perimeter.

Two General Types of Physical Barriers


5

1. Natural Barrier

Include mountains, cliffs, canyons, rivers, seas,


marshes, deserts or terrain difficult to traverse.

2. Man-Made Barrier

Are structural constructions like fences, walls,


floors, roofs, grills, bars, road blocks, or other physical
means to deter or impede penetration.

Types of Perimeter Barriers

1. Wire Fences

Is a type of perimeter barrier made of chain link


design with mesh openings not larger than two inches square,
and made of #9 gauge wire or heavier, minimum height of
which is 8 feet.

2. Building Wall

Masonry wall should have the same height as the chain


link and surmounted by the barbed wire top guards; if the
height is less than the prescribed, additional chain-link as
“topping” is placed to attain the minimum height
requirement.

3. Bodies of Water

It is an additional security measures, surrounding the


establishment.

Kinds of Perimeter Barrier Openings

1. Gates and doors, it must be guarded and locked.

2. Sidewalk elevators, it provides access to areas


within the perimeter barriers and should be locked or
guarded.

3. Utility openings, it may be composed of sewers,


air intakes, exhaust tunnels which penetrate the barriers
6

and which have cross-sectioned area of 96 sq. in. or more


should be protected by bar grills, etc.

4. Clear Zones, it is an unobstructed area maintained


on both sides of the perimeter barrier. A clear zone of 20
ft. or more is desirable between the barrier and extension
structures and natural covers which may provide concealment
or assistance to a person seeking unauthorized entry.

Additional Protective Measures

1. Top Guard

It is an additional overhang or barbed wire placed on


vertical perimeter fences facing upward and outward with a
45 degrees angle with three to four strands of barbed wires
spaced 6” apart. This will increase the protective height
and prevent easy access.

2. Sentry Stations

Normally provided at the main perimeter entrances to


secure areas located out of doors, and manned by guards on a
full time basis. Sentry Stations should be near at the
perimeter for surveillance at the entrance.

3. Guard Towers

Are house-like structure above the perimeter barriers.


It gives a psychological effect to violators.

4. Protection in Depth

In large open areas or ground where fencing or walling


is impracticable and expensive, warning signs should be
conspicuously placed. The dept itself is protection.
Reduction of access roads and sufficient notices to warn
intruders should be done. Use of animal guards and
intrusion devices can also be done.

5. Signs and Notices


7

Control signs should be erected where necessary in the


management of unauthorized ingress, and preclude accidental
entry, ID, prohibition, and exclusive areas signs.

Security Lightings

Security Lighting provides sufficient illumination to


areas during hours of darkness. Among its other purpose
are:

1. It improves visibility so that intruders can be


seen, identified or apprehended.

2. It gives psychological fear which serves as a


deterrent to thieves, pilferers, trespassers, and saboteurs.

3. It makes the routine work of guard easier of


identifying employees, vehicles, etc. during nighttime.

4. If placed in certain areas, may even reduce the


number of stationary guards, and instead, may require roving
patrol only at night.

Security Lightings Techniques

1. Security lighting should enable a guard to observe


clearly the activities around, and inside the premises
within his jurisdictions.

2. In planning, high contrast between intruder and


background should be provided. When contrast is poor,
increase intensity will improve guard’s ability to see.

3. Lighting boundaries and approaches, as well as the


area and structure is useful to discourage unauthorized
entries and reveal identity of persons. Good lighting
should reveal well boundaring areas, glaring to intruders
and adequate for the guard to observe his positions.

4. Effective lighting should: 1) discourage attempts


to enter the premise; and 2) detection were likely if entry
is attempted.
8

5. If lighting at night cannot be provided due to


impracticability, other means of protection have to be made
like additional guard posts, roving patrols and animal
guards.

