Lea R1

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 97

LEA R1

JOSE MELARTE G. GOOCO JR.


PAMANTASAN NG LUNGSOD NG MUNTINLUPA
POLICE ADMINISTRATION & MANAGEMENT CONCEPTS

The setting below shows that management is related with


administration in an organizational environment.

Management pertains to the utilization of available resources in


an organization while

Administration refers to the processes used. The organization


with management and administration is directed towards the
achievement of goals and objectives.
Goals are broad statements of general and long-
term organizational purposes often used to define
the role of the police, for instance, to prevent
crime, maintain order or help solve community
problems.
Objectives are specific short term statements
consistent with an organization’s goal.
 Productivity means the summary of measures of the
quantity and quality of police work performance
achieved, with resource utilization considered.
 Good police managers establish and support the
conditions needed to ensure high productivity for
themselves, for individual contributors, for their work
units, and for the organization as a whole.
Police Effectiveness, which measures whether or not
important task goals are being attained

Police Efficiency, which measures how well resources are


being utilized.
POLICE MANAGEMENT PROCESSES

The management process


  involves Planning – Organizing –
Leading – Controlling the use of
organizational resources to
achieve high performance results.
1. Planning – is the process of setting performance objectives
and identifying the actions needed to accomplish them.
2. Organizing – is the process of dividing the work to be done
and coordinating results to achieve a desired purpose.
3. Leading – is the process of directing and coordinating the
work efforts of other people to help them accomplish
important task.
4. Controlling – is the process of monitoring performance,
comparing results to objectives and taking corrective action
as necessary.
Police Managerial Activities and Roles

Interpersonal Roles – working directly with other people


 Figurehead – hosting and attending official ceremonies
 Leadership – creating enthusiasm and serving people’s
needs
 Liaison – maintaining contacts with important people and
groups
Informational Roles –exchange information with
other people
 Monitor – seeking out relevant information
 Disseminator – sharing information with insiders
 Spokesperson – sharing information with outsiders
Decisional Roles – make decisions that affect other people
 Entrepreneur – seeking problems to solve and
opportunities to explore
 Disturbance handler – helping to resolve conflicts
 Resource Allocator – allocating resources to various
uses
THE FOUNDATIONS OF POLICE ORGANIZATION AND
MANAGEMENT/ CLASSICAL APPROACH
1. Scientific Management (Frederick Taylor, 1856-1915)

Scientific Management sought to discover the best method


of performing specific task. Based on his studies, Taylor
believed that if workers were taught the best procedures,
with pay tied to output, they would produce the maximum
amount of work.
2. Bureaucratic Management (Max Weber, 1864-1920)
The concept of Bureaucracy is generally associated with
the work of Max Weber, who was the major contributor to
modern sociology.
 Division of labor based on a specified sphere of
competence
 Hierarchy of authority where its lower office is under the
control and supervision of a higher one.
 Specified set of rules applied uniformly throughout the
organization
3. Administrative Management - It emphasizes
broad administrative principles applicable to
higher levels with in the organization.
Henri Fayol (1841-1945) – in his most
influential work “Industrial and General
Management”, 14 principles of efficient
management was identified. 
 Division of Work - work specialization can increase
efficiency with the same amount of effort.
 Authority and Responsibility – authority includes the right
to command and the power to require obedience; one
can not have authority without responsibility.
 Discipline – Discipline is necessary for an organization
to function effectively, however, the state of the
disciplinary process depends upon the quality of its
leaders.
 Unity of Command - employee should receive orders
from one superior only.
 Unity of Direction – there should be one manager and
one plan for a group of activities that have the same
objective.
 Subordination of individual interest to general interest –
the interest of one employee or group of employees
should not take precedence over those of the
organization as a whole.
 Remuneration of Personnel – compensation should be fair to both the
employee and the employer.
 Centralization – the proper amount of centralization depends on the situation.
The objective is to pursue the optimum utilization of the capabilities of
personnel
 Scalar Chain – the hierarchy of authority is the order of ranks from the
highest to the lowest levels of the organization. Besides this vertical
communication should also be encourage as long as the managers is in the
chain are kept informed.
 Order – materials and human resources should be in the
right place at the right time; individuals should be in
jobs or position that suits them.
 Equity – employees should be treated equal with
kindness and justice
 Stability of personnel tenure - an employee needs time
to adjust to a new job and reach a point of satisfactory
performance; high turnover should be avoided.
Initiative – the ability to conceive and execute
a plan (through initiative and freedom) should
be encouraged and developed throughout all
levels of the organization.
Esprit de Corps –“union” Unity is strength;
Harmony and teamwork are essential to
effective organizations.
4. Gulick and Urwick (1920-1937) - Pioneers of “The Science
of a Administration” (1937). In this book, they have described
the major functions of administration using the acronym
POSDCRB.

