Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 21

1

CAMARINES NORTE SCHOOL OF LAW, ARTS AND SCIENCES INC.


Brgy. Itomang Talisay Camarines Norte

INDUSTRIAL SECURITY CONCEPTs


DEFINITION OF SECURITY

Generally, the meaning of security is a kind of state where people, institution, authority or groups feel fully secured of
feeling, free from somewhere or someone is his/her life, liberty, property or activity. It could be in physical,
psychological, social or economical form.

-It is a state or quality of being secured, freedom from fear or danger, assurance, certainty.

-It is the degree of protection against danger, loss, and criminals.

-Protection against any type of crime to safeguard life and assets by various methods and device.

BASIC PRINCIPLE OF SECURITY

1. Command Responsibility
-Cannot be delegated but the security tasks can be assigned.
2. Compartmentation
-Need to know basis ( kung sino lang ang may nakakaalam).
3. Balance between security and efficiency
-security prevails over efficiency
4. General principle of security remain constant
-specific measures to suit operations
5. Security is the concern of all personnel
-Regardless of rank, position, designation

TYPES OF SECURITY MEASURES FOR AN EFFECTIVE DEFENSE AGAINST CRIMES;

1. ACTIVE MEASURES – these involve the installation of physical barriers, security lighting, use of vaults, locks and
others.

2. PASSIVE MEASURES - those that will deter man from committing such act of fear of being caught, charge in court
or get dismissed, such as; security educations , programs, investigations, seminars, personnel security check.

Brief History of Security in the Philippines

-The private security business began on march 11, 1933, when the first formally licensed private security agency “Special
Watchman Agency” started operations;

-later it renamed “Jimenez Security Agency “founded by brothers Juan and Pedro Jimenez;

-On May 30 1958, the Philippine Association of Detectives and Protective Agency Operations (PADPAO) was formally
organized;

-RA 5487 was passed on June 13 1969 through the continuous lobbying of the incorporators and officers of PADPAO,
which set the standards and minimum requirements for the operations of security agencies.
2

-Presidential Degree. 11 was passed on October 3, 1972 widening the coverage of RA 5487 to include security guards
employed in logging concessions, agricultural, mining and pasture lands;

-PD 100 was issued on January 17, 1973, broadening the coverage of the security industry to include employees of the
national or local government or any agency who are employed to watch or secure government building and properties.

-On August 1969, the Philippine Constabulary activated the Security and Investigation Supervisory office or SIASO to
supervise and control the organization and operation of private security and detective agencies nationwide;

-Later it was renamed Philippine Constabulary Supervisory Office for Security and Investigation

-With the passage of RA 6975, this unit was absorbed by the Philippine National Police;

-Later it was made into a division of the PNP Civil Security Group and was renamed Security Agencies and Guard
Supervision Division (SAGSD)

-It was renamed to PNP Supervisory Office for Security Investigation Agency (SOSIA)

THREE MAJOR AREAS OF SECURITY

1. Physical security
2. Personnel security
3. Document and Information Security

TYPES OF SECURITY

1. PHYSICAL SECURITY
a system of barriers placed between the potential intruder and the objects/matter to be protected. It is the broadest
branch of security, which is concerned with physical measures adopted to prevent unauthorized access to equipment,
facilities, materials and documents and to safeguard them against espionage, sabotage, damage and theft.

OBJECTIVES;
a. To protect the organization’s asset
b. To make access so difficult that an intruder will not dare attempt penetration.

CONCEPTS;
a. Enemy agents will always seek access;
b. Surreptitious entry is the greatest hazard to security;
c. There are no impenetrable barriers;
d. Each installations is different

FACTORS THAT BRING INSECURE CONDITIONS:

1. Threat
-an indication of impending danger or harm;
-positive inimical acts
2. Hazard
-A chance of being injured or harmed;
-passive inimical acts
3. Vulnerability
-inability to withstand the effects if a hostile environment
-measure of how open an establishment to intrusion, attack or injury
4. Risk
3

-is the potential that a chosen action or activity (including the choice of inaction) will lead to a loss (an
undesirable outcome)

SECURITY HAZARD

An act or condition which results in a situation conducive to a breach of the protection system and the subsequent
loss or compromise, or damage to personnel, property or facilities.

KINDS OF HAZARDS

1. Man- Made hazards – an acts or conditions affecting the safe of operation of the facility caused by human
action, accidental or intentional. It includes sabotage, espionage, pilferage and theft.

2. Natural Hazard – cause by natural phenomena which cause damage, disturbance and problems of normal
functioning activities, including security. It includes flood, lighting, storm

THE EXTENT OF DEGREE OF RISK TO SECURITY WILL BE DEFENDANT ON THE FOLLOWING;

1. RELATIVE CRITICALITY OF OPERATIONS – is the importance of the firm which reference to the national
economy and security

2. RELATIVE VULNERABILITY – the susceptibility of the plant or establishment to damage, loss or disruption of
operation due to various hazard.

BARRIER- can be defined as any structure or physical device capable of restricting, deterring, delaying, illegal access to an
installation.

Generally, a barrier is use for the following purposes;

a. Outline the perimeter of the area to be secured;


b. Create a physical and psychological deterrent to unauthorized entry;
c. Delay intrusion, thus facilitating apprehension of intruders;
d. assist in more efficient and economical employment of guards;
e. facilitates and impose the control of pedestrian and vehicular traffic.

1. FIRST LINE OF DEFENSE – Perimeter barrier/fence – a medium or structure which defines the physical limits of an
installation or area to restrict or impede access thereto.

2. SECOND LINE OF DEFENSE – doors, floors, windows, walls, roofs and grills.

3. THIRD LINE OF DEFENSE – storage system like steel cabinets, safes, vaults & interior files.

GENERAL TYPES OF PHYSICAL BARRIER;

1. NATURAL BARRIER- include mountains, rives, seas, desserts or terrain difficult to traverse. To be fully effective, these
barriers must be under surveillance of guards.

2. STRUCTURAL OR MAN-MADE BARRIER - structural constructions made by man like fences, walls, floors. roofs, grill
or other physical means to deter or impede penetration.