Types of Security Lightings

1. Stationary Luminary

Most common type, consisting of series of fixed


luminous to light a given area continuously with overlap.
These two types are used on the entry gate of employees and
vehicles. It may either be:

1) Glare Protection Type

The intensity is focused to the intruder while the


observer or guard remains in the comparative darkness. The
lighting is toward the approach of an entrance to an
installation. Lights with reflectors increase glare.

2) Controlled Lighting

The width of the lighted-atop can be controlled


and adjusted to suit the security needs. The lighting is
focused sag on a pile of items rather than on the
background.

2. Stand-by Lighting

Similar to continuous lighting, in can be turned on


manually or by special devices or other automatic means,
when there is suspicion of entry.

3. Movable Lighting

Consist of stationary or portable, manually operated


search lights which may be lighted continuously during hours
of darkness or only as needed, and usually supplementary to
either of the first two types.
4. Emergency Lighting
9

A stand-by lighting which can be utilized in the event


of electrical failure, either due to local equipment or
commercial power failure.

Types of Light Lamps

1. Incandescent Lamps

Common light bulbs in which light is produced by the


resistance of a filament to electric current. For better
concentration of light, metal reflectors are used, and
directed on areas to be lighted.

2. Gaseous Discharge Lamps

Economical to use but take two or five minutes to light


which may be a disadvantage in industrial security lighting.
Examples are as follows:

1) Mercury-Vapor Lamps – blue green color light due


to the presence of mercury vapor.

2) Sodium-Vapor Lamps – emits yellow light, placed


usually in areas to connote special concern, like bridges
and streets.

3) Quarts Lamps – very bright light.

Protective Alarms

Alarm, aural or visual signal given by the annunciator


to security when intruder actuates device in a protected
area. An annunciator is a visual or audible signaling
device which initiates conditions of associated circuits.

Basically, alarm system was designed to alert security


personnel to consummated or attempted intrusions into an
area, building or compound. Each type of alarm is activated
in the event that an intruder tampers with the circuitry, a
beam, or radiated waves; intrusion alarm can be electrical,
mechanical, or electronic. Alarms are also used for fire,
smoke or other emergencies and presence of other hazards.
10

Types of Protective Alarm Systems

1. Central Station System

Several separate compounds tie their alarm system to a


central station so that in case of need, the central station
calls for assistance to the police, fire department,
hospital or with other government assisting units.

2. Proprietory System

Similar to the central station type except that the


proprietory console is located inside the subscriber’s
installation who owns or base the system.

3. Auxillary System

An installation owned system which is a direct


extension of the local enforcement agency and/or fire
department by special arrangement.

4. Local Alarm System

Consist of ringing up of visual or audible alarm near


the object to be protected. In case of alarm, response will
be made by the local guards and other personnel within sight
or hearing.

Desirable Characteristics of Intrusion Alarm System

Intrusion alarm devices are designed to “detect” and


not to prevent criminal acts and should be used normally as
an adjunct and not a replacement of the human guard forces.

The primary considerations on the choice of a


particular alarm system include stability, durability and
reliability. Desirable characteristics, furthermore, should
include:

1. A detection unit should initiate the alarm upon


intrusion of a human being in the area or vicinity of the
protected object.
11

2. Panel board central annunciator or operating


console monitoring activities should be removed at all
times. Transmission can be by physical wires or by radio.

3. An annunciator console indicating the audible


and/or aural signal and the specific location of incident so
that proper action can be made by security and other units.

4. Fail-safe features give alarms in the annunciator


when something is wrong with the system.

5. System should be difficult to tamper or render


ineffective by outsiders, competitors or saboteurs.

Operation of Intrusion Alarm System

Intrusion devices emit certain signals to the


annunciator and operate on the following principles:

1. Breaking an Electric Circuit

In a building or compound, all possible points of entry


can be wired by using electrically charged strips of tinfoil
or wire. Any action that will move the foil or wire breaks
the circuit and activate an alarm. The alarm can be local,
or near the area where circuit is broken, or can be
monitored in a distant annunciator or both.

