Industrial Security Management Table of Specifications: Industrial Security of Administration Outcomes: A. Introduction To Industrial Security
Industrial Security Management Table of Specifications: Industrial Security of Administration Outcomes: A. Introduction To Industrial Security
Industrial Security Management Table of Specifications: Industrial Security of Administration Outcomes: A. Introduction To Industrial Security
Table of Specifications:
B. Physical Security.
Apply the principles of physical security,
and barriers in utilizing the appropriate protective system in relation to protective
lightning, protective alarm,
and communication system, protective locks and key control, protective cabinets as
well as salient provisions of RA. No. 5487 in relation to Gard force system.
C. Personnel Security.
Explain the purpose and importance of personnel security, carry out various methods
of personnel security investigation,
and implement security education programs.
INRODUCTION
SECURITY
The state or quality, condition of being secure, freedom from fear, harm, danger, loss, destruction or
damages;
To secure is to make safe or be protected
Defense against crime
SAFETY
Freedom from HAZARDS
Shall refer to the physical or environmental conditions of work or employment, which substantially comply
with legal requirements.
Man in the course of history has always showed that he values property next to his life and loved ones. Centuries
before the modern concept of security and crime prevention came into practice, cave dwellers fought among
themselves to protect life and property. Eventually, families and clans banded together as tribes and later on formed
communities for mutual protection, recognizing that there is strength in numbers.
1|LEA-2
The Great Wall of China, stretching a length of 2,414 kilometers and a height varying from 20 ft. at its lowest point to
50 feet high, serves as a living barrier for man to protect himself. Watch towers are placed in strategic areas at
regular intervals and troops are summoned by beacons of fire passing through the top of the wall.
As early as 27BC-14AD, during the time of Emperor Augustus of the Roman Empire, the Praetorian Guards was
organized to protect the life of the emperor, at the same time, keep peace and order in the streets of Rome.
In the Philippines, after World War II, several factors immensely contributed to the rapid growth of the local security
industry: When surplus amiss found their way into the hands of the populace, tension was created due to the
proliferation of loose unlicensed firearms and aggravated by the uncontrolled ingenious backyard gunsmith of gifted
Filipino technicians; the complacency and/or inability of the state to control urban migration, thus creating squatter
areas breeding places of crime, where poverty, filth and squalor abound; the government's inability to adapt a long
term economic and political solution to alleviate existing and inadequate living conditions. The lack of political will in
eradicating or stopping the formation of quasi-politico-religious lawless groups; protest, crime, terrorism, kidnap for
ransom, carnapping with the perpetrators in cahoots with elements of law enforcement agencies and countless valid
reasons that eroded the moral values of the people.
As of 1999, there are more than 400,000 security personnel, outnumbering the total AFP and PNP personnel
combined. This is the aftermath of the growth of local security industry.
Furthermore, the paradigm shift to globalization and the recent advancement in computer technology pose a greater
challenge to the security industry.
A. Natural Authority
The highest law is the law of preservation
By instinct, man naturally reacts to protect himself, his family, his home, freedom, liberty and property from
danger, threat or hazard. He does it personally or thru the help of others.
B. Constitutional Authority
1. The prime duty of the government is to serve and protect people. The government may call upon the people to
defend the state and, in the fulfillment thereof, all citizens may be required under conditions provided by law or
to render personal military or civil service. (Art II, Sec 4 of the 1987 Philippine Constitution)
Take note also that all citizen who are qualified, including the security guards, may be required by law to
render personal military or civil service. The service required of the citizen is personal.
2. No person shall be deprived of life, liberty or property without due process of law, nor shall any person be denied
the equal protection of the laws. (Art III, Sec1 of the 1987 Philippine Constitution)
This means that the life, liberty, freedom and property can only be taken from a person after the observance
of due process of law.
3. Private Property shall not be taken for public use without just compensation. (Art III Sec. 9 of the 1987 Philippine
Constitution)
The Constitution protects not only ownership but also possession, enjoyment, use and disposition of private
property by their rightful owners subject to such limitations imposed by law.
In this regards, private property to be taken by the government in its exercise of the power of the eminent
domain must satisfy two important conditions, namely: public use and just compensation.
4. The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches
and seizures of whatever nature and for any purpose shall be inviolable, and no search warrant or warrant of
arrest shall be issue except upon probable cause to be determined personally by the judge after examination
under oath or affirmation of the complainant and the witnesses he may produce, and particularly describing the
place to be search and the persons or things to seize. (Art III, Sec 2 of the 1987 Philippine Constitution).
