Lea 3 Module
Lea 3 Module
Definition of Security
To be secured could mean many different things. It could mean being free from
danger, risk, injury, fear, trouble, doubt or anxiety. Being secure could also refer
to being dependable, strong, good, impregnable or inviolable. Or simply, could
mean having peace of mind.
Related Concept
Risk- is the uncertain of financial loss, then probability that a loss has occurred
or will occur, the variations between actual and expected results, or the possible
occurrence of an undesirable event. The end result of risk is loss or decrease in
value (Sennewald, 2003).
Threat and vulnerability are sometimes interchangeable used with risk. A threat
is anything that could adversely affect assets; it can be classified into natural
hazards (such as floods), accidents (chemical spills), or international terrorism).
Vulnerability means weakness, flaw, or virtually anything that may conceivably be
exploited by a threat; example are holes in a fence, an out-of-date key system
key system or the introduction of a computer virus (Sennewald,2003).
HISTORY OF SECURITY
The historical roots of private agencies can be traced back to thousands of years
when the protection of life and personal property were up to the individual, and
later on passed to tribes, and then to cities.
In pre-historic times, man recognized the need to keep himself from both known
and unknown enemies such as animals, other inhabitants and the environment.
Itself. He used different methods to keep himself safe such as crafting weapons
out of stone and metal, building fire to word off animals, staying in caves or tree
houses, and even staying in the middle of the lake for protection.
The Greek of the ancient period were the ones who organized the first police
force in city states which they termed polis. The Romans, on the other hand,
established the praetorian Guards known as vigils who were tasked to be fire
fighters.
In the middle ages during their invasion of England, the French formed a group of
carefully selected men called shires or sheriff to look after the peace and order of
the different regions.
During the pre -colonial period in the Philippines, the sovereign monarch called
datu or lakan had servants called aliping namamahay who acted as their
watchman or protector.
The Spanish colonial government introduced the Guardia Civil in the Philippines
in 1868 to serve as police force based on the Civil Guard of Spain. They
performed patrol functions in cities and towns, organized operations for the
suppression of bandit groups, and imposed penalties for infringement of laws and
local ordinances.
After World War II, the Indian national or the Bombay pioneered as the
watchman who protected a specific building or commercial establishment.
History shows how public law enforcement and private security evolved
from the same roots but eventually took different directions. The police served
the public interest while the security force served private interests. As crime
became a bigger problem especially in urban areas, police departments who
previously looked down at private security right now are beginning to see the
benefits of building a partnership with them. Now, police functions that did not
involve enforcement, arrest or the use of force inside work spaces are turned
over to security. Traffic control around large commercial properties and patrol
functions around private neighborhoods are also now often provided by security
officers (Faye, 2006).
With the advent of terrorist in countries around the globe, it becomes
more important to build a strong partnership between the police who respond to
terrorist acts and security officers who respond also involve leaders and enforces
in other fields such as firefighting, disaster management, emergency medical
treatment and public health. This, of course, entails a strong support and
commitment from the national government.
With the combination of rising technology of rising technology and the
security industry rapid growth and recognition in organizations comes the
necessary improvement in the professionalism among security officers
With corporate crime becoming a growing area of concern, the increasing role of
private security in crime prevention is becoming more evident. These further
highlights the needs for increased competence and professionalism among
security personnel so that they can effectively play their important role of risk
prevention and management in the organization. These new breed of uniformed
individuals who are armed with education and training, equipped and reliable and
highly technical gadgets, and well informed with their moral and ethical
obligations has now taken over the business of ensuring the security of the most
important assets of organizations.
Categories of Security
1. Physical Security.
2. Personnel Security
1. Public Security
2. National Security
3. International Security
In the private sphere, security can be even further categorized, as shown below.
1. Industrial Security
4. V.I.P. Security
The universal Declaration of Human Rights, which was adopted by the United
Nations on 10 December 1948, guarantees such instinct to protect in Article 3,
which states that “Everyone has the right to life, liberty and security of person”
( united Nations, 1948, emphasis supplied
The International Covenant on Civil and Political Rights, a multilateral treaty also
adopted by the United Nations on 16 December 1966, further recognizes this
right to security of person.
The 1987 Constitution lays the foundation that protects the Filipino citizens’ right
to security. Relevant sections of the constitutions are cited here to demonstrate
specific provisions that guarantee this right.
Section 4, Article II. The prime duty of the Government is to serve and protect
the people; the Government may call upon the people to defend the State and, in
the fulfillment thereof, all citizens may be required, under conditions provided by
law, to render personal, military or civil service.
This section provides that all the qualified citizens of the State, including security
personnel, may be required by law to render personal military or civil service.
Section 9, Article III. Private property shall not be taken for public use without
just compensation.
Section 16, Article XII. The congress shall not, except by general law, provide
for the formation, organization, or regulation of private corporations. Government
owned or controlled corporations may be created or establishment by special
characters in the interest of the common good and subject to the test of
economic viability.
Applicable provisions of Act No. 3815 or “An Act Revising the Penal Code and
Other Penal Laws,” otherwise known as the Revised Penal Code (December 8,
1930) regarding crimes against persons (Title Eight of the Code), personal liberty
and security (Title Nine of the Code), and property (Title Ten of the Code) have
bearing on the individual’s right to security and the private industry.
Republic Act No. 5487 or “Act to Regulate the Organization and Operation of
Private Detective, Watchmen or Security Guards Agencies” is amended by the
Presidential Decree No. 11 on October 3, 1972. In this particular law, the security
guards, watchmen, private detectives and the security officers are considered as
force multipliers of the Philippine National Police (PNP) because of the role they
play in times of disaster or calamities. The chief of the PNP or the mayor of a
certain municipality or city may deputize them to assist the PNP in the
performance of the police duties for the duration of such emergency disaster or
calamity.
