Fundamentals of Industrial Security Management

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 40

Overview

In this module, the general concept of the need for the security, the basic Principles of Industrial
Security Management, the types of security applied in modern industries and enterprises, the major division of
security, and the development of Industrial security in the Philippines will be included.

INTRODUCTORY MESSAGE

To the Learner:

This module was designed provide you with the most essential learning outcomes necessary for the
subject Introduction to Industrial Security and Concept as well as interactive tasks to further develop your joy in
learning as we achieve together the desired learning outcomes prescribed by the Commission on Higher
Education. With the different activities provided in this module, may you find this material engaging and
challenging as it develops your critical – thinking skills.

What I Expected to Learn

In this part of the module you are going to study, understand, and comprehend the meaning of security
and its history of security, gain an overview of the different types of security.

Module 1
FUNDAMENTALS OF INDUSTRIAL SECURITY MANAGEMENT

LESSON 1

SECURITY IN GENERAL

Laws Related to Security Management

a. R.A. 5487- Private Security Agency Law (June 13, 1967)


b. R.A. 6975- The law authorizing the PNP the control and supervision of the security agencies in the
Philippines. (December 13, 1990)

Related Government and Private Agencies


a. PNPSAGSD (Philippine National Police Security Agency Guard and Supervisory Division)
b. PNPSOSIA (Philippine National Police Supervisory Office for Security and Investigative
Agencies)- unit in the PNP in charges in the supervision, direction and control of all agencies in
the country.
c. PADPAO (Philippine Association of Detective and Protective Agency Operators Inc.) authorized
to issue implementing rules and issues pertaining to R.A. 5487.
d. FEO- (Firearms and Explosives Office) – issuance of license of firearms to security agencies.
e. SEC (Security Exchange Commission) – registration of security business.
f. DTI (Department of Trade and Industry) – registration of security trade name.
g. SAGSD-SCG (Security Agency Guard and Supervision Division-Civil Security Group)
application of license to exercise profession as security guard.

Progress Check
Read and analyze carefully the statement or question before answering. Your answers shall be
based from the lesson’s discussion.

_____1. PNPSAGSD is known as?


a. Philippine Nation Police Security Agencies Guard and Supervisory Division
b. Philippine National Police Security Agency Guard and Supervisory Division
c. Philippine National Policy Security Agency Guard and Supervisory Division

1
_____2. PADPAO is known as?
a. Philippines Association of Detective of Protective Agency Operators Inc.
b. Philippine Association of Detective and Protective Agency Operators Inc.
c. Philippine Association and Detectiv and Protective Agency Operators Inc.
_____3. A unit in the PNP in charges in the supervision, direction and control of all agencies in the country.
a. PNPSOSIA
b. Philippine National Police Supervisor Office for Security and Investigative Agencies
c. All of the Above
_____4. The law authorizing the PNP the control and supervision of the security agencies in the Philippines.
a. R.A. 6975
b. R.A. 9675
c. R.A. 6957
_____5. Agencies that are responsible for the registration of security business.
a. SEC
b. Security Exchange Commission
c. All of the Above

LESSON 2

HISTORICAL BACKGROUND AND LEGAL BASES OF INDUSTRIAL SECURITY IN THE


PHILIPPINES

Origin of Security

Vigiles- soldiers assigned to guard the City of Rome. They are the night watchmen.

Nicknames- rent-a-cops, toy cops, imitation bacon, blue army, entrance decors, poste ng Beneco.

LEGAL BASIS OF INDUSTRIAL SECURITY IN THE PHILIPPINES

1. Natural Authority

a. The highest law is the law of self-preservation. By instinct man, man naturally reacts in order
to protect himself, his family, his honor, freedom, liberty and property from danger, threat or
hazard. He does it personally or thru the help of others.

2. Constitutional Authority
a. The prime duty of the Government is to serve and protect the people. The Government may
call upon the people to defend the state and, in the fulfillment thereof, all citizens may be
required, under conditions provided by law, or to render personal military service. (Art. II Sec
4 of the 1987 Philippine Constitution.
b. No person shall be deprived of life, liberty of property without due process of law, nor shall
any person be denied the equal protection of the law. ( Art. III Sec. I of the 1987 Philippine
Constitution)
c. Private Property shall not be taken for public use without just compensation. (Art. III Sec. 9
of the 1987 Philippine Constitutions.
d. The right of the people to be secured in their persons, houses, papers, and effects against
unreasonable searches and seizure of whatever nature and for any warrant of arrest of arrest
shall be issued except upon examination under oath or affirmation of the complaint and the
witnesses he may produce, and particularly describing the place to be searched and the
persons or things to be seized (Art III Sec. 2 of the 1987 Philippine Constitutions.

3. Statutory Authority
a. The Revised Penal Code (Act No. 3815, as amended )

Private Security Agency Law ( Republic Act 5487 amended)

2
Module 2
PHYSICAL SECURITY

Overview

The various types of physical security will be discussed in this module alongside with barriers that are
placed between the potential intruders and the matter to be protected

LESSON 1

PHYSICAL SECURITY

Physical Security – is the broadest branch of security which is actually a system of barriers placed between
potential intruders and matters to be protected. It is the concerned with the physical measured adopted to prevent
unauthorized access to equipment, facilities, materials, and documents, and to safeguard them against espionage,
sabotage, damage and theft.

Principles of Physical security


1. Enemy Agents Must Access-Acquisition of information is the ultimate results, and the means and the
form in which the information is obtained.
2. There is NO Penetration Barrier- for the unfriendly government or organization, they are willing to
devote enough time, money, personnel, material and imagination in passing barriers.
3. Defense in Depth- means barrier after barrier.
4. Surreptitious VS Non-Surreptitious Entry -
Surreptitious- Non observable entry.
Non-Surreptitious – observable entry.
Barriers – refers to any physical structure whether natural or man made capable of restricting, deterring,
delaying or preventing illegal and unauthorized access to an installation.

General Types of Physical Security


1. Natural Barriers – they are offered by nature which could obstruct or delay the passage way of potential
intruders. Like high cliff, canyon, desert, or bodies of water.
2. Man-Made Barriers – these are structural constructions like fence, floors, roofs, walls, or other physical
means to deter or impede penetration.
Specific Types of Physical Security Barriers
1. Natural Barriers – (high cliff, canyon, desert, or bodies of water)
2. Structural Barriers – (fence, floors, roofs, walls)
3. Human Barriers – (guards, charges of quarters, shop workers)
4. Animal Barriers – (usually shepherd dogs trained for and used as guard)
5. Energy Barriers – (protective lighting and anti-intrusion devices)
Levels of Physical Security
1. Minimum Security – designed to impede unauthorized external activity such as simple intrusion to
armed attack.
2. Low Level Security – is a system designed to impede and detect unauthorized external activity such as
on small retail store, storage warehouses.
3. Medium Security – designed to impede, detect and assess most unauthorized external and internal
activity that range from simple shoplifting to conspiracy to commit sabotage.
4. High Level Security – designed to impede, detect and assess most unauthorized external and internal
activities of certain prison, defense contractors, pharmaceutical companies, etc. This include the
utilization of the ff.:
 Close Circuit Television (CCTV)
 Perimeter Alarm System
 High Trained Armed Guard
 Control Designs
 Coordination with local law enforcement agencies.
5. Maximum Security includes the application of the following:

3
 Sophisticated alarm system
 On-site response force

Matching Type ( 2 points each )

1. Concerned with the physical measured a. CCTV


adopted to prevent unauthorized access to
equipment, facilities, and to safeguard them b. Control Designs
against espionage, sabotage, damage and theft.

2. Observable entry. C. Physical Security

3. Fence, floors, roofs, walls d. Non-Surreptitious

4. A system designed to impede and detect unauthorized e. Structural Barriers


external activity such as on small retail store, storage
warehouses.
f. Low Level Security
5. Best example of Energy Barrier

LESSON 2

PERIMETER BARRIER

Perimeter Barrier
Perimeter barrier is a medium of structure which defines the physical limits of an installations or area
to restrict or impede access thereto. It is any physical barrier used to supplement the protection of an inside or
outside perimeter.

Line of Physical Defense


1. First Line – include all perimeter barrier.
2. Second Line – includes the building exterior.
3. Third Line – includes those internal control measures.
Perimeter barriers Opening
In determining the appropriate perimeter barriers, security managers should not overlook the necessity
of monitoring perimeter openings that could be used by intruders.
1. Gates and doors
2. Windows
3. Sidewalks elevators
4. Utilities opening
5. Clear zone

Types of Perimeter Barriers


1. Fences – are independent structures designed to control physical and visual access between outside
areas.
Type of Fences
a. Solid fence-made of opaque material in such a way that visual access through the fence structure is
denied.
b. Full view fence – is constructed in such a manner that visual access is permitted such as wire
fence, through the fence structure.
c. Wire fence – is made of chain link, barbed wire concertina design with small opening not larger
than 2 square inches.
2. Building walls – include walls, floors, roofs or their combination to serve also as barriers that they
should be of such constructions to provide uniform protection just like wire-fencing.
3. Bodies of water – like rivers, lake, cataract, sea pond, or any bodies of water forming part of the wall,
building or fencing should not be considered an adequate perimeter barrier.
Additional Protective Measures
1. Top guard
2. Guard control station

4
3. Towers or Guard towers
4. Signs and notices or Control Signs
Perimeter Guards
1. Fixed post – security guards are assigned in a particular place of the compound to guard and watch the
area surrounding.
2. Patrol (Roving) – the security guard is required to walk and go around regularly around the company
premises.

EXERCISES

Analyze and understand each question before answering. Write the correct answer on the space provided.

__________ 1. It is made of opaque material in such a way that visual access through the fence structure is
denied.
__________ 2. It includes walls, floors, roofs or their combination to serve also as barriers that they should be
of such constructions to provide uniform protection just like wire-fencing.
__________ 3. The security guard is required to walk and go around regularly around the company premises.
__________ 4. It is any physical barrier used to supplement the protection of an inside or outside perimeter.
__________ 5. The security guards are assigned in a particular place of the compound to guard and watch the
area surrounding.
__________ 6. It is constructed in such a manner that visual access is permitted such as wire fence, through the
fence structure.
__________ 7. is made of chain link, barbed wire concertina design with small opening not larger than 2 square
inches.
__________ 8. Windows are example of?
__________ 9. A structure which defines the physical limits of an installations or area to restrict or impede
access.
__________ 10. They are assigned to watched the area surroundings.

LESSON 3

SECURITY LIGHTING / PROTECTIVE LIGHTING

Protective Lighting
Protective lighting provides a means of continuing illumination during hours of darkness, a degree of
protection that is maintained during daylight hours.

