Issm Slide Lecture

Download as pdf or txt
Download as pdf or txt
You are on page 1of 207

INTRODUCTION TO

INDUSTRIAL SECURITY
AND
SAFETY MANAGEMENT
FRANKLYN T. ALITA, Crmnlgst.
License No. 0121212
 CONCEPT OF SECURITY –

Security is a state or condition


of being secured; there is
freedom from fear, harm,
danger, loss, destruction or
damages.
 three major areas of Security

1. Physical Security
2. Personnel Security
3. Document and Information Security
 Physical Security

- this concern with the physical measures


adopted to prevent unauthorized access to
equipment, facilities, material and
document and to safeguard them against
espionage, sabotage, damage, loss and
theft.
 Personnel Security

-Its purpose is to insure that a firm hires


those best suited to assist the firm in
achieving its goals and objectives
 Document and Information
Security

-this involves the protection of


documents and classified papers
from loss, access by unauthorized
persons, damage, theft and
compromise through disclosure.
PROTECTIVE SECURITY
SYSTEMS
 Protective Security can be defined as
those measures taken by an
installation or unit to protect itself
against sabotage, espionage or
subversion and at the same time
provide freedom of action in order to
provide the installation of the unit
with the necessary flexibility to
accomplish its mission.
 Industrial Security

– a type of security applied to business


groups engaged in industries like
manufacturing, assembling, research and
development, processing, warehousing and
even agriculture. It may also mean the
business of providing security.
 Hotel Security

- a type of security applied to hotels where


its properties are protected from pilferage,
loss, damage and the function in the hotel
 Bank security

- this type of security is concern with bank


operations. Its main objective is the
protection of bank cash and assets, its
personnel and clientele.
 VIP Security

- a type of security applied for the


protection of top-ranking officials of the
government or private entity, visiting
persons of illustrious standing and foreign
dignitaries.
 School Security

- a type of security that is concern with the


protection of students, faculty members,
and school properties.
 Supermarket or Mall Security

- a type of security which is concern with


the protection of the stores, warehouses,
storage, its immediate premises and
properties as well as the supermarket
personnel and customers.
 Other types

– this include all other security matters not


covered in the above enumeration.
PHYSICAL SECURITY
 Physical security measures are being used
to define, protect, and monitor property
rights and assets. These measures consist
of barriers and devices that would detect,
impede, and prevent unauthorized access
to equipment, facilities, material and
document and to safeguard them against
espionage, sabotage, damage and theft.
 What is a Barrier?
Abarrier can be defined as any
structure or physical device
capable of restricting, deterring,
delaying, illegal access to an
installation.
 Generally, a barrier is use for the following
purposes:

 Define the physical limits of an area.


 Create a physical and psychological deterrent
to unauthorized entry.
 Prevent penetration therein or delay
intrusion, thus, facilitating apprehension of
intruders.
 Assist in more efficient and economical
employment of guards
 Facilitate and improve the control and
vehicular traffic.
Types of Barriers

H-A-N-E-S
 Human barriers

- persons being used in providing a


guarding system or by the nature of their
employment and location, fulfill security
functions. Examples are guards, office
personnel, shop workers, etc.
 Animal barriers

- animals are used in partially providing a


guarding system. Dogs are usually trained
and utilized to serve as guard dogs.
German shepherds are best suited for
security functions. Goose and turkeys could
also be included.
 Natural barriers

- it includes bodies of waters, mountains,


marshes, ravines, deserts or other terrain
that are difficult to traverse.
 Energy barriers

- it is the employment of mechanical,


electrical, electronic energy imposes a
deterrent to entry by the potential intruder
or to provide warning to guard personnel.
These are protective lighting, alarm system
and any electronic devices used as barriers.
 Structural barriers

- these are features constructed by man


regardless of their original intent that tends
to delay the intruder. Examples are walls,
doors, windows, locks, fences, safe,
cabinets or containers etc.
 Three
Line of Physical
Defense
First line of Defense- perimeter fences/
barriers

Second line of defense- doors, floors,


windows, walls, roofs and grills and other
entries to the buildings

Third line of defense- storage system like


steel cabinets, safes, vaults and interior
files.
Principles of Physical Security
The type of access necessary will depend
upon a number of variable factors and
therefore may be achieved in a number of
ways.
 Enemy agents must access
 There is no impenetrable barrier
 Defense-in depth is barriers after barriers
 Delay is provided against surreptitious
and non-surreptitious entry.
 Each installation is different.
What is a Restricted Area?
Arestricted area is any area in which
personnel or vehicles are controlled
for reasons of security. Restricted
area is established to provide
security for installation or facilities
and to promote efficiency of security
operations and economy in the use
of security personnel.
 Types of Restricted Areas
Exclusion Area- an exclusion area is a
restricted area which contains a security
interest to TOP SECRET importance, and
which requires the highest degree of
protection.

