Lea102 Cont Fina Coverage

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

Qualifications for Security Officer

1. Filipino citizen;
2. Holder of a Baccalaureate Degree;
3. Physically and mentally fit;
4. Has graduated from a Security Officer Training Course or its equivalent

Qualifications of Security Consultant


1. Filipino citizen;
2. Physically and mentally fit;
3. Holder of Master’s degree either in Criminology, Public Administration, MNSA,
Industrial
Security Administration, or Law
4. Must have at least ten (10) years’ experience in the operation and management of
securitybusiness.

Private Detective
-Any person who does detective work for hire, reward or commission, other than
members of the AFP, BJMP, PNP or any other law enforcement agencies.

Qualifications of A Private Detective

1. Filipino citizen;
2. Physically and mentally fit;
3. Holder of the baccalaureate degree, preferably Bachelor of Laws or Bachelor of Science
in criminology;
4. Graduate of a Criminal Investigation Course offered by the PNP or NBI or any police
training school, or a detective training in any authorized/recognized training center;
5. Advance ROTC/CMT graduate or its equivalent

Disqualifications

1. Having previous record of any conviction of any crime;


2. Having previous record of any conviction of any offense involving moral turpitude;
3. Having been dishonorably discharged or separated from employment or service;
4. Being a mental incompetent;
5. Being addicted to the use of narcotic drug or drugs, and
6. Being a habitual drunkard
7. Dummy of a foreigner

Moral Turpitude

-It is an act of baseness, vileness or depravity in the private and social duties which a
man owes to his fellowmen or to society in general, contrary to the accepted and
customary rule of right and duty between a man and man.

Conduct that is considered contrary to community standards of justice, honesty and good
morals. Examples. Rape, Forgery, Robbery
Types of Security Guard Force

1. Company Guard Force – security force maintained and operated by any private
company/corporation utilizing any of its employees to watch secure and guard its
establishment.
2. Security Agency service – security guard belonging to the privately licensed agency
(contractual basis);
3. Government Guard Forces –security unit maintained and operated by any government
entity other than the military or police.

Possession of Firearms

1. One (1) firearm for every two (2) security guards;


2. Private security agency/private detective agency/company security force/government
security force shall not be allowed to possess firearms in excess of five hundred (500)
units.
3. Shotguns not higher than 12 gauge
4. Weapons with bores not bigger than cal .22 to include pistols and revolvers with bores
bigger than cal .38.

REMINDER! Security guards are considered as force multiplier, they were given
the
authority to carry firearms. Such authority comes with great responsibility.
Exemptions: in areas where there is an upsurge of lawlessness and criminality as
determined by the Chief PNP, Regional Office or their authorized representative, they may
be allowed to acquire, possess and use high powered firearms.

Numbers of security personnel to be maintained to secure regular licenses to operate

1. Private Security Agency – minimum of two hundred (200) licensed private security
personnel and a maximum of one thousand (1,000).

2. Company Guard Force/Private Detective Agency – minimum of thirty (30) and a


maximum of One thousand (1,000).

Limitation in the carrying of firearms


1. No firearm shall be borne nor be in the possession of any private security personnel
except when in actual performance of duty, in the prescribed uniform, in the place
and time so specified in the Duty Detail Order (DDO).
2. Shall be carried only within the compound of the establishment where he is
assigned to guard.
3. While escorting big amount of cash or valuable outside of its jurisdiction or area of
operation, private security agency shall issue an appropriate Duty Detail Order to
the security personnel concerned.
Duty Detail Order (DDO) – is a written order/schedule issued by a superior officer usually
the private security agency/branch manager or operations officer assigning the
performance of private security/detective services duties.
DDO for the purpose of post duties not requiring transport of firearms outside of
the physical compound or property of a client or client establishment shall be issued for
not more than a thirty (30) days duration

Classification of Training and Its Duration


1. Basic Security Guard Course (Pre-Licensing Course) – 150 hours;
2. Re-Training Course- 48 hours;
3. Security Officers Training Course – 300 hours
4. Basic Security Supervisory Course – 48 hours
- All Licenses to Operate have a validity of Two (2) years;
- All applications for renewal of License to operate (LTO) shall be filed at least sixty
(60) days before the expiry date of LTO;
- No application shall be approved unless a certification is issued by FED-CSG to
the effect that all licenses of firearms of the agency are updated/renewed for at least
one (1) year forthcoming during the validity of the renewed LTO.

