Module Leasec3
Module Leasec3
INTRODUCTION TO
INDUSTRIAL SECURITY
LEASEC 3 CONCEPT Digitally signed by Benjamin O. Dulipas
DN: cn=Benjamin O. Dulipas, c=PH,
o=SCJPS, ou=Faculty,
[email protected]
Reason: I have reviewed this document
Location: SCJPS
BENJAMIN O.DULIPAS
Date: 2022.12.17 02:35:18 +08'00'
REFERENCES 141-142
EVALUATION OF THE MODULE 143
CHAPTER 1: SECURITY
PART 1
SECURITY CONCEPT:
SECURITY:
Security came from the Greek word SECUROS which means safe, safety or secured. Security came from the
root word “Secure” meaning free from risk, threat, or danger. Security is the state or quality of being secured,
freedom from fear or danger; assurance; certainty. To secure is to make safe or be protected, and the defense
against crime or a state of being free.
Security, in a collective sense, is the same as protection and safety; the state of being safe and the condition of
being protected against physical, social, spiritual, financial, political, emotional, occupational, psychological, or
other types or consequences of failure, damage, error, accidents, harm or any other event which could be
considered not desirable. It is also freedom from fear, harm, danger, loss, destruction, or damage.
What is a Victim?
-The crime target
What is Victimology?
-The study of victim
2. Vulnerability means weakness, flaw, or virtually anything that may conceivably be exploited by a threat;
examples are holes in a fence, an out-of-date key system or the introduction of a computer virus (Sennewald,
2003).
-A weakness that can be used to gain access to an asset.
2. Passive measures:
are those that will dates man from committing such acts for fear of being caught, charged in court, or get
dismissed; Security education programs, investigation, fire prevention seminars; personal security checks are
examples of passive security.
Purpose of Security:
The protection of establishment from any form of losses as a result of theft, robbery, pilferage, sabotage,
espionage, accident, fire and subversive activities.
3 D’s of Security:
The basic theory of any Security Program can be summed up in three words;
1. Denial – Takes the form of Physical barriers like fences, walls gates, locked doors, watch dogs, etc.
When the access is denied, the thing or area to be protected remains safe.
2. Detection – Takes the form of guards and electronic devices.
3. Deterrence – This can be both physical and psychological.
a. Physically – When attacker is delayed by walls, heavy door, high security locks. Well-constructed vaults and
safes, etc.
Fields of Security
1. IT Fields
a. Computer Security- is a branch of information security applied to both theoretical and actual computer
systems. A branch of computer science that addresses enforcement of ‘secure’ behavior on the operation of
computers.
b. Data security- is the means of ensuring that data is kept safe from corruption and that access to it is suitably
controlled.
c. Application security- encompasses measures taken to prevent exceptions in the security policy of an
application or the underlying system (vulnerabilities) through flaws in the design, development, or destruction
of the application.
d. Information security- means protecting information and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction.
2. Physical Field
a. Physical security- describes measures that prevent or deter attackers from accessing a facility, resource, or
information, stored on physical media. It can be as simple as a locked door or as elaborate as multiple layers
of armed guard posts.
b. Shopping Center Security (mall or supermarket)- a type of security which is concern with the protection of
the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel
and customers.
c. Airport security- refers to the techniques and methods used in protecting airports and by extension aircraft
from crime and terrorism.
d. Home security- are those methods use of protecting residential homes or town sites which include the
interior protection of houses against property losses or damages.
3. Political Field
a. International security- consists of the measures taken by nations and international organizations, such as
the United Nations, to ensure mutual survival and safety. These measures include military action and
diplomatic agreements such as treaties and conventions. International and national security is invariably linked.
b. National security- refers to the requirement to maintain the survival of the nation –state through the use of
economic, military, and political power and the exercise of diplomacy.
c. Human security- refers to an emerging paradigm for understanding global vulnerabilities whose proponents
challenge the traditional notion of national security by arguing that the proper referent for security should be the
individual rather than the state.
4. Monetary Field
Financial security- refers to the methods applied for the protection of fungible, negotiable instruments
representing financial value.
Layers of Security:
a. Perimeter Control – Security barriers, checkpoints at the outermost layer to anticipate/identify hostile
elements at the vicinity of the communication facility.
b. Area Access Control – Control measures undertaken to prevent entry of unauthorized person inside the
premises of communication security.
c. Control of operation Area – Final measures undertaken prior to the entry into an operating room.
d. Control of Communication Area – Final security measures undertaken prior to the entry into a
communication area.
Since security in general is very hard to comprehend, it can be divided into three major areas:
1. Physical Security – this is the broadest branch of security which concerned with the physical measures
adopted to prevent unauthorized access to equipment, facilities, material and document and to safeguard them
against espionage, sabotage, damage, loss and theft.
- Is the sum total of all physical protection employed or installed to secure the assets.
Ex. Human Guards, Perimeter fence/barrier and security devices.
2. Personnel Security – this is as important as physical security. Personnel security states even before the
hiring of an employee and remains to be maintained for as long as the person is employed.
3. Document and Information Security – this involves the protection of documents and classified papers from
loss, access by unauthorized persons, damage, theft, and compromise through disclosure. Classified
documents need special handling. Lack of indoctrination and orientation among the personal handling them
can result in the leakage, loss, theft, and unauthorized disclosure of the documents.
Is the sum total of all policies, regulation, practices, enforce to safeguards the contents and integrity of any
classified information or document from compromise or loss.
Example:
a. Policy – Security document and information is the responsibility of all concerned.
b. Regulation – Anybody found guilty of violating document and information security shall dealt with
accordingly.
c. Doctrine – Access to information is based on the “need to know” and not by position.
d. Practice - Authority to have access to classified information is not permanent but can be withdrawn by the
originating authority.
Types of Security
1. Industrial Security – a type of security applied to business groups engaged in industries like manufacturing,
assembling, research and development, processing, warehousing and even agriculture.
2. Operational Security – Deals with primarily with the protection of process, formulas, patents, and other
operational activities of an installation.
