0% found this document useful (0 votes)
246 views143 pages

Module Leasec3

Uploaded by

tweeengtweng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
246 views143 pages

Module Leasec3

Uploaded by

tweeengtweng
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 143

SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY

INTRODUCTION TO
INDUSTRIAL SECURITY
LEASEC 3 CONCEPT Digitally signed by Benjamin O. Dulipas
DN: cn=Benjamin O. Dulipas, c=PH,
o=SCJPS, ou=Faculty,
[email protected]
Reason: I have reviewed this document
Location: SCJPS

BENJAMIN O.DULIPAS
Date: 2022.12.17 02:35:18 +08'00'

A Self-Regulated Learning Module


Warren Galas Moyao
A Self-Regulated Learning Module 1
MODULE CONTENTS
MODULE LESSON PAGE
ABOUT THE COURSE 3

CHAPTER 1 FIRST GRADING LESSONS 4-39

THEORIES, CONCEPT AND PHILOSOPHY OF


SECURITY AND SAFETY

CHAPTER 2 MIDTERM GRADING LESSONS 38-127

RELATED LAWS IN SECURITY AND DETECTIVE


AGENCY OPERATIONS, MANAGEMENTS AND
ADMINISTRATIONS.

CHAPTER 3 FINAL GRADING LESSONS 128-140

INDUSTRIAL SECURITY CONCEPT OF SECURITY


SURVEY, SECURITY PLAN, SECURITY TEST AND
EVALUATION, PERSONNEL CHECK, TECHNICAL
SURVEILLANCE, AND SECURITY MANAGEMENT

REFERENCES 141-142
EVALUATION OF THE MODULE 143

A Self-Regulated Learning Module 2


ABOUT THE COURSE
Course Code LEASEC 3
Course The Subject course focuses on the the theories, concepts, and philosophy of security and
safety, related laws in security and detective agency operations, management and
description
administration; and the basic industrial security concepts of security survey, security plan,
security test and evaluation, personnel check, technical surveillance, and security
management.

Requirements 1. Attendance during Virtual Classes


of the course 2. Quiz
3. Assignments
4. Recitations
5. Online Discussions
6. Reflection Papers
7. Academic Papers
8. Major Examinations
Instructor Mr. Benjamin O. Dulipas
Official Email: [email protected]
Contact Number: 09212469177

A Self-Regulated Learning Module 3


FIRST GRADING LESSONS
Objectives:
At the end of this module, the students should be able to:
1. Conceptualized the important terms of Security.
2. Define and differentiate the Three Broad Categories of Security.

CHAPTER 1: SECURITY
PART 1
SECURITY CONCEPT:
SECURITY:
Security came from the Greek word SECUROS which means safe, safety or secured. Security came from the
root word “Secure” meaning free from risk, threat, or danger. Security is the state or quality of being secured,
freedom from fear or danger; assurance; certainty. To secure is to make safe or be protected, and the defense
against crime or a state of being free.

Security, in a collective sense, is the same as protection and safety; the state of being safe and the condition of
being protected against physical, social, spiritual, financial, political, emotional, occupational, psychological, or
other types or consequences of failure, damage, error, accidents, harm or any other event which could be
considered not desirable. It is also freedom from fear, harm, danger, loss, destruction, or damage.
What is a Victim?
-The crime target

What is Victimology?
-The study of victim

The Concept of Security:


Understanding the concept of security requires further definition of other related concepts such as asset, risk,
threat, and vulnerability.
1. An asset is anything tangible or intangible that is capable of being owned or controlled to produce value. If it
has positive economic value, it is considered an asset. Or more simply, if its value can be converted into cash,
it is an asset (Sullivan & Sheffrin, 2003).
2. Risk is the uncertainty of financial loss, the probability that a loss has occurred or will occur, the variations
between actual and expected results, or the possible occurrence of an undesirable event. The end result of risk
is loss or a decrease in value (Sennewald, 2003).
3. A Potential loss or damage to an asset.

Threat and vulnerability are sometimes interchangeably used with risk.


1. A threat is anything that could adversely affect assets; it can be classified into natural hazards (such as
floods), accidents (chemical spills), or intentional acts (domestic or international terrorism).
- An activity that could lead to a loss.

2. Vulnerability means weakness, flaw, or virtually anything that may conceivably be exploited by a threat;
examples are holes in a fence, an out-of-date key system or the introduction of a computer virus (Sennewald,
2003).
-A weakness that can be used to gain access to an asset.

A Self-Regulated Learning Module 4


Types of security measures:
1. Active- by using different types of barriers.
Methods used.
a. Overt method
b. Covert method

2. Passive measures:
are those that will dates man from committing such acts for fear of being caught, charged in court, or get
dismissed; Security education programs, investigation, fire prevention seminars; personal security checks are
examples of passive security.

Purpose of Security:
The protection of establishment from any form of losses as a result of theft, robbery, pilferage, sabotage,
espionage, accident, fire and subversive activities.
3 D’s of Security:
The basic theory of any Security Program can be summed up in three words;
1. Denial – Takes the form of Physical barriers like fences, walls gates, locked doors, watch dogs, etc.
When the access is denied, the thing or area to be protected remains safe.
2. Detection – Takes the form of guards and electronic devices.
3. Deterrence – This can be both physical and psychological.
a. Physically – When attacker is delayed by walls, heavy door, high security locks. Well-constructed vaults and
safes, etc.

The Nature of Security:


1. Action of Man against Man:
Reasons: Economic, Revenge, just plain Greed, and Avarice.
2. Individual:
We should be concerned with security and protection from pilferage or theft, robberies, and disasters.

3. In the Government Service:


Background check of Personnel, and VIP protection.
4. Every Installation:
Private or Governmental need electronic alarms for disaster as well against sabotage, Pilferage and Industrial
Espionage.

Fields of Security
1. IT Fields
a. Computer Security- is a branch of information security applied to both theoretical and actual computer
systems. A branch of computer science that addresses enforcement of ‘secure’ behavior on the operation of
computers.
b. Data security- is the means of ensuring that data is kept safe from corruption and that access to it is suitably
controlled.
c. Application security- encompasses measures taken to prevent exceptions in the security policy of an
application or the underlying system (vulnerabilities) through flaws in the design, development, or destruction
of the application.
d. Information security- means protecting information and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction.

A Self-Regulated Learning Module 5


e. Network security- consists of the provision made in an underlying computer network infrastructure, policies
adopted by the network administrator to protect the network and the network-accessible resources from
unauthorized access and the effectiveness (or lack) of the measures combined together.

2. Physical Field
a. Physical security- describes measures that prevent or deter attackers from accessing a facility, resource, or
information, stored on physical media. It can be as simple as a locked door or as elaborate as multiple layers
of armed guard posts.
b. Shopping Center Security (mall or supermarket)- a type of security which is concern with the protection of
the stores, warehouses, storage, its immediate premises and properties as well as the supermarket personnel
and customers.
c. Airport security- refers to the techniques and methods used in protecting airports and by extension aircraft
from crime and terrorism.
d. Home security- are those methods use of protecting residential homes or town sites which include the
interior protection of houses against property losses or damages.

3. Political Field
a. International security- consists of the measures taken by nations and international organizations, such as
the United Nations, to ensure mutual survival and safety. These measures include military action and
diplomatic agreements such as treaties and conventions. International and national security is invariably linked.
b. National security- refers to the requirement to maintain the survival of the nation –state through the use of
economic, military, and political power and the exercise of diplomacy.
c. Human security- refers to an emerging paradigm for understanding global vulnerabilities whose proponents
challenge the traditional notion of national security by arguing that the proper referent for security should be the
individual rather than the state.

4. Monetary Field
Financial security- refers to the methods applied for the protection of fungible, negotiable instruments
representing financial value.

Layers of Security:
a. Perimeter Control – Security barriers, checkpoints at the outermost layer to anticipate/identify hostile
elements at the vicinity of the communication facility.
b. Area Access Control – Control measures undertaken to prevent entry of unauthorized person inside the
premises of communication security.
c. Control of operation Area – Final measures undertaken prior to the entry into an operating room.
d. Control of Communication Area – Final security measures undertaken prior to the entry into a
communication area.

Since security in general is very hard to comprehend, it can be divided into three major areas:
1. Physical Security – this is the broadest branch of security which concerned with the physical measures
adopted to prevent unauthorized access to equipment, facilities, material and document and to safeguard them
against espionage, sabotage, damage, loss and theft.
- Is the sum total of all physical protection employed or installed to secure the assets.
Ex. Human Guards, Perimeter fence/barrier and security devices.

2. Personnel Security – this is as important as physical security. Personnel security states even before the
hiring of an employee and remains to be maintained for as long as the person is employed.

A Self-Regulated Learning Module 6


Its purpose is to ensure that a firm hires those best suited to assist the firm in achieving its goals and
objectives and once hired assist in providing necessary security to the work force while carrying out their
functions.
Personnel Security – Is the sum total of procedures followed, inquiries conducted, and criteria applied to
determine the work suitable of a particular applicant or retention or transfer of a particular employee.
Example:
a. Procedure – Complete or partial background investigation is conducted to determine whether the applicant
should hire or not, or the same investigation is conducted to determine whether the employee should remain in
his present position or to be transferred to less or non-sensitive position.
b. Inquiry – It is a process of determining the loyalty, honesty, integrity, reputation, and others of a particular
applicant or employee.
c. Criteria – Enumerated standard like education, experience, age, citizenship, family background, potential is
being verified if true or not.

3. Document and Information Security – this involves the protection of documents and classified papers from
loss, access by unauthorized persons, damage, theft, and compromise through disclosure. Classified
documents need special handling. Lack of indoctrination and orientation among the personal handling them
can result in the leakage, loss, theft, and unauthorized disclosure of the documents.

Is the sum total of all policies, regulation, practices, enforce to safeguards the contents and integrity of any
classified information or document from compromise or loss.
Example:
a. Policy – Security document and information is the responsibility of all concerned.
b. Regulation – Anybody found guilty of violating document and information security shall dealt with
accordingly.
c. Doctrine – Access to information is based on the “need to know” and not by position.
d. Practice - Authority to have access to classified information is not permanent but can be withdrawn by the
originating authority.

Types of Security
1. Industrial Security – a type of security applied to business groups engaged in industries like manufacturing,
assembling, research and development, processing, warehousing and even agriculture.
2. Operational Security – Deals with primarily with the protection of process, formulas, patents, and other
operational activities of an installation.
3. Communication Security – The application of various measures which prevent or delay the enemy or
unauthorized persons in gaining information through the communication system. It includes transmission
security and crypto security.
4. Document Security – It encompasses the protection of documents and other classified papers from loss,
unauthorized access, and avoidance of disclosures.
5. Hotel Security – a type of security applied to hotels where its properties are protected from pilferage, loss,
damage, and the function in the hotel restaurants are not disturbed and troubled by outsiders or the guest
themselves. This type of security employs house detectives, uniforms guard and supervisor and ensures that
hotel guests and their personal effects safeguarded.
6. Bank Security – this type of security is concern with bank operations. Its main objective is the protection of
bank cash and assets, its personnel and clientele. Security personnel are trained to safeguard bank and
assets while in storage, in transit and during transactions.
7. Crisis Security – Specialized field which allied if not part of VIP security which involved in the kidnapping of
VIP’s such as political leaders and the like. Motives can be economic, political, emotional, nationalistic,
religious and their combinations.

A Self-Regulated Learning Module 7


8. Personal or VIP Security – a type of security applied for the protection of top-ranking officials of the
government or private entity, visiting persons of illustrious standing and foreign dignitaries.
- It calls for a real “PRO” in the Security field.
9. School Security – a type of security that is concern with the protection of students, faculty members, and
school properties. Security personnel are trained to protect the school property from theft, vandals, handling
campus riots and detecting the use of intoxicated drugs and alcohol by the students.
10. Supermarket or Mall Security – a type of security, which is concern with the protection of the stores,
warehouses, storage, its immediate premises, and properties as well as the supermarket personnel and
customers. Security personnel are trained to detect “shoplifter”, robbery, and bomb detection and customer
relation.

PART 2:
Physical Security
PHYSICAL SECURITY
Physical security measures are being used to defined, protect, and monitor property rights and assets. These
measures consist of barriers and devices that would detect, impede, and prevent unauthorized access to
equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage and
theft.

Concept:
1. Enemy Agents must have access - In most cases espionage, acquisition of information is the ultimate result,
and means and form in which information is obtained is merely an operational detail. Normally, information on
tapes and film is as usable as the original documents. Therefore, in considering access, one should think not
only of current physical access, but also access to the discussion of the matter by the use of clandestine
listening device.
2. There is no impenetrable barriers – In an unfriendly government or organization is willing to devote enough
time, money, personnel, materials and imagination to passing a barrier, it can do so. So, we attempt to build
defense in depth by using then one barrier.

3. Surreptitious VS non-surreptitious entry – The possibility of surreptitious entry is the greatest hazard from
the standpoint of counterintelligence security because it is usually difficult to neutralized the act of espionage
because surreptitious entry is not usually detected.
4. Each installation is different - Since each installation is different each will have different problems to
overcome. The security procedures will not be adequate for all installations.

Four Layers OF Physical Security


1. Environmental Design- The initial layer of security for a campus, building, office, or physical space uses
environmental design to deter threats.
2. Mechanical and electronic Access Control- includes gates, door, and locks. Key control of the locks
becomes a problem with large user populations and any user turnover. Keys quickly become unmanageable
forcing the adoption of electronic access control.
3. Intrusion detection – Monitors for attacks. It is less a preventive measure and more of a response measure.
Although some would argue that it is a deterrent. Intrusion detection has a high incidence of false alarms.
4. Video monitoring- are more useful for incident verification and historical analysis. For instance, if alarms are
being generated and there is camera in place, the camera could be viewed to verify the alarms.

Barrier defined
A barrier can be defined as any physical structure whether natural or man-made capable of restricting,
deterring, delaying, or preventing illegal and unauthorized access to an installation.

A Self-Regulated Learning Module 8


Minimum Acceptable Requirements for fence used as Security Barrier:
1. Height: Eight feet at minimum.
2. Slack at the bottom: Not to exceed two inches, if the fence is not taut then it should extend even closer to
the ground.
3. Wooden fence post: Minimum horizontal dimension of four inches by four inches.
4. Steel fence post: The round type should be at least two inches in diameter and the H-beam type must
measurable no less than two inches at the smallest diameter.
5. Fence posts: Fence post should be set in concrete or in firm soil using commercial drive anchors, to a depth
of three feet; Maximum distance between posts is ten feet.
6. Fence top: There should be something on the top of the fence to deter persons attempting to go over the
fence good example would be the use of barbed wire overhang, holding the stands of barbed – wire should be
two feet long and should be extended at 45-degree angle in the direction of the expected approach.

7. Fence area: The area surrounding the fence should be clear of trees and vegetation and debris or other
materials which would offer concealment to the intruder or would aid him in scaling.
8. Fence Gate: Gates should be limited to the number necessary for efficient and safe operation of the
installation.
9. Fence opening: all opening in the fence in excess of 96 inches must be lock, barred, or screened in such a
way that they may only be unlocked and opened from the inside and only by selected personnel.
10. Multiple fence: If used, multiple fences should be at least ten feet apart and the overhang on the top of the
inner fence should point inward rather than away from the installation maximum distance any two parallel
fences should not exceed 150 feet.

Two general types of Physical Barriers:


1. Natural Barriers -– Such as rivers, cliffs, and ravines, etc. which delay or make more difficult the entry of the
intruder.
2. Man-made Barriers – are structural construction like fences walls, floors, roofs, grills, bars, roadblocks, or
other physical means to deter or impede penetration.

1. Natural Barriers
Advantage:
a. They provide a protection system without additional cost to the installation.
b. The difficulty to penetrate an installation increase according to the barrier.

Disadvantage:
a. Trees, ravines, vegetation could serve as a hiding place to any possible intruder.
b. Installation that has as barrier a body of water could be subject to penetration through a team of divers.

*Bodies of Water as Barriers:


Advantages:
a. When the surface of the water is calm, it offers the guards or security personnel a very extensive field view
range.
b. Water offers much resistance to a vehicle used by intruders by making it almost impossible to have rapid
access to the installation.
c. To gain access, the task of hiding a vehicle or boat without been detected by the guards or security
personnel will be an obstacle to the intruder.

A Self-Regulated Learning Module 9


Disadvantage:
a. When the water is agitated it reduces the field of vision of the guards or security personnel.
b. It is possible to control the movement of a vehicle or boat to keep it hidden between waves.
c. The surface of the water reflects the light given by the illumination system. An intruder may use this situation
in their favor when trying to penetrate an installation.