Approval, Cancellation, Suspension of LTO Chief PNP


-Approval of New Regular LTO
-Cancellation of Regular LTO
-Re-instatement of Regular LTO
-Suspension of Regular LTO

Director Civil Security Group


- Renewal of Regular LTO
- Approval of Temporary LTO
- Reversion of Regular to Temporary LTO
- Cancellation of Temporary LTO
- Suspension of Temporary LTO

Surety Bond
Agency with 1 -199 guards – P50,000.00
Agency with 200-499 guards – P100,000.00
Agency with 500-799 guards – P150,000.00
Agency with 800-1000 guards – P200,000.00

Stocking of Ammunition
1. Stocks of ammunition in the agency shall not exceed fifty (50) rounds of ammunition
per unit of duly licensed firearms.
2. Individual issue to each security guards shall be limited to twenty-five (25) rounds
for every security guard.

Grounds for the Confiscation of Firearms of Security Guard


1. When the firearm is about to be used in the commission of a crime;
2. When the firearm is actually being used in the commission of a crime;
3. When the firearm has just been used in the commission of a crime;
4. When the firearm being carried by the security guard is unlicensed or a firearm is
notauthorized by law and regulation for his use;
5. When the confiscation of the firearm is directed by the order of the court;
6. When the firearm is used or carried outside the property, compound or
establishmentserviced by the agency without proper authority; or
7. When a security guard does not possess any license to exercise his profession.
In all the above cases, the confiscating officer shall inform immediately the agency
concerned.

Revocation of License to Possess Firearm


1. Failure to submit any issued firearm for verification as required;
2. Carrying firearms by security personnel without appropriate Duty Detail Order;
3. When the firearm serial number has been duplicated on another firearm or using
onefirearms license for more than one firearm other than those stipulated in the
license;
4. Carrying of firearms outside of the place stated in the permit or in places prohibited
underthe law;
5. When the firearm was reported lost.

Security Personnel Ranks, Positions, Staffing Pattern and Job Description

1. Security Management Staff

1. Security Director (SD) –Agency Manager/Chief Security Officer


– responsible for the entire operation and administration/management of the
security agency.
2. Security Executive Director (SED) – Asst. Agency Manager/Asst. Chief Security
Officer – Assist the Security Director
3. Security Staff Director (SSD) – Staff Dir for Opn and Staff Dir for
Administration
The Staff Dir. for operation –assist the security manager for the efficient opn of
the agency.
The Staff Dir. for Administration - is the staff assistant of the agency manager
for the effective and efficient administration and management of the agency.

4. Security Staff Director for Training- Staff in charge for Training


– responsible for the training of the Agency’s security personnel

2. Line Leadership Staff


1. Security Supervisor 3 – Detachment Commander
–is the field or area commander of the agency;
2. Security Supervisor 2 – Chief Inspector
– responsible for inspecting the entire area covered by the detachment;
3. Security Supervisor 1 – Inspector
– responsible for the area assigned by the Chief Inspector or the Detachment
Commander.

3. Security guard

a. Security Guard 1 – Watchman/guard


-- the one actually posted as watchman and or guard.
b. Security Guard 2 – Shift in- charge
– responsible for the security officers who are scheduled in a certain shift for
a particular period
c. Security Guard 3 – Post in- charge
–responsible for the entire detailed security office within a certain
establishment.
Note: Security Agency operator/manager/owner can put its own staffing pattern provided it
is consistent with the provisions of IRR of RA 5487.

Advantages of Company Guard Force


1. High caliber and receives higher salary;
2. Provides better service;
3. Can be trained to handle some of the more complex security duties;4. More familiar
with facilities they protect;
5. Tend to be more loyal with the company.

Disadvantages:
1. May be required to join the union;
2. Cost more;
3. Problem of ensuring availability of back-up personnel.