3. Communication Security – The application of various measures which prevent or delay the enemy or
unauthorized persons in gaining information through the communication system. It includes transmission
security and crypto security.
4. Document Security – It encompasses the protection of documents and other classified papers from loss,
unauthorized access, and avoidance of disclosures.
5. Hotel Security – a type of security applied to hotels where its properties are protected from pilferage, loss,
damage, and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest
themselves. This type of security employs house detectives, uniforms guard and supervisor and ensures that
hotel guests and their personal effects safeguarded.
6. Bank Security – this type of security is concern with bank operations. Its main objective is the protection of
bank cash and assets, its personnel and clientele. Security personnel are trained to safeguard bank and
assets while in storage, in transit and during transactions.
7. Crisis Security – Specialized field which allied if not part of VIP security which involved in the kidnapping of
VIP’s such as political leaders and the like. Motives can be economic, political, emotional, nationalistic,
religious and their combinations.
PART 2:
Physical Security
PHYSICAL SECURITY
Physical security measures are being used to defined, protect, and monitor property rights and assets. These
measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to
equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage and
theft.
Concept:
1. Enemy Agents must have access - In most cases espionage, acquisition of information is the ultimate result,
and means and form in which information is obtained is merely an operational detail. Normally, information on
tapes and film is as usable as the original documents. Therefore, in considering access, one should think not
only of current physical access, but also access to the discussion of the matter by the use of clandestine
listening device.
2. There is no impenetrable barriers – In an unfriendly government or organization is willing to devote enough
time, money, personnel, materials and imagination to passing a barrier, it can do so. So, we attempt to build
defense in depth by using then one barrier.
3. Surreptitious VS non-surreptitious entry – The possibility of surreptitious entry is the greatest hazard from
the standpoint of counterintelligence security because it is usually difficult to neutralized the act of espionage
because surreptitious entry is not usually detected.
4. Each installation is different - Since each installation is different each will have different problems to
overcome. The security procedures will not be adequate for all installations.
Barrier defined
A barrier can be defined as any physical structure whether natural or man-made capable of restricting,
deterring, delaying, or preventing illegal and unauthorized access to an installation.
7. Fence area: The area surrounding the fence should be clear of trees and vegetation and debris or other
materials which would offer concealment to the intruder or would aid him in scaling.
8. Fence Gate: Gates should be limited to the number necessary for efficient and safe operation of the
installation.
9. Fence opening: all opening in the fence in excess of 96 inches must be lock, barred, or screened in such a
way that they may only be unlocked and opened from the inside and only by selected personnel.
10. Multiple fence: If used, multiple fences should be at least ten feet apart and the overhang on the top of the
inner fence should point inward rather than away from the installation maximum distance any two parallel
fences should not exceed 150 feet.
1. Natural Barriers
Advantage:
a. They provide a protection system without additional cost to the installation.
b. The difficulty to penetrate an installation increase according to the barrier.
Disadvantage:
a. Trees, ravines, vegetation could serve as a hiding place to any possible intruder.
b. Installation that has as barrier a body of water could be subject to penetration through a team of divers.
2. Man-made Barriers – are structural construction like fences walls, floors, roofs, grills, bars, roadblocks, or
other physical means to deter or impede penetration.
Fences: Fences are independent structures, generally in a vertical plane, designed for the physical and or
visual control of access to external.
Types of Barriers
1. Natural Barriers – it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are
difficult to traverse.
2. Structural barriers – these are features constructed by man regardless of their original intent that tends to
delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
3. Human barriers – persons being used in providing a guarding system or by the nature of their employment
and location, fulfill security functions. Examples are guards, office personnel, shop workers, etc.
4. Animal barriers – animals are used in partially providing a guarding system. Dogs are usually trained and
utilized to serve as guard dogs. German shepherds are best suited for security functions. Goose and turkeys
could also be included.
5. Energy barriers – it is the employment of mechanical, electrical, electronic energy imposes a deterrent to
entry by the potential intruder or to provide warning to guard personnel. These are protective lighting, alarm
system and any electronic devices used as barriers.
Types of Fences
1. Solid fence – constructed in such a way that visual access through the fence is denied. Its advantage is that
it denies the opportunity for the intruder to become familiar with the personnel, activities and the time
scheduled of the movements of the guards in the installation. On the other hand, it prevents the guards from
observing the area around the installation and it creates shadow that may be used by the intruder for cover and
concealment.
2. Full-View fence – it is constructed in such a way that visual access is permitted through the fence. Its
advantages are that it allows the roving patrols and stationary guard to keep the surrounding area of the
installation under observation. On the other hand, it allows the intruder to become familiar with the movements
and time schedule of the guard patrols thereby allowing him to pick the time that is advantageous on his part.
PROTECTIVE LIGHTING
The idea that lighting can provide improve protection for people and facilities is as old as civilization.
Protective lighting is the single most cost-effective deterrent to crime because it creates a psychological
deterrent to the intruders.
Areas to be lighted
1. Perimeter fence
2. Building face perimeter
3. Pedestrian Gate – Should be lighted about 25 feet on either side of the gate if possible and the range for
vehicular gates should be twice that of street lighting is recommended in these applications, but floodlights can
also be used if glare is strictly controlled.
4. Vehicular Gate – Normally manned by guards inspecting credentials, as well as inspecting for contraband
or stolen property, it is critical that the area to be lighted to at least one foot candle.
5. Parking area – This include vital building, storage depots, and vulnerable control points in communication
power, light and were distribution system.
6. Storage, large opened working areas, piers, docks, and other sensitive areas.
Alarms – Aural or visual signal given by the annunciator to security when intruder actuates device in a
protected area. An annunciator is a visual or audible signaling device which initiates conditions of associated
circuits.
Basically, alarm systems are designed to alert security personnel to consummated or attempted intrusions into
an area, building or compound. Each type of alarm is activities in the event that an intruder tempers with the
circuitry, a beam or radiated waves. Intrusion alarm can be electrical, mechanical or electronics. Alarms are
also used for fire, smoke or other emergencies and presence of other hazards.