TYPES OF FENCES

1. SOLID FENCE- Constructed in such a way that visual access through the fence is denied. Its advantage is that it denies the
opportunity for the intruder to become familiar with the personnel, activities and the scheduled movements of the security personnel.
On the other hand, it prevents the guards from observing the area around the installation and it creates shadow that may be used by the
intruder for cover and concealment.
4

WALL- Masonry wall should have the same as the chain linked and surrounded by the barbed wire as top guard.

2. FULL VIEW FENCE – it is constructed in such a way that visuals access is permitted through the fence. Its advantage is that it
allows the security personnel to keep the surrounding of the installation under observation. On the other hand, it allows the intruder to
become familiar with the movements the security personnel.

TYPES OF FULL VIEW FENCE

a. CHAIN LINK FENCE

 should be constructed minimum height of 7 feet excluding top guard;


 9 gauges or heavier;
 mesh openings of not larger 2 inches per side;
 Twisted;
 Securely fastened to rigid material or reinforced concrete;
 Reach within 2 inches of hard ground or paving;
 On soft ground, it must reach below surface deep enough to compensate for shifting soil or sand.

b. BARBED WIRE FENCE- is a type of fencing wire constructed with sharp edges or points arranged at intervals along the
strand(s). It is used to construct inexpensive fences.

c. CONCERTINA WIRE OR DANNERT WIRE – is a type of barbed wire or razor wire that is formed in large coils which
can be expanded like a concertina.

 Opened concertina wire is 50 feet long and 3 feet diameter

ADDITIONAL PROTECTIVE MEASURES

Top Guard- an addition overhang or barbed wire place on vertical perimeter fences facing upward and outward with a 45 degree
angle with three to four strands of barbed wires space six inches apart. This will increase the protective height and prevent easy access.

3. ENTRY STATIONS –provided at main perimeter entrances to secure areas located out of the doors, and manned by guards
on a full time basis.

4. TOWER’S – a house like structures above the perimeter barrier. Height of tower increase the range of observation during
day and night with artificial illumination.

5. CLEAR ZONES – unobstructed area maintains on both sides of the perimeter barrier. It affords better observation and patrol
movement. It should be cleared of anything that may provide concealment or assistance to a person seeking an authorized
entry.

NOTE: Clear zone • 20 feet or more between the perimeter barrier and exterior structure.
• 50 feet or more between the perimeter barrier and structure within the protected areas.

Protection in Depth – in large open areas or ground, where fencing or walling is impracticable and expensive, warning signs
should be conspicuously placed.

 The depth itself is protection.

6. SIGNS AND NOTICES – erected where necessary in the management of unauthorized ingress and preclude accidental
entry.

SECURITY LIGHTING- provides sufficient illumination to areas during hours of darkness.

PURPOSES OF SECURITY LIGHTING;

1. It improves visibility so that intruders can be seen, identified and apprehend;


2. It gives psychological fear, which serves as a deterrent to thieves, pilferers, trespassers, and sabotage;
3. It make easier the routine of work guars in identifying employees, vehicles during nighty time;
5

4. It placed in certain areas, may even reduce the number of stationary guards, and instead, may require only roving patrols at night.

TYPES OF SECURITY LIGHTING;

1. Stationary Luminary- most common type consisting of fixed series of luminaries. It is commonly used on entry gates of
employees and vehicles
i. Glare Protection Type –the intensity is focused to the intruder while the observer or the guard remain in
comparative darkness.

ii. Controlled lighting –the lighting is focused on certain objects than the background.

2. Standby Lighting- similar to continuous lighting but can turned on manually or by special device or other automatic means,
when there is a suspicion of entry

3. Emergency Lighting – stand by lighting which can be utilized in the event of electrical failure.

PROTECTIVE ALARMS

Is an aural or visual signal given by the annunciator to the security when intruder actuate certain devices in a protected area.
An annunciator is a visual or audible signaling device, which initiates conditions of associated circuits.

Basically, alarm system are designed to alert security personnel of attempted or consummated intrusion into an area, building
or compound. Each type of alarm is activated in the event that an intruder tampers with the circuitry, a beam or radiated waves. Alarm
are also for fire, smoke, or other emergencies and presence of hazards.

THREE BASIC PARTS OF ALARM

1. Sensors – device that can sense abnormal condition within the system and provide a signal indicating.

2. Circuit – it is the communication channel that conveys the information from all sensors in the system to the signal by means of
wire, radio waves.

3. Signal- The actual alarm may be audible or silent, a bell buzzer, phone ringing, or flashing of light.

TYPES OF PROTECTIVE ALARM

1. Central Station System – Several separate compounds tie their alarm system to a central station so that in case of need, the central
station calls for assistance to the police, fire department, hospital or with other government assisting units.

2. Proprietary System – Similar to the central station type excepts that the proprietary console is located inside the subscribers
installation who owns or bases the system.

3. Auxiliary System – an installation owned system which is a direct extension of the local enforcement agency and/or fire department
by special arrangements.

4. Local Alarm System – Consists of rigging up visual or audible alarm near the object to be protected. In case of alarm, response will
be made by the local guards and other personnel within sight or hearing.

FIRE PROTECTION

FIRE ALARM – any visual or audible signal produced by a device or system to warn the occupants of the building or firefighting
elements of the presence or danger of fire to enable them to undertake immediate action to save life and property and to suppress the
fire.

DEVICES

1. Smoke Detector – a device placed at the ceilings of the floor that detects smoke, typically as an indicator of fire.

2. Fire Bell – a hollow device made of metal that makes a ringing sound.
6

AUTOMATIC SPRINKLER – a type of built in sprinklers which works by the increase of room temperature and which automatically
operates the system to put out the fire. Attached and distributed in the celling of the rooms. These sprinklers will go into action once a
fire starts, and those will open are those that are directly above the fire and water is delivered where it is needed.

STAND PIPES – G.I steel or plastic pipes located inside the building from the lowest to the top floor with water under pressure for
use in case of fire. Located near the standpipe is a fire hose usually enclosed in a glass box.