Advantages of Agency Guard Services


1. Less expensive;
2. Use is convenient;
3. Less administrative and personnel problems;

4. Agency assumes full responsibility for the scheduling and supervising of all
guardpersonnel
5. Can easily obtain extra guard if needed;
6. Agency easily usually accepts liability of civil suits.

Disadvantages:
1. Lack of training, low caliber employee;
2. No loyalty to the company;
3. Large turnover
4. Not familiar with facilities

Essential Qualities of Security Guard


1. Alertness – being watchful in spotting violator, a person, a vehicle or an incident;
2. Judgment – sound and good judgment to arrive at wise and timely decisions;
3. Confidence – faith in oneself and his abilities;
4. Physical Fitness – always in a condition to render effective service even under the
most strenuous conditions;
5. Tactfulness – ability to deal with others successfully without offending;
6. Self-Control – ability to take hold of oneself regardless of a provoking situation.

General Functions of a Security Guard


1. Enforce company rules and regulations;
2. Operate and enforce the personnel identification system;
3. Patrol and observe designated areas, perimeter, structures, installation;
4. Take into custody a person attempting or giving unauthorized access in restricted,
limitedand controlled areas
5. Check rooms, buildings, storage rooms of security interest and after working
hours, checkproper locking of doors and gates.
6. Perform escort duties when required;
7. Respond to alarm signals or other indications suspicious activities and
emergencies;
8. Safeguard equipment and material against sabotage, unauthorized access, loss,
theft ordamage;
9. At quickly in situations affecting the security of installation and personnel, to fire
accidents,internal disorder, attempts to commit criminal acts;
10. Control and regulate vehicle and personnel traffic within the compound as well as
parkingof vehicle;
11. Other duties that is necessary in the security guard function;

Power and Duties of Security Guard

1. Territorial Power – A security guard shall watch and secure the property of the person,
firm or establishment with whom he or his agency has a contract for security services.
Such services shall not extend beyond the property or compound of said person, firm or
establishment except when required by the latter in accordance with the terms of their
contract, or in hot pursuit of criminal offenders.

2. Arrest by Security Guard – A security guard or private detective is not a police officer
and is not, therefore, clothed with police authority. However, he may arrest a person
under the circumstances mentioned in Section 5, Rule 113, Revised Rules of Criminal
Procedure.

3. Search without Warrant – Any security guard may, incident to the arrest, search the
person so arrested in the presence of at least two (2) witnesses. He may search employees
of the firm or establishment with which he or his agency has a contract, when such search
is required by the very nature of the business of the person, firm or establishment.

Duties During Strikes and Lockouts


1. All private security personnel in direct confrontation with strikers, marchers or
demonstrators shall not carry firearms. They may carry only night sticks (baton)
which may or may not be provided with tear gas canister and dispenser. Security
personnel not in direct confrontation with the strikers may carry in the usual
prescribed manner their issued firearm.
2. Private Security personnel shall avoid direct contact either physically or otherwise
with the strikers;
3. They shall stay only within the perimeter of the installation which they are protecting
at all times;
4. In protecting and securing the assets and persons of their clients, shall only use
sufficient and reasonable force necessary to overcome the risk or danger posed by
strikers or hostile crowds.
5. They shall refrain from abetting or assisting acts of management leading to physical
clash of forces between labor and management.
6. They must at all times be in complete uniform with their names and agency’s name
shown on their shirts above the breast pockets.
Functions of A Private Detective
1. Background Investigation;
2. Locating missing person;
3. Conduct surveillance work;
4. Such other detective work as may become the subject matter of contract between
theagency and its clients. Except not contrary to law, public order, public policy
morale and good custom.
Lesson 6
Security Agency Management and Administration

SECURITY SURVEY AND INSPECTION

The basic instrument for determining security vulnerability is the security survey. Most
description of security surveys refers principally to checklists, audits or inventories of security
conditions.
Security System - This is the set of policies, procedures and rules and regulations designed to
reduce to an absolute minimum the possibility of espionage, sabotage and compromise of
classified information of an office or a whole establishment. Security Survey
- A critical on-site examination and analysis of an industrial plant, business, a home or
public or private institution done to ascertain the facility’s current security status, to
identify deficiencies or excess in current practices, to determine what protection is needed
and to make recommendations for improving the overall level of security at that
installation.
- A fact-finding probe to determine a plant’s adequacy in all aspects of security, with the
corresponding recommendations.
- Refers to checklist, audits, or inventories of security conditions.

