0% found this document useful (0 votes)
152 views67 pages

Lea 3 Module

The document provides definitions and background information on security. It discusses the evolution of security from ancient times to present day, including the development of police forces and private security. It outlines categories of security such as physical, personnel, and document security. Security management in organizations is also addressed, highlighting the role of private security in preventing crime and ensuring safety.

Uploaded by

alyzza rezari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
152 views67 pages

Lea 3 Module

The document provides definitions and background information on security. It discusses the evolution of security from ancient times to present day, including the development of police forces and private security. It outlines categories of security such as physical, personnel, and document security. Security management in organizations is also addressed, highlighting the role of private security in preventing crime and ensuring safety.

Uploaded by

alyzza rezari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 67

Lesson Proper for Week 1

Definition of Security

The word secure is derived from the Latin securus which means “safe” or


“without care, or from se cura, wherein se means “free from” and "cura” means
“care”.

To be secured could mean many different things. It could mean being free from
danger, risk, injury, fear, trouble, doubt or anxiety. Being secure could also refer
to being dependable, strong, good, impregnable or inviolable. Or simply, could
mean having peace of mind.

Security can be defined as the degree of protection or resistance against harm,


danger, loss, and criminals. As a form of protection, it includes structures and
processes that provide or improve security as a condition.

Related Concept

Understanding the concept of security requires further definitions of other related


concepts such as assets, risk, threats and vulnerability.

An asset is anything tangible or intangible that is capable of being owned or


controlled to produce value. If it has positive economic value, it is considered an
asset. Or more simply, if its value can be converted into cash, it is an asset
(Sullivan & Sheffrin, 2003).

Risk- is the uncertain of financial loss, then probability that a loss has occurred
or will occur, the variations between actual and expected results, or the possible
occurrence of an undesirable event. The end result of risk is loss or decrease in
value (Sennewald, 2003).

Threat and vulnerability are sometimes interchangeable used with risk. A threat
is anything that could adversely affect assets; it can be classified into natural
hazards (such as floods), accidents (chemical spills), or international terrorism).
Vulnerability means weakness, flaw, or virtually anything that may conceivably be
exploited by a threat; example are holes in a fence, an out-of-date key system
key system or the introduction of a computer virus (Sennewald,2003).

HISTORY OF SECURITY

Historical Roots of Security

The historical roots of private agencies can be traced back to thousands of years
when the protection of life and personal property were up to the individual, and
later on passed to tribes, and then to cities.

In pre-historic times, man recognized the need to keep himself from both known
and unknown enemies such as animals, other inhabitants and the environment.
Itself. He used different methods to keep himself safe such as crafting weapons
out of stone and metal, building fire to word off animals, staying in caves or tree
houses, and even staying in the middle of the lake for protection.

The Greek of the ancient period were the ones who organized the first police
force in city states which they termed polis. The Romans, on the other hand,
established the praetorian Guards known as vigils who were tasked to be fire
fighters.
In the middle ages during their invasion of England, the French formed a group of
carefully selected men called shires or sheriff to look after the peace and order of
the different regions.

Security in the Philippine History

During the pre -colonial period in the Philippines, the sovereign monarch called
datu or lakan had servants called aliping  namamahay who acted as their
watchman or protector.

The Spanish colonial government introduced the Guardia Civil in the Philippines
in 1868 to serve as police force based on the Civil Guard of Spain. They
performed patrol functions in cities and towns, organized operations for the
suppression of bandit groups, and imposed penalties for infringement of laws and
local ordinances.

After World War II, the Indian national or the Bombay pioneered as the
watchman who protected a specific building or commercial establishment.

Security in the Present Time

            History shows how public law enforcement and private security evolved
from the same roots but eventually took different directions. The police served
the public interest while the security force served private interests. As crime
became a bigger problem especially in urban areas, police departments who
previously looked down at private security right now are beginning to see the
benefits of building a partnership with them. Now, police functions that did not
involve enforcement, arrest or the use of force inside work spaces are turned
over to security. Traffic control around large commercial properties and patrol
functions around private neighborhoods are also now often provided by security
officers (Faye, 2006).

            With the advent of terrorist in countries around the globe, it becomes
more important to build a strong partnership between the police who respond to
terrorist acts and security officers who respond also involve leaders and enforces
in other fields such as firefighting, disaster management, emergency medical
treatment and public health. This, of course, entails a strong support and
commitment from the national government.

            Fast- spaced technology, especially in the field of computer and


information technology is another issue affecting the security industry. Although
such technology has become very helpful in the security officers work, it also has
the negative effect of replacement people. Just as human labor has been
displaced by machines in other industries; it also affects individuals’ security
personnel who might become obsolete in the face of computer assisted
technologies.

            With the combination of rising technology of rising technology and the
security industry rapid growth and recognition in organizations comes the
necessary improvement in the professionalism among security officers

Security Management in Organizations

Security management has become essential feature of corporate activity; there is


almost no organization without a team dedicated to managing issues of security,
we usually see shopping malls, entertainment venues and banks policed by
private armies which we call security guards. The presence of these uniformed
staff represents the company’s ability to respond do or deter threats. This,
however only part of the security measures employed by companies against
threats posed by the opportunistic criminals, its rival organizations, or even its o

Saboteur employees. Others security measures may include the installation of


CCTV’s  sophisticated alarm systems, policies against workplace bullying and
harassment, employee screening emergency planning, and other measures that 
enable individuals and organizations to carry on with their business free from
danger.

Indeed, security has a policing function in organizations. In fact, illegal practices


in the workplace had become an established theme in criminology studies. These
crimes involve not only the robberies in shootouts inside malls or kidnappings in
school that we hear in the news. It involves high-stakes corporate crimes such as
tax evasion and money laundering, fraud, bribery, workplace harassment, or
even those similar to street crimes such as thieves sneaking inside offices.

With corporate crime becoming a growing area of concern, the increasing role of
private security in crime prevention is becoming more evident. These further
highlights the needs for increased competence and professionalism among
security personnel so that they can effectively play their important role of risk
prevention and management in the organization. These new breed of uniformed
individuals who are armed with education and training, equipped and reliable and
highly technical gadgets, and well informed with their moral and ethical
obligations has now taken over the business of ensuring the security of the most
important assets of organizations.

Categories of Security

1.       Physical Security.

2.       Personnel Security

3.        Document and Information

Political Security – is another category that relate to social relationships


involving government or entities that hold authority or power. This includes issues
of security in the public, national or international level, as enumerated below.

1. Public Security

2.       National Security

3.       International Security

In the private sphere, security can be even further categorized, as shown below.

1. Industrial Security

2. Bank and Armor Security

3.  Hotel Security

4. V.I.P. Security

5.  Operational Security


6.        Communication Security

7.        Mall/ Commercial Security

Lesson Proper for Week 2


Universal Declaration of Human Rights

The universal Declaration of Human Rights, which was adopted by the United
Nations on 10 December 1948, guarantees such instinct to protect in Article 3,
which states that “Everyone has the right to life, liberty and security of person”
( united Nations, 1948, emphasis supplied

The International Covenant on Civil and Political Rights, a multilateral treaty also
adopted by the United Nations on 16 December 1966, further recognizes this
right to security of person.

1987 Constitution of the Republic of the Philippines

The 1987 Constitution lays the foundation that protects the Filipino citizens’ right
to security. Relevant sections of the constitutions are cited here to demonstrate
specific provisions that guarantee this right.

Section 4, Article II. The prime duty of the Government is to serve and protect
the people; the Government may call upon the people to defend the State and, in
the fulfillment thereof, all citizens may be required, under conditions provided by
law, to render personal, military or civil service.

This section provides that all the qualified citizens of the State, including security
personnel, may be required by law to render personal military or civil service.

Section 1, Article III. No person shall be deprived of life, liberty or property


without due process of law, nor shall any person be denied the equal protection
of laws.

Section 2, Article III. The of people to be secure in their persons, houses,


papers, and effects against unreasonable searches and seizures of whatever
nature and for any purpose shall be inviolable and no search warrant or warrant
of arrest shall issue except upon probable cause to determined personally by the
judge except upon probable under oath of affirmation of the complainant and the
witnesses he may produce, and particularly describing the place to be searched
and the persons or things to be seized.

Section 9, Article III. Private property shall not be taken for public use without
just compensation.

Section 16, Article XII. The congress shall not, except by general law, provide
for the formation, organization, or regulation of private corporations. Government
owned or controlled corporations may be created or establishment by special
characters in the interest of the common good and subject to the test of
economic viability.

The Revised Penal Code (Act 3815)

Applicable provisions of Act No. 3815 or “An Act Revising the Penal Code and
Other Penal Laws,” otherwise known as the Revised Penal Code (December 8,
1930) regarding crimes against persons (Title Eight of the Code), personal liberty
and security (Title Nine of the Code), and property (Title Ten of the Code) have
bearing on the individual’s right to security and the private industry.

Private Security Agency Law (RA 5487 as amended)

Republic Act No. 5487 or “Act to Regulate the Organization and Operation of
Private Detective, Watchmen or Security Guards Agencies” is amended by the
Presidential Decree No. 11 on October 3, 1972. In this particular law, the security
guards, watchmen, private detectives and the security officers are considered as
force multipliers of the Philippine National Police (PNP) because of the role they
play in times of disaster or calamities. The chief of the PNP or the mayor of a
certain municipality or city may deputize them to assist the PNP in the
performance of the police duties for the duration of such emergency disaster or
calamity.

Private security personnel are called Protection Specialists because in the


present concept, law enforcement and crime prevention are not solely charged to
the PNP. The five-pillar concept in criminal justice system calls for the
involvement of the private sector and the community to which much of the
success of law enforcement depends. Private role in this regards as they are a
potent force and order and the protection of lives and properties in all areas of
the country.

PRESIDENTIAL DECREE NUMBER 1919

AMENDING FURTHER REPUBLIC ACT NUMBERED FIFTY-FOUR HUNDRED


EIGHTY-SEVEN OTHERWISE KNOWN AS “THE PRIVATE SECURITY
AGENCY LAW”

·         Amended in April 28, 1984.

·         Defining watchman on security guard to include those form government


entities

·         Specifying the employment of a minimum of 200 and a maximum of 1,000


licensed security guard for any private security agency

Presidential Decree No. 11 and No. 100 (Amending RA 5487) Presidential


Decree No. 11 amended the Private Security Agency Law on October 3, 1972,
while Presidential Decree No. 100 amended the same Law on January 17. 1973.

Lesson Proper for Week 3


Principles of Physical Security

In considering the appropriate security measures, the following principles should


be considered.

1.                The type of access necessary depends on the number of variable


factors, thus, may be obtained in different ways.

2.                There are no such things as an impenetrable barrier.

3.                The installation of a barrier varies from another.

4.                There is defense in barrier depth.


 

Factors in Selecting Security Safeguards

1.                Site Characteristics

Selection of safeguards can be influenced by the nature of the site such as the
size, layout, utilities, internal activities and assets in the site. Other factors may
include company philosophy and workforce culture.

2.                Environment - refers to the area surrounding the facility.

3.                Forces of Nature - Also at play in the selection of safeguards are the


environment’s climates. Weather and natural forces.

4.                Crime - Crime patterns must be considered in selecting the


necessary countermeasures.

Physical Barriers

A barrier is a natural or manufactured obstacle to the movement of persons,


animals, vehicles or materials. It defines physical limits to and delays or prevents
penetration of an area (POA Publishing LLC, 2003).

Advantages of physical Barriers

1.                Physical barriers become a psychological deterrence when a


potential intruder is discouraged from accessing a facility because the barrier
appears to present difficulties.

2.                Actual difficulty in getting through physical barriers.

3.                Reducing the cost of security staffing by substituting barriers for


people, and placing security posts in locations the complement barriers.

Purpose of Physical Barriers

1.                To control the movement of people and vehicles into, out of, and
within the facility.

2.                To segregate or compartmentalize sensitive areas

3.                To provide physical protection to objects, materials, and processes of


critical nature.

General Types of Physical Barriers

 
1.                Natural Barriers includes bodies of water, mountains, marshes,
ravines, deserts or other terrain that are difficult to cross.

2.                Structural Barriers are ma- made barriers such as fences, walls,


floors, roofs, grills, bars, roadblocks or other physical means.

1.                Roadblocks

2.                Walls

Other Types of Physical Barriers

1.                Human Barrier

The guard force as a human barrier is the key elements in any security system.
Without it, all other protective devices –mechanical electrical electronic- would be
a useless security action.

2.                Animal Barrier

The most common of animal barriers are dogs known as the K-9 team. The
number of dogs to be used relies on the size and kind of installation being
secured. The most popular breed is the German shepherd.

First Line of Defense: The perimeter Barrier

The usual starting point in assessing risk at a facility is the perimeter. The major
purpose of the use of perimeter as barrier is to deny access or exit of
unauthorized persons.

Purpose of the perimeter Barrier

·         To define the boundary of the property to be secured

·         To create a physical and psychological deterrence to unauthorized entry.

·          To delay intrusion, thus facilitating the apprehension of intruders.

·         To assist in a more efficient and economical employment of guards.

·         To facilitate and improve the control of pedestrian and vehicular traffic.

Types of Perimeter Barriers

1.                Wire Fences (Solid or Full –View)

1.1.  Chain Link Fence

 Must be constructed of 7- foot material excluding top guard.


 Must be of 9-gauge or heavier
 Mesh openings are not to be larger than 2 inches per side
 Should be a twisted and barbed selvage at top and bottom
 Must be securely fastened to right metal or reinforced concrete
 Must be reached within 2 inches of hard ground or paving
 On soft ground, must reach below surface deep enough to compensate for
shifting soil or sand

1.2.  Barbed Wire Fence

 Standard barbed wire is twisted, double-strand,12 gauge wire with 4-point


barbs spaced at an equal distance apart
 Must be less than seven feet high, excluding top guard
 Must be firmly affixed to post not more than six feet apart
 The distance between strands must not exceed 6 inches and least one wire
will be interlaced vertically and midway between posts.