PROTECTIVE ALARMS
Protective alarm - is one of the important barriers in security. It assists the security in detecting, impeding, or
deterring potential security threat in the installation. Basically, its function is to alert the security personnel for
any attempt of intrusion into a protected area, building or compound. Once an intruder tampers the circuitry,
the beam or radiated waves of the alarm system, it will activate an alarm signal.
On the other hand, the use of communication equipment in the installation helps security in upgrading its
operational efficiency and effectiveness.
Kinds of Alarms
1. Audio Detection Device – it will detect any sound caused by attempted force entry. A supersonic
microphone speaker sensor is installed in walls, ceilings, and floors of the protected area.
2. Vibration Detection Device – it will detect any vibration caused by attempted force entry. A vibration
sensitive sensor is attached to walls, ceilings, or floors of the protected area.
3. Metallic foil or wire – it will detect any action that moves that foil or wire. An electrically charge strips of
tinfoil or wire is used in the doors, windows, or glass surfaces of the protected area.
4. Laser Beam Alarm – a laser emitter floods a wall or fencing with a beam so that when this beam is disturbed
by a physical object, an alarm is activated.
5. Photoelectric or Electric Eye Device – an invisible/visible beam is emitted and when this is disturbed or when
an intruder break contact with the beam, it will activate the alarm.
6. Microwave Motion Detection Device – A pattern of radio waves is transmitted and partially reflected back to
an antenna. If they strike a moving object, they return at a different frequency which results in initiating an
alarm signal. Very effective for protection of interior areas. This have a good Coverage, and not affected by air
currents noise sound.
Disadvantage:
Tellers with platform shoes, itchy feet, or using brooms and other articles will often inadvertently cause a false
alarm.
Bill traps
1. Bill traps or currency activation devices are usually place in the teller’s cash drawer and connected to the
alarm system using a wire connector. When currency is removed from the devices, the alarm is activated.
2. The advantage of these devices is that the robbers themselves frequently remove the currency and activate
the alarm. This is particularly helpful when the employees are immediately force to leave their station without
having had an opportunity to activate the alarm safety.
Foot Button
Like the foot rail permit alarm activation in relatively safety while both hands remain clear in view of the
robbers.
Lock Defined
A lock is defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry into a
building, room, container or hiding place.
Types of Locks
1. Key operated mechanical lock – it uses some sort of arrangement of internal physical barriers (wards
tumblers) which prevent the lock from operating unless they are properly aligned. The key is the device used
to align these internal barriers so that the lock may be operated.
Type of Keys
1. Change key – a specific key, which operates the lock and has a particular combination of cuts, or biting,
which match the arrangement of the tumblers in the lock.
2. Sub-master Key – a key that will open all the lock within a particular area or grouping in a given facility.
3. Master Key – a special key capable of opening a series of lock.
Key Control
Once an effective key control has been installed, positive control of all keys must be gained and maintained.
This can be accomplished only if it is established in conjunction with the installation of new locking devices.
The following methods can be used to maintain effective key control;
1. Key Cabinet – a well-constructed cabinet will have to be procured. The cabinet will have to be of sufficient
size to hold the original key to every lock in the system. It should be secured at all times.
2. Key record – some administrative means must be set up to record code numbers and indicates to whom
keys to specific locks have been issued.
3. Inventories – periodic inventories will have to be made of all duplicate and original keys in the hands of eh
employees whom they have been issued.
4. Audits – in addition to periodic inventory, an unannounced audit should be made of all key control records
and procedures by a member of management.
5. Daily report – a daily report should be made to the person responsible for key control from the personnel
department indicating all persons who have left or will be leaving the company. In the event that a key has
been issued, steps should be initiated to ensure that the key is recovered.
Peterman – a term used in England for lock pickers, safecracker and penetrators of restricted rooms or areas.
Master Keying System– a system used in big installation whereby keys can open a group or group of locks.
Maison Keying- the issue of key to open main entrance gate and office.
Security Cabinet
The final line of defense at any facility is in the high security storage where papers, records, plans or cashable
instrument, precious metals or other especially valuable assets are protected. These security containers will
be of a size and quantity, which the nature of the business dictates.
In protecting property, it is essential to recognize that protective containers are designed to secure against
burglary or fire. Each type of equipment has a specialized function and it will depend on the owner of the
facility which type that is going to use.
2. Vault – heavily constructed fire and burglar resistance container usually a part of the building structure used
to keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but smaller than
a file room.
1. The vault door should be made of steel at least 6 inches in thickness.
2. Vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
3. Electrical conduits into the vaults should not exceed 11/2 in diameter.
4. Vault floor should be higher by four inches with the surrounding floors and if in level with the floor buttons,
storage container should be raised at least 4 inches above the floor.
5. Vault should not be made part of the wall due to moisture and condensation caused by temperature.
6. Standard vaults, to reduce destroying of too many records, should not be more than 5,000 cubic feet.
-The vault must be resistive up to 6 hours.
3. File room – a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate
limited people to work on the records inside.
1. The file room should at most be 12 feet high.
2. The interior cubage should not more than 10,000 cubic feet.
3. The ventilation should be through the door.
4. It must have a watertight door and at least fireproof for one hour.
-The supporting structure, the walls, floor, and roof should be made fire-proof.
3. Multiple pass system – this provides an extra measure of security by requiring that an exchange take place
at the entrance of each restricted area.
Specific solution will depend upon the nature of the business, obviously retail establishment, which encourage
high volume traffic, and which regularly handle a great deal of merchandise both in and out, have a problem of
a different dimension from the industrial operation working on a highly classified government project. Both,
however, must work from the same general principles towards providing the greatest possible security within
the efficient and effective operation of the job at hand. Traffic controlling includes.
1. Identification of employees and visitor and directing or limiting their movements.
2. Control of all incoming and outgoing packages; and
3. Control of trucks and private vehicles.
Personnel Identification:
The most practical and generally accepted system is the use of badges and identification cards. Generally
speaking, this system designates when and where and how passes should be displayed, and to whom, what is
to be done in case of the loss of the pass; procedure for taking a pass from terminating employees; and a
system in cancellation and re-issue of all passes; either as a security review or when a significant number of
badges have reported lost or stolen. To be effective:
1. Badge must be tamper-resistant, which mean that they should be printed or embossed on a distinctive stock
with a series of design difficult to reproduce.
