Professional Documents
Culture Documents
IISC
IISC
Module No. 1
Total Study Hours: 6hrs
Module Writer: PROF. RIZALINO D. FLORES III
Registered Criminologist
PHD in Criminal Justice w/ Specialization in Criminology
CONTENT
A. Definition of Security
Security – the state of quality of being secure, freedom from fear or danger, certainly to secure is
to make safe or be protected.
Active-Measures – these involves the installation of physical barriers, security lighting, use of
vaults, locks and others.
Passive-Measures – those that will deter man from committing such act of fear of being caught,
change in court or dismissed such as: security education, programs, investigations, fire prevention
seminars, personnel security checks etc.
1. Natural Authority - The highest law is the law of self-preservation. By instinct, man naturally
reacts to protect himself, his family, his honor, freedom, liberty and property from danger,
threat or hazard. He does it personally and/or thru the help of others.
2. Constitutional Authority
a. The prime duty of the Government is to serve and protect people. (Art II, Sec 4 of the
1987 Constitution).
1 | Page
b. No person shall be deprived of life, liberty or property without due process of law,
nor shall any person be denied the equal protection of the laws. (Art III Sec 1 of 1987
Constitution). This means the life, liberty; freedom and property can only be taken
from a person after the observance of due process of law.
c. The right of the people to be secure in their persons, houses, papers, and effects
against unreasonable searches and seizures of whatever nature and for any purpose
shall be inviolable. (Art III Sec 2 of 1987 Constitution)
3. Statutory Authority
a. The RPC (Act No. 3815, as amended) Applicable provisions of the Code on Crimes
Against Persons, Personal Liberty and Security and Property have bearing on the
security and protection of one’s life, liberty and property.
b. Republic Act No. 11917, (July 30, 2022) - An Act Strengthening the Regulation of the
Private Security Services Industry, Repealing for the Purpose, Republic Act No. 5487,
Entitled “Ac Act To Regulate The Organization and Operation of Private Detective
Watchmen or Security Guard Agencies”, As Amended
D. Industrial Security – is physical security as applied to business groups engaged in industries like
manufacturing, assembling, research and development, processing, warehousing, and even
agriculture. It is a form of physical security involving industrial plants and business enterprises
where the personnel, processes, properties and operations are safeguard. Use of protecting
barriers, and security lighting, personnel movement control, looks and key management, guard
forces, communication and electronic hardware are essential, aside from fire prevention and
control programs, emergency plans, industrial safety and security education programs.
2 | Page
3. Security Hazards
Man-Made Hazards – an act or conditions affecting the safe operation of the facility,
caused by human action, accidental, or intentional. It includes sabotage, espionage, pilferage, and
theft, disloyalty, disaffection, and subversive activity.
Natural Hazards – those caused by natural phenomena which cause damage, disturbance
and problems of the normal functioning of human activities, including security. It includes flood,
lighting storms, volcanic eruptions, high velocity winds, tidal waves, etc.
▪ Policies and Procedures – statements of security goals and the required means
of achieving them.
▪ Personnel – people to monitor, administer and implement the system.
▪ Barriers – access control, devices or structures.
▪ Equipment – detection, alarm, communication and control systems.
▪ Records – past incident reports, access records and transaction logs
ASPECTS OF SECURITY
Module No. 2
3 | Page
Total Study Hours: 6hrs
Module Writer: PROF. RIZALINO D. FLORES III
Registered Criminologist
PHD in Criminal Justice w/ Specialization in Criminology
● Explain the principle behind the use of barrier for security application
● Outline security line of defenses and recognize applicable access control system according to
industrial operation
● Identify security standards for installation of locks, lighting, alarms and fire protection system
CONTENT
A. Aspects of Security
a. Physical Security
b. Personnel Security
c. Information Security
Physical Security is a barrier or system placed between the potential intruder and the
matter to be protected. (Concentric Protection – lesser the intruder’s chance of success)
a. Natural Barrier – include mountains, cliffs, cannons, rivers, seas, marshes, dessert or
terrain difficult to traverse.
b. Man-Made Barriers – structural constructions like fences, walls, floors, roofs, grills, bars,
road blocks, or other physical means to deter or impede penetration
4 | Page
3. Deter- Visual evidence of a comprehensive security program will encourage
4. Delay – Thus facilitating apprehension of intruders
5. Assist - in the economical employment of guards
1. Perimeter Barrier (1st line of defense) – a medium or structure which defines the
physical limits of an installations or area to restrict or impede access thereto. It is any
physical barrier used to supplement the protection of an inside or outside perimeter:
iii. Building Wall – Masonry wall should have the same as the chain
linked and surrounded by the barbed wire top guard; if the height is
less than the prescribe additional chain linked as “toppings” is placed
to attain the minimum height requirement.