* The land as Barrier:


a. The land where the installation sits must be evaluated and considered as much from the surface access
point of view as from below the surface.
b. Points to consider when evaluating the land as barrier:
1. The looser the ground the more noise it will cause when the intruder walks.
2. Muddy soil without vegetation is very difficult to cross and at the same time the intruder leaves their
footprints.
3. Light colored soil provides reflection and contrast so as to allow the most efficient use of natural and artificial
illumination.
4. Land that is uneven such as cliff and ravines are difficult to cross and limit the amount of equipment’s and
materials that the intruder could introduce in the exterior perimeter area.

2. Man-made Barriers – are structural construction like fences walls, floors, roofs, grills, bars, roadblocks, or
other physical means to deter or impede penetration.
Fences: Fences are independent structures, generally in a vertical plane, designed for the physical and or
visual control of access to external.

Generally, a Fence is use for the following purposes:


1. Outline the physical limits of an area.
2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of guards.
5. They deny accidental access to innocent person to the protected area.
6. Facilitate and improve the control and vehicular traffic.

Types of Barriers
1. Natural Barriers – it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are
difficult to traverse.
2. Structural barriers – these are features constructed by man regardless of their original intent that tends to
delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
3. Human barriers – persons being used in providing a guarding system or by the nature of their employment
and location, fulfill security functions. Examples are guards, office personnel, shop workers, etc.
4. Animal barriers – animals are used in partially providing a guarding system. Dogs are usually trained and
utilized to serve as guard dogs. German shepherds are best suited for security functions. Goose and turkeys
could also be included.
5. Energy barriers – it is the employment of mechanical, electrical, electronic energy imposes a deterrent to
entry by the potential intruder or to provide warning to guard personnel. These are protective lighting, alarm
system and any electronic devices used as barriers.

Three Line of Physical Defense


1. First line of defense – perimeter fences / barriers
2. Second line of defense – doors, floors, windows, walls, roofs and grills and other entries to the buildings.
3. Third line of defense – storage system like steel cabinets, safes, vaults and interior files.

A Self-Regulated Learning Module 10


PERIMETER BARRIER
A medium or structure which defines the physical limits of an installation, or area to restrict or impede access
thereto. It is any physical barrier used to supplement the protection of an inside or outside perimeter.

The main purpose:


Perimeter barrier is to deny or impede access or exit of unauthorized person. Basically, it is the first line of
defense of an Installation. This is maybe in the form of fences, building walls or even bodies of water. The
function and location of the facility itself usually determine the perimeter of the installation.

Types of Perimeter Barrier


a. Fences
b. Walls
c. Bodies of Water

Types of Fences
1. Solid fence – constructed in such a way that visual access through the fence is denied. Its advantage is that
it denies the opportunity for the intruder to become familiar with the personnel, activities and the time
scheduled of the movements of the guards in the installation. On the other hand, it prevents the guards from
observing the area around the installation and it creates shadow that may be used by the intruder for cover and
concealment.

Advantage of Solid fence:


a. Denies visual access of the installation to the intruders
b. Denies the intruder the opportunity to become familiar with the personnel, activities, and time scheduled of
the movement of the guards on the installation.

Disadvantage of solid fence:


a. It prevents the installation guards from observing the area around the installation.
b. A solid fence creates shadows which may be used by the intruder for cover and concealment.

2. Full-View fence – it is constructed in such a way that visual access is permitted through the fence. Its
advantages are that it allows the roving patrols and stationary guard to keep the surrounding area of the
installation under observation. On the other hand, it allows the intruder to become familiar with the movements
and time schedule of the guard patrols thereby allowing him to pick the time that is advantageous on his part.

Advantage of Full-view fence:


a. Roving patrols and stationary guards are able to keep the area surrounding the installation under
observation.
b. It does not create shadows which would provide cover and concealment for the intruder.

Disadvantage of full-view fence:


a. It’s allowing visual access to the installation, its personnel, its guards; and its activities.
b. It allows the intruder to become familiar with the movements and the time schedule of the guards patrol;
there after allowing him to pick the time for attempting penetration which would be most advantageous to him.

Types of Full-View Fence


A. Chain link fence
1. It must be constructed of 7 feet material excluding top guard.

A Self-Regulated Learning Module 11


2. It must be of 9 gauges or heavier.
3. The mesh openings are not to be larger than 2 inches per side.
4. It should be twisted and barbed salvage at top and bottom.
5. It must be securely fastened to rigid metal or reinforced concrete.
6. It must reach within 2 inches of hard ground or paving.
7. On soft ground, it must reach below surface deep enough to compensate for shifting soil or sand.

B. Barbed wire fence


1. Standard barbed wire is twisted, double-strand, 12-gauge wire with 4-point barbs spaces on equal distance
apart.
2. Barbed wire fencing should not be less than 7 feet high excluding top guard.
3. Barbed wire fencing must be firmly affixed to post high excluding top guard.
4. The distance between strands will not exceed 6 inches and midway between parts.

C. Concertina wire fence


1. Standard concertina barbed wire is commercially manufactured wire coil of high strength steel barbed wire
clipped together at intervals to form a cylinder.
2. Opened concertina wire is 50 feet long and 3 feet in diameter.

Perimeter Barrier Opening


1. Gates and Doors – When not in use and controlled by guards, gates and doors in the perimeter should be
locked and frequently inspected by guards. Lock should be changed from time to time and should be covered
under protective locks and key control.
2. Side-walk-elevators – These provide access to areas within the perimeter barrier and should be locked and
guarded.
3.Utilities Opening – sewers, air intakes, exhaust tunnels and other utility openings which penetrate the barrier,
and which have cross sectional areas of 96 square inches or more should be protected by bars, grills, water
filled traps or other structural means providing equivalent protection to that portion of the perimeter barriers.
4 Clear Zones – an obstructed area or a “clear zone” should be maintained on both sides of the perimeter
barrier. A clear zone of 20 feet or more is desirable between the barriers and exterior structures and natural
covers that may provide concealment for assistance to a person seeking unauthorized entry.

Specification on clear zones:


Clear zones of 20 feet or more should exist between the perimeter barriers and exterior structures, parking
areas and natural or man-made features.
A clear zone of 50 feet or more should exist between the perimeter barrier and structure within the protected
areas except when a building wall constitutes part of the perimeter barrier.

Security Specification for windows or opening:


Windows or opening less than 18 feet above ground, roof, ledges, etc. or less than 14 feet directly or
diagonally, opposite uncontrolled windows in other walls, fire, escapes or other opening of 96 square inches or
larger should be grilled or have steel bar protections.

Additional Protective Measures


1. Top Guard – additional overhang of barbed wire placed on vertical perimeter fences upward and outward
with a 45-degree angle with 3 to 4 strands of barbed wires spaced 6 inches apart. This increases the
protective height and prevents easy access.

A Self-Regulated Learning Module 12


2. Guard Control Stations – this is normally provided at main perimeter entrances to secure areas located out-
of-doors and manned by guards on full-time basis. Sentry station should be near a perimeter for surveillance
at the entrance.
3. Tower Guard – this is a house-like structure above the perimeter barriers. The higher the tower, the more
visibility it provides. It gives a psychological unswerving effect to violators. By and large guard towers,
whether permanent or temporary, must have a corresponding support force in the event of need. Towers as
well as guard control stations should have telephones, intercoms, and if possible, two-way radios connected to
security headquarters or office to call for reserves in the event of need.
4. Barrier Maintenance – Fencing barriers and protective walls should always be regularly inspected by
security. Any sign or attempts to break in should be reported for investigation. Destruction of fence or sections
thereof should be repaired immediately, and guard vigilance should be increased.
5. Protection in Depth – in large open areas or ground where fencing or walling is impractical and expensive,
warning signs should be conspicuously placed. The depth itself is protection reduction of access roads, and
sufficient notices to warn intruders should be done. Use of animals as guards and intrusion device can also be
good as barriers.
6. Signs and notices – “Control signs” should be erected where necessary in the management of unauthorized
ingress to preclude accidental entry. Signs should be plainly visible and legible from any approach and in an
understood language or dialect.

PROTECTIVE LIGHTING
The idea that lighting can provide improve protection for people and facilities is as old as civilization.
Protective lighting is the single most cost-effective deterrent to crime because it creates a psychological
deterrent to the intruders.

Purpose of Protective Lighting


1. It provides sufficient illumination to the areas during hours of darkness.
2. Lighting can help improve visibility so that intruder can be seen and identified and, if possible, apprehended.
3. It serves as deterrent to would-be thieves.

Types of Protective Lighting


1. Continuous Lighting – the most familiar type of outdoor security lighting, this is designed to provide two
specific results: glare projection or controlled lighting. It consists of a series of fixed luminaries at range to
flood a given area continuously during the hours of darkness.
a. Glare projection type –The intensity is focused to the intruder while the observer or guard remained in the
comparative darkness, the lighting is toward of the approach of an entrance to an installation.
b. Controlled lighting – the lighting is focused on the pile of items, rather than the background. The width of the
lighted strip can be controlled and adjusted to suit the security needs.
2. Standby lighting – it is designed for reserve or standby use or to supplement continuous systems. A
standby system can be most useful to selectively light a particular area in an occasional basis.
3. Movable or Portable lighting – this system is manually operated and is usually made up of movable search
or floodlights that can be located in selected or special locations which will require lighting only for short period
of time.
4. Emergency lighting – this system is used in times of power failure or other emergencies when other system
is inoperative.

General Types of Lighting Sources


Listed below are the general lighting sources that are mostly used in providing indoor or outdoor lighting.
1. Incandescent Lamp – it is the least expensive in terms of energy consumed and has the advantage of
providing instant illumination when the switch is on.

A Self-Regulated Learning Module 13


2. Mercury Vapor lamp – it is considered more efficient that he incandescent and used widespread in exterior
lighting. This emits a purplish-white color, caused by an electric current passing through a tube of conducting
and luminous gas.
3. Metal halide – it has similar physical appearance to mercury vapor but provides a light source of higher
luminous efficiency and better color rendition.
4. Fluorescent – this provides good color rendition, high lamp efficiency as well as long life. However, it cannot
project light over long distance and thus are not desirable as flood type lights.
5. High pressure sodium vapor – this has gained acceptance for exterior lighting of parking areas, roadways,
buildings, and commercial interior installations. Constructed on the same principle as mercury vapor lamps,
they emit a golden white to light pink color and this provide high lumen efficiency and relatively good color
rendition.

Types of Lighting Equipment


Three types of lighting equipment are generally used or associated with security lighting. These are:
1. Floodlights – these can be used to accommodate most outdoor security lighting needs, including the
illumination of boundaries, fences, and buildings and for the emphasis of vital areas or particular buildings.
2. Street lights – this lighting equipment received the most widespread notoriety for its value in reducing crime.
Search lights – these are highly focused incandescent lamp and are designed to pinpoint potential trouble
spots.
3. Fresnel lights – these are wide beam units, primary used to extend the illumination in long, horizontal strips
to protect the approaches to the perimeter barrier. Fresnel projects a narrow, horizontal beam that is
approximately 180 degrees in the horizontal and from 15 to 30 degrees in the vertical plane.

Protective Lighting Requirement


1. Protective lighting needs at installation and facilities depend on each situation and the areas to be protected.
Each situation requires careful study to provide the best visibility practicable for security duties identification of
badges and people at gate, inspection of vehicles, prevention of illegal entry, and detection of intruders inside
or outside the buildings and other structures and inspection of unusual or suspicious circumstances.
2. When such lighting provisions are impractical, additional security posts, patrols, sentry dog patrols, or other
security means will be necessary.
3. Protective lighting should not be used as a psychological deterrent only. It should be used on a perimeter
fence line only where the perimeter fence is under continuous or periodic observation.
4. Protective lighting may be desirable for those sensitive areas or structures within the perimeter, which are
under specific observation. Such areas include vital buildings, storage, and vulnerable control points in
communication, power and water distribution system. In interior areas where night operations are conducted,
adequate lighting on the area facilitates detection of unauthorized persons approaching or attempting malicious
acts within the area.

General Consideration in Protective lighting.


In planning a protective lighting system, the owner of the installation or his security director must give specific
considerations to the following areas:
1. The determination of lighting needs must be dependent upon the threat, perimeter extremities, surveillance
capabilities, and available guard forces.
2. Lighting must be designed to discourage unauthorized entry and to facilitate detection of intruders
approaching or attempting to gain entry into protected areas.
3. The protective lighting must be continuously operating during periods of reduced visibility, and that standby
lighting is maintained and periodically tested for use during times of emergency and mobilization alerts.
4. Cleaning and replacement of lamps and luminaries, particularly with respect to costs and means required an
available.

A Self-Regulated Learning Module 14


5. The effects of local weather conditions may be a problem in cases where fluorescent units are used.
Fluctuating or erratic voltages in the primary power sources.
6. Requirements for grounding of fixtures and use of common ground on an entire line to provide a stable
ground potential.

Areas to be lighted
1. Perimeter fence
2. Building face perimeter
3. Pedestrian Gate – Should be lighted about 25 feet on either side of the gate if possible and the range for
vehicular gates should be twice that of street lighting is recommended in these applications, but floodlights can
also be used if glare is strictly controlled.
4. Vehicular Gate – Normally manned by guards inspecting credentials, as well as inspecting for contraband
or stolen property, it is critical that the area to be lighted to at least one foot candle.
5. Parking area – This include vital building, storage depots, and vulnerable control points in communication
power, light and were distribution system.
6. Storage, large opened working areas, piers, docks, and other sensitive areas.

Alarms – Aural or visual signal given by the annunciator to security when intruder actuates device in a
protected area. An annunciator is a visual or audible signaling device which initiates conditions of associated
circuits.

Basically, alarm systems are designed to alert security personnel to consummated or attempted intrusions into
an area, building or compound. Each type of alarm is activities in the event that an intruder tempers with the
circuitry, a beam or radiated waves. Intrusion alarm can be electrical, mechanical or electronics. Alarms are
also used for fire, smoke or other emergencies and presence of other hazards.

PROTECTIVE ALARMS
Protective alarm - is one of the important barriers in security. It assists the security in detecting, impeding, or
deterring potential security threat in the installation. Basically, its function is to alert the security personnel for
any attempt of intrusion into a protected area, building or compound. Once an intruder tampers the circuitry,
the beam or radiated waves of the alarm system, it will activate an alarm signal.
On the other hand, the use of communication equipment in the installation helps security in upgrading its
operational efficiency and effectiveness.

Three Basic Parts of Alarm System


1. Sensor or trigger Device- It emits the Aural or visual signals or both.
2. Transmission line- a circuit which transmit the massage to the signaling apparatus.
3. Annunciator- It is the signaling system that activates the alarm.

Types of Protective Alarm System


1. Central Station System – a type of alarm where the control station is located outside the plant or installation.
When the alarm is sounded or actuated by subscriber, the central station notifies the police and other public
safety agencies.
2. Proprietary system – centralized monitor of the proprietary alarm system is located in the industrial firm itself
with a duty operator. In case of alarm, the duty operator calls whatever is the primary need; firefighters, police,
an ambulance or a bomb disposal unit.
3. Local Alarm – this system consists of ringing up a visual or audible alarm near the object to be protected.
When an intruder tries to pry a window, the alarm thereat goes off.

A Self-Regulated Learning Module 15


4. Auxiliary alarm – company-owned alarm systems with a unit in the nearest police station so that in case of
need, direct call is possible. The company maintains the equipment and lines both for the company and those
in the police, fire and other emergency agencies by special arrangement. The auxiliary system can be availed
of by radio, landlines, or cell phones.

Kinds of Alarms
1. Audio Detection Device – it will detect any sound caused by attempted force entry. A supersonic
microphone speaker sensor is installed in walls, ceilings, and floors of the protected area.
2. Vibration Detection Device – it will detect any vibration caused by attempted force entry. A vibration
sensitive sensor is attached to walls, ceilings, or floors of the protected area.
3. Metallic foil or wire – it will detect any action that moves that foil or wire. An electrically charge strips of
tinfoil or wire is used in the doors, windows, or glass surfaces of the protected area.
4. Laser Beam Alarm – a laser emitter floods a wall or fencing with a beam so that when this beam is disturbed
by a physical object, an alarm is activated.
5. Photoelectric or Electric Eye Device – an invisible/visible beam is emitted and when this is disturbed or when
an intruder break contact with the beam, it will activate the alarm.
6. Microwave Motion Detection Device – A pattern of radio waves is transmitted and partially reflected back to
an antenna. If they strike a moving object, they return at a different frequency which results in initiating an
alarm signal. Very effective for protection of interior areas. This have a good Coverage, and not affected by air
currents noise sound.