Types of Protective Lighting


1. Continuous lighting
2. Standby Lighting
3. Movable or portable lighting
4. Emergency lighting
General Types of Lighting Sources
1. Incandescent lamp
2. Mercury vapor lamp
3. Metal halide
4. Fluorescent
5. High pressure vapor
Types of Lighting Equipment
1. Floodlights
2. Street lights
3. Search lights
4. Fresnel lights (light house)

TYPES OF SECURITY LIGHTNINGS

1. Stationary Luminary (Continuous ) – most common type consisting of services of fixed luminous to
flood a given area continuously with overlap. It may either be:

5
a. Glare – projection type – the intensity is focused to intruder while the observer or guard remains in
the comparative darkness. The lightning is toward the approach. Of an entrance to an installation.
Lights with reflectors increase glare.
b. Controlled lightning – the width of the lighted- atop can be controlled and adjusted to suit the
security needs. The lightning is focused; sag, on a pile of items rather than on the background .

2. Stand – by Lightning- similar to continuously lightning but in turned on manually or by special device
or other automatic means, when there is suspicion of entry.
3. Movable Lightning – consists of stationary or portable, manually operated search lights which may be
lighted continuously during hours of darkness or only as needed, and usually supplementary to either of
the first 2 types.
4. Emergency Lightning – a stand by lightning which can be utilized in the event of electrical failure,
either due to local equipment or commercial power failure.

GENERAL TYPES OF LIGHTNING SOURCES

1. Incandescent lights have low initial cost and provide good color rendition.
2. Mercury Vapor lamps emit a purplish- white color caused by an electric current passing through a
tube of conducting a luminous gas. Considered more efficient and is widespread in exterior
lightning.
3. Metal Halide is similar in physical appearance to mercury vapor but provides a light source of
higher luminous efficiency and better color rendition.
4. Fluorescent Lamp provides good color rendition. However, it cannot project light over long
distances; thus, it is not desirable as flood type lights.
5. High – pressure Sodium Vapor is introduced in 1965, for exterior lightning of parking areas,
roadways, building, and industrial and commercial installation. It emits golden white to pink color.
6. Low pressure Sodium Vapor produces yellow color.
7. Quartz Lamps produce very bright light.

TYPES OF LIGHTNING EQUIPMENT

1. Floodlights are used for outdoor security lightning including the illumination of boundaries,
fences, and buildings.
2. Street lights produce diffused light rather than directional beam. They are widely used in parking
area.
3. Searchlights are incandescent lights that provide a type of crime-related lightning system.

LIGHTNING APPLICATIONS/LIGHTNING SYSTEMS

1. Fenced Perimeter Lightning is used to illuminate the fence itself and the area beyond it (“the
detection zone”). Its objective is to reveal an intruder’s approach and produce glare towards him,
thus reducing his ability to see in the site. However, it can be difficult to apply because it may
create nuisance or hazards.
2. Area Lightning is used in a building face perimeters consists of faces of buildings on or within 20.
Ft of the property or area line to be protected and where the public may approach the building.
Guards may be stationed inside or outside of the building. Doorways or other insets in the
buildings face should receive special attention for lightning to eliminate shadows.
3. Flood Lightning is used to cast a strong light on the walls of buildings so that intruders are visible
either in silhouette (outline) or by the shadows which they cast.

6
4. Gate House Lightning is installed on active entrances for pedestrians and vehicles to facilitate
complete inspection of passengers, cars, trucks, and freight cars as well as their contents and
passengers.

Topping-up Lightning is used to illuminate dark areas not adequately lit by area or flood lightning. Areas and
structures within the installation property lines consists of yards, storage spaces, large open working areas, piers,
docks, and other sensitive area and structures.

LESSON 4

PROTECTIVE ALARMS

Protective Alarms

Definition of Terminologies
Alarm – (signal) is synonymous to warning of imminent danger.

Protective alarms – assist the security in detecting, impeding or deterring potential security threat in the
installation. To alert the security the personnel for any attempt of intrusion into a protected area, building or
compound.
Enunciator – is a visual or audible signaling device, which initiates condition of associated circuits.

Types of Alarm Detection System


1. Central Station System – a type of protective alarm system where the central station system is located
outside the installation.
2. Proprietary System – this functions in the same way as the central system except that is owned and
leased by the subscribers, and operated and located in the facility.
3. Local Alarm System – consist of rigging up a visual or audible alarm near the object to be protected, a
bell or light indicates an attempted or successful intrusion.
4. Auxiliary Alarm System – in this system installation circuits are led into local police or fire department
by leased telephone lines usually by special arrangement.
5. Local Alarm- By-Chance System – this is a local alarm system in which a bell or siren is sounded with
no predictable response.
6. Dial Alarm System – this system is a set to dial a predestined number when the alarm is activated.
Kinds of Alarm
1. Audio detection device
2. Vibration detection device
3. Metallic foil or wire
4. Photoelectric or electric eye device
Basic Parts of Alarm System
1. Sensor or trigger device
2. Transmission line
3. Enunciator/annunciator

EXERCISES

Before answering this exercises, make sure that you read and analyze all those topics above.
Write the correct answer on the space provided. (IDENTIFICATION)

__________ 1. It is located outside the installation.


__________ 2. It is located in the facility.
__________ 3. An alarm system in which a bell or siren is sounded with no predictable response.
__________ 4. It is to warn of imminent danger.
__________ 5. Visual or audible alarm near the object to be protected.
__________ 6. This system is a set to dial a predestined number when the alarm is activated.
__________ 7. An audible signaling device, which initiates condition of associated circuits.
__________ 8. It is to alert the security the personnel for any attempt of intrusion into a protected area, building
or compound.

7
__________ 9. A security device fitted to property, especially a house or car, to make warning sound if a break-
in or theft is attempted.
__________ 10. The sound made by a security or warning device.

LESSON 5

FIRE ALARM SYSTEM

Fire Alarm System


Fire alarms are those devices installed to help detects fire or detect anything that causes fire such as
smoke or unusual rising of temperature.

Fire Protection System


1. Automatic Sprinkling System – an integrated network of hydraulically designed piping installed in
a building, structure or area with outlet arranged in a systematic pattern which automatically
discharges water when activated by heat or combustion products from the fire.
a. Automatic Sprinkler
b. Wet Pipe System
c. Dry Pipe System
2. Fire Pumps – are mechanical device of supplying water can be manual or motor driven.
3. Standpipes – are galvanized Iron (GI) steel or plastic pipes located inside the building from the
lowest to the top floor with water under pressure for use in case of fire.
4. Fire Hydrant – is a mechanical device strategically located in an installation or street where fire
hose is connected so that water with pressure will be available to extinguish a fire.
5. Portable Hand Extinguisher – this is a fire fighting equipment which can be portable or in the cart
that is used to put out fire depending on the contents to extinguish certain types of fire as class A to
D.

Fire Detection System – this system provides sensors in fire-prone areas in a building whereby smoke or heat
will actuate these strategically located sensors or automatic fire detectors so that alarm is automatically sounded
warning the employees and summoning firefighting units.

Smoke Detectors
1. Ionization Device or Radio-active device – this contains a small radioactive source of ionizing the air
molecules between a pair of electrodes, permitting a very small current to flow between the pair. It can
also detect the invisible and poisonous gases in a fire long before visible smoke, flames and elevated
temperatures can be detected.
2. Smoke Detector – this uses a photoelectric cell. This can be rub by batteries or by building current.

EXERCISES – read the direction carefully.


Based from the lesson’s discussion, answer the following by writing the corresponding capital letter of
your answer.

_____ 1. A mechanical device of supplying water can be manual or motor driven.


a. Fire Pumps
b. Fire Hydrant
c. Portable Hand Extinguisher
_____ 2. It can also detect the invisible and poisonous gases in a fire long before visible smoke, flames and
elevated temperatures can be detected.
a. Smoke Detector
b. Radio-active device
c. Fire Detection System
_____ 3. It provides sensors in fire-prone areas in a building whereby smoke or heat will actuate these
strategically located sensors or automatic fire detectors so that alarm is automatically sounded warning the
employees and summoning firefighting units.
a. Fire Detection System
b. Smoke Detector

8
c. Detector
_____ 4. A devices installed to help detects fire or detect anything that causes fire such as smoke or unusual
rising of temperature
a. Fire Detection System
b. Smoke Detector
c. Fire Alarm System
_____ 5. This can be rub by batteries or by building current.
a. Fire Detection System
b. Smoke Detector
c. Fire Alarm System

LESSON 6

PROTECTIVE LOCKS AND KEY CONTROL AND PROTECTIVE CABINET

Definition of Terminologies
1. Lock – a mechanical, electrical, hydraulic or electronic device to prevent entry into a building room,
container or hiding place and to prevent the removal of items without the consent of the owner.
2. Key – may defined as:
a. Instrument of locking and unlocking: a metal bar with notches or grooves that, when inserted into
a lock and turned, operates the lock’s mechanism; or
b. Door or lock opener: a device such as plastic card with an encoded magnetic strip that operates a
door or lock.
3. Padlock – a potable and detachable lock having a sliding hasp which passes through a staple ring or the
like and is then made fast and secured.
4. Peterman – an English term used to describe a lock picker.
Types of Locks
1. Padlocks – a potable and detachable lock having a sliding hasp which passes through a staple ring or
the like and is then made fast and secured.
2. Combination Lock – are difficult to defeat, since they cannot pick because few experts can manipulate
the device to discover the combination. Most of this locks have three dials, which must be aligned in
the proper order before the lock will open.
3. Code Operated Locks – are combination type-locks and that no key used.
4. Electromagnetic Locks – are devices holding a door by magnetism. These are electrical units consisting
of the electromagnetic on metal holding sequence.
5. Card Operated Lock – are electronically or more usually magnetic. Code card, notched embossed or
containing an embedded patter of copper locks are used to operate such locks.
Types of Keys
1. Change Key – is a specific key, which operates the lock and has a particular combination of cuts, or
batting, which match the tumblers of the tumblers in the lock.
2. Sub-Master Key – is the key that could open all the lock within a particular area or grouping in a
particular facility.
3. Master Key – is a special key that is capable of opening a series of locks.
4. Grand Master Key – is a type of key that will open everything in a system involving two or more
master key groups.

Protective Containers
This is done by placing documents in a secured and usually fire proof container. The final line of
defense at any facility is in the high security storage where papers, records, plans or cashable instrument,
precious metals or other especially valuable assets and protected.
1. Safe – it is a metallic container used for the safekeeping of documents or small items in an office or
installation. Safe can be classified as either robbery or burglary resistance depending upon the use and
need.
2. Vault – this is a heavily constructed fire and burglar resistance container usually a part of the building
structure used to keep and protect cash, documents and negotiable instruments. Vaults are bigger than
safe but smaller than the security file room.
3. File Room – it is a cubicle in a building constructed a little lighter than a vault but bigger size to
accommodate limited people to work on the records inside.