1.3.  Concertina Wire Fence

 Standard concertina barbed wire is a commercially manufactured wire coil of


high strength steel barbed wire clipped together at intervals to form a cylinder.
 Opened concertina wire is 50 feet long and 3 feet in diameter

1.4.  The top Guard

 A top guard is an overhead of barbed wire along the top of the fence, facing
outward and upward at approximately 45-degree angle.
 Top guard supporting arms will be permanently affixed to the top of the fence
post to increase the overall height of the fence at least one foot
 Three strands of barbed wire, spaced 6 inches apart must be installed on the
supporting arms.

1.5  Clear Zones

 A clear zone 20 feet or more should exist between the perimeter and barrier
and exterior structure, parking areas and natural or man-made features.
 A clear zone of 50 feet or more should exist between the perimeter barrier
and structures within the protected areas except when a building wall
constitutes part of the perimeter barrier. And structures within the protected
areas except when a building wall constitutes part of the perimeter barrier.

2.                Building Walls -Walls, floors or their combinations serve also as


barriers and must be of such construction to provide uniform protection just like
the wire fencing.

3.                Bodies of Water - like river, lakes, marsh, ponds or other bodies of


water forming part of the wall, building or fencing should never be considered
adequate natural perimeter barrier.

Second Line of Defense: Building Exteriors

a.                Roofs - roof usually has sheathing placed over the rafters, often
horizontal wooden boards placed flush on the rafters.
b.                Exterior Walls - may be similarly constructed, with sheathing place
diagonally on vertical studs and covered with sheathing paper.

c.                Concrete Structures

An ordinary concrete building wall, because of its rugged and formidable


appearance, may give the impression that it offers good protection against
penetration, but may not.

Floors - Wooden floors normally have flush sheathing covering the joists
diagonally. This surface may then be covered with building papers and flooring
such as tile, cork, rubber, linoleum or wood.

Interior Walls - Interior walls and ceiling may be constructed of lath and plaster.
However,

Ceilings- may be covered with acoustic or decorative tile. It is a common modern


building technique to construct ceiling plenums that do not have security barriers
between rooms and areas.

Doorways- including the frame, jambs, and stops are constructed of either wood
or metal. Doorways are of two general applications: personnel and vehicular.

Windows - are designed to provide ventilation, natural illumination or visual


access through a wall, or any combination of the three.

Other openings

In addition to doors and windows, a wide variety of other openings in the roof,
walls and floor may require consideration. These includes opening for shafts,
vents, ducts or fans; utility tunnels or chases for heat, gas, water, electric power
and telephone; sewers and other types of drains; and other small service
openings.

Third Line of Defense: Interior Controls

Establishing interior controls not only maximizes the efforts of security guards.
Such measures also allow or deny access to facilities or areas within the facility,
as well as track the identity and times of entry and exit.

There are a variety of techniques to control access to the interiors of high-


security facility.

Locks

Installing locks on doors is the easiest line of defense inside a facility.


 

1.                Locks are only as good as the door, jambs, and walls around them. A
lock is therefore useless if an intruder can access a facility.

2.                Key management is important when dealing with a complete lock


system. It is important to make sure that only authorized personnel can obtain or
make key to the lock.

3.                All locks can be compromised by an expert in a very short period of


time. It is therefore wise to use locks together with other security measure and as
part of an overall physical protection system.

Telephone Entry Systems - commonly used in apartment buildings and


condominiums. They are typically located outside the building, with a panel,
handset and touchpad. Each tenant has a special entry code that a visitor dials.
The tenant may then release the door lock by pressing a designated key on the
residence phone. For added security, some systems add a CCTV camera in the
entry lobby with small monitors provided to each occupant (POA Publishing LLC,
2003).

Identification Systems

Controlled entry into a business facility usually begins with the identification of
the person entering. The identity of employees or visitors can be determined
through the following types of identification verification and access control.

1.  Guards can personally recognize or inspect the identification of employees or


visitors, and then formulate a judgment of that person’s validity.

2.  Card reader systems can compare the coded identification cards with
computer records for authorized personal verification.

3.  Biometric readers can use a person’s physical property (such as retinal


pattern or fingerprint) to gain entry.

Protective Alarm Sensors

Different types of protective alarm installed indoors or outdoors complement and


supplement physical barriers. These systems are designed to alert security
personnel to completed or attempted intrusion into an area, building or
compound.

Types of protective alarm systems, auxiliary system, central station system


and proprietary system These can serve the purpose of either substituting
other security measures for economic reasons or supplement these security
measures to provide additional controls.

Sensors can detect when an intruder penetrates the facilities boundary. It can
also “sense” unexplained presence within a zone or in close proximity to a
protected object. When the intrusion is

detected, the sensors are calibrated to activate and causes a monitoring station
of a protected facility (Fay, 2006).
Sensors can perform three main functions. They can detect intruders, such as
when it reacts to the intruder’s motion, sound or body heat. They can also open a
door. Finally, a sensor can turn on a device, such as when it reacts to movement
and automatically turns on security lights.

Protective Lighting

Protecting lighting is designed to illuminate the perimeter barrier and the outside
approaches of an area. A threat cannot be detected, either camera or in person,
if there is no light. Lighting can also serve as deterrence since a threat is no light.
Lighting can also serve as deterrence since a threat is more likely to attack an
asset in relative darkness than in bright light.

Purpose of Protective Lighting

·         To provide sufficient illumination to an area during hours of darkness

·         To improve visibility in order to easily spot, identify and even apprehend
intruders

·         To present psychological fear

·         To serve as deterrent to thieves, pilferer, trespasser and saboteurs

General Characteristics of Protective Lighting

·         It is relatively inexpensive to maintain

·         It may reduce the need for security forces

·         It may provide personal protection for security forces by reducing the
element of surprise by the intruder

·         It requires less intensity than working light

Types of Protective Lighting

·         The stationary luminary is the most common type consisting of a series of


fixed luminaries.

·         The standby lighting provides continuous illumination of a protected area


during the hours of darkness, but it can be turned on manually or by special
device or other automatic means.

·         Movable lightning can be stationary or portable and consists of manually


operated searchlights. It may be lighted continuously during hours of darkness or
only as needed. It can supplement or temporarily replace other types of security
lighting.

·         Emergency Lighting is a standby lighting can be utilized in the event of


electric failure, either due to local equipment or commercial power failure.

Lesson Proper for Week 4


Among the major threats confronting an organization are employee crime and
employee misconduct, in fact internal theft surpasses the losses that can be
attributed to robberies, theft, frauds and other criminal acts committed by
outsiders. At the same time, both substandard job performance and appropriate
behavior of employees can result in potentially devastating lawsuits’ and loss of
business.

It is the employer duty to maintain a safe and secure working environment.


Employers conduct pre-employment background checks of job applicants in
order to protect existing workers, guests, and the public from the harmful acts or
employees. Harmful acts committed by prospective employees cover a wide
number of criminal acts, such as murder, rape, assault, and drug dealing. As well
as safety violations that injures and kills. Job applicants with a potential to
commit harmful acts can be filtered out of the hiring process through pre-
employment investigations.

Personnel Security- Involves those measures taken to safeguard a company’s


employees and those coming to a place of business either for business reasons
or as guests

Can further include access control systems that control access in and out of
specific premises.

Personnel Security - Various identification card systems, passes, and permits


used by companies are considered personnel control. Probably the most recent
concerns classified under personnel security are executive protection and back-
ground investigations.

Interaction of Security Components Alarms & Hardware Reinforcement Utilization


Response Protective (Security) Components Security Personnel Employee
Support Safeguards Controls Enforcement Compliance Security Policy &
Procedures

Purpose of Personnel Security

ü  To identify security measures in proportion to the risk

ü  To reduce the risk of employing personnel likely to present a security concern

ü  To establish that applicants and contractors are who they claim to be

ü  To close down opportunities for abuse of the organization’s assets.

Pre-Employment Screening

            Personnel security measures are usually undertaken during the


recruitment process. This because companies believe that it is better to spot
dangerous or dishonest individuals before they are hired. This means that the
human resources department should not simply trust the correctness of
information written in a very impressive resume. Hence, a proper background
employment screening on job applicants must be carried out.

Through pre-employment screening the credentials of job applicants and their


preconditions for employment are verified. These checks should establish
whether the applicant has concealed important information or otherwise
misrepresented himself. The objective is to collect information and use that
information to identify individuals who present security concerns.

The pre-employment screening should include checks on the following:


·         Proof of identity and address

·         Details of education and employment

·         Criminal records checks

·         Checking of at least two character references

Pre-employment screening policy Checklist (CPNI, 2011)

·         Make pre -employment screening an integral part of the recruitment


process.

·         Ensure that applicants are informed in writing that any offer of employment
will be subjected to the satisfactory completion of pre- employment screening
checks, whether or not the individual has already been granted access to the
site.

·         Involve all the relevant departments in the organization, and ensure they
communicate and share the data effectively.

·         Identify the specific office responsible for the pre-employment screening


process.

·         Incorporate specialist business into your strategy if appropriate.

Interviews

            The job interview portion of the application also helps in the screening
process because it provides an opportunity to discuss the candidate’s suitability
for employment. This interview is important because.

·         Face to face discussions encourage applicants to be honest.

·         It allows the employer to clarify information in the application form, ask for
other information not covered in the application form, and probe candidates
about their responses.

·         It is also provides a good opportunity to add to the overall assessment of


the applicants reliability and integrity.

Identify Verification

              Verifying the applicant’s identify is a critical measure in the screening


process. In fact, other measures in the screening process should only come
second after the applicant’s identify has been satisfactory proven. The key is to
verify that the individual is not committing fraud by using false identities.

There are four main reasons why individuals use false identities:

·         To avoid detection – Individuals like crooks, terrorists or wanted criminals


may wish to remain anonymous or undetected.

·         For dishonest financial gain – this involves individuals who have ill
intentions to commit credit fraud or unqualified applicants who falsity educational
qualifications to obtain employment.

·         To avoid financial liability – this includes individuals who have failed to pay
debts and are avoiding financial liabilities.
·         To legally obtain genuine documents such as passports by using false
‘breeder’ documents (i.e. those documents required to obtain passports, such as
birth certificates which can have few or no security features).

These reasons show how some individuals will claim false qualifications in their
resumes and applications forms, possibly to get unauthorized access into an
organization’s assets. These also highlight the need to authenticate documents
submitted by the applicant and verify the information provided.

       The purpose of verifying identity is to ascertain the correctness of the


information they have given about themselves:

·         Determining that the identity is genuine and relates to a real person.

·         Establishing that the individual owns and is rightfully using that identity.

               One method of verifying identity’ which is called the paper-based
approach, involves requesting original documents such as those that corroborate
the applicant’s full name, signature, date of birth and full permanent address.
Ideally, such documents should possess the following characteristics.

·         Issued by a trustworthy and reliable source

·         Difficult to forge

·         Dated and current

·         Contains the owner’s name, photograph and signature

·         Requires evidence of identity before being issued

               A second method called the electronic approach involves checking the
applicant’s personal details against external databases. This method requires
checking and cross-referencing information from databases such as criminal
records or credit reference agencies. By searching for records associated with
the name, date of birth and address provided, it is possible to build a picture of
that individuals past and current life. Tracking such history indicates that the
identity is more likely to be genuine. On the other hand, if searches result in a
history that lacks detail or depth, it is possible that the identity is false.

               When such database checks are able to confirm that the identity does
exist, it would also be necessary test whether the individual truly owns this
identity by asking questions that could corroborate information about the identity.
Testing the individual’s knowledge of identity is as important as establishing that
the identity exists to prevent the hiring of an applicant who simply stole the
identity of someone who is actually qualified to perform an important position in
the organization.

Qualification and Employment Checks

            A qualification check involves the verification of information regarding


educational or professional qualification, while an employment check involve the
verification of the applicant employment history in term of dates of employment
and position . The purpose of such information on the applicant qualification and
previous employment is to help the employer in evaluating the candidates
reliability and integrity. It also help to discover whether applicants are hiding
negative information such as a criminal record or dismissal from previous
employment for suspicious reasons.

 
The qualification check should confirm the following information

·         The establishment attended

·         Course dates

·         Title of the course

·         Grades / marks awarded

The employment check should verify the following information

·         Dates of employment

·         Positions held

·         Duties

·         Salary

·         Reason for leaving

·         Any employment gaps

Media Searches

              Media searches involve the evacuation of an individual based on their
online reputation. It includes searching for what they say or what others say
about them on the internet. This could be a useful tool if the position to be filled
up involves access to sensitive material that the applicant might compromise. For
example, if the position requires working closely with several to and movie
personalities, it would not be ideal to hire an individual who enjoys heavy
gossiping in social media sites.

               Media searches can also help verify identity, confirm or resolve concern
about suspicious behavior, or establish how security aware the applicant is. An
individual who posts photo of drunkenness in parties and allows public viewing of
such photos could indicate poor judgment, especially if the position being applied
for involves working in a religious foundation or a prominent conservative’s
politician. Potential conflicts of interest may also be identified, such as being
personally related to the owner of a competing business.

                There are risks, however, in using media searches. Employers might
obtain information about someone with the same name as the applicant. It is also
possible that the positive information available online staged by the applicant in
order to appear qualified. Third party views or opinions about the applicant are
also not completely reliable, especially if these cannot be verified to be true.

Ongoing Personnel Security during Employment

              Personnel security is a system of policies and procedures that manages


the risk of staff or contractors exploiting legitimate access to an organization’s
assets or premises for unauthorized purposes. It is important to distinguish
between this and personal security, which seeks to reduce the risks to the safety
or well-being of individual employees.

Purpose of Ongoing Personnel Security (CPNI, 2010):

·         To minimize the likelihood of employees becoming a security concern.


·         To implement security measures in a way that is proportionate to the risk.

·         Ro reduce the risk of insider activity, protect the organization’s assets and,
where necessary, carry out investigations to resolve suspicions or provide
evidence for disciplinary procedures.

Importance of Ongoing Personnel Security

       Insider activities are those that exploit an employee’s legitimate access to an


organization’s that could have possibly hired terrorists, intelligence service
agents, discontented.

Lesson Proper for Week 5


Protecting crucial documents has become progressively more critical in this age
of last growing technology. The loss of document and information can cost a
company huge amount of money. Business competitive badge and national
security had been put at risk because proper security precautions were not
implemented. oftentimes, the importance of documents and information security
is not realized until after a loss has been discovered. Owing to this, a
comprehensive document and information security program is important to
operating and competing in our modern society.