Foot Rail Activator


1. Foot rail activators are place on the floor in such a position that tellers may activate the alarm by placing the
front of their foot to engage the activation bar.
2. Foot rail do not acquire any obvious use of the teller’s hand and their hands may kept in full view of the
robbers for reason of safety, because foot rail can be activated very obtrusively and safely then will frequently
be found in the banks where tellers normally operate while standing up.

Disadvantage:
Tellers with platform shoes, itchy feet, or using brooms and other articles will often inadvertently cause a false
alarm.

Bill traps
1. Bill traps or currency activation devices are usually place in the teller’s cash drawer and connected to the
alarm system using a wire connector. When currency is removed from the devices, the alarm is activated.
2. The advantage of these devices is that the robbers themselves frequently remove the currency and activate
the alarm. This is particularly helpful when the employees are immediately force to leave their station without
having had an opportunity to activate the alarm safety.

Knee or Thigh Buttons


These are installed inside the desk or teller station which can be activated by knee or thigh pressure. They are
commonly found in location where personnel usually perform their duties from seated position.

Foot Button
Like the foot rail permit alarm activation in relatively safety while both hands remain clear in view of the
robbers.

Double Squeeze Buttons


Required pressure on both side of the device and therefore the probability of accidental alarm is reduced.

A Self-Regulated Learning Module 16


Utilization of Alarm Devices
The selection of proper alarm system is not a simple matter, because the needs of each installation are
different, like a set of fingerprints. Some factors that determine the requirements of the installation will include:
1. Nature of the area or installation
2. Critically of the area or complex
3. Vulnerability of the area or complex
4. Accessibility
5. Location of installation and areas to be protected
6. Constructions and types of buildings
7. Hours of normal operations
8. Availability of other types of protection
9. Initial and recurring cost of installed alarm system
10. Design and salvage value of desired equipment
11. Response time of the security force and local police
12. Savings in manpower and money for a period of time if alarm is used

Desirable Characteristics of intrusion Alarm System


Intrusion alarm devices are designed to detect and not to prevent criminal acts and should be used normally as
an adjunct and not a replacement of the human guard forces. The primary consideration on the choice of a
particular alarm system includes stability, durability, and reliability. Desirable characteristics furthermore should
include:
a. A detection unit should initiate the alarm upon intrusion of a human being in the area or vicinity upon
intrusion of a human being in the area or vicinity to the protected area or object.
b. Panel board central annunciator operating console – monitoring activities should be manned at all times.
c. an annunciator console indicating the audible and/or aural signal and the specific location of incident so that
proper action can be made by security and other units.
d. Fail-safe features which give alarm in the annunciator when something is wrong with the system.
e. System should be difficult to tamper or render ineffective by outsiders, competitors or saboteurs.

Summing up Protective Alarm Devices


1. Alarm devices are physical safeguards used to assist security but not a replacement in the protection of
assets and lives in the installation.
2. It assists the guards to extend their hearing and vision even in areas where they are not physically present.
3. The alarm system whether a local, a central, proprietary, or an auxiliary type are to inform the guard either
visually or aurally of an attempt or a break-in within the premises being protected.
4. Maintenance of alarm system must be regularly made, the signal line must be protected, and there must be
alternate source of power.
5. New and improve intrusion hardwires are being developed and placed in the market but again, the human
guard is irreplaceable despite computerization and the arrival of super sophisticated devices in security alarm
systems.

PROTECTIVE LOCKS AND KEY CONTROL


Lock is one of the most widely used physical security devices in the asset protection program of an installation.
It complements other physical safeguards of the installation against any possible surreptitious entry. However,
the owner of the installation or his security officer needs to understand the weaknesses and strength of each
type of lock including the door, window or walls to be used to achieve maximum benefit from its application.
This is because highly skilled burglars more often concentrate on the lock and its surrounding mechanism in
order to make a forcible entry. It is for this obvious reason that locks are considered as delaying devices which
cannot really top a determine intruder from destroying the lock just to launch an attack. Hence, knowledge of

A Self-Regulated Learning Module 17


the basic principles of locking systems will enable the installation owner or the security officer to evaluate any
lock and determine its quality and effectiveness in a particular application.

Lock Defined
A lock is defined as a mechanical, electrical, hydraulic or electronic device designed to prevent entry into a
building, room, container or hiding place.

Types of Locks
1. Key operated mechanical lock – it uses some sort of arrangement of internal physical barriers (wards
tumblers) which prevent the lock from operating unless they are properly aligned. The key is the device used
to align these internal barriers so that the lock may be operated.

General groups and key control:


a. Disc tumbler lock – Designed for the use of the automobile industry and are in general use in car doors
today because this lock is easy and cheap to be manufactured, its use has expanded to other areas such as
desk, files and padlocks. The delay afforded is approximately ten minutes.
Wafer lock: -The wafer lock was invented in the United States in the late 1800s. Its low manufacturing cost
and mass production capability have led to its widespread use for many different applications: locks for
luggage, showcases, desks, cabinets, and some types of padlocks and switch locks.
b. Pin tumbler lock -The standard pin-tumbler lock consists of a cylinder case containing a cylinder plug or
core. Pin-tumbler locks, patented by Linus Yale in the late 1800s, offer more security than do warded or wafer
locks. In their standard form, however, pin-tumbler locks are also vulnerable to picking and impressioning. Pin-
tumbler locks can easily be master-keyed for tens of thousands of possible combinations. Very complex
master-keying systems can be developed using pin-tumbler locks. The pin-tumbler lock is widely used in the
United States in padlocks and door locks, and for special applications
c. The warded lock – offer very little security, this type of lock must therefore be use only to have privacy, but
not to provide a degree of security
- Most warded locks manufactured in the United States are padlocks. Both the padlock and the warded door
lock are easily picked.
d. Lever tumbler lock – Are difficult to define in terms of security, since they vary greatly in their effectiveness.
These locks are used in safe deposit boxes and are for all practical purposes, pick proof. The least of these
locks are used in desk, lockers and cabinets and are generally less secure than pin tumbler lock.
-Lever locks originated in Europe in the late 1700s and are still widely used. In the United States, their
principal application is in locks for post office letterboxes, pay telephone coin boxes, safe deposit boxes, and
several types of padlocks. Lever locks can provide medium to high resistance to picking.
2. Padlock – a portable and detachable lock having a sliding hasp which passes through a staple ring and is
then made fasten or secured.
3. Combination lock – instead of using the key to align the tumblers, the combination mechanism uses
numbers, letters or other symbols as reference point which enables an operator to align them manually.
4. Code-operated lock – a type of lock that can be opened by pressing a series of numbered button in the
proper sequence.
5. Electrical lock – a type of lock that can be opened and closed remotely by electrical means.
6. Card-operated lock – a type of lock operated by coded card.

Type of Keys
1. Change key – a specific key, which operates the lock and has a particular combination of cuts, or biting,
which match the arrangement of the tumblers in the lock.
2. Sub-master Key – a key that will open all the lock within a particular area or grouping in a given facility.
3. Master Key – a special key capable of opening a series of lock.

A Self-Regulated Learning Module 18


4. Grand Master key – a key that will open everything in a system involving two or more master key groups.

Key Control
Once an effective key control has been installed, positive control of all keys must be gained and maintained.
This can be accomplished only if it is established in conjunction with the installation of new locking devices.
The following methods can be used to maintain effective key control;
1. Key Cabinet – a well-constructed cabinet will have to be procured. The cabinet will have to be of sufficient
size to hold the original key to every lock in the system. It should be secured at all times.
2. Key record – some administrative means must be set up to record code numbers and indicates to whom
keys to specific locks have been issued.
3. Inventories – periodic inventories will have to be made of all duplicate and original keys in the hands of eh
employees whom they have been issued.
4. Audits – in addition to periodic inventory, an unannounced audit should be made of all key control records
and procedures by a member of management.
5. Daily report – a daily report should be made to the person responsible for key control from the personnel
department indicating all persons who have left or will be leaving the company. In the event that a key has
been issued, steps should be initiated to ensure that the key is recovered.

Statutory Prohibition of Key


ART. 304. Possession of Picklocks or similar tools
Any person who shall without lawful cause have in possession of picklocks or similar tools especially to the
commission of the crime or robbery, shall be punished by arresto mayor in its maximum period to prison
correccional in its minimum period
The same penalty shall be imposed upon any person who shall make such tool. If the offender is a locksmith,
shall suffer the penalty of prison correccional in its medium and maximum period.

ART. 305. False Key


The term “False Key” shall be deemed to include:
a. The tool mentioned in the next proceeding articles.
b. Genuine keys stolen from the owner.
c. Any key other than those intended by the owner for use in the lock forcibly opened by the offender.

Peterman – a term used in England for lock pickers, safecracker and penetrators of restricted rooms or areas.

Master Keying System– a system used in big installation whereby keys can open a group or group of locks.

Maison Keying- the issue of key to open main entrance gate and office.

Security Cabinet
The final line of defense at any facility is in the high security storage where papers, records, plans or cashable
instrument, precious metals or other especially valuable assets are protected. These security containers will
be of a size and quantity, which the nature of the business dictates.

In protecting property, it is essential to recognize that protective containers are designed to secure against
burglary or fire. Each type of equipment has a specialized function and it will depend on the owner of the
facility which type that is going to use.

A Self-Regulated Learning Module 19


Three (3) Types of Security Cabinet
1. Safe – a metallic container used for the safekeeping of documents or small items in an office or installation.
Safe can be classified as either robbery or burglary resistance depending upon the use and need.
1. At least 750 lbs. anchored
Any safe that weigh less than 750 lbs. should be anchored to a building structure.
Its body should at least one-inch-thick steel or equal
2. Safe as a general rule, require the door to be made of steel and at least 11/2 thick.

2. Vault – heavily constructed fire and burglar resistance container usually a part of the building structure used
to keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but smaller than
a file room.
1. The vault door should be made of steel at least 6 inches in thickness.
2. Vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
3. Electrical conduits into the vaults should not exceed 11/2 in diameter.
4. Vault floor should be higher by four inches with the surrounding floors and if in level with the floor buttons,
storage container should be raised at least 4 inches above the floor.
5. Vault should not be made part of the wall due to moisture and condensation caused by temperature.
6. Standard vaults, to reduce destroying of too many records, should not be more than 5,000 cubic feet.
-The vault must be resistive up to 6 hours.

3. File room – a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate
limited people to work on the records inside.
1. The file room should at most be 12 feet high.
2. The interior cubage should not more than 10,000 cubic feet.
3. The ventilation should be through the door.
4. It must have a watertight door and at least fireproof for one hour.
-The supporting structure, the walls, floor, and roof should be made fire-proof.

PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL


In every installation, the use of protective barriers, security lighting, communication and electronic hardware
provides physical safeguards, but these are insufficient to maximize the effort of the guard force. A control
point must be established for positive personnel identification and check system. This is to ensure that only
those persons who have the right and authority will be given the necessary access to the area.
The most practical and generally accepted system of personnel identification is the use of identification cards
badges or passes. Generally speaking, this system designates when and where and how identification cards
should be displayed, and to whom. This helps security personnel eliminate the risk of allowing the access of
unauthorized personnel within the establishments.

Types of Personnel Identification


1. Personal recognition
2. Artificial recognition – identification cards, passes, passwords, etc.

Use of Pass System


1. Single pass system – the badge or pass coded for authorization to enter specific areas is issued to an
employee who keeps it in his possession until his authorization is terminates.
2. Pass exchange system – an exchange takes place at the entrance of each controlled area. Upon leaving
the personnel surrenders his badge or passes and retrieve back his basic identification.

A Self-Regulated Learning Module 20


Note: In this system the second badge never leaves the controlled area, thus reducing the possibility of
switching, forging or alteration.

3. Multiple pass system – this provides an extra measure of security by requiring that an exchange take place
at the entrance of each restricted area.

Badge and Pass Control


a. The system should have a complete record of all badges and identification cards issued, return, mutilated or
lost by serial number and cross-indexed alphabetically.
b. The supervisor from time to time for its accuracy and authenticity should check the lists.
c. Passes and badges reported lost should be validated and security at entrance be informed through
conspicuous posting.

Types of controlled Areas


1. Controlled Areas – Are those areas where access is restricted as to entrance or movement by all authorized
personnel and vehicles. It should additionally mark by a fence or other barrier, and access to it should limited
to as few guests as possible.
2. Limited Areas – Are those within the controlled area where a greater degree of security is required.
3. Exclusion Areas – Are used only for handling and storage of high value cargo and classified documents. The
number of people authorized to enter this area should be strictly limited, and the area should be under
surveillance at all times.

Traffic Control system:


Controlling traffic in and out within a facility is essential to its security program. Perimeter barriers, locked doors
and screened windows prevent or deter the entry of authorized visitors, but since some traffic essential to
every operation, no matter how highly, classified it maybe, provision must be made for the control of this
movement.

Specific solution will depend upon the nature of the business, obviously retail establishment, which encourage
high volume traffic, and which regularly handle a great deal of merchandise both in and out, have a problem of
a different dimension from the industrial operation working on a highly classified government project. Both,
however, must work from the same general principles towards providing the greatest possible security within
the efficient and effective operation of the job at hand. Traffic controlling includes.
1. Identification of employees and visitor and directing or limiting their movements.
2. Control of all incoming and outgoing packages; and
3. Control of trucks and private vehicles.

Personnel Identification:
The most practical and generally accepted system is the use of badges and identification cards. Generally
speaking, this system designates when and where and how passes should be displayed, and to whom, what is
to be done in case of the loss of the pass; procedure for taking a pass from terminating employees; and a
system in cancellation and re-issue of all passes; either as a security review or when a significant number of
badges have reported lost or stolen. To be effective:
1. Badge must be tamper-resistant, which mean that they should be printed or embossed on a distinctive stock
with a series of design difficult to reproduce.
2. They should contain a clear and recent photograph of the bearer, preferably in the color.
3. The photograph should be at least one-inch square and should be updated every two or three years or when
there is any significant change in facial appearance; and

A Self-Regulated Learning Module 21


4. Should additionally contain vital statistic such as date of birth, height, weight, color of hair and eyes, sex,
and thumbprints.

Visitors Movement Control


Security should establish proper methods of establishing the authority for admission of visitors as well as the
limitation thereat. This security measure would depend on the sensibility of the installation but could include
the following.
1. Visitor’s logbook – all visitors to any facility should be required to identify them and should be given a
visitor’s ID by the security. Visitor’s logbook should be filled up with the named of visitors, nature and duration
of visit.
2. Photograph – taking of photographs should also be considered. Extreme caution must be exercised in
areas where classified information is displayed to preclude unauthorized taking of pictures of the installation. If
a visitor has camera and it is prohibited to take picture, said camera should be left in the care of security with
corresponding receipt.
3. Escort – if possible, visitors should be escorted by the security to monitor their activity within the
establishment and guide them where to go.
4. Visitor entrances – separate access for visitors and employees of the establishment should be provided.
5. Time traveled – if there is a long delay or time lapse between the departure and arrival, the visitors may be
required to show cause for the delay.

Package Movement Control


Every facility must establish a system for the control of package entering or leaving the premises. However,
desirable it might seem it is simply unrealistic to suppose that a blanket rule forbidding packages either in or
out would be workable. Such a rule would be damaging to the employee morale and, in Many cases, would
actually work against the efficient operation in the facility. Therefore, since the transporting of packages
through the portals is a fact of life, they must be dealt with in order to prevent theft and misappropriation of
company properties. Thus.

1. Packages shall be authorized to be brought inside the industrial installation, offices, and work area without
proper authority. This basic precept help reduce if not eliminate pilferage, industrial espionage, or sabotage.
2. Outgoing packages carried by personnel should be closely inspected and those in vehicles should also be
checked as many pilfered items are hidden in the surface of the vehicles leaving the compound.
3. Any personnel/Visitor entering the installation with a package should deposit the same to the security and in
return receives a numbered tag, which he/she will use in claiming his/her package upon departing.

Vehicle Movement Control and Identification


Vehicular traffic within the boundaries of any facility must be carefully controlled for safety as well s to control
the transporting of pilfered goods from the premises. Thus.
1. Privately owned vehicle of personnel/visitor should be registered and are subject to the identification and
admittance procedure.
2. Vehicles should be subjected for search at the entrance and exit of the installation.
3. All visitors with vehicle should provide him security as to the complete details of their duration of stay,
person to be visited, and other information.
4. All vehicles of visitors should be given a sign/sticker to be placed on the windshield.
5. Traffic warning signs should be installed in all entrances in order to guide the visitors in their destination as
well to provide them with the necessary safety precautions while they are inside the installation.
6. Security personnel must constantly supervise parking areas and make frequent spots searches of vehicles
found there.

