Togonon, Angelo C.

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

Togonon, Angelo C.

CRIM-1 D
STRUCTURE OF A PRIVATE SECURITY AND
THE ELEVEN GENERAL ORDERS

PACKAGE CONTROL
Safety is very important. In every angle of our lives we need an assurance that we are
safe and in order to make us more safety every facility must establish a system for the control of
package entering or leaving the industrial installation offices.
When entering an industrial installation offices, the person who is assigned to enter there must
first have a proper authority before bringing the package inside. This basic precept help reduce If
not eliminate pilferage, industrial espionage or sabotage. On the other hand all of the outgoing
packages carried by personnel should be closely inspected and same as those in vehicles, all of
those should also be checked to avoid pilfered items which are sometimes hidden in the surface
of the vehicles leaving the compound. In addition to that any personnel/visitor entering the
installation office with a package should also deposit the same to the security so that the security
will give them a numbered tag in return, which he/she will use in claiming his/her package upon
departing.

VEHICLE CONTROL
Vehicular traffic must be controlled for safety as well as to control the transporting of
pilfered goods from the premises. Traffic warning signs should be placed or installed in all
entrances in order to guide visitors in their destination as well as to provide them with the
necessary safety precautions while they are inside the installation. An owned vehicle of every
personnel/visitor should be registered and are subject to the identification and admittance
procedure.
All vehicles should be subject for search at the entrance and exit of the installation. In addition to
that those visitors with vehicle should provide details of their duration of stay., person to be
visited and other information to the security and in return the security will place a sticker on the
windshield. In addition to that the personnel must constantly supervise parking areas and make
frequent spots searches of vehicles found there.
By doing so we can assure the safety of the personnel and the safety of the industrial installation
areas.
BUILDING ACCESS CONTROL
Building Access Control is implemented to every security to secure the safety and
sensitivity of a personnel and the security and sensitivity of the installation office, a security
system must possess the ability to distinguish among authorized persons, unauthorized person or
unauthorized visitors. Appropriate warning signs should be posted at the building perimeter.
Special restricted entry facilities to public access should be provided. In addition to the restricted
area shall be limited to authorize personnel who have the direct involvement with the
installation, construction, operation, and maintenance of the equipment and systems and or/use
of the materials contained within the restricted area. Also a clear-cut policy on the access should
be disseminated to all personnel of the installation.

DOCUMENT AND INFORMATION SECURITY


Documentation and information are indispensable for their daily operations and
activities be it in the form of a paper, film, and magnetic media or in the computer system. Once
there is leakage in the contents of a company’s document and information, cost the government,
business, and industry alike. For this reason, a comprehensive and information security program
is very essential to the installation in order to focus freely on the attainment of its goals and
objectives.

Document Security
Is the protection of records from its entire document life cycle. In the Philippines,
security of documents and information is based on the premise that the government has the right
and duty to protect official papers from unwarranted and indiscriminate disclosure.
Standard Rules
It is the authority and responsibility for the preparation and classification of classified
matter should be classified with the originating office. In addition to that classified matter should
classified according to their content and classification should be made as soon as possible.
Document Security Systems
Document Security is that aspect of security that involves the application of security
measures for the proper protection and safeguarding of classified information.
Security Clearance
It is the certification by a responsible authority that the person describes is cleared for
access to classified matter the appropriate level. It is a requirement that the dissemination of
classified matters be limited strictly to person whose official duty requires knowledge or
possession thereof.
Information Security
Information Security means protecting information and information systems form
unauthorized access, use disclosure, disruption, modification, or destruction. Protecting
confidential information is a business requirement, and in many cases an ethical and legal
requirement. For the individual information security has a significant effect on privacy.
Protection of Sensitive Information
Proprietary information is information that in some special way related to the status
or activities of the possessor and over which the possessor asserts ownership. Proprietary
information could be in the form of trade secrets and patents.

