Professional Documents
Culture Documents
116202408560527856lea 3 Introduction To Security Concept
116202408560527856lea 3 Introduction To Security Concept
116202408560527856lea 3 Introduction To Security Concept
PART 1
1. PERSONALITIES:
A. Allan Pinkerton (1851)- Established the first national private security and
investigation company in the US.
B. August Pope (1853)- Patented one of the first burglar alarms.
C. Edwin Holmes ( 1858)- Introduced the first central station burglar alarms
D. Washington Perry Brinks( 1858)- Introduced the first armored carriages for
transportation of money and valuables
E. Linus Yale Jr.- in 1861, he invented and introduced the modern combination lock,
bankers quickly adopted Yale’s lock for their safe, but bank robbers came up with
several ways to get past the new inventions.
F. James Sargent- an employee of Yale, developed “theft proof lock”
THEFT PROOF LOCK
- This was a combination of lock that worked on a timer. The vault or safe door could
only be opened after a set number of hours had passed, thus a kidnapped bank
employee could not open the lock in the middle of the night even under force. Time
locks become widespread at bank in the 1870’s
G. Walter Bruch- German engineer who introduced and was responsible for the design
and installation of the system. (CCTV)
The first CCTV system was installed by Siemens Ag at Test Stand VII in
Peenemunde, Germany in 1942, for observing the launch of V-rocket.
Kings Lynn- The first place to use CCTV in the United Kingdom
-This is a sea port and market town in the ceremonial country of North folk in
the East of England
Olean New York- In September 1968, the first City in the US to install video
cameras along its main business street in an effort to fight crime. The use of
closed- circuits TV cameras piping images into the Olean Police Department
propelled Olean to the forefront of crime- fighting technology.
H. George Wackenhut( 1954)- A retired FBI agent formed the Wackenhut Corporation
an enterprise that become another one of the largest Private Security Companies in
the US.
American Society for Industrial Security ASIS (1955) this is the world largest
organization of security professional.
2. RELATED LAWS
A. REPUBLIC ACT 7641- An act amending article 287 of PD no. 442, As amended,
otherwise known as the labor code of the Philippines.
Approved: December 9, 1992
Effectivity: January 7, 1993
B. PD 96- which does not allow high government officials to use sire.
PD 96 issued on January 13, 1973 by the late President Ferdinand Marcos,
States that only “ the Armed Forces Of the Philippines, the Police Authorities,
National Bureau of Investigations, the Fire Department and Hospital
Ambulances” are allowed to use sirens.
This Law also allows President Aquino, VP Binay, CJ Corona, the Speaker
and the Senate President to use sirens.
Violators faces fine of P15,OOO
C. RA 4136- The law creating Land Transportation Commission in June 20, 1964 that
allows ambulances, police cars and fire trucks to use horn or signaling devices.
D. RA 5487- The Private Security Agency Law – has been amended by PD NO. 100
dated January 17, 1973 in order to make more responsive to the demands of the
private security industry in the country.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
2
E. PD 11- Enlarging the coverage of the private security agency law to include those
security guards and watchmen employed in logging, concession, agriculture, mining
or pasture lands. Issued on October 3, 1972
F. RA 8799- Securities Regulation Code
Approved July 17, 2000
The state shall established a socially conscious, free market that regulates
itself, encourages the widest participation of ownership in enterprises,
enhance the democratization of wealth, promote the development of the
capital market, protect investors, ensure full and fair disclosure about
securities, minimize if not totally eliminate insider trading and other fraudulent
or manipulative devices and practices which create distortion in the free
market.
3. HISTORY
The historical roots of private security agencies can be traced back to thousand
years when the protection of life and personal property were to up the individual, and
later on passed to tribes, and then to cities.
In pre- historic times, man recognized the need to keep himself safe from both
known and unknown enemies such as animals, other inhabitants and the environment
itself. He used different methods to keep himself safe.
The Greeks of ancient times were the ones who organized the first police force in
the city states which they term polis. The romans, on the other hand, established
PRAEOTORIAN GUARDS known as VIGILES who were tasked to be fighters.
In the middles Ages during their invasion in England, the French formed a group
carefully selected men called SHIRES OR SHERIFF look after the peace and order of
the different regions.
The greatest influence in the history of security came from England in 1655,
Oliver Cromwell set up in England and Wales a police force that operated to capture
and punish criminals. In 1748 London Magistrate Henry Fielding introduced the
concept of crime prevention by organizing citizen’s patrol or watchmen that not only
chased criminal for felony and misdemeanor but also served Fielding’s purpose of
preventing crime ahead of time with their patrolling function. 15 years later, English
home secretary Sir Robert peel formed the first formal police department.
A. 1950’s- The private security agencies/ guards were under the supervisions and
control of the municipal of city mayors with in the locality were they are detailed.
The only requirement in order to exercise security profession was a permit from
the city/ municipal mayor in their area of responsibility.
B. June 13, 1969
C. August 4, 1969- (PCSIASO) Organizing the Philippine Constabulary Investigating
Agency Supervisory Office.
D. June 29, 1970- (PCSUSIA)- Philippine Constabulary Supervisory Unit For
security and Investigations Agencies. Pursuant to GO. No. 404
E. January 10, 1988- Organized PC Civil Security Force Command Pursuant To G.
0 213 Memo Number 9.
F. January 24 1989- PC/INP Civil Security Force Command.
Made CSFC PCSUSIA as PC/ INPSUSIA
G. January 1, 1991- Creation of PnP, pursuant to RA 6975
PCSUSIA was renamed to Supervisory Office for Security and Investigation
Agencies( PNPSOSIA)
H. June 1, 1995- Was renamed Security agencies and Guards Supervisions
Division( PNPSAGSD)
SECURITY
-Is a state or quality, condition of being secured, freedom from fear, harm, danger, loss,
destruction or damages
- It is the assurance, guarantee and certainly of being safeguard and free from fear of
danger.
-Defense against crime (Security World Magazine, March 1973)
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
3
The security of any business establishment today is a complex process. Security works involve
active and passive measures so that effective defense can be established against crime.
Active Measure-these are physical barriers, security lighting, use of vaults, locks
and others.
Passive Measure- are those that will dates man from committing such acts for fear
of being caught, charge in court, or get dismissed; Security education programs,
investigations, fire prevention seminars, personal security checks.
Basically, it was the action of man against man that led to many unsecured and unsafe
conditions. The reason could be economic, revenge, or just plain greed and avarice. Whatever
the motives, the civilized man needs adequate protections.
3 D’s of Security
The basic theory of any security program can be summed up in the words:
A. Denial- takes the form of physical barriers like fences, walls, gates, locked doors, watch
dogs, etc. when the access id denied, the things or area are protected.
B. Detection- form of guards and electronic devices.
C. Deterrence- This can be both physical and psychological
Management in all business and organizational activities is the act of getting people together to
accomplished desired goals and objectives efficiently and effectively.
SECURITY MANAGEMENT
- The broad field of management related to asset management, physical security and
human resources safety functions. It entails the identification of organizations
information assets and the development, documentation and implementation of
policies, standards, procedures and guidelines.
SECURITY PLANNING:
- The decision making process made by executives in preparation of accomplishing
goals and objectives with in an organizations.
In security Management, a security plan composed of the Ff.
A. Situation- It explains in a short paragraph the historical background of the
organizations and its security forces.
B. Mission- Covers what plan is all about and what tends to do.
C. Execution- The concept of the project will outline and explain.
D. Administration and Logistics- involves the listing of security equipment and facilities
to be used.
E. Command and Signal- Pertains to the channel of communication needed when
implementing the project.
Security in general is very hard to comprehend; it can be divided into 3 major areas
A. Physical Security- this is the broadest branch of security which concerned with the
physical measures adopted to prevent unauthorized access to equipment, facilities,
material and document and to safeguard them against espionage, sabotage,
damage, loss and theft.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
4
B. Personnel Security- This is important as physical security. Personnel security starts
even before the hiring of employee and remains to be maintained for as long as the
person is employed.
-the purpose is to ensure that a firm hires those best suited to assist the firm in
achieving its goals and objectives and once hired assist in providing necessary
security to the work force while carrying out their functions.
C. Document and Information Security-This involves the protection of documents and
classified papers from loss, access by unauthorized persons, damage, theft and
compromise though disclosure.
-Classified documents need special handling. Lack of indoctrination and orientation
among the personal handling them can result in the leakage, loss, theft and
unauthorized disclosure of documents.
FIELDS OF SECURITY
1. IT FIELDS:
A. Computer Security- Is a branch of information security applied to both theoretical
and actual computer systems. A branch of computer science that addresses
enforcement of secure behavior on the operation of computers.
B. Data Security- Is the means of ensuring that data is kept safe from corruption and
that access to its suitably controlled.
C. Application Security- Encompasses measures taken to prevent exceptions in the
security policy of an application or the underlying system (vulnerabilities) through
flaws in the design, development, or destruction of application.
D. Network Security- Consists of the provisions made in an underlying computer
network infrastructure, policies adopted by the network administrator to protect the
network and the network- accessible resources from unauthorized access and the
effectiveness( or lack ) of the measures combined together.
2. PHYSICAL FIELDS:
A. Physical Security-Describes measures that prevent of deter attackers from
accessing a facility, resource, or information, stored on physical media. It can be as
simple as a locked door or as elaborate as multiple layers of armed guard posts.
B. Shopping Security- A type of security which is concern with protection of stores,
warehouse, storage, its immediate premises and properties as well as the
supermarket personnel and customers.
C. Airport Security- Refers to the techniques and methods used in protecting airports
and by extension aircraft from crime and terrorism.
D. Home Security- Are those methods use of protecting residential homes or town sites
which include the interior protection of houses against property losses or damages.