A Self-Regulated Learning Module 22


Building Access Control
At any physical barrier, a security system must possess the ability to distinguish among authorized persons,
unauthorized visitors, and other unauthorized persons. This is to assist the security personnel protects
sensitive are and information within the installation.

Appropriate warning signs should be posted at the building perimeter. Special restricted entry facilities to
public access should be provided. This will be dependent on the degree of security needed for the protection
of property, activity, and other processes within the building.

The access to the restricted area shall be limited to authorize personnel who have the direct involvement with
the installation, construction and operation and maintenance of eh equipment and systems and/or use of eh
materials contained within the restricted area. A clear-cut policy on the access control should be disseminated
to all personnel of the installation.

PART 3:
Personnel Security
Of the three major aspects of security, personnel security is considered as the most important. This is for the
simple reason that security involves people, both an asset to be protected and as source of security threats. It
is an acknowledge fact that losses are attributed mainly to negligence or active participation of employees,
either through theft and sabotage. This emphasizes the need to set up a system of hiring the people for the
company.

PURPOSE AND FUNCTIONS


The main purpose of personnel security program is to:
1. Ensure that the company employs only those people best suited to assist the company in achieving its
goals, and
2. After employment to assist in providing the necessary security to staff while they are carrying out their work.

It is said that vulnerability to losses caused by employees is measured in part by:


1. The character of the individual;
2. Their awareness of the asset’s protection requirements; and
3. Their motivation to become part of and co-operate in the asset protection programmed.

In implementing an assets protection:


1. Programmed, one primary objective should motivate all employees to become part of the protection
programmed.
2. Such programmed should provide adequate opportunities for feedback from all participants.

To protect the organization from undesirable persons the personnel security process requires the following
main elements:
1. An appropriate recruitment and hiring policy.
2. The use of screening devices to assist in applicant selection process.
3. A background investigation of applicants.
4. The carrying out investigation into activities of current employees suspected of violating company rules.
5. Assisting employees to protect themselves through security awareness and educational program.
6. The protection of employees from discriminatory hiring or terminating procedures, as well as unfounded
allegations of illegal or unethical activities and conduct.

A comprehensive personnel security program should include the following elements:

A Self-Regulated Learning Module 23


1. Adequate job specification and performance standards.
2. Appropriate recruitment and selection criteria
3. Background applicant screening procedures and standards.
4. Background investigation standards.
5. Truth verification standards.
6. Criteria for employee conduct.
7. Investigation of questionable employee conduct.
8. Disciplinary procedures.
9. Termination procedures.

SCREENING APPLICANT
The most effective tools available in the most effective tools available in employee selection are the application
form, and the interview.

This verifies the accuracy and completeness of the subject’s application form and can also develop additional
relevant information. The governing standards are the needs of the company and the fairness to the applicant.

Applicant rejection should be decided on the basis of pre-defined standards which have been carefully worked
out with the Personnel Department
a) Such standards must be strictly adhered to, and
b) Reviewed regularly and updated where necessary.

Things to look for during Screening Process


1. Sign of instability in personal relations
2. Indications of lack of job stability
3. Being over qualified for the post
4. A declining salary history
5. Inability to remember former supervisors
6. Gaps in residence details
7. Inadequate references
8. Use of ‘self-employed’ status to hide period of unemployment.

Common Omissions and Falsifications:


1. Applicant Signature: Application form not signed
2. Application Date: As the applicant is only responsible for the information listed as of the date of the
application.
3. Applicant’s Name: Questions about other names under which you may worked or attended
4. Education: Approximately 5% of all applicants falsify some aspect of their education background. Obtaining
lists of school, but omitting dates of attendance, or degrees lists and ‘diploma mills. Lists fictitious schools,
omitting geographic location, lists recognized schools that he never ever attended, claims graduation or
degrees from school he did attend, but for a very short time, assumes the name and degree of a bona fide
graduate.
5. Crime Records: The questioned is unanswered.
6. Employments Gaps: Applicant simply omits information, and if the interviewer fails to question the
gaps then the applicant has succeeded without actually falsifying anything.
7. Former Employers: The company may have been owned or operated by the applicant or his relatives.

Scope of Personnel Security


1. Personnel Security Investigation (PSI)

A Self-Regulated Learning Module 24


2. Security Education

Key Functions of Personnel Security


1. It serves as a screening device in hiring suitable employees.
2. It provides background investigation services of both potential and present employees, for possible
assignment to sensitive position.
3. It handles investigation of employees suspected of wrong doing.
4. It develops security awareness among employees.
5. It attempts to ensure the protection of employees from discriminatory hiring or terminating procedures as
well as unfounded allegations of illegal or unethical activities and conduct.

PERSONNEL SECURITY INVESTIGATION


Personnel Security Investigation (PSI) is a process of inquiry into the character, reputation, discretion, integrity,
morals and loyalty of an individual to determine the suitability for appointment or access to classified matter.

General Techniques of PSI


A. Background Investigation (BI) – this technique is very expensive but necessary in personnel security. It
serves to verify information on the application form and to obtain other information pertinent to the decision to
employ.

Factors to consider in the conduct of BI


1. Loyalty
2. Integrity
3. Discretion
4. Morals
5. Character
6. Reputation

Components of Complete BI
1. Applicants Name
2. Date of birth
3. Present residence address
4. Personal History
5. Marital History
6. Residence History
7. Citizenship
8. Physical Data
9. Educational History
10. Organization membership
11. Neighborhood investigation
12. Character reference
13. Employment History
14. Military History
15. Foreign travel history
16. Criminal record
17. Credit records
18. Applicant’s signature
19. Date of application

A Self-Regulated Learning Module 25


Types of Local Agency Check (LAC)
1. Barangay Clearance
2. City of Municipal Clearance
3. Local Police Clearance
4. Court Clearance

Types of National Agency Check (NAC)


1. National bureau of Investigation (NBI) Clearance
2. PNP Directorate for Intelligence (DI) Clearance
3. Intelligence Service, AFP (ISAFP) Clearance

THE BACKGROUND INVESTIGATION


1. To verify information on the application form;
2. To ascertain past employment experiences; and
3. To obtain other information pertinent to the decision to employ, either positive or negative.

Investigative Coverage
1. Prior employment back at least seven consecutive years should be verified. You will need to get
explanations for gaps greater than one month.
2. Claimed residence for the period covered in employment and educational institutes should
be verified.

Investigative Standards
1. Information sought should be relevant to the hiring decision.
2. Be reliable (i.e., have a good probability of being correct)
3. If unfavorable, be confirmed by at least one other source.

Investigative Review - all completed investigation should be reviewed by an responsible supervisory employee
so that all applicants are measured to the same standards.

Contract Investigation Agencies:


- agencies should be advised in writing of:
a) The reason for the reports
b) The nature of the investigation to be undertaken
c) The time expected to spend on the investigation
d) The authorized cost expected to be charged
e) They shall not represent themselves as the hiring company when conducting investigation
f) The identity, address and telephone numbers of company personnel to whom the investigative reports are
to be made.

B. Positive Vetting – is the process of inspecting or examining with careful thoroughness


The essence of vetting is:
1. A personal interview
2. Conducted under stress
3. The interview is based upon answers previously given by the applicant.
4. Other information issued during the interview, such as those discovered in the BI, which confirms or denies
this given by the applicant.

A Self-Regulated Learning Module 26


C. Profiling – is the process whereby a subject’s reaction in a future critical situation is predicted by observing
his behavior, or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test.
The Reid Report is an example of honesty test.
Two Popular Intelligence tests are:
1. Stanford-Binet IQ test
2. Henman-Nelson IQ test
D. Deception Detection Techniques – this process of using devices in detecting deception during the interview
stage.
Devices to detect deception during interview fall into three main types
1. Polygraph – sometimes referred to as a lie-detector, this records changes in blood pressure, breathing rate,
pulse and skin conductivity to electricity, and these changes are assessed by the examiner and therefore the
results are only as good as the skill of the examiner.
2. Psychological Stress Evaluator, which does not require any connections to the subject’s body records and
analyze stress related components of the voice, and it may be used with or without the knowledge of the
subject being tested;
3. The Voice Analyzer also does not require attachment to the body and records sub-audible tremors in speech
on to a digital tape, where they are processed electronically and provide immediate results for a single or
multiple word answer to question.

E. Financial and Lifestyle inquiry – this type of investigation seeks to gather information on income and mode
of living, sometimes referred to as the earning-to-debt ratio.

To gather basic information on income and the mode of living. Called Earning to Debt Ratio’.
All employees subject to this type of enquiry should be advised in writing at start of their employment of
company policy regarding this.
It is usually used on consideration for:
1. Promotion to a significantly more responsible job.
2. Assignment to significantly more sensitive duties.
3. Cyclical basis for staff in sensitive posts.
4. To establish whether certain employees are engaging in activities for which disciplinary action can be taken.

Subjects should be selected for review based on:


1. Specific position titles
2. By executive management submitting a confidential list of candidates
3. On the occurrence of specific events (e.g., a garnishment notice)
The source to be checked would include:
1. Security/Law enforcement agency files
2. Litigation records
3. Personnel and salaries dept records
4. Bank/credit agency files/sources
5. Inspection of residence
6. Real Property records

F. Undercover Investigation – this is the placement of an agent in a role in which the agent’s true identity and
role remains unknown, in order to obtain information for criminal prosecution or for recovery or limitation of
asset losses.

The objectives of an undercover operation are:


1. To obtain evidence of past or future crimes.

A Self-Regulated Learning Module 27


2. To identify persons engaged in theft, the methods employed, and/or the destination of diverted materials.
3. To identify contacts made by a target person.
4. To establish whether certain employees are engaging in activities for which disciplinary action can be taken

There are a number of potential problems with under-


cover operations, such as:
1. Injury – the agent may be injured by employees trying to prevent discovery of what they are doing;
2. Exposure – if the agent’s true identity or purpose is exposed it will undoubtedly impact on employee morale,
customer and supplier relationships, employee and contract labor support, and possible consequences of
impact on efficient distribution of finished goods.
3. Unfair labor practice - there may be claims of ‘unfair labor practice’ if the operation interferes, retrains or
affects employees in exercise of collective bargaining rights.
4. Civil Action for Damages – there may be civil action for damages, because an intrusion at a time and place
where there was an expectation of privacy or by public disclosure of private facts about an employee.
5. New Bargaining Issue – finally it may initiate a new bargaining issue, because any disciplinary action might
cause grievance and an allegation that the investigation was a contract violation.

REQUIREMENTS FOR UNDERCOVER INVESTIGATION


1. INVESTIGATOR- the investigator should not be known to the target population, and be a ‘logical’ fit. He
must know:
a) the identity of the control person
b) the means of contact with control
c) actions that are forbidden
d) the real purpose of the operation
e) have a good cover story
f) the working environment

2. Cover Story – it should be


a) explain qualifications for the job
b) explain how the agent got the job
c) cover agent’s past life.
3. Placement Technique – it should be a) well thought out and the job should cover the area involved in the
investigation; and b) have as few controls as possible to allow the agent to appear ordinary
4. Control Scheme – the ‘control scheme’ is made up of a control contact and a control plan.
4.1 Control Person provides:
a) Instructions
b) Evaluates reports
c) Redirects activities as necessary, virtually on a 24-hour basis.
4.2 Control plan should include:
a) The names of the contact(s)
b) Means and frequency of contact
c) Contingencies (for illness, injury, compromise)
d) Law enforcement relations
e) Support resources (e.g., concurrent surveillance operations)
f) The termination of the investigation
5. Communication – need to be carefully organized
a) Ensure there are no “give-away”
b) Agents call is always answered, and recorded
c) Daily calls are ideal but not always possible

A Self-Regulated Learning Module 28


d) A ‘drop’ must be reasonably accessible, unlikely to be disturbed, and where the material will not be affected
by the weather.
6. Law Enforcement Relations – it is important to decide what involvement there will be with the law
enforcement agencies.
7. Confidentiality Within the Organization – it is vital that the operation is kept strictly confidential within the
organization, and no routine management briefings are given.
8. Terminating the operation – terminating the operation can be as difficult as initiating it, particularly in view of
the need to maintain the identity of the secret agent, and it is important to ensure that no other members of
staff are alerted to the operation.
8.1 Planned Termination – the plan should consider:
a) if the investigation will ever be disclosed.
b) how to withdraw the agent without creating question; and
c) how to use the result without exposing the operation
8.2 Compromised Operation – if the operation is compromised the plan should address:
a) How to withdraw the agent immediately and safely
b) Salvaging of as much of the result to date as possible
c) Preparing explanations, defense, or position as needed.
9. Analysis- the investigators report will need to be analyzed to identify any shortcomings in the control of
routine operations of the company or any supervisory or communication weaknesses.
10. Cost – the cost undercover operations are high, there is the normal wages for the ‘employee’ agent
(Incomplete payroll tax) and the fee paid to the agency
11. Summary
a) Use undercover operations where there are no other alternatives
b) Define the purpose and objectives clearly
c) Select a suitably qualified agent
d) Prepare a plausible cover story
e) Devise an appropriate placement plan
f) Have effective controls and point of contact
g) Budget sufficient funds to fully resource the operation

MISCELLANEOUS MATTERS
1. Personnel Dept, and security managers responsible for personnel clearance investigations should keep
abreast of changes in law by statutes or court decisions.
2. Remember an employee has the right his pre employment investigation file and reasonably
challenge any findings.
3. In some countries criminal records are a matter of public record, felonies are filed in superior courts and
misdemeanors in municipal courts

G. Exit Interview:
An ‘exit-interview’ is a valuable tool because it:
a) gives the employee an opportunity to list grievances.
b) offers management the opportunity to learn of problems not previously known.
c) can help reduce losses when a checklist is employed to return company issued property;
d) the interview is also used to remind departing employees of their legal obligation to protect trade secrets or
confidential information.

Bonding:
Used by some firms, as a type of insurance, against loss where company controls prove ineffective.
Bonding should never be considered as an alternative to an effective security program

A Self-Regulated Learning Module 29


a) “Fidelity Bond” is the insurance on a person against that person’s dishonesty.
b) “Indemnity Bond” is an insurance contract designed to reimburse an individual or
organization for possible losses of a particular type.

The two major tools used in employee’s selection procedures are:


a) The application
b) The interview

SECURITY EDUCATION
Security Education is conducted to develop security awareness among employees of the company. It should
cover all employees, regardless of rank or position.

SECURITY EDUCATION PROGRAM


The basic goal of security education program is to acquaint all the employees the rationale behind the security
measures and to insure their cooperation at all times.

Objectives of Security Education


1. Guidance for all supervisory and executive levels of the organization.
2. A mandatory indoctrination on security for all new personnel before their assignment to their respective jobs.
3. Development of a high degree of security consciousness among the selected supervisors and other key
personnel in a program that should be continuing and supported by top management.
4. A down-the-line security program aimed at instilling consciousness and dedication through demonstration,
lectures, motivations and suggestions.
5. To let all employee force be informed that they all belong to the organization and that non-awareness to the
security program is tantamount to disloyalty.
6. That the program is also to develop discipline, loyalty and belongingness.

Phases of Security Education Program


1. Initial Interview – it is the first contact of eh prospective employee wherein the interviewer determines the
suitability of the applicant for employment through his give answers on the different type of questions being
conducted. It is in this stage where, the interviewer, may start providing the necessary information as to the
overview of company security policies and at the same time on the employee accountability and corresponding
penalties that could result from violation there from.
2. Orientation and Training – it is in this stage where new employees receive detailed presentation of
personnel security policy. Usually handouts or employee’s manual are being distributed for reference. New
employees also requested to sign acknowledgement that they have been aware of the exiting company
policies and will abide the same.
3. Refresher conference – it is design to remind employees of the company about their responsibilities, review
the guidelines and policies, introduction of new policies and regulations and a moment of getting employees
feedback about the company policies that is being implemented.
4. Security Reminders – a phase which employs an indirect approach of educating the employees such as
posting security posters and distributing fliers.
5. Security promotion – it is the act of emphasizing the importance and role of security achieving the company
goals and objectives. It involves security employee cooperation and support.
6. Law Enforcement Relations – it is important to decide what involvement there will be with the law
enforcement agencies.

A Self-Regulated Learning Module 30


PART IV:
DOCUMENT AND INFORMATION SECURITY
In every installation, document and information are indispensable for their daily operations and activities, be it
in the form of a paper, film, and magnetic media or in the computer system. Once there is a leakage in the
contents of a company’s document and information, the business operational stability is at stake. It may be a
start of bankruptcy that would lead to its total disclosure. The leakage of document and information cost
government, business and industry alike, billions of pesos. A rival company or an enemy agent might use an
illegally obtain document and information for their own advantage. For this reason, a comprehensive and
information security program is very essential to the installation in order to focus freely on the attainment of its
goals and objectives.

