Industrial Security Management

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 96

INDUSTRIAL SECURITY

MANAGEMENT

DR. JOSE A. DELA PENA


Industrial Security Management

• Introduction to Industrial Security


• Physical Security
• Personnel Security
• Documentation and Information Security
• Risk Analysis and Security Hazard
• Security Survey, Inspection and Investigation
• RA 5487
Introduction to Industrial
Security
• Security, in its semantic and philosophical sense,
implies a stable, relatively predictable
environment in which an individual or group may
purpose its ends without disruption or harm, and
without fear of such disturbance or injury. The
concept of security in an organizational sense,
as a means by which this safety and stability can
be achieved, has evolved gradually throughout
the history of Western civilization, shaped by
wide variety of institutional and cultural
patterns.
• In examining the origins and development of
security, it is both obvious and instructive to
observe that security holds a mirror up, not to
nature, but to society and its institutions. Thus,
the practice of utilizing workers and equipment
to protect people and property is age- old. In
addition to being concerned about their own
safely, people have wanted, to protect their
belongings and the lives of others important to
them. The types of security measures that
people have taken over the ages appear to
reflect both the resources that were available
and the nature of the dangers that were present
during each period.
LEGAL BASES OF INDUSTRIAL
SECURITY IN THE PHILIPPINES
• Natural Authority.
• Constitutional Authority
• Statutory Authority
TYPES OF SECURITY

• Physical Security
• Part of security concerned with the
physical measures designed to safeguard
personnel to prevent unauthorized access
to equipment, facilities, materials,
documents, and to protect them from
espionage, sabotage, damage or theft
• Industrial Security
• A form of physical security involving
industrial plants and business enterprises.
This involves the safeguarding of
personnel, processes, properties and
operation.
• V.I.P Security
• Involves the protection of top-ranking
officials of the government, visiting
persons of illustrious standing and foreign
dignitaries
• Document Security
• Protection of documents, classified papers
and vital records from loss, access to
unauthorized persons, damage, theft and
compromise through proper storage and
procedures.

Three Line of Physical
Defense
• First line of Defense
• Example:
• Like perimeter fences/ barriers or guard at the gate
• Second line of Defense
• Example :
• Like the doors, floors, windows, walls, roofs, and grills
and other entries to a building.
• Third line of Defense
• Example:
• The storage system like steel cabinets, lacks, safes,
vaults and interior file rooms.
PHYSICAL SECURITY
• Physical measures are used to define, protect,
and monitor properly rights and objects; they
consist of barriers and devices that are able to
detect, impede, and deter potential security
threats. Physical security measures also help to
combat the crime-related threats that both
employees and outsiders pose to the
organization (for example, robbery, burglary,
arson, assault, rape, theft of services, and
automobile theft and vandalism).
Principles of Physical
Security
• The type of access necessary will defend upon
a number of variable factors & therefore may
be achieve in a number of ways.
• There is no impenetrable barrier.
• Defense is depth- barriers after barrier.
• Delay provided against surreptitious and non-
surreptitious entry.
• Each installation is different.
• Define Barrier
Any structure or physical device capable of
restricting, deterring delaying illegal
access to an installation.
Types of Perimeter Barriers
• .SOLID FENCE- deny visual access
• Wire Fences- permits visual access
Wire fencing can be barbed wire, chain
link or concertina. Chain link are for
permanent structure, barbed wire is for
semi-permanent, and concertina for the
least permanent, and also can be used as
a temporary road block or impediment
during strikes and crowd control.
Specification regulating the
use of Chain- link fences:
• Must be constructed of 7 foot material
excluding the top guard.
• Must be of 9 gauge or heavier.
• Mesh opening are not be larger than 2
inches per aide.
Specification regarding the
use of Barbed Wire fences
• 1. Standard barbed wire is twisted double
strand, 12 gauge wire, with 4
point barb spaced an equal distant part.
• 2. Barbed wire fencing should not be less
than 7 feet high, excluding the top
guard.
• 3. Barbed wire fencing must be firmly
affixed to post not more than 6 feet
Specification regarding the
use of Concertina Wire
fences:
• 1. Standard concertina barbed is a
commercial manufactured wire coil of
high- strength- steel barbed wire clipped
together at intervals to form a cylinder.
• 2. Opened concertina wire is 5 feet long
and 3 feet in high.
Types of Physical Barriers