FIRE HYDRANT- it is a mechanical device strategically located in an installation or in a street where a fire hose will be connected so
that the water will be available to extinguished a fire.

FIRE EXTINGUISHER- Is a firefighting equipment which can is a firefighting equipment which can be portable or in cart that is
used to put out fire depending on the contents to extinguish certain types of fire.

CLASSES OF FIRE

1. CLASS A – involving ordinary combustible materials such as wood, cloth, and paper, requires an extinguishing agent which
cools. A water or multi-purpose dry chemical can be used.

2. CLASS B – fires involving flammable and combustible liquids and gases, such as solvents, greases, gasoline, and lubricating
oil , require an extinguisher which removes oxygen or cuts the chain reaction , foam , carbon dioxide, dry chemical , are effective.

3. CLASS C –fires involve energized electrical equipment (live electrical wires, electrical appliances) A non-conducting
extinguishing agent such as carbon dioxide or multi-purpose dry chemical must be used.

4. CLASS D – the result of the combustion of certain materials in firely divided forms. These metals can be magnesium, potassium,
powdered aluminum and zinc.
-flamable metals such as magnesium and titanium

5. Class K – fats, grease and oil or cooking materials from restaurants

HOW TO OPERATE FIRE EXTINGUISHER

- if you need to use a fire extinguisher, remember the word PASS;

 PULL the pin – Fire extinguisher often gave a pin, latch, or puncture lever that you need to release first.
 AIM low – Aim the nozzle or hose of the extinguisher at the base of the fire
 SQUEEZE the handle – This releases the extinguishing agent
 SWEEP from side to side – Move in close, and sweep across the base of the fire. Watch for re-flash of the fire.

ALARM DEVICE

1. Magnetic Door Contact- is a protective device usually placed in the door, and window that can send notification when the opening
and closure occurs.

2. Vibration Contact - devices mounted on barriers and are used primarily to detect an attack on the structure itself. When movement
or vibration occurs, the unstable portion of the circuit moves and breaks the current flow, which produces an alarm.

3. Passive Infrared Detector (PIR) or Motion sensor – PIRs are able to distinguish if an infrared emitting object is present by first
learning the ambient temperature of the monitored space and then detecting a change in the temperature caused by the presence of an
object.

4. Panic button – Often located under the counter, the button can be pressed in times of distress (such as robbery, disruptive or
threatening behavior, or a situation which may warrant assistance) triggering a silent alarm.
7

5. CCTV- a video monitoring system is more commonly known as closed circuit Television System. A CCTV system is a system
consisting of a television camera, video monitor and a transmission medium (Cable, fiber or Wireless ) connecting the two. It used to
monitor the premises.

IP CAMERA

1. IP based cameras work by turning images and audio into data then transmitting this data over a network or Internet connection
2. IP cameras are a type of Closed Circuit Television Camera (CCTV) used for capturing images and audio recordings in surveillance
for homes and business

3. The IP name stands for Internet Protocol, a system that allows the transmission of images captured by a digital video recorder
(DVR) to the end destination computers and these components together make up a video security system.

PROTECTIVE LOCKS

Lock – define as mechanical, electrical, hydraulic or electronic device design to prevent entry to a building or room.

Types of Locks

1. Key – Operated lock

 It uses some sort of arrangement of internal physical barriers which prevent the lock from operating unless the properly
aligned. The key is the device used to align these internal barriers so that the lock may be operated.

Padlock – a portable and detachable lock having a pivoted or sliding hasp which possess through a staple ring, or the like and is made
last or secure.

1. Combination lock – a lock that requires manipulation of parts according to a predetermined combination code of numbers.
2. Card operated lock/ Coded lock - type of lock that can be opened by inserting a coded card in a slot in the lock. or by pushing the
correct button on the surface of the lock.
3. Electronic lock – type of lock that can be closed and opened remotely by electronic means.

BIOMETRICS

 A machine that can be used for identification of humans by their characteristics or traits.
 It used as a form of identification and access control.
 It is equipped with recording device that can identify the person operating the lock and the time it was operated.

Key Control
 defined as the management of keys in a plant or business organization to prevent unauthorized individual access to the keys.

Change Key – a key to a single lock


Sub-Master Key – a key that can be open all locks within a particular area or grouping.
Master Key – a special key capable of opening a series of locks.
Grand Master Key – a key that can open everything in a system involving two or more master key groups.

PETER MAN

 A term used in England for lock picker, Safecrackers, and penetrators of restricted areas or rooms.

FLASE KEY

 Genuine key stolen from the owner

HUMAN BARRIER

Security Guard – is any natural person who offers or renders personal service to watch or guard residential or business premises or
both, government and or/ their premises for hire or compensation.

Security Supervisors – Is charged with directing work and observing the behavioral performance of the guard under his unit.
8

ORGANIZATION AND ADMINISTRATION OF SECURITY GUARD FORCE

Republic act 5487, as amended – the private security agency law, approved on June 13, 1969.
2003 Revised implementation rules and regulations (IRR) of RA 5487, as amended.

PNPSOSIA - Philippine National Police Supervisory Office for Security Investigation Agency – office under the civil security group
which is charged with the suspension, direction and control of all security agencies in the Republic.

WHO MAY ORGANIZE AND MAINTAIN PRIVATE SECURITY AGENCY AND PRIVATE DETECTIVE AGENCY;

Any Filipino citizen or corporation, association, partnership, one hundred percent of which is owned and controlled by Filipino
citizens.

Basic Requirement of and Operator or Manager of Security Agency

1. Filipino citizen;
2. Not be less than twenty-five (25) years of aged.
3. College graduate and/or a commissioned officer in the inactive service or retired from the AFP or PNP;
4. Has taken a courses/ seminars on industrial security management and / or must have adequate training or
experience in security businesses.
5. Good Moral Character
6. Having no previous record of conviction of crime or offense involving moral turpitude

QUALIFICATION OF SECURITY GUARD OR WATCHMAN

1. Filipino citizen
2. High school graduate
3. Physical and mentally fit
4. At least eighteen (18) years of age but not more than fifty (50) years old.
5. Has undergone pre-licensing course or its equivalent.
Veterans and retired military/police personnel honorably discharge including graduates of ROTC advance (or its equivalent in the
PNP) are exempted from the required Basic-Licensing Training.