3. POLITICAL FIELDS:
A. International Security-Consist of the measures taken by the nations and international
organizations, such as the UN, to ensure mutual survival and safety. These
measures include military action and diplomatic agreements such as treaties and
conventions. International security is invariably linked.
B. National Security- Refers to the requirement to maintain the survival of the nation-
state through the use of economic, military and political power and the exercise of
diplomacy.
C. Human Security- Refers to the emerging paradigm for understanding global
vulnerabilities whose proponents challenge the traditional notion of national security
by arguing that the proper referent for security should be individual rather than the
state.
4. MONETARY FIELDS:
A. Financial Security- Refers to the methods applied for the protection of fungible,
negotiable instruments representing financial value.
TYPES OF SECURITY
A. Industrial Security- A type of security applied to business groups engaged in industries
like manufacturing, assembling, research and development, processing, warehousing,
and even agriculture.
B. Operational Security- Deals with primarily with the protection of process, formulas,
patents, and other operational activities of installations.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
5
C. Communication Security- the application of various measures which prevent of delay
the enemy or unauthorized persons in gaining information through the communication
system. It includes transmission security and crypto security.
D. Cryptographic Security- Results from the provisions of technically sound crypto-systems
and their proper use.
E. Bank Security- This type of security is concern with bank operations. It man objective is
the protection of bank cash and assets, its personnel and clientele. Security personnel
are trained to safeguard bank and assets while storage, in transit and during
transaction.
F. Crisis Security- Specialized field which allied if not part of VIP security which involved in
the kidnapping of VIP’S such as political leaders and the like.
-Motives can be economic, political, emotional, nationalistic, religious and their
combinations.
G. Personal Security- Protection of personnel especially rankings officials from any harm,
kidnap and other activities.
H. VIP Security- Applied for the protection of top ranking officials of the government or
private entity, visiting persons of illustrious standing foreign dignitaries.
I. School Security- The concern with the protection of students, faculty members, and
school properties. Security personnel are trained to protect the school property from
theft, vandal, handling campus riots and detecting the use of intoxicated drugs and
alcohol by the students.
PART 11
PHYSICAL SECURITY
-Physical security measures are being used to defined, protect and monitor property
rights and assets. These measures consist of barriers and devices that would detect, impede,
and prevent unauthorized access to equipment, facilities, materials and document and to safe
guard them against espionage, sabotage, damage and theft.
CONCEPT:
A. Enemy Agents must have access- In most cases espionage, acquisition of information
is the ultimate results, and means and form in which information is obtained is merely
an operational detail. Normally, information on tapes and film is as usable as the original
documents. Therefore in considering access, one should think not only of current
physical access to the discussion of the matter by the use of clandestine listing device.
B. There is no impenetrable barriers- in an unfriendly government or organizations is
willing to devote enough time, money, personnel, materials, and imagination to passing
a barrier, it can do so. So we can attempt to build defense in depth by using then one
barrier.
C. Surreptitious vs non- Surreptitious entry – The possibility of surreptitious entry is the
greatest hazard from standpoint of counter intelligence security because it is usually
difficult to neutralize the act of espionage because surreptitious entry is not usually
detected.
D. Each installation is different- Since each installation is different and it will have different
problems to overcome. The security procedures will not be adequate for all installations.
FOUR LAYERS OF PHYSICAL SECURITY
A. Environmental Design- The initial layer of security for a campus, building, office, or
physical space uses environmental design to deter threats.
B. Mechanical and electronic access control- Includes gates, doors, and locks. Key control
of the locks becomes a problem with large user populations and any user turnover.
Keys quickly become unmanageable forcing the adoption of electronic access control.
C. Intrusion detection- Monitors for attacks. It is less preventive measures and more of a
response measure. Although some would argue that it is a deterrent. Intrusion detection
has a high incidence of false alarms.
D. Video monitoring- are more useful for incident verification and a historical analysis. For
instance, if alarm is being generated and there is camera in the place, the camera could
be viewed to verify the alarm.
BARRIERS
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
6
-this can be defined as any physical structure whether natural or man-made capable of
restricting, deterring, delaying or preventing illegal and unauthorized access to an installation.
1. NATURAL BARRIERS-
Advantage:
A. They can provide a protection system without additional cost to the
installation
B. The difficulty to penetrate an installation increase according to the barriers.
Disadvantage:
A. Trees, ravines, vegetation could serve as a hiding place to any possible intruder.
B. Installations that have as barrier a body of water could be subject to penetration
through team divers.
OTHERS:
BODIES OF WATER AS BARRIERS:
ADVANTAGE:
A. When the surface of the water is calm, it offers the guard or security personnel a
very extensive filed view range.
B. Water offers much resistance to a vehicle used by intruder by making its almost
impossible to have rapid access to the installation.
C. To gain access, the task of hiding a vehicle or boat without been detected by the
guards or security personnel will be an obstacle to the intruder.
DISADVANTAGE:
A. When the water is agitated it reduces the field of vision of the guards or security
personnel.
B. It is possible to control the movement of a vehicle or boat to keep it hidden between
waves
C. The surface of the water reflects the lights given by the illumination system. An
intruder may use this situation in their favor when trying to penetrate an installation.
2. MAN-MADE BARRIERS
- Are structural constructions like fences walls, floors, roof, grills, bars, road, blocks, or
other physical means to deter or impede penetration.
FENCES:
- Fences are independent structures, generally in a vertical plane, designed for the
physical and or visual control of access to external.
Generally, a fence is use for the ff. purposes:
A. Outline the physical limits of an area.
B. Create a physical and psychological deterrent to unauthorized entry.
C. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of
intruders.
D. Assist in more efficient and economical employment of guards.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
7
E. They deny accidental access to innocent person to the protected area.
F. Facilities and improve the control and vehicular traffic.
TYPES OF BARRIERS
A. Natural Barriers- It includes bodies of waters, mountains, marshes, ravines, deserts or
other terrain that are difficult to traverse.
B. Structural Barriers- these are features constructed by man regardless of their original
intent that tends to delay the intruders.
C. Human Barriers- Person being used in providing a guarding system or by the nature of
their employment and location fulfill security functions.
D. Animal Barriers- Animals are used in partially providing a guarding system. Dogs are
usually trained and utilized to serve as guard dogs. German shepherds are best suited
for security functions. Goose and turkeys could also be included.
E. Energy Barriers- It is the employment of mechanical, electrical, electronic energy
imposes a deterrent to entry by the potential intruder or to provide warning to guard
personnel. These are protective lighting, alarm system and any electronic devices used
as a barrier
THREE LINE OF PHYSICAL DEFENSE
A. First Line of Defense- perimeter fences, barriers
B. Second Line of Defense- Doors, floors, windows, walls, roofs and grills and other entries
of the building.
C. Third Line of Defense- storage system like steel cabinets, safes vaults and interior files.
PERIMETER BARRIERS
- A medium or structure which defines the physical limits of an installation, or area to
restrict or impede access thereto. It is any physical barrier used to supplement the
protection of an inside or outside perimeter.
- This maybe form of fences, building walls or even bodies of water
- The main purpose of perimeter barrier is to deny or impede access or exit of un
authorized person.
OTHER PURPOSE OF PERIMETER BARRIER
- Defines the boundary of the property to be secured.
- Creates a physical and psychological deterrent to unauthorized entry.
- Delays intrusion, thus facilitating apprehension of intruders.
- Assists in a more efficient and economical employment of guards
- Facilitates and improves the control of pedestrian and vehicular traffic.
TYPES OF FENCES
A. Solid Fence- constructed in such a way that visual access through the fences is denied. On
the other hand, it prevents the guards from observing the area around the installation and it
creates shadow that may be used by the intruder for cover and concealment.
AD VANTAGE:
1. Denies visual access of the installation to the intruders
2. Denies the intruder the opportunity to become familiar with the personnel, activities,
and time scheduled of the movement of the guards on the installation.
DISADVANTAGE:
1. It prevents the installation guards from observing the area around the installation.
2. A solid fence creates shadows which may be used by the intruder for cover and
concealment.
B. FULL VIEW FENCE- It is constructed in such a way that visual access is permitted through
the fence. It allows the intruders to become familiar with the movements and time schedule
of the guard patrols thereby allowing him to pick the time that is advantageous on his part.
ADVANTAGE:
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
8
1. Roving patrols and stationary guards are able to keep the area surrounding the
installation under observation
2. It does not create shadows which would provide cover and concealment for the
intruder.
DISADVANTAGE:
1. It allows visual access to the installation, its personnel, its guards; and its activities.
2. It allows the intruder to become familiar with the movements and he time schedule of
the guards patrol; thereafter- allowing him to pick the time for attempting penetration
which would be the most advantageous to him.
TYPES OF FULL-VIEW FENCE
CHAIN LINK FENCES
1. It must be constructed of 7 feet materials excluding top guard.
2. Must be of 9guage or heavier.
3. Mesh opening are not to be larger than 2 inches per side
4. It should be twisted and barbed salvage at top and bottom.
5. It must be securely fastened to rigid metal or reinforced concrete.
6. Must reach within 2 of hard ground or paving.
7. On soft ground, must reach below surface deep enough to compensate for shifting
soli or sand.
BARBED WIRE FENCE
1. Standard barbed wire is twisted, double –strand 12gauge wire with 4 points barbs
space an equal distant apart.
2. Barbed wire fencing should not be less than 7 feet high excluding top guard.
3. Barbed wire fencing must be firmly affixed to post not more than 6 feet apart.
4. The distance between strands must not exceed 6’ and at least one wire will be
interlaced and midway between posts.
CONCERTINA WIRE FENCE
1. Standard concertina barbed wire is commercially manufactured wire oil of high
strength steel barbed wire clipped together at intervals to form a cylinder.