            Implementing an efficient and effective document and information security


program requires knowledge and skills in the field of document and information
technologies as well as management. Its management relies on a clear
understanding of the types and uses of document and information within an
organization. Plan measures are needed to preserve the secrecy and integrity of
documents and information throughout all phases of its existence. To prevent
loss of document and information due to employee or procedural error, security
administrators must implement an effective document and information
management plan.

            In protecting documents and information is one of the understandable the


capabilities and use of document and information technologies in terms of how
technology can be used in the creation usage, storage, transmission in disposal
information. One must also understand how technology can be used in the
manipulation and abuse of documents and information.

Types of Documents

Class I-Vital Document- An irreplaceable record, reproduction of which does not


have the same value as the original.

 Class II- Important Document-a - record, reproduction of which will involve


considerable expense and labor or considerable delay.

Class III-Useful Document- a record, the loss of which may cause


inconvenience but could be readily replaced and may not present an
insurmountable obstacle to the prompt restoration of the business.

Class IV-Non –Essential Document-a record that may include daily files,


routine in nature, the loss of which will not affect the organization’s operation.
This class represents the bulk of the records which can be kept in ordinary files
ready for reference if needed and usually discarded after some period of time.

 
Factors to consider

1. Document and Information Security is based on the premise that the


government has the right and duty to protect official papers from unwarranted
and indiscriminate disclosure.

2.  The authority and responsibility for the preparation and classification of
classified matters rest exclusively with the originating office.

3. Classified matter shall be categorized according to their content and not to the
classification of file in which they are held on another document to which they are
referred.

4. Classification shall be made as soon as possible by placing appropriate marks


on the matter to be classified.

5. Each individual whose duties allow access to classified matter while it is his
possession shall ensure the distribution on such matter on the “need to know”
basis only and to property cleared person only.

Stages of Information Cycle

Information occurs through various stages. Familiarization of the different stages


can provide significant analysis on how it can be protected.

1. Creation- during this stage, information is discovered and developed.


Information can take the form of handwritten notes, discussion, dictated script, or
electronic data. It is commonly concentrated in laboratories, offices, word
processing units and computer centers.

2. Use –undoubtedly, information is created for use. This stage involves a


process wherein people act on the information for the purpose of making a
decision based on the information, soliciting support of informing others, when
information is used, it usually includes duplication as well as distribution.
Duplication can be in the form of photocopying, printing or sending through
electronic mail.

3. Storage and Retrieval – Used information should be put away for future used.
Storage and retrieval methods must ensure the integrity of the information. It’s
timely accessible to authorized users, and its protection from criminal intervention
and disastrous circumstances.

The security measures that must be taken depend on the type of storage center,
the storage means and storage technologies used. More importantly, the
experience and dependability of the personnel who will handle the storage and
retrieval of information must be considered.

4. Transfer-this involve the transfer of information from active to inactive storage.


Inactive records are usually located in remote areas less accessible to users.
Special security precaution should be taken at the time of the transfer and when
records are on the way from one place to another.

5. Disposition-This is the last stage of the cycle of information. During this


stage, a decision can be made to retain the information indefinitely at either an
active or inactive storage center or to dispose of it. The method of disposal
should depend on the amount of information and the type of media used.

Characteristics of Information (Fay, 2006)


Information is expansive. it is unlike other business resources because it can
Easily expand to cover a wider scope. Information may age, but it tends not to
diminish; today breaking news, for instance will be event in history after a few
years. Information tends accumulate; a discovery on the healing benefits for
numerous diseases. Information is compressible and transportable at very high
speeds and can impart advantages to the holder as demonstrated by a single
memory card that can save hundreds of photos.

Information requires barriers. Just a decade ago, information assets were stored
in computer system with electronic barriers inside centrally controlled equipment
and located within the protected confines of a computer room.

Information is costly important. Organizations should protect information assets


because it is costly to acquire and maintain, and it is important to the success of
the business enterprise. In industries like research and development, education
and publishing, information fuels their business. It has significant value in much
the same sense that people, physical property and financial assets have value.

Information is coveted. When something has value, someone will want an


opportunity to take it away. For example, a new cellular phone technology being
developed by a big telecommunications company may not be accessible to the
pickpocket who kills in public places, but it can be vulnerable to an intelligent,
clever and professional spy who can steal the information and sell it to the
company’s competition.

Information has a limited life. At some point in time, certain information can lose
or most of its value. If the a business owner is in possession of valuable
information, he will want to extract from it the maximum worth possible by making
it available only to those whose talents can exploit it. When news of this
information spreads to more and more people , its value can diminish.

Information is difficult to protect. In a word advanced information technology,


several employees may hold and share sensitive corporate information on their
laptops, memory drives and emails. Oftentimes, confidential information such as
prices, designs and production schedules need to be shared with suppliers,
customers and shippers. Protecting information is difficult but it should be a
significant concern for every organization.

Information is voluminous. Another reality is that companies are dealing in larger


volumes or information that ever before. Great amounts of raw data are needed
to make fully developed analyses. From customer information to critical business
strategies, financial operational data and intellectual property. not only is there
more information but it is high –impact information. All of these have serious
security vulnerabilities.

MIDTERM

Lesson Proper for Week 7


Classification of Sensitive Information

            Sensitive information is generally classified into three (Fay, 2006)

1. Secret- this is information the unauthorized disclosure of which could cause


serious damage to the organizations business.
2.  Restricted – this is information of such value or sensitivity that its
unauthorized disclosure could have a substantially detrimental effect on the
organizations business. Examples include:

·         Marketing strategy

·         Customer files

·         Agreements and contacts

·         Contentious or litigable matters

3. Private – this is information relating to employees.

Examples include:

·         Salaries bonuses, and wages

·         Health and medical matters

·         Disciplinary actions

·         Job performance

Propriety information

Information is considered propriety when it is not readily accessible to others; it


was created by the owner through the expenditure of considerable resources; or
the owner actively protects the information from disclosure ( Fay, 2006 ). This
can include secret formulas, processes, and method used in production; or it
could be the company’s business and marketing plans, salary structure,
customer lists, and contracts and detail of its computer system.

Propriety information includes intellectual properties that are recognized and


granted varying degrees of protections by governments such as the following:

1. Patents – grand issued by a national government conferring the right to


exclude others from making, using, selling the invention within the country.
Patents may be given for new products or processes. Violation of patent right are
known as infringement or piracy.

2. Trademarks – words, names, symbols, device, or combination thereof used


by the manufacturers or merchants to differentiate their goods and distinguish
them from the products that are manufactured or sold by others. Counterfeiting
and infringement constitute violations of trademark rights.

3. Copyright -  protection given by the government to creators of original literary,


dramatic, musical, and certain other intellectual works. The owner of a copyright
has the exclusive right to reproduce the copyrighted work, prepare derivative
works based on it, distribute copies, and perform or display it publicly. Copyright
violations are also known as infringement and piracy.

4. Trade Secret – formulas, patterns, compilations, programs, devices, methods,


techniques, and processes that derive economic value from not being generally
known and not ascertainable except by illegal means. A trade secret violation I
the vocabulary of the law is a misappropriation resulting from improper
acquisitions or disclosure. The key elements in a trade secret are the owner’s
maintenance of confidentiality, limited distribution, and the absence of a patent.

Information Security Measures


            It was already demonstrated in the previous chapter on personnel
security that organizations face a wide spectrum of risks to protect information
assets. Sensitive information such as those illustrated above can be vulnerable
to threats to others not only from individual’s external to the organizations, but
from so-called insiders as well. Some of the recommended mitigation measures
include screening of both applicants an existing employee, restricting access to
sensitive areas, or using IT security measures such as firewalls, restricted site
accessing policies, and virus checks. Below are example of risks mitigation that
an organization’s can implement as part of their information security measures
(Blyth, 2008)

            Security Screening

            Job applicants, current employee’s contactors and other individuals who
could be sharing sensitive information with the organizations may have their
backgrounds checked for affiliation with known activist or dissident groups or for
any potential for insider activity. For individuals in posts that are considered
critical or vulnerable within the company structure, screening may involve an
investigation of their criminal history or interviews with the family, friends and
works colleagues in order to identify any possible concerns. In some cases,
covert methods of security clearance may be employed.

            Restricted Areas and Identification

            Physical barriers that control access to restricted areas can serve as a
deterrent and increase the likelihood identifying unauthorized individuals. The
organization can employ a series of identification methods from photographic
identification cards, bar codes, voice analysis, and retinal scan to enhance entry
restrictions within high security areas inside the facility.

            Technology Security Measures

            The organizations may use technological security measures to prevent


individuals from accessing communications or data storage media from eternal
sources. In addition, security personnel can enforce restrictions against t
electronic devices such as mobile phones, cameras and voice recorders that
could record or access sensitive information within certain areas inside the
facility. Countermeasures should also include protection against high –tech
surveillance devices that involve tapping land lines and mobile telephone calls,
remote accessing computer terminals or viruses that damage IT equipment.
Magnetic shielding, encrypted communications, virus checks, stand-alone
computers, and magnetic interference equipment as well as secondary
communication backups, alternative data storage system, and power generations
should also always be in place as part of redundancy policy.

Lesson Proper for Week 8

The Security Survey

            The security survey is a fact-finding process whereby the assessment


team gathers data that reflects the who, what, how, where, when, and why of an
organizations existing operation and facility. The purpose of a security survey is
to identify and measure the vulnerabilities to the facility or to specific assets by
determining what opportunities exist to exploit current security policies and
procedures, physical security equipment, and security personnel (Vellani, 2007),

            Security survey includes checklist, audits or inventories of security


conditions. Some expert includes the risk analysis, but the process should
instead begin with a needs assessment. It identifies people, things, process that
are necessary to the continuation of the business or work before the focus is
directed to the potential threats that may interrupt operations.

            On-site inspection and analysis are necessary in order to determine if


there is existing security, to identify deficiencies, to determine level of protection
needed, and to recommend measures to enhance overall security (Hess &
Wrobleski, 1996).

            The identification of anomalies implies that the surveyor is able to


pinpoint a certain level of security and that the existing conditions fall short of
that. Sequentially, it requires the need of the enterprise to be recognized as they
will determine what actually requires protection. In this stage, the needs
assessment is no longer implicit but explicit. It is in fact the foundation for the
survey.

Importance of Security Survey

            Some managers do not realize the huge loss that result security-related
problems in their organization. Most think that security concerns should be
directed against external threats like burglaries and robberies. They need to be
more aware of their security needs because they can possibly incur more losses
from fraud, abuse and other crimes that from other security concerns that they
have previous prioritized, like fire or industrial accidents.

An organization can consult with the security expert to determine if a security


survey is necessary. They can also seek information about their crime related
losses. They can use the security survey to determine if they need to be
concerned about certain security issues such as theft , fraud, forgery , arson,
burglary , robbery, malicious , damage, personnel screening and investigation ,
theft of trade secrets industrial espionage , executive protection , kidnap,
extortion , bomb threats, bombing and emergency/ disaster planning.

If there were security no plan, the security survey will be useful in determining the
need for it, as well as determine the security measures that should be included in
the plan. A comprehensive survey of the facility’s entire operations and
procedures will enable the organization’s decision-makers to identify critical
security factors in the facility. The survey will also be useful in analyzing
vulnerabilities and evaluating cost-effective countermeasures for protection of
assets. The survey should also recommend the establishment of policies and
procedures regarding the following security services (Sennewald, 2003).

 Protection against internal and external, theft, including embezzlement, fraud,


burglary, robbery, industrial espionage, and the theft of trade secrets and
property information.
 Development of access control procedures to protect the facility perimeter as
well as the computer facilities and executive offices located inside.

 Establishment of lock and key-control procedures.


 Installation of anti-intrusion and detection systems.
 Establishment of a workplace violence program to help corporate personnel
deal with internal and external threats.
 Control over the movement and identification of employees, customers and
visitors on company property.
 Selection, training, and deployment of security personnel.
 Establishment of emergency and disaster plans and guidelines.
 Identification of internal resources available and needed for the establishment
of an effective security program.
 Development and presentation of instructional seminars for management and
operations personnel.
The above lists includes the most frequently encountered programs and systems
reviewed or developed as a result of a security survey, but security expert may
add to it depending on the needs of the facility.

The Value of a Security Professional

            Organization face huge due to security elated concerns that a security
survey could have eliminated, prevented, or controlled. Security professional are
equipped with expertise to handle such matters. Cherles A. Sennewald the value
of the security professional in preventing such loss (Sennewald, 2003).

            By employing services of security professionals who can facilitate the


installations of appropriate installation of security measures in a facility’s an
organization will be able to reduce disruption in the facility operations, minimize
loss and, ultimately, improve net profits.

Security Inspections

Security inspection is a tool determines the possible risk in a facility in order to


control or prevent possible loss or damage of company assets. This through
assessment of what assessment of what is happening from a security point of
view ensures that the risk is recognized and cost effective countermeasure are in
place.

            Security inspection deals with the protection any person, facility material,
information, activity and other assets that have a positive value to the
organization. These assets may also have value to an adversary, possibly in a
different nature and magnitude to how the owners value them.

Security inspection also deals with the prevention of risk by taking action or using
physical entities to reduce or eliminate one or more vulnerabilities. Vulnerabilities
are weakness that can be exploited by an adversary to gain an asset. They
include structural, procedural electronic, human, and other elements that provide
opportunities to attack assets.

Purpose Security Inspection

1. To determine compliance of security policies


2. To detect weaknesses in the existing security measures
3. To assess assets and the probability of risk or the likelihood that loss will
take places

Phases of Security Inspection:

1.

            1. Detection of company policy violations – The act or practices of


employees that are contrary to policy. For example, tampering on employee
time cards or bringing out company property for unknown reasons.

2.

            2. Detection of Possible defects in protective device and other


security aids – For example, empty fire extinguishers, destroyed perimeter
fences, busted perimeter lights, and alarm system defects.

3.

            3. Detection of the condition of properties being protected - For


example, when the property being protected is exposed to rain and sunlight.
4.

            4. Detection of Security hazards – For example, improper storage of


waste materials.

5.

Importance of Security Inspection:

6.

1. It can help determine the effectiveness of a risk appraisal.


2. It can identify weaknesses in security countermeasures.
3. It can prevent possible loss of company assets.

Steps in Security Inspection:

1. Preparation

            a. Review the management policy

            b. Review the loss appraisal

            c. Use equipment needed in this activity.