- Security Surveys are often called ‘Risk Analysis Surveys’ or ‘Risk Assessment Surveys

Purposes of Security Survey


1. To determine the existing state of security;
2. Identifying weaknesses in defense;
3. To determine the degree of protection required;
4. To produce recommendations for a total security system.
The survey should be undertaken by either suitably trained staff security personnel, or a
fully qualified independent security specialist.
No universal checklist can be applied to all sites for survey purposes, as no two
facilities are alike.

Before Commencing a Security Survey

1. Written authority should be obtained from proper authority.


2. Previous surveys should be reviewed;
3. An orientation tour should be made;
4. Photographs should be taken of things which will be difficult to describe in a report.
(Onlywith authority)
-After completing the survey an immediate review of the findings should be undertaken
with the plant supervisor so that urgent deficiencies can be addressed.
-A follow-up survey should always be conducted to ensure improvements.
-Any survey report including lists of recommendations is incomplete without including a
costbenefit analysis, which is; “a direct comparison of the cost of operation of the
security unit and all the existing security measures with the amount of the corporate
assets saved or recovered as well as reduction of losses caused by injuries and lost
production and recommendations have been made”.
The Security Survey Report
A good security survey report must encompass all aspects of security risks and its
accompanying security plan shall conform with existing security policies of the management if
nay, in order to come up with adequate security system. The use of maps, sketches of the area
and even floor plans of the building should be availed of to indicate sensitive areas that would
necessitate the provision of adequate security.

Security Inspection
An important activity to ensure the integrity of the overall security programs. It complements
security survey in its attempt to prevent losses of company properties. It is conducted for two
reasons: to check on the degree of compliance with the recommended countermeasures and to
determine the effectiveness and adequacy of the countermeasures which are in effect.

Planning
-Process of developing methods or procedures or an arrangement of parts intended to
facilitate the accomplishment of a definite objective.
-The process of setting goals, developing strategies, and outlining tasks and schedules to
accomplish the goals.

Security Planning
 It is pre-determining a course of action;
 It is deciding in advance what to do, how to do it, and who is to do it.
Goals of Security Planning
1. To minimize effects of any incident upon plant and personnel;
2. To keep property and equipment loss at a minimum;
3. To ensure cooperation of all plant departments charged with specific activities of
anemergency;
4. To ensure appropriate cooperative action by and with outside civic and
governmentagencies.

Key Steps in Planning


1. Get in touch/coordinate with your Local Civil Authorities. (Tie your programs with
theirs and standardize equipment with them thus creating compatibility.);
2. Visit neighboring Plants/offices (coordinate your activities with theirs.);
3. Survey your plant for possible hazards and take immediate action to lessen or
eliminate them;
4. Appoint a disaster Director or Disaster coordinator;
5. Early in the planning stage, present the Program to your Employees and enlist their
active support;
6. Call an organization meeting of Heads of services, employee representatives and key
personnel. (outline purpose of the program and explain how the plant should
organize for protection;
7. Define the Program.
Benefits in testing the plan
1. Deficiencies will be uncovered;
2. People involved in the implementation of the plan will receive valuable training.

Two types of testing the plan


1. partial (by elements);
2. complete (entire organization)
Keeping the Plan Up to Date
1. Changes in Personnel and Facilities

Security and the Technology


Alarm Devices

1. Magnetic Door Contact


-is a protective device usually placed in the door, and window that can send
notification when the opening and closure occurs

2. Vibration Contact
- devices mounted on barriers and are used primarily to detect an attack on the
structure itself. When movement or vibration occurs, the unstable portion of the circuit
moves and breaks the current flow, which produces an alarm.

3. Passive Infrared Detector (PIR) or Motion Sensor


-PIRs are able to distinguish if an infrared emitting object is present by first
learning the ambient temperature of the monitored space and then detecting a change in
the temperature caused by the presence of an object.

