Industrial Security Management

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 25

OBE-Based

Fundamentals to
Industrial Security
A Course Module for Students

Burauen Community College

For Internal Use Only


i

Fundamentals to Industrial Security


A Course Module for Students

Burauen Community College

Written and Designed by


Ronalee R. Pedere
Burauen, Leyte

ii
BCC VISION
Burauen Community College shall emerge as the
premier local public educational institution in
Eastern Visayas which is responsive to the needs of
the community, and develops students to meet the
economic, social, and environmental challenges as
active participants in shaping the world of the
future.

BCC MISSION
Burauen Community College offers holistic and
outcomes-based experiential learning to develop
the youth to be responsible individuals with
integrity and service as agents of equality. It will
serve as a venue for the development of individuals
in the areas of academics, research, community
extension, and innovative technology.

iii
Fundamentals to Industrial Security

Burauen Community College

Printed in Burauen, Leyte

© 2021

ALL RIGHTS RESERVED. No part of this publication All rights are


reserved. No part of this publication may be reproduced, stored in a
retrieval system or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording or otherwise, without
prior permission of the institution.

This module contains information obtained from highly regarded


resources. A wide variety of references are listed. Reasonable efforts
have been made to publish reliable data and information, but the
institution cannot assume responsibility for the legality of all materials
or the consequences of their use. The institution has attempted to
trace the copyright holders of all material in this module and express
regret to copyright holders if permission to publish has not been
obtained. If any copyright material has not been acknowledged, let us
know so we may rectify in any future reprint. Registered trademark of
For students who want to purchase additional copies of this module, you may
products or corporate names are used only for explanation and
send your request to [email protected] or you may visit the institution
identification without intent to in-person
for an infringe.request.

iv
TABLE OF CONTENTS

Vision and Mission iii


Table of Contents v
Preface vi
PRELIM

Module FUNDAMENTALS OF SECURITY 2


1

Unit 1 Security 4
1.1 Concept of Security 5

1.2 Categories of Security 6


Unit 2 History of Security 8
2.1 Historical Roots of Security 8
Unit 3 Legal Context of Security 11
3.1 The 1987 Constitution of the Philippines 11
3.2 The Revised Penal Code 13
Learning Activities 16
References 20

v
Preface

To become protected and unthreatened well-beings is something


that everyone aspires. We all want the safety of our family and loved
ones, as well as our workplace, property, organization and even the
country. Therefore, criminology students can apply this by knowing the
basic steps in the course Fundamentals to Industrial Security. This
course discusses about the series of the security activities that protect
resources and minimizes risk and loss to prevent leakage of key
technologies and confidential information at the enterprise level and
affect the national problems as well. Also, this course provides insights
and comprehensive coverage of the role, resources, and skills that are
central to providing effective security management.

Fundamentals to Industrial Security provides the overview of


the development of security industry. It includes various concepts and
principles of security. It presents security organization, management,
administration and operation of private security agency, corporate and
government security unit; qualifications, trainings, skills or
competencies development in industrial security, technology-led
security operations, crime prevention, safety, investigation and
detective skills, crime scene preservation, and report writing.

At the end of the course module, the student’s knowledge and


understanding of the Fundamentals to Industrial Security and their
ability to use this data to their professional context will be measured
by identifying the following statements related to Physical Security,
Personal Security, and Document and Information Security. The
students will be required to create a methodical, systematic and
thorough risk analysis and security survey report of a certain
establishment, specifically a Local Government institution.
PRELIM:Fundame
ntals to Industrial
Security
1
Fundamentals of Industrial
Security

CONTENTS the historical roots of security during the


prehistoric times, the ancient period, the
UNIT I Middle Ages, and the evolution of security
Security in England and the United States.
UNIT II 4. The students will be able to review and 4.
History of examine the history of security in the
security Philippines setting and current issues in
UNIT III security, and to interpret the right to
Legal context security of person guaranteed by the
of security United Nations.
5. The students will be able to examine the
OUTCOMES provisions in the Philippine Constitution
LO1. Define and that guarantee the right to security and to
discuss the outline the laws relevant to security
fundamentals of management.
security through
concept map.