9
Progress Check

Based from the lesson’s discussion, answer the following by writing the corresponding capital letter of
your answer. (2 points each)

Multiple Choice

_____ 1. A protective container that is bigger than safe but smaller than the security file room.
A. Box
B. Vualt
C. Vault
_____ 2 It is a cubicle in a building constructed a little lighter than a vault but bigger size to accommodate
limited people to work on the records inside.
A. Safe
B. Vault
C. File Room
_____ 3. The key that will open everything in a system involving two or more master key groups.
A. Master Key
B. Sub-Master Key
C. Grand Master Key
_____ 4. He is also known as lock picker.
A. Peterman
B. Peterpan
C. Petermam
_____ 5. It is a metallic container used for the safekeeping of documents or small items in an office or
installation.
A. Safe
B. Vault
C. File Room

Identification. Write your answer in caps lock.

__________ 1. A device such as plastic card with an encoded magnetic strip that operates a door or lock.
__________ 2. a potable and detachable lock having a sliding hasp which passes through a staple ring or the like
and is then made fast and secured.
__________ 3. An instrument used for locking and unlocking.
__________ 4. It is a lock that no key used.
__________ 5. A device holding a door by magnetism.

10
Module 3

SECURITY GUARD FORCES

Overview
The various type of security guard forces will be emphases of this module. Relative provisions of R.A.
5487 will also be included particularly on the qualifications and paraphernalia of security personnel.

LESSON 1

SECURITY GUARD FORCES

SECURITY GUARD FORCES

1. Private Security Agency (PSA) refers to any person, association, partnership, firm or private
corporation, who contracts, recruits, trains, furnishes or post any security guard, to do its functions or
private, public or government-owned or controlled corporation to engage his/its service or those of
his/its security guards, for hire, commission or compensation.
2. Company Security Force (CSF) is a security force maintained and operated by any private company or
corporation for its own security requirements only.
3. Government Security Unit (GSU) is a security unit maintained and operate by any government entity
other than military and a police, which is established and maintained for the purpose of securing the
office or compound and/or extension of such government entity.

THE PHILIPPINE ASSOCIATION OF DETECTIVE AND PROTECTIVE AGENCY OPERATORS,


INC (PADPAO) – This is the national association of all licensed security agencies and company security
forces. This was established as early 1958 purposely for the self-regulation of all security agencies.

LICENCE TO OPERATE (LTO) is the document issued by the CPNP or his duly authorized representative
authorizing a person to engage in occupation, calling or employment as security guard or detectives, or a
juridical person to establish, engage, direct, manage or operate an individual or a private detective agency or
private security agency/company security force after payment of the prescribed dues or fees.

1. Application of License. New applicants for PSA license shall obtain:


a. A minimum capitalization of P1,000.000.00 only and
b. A minimum bank deposit of P500,000.00.
2. Where to file? To the Office of the CPNP thru the CPNP SOSIA (SAGSD) using form SAGSD form
01-94 and SAGSD Form 02-94 respectively.
3. Application Form for License to operate – The Application shall contain:
a. Full name of the applicant;
b. His age, civil status, and
c. Residence and location of his business.

Progress Check

Write a complete answer. Write your answer at the space provided. Your answer shall be based
on the lesson’s contents. (strictly no erasure)

__________ 1. An applicant for license to operate must at least have a minimum capitalization of?

11
a. 1,000,000 b. 1.000,000 c. 1,000,000.00 d. 100,000
__________ 2. What is Private Agency Law of the Philippines?
a. R.A. 5478 b. R.A. 5468 c. R.A. 5487 d. R.A. 7854
__________ 3. A security force maintained and operated by any private company or corporation for its own
security requirements only.
a. CSF b. CAB c. GSU d. PSA
__________ 4. LTO is stands for?
a. License to Operate b. Land Transportation Office c. Local to Operate d. None
__________ 5. They are established and maintained for the purpose of securing the office or compound and/or
extension of such government entity.
a. GSU b. GUS c. PSA d. CAB
__________ 6. This is the national association of all licensed security agencies and company security forces.
This was established as early 1958 purposely for the self-regulation of all security agencies.
a. PADPAO
b. THE PHILIPPINE ASSOCIATION OF DETECTIVE AND PROTECTIVE AGENCY OPERATORS,
INC
c. A and B
d. All of the above
__________ 7. Private Security Agency is refers to?
a. Any person, association, partnership, firm or private corporation, who contracts, recruits, trains,
furnishes or post any security guard, to do its functions or private, public or government-owned or
controlled corporation to engage his/its service or those of his/its security guards, for hire, commission
or compensation.
b. A security force maintained and operated by any private company or corporation for its own security
requirements only.
c. A security unit maintained and operate by any government entity other than military and a police,
which is established and maintained for the purpose of securing the office or compound and/or
extension of such government entity.
d. None of all
__________ 8. Government Security Unit is refers to?
a. Any person, association, partnership, firm or private corporation, who contracts, recruits, trains,
furnishes or post any security guard, to do its functions or private, public or government-owned or
controlled corporation to engage his/its service or those of his/its security guards, for hire, commission
or compensation.
b. A security force maintained and operated by any private company or corporation for its own security
requirements only.
c. A security unit maintained and operate by any government entity other than military and a police,
which is established and maintained for the purpose of securing the office or compound and/or
extension of such government entity.
d. None of all
__________ 9. Company Security Force is refers to?
a. Any person, association, partnership, firm or private corporation, who contracts, recruits, trains,
furnishes or post any security guard, to do its functions or private, public or government-owned or
controlled corporation to engage his/its service or those of his/its security guards, for hire, commission
or compensation.
b. A security force maintained and operated by any private company or corporation for its own security
requirements only.
c. A security unit maintained and operate by any government entity other than military and a police,
which is established and maintained for the purpose of securing the office or compound and/or
extension of such government entity.
d. None of all
__________ 10. The Application for License to Operate should contain the following EXCEPT?

12
a. Full name of the applicant;
b. His age, civil status,
c. Residence and location of his business.
d. Building

LESSON 2

SECURITY PERSONNEL QUALIFICATION, FIREARMS, EQUIPMENT and UNIFORM

DEFINITION OF TERMINOLOGIES

1. Person – This includes not only natural but also juridical persons such as single proprietorships,
partnerships, corporations, companies or associations, duly organized and registered with the securities
and Exchange Commissions and / or the Department of Trade and Industry.
2. Security Guard – Also known as private security guard or watchman shall include any person who
offer or renders personal services to watch or secure either a residence or business establishment or
both or buildings, compounds or areas, for hire or compensation or as employee of the national or local
goverments or agencies or instrumentalities thereof and of governmental buildings, compounds,
premises and other properties, other than members of AFP, BJMP, PNP or of any other law
enforcement agency of the government.
3. Private Detective refers to any person who does detective work for hire, reward or commission other
than members of the AFP, BJMP, provincial guards, PNP or any law enforcement agency of the
government.
4. License to Exercise Profession of License Certificate – The document issued by the CPNP or his duly
authorized representative recognizing a person to be qualified to perform his duties as security guard or
detective.
A. QUALIFICATIONS OF SECURITY GUARDS AND SECURITY OFFICERS
The minimum qualifications for security guards, security guards, security officers and security
consultants are stated below:

1. Basic requisites for security guards – No person shall be licensed as security guard unless he
possesses the
a. Filipino citizen;
b. High school graduate;
c. Physically and mentally fit;
d. At least 18 years old but not more than 50 years old;
e. Has undergone pre-licensing training course; and
f. Must not possess any pf the disqualifications.

2. Desirable Qualities of Security Guards – In addition to the minimum qualifications, security


guards must also possess the following:

a. Alertness – A good guard must be alert in spotting violators. This can be attained by being
watchful, dedicated and diligence.
b. Judgement – sound and good judgement is more than the use of common sense. It is the
arriving at wise and timely decision.
c. Confidence – it is the state of being sure; a state of the mind free from doubt or misgivings.
This attribute includes faith in one self and in his abilities, this is attained by the job
knowledge. Thorough and proper training plus good supervision installs confidence.
d. Physical fitness – security work is strenuous and demanding. Physical conditioning is essential
if he is to be a dependable guard.

13
e. Tactfulness – ability to take hold of oneself regardless of a provoking situation. With others
successfully without offending. In short, he can be a dependable guard.
f. Self control – ability to take hold of oneself regardless of a provoking situation. With self
control, the guard will di his work without being angry and situation will be on hand.
g. Interest, loyalty, responsible and trustworthy, is also important attributes of a reliable guard.
3. Exemptions from Pre-Licensing – The following need not undergo pre licensing training for
security gurads;
a. Veterans and retired or honorably discharged military / Police personnel possessing all the
qualification mentioned in the preceding section.

USE OF FIREARMS AND EQUIPMENT

1. Possession of Fire arms (FA) by PSA – After complying all the requirements, PSAs are entitled to
possess firearms of any of the following:

a. Shotguns, not higher than 12 gauge;


b. Low-power rifle or revolvers, cal..22;
c. Cal .38 pistols or revolvers not exceeding one (1) FA for every two(2) security guard in its
employ.
d. Minimum number of firearms.

14
1.) PSA with 100 guards – at least 30 pieces of licensed firearms. However, after operating 6
mos., the PSA can procure firearms in proportion to the number of posted guards.
2.) For regular License to Operate (LTO) application – at least 70 pieces of firearms .
3.) Use of firearms for Private Detective Agency shall be OPTIONAL.

2. Restriction to possess certain caliber of firearms – The total number of the prescribed high-powered
firearms shall not exceed ten (10) percent of the total numbers of guards employed. Private Security
Agencies are not carbine; M16; Cal 45; center fire magnum cal. 41 and PSA/CSF is operating in
areas where there is an upsurge of lawlessness and criminality. Exception is granted by CPNP or
Regional Director of Regional Police Office under the following conditions:

a. Acquisition of the high powered Firearms shall be at expense of the PSA/CSF concerned;
b. Before the firearms are issued, the same should be registered with the PNP-FED; and
c. The security personnel who will use such firearms shall first be given adequate training in the care
and use thereof which will be under the supervision of qualified officers and men of the PNP.

3. Limitation in the carrying of firearms – The issued firearm shall be carried only by the security guard
(SG):
a. During his tour of duty when in proper uniform within the compound of the establishment, where
he is assigned; and
b. Except, when he is escorting big amount of cash or valuables and upon prior coordination with the
nearest PNP unit/stations.