PERSONNEL SECURTY
Among the major aspects of security, personnel security is considered as the most
important. The reason is that security involves people, both an asset to be protected and the same
time a source of security threats. In addition to that personnel security refers to those practices,
technologies and/or services used to ensure that personnel security safeguards are applied. These
personnel safeguards takes into account in granting or withdrawing physical system and security
training up to the background checking.
Sensitive Data/Information
Refers to critical information for which the unauthorized access, misuse,
modification, or improper disclosure could negatively impact the ability of the entity or agency
to provide services and benefits to it’s customers.
Confidential Data
Refers to information that involves the privacy to which individuals are entitled by law.

Personnel Security Investigation


PSI is a process of inquiry into the character, reputation, discretion, integrity, morals
and loyalty of an individual to determine the suitability for appointment it access classified
matters.

Background Investigation
Serves to verify information on the application form and to obtain there information
pertinent to the decision to employ. It can be in a form partial background investigation or
complete background investigation.

Background Checks, Vetting and Profiting


Local Agency Check (LAC) Is a background investigation activity where the sources
of information involve only the local agencies in the community.
National Agency Check (NAC) is also an investigation activity but the sources of
information involve clearances form national government units.
Positive Vetting is the process of inspecting or examining with careful thoroughness.
The essence of vetting is that it is a personal interview conducted under streets.
Security Profiling is a process whereby a subjects reaction in a future critical
situation.

OPERATIONAL TERMINOLOGIES
In the context of security risk management, the following terms should be
understood.
Assets- Any real or personal property, tangible of intangible, that a company or
individual owns that can be given a monetary value.
Consequential- A secondary result ensuing from an action or decision.
Cost/Benefit Analysis- A process in planning, related to the decision to commit funds
or assets. This is a systematic event attempt to measure or analyze the of the benefits.
Critically- The impact of a loss event, typically calculated as the net cost of that event.
Events- Something that happens: a noteworthy happening.
Goodwill – The value of a business that has been built up by reputation of the business
concern and it’s owners.
Loss Event- An occurrence that actually produces a financial loss or negative impact on
assets.
Natural Disaster- A naturally occurring calamitous event bringing great damage, loss,
or destruction and related occurrence.
Probability- The chance, or in some cases, the mathematical certainty that given event
will occur. It is the number of outcomes in an exhausted set of equally likely outcomes that
produce a given event to a total number.
Qualitative- Relating to the amount of which is characteristic of something and which
makes it what it is.
Quantitative- Relating to the amount or number of something, capable of being
measured or expressed in numerical terms.
Risk- The possibility of loss resulted g from a threat, security incident or event.
Risk Analysis- A detailed examination including risk assessment, risk evaluation, and
risk management alternatives. It provides information regarding undesirable events: the process
of quantification of the probabilities and expected consequences.
Risk Assessment- To process of assessing security-related risks from internal and
external threats to an entity, it’s assets, or personnel.
Security Incident- A security-related occurrence or action likely led to death, injury,
or monetary loss.
Security Vulnerability- An exploitable capability; an exploitable security weakness
or deficiency at a facility, entity, venue, or of a person.
Site- A spatial location that can be designated by longitude and latitude.
State of the Art- The most advanced level of knowledge and technology currently
achieved in any field and latitude.
Statistics- A branch mathematics dealing with the collection, analysis, interpretation,
and presentation of masses of numerical data.
Threat- An intent of damage or injury, and indication of something impending.

PHASES OF RISK MANAGEMENT


Risk management consists of four interrelated phases namely the Risk
Identification, Risk Assessment, Risk Reduction and mitigation, and Risk
Monitoring and control.

Risk identification
is part of the proactive management process. It provides the opportunity to raise
risk concerns before they occur, keeping them from damaging the business
operations or goals. The objective is to identify all possible risk. Being vital to the
management process, there are some essentials to risk identification that guarantee
maximum results, as follow Team Participation, Repetition, Approach,
Documentation, Roots and symptoms, Project Definition rating index, Event Trees.

Types of security risks


Security risks is a term that indicates the risks associated with the security of
people, assets and information. These include the following risk groups: Personal
security, Physical security , Information security risks.