2. They should contain a clear and recent photograph of the bearer, preferably in the color.
3. The photograph should be at least one-inch square and should be updated every two or three years or when
there is any significant change in facial appearance; and
1. Packages shall be authorized to be brought inside the industrial installation, offices, and work area without
proper authority. This basic precept help reduce if not eliminate pilferage, industrial espionage, or sabotage.
2. Outgoing packages carried by personnel should be closely inspected and those in vehicles should also be
checked as many pilfered items are hidden in the surface of the vehicles leaving the compound.
3. Any personnel/Visitor entering the installation with a package should deposit the same to the security and in
return receives a numbered tag, which he/she will use in claiming his/her package upon departing.
Appropriate warning signs should be posted at the building perimeter. Special restricted entry facilities to
public access should be provided. This will be dependent on the degree of security needed for the protection
of property, activity, and other processes within the building.
The access to the restricted area shall be limited to authorize personnel who have the direct involvement with
the installation, construction and operation and maintenance of eh equipment and systems and/or use of eh
materials contained within the restricted area. A clear-cut policy on the access control should be disseminated
to all personnel of the installation.
PART 3:
Personnel Security
Of the three major aspects of security, personnel security is considered as the most important. This is for the
simple reason that security involves people, both an asset to be protected and as source of security threats. It
is an acknowledge fact that losses are attributed mainly to negligence or active participation of employees,
either through theft and sabotage. This emphasizes the need to set up a system of hiring the people for the
company.
To protect the organization from undesirable persons the personnel security process requires the following
main elements:
1. An appropriate recruitment and hiring policy.
2. The use of screening devices to assist in applicant selection process.
3. A background investigation of applicants.
4. The carrying out investigation into activities of current employees suspected of violating company rules.
5. Assisting employees to protect themselves through security awareness and educational program.
6. The protection of employees from discriminatory hiring or terminating procedures, as well as unfounded
allegations of illegal or unethical activities and conduct.
SCREENING APPLICANT
The most effective tools available in the most effective tools available in employee selection are the application
form, and the interview.
This verifies the accuracy and completeness of the subject’s application form and can also develop additional
relevant information. The governing standards are the needs of the company and the fairness to the applicant.
Applicant rejection should be decided on the basis of pre-defined standards which have been carefully worked
out with the Personnel Department
a) Such standards must be strictly adhered to, and
b) Reviewed regularly and updated where necessary.
Components of Complete BI
1. Applicants Name
2. Date of birth
3. Present residence address
4. Personal History
5. Marital History
6. Residence History
7. Citizenship
8. Physical Data
9. Educational History
10. Organization membership
11. Neighborhood investigation
12. Character reference
13. Employment History
14. Military History
15. Foreign travel history
16. Criminal record
17. Credit records
18. Applicant’s signature
19. Date of application
Investigative Coverage
1. Prior employment back at least seven consecutive years should be verified. You will need to get
explanations for gaps greater than one month.
2. Claimed residence for the period covered in employment and educational institutes should
be verified.
Investigative Standards
1. Information sought should be relevant to the hiring decision.
2. Be reliable (i.e., have a good probability of being correct)
3. If unfavorable, be confirmed by at least one other source.
Investigative Review - all completed investigation should be reviewed by an responsible supervisory employee
so that all applicants are measured to the same standards.
E. Financial and Lifestyle inquiry – this type of investigation seeks to gather information on income and mode
of living, sometimes referred to as the earning-to-debt ratio.
To gather basic information on income and the mode of living. Called Earning to Debt Ratio’.
All employees subject to this type of enquiry should be advised in writing at start of their employment of
company policy regarding this.
It is usually used on consideration for:
1. Promotion to a significantly more responsible job.
2. Assignment to significantly more sensitive duties.
3. Cyclical basis for staff in sensitive posts.
4. To establish whether certain employees are engaging in activities for which disciplinary action can be taken.
F. Undercover Investigation – this is the placement of an agent in a role in which the agent’s true identity and
role remains unknown, in order to obtain information for criminal prosecution or for recovery or limitation of
asset losses.
MISCELLANEOUS MATTERS
1. Personnel Dept, and security managers responsible for personnel clearance investigations should keep
abreast of changes in law by statutes or court decisions.
2. Remember an employee has the right his pre employment investigation file and reasonably
challenge any findings.
3. In some countries criminal records are a matter of public record, felonies are filed in superior courts and
misdemeanors in municipal courts
G. Exit Interview:
An ‘exit-interview’ is a valuable tool because it:
a) gives the employee an opportunity to list grievances.
b) offers management the opportunity to learn of problems not previously known.
c) can help reduce losses when a checklist is employed to return company issued property;
d) the interview is also used to remind departing employees of their legal obligation to protect trade secrets or
confidential information.
Bonding:
Used by some firms, as a type of insurance, against loss where company controls prove ineffective.
Bonding should never be considered as an alternative to an effective security program
SECURITY EDUCATION
Security Education is conducted to develop security awareness among employees of the company. It should
cover all employees, regardless of rank or position.
Protection of document and information entails a mammoth task on the part of eh executives and the staff of
the installation. There should be a clear understanding on all the types of documents and information of the
organization. Security measures in the classification, handling, care, and proper disposition of classified
documents and information must be a primary concern in order to preserve the confidentiality and integrity of
document and information throughout all phases of its existence.
- If an organization has no plan for seeing that all records/ documents flow smoothly through the record cycle, it
will be faced with more of the following problems which may severely drain profits; 1) an unmanageable tangle
of papers within the office; 2) wasted clerical effort searching for information; 3) loss of important operating
information; 4) extravagant use of operating information; 5) possible loss of key information in defending the
company against legal or governmental inquiries.
Categories of Document
Category A
1. Information which contains reportable time sensitive, order of battle and significant information.
2. It should be given priority because it is critical information.
3. It must be forwarded without delay.
4. It is critical to friendly operations.
5. It requires immediate action.
Category B
1. Anything that contains communications, cryptographic documents, or systems that should be classified a
secret and requires special handling.
