0% found this document useful (0 votes)
535 views133 pages

Lea3 Introduction To Industrial

This document provides an introduction to industrial security concepts. It discusses the general meaning of security, gives a brief history of security in the Philippines, and outlines the types of protective security systems including industrial, hotel, bank, VIP, school, and supermarket/mall security. It also identifies the three major areas of security - physical, personnel, and document/information security. For physical security, it describes barriers, perimeter security, and the types of fences used to secure perimeters.

Uploaded by

samieclay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
535 views133 pages

Lea3 Introduction To Industrial

This document provides an introduction to industrial security concepts. It discusses the general meaning of security, gives a brief history of security in the Philippines, and outlines the types of protective security systems including industrial, hotel, bank, VIP, school, and supermarket/mall security. It also identifies the three major areas of security - physical, personnel, and document/information security. For physical security, it describes barriers, perimeter security, and the types of fences used to secure perimeters.

Uploaded by

samieclay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 133

INTRODUCTION TO

INDUSTRIAL
SECURITY
CONCEPTS
ERNIE BOY P. DINAPO
SECURITY

- Generally, the meaning of security is a kind of state


where people, institutions, authority or groups feel
fully secured, free from any threat or
vulnerability from somewhere or someone in
his/her life, liberty, property or activity. It could be in
physical, psychological, social or economical form.

- It is a state or quality of being secured,


freedom from fear or danger, assurance, certainty;
Brief History of
Security in the
Philippines
March 11, 1993 - The private security
business began.

Special Watchman Agency - the first


formally licensed private security
agency “Special Watchman Agency”
started its opeation. Later, it renamed
“Jimenez Security Agency”, founded by
brothers Juan and Pedro Jimenez;
May 30 1958 - the Philippine Association
of Detectives and Protective Agency
Operators Inc. (PADPAO) was formally
organized;

June 21, 1969 - the bill was signed into law by


then President Ferdinand E. Marcos and was
known as “Republic Act 5487 or Private
Security Agency Law”
Cong. Teodulo Natividad
- sponsored this bill transferring the control
and supervision of security industry from
local mayors to Philippine
Constabulary.
- The bill passed from the lower house and was
endorsed to the Senate, and was sponsored by
Senator Alejandro Almendras, who was
dubbed as the “Father for Security
Industry in the Philippines.”
RA 11917

- AN ACT STRENGTHENING THE REGULATION


OF THE PRIVATE SECURITY SERVICES
INDUSTRY, REPEALING FOR THE PURPOSE,
REPUBLIC ACT NO. 5487, ENTITLED “AC ACT
TO REGULATE THE ORGANIZATION AND
OPERATION OF PRIVATE DETECTIVE
WATCHMEN OR SECURITY GUARD
AGENCIES”, AS AMENDED
- This Act shall be known as "The Private Security
Services Industry Act."
- lapsed into law on July 30, 2022
August 1969 - the Philippine Constabulary
activated the Security and Investigation
Supervisory office (SIASO) to supervise
and control the organization and operation of
private security and detective agencies
nationwide;

- Later it was renamed Philippine


Constabulary Supervisory Office for
Security and Investigation Agencies or
PCSOSIA;
P.D. 11 was passed on October 3, 1972, widening
the coverage of RA 5487 to include security
guards employed in logging concessions,
agricultural, mining and pasture lands (Law
that amended R.A. 5487);

P.D. 100 was issued on January 17, 1973,


broadening the coverage of the security industry
to include employees of the national or local
government or any agency who are employed to
watch or secure government building and properties;
April 28, 1984, P.D. 1919 was passed, further
broadening the provisions within the R.A. 5487.

- With the passage of RA 6975, this unit was


absorbed by the Philippine National Police;

- Later it was made into a division of the PNP Civil


Security Group and was renamed Security
Agencies and Guard Supervision Division
(SAGSD); It was again renamed to PNP
Supervisory Office for Security Investigation
Agency (SOSIA).
Types of Security Measures:

1. Active Measures - these involve the


installation of physical barriers, security
lighting, use of vaults, locks and others.

2. Passive Measures - those that will deter


man from committing such act of fear
of being caught, charge in court or get
dismissed, such as: security education,
programs, investigations, seminars, personnel
security check.
Protective Security Systems

Protective security - can be defined as those


measures taken by an installation or
unit to protect itself against sabotage,
espionage, or subversion and at the same time
provide freedom of action in order to provide
the installation of the unit with the necessary
flexibility to accomplish its mission.
Types of Protective Security

1. Industrial Security - a type of security


applied to business groups engaged in
industries like manufacturing,
assembling, research and development,
processing, warehousing, and even agriculture.
2. Hotel Security - a type of security applied to
hotels where its properties are protected from
pilferage, loss, damage and the function in the hotel
restaurants are not disturbed and troubled by
outsiders or the guest themselves. This type of
security employs house detectives, uniformed guard
and supervisor and ensures that hotel guests
and their personal effects are safeguarded.