2. Interruption of a Light Beam

This system uses a photo-electric cell or the “electric


eye” which operates on the principles of light rays. In
this system, an invisible light beam is transmitted to a
special receiver. An infrared filter over the light source
makes the beam invisible to intruders. The source of beam
is hidden, and the rays criss-cross a room by the use of
reflecting mirrors until they contact sensitive cells in the
receiver. This device terminates by wire to a console in
the security control room. When an intruder breaks the
beam, an alarm is activated.

3. Detection of Sound and Vibration


12

This can be utilized effectively to safeguard enclosed


areas vaults, safes, storage bins, file rooms, warehouses,
and similar enclosures. Supersensitive tiny microphones are
embedded in the walls, ceilings and floors of the enclosure
to be protected by sound or vibrations. These microphones
distributed evenly can detect sound or vibrations of sound
caused by attempts to force entry into the protected area.

4. Space, Motion and Vibration

These systems usually derive their operating principle


from a physical phenomenon known as “Doppler Effect.”
Constant sound waves in a cubicle disturbed by an object
will cause change of frequency and wave motion thereby
causing an alarm to trigger.

5. Electromagnetic Fence

Is an electronic fence consisting of 3 to 5 strands of


wire spaced from 9 to 24 inches above one another which
serves as an antenna, a monitor panel, and an electric
circuitry. When power is put on, an electro-magnetic field
is set among the wires from the top to the ground. An
intruder about two feet from this field will trigger an
alarm. The fence is zoned to pinpoint areas of intrusion to
a monitor located in the operation room of security. This
system is suggested to be located inside the chain-link
fencing to minimize nuisance alarms caused by animals,
debris blown by the wind, and harmless trespassers.

Security Communication System

In any plant or industrial complex, inter and intra


communications is indispensable not only in security work,
but also in the plant operation itself. It is a good
management policy that security should have its own
communication line officers within the installations and to
the outside.

The security force needs a communication landline to


call local law enforcement agencies, the fire department,
ambulance, mobile patrol and other governmental agencies.
Telephone is also needed to contact the agency’s main office
or security force outposts. The following are some means of
13

communication that can be a useful part of the protective


system: local telephone exchange, commercial telephone
service, inter-communication, two-way radios for security,
i.e., base, portable, and mobile, security supervising
system and “beep-beep,” paging and recall system, “bull-
horns” or megaphones, and amplifier or loud speaker system.

Identification and Control

Identification and control objective include precluding


unauthorized entry and facilitating authorized personnel to
enter specific areas, as well as preventing the introduction
of material components of harmful materials,
misappropriation, pilferage of installation properties and
recorded classified information. Identification and control
objectives are achieved by:

1. Initially determining who has valid right in the


areas;

2. Limiting access to those persons who have a right


and need to be there;

3. Establishing procedures for positive


identification of persons authorized access into areas;

4. Issuing passes or badges to those authorized to


enter restricted areas;

5. By using access list, identification codes, and


duress code.

What is a Pass System?

A pass or badge is issued by security for personnel to


be admitted in the installation. This system precludes those
visitors with escorts and personnel in the access list. The
pass system is for general use and not for restricted areas
like exclusive, limited and controlled areas. The following
are systems recommended:

1. Single Pass or Badge System


14

Pass is issued for permission to enter different


specific areas by letters, numerals, or colors. For example,
green backgrounds of current passes in the general area, or
white-pass with overprinted blue symbols for a certain
specific areas.

2. Pass of Badge Exchange System

Multiple copies of passes are issued to an individual


with the same photograph. The individual exchange his badge
for another color or numeral at the gate. Once inside, if he
needs to enter a restricted area, he exchanges it for one of
another color acceptable in that area.