1. Site Characteristics
Selection of safeguards can be influenced by the nature of the site such as the
size, layout, utilities, internal activities and assets in the site. Other factors may
include company philosophy and workforce culture.
Physical Barriers
1. To control the movement of people and vehicles into, out of, and
within the facility.
1. Natural Barriers includes bodies of water, mountains, marshes,
ravines, deserts or other terrain that are difficult to cross.
1. Roadblocks
2. Walls
1. Human Barrier
The guard force as a human barrier is the key elements in any security system.
Without it, all other protective devices –mechanical electrical electronic- would be
a useless security action.
2. Animal Barrier
The most common of animal barriers are dogs known as the K-9 team. The
number of dogs to be used relies on the size and kind of installation being
secured. The most popular breed is the German shepherd.
The usual starting point in assessing risk at a facility is the perimeter. The major
purpose of the use of perimeter as barrier is to deny access or exit of
unauthorized persons.
· To facilitate and improve the control of pedestrian and vehicular traffic.
A top guard is an overhead of barbed wire along the top of the fence, facing
outward and upward at approximately 45-degree angle.
Top guard supporting arms will be permanently affixed to the top of the fence
post to increase the overall height of the fence at least one foot
Three strands of barbed wire, spaced 6 inches apart must be installed on the
supporting arms.
1.5 Clear Zones
A clear zone 20 feet or more should exist between the perimeter and barrier
and exterior structure, parking areas and natural or man-made features.
A clear zone of 50 feet or more should exist between the perimeter barrier
and structures within the protected areas except when a building wall
constitutes part of the perimeter barrier. And structures within the protected
areas except when a building wall constitutes part of the perimeter barrier.
a. Roofs - roof usually has sheathing placed over the rafters, often
horizontal wooden boards placed flush on the rafters.
b. Exterior Walls - may be similarly constructed, with sheathing place
diagonally on vertical studs and covered with sheathing paper.
c. Concrete Structures
Floors - Wooden floors normally have flush sheathing covering the joists
diagonally. This surface may then be covered with building papers and flooring
such as tile, cork, rubber, linoleum or wood.
Interior Walls - Interior walls and ceiling may be constructed of lath and plaster.
However,
Doorways- including the frame, jambs, and stops are constructed of either wood
or metal. Doorways are of two general applications: personnel and vehicular.
Other openings
In addition to doors and windows, a wide variety of other openings in the roof,
walls and floor may require consideration. These includes opening for shafts,
vents, ducts or fans; utility tunnels or chases for heat, gas, water, electric power
and telephone; sewers and other types of drains; and other small service
openings.
Establishing interior controls not only maximizes the efforts of security guards.
Such measures also allow or deny access to facilities or areas within the facility,
as well as track the identity and times of entry and exit.
Locks
1. Locks are only as good as the door, jambs, and walls around them. A
lock is therefore useless if an intruder can access a facility.
Identification Systems
Controlled entry into a business facility usually begins with the identification of
the person entering. The identity of employees or visitors can be determined
through the following types of identification verification and access control.
2. Card reader systems can compare the coded identification cards with
computer records for authorized personal verification.
Sensors can detect when an intruder penetrates the facilities boundary. It can
also “sense” unexplained presence within a zone or in close proximity to a
protected object. When the intrusion is
detected, the sensors are calibrated to activate and causes a monitoring station
of a protected facility (Fay, 2006).
Sensors can perform three main functions. They can detect intruders, such as
when it reacts to the intruder’s motion, sound or body heat. They can also open a
door. Finally, a sensor can turn on a device, such as when it reacts to movement
and automatically turns on security lights.
Protective Lighting
Protecting lighting is designed to illuminate the perimeter barrier and the outside
approaches of an area. A threat cannot be detected, either camera or in person,
if there is no light. Lighting can also serve as deterrence since a threat is no light.
Lighting can also serve as deterrence since a threat is more likely to attack an
asset in relative darkness than in bright light.
· To improve visibility in order to easily spot, identify and even apprehend
intruders
· It may provide personal protection for security forces by reducing the
element of surprise by the intruder
Can further include access control systems that control access in and out of
specific premises.
ü To reduce the risk of employing personnel likely to present a security concern
ü To establish that applicants and contractors are who they claim to be
Pre-Employment Screening
· Ensure that applicants are informed in writing that any offer of employment
will be subjected to the satisfactory completion of pre- employment screening
checks, whether or not the individual has already been granted access to the
site.
· Involve all the relevant departments in the organization, and ensure they
communicate and share the data effectively.
Interviews
The job interview portion of the application also helps in the screening
process because it provides an opportunity to discuss the candidate’s suitability
for employment. This interview is important because.
· It allows the employer to clarify information in the application form, ask for
other information not covered in the application form, and probe candidates
about their responses.
Identify Verification
There are four main reasons why individuals use false identities:
· For dishonest financial gain – this involves individuals who have ill
intentions to commit credit fraud or unqualified applicants who falsity educational
qualifications to obtain employment.
· To avoid financial liability – this includes individuals who have failed to pay
debts and are avoiding financial liabilities.
· To legally obtain genuine documents such as passports by using false
‘breeder’ documents (i.e. those documents required to obtain passports, such as
birth certificates which can have few or no security features).
These reasons show how some individuals will claim false qualifications in their
resumes and applications forms, possibly to get unauthorized access into an
organization’s assets. These also highlight the need to authenticate documents
submitted by the applicant and verify the information provided.
· Establishing that the individual owns and is rightfully using that identity.
One method of verifying identity’ which is called the paper-based
approach, involves requesting original documents such as those that corroborate
the applicant’s full name, signature, date of birth and full permanent address.