2. Opened concertina wire is 50 feet long and 3 feet in diameter.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
9
B. Guard Control Stations- this is normally provided at main perimeter entrances to secure
areas located out of doors, and manned by guards on fulltime basis. Sentry station
should be near a perimeter for surveillance at the entrance.
C. Tower Guard- this is house-like structure above the perimeter barriers. The higher the
tower the more visibility it provides. It gives a psychological unswerving effect to the
violators. By and large guard tower, whether permanent or temporary, must have
corresponding support force in the event of need. Towers as well as guard control
stations should have telephones, intercoms, and if possible two way radios connected
to security headquarters or office to call for reserves in the event of need.
D. Barrier Maintenance- Fencing barrier and protective walls should always be regularly
inspected by security. Any sign or attempts to break it should be reported for
investigations. Destructions of fences or section thereof should be repaired immediately
and guard vigilance should be increase.
E. Protection in Depth- In large open areas or ground where fencing or walling is
impractical and expensive, warning sign should be conspicuously placed. The depth
itself is protection reduction of access road, and sufficient, notices to warn intruders
should be done. Use of animals as guards and intrusion device can also be good as
barriers.
F. Signs and Notices- “control signs” should be erected where necessary in the
management of unauthorized ingress to preclude accidental entry. Signs should be
plainly visible and legible from any approach and in an understood language or dialect.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
10
B. Emergency Communication- ex. Messenger
In counter intelligence security consideration there are two outstanding energy barriers:
PROTECTIVE LIGHTING
- The idea that lighting can provide improve protection for people and facilities is as
old civilization. Protective lighting is the single most cost- effective deterrent to crime
because it creates a psychological deterrent to intruders.
PURPOSE OF PROTECTIVE LIGHTING
A. It provides sufficient illumination to the areas during hours of darkness.
B. Lighting can help improve visibility so that intruder can be seen and identified and, if
possible, apprehended.
C. It serves as deterrent to would-be thieves.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
11
B. Street Lights- This lighting equipment’s received the most widespread notoriety for its
value in reducing crime.
C. Search Lights- These are highly focused incandescent lamp and are designed to
pinpoint potential trouble spots.
D. Fresnel Lights- These are wide beam units, primarily used to extend the illumination in
long, Horizontal strips to protect the approaches to the perimeter barriers. Fresnel
projects a narrow, horizontal beam that is approximately 180 degrees in the horizontal
and from 15 to 30 degrees in vertical plane.
AREAS TO BE LIGHTED
A. Perimeter Fence
B. Building Faces Perimeter
C. Pedestrian and vehicle entrance
D. Parking area
E. Storage, large open working areas, piers, docks, and other sensitive areas.
ALARMS - Aural or visual signal given by annunciator to security when intruder actuates
device in a protected area. An annunciator is a visual or audible signaling device which
initiates conditions of associated circuits.
-Basically alarm systems are design to alert security personnel to consummated or attempted
intrusions into an area, building or compound. Each type of alarm is activities in the event that
an intruder tempers with the circuitry, a beam or radiated waives. Intrusion alarm can be
electrical, mechanical or electronics. Alarms are also used for fire, smoke or other
emergencies and presence of other hazards.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
12
B. Proprietary System- Centralized monitor of the propriety alarm system is located in the
industrial firm itself with duty operator. In case of alarm, the duty operator calls whatever
is the primary need; firefighter, police, an ambulance or a bomb disposal unit.
C. Local Alarm- This system consists of ringing up a visual or audible alarm near the object
to be protected. When an intruder tries to pry a window, the alarm thereat goes off.
D. Auxiliary Alarm- Company-owned alarm systems with a unit in the nearest police station
so that in case of need, direct call is possible. The company maintains the equipment
and lines both for the company and those in the police, fire and other emergency
agencies by special arrangement. It can be availed of by radio, landline, or cell phones.
KINDS OF ALARM S:
A. Audio Detection Device- It will detect any sound caused by attempted force entry. A
supersonic microphone speaker sensor is installed in walls, ceiling and floors of the
protected area.
B. Vibration Detection- It will detect any vibration caused by attempted force entry. A
vibration sensitive sensor is attached to walls, ceilings or floors of the protected area.
C. Metallic Foil or Wire- It will detect any action that moves that foil or wire. An electrically
charge strips of tinfoil or wire is used in the doors, windows or glass surface of the area.
D. Laser Beam Alarm- A laser emitter floods a wall or fencing with in a beam so that when
this beam is disturbed by a physical object an alarm is activated.
E. Photoelectric or Electric Eye Device- An invisible/visible beam is emitted and when this
is disturbed or when an intruder breaks contact with the beam, it will activate the alarm.
INTRUSION ALARM DEVICES – These are designed to detect and not to prevent criminal
acts and should be used normally as an adjunct and not a replacement of the human guard
forces. The primary consideration on the choice of a particular alarm system includes stability
and reliability. Desirable characteristics furthermore should include:
A. A detection unit should initiate the alarm upon intrusion of a human being in the area or
vicinity to be protected area or object.
B. Panel board central annunciator operating console- monitoring activities should be
manned at all times.
C. Fail-safe features which give alarm in the annunciator when something is wrong with
the system.
D. System should be difficult to tamper or render ineffective by outsider, saboteurs.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
13
D. Maintenance of alarm system must be regularly made, the signal line must be
protected, and there must be alternative source of man power.
E. New and improve intrusion hardwires are being developed and placed in the market but
again, the human guard is irreplaceable in spite of computerization and the arrival of
super sophisticated devices in security alarm systems.
LOCK- is a mechanical, electrical, hydraulic or electronic device designed to prevent entry into
a building, room, container or hiding place.
TYPES OF LOCK
A. Key Operated Mechanical Lock- it uses some sort of arrangement of internal barriers
which prevent the lock from operating unless they are properly aligned. The key
is device used to align these internal barriers so that the lock may be operated.
B. Padlocks- A portable and detachable lock having a sliding hasp which passes through a
staple ring and is then made fasten or secured.
C. Combination Lock- Instead of using they key to align the tumblers, the combination
mechanism uses number, letters or other symbols as references point which enables an
operator to align them manually
TYPESOF KEYS
A. Change Keys- a specific which operates the lock and has particular combinations of
cuts, or biting which match the arrangement of the tumblers in the lock.
B. Sub-master Key- A key that will open all the lock within a particular area or grouping in a
given facility.
C. Mater Key- A special key capable of opening a series of lock.
D. Grand Master Key- A key that will open everything in a system involving two or more
master key group.
KEY CONTROL
-Once an affective key control has been installed, positive control of all keys must be gained
and maintained. This can be accomplished only if it is established in conjunction with the
installation of new locking devices. The ff. methods can be used to maintain effective key
control.
A. Key Cabinet –A well-constructed cabinet will have to be procured. The cabinet will have to
be of sufficient size to hold the original key to every lock in the system. It should be secured at
all times.
B. Key Record- Some administrative means must be set up to record code numbers and
indicates to whom keys to specific locks have been used.
C. Inventories-Periodic inventories will have to be made of all duplicates and original keys in
the hands of an employee whom they have been issued.
D. Audits-In addition to periodic inventory, an announced audit should be made of all key
control records and procedures by a member of management.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
14
E. Daily Report- it should be made to the person responsible for the key control from the
personnel department indicating all persons who have left or will be leaving the country. In the
event that a key has been issued, steps should be initiated to insure that the key is recovered.
SECURITY CABINET- these is the final line of defense at any facility is in the high security
storage where papers, records, plans or cashable instrument, precious metals or other
especially valuable assets are protected. These security containers will be of a size and
quantity, which the nature of business dictates.
3 TYPES OF SECURITY CABINET
A. Safe- a metallic container use for safekeeping of documents or small items in an office
or installation. Safe can be classified as either robbery or burglary resistance depending
upon the use and need:
1. At least 750 lbs, anchored
2. Any safe that weigh less than 750lbs. should be anchored to a building structure
3. Its body should at least one thick steel or equal
4. Safe as a general rule, require the door to be made of steel and at least 11/2 thick.
B. Vault- Heavily constructed fire and burglar resistance container usually a part of the
building structure used to keep and protect cash, documents and negotiable
instruments. Vaults are bigger than safe but smaller than a file room.
1. The vault door should be made of steel at least 6 inches in thickness
2. Vault walls, ceiling, floor reinforce concrete at least12 inches in thickness
3. Electrical conduits into the vaults not exceed 11/2 in diameter
4. Vault floor should be higher by hour inches with the surrounding floors and if in level
with the floor buttons, storage container should be raised at least 4 inches above the
floor.
5. Standard vaults, to reduce destroying of too many records, should not be more than
500 cubic feet.
6. Vault must be resistive up to 6 hours.
C. File Room- A cubicle in a building constructed a little lighter than a vault but of bigger
size to accommodate limited people to work on the record.
1. It should at most be 12feet high
2. The interior cubage should not more than 10,000 cubic feet
3. The ventilation should be through the door.
4. It must have a watertight door and at least fire proof for one hour.
5. The supporting structure, the walls, floor and roof should be made fire-proof.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
15
C. Multiple pass system- this provides an extra measure of security by requiring that an
exchange take place at the entrance of each restricted area.
BADGE AND PASS CONTROL
1. The system should have a complete record of all badges and identification cards
issued, return, mutilated or lost by serial number and cross- indexed alphabetically.
2. The supervisor from time to time for its accuracy and authenticity should check the list.
3. Passes and badges reported lost should be validated and security at entrance be
informed through conspicuous posting.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
16
C. Escort- if possible visitors should be escorted by the security to monitor their activity wit in
the establishment and guide them where to go.