4. Panic button
-Often located under the counter, the button can be pressed in times of distress
(Such as robbery, disruptive or threatening behavior, or a situation which may warrant
assistance), triggering a silent alarm.

5. CCTV
- A video monitoring system is more commonly known as Closed Circuit
Television Systems. A CCTV system is a system consisting of a television camera, video
monitor, and a transmission medium (Cable, fiber or wireless) connecting the two. It is
used to monitor the premises.

Internet Protocol Camera


- IP based cameras work by turning images and audio into data then transmitting this data
over a network or Internet connection.
- IP cameras are a type of Closed-Circuit Television Camera (CCTV) used for capturing
images and audio recordings in surveillance for homes and businesses.
- The IP name stands for Internet Protocol, a system that allows the transmission of
images captured by a digital video recorder (DVR) to the end destination computers and
these components together make up a video security system.

Personnel Identification and Movement Control


In every installation, the use of protective barriers, security lightning, communication and
electronic hardware provides physical safeguards but these are insufficient to maximize the
effort of the guard force. A control point must be established for positive personnel identification
and check system. This is to ensure that only those people who have the right and authority will
be given the necessary access to the area.
The most practical and generally accepted system of personnel identification is the use of
identification cards, badges or passes. Generally speaking, this system designates when and
where and how identification cards should be displayed, and to whom. This helps security
personnel eliminate the risk of allowing the access of unauthorized personnel within the
establishments.
Types of Personnel Identification
1. Personal recognition
2. Artificial recognition

Use of Pass System

1. Single Pass System- the badge or pass coded for authorization to enter specific areas is
issued to an employee who keeps it in his possession until his authorization is
terminated.
2. Pass exchange system- an exchange takes place at the entrance of each controlled area.
Upon leaving the personnel surrender his badge or pass and retrieve back his basic
identification.
3. Multiple pass system- this provides an extra measure of security by requiring that an
exchange take place at the entrance of each restricted area.

Badge and Pass Control

1. The system should have a complete record of all badges and identification cards issued,
returned, mutilated or lost by serial number and cross-indexed alphabetically.
2. The supervisor from time to time for its accuracy and authenticity should check the lists.
3. Passes and badges reported lost should be validated and security at entrance be informed
through conspicuous posting.

Visitor’s Movement Control

1. Visitor’s Logbook- all visitors to any facility should be required to identify them and
should be given a visitor’s ID by the security. Visitor’s logbook should be filled up with
the name of the visitors, nature and duration of visit.

2. Photograph- taking of photograph should also be considered. Extreme caution must be


exercised in areas where classified information ids displayed to prelude unauthorized
taking of pictures of the installation. If a visitor has a camera and it is prohibited to take
picture, said camera should be left in the care of security with corresponding receipt.

3. Escort- if possible visitors should be escorted by the security guard to monitor their
activity within the establishment and guide them where to go.

4. Visitor’s Entrance- separate access for visitors and employees of the establishment
should be provided.

5. Time-travelled- if there is a long delay or time lapse between the departure and arrival,
the visitors may be required to show cause for the delay.

Package Management Control


1. No packages shall be authorized to be brought inside and outside the industrial
installation, offices and work area without proper authority. This basic precept help
reduce if not eliminate pilferage, industrial espionage or sabotage.
2. Outgoing packages carried by personnel should be closely inspected and those in vehicles
should also be checked as many pilfered items are hidden in the surface of the vehicles
leaving the compound.
3. Any personnel or visitor entering the installation or compound with a package should
deposit the same to the security and in return receives a numbered tag which he or she
will use pin claiming his or her package upon departing.

Vehicular Movement Control and Identification


1. Privately owned vehicle of personnel or visitor should be registered and are subject to the
identification and admittance procedure.
2. Vehicles must be subjected to search at the entrance and exit of the installation.
3. All visitors with vehicle should provide the security as to the complete details of their
duration of stay, person to be visited and other information.
4. All vehicles of visitors should be given a sign or sticker to be placed on the windshield.
5. Traffic warnings signs should be installed in all entrances in order to guide the visitors in
their destination as well as to provide them with the necessary safety precautions while
they are inside the installation.
6. Security personnel must constantly supervise parking areas and make frequent spots
searches of vehicles found there.