2. Plan route

            a. Identify priority areas.

            b. Identify the Sequence

Safety Inspection

Safety is generally defined as the state of being certain that adverse effects
will not be caused by some agent under fined conditions. It means freedom
from danger, risk or injury. It involves measure (people, procedures or
equipment) used to prevent or defect an abnormal condition that can
endanger people, property, or the enterprise. These abnormal conditions
include accidents caused by human carelessness, alternativeness, and lack
of training or other unintentional events.

Objective of Safety Inspection

1. To save life- An organization’s workers are considered its most


valuable assets.it is obligation of the company to assure the safety of
its workers, as well as its visitors/ clients in its vicinity at all times
2.  To secure properties
3. To restore the affected facility as soon as possible.

Purpose of Safety Inspection

1. Detection of defects of defects such as materials, equipment, lightning


and ventilation.

2. Detection of sub-standard conditions such as poor housekeeping, poor


ventilation, poor lightning, noise, poor maintenance and poor training of
workers.
Phases of Safety Inspection

1. Detection of what might be called obvious hazards- actual unsafe


condition created either by the action of people or physical deterioration; for
example, blocked exist and tripping hazards.

2. Detection of conditions, which, of themselves, may not be the direct


cause of an accident would be contributory factors – for example, soapy
water spilled on the floor.

3. Detection of conditions wherein employees’ performance is deviating from


the standard practice or established policy, which in themselves, are wrong
and safe – for example, not wearing personal protective equipment (PPE).

4. Detection of employee performance, which, by themselves, are not


hazardous but can create hazards either directly or in contributory manner-
for example, storing old documents in a corner. 

Importance of Safety Inspection

1. It determines effective methods of hazards appraisal.

2. It corrects deficiencies to bring both safety and operation to minimum


accepted standards.

3. It is an unequal medium to determine potential accident source.

4. It recognizes defects for future necessary corrective actions.

5. It demonstrate management ‘s sincerity regarding accident prevention.

6. It increase efficiency and promotes better relationship with employees.

7. IT cultivates goodwill and moral value.

8. It determines the required emphasis of operations.

Steps in Safety Inspection

1. Preparation

a.       Plan

b.       Review

c.       Study

d.       Outline

2. Equipment

a.       Hard hat

b.       Pencil/ball pen

c.       Goggles etc.
3. Plan Route              

a.       have a definite objective

b.       Follow the pattern

4. Inspection Pattern

                  a. General conditions (lighting, work, output, buildings flashlight


materials, etc.)

                  b. Specific hazards

                  c. Work practices

                        d. How work is done (tools, machines, equipment)

Lesson Proper for Week 9


 

Security Analysis

            When an organization makes a decision to protect its assets, it is


necessary to clearly understand the actual threats to assets through effective
security plan. Without the security plan, decision-makers will have to rely on
guesswork in choosing the precautions and countermeasures against threats.

Defining the Problem

Defining a security problem involves an accurate assessment of three factors


(POA Publishing LLC, 2003):

1.       Loss Event Profile - the kinds of threats or risk affecting the assets to be
safeguarded.

This is the first step dealing with asset vulnerability.it requires recognizing
individual loss events that might occur by conditions, circumstances, objects,
activities and relationships that can produce the loss events.

2.       Loss Event Probability- the probability of those threats becoming actual


loss events.

P=      f/n

Where:

P-   is the probability that a given event  will occur

f –  is the number of outcomes or results favorable to the occurrence of that


event.

             n-  is the total number of equally possible outcomes or result.


            To make effective assessment of probability of security of loss events as
many as possible of those circumstances that could produce lost must know and
recognized. There is a need to emphasize the earlier statement that common
sense alone is not a adequate basis or yardstick risks. Specific knowledge is
required. remember, the more complex the enterprise or loss environment, the
greater the need for such expertise.

Factors of loss event probability

            There are certain conditions that could worsen risk of loss and they are
categorized as follows:

a.       Physical Environment- climate, geography, location, composition.

b.       Social Environment- age groups, ethnicity, neighborhoods, income


levels, social history, crime.

c.       Political environment – government unit, general tone, attitudes, political


areas.

Probability Ratings

Upon gathering of available data and factual circumstances in each risk, it is right
to assign a probability rating. Ratings will not consider any precaution or
countermeasures that may be taken later to reduce or eliminate the risk.

Usually, five categories of probability are established to indicate the probability


rating. With the amount of information available concerning each risk, plus the
skill on the protection specialist in assessing the probability impact of the factual
circumstances surrounding it. The ratings may be given as follows:

a.       Virtual Certain- given no changes, the event will occur.

b.       Very Probable- The likelihood of occurrence

c.       Average Probability- the event is more likely to occur than not to occur.

d.       Less Probable – The event is less likely to occur than not to occur.

e.       Very Improbable- Insufficient data are available for an evaluation.

3.       Loss Event Criticality –the effect in the assets or on the enterprise


responsible for the assets if the loss occurs.

Loss event criticality is the impact of a loss as measured in financial terms. How
important it is in terms of the survival or survival or existence of the organization.

High probable risks may not require countermeasures if the overall damage is
little. However, moderately probable risks will require attention if the size of the
loss they produce is great. Assessing the criticality is the third step vulnerability
assessment. It is first considered on occurrence basis. For events with high
recurrence probability, cumulative considerations must also be done.

Criticality includes the following cost considerations:

K= (Cp +Ct + Cd) – ( I- a)

 
Where:

K          =          Critically cost of the loss

Cp        =          Cost of permanent replacement

Ct         =            Cost of temporary replacement

Cr         =          Related cost

Cd        =          Discounted cash

I           =          Insurance

a         = allocable insurance premium

Critically Known or Unknown

Percentage of Impact

100%                =          Fatal

75%                 =         Very Serious

50%                 =          Average

25%                 =          Less Serious

0%                   =          Unimportant

Security Hazards

Every organization has the responsibility of protecting lives and property by


means of disaster preparedness and emergency management. It helps minimize
loss and ensure the continuity of production that is vital to the recovery of an area
after the occurrence of disaster. A disaster may be in the form of destructive
storm, fire, explosion, sabotage, civil disturbances, nuclear incident or even an
earthquake.

In this kind of scenario, managers should do planning coordination with the local
authorities to make certain that corporate and community resources would be
used to their fullest advantage in an emergency.

Types of Hazards 

1. Natural Hazards

These are risk arising from natural phenomena. Nobody can do anything to
prevent this kind of occurrences, but there are measures that can placed or
installed to minimize the damage or destruction of property, injury, or loss of life.
Since it is part of physical security, security plans must be coordinated with the
installation’s emergency and disaster plans.in the design of security plan,
emergency situations and disasters must be fully considered so that in the event
of their occurrences, immediate course of action can be made thus preventing or
minimizing the loss of property and lives.
-       Flash floods cause by typhoons and monsoon rains

-       Earthquakes

-       Fires

-       Storms

-       Volcanic eruptions

-       Lightning storms

-       Extreme temperature and humidity

-       Landslides

Man-made Hazards

  It is the result of a state of mind, attitude, and weakness of character traits. One
can be due to an act of omission or commission, either overt or covert, which can
disrupt the operation of an organization.

-       Carelessness

-       Accidents

-       Sabotage

-       Espionage

-       Pilferage

-       Theft

-       Disloyalty

-       Vandalism

Risk is defined the potential damage or loss of an asset. It is in fact a


combination of two factors:

1.       The value placed on that asset by its owner and the consequence, impact
adverse effect of loss or damage to that asset.

2.       The livelihood that a certain weakness will be exploited by particular threat.

Risk analysis involves the security of specific vulnerability, probability and


significance of potential threats including natural and man-made.

Major Risks

Some of the major categories or risk s are arranged according to its seriousness:

-       Nuclear attack

-       Natural catastrophe

-       Industrial disaster

-       Civil disturbances and malicious destruction


-       Other crimes

-       Conflict of interest

-       Other risks

Risk Management Alternatives and Strategies

1.       Risk Avoidance – Complete elimination or eradication of the risk from the


business, government, or industrial environment for which the risk manager has
the responsibility.

2.       Risk reduction - Decreasing of the risks by minimizing the probability of


the potential loss. This reduction for criminal opportunity is often accomplished by
situational crime prevention strategies to discourage, deny or deter criminal
incidents.

3.       Risks spreading – The distribution of a risks through


compartmentalization or decentralization to limit the impact (criticality) of the
potential loss.

4.       Risks transfer – The movement of the financial impact of the potential


loss over to an insurance company.

5.       Risks Self Assumption – This is a planned assumption and acceptance


of the potential risk by making a deliberate managerial decision of:

§  Doing nothing about the threat; or

§  Setting aside resources for use in case of a specific loss incident.

6.       Combination of the above – making use of two or more of the above


given strategies to manage potential risk and threats.

Lesson Proper for Week 10

Security Investigation

Security investigation is one of the major functions of a security organization.


Most security officers and supervisors are called upon is conduct preliminary
investigation on theft, injury or any other kind of incident. These investigations
are usually non- criminal in nature but still important since they may result in civil
litigation.

The term investigation means a planned and organized determination of facts


concerning specific events, occurrences or conditions for a particular purpose.
Security, on the other hand, means the protection of property from loss through
theft, fraud, fires, threats or hazards. While security investigation is a planned
and organized determination of facts concerning specific loss or damage of
assets due to threats, hazards or unsecured condition.

Elements of Investigation

1.       Investigator

2.       Purpose
3.       Subject of investigator

The 3 I’s of Investigation

1.       Information – the knowledge which the investigator gathers from different


sources.

a.       Acquired from regular sources. Conscientious and public spirited citizens,


company file, school files, or records file of other agencies.

b.       Acquired from cultivated sources- paid informants, bartenders, cub drivers,


acquaintances, etc.

2.       Interrogation – The skillful questioning of witnesses as well as suspect.


This is different from an interview. An interview means the simple questioning of
a person who has no personal reason to withhold information. Interrogation, in
contrast means the questioning of a suspect or other person who is reluctant to
divulge information concerning the offense under investigation.

3.       Instrumentation – it is the application of instruments and methods of


physical sciences to the detection of crimes. In other words, the summation of
the application of all sciences in crime detection known as criminalistics.

    Purpose of Investigation

1.        To identify the offender

2.       To locate the offender

3.       To provide evidence

   Qualities of Effective Investigation

The following are attributes the characterize an effective and reliable


investigation, as outlined in the Asset Protection and Security Management
Handbook (POA Publishing LLC, 2003).

1.       Objectivity

The investigator must accept any fact, regardless of its significance to


preconceived ideas. Objectivity is achieved by recognizing the investigators
personal prejudices and compensating for, or neutralizing, his effects of
investigation. An investigator who cannot sort out and identify personal
prejudices about people, places and outlooks is likely to miss the mark

2.       Thoroughness

A thorough investigator checks all leads and checks key leads more than once to
assure consistency in result. When the statement of an interviewee is critical, the
facts should be reviewed several times if at all possible without compromising the
investigation. Corroborating important aspects through different sources is a
proven means of achieving thoroughness.

3.       Relevance
Relevance means that the information developed pertains to the subject of the
investigation. Another aspect of relevance is cause and effect. Is a developed
fact the result of some other fact under investigation, or is it the cause of that
other fact? If a relationship can provide a direction for the investigative effort, or
working hypothesis, establishing the relationship may materially assists in
resolving the entire investigative problem.

4.       Accuracy

The mental processes that collect and sort data from the physical senses often
produce errors. Sound investigative techniques dictate frequent test for
verification. If data is subject to physical measurement, it must be measured. If
an informant is the only source of key data, the informant should be tested at
least for consistency in telling the version. All information must be tested for
inherent contradictions.

5.       Timeliness

Timeliness is an extension of thoroughness .it requires that the investigation be


carried to the latest possible point at which information relevant to the
investigation might be found.

Characteristics of a successful Investigator

1.       Observant

2.       Resourceful

3.       Patient

4.       People oriented

5.       Understanding of human behavior

6.       Understanding of legal implication of the work

7.       Possesses good communication skill

8.       Self - starting

9.       Healthfully skeptical

10.   Intuitive

11.   Energetic

12.   A good actor

13.   Possesses good judgment

14.   Logical

15.   Intelligent
16.   Creative

17.   Receptive

18.   Possesses sense of well being

19.   Dedicated

20.   Possesses good character

21.   Professional

Lesson Proper for Week 11

Systematic Approach to an Investigation

1. Define the investigative problem. Identify the requirement:

a.       The reason for the investigation

b.       The particular phases or elements of investigation assigned to the


investigator.

c.       Discern whether the investigation is to be handled overtly or discreetly

d.       The priority and suspense date assigned to the investigation

e.       The origin of information

2. Collection of relevant data

a. Prepare a written investigative plan that includes:

·         Information needed

·         Methods used in gathering information

·         Location of sources to furnish this information

b. Methods and sources to be used by the investigator:

·       Personal observation

·       Undercover /use of agent

·       Surveillance

·       Raids and seizure

·       Direct visit to the scene

·       Study of documents or records

·       operational files

·       Identity of documents
·       Newspapers, books, periodical, etc.

·       Correspondence, letter malls, telegrams, etc.

·       Use of Interrogation and Interview

·       Use of Recruited Informants

·       Liaison with agencies that possess the Information

3. Analysis and verification of the information gathered

a. Analysis involves a study of the information in terms of questions set out to


answer.

·       Data collected should be complete

·       Supplied information must be based on facts

b. Verification methods include the following:

·       Personal observation of the agent

·       Secure reliable statements from individuals making personal observation


through experience.

4. Drawing the conclusion is the functions and responsibility of the person


requesting the investigation.

Guidelines in Investigation

1.       Preliminary Investigation

P – proceed to the scene promptly and safely

R – render assistance to the victim, if any

E – effect the arrest of the offender

L – locate an d identify the witnesses

I – interview the complainant and witnesses

M – maintain the crime scene and protect the evidence

I – interrogate the suspect/offender

N – note all the conditions, events and remarks

A – arrange for the collection of evidence

R – report the incident fully and accurately

Y – yield the responsibility

2.       Investigation Proper

a.       Search of the crime scene

b.       Taking of photographs of the crime scene


c.       Care of evidence

3.       Methods of Investigation

a.       Information

b.       Interrogation

c.       Instrumentation

   Investigation Report

            Reporting writing is a crucial part of the investigation. The most diligent
and professionally conducted investigation loses its value if the effort is not
properly reported. An investigative report is a written document in which the
investigator records the activity in the investigation and the evidence gathered. A
competent investigator writes a report so that a reader can readily understand
what the investigator did, why it was done and the results of the action.