Limited Area Control- a limited area is a


restricted area in which a lesser degree of
control is required than in an exclusion area
but which the security interest would be
compromised by uncontrolled movement.
 Limited Area Control includes the
following:

-Interior Area Control

-Visitor Identification and Movements


Control

-Key Control

-Fire Prevention
 Interior Area Control

- Interior area control is generally affected


in two ways. The first method is the system
which is initiated and terminated at the
outer limits of the area to determine the
movements of a visitor within the area. A
second somewhat less means of
accomplishing the same thing is time
travel. This system provides for checking
the actual time used by the visitor against
known time requirements for what the
visitor is to accomplish.
 Visitor
Identification and
Movements Control

- Processing and control of


movements of visitor shall be included
in the PASS SYSTEM. The control of
movements of visitor will depend on
the installation.
 Key Control

- A system of controlling keys shall be


advised and regulations covering the
disposal, storage or withdrawals, shall
be issued and imposed.
 Fire Prevention

- fire is so potentially destructive without


human assistance, with assistance it can be
caused to devastate those things you are
attempting to secure and, professionally
accomplished, often in a way that does not
leave recognizable evidence of sabotage.
What is Perimeter Security?
 Perimeter Security

- It is the protection of the


installation’s inner and the immediate
vicinity. The main purpose of
perimeter barrier is to deny or
impede access or exit of
unauthorized person. Basically, it is
the first line of defense of an
installation. This is maybe in the form
of fences, building walls or even
bodies of water.
 Types of Perimeter Barrier

- Perimeter barriers includes fences, walls,


bodies of water

 Types of Fences:
-Solid fence
-Full-view fence
 Solid fence
 -constructed in such away that visual
access through the fence is denied.
Its advantage is that it denies the
opportunity for the intruder to become
familiar with the personnel, activities and
the time scheduled of the movements of
the guards in the installation. On the
other hand, it prevents the guards
from observing the area around the
installation and it creates shadow that
may be used by the intruder for cover and
concealment.
 Full-view fence
- it is constructed in such away that visual
access is permitted through the fence.
Its advantages are that it allows the roving
patrols and stationary guard to keep the
surrounding are of the installation under
observation. On the other hand, it allows
the intruder to become familiar with
the movements and time schedule of
the guard patrols thereby allowing him to
pick the time that is advantageous on his
part.
 Types of Full-View Fence

-Chain link fence


-Barbed wire fence
-Concertina wire fence
Chain link fence
 It must be constructed of 7 feet material
excluding top guard.
 It must be of 9 gauges or heavier.
 The mesh openings are not to be larger than
2 inches per side.
 It should be twisted and barbed selvage at
top and bottom
 It must be securely fastened to rigid metal or
reinforced concrete.
 It must reach within 2 inches of hard ground
or paving.
 On soft ground, it must reach below surface
deep enough to compensate for shifting soil
or sand.
Barbed wire fence
 Standard barbed wire is twisted, double-
strand, 12-gauge wire with 4 point barbs
spaces in an equal distance apart.
 Barbed wire fencing should not be less
than 7 feet high excluding top guard.
 Barbed wire fencing must be firmly affixed
to posts not more than 6 feet apart.

 As a standard, the distance between


strands must not exceed 6 inches at least
one wire will be interlaced vertically and
midway between posts.
Concertina wire fence

 Standard concertina barbed wire is


commercially manufactured wire coil
of high strength steel barbed wire
clipped together at intervals to form
a cylinder.

 Opened concertina wire is 50 feet


long and 3 feet in diameter.
Perimeter Barrier Opening
 Gates and Doors

- when not in use and controlled by


guards, gates and doors in the perimeter
should be locked and frequently inspected
by guards. Locks should be changed from
time to time and should be covered under
protective locks and key control.
 Side-walk-elevators

- these provide access to areas within the


perimeter barrier and should be locked and
guarded.
 Utilities Opening
- sewers, air intakes, exhaust tunnels
and other utility openings which
penetrate the barrier and which have
cross sectional areas of 96 square
inches or more should be protected by
bars, grills, water filled traps or other
structural means providing equivalent
protection to that portion of the
perimeter barriers.
 Clear Zones

- an obstructed area or a “clear zone”


should be maintained on both sides of the
perimeter barrier. A clear zone of 20 feet or
more is desirable between the barriers and
exterior structures and natural covers that
may provide concealment for assistance to
a person seeking unauthorized entry.
Additional Protective Measures
 Top Guard

- additional overhang of barbed wire placed


on vertical perimeter fences upward and
outward with a 45 degree angle with 3 to 4
strands of barbed wires spaced 6 inches
apart.
 Guard Control stations

