116202408560527856lea 3 Introduction To Security Concept

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 42

1

LEA 3- INDUSTRIAL SECURITY

COMPILED BY: Mr. Benjamin Dulipas,MSCrim- University Of Baguio

PART 1

1. PERSONALITIES:
A. Allan Pinkerton (1851)- Established the first national private security and
investigation company in the US.
B. August Pope (1853)- Patented one of the first burglar alarms.
C. Edwin Holmes ( 1858)- Introduced the first central station burglar alarms
D. Washington Perry Brinks( 1858)- Introduced the first armored carriages for
transportation of money and valuables
E. Linus Yale Jr.- in 1861, he invented and introduced the modern combination lock,
bankers quickly adopted Yale’s lock for their safe, but bank robbers came up with
several ways to get past the new inventions.
F. James Sargent- an employee of Yale, developed “theft proof lock”
THEFT PROOF LOCK
- This was a combination of lock that worked on a timer. The vault or safe door could
only be opened after a set number of hours had passed, thus a kidnapped bank
employee could not open the lock in the middle of the night even under force. Time
locks become widespread at bank in the 1870’s
G. Walter Bruch- German engineer who introduced and was responsible for the design
and installation of the system. (CCTV)
 The first CCTV system was installed by Siemens Ag at Test Stand VII in
Peenemunde, Germany in 1942, for observing the launch of V-rocket.
 Kings Lynn- The first place to use CCTV in the United Kingdom
-This is a sea port and market town in the ceremonial country of North folk in
the East of England
 Olean New York- In September 1968, the first City in the US to install video
cameras along its main business street in an effort to fight crime. The use of
closed- circuits TV cameras piping images into the Olean Police Department
propelled Olean to the forefront of crime- fighting technology.
H. George Wackenhut( 1954)- A retired FBI agent formed the Wackenhut Corporation
an enterprise that become another one of the largest Private Security Companies in
the US.
 American Society for Industrial Security ASIS (1955) this is the world largest
organization of security professional.

2. RELATED LAWS
A. REPUBLIC ACT 7641- An act amending article 287 of PD no. 442, As amended,
otherwise known as the labor code of the Philippines.
Approved: December 9, 1992
Effectivity: January 7, 1993

B. PD 96- which does not allow high government officials to use sire.
 PD 96 issued on January 13, 1973 by the late President Ferdinand Marcos,
States that only “ the Armed Forces Of the Philippines, the Police Authorities,
National Bureau of Investigations, the Fire Department and Hospital
Ambulances” are allowed to use sirens.
 This Law also allows President Aquino, VP Binay, CJ Corona, the Speaker
and the Senate President to use sirens.
 Violators faces fine of P15,OOO
C. RA 4136- The law creating Land Transportation Commission in June 20, 1964 that
allows ambulances, police cars and fire trucks to use horn or signaling devices.
D. RA 5487- The Private Security Agency Law – has been amended by PD NO. 100
dated January 17, 1973 in order to make more responsive to the demands of the
private security industry in the country.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
2
E. PD 11- Enlarging the coverage of the private security agency law to include those
security guards and watchmen employed in logging, concession, agriculture, mining
or pasture lands. Issued on October 3, 1972
F. RA 8799- Securities Regulation Code
 Approved July 17, 2000
 The state shall established a socially conscious, free market that regulates
itself, encourages the widest participation of ownership in enterprises,
enhance the democratization of wealth, promote the development of the
capital market, protect investors, ensure full and fair disclosure about
securities, minimize if not totally eliminate insider trading and other fraudulent
or manipulative devices and practices which create distortion in the free
market.

3. HISTORY
The historical roots of private security agencies can be traced back to thousand
years when the protection of life and personal property were to up the individual, and
later on passed to tribes, and then to cities.
In pre- historic times, man recognized the need to keep himself safe from both
known and unknown enemies such as animals, other inhabitants and the environment
itself. He used different methods to keep himself safe.
The Greeks of ancient times were the ones who organized the first police force in
the city states which they term polis. The romans, on the other hand, established
PRAEOTORIAN GUARDS known as VIGILES who were tasked to be fighters.

In the middles Ages during their invasion in England, the French formed a group
carefully selected men called SHIRES OR SHERIFF look after the peace and order of
the different regions.
The greatest influence in the history of security came from England in 1655,
Oliver Cromwell set up in England and Wales a police force that operated to capture
and punish criminals. In 1748 London Magistrate Henry Fielding introduced the
concept of crime prevention by organizing citizen’s patrol or watchmen that not only
chased criminal for felony and misdemeanor but also served Fielding’s purpose of
preventing crime ahead of time with their patrolling function. 15 years later, English
home secretary Sir Robert peel formed the first formal police department.

A. 1950’s- The private security agencies/ guards were under the supervisions and
control of the municipal of city mayors with in the locality were they are detailed.
The only requirement in order to exercise security profession was a permit from
the city/ municipal mayor in their area of responsibility.
B. June 13, 1969
C. August 4, 1969- (PCSIASO) Organizing the Philippine Constabulary Investigating
Agency Supervisory Office.
D. June 29, 1970- (PCSUSIA)- Philippine Constabulary Supervisory Unit For
security and Investigations Agencies. Pursuant to GO. No. 404
E. January 10, 1988- Organized PC Civil Security Force Command Pursuant To G.
0 213 Memo Number 9.
F. January 24 1989- PC/INP Civil Security Force Command.
 Made CSFC PCSUSIA as PC/ INPSUSIA
G. January 1, 1991- Creation of PnP, pursuant to RA 6975
 PCSUSIA was renamed to Supervisory Office for Security and Investigation
Agencies( PNPSOSIA)
H. June 1, 1995- Was renamed Security agencies and Guards Supervisions
Division( PNPSAGSD)
SECURITY
-Is a state or quality, condition of being secured, freedom from fear, harm, danger, loss,
destruction or damages
- It is the assurance, guarantee and certainly of being safeguard and free from fear of
danger.
-Defense against crime (Security World Magazine, March 1973)

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
3
The security of any business establishment today is a complex process. Security works involve
active and passive measures so that effective defense can be established against crime.
 Active Measure-these are physical barriers, security lighting, use of vaults, locks
and others.
 Passive Measure- are those that will dates man from committing such acts for fear
of being caught, charge in court, or get dismissed; Security education programs,
investigations, fire prevention seminars, personal security checks.

Basically, it was the action of man against man that led to many unsecured and unsafe
conditions. The reason could be economic, revenge, or just plain greed and avarice. Whatever
the motives, the civilized man needs adequate protections.

THE NATURE OF SECURITY:


A. Action of Man against Man.
Reasons: Economic, Revenge, Just plain greed, Avarice.
B. Individual: We should be concerned with security and protection from pilferage or theft,
robberies and disasters.
C. Government Service: Background check of personnel, and VIP protection
D. Every Installation, private of governmental need electronic alarms for disaster as well
against sabotage, pilferage and industrial Espionage.

3 D’s of Security
The basic theory of any security program can be summed up in the words:
A. Denial- takes the form of physical barriers like fences, walls, gates, locked doors, watch
dogs, etc. when the access id denied, the things or area are protected.
B. Detection- form of guards and electronic devices.
C. Deterrence- This can be both physical and psychological
Management in all business and organizational activities is the act of getting people together to
accomplished desired goals and objectives efficiently and effectively.

SECURITY MANAGEMENT
- The broad field of management related to asset management, physical security and
human resources safety functions. It entails the identification of organizations
information assets and the development, documentation and implementation of
policies, standards, procedures and guidelines.

INDUSTRIAL SECURITY MANAGEMENT


- The utilization of all available resources with in security organizations in order to
function and attain its goals and objectives. It is the managing of money, men
materials and methods with in security system.

SECURITY PLANNING:
- The decision making process made by executives in preparation of accomplishing
goals and objectives with in an organizations.
In security Management, a security plan composed of the Ff.
A. Situation- It explains in a short paragraph the historical background of the
organizations and its security forces.
B. Mission- Covers what plan is all about and what tends to do.
C. Execution- The concept of the project will outline and explain.
D. Administration and Logistics- involves the listing of security equipment and facilities
to be used.
E. Command and Signal- Pertains to the channel of communication needed when
implementing the project.

Security in general is very hard to comprehend; it can be divided into 3 major areas
A. Physical Security- this is the broadest branch of security which concerned with the
physical measures adopted to prevent unauthorized access to equipment, facilities,
material and document and to safeguard them against espionage, sabotage,
damage, loss and theft.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
4
B. Personnel Security- This is important as physical security. Personnel security starts
even before the hiring of employee and remains to be maintained for as long as the
person is employed.
-the purpose is to ensure that a firm hires those best suited to assist the firm in
achieving its goals and objectives and once hired assist in providing necessary
security to the work force while carrying out their functions.
C. Document and Information Security-This involves the protection of documents and
classified papers from loss, access by unauthorized persons, damage, theft and
compromise though disclosure.
-Classified documents need special handling. Lack of indoctrination and orientation
among the personal handling them can result in the leakage, loss, theft and
unauthorized disclosure of documents.

FIELDS OF SECURITY
1. IT FIELDS:
A. Computer Security- Is a branch of information security applied to both theoretical
and actual computer systems. A branch of computer science that addresses
enforcement of secure behavior on the operation of computers.
B. Data Security- Is the means of ensuring that data is kept safe from corruption and
that access to its suitably controlled.
C. Application Security- Encompasses measures taken to prevent exceptions in the
security policy of an application or the underlying system (vulnerabilities) through
flaws in the design, development, or destruction of application.
D. Network Security- Consists of the provisions made in an underlying computer
network infrastructure, policies adopted by the network administrator to protect the
network and the network- accessible resources from unauthorized access and the
effectiveness( or lack ) of the measures combined together.
2. PHYSICAL FIELDS:
A. Physical Security-Describes measures that prevent of deter attackers from
accessing a facility, resource, or information, stored on physical media. It can be as
simple as a locked door or as elaborate as multiple layers of armed guard posts.
B. Shopping Security- A type of security which is concern with protection of stores,
warehouse, storage, its immediate premises and properties as well as the
supermarket personnel and customers.
C. Airport Security- Refers to the techniques and methods used in protecting airports
and by extension aircraft from crime and terrorism.
D. Home Security- Are those methods use of protecting residential homes or town sites
which include the interior protection of houses against property losses or damages.
3. POLITICAL FIELDS:
A. International Security-Consist of the measures taken by the nations and international
organizations, such as the UN, to ensure mutual survival and safety. These
measures include military action and diplomatic agreements such as treaties and
conventions. International security is invariably linked.
B. National Security- Refers to the requirement to maintain the survival of the nation-
state through the use of economic, military and political power and the exercise of
diplomacy.
C. Human Security- Refers to the emerging paradigm for understanding global
vulnerabilities whose proponents challenge the traditional notion of national security
by arguing that the proper referent for security should be individual rather than the
state.
4. MONETARY FIELDS:
A. Financial Security- Refers to the methods applied for the protection of fungible,
negotiable instruments representing financial value.

TYPES OF SECURITY
A. Industrial Security- A type of security applied to business groups engaged in industries
like manufacturing, assembling, research and development, processing, warehousing,
and even agriculture.
B. Operational Security- Deals with primarily with the protection of process, formulas,
patents, and other operational activities of installations.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
5
C. Communication Security- the application of various measures which prevent of delay
the enemy or unauthorized persons in gaining information through the communication
system. It includes transmission security and crypto security.
D. Cryptographic Security- Results from the provisions of technically sound crypto-systems
and their proper use.
E. Bank Security- This type of security is concern with bank operations. It man objective is
the protection of bank cash and assets, its personnel and clientele. Security personnel
are trained to safeguard bank and assets while storage, in transit and during
transaction.
F. Crisis Security- Specialized field which allied if not part of VIP security which involved in
the kidnapping of VIP’S such as political leaders and the like.
-Motives can be economic, political, emotional, nationalistic, religious and their
combinations.
G. Personal Security- Protection of personnel especially rankings officials from any harm,
kidnap and other activities.
H. VIP Security- Applied for the protection of top ranking officials of the government or
private entity, visiting persons of illustrious standing foreign dignitaries.
I. School Security- The concern with the protection of students, faculty members, and
school properties. Security personnel are trained to protect the school property from
theft, vandal, handling campus riots and detecting the use of intoxicated drugs and
alcohol by the students.

PART 11
PHYSICAL SECURITY
-Physical security measures are being used to defined, protect and monitor property
rights and assets. These measures consist of barriers and devices that would detect, impede,
and prevent unauthorized access to equipment, facilities, materials and document and to safe
guard them against espionage, sabotage, damage and theft.

CONCEPT:

A. Enemy Agents must have access- In most cases espionage, acquisition of information
is the ultimate results, and means and form in which information is obtained is merely
an operational detail. Normally, information on tapes and film is as usable as the original
documents. Therefore in considering access, one should think not only of current
physical access to the discussion of the matter by the use of clandestine listing device.
B. There is no impenetrable barriers- in an unfriendly government or organizations is
willing to devote enough time, money, personnel, materials, and imagination to passing
a barrier, it can do so. So we can attempt to build defense in depth by using then one
barrier.
C. Surreptitious vs non- Surreptitious entry – The possibility of surreptitious entry is the
greatest hazard from standpoint of counter intelligence security because it is usually
difficult to neutralize the act of espionage because surreptitious entry is not usually
detected.
D. Each installation is different- Since each installation is different and it will have different
problems to overcome. The security procedures will not be adequate for all installations.
FOUR LAYERS OF PHYSICAL SECURITY
A. Environmental Design- The initial layer of security for a campus, building, office, or
physical space uses environmental design to deter threats.
B. Mechanical and electronic access control- Includes gates, doors, and locks. Key control
of the locks becomes a problem with large user populations and any user turnover.
Keys quickly become unmanageable forcing the adoption of electronic access control.
C. Intrusion detection- Monitors for attacks. It is less preventive measures and more of a
response measure. Although some would argue that it is a deterrent. Intrusion detection
has a high incidence of false alarms.
D. Video monitoring- are more useful for incident verification and a historical analysis. For
instance, if alarm is being generated and there is camera in the place, the camera could
be viewed to verify the alarm.
BARRIERS
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
6
-this can be defined as any physical structure whether natural or man-made capable of
restricting, deterring, delaying or preventing illegal and unauthorized access to an installation.

TWO GENERAL TYPES OF PHYSICAL BARRIERS:

1. NATURAL BARRIERS-
Advantage:
A. They can provide a protection system without additional cost to the
installation
B. The difficulty to penetrate an installation increase according to the barriers.
Disadvantage:
A. Trees, ravines, vegetation could serve as a hiding place to any possible intruder.
B. Installations that have as barrier a body of water could be subject to penetration
through team divers.

OTHERS:
 BODIES OF WATER AS BARRIERS:
ADVANTAGE:

A. When the surface of the water is calm, it offers the guard or security personnel a
very extensive filed view range.
B. Water offers much resistance to a vehicle used by intruder by making its almost
impossible to have rapid access to the installation.
C. To gain access, the task of hiding a vehicle or boat without been detected by the
guards or security personnel will be an obstacle to the intruder.
DISADVANTAGE:
A. When the water is agitated it reduces the field of vision of the guards or security
personnel.
B. It is possible to control the movement of a vehicle or boat to keep it hidden between
waves
C. The surface of the water reflects the lights given by the illumination system. An
intruder may use this situation in their favor when trying to penetrate an installation.