2. Higher authorities should declassify it.
Category C
1. Other information, which contains something that, could be an intelligence value.
2. Contains exploitable information regardless of its contents.
3. Unscreened materials/documents should be categorized as Category C.
Category D
1. No value, yet lower level will ever classify documents as category D.
2. No decision must be made at the lower echelon that document has no value.
3. It is the responsibility of the higher headquarters.
Types of Documents:
Class I – Vital Documents:
In this category these are records that are irreplaceable, records of which reproduction does not have the
same value as the original; records needed to recover cash, to replace building, equipment’s, raw materials,
finished products, and work in process and records needed to avoid delay in restoration of production, sales
and services.
Class II – Important Documents:
This includes records the reproduction of which will close considerable expense and labor, or considerable
delay.
Class III – Useful Documents
This includes records whose loss might cause inconvenience but could be readily replaced and which would
not in the meantime present an insurmountable obstacle to the prompt restoration of the business.
Class IV – Non–essential Documents:
These records are daily files, routine in nature even if lost or destroyed, will not affect operation or
administration. This class represent the bulk of records which should not be even attempted to be protected in
INSTRUCTIONS. Multiple Choices: Read each statement in every number and identify what is being
described, defined, or asked and select the letter which corresponds to your answer, then write your answer
before the number.NO ERASURES ALLOWED:
48. It is the managing of money, men, materials and methods within security system.
A. Security Management C. Management
B. Industrial Security Management D. Any of these
49. These security containers will be of a size and quantity, which the nature of the business dictates.
A. Safe C. Vault
B. File room D. Security Cabinet
50. The decision-making process made by executives in preparation of accomplishing goals and objectives
within an organization.
A. Security Plan C. Security Planning
B. Security Program D. Security Management Plan
Objectives:
At the end of this module, the students should be able to:
1. Define and Discuss RA 11917.
2. Conceptualize and explain Management and Administration.
Part 1
RA 11917
The Private Security Service Act of 2022
BOOK I
PRELIMINARY AND GENERAL PROVISIONS
Rule 1. Declaration of Policy
Section 1. Scope. The organization, operation, business, and activities of Private Security Professionals
(PSPs), Private Security Agencies (PSAs), Company Security Units (CSUs), Government Security Forces
(GSFs), and Private Security Training Agencies (PSTAs) shall be governed by Republic Act No. 11917 and
this IRR.
Section 2. Construction and Interpretation. These Rules shall be construed and interpreted in the light of the
State policies declared in Chapter I, Section 2, of RA 11917, which stipulates that:
“The State recognizes the vital role of the private sector in the protection of the people and safeguarding of
property as well as maintenance of peace and order in the country. Towards this end, the State shall adopt
measures to strengthen the regulation of private security services industry and establish quality standards to
ensure competent private security personnel and professionals that complements our law enforcement
authorities in preservation of public order in the country.”
Rule 2. Definition of Terms
Section 3. Definition. For purposes of and when used in this IRR, the following terms shall be construed in the
sense indicated herein unless the context of a particular section clearly indicates that a different sense is or
meaning intended:
a. Answer- refers to a pleading in which the respondent or other adverse party sets forth the negative and
affirmative defenses upon which he relies.
b. Authentication- refers to the service and procedure being conducted by SOSIA of verifying the authenticity
genuiness or faithful reproduction of LESP, LTO, or any document related thereto.
c. Alunan Doctrine- refers to Letter of Instructions 01/93 (Paglalansag "Charlie") issued by former Secretary
Rafael M Alunan III, DILG/Chairman Joint Cabinet Task Force OPLAN Paglalansag dated November 11, 1883
which sets forth the specific operational objectives, concepts, and tasks to be strictly followed by all concerned
Training aids will be placed at the discretion of the evaluator and can be placed anywhere from a minimum of
one (1) foot below surface level to a maximum of eight (8) feet above surface level.
Section 271. Aircraft or Watercraft, Rail Coach and Bus Search. The search shall be at the discretion of the
evaluator. It could be interior or exterior of the aircraft along will ground support equipment. All training aids
shall be placed in a manner such that the EDD cannot retrieve the same.
Section 272. Evaluation. The evaluator will determine if the explosive detector dog team will be certified upon
the completion of the test. The handler and EDD will be considered as a team which will be certified. If the
EDD changes handler, a new Team exists and the team needs to be certified anew.
Section 273. Certification. For certification, the explosive detector dog team cannot miss more than one (1)
training aid in all phases of testing. If the tested explosive detector dog team has more than one (1) training
aid missed, which is a FAILURE, then the team must RETEST in all phases. All testing will be done on PASS
Concept of Management:
The process of planning, organizing, actuating and controlling an organization’s operations in order to achieve
coordination of the human and material resources essential in the effective and efficient attainment of
objectives.
Five general functions:
1. planning
2. organizing
3. staffing
4. leading
5. controlling.
Security Management- The broad field of management related to asset management, physical security, and
human resource safety functions. It entails the identification of an organization's information assets and the
development, documentation and implementation of policies, standards, procedures, and guidelines. Security
management is the identification of an organization's assets (including people, buildings, machines, systems,
and information assets), followed by the development, documentation, and implementation of policies and
procedures for protecting assets.
Security management concepts and principles:
1. These are inherent elements in a security policy and solution deployment.
2. They define the basic parameters needed for a secure environment.
3. They also define the goals and objectives that both policy designers and system implementers must achieve
to create a secure solution.
Industrial Security Management - The utilization of all available resources within a security organization in
order to function and attain its goal and objectives. It is the managing of money, men, materials, and methods
within security system.
"Industrial Security Management emphasizes the general security techniques and the ethical responsibilities of
those involved, and “the skillful handling of the security and safety measures of business enterprises and
industrial establishments.”
Importance:
Corporations are always at a risk of intrusion and information leakage hence vast knowledge in security and
protection is required to execute and manage an entire security system. Security systems are a compulsory
necessity in all types of industries.