C. Statutory Authority
2|LEA-2
The applicable provisions of the Revised Penal Code on Crime Against Persons. Personal liberty, security and
property have bearing on the security and protection of one’s life, liberty and property.
PROTECTIVE SECURITY
can be defined as those measures taken by an installation or unit to protect itself against sabotage, espionage
or subversion and at the same time provide freedom of action in order to provide the installation of the unit
with the necessary flexibility to accomplish its mission.
The aspects of protective security can be seen with the application of the following:
A. Industrial Security E. School Security
B. Hotel Security F. Supermarket or Mall Security
C. Bank Security G. Other types – this includes all other security
D. VIP Security matters not covered in the above enumeration
Industrial Security
a type of security applied to business groups engaged in industries like manufacturing, assembling, research
and development, processing, warehousing and even agriculture.
It may also mean the business of providing security.
Hotel Security
a type of security applied to hotels where its properties are protected from pilferage, loss, damage and the
function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves. This
type of security employs house detectives, uniformed guard and supervisor and ensures that hotel guests
and their personal effects are safeguarded.
Bank Security
this type of security is concern with bank operations.
Its main objective is the protection of bank cash and assets, its personnel and clientele.
VIP Security
a type of security applied for the protection of top-ranking officials of the government or private entity,
visiting persons of illustrious standing and foreign dignitaries.
School Security
a type of security that is concern with the protection of students, faculty members, and school properties.
1. PHYSICAL SECURITY
The broadest branch of security which is concerned with the physical measures adopted to prevent
unauthorized access to equipment, facilities, materials and document and to safeguard them from espionage,
sabotage, damage, loss and theft.
3|LEA-2
defined as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies,
programs, personnel, property, utilities, information, facilities and installation against compromise, trespass,
sabotage, pilferage, embezzlement, fraud, or another dishonest criminal act.
It is the sum total of all physical protection employed or installed to secure assets.
Ex. Human Guards, perimeter fence/barrier and security devices
BARRIER
defined as any physical structure whether natural or man-made, capable of restricting, deterring, delaying or
preventing illegal and unauthorized access to an installation.
Natural Barrier
it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to traverse
which delay or make more difficult the entry of the intruder.
Man-Made Barrier
Structural constructions like fences, walls, floors, roofs, grills, bars, road blocks, or other physical means to
deter or impede penetration.
Kinds of Barriers:
A. Natural barriers D. Animal barriers
B. Structural barriers E. Energy barriers
C. Human barriers
Natural barriers
it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to
traverse.
Structural barriers
these are features constructed by man regardless of their original intent that tends to delay the intruder.
Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
Human barriers
persons being used in providing a guarding system or by the nature of their employment and location, fulfill
security functions.
Examples are guards, office personnel, shop workers, etc.
Animal barriers
animals are used in partially providing a guarding system.
Dogs are usually trained and utilized to serve as guard dogs. German shepherds are best suited for security
functions.
Energy barriers
it is the employment of mechanical, electrical, electronic energy imposes a deterrent to entry by the potential
intruder or to provide warning to guard personnel.
These are protective lighting, alarm system and any electronic devices used as barriers.
MAIN PURPOSE
To deny, to delay or impede access or exit unauthorized person/s.
TYPES OF FENCING
1. SOLID
2. FULL-VIEW
Solid fence
constructed in such a way that visual access through the fence is denied.
Its advantage is that it denies the opportunity for the intruder to become familiar with the personnel,
activities and the time scheduled of the movements of the guards in the installation.
On the other hand, it prevents the guards from observing the area around the installation and it creates
shadow that may be used by the intruder for cover and concealment.
Full-view fence
it is constructed in such a way that visual access is permitted through the fence.
Its advantages are that it allows the roving patrols and stationary guard to keep the surrounding are of the
installation under observation.
On the other hand, it allows the intruder to become familiar with the movements and time schedule of the
guard patrols thereby allowing him to pick the time that is advantageous on his part.
Standard concertina barbed wire is commercially manufactured wire coil of high strength steel barbed wire
clipped together at intervals to form a cylinder.
Opened concertina wire is 50 feet long and 3 feet in diameter.
5|LEA-2
A top guard is an overhead of barbed wire along the top of the fence, facing outward and upward at
approximately 45-degree angle.
Top guard supporting arms will be permanently affixed to the top of fence posts to increase the overall
height of the fence by at least one foot.
Three strands of barbed wire, spaced 6" apart, must be installed supporting arms.