4. Duty Detail Order of DDO – Private Security Agencies or Company Security Forces detailing security
personnel on duties under the circumstances mentioned in the preceding section or while escorting big
amount of cash or valuable outside its jurisdiction or area of operation, shall issue an appropriate DDO
using SAGSD Form No. 12-94.

5. Confiscation of firearms – Firearms could be confiscated when the it is:

a. About to be used in the commission of a crime;


b. Actually being used in the commission of crime;
c. Has just been used in the commission of a crime;
d. Is being carried by the SG is unlicensed or not authorized by law and regulation for his use;
e. Confiscated by order of the court.
f. Used or carried outside the AOR of the SG without proper authority; or
g. The SG is unlicensed.

6. Disposition of confiscated Firearms – The law enforcement officer who confiscated the FA shall
inform the CPNP through CSG within 24hours after such confiscation.

a. The firearm shall be turned over immediately to the nearest PNP Unit / Station who shall
immediately turn over the same to the CSG District Office.
b. When the confiscation is by order of the court, the same shall be turned over to the court
concerned.
7. Filling s outside NCR in accordance with the firearms laws and implementing executive orders and
regulations. In addition, the following shall be submitted:
a. Duly approved LTO;
b. Certification of safety vault ownership as prescribed by the Chief, Firearm and Explosive
Division or CFED;
c. P40.00 surety bond per firearm to be deposited through the PNB and a FA certificate of
deposit shall be secured pursuant to Sec. 887 of the Revised Administrative Code (RAC); and

15
d. Sworn Statement of the manager or operator of the Agency that its security personnel shall be
required by management to undertake the following in case of impending or actual strike:
1) To report to the CPNP or nearest police station such impending strike;
2) To exercise necessary diligence in the collection and safekeeping of FAs to include
safety vaults to prevent the use of the FA in the furtherance of the strike;
3) To insure the all FAs and ammunitions in the possession of all striking security
personnel of the agency are immediately collected and security in the safety vaults
under the control of the agency; and
4) To assume responsibility in the proper handling of FAs in order to prevent misuse of
same or that no non-members shall be allowed to hold said FAs issued or licensed in
favor of the Agency.
8. Revocation of license to possess FAs – Reason of revocation:
a. Failure to submit any issued FA for verification as required by Sec. 879 of RAC;
b. Carrying of FAs by security personnel w/out appropriate DDO;
c. When its serial number (SN) is duplicated or using the SN for more than one firearm (FA);
d. Carrying of FAs outside the place stated in the permit as required by E.O. or carrying FA in
places prohibited under the law;
e. Conviction of the operator of manager of the agency of any crime involving moral turpitude;
or
f. When the firearm was reported lost.
9. Illegal possession of firearms – no security guard or private detective shall use unlicensed FAs in the
performance of his duty, nor be allowed to use with duplicated serial numbers (SNs).
10. Stocking of ammunition – it shall be on a limited and reasonable quantity that suits the need of the
Agency and be subjected to regular inspection by representative of the CPNP.
11. Its shall not exceed fifty (50) rounds of ammunitions per unit of duly licensed FAs.
12. Individual issues to security guard shall be limited to twenty – five (25) rounds per SG.
13. Use of VHF/UHF handheld radios – optional on the part of management of the agency / company
depending on the prevailing situation provided that such equipment is properly registered in accordance
with the existing law.

2 points each

_____1. No security guard or private detective shall use unlicensed FAs in the performance of his duty, but be
allowed to use with duplicated serial numbers (SNs). This statement is?
A. True b. False c. Maybe d. NONE
_____ 2. The failure to submit any issued FA for verification as required by Sec. 879 of RAC, the license shall
automatically have confiscated. This statement is?
A. True b. False c. Maybe d. NONE
_____ 3. The law enforcement officer who confiscated the FA shall not inform the CPNP through CSG within
24hours after such confiscation. This statement is?
A. True b. False c. Maybe d. NONE
_____ 4. The individual issues to security guard shall be limited to twenty – five (25) rounds per SG. This
statement is?
A. True b. False c. Maybe d. NONE
_____ 5. Mandatory on the part of management of the agency / company depending on the prevailing situation
provided that such equipment is properly registered in accordance with the existing law. This statement is?
A. True b. False c. Maybe d. NONE
_____ 6. The ability to take hold of oneself regardless of a provoking situation.
a. Tactfulness b. Snappy c. Physical Fitness d. Self-control
_____ 7. This attribute includes faith in one self and in his abilities, this is attained by the job knowledge.
a. Confidence b. Judgement c. Alertness d. None
_____ 8. This can be attained by being watchful, dedicated and diligence.

16
a. Alertness b. Judgement c. Confidence d. all of the above

_____ 9. Firearms could be confiscated when it is?

a. Is being carried by the GC is unlicensed or not authorized by law and regulation for his use;
b. Confiscated by order of the office.
c. Used or carried outside the ROA of the SG without proper authority; or
d. The SG is unlicensed.

_____ 10. Revocation of license to possess Fas when it is?

a. Failure to submit any issued FA for verification as required by Sec. 978 of RAC.
b. Carrying of FAs by security personnel w/out appropriate BDO.
c. When its serial number (SN) is duplicated or using the NS for more than one firearm (FA).
d. Carrying of FAs outside the place stated in the permit as required by E.O. or carrying FA in
places prohibited under the law.

LESSON 3

RANK AND POSITION

The organization of private security agencies, company guard forces, and government security units are
patterned from the organizational structures of the PNP and the AFP. Hence security officers and personnel too
are distinguished by means of ranks and position.

The ranks and positions described in this lesson are in accordance with Sec. 1, Rule VII of R.A. 5487.
It is mandated that the security agency operator or owner must observe the required major ranks and positions in
the organization of the agency.

1. Security Management Staff

a. Security Director (SD) - Agency Manager / Chief Security Officer.


b. Security Executive Director (SED) – Asst. Agency Manager / asst. Chief
Security Officer.
c. Security Staff Director (SSD) – Staff Director for Operation and Staff Director
(SSD) – Staff Director for Administration

2. Line Leadership Staff

a. Security Supervisor 3 – Detachment Commanders


b. Security Supervisor 2 – Chief inspector
c. Security Supervisor 1 – Inspector

3. Security Guard

a. Security Guard 1 – watchman / guard


b. Security Guard 2 - Shift in charge
c. Security Guard 1 – Post in-charge

4. Security Consultant is optional but must possess all qualification listed in Sec.6, Rule III
of R.A. 5487.

A. STAFFING AND JOB DESCRIPTION

17
The structure of the PSA, CSF, and GSU also follows a vertical line staff model. The pattern
of staffing and their respective job descriptions are based on Sec. 2, Rule Vll of R.A. 5487.

1. Security Management Staff


a. Agency manager/Chief Security Officer. He is responsible for the entire operation and administration /
management of the security agency and directly responsible to the agency operator/owner/Board of
Directors.
b. Assistant Agency Manager assist the agency manager and takes the operational and administrative
management when the manager is absent.
c. Security Staff Director for Operation – The staff assistant for the efficient operation of agency. It includes
canvassing of clientele and the implementation of contract and agreement – He is also responsible for the
professionalization of the personnel. Procurement/recruitment, confirming of awards, mobility and issuance
of Firearms.

2. Line Leadership Staff

a. The Detachment Commander – The field or area commander of the Agency.


Detachment shall consist of several posts.
b. The chief Inspector – shall be responsible for inspecting the entire area covered by
the Detachment.
c. The Security Inspector – is responsible for the area assigned by the Chief Inspector of
the Detachment Commander.

3. Security Guard

a. Security Guard 3 or The Post – in - charged – responsible for the entire detailed
security officer/personnel within a certain establishment.
b. Security Guard 2 or The Shift-in-Charge – is responsible for the security officers who
are scheduled in a certain shift for a particular period.
c. Security Guard 1 or The Security Guard (watchman/Guard) – The one actually
posted as watchman and or guard.

B. SPECIFIC DUTIES AND RESPONSIBILITIES

1. Office of the General Manager / Security Director

a. It is vested the authority and responsibility of running the security force by authority
of the President of the Company / Corporation.
b. He is directly responsible to the President of the Company / Corporation in the
Operations and administration of the security force.
c. He is principal adviser to the president on matters involving security operations,
administration of the security force.
d. He is the overall head of both various staff departments and fields units where he
may delegate corresponding authority commensurate to their assigned responsibility.
e. He implements policies promulgated by the policy making body and executed by the
President.
f. He directs controls and supervises all offices and field units of the force in their
respective assigned tasks.
g. He performs other functions a directed by the President of the Company /
Corporation.

2. Office of the Executive secretary of the General Manager.

18
a. He is the principal administrative assistant to the General Manager/Security
Director.
b. He prepares communications initiated by the General Manager/ Security Director.
c. He maintains records of scheduled conferences, appointments and other engagements
and advises the GYM/SD of such activities.
d. He records and checks outgoing communications signed by the GM/SD as to its
completeness (attachments to the considered) as well as to ensure the timely dispatch
to the addressee through the administrative section.
e. To perform other duties as directed by the General Manager (GM)/Security Director
(SD).

3. Office of the Assistant General Manager/Security Executive Director.

a. He takes the Operational and Administrative Management of the Security force in the
absence of GM/SD.
b. He is directly responsible to the GM/SD.
c. He performs other duties as directed by GM/SD.

4. Office of the Human Resources and Administrative Manager/Staff Director for Personnel
and Administration – He is the principal staff assistant to the General matters of activities
pertaining to personnel management and miscellaneous administrative functions such as:

a. Personnel Strengths
b. Replacement
c. Discipline, Law and Order
d. Morale and Personnel Services
e. Personnel Procedures
f. Interior Management
g. Personnel Adviser

5. Office of the Operations Manager/Staff Director for Operations – This office is the
Principal Staff on Operations, training, intelligence and investigation.

Office of the Finance – This office is principally concerned with budgeting, finance, reports control and
program review and analysis. Exercises supervision over the management engineering activities of the company
and the accounting office. Renders advice, assistance and guidance to GM/SD on financial management.
Specific duties and functions of the Finance office area.