Protection of document and information entails a mammoth task on the part of eh executives and the staff of
the installation. There should be a clear understanding on all the types of documents and information of the
organization. Security measures in the classification, handling, care, and proper disposition of classified
documents and information must be a primary concern in order to preserve the confidentiality and integrity of
document and information throughout all phases of its existence.

Understanding Document and Information Security:


Definition:
1. Document Security – this involves the protection of documents and classified papers from loss, access by
unauthorized persons, damage, theft and compromise through disclosure.
2. Classified Information – this includes all information concerning document, cryptographic devices developed
projects and materials following on the categories of Top Secret, Confidential or Restricted.
3. Classified Matter – any information or material in any form or of any nature, the safeguarding of which is
necessary in the interest of security, and which is classified for such purpose by the responsible classifying
authority.
4. Classify – this refers to the assigning of information or material, one of the four security categories after
determination has been made that the information requires the security protection as provided.
5. Declassify – the act of removing the security classification from classified information or matter.
6. Reclassifying or Regarding – refers to the act of changing the assigned classification from classified
information or matter.
7. Upgrading – refers to the act of assigning the information or matter to the higher classification than that
previously assigned to it.
8. Compartmentation – refers to the grant of access to the classified matter only to properly cleared person
when such classified information is required in the performance of their official duties.
9. Need to know – is the dissemination of classified information or matter to be limited strictly to those people
whose duties requires knowledge or possession thereof.
10. Unauthorized – refers to person not authorized to have access on classified matters.
11. Compromise – this takes place through the loss of security, which results from unauthorized persons
obtaining knowledge of classified matters.
12. Damage to National Security – refers to the prejudice, embarrassment or injury to the country resulting
from act or omission.

Purpose of Protecting Classified Materials


1. Deter and impede potential spy
2. Assist in security investigations by keeping accurate records of the moments of classified materials.
3. Enforce the use of “Need to Know” principle.

A Self-Regulated Learning Module 31


Two (2) Kinds of Documents
1. Personal – letters, diary and notebooks. These should be treated usually the same with official document.
2. Official – orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain
of command.

DOCUMENT / INFORMATION CYCLE


Each document or information has a life cycle in the sense that its usefulness has a beginning and an end. It
passes various stages from the time it is created until it is finally disposed. This cycle consists of the following:
1. Creation
2. Classification
3. Storage
4. Retrieval
5. Retention/Purging
6. Transfer
7. Disposition

- If an organization has no plan for seeing that all records/ documents flow smoothly through the record cycle, it
will be faced with more of the following problems which may severely drain profits; 1) an unmanageable tangle
of papers within the office; 2) wasted clerical effort searching for information; 3) loss of important operating
information; 4) extravagant use of operating information; 5) possible loss of key information in defending the
company against legal or governmental inquiries.

Categories of Document
Category A
1. Information which contains reportable time sensitive, order of battle and significant information.
2. It should be given priority because it is critical information.
3. It must be forwarded without delay.
4. It is critical to friendly operations.
5. It requires immediate action.

Category B
1. Anything that contains communications, cryptographic documents, or systems that should be classified a
secret and requires special handling.
2. Higher authorities should declassify it.

Category C
1. Other information, which contains something that, could be an intelligence value.
2. Contains exploitable information regardless of its contents.
3. Unscreened materials/documents should be categorized as Category C.

Category D
1. No value, yet lower level will ever classify documents as category D.
2. No decision must be made at the lower echelon that document has no value.
3. It is the responsibility of the higher headquarters.

Three (3) Security Concepts


1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel conscious and realize the value of document.
3. Training is necessary for the practice of “Need to Know” principle.

A Self-Regulated Learning Module 32


Four (4) Types of Classified Matters
1. TOP SECRET (green color code) – is any information and materials the unauthorized disclosure of it would
cause exceptionally grave damage to the nation, politically, economically and military operation.
2. SECRET (red color) –These information and material (matter), the unauthorized disclosure of which would
endanger national security, cause serious injury to the interest or prestige of the nation or of any government
activity or would be of great advantage to a foreign nation.
3. CONFIDENTIAL (blue color code) – is any information or material, the unauthorized disclosure of it would be
prejudicial to the interest and prestige of the national or governmental activity or would cause administrative
embarrassment or unwanted injury to and be of advantage to and be of advantage to a foreign country.
4. RESTRICTED (white or no color) – is any information and material which requires special protection other
than those determines confidential, secret and top secret.

Rules of Classification of Documents


Documents shall be classified according to their content.
1. The overall classification of a file or of a group of physically connected therein. Pages, paragraphs, sections
or components thereof may bear different classifications. Documents separated from file or group shall be
handled in accordance with their individual classification.
2. Transmittal of documents or endorsements which do not contain classified information or which contain
information classified lower than that of the preceding element or enclosure shall include a notation for
automatic downgrading.
3.Correspondence, Indexes, receipts, reports of possession transfer or destruction, catalogs, or accession list
shall not be classified if any reference to classified matter does not disclosed classified information.
4. Classified matter obtained from other department shall retain the same original classification.

PROTECTION OF SENSITIVE INFORMATION


Proprietary information is information that in some special way relates to the status or activities of the
possessor and over which the possessor asserts ownership. In the business community, proprietary
information relates to the structure, products or business methods of the organization. It is usually protected in
some way against causal or general disclosure.
All proprietary information is confidential, but not all confidential information is proprietary. For example,
confidential personnel data in employee files is not considered as proprietary although the company treats it as
confidential.

Types of Documents:
Class I – Vital Documents:
In this category these are records that are irreplaceable, records of which reproduction does not have the
same value as the original; records needed to recover cash, to replace building, equipment’s, raw materials,
finished products, and work in process and records needed to avoid delay in restoration of production, sales
and services.
Class II – Important Documents:
This includes records the reproduction of which will close considerable expense and labor, or considerable
delay.
Class III – Useful Documents
This includes records whose loss might cause inconvenience but could be readily replaced and which would
not in the meantime present an insurmountable obstacle to the prompt restoration of the business.
Class IV – Non–essential Documents:
These records are daily files, routine in nature even if lost or destroyed, will not affect operation or
administration. This class represent the bulk of records which should not be even attempted to be protected in

A Self-Regulated Learning Module 33


the event of disasters, they should, however, be kept in ordinary files ready for reference, if needed, and
usually discarded after some period of time.

Basic Consideration in Document and Information Security:


1. Security of information is based on the premise that the government has the right and the duty to protect
official papers from unwarranted and indiscriminate disclosure;
2. The authority and responsibility for the preparation and classification of classified matters rest exclusively
with the originating office;
3. Classified matter shall be classified according to their contents and not to the classification of files in which
they are held or another document to which they are referred;
4. Classification shall made as soon as possible by placing appropriate marks on the matter to be classified;
and
5. Each individual whose duties allow access to classified matter or each individual who possess knowledge of
classified matter while it is in his position shall insure that dissemination of such classified matter is on the
“need to know” basis and to property cleared persons only.

Types of Proprietary Information


1.Trade Secrets – this consist of any formula, pattern, device or compilation of information which is used in
one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or
use it. It may be a formula for a chemical compound a process of manufacturing, treating or preserving
materials, a pattern for machine or device, or a list of customers. It differs from other secret information as to
single or ephemeral events. A trade secret is a process or device for continuous use in the protection of the
business.
2. Patents – this is a grant made by the government to an inventor, conveying or securing to him the exclusive
right to make, use, or sell his invention for term of years.
Primary Distinctions between Patents and Trade Secrets
Requirements for obtaining a patent are specific; to qualify for a patent the invention must be more than novel
and useful. It must represent a positive contribution beyond the skill of the average person.
1. A much lower of novelty is required of a trade secret.
2. A trade secret remains secret as long as it continues to meet trade secret tests while the exclusive right to
patent protection expires after 17 years.

Proprietary Information Protection Program


Realizing that the most serious threat to trade secrets is the employee, a measure of protection is often
realized through the use of employee agreements which restrict the employee’s ability to disclose information
without specific authorization to the company. The following countermeasures may be adopted:
Policy and procedure statements regarding all sensitive information.
1. pre-and post-employment screening and review.
2. non-disclosure agreements from employees, vendors, contractors and visitors.
3. Non-competitive agreements with selected employees.
4. Awareness programs.
5. Physical security measures
6. informed monitoring of routine activities

A Self-Regulated Learning Module 34


CHAPTER 1
ACTIVITY 1

INSTRUCTIONS. Multiple Choices: Read each statement in every number and identify what is being
described, defined, or asked and select the letter which corresponds to your answer, then write your answer
before the number.NO ERASURES ALLOWED:

1. What is the broadest type of security organization?


A. Physical security C. Crisis security
B. VIP security D. Communication Security
2. What is the key element in the security system of a plant or installation?
A. Human guard C. Protective alarm devices
B. Natural barriers D. Key control system.
3. When a private security contracts a bank, an industrial firm, or other subscribers to provide electric
protective devices, and when the alarm is made, control panel or console operator immediately inform through
other communication channel the local police and other law enforcement agencies, the department or other
appropriate agencies, this is called.
A. central station system C. propriety system
B. Auxiliary system D. Local alarm system
4. When the system consists of rigging up a visual or audible alarm near the object to be protected, and in
cause of alarm, the response will be made by the local guards and other personnel within sight or hearing, this
system is called.
A. Local alarm system C. Auxiliary system
B. Proprietary system D. Central station
5. In the choice and eventual installation of an alarm system for specific need what factors must be considered.
A. Nature and criticality of the area or installation
B. Vulnerability and accessibility of the premises of the area
C. Location construction and types of buildings
D. All of the above
6. This is a place in an industrial installation where a security agency will establish its personnel identification
and checking system.
A. A control point C. Detachment Headquarters
B. Guardhouse D. Branch office
7. It is a complete study and analysis of the business operation, its properties, personnel and installations to
determine the adequacy and/or deficiency of existing safeguards,
A. Security survey C. Inspection
B. Security planning D. Security management
8. In an industrial firm, there is a need for document security. As a security officer, you can advise
management on this aspect although this is not totally your assigning work. Document security is not a
protection of vital records from:
A. unauthorized access C. Theft or loss
B. compromise or destruction D. Authorized handlers
9. In an industrial firm or business office, if the safe used weighs less than 750 pounds, said receptacle should
be:
A. guarded at all times C. Anchored to building fixed structure
B. used only for unclassified document D. Burglar and fire resistive

A Self-Regulated Learning Module 35


10. A security survey of a plant or industrial firm is also known by the terms, except:
A. security audit C. Vulnerability assessment
B. risk assessment D. Robbery evaluation
11. It must have a watertight door and at least fireproof of____________.
A. One hour. C. Two hours
B. Three hours D. Four hours
12. It is authenticated list personnel given to security guard allowing entry to compound or installation or part
thereof.
A. Access list C. Ingress List
B. Egress List D. White list

13. PBI refers to:


A. Partial Background Investigation C. Partial Background Intelligence
B. Part Background Intelligence D. Partial Backward Investigation
14. This is a complete inquiry or investigation into all important aspects of an individual’s life history.
A. CBI C. PBI
B. NAC D. LAC
15. It is in this stage where; the interviewer may start providing the necessary information as to the overview of
company security policies and at the same time on the employee accountability and corresponding penalties
that could result from violation there from.
A. Initial Interview C. Orientation and Training
B. Refresher conference D. Security Reminders
16. This is to remind employees of the company about their responsibilities, review the guidelines and policies,
introduction of new policies and regulations and a movement of getting employees feedback about the
company policies that is being implemented.
A. Initial Interview C. Orientation and Training
B. Refresher conference D. Security Reminders
17. The protection resulting from all measures designed to deny unauthorized persons information of value
which might be derived from the possession and study of telecommunications or to mislead unauthorized
persons in their interpretation of the results of such study.
A. Information Security C. Document Security
B. Communication Security D. Telecommunication Security
18. The process of destroying a document which is no longer significant in the organization refers to
A. Retrieval C. Transfer
B. Purging D. Disposition
19. What metallic container is used for the safekeeping of documents or small items in an office or installation?
A. safe C. safety cabinet
B. vault D. file room
20. What should be the standard weight of a safe?
A. 650 lbs C. 450 lbs
B. 750 lbs D. 550 lbs
21. Any information that in some special way relates to the status or activities of the possessor and over which
the possessor asserts ownership.
A. Trade Secrets C. Patents
B. Proprietary Information D. Classified Information

A Self-Regulated Learning Module 36


22. Protective guarding in a compound can be done by the use of electronic hardware’s, human guards and
even animals. In England, an owner to protect his compound used this and they are not only effective but the
cheapest to maintain. This man is using:
A. Doberman dog C. geese
B. Tamed tigers and lions D. Ducks
23. Investigation of the records and files of agencies in the locality or place of residence of the individual
checked is called
A. CBI C. PBI
B. LAC D. NAC
24. The protection against any type of crime to safeguard life, assets, and operation by the use of various
methods and devices.
A. Security C. Surveillance
B. Stationary guard D. Security alarm system
25. The management of keys in a plant, office or business organization to prevent unauthorized access to said
keys.
A. Key control C. Control key
B. Intrusion alarm keys D. Security Guard key
26. The providing of sufficient illumination to areas, buildings, fencing or other spots during hours of darkness
to ensure visibility of the guards and to act as deterrent to intruders.
A. Lighting security C. Agency lighting
B. Emergency lighting D. Guard lighting
27. A method, scheme, device, or their combinations to thwart, prevent, delay, or negate criminal acts.
A. Counter measure C. Fencing
B. Burglar-resistive D. Dry-run
28. It is being used in prisons and correctional institution to illuminate walls and outside barriers.
A. Glare projection type C. Controlled lighting
B. Continuous Lighting D. Standby lighting
29. Type of protective lighting that can be most useful to selectively light a particular area in an occasional
basis is:
A. Glare projection type C. Controlled lighting
B. Continuous Lighting D. Standby lighting
30. It is the least expensive in terms of energy consumed and has the advantage of providing instant
illumination when the switch is on.
A. Incandescent Lamp C. Mercury vapor lamp
B. Metal Halide D. Fluorescent
31. This provides good color rendition high lamp efficiency as well as long life.
A. Incandescent Lamp C. Mercury vapor lamp
B. High-pressure sodium vapor D. Fluorescent
32. It is the broadest branch of security which is concerned with the physical measures adopted to prevent
unauthorized access to equipment, facilities, materials, and documents, and to safeguard them against
espionage, sabotage damage and theft.
A. Industrial security C. Physical security
B. Communication Security D. VIP Security
33. A component of communications security that results from all measures designed to protect transmission
from the interception, traffic analysis, and imitative deception.
A. Cryptographic Security C. Physical Security
B. Transmission Security D. Speech security

A Self-Regulated Learning Module 37


34. This refers to any physical structure whether natural or manmade capable of restricting, deterring, delaying,
or preventing illegal and unauthorized access to an installation.
A. Barriers C. Hazards
B. Fences D. Walls
35. What is the term referring to barriers which are offered by nature which could obstruct or delay the
passageway of potential intruders?
A. Artificial Barriers C. Natural Barriers
B. Nature Provided Barriers D. Man-made Barriers
36. What is the level of security where the system designed to impede unauthorized external activity such as
simple intrusion to armed attack?
A. Minimum C. Low Level
B. Medium D. High Level
37. A company-owned alarm systems with a unit in the nearest police station so that in case of need, direct call
is possible. The company maintains the equipment and lines both for the company and those in the police, fire
and other emergency agencies by special arrangement.
A. Auxiliary alarm C. Local Alarm
B. Proprietary system D. Central Station System
38. The final line of defense at any facility is in the high security storage where papers, records, plans or
cashable instrument, precious metals or other especially valuable assets are protected.
A. Perimeter Barrier C. Barrier
B. Protective locks D. Security Cabinet
39. This provides an extra measure of security by requiring that an exchange take place at the entrance of
each restricted area.
A. Single pass system C. Pass exchange system
B. Multiple pass system D. All of the following
40. This technique is very expensive but necessary in personnel security. It serves to verify information on the
application form and to obtain other information pertinent to the decision to employ.
A. PSI C. BI
B. CBI D. PBI
41. A form of security involving industrial plants and business enterprises, which includes the safeguarding of
personnel, process, properties and operation is:
A. document security C. bank security
B. personnel security D. industrial security
42. Security alarm, protective lighting, and __________system is used in industrial security as physical barrier.
A. ID system C. Guarding system
B. Personnel security system D. Storage system
43. If a thickness of a safe is 3inches, what is the thickness of a vault?
A. 3 C. 5
B. 4 D. 6
44. When currency is removed from the devices, the alarm is activated.
A. Bill Traps C. currency activation devices
B. Either D. Neither
45. The most widely used physical security devices in the asset protection program of an installation.
A. Lock C. Alarm
B. Lighting D. Security Cabinet
46. Any key other than those intended by the owner for use in the lock forcibly opened by the offender
A. Genuine keys C. False Key
B. Lost Key D. Duplicate Key

A Self-Regulated Learning Module 38


47. The world largest organization of security professionals.
A. American Society for Industrial Security C. Wackenhut Corporation
B. American Society Corporation D. Neither

48. It is the managing of money, men, materials and methods within security system.
A. Security Management C. Management
B. Industrial Security Management D. Any of these

49. These security containers will be of a size and quantity, which the nature of the business dictates.
A. Safe C. Vault
B. File room D. Security Cabinet

50. The decision-making process made by executives in preparation of accomplishing goals and objectives
within an organization.
A. Security Plan C. Security Planning
B. Security Program D. Security Management Plan

A Self-Regulated Learning Module 39


CHAPTER 2: RELATED LAWS IN SECURITY AND DETECTIVE
AGENCY OPERATIONS, MANAGEMENTS AND ADMINISTRATIONS.