 THE LAND AS A BARRIER:


A. The land where the installation sits must be evaluated and considered as much from
the surface access point of view as from below the surface:
B. Points to consider when evaluating the land as a barrier:
1. The looser the ground the more noise wit it cause when the intruder walk.
2. Muddy soil without vegetation is very difficult to cross and at the time the
intruders leaves their footprints.
3. Light colored soil provides reflection and contrast so as to allow the most efficient
use of natural and artificial illumination.
4. Land that is uneven such as cliff and ravines are difficult to cross and limit the
amount of equipment’s and materials that the intruder could introduce in the
exterior perimeter area.

2. MAN-MADE BARRIERS
- Are structural constructions like fences walls, floors, roof, grills, bars, road, blocks, or
other physical means to deter or impede penetration.
FENCES:
- Fences are independent structures, generally in a vertical plane, designed for the
physical and or visual control of access to external.
Generally, a fence is use for the ff. purposes:
A. Outline the physical limits of an area.
B. Create a physical and psychological deterrent to unauthorized entry.
C. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of
intruders.
D. Assist in more efficient and economical employment of guards.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
7
E. They deny accidental access to innocent person to the protected area.
F. Facilities and improve the control and vehicular traffic.
TYPES OF BARRIERS
A. Natural Barriers- It includes bodies of waters, mountains, marshes, ravines, deserts or
other terrain that are difficult to traverse.
B. Structural Barriers- these are features constructed by man regardless of their original
intent that tends to delay the intruders.
C. Human Barriers- Person being used in providing a guarding system or by the nature of
their employment and location fulfill security functions.
D. Animal Barriers- Animals are used in partially providing a guarding system. Dogs are
usually trained and utilized to serve as guard dogs. German shepherds are best suited
for security functions. Goose and turkeys could also be included.
E. Energy Barriers- It is the employment of mechanical, electrical, electronic energy
imposes a deterrent to entry by the potential intruder or to provide warning to guard
personnel. These are protective lighting, alarm system and any electronic devices used
as a barrier
THREE LINE OF PHYSICAL DEFENSE
A. First Line of Defense- perimeter fences, barriers
B. Second Line of Defense- Doors, floors, windows, walls, roofs and grills and other entries
of the building.
C. Third Line of Defense- storage system like steel cabinets, safes vaults and interior files.

PERIMETER BARRIERS
- A medium or structure which defines the physical limits of an installation, or area to
restrict or impede access thereto. It is any physical barrier used to supplement the
protection of an inside or outside perimeter.
- This maybe form of fences, building walls or even bodies of water
- The main purpose of perimeter barrier is to deny or impede access or exit of un
authorized person.
OTHER PURPOSE OF PERIMETER BARRIER
- Defines the boundary of the property to be secured.
- Creates a physical and psychological deterrent to unauthorized entry.
- Delays intrusion, thus facilitating apprehension of intruders.
- Assists in a more efficient and economical employment of guards
- Facilitates and improves the control of pedestrian and vehicular traffic.

TYPES OF PERIMETER BARRIERS


A. Fences B. walls C. Bodies of water

TYPES OF FENCES
A. Solid Fence- constructed in such a way that visual access through the fences is denied. On
the other hand, it prevents the guards from observing the area around the installation and it
creates shadow that may be used by the intruder for cover and concealment.
AD VANTAGE:
1. Denies visual access of the installation to the intruders
2. Denies the intruder the opportunity to become familiar with the personnel, activities,
and time scheduled of the movement of the guards on the installation.
DISADVANTAGE:
1. It prevents the installation guards from observing the area around the installation.
2. A solid fence creates shadows which may be used by the intruder for cover and
concealment.

B. FULL VIEW FENCE- It is constructed in such a way that visual access is permitted through
the fence. It allows the intruders to become familiar with the movements and time schedule
of the guard patrols thereby allowing him to pick the time that is advantageous on his part.
ADVANTAGE:

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
8
1. Roving patrols and stationary guards are able to keep the area surrounding the
installation under observation
2. It does not create shadows which would provide cover and concealment for the
intruder.
DISADVANTAGE:
1. It allows visual access to the installation, its personnel, its guards; and its activities.
2. It allows the intruder to become familiar with the movements and he time schedule of
the guards patrol; thereafter- allowing him to pick the time for attempting penetration
which would be the most advantageous to him.
TYPES OF FULL-VIEW FENCE
 CHAIN LINK FENCES
1. It must be constructed of 7 feet materials excluding top guard.
2. Must be of 9guage or heavier.
3. Mesh opening are not to be larger than 2 inches per side
4. It should be twisted and barbed salvage at top and bottom.
5. It must be securely fastened to rigid metal or reinforced concrete.
6. Must reach within 2 of hard ground or paving.
7. On soft ground, must reach below surface deep enough to compensate for shifting
soli or sand.
 BARBED WIRE FENCE
1. Standard barbed wire is twisted, double –strand 12gauge wire with 4 points barbs
space an equal distant apart.
2. Barbed wire fencing should not be less than 7 feet high excluding top guard.
3. Barbed wire fencing must be firmly affixed to post not more than 6 feet apart.
4. The distance between strands must not exceed 6’ and at least one wire will be
interlaced and midway between posts.
 CONCERTINA WIRE FENCE
1. Standard concertina barbed wire is commercially manufactured wire oil of high
strength steel barbed wire clipped together at intervals to form a cylinder.
2. Opened concertina wire is 50 feet long and 3 feet in diameter.

PERIMETER BARRIERS OPENING


A. Gates and Doors- when not in use and controlled by guards, gates and doors in the
perimeter should be locked and frequently inspected by guards. Lock should be
changed from time to time and should be covered under protective locks and key
control.
B. SIDE WALK ELEVATOR- These provides access to areas within perimeter barrier
and should be lock and guarded.
C. UTILITIES OPENING- Sewers, air intakes, exhaust tunnels and other utility
openings which penetrate the barrier and which have cross sectional areas of 96
square inches or more should be protected by bars, grills, water filled traps, or other
structural means providing equivalent protection to that portion of perimeter barriers.
D. CLEARZONE- an obstructed area or a “clear zone” should be maintained on both
sides of the perimeter barrier. A clear zone of 20 feet or more is desirable between
the barriers and exterior structures and natural cover s that may provide
concealment for assistance to a person seeking unauthorized entry.

SPECIFICATION ON CLEAR ZONES


A. Clear zones of 20 feet or more should exist between the perimeter barriers and exterior
structures, parking areas and natural or man-made features.
B. A clear zone of 5o feet or more should exist between the perimeter barrier and structure
within the protected areas except when a building wall constitutes part of the perimeter
barriers.
ADDITIONAL PROTECTIVE MEASURES
A. Top Guard- additional overhang of barbed wire placed on vertical perimeter fences
upward and upward with a 45degree angle with 3 to 4 strands of barbed wires paced 6
inches apart this increases the protective height and prevents easy access.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
9
B. Guard Control Stations- this is normally provided at main perimeter entrances to secure
areas located out of doors, and manned by guards on fulltime basis. Sentry station
should be near a perimeter for surveillance at the entrance.
C. Tower Guard- this is house-like structure above the perimeter barriers. The higher the
tower the more visibility it provides. It gives a psychological unswerving effect to the
violators. By and large guard tower, whether permanent or temporary, must have
corresponding support force in the event of need. Towers as well as guard control
stations should have telephones, intercoms, and if possible two way radios connected
to security headquarters or office to call for reserves in the event of need.
D. Barrier Maintenance- Fencing barrier and protective walls should always be regularly
inspected by security. Any sign or attempts to break it should be reported for
investigations. Destructions of fences or section thereof should be repaired immediately
and guard vigilance should be increase.
E. Protection in Depth- In large open areas or ground where fencing or walling is
impractical and expensive, warning sign should be conspicuously placed. The depth
itself is protection reduction of access road, and sufficient, notices to warn intruders
should be done. Use of animals as guards and intrusion device can also be good as
barriers.
F. Signs and Notices- “control signs” should be erected where necessary in the
management of unauthorized ingress to preclude accidental entry. Signs should be
plainly visible and legible from any approach and in an understood language or dialect.

GUARD AND GUARD SYSTEM:


A. Four basic function that must be accomplished by this Guard System:
1. Detect intruders
2. Sound alarms
3. Apprehend unauthorized personnel; and
4. Identify unauthorized personnel.
B. Human Barriers:
 Guard procurement: selection criteria:
1. Must eligible for security clearance;
2. Vigorous and physically able to serve in the capacity of a guard;
3. Intelligence necessary to accomplished the guard function;
4. The ability to make rapid decisions and react in a calm way to emergencies;
5. Loyalty and discretion are required attributes;
6. Experience is highly desirable although not usually mandatory.
 Guard Training: Programs of training should include:
1. General orientations
2. Instruction in security procedures of the installation, first aid, and communication
3. Instruction in traffic control, riot control, self defense
4. Weapons qualifications to include maintenance and safety.
5. Refresher course and advance training in specific subject.
 Guard Employment: Two basic techniques of guard employment:
1. Fixed Post 2.Patrols
 Guard Supervisions:
1. Personal supervision- Personal inspection of all guards prior to their starting tour
of duty. Periodic checks of guards during their tour by the senior member of
each relief or his representative.
2. Artificial Supervision:
A. Recorded Tour- Guard takes with him on his tour of duty a form which must
have time punched on it at each station.
B. Supervisory tour- This is where the guard sends signal to guard headquarter
from each station that he checks.
 Guard Equipment’s:
1. Distinctive uniform 5. Credentials
2. Weapons ( 38 rev., 45 pistols) 6. Whistle
3. Notebooks 7. Flashlights
4. Nightsticks 8. Others uniforms as may be directed by the unit SOP
 Guard Communication:
A. Primary Communications- Direct line telephone or some instance radio

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
10
B. Emergency Communication- ex. Messenger

In counter intelligence security consideration there are two outstanding energy barriers:

A. Protective lightings B. Protective alarms

PROTECTIVE LIGHTING
- The idea that lighting can provide improve protection for people and facilities is as
old civilization. Protective lighting is the single most cost- effective deterrent to crime
because it creates a psychological deterrent to intruders.
PURPOSE OF PROTECTIVE LIGHTING
A. It provides sufficient illumination to the areas during hours of darkness.
B. Lighting can help improve visibility so that intruder can be seen and identified and, if
possible, apprehended.
C. It serves as deterrent to would-be thieves.

TYPES OF PROTECTIVE LIGHTING


 Continuous Lighting-The most familiar type of outdoors security lighting, this is design to
provide two specific results: glare projection or controlled lighting. It consists of a series
of fixed luminaries at range to flood a given area continuously during the hours of
darkness.
A. Glare Projection Type- The intensity is focused to the intruder while the observer or
guard remained in the comparative darkness; the lighting is toward of the approach of
an entrance to an installation. This is being used in prisons and correctional institution
to illuminate walls outside barriers.
B. Controlled Lighting-the lighting is focused on the pile of items, rather than the
background. The width of the lighted strip can be controlled and adjusted to suit the
security needed
 Standby lightings- It is designed for reserve or standby use or o supplement continuous
system. A standby system can be most useful to selectivity light a particular area in an
occasional basis.
 Movable Or Portable Lightings- This system is manually operated and is usually made
up of movable search or floodlights that can be located in selected or special locations
which will require lighting only for short period of time.
 Emergency Lighting- This system is used in times of power failure or other emergencies
when other system is inoperative.

GENERAL TYPES OF LIGHTING SOURCES


Listed below are the general lighting sources that are mostly used in providing indoor or
outdoor lighting.
A. Incandescent Lamp- it is least expensive in terms of terms of energy consumed and has
advantage of providing instant illumination when switch is on.
B. Mercury Vapor Lamp- It is considered more efficient that the incandescent and used
widespread in exterior lighting. This emits a purplish-white color, caused by an electric
current passing through a tube conducting and luminous gas.
C. Metal Halide- it has similar physical appearance to mercury vapor but provides a light
source of higher luminous efficiency and better color rendition.
D. Fluorescent- This provides good color rendition, high lamp efficiency as well as long life.
However, it cannot project light over long distance and thus are not desirable as flood
types light.
E. High Pressure Sodium Vapor- this has gained acceptance for exterior lighting of parking
areas, roadways, buildings and commercial interior installations. Constructed on the
same principles as mercury vapor lamps, they emit a golden white to light pink color and
this provide lumen efficiency and relatively good color rendition.

TYPES OF LIGHTING EQUIPMENTS


Three types of lighting equipment’s are generally used or associated with security lighting.
A. Flood Lights- these can be used to accommodate most outdoor security lighting needs,
including the illumination of boundaries, fences and buildings and for the emphasis of
vital areas or particular building.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
11
B. Street Lights- This lighting equipment’s received the most widespread notoriety for its
value in reducing crime.
C. Search Lights- These are highly focused incandescent lamp and are designed to
pinpoint potential trouble spots.
D. Fresnel Lights- These are wide beam units, primarily used to extend the illumination in
long, Horizontal strips to protect the approaches to the perimeter barriers. Fresnel
projects a narrow, horizontal beam that is approximately 180 degrees in the horizontal
and from 15 to 30 degrees in vertical plane.

PROTECTIVE LIGHTING REQUIREMENTS


A. Protective lighting needs at installation and facilities depend on each situation and the
areas to be protected. Each situation requires careful study to provide the best visibility
practicable for security duties identification of badges and people at gate, inspection of
vehicles, prevention of illegal entry, and detection of intruders inside or outside the
building and other structures and inspection of unusual or suspicious circumstances.
B. When such lighting provisions are impractical, additional security posts, patrols, sentry
dog patrols, or other security means will be necessary
C. Protective lightings should not be used as a psychological deterrent only. It should be
used on a perimeter fence line only where the perimeter fence is under continuous or
periodic observation.
D. Protective lightings maybe desirable for those sensitive areas or structures within the
perimeter, which are under specific observation. Such areas include vital buildings,
storage, and vulnerable control points in communication, power and water distribution
system. In interior areas where night operations are conducted, adequate lighting on the
area facilities detection of unauthorized persons approaching or attempting malicious
acts within the area.

AREAS TO BE LIGHTED
A. Perimeter Fence
B. Building Faces Perimeter
C. Pedestrian and vehicle entrance
D. Parking area
E. Storage, large open working areas, piers, docks, and other sensitive areas.

ALARMS - Aural or visual signal given by annunciator to security when intruder actuates
device in a protected area. An annunciator is a visual or audible signaling device which
initiates conditions of associated circuits.
-Basically alarm systems are design to alert security personnel to consummated or attempted
intrusions into an area, building or compound. Each type of alarm is activities in the event that
an intruder tempers with the circuitry, a beam or radiated waives. Intrusion alarm can be
electrical, mechanical or electronics. Alarms are also used for fire, smoke or other
emergencies and presence of other hazards.

PROTECTIVEALARMS- Is one of the important barriers in security. It assists the security in


detecting, impeding or deterring potential security threat in the installation. Basically, its
function is to alert the security personnel for any attempt of intrusion into a protected area,
building or compound. Once an intruder tampers the circuitry, the beam or radiated waves of
the alarm system, it will activate an alarm signal.

THREE BASIC PARTS OF ALARM SYSTEM


A. Sensor or trigger devices- it emits the aural or visual signal or both.
B. Transmission Line- a circuit which transmit the message to the signaling apparatus
C. Annunciator- It is the signaling system that activates the alarm.