Visitor, Property, Movement and Vehicle Control

A visitor is any person not regularly employed in a


plant or firm. Strict precautions are taken with visitor
against pilferage, sabotage and other crimes. Plant visitors
can be suppliers, promoters, collectors, customers,
government inspectors, contractors, job-seekers, group
visitors, guided tours, and others.

Passes or badge may be issued to visitors indicating


area to be visited and escorts requirements. Likewise,
movement of packages should be controlled, closely
inspecting all incoming and outgoing packages, with
inspection to all the vehicles. Trucks entering and leaving
the area should be inspected. Trucks have been found to have
special components, items placed inside the spare tire, tool
boxes, and even in fake gasoline tanks.

What is a Protective Lock?

A protective lock is defined as a mechanical,


electrical, hydraulic, or electronic devised designed to
prevent entry to a building, room, container or hiding
place.

Four General Groups of Key Locks

1. The Warded Lock


15

The underlying principle is the incorporation of wards


or obstructions inside the lock to prohibit a key from
operating the bolt unless the key has corresponding notches
cut in it so that it will pass the wards.

2. The Lever Tumbler Lock

Each lever hinges on a fixed point and is held down


against a stop by the pressure of a flat spring. Each lever
has a cut in tilt, and all the gates can be located at
different places. When the proper key is inserted and
turned, notches of various depths raise all the lever
whatever distance is required to line up all the gates
exactly opposite the fence on the bolt. When the key is
turned, a portion of the key catches the bolt and slides it
back. Because there is no resistance to the post entering
the gate, the lock is opened. If the key is not the correct
one and if even one gate does not line up to let the post
slide into it, the lock cannot be opened.

3. The Disc Tumbler Lock

Also known as the woofer tumbler type, has flat metal


tumblers with open center fitted into slots in a plug which
is in turn fitted into a lock case. When the plug is turned,
it activates a cam. The key is removable at 90 to 180
degrees and may be rotated either right or left. The disks
are under spring tension forcing them partially out of the
plug into recesses in the case thereby preventing the
cylinder from turning. Rectangular openings in the disk
tumblers are out into various longitudinal dimensions
requiring corresponding cuts in the key to position the
tumblers. Proper unlocking positioning of the tumblers is
accomplished when they are withdrawn from the recesses in
the body of the lock to position flush with the plug,
allowing the plug to turn the cam which causes the
withdrawal of the bolt.

4. Pin Tumbler Lock

The pin tumbler mechanism depends for its security, on


a number of round pin or tumblers operating on a cylinder.
Each tumbler or pin is divided into two parts: the upper,
which is flat on both, is called the driver; the bottom part
16

called the pin is rounded or slightly pointed on the lower


end to fit the grooves or cuts in the key. A coil spring
above each driver constantly forces it downward. When the
right key is inserted, the various depths of the cuts in the
key compensate for the different lengths in the pins. The
dividing points between each of the two pins segment are
brought into line with the top of the plug, and allowing it
to rotate in the cylinder. When the plug turns, it carries
with its cam which activates the bolt and other lock
mechanism.

What is a Padlock?

A portable and detachable lock having a pivoted or


sliding hasp which posses through a staple ring, or the
like and is then made fast to secured.

What is a Combination Locks?

Is a lock that requires manipulation of parts according


to a predetermined combination code of numbers of letters.

What is Key Control?

The management of keys in a plant or business


organization to prevent unauthorized individual access to
the keys.

What is a Master Key?

It is a special key capable of opening stories of


locks. This key is capable of opening less number of locks
than the grand master.
What is a Master Keying System?

A system used in big installations whereby keys can


open a group or groups of locks. This is possible by the use
of interchangeable cylinder cores in the locks. Using locks
with the same key in a facility is not master keying or the
use of a pass key. It is used to operate an inexpensive lock
17

by moving it in the key hole until it catches a locking belt


and unlocks the mechanism.