- this is normally provided at


main perimeter entrances to
secure areas located out-of-
doors, and manned by guards on
full-time basis.
 Tower Guard

- this is a house-like structure above


the perimeter barriers. The higher the
tower, the more visibility it provides.
It gives a psychological unswerving
effect to violators.
 Barrier Maintenance

- fencing barriers and protective walls


should always be regularly inspected
by security. Any sign or attempts to
break in should be reported for
investigation. Destruction of fence or
sections thereof should be repaired
immediately and guard vigilance
should be increased.
 Protection in Depth

- in large open areas or ground


where fencing or walling is
impractical and expensive,
warning signs should be
conspicuously placed
 Signs and notices

- “Control signs” should be erected


where necessary in the management
of unauthorized ingress to preclude
accidental entry. Signs should be
plainly visible and legible from any
approach and in an understood
language or dialect.
What is Protective Lighting?
Protective lighting

-is the single most cost-effective


deterrent to crime because it
creates a psychological deterrent
to the intruders.
Types of Protective Lighting
 Continuous lighting

- the most familiar type of


outdoor security lighting, this
is designed to provide two specific
results: glare projection or
controlled lighting.
Standby lighting

- it is designed for reserve or


standby use or to supplement
continuous systems. A standby
system can be most useful to
selectively light a particular area
in an occasional basis.
Movable or Portable lighting

- this system is manually


operated and is usually made up
of movable search or floodlights
that can be located in selected or
special locations which will
require lighting only for short
period of time.
Emergency lighting

- this system is used in


times of power failure or
other emergencies when
other systems are inoperative.
General Types of Lighting
Sources
 Incandescent lamp

 Mercury vapor lamp

 Metal halide

 Fluorescent

 High-pressure sodium vapor


 Incandescent lamp

- it is the least expensive in terms


of energy consumed and has the
advantage of providing instant
illumination when the switch is
on.
 Mercury vapor lamp

- it is considered more efficient that


the incandescent and used
widespread in exterior lighting.
This emits a purplish-white color,
caused by an electric current passing
through a tube of conducting and
luminous gas.
Metal halide

- it has similar physical


appearance to mercury vapor but
provides a light source of
higher luminous efficiency and
better color rendition.
 Fluorescent

- this provides good color rendition,


high lamp efficiency as well as long
life. However, it cannot project light
over long distance and thus are not
desirable as flood type lights.
High-pressure sodium vapor

- this has gained acceptance for


exterior lighting of parking
areas, roadways, buildings and
commercial interior installations.
Types of Lighting Equipment
 Floodlights

 Street lights

 Search lights

 Fresnel lights
Floodlights

- These can be used to


accommodate most outdoor
security lighting needs, including
the illumination of boundaries, fences
and buildings and for the emphasis of
vital areas or particular buildings.
Street lights

- This lighting equipment received


the most widespread notoriety for
its value in reducing crime.
Search lights

- These are highly focused


incandescent lamp and are
designed to pinpoint potential
trouble spots.
Fresnel lights

- These are wide beam units,


primary used to extend the
illumination in long, horizontal
strips to protect the approaches
to the perimeter barrier. Fresnel
projects a narrow, horizontal
beam
What are Protective Alarms?
Protective alarm

-is one of the important barriers in


security. It assists the security in
detecting, impeding or deterring
potential security threat in the
installation. Basically, its function is to
alert the security personnel for any
attempt of intrusion into a protected
area, building or compound.
Three Basic Parts of Alarm
System
 Sensor or trigger device - it emits the
aural or visual signals or both.

 Transmission line - a circuit which


transmit the message to the signaling
apparatus.

 Enunciator - it is the signaling system that


activates the alarm.

Types of Protective Alarm System

 Central Station System

 Proprietary system

 Local Alarm

 Auxiliary alarm
Central Station System

- a type of alarm where the control


station is located outside the plant
or installation. When the alarm is
sounded or actuated by subscriber,
the central station notifies the police
and other public safety agencies.
Proprietary system

- centralized monitor of the


proprietary alarm system is located in
the industrial firm itself with a duty
operator. In case of alarm, the duty
operator calls whatever is the primary
need; firefighters, police, an
ambulance or a bomb disposal unit.
 Local Alarm

– This system consist of ringing


up a visual or audible alarm near
the object to be protected. When
an intruder tries to pry a window,
the alarm thereat goes off.
Auxiliary alarm

- company-owned alarm systems with


a unit in the nearest police station so
that in case of need, direct call is
possible. The company maintains the
equipment and lines both for the
company and those in the police, fire
and other emergency agencies by
special arrangement. Radio, landlines,
or cell phones can avail of the
auxiliary system.
Kinds of Alarms