CLEAR ZONES
A. A clear zone of 20 feet or more should exist between the perimeter barrier and exterior structures, parking
areas and natural or man-made features.
B. A clear zone of 50 feet or more should exist between the perimeter and structures within the protected
areas except when a building constitutes part of the perimeter barrier.
2. BUILDING EXTERIORS
(2nd Line of Defense)
1. Walls
2. Doors
3. Windows
4. Roof Openings
5. Fire Escapes
3. INTERIOR CONTROLS
(3rd Line of Defense)
1. ID System
2. Entrance
3. Exit
4. Restricted Area
5. Alarm Sensors
6. Communication Systems
a. Local Tel Exchange
b. Two-Way Radio
c. Commercial Tel Service
d. Call Boxes
e. Intercommunications
f. Paging & Recall System
7. Guards
2. Primary Value
a. Sensor mechanism, 100X better than man
b. Hearing 2X that of man
3. Secondary Value
a. Attack/Pursue, attack/hold
4. Dog's Sense
a. Smell
b. Hearing
c. Sight
d. Touching
5. Deployment
a. With Handlers
b. Without Handlers
6|LEA-2
PROTECTIVE LIGHTING
is the single most cost-effective deterrent to crime because it creates a psychological deterrent to the
intruders.
A. Continuous lighting
the most familiar type of outdoor security lighting
this is designed to provide two specific results: glare projection or controlled lighting.
it consists of a series of fixed luminaries at range to flood a given area continuously during the hours of
darkness.
B. Stand-by Lighting
it is designed for reserve or standby use or to supplement continuous systems. A standby system can be most
useful to selectively light a particular area in an occasional basis.
C. Movable or Portable Lighting
this system is manually operated and is usually made up of movable search or floodlights that can be located
in selected or special locations which will require lighting only for short period of time.
D. Emergency Lighting
A stand-by lighting which can be utilized in the event of electrical failure or other emergencies when other
system is inoperative, either due to local equipment or commercial power failure.
A. Flood lights
These can be used to accommodate most outdoor security lighting needs, including the illumination
of boundaries, fences and buildings and for the emphasis of vital areas or particular buildings.
B. Street lights
This lighting equipment received the most widespread notoriety for its value in reducing crime.
C. Search lights
These are highly focused incandescent lamp and are designed to pinpoint potential trouble spots.
D. Fresnel lights
These are wide beam units, primary used to extend the illumination in long, horizontal strips to
protect the approaches to the perimeter barrier.
Fresnel projects a narrow, horizontal beam that is approximately 180 degrees in the horizontal and
from 15 to 30 degrees in the vertical plane.
ALARM
is an aural or visual signal given by the annunciator to security when intruder actuates device in a
protected area.
designed to alert security personnel to consummated or attempted intrusions into an area, building
or compound
PROTECTIVE ALARM
It assists the security in detecting, impeding or deterring potential security threat in the installation.
7|LEA-2
Basically, its function is to alert the security personnel for any attempt of intrusion into a protected
area, building or compound. Once an intruder tampers the circuitry, the beam or radiated waves of
the alarm system, it will activate an alarm signal.
C. Local Alarm
This system consists of ringing up a visual or audible alarm near the object to be protected. When an intruder
tries to pry a window, the alarm thereat goes off.
D. Auxiliary alarm
company-owned alarm systems with a unit in the nearest police station so that in case of need, direct call is
possible. The company maintains the equipment and lines both for the company and those in the police, fire
and other emergency agencies by special arrangement. The auxiliary system can be availed of by radio,
landlines, or cell phones.
E. Local alarm by chance system
This is local alarm system in which a bell or siren is sounded with no predictable response.
This system is used in residence or small retail establishment which affords a respond system.
The hope is that a neighbor or passing patrol car will reach to alarm and call for police assistance, but such a
call is purely a matter of chance.
Foot button:
Like the foot rail, permit alarm activation in relatively safety while both hands remain clear in view of the
robbers.
Double squeeze buttons:
Required pressure on both side of the device and therefore the probability of accidental alarm is reduced.
LOCK
defined as a mechanical, electrical, hydraulic, or electronic devised designed to prevent entry into a building,
room, container or hiding place.
PETERMAN
a term in England for lock picker, safecracker, and penetrator of restricted areas or room.
Types of Locks:
A. Key-operated mechanical lock E. Electrical lock
B. Padlock F. Card-operated lock
C. Combination lock G. Biometric system
D. Code-operated lock
2. Padlock
a portable and detachable lock having a sliding hasp which passes through a staple ring and is then made
fasten or secured.