Purpose of Investigation Report

The following are the rationale of an investigation report.

1.       To provide a permanent official record of the investigation.

2.       To provide other investigators with information necessary to further


advance the investigation.

3.       To uphold the statements as facts on which designated authorities may


base a criminal corrective or disciplinary action.

Qualities of Investigation Report

1.       The report serves as an objectives statement of the investigation findings.

2.       The report is an official record of the information relevant to the


investigation which the investigator submits to his superior.

3.       The report is clear, brief, accurate, impartial but complete.

4.      The report is sans of investigator’s opinion or other irrelevant facts foreign
to the case.

5.       The report is accurate and is a true representation of the facts of the case.

3.       The report is clear and is logically and chronologically developed.

Parts of the Report

            The investigation report contains the following components:

1.       Administrative data

a.       Date

b.       File number

c.       Subject

d.       Complaint

e.       Reporting investigator
f.         Office of origin

g.       Status

h.       Distribution

2.       Synopsis – a brief description of the actions of the perpetrator as


established in the body of the report.

3.       Details of the report – objective of the investigation

4.       Conclusion and recommendation – includes the investigator’s opinion,


conclusion and recommendations.

5.       Enclosures – photographs, sketches, sworn statement, etc.

SAMPLE REPORT FORMAT

CONFIDENTIAL

     (Letterhead)

Code: _______________________________________________Date:
___________

Subject:
____________________________________________________________

To: (the Chief or Commander who assigned the case)

I.                     AUTHORITY

This section contains a brief statement of when, where, and by whom the
investigation was made and should cite the authority for making it.

II.                   MATTERS INVESTIGATED

This section represents the mission of the investigator. In essence, it answers the
question: what is the investigation about.

III.                 FACTS OF THE CASE

This section presents the real truth as regards the matter being investigated. The
report must be containing these two main characters: completeness and clarity. It
should be coherent in the presentation of all pertinent facts. It should be free from
argument or bias and should be fully supported by evidence.

IV.                DISCUSSION

Discussion should set forth the presumption and inferences from all
circumstances in the case when appropriate. The goal is to give the directing
authority the clearest possible picture. It should contain related factual matter of
argument as may be necessary to establish the conclusions and
recommendations.

V.                  CONCLUSION

It represents concise summary of the results of the investigation. This is usually


stated in the order naturally suggested by the statement of the allegations or
facts.

VI.                RECOMMENDATION

It contains practical suggestions as appropriate action to be taken to make


suitable position of all phases of the case.

_______________________

                                                                                Investigating Officer

Incident - Type Investigation / Complaint - Type Investigation

A.      General Facts

1.       The incident type investigation is also known as a complaint type of


investigation.

2.       An investigation might begin with a personal observation. Usually, a report


made by someone, stating the facts and conditions, actual or alleged, from which
an investigation shall be conducted. There is a basis of complaint or report about
an event or a condition.

B.      Investigative Process

1.       The investigative process begins with the acquisition of the initial


information in which the investigation is based on. It ends when the last piece of
physical, testimonial or directly observed date has been collected. The
investigative process then moves to analysis and report writing process.

2.       A systematic approach to investigation applied.

C.      The Investigative Analysis

Preliminary analysis of the investigative steps to be taken is made by someone


who assigns and reviews investigation as well as by the investigator. This results
to a note or list of the investigative steps to be taken and some instances the
sequences. The investigator determines in advance the precise location and
availability of persons or premises to be interviewed or viewed. Other preliminary
observations include:

1.       Is the prime or another informant a member of the bargaining unit? If so,
what is the policy should the informant request representation during the
investigative interview?

2.       Have all the persons, events and locations mentioned in the complaint
been checked through security investigative indexes and the results noted?

3.       Should any operating or executive management personnel be notified of


the initiation of this investigation before further steps are taken?

4.       Does it appear that recording or photographic equipment will be needed? If


so, is it in serviceable condition?

5.       Is there a need for more than one security investigator for the case?

Sequence of Investigative Leads

            Subject to the circumstances of the situation, the following rules are
established for priorities.

1.       Prioritize those persons not likely to remain available for interview. These
might include employees scheduled for a trip or reassignment, informants only
temporarily in the area, etc.

2.       Give second priority for interview those persons with the most extensive
information or the most fundamental. This usually includes the prime informant or
person providing the information which predicated the inquiry.

3.       Interview next those individuals with relevant but less extensive


information, such as those witnesses or are familiar with the part if the subject
matter.

4.       The last interviews are those likely to be hostile. This usually includes the
subject of the investigation of criminal misconduct. The reasons for deferring this
type of interview are:

a.       It may create administrative obstacle as when hostile informant advises


others no to cooperate, or makes a complaint to his supervisor or other member
of the management which may require collateral resolution and cause delay;

b.       It may alert people in a position to compound or obstruct the investigation


and ultimately frustrate its purpose.

5.       Observe first those events or location which may not available at a later
date for observation or which may change unless observed promptly.

6.       Observe later those events or locations with irrelevant characteristics but


the condition of which at a given time is not.

INTERROGATION AND INTERVIEW

Interview of Non-Hostile Informants

It must be noted that an interview conducted at a security office affords better


control of the environment. However, it is likely to make the interviewee, even a
friendly one, most apprehensive. Considerations of the confidentiality may
require a private interview. If they do not, and if the interview could be
accomplished at or near the informant’s regular work station, consider doing it
that way to keep the informant at ease.

Show consideration for the comfort and convenience of the interviewee, and if
possible, preserve lengthy interviews on audio tape recordings, making their total
reconstruction later. The use of covert sound recording should always be
evaluated carefully.

The Interrogator and the Science of Psychology

1.       Human beings tend to be talkative, especially after a harrowing


experience.

2.       Human beings tend to be defensive when confronted with superior


authority

3.       People tend to rationalize acts they feel guilty about.

4.       People in tight situations tend to be unable to apply or remember lessons


they have been taught regarding security.

5.       Human beings normally do not wish to antagonize those who have power
over them and are, therefore tempted to be cooperative with those in control.

6.       Human beings tend to attach less importance to what they think is their
exclusive knowledge when someone else demonstrates that he too possesses a
great portion of that knowledge.

7.       People tend to like being flattered and exonerated from guilt

8.       People are inclined to respond to kindness and understanding, especially


in dire situations.

9.       They resent having something they respect belittled, especially by


someone they dislike.

Interrogation of Suspected Individuals

1.       Physical Aspect

a.       The ideal interrogation room should be exclusive.

b.       The room should be will lighted.

c.       The room should be furnished with chairs, rugs, and shades made of plain
materials.

d.       The walls and ceiling should be painted with neutral shade.

e.       There should be nothing in the room that would distract the attention in
working condition.

f.         No telephone should be provided with sound recording devices in good


working condition.

g.       The room should be provided with sound recording devices in good


working condition.

h.       No interruption should be made during interrogation.


 

2.       Mental Aspects

a.       The interrogator must be familiar with all aspects of the investigation.

b.       He must never be on the defensive for lack of knowledge of the case.

c.       He must take advantage of slips made by the suspect.

d.       The interrogator must check all appropriate files or record.

e.       He should be able to determine what he knows, what he must find out and
what the suspect can tell.

f.         He must be familiar with the techniques he intends to use to obtain the
desired information.

Types of Suspects in Terms of Attitude and Personality

1.       Talkative type

2.       Pathological liar

3.       Disinterested type

4.       Imprudent type

5.       Explainer

6.       Shy and uncommunicative

7.       Know- nothing type

8.       Fearful type

Different Interrogation Schemes

1.       Direct approach. The suspect is allowed to speak/talk freely.

2.       Emotional approach. Discover type against of emotion to use to obtain an


admission.

3.       Trickery. One suspect is played against the other.

4.       The location trick. The mentioning of false episode.

5.       Hate and revenge. Giving clever hints referring to a double cross and
confession of an accomplice.

6.       National pride. Making an appeal on nationalism or love of country.

7.       Kindness and sympathy. Let the suspect understand that you are fair and
will see that justice is accorded.

8.       Mutt and Jeff. The use of two interrogators, one is hostile and the other is
sympathetic.

Interrogation Proper

1.       Explain his rights under the Constitution.


2.       Begin with background questions.

3.       Study the subject’s reactions to determine the interrogation techniques


needed, the emotions to be played upon.

4.       Pick up new leads.

FINALS

Lesson Proper for Week 13

Management in General and Planning Function

            The security executive is no longer a private practitioner who impresses


people with his courageous deeds, skill in apprehending criminals or expertise in
handling weapons, Rather, he is a modern manager entrusted with the twin tasks
of protecting corporate assets and ensuring that business interruptions, if at all,
are kept to the minimum. In fact, his most challenging role is to predict the
opportunities to manageable proportions. In this role, he is backed by his years
and years of technical expertise as well as the seasoning and sensitivity that
come with long years of exposure in the field.

            In security as in other fields, the manager uses management techniques


in getting things done and is familiar with the following elements of management:
planning, financing, organizing, staffing, training and professional development
and communication.

Security Management and Cost Effectiveness

            Cost effectiveness means spending the least possible amount consistent
with required results and, at the same time, assuring that each item of expense is
fully justified as the best available way to commit the funds. Akin to profit - center
orientation with which it is closely aligned; cost effectiveness in security
management definitely enhances the profitability of a business enterprise.

Security Planning

            Planning is the key factor in the successful management of a security


program. A management expert defines planning as pre-determining a course of
action. Another defines it as deciding in advance what to do, how to do it and
who should do it. It is necessary for a security executive to plan, the alternative is
obviously to react to events that have already occurred or try to solve problems
that could have been avoided in the first place.

            The first requirement in planning is to identify the overall objective and
purpose of the organization. Afterwards, the executive may start his own
planning which should be objective and supports the organization’s goals.

            One method of security planning is to create an overall blueprint for


security program based on the identified vulnerabilities or the result of
vulnerability assessment. another method is to write the several plans such as a
comprehensive emergency plan covering various anticipated contingencies and
various operational plans, policies, standards and procedures. Still another way
is the use of action plans showing three columns:  the first column identifies the
planned activities, the second column identifies the action officer involved, while
the third column shows the time frame.

Development of Security Polices

            A policy is abroad guide to management decision –making in situations of


a repetitive nature. Its purpose is to orient decision making towards the
organization’s ultimate objectives. Hence, a policy should reflect the objectives
and be flexible and sufficiently broad enough to be applicable to changing
conditions.

            Nevertheless, security policies vary from organization to organization.


Beyond moral standards there seems to be little commonality among
organizations among organizations as to suggest standard policies applicable to
all.

Illustrations of Security Policies

1.       In a Non- Union Company.

The company recognizes the loyalty of its employees and its obligation as a
corporate citizen to the community and thus fosters a cooperative attitude in the
protection of personnel and property.

2.       In a Company with Union

The company recognizes its obligation as a corporate citizen to the community


and thus, practices an aggressive policy of prosecution regarding theft within the
company.

3.       Information Security Policy

The computer center recognizes the propriety interest of the client entities who
utilize the facilities of the center, hence, strictly controls dissemination of
management information on strictly need-to- know basis and only to such
persons that have been specifically cleared to receive such information.

Operating Level Policies

      Major policies and procedure covering various areas of security will have to
be developed. The need to draw up specific policies such as “Access Control”,
“Key Control”, “How to Handle a Bomb Threats”, etc., may be written as a
possible as a basis for common interpretation or may include specific procedures
in implementation of a particular mandate from management.

Financing

            Managing security requires cash to carry out the various responsibilities
involved. A security executive should be able to have an enlightened view of
what activities he plans for a specific period. the expected operational conditions
and the cost involved. A security executive should have knowledge in forecasting
and budgeting to make security management successful. He should be familiar
with the organization’s stand on Return on Investments and spending
preferences.

Budgeting 

            A budget is usually a prepared annual plan stated in financial terms. It is


ordinarily finalized a few months before the start of the budget period. It contains
the different items for which costs are involved. No security organization can
operate nor have its program implemented without a budget.

The Process of Budgeting

1.       Setting up goals and objective for a particular period, usually a year.

2.       Budget development involving an evaluation of current activities,


identification of projected new activities and determination of costs.

3.       An evaluation and review of the recommendation.

4.       Budget establishment or allocation of funds.

The process is set off by appropriate guidelines from senior management. The
security executive then prepared his program and various activities and costs. He
develops and recommends alternative courses of action. The senior
management then reviews the recommendations makes decision on the funds
allocation.

Budget Costs and Justification

1.       Salary Expense – refers to total personnel costs. It is computed by adding


up the total monthly compensation of each employee and multiplying the total by
13 considering the provision the 13 th month pay. Provision for expected salary
increases should also be made.

2.       Sundry Expense – these are non-salary expenses such as supplies,


uniforms, travel, transportation, representation, contract services, professional
fees, membership fees, publications and subscriptions.

3.       Capital Expenditures – these are one- time expenses for physical


improvements or acquisition of equipment such as purchase of communication
equipment, computers, firearms, vaults, alarm systems and construction of firing
range.

To justify the budget, the following questions must be resolved:

-       What must be done?

-       How are we going to do it?

-       When must it be done?

-       How much will it cost?

Organizing
An organization is the orderly arrangement of manpower and material resources
to effectively carry out their intended purposes. It molds the activities of many
people into a smooth working team and could mean the difference between the
success and failure of a security department or company.

            A security organization must be planned in such a way that it meets the
needs of the enterprise it is responsible to secure. It must be designed with the
aim of helping a company fulfill its mission. Each sub-unit must be able to carry
out its assigned task at an acceptable level of efficiency.

            A security organization must also be flexible in such a way that the
structure must be able to adapt to necessary changes without interfering with the
major objective of the department or agency.