Objectives:
At the end of this module, the students should be able to:
1. Define and Discuss RA 11917.
2. Conceptualize and explain Management and Administration.

Part 1
RA 11917
The Private Security Service Act of 2022
BOOK I
PRELIMINARY AND GENERAL PROVISIONS
Rule 1. Declaration of Policy
Section 1. Scope. The organization, operation, business, and activities of Private Security Professionals
(PSPs), Private Security Agencies (PSAs), Company Security Units (CSUs), Government Security Forces
(GSFs), and Private Security Training Agencies (PSTAs) shall be governed by Republic Act No. 11917 and
this IRR.
Section 2. Construction and Interpretation. These Rules shall be construed and interpreted in the light of the
State policies declared in Chapter I, Section 2, of RA 11917, which stipulates that:
“The State recognizes the vital role of the private sector in the protection of the people and safeguarding of
property as well as maintenance of peace and order in the country. Towards this end, the State shall adopt
measures to strengthen the regulation of private security services industry and establish quality standards to
ensure competent private security personnel and professionals that complements our law enforcement
authorities in preservation of public order in the country.”
Rule 2. Definition of Terms
Section 3. Definition. For purposes of and when used in this IRR, the following terms shall be construed in the
sense indicated herein unless the context of a particular section clearly indicates that a different sense is or
meaning intended:
a. Answer- refers to a pleading in which the respondent or other adverse party sets forth the negative and
affirmative defenses upon which he relies.
b. Authentication- refers to the service and procedure being conducted by SOSIA of verifying the authenticity
genuiness or faithful reproduction of LESP, LTO, or any document related thereto.
c. Alunan Doctrine- refers to Letter of Instructions 01/93 (Paglalansag "Charlie") issued by former Secretary
Rafael M Alunan III, DILG/Chairman Joint Cabinet Task Force OPLAN Paglalansag dated November 11, 1883
which sets forth the specific operational objectives, concepts, and tasks to be strictly followed by all concerned

A Self-Regulated Learning Module 40


agencies in the campaign to fast track and finally end the existence of private armed groups throughout the
country;
d. Appellate Authority- refers to that authority, office or unit where an appellant can appeal his case, e.g. the
Chief, PNP, for cases resolved by Chief, SOSIA or its authorized representative.
e. Armored Vehicle- refers to a transport car, security van, or truck equipped or protected with ballistic armor
and vehicle, used to transport cash, fund, checks, or any negotiable instrument or valuables.
f. Armored Guards Private Security Agency – refers to the category of PSA authorized to employ and deploy
armored vehicle security crew and/or armored security driver.
g. Armored Vehicle Ballistics Testing and Evaluation Board (AVTEB)- refers to the collegiate body composed
of selected SOSIA personnel and private security industry stakeholders tasked to evaluate and approve the
testing and evaluation conducted by designated team to ensure compliance of armored vehicle to the Ballistics
Resistance Testing and Evaluation (BRTE) requirements.
h. Authority to Purchase Firearms –refers to that authority being issued by SOSIA to a PSA, PSTA, CSU, or
GSF allowing them to procure or purchase firearm/s after complying all the requirements of the law relative
thereto.
i. Ballistic Resistance Test and Evaluation - refers to the procedure of determining that an armored vehicle is
constructed of bullet-resistant materials capable of withstanding the effects of high-powered firearms and
conforms to the standards set by SOSIA.
j. Bouncer/ Door Supervisor- refers to a licensed natural person belonging to a category of unarmed PSP who
renders security service to persons or property especially entertainment establishments, such as but not
limited to, bars, clubs, and restaurants.
k. Business Entity- refers to any organization formed by one or more natural persons to conduct business,
including, but not limited to, sole proprietorships, partnerships, corporations, cooperatives, and other
associations.
l. Canine (K9)- refers to a working dog specially trained to assist security personnel in the conduct of security
or law enforcement services such as explosive/explosive ingredients/narcotic detection, protection, patrolling,
tracking, or search and rescue.
m. Certification- refers to the service and procedure of issuing a certificate by SOSIA certifying to the existence
or non-existence of a person’s record in the SOSIA database/information system.
n. Canine (K9) Handler- refers to a license unarmed guard who officially utilizes a registered K9 in providing K9
Team services.
o. Canine (K9) Team- refers to a licensed K9 handler and his registered working dog which performs security,
law enforcement, EEIs/narcotic detection, protection, patrolling, tracking or search and rescue services.
p. Canine (K9) Trainer- refers to a person who trains the K9 Team in specific disciplines.
q. Canine (K9) Team Evaluator- refers to PNP personnel trained and certified to evaluate and conduct
proficiency/efficiency tests to K9 teams

A Self-Regulated Learning Module 41


r. Cancellation of a License- refers to the action of the Chief, PNP or the duly authorized representative of
invalidating a license issued to a licensee, after due process, upon discovery that he/she fails to meet the
eligibility requirements prescribed by laws, rules and regulations for the enjoyment of such a privilege. The
holder of a cancelled license may reapply for issuance of the same after meeting the eligibility requirements or
correction of errors committed that caused the cancellation of license. There shall be a list of cancelled
licenses to be updated weekly in the SOSIA database and uploaded/updated in the SOSIA website.
s. Cease-to-Operate Order (CTOO) –refers to the order issued by SOSIA to an entity engaged in the operation
and management of private security services for causes in gross violation/s of any of the conditions prescribed
by law in the operation of the same or for failure to renew the LTO within the specified period prescribed by
law, rules and regulations, or for causes that forced the licensee to voluntarily cease operations.
t. Closed Circuit Television (CCTV) Operator- refers to category of unarmed PSP who works in a separate
control room, monitoring and controlling a batch of screens which are linked to surveillance cameras placed in
specific places, buildings, and places to detect and prevent crime, and protect people. It is a specific
subcategory of Security Hardware Operator.
u. Company Security Unit (CSU)- refers to a security unit established and operated by any non-government
business entity whose primary business is not security service, utilizing any of its employees to watch, secure,
or guard or manage security services for the protection of its business establishment, premises, compound, or
properties; Provided that, it possesses a valid LTO to legitimately exist and operate.
v. Conflict of Claims- refers to a situation wherein there is a legal controversy issue or claim on the ownership
of a property by which parties may contract the services of their respective PSAs.
w. Due Process- refers to the right of a person to be notified, to answer, and be heard for any charge for
violation of existing laws, rules and regulations.
x. Duty Detail Order (DDO)- refers to the written order/schedule/assignment issued to security guard or other
private security personnel by a superior officer, usually the licensee of the Private Security Agency, or
administrative/resource operations manager of security, detective service, deployment of Private Security
Guard and deployment of agency owned firearms.
y. Firearm- refers to any handheld or portable weapon, whether a small arm or light weapon, that expels or is
designed to expel a bullet, shot, slug, missile or any projectile which is discharged by means of expansive
force of gases from burning gunpowder or other form of combustion or any similar instrument or implement.
For purposes of the law, the barrel, frame or receiver is considered a firearm.
z. Firearm Registration Card/Firearm Certificate of Registration- refers to the document issued by the FEO as
proof that the firearm is duly registered to a licensed citizen or licensed juridical entity and recorded in the
Firearms Information Management System (FIMS).
aa. Government Entity- refers to Local Government Units (LGUs), departments, bureaus, offices, or agencies
of the National Government, or any government entity including but not limited to GFIs, GOCCs, state
universities and colleges.
bb. Government Security Force (GSF)- refers to a government security unit other than the military, police, or
other law enforcement agencies (LEAs) established, maintained and operated for the purpose of securing the
office or compound and/or extension of a government entity.

A Self-Regulated Learning Module 42


cc. Government Security Force Personnel (GSFP)- refers to natural persons rendering and performing security
services and employed by government entities with appropriate plantilla position.
dd. Interlocking interest– refers to multiple stock ownership in various business organizations like sole
proprietorship, partnership or corporations.
ee. Juridical Entity- refers to corporations, partnerships, or businesses duly registered with the Securities and
Exchange Commission (SEC), cooperatives duly registered with the Cooperative Development Authority
(CDA), and such other associations registered with the appropriate regulatory agency; Local Government Units
(LGUs); departments, bureaus, offices, or agencies of the National Government, or any government entity
including GOCCs, state universities and colleges, and such other organizations operating or maintaining its
own security unit, whether as its main business or an adjunct thereof, that may be issued a juridical License to
Own and Possess Firearms (LTOPF) or Long Certificate of Registration (LCR) so as to legally own and
possess firearm/s and ammunition.
ff. Kennel Master- refers to a person responsible for the daily care of canine and maintenance of kennel facility.
gg. Letter of Authority- a one-time authority granted by Chief, SOSIA to PSTA to conduct private security
training.
hh. License Applicant- refers to a person, natural or juridical, who/which files an application for license to
exercise profession or license to operate private security business or entity.
ii. License to Exercise Security Profession (LESP)- refers to a license issued by the Chief PNP or his duly
authorized representative, recognizing a natural person to be qualified to perform the duties as private security
professional.
jj. License to Operate (LTO)- refers to a license issued by the Chief, Philippine National Police or his duly
authorized representative, authorizing a person to engage in a business or operation of a Private Security
Agency or Private Security Training Agency. It shall also be issued to private business entities who establish
and operate its own Company Security Unit and to government entities who shall operate its own Government
Security Force.
kk. License to Own and Possess Firearms (LTOPF)- refers to a written authority to own and possess a firearm
or firearms and ammunition granted by the Chief PNP through the Chief FEO to a citizen or a juridical entity in
accordance with the 2018 Revised lRR of RA 10591 and/or IRR of RA 11766.
ll. Long Certificate of Registration (LCR)- refers to licenses issued to government agencies or offices,
government-owned-or-controlled corporations or local government units for firearms to be used by their
officials and employees who are qualified to possess firearms as provided in the Revised IRR of RA 10591
and/or IRR of RA 11766.
mm. Monthly Disposition Report- refers to a report that PSAs submit to SOSIA and RCSUs for data
processing/encoding and record keeping. It is based on a SOSIA prescribed format that includes but is not
limited to the agency's client, security personnel, LESP category, LESP ID number, educational attainment,
issued firearms.

A Self-Regulated Learning Module 43


nn. Person- refers to natural or juridical persons, such as but not limited to sole proprietorships, partnerships or
corporations, duly organized and registered with the appropriate government agency, including any juridical
entity as defined in this IRR.
oo. Permit to Transport (PTT) - refers to a written authority issued to a licensed citizen or a licensed juridical
entity by the Chief, PNP through the Chief, FEO or by RCSUs) which entitles such person or entity to transport
particular regulated or controlled items/articles including but not limited to firearm/s and ammunition from and
to a specific location, within the duration and purpose in the authority.
pp. Pre-Licensing Training Program (PLTP)- refers to licensing pre-requisite and pre-licensing training
programs that include all training and academic programs and courses with the objective of indoctrinating
individual with the basic skills and educational backgrounds necessary in the effective exercise and
performance of the security and detective profession. These include, but are not limited to, the Basic Security
Guard Course and the Security Officers Training Course subject to the conditions, requirements and limitations
prescribed by the Private Security Training Board and duly organized by Chief, SOSIA.
qq. Private Detective (PD)- refers to any person who does detective work for hire, reward or commission, other
than members of the Armed Forces of the Philippines, guards of the Bureau of Jail Management and
Penology, municipal or city jail guards, and members of the Philippine National Police or of any other law
enforcement agency of the government.
rr. Private Detective Services (PDS)- refers to the act of providing detective, investigative or protective
services, including but not limited to personal security protection, inquiry and information gathering, pre-
employment verification and individual background profiling, providing assistance in civil liability and personal
injury cases, insurance claims and fraud, child custody and protection cases, for the purpose of assisting in
gathering information leading to determination and/or prevention of criminal acts and/or resolution of legal,
financial and personal problems.
ss. Private Security Agency (PSA)- - refers to any person, natural or juridical, which contracts, recruits,
furnishes or posts any security guard or any other private security professional, to perform its functions or
solicit individuals, businesses, firms, or private, public or government-owned or controlled corporations to
engage its service or those of his/its security guards, for hire, commission or compensation thru subscription or
as a consultant/trainer to any private or public corporation whose business or transactions involve national
security or interest like the operation and/or management of domestic or ocean vessels, airplanes, helicopters,
seaports, airports heliports, landing strips etc., or as consultant on any security related matter, or to provide
highly specialized security, private escort, detective and investigation services like gangway security, catering
security, passenger profiling, baggage examination, providing security on board vessels or aircraft, or other
security needs that the PNP may approve.
tt. Private Security Industry (PSI)- refers to the industry that is engaged in providing security consulting,
management, administration, operation, and provision of private or company watchman, guarding,
investigative/protective/detective services, security training, Canine security, armored vehicle security services,
alarm system monitoring services, closed-circuit television (CCTV) suppliers and other providers of security
hardware, security hardware operation, personal protection services, security consultant.
uu. Private Security Professional (PSP)- refers to a person who is eligible/qualified to be issued a valid LESP
of any classification or category, issued by the designated government agency after satisfying all the
qualifications and requirements set forth in this IRR. It includes but is not limited to security watchmen, security
guards, security officers, personal security escorts, private investigator, training officers and directors, canine

A Self-Regulated Learning Module 44


handlers, canine administrators, canine evaluators, canine trainers, kennel masters, and other certified or
licensed security service providers rendering or performing security, investigation, security escorting services,
security hardware planners and systems designers, security hardware operators, security managers, security
consultants whether employed by private security agencies, private corporations, government agencies or
independently practicing or providing professional security services.
vv. Private Security Services (PSS)- refer to the act of providing or rendering security services for
compensation pursuant to mutually agreed terms of reference and contract and shall include the act of
providing or rendering services to watch an establishment whether public or private, building, compound/area
or property, to conduct access control/denial in any form whether physically, manually or scientifically by
manual, mechanical or electronic monitoring systems, for the purpose of securing such area/property and at
the same time ensuring safety and protection of persons within such areas, to maintain peace and order within
such areas, to conduct private security training, and/or to conduct investigation. It shall also include the act of
contracting, recruiting, training, furnishing or posting any security guard, to do its functions or solicit individuals,
businesses, firms, or private, public or government -owned or -controlled corporations to engage his/its service
or those of his/its security guards, for hire, commission or compensation through subscription or as a
consultant/trainer to any private or public corporation.
ww. Private Security Service Provider (PSSP)- refers to any person, natural or juridical, which is engaged in
providing private security services for compensation or commission through the employment and deployment
of private security professionals.
xx. Private Security Training Agency (PSTA)- refers to an agency which engages in the business of providing
training, academic and other professional development programs to Private Security Professionals.
yy. Private Security Training Programs (PSTP)- refer to training and academic programs and courses duly
approved or prescribed by the Philippine National Police and adopted by the Technical Education and Skills
Development Authority (TESDA). It shall include the pre-licensing training requirements of individual security
guards and other security personnel, the periodic and non-periodic in-service skill refreshers for such security
personnel, and other specialized, individual or group, private security personnel skills development.
zz. Private Security Training Services (PSTS)- refer to the conduct of private security training, provision of the
physical facilities and installation necessary in the conduct thereof, and/or the provision of the appropriate
management, administrative, and instructor/training staffs therefore, the actual performance and/or exercise of
which requires the appropriate permit and/or authority as herein provided.
aaa. Protection Agent – refers to a natural person issued with LESP by SOSIA to engage in providing personal
security protection to a VIP or Protectee.
bbb. RCSU- refers to the Regional Civil Security Unit of the Civil Security Group. For purposes of this IRR, the
Chief, RCSU is the official representative of the Chief, SOSIA in their respective territorial jurisdiction.
ccc. Restoration of License- refers to the action of the Chief, PNP or the duly authorized representative, of
restoring the validity of a license previously declared null and void, after the licensee’s showing of pertinent
documents that will merit such action.