3. Combination lock
instead of using the key to align the tumblers, the combination mechanism uses numbers, letters or other
symbols as reference point which enables an operator to align them manually.
4. Code-operated lock
a type of lock that can be opened by pressing a series of numbered button in the proper sequence.
5. Electronic lock
a type of lock that can be opened and closed remotely by electrical means.
6. Card-operated lock
a type of lock operated by a coded card.
7. Biometric System
Types of Keys:
1. Change key - a specific key, which operates the lock and has a particular combination of cuts or biting, which
match the arrangement of the tumblers in the lock.
2. Sub-master key - a key that will open all the lock within a particular area or grouping in a given facility.
3. Master key - a special key capable of opening a series of lock.
4. Grand Master key - a key that will open everything in a system involving two or more master key groups.
Key Control
Once an effective key control has been installed, positive control of all keys must be gained and maintained.
This can be accomplished only if it is established in conjunction with the installation of new locking devices.
The following methods can be used to maintain effective key control;
a) Key cabinet- a well-constructed cabinet will have to be procured. The cabinet will have to be of
sufficient size to hold the original key to every lock in the system. It should be secured at all times.
b) Key record- some administrative means must be set up to record code numbers and indicates to
whom keys to specific locks have been issued.
c) Inventories- periodic inventories will have to be made of all duplicate and original keys in the hands
of the employees whom they have been issued.
d) Audits- in addition to periodic inventory, an unannounced audit should be made of all key control
records and procedures by a member of management.
e) Daily report- should be made to the person responsible for key control from the personnel
department indicating all persons who have left or will be leaving the company. In the event that a
key has been issued, steps should be initiated to ensure that the key is recovered.
10 | L E A - 2
Art. 304 (RPC) Possession of picklocks or similar tools.
Any person, who shall without lawful cause have in his possession picklocks or similar tools especially
adapted to the commission of the crime of robbery, shall be punished by arresto mayor in its maximum
period to prision correccional in its minimum period.
The same penalty shall be imposed upon any person who shall make such tools. If the offender be a
locksmith, he shall suffer the penalty of prision correccional in its medium and maximum periods.
Art. 305 (RPC) False keys. — The term "false keys" shall be deemed to include:
The tools mentioned in the next preceding articles.
Genuine keys stolen from the owner.
Any keys other than those intended by the owner for use in the lock forcibly opened by the offender.
SECURITY CABINET
The final line of defense at any facility is in the high security storage where papers, records, plans or
cashable instrument, precious metals or other especially valuable assets are protected.
These security containers will be of a size and quantity, which the nature of the business dictates.
Safe
a metallic container used for the safekeeping of documents or small items in an office or installation.
Its weight must be at least 750 lbs. and should be anchored to a building structure.
Its body should at least one-inch-thick steel.
Vault
heavily constructed fire and burglar resistance container usually a part of the building structure used to keep
and protect cash, documents and negotiable instruments.
Vaults are bigger than safe but smaller than a file room.
The vault door should be made of steel at least 6 inches in thickness.
The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
The vault must be resistive up to 6 hours.
File room
a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited
people to work on the records inside.
The file room should at most be 12 feet high.
It must have a watertight door and at least fire proof for one hour.
Personnel Identification:
1. Personal Recognition
2. Artificial Recognition
a) Use of Pass System b) Badge and Pass Control
Movement Control:
1. Traffic Control
a) Visitors Movement Control c) Vehicle Movement Control
b) Package Movement Control d) Building Access Control
11 | L E A - 2
this provides an extra measure of security by requiring that an exchange take place at the entrance of each
restricted area.
Restricted/Controlled Area
any area in which personnel or vehicles are controlled for reasons of security.
Are those areas where access is restricted as to entrance or movement by all authorized personnel and
vehicles
These restricted areas are termed Exclusion areas and Limited areas
EXCLUSION AREA
which contains a security interest to TOP SECRET importance, and which requires the highest degree of
protection.
LIMITED AREA
a lesser degree of control is required than in an exclusion area but which the security interest would be
compromised by uncontrolled movement.
1. Visitor’s logbook
All visitors to any facility should be required to identify themselves and should be given a
visitor’s ID by the security. Visitor’s logbook should be filled up with the named of visitors,
nature and duration of visit.
2. Photograph
taking of photographs should also be considered. Extreme caution must be exercised in areas
where classified information is displayed to preclude unauthorized taking of pictures of the
installation. If a visitor has camera and it is prohibited to take picture, said camera should be
left in the care of security with corresponding receipt.