Progress Check

Matching Type (2 points each)

1. This office is principally concerned with budgeting, finance, reports control and program review and
analysis.
a. Office of the Assistant General Manager/Security Executive Director
b. Office of the Finance
c. General Manager
d. Office of the General
e. Security Director
f. The chief Inspector
2. He performs other duties as directed by GM/SD.
a. Office of the Assistant General Manager/Security Executive Director
b. Office of the Finance

19
c. General Manager
d. Office of the General
e. Security Director
f. The chief Inspector
3. He implements policies promulgated by the policy making body and executed by the President.
a. Office of the Assistant General Manager/Security Executive Director
b. Office of the Finance
c. General Manager
d. Office of the General
e. Security Director
f. The chief Inspector
4. He is responsible for inspecting the entire area covered by the Detachment.
a. Office of the Assistant General Manager/Security Executive Director
b. Office of the Finance
c. General Manager
d. Office of the General
e. Security Director
f. The chief Inspector
5. He performs other functions a directed by the President of the Company / Corporation.
a. Office of the Assistant General Manager/Security Executive Director
b. Office of the Finance
c. General Manager
d. Office of the General
e. Security Director
f. The chief Inspector
6. Security Executive Director.
a. He takes the Operational and Administrative Management of the Security force in the absence
of GM/SD.
b. He is directly responsible to the GM/SD.
c. He performs other duties as directed by GM/SD.
d. All of the above
7. Office of the Human Resources and Administrative Manager/Staff Director for Personnel and
Administration his function ECXEPT?
a. Personnel Strengths
b. Replacement
c. Discipline, Law and Order
d. None of this
8. Office of the Executive secretary of the General Manager.
a. He is the principal administrative assistant to the General Manager/Security Director.
b. He prepares communications initiated by the General Manager/ Security Director.
c. He maintains records of scheduled conferences, appointments and other engagements and
advises the GYM/SD of such activities.
d. All of the above
9. Security Director.
a. It is vested the authority and responsibility of running the security force by authority of the
President of the Company / Corporation.
b. He is directly responsible to the President of the Company / Corporation in the Operations and
administration of the security force.
c. He is principal adviser to the president on matters involving security operations,
administration of the security force.
d. All of the above
10. Office of the Finance.

20
a. This office is principally concerned with budgeting, finance, reports control and program
review and analysis.
b. Exercises supervision over the management engineering activities of the company and the
accounting office.
c. Renders advice, assistance and guidance to GM/SD on financial management. Specific duties
and functions of the Finance office area.
d. None at all

LESSON 4
PROFESSIONAL CONDUCT AND ETHICS

SECTION 1. Security Guard Creed, Code of Ethics, and Code of Conduct.- All members of the private security
agency and private detective agency/company security force/government security unit duly licensed in
accordance with RA 5487, as amended, and its implementing rules and regulations shall strictly observe the
following:

A. SECURITY GUARDS CREED


As a security guard my fundamental duty is to protect lives and property and maintain order within my
place of duty; protect the interest of my employer and our clients and the security and stability of our
government and country without compromise and prejudice, honest in my action, words and thought; and do my
best to uphold the
principle: MAKADIOS, MAKABAYAN, MAKATAO at MAKAKALIKASAN.

B. ETHICAL STANDARD

a. As a security guard/detective his fundamental duty is to serve the interest or mission of his agency in
compliance with the contract entered into with clients or customers of the agency he is supposed to
serve;
b. He shall be honest in thoughts and deeds both in his personal and official actuations, obeying the laws of the
land and the regulations prescribed by his agency and those established by the company he is supposed to
protect;
c. He shall not reveal any confidential information confided to him as a security guard and such other matters
imposed upon him by law;
d. He shall act at all times with decorum and shall not permit personal feelings, prejudices and undue friendship
to influence his actuation while in the performance of his official functions;
e. He shall not compromise with criminals and other lawless elements to the prejudice of the customers or
clients and shall assist the government in its relentless drive against lawlessness and other forms of criminality;
f. He shall carry out his assigned duties as required by law to the best of his ability and shall safeguard the life
and property of the establishment he is assigned to;
g. He shall wear his uniform, badge, patches and insignia properly as a symbol of public trust and confidence, as
an honest and trustworthy security guard and private detectives;
h. He shall keep his allegiance first to the government, then to the agency where he is employed and to the
establishment he is assigned to serve with loyalty and utmost dedication;
i. He shall diligently and progressively familiarize himself with the rules and regulations laid down by his
agency and those of the customers or clients;
j. He shall at all times be courteous, respectful and salute his superior officers, government officials and officials
of the establishment where he is assigned or the company he is supposed to serve;
k. He shall report for duty always in proper uniform and neat in his appearance; and
l. He shall learn at heart and strictly observe the laws and regulations governing the use of firearms.

C. CODE OF CONDUCT

21
a. He shall carry with him at all times during his tour of duty his license, identification card and duty detail order
with an authority to carry firearm;
b. He shall not use his license and other privileges if any, to the prejudice of the public, the client or customer
and his agency;
c. He shall not engage in any unnecessary conversation with anybody except in the discharge of his duties or sit
down unless required by the nature of his work and shall at all times keep himself alert during his tour of duty;
d. He shall refrain from reading newspapers, magazines, books, etc, while actually performing his duties;
e. He shall not drink any intoxicating liquor immediately before and during his tour of duty;
f. He shall know the location of the alarm box near his post and sound the alarm in case of fire or disorder.
g. He shall know how to operate any fire extinguisher at his post;
h. He shall know the location of the telephone and/or telephone number of the police precincts as well as the
telephone numbers of the fire stations in the locality;
i. He shall immediately notify the police in case of any sign of disorder, strike, riot or any serious violation of
the law;
j. He or his group of guards, shall not participate or integrate any disorder, strike, riot, or any serious violations
of the law;
k. He shall assist the police in the preservation and maintenance of peace and order and in the protection of life
and property having in mind that the nature of his responsibilities is similar to that of the latter.
l. He shall familiarize himself by heart with the Private Security Agency Law (RA 5487, as amended) and these
implementing rules and regulations;
m. When issued a FA she should not lend his FA s to anybody.
n. He shall always be in proper uniform and shall always carry with him his basic requirements, and
equipment’s such as writing notebook, ballpen, night stick (baton) and/or radio.
o. He shall endeavor at all times, to merit and be worthy of the trust and confidence of the agency he represents
and the client he serves.

GENERAL ORDERS OF SECURITY GUARDS

1. To take charge of this post and all company properties in view and to protect/preserve the  same with
utmost diligence.
2. To walk in an alert manner during my tour of duty, keeping always on the alert and observing
everything that takes place within sight or hearing.
3. To report all violations of orders I am instructed to enforce.
4. To relay all calls from posts more distant from the guard house than my own.
5. To quit my post only when properly relieved.
6. To receive, obey, and pass on to the relieving me all orders from company officers or officials,
supervisors, post-in-charge or shift leaders.
7. To talk to no one except in line of duty.
8. To give the alarm in the case of fire or disorder.
9. To call the superior officer in any case not covered by instructions.
10. To salute all company officials, superiors in the agency, ranking public officials and officers of the
Philippine National Police.
11. To be especially watchful at night and during the time for challenging, to challenge all persons on or
near my post, and to allow no one to pass or loiter without proper authority.

Progress check

Supply the missing word with the appropriate word.

1. To walk in an ______ manner during my tour of duty, keeping always on the alert and observing
everything that takes place within sight or hearing.
2. As a security guard my fundamental duty is to ______ lives and property and maintain order within
my place of duty; protect the interest of my employer and our clients and the security and stability of
our government and country without compromise and prejudice, honest in my action, words and
thought; and do my best to uphold the principle: ________, _______________, ______________ at
_________________.
3. He shall carry with him at all times during his tour of duty his license, identification card and duty
detail order with an ________ to carry firearm;
4. To talk to _________ one except in line of duty.

22
5. He shall learn at ___________ and strictly observe the laws and regulations governing the use of
firearms.
6. To receive, ___________, and pass on to the relieving me all orders from company officers or officials,
supervisors, post-in-charge or shift leaders.
7. He shall carry out his assigned duties as required by law to the best of his __________ and shall
safeguard the life and property of the establishment he is assigned to.
8. He shall not compromise with criminals and other lawless elements to the ___________ of the
customers or clients and shall assist the government in its relentless drive against lawlessness and other
forms of criminality.
9. To ______________ all company officials, superiors in the agency, ranking public officials and
officers of the Philippine National Police.
10. As a security guard/detective his fundamental duty is to ___________ the interest or mission of his
agency in compliance with the contract entered into with clients or customers of the agency he is
supposed to serve.

Module 4

PERSONNEL, DOCUMENT, and INFORMATION

Overview

The various system employed in securing company personnel, documents, information will be
highlighted. It will also include the different systems of classifying documents and information.

LESSON 1
PERSONNEL SECURITY

Definition: Personnel Security includes all the security measures designed to prevent unsuitable individuals or
persons of doubtful loyalty to the government, from gaining access to classified matter or to any security
facility, and to prevent appointment, or retention as employees of such individuals.

The Security “Chain”: Personnel security is the weakest link in the security “chain”. This weakness can best be
minimized or eliminated by making the personnel security conscious through good training program.

Control of Personnel
Access to “restricted Areas” can be partially controlled by fences, gates and other physical means, but
the individual working in the area is the key to bringing out of classified matter to unauthorized personnel.

23
Objectives of Personnel Security
1. To provide the standards and procedures necessary to insure the appointment, employment of retention
of suitable and loyal individuals.
2. To develop the necessary and proper security discipline among the applicants and employee as well as
protect and preserve the security interest in the organization.
3. Inculcate the desirable security attitudes and habits among the applicants and employees.

Basic Policies in Personnel Security


1. No person is entitled solely by virtue of his grade or position to knowledge or possession of classified
matter. Classified matter shall be entrusted only to those individuals whose official duties require such
knowledge or possession, and who have been granted the proper clearance.
2. All personnel whose duties require access to classified matter shall be subject to a security
investigation to determine the eligibility for the required security clearance.
3. All personnel shall undergo security orientation, indoctrination and security education.

Control of Personnel in the Physical Facility


1. Personnel Identification
a. Personal recognition – familiarity of the person’s characteristics.
b. Artificial recognition – identification cards, passes, password, etc.
2. Use of Pass System
a. Single pass system – the badge or pass coded for authorization to enter the specific areas
is issued to an employee who keeps it in his possession until his authorization is
terminates.
b. Pass exchange system – an exchange takes place at the entrance of each controlled area.
Upon leaving the personnel surrenders his badge or passes and retrieve back his basic
identification.
c. Multiple pass syst3m – this provides an extra measures of security by requiring that an
exchange take place at the entrance of each restricted area.
3. Badge and Pass Control
a. The system should have a complete record of all badges and identification cards issued,
return, mutilated or lost by serial numbers and cross-indexed alphabetically.
b. The supervisor from time to time to its accuracy and authenticity should check the list.
c. Passes and badges reported lost should be reported lost should be validated and security at
entrance be informed through conspicuous posting.
VISITORS MOVEMENT CONTROL

1. Visitor’s logbook – all visitors to any facility should be required to identify themselves and should be
given a visitor’s ID by security. Visitor’s logbook should be filled up with the named of visitors, nature
and duration of visit.
2. Photograph – taking of photograph should also be considered. Extreme caution must be exercised in
areas where classified information is displayed to preclude unauthorized taking of pictures of
installation. If a visitor has camera and it is prohibited to take picture, said camera should be left in the
care of security with corresponding receipt.
3. Escort – if possible visitors should be escorted by the security to monitor their activity within the
establishment and guide theme where to go.
4. Visitor Entrances – separate access for visitor and employees of the establishment should be provided.
5. Time-travelled – if there is a long delay or time lapse between the departure and arrival, the visitors
maybe required to show cause for the delay.
6. Access list – record of pre-determined visitors.