Organizational Relationship

            The following are the basic forms of organizational relationship:

1.       Line Authority- line authority is based in the relationship between a


superior and a subordinate level. It is formal managerial authority with the right
and power to issue commands to exact accountability, and to discipline for
violations.

2.       Staff Authority- It is based on relationship between managers of auxiliary


and facilitating groups and the line organization. It is limited by absence of the
right to command beyond the staff group itself.

3.       Function Authority- Between the above mentioned authorities is the


functional authority which is the formal power to command, limited to a specified
area of expertise which may be organization-wide and directed across
substructures as section, departments and divisions.

Organizational Principle

 To come out with an effective security organization, the executive should be
aware of the following principles:

1.       The work should be divided according to some logical plan. The five
primary ways are: purpose, process or method, clientele, time and geography.

2.       Line of authority and responsibility should be made as clear as possible.


These are reflected in the pyramid-like structure with blocks and lines known as
“organization chart” and with the positions of greater authority and responsibility
located in the upper levels.

3.       There should be a “unity of command” in the organization. This means that


an employee should be under the direct control of one and only one supervisor at
any given time.

4.       One supervisor can effectively control only a number of people, and that
limit should not exceed. This is known as the principle of span of control. At the
highest level the number is normally three and at the lowest level the maximum is
12.

5.       Responsibility cannot be given without delegating commensurate authority,


and there must be accountability.

6.       All efforts of sub-units and personnel must be coordinated into the


harmonious achievement of the organization’s objectives.
Reporting Levels

            Oftentimes, the security director/manager may report directly to the


president or at least one of the senior executives. He may also report to a middle
management executive who tends to limit his stature, authority and scope of his
responsibility.

Typical Security Organization

            There are factors that could dictate the type of security organization that
an enterprise may adopt. Among these are the corporate philosophy and
purpose, the customers that the security organization is serving, the particular
nature of business activities, the identified vulnerabilities and the location of a
company’s facilities

Lesson Proper for Week 14


The Agency Operator/Security Director

            The security executive usually wears to hats. First is the perception that
he is an expert in security. Second is the awareness that he is the highest
management guy in the hierarchy, thus, he should be backed by a track record of
success in handling people, problem solving and professional competence.

1. Leader - His most basic role is to provide leadership, set the right climate,
establishes the directions to take, motivates his people and try to bring out the
best in them.

            2. Company Executive - He is accepted by his senior management and


peers as part of the management team.

He is discerned as a modern day manager.

            3. Executive with High Visibility – He is visibly recognized and


participates in various company activities and is a much sought after speaker in
his area of expertise.

            4. Innovator – He is expected to be always on the lookout for better and


less expensive ways to do a job. He is not fearful of trying new ways and take
risks.

            5. Counselor / Adviser – He is able to provide advice, suggests


alternatives, and helps solve problems.

            6. Trainer - He establishes professional development and keeps his


people attuned with times and various requirements,

            7. Contemporary Professional – He keeps abreast with current


development in the profession by participating in meetings, conferences, and
seminars, and subscribes to security magazines and periodicals.

             8. Goal-Setter – He establishes objectives and defines the goals to be


achieved. It starts with the setting up of goals and objectives for particular period,
usually a year. Afterwards, budget development follows. This involves an
evaluation of current activities, identification of projected new activities, and
development alternatives and determination of costs. After these, an evaluation
and review follows.
 

Staffing and Administration

Ranks and Positions

        The security agency operator / owner must observe the required major
ranks and position in the organization of the agency, as prescribed by the
implementing rules and regulation of RA 5487, as amended.

       a. Security Management Staff

                  1. Security Director (SD) – Agency Manager / Chief Security Officer

                   2. Security Executive Director (SED) – Assistant Agency Manager /


Assistant Chief Security Officer.

                   3. Security Staff Director (SSD) – Staff Director for Operations and
Staff Director for Administration.

                  4. Security Staff Director for Training – Staff in-charge for training.

                

        b. Line Leader Staff

                  1. Security Supervisor 3 – Detachment Commander

                  2. Security Supervisor 2 – Chief Inspector

                  3. Security Supervisor 1 – Inspector

        c. Security Guard

                  1. Security Guard 1 – Watchman / guard

                  2. Security Guard 2 – Shift-In-Charge

                  3. Security Guard 3 – Post-in-charge

        d. Security Consultant (Optional)

Staffing Pattern

        All security agency owners / managers shall follow the required staffing
pattern as prescribed under Rule IX, Sec. 2, NIRR of RA 5487, as amended.

             1. The agency manager is automatically the Security Director who shall


be responsible for the entire operation and administration / management of the
security agency. He shall be the authorized signatory to all duty detail orders and
all other documents and communications pertinent to the operation and
management of a security agency. He may delegate certain functions to a
subordinate, provided the subordinate is qualified to discharge the given function
in accordance with law.
            2.  Security agency shall appoint a staff officer as Security Training
Officer, who shall be responsible for the training of the Agency’s security
personnel in accordance with the requirements of RA 5487 and the IRR. The
Training Officer shall be licensed as security officer likewise accredited as such
by the Training and Education Branch of SOSIA.

            3. The Staff Director for Operations is the staff assistant of the security
manager for the efficient operation of the manager for the efficient operation of
the agency. This position includes the responsibility to canvass clientele and the
implementation of contract and agreement. He is also responsible for the conduct
of investigation and the conduct of training.

            4. The Staff Director for Administration is the staff assistant of the


agency manager for the effective and efficient administration and management of
the agency. He is responsible for the professionalism of the personal,
procurement / recruitment, confirming of wards, mobility and issuance of FA’s

            5. The Detachment commander is the field or area commander of the


agency. The Detachment shall consist of several posts.

            6. The Chief Inspector shall be responsible for inspecting the entire area


covered by the detachment.

            7. The Security Inspector is responsible for the area assigned by the


Chief Inspector of the Detachment Commander.

            8. The Post –in –Charge is responsible for the entire detailed security
office within a certain establishment.

            9. The Shift- in- Charge is responsible for the security officers who are
scheduled in a certain shift for a particular period.

            10. The Security Guard is the one actually posted as watchman and or
guard.

Position Standards

         One of the major tasks of the corporate security executive which cannot be
delegated is the setting up of standards for key positions in his organization.
Also, more often than not, he himself would establish the standards for his own
position especially if it is a newly created one. Among the areas defined by the
Job Description are: the job functions, reporting relationship, skills required,
managerial capabilities, education and training, years of experience and personal
circumstance.

Hiring

       This process involves sourcing of candidates through advertisements or


referrals, interviewing, short listing, background investigation, selection of the
best candidates and finally preparing the job offer.

Training and Professional Development

        Although there have been state-of the-art developments in the field of


security as far as technologies and various literature are concerned, it is quite
obvious that these will not immediately take place in the country. The assurance
of professional development that a junior security officer could hope for is to do
research of his own and associate himself with and be an understudy of
somebody with recognized professional competence.

Discipline  

        Below are some of the basic rules of discipline:

1.       Put rules in writing and ensure that employees understood them.


Employees are entitled to know what is expected of them.

2.       Do the disciplining in the privacy of the office. Do not chastise one in the
presence of others.

3.       Be objective and consistent. Discipline condemns the act and not the
person.

4.       Educate and do not humiliate. The idea is to help, not to hurt.

5.       Keep a file of all employees’ infractions. This can come handily later on.

6.       Exercise discipline promptly. Delay raises questions.

Appraisal of Results

       A performance appraisal should be done to measure and evaluate the


performance of subordinates on a regular basis. It can be done annually or semi-
annually. This is the usual basis for administrative actions such as promotions or
salary increase or o the extreme, the basis for separation from the organization.

Promotions

       Promoting deserving employees is one of the important functions of a


security executive. If there’s a vacancy, he has the option to fill it up by promoting
a staff member based on his track record and his expected performance in the
higher position.

Morale and Welfare

        In security, all things being equal, employee welfare should be given the
utmost importance along with morale. The security executive should be able to
motivate his subordinates, make them function as a team and instill pride in and
identification with their organization.

        The security executive should realize that the manpower is their “product”
thus, the people’s well-being, welfare and movable should be their principal
considerations. These include the achiever’s recognition, professional
development, fairness and consistency.

Communication
        Continuing communication within the security organization and with other
subdivisions of the company is major responsibility of the security executive. He
should be able to communicate upward, downward and laterally; as well as
receive communications from above, below and laterally.

Some Management Principles

         Security practitioners should be conversant with the following “Ten


Management Rules.”

1.       Definite and clean-cut responsibilities should be assigned to each


executive

2.       Responsibility should always be coupled with corresponding authority.

3.       No change should be made in the scope or responsibilities of a position


without definite understanding to that effect on the part of all persons concerned.

4.       No executive, or employees, occupying a single position in the


organization should be subject to definite orders from more than one source.

5.       Orders should never be given to subordinates over the head of a


responsible executive. The management should instead supplant the officer-in-
question.

6.       Criticism of subordinates should, whenever possible, be made privately,


and in on case should be criticized in the presence of executives or employees of
equal or lower rank.

7.       No dispute or difference between executives or employees as to authority


or responsibilities should be considered too trivial for prompt and careful
adjunction.

8.       Promotions, wage adjustments and disciplinary actions should always be


approved by the executive immediately superior to the one directly responsible.

9.       No executive or employee should ever be required or expected to be at


same time an assistant to, and critic of, another.

10.   Any executive whose work is subject to regular inspection should whenever


practicable, be given the assistance and facilities necessary to enable him to
maintain an independent check of the quality of his work.

Lesson Proper for Week 15

Program Implementation

Top Management’s Responsibility

        The top management should always be interested in the implementation of


any security program. They must extend complete support to program on a
continuing basis. They must be willing to take action to ensure that employees at
the other levels comply with the requirements that have been established for the
protection of personnel and other assets. The responsibility and accountability
from the implementation are delegated to the security executive. Thus, he would
function as a steward doing the necessary management work for and on behalf
of top management.

Involvement of Others

       Non-security can be of great assistance in the implementation of the security


program and their active participation can contribute to its success. Thus, it is
important to keep other employees aware and involved.

Setting Priorities and Meeting Schedules

      The higher the criticality rating of the identified vulnerability, the higher is its
priority in the implementation of countermeasures. It is important also that the
time frame established be met otherwise it could affect the entire program.

Drills and Rehearsals

      Some areas of the security program would need regular drills or rehearsal’s


which stimulate anticipated conditions, i.e. crisis management, fire drill, bomb
threat handling, and response to a robbery.

Validation and Updating of Plans

       During program implementation, opportunities to arise to improve


countermeasures or reinforce those found effective. If new conditions present
themselves, necessary adjustment sometimes need to be made in the security
program.

Program Evaluation

        At the end of timetable or drills, rehearsals, the security program or part of it
need to be evaluated. Issues such as relevance or adequacy of
countermeasures, cost effectiveness, etc., need to be addressed to check the
existence of vulnerability which may trigger the need for a much responsive
security program.

Problem Solving and Decision-Making

Problem Solving Techniques

       The successful security executive is a problem solver. He is able to solve


most of the problem through quick evaluation of the situation against experience
and logic employing the following seven steps of problem solving;

1.       Clearly Defining Problem – he ensures he has the complete grasp of the


problem at hand. He is able define and clarify issues involved.

2.       Gathering Information – he gathers information through research and


interviews. It may require putting the information gathered in document form, in
tapes or indexes
3.       Interpretation – the gathered information’s are put together to arrive at a
clearer picture and try to ascertain the meaning and related implications.

4.       Developing Solutions – the security executive may come out with a


solution and several alternatives. In this step he should be guided by the
principles and techniques of effective management and company police.

5.       Selecting the Best Solution – from several alternatives the security


executive selects the best practical solution considering the short and long term
effect of each possible solution.

6.       Putting the Solution into Operation – One of the most appropriate


solution is chosen, implementation is next. This is critical as it may involve
change be difficult to accept. There might be a need to sell the solution to others.

7.       Evaluating the Effectiveness – the plan or solution should be reviewed


periodically for effectiveness. A comparison between the ideal solution and the
actual practice may be made.

Some Pitfalls in Decision Making

         The appropriate decision and taking responsibility for it is a critical function
of any executive, much more security professional. The security executive should
avoid the following:

1.       Jumping into conclusion

2.       Accepting the first choice

3.       Accepting the easiest way out

4.       Procrastinating

5.       Letting prejudices or emotions influence

6.        Failing to get the facts

7.       Failing weigh, the alternatives

8.       Falling to consider consequences

9.       Fearing to take risks and assume responsibility

Factors Affecting a Decision

1.       Prior Experience – a tried and reliable course of action that worked before
may very much work again in similar situation.

2.       Self Interest – one’s own interest may not be the best for others. The ideal
situation here is to balance one’s interest with those of the others.

3.       Tradition – there are good traditions but there are those that limit the way
of doing things and become the basis for decision because they form the easiest
way out.

4.       Creativity – this is the opposite tradition. It has resulted in a lot of good in


some areas but for the sake of change is not healthy way to arrive at a decision.
5.       Authority or expert Opinion – this should be given great consideration.
However, the security executive should make a certain that they are really
experts rather than products of media hype.

6.       Logically Thinking – the decision is based on sufficient facts and


throughout analysis leading to clear conclusion and good decision.

7.       Emotional Prejudice- the decision should be free from bias and


sentiments. It may lead to favoritism and irrational decision making

8.       Ease of Execution - all thing being equal, security executives confronted


with problems would like an easy way out, but easy the easy way out is not
usually the best way out.

Security Audit/Inspection

Rationale for Security Audit

There a usually need for a formal audit or inspection to: check the degree of
compliance with the recommended countermeasures in effect.

 Conduct of the Audit

            A security audit has for its basis the security survey and the vulnerability
assessment reports prepared during the previous period. A checklist for the
purpose ensures that all areas are covered. The following questions should also
be used:

            1. Why are we doing it?

            2. Must we do it all?

            3. If we must. Is there a better way?

            4. Is there a less expensive or more cost-effective way?

Formal and Informal Security Audit

             A formal security inspection is announcing and is communicated to the


organization or unit in advance. All documents needed are prepared beforehand.
An informal audit is the result of an entrenched and institutionalized system
understood and accepted as part of the organizational life conducted in the spirit
of cooperation and understanding.

Structured and Unstructured Audit

            A structured audit has a format or logical sequence to the process. The
unstructured audit is conducted in a random manner without any formal or logical
sequencing.