OBJECTIVES
1. The
students will be
able to define the
security and the
concepts of asset,
risk, threat, and
vulnerability.
2. The
students will be
able to outline the
categories of
security and to
review the
importance of
private security in
organizations.
3. The students will
be able to trace

2 Pedere‖ Fundamentals to Industrial Security


According to structure’s relationship – be it
Bobier (2016), vulnerability, insulation, or protection – to
security is threats in its environment. Generally,
important to security is important to individuals such as
everyone. a homeowner who wants to protect
However, we valuable items in his house, a parent who
need to does not want her child to be harmed
understand first while in school, an employee who wants
the concept of to save for a comfortable retirement, or
security. What an online shopper who wants to purchase
does it mean to a gadget via internet. Moreover, it is also
be secure? How important to private companies such as
does it affect the jewellery store that keeps diamonds in
everyday lives of storage, a law firms that holds
people? From a incriminating evidence against a drug lord,
general or an internet company that requires
perspective, personal information and passwords from
security its users. Of course, it is also very
suggests the important to governments that maintain
degree of military forces, use intelligence services,
protection legislate civil defense policies, and
against any form implement emergency preparedness
of danger or measures to serve and protect its citizens
loss. From an
objective
perspective, it is
a structure’s
actual degree of
resistance to
harm. It derives
from the

3 Pedere‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

UNIT I: processes that provide or improve security


as a condition.
SECURITY Security, therefore, is a vital issue – a
concern that needs to be taken with careful
What is consideration. There is need to identify
Security? ideas, techniques, and issues that are at the
The word heart of professional security management
secure is derived today.
from the Latin’
’secures’’ which The Institute for Security and Open
means “safe” or Methodologies (ISECOM) is an open
“without care” or community and non-profit organization that
from se cure, published in 2001 the Open-Source Security
wherein means Testing Methodology Manual (OSSTMM), a
“free from” and peer-reviewed manual of security testing and
cura means “care”. analysis. OSSTMM 3 was released in 2010,
To be secure could defining security with the following
mean many explanation:
different things. It “For a threat to be effective, it must
could mean being interact either directly or indirectly with the
free from danger, asset. To separate the threat from the asset
risk, injury, fear, is to avoid a possible interaction. Therefore,
trouble, doubt or it is possible to have total (100%) security if
anxiety. Being the threat and the asset are completely
secure could also separated from each other. Otherwise, what
refer to being you have is safety of the asset which is
dependable, provided by the controls you put on the asset
strong, good, or the degree to which you lessen the impact
impregnable or of the threat.
inviolable. Or For example, to be secure from
simply, it could lightning, one must move to where lightning
mean having peace can’t reach such as deep in the mountain.
of mind. Threats which can’t be separated from the
Security can assets must be made safer so that their
be defined as the interactions and any effects from interactions
degree of do little or no harm. In this example, to be
protection or safe from lightning, one must stay indoors
resistance against during storms, avoid windows or other
harm, danger, loss, opening, and use lightning rods on the roof.
and criminals. As a Therefore, under the context of operational
form of protection, security, we call security the separation of an
it includes asset and a threat and safety the control of a
structures and threat or its effects” (Bobier, 2016).