• 1. Natural
• 2. Structural
• 3. Human
• 4. Animal
• 5. Energy
PROTECTIVE LIGHTING

• Depending the nature of the facility, protective


lighting will designed either to emphasize the
illumination of the perimeter barrier and the
outside approaches to it, or to concentrate on
the area and the building within the perimeter.
In either case it must produce sufficient light to
create a psychological deterrent to intrusion as
well as to make detection virtually certain in the
event an entry is made. It must avoid glare that
would reduce the visibility or security personnel,
while creating glare to detect intruder.
Types of Protection Lighting

• Stationary Luminary
• This is common type consisting of
series of fixed luminaries to flood given
area continuously overlap.
Types of Stationary Lighting
• Glare- projection Type
The intensity is focused to the intruder while
the observer or guard remained in the
comparative darkness.

• Controlled Lighting
The lighting is focused on the pile of items,
rather than the background.
• Standby Lighting
This system is similar to continuous lighting
but us turn on manually or by special device or
other automatic means.
• Movable Lighting
This consists of stationary or portable,
manually operated search- lights.
• Emergency Lighting
This type may duplicative of existing system.
This a standby which can be utilized in the event
of electric failure, either due to local equipment
or commercial power failure.
Types of Light Lamp

• Incandescent Lamp
These are common lights bulbs of the
found in the home. They have the
advantage of providing instant illumination
when the switch is thrown and are thus
the most commonly used protective
lighting system.
• Gaseous- discharge Lamp
The use of gaseous, discharge lamps in
protective lighting is somewhat limited,
since they require a period of from two to
five minutes to light when they are cold
and even longer period to light, when hot,
after a power interruption, it is very
economical to use but for industrial
security it is not acceptable due to long
time in the lighting in case it is turn off
accident or low voltage or brown-out.
Types of Gaseous- discharge
Lamps
• Mercury – Vapor Lamps
• These lamps give a blue- green color light due to
the presence of mercury vapor
• Sodium- Vapor Lamps
• These lamps emits yellow light. It is an efficient bulb
and due to its color, these light lamps are used also in
areas where insect predominate.
• Quarts Lamp
• These lamps emit a very bright white light and snap
on almost as rapidly as the incandescent lamp.
Types of Lighting Equipment

• Floodlights
• These lights project light in a concentrated beam.
They are appropriate to use in instances which call for
illumination of boundaries, building or fences.

• Searchlights
• These are highly focused incandescent lamps used
to pinpoint potential trouble spots.
• Fresnel Lights
These are wide beam units, primary used to
extend the illumination in long, Horizontal strips
to protect the approaches to the perimeter
barrier. Fresnel project a narrow, horizontal
beam which is approximately 180 degrees in the
horizontal and from 15 to 30 degrees in the
vertical plane.
• Street Lights
These produce diffused light rather than
direction beam. They are widely used in parking
areas.
PROTECTIVE ALARMS
• Another safeguard used to assist security to
complement if not supplement physical barriers
is an array of alarms. These alarms of various
types and cost can be installed indoors or
outdoors. Basically, alarms system is designed to
alert security or compound.
What is protective alarm?