D. Visitors Entrance-separate access for visitors and employees of the establishment should
be provided.
E. Time Travelled- If there is a long delay or time lapse between the departure and arrival, the
visitors may be required to show cause for the delay.
PART III
PERSONNEL SECURITY
Of the three major aspects of security, personnel security is considered as the most important
and critical. This is the simple reason that security involves people, both an assets to be
protected and as source of security threats. It is an acknowledge fact that losses are attributed
mainly to negligence or active participation of employees, either through theft and sabotage.
This emphasizes the need to set up a system of hiring the people for the company.
PURPOSE OF PERSONNEL SECURITY
A. To insure that a firm hires those employees best suited for the firm; and
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
17
B. Once hired, to assist in providing the necessary security to the employees while they
are carrying out them functions.
Scope of personnel security
A. Personnel Security Investigations
B. Security Education
Key Function of Personnel Security
A. I t serves as a screening device in hiring suitable employees
B. It provides background investigation service of both potential and present employees,
for possible assignment to sensitive position.
C. It handles investigation of employees suspected of wrong doing
D. It develops security awareness among employees.
E. It attempts to ensure the protection of employees from discriminatory hiring or
terminating procedures as well as unfounded allegations of illegal or unethical activities
and conduct.
2. Positive Vetting-Is the process of inspecting or examining with careful thoroughness. The
essence of vetting that is a personal; interview conducted under stress. It is based on
information previously given by applicant. Other information issued during the interview,
such as those discovered in the BI which confirms or denies this given by the applicant.
3. Profiling- this is the process whereby a subjects reaction in a failure critical situation is
predicted by observing his behavior, or by interviewing him, or analyzing his response to a
questionnaire, such as an honesty test.
4. Deception Detection Techniques- this process of using devices in detecting deception
during the interview stage. This includes the use of a polygraph, psychological stress
evaluator and voice analyzer.
5. Financial and Lifestyle Inquiry- This type of investigations seeks to gather information on
income and mode of living, sometimes referred to as the earning to debt ratio.
6. Undercover Investigations- This is the placement of an agent in a role in which the agents
true identity and role remains unknown, in order to obtain information for criminal
prosecution or for recovery or limitation of asset losses.
7. Exit Interview- This is a valuable tool because it gives departing employees an opportunity
to list grievances. It offers security managers an opportunity to learn of problems not
previously known. Incorporating a checklist of company- issued property and confronting a
departing employee of this resulted in reducing losses of company property. Debriefing an
employee is also incorporated into the exit interview to remind employees of their
continuing legal obligation to safeguard confidential company information.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
18
Security Education Program- The basic goal of security education program is to acquaint all
the employee’s the rationale behind the security measure and to insure their cooperation at all
times.
OBJECTIVES OF SECURITY EDUCATION
A. Guidance for all supervisory and execution levels of the organization.
B. A mandatory indoctrination on security for all new personnel before their assignment to
their respective jobs.
C. Development of a high degree of security consciousness among the selected
supervisors and other key personnel in a program that should be continuing and
supported by top management.
D. A down-the-line security program aimed at instilling consciousness and dedication
through demonstration, lecture, motivations, and suggestion.
E. To let all employees force is informed that they all belong to the organization and that
no- awareness to the security program is tantamount to disloyalty.
F. That the program is also to develop discipline, loyalty and belongingness.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
19
I. Need to Know- Is the dissemination of classified information or matter to be limited
strictly to those person whose duties requires knowledge or possession thereof
J. Unauthorized- Refers to the person not authorized to have access to classified matters.
K. Compromise- This takes place through the loss of security, which results from
unauthorized person obtaining knowledge of classified matters.
L. Damage to National Security- Refers to the prejudice, embarrassment or inquiry to the
country resulting from act or omission.
Purpose of Protecting Classified Materials
A. Deters and impede potential spy.
B. Assist in security investigations by keeping accurate records of the moment of classified
materials.
C. Enforce the use of “need to know” principle.
Two Kinds of Documents
A. Personal- Letters, diary and notebooks. These could be treated usually the same with
official documents.
B. Official- Orders, manuals, letters, overlays, mas and magazines. You may be careful
and follow the chain of command.
Document/ Information Cycle
Each document or information has a life cycle in the sense that its usefulness has a
beginning and an end. It passes the various stages from the time it is created until it is finally
disposed. This cycle consist of the ff.
A. Creation E. Retention/ purging
B. Classification F. Transfer
C. Storage G. Disposition
D. Retrieval
If an organization has no plan for seeing that all records/documents flow smoothly
Through the record, it will faced with more of the following problems which may severely
drain profit; 1. An unmanageable tangle of papers within the office 2. Wasted clerical effort
searching for information. 3. Loss important operating information. 4. Extravagant use of
operating information. 5. Possible loss of key information in defending the company against
legal or governmental inquiries.
Categories of Document
1. Category A
A. Information which contains reportable time sensitive, order of battle, and significant
information
B. It should be given priority because it is critical information
C. It must be forwarded without delay.
D. It is critical to friendly operations
E. It requires immediate soon
2. Category B
A. Anything that contains communications, cryptographic documents, or systems that
should be classified a secret and requires special handling
B. Higher authorities should declassify it.
3. Category C.
A. Other information, which contains something that, could be an intelligence value.
B. Contains exploitable information regardless of its contents
C. Unscreened materials/ documents should be categorized as category c.
4. Category D
A. No value, yet lower level will never classify documents as category D
B. No Decision must be made at the lower echelon that document has no value. It is the
responsibilities of the higher headquarter.
Three (3) Security Concepts
A. Personnel are the weakest link in the security chained
B. Training is important to make security personnel conscious and realize the value of
document
C. Training is necessary for the practices of “need to know” principle
Four (4) types Of Classified Matters
1. Top Secret (green color code)- is any information and materials the unauthorized
disclosure of it would cause exceptionally grave damage to the nation, politically,
economically, and military operation.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
20
2. Secret (red color)- Is any information and materials, the unauthorized disclosure of it
would endanger national security, causes serious to the interest and prestige of the
nation of any government activity, or of great advantage to a foreign country.
3. Confidential (blue Color)- Is any information or material, the unauthorized disclosure of it
would be prejudicial to the interest and prestige of the national or governmental activity
or would cause administrative embarrassment or unwanted injury to and be of
advantage to and be of advantage to a foreign country.
4. Restricted (white or no color)- Is any information and material which requires special
protection other than those determines confidential, secret and top secret.
Protection of Sensitive Information
-Propriety information is information that in some special way relates to the status or activities
of the possessor and over which the possessor assert ownership. In the business community,
propriety information relates to the structure, products or business methods of the
organization. It usually protected in some way against casual or general disclosure.
Types of Documents;
Class 1- Vital Documents- In this category these are records that are irreplaceable records of
which reproduction does not have the same value as the original; records needed to recover
cash, o replace building, equipment’s, raw materials, raw products, and work in process and
records needed to avoid delay in restoration of production, sales and services.
Class II- Important Documents-This includes records reproduction of which will close
considerable expense and labor, or considerable delay.
Class III-Useful Document - this includes records whose loss might cause inconvenience but
could be readily replaced and which would not in the meantime present an insurmountable
obstacle to the prompt restoration of the business.
Class IV- Non-essential Documents- this records are daily files, routine in nature even if lost or
destroyed, will not affect operation or administration. This class represent the bulk of records
which should not be even attempted to be protected in the event of disasters, they should,
however, be kept in ordinary files ready for reference, if needed and usually discarded after
some period of time.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
21
B. A much lower of novelty is required of a trade secret
C. A trade secret remains secret as long as it continuous to meet trade secret test while
the exclusive right to patent protection expires after 7 years.
Security Hazards- any act or conditions, which may result in the compromise of information,
loss of life, loss of destruction of property of disruption of the objective of the installation.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
22
Types of Hazards
A. Natural Hazards- These are hazards which arises from natural phenomena. The ff. are
types of natural hazards or disaster:
1. Floods caused by 4. Storms(Typhoons, 6. Extreme
typhoons cyclone, tornado temperature and
2. Earthquakes and hurricane) humidity
3. Fire( not caused by 5. Lighting storm
human action)
B. Human made Hazards- These are hazards which are result of a state of mind, attitude,
weaknesses or character traits of one or more persons. They can be acts of
commission or omission, both overt and covert, which can disrupt operation of a plant or
installation. The ff. are the types of human or manmade hazards.
1. Carelessness- accidents and dissatisfaction
2. Disloyalty- subversion and sabotage
3. Espionage, pilferage and theft
4. Vandalism, etc.
Sabotage as a Security Hazards
Description of a Saboteur
1. He is the most dangerous for whom security will have to deal with while planning and
implementing security measures and techniques
2. He is an ordinary looking as the next guy but in his mind, he has the training in
deception, knowledgeable in incendiaries, explosives, chemistry, bacteriology,
mechanics and psychology.
3. He can work alone or simultaneously in several places.
Possible targets of Saboteur
1. Armed forces Installation
2. Natural Resources- mines, forest, farms, and farms products.
3. Industries- Buildings, power sources, machinery, fuel, etc.
4. Warehouse depots, communications, public utilities, etc.
Countermeasures against Sabotage
1. Use of an efficient, alert and trained guard force
2. Use of physical security aids like barriers, personnel and vehicular control, intrusion
devices, communication systems, and electric aids.
3. Proper screening of personnel
4. Searches on incoming vehicles
5. Safeguarding of classified information
6. Designation of restricted areas
7. Investigation of breaches of security
8. Security education and indoctrination
9. Good housekeeping methods
10. Effective and compatible emergency planning
11. Regular audit
12. Continuing audit background check.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
23
4. Using “front” as commercial concerns, travel agencies, associations, business groups
and other organizations to obtain confidential information or data.