4 Pedere ‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

Threat and vulnerability are


1.1 Concepts of sometimes interchangeably used with risk, a
Security threat is anything that could adversely affect
assets; it can be classified into natural
Understandin hazards such as floods, accidents like
g the concept of chemical spills, or intentional acts like
security requires domestic and international terrorism. On the
further definition of other hand, vulnerability means weakness,
other related flaw, or virtually anything that may
concepts such as conceivably be exploited by a threat. For
asset, risk, threat, example, holes in a fence, an out-of-date key
vulnerability, system, or the introduction of a computer
defense of depth, virus (Bobier, 2016).
target hardening, Meanwhile, the defense in depth is an
countermeasure, approach to security in which a series of
and mitigation. defensive mechanisms are layered to protect
An asset is the asset. The concept is that, of one
anything tangible defense mechanism fails, other steps up; to
or intangible that is immediately impede an attack or
capable of being unauthorized intrusion. However, target
owned or controlled hardening is more focused on strengthening
to produce value. If the security of the building or installation in
it has positive order to protect it in the event of attack or
economic value, it reduce the risk.
is considered an Similarly, countermeasure is a way to
asset. Or more if stop a threat from triggering a risk event.
its value can be Also, mitigation is means of reducing the risk
converted into loss from the occurrence of any undesirable
cash, it is an asset. event. A mitigation action is a specific action,
While, risk is project, activity, or process taken to reduce
the uncertainty of or eliminate long-term risk to people and
financial loss, the property from hazar5ds and their impacts
probability that a (Manwong & Domingo, 2020).
loss has occurred
or will occur, the
variations between
actual and
expected results,
or the possible
occurrence of an
undesirable event.
The result of risk is
loss or a decrease
in value.

5 Pedere ‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

1.2 Categories of protect them from espionage, sabotage,


Security damage, or theft.
It was 2.Personnel Security – refers to the
discussed by Bobier procedure followed, inquiries conducted, and
(2016), that the criteria applied to determine the work
concept of security suitability of a particular applicant or the
is so wide that retention of a particular employee. It also
categorization is involves the background check of individual
necessary for commensurate within the security
better requirements.
understanding and
analysis. The three 3. Document and Information Security –
main categories refers to policies, regulations, doctrines, and
covered in this practices enforced to safeguard the contents
module include and integrity of any classified information or
(the three main document from compromise or loss. This
categories includes the protection of documents,
enumerated below classified matters and vital records from loss,
will be discussed access to unauthorized persons, damage,
more lengthily in theft, and compromise through proper
the midterm period storage and procedures.
of the module):
On the other hand, Political security is
1.Physical another category that relate to social
Security – relationships involving government or
pertains to all entities that hold authority or power. This
physical barriers includes issues of security in the public,
employed or national or international level, as
installed to secure enumerated below.
assets. The
broadest type of a. Public safety refers to the way
security that is governments are ensuring the protection of
concerned with the its citizens, organizations, and institutions
physical measures against threats to their well-being, as well as
designed to maintaining the general security and peace
safeguard in public places. This includes security
personnel and against problems that have direct impact on
prevent people’s lives, such as gang violence,
unauthorized cybercrime, or trafficking of illegal drugs and
access to firearms.
equipment, b. National security is the requirement to
facilities, materials, maintain the survival of a state using
documents and to economic power, diplomacy, and political
power. Security threats include military foes

6 Pedere ‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

from other nations, application of various measures which


big drug cartels, or safeguards cash and assets in storage, in
even national transit, or during transaction.
disasters that 3. Hotel security involves using various
cause severe measures of protection for the guests,
environmental personnel properties and functions in hotels,
damage. restaurants, bars and clubs.
3. International 4. V.I.P security involves the protection of
security consists top-ranking officials of the government,
of the measures visiting persons of illustrious standing and
taken by nations foreign dignitaries.
and international 5. Operational security involves the
organization to protection of processes, formula, patents and
ensure mutual industrial and manufacturing activities from
survival and safety. espionage, infiltration, loss, compromise or
Examples of infringement.
measures are 6. Communication security involves the
military actions and safeguard resulting from the application of
diplomatic different measures which prevent or delay
agreements. the enemy or unauthorized person from
gaining information through communication
Meanwhile, security including transmission or cryptographic.
can be even further 7. Mall/ commercial security is the degree of
categorized in the protection against danger, loss, and crime
private sphere, as inside malls. As a form of protection, it refers
shown below. to system, structures and processes that
provide or improve mall security as a
1. Industrial condition
security is a form
of physical security Security Management in Organizations
involving industrial Security management has become an
plants and business essential feature of corporate activity; there
enterprises. This is almost no organization without a team
involves the dedicated to managing issues of security. We
safeguarding of usually see shopping malls, entertainment
personnel, venues and banks policed by private armies
processes, which we call ‘security guards. The presence
properties, and of these uniformed staff represents the
operations. company’s ability to respond to or deter
2. Bank and threats. This, however, is only part of the
armour security security measures employed by companies
involves the against threats posed by opportunistic
protection resulting criminals, its rival organizations, or even its
from the own saboteur employees. Other security