Ideally, such documents should possess the following characteristics.
· Difficult to forge
A second method called the electronic approach involves checking the
applicant’s personal details against external databases. This method requires
checking and cross-referencing information from databases such as criminal
records or credit reference agencies. By searching for records associated with
the name, date of birth and address provided, it is possible to build a picture of
that individuals past and current life. Tracking such history indicates that the
identity is more likely to be genuine. On the other hand, if searches result in a
history that lacks detail or depth, it is possible that the identity is false.
When such database checks are able to confirm that the identity does
exist, it would also be necessary test whether the individual truly owns this
identity by asking questions that could corroborate information about the identity.
Testing the individual’s knowledge of identity is as important as establishing that
the identity exists to prevent the hiring of an applicant who simply stole the
identity of someone who is actually qualified to perform an important position in
the organization.
The qualification check should confirm the following information
· Course dates
· Dates of employment
· Positions held
· Duties
· Salary
Media Searches
Media searches involve the evacuation of an individual based on their
online reputation. It includes searching for what they say or what others say
about them on the internet. This could be a useful tool if the position to be filled
up involves access to sensitive material that the applicant might compromise. For
example, if the position requires working closely with several to and movie
personalities, it would not be ideal to hire an individual who enjoys heavy
gossiping in social media sites.
Media searches can also help verify identity, confirm or resolve concern
about suspicious behavior, or establish how security aware the applicant is. An
individual who posts photo of drunkenness in parties and allows public viewing of
such photos could indicate poor judgment, especially if the position being applied
for involves working in a religious foundation or a prominent conservative’s
politician. Potential conflicts of interest may also be identified, such as being
personally related to the owner of a competing business.
There are risks, however, in using media searches. Employers might
obtain information about someone with the same name as the applicant. It is also
possible that the positive information available online staged by the applicant in
order to appear qualified. Third party views or opinions about the applicant are
also not completely reliable, especially if these cannot be verified to be true.
· Ro reduce the risk of insider activity, protect the organization’s assets and,
where necessary, carry out investigations to resolve suspicions or provide
evidence for disciplinary procedures.
Types of Documents
Factors to consider
2. The authority and responsibility for the preparation and classification of
classified matters rest exclusively with the originating office.
3. Classified matter shall be categorized according to their content and not to the
classification of file in which they are held on another document to which they are
referred.
5. Each individual whose duties allow access to classified matter while it is his
possession shall ensure the distribution on such matter on the “need to know”
basis only and to property cleared person only.
3. Storage and Retrieval – Used information should be put away for future used.
Storage and retrieval methods must ensure the integrity of the information. It’s
timely accessible to authorized users, and its protection from criminal intervention
and disastrous circumstances.
The security measures that must be taken depend on the type of storage center,
the storage means and storage technologies used. More importantly, the
experience and dependability of the personnel who will handle the storage and
retrieval of information must be considered.
Information requires barriers. Just a decade ago, information assets were stored
in computer system with electronic barriers inside centrally controlled equipment
and located within the protected confines of a computer room.
Information has a limited life. At some point in time, certain information can lose
or most of its value. If the a business owner is in possession of valuable
information, he will want to extract from it the maximum worth possible by making
it available only to those whose talents can exploit it. When news of this
information spreads to more and more people , its value can diminish.
MIDTERM
· Marketing strategy
· Customer files
Examples include:
· Disciplinary actions
· Job performance
Propriety information
Security Screening
Job applicants, current employee’s contactors and other individuals who
could be sharing sensitive information with the organizations may have their
backgrounds checked for affiliation with known activist or dissident groups or for
any potential for insider activity. For individuals in posts that are considered
critical or vulnerable within the company structure, screening may involve an
investigation of their criminal history or interviews with the family, friends and
works colleagues in order to identify any possible concerns. In some cases,
covert methods of security clearance may be employed.
Physical barriers that control access to restricted areas can serve as a
deterrent and increase the likelihood identifying unauthorized individuals. The
organization can employ a series of identification methods from photographic
identification cards, bar codes, voice analysis, and retinal scan to enhance entry
restrictions within high security areas inside the facility.
Some managers do not realize the huge loss that result security-related
problems in their organization. Most think that security concerns should be
directed against external threats like burglaries and robberies. They need to be
more aware of their security needs because they can possibly incur more losses
from fraud, abuse and other crimes that from other security concerns that they
have previous prioritized, like fire or industrial accidents.
If there were security no plan, the security survey will be useful in determining the
need for it, as well as determine the security measures that should be included in
the plan. A comprehensive survey of the facility’s entire operations and
procedures will enable the organization’s decision-makers to identify critical
security factors in the facility. The survey will also be useful in analyzing
vulnerabilities and evaluating cost-effective countermeasures for protection of
assets. The survey should also recommend the establishment of policies and
procedures regarding the following security services (Sennewald, 2003).
Organization face huge due to security elated concerns that a security
survey could have eliminated, prevented, or controlled. Security professional are
equipped with expertise to handle such matters. Cherles A. Sennewald the value
of the security professional in preventing such loss (Sennewald, 2003).
Security Inspections
Security inspection deals with the protection any person, facility material,
information, activity and other assets that have a positive value to the
organization. These assets may also have value to an adversary, possibly in a
different nature and magnitude to how the owners value them.
Security inspection also deals with the prevention of risk by taking action or using
physical entities to reduce or eliminate one or more vulnerabilities. Vulnerabilities
are weakness that can be exploited by an adversary to gain an asset. They
include structural, procedural electronic, human, and other elements that provide
opportunities to attack assets.
1.
2.
3.
5.
6.