 Audio Detection Device

 Vibration Detection Device

 Metallic foil or wire

 Laser Beam Alarm

 Photoelectric or Electric Eye Device


Audio Detection Device

- it will detect any sound caused


by attempted force entry. A
supersonic microphone speaker
sensor is installed in walls,
ceilings and floors of the
protected area.
Vibration Detection Device

- it will detect any vibration


caused by attempted force entry.
A vibration sensitive sensor is
attached to walls, ceilings or
floors of the protected area.
Metallic foil or wire

- it will detect any action that


moves the foil or wire. An
electrically charge strips of tinfoil
or wire is used in the doors,
windows or glass surfaces of the
protected area.
Laser Beam Alarm

- a laser emitter floods a wall or


fencing with a beam so that when
this beam is disturbed by a
physical object, an alarm is
activated.
Photoelectric or Electric Eye
Device

- an invisible/visible beam is
emitted and when this is
disturbed or when an intruder
breaks contact with the beam, it
will activate the alarm.
What is a Lock?
A lock is defined as a mechanical,
electrical, hydraulic or electronic
device designed to prevent entry
into a building, room, container or
hiding place.
Types of Locks

1. Key-operated mechanical lock


2. Padlock
3. Combination lock
4. Code-operated lock
5. Electrical lock
6. Card-operated lock
Key-operated mechanical lock

- it uses some sort of arrangement of


internal physical barriers (wards tumblers)
which prevent the lock from operating
unless they are properly aligned. The key is
the device used to align these internal
barriers so that the lock may be operated.
 Three(3) Types of Key-
operated Lock

1. Disc or wafer tumbler


mechanism
2. Pin tumbler mechanism
3. Lever tumbler mechanism
Padlock

- a portable and detachable lock


having a sliding hasp which
passes through a staple ring and
is then made fasten or secured.
Combination lock

- instead of using the key to align the


tumblers, the combination mechanism
uses numbers, letters or other
symbols as reference point which
enables an operator to align them
manually.
Code-operated lock

- a type of lock that can be


opened by pressing a series of
numbered button in the proper
sequence.
Electrical lock

- a type of lock that can be


opened and closed remotely by
electrical means.
Card-operated lock

- a type of lock operated by a


coded card.
Types of Keys

1. Change key
2. Sub-master key
3. Master key
4. Grand Master key
 Key Control

Once an effective key control has


been installed, positive control of all
keys must be gained and maintained.
This can be accomplished only if it is
established in conjunction with the
installation of new locking devices.
 Key cabinet

a well-constructed cabinet will


have to be procured. The cabinet
will have to be of sufficient size to
hold the original key to every lock
in the system. It should be
secured at all times.
Key record

- some administrative means


must be set up to record code
numbers and indicates to whom
keys to specific locks have been
issued.
Inventories

- periodic inventories will have to


be made of all duplicate and
original keys in the hands of the
employees whom they have been
issued.
Audits

- in addition to periodic inventory,


an unannounced audit should be
made of all key control records
and procedures by a member of
management
Daily report

- a daily report should be made to the


person responsible for key control
from the personnel department
indicating all persons who have left or
will be leaving the company.
 What is a Security Cabinet?

The final line of defense at any facility is in


the high security storage where papers,
records, plans or cashable instrument,
precious metals or other especially valuable
assets are protected.
 Three(3) Types of Security
Cabinet

1. Safe
2. Vault
3. File room
 Safe

- a metallic container used for the


safekeeping of documents or small items in
an office or installation. Safe can be
classified as either robbery or burglary
resistance depending upon the use and
need.

Its weight must be at least 750 lbs. And


should be anchored to a building structure.

Its body should at least one inch thick


steel.
 Vault

- heavily constructed fire and burglar


resistance container usually a part of the
building structure used to keep and protect
cash, documents and negotiable instruments.
Vaults are bigger than safe but smaller than
a file room.

 The vault door should be made of steel at


least 6 inches in thickness.

 The vault walls, ceiling, floor reinforce


concrete at least 12 inches in thickness.

 The vault must be resistive up to 6 hours.


 File room
- a cubicle in a building constructed a little
lighter than a vault but of bigger size to
accommodate limited people to work on the
records inside.

 The file room should at most be 12 feet


high.