5. Using various form of threats to obtain information.
6. Using blackmail techniques by exposing intimate and personal details concerning an
individual or organizations.
7. Picking or securing information in social and other gatherings.
8. Penetration and operational tactics.
Countermeasures against Industrial Espionage
1. Careful and complete pre-employment measures designed to control threats of
industrial espionage.
2. Continuing personnel check on employees and particularly personnel on sensitive
positions even already employed
3. Prevention of unauthorized entry to the plant or industrial installation
4. Restricting of movement of personnel in the premises of the plant
5. Controlled disposal of waste papers including carbons in classified works
6. Only properly cleared personnel should handle classified information.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
24
A. Location of items to be pilfered- the systematic pilferer surveys shopping and store
areas, or through contracts from the firms.
B. Access to the items- techniques can be form fake document, bribing of guards,
outsmarting security, creating disturbance and other methods to divert attention while
pilferage goes on.
C. Removal of item- This can be done as wearing the stolen shoes or shorts, concealment
in body or vehicles, use of false document, etc. Drivers may conceal pilfered items in his
vehicles
D. Disposal of items- This is need for “fences” “brokers or ” “clearing house ” for this hot
items.
Countermeasure for Casual Pilferage
A. Spot check on outgoing vehicles and persons
B. An aggressive Security education and indoctrination program with emphasis that “ crime
does not pay”
C. Superiors should set example of integrity and desirable moral climate for employees in
the establishment
D. All employees must be enjoined to report or may loss to security.
E. Inventory and control methods should be done especially to pilferable items.
F. Control of tools equipment and sets.
VIP SECURITY
Protection against any type of crime to safeguard life, assets and operation by the various
methods and devices.
1. VIP- Very Important People( State President, High Ranking Public officials)
2. Escort- One or more persons accompanying another to give guidance or protection or to
pay honor
3. Body Guard- A person or a grouped of persons usually armed and responsible for the
physical safety of one or more specific person.
Organization of VIP Security
1. Area Security- covers all the surrounding areas of engagement. Conduct prophylactic
(Neutralize the area), operations in the area of engagement.
2. Perimeter Security- Secures the immediate areas surrounding the place of engagement.
Usually these are uniformed men
3. Advance Security- this are the advanced security at the place of engagement before the
arrival of the VIP. Sanitize the area.
4. Close- in- Security- Accompanies the VIP where ever he goes. Max. of 4 person
5. Reserve Security- On standby for possible back up/re-enforcement.
6. Route Security- Neutralize the possible route of VIP party.
Prophylactic Operations
1. Patrolling
2. Putting up of check point, block and gates.
Four common elements in all Assassinations
1. Victim 3.Assassin
2. Modus operandi 4. opportunity
Reasons why do they needs Body Guards
As results of the “increased concern about kidnapping threat” there has been an
escalation in the demand for body guards. Thereby, brains is need not brown ( meaning
muscular in power) has been offered as the basis for the body guards selection. The body
guards should fit the image and lifestyle of the individual he is guarding.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
25
3. Mental Attitude- the body guard should be stable individual, intelligent, should be
mentally alert.
Some protection techniques while moving on foot
1. Individual in the vicinity of the persons being protected should be observed especially
their hands.
2. If a weapon is displayed, the weapon should be attacks so as to be ready to respond
effectively.
3. The body guards should anticipate potential attacks so as to be ready respond
effectively.
4. If a threatening situation begins to develop the individual being protected should
immediately be removed from the danger area.
5. If two body guards are used to attack develop, one body guard should remove the
individual being protected while the other neutralized the threat. The primary objective is
to protect the target person, not apprehend the attacker. Escape is certainly more
important than winning the “skirmish” meaning primary conflict or dispute.
6. If one body guard is utilized he/she will usually walk in front and slightly to the left of the
person being protected.
7. When two body guards are utilized, one will take a positioned in front to the left. While
the second, will take a position to the rear and slightly to the right.
Protection in transit
An individual is particularly vulnerable while moving from one place to another . hence a
regular route and time travel should be established. Frequent changes of direction, travel time
mode of transport, coordinated with in overall protection plan, will make it more difficult for an
abduction to plan of an ambush or to interpret.
Vehicle Security- the vehicle utilized by a potential kidnap victim should not be placed
unattended in a parking area stall with the individual name of it. If possible, when not in used,
the vehicle, the vehicle should be parked in locked garage under guard. All the doors and
windows should be locked whether occupied or not. It should be installed by tamper alarm on
the vehicles and panic or trouble alarms in the parking area.
COMMUNICATION SECURITY
1. Communication- the transfer of thought from the mind of one person to the mind of
another thought a common medium or channel. It is the process of sending and
receiving messages to achieve understanding.
2. Channel of communication- refers to the equipment being used to transfer thoughts and
ideas.
3. Conference- the exchange of thoughts or opinions by conversations, or seminar. The
exchange could be oral, written and other forms
4. Medium of communications- refers to the common language known for two or more
individuals who wants to exchange thought or ideas with each other.
5. Medium of communications- refers to the common language known for two or more
individual who wants to exchange thought and ideas with each other Example: English:
is the dominant medium of communication in the world.
Following are the common equipment being used for communication:
1. Hand held radio or walkie talkie- communication on electromagnetic waves transmitted
through the space.
2. Basic types of radio’s:
A. Amatuer Radio- For hobby and emergency purposes; and
B. Commercial Radio- for business purposes.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
26
Requisites For modulation / Voice transmission:
A. Alertness – give the impression that you are alert and wide awake and interested as the
person calling.
B. Pleasantness- build a pleasant office image with voice of smile
C. Naturalness-Use simple language and avoid slang
D. Distinction- Speak clearly and relax to avoid garbled transmission and
E. Expressiveness- normal tone of voice in moderate manner not too fast and not too slow.
Duty Cycle of PTT
As a Rule transmitting message in short duration carries 3 to 5 words at a time
Approaches to adhere the duty cycle:
1. Use the phonetics alphabet and numerical. Ex. Alpha-Zebra
2. Use of military hours
3. Police ten APCO signals
4. Use of moral codes
APCO- Association Public Safety Communication Offer Inc.
PTT- press to talk
5. Telephone- Combination of apparatus of converting speech energy to electrical wave
then transmit the same to a certain point then finally re-convert the electrical energy to
audible sounds.
6. Intercom- Wired system of communication being used with I abuilding or compound for
direct exchange of calls
7. Audio hailer – portable transistorized and battery- operated amplifier that magnify the
voice of the users
8. Computer Facsimile- Modern type of communication equipment’s.
PART VI
SECURITY SURVEY INSPECTION
The basic instrument for determining security vulnerability is the security survey. Most
description of security survey refers principally to checklist, audits or inventories of security
conditions.
Security Survey- Defined as a critical on-site examination and analysis of industrial plants,
business, a home or public or private institution done to ascertain the facility’ current security
status, to identify deficiencies or excess in current practices, to determine what protection is
needed and to make recommendations for improving the overall level of security at that
installation. As previously noted, security survey is a general term that often encompasses
other related procedures.
Objectives of Security Survey
1. To determine existing vulnerabilities to injuries, death, damage, or destruction by natural
cause.
2. To determine existing vulnerabilities of corporates assets due to outside criminal activity
3. To determine existing vulnerabilities t of corporate assets due to criminal activity within
the organizations
4. To determine existing conditions of physical security of corporate property.
5. To Compliance of employees to security.
Planning a security Survey
1. Verify the need
2. Obtain organizational support
3. State the surveys executives
4. Determine how data will be gathered
5. Develop alternatives
6. Prepare a schedule of activities.
Security Inspection
Another important activity, which is necessary to insure the integrity of the overall
security program, is security inspection. This complements security in its attempt to prevent
losses of company property.
Security Inspection is conducted for two reasons: to check on the degree of compliance with
the recommended counter measures and to determine the effectiveness and adequacy of the
countermeasures.
Types of Security Inspection
A. Continuous Inspection
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
27
B. Formal Or Informal
C. Structured Or unstructured Inspection
The 2003 revised rules and regulations implementing republic act no. 5487 s amended,
pursuant to section 24,25 and 26 of executive #262, and in consultation with the PADPAO ,
these revised rules and regulations governing the organizations and operation of private
security agencies, company security forces and government security units.
The organization, operation, business and activities of private watchman/security or
detective agencies, security training institutions/systems as well as private security and training
personnel shall be governed by these Rules and Regulations implementing Republic Act 5487,
as amended.
This unit under the Philippine National Police which is charged with the supervision, direction
and control of all security agencies in the Philippines
A. PNP SAGSD- Philippine National Police Security Agency , Guard and Supervision Division
B. PNP SOSIA- Philippine National Police Supervisory Officer for security and investigative
Agencies..
Definitions of term
A. Person – shall include not only natural but also juridical persons such as single
proprietorships, partnerships, corporations, companies or associations, duly organized
and registered with the Securities and Exchange Commission and/or the Department of
Trade and Industry.
B. Private Security Services – shall include the act of providing or rendering services to
watch an establishment whether public or private, building, compound/area or property,
to conduct access control/denial in any form whether physically, manually or scientifically
by electronic monitoring systems, for the purpose of securing such area/property and at
the same time ensuring safety and protection of persons within such areas, to maintain
peace and order within such areas, to conduct private security training, and/or to conduct
investigation. It shall also include the act of contracting, recruiting, training, furnishing or
posting any security guard, to do its functions or solicit individuals, businesses, firms, or
private, public or government-owned or controlled corporations to engage his/its service
or those of his/its security guards, for hire, commission or compensation thru
subscription or as a consultant/trainer to any private or public corporation
C. Private Detective Services – shall include among others the act of providing personal
security protection, inquiry and information gathering, pre-employment verification and
individual background profiling, providing assistance in civil liability and personal injury
cases, insurance claims and fraud, child custody and protection cases, for the purpose of
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
28
assisting in gathering information leading to determination and/or prevention of criminal
acts and/or resolution of legal, financial and personal problems.