Ascertaining compliance
             The inspector should establish that the countermeasures are as they
ought to be. It is possible that the unit or people being audit do not do what is
expected of them. Deficiencies note should always be highlighted and follow
through scheduled and implemented, otherwise, vulnerabilities will persist.

Lesson Proper for Week 16


  

Definition

A private security guard is sometimes called a watchman. It is a person who


offers or renders personal service to watch or secure a residence, business
establishment or building, compound, areas or property. He is usually to
tasked/monitor bodily check / search individuals and / or baggage. He also does
other forms of security inspection physically / manually or scientifically /
electronically.

Types of Security Guard

1.       Company Guard Force – This is the security guard requited and


employed by the company. They are in the company payroll and entitled to the
same benefits received by other employees.

2.       Security Agencies Service – A security guard belonging to privately


licensed agency. Agency guards are provided on a contractual basis. The
agency supplies the number of guard needed to carry out the security and duties
and function required. This may include supervision as part of the force, or if the
force is small, supervision may be done by scheduled visits.

3.       Government Guard Forces – A security guard requited and employed by


the government. He is assigned to guard
government installation and governments assets. He is entitled benefits received
by other government employees, and under the control and supervision of civil
service commission (CSC).
ADVANTAGES DISADVANTAGES
·       High caliber and ·       may be required to join
receives higher wages guard union
·       Provides better ·       cost more
Company Guard
service
·       problem of ensuring
·       Can be trained to availability if back up
handle some of the more
complex security duties
·       Less turn over
·       More familiar with
facilities they protect
·       Tend to be more loyal
with the company
·       less expensive ·       lack of training
Agencies Guard ·       use is convenient ·       low caliber employee
·       less administrative ·       no loyalty to the
and personnel problems company
·       agency assumes full ·       projects poor image
responsibility for
·       large turnover
scheduling and
supervising of all guard ·       not familiar with
personnel facilities
·       can easily obtain
extra guard if needed
·       agency usually
accepts liability of civil
suits

General Function of a Security Guard

         The duties security guards vary depending on the category of installations,
facilities, establishments, location, social conditions and some other factors.
Nevertheless, duties assigned to guards are outlined in the installation program
which includes the following:

1.       Enforce family rules and regulations

2.       Operate and enforce the “personnel identification system”

3.       Patrol and observed designated areas, perimeter, structures, installations

4.       Take into custody a person attempting or giving unauthorized access in


restricted, limited and controlled areas

5.       Check room, building, storage rooms of security interest and after working
hours, check proper locking of doors and gates

6.       Perform escort duties when required

7.       Respond to protective alarm signals or other indications suspicious


activities and emergencies

8.        Safeguard equipment and material against sabotage, unauthorized


access, loss, theft or damage

9.        Act quickly in situations affecting the security of installation and personnel


to fire accidents, internal disorder, attempts to commit criminal acts

10.    Control and regulate vehicle and personnel traffic within the compound as
well as parking of vehicle

11.    Other duties that is necessary in the security guard’s function

Categories of Private Security Training

Pre-Licensing Training Programs - as a matter of license prerequisite, Pre-


Licensing Training Programs and curses whose objective is indoctrinating the
individual with the basic skills and educational backgrounds necessary in the
effective exercise and performance of his/her elected/would be security detective
profession.

1.       Refresher Training Programs -  this shall refer to periodic and non-periodic


training designed with the objective of and reinvigorating and / or developing
basic skills and knowledge gained previously or gained while in the exercise of
his / her profession as a matter of experience, to enhance current in-service and
future individual and / or collective of exercise profession.

2.       Specialized Training Programs -  this shall refer to training program and


courses other than those prescribed in the preceding.

3.        It includes but is not limited to such courses as the Intelligence/


Investigator Training Course, Basic Crises Management Course, Personal / VIP
Protection Course, Bank and Armored Training Course, Basic Aviation Security
Course, Mall / Commercial Establishment Course.

Powers and Duties of Security Guard

1.       Territorial Power a security guard shall watch and secure the property of
the person, firm or establishment with whom he or his agency has contract for
security services.

2.       Arrest by Security Guard a security guard or private detective is not a


police officer and is not, therefore, clothed with police authority. Nevertheless, he
may affect arrest under any of the following circumstances.

a)      When, in his presence, the person to be arrested has committed, is actually


committing or attempting to commit an offense;

b)      When an offense has just been committed and he has probable cause to
believed based on personal knowledge of facts and circumstances that the
person to be arrested has committed it; and

c)       When the person to be arrested is a prisoner who has escaped from a


penal establishment or place where he is serving final judgment or temporarily
confined when his case is pending or has escaped while being transferred from
one confinement to another (Section 6, Rule 113, Rule of Court)

3.       Method of Arrest when making an arrest, the watchman, security guard or


private detective, shall inform the person to be arrested of the intention to arrest
him and cause of the arrest, unless the person to be arrested is then engaged in
the in the committing of an offense or after an escape or flees or forcibly resists
before the person making the arrest has opportunity so to inform him or when the
giving of such information will imperil the arrest.

4.       Duty of Security Guard Making Arrest any guard making arrest shall
immediately turn over the person arrested to the nearest peace officer, police
outpost or headquarters for custody and/or appropriate action, or he may without
necessary delay and within the time prescribed in Article 125 of the Revised
Penal Code, as amended, take the person arrested to the proper Court of Law or
judge for such action as they may deem proper to take.

5.       Search without Warrant any security guard may, incident to the arrest,
search the person so arrested in the presence of at least two witnesses. He may
search employees of the person, film or

establishment with which he is or his agency has a contract of private detective,


watchman, or security services, when such search is required by the very nature
of the business of the person, firm or establishment.

6.       Duty to Assist the Law Enforces Spy security guard shall be duty bound to
assist any piece officer in the pursuit if his bounding duty, when requested,
provided it is within the territorial jurisdiction of his (security officer) area of his
duty.
Attributes of Security Guard/Private Detectives

1.       Honesty

2.       Presence of mind

3.       Moral courage

4.       Reliability and dependability

5.       Endurance

6.       Calmness

7.       Trustworthiness

8.       Ability

9.       Attitude

10.   Courtesy

11.   Discipline

12.   Interest

13.   loyalty

14.   Devotion

15.   Dedication

Desirable Qualities of Security Guard many of the qualities of the guard are
developed through training and experience. A good trait learned and used
over again and again becomes “instinctive” or habitual. Willingness to learn for
self-improvement is indeed a quality in self- much desired by any individual for
any activity. Of the many qualities the following are considered essential:

1.       Alertness – This is desirable quality of security guard at it determines his


effectiveness; it must be therefore developed by everyone desiring to become a
security guard security guard.

2.       Judgment – Sound and good judgment is more than the use of common
sense. It is the arriving at wise and timely decision.

3.       Confidence – It is the state of being sure, a state of mind free from doubt of
misgivings. This attribute includes faith in oneself and in his abilities, which is
attained by job knowledge

4.       Physical Fitness – Security guard work is tremendous and demanding. In


the protection of plant even the guard’s life may depend on his physical fitness.

5.       Tactfulness – A security guard’s ability to deal with others successfully


without offending is tactfulness.

6.       Self-Control – it is the ability to take holds oneself regardless of provoking


situations. A security guard must have sound judgment and tact, but without self-
control, he become personal and the situation will go out of hand. a security
guard should be curt and not discuss with an offender.

Desirable Qualities of Security Supervisor

                The security supervisor must win the confidence of his men in rallying
their abilities to execute the plans and programs. Qualities that tend to influence
leadership confidence are the following.

1.       Physical and Nervous Energy – it is impossible to be a supervisor unless


one possesses an adequate amount of physical and nervous energy to permit
him to take an active interest in his work.

2.       Sense of Purpose and Direction – any good supervisory leader will have in
his mind a definite purpose which he hopes to achieve; he will then direct all his
energy toward reaching the goal.

3.       Enthusiasm – no person can succeed without enthusiasm. A enthusiastic


man loves his work and enjoys performing it.

4.       Friendliness and Affection – a supervisor must have these two qualities to


successfully lead subordinates. They will follow his example and the organization
will be well on the way to success.

5.       Integrity – every leader should have this quality. Without the leader’s
integrity, the followers will most likely falter and later desert their leader.

6.       Decisiveness – a supervisor should be decisive. He should be responsible


enough to make the decision in the midst of pressure from both sides.

7.       Technical Mastery – a capable supervisor is someone who has skills and


knowledge that are necessary for his job.

8.       Intelligence – the supervisor as leader must have enough knowledge to do


his job.

9.       Teaching Skills – a leader should be able to teach his men what exactly
that he wants to be done.

10.   Faith – he must have faith with his capability. He must have faith with his
superiors and the capability of those under him.

Basis for disqualification

        Below are the situations or behavior that would disqualify an individual to
become a security guard or private detective.

1.       Dishonorable dismissal or discharge without honor from PNP. AFP,


government entity or government-owned or controlled corporation

2.       Mental incompetence

3.       Addiction to the use of narcotic drugs

4.       Habitual drunkenness

5.       Election or appointment in the government whose position maybe called


upon to enforce or implement the provision of RA 5487 as amended and the
rules and regulations of the Philippine National Police

6.       Conviction of any crime involving moral turpitude


Grounds for cancellation of Security Guard License

1.       Assisting or protecting criminals during, on or off duty status;

2.       Providing confidential information to unauthorized person;

3.       Posted security guard found drunk or drinking intoxicating liquor; and

4.       Other similar acts;

Private Security Agency Law (RA 5487 as amended)

Below are the specific amended provisions of Republic Act No. 5487 as
amended

A. Organization

·       Section 4 (as amended). Who may organize a Security or Watchman


Agency?

Qualifications of agency operator:

-       Filipino citizens or corporation with 100% Filipino Capital

-       At least 25 years of age

-       College graduate and / or a commissioned officer of the AFP in the inactive


service

-       Of good moral character

 Disqualifications:

-       With record of conviction of any crime involving moral turpitude

-       Dishonorably discharged or separated from the AFP

-       Mentally competent

-       Drug addict

-       Habitual drunkard and alcoholic

-       Elective or appointive government employees

-       Dummy of any foreigner

·       Section 16 (as amended). Limitations and prohibitions

Organization Structure of Private Security Agency / Company Security Services,


Government Security Unit

-       Initial requirements of 100 guards shall be contracted during the first year of
operation

-       The 200 guard’s minimum requirements shall be complied in the


succeeding year of operation

-       Company security forces shall substantially conform with the structure


prescribed for private security agencies
-       Government Security Unit shall be organized to conform with the
organization structure as prescribed for government security units

·       Main/branch Offices of PSAs

-       Branch officers to be established and maintained in other provinces and


cities where at least a minimum of 10 guards are employed during the first year

-       Branch officers to be registered with Regional PADPAO and Regional


PROs

A.      Management

·       Licenses Required for Security Personnel (RA 5487, Sections 4 & 5 as a


amended and implemented in Sections 1,2,3 of Rule II and NIRR)

Private Security/Detective Agency

-       License to operate by the Civil Security Group, PNP (section6, 7 & 9, RA


5487),

-       Registration with the Security and Exchange Commissions (SEC)

-       Registration with the bureau of Documents and Department of Trade and


Industry (DTI)

-       Mayor’s permit from the local government where the agency is operating or
having business

-       Barangay permit

Private Security Consultants, Managers/ Operators, Security Officers, Private


Detectives and Private Security Guards

-       License to Exercise Profession by PNP SOSIA, Civil Security Group, PNP

-       Appropriate Mandatory clearances

Mandatory Requirements for Private Security/ Detective Agencies

-       Business Office

-       Firearms Vault

-       Organizational Chart, to be displayed openly in the office

-       PNP Civil Security Group/SOSIA license to operate, to be displayed openly


displayed in the office

-       Business permit from the local government, to be displayed openly in the


office

-       Filling cabinets

-       Minimum of a least 30 new firearms for temporary license / 70 firearms for


regular licensee

-       List of a minimum of 200 and a maximum of 1000 posted guards

-       SSS membership certificate

-       Surety bond
-       Submission of periodic reports to PNP SOSIA

Uniform, Equipment and Paraphernalia

-       Uniform for male guards (Section 14, RA 5487 and Section 1, Rule VI,
NIRR)

-       Uniform for female guards (Section 14, RA 5487 and Section 2, Rule VI,
NIRR)

-       Ornaments and Patches (Section 3, Rule VI, NIRR)

-       Special Set of Uniform (Section 4, Rule VI, NIRR)

Basic Equipment

The following should comprise of the Basic Equipment of a security guard:

-       Prescribed basic uniform

-       Nightstick/baton

-       Timepiece (synchronized)

-       Writing pen

-       Notebook and duty checklist (electronic or not)

-       Flashlight

-       First aid kit

-       Service Firearms (as require)

Other Equipment

Apart from the mandatory basic equipment, other equipment may be used by the
security guard as deemed necessary, following client contract requirement, and
provided the security guard shall have acquired the prior training/knowledge on
the proper use of the same but not limited to the following:

-       Handcuffs

-       Metal detectors

-       Communication radios

-       Stun devices

-       Armor vest

-       Canine

Electronic and / or communication devices requiring registration under the


jurisdiction of other government agencies shall be complied with prior to issuance
for use of the security guard.
Live units such as k-9 (dogs) shall require prior training confirmation and
registration with the PNP before utilization by any security agency purposely to
ensure truthful deployment versus client requirement or purpose of operation.

B.      Operations

·       Supervisory powers of the Philippines National Police (Section 11, RA 5487


as amended by RA 6975)

·       Emergency powers of the Chief PNP over private security / detective


agencies (Sec. 11, RA 5487).

In case of emergency as in time of disaster or calamities, the chief PNP may


deputize any private detective, watchman or security guard as herein defined to
assist the PNP in the performance of public duties for the duration of such
emergency or calamity.

·       Emergency powers of city or Municipal mayors over the private security /


detective agency (Section 12, RA 5487).

In case of emergency or in times disaster which the need for the services of such
agencies arise, the city / municipal mayor as Director of Civil Defense, may
master or incorporate the services of the agency near the area where the
emergency, disaster, or calamity arises.

Duties of Security Personnel in Case of Impending Strikes in Relation to


the Use of Firearms (Section 7, Rule V, NIRR).