 1. Planning – working out in broad outline the things that need to be


done and the methods for doing them to accomplish the purpose set
for the enterprise.
 2. Organizing – establishment of the formal structure of authority
through which work subdivisions are arranged, defined, and
coordinated for the define objective.
 3. Staffing – personnel function of bringing in and out training the
staff and maintaining the staff the favorable conditions of work.
Filling the organization with the right people and right position.
 4.Directing – task of making decisions and embodying
them in specific and general orders and instructions and
serving as the leader of the enterprise
 5.Coordinating - the all-important duty of interrelating the
various parts of the work.
 6. Reporting – is keeping those to whom the executive is
responsible informed as to what is going on, which thus
includes keeping himself and his subordinates informed
through records research and inspection.
 7. Budgeting – with all that goes of budgeting in the form
of fiscal planning, accounting, and control
HUMAN RELATIONS APPROACH

Elton Mayo (the Hawthorne study)


 The results of Hawthorne experiment contradicted the
traditional views of management emphasized by the
classical theorists and led to the behavioral approach
emphasizing concern for the workers. The study suggests
that when special attention is paid to employees by
management, productivity is likely to increase regardless
of changes in working conditions. This phenomenon was
labeled the “Hawthorne effect”.
BEHAVIORAL SCIENCE APPROACH
The behavioral science approach utilizes
scientific method as the foundation for
testing and developing theories about
human behavior in organizations that can
be used to guide and develop managerial
policies and practices.
CONTEMPORARY APPROACH

1. The System Theory - It simply means that


all parts of a system are interrelated and
interdependent to form the whole. A system
is composed of elements or subsystems that
are related and dependent upon one another.
When these subsystems are in interaction
with one another, they form a unitary whole.
 2. The Contingency Theory – This approach recognizes
that many internal and external environmental variables
affect organizational behavior. In this case, there is no best
way for structuring and managing diverse types of
organizations. So the underlying theme of this theory is
that it all depends on a particular situation. The task of
managers then is to determine in which situations and at
what times certain methods or techniques are the most
effective. In this way, the approach is more pragmatic
although it encompasses relevant concepts of both
classical and behavioral theories.
 3. Theory Z and Quality Management - Important
emerging perspectives include Theory Z and
Quality Management, focused on the Japanese
management practices. The emergence of Total
Quality Management (TQM) practices – a
customer oriented approach and emphasizes on
both human resources and quantitative methods in
an attempt to strive towards continuous
improvement.
Executive Order No. 292 [BOOK IV/Title
VIII/Subtitle III
 SECTION 69. Declaration of Policy.—(1) The State shall
establish and maintain one police force which shall be national
in scope and civilian in character, to be administered and
controlled by a national police commission and shall provide, by
law, the authority of local executives over the police units in
their jurisdiction. (2) The maintenance of peace and order, the
protection of life, liberty, and property, and the promotion of the
general welfare are essential for the enjoyment by all the people
of the blessings of democracy.
SECTION 70. The National Police Commission.
—Unless otherwise provided by law, the
National Police Commission shall be under the
control and supervision of the Office of the
President and shall continue to operate in
accordance with its present organizational
structure and perform the functions and duties
assigned to it by law.
SECTION 71. Powers and Functions.—As provided by law,
the Commission shall exercise the following functions:

 (1)
Investigate, decide, and review administrative cases against
members of the Integrated National Police;
 (2) Adjudicatedeath and permanent disability benefit claims of
members of the Integrated National Police;
 (3) Administer appropriate examinations for the police, fire and jail
services;
 (4) Attest appointments of members of the Integrated National Police;
 (5) Inspect and audit the performance of the
Integrated National Police;
 (6) Prepare a National Crime Prevention Program
and coordinate its implementation upon approval
by the President; and
 (7) Perform other duties provided by law or
assigned by higher authorities.
Republic Act No. 10867
Section 1