3. Bank Security - this type of security is


concerned with bank operations. Its main
objective is the protection of bank cash and
assets, its personnel and clientele. Security
personnel are trained to safeguard bank and assets
while in storage, in transit and during transactions.
4. VIP Security - a type of security applied for the
protection of top ranking officials of the
governent or private entity, visiting persons of
illustrious standing and foreign dignitaries.

5. School Security - a type of security that is


concern with the protection of students, faculty
members, and school properties. Security
personnel are trained to protect the school property
from theft, vandals, handling campus riots and
detecting the use of intoxicated drugs and alcohol by
the students.
6. Supermarket or Mall security - a type of
security which is concerned with the protection
of the stores, warehouses, storage, its
immediate premises and properties as well as
the supermarket personnel and
cutomers. Security personnel are trained to
detect shoplifter, robbery, and bomb
detection and customer relation.
7. Operational Security – Involves the
protection of processes, formulas and
patents, industrial and manufacturing
activities from espionage, infiltration, loss,
compromise or photocopying;

8. Communication Security - It is a
safeguard resulting from the application of
different measures which prevent or delay the
enemy or unauthorized person in gaining
information through communication
including transmission, cryptographic,
and physical security.
Three (3) Major Areas of Security

I. Physical Security - Physical Security is the


branch of security that is concerned with measures
implemented to prevent unauthorized access to
facilities, equipment, materials, documents and
personnel
- These measures consist of barriers, devices and
security personnel that would detect, impede, and
prevent unauthorized access to facilities, equipment,
materials, documents and personnel against sabotage,
espionage, damage and pilferage
II. Personnel Security - Personnel Security
concerns itself in ensuring that the hiring
and employment of personnel is suited
to assist the company in achieving its
objectives. It begins even before the hiring of
an employee and is maintained for as long as
the person is employed.

III. Document and Information Security -


Document and Information Security relates to
the protection of vital secrets from
competitors, and it has become progressively
more crucial in this age of highly advanced
technology.
I. PHYSICAL SECURITY
Physical Security

Barrier - can be defined as any structure or


physical device capable of restricting,
deterring, delaying, illegal access to an
installation.

Different types of Barrier:


1. Structural or Man-made
2. Human
3. Animal
4. Natural
5. Energy
Types of Barrier

1. Structural/Man-Made Barrier - these are


features constructed by man regardless of their
original intent that tends to delay the intruder.
Structural constructions made by man like fences,
walls, floors, roofs, grill or other physical means
to deter or impede penetration.

2. Human Barrier - Persons being used in


providing a guarding system or by the nature of their
employment and location, fulfill security
functions. Such as security guards, office
personnel, employees etc.
3. Animal Barrier - animals are used in partially
providing a guarding system like dogs and geese.

4. Natural Barrier - it includes bodies of waters,


mountains, deserts or terrain that are difficult to
traverse.

5. Energy Barrier - It is the employment of


mechanical, electrical, electronic energy that
imposes a deterrent to entry by the potential intruder
or to provide warning to guard personnel. Such as
protective lighting, alarm system, electronic
devices etc.
Perimeter security - protection of the
installation's inner and immediate vicinity.

Perimeter Barrier - a medium or structure


which defines the physical limits of an
installation or area to restrict or impede access
thereto. The main purpose is to deny or
impede access or exit of unauthorized
person.
Types of Fences

1. Solid fence
- Constructed in such a way that visual
access through the fence is denied. Its
advantage is that it denies the opportunity for
the intruder to become familiar with the
personnel, activities and the scheduled
movements of the security personnel. On the
other hand, it prevents the guards from
observing the area around the installation and
it creates shadow that may be used by the
intruder for cover and concealment
2. Full view fence
- It is constructed in such a way that visuals
access is permitted through the fence.
It allows roving patrols and stationary guard to
keep the surrounding of the installation under
observation. On the other hand, it allows the
intruder to become familiar with the
movements and time schedule of the guard
patrols thereby allowing him to pick the time
that is advantageous on his part.
Types of full view fence

a. Chain link fence


- Should be constructed minimum height of 7 feet
excluding top guard;
- 9 gauges or heavier;
- Mesh openings of not larger 2 inches per side;
- Twisted and barbed selvage at top and bottom
- fastened to rigid metal or reinforced concrete
- must reach 2 inches of hard ground or paving
- must reach below surface deep enough for soft
ground to compensate for shifting soil or sand.
b. Barbed wire fence

- Twisted, double strand, 12 gauge wire with 4-


point barbs spaces in an equal distance.
- not less than 7 feet excluding top guard
- firmly affixed to posts not more than 6 feet apart.
- distance between strands must not exceed 6 inches at
least one wire will be interlaced vertically and
midway between post.
c. Concertina wire fence
- Dannert wire