QUALIFICATION FOR SECURITY OFFICER

1. Filipino citizen
2. Holder of a Baccalaureate Degree;
3. Physically and mentally fit
4. Has graduated from security officer training course or its equivalent

QUALIFICATION OF SECURITY CONSULTANT

1. Filipino citizen
2. Physically and mentally fit
3. Holder of Master’s Degree either in criminology, public administration, MNSA, Industrial security Administration, or Law
4. Must have at least ten (10) years’ experience in the operation and management of security business.

PRIVATE DETECTIVE

Any person who does detective work for hire, reward or commission, other than members of the AFP, BJMP, PNP or any
other law enforcement agencies
.
QUALIFICATION OF A PRIVATE DETECTIVE

1. Filipino citizen;
2. Physically and mentally fit;
3. Holder of baccalaureate degree, preferably Bachelors of Laws or Bachelors of Science in Criminology;
4. Graduate of a Criminal Investigation Course offered by The PNP, or NBI or any police training school, or a detective training in
any authorized/recognized training center;
9

5. Advance ROTC/CMT graduate or its equivalent

DISQUALIFICATIONS

1. Having previous record of any conviction of any crime;


2. Having previous record of any conviction of any offense involving moral turpitude;
3. Having been dishonorably discharged or separated from employment or service;
4. Being a mental incomplete;
5. being addicted to use of narcotic drug or drugs, and
6. being a habitual drunkard
7. Dummy of a foreigner

MORAL TURPITUDE

it is an act of baseness, vileness or depravity in the private and social duties which a man owes to his fellowmen or to society
in general, contrary to the accepted and customary rule of right and duty between a man and man.

Conduct that is considered contrary to community standards of justice, honesty and good morals.
Example, RAPE, FORGERY, ROBBERY.

TYPES OF SECURITY GUARD FORCE

1. Company Guard Force – security force maintained and operated by any private company/corporation utilizing any of its
employees to watch secure and guard its establishment.

2. Security Agency service – security guard belonging to privately licensed agency (contractual basis);

3. Government Guard Force – security unit maintained and operated by any government entity other than military or police.

POSSESION OF FIREARMS

1. One (1) firearm for every two (2) security guards;


2. Private security agency/private detective agency/company security force/government security force shall not be allowed to
possess firearm in excess of five hundred (500) units;
3. Shotgun not higher than 12 gauge
4. Weapons with bores not bigger than cal.22 to include pistols and revolvers with bores bigger than cal.38

Exemption; in areas where there is an upsurge of lawlessness and criminality as determined by the Chief PNP, Regional
Office or their authorized representative, they may allowed to acquired, possess and use high powered firearms.

NUMBER OF SECURITY PERSONNEL TO BE MAINTAINED TO SECURE REGULAR LICENSE TO OPERATE

1. Private Security Agency – minimum of two hundred (200) licensed private security personnel and a maximum of one thousand
(1,000)

2. Company Guard Force/private Detective Agency – minimum of thirty (30) and a maximum of one thousand (1,000)

LIMITATION IN THE CARRYING OF FIRE ARMS

a. No firearm shall be borne nor be in the possession of any private security personnel except when in actual performance of
duty, in the prescribed uniform, in the place and time so specified in the Duty Detail Order (DDO)
b. Shall be carried only within the compound of the establishment where he is assigned to guard.

c. While escorting big amount of cash or valuable outside of its jurisdiction or area of operation, private security agency shall
issue an appropriate Duty Detail Order to the security personnel concerned.
10

Duty Detail Order (DDO) – is a written order/schedule issued by a superior officer usually the private agency/branch manager or
operations officer assigning the performance of private security/detective services duties.

DDO for the purpose of post duties not requiring transport of firearms outside of the physical compound or property of a
client or client establishment shall be issued for not more than a thirty (30) days duration.

CLASSIFICATION OF TRAINING AND ITS DURATION

1. Basic Security Guard Course (Pre-Licensing Course) - 150 hours:

2. Re-Training Course - 48 hours

3. Security Officers Training Course -300 hours

4. Basic Security Supervisory Course - 48 hours

 All License to Operate have a validity of two (2) years.


 All applications for renewal of license to operate (LTO) shall be filed at least sixty (60) days before the expiry date of LTO.
 No application shall be approved unless a certification is issued by FED-CSG to the effect that all licenses of firearms of the
agency are updated/renewed for at least one (1) year forthcoming during the validity of the renewed LTO.

APPROVAL , CANCELLATION , SUSPENSION OF LTO

Chief PNP

 Approval of New Regular LTO


 Cancellation of Regular LTO
 Re - instatement of Regular LTO
 Suspension of Regular LTO

Director Civil Security Group

 Renewal of Regular LTO


 Approval of Temporary LTO
 Reversion of Regular to Temporary LTO
 Cancellation of Temporary LTO
 Suspension of Temporary LTO

SURETY BOND

Agency with 1-199 guards P50,000.00

Agency with 200-499 guards - P100.000.00

Agency with 500-799 guards P150,000.00

Agency with 800-1000 guards - P200.000.00

STOCKING OF AMMUNITION

1. Stocks of ammunition in the agency shall not exceed fifty (50) rounds of ammunition per unit of duly licensed firearms.
2. Individual issue to each security guards shall be limited to twenty five (25) rounds for every security guard.

CONFISCATION OF FIREARMS OF SECURITY GUARD


11

1.When the firearm is about to be used in the commission of a crime


2. When the firearm is actually being used in the commission of a crime
3. When the firearm has just been used in the commission of a crime
4. When the firearm being carried by the security guard is unlicensed or a firearm is not authorized by law and regulation for his use
5. When the confiscation of the firearm is directed by the order of the court
6.When the firearm is used or carried outside the property, compound or establishment serviced by the agency without proper
authority or
7. When a security guard does not possess any license to exercise his profession In all the above cases, the confiscating officer shall
inform immediately the agency concerned.