 It must have a watertight door and at


least fire proof for one hour.
PERSONNEL SECURITY
Control of Personnel in the
Physical Facility
2 Types of Personnel
Identification

1. Personal recognition
2. Artificial recognition-
identification cards, passes,
passwords, etc.
Use of Pass System

1. Single pass system

2. Pass exchange system

3. Multiple pass system


Single pass system

- the badge or pass coded for


authorization to enter specific areas is
issued to an employee who keeps it in
his possession until his authorization
is terminates.
Pass exchange system

- an exchange takes place at the


entrance of each controlled area.
Upon leaving the personnel
surrenders his badge or passes
and retrieve back his basic
identification.
Multiple pass system

- this provides an extra measure


of security by requiring that an
exchange take place at the
entrance of each restricted area.
 Visitors Movement Control

Security should establish proper


methods of establishing the authority
for admission of visitors as well as the
limitation thereat. This security
measure would depend on the
sensibility of the installation, but could
include the following:
Visitor’s logbook

– All visitors to any facility should be


required to identify them selves and should
be given a visitor’s ID by the security.
Visitor’s logbook should be filled up with
the named of visitors, nature and duration
of visit.
Photograph

- taking of photographs should also be


considered. Extreme caution must be
exercised in areas where classified
information is displayed to preclude
unauthorized taking of pictures of the
installation.
Escort

- If possible visitors should be


escorted by the security to
monitor their activity within the
establishment and guide them
where to go.
Visitor entrances

- separate access for visitors and


employees of the establishment
should be provided.
Time- traveled

- If there is a long delay or


time lapse between the
departure and arrival, the
visitors maybe required to
show cause for the delay.
Access to “restricted Areas”
can be partially controlled by
fences, gates and other physical
means, but the individual working
in the area is the key to the
bringing out of classified matter
to unauthorized personnel.
What is Personnel Security
Investigation?

It is an inquiry into the character,


reputation, discretion and loyalty of
individual in order to determine a person’s
suitability to be given security clearance.
 Types of Personnel Security
Investigation (PSI)

National Agency Check (NAC). – This is an


investigation of an individual made upon the basis
of written information supplied by him in response
to official inquiry, and by reference to appropriate
national agencies.
Local Agency Check (LAC) – This type of
investigation consist of the first type plus written
inquiries sent to appropriate local government
agencies, former employees, references and
schools listed by the person under investigation.
Background Investigation (BI)

A through and complete


investigation of all or some of the
circumstances or aspects of a
person’s life is conducted.
 Complete Background Investigation –
Consist of the investigation of the
background of a person, particularly all
the circumstances of his personal life.

 Partial Background Investigation –


Consist of the investigation of the
background of an individual but limited
only to some of the circumstances of his
personal life which are deemed pertinent
to the investigation.
 Factors considered in Background
Investigation.

 Loyalty – faithful allegiance to the country,


government and its duly constituted
authority.
 Integrity- uprightness in character,
soundness of moral principles, freedom from
moral delinquencies, ore more simply stated-
honesty.
 Discretion- the ability of tendency to act or
decide with prudence; the habit of wise
judgment or simply stated- good judgment
 Moral- distinctive identifying qualities which
serve as an index to the essential or intrinsic
nature of a person; his outward
manifestation, personal traits or moral
habits.
 Character- the sum of the traits that serves
as an index of the essential intrinsic nature of
a person. It is the aggregate of distinctive
mental and moral qualities that have been
impressed by nature, education and habit
upon the individual.
 Reputation- opinion or estimation in which
one is generally held. It is what one reported
to be, whereas character is what a person is.
 Motives that cause people to be
disloyal

Revenge- Hatred wraps the sense of moral


values until the hater will go to any lengths,
even betrayal of his country, to avenge
himself on the person or class of people
hated.

Material Gain- some people are so avid


for material gain that they will stop at
nothing to achieve this end.
Personal Prestige

- this motivation applies to those


whose main desire is for power-
power over others-to prove to the
world what leaders they are.
 Friendship

–through close attachment to


another person, many people,
otherwise of high integrity, will do
things inimical to their country’s
interest.
Ideological Beliefs

- If a person holds inimical to


their country, they are of course
vulnerable to approach by
subversive groups of agents.
THE GUARD FORCE AND GUARD
SYSTEM

The security guard force is the key element


in the overall security system of a plant or
installation. Its basic mission is to protect
all the property within the limits of the
facility boundaries and protect employees
and other persons on the installation.
 Security Guard Defined

 Sometimes called private security guard


or watchman shall include any person who
offers or renders personal service to
watch or secure either a residence or
business establishment or both for hire or
compensation, and with a license to
exercise profession.
Security Guard Force

It is a group of force selected men,


trained or grouped into functional unit
for the purpose of protecting
operational processes from those
disruption which would impeded
efficiency or halt operation at a
particular plant, facility, installation or
special activity
 Types of Security Guard Forces

 Private Security Agency - any person,


association, partnership, firm or private
corporation, who contracts, recruits,
trains, furnishes or post any security
guard, to do its functions or solicit
individual s, business firms, or private,
public or government-owned or controlled
corporations to engage his/its service or
those of his/its security guards, for hire
commission or compensation.
Company Security Force