Types of risks Sources


Types of risks are defined in terms of their severity in the field or risk
management, there are distinguished sources of risk: Exposure, failure, crisis,
disaster, Opportunity, Attack, Human stupidity.
Risk Identification Tools and techniques
There are Risk Identification Techniques that we can use and the first one is the
Documentation Reviews and Information gathering particularly the brainstorming,
Delphi Technique, Interviewing, Root Cause Analysis, SWOT Analysis, Checklist
Analysis, Assumption Analysis, and not but not the least is the Risk Register.

Risk Assessment:
Security Risk Assessment is the process if identifying assessing, and
implementing key security controls in application. It focuses preventing
application security defects and vulnerabilities. In risk management, risk analysis
is essential, there are security risk assessment procedure. The first procedure is to
understand the Organization and identify its asset. Next Specify Loss Events/
Vulnerability, The third, Establish Probability of Loss Risk and Frequency of
Events. The fourth one is to determine the impact of the Event. The fifth one is to
develop Options to mitigate Risk and Study Feasibility of Implementing Options,
Next is to perform Cost/Benefit Analysis.
In addition to that there are Security Risk Assessment Tools that can be used for
qualitative risk assessment and analysis and these are as follows. First is the
probability and impact Matrix, Second is the Risk Data Quality Assessment, then
third is the probability and Impact Analysis and then the fourth one is the Monte
Carlo Analysis (Stimulation Technique), The fifth one is the Decision Tree and last
but not least is the Risk Register Updates.

Risk Probability Factors


Probability Factors are conditions and sets of conditions that will worsen or
increase asset exposure to risk of loss. The probability factors is divided into
six major parts namely the Physical environment, Social environment,
Political environment, Historical experience, Procedure and processes, and
the criminal state-of-art.

Risk Assessment Matrix


Risk Assessment Matrix is made in the form of a simple table where the risks
are grouped based on their likelihood and the extent or damage or the kind of
consequences that the risks can result in.
Likelihood occurrence can be classified under one of the five categories
particularly the Definite, Likely, Occasional, Seldom, and Unlikely. On the other
hand are the consequences. Consequences can also be classified into five
categories and these are the insignificant, Marginal, Moderate, Critical and
Catastrophic.
Risk Reduction and Mitigation
Risk reduction is identifying ways to eliminate risk. There risk reduction and
Mitigation strategies which we can use and these are the Contingency
planning, Hazard prevention, Likelihood reduction, Risk Avoidance, Risk
Transfer, Risk Spreading, Risk Transfer, and Risk Acceptance. But the best
strategy in mitigating risk I’d a combination of all the elements f decreasing
threats, blocking, opportunities and reducing consequences.

Risk Reduction and Mitigation Components


A logical mitigation strategy ties asset to threats and vulnerabilities to identify
risk. The Risk Reduction and Mitigation Components has three assessments
particularly the Threat Assessment, Vulnerability Assessment, and Crime
Prevention through Environmental Design.

Risk Monitoring And Control


Risk monitoring and control is required in order to ensure the execution of the
risk plans and evaluate their effectiveness in reducing risk. The purpose of risk
monitoring is to determine if the responses have been implemented as planned.
Risk Monitoring Tools and Techniques
The Risk Monitoring Tools and Techniques that can be used are the following.
First the Risk Reassessment, then next is the Risk Audits, third is the variance and
trend Analysis, Reserve analysis, and the family status meetings.

THE PRIVATE SECURITY INDUSTRY

Security Guard is called a private security guard or watchman that include


any person who offers or renders personal service to watch or secure either a
residence or business establishment, property assets, and people with a license to
exercise profession.

Private Security Service include the act of providing or rendering services to


watch an establishment whether public or private, building, or compound. It also
include the act of contracting, recruiting, training, furnishing or posting any
security training.

Private Detective Services include among others the act of providing security
protection, inquiry and information gathering security protection, inquiry and
information gathering, pre-employment verifications up to the financial and
personal problems.

The Security Guard Forces

It is a group of selected men, trained or grouped into functional unit for the
purpose of protecting operational processes from those disruption the functional
units and these are the following units the Private Security Agency, Company
Security Force, Government Security Unit.