Master keying is when a lock operates on a master key


plus an individual or changes key. Master keying is made
possible due to the development of interchangeable cylinder
cores. In matters of seconds, keys and lock combination can
be changed, and this is done by the use of a “control key”.
With this key, all the cores in a locking system can be
changed rendering the existing keys not usable.

Levels of Control in the Master Keying Plan

1. One-Level–Change Key

All locks re operated by the change key only and the


keys are different or alike or required. Each key operates
its own lock only. Examples are the houses, stores, cars,
warehouses.

2. Two-Levels–Master Key

All levels are operated by change keys and master key.


Master key operates all locks generally of one building.
Example: small school, apartment.

3. Three-Levels–Grand Master Key

All locks are operated by change key, master keys, and


grand master keys. Grand master key operates all locks
generally used in large buildings or a facility with several
buildings. Example: office buildings, hospitals.

4. Four-Levels–Great Grand Master Key

All locks are operated by change key. Grand master keys


and great grand master keys. Used in great or large complex
system and similar to three levels.

5. Five-Levels–Great-Great Grand Master Key


18

All locks operated by change key, master key, grand


master key and great grand master key , and great great
grand master key. Example: big universities, complexes,
large industrial complexes.

Pointers for Effective Locks and Key Control

1. Records of all keys issued and names of holders


must be meticulously made regardless of the size of the
establishment.

2. Storage key is important. Duplicate or spare keys


should be stored in a securely locked cabinet in a secure
area.

3. Master key should be ensued on an absolute minimum


number, and must be kept by an individual responsible for
locks and keys.

4. Regular checks should be made in employees with


keys issued.

5. Issuance of keys and locks should be carefully


controlled, and issuance should be on a real-need basis.

6. Periodic re-keying should be considered as


essential security safeguard just as combination of safes
are changed from time to time.

7. A key depository should be provided in a big


plant. Supervisors taking keys should register in registry
book.

What is Maison Keying?

The issue of key to open the main entrance and the


office.

What is a Coded Lock?


19

This is a type of lock that can be opened by inserting


a coded card in a slot in the lock, or by pushing the
correct buttons on the surface of the lock.

What is Electronic Lock?

It is a type of lock that can be closed and opened


remotely by electronics means.

Types of Business Records

1. Class 1 – Vital Records

Includes the records that are irreplaceable; records


wherein reproduction of which does not have the same value
as the original; records needed to recover cash to replace
buildings, equipments, raw materials, finished products and
records needed to avoid delay in restoration of production,
sales and services.

2. Class II – Useful Records

Includes records which loss might cause inconvenience


but could be readily replaced and which would not in the
meantime present an insurmountable obstacle to the prompt
restoration of the business.

3. Class III – Important Records

Include records, the reproduction of which will involve


considerable expense and labor, or considerable delays.
Operating and statistical records belong to this class as
well as those to maintain check on efficiencies, operating
costs, etc. Also included are contracts, customer credit
files, sales records, design in process development, records
of experiments in progress, etc.

4. Class IV – Non-Essential Records

Are the daily files, and routine in nature so that even


if lost or destroyed, will not affect operation and
administration of the plants or firms.
20

What is a Safe?

A metallic container used for the safekeeping of


documents or small items in an office or installation. Safes
can be classified as either robbery and/or burglary
resistant depending upon the use and need. Many safes are
required to be installed in steel-clad concrete blocks to
prevent being carted away by the thieves and robbers.

What is a Vault?

A heavily constructed fire and burglar–resistant


container usually a part of the building structure used to
keep and protect cash, documents, and negotiable
instruments. Vaults are bigger than safes but smaller than
security file rooms.

What is a File Room?

A cubicle in a building constructed a lighter than a


vault but of bigger size to accommodate limited people to
work on the records inside.

What is a Security Survey and Inspection?

A fact-finding probe to determine the plant’s adequacy


and deficiency in all aspects of security, with the
corresponding recommendations.

What is a Survey?

The term applied to the first detailed “look-see”


conducted by a team.

What is Inspection or Follow-up Survey?