TYPES OF PROTECTIVE ALARM SYSTEM


A. Central Station System- A type of alarm where the control station is located outside the
plant or installation. When the alarm is sounded or actuated by subscriber, the central
station notifies the police and other public safety agencies.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
12
B. Proprietary System- Centralized monitor of the propriety alarm system is located in the
industrial firm itself with duty operator. In case of alarm, the duty operator calls whatever
is the primary need; firefighter, police, an ambulance or a bomb disposal unit.
C. Local Alarm- This system consists of ringing up a visual or audible alarm near the object
to be protected. When an intruder tries to pry a window, the alarm thereat goes off.
D. Auxiliary Alarm- Company-owned alarm systems with a unit in the nearest police station
so that in case of need, direct call is possible. The company maintains the equipment
and lines both for the company and those in the police, fire and other emergency
agencies by special arrangement. It can be availed of by radio, landline, or cell phones.

KINDS OF ALARM S:
A. Audio Detection Device- It will detect any sound caused by attempted force entry. A
supersonic microphone speaker sensor is installed in walls, ceiling and floors of the
protected area.
B. Vibration Detection- It will detect any vibration caused by attempted force entry. A
vibration sensitive sensor is attached to walls, ceilings or floors of the protected area.
C. Metallic Foil or Wire- It will detect any action that moves that foil or wire. An electrically
charge strips of tinfoil or wire is used in the doors, windows or glass surface of the area.
D. Laser Beam Alarm- A laser emitter floods a wall or fencing with in a beam so that when
this beam is disturbed by a physical object an alarm is activated.
E. Photoelectric or Electric Eye Device- An invisible/visible beam is emitted and when this
is disturbed or when an intruder breaks contact with the beam, it will activate the alarm.

UTILIZATION OF ALARM DEVICES


The selection of proper alarm system is not a simple matter, because the needs of each
installation are different, like sets of fingerprints. Some factors that determine the requirements
of the installation will include:
A. Nature of the area or installation
B. Critically of the area or complex
C. Accessibility
D. Location of installation and areas to be protected
E. Construction and types of buildings
F. Hours of normal operations
G. Availability of other types of protection
H. Initial and recurring cost of installed alarm system
I. Design and salvage value of desired equipment
J. Response time of the security force and local police
K. Savings in manpower and money for a period of time if alarm is used.

INTRUSION ALARM DEVICES – These are designed to detect and not to prevent criminal
acts and should be used normally as an adjunct and not a replacement of the human guard
forces. The primary consideration on the choice of a particular alarm system includes stability
and reliability. Desirable characteristics furthermore should include:
A. A detection unit should initiate the alarm upon intrusion of a human being in the area or
vicinity to be protected area or object.
B. Panel board central annunciator operating console- monitoring activities should be
manned at all times.
C. Fail-safe features which give alarm in the annunciator when something is wrong with
the system.
D. System should be difficult to tamper or render ineffective by outsider, saboteurs.

SUMMING UP PROTECTIVE ALARM DEVICES


A. Alarm devices are physical safeguards used to assist security but not a replacement in
the protection of assets and lives in the installation.
B. It assists the guards to extend their hearing and vision even in areas where they are not
physically present.
C. The alarm system whether a local, a central, proprietary, or auxiliary type are to inform
the guard either visually or aurally of an attempt or a break-in within the premises being
protected.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
13
D. Maintenance of alarm system must be regularly made, the signal line must be
protected, and there must be alternative source of man power.
E. New and improve intrusion hardwires are being developed and placed in the market but
again, the human guard is irreplaceable in spite of computerization and the arrival of
super sophisticated devices in security alarm systems.

PROTECTIVE LOCKS AND KEY CONTROL


-Locks are one of the most widely used physical security devices in the asset protection
program of an installation. It complements other physical safeguards of the installation against
any possible surreptitious entry. However, the owner of the installation or his security officer
needs to understand the weaknesses and strength of each type of lock including door,
windows or walls to be used to achieve maximum benefit from it application. This is because
highly skilled burglars more often concentrate on the locks and its surrounding mechanism in
order to make forcibly entry. It is for this obvious reasons that locks are considered as delaying
devices which cannot really top a determine intruder from destroying the lock just to launched
an attacked. Hence, knowledge of the basics principle of locking systems will enable the
installation owner or the security officer to evaluate any lock and determine its quality and
effectiveness in particular application.

LOCK- is a mechanical, electrical, hydraulic or electronic device designed to prevent entry into
a building, room, container or hiding place.
TYPES OF LOCK
A. Key Operated Mechanical Lock- it uses some sort of arrangement of internal barriers
which prevent the lock from operating unless they are properly aligned. The key
is device used to align these internal barriers so that the lock may be operated.
B. Padlocks- A portable and detachable lock having a sliding hasp which passes through a
staple ring and is then made fasten or secured.
C. Combination Lock- Instead of using they key to align the tumblers, the combination
mechanism uses number, letters or other symbols as references point which enables an
operator to align them manually

D. Code-operated Lock- a type of lock that can be opened by pressing a series of


numbered button in the proper sequence.
E. Electrical Lock- A type of that can be opened and closed remotely by electrical means.
F. Card- Operated Lock- A type of locked operated by coded card.

TYPESOF KEYS
A. Change Keys- a specific which operates the lock and has particular combinations of
cuts, or biting which match the arrangement of the tumblers in the lock.
B. Sub-master Key- A key that will open all the lock within a particular area or grouping in a
given facility.
C. Mater Key- A special key capable of opening a series of lock.
D. Grand Master Key- A key that will open everything in a system involving two or more
master key group.

KEY CONTROL
-Once an affective key control has been installed, positive control of all keys must be gained
and maintained. This can be accomplished only if it is established in conjunction with the
installation of new locking devices. The ff. methods can be used to maintain effective key
control.
A. Key Cabinet –A well-constructed cabinet will have to be procured. The cabinet will have to
be of sufficient size to hold the original key to every lock in the system. It should be secured at
all times.
B. Key Record- Some administrative means must be set up to record code numbers and
indicates to whom keys to specific locks have been used.
C. Inventories-Periodic inventories will have to be made of all duplicates and original keys in
the hands of an employee whom they have been issued.
D. Audits-In addition to periodic inventory, an announced audit should be made of all key
control records and procedures by a member of management.
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
14
E. Daily Report- it should be made to the person responsible for the key control from the
personnel department indicating all persons who have left or will be leaving the country. In the
event that a key has been issued, steps should be initiated to insure that the key is recovered.

SECURITY CABINET- these is the final line of defense at any facility is in the high security
storage where papers, records, plans or cashable instrument, precious metals or other
especially valuable assets are protected. These security containers will be of a size and
quantity, which the nature of business dictates.
3 TYPES OF SECURITY CABINET
A. Safe- a metallic container use for safekeeping of documents or small items in an office
or installation. Safe can be classified as either robbery or burglary resistance depending
upon the use and need:
1. At least 750 lbs, anchored
2. Any safe that weigh less than 750lbs. should be anchored to a building structure
3. Its body should at least one thick steel or equal
4. Safe as a general rule, require the door to be made of steel and at least 11/2 thick.
B. Vault- Heavily constructed fire and burglar resistance container usually a part of the
building structure used to keep and protect cash, documents and negotiable
instruments. Vaults are bigger than safe but smaller than a file room.
1. The vault door should be made of steel at least 6 inches in thickness
2. Vault walls, ceiling, floor reinforce concrete at least12 inches in thickness
3. Electrical conduits into the vaults not exceed 11/2 in diameter
4. Vault floor should be higher by hour inches with the surrounding floors and if in level
with the floor buttons, storage container should be raised at least 4 inches above the
floor.
5. Standard vaults, to reduce destroying of too many records, should not be more than
500 cubic feet.
6. Vault must be resistive up to 6 hours.
C. File Room- A cubicle in a building constructed a little lighter than a vault but of bigger
size to accommodate limited people to work on the record.
1. It should at most be 12feet high
2. The interior cubage should not more than 10,000 cubic feet
3. The ventilation should be through the door.
4. It must have a watertight door and at least fire proof for one hour.
5. The supporting structure, the walls, floor and roof should be made fire-proof.

PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL


-Every installation, the use of protective barriers, security lighting, communication and
electronic hardware provides physical safeguards but these are insufficient to maximize the
effort of the guard force. A control point must be established for positive personnel
identification and check system. This is to insure that only persons who have the right and
authority will be given the necessary access to the area.
- The most practical and generally accepted system of personnel identification is the use of
identification cards badges or passes. Generally speaking, this system designates when and
where and how identification cards should be displayed, and to whom. This helps security
personnel eliminate the risk of allowing the access of authorized personnel within the
establishment.
TYPES OF PERSONNEL IDENTIFICATION
A. Personal Recognition
B. Artificial Recognitions- Identification cards, passes, passwords, etc.

USE OF PASS SYSTEM


A. Single pass system- the badge or pass coded for authorization to enter specific areas is
issued to an employee who keeps it in his possession until authorization is terminates.
B. Pass exchange system- An exchange takes place at the entrance of each controlled
area. Upon leaving the personnel surrenders his badge or passes and retrieve back his
basic identification.
NOTE: in this system the second badge never leaves the controlled area, thus reducing the
possibility of switching, forging or alteration.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
15
C. Multiple pass system- this provides an extra measure of security by requiring that an
exchange take place at the entrance of each restricted area.
BADGE AND PASS CONTROL
1. The system should have a complete record of all badges and identification cards
issued, return, mutilated or lost by serial number and cross- indexed alphabetically.
2. The supervisor from time to time for its accuracy and authenticity should check the list.
3. Passes and badges reported lost should be validated and security at entrance be
informed through conspicuous posting.

TYPES OF CONTROLLED AREA


A. Controlled Areas- are those areas where access is restricted as to entrance or
movement by all authorized personnel and vehicles. It should additionally mark by a
fences or other barrier, and access to its limited to as few guests as possible.
B. Limited Areas- Are those within the controlled area where a greater degree of security is
required.
C. Exclusion Areas- are used only for handling storage of high value cargo and classified
document. The number of people authorized to enter this area should be strictly limited,
and the area should be under surveillance.
TRAFFIC CONTROL SYSTEM
-Controlling traffic in and out with in a facility is essential to its security program. Perimeter
barriers, locked, doors and screened windows prevent r deter the entry of authorized
visitors ,but since some traffic essential to every operations, no matter how highly classified it
maybe, provision must be made for the control of this movement.
- Specific solution will depend upon the nature of the business, obviously retail establishment,
which encourage high volume traffic and which regularly handle a great deal or merchandise
both in and out, have a problem of a different dimension from the industrial operation working
on a highly classified government project. Both, however, must work from the same general
principles towards providing the greatest possible security with in the efficient and effective
operation of the job at hand.
TRAFFIC CONTROLLING INCLUDES:
A. Identification of employees and visitors and visitors and directing or limiting their
movements.
B. Control of all incoming and outgoing packages; and
C. Control of trucks and private vehicles.
PERSONNEL IDENTIFICATION
-The most practical and generally accepted system is the use of badges and identification
cards. Generally speaking, this system designates when and where and how passes should be
displayed, and to whom, what is to be done in case of the loss of the pass; procedures of
taking a pass from terminating employees; and a system in cancellation and re-issue of all
passes; either as a security review or when a significant number of badge have reported lost or
stolen. To be effective:
A. Badge must be tamper- resistant which mean that they should be printed or embossed on a
distinctive stock with a series of design difficult to reproduce.
B. They should contain a clear and recent photograph of the bearer, preferably in the color:
C. The photograph should be at least one inch square and should be updated every two to
three years or when there is any significant change in facial appearance; and
D. Should additionally contain vital statistic such as date of birth, height, weight, color of hair
and eyes, sex and thumbprints.

VISITORS MOVEMENT CONTROL


-Security should establish proper methods of establishing the authority for admission of visitors
as well as the limitation thereat. This security measure would depend on the sensibility of the
installation, but could include the ff.
A. Visitor’s Logbook- all visitors to any facility should be required to identify them and should
be given a visitors ID by the security. Visitors Logbook should be filled up with the named o
visitors, nature and duration of visit.
B. Photograph- Taking photographs should also be considered. Extreme caution must be
exercise in areas where classified information is displayed to preclude unauthorized taking of
picture of the installation. If a visitor has a camera should be left in the care of security with
corresponding receipt.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
16
C. Escort- if possible visitors should be escorted by the security to monitor their activity wit in
the establishment and guide them where to go.
D. Visitors Entrance-separate access for visitors and employees of the establishment should
be provided.
E. Time Travelled- If there is a long delay or time lapse between the departure and arrival, the
visitors may be required to show cause for the delay.

PACKAGE MOVEMENT CONTROL


-Every facility must establish a system for the control of package entering or leaving the
premises.
Therefore, since the transporting of packages through the portals is a fact of life, they must be
dealt with in order to prevent theft and misappropriation. Thus;
A. No packages shall be authorized to b brought inside the industrial installation, offices
and works are without proper authority. This basic precept help reduce is not eliminate
pilferage, industrial espionage and sabotage.
B. Outgoing packages, carried by personnel should be closely inspected and those in
vehicles should be as many pilfered items hidden in the surface of the vehicles leaving
the compound.
C. Any personnel/ visitor entering the installation with a packages should be deposit the
same to the security and in return receives a numbered tag, which he/she use in
claiming his/her packages upon deporting.

VEHICLE MOVEMENT CONTROL AND IDENTIFICATION


-Vehicular traffic within the boundaries of any facility must carefully controlled for safety as
well as to control transporting of pilfered goods from the premises. Thus;
A. Privately owned vehicle of personnel / visitors should be registered and are subject to the
identification and admittance procedure.
B. Vehicles should be subjected for search at the entrance and exit of an installation
C. All visitors with vehicle should provide him security as to the complete details of their
duration of stay, person to be visited and other information
D. All vehicles of visitors should be given s sign/stickers to be placed on the windshield
E. Traffic warning signs should be installed in all entrances in order to guide the visitors in
their destination as well as to provide them the necessary safety precautions while they are
inside installation.
F. Security personnel must constantly supervise parking areas and make frequent spots
searches of vehicle found there.

BUILDING ACCESS CONTROL


-At any physical barrier, a security system must possess the ability to distinguish among
authorized persons, unauthorized visitors, and other unauthorized persons. This is to assist the
security personnel protects sensitive are and information within the installation.
- Appropriate warning signs should be posted at the building perimeter. Special restricted entry
facilities to public access should be provided. This will be dependent on the degree of security
needed for the protection of property, activity and other processes within the building.
- The access to the restricted area shall be limited to authorize personnel who have the direct
involvement with the installation, construction and operation and maintenance of the
equipment and systems and or use of the materials contained within the restricted area. A
clear-cut policy on the access control should be disseminated to all personnel o the
installation.

PART III
PERSONNEL SECURITY
Of the three major aspects of security, personnel security is considered as the most important
and critical. This is the simple reason that security involves people, both an assets to be
protected and as source of security threats. It is an acknowledge fact that losses are attributed
mainly to negligence or active participation of employees, either through theft and sabotage.
This emphasizes the need to set up a system of hiring the people for the company.
PURPOSE OF PERSONNEL SECURITY
A. To insure that a firm hires those employees best suited for the firm; and

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
17
B. Once hired, to assist in providing the necessary security to the employees while they
are carrying out them functions.
Scope of personnel security
A. Personnel Security Investigations
B. Security Education
Key Function of Personnel Security
A. I t serves as a screening device in hiring suitable employees
B. It provides background investigation service of both potential and present employees,
for possible assignment to sensitive position.
C. It handles investigation of employees suspected of wrong doing
D. It develops security awareness among employees.
E. It attempts to ensure the protection of employees from discriminatory hiring or
terminating procedures as well as unfounded allegations of illegal or unethical activities
and conduct.