Short Title.— This Act shall be known as the “National Bureau of Investigation
Reorganization and Modernization Act”.
Powers and Functions.— The NBI shall have the following powers and functions:
1. Undertake investigation and detection of crimes and offenses enumerated under
Section 5 hereof;
2. Issue subpoena for the appearance of any person for investigation or production
of documents, through its officers from the ranks of Regional Director to
Director;
3. Act as a national clearing house of criminal records and other related
information for the benefit of the government;
4. Render technical assistance to government
agencies and instrumentalities, when so
requested;
5. Extend assistance in cases involving extradition
and mutual legal assistance, when requested by
the Department of Justice;
6. Establish an NBI Academy which shall be
responsible for the recruitment, training, and
development of all NBI agents and personnel,
among others;
6. Establish and maintain a Forensic and
Scientific Research Center which shall serve as
the primary center for forensic and scientific
research in furtherance of scientific knowledge
in criminal investigation, detection, evidence
collection and preservation, and provide the
necessary training therefor;
8. Establish and maintain a Cyber Investigation and
Assessment Center which shall serve as the nerve center
for computer information technologies, data on
cybercrime cases, computer intrusion, threats, and other
related crimes or activities;

9. Establish and maintain an integrated, comprehensive, and


state-of-the-art network of equipment and facilities to be
used by the NBI in its criminal investigation, detection,
and evidence gathering, and to provide the corresponding
training in this regard;
10. Request the assistance of the Philippine National Police
(PNP), Armed Forces of the Philippines, or any other
agency of the government, including government-owned
and/or -controlled corporations, in its anti-crime drive.
Such assistance may include the use of the agency’s
personnel and facilities upon prior approval by the head
of the agency concerned;

11. Conduct intelligence operations in furtherance of the


foregoing powers and functions;
12. Enter into any contract or transaction for the acquisition,
ownership, possession, administration, lease, disposition or
acceptance of real or personal property in its name, subject to
the approval of the Secretary of Justice;
13. Establish a modern NBI Clearance and Identification
Center containing all derogatory and criminal records
and civilian identification records, including their
identifying marks and characteristics and fingerprint
database, as well as dental records pursuant to
Presidential Decree No. 1575, entitled “Requiring
Practitioners of Dentistry to Keep Records of Their
Patients”;
14. Maintain, for purposes of investigative and forensic
requirements of the NBI, relevant database such as
ballistic records of firearms including, but not limited to,
data ownership, possession, and other related identifying
circumstances; and Deoxyribonucleic Acid (DNA)
databank; and

15. Perform such other functions as the President or the


Secretary of Justice may assign.
 The Philippine Drug Enforcement Agency (PDEA)
is responsible for the efficient law enforcement of
all provisions on any dangerous drugs and/or
precursors and essential chemicals.
 Notes:1/ The volume of drug and non-drug
evidence seized/confiscated depends on the actual
seizure/confiscation during anti-drug operations.
The Department of National Defense
(DND) is tasked to guard the country
against external and internal threats to
national peace and security, and to
provide support for social and economic
development.
The BUREAU OF CORRECTIONS is an
agency under the Department of Justice
that is charged with custody and
rehabilitation of national offenders, that is,
those sentenced to serve a term of
imprisonment of more than three (3) years.
 Confine persons convicted by the courts to serve a sentence in national
prisons.
 Keep prisoners from committing crimes while in custody.
 Provide humane treatment by supplying the inmates' basic needs and
implementing a variety of rehabilitation programs designed to change
their pattern of criminal or anti-social behavior.
 Engage in agro-industrial projects for the purpose of developing prison
lands and resources into productive bases or profit centers, developing
and employing inmate manpower skills and labor, providing prisoners
with a source of income and augmenting the Bureau's yearly
appropriation
Industrial Security Concept
JOSE MELARTE G. GOOCO JR.
PAMANTASAN NG LUNGSOD NG MUNTINLUPA
 CONCEPT OF SECURITY

 Security is a state or condition of being secured; there is freedom from fear, harm,
danger, loss, destruction or damages. Basically, it was the action of man against
man that led to many unsecured and unsafe conditions. Reasons could be
economic, revenge, or just plain greed and avarice. Whatever the motives, the
civilized man needs adequate protection.
Three major areas:

 1. Physical Security - this concern with the physical measures adopted to prevent unauthorized access
to equipment, facilities, material and document and to safeguard them against espionage, sabotage,
damage, loss and theft.
 2. Personnel Security- this is as important as physical security. Personnel security starts even before the
hiring of an employee and remains to be maintained for as long as the person is employed. Its purpose is to
insure that a firm hires those best suited to assist the firm in achieving its goals and objectives and once
hired assist in providing necessary security to the work force while carrying out their functions.
 3. Document and Information Security- this involves the protection of documents and classified
papers from loss, access by unauthorized persons, damage, theft and compromise through disclosure.
Classified documents need special handling. Lack of indoctrination and orientation among the personal
handling them can result in the leakage, loss, theft and unauthorized disclosure of the documents.
Barrier
 A barrier can be defined as any structure or physical device capable of restricting, deterring, delaying,
illegal access to an installation.
 Generally, a barrier is use for the following purposes:
 1. Define the physical limits of an area.
 2. Create a physical and psychological deterrent to unauthorized entry.
 3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders.
 4. Assist in more efficient and economical employment of guards
 5. Facilitate and improve the control and vehicular traffic.
Types of Barriers
1. Natural barriers - it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are
difficult to traverse.
2. Structural barriers - these are features constructed by man regardless of their original intent that tends to
delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
3. Human barriers - persons being used in providing a guarding system or by the nature of their employment
and location, fulfill security functions. Examples are guards, office personnel, shop workers, etc.
4. Animal barriers - animals are used in partially providing a guarding system. Dogs are usually trained and
utilized to serve as guard dogs. German shepherds are best suited for security functions. Goose and turkeys
could also be included.
5. Energy barriers - it is the employment of mechanical, electrical, electronic energy imposes a deterrent to
entry by the potential intruder or to provide warning to guard personnel. These are protective lighting, alarm
system and any electronic devices used as barriers.
Three Line of Physical Defense

1. First line of Defense- perimeter fences/


barriers
2. Second line of defense- doors, floors,
windows, walls, roofs and grills and other
entries to the buildings
3. Third line of defense- storage system like
steel cabinets, safes, vaults and interior files.
Principles of Physical Security
 1.The type of access necessary will depend upon a
number of variable factors and therefore may be
achieved in a number of ways.
 2. There is no impenetrable barrier
 3. Defense-in depth is barriers after barriers
 4. Delay is provided against surreptitious and non-
surreptitious entry.
 5. Each installation is different.
Types of Fences

 Solid fence -constructed in such away that visual access through the fence is
denied. Its advantage is that it denies the opportunity for the intruder to become
familiar with the personnel, activities and the time scheduled of the movements
of the guards in the installation. On the other hand, it prevents the guards from
observing the area around the installation and it creates shadow that may be
used by the intruder for cover and concealment.
 Full-view fence - it is constructed in such away that visual access is permitted
through the fence. Its advantages are that it allows the roving patrols and
stationary guard to keep the surrounding are of the installation under
observation. On the other hand, it allows the intruder to become familiar with
the movements and time schedule of the guard patrols thereby allowing him to
pick the time that is advantageous on his part.
Types of Full-View Fence

 1. Chain link fence


 It must be constructed of 7 feet material excluding top guard.
 It must be of 9 gauges or heavier.
 The mesh openings are not to be larger than 2 inches per side.
 It should be twisted and barbed selvage at top and bottom
 It must be securely fastened to rigid metal or reinforced concrete.
 It must reach within 2 inches of hard ground or paving.
 On soft ground, it must reach below surface deep enough to compensate for
shifting soil or sand.
2. Barbed wire fence
Standard barbed wire is twisted, double-
strand, 12-gauge wire with 4 point barbs
spaces in an equal distance apart.
Barbed wire fencing should not be less than 7
feet high excluding top guard.
Barbed wire fencing must be firmly affixed to
posts not more than 6 feet apart.
3. Concertina wire fence
Standard concertina barbed wire is
commercially manufactured wire coil of high
strength steel barbed wire clipped together at
intervals to form a cylinder.
Opened concertina wire is 50 feet long and 3
feet in diameter.
Perimeter Barrier • Utilities Opening - sewers, air intakes, exhaust
Opening tunnels and other utility openings which
penetrate the barrier and which have cross
 Gates and Doors - when not sectional areas of 96 square inches or more
in use and controlled by should be protected by bars, grills, water filled
guards, gates and doors in the traps or other structural means providing
perimeter should be locked and equivalent protection to that portion of the
frequently inspected by guards. perimeter barriers.
Locks should be changed from • Clear Zones - unobstructed area or a “clear
time to time and should be zone” should be maintained on both sides of
covered under protective locks the perimeter barrier. A clear zone of 20 feet or
and key control. more is desirable between the barriers and
 Side-walk-elevators - these exterior structures and natural covers that may
provide access to areas within provide concealment for assistance to a person
the perimeter barrier and seeking unauthorized entry.
should be locked and guarded.
Additional Protective Measures