- A security force maintained and


operated any private company/
corporation for its own security
requirements only.
Government Security Unit

- a security unit maintained and


operated by any government entity
other than military and/a police,
which is established and maintained
for the purpose of securing the office
or compound and/or extension such
government entity.
 Security
Guard’s
Professional Conduct
and Ethics
 Security Guard’s Creed: As a Security
Guard, my fundamental duty is to protect
lives and properties and maintained order
within the vicinity or place of duty, protect
the interest of my employer and our
clients and the security and stability of
our government and country without
compromise and prejudice, honest in my
action, words and thought, and do my
best to uphold the principle: MAKADIOS,
MAKABAYAN AT MAKATAO.
 The 11 General Orders (GO’s)

 To take charge of this post and all companies
property in view and protect/preserve the same
with utmost diligence.
 To walk during tour of duty in military manner,
keeping always in the alert and observing
everything that takes place within sight or
hearing.
 To report all violations of orders I am instructed
to enforce.
 To repeat all calls from post more distant from
the guardhouse where I am station.
 To quit my post only when properly relieved.
 T o receive, obey and pass out to the relieving
guard all order from company officers or officials,
supervisors post in charge or shift leaders.
 To talk to no one except in the line of duty
 To sound or call the alarm in case of fire or
disorder
 To call the superior officer in any case not
covered by instructions.
 To salute all company officials, superiors in the
agency, ranking public officials and commission
officer of the AFP and officers of the PNP.
 To be especially watchful at night and during the
time of challenging to challenge all persons on or
near my post and to allow no one to pass or
loiter without proper authority.
 Selection of Guards - Republic Act
Number 5487 and its implementing
rules and regulations prescribed the
minimum requirements for guards to
be able to secure a license to
exercise profession as a security
guard, private detective, security
officer and security consultant.
 General Requisites in the
Security Profession
1. Filipino Citizen
2. Physically and mentally fit
3. Good moral character
4. Must not posses any
disqualification

 General Disqualification
1. Dishonorably discharge from the service
in the PNP/AFP or any private
government entities.
2. Physically or mentally unfit
3. Conviction of a crime
4. Addicted to drugs or alcohol dummy of a
foreigner
5. Elective or appointive government
official
 Basic Qualifications of an Agency
Operator/Manager
1. In addition to the general
qualifications, an operator should
be:
2. At least 25 years of age
3. Commissioned officer, inactive or
retired from AFP or PNP or a
graduate of Industrial Security
Management with adequate training
and experience in the security
business.
 Basic Qualification of a Security
Consultant
1. In addition to the general
qualifications, a consultant should
be:
2. Holder of Master Degree in
Criminology, MPA, MNSA, Industrial
Management or LL.B.
3. Must have at least ten (10) years
experience in the operation and
management of security business.
Basic Qualifications of a Security
Officer:
1. In addition to the general qualifications,
a security officer, should be:
2. At least graduated from Security Officers
Training Course
3. A retired personnel in the PNP/AFP
4. Must not posses any of the
disqualification.
Basic Qualifications of a Private
Detective

1. In addition to the general qualification, a


detective should posses any of the
following:
2. BS Criminology Graduate
3. LL.B. holder
4. Graduate of a Criminal Investigation
Course
5. Advance ROTC graduate
Basic Qualification of a Security Guard
1. In addition to the general
qualifications , a security guard
should-
2. Be at least high school graduate
3. Be at least 18 years of age but not
more than 50 years old
4. Undergone pre-licensing training
course
5. Passed a neuropsychiatry
examination.
6. Be locally cleared with PNP or NBI
 Desirable
Qualities of
Security Guards
 Alertness- A good guard must
be alert in spotting violators.
This can be attained by being
watchful, dedicated and
diligence.
 Judgment- sound and good
judgment is more than the use
of common sense. It is the
arriving at wise and timely
decision.
 Confidence- it is the state of being
sure; a state of the mind free from
doubt or misgivings. This attribute
includes faith in oneself and in his
abilities, which is attained by job
knowledge. Thorough and proper
training plus good supervision instills
confidence.
 Physical fitness- security work is
strenuous and demanding. Physical
conditioning is essential if he is to be
a dependable guard.
 Tactfulness- ability of the guard to deal
with others successfully without offending.
In short, he can be firm but pleasant.
 Self-control- ability to take hold of
oneself regardless of a provoking
situation. With self-control, the guard will
do his work without being angry and the
situation will be on hand.
 Interest, loyalty, responsible and
trustworthy, is also important attributes
of a reliable guard.
Licenses in the
Security Profession
License to Operate
Security Guard License
Firearm’s license
 License to Operate- before a Private Security
Agency (PSA) can operate; it has to secure a
License to Operate (LTO) categorized as
either temporary or regular. A temporary
license is issued by the PNP thru Civil
Security Croup Directorate after the applicant
/licensee should have complied with all the
requirements while it has less than two
hundred guards. A Regular license to operate
is issued to the PSA once it is qualified of
having two hundred (200) or more license
security guard in its employ duly posted.
Regular license is renewable every two (2)
years.
 Security Guard License-
before a security guard can
practice his profession; he
shall possess valid security
license. The use of expired
license is not allowed. In
case of doubt, licenses may
be verified at the PNP SAGSD
whether valid or fake.
 Firearm’s license- all firearms of the
security agency should be covered
with firearms license issued by the
PNP through its Firearms Explosive
Division under the Civil Security
Group, renewable every two years.
No duplication of two or more
firearms with the same make and
serial number shall be covered by
one license.
 Firearms and Weapons Authorized for
Used of the Security Guard While on
Duty
 Handguns/Low-powered (cal. 22 and
cal.38) not exceeding one FA for every
two guards employed.
 Shotguns (not bigger than 12 gauge)
 High-powered- when the agency is
operating in areas where there is upsurge
of lawlessness and criminality as
determined by the Chief PNP.
 Guard’s Uniforms, Equipment and Paraphernalia