REVOCATION OF LICENSE TO POSSESS FIREARM

1. Failure to submit any issued firearm for verification as required.


2. Carrying firearms by security personnel without appropriate Duty Detail Order.
3. When the firearm serial number has been duplicated on another firearm or using one firearms license for more than one firearm
other than those stipulated in the license.
4. Carrying of firearms outside of the place stated in the permit or in places prohibited under the law.
5. When the firearm was reported lost.

SECURITY PERSONNEL RANKS , POSITIONS , STAFFING PATTERN AND JOB DESCRIPTION

1. Security Management Staff

1.1 Security Director (SD) -Agency Manager / Chief Security Officer - responsible for the entire operation and
administration / management of the security agency.

1.2 Security Executive Director (SED) - Assistant Agency Manager / Asst. Chief Security Officer -Assist the Security
Director
1.3 Security Staff Director (SSD) - Staff Director for Operation and Staff Director for Administration

 The Staff Director for operation -assistant of the security manager for the efficient operation of the agency

 The Staff Director for Administration - is the staff assistant of the agency manager for the effective and efficient
administration and management of the agency

1.4Security Staff Director for Training- Staff in charge for Training - responsible for the training of the Agency's security
personnel.

2. Line Leadership Staff

2.1 Security Supervisor 3 - Detachment Commander is the field or area commander of the agency
2.2 Security Supervisor 2 - Chief Inspector - responsible for inspecting the entire area covered by the detachment
2.3 Security Supervisor 1- Inspector - responsible for the area assigned by the Chief Inspector or the Detachment
Commander.

3. Security guard

3.1 Security Guard 1 - Watchman / guard- the one actually posted as watchman and or guard
3.2 Security Guard 2- Shift in- charge- responsible for the security officers who are scheduled in a certain shift for a
particular period
3.3 Security Guard 3 - Post in- charge -responsible for the entire detailed security office within a certain establishment

NOTE; Security Agency operator / manager / owner can put its own staffing pattern provided it is consistent with the provisions of
IRR of RA 5487

ADVANTAGES OF COMPANY GUARD FORCE

1. High caliber and receives higher salary


2. Provides better service
12

3. Can be trained to handle some of the more complex security duties


4. More familiar with facilities they protect
5. Tend to be more loyal with the company.

DISADVANTAGES:

1. May be required to join the union


2. Cost more;
3. Problem of ensuring availability of back - up personnel

ADVANTAGES OF AGENCY GUARD SERVICES

1. Less expensive
2. Use is convenient
3. Less administrative and personnel problems
4. Agency assumes full responsibility for the scheduling and supervising of all guard personnel
5. Can easily obtain extra guard if needed
6. Agency easily usually accepts liability of civil suits

DISADVANTAGES:

1. Lack of training, low caliber employee


2. No loyalty to the company
3. Large turnover
4. Not familiar with facilities

ESSENTIAL QUALITIES OF SECURITY GUARD

1. Alertness - being watchful in spotting violator, a person, a vehicle or an incident


2. Judgment - sound and good judgment to arrive at wise and timely decisions
3. Confidence - faith in oneself and his abilities
4. Physical Fitness - always in a condition to render effective service even under the most strenuous conditions
5. Tactfulness - ability to deal with others successfully without offending
6. Self-Control - ability to take hold of oneself regardless of a provoking situation

GENERAL FUNCTIONS OF A SECURITY GUARD

1. Enforce company rules and regulations


2. Operate and enforce the personnel identification system
3. Patrol and observe designated areas perimeter, structures, installation
4. Take into custody a person attempting or giving unauthorized access in restricted, limited and controlled areas
5. Check rooms, buildings, storage rooms of security interest and after working hours check proper locking of doors and gates
Perform escort duties when required
6. Respond to alarm signals or other indications suspicious activities and emergencies:
7. Safeguard equipment and material against sabotage, unauthorized access, loss, theft or damage
8. At quickly in situations affecting the security of installation and personnel, to fire accidents internal disorder, attempts to
commit criminal acts
9. Control and regulate vehicle and personnel traffic within the compound as well as parking of vehicle
10. Other duties that is necessary in the security guard function

POWER AND DUTIES OF SECURITY GUARD

1. Territorial Power - A security guard shall watch and secure the property of the person firm or establishment with whom he
or his agency has a contract for security services. Such services shall not extend beyond the property or compound of said
13

person, firm or establishment except when required by the latter in accordance with the terms of their contract, or in hot
pursuit of criminal offenders
2. Arrest by Security Guard - A security guard or private detective is not a police officer and is therefore, clothed with police
authority However, he may arrest a person under the circumstances mentioned in Section 5 , Rule 113 , Revised Rules of
Criminal Procedure
3. Search without Warrant - Any security guard may, incident to the arrest, search the person so arrested in the presence of at
least two (2) witnesses. He may search employees of the firm or establishment with which he or his agency has a contract,
when such search is required by the very nature of the business of the person, firm or establishment

DUTIES DURING STRIKES AND LOCKOUTS;

1. All private security personnel in direct confrontations with strikers, marchers or demonstrators shall not carry firearms. They may
carry only night sticks (baton) which may or may not be provided with fear gas canister and dispenser. Security personnel not in
direct confrontation with the strikers may carry in the usual prescribed manner their issued firearm.

2. Private Security personnel shall avoid direct contact either physically or otherwise with the strikers;

3. They shall stay only within the perimeter of the installation which they are protecting at all times;

4. In protecting and securing the assets and persons of their clients, shall only use sufficient and reasonable force necessary to
overcome the risk or danger posed by strikers or hostile crowds.

5. They shall refrain from abetting or assisting acts of management leading to physical clash of forces between labor and management.

6. They must all times be in complete uniform with their names and agency’s name shown on their shirts above the breast pockets.

POWER OF CITY, MUNICIPAL MAYORS IN CASE OF EMERGENCY;

- In case of emergency or in times of disaster or calamity when the services of any security agency/entity and his personnel are
needed. The city or municipal mayor, may muster or incorporate the members of the agency or agencies nearest the area of
such disaster or calamity to help in the maintenance of peace and order, prevention of crime, or apprehension of violators of
laws and ordinance and in the protection of lives and properties.
- They shall receive direct orders from the Chief of Police of the city or municipality for the duration of the emergency,
disaster or calamity.