1. Preparation
2. Plan route
Safety Inspection
Safety is generally defined as the state of being certain that adverse effects
will not be caused by some agent under fined conditions. It means freedom
from danger, risk or injury. It involves measure (people, procedures or
equipment) used to prevent or defect an abnormal condition that can
endanger people, property, or the enterprise. These abnormal conditions
include accidents caused by human carelessness, alternativeness, and lack
of training or other unintentional events.
1. Preparation
a. Plan
b. Review
c. Study
d. Outline
2. Equipment
a. Hard hat
b. Pencil/ball pen
c. Goggles etc.
3. Plan Route
4. Inspection Pattern
Security Analysis
1. Loss Event Profile - the kinds of threats or risk affecting the assets to be
safeguarded.
This is the first step dealing with asset vulnerability.it requires recognizing
individual loss events that might occur by conditions, circumstances, objects,
activities and relationships that can produce the loss events.
P= f/n
Where:
There are certain conditions that could worsen risk of loss and they are
categorized as follows:
Probability Ratings
Upon gathering of available data and factual circumstances in each risk, it is right
to assign a probability rating. Ratings will not consider any precaution or
countermeasures that may be taken later to reduce or eliminate the risk.
c. Average Probability- the event is more likely to occur than not to occur.
d. Less Probable – The event is less likely to occur than not to occur.
Loss event criticality is the impact of a loss as measured in financial terms. How
important it is in terms of the survival or survival or existence of the organization.
High probable risks may not require countermeasures if the overall damage is
little. However, moderately probable risks will require attention if the size of the
loss they produce is great. Assessing the criticality is the third step vulnerability
assessment. It is first considered on occurrence basis. For events with high
recurrence probability, cumulative considerations must also be done.
Where:
Percentage of Impact
Security Hazards
In this kind of scenario, managers should do planning coordination with the local
authorities to make certain that corporate and community resources would be
used to their fullest advantage in an emergency.
Types of Hazards
1. Natural Hazards
These are risk arising from natural phenomena. Nobody can do anything to
prevent this kind of occurrences, but there are measures that can placed or
installed to minimize the damage or destruction of property, injury, or loss of life.
Since it is part of physical security, security plans must be coordinated with the
installation’s emergency and disaster plans.in the design of security plan,
emergency situations and disasters must be fully considered so that in the event
of their occurrences, immediate course of action can be made thus preventing or
minimizing the loss of property and lives.
- Flash floods cause by typhoons and monsoon rains
- Earthquakes
- Fires
- Storms
- Volcanic eruptions
- Lightning storms
- Landslides
Man-made Hazards
It is the result of a state of mind, attitude, and weakness of character traits. One
can be due to an act of omission or commission, either overt or covert, which can
disrupt the operation of an organization.
- Carelessness
- Accidents
- Sabotage
- Espionage
- Pilferage
- Theft
- Disloyalty
- Vandalism
1. The value placed on that asset by its owner and the consequence, impact
adverse effect of loss or damage to that asset.
Major Risks
Some of the major categories or risk s are arranged according to its seriousness:
- Nuclear attack
- Natural catastrophe
- Industrial disaster
- Conflict of interest
- Other risks
Security Investigation
Elements of Investigation
1. Investigator
2. Purpose
3. Subject of investigator
1. Objectivity
2. Thoroughness
A thorough investigator checks all leads and checks key leads more than once to
assure consistency in result. When the statement of an interviewee is critical, the
facts should be reviewed several times if at all possible without compromising the
investigation. Corroborating important aspects through different sources is a
proven means of achieving thoroughness.
3. Relevance
Relevance means that the information developed pertains to the subject of the
investigation. Another aspect of relevance is cause and effect. Is a developed
fact the result of some other fact under investigation, or is it the cause of that
other fact? If a relationship can provide a direction for the investigative effort, or
working hypothesis, establishing the relationship may materially assists in
resolving the entire investigative problem.
4. Accuracy
The mental processes that collect and sort data from the physical senses often
produce errors. Sound investigative techniques dictate frequent test for
verification. If data is subject to physical measurement, it must be measured. If
an informant is the only source of key data, the informant should be tested at
least for consistency in telling the version. All information must be tested for
inherent contradictions.
5. Timeliness
1. Observant
2. Resourceful
3. Patient
4. People oriented
8. Self - starting
9. Healthfully skeptical
10. Intuitive
11. Energetic
14. Logical
15. Intelligent
16. Creative
17. Receptive
19. Dedicated
21. Professional
· Information needed
· Personal observation
· Surveillance
· operational files
· Identity of documents
· Newspapers, books, periodical, etc.
Guidelines in Investigation
1. Preliminary Investigation
2. Investigation Proper
3. Methods of Investigation
a. Information
b. Interrogation
c. Instrumentation
Investigation Report
Reporting writing is a crucial part of the investigation. The most diligent
and professionally conducted investigation loses its value if the effort is not
properly reported. An investigative report is a written document in which the
investigator records the activity in the investigation and the evidence gathered. A
competent investigator writes a report so that a reader can readily understand
what the investigator did, why it was done and the results of the action.
4. The report is sans of investigator’s opinion or other irrelevant facts foreign
to the case.
5. The report is accurate and is a true representation of the facts of the case.
1. Administrative data
a. Date
b. File number
c. Subject
d. Complaint
e. Reporting investigator
f. Office of origin
g. Status
h. Distribution
CONFIDENTIAL
(Letterhead)
Code: _______________________________________________Date:
___________
Subject:
____________________________________________________________
I. AUTHORITY
This section contains a brief statement of when, where, and by whom the
investigation was made and should cite the authority for making it.
II. MATTERS INVESTIGATED
This section represents the mission of the investigator. In essence, it answers the
question: what is the investigation about.