D. Private Security Industry – shall cover those in the legitimate business of providing
private security and detective services.
E. Private Security Guard (SG) – sometimes called private security guard or watchman
shall include any person who offers or renders personal service to watch or secure either
a residence, business establishment or both for hire or compensation, and with a license
to exercise profession
F. Private Detective (PD) – shall mean any person who does detective work for hire, reward
or commission, other than members of the Armed Forces of the Philippines, guards of
the Bureau of Jail Management and Penology, municipal or city jail guards, and
members of the Philippine National Police or of any other law enforcement agency of the
government.
G. Private Security Personnel – shall be natural persons which include private security
guards, private detectives, security consultants, security officers and others that may be
classified later, rendering/performing security and/or detective services as employed by
private security agencies and/or private firms
H. Government Security Personnel – shall be natural persons which include government
security guards, detectives, security consultants, security officers and others that may be
classified later, except those of the Armed Forces of the Philippines, Philippine National
Police, Bureau of Jail Management and Penology, Municipal or City Jail guards
rendering/performing security and/or detective services as employed by government
entities
I. Private Security Agency (PSA) – shall mean any person association, partnership, firm or
private corporation, who contracts, recruits, trains, furnishes or posts any security guard,
to perform its functions or solicit individuals, businesses, firms, or private, public or
government-owned or controlled corporations to engage his/its service or those of his/its
security guards, for hire, commission or compensation thru subscription or as a
consultant/trainer to any private or public corporation whose business or transactions
involve national security or interest like the operation and/or management of domestic or
ocean vessels, airplanes, helicopters, seaports, airports heliports, landing strips etc., or
as consultant on any security related matter, or to provide highly specialized security,
detective and investigation services like gangway security, catering security, passenger
profiling, baggage examination, providing security on board vessels or aircraft, or other
security needs that PNP SAGSD may approve.
J. . Private Detective Agency (PDA) – shall mean any person association, partnership, firm
or private corporation, who contracts, recruits, trains, furnishes or posts any private
detective, to perform its functions or solicit individuals, businesses, firms, or private,
public or government-owned or controlled corporations to engage his/its service or those
of his/its detectives, for hire, commission or compensation thru subscription or as a
consultant/trainer to any private or public corporation or as consultant on any detective
related matter, or to provide highly specialized detective and investigation services, or
other detective needs that SAGSD-CSG may approve.
K. License to Exercise Profession – shall mean any document issued by the Chief,
Philippine National Police or his duly authorized representative recognizing a person to
be qualified to perform his duties as private security or training personnel
L. License to Operate (LTO) – is a License Certificate document, issued by the Chief,
Philippine National Police or his duly authorized representative, authorizing a person to
engage in employing security guard or detective, or a juridical person to establish,
engage, direct, manage or operate an individual or a private detective agency or private
security agency/company security force after payment of the prescribed dues or fees as
provided in these Rules and Regulations.
M. Company Guard Force (CGF) – a security force maintained and operated by any private
company/corporation utilizing any of its employees to watch, secure or guard its
business establishment premises, compound or properties.
N. Government Guard Unit (GGU) – a security unit maintained and operated by any
government entity other than military or police, which is established and maintained for
the purpose of securing the office or compound and/or extension of such government
entity.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
29
O. PNP as used herein shall mean the Philippine National Police, which was organized
pursuant to the provision of RA 6975 otherwise known as the National Police Act of
1991. Act as a public security.
P. SAGSD has used herein shall refer to the current PNP Civil Security Group Security
Agency and Guard Supervision Division or any other PNP Office that may be designated
later as the primary office for supervision of the implementation of these rules and
regulations.
Q. PADPAO- refers to the Philippines Association of Detective and Protective Agency
Operators, Inc., which is an association of all licensed security agencies and company
security forces
R. Duty Detail Order- is a written order/schedule issued by a superior officer usually the
private security agency/branch manager or operations officer assigning the performance
of private security/detective services duties.
A. Who may organize and maintain a Private Security Agency and Private Detective Agency
- Any Filipino citizen or corporation, association, partnership, one hundred percent
(100%) of which is owned and controlled by Filipino citizens
C. Basic requirement of an operator or manager of agency
The operator or manager of an agency including, managers of branch offices, must be:
1. Filipino citizen;
2. Not be less than twenty five (25) years of age
3. College graduate and/or a commissioned officer in the inactive service or retired
from the Armed Forces of the Philippines or the Philippine National police;
4. Has taken a course/seminar on industrial Security Management and/or must have
adequate training or experience in security business; and
5. Good moral character
New applicants for license to operate shall be required to obtain a minimum capitalization
of one million pesos (P1, 000,000.00) with a minimum bank deposit of five hundred
thousand (P500, 000.00) pesos in order to start its business operation
Main/ branch offices- All agencies shall maintain a main office in their registered addresses.
Branch offices may be established and maintain in other provinces/ cities where the security
agency has deployed security guards.
1. No licensed security agency shall operate, promote and enter into an agreement of “merger”
(kabit system) with any person or a group of persons for the purpose of organizing a branch
unit or subsidiary under separate control and ownership. Merger of security and detective
agencies shall not be recognized without prior approval from the Securities and Exchange
Commission with respect to their Articles of Incorporation and the Department of Trade and
Industry, with regards their business name.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
30
e) Keeping/maintaining separate payrolls for the branch employees signed and/or approved by
the branch manager only;
f) Absence of record of monthly income remittances to the main office when said branch is
authorized to make collections from the clients of the licensee; and
g) All other similar acts tending to show separate and distinct relationship/ personality/
ownership/ management.
On Membership.
a. No regular license shall be granted to any private security agency unless it has a minimum
of two hundred (200) licensed private security personnel under its employ.
b. No regular license shall be granted to any company guard force or private detective agency
unless it has a minimum of thirty (30) licensed private security personnel under its employ.
c. The maximum number of private security personnel that a PSA/CGF/PDA may employ shall
be one thousand (1000).
Status and Validity of License to Operate. The status of license certificate in Section 7
above shall be issued in conformity with the following:
a. Regular LTO – issued, after complying with licensing requirements, to private security
agencies having obtained and maintained in its employ at least two hundred (200) security
personnel, and to company guard forces and private detective agencies having obtained and
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
31
maintained in its employ at least thirty (30) security personnel and private detectives
respectively. Such license may be renewed following conformity with renewal requirements
prescribed in a Standard Operating Procedure (SOP).
b. Temporary LTO – initial and conditional issuance to new private security agencies and to
PSAs holding regular LTO not able to maintain the minimum number of security personnel or
conform to standards, for them to be able to attain the 200 minimum number of security
personnel or comply with licensing standards, prior to issuance/reissuance of regular LTO.
Such issuance shall not be renewable nor be extendible.
c. Unless sooner cancelled or revoked and provisions hereof modified, all licenses to operate
shall have a validity of two (2) years. Temporary LTOs upon expiration are automatically
cancelled.
d. The expiry date of Regular Licenses to Operate shall be on the last day of the month of the
second year corresponding to the last number before the year series number of the assigned
number/LTO number of the License. (i.e. hereto in bold numbers PSA-00001-02 and PSA
00050-03 representing expiry on January 31, 2004 and October 31, 2005 respectively). For
this purpose the appropriate transition period shall be provided after the effectivity of these
Rules and Regulations.
LTO Processing.
a. All applications for Licenses to Operate filed shall be processed by SAGSDCSG for
approval and subsequent issuance of the appropriate LTO, and/or for disapproval.
b. When all requisites for the issuance of License to Operate have been complied with,
corresponding license certificate shall be issued upon payment by the applicant of applicable
fees and bond, prescribed/to be prescribed following existing administrative laws:
1. National License Fee
2. Security Personnel Registration Fee
3. Annual Internal Revenue tax.
3. Local Government Business tax Bond issued by any competent or reputable surety or
fidelity or insurance company duly accredited by the Insurance Commission in the sum of ten
thousand pesos in the discretion of the CPNP which bond shall answer for any valid and legal
claim against the agency by its clients or employees 4. Applications with lacking requirements
shall not be accepted for processing.
5. All accepted applications for license to operate shall be processed for completeness of
documentary requirements and conformity to standards.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
32
D.
D. Qualifications a Private Security Guard. No person shall be licensed as security
guard unless he possesses the following qualifications:
a. Filipino citizen;
b. High school graduate;
c. Physically and mentally fit; d. Not less than eighteen (18) years of age nor more than fifty
(50) years of age (for new applicants and SGs in nonsupervisory position); and
e. Has undergone a pre-licensing training course or its equivalent.
E. Exemptions from Basic Pre-Licensing Training.
a. Veterans and retired military/police personnel or those honorably discharged military/police
personnel possessing all the qualifications mentioned in the preceding Section shall be
exempted from pre-licensing training/seminar and academic/scholastic attainment which is a
requirement for the initial issuance of License to exercise private security profession but shall
not however be exempted from taking the refresher training courses or its equivalent.
b. Likewise, graduates of ROTC advance/CHDF (or its equivalent in the PNP) Training
graduates shall be exempted from the required Basic-licensing Training/Seminar.
Types of License.
a. Temporary License – initial and conditional issuance while awaiting issuance of regular
license identification cards or in the interim for purposes not covered by Rule V.
b. Regular License – generated Private Security Personnel License Card, duration or validity
of which shall be for two (2) years
Government Security Personnel – no person shall be licensed as Government Security
Personnel unless he possesses the qualifications as prescribed in Section 3, 4, 5 of this
rule, provided he submits an appointment order coming from the Civil Service Commission.