Structure of a Private Security Agency

The security force of any installation must be organized in accordance with the
principles of responsibility and authority. The security positions may be classified
into the following: Office of the General Manager/Security Director. Next is the
Office of the executive Secretary of the General Manager. The third one is the
Office of the Assistant General Manager / Security Executive Director. Fourth one
is the Office of the human resources and administration manager/Staff Director for
personnel and administration. Then the office of the operations manager/staff
director for operations. The next one is the office of the finance and then the office
of the Logistic Manager. Then the Office of the inspectorate and special Projects.
The office of the communications Officer, The detachment Commander/Officer in
charge, Assistant Detachment Commander, Shift-in-change, and the Security
Guard on Duty/Post. These are the organized security positions.

Establishing a Private Security Agency

The organization, operation, business and activities of private


watchman/security or detective agencies, security training institutions/systems as
well as private security. In establishing a private security agency the agency or the
person must first go to the LTO to get a license to operate. We also need to know
the basic qualifications of the operator whom who will operate the agency. The
qualifications are, the operator must be a Filipino Citizen and not less than 25 years
of age has taken or is a college graduate and must be a person of good moral
character. New applicants for license must obtain a minimum capitalization of one
million pesos with a minimum bank deposit of five hundred thousand pesos in
order to start its business operation.
Disqualifications and Prohibitions

It states here that no person shall organize or have an interest in more than one
agency in doing so he/she will be prohibited and be disqualified. No agency shall
offer render or accept other illegal services. All agencies shall maintain a main
office in their registered addresses where the security agency has deployed security
guards. In doing that we can maintain peace and avoid Disqualifications and
Prohibitions.

Concept of Merger

It states here the purpose Merger or “kabit system”. A merger is an act


prohibited under 5he private security agency law. It is an agreement that combines
two separate, existing companies into a new, larger entity. The aim of a merger is
to create a stronger, single company. A merger is often referred to as a 'merger of
equals' as the companies involved usually have a similar size and value.

Security Service Contract

Private security agencies render security services to their clients only after a
service contract have been executed between them. The salary each individual
security guard receive is from the agency.

Tenure of Security Personnel

The tenure of security personnel is co-terminus with the service contract


between the PSA and the client.
License to Exercise Private Security Profession

Once the private security agency is established it necessarily be in need of


licensed security guards to be posted as security personnel on different posting
areas based on the security service contract with a client. This law requires that any
Filipino citizen may apply for License to Exercise Private Security Profession to
engage in the occupation, calling or employment either as a private security
guards. In addition to that there are following conditions which is need to be
followed.

Limitations in the carrying of firearms

Unless specified or expected pursuant to pertinent provisions of laws or


regulations, no firearm can be borne nor be in the possession of any private
security. The firearm must only be carried by the personnel when he/she is
assigned to guard.

Duty Detail Order Requirement

A Duty Detail Order (DDO) is a written order issued by a superior officer.

Justification for Confiscation of Firearm by Authorities

When the firearm is about to be use in the commission of a crime. When the
firearm is actually being used in the commission of crime. When establishments
serviced by the agency without proper authority.
Uniform, Equipment and Paraphernalia

The Uniform of private security personnel (male) consists of prescribed


headgear, service shirt, service trousers belt and footwear. The uniform of the
female must be made with thick fabric. It consists of 2-ply cap, service skirts, and
blouse, service belt and black leather shoes prescribed.

Security Ranked Position

The security agency operator/owner are mandated by law to observe the


required major ranks and positions in the organization of the agency. The rank
starts with the Security Consultant up to Security Guard 3.

Private Security Training

Private Security Training for private security forces refers to training and
academic programs and courses duly approved or prescribed by the Philippine
National Police.

Power and Duties of Private Security Personnel

Territorial power- This is where a security guard watch and secure the
property of the person, from, or establishment with whom he or his agency has a
contract for security services.