This section presents the real truth as regards the matter being investigated. The
report must be containing these two main characters: completeness and clarity. It
should be coherent in the presentation of all pertinent facts. It should be free from
argument or bias and should be fully supported by evidence.
IV. DISCUSSION
Discussion should set forth the presumption and inferences from all
circumstances in the case when appropriate. The goal is to give the directing
authority the clearest possible picture. It should contain related factual matter of
argument as may be necessary to establish the conclusions and
recommendations.
V. CONCLUSION
VI. RECOMMENDATION
_______________________
A. General Facts
B. Investigative Process
1. Is the prime or another informant a member of the bargaining unit? If so,
what is the policy should the informant request representation during the
investigative interview?
2. Have all the persons, events and locations mentioned in the complaint
been checked through security investigative indexes and the results noted?
5. Is there a need for more than one security investigator for the case?
Subject to the circumstances of the situation, the following rules are
established for priorities.
1. Prioritize those persons not likely to remain available for interview. These
might include employees scheduled for a trip or reassignment, informants only
temporarily in the area, etc.
2. Give second priority for interview those persons with the most extensive
information or the most fundamental. This usually includes the prime informant or
person providing the information which predicated the inquiry.
4. The last interviews are those likely to be hostile. This usually includes the
subject of the investigation of criminal misconduct. The reasons for deferring this
type of interview are:
5. Observe first those events or location which may not available at a later
date for observation or which may change unless observed promptly.
Show consideration for the comfort and convenience of the interviewee, and if
possible, preserve lengthy interviews on audio tape recordings, making their total
reconstruction later. The use of covert sound recording should always be
evaluated carefully.
5. Human beings normally do not wish to antagonize those who have power
over them and are, therefore tempted to be cooperative with those in control.
6. Human beings tend to attach less importance to what they think is their
exclusive knowledge when someone else demonstrates that he too possesses a
great portion of that knowledge.
1. Physical Aspect
c. The room should be furnished with chairs, rugs, and shades made of plain
materials.
e. There should be nothing in the room that would distract the attention in
working condition.
2. Mental Aspects
b. He must never be on the defensive for lack of knowledge of the case.
e. He should be able to determine what he knows, what he must find out and
what the suspect can tell.
f. He must be familiar with the techniques he intends to use to obtain the
desired information.
1. Talkative type
2. Pathological liar
3. Disinterested type
4. Imprudent type
5. Explainer
8. Fearful type
5. Hate and revenge. Giving clever hints referring to a double cross and
confession of an accomplice.
7. Kindness and sympathy. Let the suspect understand that you are fair and
will see that justice is accorded.
8. Mutt and Jeff. The use of two interrogators, one is hostile and the other is
sympathetic.
Interrogation Proper
FINALS
Cost effectiveness means spending the least possible amount consistent
with required results and, at the same time, assuring that each item of expense is
fully justified as the best available way to commit the funds. Akin to profit - center
orientation with which it is closely aligned; cost effectiveness in security
management definitely enhances the profitability of a business enterprise.
Security Planning
The first requirement in planning is to identify the overall objective and
purpose of the organization. Afterwards, the executive may start his own
planning which should be objective and supports the organization’s goals.
The company recognizes the loyalty of its employees and its obligation as a
corporate citizen to the community and thus fosters a cooperative attitude in the
protection of personnel and property.
The computer center recognizes the propriety interest of the client entities who
utilize the facilities of the center, hence, strictly controls dissemination of
management information on strictly need-to- know basis and only to such
persons that have been specifically cleared to receive such information.
Major policies and procedure covering various areas of security will have to
be developed. The need to draw up specific policies such as “Access Control”,
“Key Control”, “How to Handle a Bomb Threats”, etc., may be written as a
possible as a basis for common interpretation or may include specific procedures
in implementation of a particular mandate from management.
Financing
Managing security requires cash to carry out the various responsibilities
involved. A security executive should be able to have an enlightened view of
what activities he plans for a specific period. the expected operational conditions
and the cost involved. A security executive should have knowledge in forecasting
and budgeting to make security management successful. He should be familiar
with the organization’s stand on Return on Investments and spending
preferences.
Budgeting
The process is set off by appropriate guidelines from senior management. The
security executive then prepared his program and various activities and costs. He
develops and recommends alternative courses of action. The senior
management then reviews the recommendations makes decision on the funds
allocation.
Organizing
An organization is the orderly arrangement of manpower and material resources
to effectively carry out their intended purposes. It molds the activities of many
people into a smooth working team and could mean the difference between the
success and failure of a security department or company.
A security organization must be planned in such a way that it meets the
needs of the enterprise it is responsible to secure. It must be designed with the
aim of helping a company fulfill its mission. Each sub-unit must be able to carry
out its assigned task at an acceptable level of efficiency.
A security organization must also be flexible in such a way that the
structure must be able to adapt to necessary changes without interfering with the
major objective of the department or agency.
Organizational Relationship
Organizational Principle
To come out with an effective security organization, the executive should be
aware of the following principles:
1. The work should be divided according to some logical plan. The five
primary ways are: purpose, process or method, clientele, time and geography.
4. One supervisor can effectively control only a number of people, and that
limit should not exceed. This is known as the principle of span of control. At the
highest level the number is normally three and at the lowest level the maximum is
12.
There are factors that could dictate the type of security organization that
an enterprise may adopt. Among these are the corporate philosophy and
purpose, the customers that the security organization is serving, the particular
nature of business activities, the identified vulnerabilities and the location of a
company’s facilities
The security executive usually wears to hats. First is the perception that
he is an expert in security. Second is the awareness that he is the highest
management guy in the hierarchy, thus, he should be backed by a track record of
success in handling people, problem solving and professional competence.