 Set of Uniforms for Security Personnel - Headgear-


pershing cap for men and 2 ply cap for women, Service
Bush Jacket- intended for Directorial and Staff officers,
Service shirt, Service trouser, Service belt, Footwear
 Color of Uniforms - Private Security Agency- navy blue
(upper and lower), Company Security Forces- light
blue/light gray for upper and navy blue for lower,
Government Security Forces- white for upper and navy
blue for lower
 Ornaments and Patches - National badge, Cap device,
Regulation buckle, Collar device, Name cloth, Agency/unit
name cloth
 Equipment and Paraphernalia - Leather pistol belt with
regulation buckle, Holster, black leather for pistol, Night
stick with horizontal handle, Whistle with lanyard,
Handheld radio, Pocket notebook and ball pens
DOCUMENTAND
INFORMATION
SECURTY
 ClassificationCategories - Official
matter which requires protection in
the interest of national security
shall be limited to four categories of
classification which in descending
order of importance shall carry one
of the following designations:

 TOP SECRET
 SECRET
 CONFIDENTIAL
 RESTRICTED
 What are Top Secret Matters?
 These are information and material
(matter), the unauthorized
disclosure of which would cause
exceptionally grave damage to the
nation, politically, economically or
from a security aspect. This category
is reserve for the nation’s closest
secrets and is to be used with great
reserve.
 What are Secret Matters?

 These Information and material


(matter), the unauthorized
disclosure of which would endanger
national security, cause serious
injury to the interest or prestige of
the nation or of any governmental
activity or would be of great
advantage to a foreign nation.
 What are Confidential Matters?

 These are information and material


(matter) the unauthorized disclosure of
which, while not endangering the national
security, would be prejudicial to the
interest or prestige of the nation or any
governmental activity, or would cause
administrative embarrassment or
unwarranted injury to an individual or
would be of advantage to a foreign nation.
 What are Restricted Matters?

 These are information and material


(matter), which requires special
protection other than that determined to
be TOP SECRET, SECRET, or
CONFIDENTIAL. Authority to classify shall
be the same as for CONFIDENTIAL matter.
Reproduction is authorized. Transmission
shall be through the normal dissemination
system.
 Purpose of Protecting
Classified Materials

1. Deter and impede potential spy


2. Assist in security investigations
by keeping accurate records of
the moments of classified
materials.
3. Enforce the use of “Need to
Know” principle
 Security Clearance is the
certification by a
responsible authority that
the person described is
cleared for access to
classified matter the
appropriate level.
 Need-to-know is the principle
whereby access to classified
matter may only be only given
to those persons to whom it is
necessary for the fulfillment of
their duties. Persons are not
entitled to have access to
classified matter solely by virtue
of their status or office.
 Certificated of Destruction
is the certification by a
witnessing officer that the
classified matters describe
therein has been disposed
of in his presence,
approved destruction
methods.
 Classifiedrefers to assign
information by one of the
four classification
categories.
Security Clearance
refers to the
administrative
determination that an
individual is eligible for
access to classified
matter.
Compromise means
lose of security, which
results from an
authorized persons
obtaining knowledge
of classified matter.
Compartmentation is
the grant of access to
classified matter only to
properly cleaved
persons in the
performance of their
official duties.
Declassify is the
removal of security
classification from
classified matter
 Reclassify / Re grading is
the act of changing the
assigned classification of
matter
Up- grading is the act
of assigning to a matter
of higher classification
to a classified
document.
RISK ANALYSIS AND
SECURITY HAZARD
What is a Risk? It is the potential
damage or loss of an asset. The level
of risk is a combination of two factors:
The value placed on that asset by its
owner and the consequence, impact
adverse effect of the loss or damage
to that asset and; the likelihood that a
specific vulnerability will be exploited
by a particular threat.
 What is Risk Management?