Arrest by security guard- A security guard, or private detective is not a


police officer and is not therefore clothed with police authority.
Method of arrest- when making an arrest, the watchman shall inform the
person to be arrested of the intention to arrest him and cause of the arrest.

Duty of security guard making arrest- Any security guard making arrest
shall immediately turn over the person arrested to the nearest peace officer police
outpost or headquarters for custody and appropriate actions.

Search without warrant- Any security guard may incident to the arrest,
search the person so arrested in the presence of at least two witnesses.

Duty to Assist Law Enforcers- Any security guard is duty bound to assist any
peace officer in 5he pursuit of his bounding duty.

Duties during strikes and Lockouts- All private security personnel in direct
confrontation with stickers, marchers, or demonstrator shall not carry firearms.

Awards and Decorations

All security guards are entitled for the awards which will be given unto them
for their outstanding feat/accomplishment during the performance of their duties
while serving the exercise profession.

Conduct and Ethical Standards


A code of ethics and professional conduct outlines the ethical principles that
govern decisions and behavior at a company or organization. They give general
outlines of how employees should behave, as well as specific guidance for
handling issues like harassment, safety, and conflicts of interest. This means
principles of fairness, good faith and respect consistent with laws, regulations and
University policies govern our conduct with others both inside and outside the
community. Each situation needs to be examined in accordance with the Standards
of Ethical Conduct.

Code of conduct for security Guards


The following sets of the code of conduct for security guards means principles of
fairness, good faith and respect consistent with laws, regulations and University
policies govern our conduct with others both inside and outside the community.
Each situation needs to be examined in accordance with the Standards of Ethical
Conduct. Code of conduct for security Guards.
The Importance of this Code of conduct is it serves as a guide to the performance
of a security guard to any company he/she work for. It emphasizes your his/her as
a security guard that you swore to oath to protect innocent lives from the criminals
that dare to threaten the establishment you're assigned to.

The Eleven (11) GENERAL ORDERS

1. TO TAKE CHARGE MY POST AND ALL COMPANY PROPERTIES IN


VIEW AND PROTECT/PRESERVE THE SAME WITH UTMOST DILIGENCE;
2. TO WALKED MY POST IN A MILITARY MANNER, KEEPING ALWAYS
ON THE ALERT AND OBSERVING EVERYTHING THAT TAKES PLACE
WITH IN SIGHT OR HEARING;
3. TO REPORT ALL VIOLATION OF ORDERS I AM INSTRUCTED TO IN
FORCE;
4. TO RELAY ALL CALLS FROM POST MORE DISTANCE FROM THE
GUARD HOUSE WHERE I AM STATIONED;
5. TO QUIT MY POST ONLY WHEN PROPERLY RELIEVED;
6. TO RECIEVED, OBEY AND PASS UN TO THE RELIEVING GUARD ALL
ORDERS FROM THE COMPANY OFFICERS OR OFFICIAL, SUPERVISOR,
POST INCHAGRED, AND OR SHIFT LEADERS;
7. TO TALK TO NO ONE EXCEPT IN LINE OF DUTY;
8. TO SOUND OR CALL THE ALARM IN CASE OF FIRE OR DISORDER;
9. TO CALL MY SUPERIOR OFFICER IN ANY CASE NOT COVERED BY
INSTRUCTIONS;
10. TO SALUTE ALL COMPANY OFFICIAL, SUPERVISOR IN THE
AGENCY, RANKING PUBLIC OFFICIAL, ALL OFFICERS OF THE PNP AND
ALL COMMISSION OFFICERS OF THE AFP;
11. TO BE SPECIALLY WATCHFUL AT NIGHT AND DURING THE TIME
OF CHALLENGING TO CHALLENGE ALL PERSON ON OR NEAR MY
POST AND TO ALLOW NO ONE TO PASS OR LOITER WITHOUT PROPER
AUTHORITY.

The main objective of The Eleven General Orders is to salute all officers and all
colors and standards not cased.. And especially to be watchful at night, and during
the time for challenging, to challenge all persons on or near my post, and to allow
no one to pass without proper authority.

You might also like