Top Guard - additional overhang of barbed


wire placed on vertical perimeter fences
upward and outward with a 45 degree
angle with 3 to 4 strands of barbed wires
spaced 6 inches apart. This increases the
protective height and prevents easy access.
Guard Control stations - this is normally
provided at main perimeter entrances to
secure areas located out-of-doors, and
manned by guards on full-time basis.
Sentry station should be near a perimeter
for surveillance at the entrance.
 Tower Guard - this is a house-like structure above the
perimeter barriers. The higher the tower, the more visibility
it provides. It gives a psychological unswerving effect to
violators. By and large guard towers, whether permanent or
temporary, must have a corresponding support force in the
event of need. Towers as well as guard control stations
should have telephones, intercoms, and if possible two-way
radios connected to security headquarters or office to call
for reserves in the event of need.
Protective lighting is the single most cost-effective
deterrent to crime because it creates a psychological
deterrent to the intruders

 Types of Protective Lighting


 1. Continuous lighting - the most familiar type of outdoor security lighting, this is designed to provide two
specific results: glare projection or controlled lighting. It consists of a series of fixed luminaries at range to
flood a given area continuously during the hours of darkness.
 a. Glare projection type- it is being used in prisons and correctional institutions to illuminate walls and
outside barriers.
 b. Controlled lighting- it is generally employed where, due to surrounding property owners, nearby highways
or other limitations, it is necessary for the light to be more precisely focused.
 2. Standby lighting - it is designed for reserve or standby use or to supplement
continuous systems. A standby system can be most useful to selectively light a
particular area in an occasional basis.
 3. Movable or Portable lighting - this system is manually operated and is usually
made up of movable search or floodlights that can be located in selected or special
locations which will require lighting only for short period of time.
 4. Emergency lighting - this system is used in times of power failure or other
emergencies when other systems are inoperative.
General Types of Lighting Sources

1. Incandescent lamp - it is the least expensive in terms of energy


consumed and has the advantage of providing instant illumination
when the switch is on.
2. Mercury vapor lamp - it is considered more efficient that the
incandescent and used widespread in exterior lighting. This emits a
purplish-white color, caused by an electric current passing through
a tube of conducting and luminous gas.
3. Metal halide - it has similar physical appearance to mercury vapor
but provides a light source of higher luminous efficiency and better
color rendition.
3. Fluorescent - this provides good color rendition, high lamp efficiency
as well as long life. However, it cannot project light over long distance
and thus are not desirable as flood type lights.
4. High-pressure sodium vapor - this has gained acceptance for exterior
lighting of parking areas, roadways, buildings and commercial interior
installations. Constructed on the same principle as mercury vapor
lamps, they emit a golden white to light pink color and this provide
high lumen efficiency and relatively good color rendition. 
Types of Lighting Equipment

 1. Floodlights - These can be used to accommodate most outdoor security


lighting needs, including the illumination of boundaries, fences and buildings and
for the emphasis of vital areas or particular buildings.
 2. Street lights - This lighting equipment received the most widespread notoriety
for its value in reducing crime.
 3. Search lights - These are highly focused incandescent lamp and are designed to
pinpoint potential trouble spots.
 4. Fresnel lights - These are wide beam units, primary used to extend the
illumination in long, horizontal strips to protect the approaches to the perimeter
barrier. Fresnel projects a narrow, horizontal beam that is approximately 180
degrees in the horizontal and from 15 to 30 degrees in the vertical plane.
Protective alarm

 one of the important barriers in security. It assists the


security in detecting, impeding or deterring potential
security threat in the installation. Basically, its function is to
alert the security personnel for any attempt of intrusion into
a protected area, building or compound. Once an intruder
tampers the circuitry, the beam or radiated waves of the
alarm system, it will activate an alarm signal.
Three Basic Parts of Alarm System

1. Sensor or trigger device - it emits the aural or


visual signals or both.
2. Transmission line - a circuit which transmit the
message to the signaling apparatus.
3. Enunciator/annunciator - it is the signaling system
that activates the alarm.
Types of Protective Alarm System