PERSONNEL SECURITY INVESTIGATION

1. Types of Personnel Security Investigation (PSI)

a. National Agency Check (NAC) – This is an investigation of an individual made upon the basis of
written information supplied by him in response to official inquiry, and by reference to appropriate
national agencies. It is simply a check of the files and record of national agencies. The national
agencies checked under this type of investigation are the following:
1) National Intelligence Coordinating Agency (NICA)
2) National Bureau of Investigation (NBI)

24
3) ISAAFP or J2 Division, GHQ AFP
4) CIDG PNP Camp Crame., etc.
b. Local Agency Check (LAC) – this type of investigation consist of the first type plus written inquires
sent to appropriate local government agencies, former employees, references and schools listed by the
person under investigation. The local agencies normally check besides the past employment, schools
and references are the following:
1) Place of the locality where the individual is a resident.
2) Mayor, Police, Fiscal, Judge of locality where the individual is a resident.

BACKGROUND INVESTIGATION

This is more comprehensive investigation than the NAC and LAC. A through and complete investigation of
all or some of the circumstances or aspects of a person’s life is conducted.

1. Types of BI – it may either be a complete (CBI) or a partial Background Investigation (PBI).


a. Complete Background Investigation – consist of the investigation of the background of a
person, particularly all the circumstances of his personal life.
b. Partial Background Investigation – consist of the investigation of the background of an
individual but limited only to some of circumstances of his personal life which are deemed
pertinent to the investigation. Normally, the request for the investigation will indicate the
specific personal circumstances to be covered. This type of BI is also used to further develop
questionable information contained in another investigation report.
2. Factors considered in Background Investigation
a. Loyalty – faithful allegiance to the country, government and its duly constituted authority
b. Integrity – uprightness in character, soundness of moral principles, freedom from moral
delinquencies, or more simply stated-honesty.
c. Discretion – the ability of tendency to act or decide with prudence; the habit of wise
judgement or simply stated – good judgement.
d. Moral – distinctive identifying qualities which serve as an index to the essential or
intrinsic nature of a person; his outward manifestation, personal trait or moral habits.
e. Character – the sum of the traits that serves as an index of the essential intrinsic nature of
a person. It is the aggregate of distinctive mental and moral qualities that have been
impressed by nature, education and habit upon the individual.
f. Reputation – opinion or estimation in which one is generally held, it is what one reported
to be, whereas character is what a person is.

Progress Check

Write the complete answer on the space provided. (strictly no erasure)

1. __________ It consists the investigation of the background of a person, particularly all the
circumstances of his personal life.
2. ___________ The security must monitor their activity within the establishment and guide theme where
to go.
3. __________ This is an investigation of an individual made upon the basis of written information
supplied by him in response to official inquiry, and by reference to appropriate national agencies.
4. __________ This type of investigation is also used to further develop questionable information
contained in another investigation report.
5. ___________ It is record of pre-determined visitors.
6. __________ It is the aggregate of distinctive mental and moral qualities that have been impressed by
nature, education and habit upon the individual.
7. __________It is what one reported to be, whereas character is what a person is.
8. ___________ The familiarity of the person’s characteristics.
9. ___________ Passes and badges reported lost should be reported lost should be validated and security
at entrance be informed through conspicuous posting.

25
10. ___________ The badge or pass coded for authorization to enter the specific areas is issued to an
employee who keeps it in his possession until his authorization is terminates.

LESSON 2

SECURITY EDUCATION

SECURITY EDUCATION

Oftentimes, employees of companies or business establishments rely on the assigned security personnel
for their security and protection. This attitude normality results to vulnerability and susceptibility of the
concerned of the concerned company to security hazards. When a loss or damage to property occurts,
company management puts the blame on the security personnel. One thing is always forgotten.
“Security is everybody’s business”.

It has been stated previously that human barriers includes shop workers, utility workers, rank-and file
employees, and management staff of companies and business establishments.

With these, company employees should be educated and made aware of their roles in the security of
their own company.
The ultimate purpose is to make everybody “security conscious”’.

OBJECTIVES OF SECURITY EDUCATION

1. Guidance for all supervisory indoctrination and executive levels of the organization.
2. A mandatory indoctrination on security for all new personnel before their assignment to their
respective jobs.

26
3. Development of high-degree of security consciousness among the selected supervisors and other
key personnel in a program that should be containing and supported by top management.
4. A down-the-line security programmed at installing. Consciousness and dedication through
demonstration. Lectures , motivation and suggestion.
5. To let all the employees force know that they all belong to the organization and that non-awarness
and non-concern to the security program is tantamount to disloyalty.

TYPES OF SECURITY EDUCATION PROGRAMS

Security manager or company security coordinates should design programs that will enhance the security
consciousness of the employees. In additional, identification a hazards and handling of crises should also be
taught. The security education programs include:

a. Company’s Role in the prevention and/or reduction a loss;


b. Integration of Security Education during Company Employees’ Orientation;
c. Fire Prevention programs and drills;
d. Natural Disaster/Calamities Drill;
e. Coordination with the Security Department;
f. Creation of Safety of Security Committee;
g. Proper Waste Disposal – this is to prevent chances a pilferage; espionage by proper disposal
of documents(shredding of waste documents); and destructive fire by segregating flammable
waste substances;
h. Regular In-Service Retraining where provisions company security is integrated; and

Posting of Security Awareness Posters/Notices, issues of pamphlets and brochures.

Progress Check
Complete the sentences. Write the answer on the blank. (2 points each)

1. Guidance for all supervisory ________________ and executive levels of the organization.
2. A ___________ indoctrination on security for all new personnel before their assignment to their
respective jobs.
3. Development of _____________ of security consciousness among the selected supervisors and
other key personnel in a program that should be containing and supported by top management.
4. A down-the-line security programmed at installing. ___________ and dedication through
demonstration. Lectures, motivation and suggestion.
5. To let all the employees force know that they all belong to the organization and that non-awareness
and non-concern to the security program is _______________t to disloyalty.

LESSON 3

DOCUMENT and INFORMATION SECURITY

On the part of the government, “Security” of documents and information is based on the premise that the
government has the right and duty to protect official papers from unwarranted and indiscriminate
disclosure.

On the other hand, private individuals and private business establishments stand on the constitutional
provisions on the “right of privacy” where it is stated that “the right of a person to be from unwarranted

27
publicity, or disclosure and as the right to live without unwarranted interference by the public in matters
with which the public is not necessarily concerned.

PURPOSE OF PROTECTING CLASSIFIED MATTERS

In government and non-government organizations, classified matters are protected for the following
purpose:

1. Deter and impede potential spy or prevent espionage;


2. Assist in security investigations by keeping accurate records of the moments of classified materials;
and
3. Enforce the use of ‘Need to know” principle.

DOCUMENT SECURITY SYSTEM

This is the aspect of security which involves the application of security measures for the proper
protection and safeguarding of classified information.

In Document and Information Security, a matter includes everything, regardless of its physical
character, or in which information is recorded or embodied. Documents, equipment, projects,
books, reports, articles, notes, letters, drawing, drawings, sketches, plans, photographs, recordings,
machinery, models, apparatus, devices, and all other products or substances fall within the general
term “matter”. Information, which is transmitted orally, is considered “matter” for purposes of
security.

TYPES OF BUSINESS RECORDS

In some business establishment, documents and records are classified to determine the degree of
security needed. The classifications are:

1. Class 1 (Vital Records) – these include records that are liable records of which reproduction
does not have the same value as original, records, needed to recover cash to replace buildings,
equipment, raw materials, finished products and records needed to avoid delay in restoration
of production, sales and services.
2. Class 2 (Useful Records) – these include records which loss might cause inconvenience but
could be readily replaced and which would not in the meantime present an insurmountable
obstacle to the prompt restoration of the business.
3. Class 3 (Important Records) – these include records of the reproduction of which will involve
considerable expense and labor, or considerable delay. Operating and statistical records
belong to this class as well as those to maintain check on efficiencies, operating costs, etc.
Also included are contracts, customer’s credit files, sales records, designs in process
development, records of experiments in progress, etc.
4. Class 4 (Non- Essential Records) – these are the daily files, routine in nature so that even if
lost or destroyed, will not affect operation or administration.

SECURITY CLEARANCE

Security Clearance is the certification by a responsible authority that the person described is cleared for
access to classified matter the appropriate level, or Security Clearance refers to the administrative that an
individual is eligible for access to classified matter. Need to know is the principle whereby access to classified
matter may only be only given to those persons to whom it is necessary for the fulfillment of their duties.

RECORDS AND DOCUMENTS PROTECTION – Addition, documents and information could be protected
by proper storage like using steel cabinets, safes, vaults and file rooms as discussed in earlier lessons.

28
1. Categories of Storage Containers – Storage containers too are categorized or classified according to
what should be stored.
a. Class 1. Commercial record safes designed for fire protection.
b. Class 2. Commercial money safes designed for robbery and burglary protection.
c. Class 3. Security cabinets designed to meet specifications for safeguarding classified materials.

OTHER TERMONOLOGIES

The following are other terminologies relative to document and information security:

1. Classified refers to assign information by one of the four classification categories.


2. Compromise means loss of security, which results from an authorized persons obtaining knowledge of
classified matter.
3. Compartmentation is the grant of access to classified matter only to properly cleaved persons in the
performance of their official duties.
4. Declassify is the removal of security classification from classified matter.
5. Reclassify/Re-grading is the act of changing the assigned classification of matter.
6. Upgrading is the act of assigning to a matter of higher classification to classified.
7. Dissemination – dissemination of classified matter shall be restricted to property cleared persons whose
official duties required knowledge of possession the, knowledge or command control of the
information involve, and recipient.
8. Purging is the process of destroying a document which is no longer significant in the organization.

Progress Check

IDENTIFICATION. Write the complete answer on the blank.

__________1. the removal of security classification from classified matter.

__________2. refers to assign information by one of the four classification categories.

__________3. the process of destroying a document which is no longer significant in the organization.

__________4. the grant of access to classified matter only to properly cleaved persons in the performance of
their official duties.

__________5. refers to the administrative that an individual is eligible for access to classified matter.

__________6. Security cabinets designed to meet specifications for safeguarding classified materials.

__________7. ___________ is everybody’s business”.

__________8. these are the daily files, routine in nature so that even if lost or destroyed, will not affect
operation or administration.