7 Pedere ‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

measures may even those like street crimes such as thieves


include the sneaking inside offices.
installation of With corporate crime becoming a
CCTVs, growing area of concern, the increasing role
sophisticated alarm of private security in crime prevention is
systems, policies becoming more evident. This further
against workplace highlights the need for increased competence
bullying and and professionalism among security
harassment, personnel so that they can effectively play
employee their important role of risk prevention and
screening, management in the organization. This new
emergency breed of uniformed individuals who are
planning, and other armed with education and training, equipped
measures that with reliable and highly technical gadgets,
enable individuals and well-informed with their moral and
and organizations ethical obligations has now taken over the
to carry on with business of ensuring the security of the most
their business free important assets of organizations (Bobier,
from danger. 2016).
Indeed,
security has a UNIT II: HISTORY
policing function in
organizations. In 2.1 Historical Roots of Security
fact, illegal In the ancient world, human learned
practices in the to unite into clans, then into tribes and later
workplace have into bigger communities with their primary
become an reason of securing their lives, and
established theme livelihoods. Humans that time were only
in criminology worried of natural causes of danger and
studies. These other tribes competing for survival. Ancient
crimes involve not tribesmen’s earliest form of security is
only the robberies assigning all their able-bodied males of the
and shootouts tribe to guard their crops and their territory
inside malls or against animal’s attack. They used variety of
kidnappings in means to protect themselves such as
schools that we weapons out of wood, stones and then later
hear in the news. It those made of metals, traps, or devices
involves high- design to catch animals, and barriers like
stakes corporate wooden fences, natural barriers like river and
crimes such as tax cliff. Meanwhile, the historical roots of
evasion and money private security agencies can be traced back
laundering, fraud, to thousands of years when the protection of
bribery, workplace life and personnel property were up to the
harassment, or individual, and later passed to tribes, and

8 Pedere ‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

then to cities. In selected men called shires or sheriff to look


pre-historic times, after the peace and order of the different
man recognized the regions. The greatest influence in the history
need to keep of security came from England. In 1655,
himself safe from Oliver Cromwell set up in England and Wales
both known and a police force that operated to capture and
unknown enemies punish criminals. In 1748, London magistrate
such as animals, Henry Fielding introduced the concept of
other inhabitants, crime prevention by organizing citizen
and the patrols or watchmen that not only chase
environment itself. criminal for felony and misdemeanor but also
He used different served Fielding’s purpose of preventing crime
methods to keep ahead of time with their patrolling function.
himself safe such Fifty years have passed, English Home
as crafting Secretary Sir Robert Peel formed the first
weapons out of formal police department.
stone and metal, During the colonial period in the
building fire to United States, immigrants from England,
ward off animals, Ireland, and Scotland came to America
staying in caves or shores bringing with them this British
tree houses, and approach to policing. At the time, law
even staying in the enforcement officers had to deal with
middle of the lake rampant crime in U.S cities and had little
for protection. The time and resources left to deal with the
Greeks of the protection of private property. Hence, citizen
ancient period were who wanted protection for their private
the ones who properties had depend on the armed
organized the first immigrants who were prepared to deal with
police force in city criminal. This watchman form of security was
states which they to become the early version of private
termed polis. The security practices that endure to this day
Romans, on the (Bobier, 2016).
other hand, Security in the Philippines History
established the During the pre-colonial period in the
Praetorian Guards Philippines, the sovereign monarchs called
known as vigils datu or lakan had servants called aliping
who were tasked to mamamahay who acted as their watchman
be fire fighters. In or protector.
the Middle Ages The Spanish colonial government
during their introduced the Guardia Civil in the Philippines
invasion in in 1868 to serve as the police force based on
England, the the Civil Guard of Spain. They performed
French formed a patrol functions in cities, and in towns,
group of carefully organized operation for the suppression of