 1. Central Station System - a type of alarm where the control station is


located outside the plant or installation. When the alarm is sounded or
actuated by subscriber, the central station notifies the police and other public
safety agencies.
 2. Proprietary system - centralized monitor of the proprietary alarm system
is located in the industrial firm itself with a duty operator. In case of alarm,
the duty operator calls whatever is the primary need; firefighters, police, an
ambulance or a bomb disposal unit.
 3. Local Alarm – This system consist of ringing up a visual
or audible alarm near the object to be protected. When an
intruder tries to pry a window, the alarm thereat goes off.
 4. Auxiliary alarm - company-owned alarm systems with a
unit in the nearest police station so that in case of need,
direct call is possible. The company maintains the
equipment and lines both for the company and those in the
police, fire and other emergency agencies by special
arrangement. Radio, landlines, or cell phones can avail of
the auxiliary system.
Kinds of Alarms
 1. Audio Detection Device - it will detect any sound caused by attempted force entry. A
supersonic microphone speaker sensor is installed in walls, ceilings and floors of the protected
area.
 2. Vibration Detection Device - it will detect any vibration caused by attempted force entry. A
vibration sensitive sensor is attached to walls, ceilings or floors of the protected area.
 3. Metallic foil or wire - it will detect any action that moves the foil or wire. An electrically
charge strips of tinfoil or wire is used in the doors, windows or glass surfaces of the protected
area.
 4. Laser Beam Alarm - a laser emitter floods a wall or fencing with a beam so that when this
beam is disturbed by a physical object, an alarm is activated.
 5. Photoelectric or Electric Eye Device - an invisible/visible beam is emitted and when this is
disturbed or when an intruder breaks contact with the beam, it will activate the alarm.
What is a Lock?

A lock is defined as a mechanical,


electrical, hydraulic or electronic device
designed to prevent entry into a building,
room, container or hiding place.
Types of Locks
 1. Key-operated mechanical lock - it uses some sort of arrangement of
internal physical barriers (wards tumblers) which prevent the lock from
operating unless they are properly aligned. The key is the device used to
align these internal barriers so that the lock may be operated.
 Three (3) Types of Key-operated Lock
 a. Disc or wafer tumbler mechanism
 b. Pin tumbler mechanism
 c. Lever tumbler mechanism
 2. Padlock - a portable and detachable lock having a sliding
hasp which passes through a staple ring and is then made
fasten or secured.
 3. Combination lock - instead of using the key to align the
tumblers, the combination mechanism uses numbers, letters
or other symbols as reference point which enables an
operator to align them manually.
 4. Code-operated lock - a type of lock that can be opened by
pressing a series of numbered button in the proper sequence.
 5. Electrical lock - a type of lock that can be opened and
closed remotely by electrical means.
 6. Card-operated lock - a type of lock operated by a coded
Types of keys

 1.Change key - a specific key, which operates the lock and has a particular
combination of cuts which match the arrangement of the tumblers in the lock.
 2. Sub-master key - a key that will open all the lock within a particular area
or grouping in a given facility.
 3. Master key - a special key capable of opening a series of lock.
 4. Grand Master key - a key that will open everything in a system involving
two or more master key groups.
 What is a Security Cabinet?

 The final line of defense at any facility is in the high security storage
where papers, records, plans or cashable instrument, precious metals
or other especially valuable assets are protected. These security
containers will be of a size and quantity, which the nature of the
business dictates.
 In protecting [property, it is essential to recognize that protective
containers are designed to secure against burglary or fire. Each type
of equipment has a specialized function and it will depend on the
owner of the facility which type ha is going to use.
Three (3) Types of Security Cabinet

 1. Safe - a metallic container used for the safekeeping of


documents or small items in an office or installation. Safe
can be classified as either robbery or burglary resistance
depending upon the use and need.
 a. Its weight must be at least 750 lbs. And should be
anchored to a building structure.
 b. Its body should at least one inch thick steel.
 2. Vault - heavily constructed fire and burglar resistance container usually
a part of the building structure used to keep and protect cash, documents
and negotiable instruments. Vaults are bigger than safe but smaller than a
file room.
 a. The vault door should be made of steel at least 6 inches in thickness.
 b. The vault walls, ceiling, floor reinforce concrete at least 12 inches in
thickness.
 c. The vault must be resistive up to 6 hours.
 3. File room - a cubicle in a building constructed a little lighter than a
vault but of bigger size to accommodate limited people to work on the
records inside.
 a. The file room should at most be 12 feet high.
 b. It must have a watertight door and at least fire proof for one hour.
Use of Pass System
 1. Single pass system - the badge or pass coded for authorization to enter
specific areas is issued to an employee who keeps it in his possession until
his authorization is terminates.
 2. Pass exchange system - an exchange takes place at the entrance of each
controlled area. Upon leaving the personnel surrenders his badge or passes
and retrieve back his basic identification.
 3. Multiple pass system - this provides an extra measure of security by
requiring that an exchange take place at the entrance of each restricted area.
Visitors Movement Control
 1. Visitor’s logbook – All visitors to any facility should be required to identify them selves and should be
given a visitor’s ID by the security. Visitor’s logbook should be filled up with the named of visitors, nature
and duration of visit.
 2. Photograph - taking of photographs should also be considered. Extreme caution must be exercised in
areas where classified information is displayed to preclude unauthorized taking of pictures of the installation.
If a visitor has camera and it is prohibited to take picture, said camera should be left in the care of security
with corresponding receipt.
 3. Escort - If possible visitors should be escorted by the security to monitor their activity within the
establishment and guide them where to go.
 4. Visitor entrances - separate access for visitors and employees of the establishment should be provided.
 5. Time- traveled - If there is a long delay or time lapse between the departure and arrival, the visitors
maybe required to show cause for the delay.
Personnel Security