- is a type of barbed wire or razor wire that is formed


in large coils which can be expanded like a
concertina. Opened concertina wire is 50 feet long
and 3 feet diameter.
- steel barbed wire clipped together at intervals to
form a cylinder.
Additional Protective Barriers

1. Top Guard - an additional overhang or


barbed wire placed on vertical perimeter fences
facing upward and outward with a 45
degree angle with three to four strands of
barbed wire space six inches apart. This will
increase the protective height and prevent easy
access.
2. Guard Control Stations - provided at main
perimeter entrances to secure areas located out
of the doors, and manned by guards on a full time
basis. Sentry station should be near a perimeter for
surveillance at the entrance.
3. Tower Guard - a house like structures above
the perimeter barrier. Height of the tower
increases the range of observation during day and
night with artificial illumination.
4. Protection In Depth - In large open areas or
ground, where fencing or walling is
impracticable and expensive, warning signs should
be conspicuously placed. The depth itself is
protection.

5. Signs and Notices - "Control Signs" should be


erected where necessary in the management
of unauthorized ingress to preclude accidental
entry. Should be plainly visible and in an understood
language.

6. Barrier Maintenance - fencing barriers and


protective walls should always be regularly
inspected by security. Destruction of fence or
sections should be repaired immediately.
Perimeter Barrier Opening

1. Gates and Doors - when not in use and


controlled by guards, gates and doors in the
perimeter should be locked and
frequently inspected by guards.

2. Side-walk elevator - these provide access


to areas within the perimeter barrier and should
be locked and guarded.
3. Utilities Opening - sewers, air intakes, exhaust
tunnels and other utility openings which penetrate the barrier
and which have cross sectional areas of 96 square inches
or more should be protected by bars, grills, water
filled traps or other structural means providing
equivalent protection to that portion of the perimeter barrier.

4. Clear Zones - unobstructed area maintained on both


sides of the perimeter barrier. It affords better observation and
patrol movement. It should be cleared of anything that
may provide concealment or assistance to a person
seeking an authorized entry.
- 50 feet or more (Inside) between the perimeter barrier and
structure within the protected areas. .
- 20 feet or more (Outside) between the perimeter barrier and
exterior structure.
Protective Lighting

- provides sufficient illumination to areas


during hours of darkness.
- single most cost-effective deterrent to
crime because it creates a psychological
deterrent to the intruders.
Types of Protective Lighting

1. Continous Lighting - the most familiar


type of outdoor security lighting, this is
designed to provide two specific results;
glare projection and controlled lighting.
it consists of a series of fixed
luminaries at range to flood a given area
continously during the hours of darkness.
Glare Projection Type -
being used in prisons
and correctional
institutions to illuminate
walls and outside barriers.

Controlled Lighting -
generally employed due to
surrounding property
owners, nearby
highways or other
limitations. It is necessary
for the light to be more
preicesly focused.
2. Standby Lighting - similar to continuous lighting
but can be turned on manually or by special
device or other automatic means, when there is
a suspicion of entry.

3. Movable or Portable Lighting - manually


operated and is usually made up of movable
search or floodlight that can be located in selected
loaction which will require lighting only for
short period of time.

4. Emergency Lighting - stand by lighting which


can be utilized in the event of electrical failure.
General types of Lighting Sources

1. Incandescent lamp - an electric light with a


wire filament heated until it glows. The
filament is enclosed in a glass bulb with a vacuum
or inert gas to protect the filament from oxidation.
2. Mercury Vapor Lamp - a gas-discharge lamp
that uses an electric arc through vaporized mercury
to produce light. It produces a greenish-white
light due to mercury's combination of spectral lines.
3. Metal-Halide Lamp - is an electrical lamp that
produces light by an electric arc through a gaseous
mixture of vaporized mercury and metal
halides(compounds of metals with bromine or
iodine). Similar to mercury vapor lamps, but
contain additional metal halide compounds in
the quartz arc tube, which improve the efficiency
and color rendition of the light.
4. Fluorescent Lamp - an electric discharge lamp,
cooler and more efficient than incandescent
lamps, that produces light by the
fluorescence of a phosphor coating. Consists
of a glass tube filled with a mixture of argon and
mercury vapour.
5. Sodium-Vapor Lamp - is a gas-discharge lamp
that uses sodium in an excited state to produce
light and emit monochromatic yellow light and so
inhibit color vision at night.
Types of Lighting Equipment

1. Floodlights - project light in a concentrated


beam. Called flood lights because they are flooding
the area with light. Best used in boundaries,
buildings or fences.
2. Street lights - Produced diffused light rather
than direction beam. They are widely used in
parking areas.
3. Search lights - Highly focused incandescent
lamps and are designed to pinpoint potential trouble
spot.
4. Fresnel lights - Wide beam units,
primarilyused to extend the illumination in
long, horizontal strips. It projects a narrow
horizontal beam which is approximately 180
degrees in the horizontal and from 15 to 30
degrees in the vertical plane.
Protective Alarms - is an aural or visual signal
given by the annunciator to the security when
intruders actuate certain devices in a protected area.
It assists the security in detecting, impending
or deterring potential security threat in the
installation.
Three (3) Basic parts of Alarm system
1. sensor or trigger device - device that can
sense an abnormal condition within the
system and provide a signal indicating the presence
or nature of the abnormality.