9 Pedere ‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

bandit groups, and protection of property and assets (Bobier,


imposed penalties 2016).
for infringement of Security in the Present Time History
laws and local shows how public law enforcement and
ordinances. private security evolved from the same roots
The constable but eventually took different directions. The
of the American police served the public’s interest while the
colonial period in security force served private interest. As
the Philippines crime became a bigger problem especially in
became the urban areas, police departments who
forebear of the previously looked down at private security
present national are now starting to see the benefits of
police. During that building a partnership with them. Now, police
time, a couple of functions that did not involve enforcement,
constable officers arrest or the use of force inside workspaces
were adequate to are turned over to security. Traffic control
maintain the peace around large commercials properties and
and order in the patrol functions around private
town or sitio. neighborhoods are also now often provided
After World by security officers.
War II, the Indian With the advent of terrorism in
national or the countries around the globe, it becomes more
Bombay pioneered important to build a strong partnership
as the watchman between the police who respond to terrorist
who protected a acts and security officers who respond on the
specific building or private premises that they protect. This
commercial collaboration should also involve leaders and
establishment. enforcers in other fields such as firefighting,
Today, disaster management, emergency medical
private security has treatment and public health. This, of course,
a major role in the entails a strong support and commitment
preservation and from the national government.
protection of peace Fast-paced technology, especially in
and order in the the field of computer and information is
country. It another issue affecting the security industry.
complements police Although such technology has become very
efforts by providing helpful in the security officer’s work, it also
additional security has the negative effect of replacing people.
during emergency Just as human labor has been displaced by
responses and machines in other industries, it also affects
public events as individual security personnel who might
well as safety become obsolete in the face of computer
precaution and assisted technologies.

10 Pedere ‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

With the protect in Article 3, which states that


combination of “Everyone has the right to life, liberty and
rising technology security of person”. The United Nation
and the security Human Rights mention The International
industry’s rapid Covenant on Civil and Political Rights, a
growth and multilateral treaty also adopted by the United
recognition in Nations on 16 December 1966, further
organization comes recognizes this right to security of person in
the necessary Article 9 (1) which states that: “Everyone
improvement in the has the right to liberty and security of
professionalism person. No one shall be subjected to
among security arbitrary arrest or detention. No one shall be
officers (Manlusoc, deprived of his liberty except on such
2018). grounds and in accordance with such
procedure as are established by law” (Caday,
2016).
UNIT III: LEGAL
CONTEXT OF
SECURITY
Man,
instinctively 3.1 The 1987 Constitution of the
protects himself Republic of the Philippines
and those he holds The 1987 Constitution lays the
dear from danger foundation that protects the Filipino citizen’s
or threat, with or right to security. Relevant sections of the
without help from constitution are cited here to demonstrate
others. This is specific provisions that guarantee this right.
supreme law – the Section 4, Article II. The prime duty
law of self- of the Government is to serve and protect
preservation. the people. The Government may call upon
the people to defend the Sate and, in the
Universal fulfilment thereof, all citizens may be
Declaration of required, under conditions provided by law,
Human Rights to render personal military or civil service.
The This section provides that all qualified
Universal citizens of the state including security
Declaration of personnel, may be required by law to render
Human Rights, personal military or civil service. The right of
which was adopted the government to require compulsory
by the United military service is a consequence of its duty
Nation on to defend the state and is reciprocal with its
December 10, duty to defend the life, liberty and property
1948, guarantees of the citizen (People vs. Lagman 66 Phil 13
such instinct to 1938).