21

The term used for succeeding surveys after the initial


survey.

What is a Supplemental Survey?

Conducted when there is business reorganization with


corresponding changes in objectives and physical lay-outs of
the complex.

What is a Special Survey?

Directed by the management, if the initial survey


appears to have left certain portions or aspects involving
security due to change in policy or operations that will
greatly affect the total security picture.

What is Entrance Conference?

A conference or dialogue between the survey team and


the management, and officials of a plant before security
survey is conducted.

What is Exit Conference?

A conference similar to entrance conference and it is


done after the completion of the security survey.

Who Performs Security Survey & Inspection?

Security survey is performed by qualified security


experts who can be from the organization or outsiders
contracted to do the job. Recommendation will fall into
three categories: human guard, equipment, and procedures.

What is a Security Education Program?

The exposure and teaching of employees on security and


its relevance to their work.
22

What are the Objectives of Security Education Program?

1. Guidance for all supervisory and executive levels


of the organization;

2. A mandatory indoctrination on security for all new


personnel before their assignment to their respective jobs;

3. Development of high-degree of security


consciousness among the selected supervisors and other key
personnel in a program that should be containing and
supported by top management;

4. A down-the-line security program aimed at


installing consciousness and dedication through
demonstration, lectures, motivations, and suggestion.

5. To let all the employees informed that they all


belong to the organization and that non-awareness and non-
concern to the security program is tantamount to disloyalty.

6. To develop discipline, loyalty and belongingness.


These attributes when fully imbued will result in
effectiveness and efficiency.

Definition of Terms

1. Access List

An authenticated list of personnel given to security


allowing entry to a compound or installation or part
thereof.
2. Badge System

A system for personnel movement and control whereby


badges or identification are issued to personnel upon
entering an installation. Visitors are also issued temporary
badges when entering the installations.

3. Background Investigation

A check made on an individual usually seeking


employment through subject’s records in the police files,
23

educational institutions, places of residence and former


employers.

4. Complete Background Investigation

Same as B.I but more comprehensive to include places of


residence since birth.

5. Controlling

The regulation of many different aspects of business


activity. Controls are needed to standardize quality and
performance, protect assets, measure performance, balance
plans and programs, and motivate individuals.

6. Controlled Area

An area near or adjacent to limited or exclusive areas


where entry is restricted.

7. Coverage Factor

The minimum number of directions from which each point


in the area should be lighted depending upon the use of the
area.

8. Doppler Effect

A physical phenomenon that causes frequency shift if an


object moves in an area permeated by radio frequency
signals. This change in certain types of alarms activates a
signaling unit.

9. Dry-run

Practical test or exercise of a plan or any activity to


test its validity; it is also an operational readiness
exercise.

10. Duress Code

A type of code system so that security personnel when


forced by armed men to enter an installation can give alarm
24

by the use of certain words in casual conversation with


other personnel in the installation.

12. Exclusion Area

A restricted area containing materials or operation of


security interest.

13. Fail-Safe

A term applied to a device or system that in the event


of failure of a component—the incapacity will be signaled.

14. Restricted Area

Any area, access to which is subject to special


restriction control.

15. Peterman

A term used in England for lock pickers, safecrackers,


and penetrators of restricted rooms or areas.

Important Factors on Security Survey

1. Surveys must be exhaustive and complete.

2. Hazards must be identified with specific


recommendations for elimination, neutralization or
reduction.

3. Deficiencies found should be described in detail,


and if possible with photos, sketches, diagrams, maps and
other explanatory notes.
4. Early surveys should be reviewed so that the
current survey will determine the improvement in the former
deficiencies.