Industrial:
Relating to industry: of or relating to factories, the people who work in factories, or the things made in
factories.: having a developed industry: having factories that actively make a product. : coming from or used
in industry : made or used in factories also : stronger than most other products of its kind.
The decision-making process made by executives in preparation of accomplishing goals and objectives within
an organization.
SECURITY HAZARD
someone who could damage an organization by giving information to an enemy or competitor.
Hazard:
Is any source of potential damage, harm or adverse health effects on something or someone. Basically,
a hazard is the potential for harm or an adverse effect (for example, to people as health effects, to
organizations as property or equipment losses, or to the environment).
Definition of terms:
Risk – is the potential damage or loss of an asset. The level of risk is a combination of two factors: The value
placed on that asset by its owner and the consequence, impact adverse effect of the loss or damage to that
asset and the likelihood that a specific vulnerability will be exploited by a particular threat.
Adversary – an individual, group, organization, or government that conducts activities or has the intention and
capability to conduct activities detrimental to the individual, private or government entity.
Asset – any information, facility, material, information, or activity which has a positive value to its owner
whether it is an individual, private or government entity.
Vulnerability – any weakness that can exploit by an adversary to gain access to an asset.
Countermeasures – an action taken, or a physical entity used to reduce or eliminate one or more
vulnerabilities. The cost of possible countermeasures may be monetary but may also include non-monetary
cost such as reduced operational efficiency, adverse publicity unfavorable working conditions, and political
consequences.
Probability – The chance or likelihood that a loss will take place. Indicated by a mathematical statement
concerning the possibility of an even occurring.
Criticality – the impact of a loss as measured in financial terms. How important it is in terms of the survival or
existence of the organization.
Risk Reduction – decreasing the risk by minimizing the probability of the potential loss. The reduction of
criminal opportunity is often accomplished by situational crime prevention strategies to discourage, deter, or
deny criminal incidents.
Risk Spreading – spreading the risk through compartmentation or decentralization to limit the impact (criticality)
of the potential loss.
Risk Transfer – moving the financial impact of the potential loss-over to an insurance company.
Risk-Self assumption – planned assumption and acceptance of the potential risk by making a deliberate
managerial decision of doing nothing about the threat or setting aside resources for use in case of a specific
loss incident.
SECURITY HAZARDS
Any act or condition, which may result in the compromise of information, loss of life, loss or destruction of
property or disruption of the objective of the installation.
Types of Hazards
1. Natural Hazards – these are hazards which arise from natural phenomena. The following are types of
natural hazards or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Fire (not caused by human action)
d. Storms (typhoons, cyclones, tornado and hurricane)
e. Lighting storms
f. Extreme temperature and humidity
2. Human-man made Hazards – These are hazards which are the result of a state of mind, attitude,
weaknesses, or character traits of one or more persons. They can be acts of commission or omission, both
overt and covert, which can disrupt operation of a plant or installation. The following are types of human or
man-made hazards:
a. Carelessness – accidents and dissatisfaction
b. Disloyalty –subversion and sabotage
c. Espionage, pilferage, and theft
d. Vandalism, etc.
Pilferage:
This is one of the most annoying and common human hazards which security has to deal with. This activity it
uncontrolled can become a financial drain if not a menace to smooth and orderly operation. Due to this,
security force has to concentrate large number men to check this nefarious and disconnecting activity. Petty
pilferage is frequent, hard to detect, difficult to prove and win conviction but dangerous to ignore.
Types of Pilferers
1. Casual Pilferer – one who steals due to his inability to resist the unexpected opportunity and has little fear of
detection is no plan or premeditation and he is usually a “loner” on the job. The temptation to pick up the
article is basically due to poor security measure. The implication of causal pilfering is the big cumulative cost if
it remains unchecked.
2. Systematic Pilferer – one who steals with preconceived plans and takes away any or all types of items or
supplies for economic gain. Pilferers of this kind can be employees or outsiders of the establishment.
Anatomy of Pilferage
1. Where need or desire exists and opportunity is present, theft is almost sure to result.
2. Pilferage occurs everywhere. Opportunities for pilferage increase when supplies or goods are transported
or transferred from one place to another.
PART III
Guard Force Administration
B. Human Barriers:
1. Guard Procurement: Selection criteria:
a. Must be eligible for security clearance.
b. Vigorous and physically able to serve in the capacity of a guard.
c. Intelligence necessary to accomplish the guard function.
d. The ability to make rapid decisions and react in a calm way to emergencies:
e. Loyalty and discretion are required attributes; and
f. experience is highly desirable although not usually mandatory.
4. Guard supervision:
a. Personal supervision: Personal inspection of all guards prior to their starting tour of duty. Periodic checks of
guards during their tour by the senior member of each relief or his representative.
b. Artificial Supervision:
1. Recorded tour – guard takes with him on his tour of duty a form which must have the time punched on it at
each station.
2. Supervisory Tour – This is where the guard sends signals to guard headquarters from each station that he
checks.
5. Guard equipment’s:
a. Distinctive uniform
b. Credentials
c. Weapons – 38 revolvers, 45 pistols
d. Whistle
e. Notebook
f. Flashlights
g. Nightsticks
h. other uniform or equipment’s as may be directed by the unit SOP.
6. Guard communication:
a. Primary Communication – direct line telephone or in some instance radio.
b. Emergency Communication – ex. Messengers
DISCUSSION:
Objectives:
Part 1
Security Survey and Inspection
Security Survey is defined as a critical on-site physical examination and analysis of an industrial plant,
business, a home or public or private institution done to ascertain the facility’s current security status, to
identify deficiencies or excess in current practices, to determine what protection is needed and to make
recommendations for improving the overall level of security at that installation. As previously noted, security
survey is a general term that often encompasses other related procedures.
SECURITY INSPECTION
Another important activity, which is necessary to ensure the integrity of the overall security programs, is
security inspection. This complements security survey in its attempt to prevent losses of company properties.
Security inspection is the process of conducting physical examination to determine compliance with
established security policies and procedures as a result of security survey.
Security inspection is conducted for two reasons: to check on the degree of compliance with the recommended
countermeasures and to determine the effectiveness and adequacy of the countermeasures which are in
effect.