11 Pedere ‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

Section 1, houses, papers, and effects against


Article III. No unreasonable searches and seizures of
person shall be whatever nature and for any purpose shall
deprived of life, be inviolable, and no search warrant or
liberty, or property warrant of arrest shall issue except upon
without due probable cause to be determined personally
process of law, nor by the judge after examination under oath or
shall any person be affirmation of the complainant and the
denied the equal witness he may produce, and particularly
protection of the describing the place to be searched and the
laws. This section person or things to be seized.
provides that due As a general rule, search and seizure
process of law are unreasonable unless authorized by a
should be observed validly issued search warrant or warrant of
all the time. It is arrest.
unlawful to deprive Every person, whether natural or
a person his life or judicial, enjoys protection against searches
property without or seizures that are unreasonable. All illegal
undergoing proper searches and seizures are unreasonable
inquiry, trail or while lawful ones are reasonable. There are
even judgement instances, however, where search or seizures
(Bobier, 2016). The may be legally made even without a warrant,
equality that it and they are:
guarantees is legal 1. If the search or seizure is done in
equality or the the valid exercise of the police power of the
equality of all State;
person before the 2. If what is searched or seized is a
law. It does not contraband or article prohibited by law;
demand absolute 3. If the search or seizure is incidental
equality. It merely to a lawful arrest;
requires that all 4. Where there is a waiver of the right
person shall be against unreasonable search or seizure; and
treated alike, under 5. In case of war or national
like circumstances emergency (Philippine Constitution, 1987).
and conditions both
as to privileges Section 9, Article III. Private
conferred and property shall not be taken for public use
liabilities enforced without just compensation. Being the rightful
(Caday, 2016). owner, it is the right of the person to keep
Section 2, the ownership of his property subject to
Article III. The limitations imposed by the law. If the
right of the people government plans to take a private property
to be secure in for public use, just compensation should be
their persons, extended to the private owner.

12 Pedere ‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

a law equally applicable to all private


Section 16, corporations.
Article XII. The On the other hand, Government-owned
Congress shall not, or controlled corporations refer to
except by general corporation created by special law where the
law, provide for the government owns at least a majority of its
formation, outstanding voting capital stock such as Land
organization, or Bank, Government Service Insurance
regulation of System, Philippine Postal Corporation and
private those formed under Corporation Code. They
corporations. may performed or proprietary function.
Government-owned Thus, Government-owned or controlled
or controlled corporations may be created:
corporations may 1. Special charters in the interest of
be created or the common good and subject to the test of
established by economic viability.
special charters in 2. By incorporation under the General
the interest of the Corporation Law. In other words, security
common good and agency can be form in Private Corporation,
subject to the test could be Government-owned or controlled
economic viability. corporations (GOCC), or single
Soriano proprietorship.
(2015) discussed
the private 3.2 The Revised Penal Code (Act 3815)
corporation is Applicable provision of Act No. 3815 or
formed for a “An Act Revising the Penal Code and other
private purpose like Penal Law,” otherwise known as the Revised
San Miguel Penal Code (December 8, 1930) regarding
Corporation. crimes against person (Tile Eight of the
However, the Code), personal liberty and security (Title
Congress is Nine of the Code), and property (Tile Ten of
prohibited from the Code) have bearing on the individual’s
passing a special right to security and the private security
law or charter for industry. The Revised Penal Code contains
the formation, the general penal laws of the Philippines.
organization, or First enacted in 1930, which took effect on
regulation of January 1, 1932, and up today, despite
Private several amendments thereto. It does not
Corporation. These comprise a comprehensive compendium of
matters are to be all Philippine penal laws. The Revised Penal
provided for Code was based on the Spanish Penal Code
general law that is of 1870. Thus, in case of conflict between the
Spanish text and English text of the Revised
Penal Code, the Spanish text shall prevail