5. Recommendations should be consistent with the


current situations, facilities, resources available, and
most of all concomitant with the organization’s objectives
and goals. Time-phasing of the recommendations should be
also recommended especially on execution.
25

The Security Guard

The key element in the security survey system of a


plant or installations is the human guard. Without this
human element, all the mechanical, electrical, and
electronic protective aids, as well as security techniques
would be worthless. It is the human guard, as a part of the
security enforcement medium, who contributes the thought
processes and all the human senses to the security system.
The electronic device may sound the alarm, the television
camera may spot the culprit, and the mini-computer may
trigger the red button, but it is the guard responds and
initiates the necessary action.

Procedures in the Selection of Guards

The selection of the guards must be done with care and


meticulousness. The guard occupies an important slot in the
whole security system. Such a guard, to be effective and
useful, must be physically able, mentally alert, morally
responsible, reliable, and must be stable under pressure.
Above all, he must be responsive to his work to a point of
dedication.

The Company and the Contract Guards

There are two different ways in which security guards


are hired or employed. Those who are hired directly under
the payroll of an employer to protect the employer’s
property are called company guard, or “in-house” guards, and
they are considered employees of that company. Government
guards are included in this category.
Other individuals or entities prefer to avail the
services of an outside firm providing security guards on
contract basis. These firms are the private security
agencies, specializing in providing trained security guards.
The security guards employed under contract are employees of
the agency.

In the local setting, there are more contract agency


guards than company or government guards. Their jobs are
26

all basically the same, the only difference are their


employers.

There are more contract guards from private security


agencies hired by government entities and privately owned
companies or corporations for the reasons that it is more
practical, less expensive, and with better trained
personnel.

What is Republic Act No. 5487?

This is an “Act to Regulate the Organization and


Operation of Private Detective, Watchman or Security Guards
Agencies” or the “Private Security Agency Law,” approved and
took effect on 13 June 1969, as amended by PD No. 11, dated
03 October 1972, PD No. 100, dated 17 January 1973, PD No.
1919, and EO No. 393, dated 10 May 1972.

Who is In-Charge with the Implementation of RA No. 5487?

The Chief, Philippine National Police (C, PNP) through


the SAGSD, CSG or the former Supervisory Office for Security
and Investigative Agencies, Civil Security Unit (SOSIA, CSU)
as provided by Sec. 35, RA No. 6975, in close coordination
with PADPAO, Inc.

SAGSD is an administrative support unit of the PNP


which is in charge with the supervision, direction and
control of all Private Security Agencies (PSA) and Private
Detective Agencies in the country. The Group Director (CG,
CSG) acts in the name of the C, PNP on matters, duties, and
powers delegated by him to the latter.

Who are the Watchmen or Security Guards?

They are any persons who offers or renders personal


service to watch or secure either residential or business
establishment, or both, or any building, compound, or area,
including, but not limited to, logging concessions,
agricultural mining or pasture lands, for hire or
compensation, or as an employee thereof, including any
employee of the national or local government or any agency
27

or instrumentality thereof and of government-owned or


controlled firms or corporations, who is employed to watch
or secure government buildings, compounds, premises and
other properties other than members of the Armed Forces of
the Philippines, guards of the Bureau of Prisons, Provincial
and City Jail Guards, and members of city and municipal
police forces.

Who are the Private Detectives?

A private detectives are any persons who are not a


member of a regular police agency or the Armed Forces of the
Philippines who does detective work for hire, reward, or
commission.

What is a Private Detective Agency?

A PDA is any person who for hire or reward or on


commission, conducts or carries on or holds himself out as
conducting or carrying on a detective agency or detective
service.

What is a Private Security Agency?

Any person, association, partnership, firm or private


corporation, who/which recruit, trains, furnishes, or
employs any watchman or security guard, or solicits
individual, business firm, private, public or government-
owned or controlled corporation to engage his/its watchmen
or security guards.

What is a Company Security Force?

It is a security force maintained and operated by any


private company/corporation for its own security
requirements.

What is a Government Security Unit?


28

It is a security unit maintained and operated by any


government entity other than military and/or police, which
is established and maintained for the purpose of securing
the office or compound and/or extension of the government
entity.