1. Leader - His most basic role is to provide leadership, set the right climate,
establishes the directions to take, motivates his people and try to bring out the
best in them.
The security agency operator / owner must observe the required major
ranks and position in the organization of the agency, as prescribed by the
implementing rules and regulation of RA 5487, as amended.
3. Security Staff Director (SSD) – Staff Director for Operations and
Staff Director for Administration.
4. Security Staff Director for Training – Staff in-charge for training.
Staffing Pattern
All security agency owners / managers shall follow the required staffing
pattern as prescribed under Rule IX, Sec. 2, NIRR of RA 5487, as amended.
3. The Staff Director for Operations is the staff assistant of the security
manager for the efficient operation of the manager for the efficient operation of
the agency. This position includes the responsibility to canvass clientele and the
implementation of contract and agreement. He is also responsible for the conduct
of investigation and the conduct of training.
8. The Post –in –Charge is responsible for the entire detailed security
office within a certain establishment.
9. The Shift- in- Charge is responsible for the security officers who are
scheduled in a certain shift for a particular period.
10. The Security Guard is the one actually posted as watchman and or
guard.
Position Standards
One of the major tasks of the corporate security executive which cannot be
delegated is the setting up of standards for key positions in his organization.
Also, more often than not, he himself would establish the standards for his own
position especially if it is a newly created one. Among the areas defined by the
Job Description are: the job functions, reporting relationship, skills required,
managerial capabilities, education and training, years of experience and personal
circumstance.
Hiring
Discipline
2. Do the disciplining in the privacy of the office. Do not chastise one in the
presence of others.
3. Be objective and consistent. Discipline condemns the act and not the
person.
5. Keep a file of all employees’ infractions. This can come handily later on.
Appraisal of Results
Promotions
In security, all things being equal, employee welfare should be given the
utmost importance along with morale. The security executive should be able to
motivate his subordinates, make them function as a team and instill pride in and
identification with their organization.
The security executive should realize that the manpower is their “product”
thus, the people’s well-being, welfare and movable should be their principal
considerations. These include the achiever’s recognition, professional
development, fairness and consistency.
Communication
Continuing communication within the security organization and with other
subdivisions of the company is major responsibility of the security executive. He
should be able to communicate upward, downward and laterally; as well as
receive communications from above, below and laterally.
Program Implementation
Involvement of Others
The higher the criticality rating of the identified vulnerability, the higher is its
priority in the implementation of countermeasures. It is important also that the
time frame established be met otherwise it could affect the entire program.
Program Evaluation
At the end of timetable or drills, rehearsals, the security program or part of it
need to be evaluated. Issues such as relevance or adequacy of
countermeasures, cost effectiveness, etc., need to be addressed to check the
existence of vulnerability which may trigger the need for a much responsive
security program.
The appropriate decision and taking responsibility for it is a critical function
of any executive, much more security professional. The security executive should
avoid the following:
4. Procrastinating
1. Prior Experience – a tried and reliable course of action that worked before
may very much work again in similar situation.
2. Self Interest – one’s own interest may not be the best for others. The ideal
situation here is to balance one’s interest with those of the others.
3. Tradition – there are good traditions but there are those that limit the way
of doing things and become the basis for decision because they form the easiest
way out.
Security Audit/Inspection
There a usually need for a formal audit or inspection to: check the degree of
compliance with the recommended countermeasures in effect.
A security audit has for its basis the security survey and the vulnerability
assessment reports prepared during the previous period. A checklist for the
purpose ensures that all areas are covered. The following questions should also
be used:
A structured audit has a format or logical sequence to the process. The
unstructured audit is conducted in a random manner without any formal or logical
sequencing.
Ascertaining compliance
The inspector should establish that the countermeasures are as they
ought to be. It is possible that the unit or people being audit do not do what is
expected of them. Deficiencies note should always be highlighted and follow
through scheduled and implemented, otherwise, vulnerabilities will persist.
Definition
The duties security guards vary depending on the category of installations,
facilities, establishments, location, social conditions and some other factors.
Nevertheless, duties assigned to guards are outlined in the installation program
which includes the following:
5. Check room, building, storage rooms of security interest and after working
hours, check proper locking of doors and gates
10. Control and regulate vehicle and personnel traffic within the compound as
well as parking of vehicle
1. Territorial Power a security guard shall watch and secure the property of
the person, firm or establishment with whom he or his agency has contract for
security services.
b) When an offense has just been committed and he has probable cause to
believed based on personal knowledge of facts and circumstances that the
person to be arrested has committed it; and
4. Duty of Security Guard Making Arrest any guard making arrest shall
immediately turn over the person arrested to the nearest peace officer, police
outpost or headquarters for custody and/or appropriate action, or he may without
necessary delay and within the time prescribed in Article 125 of the Revised
Penal Code, as amended, take the person arrested to the proper Court of Law or
judge for such action as they may deem proper to take.
5. Search without Warrant any security guard may, incident to the arrest,
search the person so arrested in the presence of at least two witnesses. He may
search employees of the person, film or
6. Duty to Assist the Law Enforces Spy security guard shall be duty bound to
assist any piece officer in the pursuit if his bounding duty, when requested,
provided it is within the territorial jurisdiction of his (security officer) area of his
duty.
Attributes of Security Guard/Private Detectives
1. Honesty
2. Presence of mind
3. Moral courage
5. Endurance
6. Calmness
7. Trustworthiness
8. Ability
9. Attitude
10. Courtesy
11. Discipline
12. Interest
13. loyalty
14. Devotion
15. Dedication
Desirable Qualities of Security Guard many of the qualities of the guard are
developed through training and experience. A good trait learned and used
over again and again becomes “instinctive” or habitual. Willingness to learn for
self-improvement is indeed a quality in self- much desired by any individual for
any activity. Of the many qualities the following are considered essential:
2. Judgment – Sound and good judgment is more than the use of common
sense. It is the arriving at wise and timely decision.