3. Escort
If possible, visitors should be escorted by the security to monitor their activity within the
establishment and guide them where to go.
4. Visitor entrances
separate access for visitors and employees of the establishment should be provided.
5. Time- traveled
If there is a long delay or time lapse between the departure and arrival, the visitors may be
required to show cause for the delay.
12 | L E A - 2
b) Outgoing packages carried by personnel should be closely inspected and those in vehicles should also
be checked as many pilfered items are hidden in the surface of the vehicles leaving the compound.
c) Any personnel/visitor entering the installation with a package should deposit the same to the security
and in return receives a numbered tag, which he/she will use in claiming his/her package upon
departing.
PERSONNEL SECURITY
Of the three key security processes, personnel security is considered the most important simply because
security involves people, both as assets to be protected and as sources of security threats.
Purpose
To ensure that a firm hires those employees best suited to assist the firm in achieving its goals; and
Once hired, assist in providing the necessary security to them
Control of Personnel:
Access to “Restricted Areas” can be partially controlled by fences, gates and other physical means, but
the individual working in the area is the key to the bringing out of classified matter to unauthorized
personnel.
Written information does not have the power of speech.
Only the individual has knowledge of this written information can pass it to unauthorized personnel if
he unguardedly talks about information.
This type of Personnel Security Investigation may either be a complete (CBI) or a partial Background
Investigation (PBI).
a) Complete Background Investigation - Consist of the investigation of the background of a person,
particularly all the circumstances of his personal life.
b) Partial Background Investigation – Consist of the investigation of the background of an individual but
limited only to some of the circumstances of his personal life which are deemed pertinent to the
investigation. Normally, the request for the investigation will indicate the specific personal
circumstances to be covered. This type of BI is also used to further develop questionable information
contained in another investigation report.
Background Investigation
It serves to verify information on the application form and to obtain other information pertinent to the
decision to employ.
Factors to consider in a Bl:
• Loyalty - quality of faithfulness to the organization, superiors, subordinates and peers.
• Integrity - uprightness of character, soundness of moral principles and truthfulness.
• Discretion - ability to act or decide with prudence; habit of wise judgment.
• Morals - distinctive identifying qualities that serve as an index to the essential nature of a person.
• Character-sum of traits impressed by nature, education and habit of a person.
• Reputation - opinion which one is generally held.
Positive Vetting
The process of inspecting or examining with careful thoroughness.
The essence of vetting is a personal interview conducted under stress.
It is based on the information previously given by the applicant.
Profiling
The process whereby a subject’s reaction in a future critical situation is predicted by observing his behavior,
or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test.
Undercover Investigation
This is the placement of an agent in a role in which the agent’s true identity and role remains
unknown in order to obtain information for criminal prosecution or for recovery or limitation of
asset losses
Exit Interview
It gives departing employees an opportunity to list grievances.
It offers security managers an opportunity to learn of problems not previously known.
Debriefing an employee to remind their continuing legal obligation to safeguard confidential
company information
SECURITY GUARD
The key element in the security survey system of a plant or installations is the human guard. Without this
human element, all the mechanical, electrical, and electronic protective aids, as well as security techniques
would be worthless.
It is the human guard, as a part of the security enforcement medium, who contributes the thought processes
and all the human senses to the security system.
The electronic device may sound the alarm, the television camera may spot the culprit, and the mini-
computer may trigger the red button, but it is the guard responds and initiates the necessary action.
Sometimes called private security guard or watchman shall include any person who offers or renders
personal service to watch or secure either a residence or business establishment or both for hire or
compensation and with a license to exercise profession.
15 | L E A - 2
Company Guard Force
A security force maintained and operated by any private company/corporation utilizing any of its
employees to watch, secure or guard its business establishment premises, compound or properties.
Government Guard Unit
a security unit maintained and operated by any government entity other than military or police,
which is established and maintained for the purpose of securing the office or compound and/or
extension of such government entity.
Colors of Uniform:
Private Security Agency = Navy blue (upper and lower)
Company Guard Force = light blue/light gray for upper and navy blue for lower
Government Guard Unit = white for upper and navy blue for lower
Definition of Terms:
PERSON
shall include not only natural persons but also juridical persons such as single proprietorship,
corporations, companies or association duly organized and registered with the Security Exchange
Commission and/or the Department of Trade and Industry.