1. Personnel Security Investigations-Is a process of inquiry/ into the character, reputation,


discretion, integrity, morals and loyalty of an individual to determine the suitability for
appointment or access to classified matters.
General Techniques of PSI
A. Background Investigations (BI)- This technique is very expensive but necessary in
personnel security. It serves to verify information on the application form and to obtain
other information pertinent to the decision to employ.
Factors to consider in the conduct of BI
A. Loyalty D. Morals
B. Integrity E. Character
C. Discretion F. reputations
Types of Local Agency Check (LAC)
A. Barangay clearance C. City or Municipal clearance
B. Court Clearance D. Local Police clearance
Types of National Agency Check (NAC)
A. National Bureau of Investigation Clearance
B. PnP Directorate for Intelligence Clearance
C. Intelligence Service, AFP Clearance

2. Positive Vetting-Is the process of inspecting or examining with careful thoroughness. The
essence of vetting that is a personal; interview conducted under stress. It is based on
information previously given by applicant. Other information issued during the interview,
such as those discovered in the BI which confirms or denies this given by the applicant.
3. Profiling- this is the process whereby a subjects reaction in a failure critical situation is
predicted by observing his behavior, or by interviewing him, or analyzing his response to a
questionnaire, such as an honesty test.
4. Deception Detection Techniques- this process of using devices in detecting deception
during the interview stage. This includes the use of a polygraph, psychological stress
evaluator and voice analyzer.
5. Financial and Lifestyle Inquiry- This type of investigations seeks to gather information on
income and mode of living, sometimes referred to as the earning to debt ratio.
6. Undercover Investigations- This is the placement of an agent in a role in which the agents
true identity and role remains unknown, in order to obtain information for criminal
prosecution or for recovery or limitation of asset losses.
7. Exit Interview- This is a valuable tool because it gives departing employees an opportunity
to list grievances. It offers security managers an opportunity to learn of problems not
previously known. Incorporating a checklist of company- issued property and confronting a
departing employee of this resulted in reducing losses of company property. Debriefing an
employee is also incorporated into the exit interview to remind employees of their
continuing legal obligation to safeguard confidential company information.

Security Education- Is conducted to develop security awareness among employees of the


company. It should cover all employees, regardless of rank or position.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
18
Security Education Program- The basic goal of security education program is to acquaint all
the employee’s the rationale behind the security measure and to insure their cooperation at all
times.
OBJECTIVES OF SECURITY EDUCATION
A. Guidance for all supervisory and execution levels of the organization.
B. A mandatory indoctrination on security for all new personnel before their assignment to
their respective jobs.
C. Development of a high degree of security consciousness among the selected
supervisors and other key personnel in a program that should be continuing and
supported by top management.
D. A down-the-line security program aimed at instilling consciousness and dedication
through demonstration, lecture, motivations, and suggestion.
E. To let all employees force is informed that they all belong to the organization and that
no- awareness to the security program is tantamount to disloyalty.
F. That the program is also to develop discipline, loyalty and belongingness.

Phase of Security Education Program


A. Initial Interview- It is the first contact of the prospective employee wherein the
interviewer deters the suitability of the applicant for employment through his give
answers on the different type of questions being conducted. It is in this stage where, the
interviewer may start providing the necessary information as to the overview of
company security policies and at the same time on the employee accountability and
corresponding penalties that could result from violation.
B. Orientation and Training- It is this stage where new employees receive detailed
presentation of personnel security policy. Usually handouts or employees manual are
being distributed for references. New employees also requested to signed
acknowledgment that they have been aware of the exiting company policies and will
abide the same.
C. Refresher Conference- It is design to remind employees of the company about their
responsibilities, review the guidelines and policies, introduction of new policies and
regulations and the moment of getting employees feedback about the company policies
that is being implemented.
D. Security Reminders- A phase which employees an indirect approach of educating the
employees such as posting security poster and distributing fliers.
E. Security Promotion- It is the act of emphasizing the importance and role of security
achieving company goals and objective. It involves security employee cooperation and
support.
PART IV
DOCUMENT AND INFORMATION SECURITY
A. Document Security- This involve the protection of documents and classified papers from
loss, access by unauthorized persons, damage, theft and compromise through
disclosure.
B. Classified Information- This includes all information concerning document, cryptographic
devices developed projects and materials following on the categories t Top Secret,
Confidential or Restricted.
C. Classified Matters- Any information or material in any form or of nature, the
safeguarding of which is necessary in the interest of security and which is classified for
such purpose by the responsible classifying authority.
D. Classify- This refers to the assigning of information or material, one of the four security
categories after determination has been made that the information requires the security
protection as provided.
E. Declassify- The act of removing the security classification from classified information.
F. Reclassifying or Regarding- Refers to the act of changing the assigned classification
from classified information or matter.
G. Upgrading- the act of assigning the information or matter to the higher classification
than that previously assigned to it.
H. Compartmentation- Refers to the grant of access to the classified matter only to
properly cleared person when such classified information is required in the performance
of their official duties

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
19
I. Need to Know- Is the dissemination of classified information or matter to be limited
strictly to those person whose duties requires knowledge or possession thereof
J. Unauthorized- Refers to the person not authorized to have access to classified matters.
K. Compromise- This takes place through the loss of security, which results from
unauthorized person obtaining knowledge of classified matters.
L. Damage to National Security- Refers to the prejudice, embarrassment or inquiry to the
country resulting from act or omission.
Purpose of Protecting Classified Materials
A. Deters and impede potential spy.
B. Assist in security investigations by keeping accurate records of the moment of classified
materials.
C. Enforce the use of “need to know” principle.
Two Kinds of Documents
A. Personal- Letters, diary and notebooks. These could be treated usually the same with
official documents.
B. Official- Orders, manuals, letters, overlays, mas and magazines. You may be careful
and follow the chain of command.
Document/ Information Cycle
Each document or information has a life cycle in the sense that its usefulness has a
beginning and an end. It passes the various stages from the time it is created until it is finally
disposed. This cycle consist of the ff.
A. Creation E. Retention/ purging
B. Classification F. Transfer
C. Storage G. Disposition
D. Retrieval
If an organization has no plan for seeing that all records/documents flow smoothly
Through the record, it will faced with more of the following problems which may severely
drain profit; 1. An unmanageable tangle of papers within the office 2. Wasted clerical effort
searching for information. 3. Loss important operating information. 4. Extravagant use of
operating information. 5. Possible loss of key information in defending the company against
legal or governmental inquiries.
Categories of Document
1. Category A
A. Information which contains reportable time sensitive, order of battle, and significant
information
B. It should be given priority because it is critical information
C. It must be forwarded without delay.
D. It is critical to friendly operations
E. It requires immediate soon
2. Category B
A. Anything that contains communications, cryptographic documents, or systems that
should be classified a secret and requires special handling
B. Higher authorities should declassify it.
3. Category C.
A. Other information, which contains something that, could be an intelligence value.
B. Contains exploitable information regardless of its contents
C. Unscreened materials/ documents should be categorized as category c.
4. Category D
A. No value, yet lower level will never classify documents as category D
B. No Decision must be made at the lower echelon that document has no value. It is the
responsibilities of the higher headquarter.
Three (3) Security Concepts
A. Personnel are the weakest link in the security chained
B. Training is important to make security personnel conscious and realize the value of
document
C. Training is necessary for the practices of “need to know” principle
Four (4) types Of Classified Matters
1. Top Secret (green color code)- is any information and materials the unauthorized
disclosure of it would cause exceptionally grave damage to the nation, politically,
economically, and military operation.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
20
2. Secret (red color)- Is any information and materials, the unauthorized disclosure of it
would endanger national security, causes serious to the interest and prestige of the
nation of any government activity, or of great advantage to a foreign country.
3. Confidential (blue Color)- Is any information or material, the unauthorized disclosure of it
would be prejudicial to the interest and prestige of the national or governmental activity
or would cause administrative embarrassment or unwanted injury to and be of
advantage to and be of advantage to a foreign country.
4. Restricted (white or no color)- Is any information and material which requires special
protection other than those determines confidential, secret and top secret.
Protection of Sensitive Information
-Propriety information is information that in some special way relates to the status or activities
of the possessor and over which the possessor assert ownership. In the business community,
propriety information relates to the structure, products or business methods of the
organization. It usually protected in some way against casual or general disclosure.

Types of Documents;
Class 1- Vital Documents- In this category these are records that are irreplaceable records of
which reproduction does not have the same value as the original; records needed to recover
cash, o replace building, equipment’s, raw materials, raw products, and work in process and
records needed to avoid delay in restoration of production, sales and services.
Class II- Important Documents-This includes records reproduction of which will close
considerable expense and labor, or considerable delay.
Class III-Useful Document - this includes records whose loss might cause inconvenience but
could be readily replaced and which would not in the meantime present an insurmountable
obstacle to the prompt restoration of the business.
Class IV- Non-essential Documents- this records are daily files, routine in nature even if lost or
destroyed, will not affect operation or administration. This class represent the bulk of records
which should not be even attempted to be protected in the event of disasters, they should,
however, be kept in ordinary files ready for reference, if needed and usually discarded after
some period of time.

Basic Consideration in Document and Information Security:


1. Security of information is based on the premises that the government has the right and
the duty to protect official papers from unwarranted and indiscriminate disclosure;
2. The authority and responsibility for the preparation and classification of classified
matters rest exclusively with the originating office.
3. Classified matter shall be classified according to their contents and not to the
classification of files in which they are held or another document to which they are
referred
4. Classified shall made as soon as possible by placing appropriate marks on the matter to
be classifieds; and
5. Each individual whose duties allow access to classified matter or each individual who
possess knowledge of classified matter while it is in his position shall insure that
dissemination of such classified matter is in the “need to know” basis and to properly
cleared persons only.

Types of Propriety Information


A. Trade Secret- This consist of any formula, pattern, device, or compilation of information
which is used In one’s business and which gives him an opportunity to gain an
advantage over competitors who do not know or use it. It may be a form of formula for a
chemical compound a process of manufacturing, treating or preserving materials, a
pattern for a machine or device, or a list of customers. It differs from other secret
information as to single or ephemeral events. A trade secret is a process or device for
continuous use in the protection of business.
B. Patents- This is grant made by the government to an inventor, conveying or securing to
him the exclusive right to make, use, or sell his inventions for term of years.
Primary Distinction between Patents and Trade Secrets
A. Requirements for obtaining a Patent are specific; to qualify for a patent the invention
must be more than novel or useful. It must represent a positive distribution beyond the
skill of the average person.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
21
B. A much lower of novelty is required of a trade secret
C. A trade secret remains secret as long as it continuous to meet trade secret test while
the exclusive right to patent protection expires after 7 years.

Propriety Information Protection


Realizing that the most serious threat to trade secret is the employee, a measure of protection
is realized through the use of employee agreements which restrict the employee’s ability to
disclose information without specific authorization to the company. The ff. countermeasures
may be adopted:
A. Policy and procedure statements regarding all sensitive information.
B. Pre and post-employment screening and review
C. Non- disclosure agreements from employees, vendors, contractors visitors
D. Non- competitive agreements with selected employees
E. Awareness program
F. Physical security measures
G. Informed monitoring of routine activities
PART V
SECURITY HAZARDS
Definitions of term
A. Risk- is the potential damage or loss of an asset. The level of risk is a combination of two
factors: the value placed on that asset by its owner and the consequence, impact
adverse effect of the loss or damage to that asset and; the likelihood that a specific
vulnerability will be exploited by a particular threat.
B. Risk Management- Is a process of selecting and implementing security countermeasures
to achieve an acceptable level of risk at an acceptable cost.
C. Risk Analysis- The analysis of risk includes examinations of vulnerability, probability and
criticality of potential threats and include natural and man-made risk
D. Adversary- An individual, group, organization, or government that conducts activities or
has intention and capability to conduct activities detrimental to the individual, private or
government entity
E. Asset- any information, facility, material, information, or activity which has a positive
value to its owner whether it is an individual, private or government entity.
F. Vulnerability- any weaknesses that can by an adversary to gain access to an asset.
G. Countermeasures- an action taken cost or a physical entity used to reduce or eliminate
one or more vulnerabilities. The cost of possible countermeasure may be monetary, but
also include non- monetary cost such as reduced operational efficiency, adverse
publicity unfavorable working conditions and political consequences.
H. Probability- The chance or likelihood that a loss will take place. Indicate by a
mathematical statement concerning the possibility of an event occurring.
I. Criticality- The impact of a loss as measured in financial terms how important it is in
terms of the survival or existence of the organizations.
Risk Management Alternatives and Strategies
A. Risk avoidance- Eliminating or removing the risk totally from the business, government,
or industrial environment for which the risk manager has responsibility.
B. Risk Reduction- Decreasing the risk by minimizing the probability of the potential loss.
The reduction of criminal opportunity is often accomplished by situational crime
prevention strategies to discourage, deter, or deny criminal incidents.
C. Risk Spreading- Spreading the risk through compartmentation or decentralization to
limit the impact critically of the potential loss.
D. Risk Transfer- Moving the financial impact of the potential loss-over o an insurance
company.
E. Risk Self Assumption- Planned assumption and acceptance of the potential risk by
making a deliberate managerial decisions of doing nothing about the threat, or setting
aside resources for use in case of a specific loss incident.
F. Risk- Self Assumption- Planned assumption and acceptance of the potential risk by
making a deliberate managerial decisions of doing nothing about the threat, or setting
side resources for use in case of specific loss incident.

Security Hazards- any act or conditions, which may result in the compromise of information,
loss of life, loss of destruction of property of disruption of the objective of the installation.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
22
Types of Hazards
A. Natural Hazards- These are hazards which arises from natural phenomena. The ff. are
types of natural hazards or disaster:
1. Floods caused by 4. Storms(Typhoons, 6. Extreme
typhoons cyclone, tornado temperature and
2. Earthquakes and hurricane) humidity
3. Fire( not caused by 5. Lighting storm
human action)
B. Human made Hazards- These are hazards which are result of a state of mind, attitude,
weaknesses or character traits of one or more persons. They can be acts of
commission or omission, both overt and covert, which can disrupt operation of a plant or
installation. The ff. are the types of human or manmade hazards.
1. Carelessness- accidents and dissatisfaction
2. Disloyalty- subversion and sabotage
3. Espionage, pilferage and theft
4. Vandalism, etc.
Sabotage as a Security Hazards
Description of a Saboteur
1. He is the most dangerous for whom security will have to deal with while planning and
implementing security measures and techniques
2. He is an ordinary looking as the next guy but in his mind, he has the training in
deception, knowledgeable in incendiaries, explosives, chemistry, bacteriology,
mechanics and psychology.
3. He can work alone or simultaneously in several places.
Possible targets of Saboteur
1. Armed forces Installation
2. Natural Resources- mines, forest, farms, and farms products.
3. Industries- Buildings, power sources, machinery, fuel, etc.
4. Warehouse depots, communications, public utilities, etc.
Countermeasures against Sabotage
1. Use of an efficient, alert and trained guard force
2. Use of physical security aids like barriers, personnel and vehicular control, intrusion
devices, communication systems, and electric aids.
3. Proper screening of personnel
4. Searches on incoming vehicles
5. Safeguarding of classified information
6. Designation of restricted areas
7. Investigation of breaches of security
8. Security education and indoctrination
9. Good housekeeping methods
10. Effective and compatible emergency planning
11. Regular audit
12. Continuing audit background check.