13 Pedere ‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

because the RPC for the duration of such emergency disaster


was enacted and or calamity.
approved in Private security personnel are called
Spanish. ‘protection specialists’ because in the present
Private concept, law enforcement and crime
Security Agency prevention are not solely charged to the PNP.
Law (RA 5487 as The five-pillar concept in criminal justice
amended) system calls for the involvement of the
Republic Act No. private sector and the community to which
5487 or “An Act to much of the success of law enforcement
Regulate the depends. Private security forces play a vital
Organization and role in this regard as they are a potent force
Operation of in crime prevention. They have contributed
Private Detective, to the improvement of peace and order and
Watchmen or the protection of lives and properties in all
Security Guards areas of the country. The scope of the law
Agencies,” is covers originally promulgated and newly
amended by introduced rules and regulations designed to
Presidential Decree professionalize the security industry.
No. 11 on Revision were made to make the security
December 3, 1972. business a more credible and reliable sector
In this view, the in our country. New provisions include the
security guards, rule in the utilization of security personnel in
watchmen, private certain types of services. The training
detectives and program for private security personnel was
security officers are also expanded in order to develop skills and
considered as force knowledge suitable to current and future
multipliers of the application (Bobier, 2016).
Philippine National Presidential Decree No. 1919
Police (PNP) (Amending RA 54870 and PD 100)
because of the role Presidential Decree No. 1919 amended
they play in times further The Private Security Agency Law on
of disaster or April 28, 1984, with the following changes:
calamities. The 1. Defining watchman or security
chief of the PNP or guard to include those from government
the mayor of a entities
certain municipality 2. Specifying the employment of a
or city may minimum of 200 and a maximum of 1,000
deputize them to licensed security guards for any private
assist the PNP in security agency
the performance of 3. Specifying 30 to 1,000 company
the police duties guards for company forces.

14 Pedere ‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

Presidential Private Detective – shall mean any person


Decrees No. 11 who does detective work for hire, reward or
and No. 100 compensation, other than members of Armed
(Amending RA Forces of the Philippines, guard of the
5487) Presidential Bureau of Jail Management and Penology,
Decree No. 11 municipal or city jail guards and member of
amended ‘The the Philippine National Police or of any other
Private Security law enforcement agency of the government.
Agency Law’ on Private Security Guard – sometimes called
October 3, 1972, watchman, and shall include any person who
while Presidential offers or renders personal service to watch or
Decree No. 100 secure either residence, business
amended the same establishments, or buildings, compounds,
law on January 17, areas or property, inspects or monitors
1973. bodily checks or searches individual and/or
baggage and other forms of security
Terms to Ponder inspection, physically/mentally or
scientifically electronic, including but not
Access – any item, limited to, logging concession and
place, or agricultural, mining or pasture lands,
equipment open to transportation, for hire or compensation, or
or within easy as an employee thereof, including any
entry or grasp. It is employee of the national or local
an element to governments or agencies or instrumentality’s
commit theft. thereof and/or government-owned or
Administration – controlled firm or corporations who is
the supervision, employed to watch or secure government
direction and buildings, compounds, premises and other
control of a properties. Other than the member of the
security agency of Armed Forces of the Philippines, guards of
its human and the Bureau of Jail Management and
other resources to Penology, Municipal or City Jail guards ad
carry out its members of the Philippines National Police or
functions. of any other law enforcement agency of the
Agency – an office, government.
entity or bureau Private Security Personnel – shall refer to
which can be natural persons that includes private security
private or guards, private detectives, security
governmental. In consultants, security officers that may be
private security classified later, rendering/performing
work, this is the security and/or detective services as
administering or employees by private security agencies
directing the office and/or private firms
for security guards.