PRIVATE DETECTIVE
any person who does detective work for hire, reward, or commission other than members of the AFP,
Guard of the BJMP, Municipal or City jail guards, and members of the PNP or of any other Law
Enforcement Agency of the government
Who May Organize and maintain PSA and PDA?
Any Filipino citizen or corporation, partnership, or association, one hundred per cent (100%) of which is
owned and controlled by Filipino citizens
Provided, that no person shall organize or have an interest in, more than one such agency except those which
are already existing at the promulgation of this Decree:
Provided, further, That the operator or manager of said agency must be:
a) at least 25 years of age;
b) a college graduate; and/or
c) a commissioned officer, inactive or retired service or retired from the Armed Forces of the Philippines
or PNP.
d) Has taken a course/seminar on Industrial Security Management and/or must have adequate training or
experience in the security business; and
e) Good moral character
New applicant for license to operate shall be required to obtained minimum capitalization of one million (Php
1,000,000.00) pesos with minimum bank deposit of five hundred thousand (Php 500,000.00) pesos in order to
start its business operation
1. On Membership:
No regular license shall be granted to any PRIVATE SECURITY AGENCY unless it has a minimum of two
hundred (200) licensed private security personnel under its employ;
nor to any COMPANY GUARD FORCE or PRIVATE DETECTIVE AGENCY unless it has a minimum of thirty (30)
licensed private security personnel under its employ;
Provided, that the maximum number of private security personnel that a PSA/CGF/PDA may employ shall be
one thousand (1,000):
2. On Organization:
No person, corporation, partnership or association may organize more than one agency in any one city or
municipality.
3. On Service:
16 | L E A - 2
No agency shall offer, render or accept its services to gambling dens or other illegal enterprises.
The extent of the security service being provided by any security agency shall not go beyond the whole
compound or property of the person or establishment requesting the security service except when they
escort big amount of cash.
1. License to Operate
Is license certificate document, issued by the Chief, PNP or his duly authorized representative,
authorizing a person to engage in employing security guard or detective, or a juridical person to
establish, engage, direct, manage, or operate an individual or a private detective agency or private
security agency/company security force after payment of the prescribed dues or fees as provided.
Application of LTO:
To the Chief, PNP through the PNP Security and Guard Supervision Division, Civil Security Group
(SAGSD-CSG). Using license application form PNPSF1, the application shall contain the full name of
the applicant, his age, civil status, his residence and location of business
Temporary License
Is issued by the PNP thru CSG Directorate after the applicant/licensee should have complied with all the
requirements while it has less than two hundred guards.
Regular License
Is issued to the PSA once it is qualified of having two hundred (200) or more licensed security guard in its
employ duly posted.
It is renewable every two years
3. Firearms License
All firearms of the security agency should be covered with firearms license issued by the PNP through
Firearms Explosives Division under the Civil Security Group
Renewable every two years.
Qualifications Required:
17 | L E A - 2
No person shall be licensed as SECURITY GUARD unless he is:
a) a Filipino citizen;
b) a high school graduate;
c) physically and mentally fit;
d) not less than 18 years of age nor more than 50 years of age;
e) Has undergone a pre-licensing training course or its equivalent
Possession of Firearms:
one firearm for every two security guards (1:2) in its employ;
No PSA/CSF/GSU shall be allowed to possess firearms in excess of 500 units
Stocking of ammunition:
PSA shall not exceed fifty (50) rounds of ammunition per unit of duly licensed firearms.
Individual issue to each a security guard shall be limited to one half of such basic load or twenty-five
(25) rounds for every security guard
SAGSD
Security Agency, Guard and Supervision Division
SOSIA
Supervisory Officer for Security and Investigative Agencies
PADPAO
Philippines Association of Detective and Protective Agency Operators, Inc.,
An association of all licensed security agencies and company security forces.
The one who are authorized to issue the implementing rules and regulations pertaining to R.A. No. 5487.
DDO (Duty Detail Order)
A written order/schedule issued by a superior officer usually the private security agency/branch manager or
operation officers assigning the performance of private security detective.
What is Secret?
This question is taken up first because it is relevant even in cases where data involved are not trade secrets but
merely simple facts. If information is not novel or secret, it is not entitled to any protection; it is the property of
everyone and it is in the public domain.
To be secret, information must generally meet the following tests:
a. It must be identifiable
b. It must not be already available in public sources
c. It must be disclosed by the owner only to persons who under some duty to protect its secrecy
d. Persons to whom it is disclosed must know it is a secret
e. There must be some objective indication that the owner is attempting to prevent its unauthorized disclosure
A Patent is a grant made by the government to an inventor, conveying and securing to him exclusive rights to make,
use and sell his invention for a term of 20 years.