Espionage as a Security Hazard


Description of an Espionage Agent
1. He is very dangerous adversary and his skills in deception and his cunning should
never be under estimated.
2. He is usually a person of extensive training and will be highly effective in gaining the
confidence of people and of extracting information of value to be relayed to his
employer or handler.
3. Even how well trained an espionage agent might be, he is human like the saboteur and
he can be defeated in his own game if proper methods and techniques are undertaken.

Some methods Employed by Espionage Agents


1. Stealing Information from Employees.
2. Stealing information from records or other sources
3. Using various methods of reproducing documents products, equipment’s or working
models.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
23
4. Using “front” as commercial concerns, travel agencies, associations, business groups
and other organizations to obtain confidential information or data.
5. Using various form of threats to obtain information.
6. Using blackmail techniques by exposing intimate and personal details concerning an
individual or organizations.
7. Picking or securing information in social and other gatherings.
8. Penetration and operational tactics.
Countermeasures against Industrial Espionage
1. Careful and complete pre-employment measures designed to control threats of
industrial espionage.
2. Continuing personnel check on employees and particularly personnel on sensitive
positions even already employed
3. Prevention of unauthorized entry to the plant or industrial installation
4. Restricting of movement of personnel in the premises of the plant
5. Controlled disposal of waste papers including carbons in classified works
6. Only properly cleared personnel should handle classified information.

Subversive Activity as a Subversive Hazards (Threats of subversive activity)


1. It can be local or national in nature and their mission is to undermine the authority
weaken the organization, and eventually take over. This can be business or any activity.
2. This can be in the form of rumor mongering, propaganda, undermining morale, and
injecting defeatist attitudes and other approaches.
3. It is an activity not easy to detect.
Counter measures to Subversive Activity
1. The spreading of rumors, written materials, slogans or any devices to confuse the work
population and discredited the government should immediately reported.
2. Labor and other company unions can be infiltrated so that strikes and ‘slowdowns’ can
be called to disrupt the normal operations of a plant or installation.
3. Security force should be alerted for person trying to recruit others in organizing
movements for peace, anti-colonials, anti – trade and anti- imperialism.
4. Employees or outside personnel seeking membership in “paper organizations” should
report his activity to security.
5. Other methods of subversion like untied fronts, mob actions, terrorism and sabotage will
do to gain the subversive ends.
Pilferage as a business Hazards
1. Pilferage is one of the most annoying and common human hazards which security has
to deal with.
2. Become financial drain if not a menace to smooth and orderly operation
3. Failure to detect shortage and inaccurate inventories will cause inventory losses, which
may be leveled as pilferage.
PILFERAGE- is one of the most annoying and common human hazards which security has to
deal with. This activity it uncontrolled can become a financial drain if not a menace to smooth
and orderly operations. Due to this, security force has to concentrate large number men to
check this nefarious and disconnecting activity. Petty pilferage is frequent, hard to detect,
difficult to prove and win conviction but definitely dangerous to ignore.
Types of Pilferer
A. Casual Pilferer- One who steals due to his inability to resist the unexpected opportunity
and has fear of detection is no plan or premeditation and he is usually a “loner” on the
job. The temptation to pick up the article is basically due to poor security security
measure. The implication of causal pilfering is the big cumulative cost if it remains
unchecked.
B. Systematic Pilferer- one who steals with preconceived plans and take away any or all
types of item or supplies for economic gain. Pilferers of this kind can be employees or
outsiders of the establishments.
Anatomy of Pilferage
A. Where need or desire exists and opportunity is present, theft is almost sure to result.
B. Pilferage occurs everywhere. Opportunities for pilferage increase when supplies or
goods are transported or transferred from one place to another.
Factors considered by Pilferers to be successful on his act.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
24
A. Location of items to be pilfered- the systematic pilferer surveys shopping and store
areas, or through contracts from the firms.
B. Access to the items- techniques can be form fake document, bribing of guards,
outsmarting security, creating disturbance and other methods to divert attention while
pilferage goes on.
C. Removal of item- This can be done as wearing the stolen shoes or shorts, concealment
in body or vehicles, use of false document, etc. Drivers may conceal pilfered items in his
vehicles
D. Disposal of items- This is need for “fences” “brokers or ” “clearing house ” for this hot
items.
Countermeasure for Casual Pilferage
A. Spot check on outgoing vehicles and persons
B. An aggressive Security education and indoctrination program with emphasis that “ crime
does not pay”
C. Superiors should set example of integrity and desirable moral climate for employees in
the establishment
D. All employees must be enjoined to report or may loss to security.
E. Inventory and control methods should be done especially to pilferable items.
F. Control of tools equipment and sets.

VIP SECURITY
Protection against any type of crime to safeguard life, assets and operation by the various
methods and devices.
1. VIP- Very Important People( State President, High Ranking Public officials)
2. Escort- One or more persons accompanying another to give guidance or protection or to
pay honor
3. Body Guard- A person or a grouped of persons usually armed and responsible for the
physical safety of one or more specific person.
Organization of VIP Security
1. Area Security- covers all the surrounding areas of engagement. Conduct prophylactic
(Neutralize the area), operations in the area of engagement.
2. Perimeter Security- Secures the immediate areas surrounding the place of engagement.
Usually these are uniformed men
3. Advance Security- this are the advanced security at the place of engagement before the
arrival of the VIP. Sanitize the area.
4. Close- in- Security- Accompanies the VIP where ever he goes. Max. of 4 person
5. Reserve Security- On standby for possible back up/re-enforcement.
6. Route Security- Neutralize the possible route of VIP party.

Prophylactic Operations
1. Patrolling
2. Putting up of check point, block and gates.
Four common elements in all Assassinations
1. Victim 3.Assassin
2. Modus operandi 4. opportunity
Reasons why do they needs Body Guards
As results of the “increased concern about kidnapping threat” there has been an
escalation in the demand for body guards. Thereby, brains is need not brown ( meaning
muscular in power) has been offered as the basis for the body guards selection. The body
guards should fit the image and lifestyle of the individual he is guarding.

Selection Criteria to become a body guard


1. Physical Conditions- excellent physical conditions is essential. Excessive overweight,
high blood pressure, respiratory problem are disqualified. Hearing should be should be
normal, eyesight at or close to 20/20 without glasses and color vision normal.
2. Training- the body guard should be trained in both unarmed and armed defense tactics.
Regular training, session should be encouraged, so that the body guards maintain
proficiency. Also trained in the operation of equipment’s being used. Also trained in
driving and trouble shooting and first aid techniques.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
25
3. Mental Attitude- the body guard should be stable individual, intelligent, should be
mentally alert.
Some protection techniques while moving on foot
1. Individual in the vicinity of the persons being protected should be observed especially
their hands.
2. If a weapon is displayed, the weapon should be attacks so as to be ready to respond
effectively.
3. The body guards should anticipate potential attacks so as to be ready respond
effectively.
4. If a threatening situation begins to develop the individual being protected should
immediately be removed from the danger area.
5. If two body guards are used to attack develop, one body guard should remove the
individual being protected while the other neutralized the threat. The primary objective is
to protect the target person, not apprehend the attacker. Escape is certainly more
important than winning the “skirmish” meaning primary conflict or dispute.
6. If one body guard is utilized he/she will usually walk in front and slightly to the left of the
person being protected.
7. When two body guards are utilized, one will take a positioned in front to the left. While
the second, will take a position to the rear and slightly to the right.
Protection in transit
An individual is particularly vulnerable while moving from one place to another . hence a
regular route and time travel should be established. Frequent changes of direction, travel time
mode of transport, coordinated with in overall protection plan, will make it more difficult for an
abduction to plan of an ambush or to interpret.
Vehicle Security- the vehicle utilized by a potential kidnap victim should not be placed
unattended in a parking area stall with the individual name of it. If possible, when not in used,
the vehicle, the vehicle should be parked in locked garage under guard. All the doors and
windows should be locked whether occupied or not. It should be installed by tamper alarm on
the vehicles and panic or trouble alarms in the parking area.

Kidnappers fall into Four Categories.


1. Neither opportunities nor Novice Criminals- This constrained of poor planning and lack
of true criminal expertise.
2. Religious or politically motivated individuals- This arte the DO or Die who are willing to
sacrifice their lives and or willing to their their victims to publicize a cause.
3. Mentally derange individual- Thy may kidnap or kill for the thrill, from confusion or due to
psychosis.
4. Professional Criminal- They are motivated for kidnapping usually centers on financial
gain, with extensive planning to ensure his or her escape and the ability or spend
illegally obtained funds.

COMMUNICATION SECURITY
1. Communication- the transfer of thought from the mind of one person to the mind of
another thought a common medium or channel. It is the process of sending and
receiving messages to achieve understanding.
2. Channel of communication- refers to the equipment being used to transfer thoughts and
ideas.
3. Conference- the exchange of thoughts or opinions by conversations, or seminar. The
exchange could be oral, written and other forms
4. Medium of communications- refers to the common language known for two or more
individuals who wants to exchange thought or ideas with each other.
5. Medium of communications- refers to the common language known for two or more
individual who wants to exchange thought and ideas with each other Example: English:
is the dominant medium of communication in the world.
Following are the common equipment being used for communication:
1. Hand held radio or walkie talkie- communication on electromagnetic waves transmitted
through the space.
2. Basic types of radio’s:
A. Amatuer Radio- For hobby and emergency purposes; and
B. Commercial Radio- for business purposes.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
26
Requisites For modulation / Voice transmission:
A. Alertness – give the impression that you are alert and wide awake and interested as the
person calling.
B. Pleasantness- build a pleasant office image with voice of smile
C. Naturalness-Use simple language and avoid slang
D. Distinction- Speak clearly and relax to avoid garbled transmission and
E. Expressiveness- normal tone of voice in moderate manner not too fast and not too slow.
Duty Cycle of PTT
As a Rule transmitting message in short duration carries 3 to 5 words at a time
Approaches to adhere the duty cycle:
1. Use the phonetics alphabet and numerical. Ex. Alpha-Zebra
2. Use of military hours
3. Police ten APCO signals
4. Use of moral codes
APCO- Association Public Safety Communication Offer Inc.
PTT- press to talk
5. Telephone- Combination of apparatus of converting speech energy to electrical wave
then transmit the same to a certain point then finally re-convert the electrical energy to
audible sounds.
6. Intercom- Wired system of communication being used with I abuilding or compound for
direct exchange of calls
7. Audio hailer – portable transistorized and battery- operated amplifier that magnify the
voice of the users
8. Computer Facsimile- Modern type of communication equipment’s.

PART VI
SECURITY SURVEY INSPECTION
The basic instrument for determining security vulnerability is the security survey. Most
description of security survey refers principally to checklist, audits or inventories of security
conditions.
Security Survey- Defined as a critical on-site examination and analysis of industrial plants,
business, a home or public or private institution done to ascertain the facility’ current security
status, to identify deficiencies or excess in current practices, to determine what protection is
needed and to make recommendations for improving the overall level of security at that
installation. As previously noted, security survey is a general term that often encompasses
other related procedures.
Objectives of Security Survey
1. To determine existing vulnerabilities to injuries, death, damage, or destruction by natural
cause.
2. To determine existing vulnerabilities of corporates assets due to outside criminal activity
3. To determine existing vulnerabilities t of corporate assets due to criminal activity within
the organizations
4. To determine existing conditions of physical security of corporate property.
5. To Compliance of employees to security.
Planning a security Survey
1. Verify the need
2. Obtain organizational support
3. State the surveys executives
4. Determine how data will be gathered
5. Develop alternatives
6. Prepare a schedule of activities.
Security Inspection
Another important activity, which is necessary to insure the integrity of the overall
security program, is security inspection. This complements security in its attempt to prevent
losses of company property.
Security Inspection is conducted for two reasons: to check on the degree of compliance with
the recommended counter measures and to determine the effectiveness and adequacy of the
countermeasures.
Types of Security Inspection
A. Continuous Inspection

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
27
B. Formal Or Informal
C. Structured Or unstructured Inspection

Emergency and Disaster Management


A. Emergency Planning- is one of the harsh realities that an installation will encounter is
the occurrence of a disaster or emergency. Any of these can be regarded as a potential
events, occurrence or condition outside the scope of normal business activities with
significant potential for death, injury, property, damage, assets, diversion or other
favorable impact upon installation.
B. Emergency - is a sudden, generally unexpected occurrence or set of circumstances
demanding immediate action
C. Disaster Management- is the systematic management of disaster from the initial stage
to its termination using various tools to minimizes lost of lives, damage to property and
enhance rehabilitation
D. Disaster- Is the unscheduled event that causes by emergency. It upsets the
performance of valued activities of the community in two ways: there is a drastic
increase in demand for certain services and there is a reduction in the capability to
perform services.
E. Crisis- Crisis is the turning point of a disasters or emergency, if not contained or
controlled.