5 | Page
i. Gates and doors
ii. Sidewalk elevator
iii. Utilities opening
d. Signs and Notices – control signs should be erected where necessary in the
management of unauthorized ingress and preclude accidental entry. It
includes I.D., prohibitions and exclusive area signs.
a. Walls
b. Doors
c. Windows- Windows below 18 feet must be grilled
6 | Page
d. Roof Openings
e. Fire Escapes
a. ID System
b. Entry/Exit of Employees, Visitor, Suppliers, Customers and their vehicles
c. Restricted Areas
d. Communications System
e. Key Control
f. Emergency Plans
g. Guards
2. Areas to be Lighted
a. Sensitive areas
b. Parking lot
c. Entrances
d. Bothe sides of the perimeter barrier
a. Security lightning should be enable the guard to observe clearly the activities
around and inside the premises within his jurisdiction
7 | Page
b. In planning, high contrast between intruder and background should be
provided. When contrast is poor, increase intensity will improve guard’s
ability to see
c. Lighting boundaries and approaches, as well as the areas and structures, is
useful to discourage unauthorized entries and reveal identity of persons.
Good lightning should reveal well boundering areas, glaring to intruders and
adequate for the guard to observe his position.
d. Effective lightning should deter or discourage attempts to enter the premises
and detection was likely if entry is attempted.
e. If lightning at night cannot be provided due to impracticability, other means
of protection have to be made like additional guard post, roving and animal
guards.
8 | Page
a. Vandalism
i. Reduce effectiveness and tampering
ii. Wires should be mounted very high or protected with wire
mesh (8m/24ft)
iii. Provided with standby power supply
iv. Circuiting should be protected from the source to the lamp
b. Design
i. Shadows should be avoided
ii. Accessible for immediate maintenance
iii. Source are lock
iv. Design in a manner that not all will be put off at the same
time
G. Protective Alarms
Alarm is an aural or visual signal given by the annunciator to security when intruder
actuates device in protected at area. An annunciator is a visual or audible signaling device, which
initiates conditions of associated circuits.
a. Detection of fire
b. Detection of intrusion
c. Emergency notifications
9 | Page
d. Monitoring of equipment/facility condition
3. Alarm notifications
a. Sound (bell)
b. Lighting (fixed, flashing, rotating)
c. Public address system
d. Automatic telephone dialer
10 | Page
b. Operation of Intrusion Alarm System
a. User’s negligence
b. Poor installation services
c. Faulty equipment
11 | Page
H. Monitoring System (CCTV)
a. Monitoring System
i. Television camera
1. Features:
a. Pan
b. Tilt
c. Zoom
ii. Monitor/Recorder
iii. Connecting circuit
iv. Power Source
b. Purpose
i. Detection
ii. Deterrence
iii. Document
c. Operation
i. Local
ii. Remote
iii. Combine with other system such as video analytic, motion detector, facial
recognition and memory videos
A visitor is any person not regularly employed in a plant or concern. Strict precautions are
taken with visitor against pilferage, sabotage and other crimes. Plant visitors may and they can be
suppliers, promoters, collectors, customers, government inspectors, contractors, job-seekers,
group visitors, guided tours etc.
a. Types
1. Single Pass or Badge System - Pass is issued for permission to enter differing
in specific areas by letters, numerals, or colors e.g. green background of
12 | Page
current passes in the general area, or white pass with overprinted blue
symbols for a certain specific area.
2. Pass of Badge Exchange System- Multiple copies of passes are issued to an
individual with the same photograph. The individual exchange his badge for
another color or marking at the gate. Once inside, if he needs to enter a
restricted area, he exchanges it for one another color acceptable in that area.
b. Pass/Badge requirement
i. Tamper resistant
ii. Clear and recent photo of the bearer
iii. Photo of at least 1 inch square
iv. Vital statistics
v. Laminated
vi. Sturdy
vii. Color coded
viii. Signature
b. Traffic Control
13 | Page
b. Other Locks:
i. Padlock – A portable and detachable lock having a pivoted or sliding hasp which
possess through a staple ring, or the like and is made fast or secured.
ii. Combination Locks – A lock that requires manipulation of parts according to a
predetermined combination code of numbers or letters.
iii. Coded Lock - A type of lock that can be opened by inserting a coded card in a
slot in the lock, or by pushing the correct buttons on the surface of the lock.
iv. Electronic Lock – Type of lock that can be closed and opened remotely by
electronic means.
c. Key Control
a. One Level (Change Key) – All locks operated by change key only
and keyed different or alike or required. Each key operates its
own lock only, e.g. house, stores, cars, warehouses.
b. Two levels (Master Key) – All levels operated by change keys and
master key. Mater key operates all locks generally of one
building, e.g. small school apartment.
c. Three Levels (Grand Master Key) – All locks operated by change
key, master keys, and grand master keys. Grand master operates
all locks generally used in large buildings or a facility with several
buildings e.g. office buildings and hospitals.
d. Four Levels (Great Grand Master Key) – All locks operated by
change key, Grand master key and great grand master keys. Used
in great or large complex system and similar to three levels.
1. Record all keys issued and names of holders be meticulously made regardless of the
size of the establishment.
14 | Page
2. Storage key is important. Duplicate or spare keys should be stored in a securely
locked cabinet in a secure area.
3. Master keys should be issued on an absolute minimum number and be kept by an
individual responsible for locks and keys.
4. Regular checks should be made in employees with keys issued.
5. Issuance of keys and locks should be carefully controlled, and issuance should be on
a real-need basis.
6. Periodic rekeying should be considered as essential security safeguard just as
combination of safes are changed from time to time.
7. A key depository should be provided in a big plant. Supervisors taking keys should
be registered in a registry book.
15 | Page