The main differences between a Trade Secret and a Patent are:
a. A trade secret can remain a secret for as long as it continues to meet the trade secret test, whereas an
exclusive right patent expires after a period of 20 years.
b. Since anyone can purchase a patent, they are not industrial espionage targets, whereas trade secrets are.
Basis of Document, Information, and Communication Security:
Security of documents and information is based on the premise that the government has the right and duty
to protect official papers from unwarranted and indiscriminate disclosure.
In answer to this problem, Malacañang, Manila dated August 14, 1964 entitled “Promulgating rules
governing security of classified matters in Government Offices” was promulgated in order to safeguard our
secrets as secrets.
Standard Rules
The authority and responsibility for the preparation and classification of classified matter rest exclusively
with the originating office. Classified matter shall be classified according to their content and not to the
classification of files in which they are held or another document to which they referred;
Classification shall be made as soon as possible by placing the appropriate marks on the matter to be
classified.
Each individual whose duties allow access to classified matter, or each individual who possesses knowledge
of classified matter while it is in his possession shall insure that dissemination of such classified matter is on
the “need-to-know” basis and to properly cleared persons only.
Matter
In Document and Information Security, it includes everything, regardless of its physical character, or in which
information is recorded or embodied.
A general term referring to documents, equipment, projects, books, reports, articles, notes, letters, drawings,
drawings, sketches, plans, photographs, recordings, machinery, models, apparatus, devices, and all other
products or substances.
For purposes of security, it is also information which is transmitted orally.
Classified
refers to assign information by one of the four classification categories.
Security Clearance
19 | L E A - 2
is the certification by a responsible authority that the person described is cleared for access to classified
matter in the appropriate level.
Need-to-know
is the principle whereby access to classified matter may only be only given to those persons to whom it is
necessary for the fulfillment of their duties? Persons are not entitled to have access to classified matter solely
by virtue of their status or office. It is a requirement that the dissemination of classified matters be limited
strictly to persons whose official duty requires knowledge or possession thereof.
Certificate of Destruction
the certification by a witnessing officer that the classified matters describe therein has been disposed of in his
presence, approved destruction methods.
Compromise
means loss of security, which results from unauthorized persons obtaining knowledge of classified matter.
Compartmentation
the grant of access to classified matter only to properly cleared persons in the performance of their official
duties.
Declassify
the removal of security classification from classified matter.
Reclassify/Regrading
the act of changing the assigned classification of matter.
Up-grading
is the act of assigning to a matter of higher classification to a classified document.
Documents Security
is that aspect of security which involves the application of security measures for the proper protection and
safeguarding of classified information.
Classification Categories
Official matter which requires protection in the interest of national security shall be limited to four categories
of classification which in descending order of importance shall carry one of the following designations:
1. TOP SECRET 3. CONFIDENTIAL
2. SECRET 4. RESTRICTED
Secret
Red Color Code
Is any information and material (matter), the unauthorized disclosure of it would endanger national
security, cause serious injury to the interest or prestige of the nation or any governmental activity or
advantage to a foreign nation.
Confidential
Blue Color Code
Is any information and material (matter) the unauthorized disclosure of it, would be prejudicial to the interest
and prestige of the national or governmental activity, or would cause administrative embarrassment or
unwarranted injury to and be of advantage to a foreign country.
Restricted
White or No Color
Is any information and material (matter), which requires special protection other than that
determined to be TOP SECRET, SECRET, or CONFIDENTIAL.
Memorandum Circular No. 78 dated August 14, 1964 and Memorandum Circular No. 196 dated July 19, 1968
20 | L E A - 2
Were promulgated to ensure against unauthorized access or disclosure of information and classified matters
which could cause grave damage to the government or national interest;
SECURITY HAZARD
Any act or condition which may result in the compromise of information, loss of life, and loss or
destruction of property or disruption of the activity of the installation.
The Extent and Degree of Risk to Security will dependent on the following:
A. Relative Criticality of Operation
It is the importance of the firm with reference to the natural economy and security.
B. Relative Vulnerability
It is the susceptibility of the plant or establishment to damage, loss or disruption of operation due to
various hazards.
Types of Hazards:
A. Human/Man-made Hazard B. Natural Hazard
Human/Man-made Hazard
These are hazards which are the result of a state of mind, attitude, weaknesses or character traits of one or
more persons.