• Device and contrivance installed inside


and outside a facility to compliment and
provide additional security measures and
operates to advertise entry into sensitive
and protected area.
Types of protective alarm
detection system
• 1. Central station system – The control station is located
outside the plant or installation. When the alarm is
activated, the central station notifies the police or other
public safety agency.
• 2. Proprietary system – centralized monitor of the alarm
system located in the installation with a duty operator.
In case of alarm, the duty operator calls whatever is the
primary need. This is owned and operated by the
installation.
• 3. Local alarm – this system consist of ringing up a
visual or audible alarm near the object to be protected.
Only guards within hearing can respond to such alarm .
• 4. Auxiliary alarm – in this system installation of circuits
is led into the nearest police station.
Kinds of alarm system
• 1. Audio detection device – it detects any sound
caused by attempted force entry. A supersonic
microphone speaker in walls, ceiling and floors
of the protected area.
• 2. Vibration detection device – detect any
vibration caused by forcible entry. Effective to
safeguard enclosed areas.
• 3. Metallic foil/ wire – an electrically charged
strips of tinfoil or wire is used in doors, windows
or glass surface.
• 4. Photoelectric/ electric eye device – activated
when the intruder crosses the beam that breaks
contact and activates the alarm.
Bank alarm system
• . Foot rail – place on the floor in such a position
that tellers may activate the alarm by placing
the front of their feet to engage the activation
bar.
• 2. Bill traps – currency is usually place in the
teller’s cash drawer and connected to the alarm
system. When the currency is removed, the
device is activated.
• 3. Double squeeze button – requires pressure on
both side of the device and reduces the
probability of accidental activation.
Protective Lock
• Lock is one of the most widely used physical security
devices in the asset protection program of an installation.
It complements other physical safeguards of the
installation against any possible surreptitious entry.
However, the owner of the installation or his security
officer needs to understand the weaknesses and strength
of each type of lock including the door, window or walls to
be used to achieve maximum benefit from its application.
This is because burglars more often concentrate on the
lock and its application mechanism in order to make a
forcible entry. It is for this obvious reasons that locks are
considered as delaying devices which cannot really stop a
determine intruder from destroying the lock
• What is lock?
Known as mechanical, electrical,
hydraulic or electric device designed to
prevent entry and removal of essential
items into a building, room, and container
of hiding place.
• What is padlock?
Portable and detachable lock having a
sliding hasp which passes through a staple
ring and is then made secured.
What are the types of lock?

• Warded lock – is a type of lock that uses a


set of obstruction, or wards, to prevent
the lock from opening unless the correct
key is inserted. The correct key has
notches or slots corresponding to the
obstructions in the lock, allowing it to
rotate freely inside the lock.
• Disc tumbler lock – is a type of lock that utilizes
a set of flat disc to prevent the lock from
opening unless the correct key is inserted.
• Pin tumbler lock – is a lock mechanism that uses
pins of varying lengths to prevent the lock from
opening without the correct key. Pin tumbler are
most commonly employed in cylinder lock, but
may also be found in tubular or radial locks.
• Combination lock – instead of using key to align
the tumblers, the combination mechanism uses
numbers, letters or symbols as reference point
which enable an operator to align them
manually
• Code operated lock – type of lock than
can be operated by pressing a series of
numbered button in the proper sequence.
• Electromagnetic lock – can be opened and
closed remotely by electrical means.
• Card operated lock – operated by a coded
card.
What are the types of Keys?
• Change key – a specific key which operates the
lock and has a particular combination of cuts,
which match the arrangement of the tumblers in
the lock
• Sub – master key – a key that will open all the
lock within a particular area or grouping in a
given facility.
• Master key – a special key capable of opening a
series of locks.
• Grand master key – a key that will open
everything in a system involving two or more
master key groups.
What is key control?

• The management of keys in plant or


business organization to prevent
unauthorized access to the keys.
What is security cabinet?

• The final line of defense at any facility is


in security storage where papers, records
plans or cashable instrument, precious
metals or other especially valuable assets
are protected. These security containers
will be of a size quantity, which nature of
the business dictates.
Three types of security cabinet

• Safe – a metallic container used for the


safekeeping of documents or small items
in an office or installation. Safe can be
classified as either burglary of fire proof
depending upon the used and need
Specification for Safe

• 1. It’s weight must be at least 750 lbs.