__________9. these include records which loss might cause inconvenience but could be readily replaced and
which would not in the meantime present an insurmountable obstacle to the prompt restoration of the business.

__________10. This is the aspect of security which involves the application of security measures for the proper
protection and safeguarding of classified information.

__________11. the act of changing the assigned classification of matter.

__________12. Deter and impede potential spy or prevent ____________.

29
__________13. Assist in security ____________ by keeping accurate records of the moments of classified
materials.

__________14. Enforce the use of ______________ principle.

__________15. ___________ is the certification by a responsible authority that the person described is cleared
for access to classified matter the appropriate level, or Security Clearance refers to the administrative that an
individual is eligible for access to classified matter.

LESSON 4

PROTECTION OF SENSITIVE MATERIALS

PROPRIETARY INFORMATION

This is information that in some special way relates to the status or activities of the possessor and over which the
possessor assert ownership. In the business community, proprietary information relates to the structure, products
or business methods of the organization. It is usually protected in some way against causal or general disclosure.

Proprietary pertains to anything used with exclusive legal; right or anything used, manufactured, or sold by a
person or company with an exclusive property right, for example a patent or trademark.

All proprietary information is confidential, but not all confidential information is proprietary. For example,
confidential personnel data in employee files is not considered as proprietary although the company treats it as
confidential.

TYPES OF PROPRIETARY INFORMATION

In the business world, proprietary matters are classified into:

1. Trade Secret – this consist of any formula, pattern, pattern device or compilation of information which
is used in one’s business and which gives him an opportunity to gain an advantage over competitors
who do not know to use it.
2. Patents – this is a grant made by the government to an inventor, conveying or securing to him the
exclusive right to make, sure, or sell his invention for term of years.

DISTNICTION BETWEEN PATENTS AND TRADE SECRET

Under the law, patents and trade secrets are distinguished by the following characteristics:
1. Requirements for obtaining a patent are specific. To qualify for patent, the invention must be more than
novel and useful. It must represent a positive contribution beyond the skill of the average person.
2. A much lower of novelty is required of a trade secret.

A trade secret remains secret as long as it continues to meet trade secret tests while the exclusive right to patent
protection expires after 17 years.

Check Progress

30
Module 5

RISK ANALYSIS and SECURITY HAZARD

Overview

Understanding the reasons for security and protection measures will be included in the module.
Further, topics on risk management and strategies, security hazard, and identification and avoidance of pilferage
will be the bulk of discussion.

LESSON 1
RISK MANAGEMENT ALTERNATIVE and STRATEGIES

DEFINITION OF TERMINOLOGIES

1. Hazard – exposure to the chance of loss or injury, synonymous to risk and or peril.
2. Security Hazard – any act or condition which may result in the compromise of information, loss of life,
loss or destruction of property of disruption of the objective of the installation. It can also be defined as
an act or condition affecting the safe operation of the facility caused by human action accidental or
intentional.
3. Risk – it is the potential damage or loss of an asset the level of risk is a combination of two factors: The
value placed on that asset by its owner and consequence, impact adverse effect of the loss or damage to
that asset and; the likelihood that a specific vulnerability will be exploited by a particular threat.
4. Risk Management – it is process of selecting and implementing security countermeasures to achieve an
acceptable level of risk at an acceptable cost.
5. Risk Analysis – it is analysis of risk which includes examinations of the vulnerability, probability and
criticality of potential threats and include natural and man made risk.
6. Adversary – an individual, group, organization, or government that conduct activities or has the
intention and capability to conduct activities detrimental to the individual, private or government entity.
7. Asset – any information, facility, material, information, or activity which has a positive value to its
owner whether it is an individual, private or government entity.
8. Countermeasures – an action taken or a physical security used to reduce or eliminate one or more
vulnerabilities. The cost of possible countermeasures may be monetary, but may also include non-
monetary cost such as reduced operational efficiency, adverse publicity unfavorable working
conditions, and political consequences.
9. Probability – it is the change or likelihood that the loss will take place. Indicated by a mathematical
statement concerning the possibility of an event occurring.
10. Criticality – it is the impact of the loss as measured in financial term of the survival of existence of the
organization.

RELATIVITY OF RISK AND SECURITY

1. Relative criticality or the operation – this pertains to the importance or the firm with reference to the
natural economy and security. Example is gasoline depots, communication transmission lines, and
power plant.
2. Relative vulnerability – this is the susceptibility of the plant or establishment to damage, loss or
disruption of operation due to the various hazard. A good example is the location of the building; the
machines; or presence of possible poisons. Security managers and planners normally consider the
above relativity in determining the degree of security measures needed to reduce or eliminate the
potential risks or hazards.

31
RISK MANAGEMENT ALTERNATIVES AND STRATEGIES

1. Risk Avoidance - this is the eliminating or removing the risk totally from the business, government, or
industrial environment for which the risk manager has responsibility.
2. Risk Reduction – this is the decreasing the risk by minimizing the probability of the potential loss. The
reduction or criminal opportunity is often accomplished by situation crime prevention strategies to
discourage, deter, or deny criminal incidents.
3. Risk Spreading – this is the spreading the risk through compartmentation or decentralization to limit
the impact (criticality) of the potential loss
4. Risk Transfer – this is the moving the financial impact of the potential loss- over to an insurance
company
5. Risk Self-assumption – this is a planned assumption and acceptance of the potential risk by making a
deliberate managerial decision of doing nothing about the threat, or setting aside resources for use in
case of specific loss incident.

Progress Check

Write the answer on the space provided. Write it in caps lock.

____________1. Decentralization to limit the impact (criticality) of the potential loss


____________2. Removing the risk totally from the business, government, or industrial environment for which
the risk manager has responsibility.
____________3. Moving the financial impact of the potential loss- over to an insurance company.
____________4. Any information, facility, material, information, or activity which has a positive value to its
owner whether it is an individual, private or government entity.
____________5. Risk and or peril.
____________6. An act or condition affecting the safe operation of the facility caused by human action
accidental or intentional.
____________7. An action taken or a physical security used to reduce or eliminate one or more vulnerabilities.
____________8. It is the impact of the loss as measured in financial term of the survival of existence of the
organization.
____________9. Conduct activities or has the intention and capability to conduct activities detrimental to the
individual, private or government entity.
____________10. Indicated by a mathematical statement concerning the possibility of an event occurring.

Essay

Discuss further the difference between Relative Criticality and Relative Vulnerability.

LESSON 2

32
SECURITY HAZARD

HAZARDS IN GENERAL

As earlier defined, hazard could mean exposure to the chance of loss or injury; or the term is synonymous to the
risk and or peril, in the field of industrial security, any hazardous situation or conditions are called security
hazards.

TYPES OF HAZARDS

1. Natural Hazard – these are hazards which arise from natural hazards or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Fire (not caused by human action) – such as those cause by lightning.
d. Storms (typhoons, cyclones, tornado and hurricane)
e. Lightning storms
f. Extreme temperature and humidity
2. Human-Man made Hazards – these hazards which are the result of the state of mind, attitude,
weaknesses or character traits of one or more persons. They can be acts of commission o mission, both
overt and covert, which can disrupt operation of a plant or installation.
a. Sabotage – it can be described as the deliberate destruction or the deliberate damaging or
destroying of property of equipment, for example by resistance fighters, enemy agents, or
disgruntled workers; or action to hinder or an action taken to undermine or destroy
somebody’s effort or achievements.
b. Espionage – it is describes as the activity of spying or the use of spying or spies to gather
secret information. This is hazard because people may come to know the confidential
processes or procedures of a certain organization or business establishment (Microsoft,
Encarta,2001-2005)
c. Pilferage – the act of stealing small this or items of little value, especially habitually.
d. Theft and Robbery - both acts involve the taking of another’s property with intent to gain
without the owners against or intimidation of person nor force upon things while robbery
involves intimidation of persons of force upon things.
e. Disloyalty – this is the act of unfaithfulness to one’s organization. This is hazardous because it
may lead to unauthorized disclosure of information to other people.
f. Disaffections - this is manifested by losing satisfactory thereby causing the dissatisfied person
to commit acts that may cause peril to his own organization.
g. Subversive activities – these are activities designed to overthrow government or other
institution. These hazards because they may cause disruption of the normal operations of an
institution or organization.

PERSON’S INTERNAL HAZARDS

Every employee of the company of business establishment including but not limited to the assigned security
personnel are all possible causes of security hazards. This is because of the following that are innate to every
human being:

1. Faith - In the sphere of security operations, faith can be a questionable virtue. Those persons in which
trust of their fellowmen is an abiding instinct, and who consider themselves a definite threat to
effective security, for the entire training an enemy is aimed at deceiving this type of person. He may do
this through an infinite number of ways, but it is often the most common place and unexpected that
prove most dangerous to the company’s and most often productive to him.

2. Conceit – it is the desire to satisfy the ego or impress someone, provides the enemy agent with his best
source of information. An individual may unconsciously disclose sensitive information to unauthorized
persons because of conceit.

33
3. Enthusiasm and Pride – These are common causes of indiscretion. Anyone who is truly interested in his
job finds it difficult not to talk and write about it. The foreign agent and/or criminal element by
touching upon the individual’s pride in his unit or mission can learn much about the equipment,
training operations, personnel, and its strength.

Ignorance – Many people compromise vital information simply because they do not realize its value and do not
know the methods by which intelligence agencies operate. Through security education and indoctrination, one
can combat this.

LESSON 3
PILFERAGE AND OTHER SECURITY HAZARD

PILFERAGE AS A SECURITY HAZARD

As earlier described, pilferage is the act of stealing small items or items. Of little value. However,
these little items when accumulated become a great loss to a business establishment.

1. Types of Pilferers

a. Casual Pilferer is one who steal due to his inability to resist the unexpected opportunity and has
little fear of detection is no plan or premeditation and he is usually a “loner” on the job. The
temptation to pick up the article is basically due to poor security measure. The implication of
causal pilfering is the cumulative cost if it remains unchecked.
b. Systematic Pilferer is one who steals with preconceived plans and takes away any or all types of
items or supplies for economic gain. Pilferers of this kind can be employee or outsiders of the
establishment.

A. SABOTAGE AS A SECURITY HAZARD – As earlier defined sabotage is the deliberate


destruction of the deliberate damaging or destroying of property or equipment.

B. ESPIONAGE AS A SECURITY HAZARD – As earlier stated, espionage is a hazard because. It


may cause unauthorized disclosures of company information, processes and procedures.

SUBVERSIVE ACTIVITY AS A SECURITY HAZARD – This clearly a security hazard because its disrupts
normal operation within a certain organization or institution.