2. Circuit or Transmission Line – It is the


communication channel that conveys the
information from all sensors in the system to the
signal by means of wire, radio waves.

3. Annunciator/Enunciator – is a visual or
audible signaling device. The actual alarm may
be audible or silent, a bell, buzzer, phone ringing, or
flashing of light.
Types of Protective Alarm System

1. Central station system - a type of alarm


where the control station is located
outside the plant or installation.

2. Proprietary system - centralized monitor


of the proprietary alarm system is located in
the industrial firm itself with a duty
operator.
3. Local alarm system - These systems
sound an alarm to alert home and
business owners of emergencies. However,
these systems do not contact authorities.

4. Auxiliary alarm system - company


owned alarm systems with a unit in the
nearest police stations and other public
safety agencies so that in case of need, direct
call is possible.
Kinds of Alarm

1. Audio detection device - detect sound


caused by attempted force entry.

2. Vibration detection device - detect any


vibration caused by attempted force entry.

3. Metallic foil or wire - detect any action


that moves the foil or wire. Best used in
the doors, windows or glass surfaces of the
protected area.
4. Laser beam alarm - a laser emitter
floods a wall or fencing with a beam so
that when this beam is disturbed by a physical
object, an alarm is activated.

5. Photoelectric or Electric eye device -


an invisible/visible beam is emitted and when
this is disturbed or when an intruder breaks
contract with the beam, it will activate the
alarm.
Types of Bank Alarm

1. Foot rail Activator – They are placed on


the floor in such a position that tellers may
activate the alarm by placing the front of
their foot to foot rail to activate the
alarm.

2. Knee or Thigh Buttons – It is installed


inside the teller station so that they can be
activated by knee or thigh pressure.
3. Foot Button – Like the foot rail, it permits
alarm activation in relative safety, while
both hands remain clear in view of the
robbers.

4. Double Squeeze Button – It requires


pressure on both sides of the device , thus
the probability of accidental alarm is
reduced.

5. Bill Trap - has a built-in switch that


transmits an alarm to the receiver when
the cashier removes the trapped bill
PROTECTIVE LOCKS

Lock - defined as a
mechanical, electrical,
hydraulic or electronic
device designed to prevent
entry to a building or room.
Types of Locks

1. Key-operated mechanical lock - Key is


the device used to align these internal barriers
so that the lock may be operated. There are
three types of key operated lock:
a. Disc or wafer tumbler mechanism
b. Pin tumbler mechanism
c. Lever tumbler mechanism
a. Disc or wafer tumbler mechanism - is a lock
composed of slotted rotating detainer discs.
Commonly designed for the automobile industry and
general use in car doors.

b. Pin Tumbler Lock – is a lock mechanism that


uses pins of varying lengths to prevent the lock
from opening without the correct key.

c. Lever Tumbler Lock – lock used in a safe


deposit box and is for all purposes. It is also used
in desk, lockers and cabinets and are generally
less secure than pin tumbler lock.
2. Padlock - a portable and detachable lock
having a pivoted or sliding hasp which possesses
through a staple ring, or the like and is made fast or
secured.
3. Combination Lock – a lock
that requires manipulation of
parts according to a
predetermined combination
code of numbers. Most of
this lock has three dials but
some locks have four dials for
greater security.
4. Code-operated lock
- a type of lock that can
be opened by pressing a
series of numbered
button in the proper
sequence.
5. Card Operated Lock/Coded Lock – type of lock
that can be opened by inserting a coded card in
a slot in the lock, or by pushing the correct button on
the surface of the lock.
6. Electronic Lock – type of lock that can be
closed and opened remotely by electronic
means.
Types of keys

1. Change Key – a key to a single lock;

2. Sub-Master Key – a key that can open all locks


within a particular area or grouping;

3. Master Key – a special key capable of opening a


series of locks. It is capable of opening less
number of locks than grand master key;

4. Grand Master Key – a key that can open


everything in a system involving two or more master
key groups.
Key Control - defined as the management of
keys in a plant or business organization to
prevent unauthorized individual access
to the keys.