• 2. It less than 750 lbs it should be
anchored to building structure
• 3. Its body should be atleast 1 inch thick
steel
• Vault – Heavily constructed fire and
burglar resistance container usually part of
the building structure used to keep and
protect cash, documents and negotiable
instruments. It is bigger than safe but
smaller than file room.
Specification for Vault
• 1. The vault door should be made of steel
atleast 6 inches in thickness
• 2. The walls, ceilings, and floors must be
reinforced by concrete atleast 12 inches in
thickness
• 3. It must be fire resistive up to 6 hours
• File room – a cubicle in a building
constructed a little lighter than vault but
bigger in size to accommodate limited
people to work on the records inside.
Guard Force system
• Private Security Agency (PSA)
• shall mean any person association, partnership, firm or
private corporation, who contracts, recruits, trains,
furnishes or posts any security guard, to perform its
functions or solicit individuals, businesses, firms, or
private, public or government- owned or controlled
corporations to engage his/its service or those of his/its
security guards, for hire, commission or compensation
thru subscription or as a consultant/trainer to any
private or public corporation whose business or
transactions involve national security or interest
• Government Security Personnel — shall be
natural persons which include government
security guards, detectives, security consultants,
security officers and others that may be class
Tied later, except those of the Armed Forces of
the Philippines, Philippine National Police,
Bureau of Jail Management and Penology,
Municipal or City Jail guards
rendering/performing security and/or detective
services as employed by government entities.
• Company Guard Force (CGF) — a security force
maintained and Operated by any private
company/corporation utilizing any of its
employees to watch, secure or guard its
business establishment premises, compound or
properties.
Control of personnel in the
physical facility
• The most practical and generally accepted
system of personnel identification is the use of
identification cards, badges or passes. Generally
speaking, this system designates when and
where and how identification cards should be
displayed, and to whom. This helps security
personnel eliminate the risk of allowing the
access of unauthorized personnel within the
establishment.
Two types of personnel
identification

• 1. Personal recognition
• 2. Artificial recognition
Use of Pass system
• 1. Single pass system – the badge or pass coded
for authorization to enter specific areas is issued
to an employee who keeps it in his possession
until his authorization terminates.
• 2. Pass exchange system – an exchange takes
place at the entrance of each controlled area.
Upon leaving the personnel surrenders his
badge or passes and retrieve back his basic
identification.
• 3. Multiple pass system – This provides an extra
measure of security by requiring that an
exchange take place at the entrance of each
restricted area.
Visitors Movement control
• 1. Visitor’s logbook – all visitors to any facility should be
required identification card and filled up the logbook.
• 2. Photography – taking photography should also be
considered especially in controlled areas.
• 3. Escort – if possible visitors should be escorted by the
security to monitor their activity and guide them.
• 4. Visitors entrance – separate access for visitors and
employees should be provided
• 5. Time traveled – if there is long delay or time lapse
between the departure and arrival, the visitor may be
require to show cause for the delay.
Personnel Security

• It includes all the security measures


designed to prevent unsuitable individuals
or persons of doubtful loyalty to the
government, from gaining access to
classified matter or to any security facility,
and to prevent appointment or retention
as employees of such individuals.
Security Chain

• Personnel security it is the weakest link in


the security chain. This weakness can be
best minimized or eliminated by making
personnel security conscious through
training program.
What is Personnel Security
Investigation?

• It is inquiry into the character, reputation,


discretion and loyalty of individual in order
to determine a person’s suitability to be
given a security clearance.
What are the types of PSI?
• . National Agency Check (NAC) – this is an
investigation of an individual made upon the
basis of written information supplied by him in
response to official inquiry, and by reference to
appropriate national agencies.
• 2. Local Agency Check (LAC) – this type of
investigation consist of the NAC plus written
inquiries sent to appropriate local government
agencies, former employees, reference and
school listed by the person under investigation.
Background Investigation

• This is more comprehensive investigation


than the NAC & LAC. A thorough and
complete investigation of all or some of
the circumstances or aspects of a person’s
life is conducted.
What are the two Types of BI
• Complete background Investigation (CBI)
– Consist of the investigation of the
background of a person, particularly all
the circumstances of his personal life
• Partial Background Investigation (PBI) –
Consist of the investigation of the
background of an individual but limited
only to some of the circumstances of his
personal life which are deemed pertinent
to the investigation.
Security Education Program

• The basic goal of security education


program is to acquaint all the employees
the rationale behind the security measures
and to insure their cooperation at all
times.
Objectives of Security
Education Program.
– Guidance for all supervisory and executive
levels of the organization;
– A mandatory indoctrination of security for all
new personnel before their assignment to
their respective jobs;
– Development of high degree of security
consciousness among the selected supervisors
and other key personnel in a program that
should be continuing and supported by top
management,
– A down- the- line security program aimed at
instilling consciousness and dedication
through demonstrations, lectures,
motivations, and suggestions,
– To let all the employee force be informed that
they all belong to the organization and that
non- awareness and non- concern to the
security program is tantamount to disloyalty.
– That the program is also to develop discipline,
loyalty and belongingness.