15 Pedere ‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

Experiential Learning Activity 1

Interpretive theory

DIRECTION: Analyze and identify the following statements related to


Physical Security, Personal Security, and Document and Information
Security. Use the following description for your answer.

A. if the statement pertains to Physical Security

B. if the statement pertains to Personal Security

C. if the statement pertains to Document and Information Security

D. if the statement does not pertain to Physical Security, Personal


Security, and Document and Information Security

1. This consists of barriers and devices that can detect, impede, and
deter potential security threats.

2. It protects your people, information, and assets by enabling your


organization to reduce the risk of harm to your people, customers and
partners.

3. It is to reduce the risk of your information or assets being lost,


damage or compromised.

4. This is based on the premised that the government has the right
and duty to protect official papers from unwarranted and
indiscriminate disclosure.

5. The houses, the protection is not limited to dwelling houses but


extends to a garage, warehouse, shop, store, office, and even a safety
deposit vault.

6. A state of the mind by which a person see or feel absence of danger


and presence of comfort.

7. A fence can slow down the intruder.

8. The purpose is to reduce the risk of employing personnel likely to


present a security concern.

9. Industrial security involves in industrial plants and business


enterprises.

16 Pedere ‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

10. An asset is anything tangible or intangible that is capable of being


owned or controlled to produce value.

11. The following is any person who is not a member of a regular


police agency or the Armed Forces of the Philippines who does
detective work for hire, reward, or commission?
a. Private Detective Agency
b. Private Detective
c. Private Security Guard
d. Private Security Agency
12. The following is any person who offers or renders personal service
to watch or secure either residential or business establishment or both,
or any building, compound or area building but not limited to logging
concession or as an employee thereof is known as?
a. Security Guard
b. Private Security Agency
c. Private Detective Agency
d. Private Security Agency
13. Which of the following state that any person, association,
partnership, or corporation who recruits, trains, muster, furnishes, and
solicits individuals or business firms, private or government owned or
controlled corporations to engage his service or those of its watchmen?
a. Private Security Guard
b. Private Detective
c. Private Detective Agency
d. Private Security Agency

14. Which of the following states “Private property shall not be taken
for public interest without just compensation”?
a. Section 4, Article II
b. Section 1, Article III
c. Section 16, Article XIII
d. Section 9, Article III

15. Which of the following categories of security would fall if


Ambassador Takoyaki arrived in the Philippines?
a. Operational security
b. Hotel security
c. Industrial security
d. VIP Security

17 Pedere ‖ Fundamentals to Industrial Security


Module 1 Fundamentals to industrial Security

Activity 2: Knowledge Assessment Instruction:


Read the questions carefully. Identify the answer for each of the
following statements below.
Note: Try to answer the assessment exercise without referring or
looking back at the discussion in the preceding pages.
1. The Private Security Agency Law is known as _______________.
2. Any person who, for hire or reward or on commission, conducts or
carries on or holds himself or itself out as conducting or carrying on a
detective agency or detective service.
3. It is a degree of protection or resistance against harm, danger, loss
or criminals.
4. This pertains to all physical barriers employed or installed to secure
assets.
5. This includes issues of security in the public, national or
international level.
6. It is the protection of top-ranking officials of the government,
visiting persons of illustrious standing and foreign dignitaries.
7. It is the protection resulting from the application of various
measure which safeguards cash and assets which are in storage,
transit, and or during transaction.
8. During the pre-colonial period in the Philippines, datu has a servant
who acted as their watchman or protector called _____.
9. They have a major role in the preservation and protection of peace
and order in the country.
10. It is the most fundamental aspect of protection.
11. Private security personnel are called ________ because in the
present concept, law enforcement and crime prevention are not solely
charged to the PNP.
12. They performed patrol functions in cities and towns, organized
operations for the suppression of bandit groups, and impose penalties
for infringement of laws and local ordinance

18 Pedere ‖ Fundamentals to Industrial Security

You might also like