PRIVATE SECURITY AGENCY LAW ORGANIZATION AND ADMINISTRATION OF


SECURITY GUARD FORCE

The 2003 revised rules and regulations implementing republic act no. 5487 s amended,
pursuant to section 24,25 and 26 of executive #262, and in consultation with the PADPAO ,
these revised rules and regulations governing the organizations and operation of private
security agencies, company security forces and government security units.
The organization, operation, business and activities of private watchman/security or
detective agencies, security training institutions/systems as well as private security and training
personnel shall be governed by these Rules and Regulations implementing Republic Act 5487,
as amended.
This unit under the Philippine National Police which is charged with the supervision, direction
and control of all security agencies in the Philippines
A. PNP SAGSD- Philippine National Police Security Agency , Guard and Supervision Division
B. PNP SOSIA- Philippine National Police Supervisory Officer for security and investigative
Agencies..
Definitions of term
A. Person – shall include not only natural but also juridical persons such as single
proprietorships, partnerships, corporations, companies or associations, duly organized
and registered with the Securities and Exchange Commission and/or the Department of
Trade and Industry.
B. Private Security Services – shall include the act of providing or rendering services to
watch an establishment whether public or private, building, compound/area or property,
to conduct access control/denial in any form whether physically, manually or scientifically
by electronic monitoring systems, for the purpose of securing such area/property and at
the same time ensuring safety and protection of persons within such areas, to maintain
peace and order within such areas, to conduct private security training, and/or to conduct
investigation. It shall also include the act of contracting, recruiting, training, furnishing or
posting any security guard, to do its functions or solicit individuals, businesses, firms, or
private, public or government-owned or controlled corporations to engage his/its service
or those of his/its security guards, for hire, commission or compensation thru
subscription or as a consultant/trainer to any private or public corporation
C. Private Detective Services – shall include among others the act of providing personal
security protection, inquiry and information gathering, pre-employment verification and
individual background profiling, providing assistance in civil liability and personal injury
cases, insurance claims and fraud, child custody and protection cases, for the purpose of
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
28
assisting in gathering information leading to determination and/or prevention of criminal
acts and/or resolution of legal, financial and personal problems.
D. Private Security Industry – shall cover those in the legitimate business of providing
private security and detective services.
E. Private Security Guard (SG) – sometimes called private security guard or watchman
shall include any person who offers or renders personal service to watch or secure either
a residence, business establishment or both for hire or compensation, and with a license
to exercise profession
F. Private Detective (PD) – shall mean any person who does detective work for hire, reward
or commission, other than members of the Armed Forces of the Philippines, guards of
the Bureau of Jail Management and Penology, municipal or city jail guards, and
members of the Philippine National Police or of any other law enforcement agency of the
government.
G. Private Security Personnel – shall be natural persons which include private security
guards, private detectives, security consultants, security officers and others that may be
classified later, rendering/performing security and/or detective services as employed by
private security agencies and/or private firms
H. Government Security Personnel – shall be natural persons which include government
security guards, detectives, security consultants, security officers and others that may be
classified later, except those of the Armed Forces of the Philippines, Philippine National
Police, Bureau of Jail Management and Penology, Municipal or City Jail guards
rendering/performing security and/or detective services as employed by government
entities
I. Private Security Agency (PSA) – shall mean any person association, partnership, firm or
private corporation, who contracts, recruits, trains, furnishes or posts any security guard,
to perform its functions or solicit individuals, businesses, firms, or private, public or
government-owned or controlled corporations to engage his/its service or those of his/its
security guards, for hire, commission or compensation thru subscription or as a
consultant/trainer to any private or public corporation whose business or transactions
involve national security or interest like the operation and/or management of domestic or
ocean vessels, airplanes, helicopters, seaports, airports heliports, landing strips etc., or
as consultant on any security related matter, or to provide highly specialized security,
detective and investigation services like gangway security, catering security, passenger
profiling, baggage examination, providing security on board vessels or aircraft, or other
security needs that PNP SAGSD may approve.
J. . Private Detective Agency (PDA) – shall mean any person association, partnership, firm
or private corporation, who contracts, recruits, trains, furnishes or posts any private
detective, to perform its functions or solicit individuals, businesses, firms, or private,
public or government-owned or controlled corporations to engage his/its service or those
of his/its detectives, for hire, commission or compensation thru subscription or as a
consultant/trainer to any private or public corporation or as consultant on any detective
related matter, or to provide highly specialized detective and investigation services, or
other detective needs that SAGSD-CSG may approve.
K. License to Exercise Profession – shall mean any document issued by the Chief,
Philippine National Police or his duly authorized representative recognizing a person to
be qualified to perform his duties as private security or training personnel
L. License to Operate (LTO) – is a License Certificate document, issued by the Chief,
Philippine National Police or his duly authorized representative, authorizing a person to
engage in employing security guard or detective, or a juridical person to establish,
engage, direct, manage or operate an individual or a private detective agency or private
security agency/company security force after payment of the prescribed dues or fees as
provided in these Rules and Regulations.
M. Company Guard Force (CGF) – a security force maintained and operated by any private
company/corporation utilizing any of its employees to watch, secure or guard its
business establishment premises, compound or properties.
N. Government Guard Unit (GGU) – a security unit maintained and operated by any
government entity other than military or police, which is established and maintained for
the purpose of securing the office or compound and/or extension of such government
entity.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
29
O. PNP as used herein shall mean the Philippine National Police, which was organized
pursuant to the provision of RA 6975 otherwise known as the National Police Act of
1991. Act as a public security.
P. SAGSD has used herein shall refer to the current PNP Civil Security Group Security
Agency and Guard Supervision Division or any other PNP Office that may be designated
later as the primary office for supervision of the implementation of these rules and
regulations.
Q. PADPAO- refers to the Philippines Association of Detective and Protective Agency
Operators, Inc., which is an association of all licensed security agencies and company
security forces
R. Duty Detail Order- is a written order/schedule issued by a superior officer usually the
private security agency/branch manager or operations officer assigning the performance
of private security/detective services duties.

A. Who may organize and maintain a Private Security Agency and Private Detective Agency
- Any Filipino citizen or corporation, association, partnership, one hundred percent
(100%) of which is owned and controlled by Filipino citizens
C. Basic requirement of an operator or manager of agency
 The operator or manager of an agency including, managers of branch offices, must be:
1. Filipino citizen;
2. Not be less than twenty five (25) years of age
3. College graduate and/or a commissioned officer in the inactive service or retired
from the Armed Forces of the Philippines or the Philippine National police;
4. Has taken a course/seminar on industrial Security Management and/or must have
adequate training or experience in security business; and
5. Good moral character
 New applicants for license to operate shall be required to obtain a minimum capitalization
of one million pesos (P1, 000,000.00) with a minimum bank deposit of five hundred
thousand (P500, 000.00) pesos in order to start its business operation

Main/ branch offices- All agencies shall maintain a main office in their registered addresses.
Branch offices may be established and maintain in other provinces/ cities where the security
agency has deployed security guards.

Prohibition on “KABIT SYSTEM” operators.

1. No licensed security agency shall operate, promote and enter into an agreement of “merger”
(kabit system) with any person or a group of persons for the purpose of organizing a branch
unit or subsidiary under separate control and ownership. Merger of security and detective
agencies shall not be recognized without prior approval from the Securities and Exchange
Commission with respect to their Articles of Incorporation and the Department of Trade and
Industry, with regards their business name.

2. Any of the following circumstances or a combination thereof shall be considered prima-facie


evidence of the existence of “Kabit System.”
a) Maintaining a separate branch, unit or subsidiary office aside from the main office of the
agency situated within the same locality;
b) Receiving direct payments from the agency’s clientele and issuing officials receipt of their
own distinct from that issued by the agency concerned;
c) Remitting directly Social Security System premiums, Medicare contributions and other
premium for other policy insurance benefits by the aforementioned branch, unit or subsidiary
office;
d) Existence of an agreement between the licensee and a branch manager thereof, whereby
the latter obligates himself to pay a certain percentage of his income to the former on the
condition that the control and supervision of the guards posted by said branch shall course on
the manager thereof and that the licensee shall be exempt from liabilities/ obligations attendant
to the operation of said branch.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
30
e) Keeping/maintaining separate payrolls for the branch employees signed and/or approved by
the branch manager only;
f) Absence of record of monthly income remittances to the main office when said branch is
authorized to make collections from the clients of the licensee; and
g) All other similar acts tending to show separate and distinct relationship/ personality/
ownership/ management.

Organizational structure of private security agencies/company security services/


government security units
a. Private security agencies shall conform to the organizational structure, personnel,
equipment, training and clothing as provided for hereinafter.
b. Company security forces shall be organized to conform substantially to the organizational
structure prescribed for private security agencies.
c. Government Guard Unit shall be organized to conform to the organizational structure of the
said government firm but not contrary to the organizational structure as prescribed for
government security units.

On Membership.
a. No regular license shall be granted to any private security agency unless it has a minimum
of two hundred (200) licensed private security personnel under its employ.
b. No regular license shall be granted to any company guard force or private detective agency
unless it has a minimum of thirty (30) licensed private security personnel under its employ.
c. The maximum number of private security personnel that a PSA/CGF/PDA may employ shall
be one thousand (1000).

Application for License to Operate (LTO).


a. The application shall be made in writing by the owner (for single proprietorships) or
authorized person duly designated by the corporation or partnership (through a board
resolution or joint affidavit, respectively) and shall be filed with the Chief of the Philippine
National Police (CPNP) through the PNP Security Agency and Guard Supervision Division,
Civil security Group (SAGSD-CSG). Using license application form PNPSF1, the application
shall contain the full name of the applicant, his age, civil status, his residence and location of
business.
b. Applications of corporations, associations, partnerships shall furthermore include a copy of
the certificate of registration together with its by-laws and articles of incorporation.
c. All applications shall be accompanied by a bond issued by any competent or reputable
surety or fidelity or insurance company duly accredited by the Office of the Insurance
Commissioner, which bond shall answer for any valid and legal claim against the agency by its
clients or employees

License to Operate (LTO). License to Operate (LTO) shall be issued corresponding to


the purpose of the organized Private Security Agency:
a. Private Security/Detective Agency LTO. License certificate issued to persons, corporations,
associations, partnerships whose primary purpose is to provide/offer commercial private
security and/or detective services for hire, commission or compensation.
b. Company Guard Force LTO. License certificate issued to persons, corporations,
associations, partnerships not doing business nor organized purposely or principally as a
private security guard or detective agency who/which is utilizing for its security purpose any of
his/its employees to render private security or detective services.
c. Government Guard Unit Certificate of Registration (CR). License certificate issued to
national or local government or any agency or instrumentality thereof, or of government owned
or controlled corporation not doing business nor organized purposely or principally as a private
security guard or detective agency who/which is utilizing for its purpose any of his/its
employees to render private security or detective services.

Status and Validity of License to Operate. The status of license certificate in Section 7
above shall be issued in conformity with the following:
a. Regular LTO – issued, after complying with licensing requirements, to private security
agencies having obtained and maintained in its employ at least two hundred (200) security
personnel, and to company guard forces and private detective agencies having obtained and

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
31
maintained in its employ at least thirty (30) security personnel and private detectives
respectively. Such license may be renewed following conformity with renewal requirements
prescribed in a Standard Operating Procedure (SOP).
b. Temporary LTO – initial and conditional issuance to new private security agencies and to
PSAs holding regular LTO not able to maintain the minimum number of security personnel or
conform to standards, for them to be able to attain the 200 minimum number of security
personnel or comply with licensing standards, prior to issuance/reissuance of regular LTO.
Such issuance shall not be renewable nor be extendible.
c. Unless sooner cancelled or revoked and provisions hereof modified, all licenses to operate
shall have a validity of two (2) years. Temporary LTOs upon expiration are automatically
cancelled.
d. The expiry date of Regular Licenses to Operate shall be on the last day of the month of the
second year corresponding to the last number before the year series number of the assigned
number/LTO number of the License. (i.e. hereto in bold numbers PSA-00001-02 and PSA
00050-03 representing expiry on January 31, 2004 and October 31, 2005 respectively). For
this purpose the appropriate transition period shall be provided after the effectivity of these
Rules and Regulations.

LTO Processing.
a. All applications for Licenses to Operate filed shall be processed by SAGSDCSG for
approval and subsequent issuance of the appropriate LTO, and/or for disapproval.
b. When all requisites for the issuance of License to Operate have been complied with,
corresponding license certificate shall be issued upon payment by the applicant of applicable
fees and bond, prescribed/to be prescribed following existing administrative laws:
1. National License Fee
2. Security Personnel Registration Fee
3. Annual Internal Revenue tax.
3. Local Government Business tax Bond issued by any competent or reputable surety or
fidelity or insurance company duly accredited by the Insurance Commission in the sum of ten
thousand pesos in the discretion of the CPNP which bond shall answer for any valid and legal
claim against the agency by its clients or employees 4. Applications with lacking requirements
shall not be accepted for processing.
5. All accepted applications for license to operate shall be processed for completeness of
documentary requirements and conformity to standards.

Renewal of License to Operate.


a. Filing of Applications for Renewal and Late Filing. All applications for renewal of License to
operate shall be filed at least sixty (60) days before expiry date of LTO subject of the renewal
application. Applications filed/accepted thereafter shall be penalized for late filing.
b. Failure to Conform to the Standards for Renewal. Renewal applicants/holders of regular
license not able to maintain the 200 minimum number of security personnel under its employ
or license renewal requirements at the time of filing of application, shall be reverted to
temporary status and issued temporary LTO. Within its duration the agency applicant may
comply with the required minimum number of employed security personnel or license renewal
requirements prior to reissuance/renewal of its regular LTO.
c. Failure to file for renewal. The Licenses to Operate of applications for renewal of regular
Licenses to Operate who fail to file applications sixty (60) days after the expiry date of LTO
subject of the renewal application, SHALL AUTOMATICALLY BE CANCELLED.
d. In addition to other renewal requirements under provisions of these rules and regulations, no
application shall be approved unless a certification is issued by FEDCSG to the effect that all
licenses of firearms of the agency concerned are updated/ renewed for at least one (1) year
forthcoming during the validity of the renewed LTO

LICENSE TO EXERCISE PRIVATE SECURITY PROFESSION


A. Who may apply for a License to Exercise Private Security Profession?-
- Any Filipino citizen may apply for License to Exercise Private Security Profession to
engage in the occupation, calling or employment either as a Private Security Guard, Private
Security Officer, Private Detective and/or Private Security Consultant, after complying with
both academic/scholastic and skills/training requirements subject to other requirements
prescribed herein-under provisions

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
32

B. Basic requirements of private security personnel


a. Filipino citizen;
b. Not be less than eighteen (18) years of age;
c. Must have taken a private security course/seminar and/or must have adequate training or
experience in security business or rendering security/detective services;
d. Of good moral character and must not have been convicted of any crime or violation of
these rules and regulations carrying a penalty of prohibition to be licensed; and e. Must be
physically and mentally fit

C. Qualifications a Private Security Guard. No person shall be licensed as security


guard unless he possesses the following qualifications:
a. Filipino citizen;
b. High school graduate;
c. Physically and mentally fit; d. Not less than eighteen (18) years of age nor more than fifty
(50) years of age (for new applicants and SGs in nonsupervisory position); and
e. Has undergone a pre-licensing training course or its equivalent.

D.
D. Qualifications a Private Security Guard. No person shall be licensed as security
guard unless he possesses the following qualifications:
a. Filipino citizen;
b. High school graduate;
c. Physically and mentally fit; d. Not less than eighteen (18) years of age nor more than fifty
(50) years of age (for new applicants and SGs in nonsupervisory position); and
e. Has undergone a pre-licensing training course or its equivalent.
E. Exemptions from Basic Pre-Licensing Training.
a. Veterans and retired military/police personnel or those honorably discharged military/police
personnel possessing all the qualifications mentioned in the preceding Section shall be
exempted from pre-licensing training/seminar and academic/scholastic attainment which is a
requirement for the initial issuance of License to exercise private security profession but shall
not however be exempted from taking the refresher training courses or its equivalent.
b. Likewise, graduates of ROTC advance/CHDF (or its equivalent in the PNP) Training
graduates shall be exempted from the required Basic-licensing Training/Seminar.

 Types of License.
a. Temporary License – initial and conditional issuance while awaiting issuance of regular
license identification cards or in the interim for purposes not covered by Rule V.
b. Regular License – generated Private Security Personnel License Card, duration or validity
of which shall be for two (2) years
 Government Security Personnel – no person shall be licensed as Government Security
Personnel unless he possesses the qualifications as prescribed in Section 3, 4, 5 of this
rule, provided he submits an appointment order coming from the Civil Service Commission.

 Possession of Firearms
Ratio: 1 FA for every 2 (1:2) security guards in its employ.
-No PSA/ CSF/ GSU shall be allowed to possess FA in excess of 500 units.
 Restriction to possess high-powered firearms
A private detective agency/private security agency/ company security services/
government security unit is not allowed to possess high caliber firearms considered as
military-type weapons such as M16, M14, cal .30 carbine, M1 Garand, and other rifles and
special weapons with bores bigger than cal .22, to include pistols and revolvers with bores
bigger than cal .38 such as cal .40, cal .41, cal .44, cal .45, cal .50, except cal .22
centerfire magnum and cal .357 and other pistols with bores smaller than cal .38 but with
firing characteristics of full automatic burst and three-round burst. However, when such
entities are operating in areas where there is an upsurge of lawlessness and criminality as
determined by the Chief, PNP, Police Regional Office Regional Director or their authorized
representative, they may be allowed to acquire, possess and use high-powered firearms
under the following conditions:

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
33
a. The acquisition of the high-powered firearms shall be at the expense of the private
security agency/private detective agency/company security force/government security
unit concerned;
b. The firearms should first be registered with the Firearms and Explosives Division
before issuance and shall not be used or transferred in places other than those
specially authorized by the Director, CSG;
c. The total number of high-powered firearms that an agency or security force/unit is
authorized to possess shall not exceed ten percent (10%) of the total number of
security guards of watchmen in its employ; and
d. The duly licensed security guards or watchmen who will use the firearm shall first be
given adequate training in the care and use thereof and will be under the supervision
of qualified officers and men of the Philippine National Police.