3. Confidence – It is the state of being sure, a state of mind free from doubt of
misgivings. This attribute includes faith in oneself and in his abilities, which is
attained by job knowledge
The security supervisor must win the confidence of his men in rallying
their abilities to execute the plans and programs. Qualities that tend to influence
leadership confidence are the following.
2. Sense of Purpose and Direction – any good supervisory leader will have in
his mind a definite purpose which he hopes to achieve; he will then direct all his
energy toward reaching the goal.
5. Integrity – every leader should have this quality. Without the leader’s
integrity, the followers will most likely falter and later desert their leader.
9. Teaching Skills – a leader should be able to teach his men what exactly
that he wants to be done.
10. Faith – he must have faith with his capability. He must have faith with his
superiors and the capability of those under him.
Below are the situations or behavior that would disqualify an individual to
become a security guard or private detective.
2. Mental incompetence
4. Habitual drunkenness
Below are the specific amended provisions of Republic Act No. 5487 as
amended
A. Organization
Disqualifications:
- Mentally competent
- Drug addict
- Initial requirements of 100 guards shall be contracted during the first year of
operation
A. Management
- Mayor’s permit from the local government where the agency is operating or
having business
- Barangay permit
- Business Office
- Firearms Vault
- Filling cabinets
- Surety bond
- Submission of periodic reports to PNP SOSIA
- Uniform for male guards (Section 14, RA 5487 and Section 1, Rule VI,
NIRR)
- Uniform for female guards (Section 14, RA 5487 and Section 2, Rule VI,
NIRR)
Basic Equipment
- Nightstick/baton
- Timepiece (synchronized)
- Writing pen
- Flashlight
Other Equipment
Apart from the mandatory basic equipment, other equipment may be used by the
security guard as deemed necessary, following client contract requirement, and
provided the security guard shall have acquired the prior training/knowledge on
the proper use of the same but not limited to the following:
- Handcuffs
- Metal detectors
- Communication radios
- Stun devices
- Armor vest
- Canine
B. Operations
In case of emergency or in times disaster which the need for the services of such
agencies arise, the city / municipal mayor as Director of Civil Defense, may
master or incorporate the services of the agency near the area where the
emergency, disaster, or calamity arises.
- To report to the chief PNP or to the nearest police agency such impending
strike;
- To ensure that all firearms and ammunition in the possessions of all striking
security personnel of the agency are immediately collected and secured in the
safety vaults under the control of the agency; and
· Limitations Private security agencies shall not deploy / post more than one
thousand security guards to include its branches (Section I, rule XII, NIRR and
section 16 of RA 5487 as amended by section 8 of PD 100 and further by PD
1919)
· No person shall organize / operate or have interest in more than one
security agency in any one city or municipality (Section 2, Rule XII, NIRR and
Section 4, RA 5487).
As a licensed private security agency, it shall be its prime concern to share with
other licensed agencies and company security forces the burden of responsibility
in upholding the integrity trust of the private security profession at all times. In
discharging this responsibility, its official shall
4. With faith and diligence, perform their contractual obligations for the
protection of life, limb and property
6. Continuously work with and assist the law enforcement agencies in the
preservation of peace and order in the country
1. They shall at all times adhere to the professional ethics and refrain from
practices that negate the best interest of the private security services industry
2. They shall always consider that unity in the profession is vital and
paramount for the attainment of common objectives
3. They shall not use deceitful means and/or misrepresentation in all their
business transactions. To this end, they shall avoid granting of rebates, or
commissions incurring guarding contracts
5. They shall pay their guards in accordance with rates fixed by law. They
shall not impose any unauthorized deductions on the gurus to seek employment
elsewhere as they choose, subject to existing laws, nor accept a guard without
clearance from the losing agency
6. When a prospective client with existing company security force call/bids for
additional security guard, all bidding security agencies shall observe the principle
of “equal pay for equal work” considering the rate of pay of the company security
service their own guards
7. Anchored on the principle of securing property, of providing safety of
persons and maintaining peace and order within such property, when accepting
contract with clients having existing client of claims, management, ownership or
administration of properties and/or establishments where there exist or
forthcoming another contracted/contracting agency, they should conduct
themselves and their deployed guard in a manner primarily not to be used
against each other at the same time without compromising their respective
contracts.
11. They shall not, under any circumstances, employ for guard duty any person
without a professional license as a security duly issued by the chief, PNP
12. They shall at all times exercise vigilance and be prepared to prevent the use
of their guards or the agency in activities inimical to the state or national security.
When activities of this nature come to their attention, they shall as a matter of
duty render an appropriate report to the PNP authorities
Security Guards
“As a security guard, my fundamental duty is to protect lives and properties and
maintain the vicinity/my place of duty, protect the interest of my employer and our
clients and the security and stability of our government and country without
compromise and prejudice, honest in my action, words and thought, and do my
best to uphold the principle “MAKADIYOS, MAKABAYAN, MAKATAO at
MAKAKALIKASAN”
All security personnel shall memorize and strictly observe the following general
orders:
1. To take charge of the post and all company properties in view, and
protect / preserve the same with utmost diligence
2. To walk in a military manner during tour of duty and keeping always on the
alert, observing everything that takes place within sight or hearing
3. To report all the violations regulations and order I am instructed to enforce
4. To relay all call from post more distant from the security house where I am
stationed.