SUPERVISION OF THE PNP;

- In case of emergency or in times of disaster or calamities, the Chief of PNP may deputize any security guards to assist PNP in
the performance of police duties for the duration of such emergency, disaster or calamity. Licensed guards, who are actually
assigned to clients with DDO, shall be deputized by the Chief PNP, and clothed with authority to enforce laws, rules and
regulations within his area of responsibility.

INTER-RELATIONSHIP BETWEEN PRIVATE SECURITY PERSONNEL AND MEMBERS OF THE PNP;

1. Private security personnel are always subordinate to members of PNP on matters pertaining to law enforcement and crime
prevention. They cannot enforce any provision of the law except in executing citizen’s arrest and/or conducting initial investigation of
a commission of the crime. In such case, any arrest person shall be return over immediately to the nearest PNP unit/stations.

2. Criminal investigation is the responsibility of the PNP. All results of initial investigation conducted by private security
personnel and all evidence gathered by them shall be returned over to PNP unit/station concerned as matter of course without delay.
14

GROUNDS FOR CANCELLATION OF SECURITY GUARD LICENCE

1. Assisting or protecting criminals during on or off duty status;

2. Providing confidential information to unauthorized person;

3. Posted security guard found drunk or drinking intoxication liquor; and

4. Other similar acts.

THEFT AND PILFERAGE

Theft – committed by any person, who with intent to gain but without violence, against, or intimidations of person nor force upon
things shall be take property of another without the latter consent.

PSYCHOLOGICAL EXPLANATION OF THEFT

1. The need or desire – An individual may need or desire to commit an act because of financial problem, inadequate income,
extravagant living, gambling.

2. Psychological needs (Kleptomania) – is an irresistible urge to steal items of trivial value. People with this disorder are compelled
to steal things, generally, but not limited to, object of little or no consent.

3. The criminal tendency – The individual with such tendency may be more tempted to steal if security control is inadequate.

THE CASUAL AND SYSTEMATIC PILFERER

Casual pilferer – One to steal due to his inability to resist the unexpected opportunity and has a little fear of detection.

Systematic pilferer- one to steal with preconceived plans and takes away any or all types of items or supplies for economic gain.

COMMUNICATION SECURITY – is the protection resulting from application of various measures which prevent or delay the
enemy or unauthorized person from gaining information through the communication system. This includes;

a. Transmission security – component of communications security which results from all measures designed to protect
transmission from interception.

b. Cryptographic security – results from the provisions of technically sound crypto-system and their proper use.

c. Physical security – providing safeguards to equipment and material from access by unauthorized persons.

THREAT OF COMMUNICATION SECURITY

1. Wiretapping – is the monitoring of telephone conversations by a third party, often by convert means.

2. Bugging – means to secretly listen to or record a conversation using a hidden electronic device.

3. Eavesdropping (unauthorized listening) – is the unauthorized real time interception of a private communication such as a phone
call, instant message, videoconference or fax transmission.

R.A No. 4200, Approve June 19, 1965 - An act to prohibit to penalize wiretapping and other related violation of privacy of
communication, and other purposes.

UNLAWFUL ACT

Sec. 1
15

It shall be unlawful for any person, not being authorized by all the parties to any private communication or spoken word, to tap any
wire or cable, or disc record, or arrangement, to secretly overhear, intercept, or record such communication or spoken words by using
any other device commonly known as a dectaphone or dictagraph or walkie-talkie or tape recorder.

It shall be unlawful for any person, be he a participant or not in the act or act penalized in the next proceedings sentence, to knowingly
possess any tape record, wire record, disc record or any other such records, or copies thereof, of any communication or spoken word
secure either before or after the effective date of this act in the manner prohibited by this law; or to reply the same for any other person
or person’s; or to communicate the contents thereof, either verbally or writing, or to famish transactions thereof, whether complete or
partial, to any other person.

Provided, that the use of such record or any copies thereof as evidence in any civil, criminal investigation or trial of offenses mention
in sec. 3 hereof, shall not be covered by this prohibition.

Sec. 3

Nothing contained in this Act, however, shall render it unlawful or punishable by any peace officer, who is authorize by a written
order of the court, to execute by any of the act declared to be unlawful in the two proceeding sections in case involving the crime of
treason, espionage, provoking war and disloyalty, in case of the war, piracy, mutiny in the high seas, rebellion, conspiracy and
proposal to commit rebellion, inciting to rebellion sedition, conspiracy to commit sedition, inciting to sedition, kidnapping as defined
by the revise penal code, and violation of commonwealth act no. 616, punishing espionage and other offenses against national
security.

AUTHORIZATION

The authorization shall effective for the period specified in the order which shall not exceed sixty (60) days from the date of issuance
of the order, unless extended or renewed by the court upon being satisfied that such extension or renewal is in the public interest.

The court referred to in this section shall be understood to mean the court of first instance within whose territorial jurisdiction the act
for are to be executed.

BANK SECURITY – a specialize type of physical security protecting the assets, personnel and operation of the bank, with special
emphasis on the precaution and measures to safeguard the cash and assets while in storage, in transit, and during transaction.

 Bangko Sentral ng Philipinas (BSP) Circular no. 620 issued on September 3, 2008 – a circular issued by BSP concerning
regulations on Bank protection which aim to promote maximum protection which aim to promote maximum protection of life
and property against crimes (rubbery, theft etc.) and other distractive causes.

Guard System - BSP requires that all banking offices be manned by adequate number of security personnel to be determined by the
bank, taking into consideration its size, location, cost and overall bank protection robbery.

Security Devices - Banks are required to have a robbery alarm or other appropriate device for promptly notifying law enforcement
office either directly or through an intermediary of an attempted, ongoing or perpetrated robbery.

In Armored Car Operations – all armored vehicles are required to be built with bullet resistant materials capable of withstanding the
firepower of high powered firearm (M16, M14). Also equipped with a vault or safe or a partition wall with a combination lock
designed to prevent retrieval of the cargo while in transit.