 Disposition of confiscated firearms. Any law enforcement officer authorized by law


effecting the confiscation of firearm under any of the circumstances mentioned in the
preceding section shall inform the Chief, Philippine National Police thru the CSG within
twenty-four (24) hours after such confiscation. The firearm shall be turned over immediately
to the nearest Philippine National Police unit/station which shall be responsible for the
conveyance of same to the FED, CSG, except when charges have been filed against the
suspect, in which case, the firearm shall be turned over to the concerned court.
 Security Guard Forces – Is a group of forces o men selected, trained or grouped into
functional unit the purpose of protecting operational process from disruption which would
impede efficiency or halt operations at a particular plant, facility, installations, or special
activity.
 Types of Security Guard Forces
1. Company Guard Forces
2. Private Security Guard Forces
3. Government Guard Force
 Security Guards Function/ Guarding Procedures
Primary Function is to protect life and property
A. Fixed post C. patrol
B. Reserve D. Administration work
C. General Functions E. investigations and escort
 PERMIT- a document issued by the CPNP or his duly authorized representative
authorizing a person to engage in the occupation calling or employment of watchman,
security guard or private after payment of dues or fees.
 Fire Arms authorized for used by the security guard while on duty
a. Hand gun
b. Shotguns
c. Riots of prescribe calibers
 MISSION ORDER- is a written instruction issued by the agency to its guards to perform
lawful activity at specific time, pace and date. It shall include the make, model and serial
number of the firearm issued to the guard and the name of the operation officer or manager
of the agency.
RANKS, POSITIONS, STAFFING PATTERN AND JOB DESCRIPTION
Ranks and Position - The security agency operator/owner must observe the required major
ranks and positions in the organization of the agency
 Security Management Staff
1. Security Director (SD) – Agency Manager/Chief Security Officer.
2. Security Executive Director (SED) – Assistant Agency Manager /Assistant Chief Security
Officer;
3. Security Staff Director (SSD) – Staff Director for Operation and Staff Director for
Administration.
4. Security Staff Director for Training – Staff in-Charge for Training
 Line Leadership Staff
1. Security Supervisor 3 – Detachment Commanders
2. Security Supervisor 2 – Chief Inspector
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
34
3. Security Supervisor 1 – Inspector
 c. Security Guard
1. Security Guard 1 – Watchman/guard
2. Security Guard 2 – Shift in-charge
3. Security Guard 3 – Post in-charge d. Security Consultant – (optional)
PROFESSIONAL CONDUCT AND ETHICS
Security Guard Creed, Code of Ethics, and Code of Conduct. All members of the private
security agency and private detective agency/company security force/government security unit
duly licensed in accordance with RA 5487, as amended, and its implementing rules and
regulations shall strictly observe the following:

A. SECURITY GUARDS CREED


As a security guard my fundamental duty is to protect lives and property and maintain order
within my place of duty; protect the interest of my employer and our clients and the security
and stability of our government and country without compromise and prejudice, honest in
my action, words and thought; and do my best to uphold the principle: MAKADIOS,
MAKABAYAN, MAKATAO at MAKAKALIKASAN.

B. ETHICAL STANDARD
A. As a security guard/detective his fundamental duty is to serve the interest or mission of
his agency in compliance with the contract entered into with clients or customers of the
agency he is supposed to serve;
B. He shall be honest in thoughts and deeds both in his personal and official actuations,
obeying the laws of the land and the regulations prescribed by his agency and those
established by the company he is supposed to protect;
C. He shall not reveal any confidential information confided to him as a security guard and
such other matters imposed upon him by law;
D. He shall act at all times with decorum and shall not permit personal feelings, prejudices
and undue friendship to influence his actuation while in the performance of his official
functions;
E. He shall not compromise with criminals and other lawless elements to the prejudice of
the customers or clients and shall assist the government in its relentless drive against
lawlessness and other forms of criminality;
F. He shall carry out his assigned duties as required by law to the best of his ability and
shall safeguard the life and property of the establishment he is assigned to;
G. He shall wear his uniform, badge, patches and insignia properly as a symbol of public
trust and confidence, as an honest and trustworthy security guard and private
detectives;
H. He shall keep his allegiance first to the government, then to the agency where he is
employed and to the establishment he is assigned to serve with loyalty and utmost
dedication;
I. He shall diligently and progressively familiarize himself with the rules and regulations
laid down by his agency and those of the customers or clients;
J. He shall at all times be courteous, respectful and salute his superior officers,
government officials and officials of the establishment where he is assigned or the
company he is supposed to serve;
K. He shall report for duty always in proper uniform and neat in his appearance;
L. He shall learn at heart and strictly observe the laws and regulations governing the use
of firearms.

C. CODE OF CONDUCT
a. He shall carry with him at all times during his tour of duty his license, identification card
and duty detail order with an authority to carry firearm;
b. He shall not use his license and other privileges if any, to the prejudice of the public,
the client or customer and his agency;
c. He shall not engage in any unnecessary conversation with anybody except in the
discharge of his duties or sit down unless required by the nature of his work and shall at
all times keep himself alert during his tour of duty;

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
35
d. He shall refrain from reading newspapers, magazines, books, etc, while actually
performing his duties;
e. He shall not drink any intoxicating liquor immediately before and during his tour of duty;
f. He shall know the location of the alarm box near his post and sound the alarm in case
of fire or disorder.
g. He shall know how to operate any fire extinguisher at his post; h. He shall know the
location of the telephone and/or telephone number of the police precincts as well as the
telephone numbers of the fire stations in the locality;
h. He shall immediately notify the police in case of any sign of disorder, strike, riot or any
serious violation of the law;
i. He or his group of guards, shall not participate or integrate any disorder, strike, riot, or
any serious violations of the law;
j. He shall assist the police in the preservation and maintenance of peace and order and
in the protection of life and property having in mind that the nature of his responsibilities
is similar to that of the latter.
k. He shall familiarize himself by heart with the Private Security Agency Law (RA 5487, as
amended) and these implementing rules and regulations;
l. When issued a FA she should not lend his FA s to anybody.
m. He shall always be in proper uniform and shall always carry with him his basic
requirements, and equipment’s such as writing notebook, ballpen, night stick (baton)
and/or radio. o. He shall endeavor at all times, to merit and be worthy of the trust and
confidence of the agency he represents and the client he serves.
 Sanction. – Any private security agency operator or guard who violates the creeds, ethical
standards and codes as set forth in the preceding sections, shall be subject to the penalties
provided in these implementing rules and regulations
PRIVATE SECURITY TRAINING
Private Security Training. It shall refer to training and academic programs and courses duly
approved or prescribed by the Philippine National Police and adopted by the Technical
Education and Skills Development Authority. It includes the prelicensing requirements of
individual security guards and other security personnel approved by RA 5487, the periodic and
non-periodic in-service skill refreshers for such security personnel, and other specialized,
individual or group, private security personnel skills development
Private Security Training Services. These shall refer to the conduct of Private Security
Training, provision of the physical facilities and installation necessary in the conduct thereof,
and the provision of the appropriate management, administrative, and instructor/training staffs
therefore, the actual performance and/or exercise of which requires the appropriate permit
and/or authority as herein provided.
Private Security Training Institutions. These shall refer to all persons, natural and/or
juridical, who/that provide and/or conduct private security training, and/or services.
 Categories of Private Security Training. The following are the general categories of
Private Security Training:
a. Pre-Licensing Training Programs. As a matter of licensing prerequisite, Pre-Licensing
Training Programs include all training and/or academic programs and courses whose
objective is to indoctrinate the individual with the basic skills and educational backgrounds
necessary in the effective exercise and performance of his/her elected/ would-be
security/detective profession. It includes but is not limited to the Basic Security Guard
Course, the Security Officers Training Course, Private Security Agency Operators
Training/Seminar, Private Security Training Trainers’ Course.
b. Refresher Training Programs. This shall refer to periodic and non-periodic training
programs and courses designed with the objective of reinvigorating and/or developing basic
skills and knowledge gained previously or gained while in the exercise of his/her profession as
a matter of experience, to enhance current in-service and future individual and/or collective
exercise of profession. This includes mandated periodic inservice training to be initiated by
employer-security agencies which is further a prerequisite for the renewal of individual
professional security licenses. It includes but is not limited to the periodic Re- Training Course,
Basic Security Supervisory Course, and Security Supervisor Development Course.
c. Specialized Training Programs. This shall refer to training program and courses other than
those described in the preceding categories designed at developing previously-gained skills
and knowledge, designed at augmenting or expanding current skills and knowledge, and/or
designed at developing current skills and knowledge to suit identified future applications. It
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
36
includes but is not limited to such courses as the Intelligence/Investigator Training Course,
Basic Crises Management Course, Personal/VIP Security Training Course, Armoured Car
Crew Training Course, Bomb Disposal Training Course, Bank Security Training Course, and
Basic Aviation Security Specialist Course.

 Categories of Private Security Training Institutions.


A.)Private Security Training Systems. Government or duly registered private training
establishments, associations, firms, partnerships, corporations and the like, which provide
the physical facilities and installations, and the appropriate management, administrative,
and instruction/training staff necessary and for the purpose of conducting Private Security
Training:
1) Private Security Training Centers – Private Security Training Systems whose primary
purpose is to provide private security training and training services, may be qualified to
offer and conduct Private Security Training Programs in all categories provided that, it has
secured Regular Accreditation from the SAGSD upon compliance and conformity with the
latter’s application and approval requirements, and prior TESDA registration/accreditation.
2) Other Juridical Entities - Private Security Training Systems whose primary purpose is not
to provide private security training and training services, may be qualified, on interim basis,
to offer and conduct Private Security Training for a specific course/class and duration under
Refresher and Specialized programs only, provided that, it has secured prior Interim
Accreditation from the SAGSD upon compliance and conformity the latter’s application and
approval requirements. Such Interim Accreditation is also issued to those with Regular
Accreditation but which cannot comply with the renewal requirements.
3) Watchman/Security and/or Detective Agencies defined under RA 5487 as amended,
which shall not be required prior accreditation to operate, by virtue of their License to
Operate as Private Security Agency, Company Security Force or Government Security
Force, may be authorized to conduct only in-house refresher or specialized training for its
own security personnel, upon compliance and conformity with application and approval
requirements of SAGSD.
4) Police Offices/Units assigned/designated to conduct Private Security Training, which
shall not be required TESDA registration but shall require prior official authority of SAGSD,
may conduct training in all categories but subject to requirements of Rule XI of these rules
and regulations or as may be prescribed by SAGSD.
5) Police Supervisory Office (presently the SAGSD) as having the primary responsibility of
the conduct, supervision, and control of all private security training and training services.

B. ) Training Instructor. Any person who renders personal and/or professional trainor,
instructor, and/or teacher services relative to private security training by virtue of his
profession, expertise, knowledge, and/or experience in a particular field of knowledge.
Training Instructor includes but is not limited to currently or retired licensed or accredited
private security training instructors, professional educators, and/or field/practicing experts.

CHARGES AND FEES


A. Consistent with laws existing during this formulation, the Chief of Philippine National Police
or his authorized representative shall impose the following fees and charges relative to private
security training:
1) Pre-Licensing Training Programs Basic Scty Guard Training Course P 200.00/participant
A. Security Officer Training Course P 300.00/participant
B.Private Scty Trng Trainor’s Course P 300.00/participant
C. Private Detective Training P 300.00/participant
2) Refresher Training Programs
A.SG In-Service Training P 100.00/participant
B. Other refresher/re-training courses P 50.00/participant
3) Specialized Training Courses (all) P 100.00/participant
b. The same schedule of fees will also be charged from individual walk-in applicants
who will avail of the private security training programs.
c. Serialized certificates of completion/participation shall be given to each participant
which issuance shall be managed by SAGSD.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
37
d. The following shall be collected as permit fees from among the Private Security
Training Institutions which are conducting Private Security Training, for every Letter of
Authority / Training Directive for:
1.Pre-licensing Training P 100.00
2. Refresher Training P 100.00
3.Any Specialized Training P 100.00.
e. The following shall be collected as accreditation fees from among the approved
applicants for:
1. Accreditation of Training Systems P 2,500.00/yr
2. Accreditation of Training Personnel
3.Training Consultant P 150.00/yr Training Officer P 150.00/yr
4.Training Instructor P 150.00/yr .
f. The fees collected shall accrue to the PNP in accordance with the provisions of Rule
VI hereof Rules and Regulations.

UTILIZATION OF PRIVATE SECURITY AGENCIES AND PERSONNEL


A. Powers of city municipal mayors in case of emergency - In case of emergency or in
times of disaster or calamity when the services of any security agency/entity and its
personnel are needed, the city or municipal mayor may muster or incorporate the
members of the agency or agencies nearest the area of such disaster or calamity to
help in the maintenance of peace and order, prevention of crime, or apprehension of
violators of laws or ordinance, and in the protection of lives and properties. The
deputized security guard shall receive direct orders from the Chief of Police of the city or
municipality for the duration of the emergency, disaster or calamity.
B. Supervision of the PNP-The PNP shall exercise general supervision over the operators
of all security agencies and guards. In case of emergency or in times of disaster or
calamities, the Chief, PNP may deputize any security guard to assist the PNP in the
performance of police duties for the duration of such emergency, disaster or calamity.
Licensed guards, who are actually assigned to clients with Duty Detail Orders (DDO),
shall be deputized by the Chief, PNP, and clothed with authority to enforce laws, rules
and regulations within his area of responsibility.
C. Security Guard Post Service-Private security guards shall perform personal service to
watch or secure private or public establishments or property, maintain peace and order
and protect lives of persons through any form of access control/denial, sentry operation,
patrolling, establishing reaction teams and the like provided that: a. No Private Security
Guard performing post service shall act or serve as bodyguard or personal security
escort of any person; b. The private security guard shall always be in the uniform
prescribed for guards on post, especially when bearing firearms; c. The services
rendered are confined to the premises and/or property being secured; d. Private
Security Guards performing as security aides, or back-up/support of guards performing
Post Service, or performing electronic monitor/security system operation shall not bear
firearms and may not be required to use the prescribed uniforms of guards on post.
D. Security Guard Conduction Service-Private security guards shall perform personal
service to watch or secure movable private or public property in transit like but not
limited to seafaring/ocean vessels, aircrafts, land-locked vehicles, or valuables/cash in
transit using any means of transportation except armored vehicles, provided that: a. No
Private Security Guard performing conduction service shall act or serve as bodyguard
or personal security escort of any person; b. The private security guard must always be
in uniform prescribed for guards on post service, especially when bearing firearms.
E. Armored Vehicle/Guard Service. Private security guards shall perform security escort
service for the protection of large amount of cash or valuables through the operation of
armored vehicles, usually for deposit pick-up or delivery, provided that:
a. No Private Security Guard performing armored service shall act or serve as
bodyguard or personal security escort of any person;
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
38
b. The private security guard must always be in uniform prescribed for guards on
armored service, especially when bearing firearms;
c. Over and above the registration required of vehicles and operation of such
under existing transportation laws, all armored vehicles in the fleet of PSA/CGF
armored service providers shall be inventoried/reported with the PNP;
d. All security personnel performing armored vehicle operation shall have a
specified training and qualification requirement over and above the basic requirements
for security guards;
e. Unless inconsistent with other laws or circulars, the minimum built requirement
for armored vehicles shall be of bullet-resistant materials capable of withstanding the
effects of high-powered firearms, provided with a vault, safe or partition wall with
combination lock designed in such a way that access to valuables/cash deposit into it is
denied while in transit;
f. The minimum crew shall be composed of a vehicle operator preferably licensed
security guard and two (2) security personnel; 45
g. Private Security Armored Services providers to the banking and other financial
system shall conform with the requirements of the Banko Sentral ng Pilipinas (BSP); h.
The standards, requirements, organization, operation and training for private security
armored services shall be provided in an SOP issued by the Director, CSG.
F. Investigation and Detective Services- Inherent to the provision of security services, all
PSAs, CGFs, GGUs, and PDAs may offer private investigative and detective services
for the purpose of assisting in gathering information leading to determination and/or
prevention of criminal acts and/or resolution of legal, financial and personal
cases/problems, provided that:
a. Only licensed private detectives shall perform or render investigative and
detective duties;
b. No PSA, CGF or, GGU shall provide or offer personal security protection
service;
c. Only PDAs and licensed private detectives as qualified and trained, and
explicitly/specifically authorized by the PNP may render personal security protection
services;
d. The standards, requirements, organization, operation and training for personal
security protection services shall be provided in an SOP/circular issued by the CPNP
through the recommendation of the Director, CSG in coordination with the PNP
Directorate for Operations, Directorate for Intelligence and Police Security and
Protection Office.