Progress Check

Write the answer on the space provided. Write it in caps lock.

______________1. Disrupts normal operation within a certain organization or institution.

______________2. It may cause unauthorized disclosures of company information, processes and procedures.

______________3. These are hazards which arise from disasters

______________4. An individual may unconsciously disclose sensitive information to unauthorized persons


because of____________.

34
______________5. Steals with preconceived plans and takes away any or all types of items or supplies for
economic gain
______________6. The act of stealing small this or items of little value, especially habitually
______________7. it can be described as the deliberate destruction or the deliberate damaging or destroying of
property of equipment
______________8. This is hazardous because it may lead to unauthorized disclosure of information to other
people.
______________9. The inability to resist the unexpected opportunity
______________10. These are common causes of indiscretion.

11- 15 – 5 examples of Subversive Activities

11.
12.
13.
14.
15.

Module 6

SECURITY SURVEY, SECURITY INSPECTION


and
SECURITY INVESTIGATION

Overview

The methods of conducting security survey and security inspection as well as security investigation
will be highlighted in this module. It will also include the discussions on survey and inspection report
preparation.

LESSON 1
SECURITY SURVEY

SECURITY SYSTEM - This is the set of policies, procedures and rules and regulations designed to reduce to
an absolute minimum the possibility of espionage and compromise of classified information of an office or a
whole establishment.

35
SECURITY SURVEY – This is also known as security audit which is actually a fact – finding
probe to determine a plant’s adequancy and deficiency in all aspects of security, with the
corresponding recommendations.

It also referring to an estimate of the security standards of a unit and is conducted to enable the
responsible officer to recognize and evaluate security hazards and determine protective measures
necessary to the prevention of sabotage, espionage, subversive activities and other criminal acts
inimical towards the interest and / or mission of the unit and / or command.

A. SABOTAGE AS A SECURITY HAZARD – As earlier defined sabotage is the deliberate


destruction of the deliberate damaging or destroying of property or equipment.

RELATED TERMINOLOGIES – For better comprehension, the following terminologies are


hereby defined:

1. Survey – the term applied to the first detailed “look see” conducted by a term.
2. Security Inspections or Follow up Survey - This is the term referring to the succeeding
surveys after the initial surveys.
3. Supplements Surveys – It is conducted when there is business reorganization with
corresponding changes in object and physical by – outs of the complex.
4. Special Survey – This is directed by management , if the initial survey appears to have left
certain portions as aspects involving security due to change in policy or operation that will
greatly affect the total security picture.
5. Entrance Conference – A conference or dialogue between the survey team and management
officials of a plant before security survey is conducted.
6. Exit Conference – A conference similar to entrance conference done after the completion of
the security survey.

WHO PERFORMS SECURITY AUDIT AND SURVEY? This should be conducted by qualified security
experts who can be from the organization or outsiders contracted to do the job. Generally, recommendations
from security survey will fall into three categories.

1. Human guard – refers to the number of guards needed their respective qualifications like female guards
for searching female employees.
2. Equipment – this includes the type and number of firearm needed, communications gadgets, metal
detectors and other devices necessary in the implementation of the proposed security system.
3. Procedures – these are the detailed rules and regulations and steps necessary in the implementation of
the proposed or existing security sytem.

The following are some of the situations under which a security survey may be requested or directed:

1. Activation of an organization of office.


2. Reactivation of an organization or office.
3. A substantial change on the mission number personnel, structures , or real estate of the office.
4. Indications of laxity in the security program which would indicate the need for a complete
revaluation of the security system.
5. When no record exists of a prior survey having been conducted.

SECURITY SURVEY PROCEDURES - Security surveys are conducted by considering the following steps:

1. Preliminary Planning – To assure as much as possible the successful completion of a security survey, a
chronological plan of action is developed. The first action taken by the security survey agent is to
prepare for and conduct those preliminary courses of action that precede the actual conduct of the
survey.

36
A very important consideration during the preliminary Planning stage is the use of a checklist. This is a
list of general considerations or specific point that must be covered during the survey. Checklists may
be either the general type or the specific of detailed type.

2. Initial Briefing (Entrance Conference) – After completion of the preliminary stage, the specialist is
prepared to visit the office. It is to be recalled as mentioned previously that contact is made with the
security officer of the office for the purpose of establishing a time and date for the initial briefing of the
office head. It would be ideal to have at this conference not only the office head but his entire staff and
other key personnel of the office.

3. Escort Personnel – It is often desirable for both the specialist and the office that an escort accompany
the specialist during the survey. Preferably, this escort should be the security office of the office of his
representative. In any event he should be a person conversant with the security practice and procedures
employed as the office.

4. Preliminary Exterior and Interior Check – As soon as possible after the initial briefing, the specialist
conducts a tour of the area surrounding the office. The purpose of such an inspection is to gain a
general knowledge of those elements outside the office which do or could conceivably have either a an
direct or indirect influence upon the security of the office.

5. Analyzing Existing Security – Having completed the preliminaries and determined the level of required
security, the specialist must now ascertain the existing level of security of the installation. This portion
of the survey is a minute examination of all factors regarding the physical security, security of
personnel and the security of information. It includes the collection of all factual data that affects the
security of the office. This data will include all preventive measures as well as hazards and
deficiencies any of the security measures the specialist examine are not base upon existing
requirements. The specialist makes his own conclusions which are reflected in his recommendations.

6. Final briefing ( Exit conference ) – The final conference is an oral to the chief wherein the specialist
determines whether or not his tentative recommendations can be realistically implemented. The
specialist discusses the recommendation with the command since information may exist which may
negate or change the recommendations. In many instance the chief may have unsuccessfully attempted
to implement corrective measures or the recommendations are not feasible for some reason unknown to
the agent. If the chief has unsuccessfully attempted to correct its certain security weakness, a report of
these attempts is included in the specialist’s final report.

REPORT OF SECURITY SURVEY – A Security Inspection is a service performed to determine


compliance with established security policies and procedures and is conducted on a recurring schedule
or a follow-up to a security survey.

LESSON 2

SECURITY INSPECTION

Security Inspection

Security inspection is a check of how well existing security measures and regulations are being carried
out within a detachment or establishment. A security inspection may include an investigation of alleged or
suspected security violation. Physical security is concerned with forces, entrances and exits, guards, traffic
control, lighting fire control, and with such other physical measures, which, if properly established and
maintained, will deny access to unauthorized person.

37
Characteristics of Security Inspection

The security inspection, although akin to the security survey, is much more restricted in scope. As
observed, the security survey considers everything pertaining to an office’s security, but the security inspection
is limited to the limitation of the degree of compliance with established security policies and procedures.

Security Inspection Procedure

The preliminary and investigative procedures involved in the conduct of a security inspection are
essentially the same as those required for a security survey; this is a selection of inspection personnel, the
necessary file checks and other preparation, the duties of the incharge, the use of checklists and the coordination
with the Security officer. The actual inspection will closely parallel the same procedures followed during the
conduct of security survey.

Prior to the actual conduct of the inspection, the agent conducts preliminary check of the office or
offices to be inspected to determine what security regulations are enforced at the unit.

Types of Security Inspection

1. Continuous Inspection - to keep pace with the constant charges in the organization, charges in our
security terms of attitudes, life-style and moral values, and the rapid advancement of technological
modifications are all around us, the inspection must be an on-going and never ending activity.
2. Formal or Informal
a. Formal inspection – is one which some fanfare is attached. It is usually preceded by an
announcement, and the unit under inspection “prepares” for events, including some extra
housekeeping activities that would not otherwise happen at that point in time.
b. Informal Inspection – is usually the result of a long and firmly entrenched inspection
program, understood by all and accepted as part of the organizational life. The inspection has
been stripped of all external trappings of importance but their functional importance has not
been lessen in any manner. They are seriously and quietly executed in a spirit of
understanding and cooperation.
3. Structured and Unstructured Inspection
a. Structured inspection – is one that moves systematically from one area to the next and so on.
There is a format or logical sequence to the process. For instance, the audit may start with the
first line of defense, then the second line, then the third line, etc.
Unstructured inspection – is conducted in a random manner. There is no format or logical
sequencing. For example, the inspection may start with countermeasures for proprietary information,
then emergency plan, followed by investigation and so forth.

LESSON 3
SECURITY INVESTIGATION

SECURITY INVESTIGATION – This is a planned and organized determination of facts concerning specific
loss or damage of assets due to threats, hazard or unsecured conditions.

TOOLS OF INVESTIGATION – There are four specific types of investigation which may be applicable to
security, this are:

1. Information – knowledge which the investigator gathers from other persons.


a. Acquired from regular sources conscientious and public –spirited citizens, company files,
school files or records file of other agencies.
b. Acquired from cultivated sources paid informants, bartenders, cab drivers, acquaintances, etc.

38
2. Interrogation – the skillful questioning of a person who is reluctant to divulge information concerning
the offence under investigation.
3. Interview – the simple questioning of a witness who has no personal reason to withhold information.
4. Instrumentation – the application of instruments and methods of physical sciences to the detection of
crimes. In other words, the sum total of the application of all sciences in crime detection otherwise
known as criminalistics.

SYSTEMATIC APPROACH TO AN INVESTIGATION

1. Defined the Investigative Problem


a. Know the reason for the investigative
b. Know the particular phases or elements of investigation assigned to the investigador.
c. Know whether the investigation is to be handled overtly or discreetly.
d. Know the priority and suspense date assigned to the investigation
e. Know the origin of the information.
2. Collection of Relevant data
a. Prepare written investigative plan represents a guide for work. This covers:
1) Information needed
2) Methods used in gathering information.
3) Location of sources to furnish this information.
b. Methods and source to be used. Methods available to an investigador are follows:

1) Personal observation
- Undercover/use of agent
- Surveillance
- Raids and seizure
- Direct visits to the scene

2) Study of Documents or record


- Operational files
- Identity of documents
- Newspapers, books, periodicals, etc.
- Correspondence, letter, telegrams etc.
3) Use of interrogation and interview
4) Used of recruited informants
5) Liaison with agencies who possess information
3. Analysis and Verification of the Information Gathered
a. Analysis involves a study of the information in terms of the questions set out to answer.
1) Data collected should be appropriate and complete.
2) Information supplied must be factual.
b. Verification Method Involves:
1) Personal observation of the agent
2) Secure reliable statements from individuals making personal observation through
experience
3) Documents or physical evidence consulting official records.
4. Drawing the Conclusion
It is the function and responsibility of the person requesting the investigation.

Progress Check

Essay (Discuss the difference between Security Inspection, Security Survey and Security Investigation)

20 points.

39
Enumeration

1-6 – security Procedures

7-10 – Tools of Investigation

11-15 – Situations which a security survey may be requested or directed.

40

You might also like