Possession of Firearms
Ratio: 1 FA for every 2 (1:2) security guards in its employ.
-No PSA/ CSF/ GSU shall be allowed to possess FA in excess of 500 units.
Restriction to possess high-powered firearms
A private detective agency/private security agency/ company security services/
government security unit is not allowed to possess high caliber firearms considered as
military-type weapons such as M16, M14, cal .30 carbine, M1 Garand, and other rifles and
special weapons with bores bigger than cal .22, to include pistols and revolvers with bores
bigger than cal .38 such as cal .40, cal .41, cal .44, cal .45, cal .50, except cal .22
centerfire magnum and cal .357 and other pistols with bores smaller than cal .38 but with
firing characteristics of full automatic burst and three-round burst. However, when such
entities are operating in areas where there is an upsurge of lawlessness and criminality as
determined by the Chief, PNP, Police Regional Office Regional Director or their authorized
representative, they may be allowed to acquire, possess and use high-powered firearms
under the following conditions:
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
33
a. The acquisition of the high-powered firearms shall be at the expense of the private
security agency/private detective agency/company security force/government security
unit concerned;
b. The firearms should first be registered with the Firearms and Explosives Division
before issuance and shall not be used or transferred in places other than those
specially authorized by the Director, CSG;
c. The total number of high-powered firearms that an agency or security force/unit is
authorized to possess shall not exceed ten percent (10%) of the total number of
security guards of watchmen in its employ; and
d. The duly licensed security guards or watchmen who will use the firearm shall first be
given adequate training in the care and use thereof and will be under the supervision
of qualified officers and men of the Philippine National Police.
B. ETHICAL STANDARD
A. As a security guard/detective his fundamental duty is to serve the interest or mission of
his agency in compliance with the contract entered into with clients or customers of the
agency he is supposed to serve;
B. He shall be honest in thoughts and deeds both in his personal and official actuations,
obeying the laws of the land and the regulations prescribed by his agency and those
established by the company he is supposed to protect;
C. He shall not reveal any confidential information confided to him as a security guard and
such other matters imposed upon him by law;
D. He shall act at all times with decorum and shall not permit personal feelings, prejudices
and undue friendship to influence his actuation while in the performance of his official
functions;
E. He shall not compromise with criminals and other lawless elements to the prejudice of
the customers or clients and shall assist the government in its relentless drive against
lawlessness and other forms of criminality;
F. He shall carry out his assigned duties as required by law to the best of his ability and
shall safeguard the life and property of the establishment he is assigned to;
G. He shall wear his uniform, badge, patches and insignia properly as a symbol of public
trust and confidence, as an honest and trustworthy security guard and private
detectives;
H. He shall keep his allegiance first to the government, then to the agency where he is
employed and to the establishment he is assigned to serve with loyalty and utmost
dedication;
I. He shall diligently and progressively familiarize himself with the rules and regulations
laid down by his agency and those of the customers or clients;
J. He shall at all times be courteous, respectful and salute his superior officers,
government officials and officials of the establishment where he is assigned or the
company he is supposed to serve;
K. He shall report for duty always in proper uniform and neat in his appearance;
L. He shall learn at heart and strictly observe the laws and regulations governing the use
of firearms.
C. CODE OF CONDUCT
a. He shall carry with him at all times during his tour of duty his license, identification card
and duty detail order with an authority to carry firearm;
b. He shall not use his license and other privileges if any, to the prejudice of the public,
the client or customer and his agency;
c. He shall not engage in any unnecessary conversation with anybody except in the
discharge of his duties or sit down unless required by the nature of his work and shall at
all times keep himself alert during his tour of duty;
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
35
d. He shall refrain from reading newspapers, magazines, books, etc, while actually
performing his duties;
e. He shall not drink any intoxicating liquor immediately before and during his tour of duty;
f. He shall know the location of the alarm box near his post and sound the alarm in case
of fire or disorder.
g. He shall know how to operate any fire extinguisher at his post; h. He shall know the
location of the telephone and/or telephone number of the police precincts as well as the
telephone numbers of the fire stations in the locality;
h. He shall immediately notify the police in case of any sign of disorder, strike, riot or any
serious violation of the law;
i. He or his group of guards, shall not participate or integrate any disorder, strike, riot, or
any serious violations of the law;
j. He shall assist the police in the preservation and maintenance of peace and order and
in the protection of life and property having in mind that the nature of his responsibilities
is similar to that of the latter.
k. He shall familiarize himself by heart with the Private Security Agency Law (RA 5487, as
amended) and these implementing rules and regulations;
l. When issued a FA she should not lend his FA s to anybody.
m. He shall always be in proper uniform and shall always carry with him his basic
requirements, and equipment’s such as writing notebook, ballpen, night stick (baton)
and/or radio. o. He shall endeavor at all times, to merit and be worthy of the trust and
confidence of the agency he represents and the client he serves.
Sanction. – Any private security agency operator or guard who violates the creeds, ethical
standards and codes as set forth in the preceding sections, shall be subject to the penalties
provided in these implementing rules and regulations
PRIVATE SECURITY TRAINING
Private Security Training. It shall refer to training and academic programs and courses duly
approved or prescribed by the Philippine National Police and adopted by the Technical
Education and Skills Development Authority. It includes the prelicensing requirements of
individual security guards and other security personnel approved by RA 5487, the periodic and
non-periodic in-service skill refreshers for such security personnel, and other specialized,
individual or group, private security personnel skills development
Private Security Training Services. These shall refer to the conduct of Private Security
Training, provision of the physical facilities and installation necessary in the conduct thereof,
and the provision of the appropriate management, administrative, and instructor/training staffs
therefore, the actual performance and/or exercise of which requires the appropriate permit
and/or authority as herein provided.
Private Security Training Institutions. These shall refer to all persons, natural and/or
juridical, who/that provide and/or conduct private security training, and/or services.
Categories of Private Security Training. The following are the general categories of
Private Security Training:
a. Pre-Licensing Training Programs. As a matter of licensing prerequisite, Pre-Licensing
Training Programs include all training and/or academic programs and courses whose
objective is to indoctrinate the individual with the basic skills and educational backgrounds
necessary in the effective exercise and performance of his/her elected/ would-be
security/detective profession. It includes but is not limited to the Basic Security Guard
Course, the Security Officers Training Course, Private Security Agency Operators
Training/Seminar, Private Security Training Trainers’ Course.
b. Refresher Training Programs. This shall refer to periodic and non-periodic training
programs and courses designed with the objective of reinvigorating and/or developing basic
skills and knowledge gained previously or gained while in the exercise of his/her profession as
a matter of experience, to enhance current in-service and future individual and/or collective
exercise of profession. This includes mandated periodic inservice training to be initiated by
employer-security agencies which is further a prerequisite for the renewal of individual
professional security licenses. It includes but is not limited to the periodic Re- Training Course,
Basic Security Supervisory Course, and Security Supervisor Development Course.
c. Specialized Training Programs. This shall refer to training program and courses other than
those described in the preceding categories designed at developing previously-gained skills
and knowledge, designed at augmenting or expanding current skills and knowledge, and/or
designed at developing current skills and knowledge to suit identified future applications. It
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
36
includes but is not limited to such courses as the Intelligence/Investigator Training Course,
Basic Crises Management Course, Personal/VIP Security Training Course, Armoured Car
Crew Training Course, Bomb Disposal Training Course, Bank Security Training Course, and
Basic Aviation Security Specialist Course.
B. ) Training Instructor. Any person who renders personal and/or professional trainor,
instructor, and/or teacher services relative to private security training by virtue of his
profession, expertise, knowledge, and/or experience in a particular field of knowledge.
Training Instructor includes but is not limited to currently or retired licensed or accredited
private security training instructors, professional educators, and/or field/practicing experts.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
37
d. The following shall be collected as permit fees from among the Private Security
Training Institutions which are conducting Private Security Training, for every Letter of
Authority / Training Directive for:
1.Pre-licensing Training P 100.00
2. Refresher Training P 100.00
3.Any Specialized Training P 100.00.
e. The following shall be collected as accreditation fees from among the approved
applicants for:
1. Accreditation of Training Systems P 2,500.00/yr
2. Accreditation of Training Personnel
3.Training Consultant P 150.00/yr Training Officer P 150.00/yr
4.Training Instructor P 150.00/yr .
f. The fees collected shall accrue to the PNP in accordance with the provisions of Rule
VI hereof Rules and Regulations.
G. Electronic Security Systems and Services. Security Agencies in providing security services
may utilize scientifically designed electronic security systems like but not limited to the anti-
burglary, robbery, or intrusion alarms, closed circuit television recording and monitoring under
the following conditions:
a. Only trained licensed private security guards may operate electronic security
systems; b. PSAs offering the system shall be accountable for the legitimate registration
and licensing of these devices and their operators with the appropriate government
agency
A. Territorial power - A security guard shall watch and secure the property of the person,
firm, or establishment with whom he or his agency has a contract for security services.
Such service shall not, however, extend beyond the property or compound of said
person, firm or establishment except when required by the latter in accordance with the
terms of their contract to escort, or in hot pursuit of criminal offenders.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
39
B. Arrest by security guard- A security guard, or private detective is not a police officer
and is not, therefore, clothed with police authority. However, he may effect arrest under
any of the following circumstances:
a. When, in his presence, the person to be arrested has committed, is actually
committing, or is attempting to commit an offence;
b. When an offense has just been committed and he has probable cause to
believe based on personal knowledge of facts and circumstances that the person to be
arrested has committed it; and
c. When the person to be arrested is a prisoner who has escaped from a penal
establishment or place where he is serving final judgment or temporarily confined while
his case is pending or has escaped while being transferred from one confinement to
another (Section 6, Rule 113, Rule of Court).