Phases of Security
Education
• Initial Interview
• Training Conference
• Refresher Conference
• Security Reminders
• Security Promotion
• Special Interviews
• Debriefing
DOCUMENT AND
INFORMATION SECURITY
• The information cycle consists of five
stage namely : (a) creation (b) use, (c)
storage and retrieval (d) transfer, and (e)
disposition.
Types of Documents

• Class1- Vital Document


• In this category are records that are
irreplaceable; records of which
reproduction does not have the same
value as the original;
• Class II- Important Document
• This includes records the production of
which will close considerable expense and
the labor, or considerable delay.
• Class III – Useful Documents
• This include records whose loss might
cause inconvenience but could be reality
replace and which would not in the
meantime present an insurmountable
obstacle to the prompt restoration of the
business.
• Class IV- Non- essential Documents
• These records are daily files, routine in
nature even if lost or destroyed, will not
effect operation or administration. This
class represent the bulk of the records
which should not even attempted to
protect in the event of disasters. They
should however, be kept in ordinary files
ready for reference if needed and usually
discarded after some period of time.
SECURITY HAZARDS
• Type of Hazards
• Natural Hazards
These are hazards which arise from
natural phenomena.
• Human or Man-made Hazards
Human or man-made hazards are the
greatest concern to personnel charge with
the responsibility of safeguarding and
protecting a plant or installation.
Types of Pilferer
• Casual Pilferer
Is one who steals due to his inability to
resists the unexpected opportunity and
has little by detection.
• Systematic Pilferer
Is one who steals with preconceived
plan takes away any or all types of items
or supplies for economic gain.
SECURITY SURVEY
• A security survey is a critical on- site
examination and analysis of an industrial
plant, business, home, or public or private
institution done to ascertain the facility’s
current security status, to identify
deficiencies or excesses in current
practices, to determine what protection is
needed, and to make recommendations
for improving the overall level of security
at that location.
Objectives of Security
Survey
• To determine existing state of security
• To locate weakness in defense
• To determine degree of protection
required
• To produce recommendations establishing
a total security program.
Security Survey Sequence
of Action
• Examine and analyze the site and the
organization
• Ascertain the organization/s current
security status.
• Determine the level of protection needed
• Make recommendations
SECURITY INSPECTION

• Types of Security Inspection


• A. Continuous Inspection
• B. formal
• C. informal
• D. structured
• E. unstructured
• Continuous Inspection
To keep pace with constant changes in
the organization, changes in our security
in term of attitudes, life-styles and moral
values, and the rapidly advancing
technological modifications all around us,
the inspection process must be an on –
going, never ending activity.
• B. formal
Is one to which some fanfare is
attached: it is usually preceded by an
announcement, and the unit under
inspection “prepares” for events, including
some extra housekeeping activities that
would not otherwise happen at that point
in time.
• . informal
Are usually the result of a long and
firmly entrenched inspection program,
understood by all and accepted as a part
of the organizational life.
• Structured
As opposed to an unstructured
inspection, is one that moves
systematically, perhaps even rigidly, from
one designated inspection point to the
next. The following could be part of such
a structured inspections.
• Unstructured Inspections
In contrast, would approach the
warehouse unit in a more random manner,
with less methodical attention to small
specifics. The experience eye of a top security
professional would note a glance, without
following a checklist, the weeds and other
vegetations against the fence needed
clearing.
Republic Act 5487