● Peterman – A term used in England for lock


picker, safecrackers, and penetrators of
restricted areas or rooms.
● False Key – picklocks or similar tools,
genuine keys stolen from the owner, and or
any key other than those intended by owner for
use in the lock.
Key Control

1. Key cabinet -
sufficient size to hold
the original key to every
lock in the system and
should be secured at all
times.
2. Key record - some administrative means must be
set up to record code numbers and indicates to
whom keys to specific locks have been
issued.
3. Inventories - periodic inventories will have to be
made of all duplicate and original keys in the
hands of the employees whom they have been issued.
4. Audits - in adddition to inventories, an
unannounced audit should be made.
5. Daily report - made by person responsible for key
control indicating all persons who have left or will be
leaving the company and recover all issued key.
Security Cabinet

- a high security storage in the final line of


defense at any facility, where papers,
records, plans, or cashable instrument,
precious metals or other especially valuable
assets are protected. It is designed to
secure valuable assets against burglary
or fire.
Three (3) types of cabinets

1. Safe - metallic container used for the


safekeeping of documents or small items in an
office or installation.
2. Vault - heavily constructed fire and burglar
resistance container usually part of the
building structure used to keep and protect cash,
documents and negotiable instruments. It is bigger
than safe but smaller than a File Room.
3. File room - A cubicle in a building constructed
to be little lighter than a vault but bigger in
size. It can accommodate limited people to work on
the records inside.
VAULT

SAFE

FILE ROOM
Some Test for Fire Resistance

1. Fire Endurance Test – also known as “fire


resistance test”, which subjects a specimen to a
prescribed fire (usually at temperature 350 F)
until certain conditions are met that indicate the end
of the endurance test.
2. Explain Hazard Test – test to determine if the safe
can withstand 2000 F for 30 minutes without
cracking or opening;
3. Fire and Impact test – Its objective is to
determine the strength of a safe to resist the
collapse of a building during fire.
Use of Pass system

1. Single pass system - the badge or pass coded for


authorization to enter specific areas is issued to an
employee who keeps it in his possession until his
authorization is terminates.
2. Pass exchange system - an exchange takes
place at the entrance of each controlled area. Upon
leaving of the personnel surrenders his badge or
passes and retreive back his basic
identification.
3. Multiple pass system - this provides an extra
measures of security by requiring that an exchange
take place at the entrance of each restricted
area.
Visitors Movement Control

1. Visitors logbook - should be filled up


with the name of the visitors, nature and
duration of visit. All visitors should be
required to identify themselves and should be
given a visitors id by the security.

2. Photograph - taking of photograph should


also be considered.
3. Escort - if possible, visitors should be escorted by
the security to monitor their activity within the
establishment and guide them where to go.

4. Visitor's entrance - separate access for


visitors and employees of the establishment should be
provided.

5. Time-traveled - if there is a long delay or time


lapse between the departure and arrival, the visitors
may be required to show cause for the delay.
RA 5487 - "The Private
Security Agency Law."
Private Security Industry – shall cover those in the
legitimate business of providing private security and
detective services.

Private Security Guard (SG) – sometimes called private


security guard or watchman shall include any person
who offers or renders personal service to watch or
secure either a residence, business establishment,
or buildings, compounds, areas, or property, inspects/monitors
bodily checks/searches individuals and/or baggage

Private Detective (PD) – shall mean any person who does


detective work for hire, reward or commission, other
than members of the AFP, guards of BJMP, PNP or of any
other law enforcement agency of the government.
Private Security Personnel – shall be natural persons which
include private security guards, private detectives,
security consultants, security officers and others.

Government Security Personnel – shall be natural persons


which include government security guards,
detectives, security consultants, security officers and
others that may be classified later, except those of the law
enforcement agency of the government.

Duty Detail Order - is a written order/schedule issued by


a superior officer usually the private security
agency/branch manager or operations officer
assigning the performance of private security/detective
services duties.
Who may organize and maintain Private Security
Agency and Private Detective Agency?
- Any Filipino citizen or corporation, association,
partnership, one hundred percent of
which is owned and controlled by
Filipino citizens.
Requirement of an Operator / Manager
of
Security Agency

a. Filipino citizen;
b. Not be less than twenty five (25) years of age;
c. College graduate and/or a commissioned officer in
the inactive service or retired from the AFP or PNP;
d. Has taken a course/seminar on Industrial Security
Management and/or must have adequate training or
experience in security business.
e. Good moral character;
f. Having no previous record of conviction of crime or
offense involving moral turpitude.

not suffering from any of the following


disqualifications:
(1) Having been dishonorably discharged or separated
from the Armed Forces of the Philippines;
(2) Being a mental incompetent;
(3) Being addicted to the use of narcotic drug or drugs;
and
(4) Being a habitual drunkard.
Qualifications of Security Guard:

a. Filipino citizen;
b. High School graduate;
c. Physically and mentally fit;
d. At least eighteen (18) years of age but not
more than fifty (50) years old;
e. Has undergone Pre-Licensing course or its
equivalent.
Qualifications for Security Officer:

1. Filipino citizen;
2. Holder of a Baccalaureate Degree;
3. Physically and mentally fit;
4. Has graduated from a Security Officer
Training Course or its equivalent
Qualifications for Security Consultant:

1. Filipino citizen;
2. Holder of a Baccalaureate Degree;
3. Holder of Masters degree either in
Criminology, Public Administration, MNSA,
Industrial Security Administration, or Law
4. Must have at least ten (10) years experience
in the operation and management of security
business.
Qualifications for Private Detective:

1. Filipino citizen;
2. Holder of a Baccalaureate Degree;
3. Holder of baccalaureate degree, preferably Bachelor
of Laws or Bachelor of Science in Criminology;
4. Graduate of a Criminal Investigation Course offered
by the PNP or NBI or any police training school, or a
detective training in any authorized/recognized
training center;
5. Advance ROTC/CMT graduate or its equivalent
Functions of a Private Detective:

1. Background Investigation;
2. Locating missing person;
3. Conduct surveillance work;
4. Such other detective work may become the
subject matter of contract between the
agency and its clients. Except not contrary
to law, public order, public policy morale and
good custom.
Types of Security Guard Forces

1. Company Guard Force – security force


maintained and operated by any private
company/corporation utilizing any of its
employees to watch, secure and guard its
establishment.
2. Private Security Agency – security guard
belonging to privately licensed agency
(contractual basis);
3. Government Guard Unit – security unit
maintained and operated by any government
entity other than military or police.
Regular License To Operate:

1. Private Security Agency – minimum of


two hundred (200) licensed private security
personnel and a maximum of one thousand
(1,000);

2. Company Guard Force/Private


Detective Agency – minimum of thirty
(30) and a maximum of One thousand
(1,000)
Classification of Training And Its Duration

* Basic Security Guard Course (Pre-Licensing


Course) – 150 hours;
* Re-Training Course – 48 hours;
* Security Officers Training Course – 300 hours
* Basic Security Supervisory Course – 48 hours
License and Fees

- New applicants to operate shall be required to


obtain a minimum capitalization of P1
Million with minimum bank deposit of
P500,000.00 in order to start its business
operation;

- All Private Security Agencies must be


registered at the Security and
Exchange Commission (SEC).
Surety Bond

● Agency with 1 -199 guards – P50,000.00

● Agency with 200-499 guards – P100,000.00

● Agency with 500-799 guards – P150,000.00

● Agency with 800-1000 guards – P200,000.00

➔ NOTE: This bond shall answer for any valid and


legal claims against the agency filed by an aggrieved
party.
License to Operate

● Chief PNP

○ Approval of New Regular LTO;


○ Cancellation of Regular LTO;
○ Reinstatement of Regular LTO;
○ Suspension of Regular LTO
Possession of Firearm

1. One (1) firearm for every two (2) security


guards; (1:2)

2. Private security agency/private detective


agency/ company security
force/government security force shall not be
allowed to possess firearms in excess of five
hundred (500) units.

3. Shotguns not higher than 12 gauge;


4. Weapons with bores not bigger than cal
.22 to include pistols and revolvers with bores
bigger than cal .38

➔ Exemptions: in areas where there is an


upsurge of lawlessness and criminality as
determined by the Chief PNP, Regional Office
or their authorized representative, they may be
allowed to acquire, possess and use high
powered firearms.
● Private Security Agency with Temporary
License to Operate – for one hundred
guards, an initial of at least thirty licensed
firearms;

● For with Regular License to Operate - for


200 hundred security guards, at least 70
pieces of licensed firearms.
Limitation in the Carrying of Firearms

1. No firearm shall be borne nor be in the possession


of any private security personnel except when in
actual performance of duty, in the prescribed
uniform, in the place and time so specified in the
Duty Detail Order (DDO);

2. Shall be carried only within the compound of the


establishment where he is assigned to guard;

3. While escorting big amount of cash or valuable


outside of its jurisdiction or area of operation, private
security agency shall issue an appropriate Duty
DetailOrder to the security personnel concerned.
11 General Orders

1. To take charge of this post and all companies


property in view and protect/preserve the same with
utmost deligence.
2. To walk during tour of duty in military manner,
keeping always in the alert and observing everything
that takes place within sight or hearing.
3. To report all violations of orders I am instructed to
enforce.
4. To repeat all calls from post more distant from the
guardhouse where I am station.
5. To quit my post only when properly relieved.
6. To receive, obey and pass out to the relieving guard
all order from company officers or officials,
supervisors post in charge or shift leader.
7. To talk to no one except in the line of duty.
8. To give sound or call the alarm in case of fire or
disorder.
9. To call the the superior officer in any case not
covered by instructions.
10. To salute all company officials, superiors in the
agency, ranking public officials, and commission
officers of the AFP and officers of the PNP.
11. To be especially watchful at night and during the
time of challenging to challenge all persons on or
near my post and to allow no one to pass or loiter
without proper authority
II. Personnel Security
II. Personnel Security