2 Formal or Informal
For the company which has just upgraded the security function, hired a new security administrator, or initiated
a security department and program. The formal approach to inspection is most desirable, primary because it
tells the company how senior management feels about protection, and thus establishes the desirable climate.
a. Formal Inspection is one which some fanfare is attached. It is usually preceded by an announcement, and
the unit under inspection “prepares” for events, including some extra housekeeping activities that would not
otherwise happen at that point in time.
b. Informal Inspection is usually the result of a long and firmly entrenched inspection program, understood by
all and accepted as part of the organizational life. The inspection has been stripped of all external trappings of
importance, but their functional importance has not been lessened in any manner. They are seriously and
quietly executed in a spirit of understanding and cooperation.
Part 2
EMERGENCY and DISASTER MANAGEMENT
Emergency planning is one of the harsh realities that an installation will encounter is the occurrence of a
disaster or emergency. Any of these can be regarded as a potential event, occurrence or condition outside the
scope of normal business activities with significant potential for death, injury, property damage, assets
diversions or other favorable impact upon the installation. It is for this reason that the owner of the installation
or its executives will decide in advance what to do and how to counter the effects of any emergency in order to
assure continuity of operations.
Emergency Defined
Disaster Defined
Disaster is the unscheduled event that causes by emergency. It upsets the performance of valued activities of
the community in two ways: there is a drastic increase in demand for certain services and there is reduction in
the capability to perform services.
Crisis Defined
Crisis is the turning point of a disaster or emergency, if not contained or controlled.
Types of Emergencies
1. Earthquake
2. Typhoon
3. Tsunamis
4. Volcanic eruption Fire
5. Fire
6. Explosion (Bomb, flammable liquids, gases, etc.)
7. Building collapse
8. Leakage of gas or toxic fumes
9. Bomb threat
10. Strikes
11. Work accidents
12. Enemy attack/action
Responding to an emergency situation requires special capabilities and considerations. First, the ERT must
identify the kind of emergency. Then, the operation plan (OPLAN) formulated for the said emergency must be
put into effect as quickly as possible.
The person receiving the bomb threat should attempt to ask the caller certain questions: when is the bomb
going to explode? Where is the bomb right now? What type of bombs it is? What does the bomb look like?
What will cause the bomb to explode? Why did you place the bomb?
Remember that the caller may not answer your question, but any additional information that he may relate will
be helpful. It may be advisable to inform the caller that the building is occupied and the detonation of a bomb
could result in death or serious injury to many innocent people.
Once the telephone threat is received, notify your local police at once.
Part 3
Report Writing /Security Investigation/Logbook
Report:
It is a story of actions performed by men.
- A chronological, step by step, account entirely or almost entirely a factual account of the incidents that took
place in a given event. Or it is the story of actions that were actually performed by flesh and blood human
beings.
Note Taking:
The process of jotting down important matters and events of a certain incident or activities.
Report Writing:
The processes of finalizing note taking where in the six important elements of reports writing are present.
WHO - This pertains to some information regarding the victim, suspect, witness, owner, and property?
Complete and correct name. Wrong names result in failure to locate a witness or apprehend a suspect. The
spelling should be correct; name, including the middle initial or name should be exact.
Exact home address (be it a residence or a hotel) and telephone numbers.
Relative questions under WHO may include the following:
a. Who was present at the crime scene: witness, suspects, victims, etc?
b. Who was apprehended?
c. Who discovered the evidence?
WHERE - This question is concerned with the geographical location of the crime scene, property or evidence.
1. Where was the offense committed?
2. Where was the property found?
3. Where was the evidence found?
WHEN - This question includes the date and time when the offense was committed; property found; suspect
apprehended.
1. When did the police officer arrive?
2. When was the crime discovered?
3. When was the suspect apprehended?
HOW - This question refers to the general manner in which the crime was committed.
1. How was the crime reported?
2. How were certain tools used?
3. How was the crime committed and discovered?
WHY - Under this heading is listed the object or desire which was motivated the offense. For example:
1. In the crime against persons, the object of the attack might be revenge, ransom or rape.
2. In crimes for gain, the reason may be to acquire money or property.
Generally, the WHO, WHEN, and WHERE will appear at the beginning of the report. The reader needs to
know the persons involved, the time the incident happened and the location at which it took place.
WHAT HAPPENED is usually unfolded throughout the report. The HOW is closely related to WHAT. The
WHY may belong before or after the WHAT, depending on the situation.
Sample Report:
BENJAMIN SECURITY AGENCY CORPORATION (Company Name)
Gen Luna Rd. Baguio City (Address)
Tel.444-1234(Tel/Cel.Number)
SUBJECT : SPOT REPORT RE: FIRE INCIDENT BESIDE CENTENNIAL BLDG. (type of report)
On or about 1745H, 28 November 2015, there was a fire incident occurs beside University of Baguio
Centennial Building. Located at Assumption Road Baguio City.
Prior to the incident, I observed a big smoke and flame to a private property besides Centennial building. This
prompted the undersigned to proceed and check /inspect the area that turned out to be a fire from the
mentioned area. Upon assessment, it was learned that the fire originated from a grass fire burned by the
caretaker of the said private property beside Centennial building, So I, with the Security Marshall, and student
from the Graduate School who are police officers who aid us to put out the fire. After the fire was eliminated,
the undersigned immediately call the superior officer to report the incident.
Respectfully yours;
Elements of Investigation
Investigator
Purpose
Subject of Investigator
Tools of Investigation
1. Information – knowledge which the investigator gathers from other persons.
-Acquired from regular sources – conscientious and public-spirited citizens, company files, school files
or records file of other agencies.
-Acquired from cultivated sources – paid informants, bartenders, cab drivers, acquaintances, etc.
2. Interrogation – the skillful questioning of a person who is reluctant to divulge information concerning the
offense under investigation.
3. Interview – the simple questioning of a witness who has no personal reason to withhold information.
4. Instrumentation – the application of instruments and methods of physical sciences to the detection of
crimes. In other words, the sum total of the application of all sciences in crime detection otherwise
known as criminalistics.