A Self-Regulated Learning Module 45


ddd. Revocation of License - refers to the action of the Chief, PNP or the duly authorized representative, of
invalidating a license, after due process, for the licensee’s culpable violation of applicable provisions of RA
11917, this IRR, or relevant issuances.
eee. Security Consultant- refers to a security professional authorized by law to provide security services
including but not limited to design and formulation of a security plan, threat and vulnerability assessment,
resiliency planning, security surveying, security auditing, risk management, travel security training, event
security planning and management, emergency and incident planning and management, crisis management,
business continuity and other services related to the formulation of security-related solutions other than
providing guards and watchmen.
fff. Security Guard (SG)- refers to a license natural person who offers or renders personal service to watch or
secure either a residence, business establishment, or buildings, compounds, areas, or property,
inspects/monitors bodily checks/searches individuals and/or baggage and other forms of security inspection,
physically/manually or scientifically by electronic or any other means, including but not limited to, logging
concessions and agricultural, mining or pasture lands, transportation, for hire or compensation , or as an
employee thereof, including any employee of the national or local governments or agencies or instrumentality’s
thereof and or government owned or controlled firm or corporations who is employed to watch or secure
government buildings, compounds, premises and other properties, other than members of the Armed Forces of
the Philippines, guards of the Bureau of Jail management and Penology, Municipal or City jail guards, and
members of the Philippine National Police or of any other law enforcement agency of the Government.
ggg. Security Hardware- refers to any mechanical or electronical device, which is designed and/or used for
detection of an unauthorized entry into a facility, for alerting others of the commission of unlawful or
unauthorized act within a building, structure or facility, identification and screening, control, repel and prevent
entry of persons and vehicles of person and materials, recording and documentation of activities and events,
repel and prevent aggression to a person of facility standard specification of security hardware presented by
the UESB.
hhh. Security Hardware and Systems Designers and Planners- refer to the security professionals who
specialize in the design of security systems using a combination of security software and hardware to address
security requirements of a facility and the training for their operation and maintenance.
iii. Security Manager- refers to a license natural person who strategically maintains a secure and safe physical
environment. They typically do this by planning and practicing safety strategies, emergency procedures and
property surveillance. This PSP may be employed either by a PSA, PSTA, CSU, or GSF.
jjj. Security Motor Vehicle – refers to marked vehicles being utilized by PSSPs in rendering security services. It
shall include, but not limited to, Armored Vehicles, Patrol Vehicles, Electric Vehicles, and K9 Vehicles.
Standard Specification of Security Motor Vehicle are prescribed by the UESB.
kkk. Security Supervisor- refers to a license natural person in charge internally forced of coordinating and
overseeing the security staff in a building or within the designated area or deployment. This PSP is usually
employed by a PSA and deployed to a specific client establishment/facility responsible for the supervision of a
security team.
lll. Sentry Canine- refers to a dog trained usually for deployment on fixed post such as entry and exit points of
building or commercial centers or used to guard the outside of a large property, such as a warehouse or
shipyard, to prevent trespassers. In many cases, their presence or bark deter unwanted visitors.

A Self-Regulated Learning Module 46


mmm. SOSIA - refers to the Supervisory Office for Security and Investigation Agencies of the Philippine
National Police;
nnn. SOSIA License Revocation and Restoration Board (SLRRB)- refers to the SOSIA board with a regulatory
function to study, review, validate and recommend the revocation, cancellation, suspension or restoration of all
issued licenses, registrations and permits relative to private security industry after due process, subject to the
approval of Chief, SOSIA.
ooo. SOSIA Security Training Board (SSTB)- refers to the SOSIA board with regulatory functions to study,
review, and formulate training programs to be offered by PSTAs in the development of skills and knowledge of
private security professionals.
ppp. Special Duty Detail Order (SDDO)- is a written order issued by the C, PNP or his authorized
representative to allow a protective agents to be deployed by a protectee.
qqq. Suspension of License- refers to the action of the Chief, PNP or his duly authorized representative of
temporary withdrawing the privileges provided by law on a license for the licensee’s non-compliance of the
terms and conditions set forth for enjoying such privileges. Suspended licenses shall be restored immediately
upon satisfactory compliance of the licensee of the lacking requirements or satisfaction of penalties for
violations committed or other deficiencies that caused the suspension. Non-compliance for such will be
grounds for revocation.
Rule 3. Types of Licenses
Section 4. Two (2) Types of Licenses. The two (2) types of licenses are as follows:
1) License to Exercise Security Profession (LESP); and
2) License to Operate (LTO).
Section 5. Three (3) Classes of LESP.
1) LESP-Training Personnel.
2) LESP-Security Personnel (including CSU and GSF personnel); and
3) Operator LESP.
Section 6. Categories of LESP (ANNEX “A”). The following are the categories of LESP and its restrictions:
1) Private Security Training Agency Personnel:
a. Training Director;
b. Training Officer;
c. Training Instructor;
d. Training Consultant; and
e. Canine Trainers;

A Self-Regulated Learning Module 47


2) Private Security Agency Personnel:
a. Watchmen.
b. Security Guard.
c. Canine Handlers.
d. Security Systems Integrator.
e. Bank and Armored Guard.
f. Protection Agent.
g. Private Detective.
h. Security Officer.
i. Kennel Master;
j. Security Manager; and
k. Security Consultant.

3) Company Security Unit Personnel:


a. Company Security Manager.
b. Company Security Officer; and
c. Company Security Guard.

4) Government Security Force Personnel:


a. Government Security Manager.
b. Government Security Officer; and
c. Government Security Guard.
5) Operator LESP.
Section 7. Four (4) Classes of LTO.
1) Private Security Training Agency.
2) Private Security Agency.
3) Company Security Unit; and
4) Government Security Force.

A Self-Regulated Learning Module 48


Section 8. Categories of Security Services of PSA.
1) Guard Services.
2) Protective Services.
3) Detective Services.
4) Canine Security Service Provider.
5) Armored Vehicle Security Services.
6) Security System Hardware and Design
A business entity may establish one (1) PSA which may provide one or more categories of security services
covered by distinct and separate LTO: Provided that they shall not employ more than 2,000 Private Security
Professionals.
Rule 4. License Necessary
Section 9. LESP for Private Security Professionals. No person shall act as or engage in, the practice, service,
business, occupation, or calling security profession without a valid License to Exercise Security Profession
(LESP) issued by the Chief, SOSIA.
Section 10. Exception for Clerical or Manual Work. No person shall engage in the operation, management,
direction, and/or conduct of a PSA, CSU, GSF, or PSTA without a valid LESP except those employed solely for
clerical or manual work or office rank and file personnel. Provided that supervisory and managerial office
personnel shall be required to serve their respective LESP.
Section 11. LTO for PSA, CSU, GSF, and PSTA. No person shall act as, or engage in, the service or business,
a PSA, CSU, GSF, or PSTA without a valid License to Operate (LTO) issued by the Chief, SOSIA.
Section 12. LESP Conversion from PSA Personnel to GSF personnel. A PSP with LESP classification under
PSA personnel and was hired by a GSF shall convert his/her LESP from PSA personnel to GSF personnel
subject to additional qualifications and documentary requirements as indicated in the last preceding section
and upon payment of appropriate fees.
Section 13. Period of LESP Conversion of PSP to GSF Classification. The period of LESP conversion shall be
within thirty (30) days after the date of hiring by a GSF: Provided that, late conversion fee shall be imposed if
not complied.
Section 14. Period of Validity in the LESP Conversion of PSP to GSF Classification. LESP under PSA
personnel classification that are not appropriately converted shall be automatically cancelled.
Section 15. LESP Categories not Allowed under CSU personnel and GSF Classification. Any LESP may be
processed under the CSU personnel and GSF personnel category, except the Personal Security
Escort/Protection Agent.
Rule 5. Validity of License
Section 16. Validity. The validity of licenses shall be as follows unless sooner suspended, revoked or canceled;
a. The LESP of duly qualified PSPs shall be valid for a period of five (5) years from the date of issuance.

A Self-Regulated Learning Module 49


b. The LTO shall be valid for five (5) years from the date of issuance.
Section 17. Renewal. A license may be renewed or cancelled on any of the following instances:
a. Licenses may be renewed on or within sixty (60) days prior to the expiry date;
b. Expired LESP may be renewed provided that the personnel shall undergo Retraining Course; or
c. The LTO of PSAs, PDAs, and CSUs that fail to file for renewal of LTO sixty (60) days after its expiry date
shall automatically be cancelled and be issued with Cease-to-Operate Order by the approving authority.
Rule 6. Authority over Licenses
Section 18. Authority on LESP and LTO. Chief, SOSIA shall have the authority to approve or disapprove
applications for LESPs and LTOs.
Section 19. Authority to Impose, Appropriate, Administrative Action, Fine or Penalty, Suspend, Revoke, or
Cancel LESP and LTO. Chief, SOSIA shall have the authority to suspend, revoke, or cancel LESP and LTO:
Provided, that suspension, revocation, and cancellation shall be based on the deliberation and
recommendation/s by the SOSIA License Revocation and Restoration Board (SLRRB).
Rule 7. Pre-licensing Training Requirement
Section 20. Training required for Applicants. All applicants for LESP or LTO shall have received the
appropriate training from a PSTA with a valid LTO. Provided that, all PSTAs shall acquire appropriate Letter of
Authority (LA) issued by SOSIA prior to the conduct of training.
Section 21. Other Trainings. Clients of the PSA may require other trainings and seminars for security
personnel: Provided that expenses for such trainings and seminars shall be borne by the clients.
Rule 8. Standard Qualifications of a LESP applicant and Documentary Requirements
Section 22. Standard Qualifications of LESP Applicant and Documentary Requirements for New LESP
Application. No applicant shall be granted LESP unless he/she possesses the standard qualifications and able
to submit the following documentary requirements which must be valid, authentic and complete:
Qualifications Documentary Requirements
1. Legal age;
2. Filipino citizen;
3. Physically and mentally fit;
4. Good moral character;
5. Must not have been convicted of a crime or offense involving moral turpitude; and
6. Must have completed PLTP and/or a PSPTC
1. Birth Certificate issued by the Philippine Statistics Authority.
2. Medical Certificate from any government hospital (Fit to Work).

A Self-Regulated Learning Module 50


3. Neuro-Psychiatric Evaluation Result (recommended) from the PNP Health Service or PNP Accredited
Neuro-Psychiatric Test and Evaluation Center (NPTEC) duly validated by the PNP Health Service.
4. Drug Test Result (negative) from a DOH-accredited Drug Testing Laboratory Center or the PNP Forensic
Group.
5. National Police Clearance; and
6. Certificate of Completion for each PLTP and/or each PSPTC from a PSTA with valid LTO and LOA.
Provided that new LESP applicants for other specific categories of LESP shall possess and submit additional
qualifications and requirements as may be required by SOSIA.
Section 23. Standard Qualifications of a LESP applicant and Documentary Requirements for Renewal of LESP
Application. LESP shall be renewed every five (5) years and upon satisfying the requirements of SOSIA such
as, but not limited to, absence of pending case, submission of mandatory periodic reports, and completion of
In-service Skills Refresher Courses, Skills Development Courses, and other Enhancement and Specialized
Training Courses.
Section 24. Standard Documentary Requirements for a New LTO Applicant. No juridical entity applicant shall
be granted an LTO unless it possesses the standard qualifications and able to submit the following
documentary requirements which must be valid, authentic and complete:
Applicant Requirements:
1. Valid Operator LESP; and
2. Notarized LTO Application Form.
Legal Requirements for New Applicant:
3. Appropriate business/ company registration documents:
a. For Sole/ Single Proprietorship –
i. Certificate of Business Registration issued by the DTI indicating the name of Applicant with valid Operator
LESP as Owner/ Proprietor.
b. For Juridical Entity –
i. Certificate of Registration issued by SEC, CDA, or equivalent government agency; and
ii. Relevant documents indicating the name of Applicant with valid Operator LESP as part owner or holder of at
least one (1) share of stock with voting rights (e.g. SEC=Articles of Incorporation; CDA=Approved By-laws,
etc.).
c. For Government Entity –
i. The law highlighting the provision of its creation or establishment.
Financial Requirements:
4. Bank Certification/Statement or Treasurer’s Certificate indicating at least One Million Pesos
(Php1,000,000.00) of available funds.

A Self-Regulated Learning Module 51


5. Bond, with coverage amount of at least Fifty Thousand pesos (Php50,000.00), issued by competent
reputable surety, fidelity, or insurance company duly accredited by the Insurance Commission.
Staffing Requirements:
6. LESPs of the required PSP staff. (at least 1 Operation Officer and 1 Admin Officer)
7. Training Certificate of the Licensee Security Industry Regulation Seminar (SIRS) by SOSIA (Original and
Photocopy Authenticated by STMD, SOSIA) as necessary
8. Valid SO/SC LESP of the Licensee and Staff (Original or Authenticated Photocopy) as necessary.
Facilities Requirements:
9. Proof of Ownership of office / (valid for at least one (1) year Lease Contract of property.
10. Appropriate facilities based on the nature of the security service.
11. Endorsement with Inspection Report from Chief, RCSU (Application outside Manila) and Inspection Report
from Chief, RCSU-NCR (Application based in Manila);
Equipment Requirements:
12. Appropriate and sufficient equipment for efficient operation.
Section 25. Standard Documentary Requirements for Renewal of LTO. No application for renewal of LTO shall
be processed unless juridical entity applicant shall be able to submit the following documentary requirements
which must be valid, authentic and complete:
Documentary Requirements:
1. Valid Operator LESP;
Legal Requirements:
2. Appropriate business/ company registration documents from DTI, SEC, CDA, or equivalent government
agency indicating name of Operator as proprietor, President, at least 1% stockholder with voting rights, or its
equivalent.
3. Annual Income Tax Returns (ITR);
4. Value Added Tax (VAT) Payments.
5. Previous LGU business permit.
6. SSS, PhilHealth, Pag-IBIG registration.
Financial Requirements:
7. Bank Certification/Statement or Treasurer’s Certificate indicating at least Php1,000,000.00 of available
funds.
8. Bond, with coverage amount appropriate to number of PSPs employed, issued by competent reputable
surety, fidelity, or insurance company duly accredited by the Insurance Commission.

A Self-Regulated Learning Module 52


Staffing Requirements:
9. LESPs of the required PSP staff (at least 1 Operation Officer and 1 Admin Officer);
10. Appropriate certificates of the required PSP staff.
Facilities Requirements:
11. Proof of Ownership of the office/ At least one (1)-year Lease Contract of Property (valid for at least one
year);
12. Inspection Report.
Equipment Requirements:
13. Appropriate and sufficient equipment for efficient operation.
Rule 9. Limitations, Disqualifications, And Prohibitions
Section 26. Disqualifications. No license shall be granted to any application new/renewal for LTO or LESP
with any of the following disqualifications.
1. having been convicted of any crime or offense involving moral turpitude.
2.having been dishonorably discharged or separated from employment or service.
3. being a mental incompetent.
4. being a user of or addicted to the use of dangerous drugs or narcotics.
5. being a habitual drunkard; or
6. dummy of a foreigner.
Rule 10. Processing of Application for LESP and LTO
Section 27. Who shall Process. All applications for LESP or LTO shall be processed by SOSIA and/or RCSUs.
Section 28. Processing Requirements. Application shall be processed upon showing that the applicant has all
the qualifications and none of the disqualifications, able submit complete, authentic and valid documentary
requirements, and upon payment of applicable fees. All applications shall be processed in accordance with the
procedures specified in ANNEX “B” of this IRR.
Rule 11. Issuance of LTO And LESP Identification Card
Section 29. Issuance of LTO. It shall be issued to an applicant, who has complied with all the standard
qualifications and documentary requirements after payment of fees as prescribed by SOSIA. The LTO shall
bear the signature of the Chief, SOSIA indicating that the person named therein is entitled to operate a security
service so specified in the license.
Section 30. Issuance of LESP Card. It shall be issued to an applicant, who has complied with all the standard
qualifications and documentary requirements after payment of fees as prescribed by SOSIA. The LESP card
shall bear the signature of the Chief, SOSIA indicating that the person named therein is entitled to exercise a
security profession so specified in the license.