Personnel Security includes all the security


measures designed to prevent unsuitable
individuals or persons of doubtful loyalty
to the government, from gaining access to
classified matter or to any security facility,
and to prevent appointment, or retention as
employees of such individuals,
Types of Personnel Security Investigation
(PSI)
 National Agency Check (NAC). – This is an investigation of an individual made
upon the basis of written information supplied by him in response to official
inquiry, and by reference to appropriate national agencies. It is simply a check of
the files and record of national agencies. The national agencies checked under this
type of investigation are the following:
  National Intelligence Coordinating Agency (NICA)
  National Bureau of Investigation (NBI)
  ISAAFP or J2 Division, GHQ AFP
  CIDG PNP Camp Crame., etc.
 Local Agency Check (LAC) – This type of investigation consist of the first
type plus written inquiries sent to appropriate local government agencies,
former employees, references and schools listed by the person under
investigation. The local agencies normally check besides the past
employment, schools and references are the following:
 Place of the locality where the individual is a resident.
 Mayor, Police, Fiscal, Judge of the locality where the individual is a
resident.
Background Investigation (BI)
This is more comprehensive investigation
than the NAC or the NAC and LAC. A
through and complete investigation of all
or some of the circumstances or aspects of
a person’s life is conducted.
This type of personnel Security Investigation may either
be a complete (CBI) or a partial Background
Investigation (PBI).
1. Complete Background Investigation – Consist of the investigation of
the background of a person, particularly all the circumstances of his
personal life.
2. Partial Background Investigation – Consist of the investigation of the
background of an individual but limited only to some of the circumstances
of his personal life which are deemed pertinent to the investigation.
Normally, the request for the investigation will indicate the specific
personal circumstances to be covered. This type of BI is also used to
further develop questionable information contained in another
investigation report.
 Security Guard Defined
 Sometimes called private security guard or
watchman shall include any person who offers or
renders personal service to watch or secure either a
residence or business establishment or both for hire
or compensation, and with a license to exercise
profession.
Security Guard Force
It is a group of force selected men, trained or
grouped into functional unit for the purpose of
protecting operational processes from those
disruption which would impeded efficiency or halt
operation at a particular plant, facility, installation
or special activity
Types of Security Guard Forces
1. Private Security Agency - any person, association, partnership, firm or private corporation,
who contracts, recruits, trains, furnishes or post any security guard, to do its functions or
solicit individual s, business firms, or private, public or government-owned or controlled
corporations to engage his/its service or those of his/its security guards, for hire commission
or compensation.
2. Company Security Force - A security force maintained and operated any private company/
corporation for its own security requirements only.
3. Government Security Unit - a security unit maintained and operated by any government
entity other than military and/a police, which is established and maintained for the purpose of
securing the office or compound and/or extension such government entity.
 General Requisites in the Security Profession

 1. Filipino Citizen
 2. Physically and mentally fit
 3. Good moral character
 4. Must not posses any disqualification
 General Disqualification
 1. Dishonorably discharge from the service in the PNP/AFP or any
private government entities.
 2. Physically or mentally unfit
 3. Conviction of a crime
 4. Addicted to drugs or alcohol dummy of a foreigner
 5. Elective or appointive government official
 Basic Qualifications of an Agency Operator/Manager
 In addition to the general qualifications, an operator should be:
 a. At least 25 years of age
 b. Commissioned officer, inactive or retired from AFP or PNP or a graduate of
Industrial Security Management with adequate training and experience in the
security business.
 Basic Qualification of a Security Consultant
 In addition to the general qualifications, a consultant should be:
 a. Holder of Master Degree in Criminology, MPA, MNSA, Industrial
Management or LL.B.
 b. Must have at least ten (10) years experience in the operation and management
of security business.
 Basic Qualifications of a Security Officer:
 In addition to the general qualifications, a security officer, should be:
 a. At least graduated from Security Officers Training Course
 b. A retired personnel in the PNP/AFP
 c. Must not posses any of the disqualification.
 Basic Qualifications of a Private Detective
 In addition to the general qualification, a detective should posses any of the
following:
 a. BS Criminology Graduate
 b. LL.B. holder
 c. Graduate of a Criminal Investigation Course
 d. Advance ROTC graduate
 Basic Qualification of a Security Guard
 Inaddition to the general qualifications , a security guard
should-
 a. Be at least high school graduate
 b. Be at least 18 years of age but not more than 50 years old
 c. Undergone pre-licensing training course
 d. Passed a neuropsychiatry examination.
 e. Be locally cleared with PNP or NBI
Licenses in the Security Profession