It is a process of selecting and


implementing security
countermeasures to achieve an
acceptable level of risk at an
acceptable cost.
 What is Risk Analysis?

It is the analysis of risk include


examinations of the vulnerability,
probability and criticality of
potential threats and include
natural and man made risk
 What is an Adversary?

 An individual, group,
organization, or government that
conducts activities or has the
intention and capability to
conduct activities detrimental to
the individual, private or
government entity.
 What is Asset?

 Any information, facility,


material, information, or activity
which has a positive value to its
owner whether it is an
individual, private or
government entity.
 What are Countermeasures? An action
taken or a physical entity used to reduce
or eliminate one or more vulnerabilities.
The cost of possible countermeasures
may be monetary, but may also include
non-monetary cost such as reduced
operational efficiency, adverse publicity
unfavorable working conditions, and
political consequences.
What is Probability?

It is the chance or likelihood that a loss will


take place. Indicated by a mathematical
statement concerning the possibility of an
event occurring
What is Criticality?

It is the impact of a loss as measured


in financial terms. How important it is
in terms of the survival or existence of
the organization.
 Risk Management
Alternatives and
Strategies
1. Risk Avoidance
2. Risk Reduction
3. Risk Spreading
4. Risk Transfer
5. Risk Self-assumption
 RiskAvoidance-
eliminating or removing
the risk totally from the
business, government, or
industrial environment for
which the risk manager
has responsibility
 Risk Reduction- decreasing
the risk by minimizing the
probability of the potential
loss. The reduction of
criminal opportunity is often
accomplished by situational
crime [prevention strategies
to discourage, deter, or deny
criminal incidents.
Risk Spreading-
spreading the risk
through
compartmentation or
decentralization to limit
the impact (criticality) of
the potential loss
Risk Transfer- moving
the financial impact of
the potential loss-over
to an insurance
company.
 Risk Self-assumption-
planned assumption and
acceptance of the potential
risk by making a deliberate
managerial decision of doing
nothing about the threat, or
setting aside resources for
use in case of a specific loss
incident.
 SECURITY HAZARDS - Any
act or condition which may
result in the compromise of
information, loss of life, loss
or destruction of property or
disruption of the objective of
the installation.
 Types of Hazards
1. Natural Hazard
2. Human-Man made Hazards
 Sabotage as a Security Hazard

 Description of a Saboteur

1. He is the most dangerous foe whom security
will have to deal with while planning and
implementing security measures and
techniques.
2. He is an ordinary looking as the next guy but in
his mind, he has the training in deception,
knowledgeable in incendiaries, explosives,
chemistry, bacteriology, mechanics and
psychology.
3. He can work alone, in-groups, or
simultaneously in several places.
 Espionage as a Security Hazard
 Description of an Espionage Agent
1. He is very dangerous adversary and his
skills in deception and his cunning should
never be under estimated.
2. He is usually a person of extensive training
and will be highly effective in gaining the
confidence of people and of extracting
information of value to be relayed to his
employer or handler.
3. Even how well-trained an espionage agent
he might be, he is human like the saboteur
and he can be defeated in his own game if
proper methods and techniques are
undertaken.
 Subversive Activity as a Security
Hazard
 Threats of Subversive Activity
1. It can be local or national in nature and
their mission is to undermine the
authority weaken the organization, and
eventually take over. This can be in
business or any activity.
2. This can be in the form of rumor
mongering, propaganda, undermining
morale, and injecting defeatist attitudes,
and other emotional approaches.
3. It is an activity not easy to detect.
 Pilferage as a Business Hazard
 Pilferage is one of the most annoying and
common human hazards which security
has to deal with. This activity if
uncontrolled can become financial drain if
not a menace to smooth and orderly
operation.
 Failure to detect shortage and inaccurate
inventories will cause inventory losses,
which may be labeled as pilferage.
 Types of Pilferers
 Casual Pilferer- one who steals due to his
inability to resist the unexpected opportunity and
has little fear of detection is no plan or
premeditation and he is usually a “loner” on the
job. The temptation to pick up the article is
basically due to poor security measure. The
implication of causal pilfering is the big
cumulative cost if it remains unchecked.

 Systematic Pilferer- one who steals with
preconceived plans and takes away any or all
types of items or supplies for economic gain.
Pilferers of this kind can be employees or
outsiders of the establishment.

You might also like