- includes all the security measures designed to


prevent unsuitable individuals or
persons of doubtful loyalty to the
government, from gaining access to
classified matter or to any security facility,
and to prevent appointment, or retention as
employees of such individuals.
- considered as the weakest link in security
chain
Personnel Security Investigation (PSI)

- It is an inquiry into the character,


reputation, discretion, integrity, morals,
and loyalty of an individual in order to
determine a person’s suitability for
appointment or access to classified matter.

Types of PSI:
1. National Agency Check (NAC);
2. Local Agency Check (LAC)
1. National Agency Check (NAC) – this is an investigation
of an individual made upon the basis of written information
supplied by him in response to official inquiry, and by
reference to appropriate national agencies.It consists
of the records and files of the following national agencies:
PNP, ISAFP, NBI, CSC, Bureau of Immigration and other
agencies;

2. Local Agency Check (LAC) – this type of investigation


consist of the first type plus written inquiries sent to
appropriate local government agencies, past
employment, schools and etc. Refers to the investigation of the
records and files of agency in the area of principal
residence of the individual being investigated like clearances
from Mayor, Police, Prosecutor and Courts.
Background Investigation (BI)

- It is an inquiry which aims to verify


applicant’s information written at the
applicants form, to ascertain his/her past
employment experiences and to obtain other
information pertinent to the decision to
employ;
- more comprehensive investigation than
NAC and LAC. A thorough and complete
investigation of all or some of the
circumstances or aspects of a person's life is
conducted.
Kinds of Background Investigation:

1. Complete background Investigation


(CBI) – a type of BI which is more
comprehensive, particularly all the
circumstances of his personal life.

2. Partial Background Investigation (PBI)


– Investigation of the background of the
individual but limited only to some
circumstances of his personal life.
III. DOCUMENT AND
INFORMATION SECURITY
Document and Information Security

- Security involving the protection of


documents and information from loss,
access by unauthorized persons;
- the application of security measures for the
proper protection and safeguarding of
classified information
Relevant Terms:

Classify - refers to the act of assigning to


information or material one of the four
security classification categories after
determination has been made that the information
requires the security protection as provided for in the
regulation;

Security Clearance - Is an administrative


determination that an individual is eligible from a
security standpoint for access to classified
matter of a specific category;
Compartmentation - Refers to the grant of access
to classified matter only to properly cleared
persons when such classified information is required
in the performance of their official duties, and
restricting it to specific physical confine when
feasible.

Need to Know - term given to the requirement that


the dissemination of classified matters be
limited strictly to those persons whose
official duties require knowledge thereof.
Declassify - removal of security
classification from classified matter.

Reclassify - act of changing the


classification matter.

Upgrading - act of assigning to a matter of


higher classification.

Downgrading - act of assigning to a matter of


lower classification.
Records Cycle

1. Birth Creation - record comes into exitence or


created.
2. Record Maintenance and Use - perieod when
record serves its purpose either active(being use) or
inactive(used or rarely use).
3. Classification
4. Storage
5. Retrieval - act of taking out of the record from
storage.
6. Purging or Retention- (retention or disposal)
7. Transfer - moving from other storage
8. Archival Storage - long term storage
Period of Retention of Records

1. Permanent record - kept for not less than 10


years
2. Semi-Permanent - kept for 5 years
3. Temporary - less than 5 years

Phases of its Life Cycle

1. Current Phase - records that are regularly used


and maintain.
2. Semi-Current Phase - rarely used
3. Non-Current Phase - no longer used
Types of Police Records

1. Case records - the heart of any police


records system. It serve as the basis for an analysis
of offenses and the methods by which they are
committed.

a. Complaint sheet - the Foundation record of


the police department. It reflects all information
regarding complaints and reports received by the
police from citizens and other agencies or actions
taken by the police.

b. Investigative report - It contains the


findings and actions taken by the
investigating officer.
2. Arrest and Booking Records - these records
maintain the arrest and jail booking report which is
required for all persons arrested.

a. Arrest report - full name of offender, charges


and circumstances of arrest.

b. Booking report - list of prisoners in custody


which indicates the status and disposition.

c. Prisoner's property receipt - contains all


information regarding the property takn from the
prisoner and acomplish duplicate.
3. Identification Records - third major
division of police record. Provides
identification of criminals which includes
name, physical characteristics and in some
cases photograph.

a. Fingerprint - heart of any identification


system

b. Modus operandi - signature or


methods of committing the crime.
4. Administrative Records - essential in
administering personnel matters and designed
to aid in assignment, promotion, and
disciplinary action of personnel.