Who May Organize and Maintain PSA and PDA?

Any Filipino citizen or a corporation, partnership, or


association, one hundred percent of which is owned and
controlled by Filipino citizens may organize and maintain a
private security agency or private detective agency.

Basic Requirements of Operator or Manager of PSA and PDA

The operator or manager of an agency including managers


of branch offices, must be a Filipino citizen, shall not be
less than 25 years of age, a college graduate and/or a
commissioned officer in the inactive service or retired from
the Armed Forces of the Philippines or the Philippine
National Police, or graduated/taken a course in concepts and
methods in Industrial Security and Security Management
and/or must have adequate training or experience in security
business, of good moral character, not having been convicted
of any crime involving moral turpitude and not suffering
from any of the following disqualifications:

1. Dishonorably discharged or separated from the


Armed Forces of the Philippines or Philippine National
Police or separated for cause from any government entity or
government-owned or controlled corporations;

2. Being mentally incompetent, being physically


unfit, addicted to the use of narcotic and/or prohibited
drugs and/or substances, and habitual drunkard or alcoholic.

6. Elective or appointive government employees who


may be called upon on account of the functions of their
respective offices in the implementation and enforcement of
the provisions of RA 5487, and any person related to such
government employees by affinity or consanguinity in the
third civil degree shall not hold any interest, directly or
indirectly in any security guard or watchman agency on
29

account of the functions of their respective offices in the


implementation and enforcement of the provisions of RA 5487
as amended, and the rules and regulations implementing the
Private Security Agency Law.

Person Exempted from the Pre-licensing Training

1. Veterans and retired military/police personnel or


honorably discharged military/police personnel possessing
all the qualifications mentioned shall be exempted from pre-
licensing seminar which is a requirement for the issuance of
license to exercise profession as a security guard;

2. Graduates of ROTC advance/basic, and/or its


equivalent in the AFP, CAFGU/CHDF, or its equivalent in the
PNP. Training graduates shall be exempted from the required
basic licensing seminar.

What are the Qualifications of a Private Detective?

No person shall be licensed as a private detective,


unless, in addition to the initial qualifications, shall
possess the following:

1. Holder of a baccalaureate degree of Bachelor of


Law, or

2. Holder of a degree of Bachelor of Science in


Criminology, or

3. Graduate of a Criminal Investigation Course


offered by the then PC/INP or the NBI or any police training
school or detective training with authorized/recognized
training center for security guard.

4) Advance ROTC/CMT graduates.

What are the Basic Requisites in Applying for License?

1. Any person possessing all the qualifications and


none of the disqualifications, may apply for a license or
30

license certificate to engage in the occupation, calling or


employment as certified guard or private detective.

2. Any person qualified under the rule to engage in


business of private security agency or private detective
agency may file a license to operate.

3. Applicants for Private Security Agency license to


operate shall be required to present a minimum
capitalization of P1,000,000.00 and a minimum bank deposit
of P500,000.00 in order to start its business operation.

What are the Qualifications of Security Officer?

No person shall be licensed as a security officer


unless he has the following qualifications: Filipino
citizen, holder of baccalaureate degree, physically and
mentally fit, has graduated from security officer training
course, retired personnel of the PNP or AFP, and must not
possess any disqualifications.

Summary Power of the Chief, PNP as Provided by RA No. 5487

The Chief, PNP may at any time suspend or cancel the


licenses/permits of private watchman/detective or security
guard agency found violating any of the provisions of RA
5487, as amended, and the Rules and Regulations promulgated
by the Chief, PNP pursuant thereto. The Chief, PNP upon
prior recommendation of PADPAO as concurred by the Director
CSG through SAGSD, may refuse issuance or renewal of
license/permit to operate to any security agency and/or
security guard summarily found to have violated the
provision of RA 5487 and its implementing rules and
regulations.

You might also like