DOCUMENTS AND INFORMATION SECURITY - Security involving the protection of the documents and information form loss
access by unauthorized person.

 Prescribes the policies and establishes the standard basic procedure governing the classification and security of official
matter.

DEFINITION OF DOCUMENTS
16

 Any material that contain marks, symbols, or signs, either visible partially visible or completely invisible that may be
presently or ultimately convey a meaning or message to someone.

CLASSIFY – refers to the act of assigning to information or material one of the four security classification category alter
determination has been made that the information requires the security protection as provided in the regulation.

SECURITY CLEARANCE – Is an administrative determination that an individual is eligible from a security standpoint for access to
classified matter of a specific category.

COMPARTMENTATION – Refers to the grant of access to classified matter only properly cleared person which such classified
information is required in the performance of the official duties, and restricting it to specific physical confine when feasible.

NEED TO KNOW – terms given to requirement that the dissemination of classified matter be limited strictly to those persons whose
official duties require knowledge thereof.

SECURITY OF CLASSIFIED MATTER;

CLASIFICATION OF DOCUMENTS –memorandum circular no. 196, dated 07/19/1968 (Security of Classified Matter in
government offices.)

1.TOP SECRET - any information and material, the authorized disclosure of which would case exceptionally grave damage to the
nation, politically, economically or military;

2.SECRET - any information and material, the authorized disclosure of which would endanger national security, cause serious injury
to the interest or prestige of the nation or any governmental activity.

3.CONFIDENTIAL - any information and materials, the authorized disclose of which would be prejudicial to the interest or prestige
of the nation or government activity or would cause administrative embarrassment or un warranted injury.

4. RESTRICTED- any information and material which requires special protection other than those determined to be Confidential,
Secret, and Top Secret matters.

METHOD OF TRANSMISSION;
a. By direct contact of officer or personnel concern;
b. By official courier;
c. Electrical means in cryptographic form
d. Registered mail

DESTRUCTION
a. Burning
b. Shredding

STORAGE; shall be in a safe, steel filing cabinet with built in dial type combination lock of such weight, size and construction as to
minimize the possibility of physical theft or damage to fire.

OPERATIONAL SECURITY ; Part of physical security that deals primarily with the protection of processes, formulas, patents, and
other industrial and manufacturing activities from espionage, infiltration, loss, compromise or photocopying;

INFORMATION CYCLE;

1. The Creation ; information is discovered and develop;


2. Used ; some action is take with the information;
3. Storage & Retrieval ; Stored for future use;
17

4. Transfer ; Transferring of information from active to inactive use;


5.Disposition ; decision may made to retain the information indefinitely.

KINDS OF SENSITIVE INFORMATION;

PROPRIETARY INFORMATION- information which some special way is related to the status, operation or activities of the
possessor over which the possessor asserts ownership.

TRADE SECRETS- it may consist of any formula, pattern device or compilation of information which is used in one’s
business and which gives one opportunity to gain an advantage over competitors who do not know or use it.

PATENT - a grant given by the government to an inventor, conveying and securing to him the exclusive rights to make, use
and sell his invention for term of twenty (20) years.

LAW ON INTELLECTUAL PROPERTY

INTELLECTUAL PROPERTY CODE OF THE PHILIPPINE [Republic Act no. 8293] Approved on June 6, 1997
AN ACT PRRESCRIBING THE INTELLECTUAL PROPERTY CODE
AND ESTABLISHING THE INTELLECTUAL PROPERTY OFFICE
PROVIDING FOR ITS POWERS AND FUCTIONS, AND FOR OTHER PURPOSES

THREAT TO PROTECTION OF SENSITIVE INFORMATION

Competitive Intelligence – systematic program for gathering and analyzing information about competitor’s activities and general
business trends to further company’s goals.

Types of Competitive intelligence

1. White – information available from company publication, public records or commercial reporting sources;
2. Gray – not readily available but which is usually can be obtained without acquiring any civil/criminal liability in the process.
3. Black – obtained through clearly unethical or illegal means.

TYPES OF DOCUMENT;
CLASS I – Vital Document – This is an irreplaceable record, reproduction of which does not have the same value as the original;
CLASS II – Important Document – This is a record, reproduction of which cause considerable expense and labor, or considerable
delay.
CLASS III – Useful Document – This is a record, the loss of which may cause inconvenience but could be readily replaced and may
not present insurmountable obstacle to the prompt restoration of the business;
CLASS IV – Non essential Document – This record may include daily files, routine in nature, lost of which will not affect the
organization.

STORAGE

1. SAFE- a metallic container employees are best suited to assist the organization in achieving its mission and vision;
2. VAULT – a heavily constructed fire and burglar resistant container usually part of the building structure
3. FILE ROOM – a cubicle in a building constructed a little lighter than a vault but if bigger size to accommodate limited people to
work on the records inside.

PERSONNEL SECURITY

 Refers to the procedure followed, requires conduct and criteria applied to determine the work suitability of a particular
applicant or the retention of a particular employee.
18

PURPOSE

1. To ensure that hired employees are best suited to assist the organization in achieving its mission and visions;
2. To assist in providing the necessary security to the employees while they carry out their functions.

PERSONNEL SECURITY INVESTIGATION (PSI)

It is an inquiry in to the character, reputation, discretion, integrity, morals and loyalty of an individual in order to determine a person’s
suitability for appointment or access to classified matter.

TYPES OF PSI

1. National agency check


2. Local agency check
3. Partial background investigation
4. Complete background investigation

BACKGROUND INVESTIGATION (BI) – It is an inquiry which aim to verify applicant’s information written at the applicant
form, to ascertain his/her past employment experiences and to obtain other information pertinent to the decision to employ.

FACTORS TO BE CONSIDERED IN THE CONDUCT OF BI

1. Loyalty – faithful allegiance to the Philippine government and it duty constitutional authorities;
2. Integrity – uprightness in character, soundness in moral principle, freedom, from moral delinquencies;
3. Discretion – the ability or tendency to act or to decide with prudence, the habit of wise judgment;
4. Morals – distinctive identifying qualities which serve as an index to the essential or instinctive nature of a person;
5. Character – the sum of traits that have been empresses by nature, education and habit upon the individual;
6. Reputation – opinion or statement in which one is generally held. it is what a person is reported to be whereas character is what a
person is.