SUBJECT:
AUTHORITY
This section should contain a brief statement of when, where and by whom the investigation was made and
should cite the authority for making it.
MATTERS INVESTIGATED
This section of the report represents the mission of the investigator. In essence, it answers the question: what
is the investigation all about?
DISCUSSION
This section set forth when appropriate, the presumption and inferences from all the circumstances in the case
to give the directing authority the clearest possible picture. It should contain such related factual matter of
argument as may be necessary in addition to the facts presented, to establish the conclusions and
recommendation based thereon.
CONCLUSION
This represents concise summary of the results of the investigation directly consequent from and supported by
facts. These logically follow from the facts of case of found and set forth in the report. They are usually stated
in the order naturally suggested by the statement of the allegations or facts.
RECOMMENDATIONS
This should contain the practical suggestions as to appropriate action to be taken to make suitable position of
all phases of the case. They should follow, as far as practicable, the same sequence as was used in the
presentation of conclusion.
______________________
Investigator
Logbook:
A record book used by security personnel while in the actual service of duty.
1. Events to be recorded:
1. Movements of people.
2. Transfer of properties both internal and external.
3. Accidents.
Note: All logbooks property of “security agency name” (in front cover) should have label tags, duties and
responsibilities (Inside front cover), and emergency numbers (inside back cover).
INSTRUCTIONS:
Multiple Choices: Read each statement in every number and identify what is being described, defined or asked
and select the letter which corresponds to your answer, then write your answer before the number. NO
ERASURES ALLOWED:
1. The value placed on that asset by its owner and the consequence, impact adverse effect of the loss or
damage to that asset and the likelihood that a specific vulnerability will be exploited by a particular threat.
A. Security hazard C. Risk Management
B. Risk D. Risk Analysis
2. Who has the primary responsibility of determining the classification level for information?
A. The functional manager C. The owner
B. Senior Management D. The user
3. A conference or dialogue between the survey team and management officials of a plant before security
survey is conducted.
A. Fail Safe C. Exclusion area
B. Exit Conference D. Entrance Conference
4. Any sudden, extraordinary misfortune in nature that can result to injuries death, and property loss.
A. natural disaster C. natural occurrence
B. natural calamity D. natural damage
5. This occurs when an individual or group disrupts the normal place and tranquility of a community or the
operations of a business or organization.
A. civil disturbance C. civil disorder
B. human disturbance D. rallies and demonstrations
6. The simple questioning of a witness who has no personal reason to withhold information.
A. Information C. Interrogation
B. Instrumentation D. Interview
7. The report is a statement of facts on which designated authorities may base a criminal, corrective or
disciplinary action.
A. Record C. Leads
B. Information D. Prosecutive action
11. The Cardinal Principles of good Report writing which eliminates all irrelevant, unessential, and
unnecessary materials. It includes ability to make report unified, coherent, and emphatic.
A. Accuracy C. Completeness
B. Brevity D. Fairness
12. The processes of finalizing note taking where in the six important elements of reports writing are present.
A. Report Writing C. Note Taking
B. Report D. Logbook
13. A record book used by security personnel while in the actual service of duty.
A. Report Writing C. Note Taking
B. Report D. Logbook
14. Any act or condition, which may result in the compromise of information, loss of life, loss or destruction of
property or disruption of the objective of the installation.
A. Security hazard C. Risk Management
B. Risk D. Risk Analysis
15. It upsets the performance of valued activities of the community in two ways: there is a drastic increase in
demand for certain services and there is reduction in the capability to perform services.
A. Disaster C. Emergency
B. Crisis D. Typhoon
• Ajero, J M. Bank Security Management. Quezon City; Wiseman’s Book Trading Inc, c2011
• Banlaoi ,R C. Philippine Security in the Age of Terror; National, Regional, and Global in the post.9/11
World.Boca Raton CRC press,c2010
• Bermas, D S. Criminology Licensure Examination Review. Quezon City Central Professional
Book.c2003
• Bosworth, S.Computer Security Handbook. Canada.c2002
• Cordova, R V. Police intelligence. Manila: Mindshapers, c2010.
• Corpuz,W.M., and D.B.S. Delizo. Industrial Security Management Manual. Quezon City; Wiseman’s
c2011
• Delizo ,Bernard and Manwong,Rommel K. The Law Enforcement Administration Text Book in
Criminology.RK Manwong Publication 2006.
• Domingo, WC. Module in Industrial Security Management, Manila Mindshipers, c2010
• Dulipas, Benjamin O. and Peckley Miller F. Industrial Security Management Review Hand
book.Wiseman’s Books Trading.c2008
• Dulipas, Benjamin O. and Peckley Miller F . Industrial Security Management, Review Handbook for
Criminologist licensure examination. Baguio City Phil.,2007
• Guevara, Dean Ricardo M. Police intelligence and secret service Quezon City: Wiseman's Books
Trading. C2010
• Hill, Bryan, Rebecca Paynich. Fundamentals of crime mapping, 2nd ed. Burlington, Mass.: Jones &
Bartlett Learning, c2014.
• Manlusoc, A C. Police intelligence. Muntinlupa City: Stronghold Enhancement Center, c2013.
• Supan JJ (2012) The Art and Science of Security. Stone Wall Security Concepts, 63 Magnolia St.
Roxas District Quezon City 1103 Philippines.
• The Revised rules and regulation Governing the organization the Organization and Operation P.D.
Watchman, and PSA throughout the Philippines. 2003
• Compilation: Reviewer on Industrial Security Management and disaster Control. Law Enforcement
Academy 2022
b. Journals / Magazines
• RA 11131
• RA11917
• https://www.tpb.gov.ph/alpha_listing/philippine-association-of-detective-protective-agency-operators-
padpao/
• https://lawphil.net/statutes/repacts/ra1969/ra_5487_1969.html
• https://lawphil.net/statutes/repacts/ra2013/ra_10591_2013.html
• https://www.officialgazette.gov.ph/2013/12/07/implementing-rules-and-regulations-of-republic-act-no-
10591/
2. What is the most important lesson which I can apply in my daily life?