They can be acts of commission or omission, both overt and covert, which can disrupt operation of a plant or
installation
The following are types of human/man – made hazards
a) Carelessness – accident and c) Espionage, pilferage and theft
dissatisfaction d) Vandalism, etc.
b) Disloyalty – subversion and sabotage
Natural Hazard
21 | L E A - 2
Those caused by natural phenomena which cause damage, disturbance and problems of the normal
functioning of human activities, including security.
It includes floods caused by typhoons, earthquakes, lighting storms, volcanic eruptions, high-velocity winds,
tidal waves, etc.
Types of Pilferers:
1. Casual Pilferer
one who steals due to his inability to resist the unexpected opportunity and has little fear of detection;
are no plan or premeditation and he being usually a “loner” on the job?
2. Systematic Pilferer
one who steals with preconceived plans and takes away any or all types of items or supplies for economic
gain.
Pilferers of this kind can be employees or outsiders of the establishment.
RISK ANALYSIS
Risk
It is the potential damage or loss of an asset. The level of risk is a combination of two factors:
a) The value placed on that asset by its owner and the consequence, impact adverse effect of the loss or
damage to that asset and;
b) the likelihood that a specific vulnerability will be exploited by a particular threat.
Risk Management
It is a process of selecting and implementing security countermeasures to achieve an acceptable level
of risk at an acceptable cost.
Risk Analysis
It is the analysis of risk includes examinations of the vulnerability, probability and criticality of
potential threats and includes natural and man-made risk.
Adversary
An individual, group, organization, or government that conducts activities or has the intention and capability
to conduct activities detrimental to the individual, private or government entity.
Asset
Any information, facility, material, information, or activity which has a positive value to its owner whether it is
an individual, private or government entity.
Countermeasures
An action taken or a physical entity used to reduce or eliminate one or more vulnerabilities.
The cost of possible countermeasures may be monetary, but may also include non-monetary cost such as
reduced operational efficiency, adverse publicity unfavorable working conditions, and political consequences.
Security Survey
defined as a critical on-site examination and analysis of an industrial plant, business, a home or public or
private institution, done to ascertain the facility’s current security status, to identify deficiencies or excess in
current practices, to determine what protection is needed and to make recommendation for improving the
over-all level of security at that installation.
It is an estimate of the security standards of a unit, and is conducted to enable the responsible officer to
recognize and evaluate security hazards and determine protective measures necessary to the prevention of
sabotage, espionage, subversive activities and other criminal acts inimical towards the interest and/or
mission of the unit and/or command.
Security Inspection
This complements security survey in its attempt to prevent losses of company properties.
Is conducted for two reasons:
a) to check on the degree of compliance with the recommended countermeasures; and
b) to determine the effectiveness and adequacy of the countermeasures which are in effect
Continuous Inspection
To keep pace with the constant changes in the organization, changes in security terms of attitudes, lifestyle
and moral values, and the rapid advancement of technological modifications all around us, the inspection
must be an on-going and never-ending activity.
Unstructured inspection
Conducted in a random manner. There is no formal or logical sequencing.
For example, the inspection may start with countermeasures for proprietary information, then
emergency plan, followed by investigation and so forth.
Entrance Conference
A conference or dialogue between the survey team and management officials of a plant before security
survey is conducted
Exit Conference
A conference similar to entrance conference, done after the completion of the security survey
23 | L E A - 2
SECURITY EDUCATION
Is conducted to develop security awareness among employees in the company.
It should cover all employees, regardless of rank or position.
Initial Interview
The first contact of the prospective employee wherein the interviewer determines the suitability of the
applicant for employment through his given answers on the different type of questions being conducted.
It is in this stage where the interviewer may start providing the necessary information as to the overview of
company security policies and at the same time on the employee accountability and corresponding penalties
that could result from violation therefrom.
Orientation and Training
It is in this stage where new employees receive detailed presentation of personnel security policy.
Usually, hand-outs or employee’s manual are being distributed for reference.
New employees also requested to sign acknowledgement that they have been aware of the existing company
policies and will abide the same.
Refresher Conference
It is design to remind employees of the company about their responsibilities, review the guidelines and
policies, introduction of new policies and regulations and a movement of getting employees feedback about
the company policies that is being implemented.
Security Reminders
This employed as an indirect approach of educating the employees, such as posting security posters and
distributing fliers.
Security Promotion
The act of emphasizing the importance and role of security achieving the company goals and objectives.
It involves security employees’ cooperation and support.
-------END-------
24 | L E A - 2
25
25 | L E A - 2