Building Access Control


At any physical barrier, a security system must possess the ability to distinguish among
authorized persons, unauthorized visitors, and other unauthorized persons. This is to assist the
security personnel protects sensitive information within the installation.
Appropriate warning signs should be posted at the building perimeter. Special restricted
entry facilities to public access should be provided. This will be dependent on the degree of
security needed for the protection of property, activity and other processes within the building.
The access to the restricted area shall be limited to authorized personnel who have the
direct involvement with the installation, construction and operation and maintenance of the
equipment and system and/or use of the materials contained within the restricted area. A clear-
cut policy on the access control should be disseminated to all personnel of the installation.

Lesson 7
Problem Solving and Decision Making in Security

Security Problems
Any act or condition which may results in the compromise of information, loss of life, and loss
or destruction of property or disruption of the activity of the installation.
The extent and degree of risk to security is dependent on:

a) Relative criticality of operation-is the importance of the firm with reference to the natural
economy and security;
b) Relatively vulnerability- is the susceptibility of the plant or establishment to damage loss
or disruption of operation due to various hazards.
Types of Hazards
1. Natural Hazard- these are hazards which arises from natural phenomena;

a. Floods cause by typhoons


b. Earthquakes
c. Storms
d. Extreme Temperature and humidity
2. Human or Man –made Hazard- these are hazards which are the result of a state of mind,
attitudes, weaknesses or character traits of one or more persons. They can be acts of
commission or omission, both overt or covert, which can disrupt operation of a plant or
installation. The following are types of human or man-made hazards;
a. Carelessness- accidents and dissatisfaction
b. Disloyalty- subversion and sabotage
c. Espionage, pilferage and theft
d. Vandalism
Sabotage as a security hazard
Description of a saboteur
1. He is the most dangerous for whom security will have to deal with while planning and
implementing security techniques.
2. He looks as an ordinary person but possesses a lot of knowledge about deception,
incendiaries and explosives.
3. He can work alone, in groups or simultaneously in several places Possible targets of
Saboteur
1. Armed Forces Installation
2. Natural Resources- mines, forests, and farms
3. Industries- buildings, power sources, and machineries
4. Warehouses depots, communication installations, public utilities
Countermeasures against Sabotage
1. Use of an efficient, alert and trained guard force.
2. Use of physical security aids like barriers, personnel and vehicular control, intrusion
devices, communication systems and electric aids.
3. Proper screening of personnel
4. Identification and movement control system
5. Searches on incoming vehicles
6. Safeguarding classified information
7. Designation of restricted areas
8. Investigation of breaches of security 9. Security education and indoctrination
10. Continuous background checks.

Espionage as a security hazards

Espionage Agent

- he is a dangerous adversary and has a great skill in deception.


- he has an extensive training in gaining trust and confidence and extracting information
tobe reported to his handler/employer.
Methods of an Espionage Agent

1. Securing or stealing information from persons, records, organizations, social


gatherings by means of blackmail techniques or threats or acting as “front”.
2. Through penetration or operational tactics.

Countermeasures against Industrial Espionage


1. Careful and complete pre-employment measures designed to control threats of
industrial espionage.
2. Continuous background checks on employees.
3. Prevention of unauthorized person to enter the premises.
4. Authorized person should only be the one handling classified documents matters.
Threat – is an indication of something impending and usually undesirable or unpleasant, with an
intention to inflict evil, injury or damage on another, usually as retribution or punishment for
something done or left undone. It is an expression of an intention to inflict loss or harm on
another by illegal means, and especially by involving coercion or duress over the person or his
welfare.

Threat Assessment – the process of investigation/validating the truthfulness of the existence of


threat to an individual.

Emergency Situation – condition or state that danger has already occurred which resulted to
loss of life/liberty and/or there is imminent danger or threat to life and property where delay will
endanger or may cause the loss of life/property.