-       To report to the chief PNP or to the nearest police agency such impending
strike;

-       To exercise diligence in the collection and safekeeping of firearm safety


vaults provided thereof in the furtherance of the strike;

-       To ensure that all firearms and ammunition in the possessions of all striking
security personnel of the agency are immediately collected and secured in the
safety vaults under the control of the agency; and

-       To assume responsibility in the proper handling og firearms in order to


prevent misuse of the same or that no non-member shall be allowed to hold said
firearms issued or licensed in favor of the agency.

Limitation and Prohibitions

·       Limitations Private security agencies shall not deploy / post more than one
thousand security guards to include its branches (Section I, rule XII, NIRR and
section 16 of RA 5487 as amended by section 8 of PD 100 and further by PD
1919)

·       No person shall organize / operate or have interest in more than one
security agency in any one city or municipality (Section 2, Rule XII, NIRR and
Section 4, RA 5487).

Lesson Proper for Week 17


Private Security Agencies
Private Security Agency’s Creed

“As a security agency proprietor, my fundamental duty is to serve the interest of


my clientele and security guard; protect the interest of the government, adhere
professionally in the conduct of my business without prejudices and
compromises to human rights, and uphold constantly the law and abide by the
rules and regulations set by the government in the conduct of my business”

Ethical Standards for Private Security Agencies

As a licensed private security agency, it shall be its prime concern to share with
other licensed agencies and company security forces the burden of responsibility
in upholding the integrity trust of the private security profession at all times. In
discharging this responsibility, its official shall

1.       Endeavor to fulfill their professional duties in accordance with the highest


moral principles, always conforming to the precepts of truth fairness of justice

2.       Contribute to the national welfare by securing and preserving industrial


facilities of the country through competent guarding services

3.       Promote the well-being of security guard through adequate wages and


other emoluments

4.       With faith and diligence, perform their contractual obligations for the
protection of life, limb and property

5.       Constantly endeavor to raise quality standards of private security services

6.       Continuously work with and assist the law enforcement agencies in the
preservation of peace and order in the country

Code of Conduct for Private Security Agencies

1.       They shall at all times adhere to the professional ethics and refrain from
practices that negate the best interest of the private security services industry

2.       They shall always consider that unity in the profession is vital and
paramount for the attainment of common objectives

3.       They shall not use deceitful means and/or misrepresentation in all their
business transactions. To this end, they shall avoid granting of rebates, or
commissions incurring guarding contracts

4.       They shall not indulge in cut-throat competition by undercutting the existing


contract rates between PSA and the client and/or the minimum contract rate
prescribed under PADPAO Memorandum Agreement in conformity With existing
minimum wage laws.

5.       They shall pay their guards in accordance with rates fixed by law. They
shall not impose any unauthorized deductions on the gurus to seek employment
elsewhere as they choose, subject to existing laws, nor accept a guard without
clearance from the losing agency

6.       When a prospective client with existing company security force call/bids for
additional security guard, all bidding security agencies shall observe the principle
of “equal pay for equal work” considering the rate of pay of the company security
service their own guards
7.       Anchored on the principle of securing property, of providing safety of
persons and maintaining peace and order within such property, when accepting
contract with clients having existing client of claims, management, ownership or
administration of properties and/or establishments where there exist or
forthcoming another contracted/contracting agency, they should conduct
themselves and their deployed guard in a manner primarily not to be used
against each other at the same time without compromising their respective
contracts.

8.       They shall endeavor to raise the standard of service in the security


profession thru incentive and in-service training

9.       They shall establish an adequate library of books, magazines and other


publications on security subject, materials, references, etc, in each PSA

10.   They shall always be truthful and accurate in reports required by SAGSD


and/or other competent authorities and be prompt in the submission of the same

11.   They shall not, under any circumstances, employ for guard duty any person
without a professional license as a security duly issued by the chief, PNP

12.   They shall at all times exercise vigilance and be prepared to prevent the use
of their guards or the agency in activities inimical to the state or national security.
When activities of this nature come to their attention, they shall as a matter of
duty render an appropriate report to the PNP authorities

Security Guards

Security Guard’s Creed

“As a security guard, my fundamental duty is to protect lives and properties and
maintain the vicinity/my place of duty, protect the interest of my employer and our
clients and the security and stability of our government and country without
compromise and prejudice, honest in my action, words and thought, and do my
best to uphold the principle “MAKADIYOS, MAKABAYAN, MAKATAO at
MAKAKALIKASAN”

The 11 General Orders for Security Guards

All security personnel shall memorize and strictly observe the following general
orders:

1.       To take charge of the post and all company properties in view, and
protect / preserve the same with utmost diligence

2.       To walk in a military manner during tour of duty and keeping always on the
alert, observing everything that takes place within sight or hearing

3.       To report all the violations regulations and order I am instructed to enforce

4.       To relay all call from post more distant from the security house where I am
stationed.

5.       To quit my post only when properly relived

6.       To received, obey and pass on to relieving guard all orders from company
officers or official, supervisors, post-in—charge or shift leader

7.       To talk to no one except in line in duty


8.       To sound the alarm or call in case of fire or disorder

9.       To call the superior officer in any case not covered by instructions

10.   To salute all company officials, superiors in the agency, ranking public
official, commissioned officers of the Armed Forces of the Philippines and
commissioned officers of the Philippines National Police

11.   To be especially watchful at night and during the time of challenging all
persons on or near my post, and to allow no one to pass without proper authority

Code of Ethics for Security Guards

1.       As security agent, his fundamental duty is to serve the interest or mission
of his agency in compliance with the contract entered into with the clients or
customers of the agency.

2.       He shall be honest in thoughts and deed both in his personal and official
actuations, obeying the laws of the land and the regulations prescribed by his
agency and those established by the company he I supposed to protect.

3.       He shall not reveal any confidential matter that is confided to him as a
security guard and such other matters imposed upon him by law

4.       He shall act at all times with decorum and shall not permit personal
feelings, prejudices and undue friendship to influence his actuation in the
performance of his official functions.

5.       He shall not compromise with criminal and other lawless elements to the
prejudices of the customer of the customer of his client but to assist the
government in its relentless drive against lawlessness and other forms of
criminality.

6.       He must carry his assigned duties as security guard or watchman as


required by law to the best of his ability and to safeguard life and property of the
establishment.

7.       He shall wear his uniform, badge, patches and insignia properly as a
symbol of public trust and confidence as an honest and trustworthy security
personnel and private detective.

8.       He must keep his allegiance first to the government, to the agency he is
employed and to the establishment he is assigned to serve with loyalty and
dedicated service.

9.       He shall diligently and progressively familiarize himself with the rules and
regulations laid down by his agency and that of the customers and clients.

10.   He shall at times be courteous and respectful; and he shall salute to his
superior officers, government officials and company6 officials of the
establishment where he is assigned or the company he is supposed to serve.

11.   He shall report to his duty always in proper uniform and neat in appearance.

12.   He shall learn at hear or memorize, and strictly observe the laws and
regulations governing the use of firearms.

Code of Conduct for Security Guards

1.       He shall carry with him at all times during his tour of duty is license and
identification card and duty detail order with an authority to carry firearms.
2.       He shall not use his licenses and other privileges, if any to the prejudice of
the public, the client, the customer or his agency.

3.       He shall not engage in any unnecessary conversation with anybody except
in discharge of his duties; or sit down unless required by nature of his work, and
shall at times keep himself alert during his tour of duty.

4.       He shall refrain from reading newspapers, magazine, books etc. while
actually performing his duties.

5.       He shall not drink any intoxicating liquor immediately before and during his
tour of duty.

6.       He shall know how to operate any fire extinguisher at his post.

7.       He shall know the location of fire alarm box near his post and sound the
alarm in case of fire or disorders.

8.       He shall know the location of the telephone and/or telephone numbers of
the police precincts as well as the telephone numbers of the fire stations in
locality.

9.       He shall immediately notify the police in case of any sign of disorder,
strike, and riot or any serious violations of the law.

10.   .he or his group of guards shall not participate or integrate with any disorder,
strike, riot or any serious violations of the law.

11.   He shall assist the police in the preservation and maintenance of peace and
order an in the protection of life and property, having in mind that the nature of
his responsibilities is similar to that of that of the latter.

12.   He shall familiarize himself by heart with the Private Security Agency Law
(RA 5487 as amended) and its implementing rules and regulations.

13.   When issued a firearm, he should not tend his firearm to anybody.

14.   He shall always be in proper uniform and shall always carry with him his
basic requirements and equipment such as writing notebook, ball pen, nightstick
(baton) and/or radio.

Any private security agency operator or guard who violates the creeds, ethical
standards and codes as set forth in the preceding sections, shall be subject to
the penalties provided in the IRR of RA 5487.

GUARD FORCE ADMINISTRATION

The success of a security officer rests heavily on his keen knowledge in his units,
strengths and weakness, as well as his role and functions as an administrator,
supervisor or manager. It is important that he is aware of his functions in general
and the responsibilities attached to each. Hence, it is critical that the security
administrator realizes that he has two specific purposes of existence:

     1. The accomplishment of the mission, and

     2. Looking for the welfare of his men.

 To accomplish these role and responsibilities, his job is divided into four
(4) functional areas:

     1. Leadership and Command


2.  Operations

3. Administration

4. Technical Services

Leadership and Command

Effective leadership is demonstrated by one’s ability to command respect and


confidence of his men. The indications are: morale discipline, esprit d’ corps,
proficiency and effective unit.

Leadership is developed by the ability of a person to influence others in such a


way to obtain their loyalty, cooperation and willing obedience in order to
accomplish the goal. Leadership and command involve the planning, leading
organizing, and controlling the manpower and resources, making things happen
through other people.

Leadership defined as an art of influencing and directing men in such a way as to


obtain their willing obedience, confidence, respect, and loyal cooperation in order
to accomplish the mission.

Leadership: the Concept

Leadership is ART and being so; it can be learned, acquired and developed as
any other arts or activities. In the definite sense, leadership is based upon the
development of traits of the individual personality and upon the understanding
and application of sound leadership principles and techniques.

A leader in a private security organization could be the supervisor of the


commander. He therefore, expected to possess inherent authority to meet his
diverse responsibilities. In practice, his authority may be delegated in pursuance
of tasks but never his responsibilities.

Goal of a Leader

There are two main purposes why a leader exists:

1. To accomplish the mission, and

2. To look for the welfare of his men

Types of Leadership
1. Authoritative/Dogmatic. A type of leader who gains obedience by asserting
authority and authority and superiority, or by  instilling fear or punishment.

2. Persuasive/Considerate. A type of leader who attains obedience or leads by


compassion and persuasion, and considers the “human factor”.

Leadership Traits

The following are the qualities that leader should possess in in order win the
willing obedience, confidence, respect and loyal cooperation of his men toward
the accomplishment of his goals.

1. Integrity - The uprightness of character, soundness of moral principles and


truthfulness.

2. Knowledge – Acquired facts and skills of the job.


3. Courage –This is the mental control of fear. Acting calmly and decidedly in
stressful situations. Standing up for what is right regardless of opposition of
others. He accepts personal responsibility for mistakes and does spot correction
of men who need correcting, anywhere.

4. Initiative – He sees what needs to be done and doing it even in the absence of
direction from superiors.

5. Decisiveness – He has the ability to make a sound and timely decision.


Studying the alternatives and carefully selecting the best course of action when
time and circumstances permit. He announces decisions authoritatively,
concisely and clearly.

6. Tact – He has the ability to deal with subordinates and superiors in an


appropriate manner. Speaking to others with the same kind of respect he expects
from others.

7. Justice – He gives every man his due by being equal, impartial and consistent
in application of rewards and punishments. He listens to all sides of the issue
before making a decision.

8. Dependability – He performs his duty loyalty. Being at places he expected to


be at certain time. He is a man of his word. He does what promised to do and
promptly on time.

9. Bearing – He knows how to carry himself setting high standards of appearance


and conduct. He avoids excessive profanity , controls voice and gestures so that
extremes of emotions do not show in actions. He avoids mannerisms.

10. Endurance – It is a mental and physical stamina even under extreme


pressure.

11. Enthusiasm- He has intense interest in the task at hand. He never complains
in front of his men about “they ‘or the system.

12. Loyalty – This is the quality of faithfulness to the organization, superior,


subordinates and associates. Passing on and carrying out tough orders of
superiors, without expressing personal criticism. He defends his men against
unfair treatment.

13. Unselfishness -   This quality ensures that the needs of his men are met
before attending to his own needs. He shares the hardship, danger, and
discomfort of his men.

14. Judgment – This is the ability to logically weigh facts and possible solutions
on which to base sound decisions. He considers are possible consequence of his
decision.

Leadership Principles

Below are the fundamentals guidelines for the selection of appropriate action and
orders in the proper exercise of authority.

1. Know oneself and seek self-improvement.

2. Be technically and tactically proficient.

3.Seek responsibility and take responsibility for actions.

4. Make sound and timely decisions.


5. Set the example.

6. Be acquainted with subordinates and look after their welfare.

7.Make a certain that the subordinates are properly informed of the situation.

8.Develop a sense of responsibility in subordinates.

9.Ensure that the task is clearly understood, supervised, and accomplish.

10. Train staff to work as a team.

11. Employ men in accordance with their capabilities.

Leadership Indicators

1. Morale – The state of mind of an individual with respect to his confidence,


cheerfulness, discipline, ect.

2. Discipline – The state of order based upon submission to rules and authority.

3. Esprit d’ Corps – Loyalty to, pride in, and enthusiasm for the unit/organization
displayed by its members.

4. Proficiency – The physical, technical and tactical ability of the individual.

5. Effective Unit - The one that accomplishes assigned mission, for which it was
equipped, trained and organized in the shortest possible time, with the least
expenditure of resources and least confusion.

Operations

This has direct impact on the mission of the security unit normally affecting life,
property and proprietary rights. Under this function, the security officer performs
the following:

1. The deployment of men and resources consistent with threat and need of the
organization.

2. Defining the basic role and functions of the individuals in the total organization,
his unit and on post assignment.

3. Conduct of patrols, search, apprehension and recovery.

4. Provide VIP security and related protective services

5. Enforce rules and regulations

6.  Control persons, vehicles and property.

You might also like