G. Electronic Security Systems and Services. Security Agencies in providing security services
may utilize scientifically designed electronic security systems like but not limited to the anti-
burglary, robbery, or intrusion alarms, closed circuit television recording and monitoring under
the following conditions:

a. Only trained licensed private security guards may operate electronic security
systems; b. PSAs offering the system shall be accountable for the legitimate registration
and licensing of these devices and their operators with the appropriate government
agency

POWER AND DUTIES OF SECURITY GUARD

A. Territorial power - A security guard shall watch and secure the property of the person,
firm, or establishment with whom he or his agency has a contract for security services.
Such service shall not, however, extend beyond the property or compound of said
person, firm or establishment except when required by the latter in accordance with the
terms of their contract to escort, or in hot pursuit of criminal offenders.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
39
B. Arrest by security guard- A security guard, or private detective is not a police officer
and is not, therefore, clothed with police authority. However, he may effect arrest under
any of the following circumstances:
a. When, in his presence, the person to be arrested has committed, is actually
committing, or is attempting to commit an offence;
b. When an offense has just been committed and he has probable cause to
believe based on personal knowledge of facts and circumstances that the person to be
arrested has committed it; and
c. When the person to be arrested is a prisoner who has escaped from a penal
establishment or place where he is serving final judgment or temporarily confined while
his case is pending or has escaped while being transferred from one confinement to
another (Section 6, Rule 113, Rule of Court).
C. Method of Arrest. - When making an arrest, the watchman, security guard or private
detective shall inform the person to be arrested of the intention to arrest him and cause of
the arrest, unless the person to be arrested is then engaged in the commission of an
offense or after an escape, or flees, or forcibly resists before the person making the arrest
has opportunity so to inform him, or when the giving of such information will imperil the
arrest. (Section 10,lbid).
D. Duty of security guard making arrest. -Any security guard making arrest, shall
immediately turn over the person arrested to the nearest peace officer, police outpost or
headquarters for custody and/or appropriate action, or he may without necessary delay
and within the time prescribed in Article 125 of the Revised Penal Code, as amended, take
the person arrested, to the proper Court of Law or judge for such action as they may deem
proper to take. (Section 17, bid)
E. Search without warrant. - Any security guard may, incident to the arrest, search the
person so arrested in the presence of at least two (2) witnesses. He may also search
employees of the person firm or establishment with which he is or his agency has a
contract of private detective, watchman or security services, when such search is required
by the very nature of the business of the person, firm or establishment.
F. General Orders-All security guards shall memorize and strictly keep by heart the following
general orders:
a. To take charge of the post and all company properties in view and protect/ preserve
the same with utmost diligence;
b. To walk in an alert manner during my tour of duty and observing everything that takes
place within sight or hearing;
c. To report all violations of regulations and orders I am instructed to enforce;
d.To relay all calls from posts more distant from the security house where I am
stationed;
e. To quit my post only when properly relieved;
f. To receive, obey and pass on to the relieving guard all orders from company officers
or officials, supervisors, post in charge or shift leaders;
g. To talk to one except in line of duty;
h. To sound or call the alarm in case of fire or disorder; i. To call the superior officer in
any case not covered by instructions;
j. To salute all company officials, superiors in the agency, ranking public officials and
officers of Philippine National Police; and
k. To be especially watchful at night and during the time of challenging, to challenge all
persons on or near my post and to allow no one to pass or loiter without proper
authority.

G. Duty to Assist Law Enforcers - Any security guard shall be duty bound to assist any
peace officer in the pursuit of his bounding duty, when requested, provided it is within
the territorial jurisdiction of his (security officer) area of duty

AWARDS AND DECORATIONS OF SECURITY PERSONNEL

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
40
Types/awards - All security guards are entitled to the following awards for their outstanding
feat/ accomplishment /achievement during the performance of their duties and/or while serving
in the exercise of profession
A. Medalya ng Kagitingan (Blueguards Medal of Valor).
B. Medalya ng Katapatan sa Paglilingkod (Blueguard Distinguished Service Medal).
C. Medalya ng Katapangan (Blueguards Bravery Medal).
D. Medalya ng Pambihirang Paglilingkod (Blueguards Special Service Medal
E. Medalya ng Kadakilaan (Blueguards Heroism Medal).
F. Medalya ng Katangitanging Asal (Blueguards Special Action Medal).
G. Medalya ng Kasanayan (Blueguards Efficiency Medal).
H. Medalya ng Papuri (Blueguards Commendation Medal).
I. Medalya ng Sugatang Magiting (Blueguards Wounded Medal).
J. Medalya sa Pagtulong sa Nasalanta (Blueguards Disaster Relief and Rehabilitation
Medal). k
K. Letter of Commendation.
Description of action required of the above-mentioned awards:
A. Medalya ng Kagitingan (Blueguards Medal of Valor)-can be awarded to any Blueguards
whose performance and action falls under para. 1 and/or 2 below:
(1) Action of the Blueguard involving conspicuous gallantry and intrepidity
ignoring the risk of life and limb above and beyond the call of duty. In order to justify this
award, a Blueguard must perform conspicuously in deed and in action personal bravery
and self-sacrifice above and beyond the call of duty as to distinguish himself clearly
from his comrades in performing hazardous service.
(2) Blueguards who participated in rescue in any fire incident, disaster, calamity
or earthquake whose actions involve actual rescue operation, characterized by gallantry
and intrepidity at the risk of life and limb above and beyond the call of duty. In order to
justify this award, a Blueguard must have saved or attempted to save lives and
properties characterized by personal bravery, courage, heroism or self-sacrifice above
and beyond the call of duty as to distinguished himself above his comrades in the
performance of more than ordinary hazardous service.
B. Medalya ng Katapatan sa Paglilingkod (Blueguards Distinguished Service Medal) can
be awarded to any member of the Blueguards whose action and performance either fall under
para. a or b below:
(1) It can be awarded to any Blueguard who has rendered eminently meritorious
and invaluable service in the position of major responsibility. The performance of duty
must be exceptional. A superior performance of duty normal and relative to assignment,
position and experience of an individual is not an adequate basis for the award.
(2) The accomplishment of the duty, which has to be exceptional or significant
should have been completed prior to submission of the recommendation.
C. Medalya ng Katapangan (Blueguards Bravery Medal). It can be awarded to any
Blueguard member with the following requirements;
(1) For gallantry of the Blueguards action not warranting the Medalya Ng
Kagitingan nor Medalya ng Katapatan sa Paglilingkod.
(2) For Blue guard members who participated on rescue operations in a fire
incident, car accident, earthquake, flood, typhoon and other disasters/calamities and
whose acts of heroism has put his life in extreme danger in his desire to save the lives
of others.
D. Medalya ng Pambihirang Paglilingkod (Blueguards Special Service Medal). The
President of the Philippine Association of Detective and Protective Agency Operators, Inc.
(PADPAO) in Consonance with the Resolutions of the Board of Director, can award the medal
to any member of the civilian government such as parliamentarians, statement, diplomats,
journalists, scientists and any member of the Philippine National Police holding them and
respectable position and whose contribution and accomplishments greatly enhanced the
development and professionalism of the Civil Security Industry. The four (4) degrees of the
Medalya ng Pambihirang Paglilingkod with the corresponding requirements are the following:
(1) Degree of Raja - It can be awarded to any member of the legislative and the
judiciary to include jurists, parliamentarians, statesmen, diplomats, journalists, scientists
and the Director General of the Philippine National Police who has rendered eminently
meritorious and invaluable service in undertaking a major responsibility leading to the
development and professionalization of the Civil Security Industry. A superior
|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
41
performance of normal duties based on one’s position will not be made a justification to
the award.
(2) Degree of Datu - It can be awarded to any of the Regional Directors and/or
any of the Directors of the National Supporting Unit or Command of the Philippine
National Police who has rendered eminently meritorious and invaluable service leading
to the development of the Civil Security Industry and contributed professional
assistance while in a position of major responsibility which has a lesser degree of
category and not warranting the award of the degree of Raja.
(3) Degree of Lakan - It can be awarded to any officer of the Philippine National
Police and the Armed Forces of the Philippines who has distinguished himself thru
exceptional meritorious conduct in the performance of outstanding service in the
development of the Civil Security Industry.
(4) Degree of Maginoo - It can be awarded to any member of the PNP, Armed
Forces of the Philippines and other government law enforcement agencies who has
distinguished himself thru exceptional meritorious conduct and outstanding service that
contributed in the making, developing and professionalizing the Civil Security Industry
but in a 67 lesser degree of category not warranting the award of the degree of Lakan.
For meritorious service of the greater value, the Blueguards Efficiency Medal is usually
awarded

E. Medalya ng Kadakilaan (Blueguards Heroism Medal)- It can be awarded to any


Blueguard member whose action and performance fall under para. 1 and 2 below:
(1) An act of heroism that involves actual conflict with criminal elements either in
actual duty or beyond the relief of posted duty.
(2) An act of heroism shown or performed in rescue operations, saving the lives
and properties of any person or persons who are victims of criminal elements and
natural calamities or fortuitous events such as fire, earthquake, flood, typhoon and other
disasters.

F. Medalya ng Katangiang Asal (Blueguards Special Action Medal). It can be awarded to


any Blueguard member in any of the categories with corresponding requirements as follows:
(1) Raja - for heroic act performed by Blueguard member in actual conflict with criminal
elements during a crime incident or to save the lives and limbs of any person or persons
in case of a fire incident which would conspicuously distinguish himself thru gallantry
and intrepidity notwithstanding the risk of life which is above and beyond the call of duty.
Such deed of bravery and self-sacrifice must be clearly visible so as to distinguish
himself from other Blueguard members.
(2) Datu - for conspicuous acts of courage and gallantry confronting armed enemy in a
crime situation or life saving and fire fighting in a fire situation not warranting the
Medalya ng Katangitanging Asal degree of Raja. He must perform a notable act of
heroism involving risk of l ife as to set him apart from other members.
(3) Lakan - For gallantry in action in a crime of fire situation not warranting the Medalya
ng Katangitanging Asal degree of Raja or Datu. It can be awarded to recognize a
meritorious service accomplished with distinction by any person or persons either in a
duty responsibility or in direct support to PNP Station.
(4) Maginoo - For gallantry in action not warranting the Medalya ng Katangitanging Asal
degree of Raja, Datu or Lakan.
G. Medalya ng Kasanayan (Blueguards Efficiency Medal)- It can be awarded to any member
of the blueguards for meritorious and invaluable service rendered. The performance of duty
must be in such a way as to merit recognition by an exceptional service. The superior
performance of the normal duties as called for by the position is not alone justification of the
award.
H. Medalya ng Papuri (Blueguards Commenda-tion Medal)-It can be awarded to any member
of the Blueguards who has demonstrated exemplary efficiency, devotion and loyalty to his duty
assignments.
I. Medalya ng Sugatang Magiting (Blueguards Wounded Medal). It can be awarded to any
member of the Blueguards in the actual performance of duties. It requires that said member
must have been wounded in action in his fight against criminal elements or from a direct
assault of the enemy, or wounds caused by fire in a fire fighting activity. Provided, however,
that such wounds would necessitate treatments by a medical officer. For this purpose, a

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!
42
“wound” is hereby defined as an injury to any part of the body sustained due to a hostile act of
an enemy on in quelling a fire. J. Medalya sa Pagtulong sa Nasalanta (Blueguards Disaster
Relief and Rehabilitation Medal)- It can be awarded to any member of the Blueguards with the
requirement that there should be an active participation of such member in an undertaking that
involves rescue/ relief and rehabilitation operations in relation to disasters of fortuitous events
such as typhoons, flood, earthquakes, conflagration and other calamities. k. Letter of
Commendation - any good activity done by any security guard officer.
Authorities to Grant Award -The following are authorized to approve/issue awards:
a. Medalya ng Kagitingan - Secretary of the Interior and Local Government.
b. Medalya ng Katapatan sa Paglingkod - Chief, Philippine National Police.
c. Medalya ng Katapangan - Chief, Philippine National Police.
d. Medalya ng Pambihirang Paglilingkod - Regional Director, PNP Police Regional
Office/Director, Civil Security Force Office.
e. Medalya ng Kadakilaan - Regional Director, PNP Police Regional Office/ Director,
Civil Security Group.
f. Medalya ng Katangi-tanging Asal - Regional Director, PNP Police Regional
Office/Director, Civil Security Group.
g. Medalya ng Kasanayan - Regional Director, PNP Police Regional Office/ Director,
Civil Security Group.
h. Medalya ng Papuri - Provincial Director, PNP Provincial Office/Chief, SAGSD/ CSG
Regional Office Directors.
i. Medalya Sa Pagtulong sa Nasalanta - Provincial Director, PNP Provincial Office/Chief,
SAGSD/ CSG Regional Office Directors
. j. Letter of Commendation - PSAs/ CGFs Operators/ Managers concerned. SEC
Wearing of Medals - All security guard who are recipients of awards shall wear them as part
of their uniform and miniature thereof, and shall be worn of the above left pocket of the
uniform.

Special Award - A Private Security Agency/Company Security Services/ Government Security


Unit selected as Outstanding Agency the SAGSD, CSG or by the NHQ, PNP shall be
authorized to wear the Chief, PNP agency citation badge. Such badge shall be worn also as
part of the uniform in a miniature type of the security personnel.

The categories for recognition of the Most Outstanding Blueguards, Private Security
Agency and Company Guard Forces of the Year are the following
A. Male Blueguard of the Year.
B. Female Blueguard of the Year.
C. Private Security Agency of the Year.
D. Company Guard Force of the Year.

The categories for recognition of the Most Outstanding Blueguards Training School are
the following:
A. Pre-Licensing Trainee Graduates
B. Blueguards Trainee Graduates
C. Outstanding Blue guards Training School.

Determination of Awards - Awards shall be determined by a committee created for the


purpose to be designated by D, CSG in coordination with PADPAO. Prospective awardees
shall be duly recommended by the PSA/CGF concerned.

|chats File| Remember that the greatest glory in life is rising when you fall. Be Strong and have Faith!

You might also like