Definition of Terms:

1. Access List – authenticated list of personnel given to the security allowing entry to a
compound or installation or part thereof;
2. Controlled Area – an area near or adjacent to limited or exclusive areas where entry is
restricted;
3. Dry-run – practical test or exercise of plans or any activity to test its validity, an operational
readiness exercise;
4. Duress Code – type of code system so that security personnel or any employee when forced
by armed men intending to enter an installation can five alarm by the use of certain words in
casual conversation with personnel in the installation.
5. Exclusion Area – a restricted area containing materials or operation of security interest;
6. Restricted area – any area access to which is subject to special restriction control;
7. Security Hazard – Is any act or condition, which may result in the compromise of
information, loss of life, loss or destruction of property or disruption of objectives of the
installation.

Pilferage
– committed by any person, who with intent to gain but without violence, against, or
intimidation of persons nor force upon things shall take personal property of another without the
latter consent.

Psychological Explanations On Pilferage

1. The need or desire. An individual may need or desire to commit the act because of financial
problem, inadequate income, extravagant living, gambling.
2. The psychological need (Kleptomania) -is an irresistible urge to steal items of trivial value.
People with this disorder are compelled to steal things, generally, but not limited to, objects of
little or no significant value.
3. The criminal tendency. The individual with such tendency may be more tempted to steal if
security control is inadequate.

The Casual and Systematic Pilferer

Casual Pilferer – One who steals due to his inability to resist the unexpected opportunity and
has a little fear of detection.
Systematic Pilferer – One who steals with preconceived plans and takes away any or all types
of items or supplies for economic gain.

Countermeasures for Casual Pilferage


1. Checking of outgoing vehicles and persons
2. Aggressive security education and indoctrination program
3. Superiors should set example of integrity and desirable moral environment
4. All employees must encourage to report any loss to security.
5. Inventory should be done especially to pilferable items.

Countermeasures for Systematic Pilferage


1. Guards and electronic surveillance on all exits.
2. Careful screening and background checks on applicants.
3. Quick investigation on all reported lost.
4. Establish an effective lock and key control system.
5. Install mechanical, electrical, electronic detection and alarm devices.

Crisis Management

Crisis- it refers to a decisive point of a condition, improper handling on which immediately


places under threat or danger of one’s life, limbs, freedom and property.

Crisis Management- it is the totality of action of handling or responding to a given crisis


situation.

Crisis Management Plan- it is a complete and comprehensive plan of actions designed to


protect life, limbs, freedom and property, before, during and after any given crisis situation.

Two Kinds of Crisis According to Origin


1. Natural Crisis
2. Man-made Crisis

Work Stoppage- it is a condition of an enterprise whereby normal work operation was stopped
as a result of a strike and lockout.

Rules of Security guard during strikes and lockouts


1. Maintenance of peace and order
2. Protection of life and property
3. To provide security to any personnel.

Emergency and Disaster Management

Emergency planning is one of the harsh realities that an installation will encounter is the
occurrence of a disaster or emergency. Any of these can be regarded as a potential event, or
condition outside the normal business wherein it might cause potential damage or death, injury
or loss, therefore it is the prerogative of the administrations to decide in advance on what to do,
and how to counter the effects of any emergency in order to assure continuity of operations.
Emergency
- It refers to the sudden, generally unexpected occurrence or set of circumstances
demanding immediate action.
Disaster Management
- Is the systematic management of disaster from the initial stage to its termination using
various tools to minimizes loss of lives, damage, to property and enhance
rehabilitation?

Disaster
- It refers to the unscheduled event that causes emergency. It upsets the performance of
valued activities of the community in two ways; there is a drastic increase in demand
for certain services and there is reduction in the capability to perform services.

Basic Considerations in Emergency Planning


1. Goals of the emergency plan
2. Emergency plan should be in writing
3. The plan should be precise and specific
4. There should be a contingency plan
5. Key elements of plan; what to do and who will do it
6. General and individual awareness
7. Checklist before formulating a detailed emergency plan.

Guides in emergency plan


1. Who will make the final decision for the whole team?
2. Who will be the members and their individual responsibilities
3. The mission of the team.
4. The tasks of other agencies
5. Training and orientation of the members.
6. What is the contingency plan?

You might also like