 1. License to Operate- before a Private Security Agency (PSA) can


operate; it has to secure a License to Operate (LTO) categorized as
either temporary or regular. A temporary license is issued by the
PNP thru Civil Security Croup Directorate after the applicant
/licensee should have complied with all the requirements while it
has less than two hundred guards. A Regular license to operate is
issued to the PSA once it is qualified of having two hundred (200) or
more license security guard in its employ duly posted. Regular
license is renewable every two (2) years.
 2. Security Guard License- before a security guard can practice his
profession; he shall possess valid security license. The use of
expired license is not allowed. In case of doubt, licenses may be
verified at the PNP SAGSD whether valid or fake.
 3. Firearm’s license- all firearms of the security agency should be
covered with firearms license issued by the PNP through its
Firearms Explosive Division under the Civil Security Group,
renewable every two years. No duplication of two or more firearms
with the same make and serial number shall be covered by one
license.
Firearms and Weapons Authorized for Used of
the Security Guard While on Duty
1.Handguns/Low-powered (cal. 22 and cal.38)
not exceeding one FA for every two guards
employed.
2.Shotguns (not bigger than 12 gauge)
3.High-powered- when the agency is operating in
areas where there is upsurge of lawlessness and
criminality as determined by the Chief PNP.
DOCUMENT AND INFORMATION SECURTY
The leakage of document and information cost
government, business and industry alike, billion of
pesos. A rival company or an enemy agent might
use an illegally obtain document and information
for their own advantage. For this reason, a
comprehensive and information security program
is very essential to the installation in order to focus
freely on the attainment of its goals and objectives.
 Security Clearance is the certification by a responsible authority that
the person described is cleared for access to classified matter the
appropriate level. Need-to-know is the principle whereby access to
classified matter may only be only given to those persons to whom it
is necessary for the fulfillment of their duties. Persons are not
entitled to have access to classified matter solely by virtue of their
status or office. It is a requirement that the dissemination of
classified matters be limited strictly to persons whose official duty
requires knowledge or possession thereof.
 Certificated of Destruction is the certification by a witnessing officer
that the classified matters describe therein has been disposed of in
his presence, approved destruction methods.
 1. Trade Secrets- this consist of any formula, pattern, device or
compilation of information which is used in one’s business and which gives
him an opportunity to gain an advantage over competitors who do not know
or us e it. It may be a formula for a chemical compound a process of
manufacturing, treating or preserving materials, a pattern for machine or
device, or a list of customers. It differs from other secret information as to
single or ephemeral events. A trade secret is a process or device for
continuous use in the protection of the business.
 2. Patents- this is a grant made by the government to an inventor,
conveying or securing to him the exclusive right to make, use, or sell his
invention for term of years.
What is a Risk?
It is the potential damage or loss of an asset.
The level of risk is a combination of two
factors: The value placed on that asset by its
owner and the consequence, impact adverse
effect of the loss or damage to that asset and;
the likelihood that a specific vulnerability will
be exploited by a particular threat.
What is Risk Management?
It is a process of selecting and implementing
security countermeasures to achieve an
acceptable level of risk at an acceptable cost.
What is Risk Analysis?
It is the analysis of risk include examinations of
the vulnerability, probability and criticality of
potential threats and include natural and man
made risk
What is a Security Survey?

 Itis an estimate of the security standards of a unit, and is


conducted to enable the responsible officer to recognize and
evaluate security hazards and determine protective measures
necessary to the prevention of sabotage, espionage, subversive
activities and other criminal acts inimical towards the interest
and/or mission of the unit and/or command.
 What is Security Inspection?
 Itis a check of how well existing security measures and
regulations are being carried out within a command. A
security inspection may also include an investigation of
alleged or suspected security violations. Physical security is
concerned with forces, entrances and exists, guards, traffic
control, lighting, fire control, and with such other physical
measures, which, if properly established and maintained,
will deny access to, unauthorized persons.

You might also like