5. Miscellaneous Records - these are


records which are not related to the recorded
complaints and investigation report but are
essential to the daily police activities.
Classification of Documents

1. Top Secret – any information and material, the


unauthorized disclosure of which would cause
exceptionally grave damage to the nation,
politically, economically or militarily;

2. Secret – any information and material, the


unauthorized disclosure of which would
endanger national security, cause serious
injury to the interest or prestige of the nation or any
governmental activity.
3. Confidential – any information and
materials, the unauthorized disclosure of
which would be prejudicial to the interest or
prestige of the nation or governmental activity
or would cause administrative
embarrassment or unwarranted injury.

4. Restricted – any information and material


which requires special protection other
than those determined to be Confidential,
Secret, and Top Secret matters.
Types of Documents

1. Vital Document – This is an irreplaceable


records, reproduction of which does not have the
same value as the original;

2. Important Document – This is a record,


reproduction of which causes considerable
expense and labor, or considerable delay.
3. Useful Document – This is a record, the
loss of which may cause inconvenience
but could be readily replaced and may
not present insurmountable obstacle to the
prompt restoration of the business;

4. Non essential Document – This record


may include daily files, routine in nature, lost
of which will not affect the organization.
Types of Filing

1. Alphabetical Order - It is most widely used


form of filing. All materials filed in dictionary
order.

2. Encyclopedic Order - the subject are group into


major headings; individual folders are filed in
alphabetical order behind each heading.

3. Chronological Order - arranged by sequential


date order. Useful for records that are created
and monitored on a daily basis.
4. Geographical Order - arranged alphabetically by
geographical name of the place.

5. Numerical Order - Numerical value or number


into a specific file such as serial number or digit
filing.

6. Centralized Filing - Places all records in one


central location in an office. Most useful when the
majority of individuals requires access to
majority of the files.

7. Decentralized Filing - locates record in


different places within an office. Most useful
when only one individual requires access to a
specific record
Types of proprietary Information

1. Trade secret - consist of any formula, pattern,


device or compilation of information which is
used in one's business and which gives him an
opportunity to gain an advantage over competitors
who do not know or use it.

2. Patents - this is a grant made by the


government to an inventor, conveying or
securing to him the exclusive right to make, use,
or sell his invention.
Definition of Terms

Security Survey - A fact finding probe to


determine a plant’s adequacy in all
aspects of security, with the corresponding
recommendations.

Security Inspection - It is the process of


conducting physical examination to
determine compliance with
establishment security policies and
procedures as a result of a security survey.
Security Education - It is defined as the
exposure and teaching of employees on
security and its relevance to their work.
Security education is conducted to develop
security awareness among employees
of the company.

Duress Code - is a covert distress signal


used by an individual who is being coerced by
one or more hostile persons. It is used to
warn others that they are being forced
to do something against their will.
Relative Criticality - the importance of an
establishment with reference to the national
economy and security.

Relative Vulnerability - the susceptibility


of a plant or establishment to damage,
loss, or destruction of operation due to various
hazards.
Threat - any circumstance or event with the
potential to adversely impact operations.

Threat Assessment - the process of


investigation/validating the truthfulness
of the existence of threat to an individual.

Hazard - any act or condition which may


result in the compromise of
information, loss of life, loss or
distruction of property or disruption of the
objective of the installation.
Types of Hazard

1. Natural Hazard - hazards which arise from


natural phenomena. such as earthquakes,
flood caused by typhoons, eruption, etc.

2. Man-made hazard - hazards which are the


result of a state of mind, attitude,
weaknesses or character traits of one or
more persons such as carelessness,
disloyalty, pilferage, etc.
Types of pilferers

1. Casual Pilfere - one who steals due to his


inablity to resist the unexpected
opportunity and has little fear of
detection.

2. Systematic Pilferer - one who steals


with preconceived plans and take away
any or all types of items or supplies for
economic gain.
Risk Management Alternatives and Strategies

1. Risk Avoidance - eliminating or removing the


risk totally from the business, government, or
industrial environment for which the risk manager
has responsibility.

2. Risk Reduction - decreasing the risk by


minimmizing the probability of the potential loss.
3. Risk Spreading - spreading the risk through
compartmentation or decentralization to limit the
impact of potential loss.

4. Risk Transfer - moving the financial impact


of the potential loss over to an insurance
company.

5. Risk Self-assumption - planned assumption and


acceptance of the potential risk by making a
deliberate managerial decison of doing nothing
about the threat, or setting aside resources for
use in case of a specific loss incident.
THANK YOU FOR
LISTENING AND
MAY GOD BLESS
YOU ALL FUTURE
RCRIMS!!!

You might also like