• An Act governing the organization and


management of private security agencies,
company guard forces and government
security forces, it prescribed the minimum
requirements for security personnel to be
secure a license to exercise profession.
What are the general requisites
in the security profession?
• 1. Filipino citizen
• 2. Not less than 18 years of age
• 3. Physically and mentally fit
• 4. Good moral character
• 5. Must not possess any disqualification
What are the general
disqualifications?
• 1. Dishonorably discharge from the service
in the PNP/AFP
• 2. Physically and mentally unfit
• 3. Conviction of a crime
• 4. Addiction to drugs/ alcohol
• 5. Dummy of foreigner
• 6. Elective or appointed government
official
What are the basic qualification
of an agency operator/manager
• 1. Atleast 25 years of age
• 2. College graduates and/or commissioned
officer in the inactive service or retired
from the AFP/PNP
• 3. Has taken a course/seminar on seminar
on industrial security management and /
or must have adequate training or
experience in security business
• Now applicants for license to operate shall
be required to obtain a minimum
capitalization of one million pesos (P1
000,000.00) with a minimum bank deposit
of five hundred thousand (P500,000.00)
pesos in order to start its business
operation.
What are the basic qualification of
a security consultant?
• 1. Holder of masters degree of
criminology, MPA, MNSA, industrial
security administration or law
• 2. Must have atleast 10 years experience
in the operation and management of
security business
Rule IV License to operate
Sec 5. Membership
• No regular license shall be granted unless
the PSA has a minimum of 200 licensed
private security personnel.
• No regular license shall be granted
unless the CGF/PDA has a minimum of 30
licensed private security personnel.
• The maximum number of private
personnel that PSA/CGF/PDA may employ
shall be 1000
Status and Validity of License to
Operate.
• Regular LTO - issued, after complying with
licensing requirements, to private security
agencies having obtained and maintained in its
employ at least two hundred (200) security
personnel, and to company guard forces and
private detective agencies having obtained and
maintained in its employ at least thirty (30)
security personnel and private detectives
respectively. Such license may be renewed
following conformity with renewal requirements
prescribed in a Standard Operating Procedure
(SOP).
• Temporary LTO — initial and conditional
issuance to new private security agencies
and to PSAs holding regular LTO not able
to maintain the minimum number of
security personnel or conform to
standards, for them to be able to attain
the 200 minimum number of security
personnel or comply with licensing
standards, prior to issuance/re-issuance of
regular LTO. Such issuance shall not be
renewable nor be extendible.
• Unless sooner cancelled or revoked and
provisions hereof modified, all licenses to
operate shall have a validity of two (2)
years Temporary LTOs upon expiration are
automatically cancelled.
Rule VII
Sec 1. Possession of firearms by
PSA,PDA,CSF,GSU
• Shall be entitled to possess firearms after
satisfactory complying with the
requirements prescribed by the C,PNP
provided that the number of firearm shall
not exceed 1 firearm for every 2 security
guard. NO security agency shall be
allowed to possess firearms in excess of
500 units.
Sec II. Restriction to possess
high – powered firearms by
PSA, PDA, CSF, GSU
• Generally they are not allowed to possess high
caliber firearms considered as military type
weapons such as M16, M14, cal .22 to include
pistols and bores smaller than cal .38 but with
firing characteristics of full automatic burst.
However, when such entities are operating in
areas where there is upsurge of lawlessness and
criminality as determined by the C, PNP and
police regional offices, they may be allowed to
acquire, possess, and use high – powered fire
• The acquisition shall be at the expense of
the entity, the firearms should be
registered, the total number of firearms
shall not exceed 10% of the total number
of security guards employed and the
security guards who will use the firearm
shall be given adequate training in the use
of it
Stocking of ammunition
• Stocks of ammunition in the agency shall
be authorized on a limited and reasonable
quantity that will suit the requirement and
need of such agency and shall be
subjected to inspection from time to time
by representatives of the Chief, Philippine
National Police unless otherwise provided
for under existing laws
• , shall not exceed a basic load of fifty (50)
rounds of ammunition per unit of duly
licensed firearms. Individual issue to each
security guard shall be limited to one half
of such basic load or twenty five (25)
rounds for every security guard.
RULE VI
UTILIZATION OF PRIVATE
SECURITY AGENCIES
AND PERSONNEL
• Powers of city municipal mayors in case of
emergency – In case of emergency or in
times of disaster or calamity when the
services of any security agency/entity and
its personnel are needed, the city or
municipal mayor
• may muster or incorporate the members
of the agency or agencies nearest the
area of such disaster or calamity to help in
the maintenance of peace and order,
prevention of crime, or apprehension of
violators of laws or ordinance, and in the
protection of lives and properties.
Duty to Assist Law Enforcers
• - Any security guard shall be duty bound
to assist any peace officer in the pursuit of
his bounding duty, when requested,
provided it is within the territorial
jurisdiction of his (security officer) area of
duty.
Thank you and
God Bless

• “If any of you lacks wisdom, he should


ask God, who gives generously to all
without finding fault, and it will be
given to him” James 1:5
END OF PRESENTATION

You might also like