C. Method of Arrest. - When making an arrest, the watchman, security guard or private
detective shall inform the person to be arrested of the intention to arrest him and cause of
the arrest, unless the person to be arrested is then engaged in the commission of an
offense or after an escape, or flees, or forcibly resists before the person making the arrest
has opportunity so to inform him, or when the giving of such information will imperil the
arrest. (Section 10,lbid).
D. Duty of security guard making arrest. -Any security guard making arrest, shall
immediately turn over the person arrested to the nearest peace officer, police outpost or
headquarters for custody and/or appropriate action, or he may without necessary delay
and within the time prescribed in Article 125 of the Revised Penal Code, as amended, take
the person arrested, to the proper Court of Law or judge for such action as they may deem
proper to take. (Section 17, bid)
E. Search without warrant. - Any security guard may, incident to the arrest, search the
person so arrested in the presence of at least two (2) witnesses. He may also search
employees of the person firm or establishment with which he is or his agency has a
contract of private detective, watchman or security services, when such search is required
by the very nature of the business of the person, firm or establishment.
F. General Orders-All security guards shall memorize and strictly keep by heart the following
general orders:
a. To take charge of the post and all company properties in view and protect/ preserve
the same with utmost diligence;
b. To walk in an alert manner during my tour of duty and observing everything that takes
place within sight or hearing;
c. To report all violations of regulations and orders I am instructed to enforce;
d.To relay all calls from posts more distant from the security house where I am
stationed;
e. To quit my post only when properly relieved;
f. To receive, obey and pass on to the relieving guard all orders from company officers
or officials, supervisors, post in charge or shift leaders;
g. To talk to one except in line of duty;
h. To sound or call the alarm in case of fire or disorder; i. To call the superior officer in
any case not covered by instructions;
j. To salute all company officials, superiors in the agency, ranking public officials and
officers of Philippine National Police; and
k. To be especially watchful at night and during the time of challenging, to challenge all
persons on or near my post and to allow no one to pass or loiter without proper
authority.
G. Duty to Assist Law Enforcers - Any security guard shall be duty bound to assist any
peace officer in the pursuit of his bounding duty, when requested, provided it is within
the territorial jurisdiction of his (security officer) area of duty
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
40
Types/awards - All security guards are entitled to the following awards for their outstanding
feat/ accomplishment /achievement during the performance of their duties and/or while serving
in the exercise of profession
A. Medalya ng Kagitingan (Blueguards Medal of Valor).
B. Medalya ng Katapatan sa Paglilingkod (Blueguard Distinguished Service Medal).
C. Medalya ng Katapangan (Blueguards Bravery Medal).
D. Medalya ng Pambihirang Paglilingkod (Blueguards Special Service Medal
E. Medalya ng Kadakilaan (Blueguards Heroism Medal).
F. Medalya ng Katangitanging Asal (Blueguards Special Action Medal).
G. Medalya ng Kasanayan (Blueguards Efficiency Medal).
H. Medalya ng Papuri (Blueguards Commendation Medal).
I. Medalya ng Sugatang Magiting (Blueguards Wounded Medal).
J. Medalya sa Pagtulong sa Nasalanta (Blueguards Disaster Relief and Rehabilitation
Medal). k
K. Letter of Commendation.
Description of action required of the above-mentioned awards:
A. Medalya ng Kagitingan (Blueguards Medal of Valor)-can be awarded to any Blueguards
whose performance and action falls under para. 1 and/or 2 below:
(1) Action of the Blueguard involving conspicuous gallantry and intrepidity
ignoring the risk of life and limb above and beyond the call of duty. In order to justify this
award, a Blueguard must perform conspicuously in deed and in action personal bravery
and self-sacrifice above and beyond the call of duty as to distinguish himself clearly
from his comrades in performing hazardous service.
(2) Blueguards who participated in rescue in any fire incident, disaster, calamity
or earthquake whose actions involve actual rescue operation, characterized by gallantry
and intrepidity at the risk of life and limb above and beyond the call of duty. In order to
justify this award, a Blueguard must have saved or attempted to save lives and
properties characterized by personal bravery, courage, heroism or self-sacrifice above
and beyond the call of duty as to distinguished himself above his comrades in the
performance of more than ordinary hazardous service.
B. Medalya ng Katapatan sa Paglilingkod (Blueguards Distinguished Service Medal) can
be awarded to any member of the Blueguards whose action and performance either fall under
para. a or b below:
(1) It can be awarded to any Blueguard who has rendered eminently meritorious
and invaluable service in the position of major responsibility. The performance of duty
must be exceptional. A superior performance of duty normal and relative to assignment,
position and experience of an individual is not an adequate basis for the award.
(2) The accomplishment of the duty, which has to be exceptional or significant
should have been completed prior to submission of the recommendation.
C. Medalya ng Katapangan (Blueguards Bravery Medal). It can be awarded to any
Blueguard member with the following requirements;
(1) For gallantry of the Blueguards action not warranting the Medalya Ng
Kagitingan nor Medalya ng Katapatan sa Paglilingkod.
(2) For Blue guard members who participated on rescue operations in a fire
incident, car accident, earthquake, flood, typhoon and other disasters/calamities and
whose acts of heroism has put his life in extreme danger in his desire to save the lives
of others.
D. Medalya ng Pambihirang Paglilingkod (Blueguards Special Service Medal). The
President of the Philippine Association of Detective and Protective Agency Operators, Inc.
(PADPAO) in Consonance with the Resolutions of the Board of Director, can award the medal
to any member of the civilian government such as parliamentarians, statement, diplomats,
journalists, scientists and any member of the Philippine National Police holding them and
respectable position and whose contribution and accomplishments greatly enhanced the
development and professionalism of the Civil Security Industry. The four (4) degrees of the
Medalya ng Pambihirang Paglilingkod with the corresponding requirements are the following:
(1) Degree of Raja - It can be awarded to any member of the legislative and the
judiciary to include jurists, parliamentarians, statesmen, diplomats, journalists, scientists
and the Director General of the Philippine National Police who has rendered eminently
meritorious and invaluable service in undertaking a major responsibility leading to the
development and professionalization of the Civil Security Industry. A superior
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
41
performance of normal duties based on one’s position will not be made a justification to
the award.
(2) Degree of Datu - It can be awarded to any of the Regional Directors and/or
any of the Directors of the National Supporting Unit or Command of the Philippine
National Police who has rendered eminently meritorious and invaluable service leading
to the development of the Civil Security Industry and contributed professional
assistance while in a position of major responsibility which has a lesser degree of
category and not warranting the award of the degree of Raja.
(3) Degree of Lakan - It can be awarded to any officer of the Philippine National
Police and the Armed Forces of the Philippines who has distinguished himself thru
exceptional meritorious conduct in the performance of outstanding service in the
development of the Civil Security Industry.
(4) Degree of Maginoo - It can be awarded to any member of the PNP, Armed
Forces of the Philippines and other government law enforcement agencies who has
distinguished himself thru exceptional meritorious conduct and outstanding service that
contributed in the making, developing and professionalizing the Civil Security Industry
but in a 67 lesser degree of category not warranting the award of the degree of Lakan.
For meritorious service of the greater value, the Blueguards Efficiency Medal is usually
awarded
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
42
“wound” is hereby defined as an injury to any part of the body sustained due to a hostile act of
an enemy on in quelling a fire. J. Medalya sa Pagtulong sa Nasalanta (Blueguards Disaster
Relief and Rehabilitation Medal)- It can be awarded to any member of the Blueguards with the
requirement that there should be an active participation of such member in an undertaking that
involves rescue/ relief and rehabilitation operations in relation to disasters of fortuitous events
such as typhoons, flood, earthquakes, conflagration and other calamities. k. Letter of
Commendation - any good activity done by any security guard officer.
Authorities to Grant Award -The following are authorized to approve/issue awards:
a. Medalya ng Kagitingan - Secretary of the Interior and Local Government.
b. Medalya ng Katapatan sa Paglingkod - Chief, Philippine National Police.
c. Medalya ng Katapangan - Chief, Philippine National Police.
d. Medalya ng Pambihirang Paglilingkod - Regional Director, PNP Police Regional
Office/Director, Civil Security Force Office.
e. Medalya ng Kadakilaan - Regional Director, PNP Police Regional Office/ Director,
Civil Security Group.
f. Medalya ng Katangi-tanging Asal - Regional Director, PNP Police Regional
Office/Director, Civil Security Group.
g. Medalya ng Kasanayan - Regional Director, PNP Police Regional Office/ Director,
Civil Security Group.
h. Medalya ng Papuri - Provincial Director, PNP Provincial Office/Chief, SAGSD/ CSG
Regional Office Directors.
i. Medalya Sa Pagtulong sa Nasalanta - Provincial Director, PNP Provincial Office/Chief,
SAGSD/ CSG Regional Office Directors
. j. Letter of Commendation - PSAs/ CGFs Operators/ Managers concerned. SEC
Wearing of Medals - All security guard who are recipients of awards shall wear them as part
of their uniform and miniature thereof, and shall be worn of the above left pocket of the
uniform.
The categories for recognition of the Most Outstanding Blueguards, Private Security
Agency and Company Guard Forces of the Year are the following
A. Male Blueguard of the Year.
B. Female Blueguard of the Year.
C. Private Security Agency of the Year.
D. Company Guard Force of the Year.
The categories for recognition of the Most Outstanding Blueguards Training School are
the following:
A. Pre-Licensing Trainee Graduates
B. Blueguards Trainee Graduates
C. Outstanding Blue guards Training School.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!