INVESTIGATIVE COVERAGE

1. Prior employment;
2. Claimed education;
3. Claimed residence for the period covered in the employment and education institutes;
4. If the candidate indicates a criminal record, then the details should be checked.

INVESTIGATIVE STANDARDS

1. Information sought should be relevant;


2. Information should be reliable;
3. If unfavorable, the information should be confirmed by at least two sources.

SECURITY SURVEY

 A fact finding probe to determine a plant’s adequacy in all aspect of security with the corresponding recommendations.
 Refers to checklist, audit, or inventories of security conditions.
 Security surveys are often called RIST ANALISIS SURVEY’ or RIST ASSESMENT SURVEYS.
19

PURPOSES OF SECURITY SURVEY

1. To determine the existing state of security;


2. Identifying weakness in defense
3. To determine the degree of protection required;
4. To produce recommendation for a total security system.

The survey should be undertaken by either suitably trained staff security personnel, or a fully qualified independent security specialist.
No universal checklist can be applied to all site for survey purposes, as no two facilities are alike.

BEFORE COMMENCING A SECURITY SURVEY:

1. Written authority should be obtained from proper authority;


2. Previous surveys should be reviewed;
3. An orientation tour should be made;
4. Photographs should be taken of things which will be difficult to describe in a report. (Only with authority)

After completing the survey an immediate review of the findings should be undertaken with the plant supervisor so that urgent
deficiencies can be address.

 A follow-up survey should always be conducted to ensure improvements.


 Any survey report including list of recommendations is complete without including cost-benefits analysis, which is;

- A direct comparison of the cost of operation of the security unit and all existing security measures with the amount of the
corporate assets saved or recovered as well as reduction of losses cause by injuries and lost production and recommendation
has been made.

PLANNING

 Process of developing methods or procedures or an arrangement of parts intended to facilities the accomplishment of a
definite objective.
 The process of setting goals, developing strategies, and outlining task and schedules to accomplish the goals.

SECURITY PLANNING

 It is PRE-DETERMINING a course of location;


 It is deciding IN ADVACE what to do, how to do it and who is to do it.

GOAL OF SECURITY PLANNING

1. To minimize effects of any incident upon plant and personnel;


2. To keep property, and equipment loss at a minimum;
3. To ensure cooperation of all plant departments charge with specific activities of an emergency;
4. To ensure appropriate cooperative action by and outside civic and government agencies.

KEY STEPS IN PLANING

1. Get in touch and coordinate with your local civil authorities. (Tie your programs with theirs and standardize equipment with them
thus creating compatibility);
2. Visits neighboring Plants/offices (coordinate your activities with their);
3. Survey you plant for possible hazards and take immediate action to lessen or eliminate them;
20

4. Appoint a disaster director or disaster coordinator;


5. Early in planning stage, present the program to your employees and enlist their active support;
6. Call an organization meeting of Head of Services, employee representatives and key personnel. (outline purpose of the program and
explain how the plant should organize for protection;
7. Define the Program.

TESTING THE PLAN

BENEFITS IN TESTING THE PLAN

 Deficiencies will be uncovered;


 People involved in the implementation of the plan will receive valuable training.

TWO TYPES OF TESTING THE PLAN

 Partial (by elements);


 Complete (entire organization)

KEEPING THE PLAN UP TO DATE

 Changes in Personnel and Facilities

SECURITY EDUCATION

It is defined as the exposure and teaching of employees on security and its relevance to their work. Security education is
conducted to develop security awareness among employees of the company. It should cover all employees, regardless of rank or
position.

PERSONAL SECURITY

Protection of personnel especially ranking official from any harm, kidnap, and others act. VIP security is type of personnel
security.

POLICE SECURITY PROTECTION GROUP (PSPG) - is mandated by law to provide protective security to government officials,
foreign dignitaries, and private individuals authorized to be given protection and also provide physical security to vital installations,
and assist the Presidential Security Group (PSG) in securing the President and the members of the First Family.

PROTECTIVE CUSTODY - state or quality of being secured or freed from danger. It may also include the various means or devices
designed to guard a persons and property against a broad range of security hazard.

THREAT - is an indication of something impending and usually undesirable or unpleasant, with an intention to inflict evil, injury or
damage on another, usually as retribution or punishment for something done or left undone. It is an expression of an intention to inflict
loss or harm on another by illegal means and especially by involving coercion or duress over the person or his welfare.

THREAT ASSESSMENT - the process of investigation / validating the truthfulness of the existence of threat to an individual.

EMERGENCY SITUATION - condition or state that danger has already occurred which resulted to loss of liberty and or there is
imminent danger or threat to life and property where delay will endanger or may cause the loss of life / property.

DEFINITION OF TERMS
21

1. Access List - authenticated list of personnel given to the security allowing entry to a compound or installation or part thereof

2. Controlled Area - an area near or adjacent to limited or exclusive areas where entry is restricted

3. Dry - run - practical test or exercise of plans or any activity to test its validity, an operational readiness exercise

4. Duress Code - type of code system so that security personnel or any employee when forced by armed men intending to enter an
installation can five alarm by the use of certain words in casual conversation with personnel in the installation

5. Exclusion Area- a restricted area containing materials or operation of security interest

6. Restricted area - any area access to which is subject to special restriction control

7. Security Hazard - Is any act or condition, which may result in the compromise of information, loss of loss or destruction of
property or disruption of objectives of the installation

TYPES OF SECURITY

1. Industrial Security - A form of physical security that is concerned with the physical measures designed to safeguard personnel and
prevent unauthorized access to equipment, facilities materials, documents, and to protect them from espionage, sabotage, damage or
theft

2. Bank Security - the protection resulting from the application of various measures which safeguards cash and assets which are in
storage, in transit and or during transaction

3. Operational Security - Involves the protection of processes, formulas and patents, industrial and manufacturing activities from
espionage, infiltration, loss, compromise or photocopying.

You might also like