6. To received, obey and pass on to relieving guard all orders from company
officers or official, supervisors, post-in—charge or shift leader
9. To call the superior officer in any case not covered by instructions
10. To salute all company officials, superiors in the agency, ranking public
official, commissioned officers of the Armed Forces of the Philippines and
commissioned officers of the Philippines National Police
11. To be especially watchful at night and during the time of challenging all
persons on or near my post, and to allow no one to pass without proper authority
1. As security agent, his fundamental duty is to serve the interest or mission
of his agency in compliance with the contract entered into with the clients or
customers of the agency.
2. He shall be honest in thoughts and deed both in his personal and official
actuations, obeying the laws of the land and the regulations prescribed by his
agency and those established by the company he I supposed to protect.
3. He shall not reveal any confidential matter that is confided to him as a
security guard and such other matters imposed upon him by law
4. He shall act at all times with decorum and shall not permit personal
feelings, prejudices and undue friendship to influence his actuation in the
performance of his official functions.
5. He shall not compromise with criminal and other lawless elements to the
prejudices of the customer of the customer of his client but to assist the
government in its relentless drive against lawlessness and other forms of
criminality.
7. He shall wear his uniform, badge, patches and insignia properly as a
symbol of public trust and confidence as an honest and trustworthy security
personnel and private detective.
8. He must keep his allegiance first to the government, to the agency he is
employed and to the establishment he is assigned to serve with loyalty and
dedicated service.
9. He shall diligently and progressively familiarize himself with the rules and
regulations laid down by his agency and that of the customers and clients.
10. He shall at times be courteous and respectful; and he shall salute to his
superior officers, government officials and company6 officials of the
establishment where he is assigned or the company he is supposed to serve.
11. He shall report to his duty always in proper uniform and neat in appearance.
12. He shall learn at hear or memorize, and strictly observe the laws and
regulations governing the use of firearms.
1. He shall carry with him at all times during his tour of duty is license and
identification card and duty detail order with an authority to carry firearms.
2. He shall not use his licenses and other privileges, if any to the prejudice of
the public, the client, the customer or his agency.
3. He shall not engage in any unnecessary conversation with anybody except
in discharge of his duties; or sit down unless required by nature of his work, and
shall at times keep himself alert during his tour of duty.
4. He shall refrain from reading newspapers, magazine, books etc. while
actually performing his duties.
5. He shall not drink any intoxicating liquor immediately before and during his
tour of duty.
6. He shall know how to operate any fire extinguisher at his post.
7. He shall know the location of fire alarm box near his post and sound the
alarm in case of fire or disorders.
8. He shall know the location of the telephone and/or telephone numbers of
the police precincts as well as the telephone numbers of the fire stations in
locality.
9. He shall immediately notify the police in case of any sign of disorder,
strike, and riot or any serious violations of the law.
10. .he or his group of guards shall not participate or integrate with any disorder,
strike, riot or any serious violations of the law.
11. He shall assist the police in the preservation and maintenance of peace and
order an in the protection of life and property, having in mind that the nature of
his responsibilities is similar to that of that of the latter.
12. He shall familiarize himself by heart with the Private Security Agency Law
(RA 5487 as amended) and its implementing rules and regulations.
14. He shall always be in proper uniform and shall always carry with him his
basic requirements and equipment such as writing notebook, ball pen, nightstick
(baton) and/or radio.
Any private security agency operator or guard who violates the creeds, ethical
standards and codes as set forth in the preceding sections, shall be subject to
the penalties provided in the IRR of RA 5487.
The success of a security officer rests heavily on his keen knowledge in his units,
strengths and weakness, as well as his role and functions as an administrator,
supervisor or manager. It is important that he is aware of his functions in general
and the responsibilities attached to each. Hence, it is critical that the security
administrator realizes that he has two specific purposes of existence:
To accomplish these role and responsibilities, his job is divided into four
(4) functional areas:
3. Administration
4. Technical Services
Leadership is ART and being so; it can be learned, acquired and developed as
any other arts or activities. In the definite sense, leadership is based upon the
development of traits of the individual personality and upon the understanding
and application of sound leadership principles and techniques.
Goal of a Leader
Types of Leadership
1. Authoritative/Dogmatic. A type of leader who gains obedience by asserting
authority and authority and superiority, or by instilling fear or punishment.
Leadership Traits
The following are the qualities that leader should possess in in order win the
willing obedience, confidence, respect and loyal cooperation of his men toward
the accomplishment of his goals.
4. Initiative – He sees what needs to be done and doing it even in the absence of
direction from superiors.
7. Justice – He gives every man his due by being equal, impartial and consistent
in application of rewards and punishments. He listens to all sides of the issue
before making a decision.
11. Enthusiasm- He has intense interest in the task at hand. He never complains
in front of his men about “they ‘or the system.
13. Unselfishness - This quality ensures that the needs of his men are met
before attending to his own needs. He shares the hardship, danger, and
discomfort of his men.
14. Judgment – This is the ability to logically weigh facts and possible solutions
on which to base sound decisions. He considers are possible consequence of his
decision.
Leadership Principles
Below are the fundamentals guidelines for the selection of appropriate action and
orders in the proper exercise of authority.
7.Make a certain that the subordinates are properly informed of the situation.
Leadership Indicators
2. Discipline – The state of order based upon submission to rules and authority.
3. Esprit d’ Corps – Loyalty to, pride in, and enthusiasm for the unit/organization
displayed by its members.
5. Effective Unit - The one that accomplishes assigned mission, for which it was
equipped, trained and organized in the shortest possible time, with the least
expenditure of resources and least confusion.
Operations
This has direct impact on the mission of the security unit normally affecting life,
property and proprietary rights. Under this function, the security officer performs
the following:
1. The deployment of men and resources consistent with threat and need of the
organization.
2. Defining the basic role and functions of the individuals in the total organization,
his unit and on post assignment.