A Self-Regulated Learning Module 53


Rule 12. Possession and Display of License
Section 31. Possession of LESP Card. All PSPs, while in the exercise of their profession, shall have on their
possession a valid LESP Identification Card.
Section 32. Display of LTO. All PSTAs, PSAs, CSUs, and GSFs shall, at all times, display and post a copy of
its valid LTO in a conspicuous place in the business establishment or office premises of its official business
address and all its registered branch offices together with other mandatory business licenses and permits.
BOOK V
PRIVATE SECURITY AGENCY, COMPANY SECURITY UNIT AND GOVERNMENT SECURITY FORCE
Rule 29. Organization of PSA
Section 113. Who may Organize and Operate a PSA. The following may organize a PSA and provide
security services;
1. A Filipino citizen; or
2. A juridical entity wholly owned and controlled by Filipino citizen/s.
Provided that, in case of juridical entity, the named Operator or Licensee shall be its President or any of its
incorporators complying with the requirements and duly authorized by their Board of Directors.
Section 114. One Person Corporation (OPC). The named operator or licensee shall be its President/Owner
and sole shareholder.
Section 115. Who may Apply for PSA License to Operate. Only a natural person, who possesses a valid
Security Agency Operator LESP, shall be an applicant for PSA LTO.
Section 116. Standard Documentary Requirements of Applicant for PSA-LTO. No Applicant shall be granted
PSA-LTO unless it satisfies the standard qualification and submits the documentary requirements stated in
Rule 8 Section 24 of this IRR.
Section 117. Company Security Unit. Any juridical entity not primarily engaged in the security industry and
establishing its own security department or unit shall be organized and registered with SOSIA as a Company
Security Unit.
Section 118. Government Security Force. Any government agency, including but not limited to government-
owned and controlled corporation (GOCC), local government unit (LGU), and state university and college
(SUC), shall register its security unit with SOSIA as a Government Security Force, provided that there is a
charter and plantilla position.
Rule 30. Limitations and Guidelines
Section 119. Prohibition on the Organization of PSTA, PSA, and CSU. No person shall organize or have an
interest in more than one PSTA, PSA, and CSU. The Operator LESP of persons, after due process,
administratively liable for violating this provision shall be cancelled.

A Self-Regulated Learning Module 54


Section 120. Acceptance in Providing Security Services. No PSA, CSU, or GSF shall offer, render, or accept
services in illegal gambling dens or other illegal business establishments or enterprises.
Section 121. Extension in Providing Security Services. The extent of the security service provided by the PSA,
CSU, or GSF shall not go beyond the compound and/or property of the person or establishment contracting the
security service except when the security personnel is escorting person/s or big amount of money or valuables:
Provided that, the security personnel is in possession of SDDO indicating the period and route of the security
escort service. Provided further, that the security personnel are in possession of either a PA-LESP and/or AV-
LESP.
Section 122. Main Offices. All PSA, CSU, GSF shall maintain a main office in their registered addresses.
Section 123. Branch Offices. Branch offices may be established and maintained in other provinces/ cities
where the PSA, CSU, GSF has deployed security personnel: Provided that, the security service is covered by
a Security Service Agreement/ Contract and appropriate Duty Detail Order (DDO).
Section 124. Non-Base Operations. PSA operating at regions outside its main office shall be required to
register online with SOSIA accessible by RCSUs: Provided that, pending the operationalization of the Online
System, PSA shall be required to register with the nearest RCSU and shall submit an authenticated machine
copy of the following documents:
1. License to Operate.
2. List of FAs with valid registrations to be issued.
3. Juridical LTOPF for PSA with armed personnel.
4. List of security personnel with valid LESPs to be deployed; and
5. Duty Detail Order (note: does not include any fees).
Section 125. Evidence of Business Viability. No new or moribund but previously licensed PSA or CSU shall be
granted license to operate unless its business viability is supported by evidence of assured clientele, adequate
capitalization, and the like.
Section 126. Expired LTOPF and/or Firearm Registration. PSA, CSU, PSTA, or GSF applicant with expired
Juridical LTOPF and/or Firearms Registration shall not be a bar in renewal LTO application.
Rule 31. Organizational Structure of PSA, CSU, and GSF
Section 127. Private Security Agencies. All PSAs shall conform with the organizational structure, personnel,
equipment, trainings, and uniforms as provided for hereinafter.
Section 128. Company Security Unit. All CSUs shall be organized to conform substantially with the
organizational structure prescribed for Private Security Agencies.
Section 129. Government Security Force. All GSFs shall be organized to conform with the organizational
structure of the said government firm agency but not contrary to the organizational structure as prescribed for
Government Security Forces; Provided that, security personnel of GSF shall be holder of plantilla position.
Further, they shall not act beyond the limits of a security personnel and carry only firearm stated in Rule 37
Section 155 of this IRR.

A Self-Regulated Learning Module 55


Rule 32. Employment and Membership
Section 130. Minimum Number of PSP. The minimum number of private security personnel that a PSA may
employ shall be at least three (3) security staff at the time of application.
Section 131. Maximum Number of PSP. The maximum number of private security personnel that a PSA, CSU
or GSF may employ but not more than two thousand (2000) security personnel.
Section 132. Minimum Number of PSP for CSU. No LTO shall be granted to any CSU unless it has a minimum
of thirty (30) licensed security personnel employed.
Section 133. Renewal of GSF-LTO. GSF-LTO shall be renewed every five (5) years. However, GSF-LTO of
LGUs shall be renewed every three (3) years and shall be applied within sixty (60) days upon assumption of
concerned local government executive.
Rule 33. Application of LTO by the Licensee
Section 134. Application Form. The Licensee/Applicant shall fill-up the standard application form for filing of
LTO.
Section 135. Venue for LTO Application. All applications for LTO shall be filed directly to Supervisory Office for
Security and Investigation Agencies (SOSIA) or thru their respective RCSUs.
Section 136. Applications of Corporations and Partnerships. Applicant shall include a copy of the certificate of
registration with the SEC, CDA, or other similar agencies, together with its by-laws and articles of
incorporation. A board resolution must accompany the application of the licensee in the case of a corporation,
stating therein that the licensee is part-owner and operator of the agency.
Section 137. Bond Requirement. Every application for LTO shall be accompanied by a bond issued by any
competent or reputable surety, fidelity, or insurance company duly accredited by the Insurance Commission.
The bond shall be used to answer for any valid and legal claim against the agency by its clients or employees.
The amount of bond to be determined by the Chief, PNP must be reasonable and should depend on the
number of PSPs employed.
Section 138. Disposition of Excess Firearm/s. Upon renewal, excess Firearms registered under the name of
PSA shall be deposited to FEO, RCSU, or nearest Police Station with acknowledgement receipt from the
receiving unit. Upon request of the PSA, FEO shall automatically issue the findings of disposition of said
firearms.
Rule 34. Corresponding License to Operate
Section 139. Private Security Agency LTO. A license certificate issued to persons, corporations and
partnerships, whose primary purpose is to provide/offer security services for hire, commission, or
compensation.
Section 140. Company Security Unit LTO. A license certificate issued to persons, corporations and
partnerships not doing business nor purposely organized or principally as private security guard or detective
agency but utilize their own trained employees to render security duties and functions for their own assets
and/or properties.

A Self-Regulated Learning Module 56


Section 141. Government Security Force LTO. A license issued to government agency not doing business nor
organized purposely or principally a security unit but utilizes for its purpose any of its employees to render
government security and/or detective duties and functions shall submit the following documents:
1. Letter request addressed to Chief, SOSIA.
2. Charter of the agency concerned or other similar documents creating such government agency.
3. List of licensed/registered firearms.
4. List of government security personnel with valid LESP handling firearms with their personal data sheet.
5. Firearm Records Verification/Firearm Information Management System.
6. Designated posts of the government security personnel; and
7. Appointment Order/ Plantilla.
Rule 35. Responsibility of PSA, CSU and GSF
Section 142. Responsibility for Training and Progressing Development. It is the primary responsibility of all
operators of PSA, CSU, and GSF to maintain and upgrade the standards of efficiency, discipline, performance,
and competence of their personnel. Duly licensed private security agency and company security unit shall
establish a staff position for training and appoint a training officer whose primary function is to determine the
training needs of the agency/guards in relation to the needs of the client/market/industry, and to supervise and
conduct appropriate training requirements. All security personnel shall undergo In-Service Training Course at
least once every two years within the validity period of LESP and Refresher Training Course prior to renewal
application.
Section 143. Coordination with Local Police Station. All deployed security personnel through their respective
agency shall coordinate with local Police Stations in the area.
BOOK VI
FIREARMS, VEHICLES, CANINE UNITS, UNIFORMS, AND OTHER SECURITY HARDWARE AND
EQUIPMENT
Rule 36. Acquisition and Use of Firearms
Section 144. How to Acquire Firearms. A Private Security Training Agency (PSTA), Private Security Agency
(PSA), Company Security Unit (CSU), and Government Security Force (GSF) shall be entitled to acquire and
possess firearms after having successfully passed the requirements prescribed by the CPNP and in
accordance with Republic Act (RA) No. 10591 and its 2018 Revised Implementing Rules and Regulations
(RIRR) and RA No. 11766 and its IRR.
Section 145. Issuance of Authority to Purchase Firearms. Chief, SOSIA shall issue Authority to Purchase
Firearms in accordance with the procedures, requirements and guidelines provided in ANNEX “C” of this IRR.

A Self-Regulated Learning Module 57


Section 146. Validity Period of Juridical LTOPF and FR of PSTA, PSA, CSU, and GSF. Notwithstanding the
validity of LTOPF and firearm registration provided for under RA No. 11766 and its IRR, the validity period of
LTOPF and firearm registration of PSTA, PSA, CSU, and GSF shall be five (5) years reckoned from the
birthdate of the original authorized representative or bonded firearm custodian, as the case may be: Provided,
that GSF of local government unit (LGU) shall be three (3) years reckoned from the assumption of elective
officials after local elections and the birthdate of the bonded property custodian.
Section 147. Use of Firearms. The use of firearms by PSPs shall always conform to the standards of Force
Continuum as stated in section 314 of this IRR.
Section 148. Requirements for Acquisition, Use and Possession of Firearms. A PSTA, PSA, CSU, and GSF
with valid License to Operate (LTO) shall secure the Juridical License to Own and Possess Firearm (JLTOPF)
issued by PNP-Firearms and Explosives Office (FEO), as legitimate proof of its authority to acquire, own,
possess and register firearms under their names.
Section 149. Authorized Possession of Firearm/s. PSA/CSU/GSF shall be entitled to use and possess firearms
after satisfactorily complying with the requirements authorized by the Chief, Philippine National Police pertinent
to the possession of firearms, provided that the number of firearms shall not exceed one (1) firearm for every
security guard employed.
Section 150. Training required for use of Firearms. The duly licensed Security Guards or Watchmen who will
use the firearm shall undergo responsible Gun Safety and Responsible Gun Ownership Seminar (GSRGOS)
and at least basic marksmanship training under the supervision of qualified officers and men of the Philippine
National Police.
Section 151. Registration of Instructional Firearms. PSTAs after conformity with licensing requirements from
SOSIA and FEO, may be registered for the purposes of instructional, training or classroom purposes, in a
number and type as prescribed under existing firearms laws.
Rule 37. Restrictions and Limitations
Section 152. Limitations on Acquisition and Possession of Firearms of PSAs and CSUs. A PSA and CSU shall
only be allowed to acquire and possess small arms, specifically handguns and shotguns but shall not exceed
one (1) firearm for each private security professional (PSP), to include single-post, in its employ, to the
exclusion of unarmed PSP: Provided, that rifles, categorized as small arms by the FEO Classification Board,
may be acquired and possessed by a PSA and CSU in instances determined and approved by Director, CSG.
Section 153. Instances when Rifles with Category as Small Arms may be Allowed for PSAs and CSUs. The
following are the instances when rifles with category as small arms may be allowed for PSAs and CSUs:
1. Mine site deployment.
2. Power plant deployment.
3. Critical infrastructures, Vital Installations.
4. Escorting and securing large amounts of cash or valuables.
5. Upsurge of lawlessness and criminality as determined by the PNP; and
6. Other facilities which, by the nature of their business, personalities, and security conditions in the area of
deployment, merit the deployment of the said arms.

A Self-Regulated Learning Module 58


Section 154. Allowable Firearms for PSAs and CSUs. A PSA and CSU shall only be allowed to acquire and
possess the following small arms: revolver, Caliber .38, .22, .25, 9mm, shotgun, and Semi-automatic Pistol
Caliber Carbine not exceeding Caliber .45.
Section 155. Restriction to Possess High-Powered Firearms/ Light Weapons. A PSA/ CSU/ GSF is not allowed
to possess high caliber firearms considered as military-type weapons such as M16, M14, cal .30 carbine, M1
Garand, and other rifles and special weapons with bores bigger than cal .22, to include pistols and revolvers
with bores bigger than cal .38 such as cal .40, cal .41, cal .44, cal .45, cal .50, except cal .22 centerfire
magnum and cal .357 and other pistols with bores smaller than cal .38 but with firing characteristics of full
automatic burst and three-round burst. However, when such entities are operating in areas where there is an
upsurge of lawlessness and criminality as determined by the C, SOSIA, they may be allowed to acquire,
possess and use high-powered firearms.
Section 156. Quantity Limitations on PSTAs. For PSTA, the number of firearms shall be limited to the
instructional or training requirements of the training agency as determined and approved by FEO and SOSIA;
Provided that, PSTA may outsource GSRGOS or marksmanship training with FEO accredited shooting range/s
through a Memorandum of Agreement or similar contract.
Section 157. Quantity Limitations on GSFs. For Government Security Forces, the quantity of the firearms
under its ownership and/or possession or to be acquired shall depend on the number of personnel or
employees with plantilla positions performing security functions.
Rule 38. Transportation, Carrying and Bearing of Firearms and Ammunition.
Section 158. Permit to Transport Firearms and Ammunition. PSTA, PSA, CSU, and GSF shall secure a
Permit to Transport firearms and ammunition from FEO or RCSU prior to its movement or transportation.
Section 159. Validity Period of PTT. It shall indicate the validity period as appropriate to the distance, location,
and circumstances of the transportation activity.
Section 160. Carrying and Bearing of FAs by PSAs and CSUs. Carrying and use of firearms by PSPs of PSA,
GSF and CSU shall only be allowed during their tour of duty, in proper uniform, and within the compound of the
establishment covered by Duty Detail Order (DDO).
Section 161. Duty Detail Order (DDO). Private security agency/private detective agency / company security
services/ government guard unit detailing their security personnel on duty under the circumstances mentioned
in the preceding section or while escorting big amount of cash or valuable outside its jurisdiction or area of
operation, shall issue an appropriate duty detail order to the security personnel concerned using under the
following conditions:
Section 162. Duty Detail Order (DDO) Necessary. A DDO shall be issued by the PSA and CSU indicating the
name of the PSP, the firearm description, the specific duration and location of the posting or assignment, the
authorized bonded firearm custodian, and such other terms and conditions deemed necessary.
1. DDOs for the purpose of transporting agency licensed firearms from agency vault/office to post and back for
posting, for routine rotation, replacement of firearms or for conduction service duties, shall be issued for not
more than a duration of twenty-four (24) hours;
2. DDOs for the purpose of post duties not requiring transport of firearms outside of the physical compound or
property of a client or client establishment/firm shall be issued for not more than a thirty (30) day duration.

A Self-Regulated Learning Module 59


3. Transport of firearm other than those covered in paragraph a and b, Section 1, Rule VI above, shall require
the appropriate transport permit issued by the Firearms and Explosives Office or Police Regional, Provincial or
City Office nearest the place of origin.
4. All DDOs shall indicate the following:
a. Name, address and contact number of agencies.
b. Issue serial number and date of DDO.
c. Complete name and designation of grantee.
d. Purpose.
e. Inclusive dates of detail.
f. Firearms description and license number.
g. Other specific instructions/remarks; and
h. Signature and designation of issuing officer.
Section 163. Carrying of FAs of PSTAs. For private security training personnel of PSTA, carrying and use of
firearms shall only be done during instructional demonstration and practical exercises within the premises of
the classroom or as may be appropriate under the circumstances in relation to Off-site training.
Section 164. Carry and Use of FAs for GSFs. For appointed personnel and employees of GSFs, carrying and
use of firearms shall only be authorized during their tour of duty, in prescribed uniform, within the premises of
the government office or agency and covered by Short Certificate of Registration (SCR) issued by the FEO;
Provided that, GSFs that have issued Mission Orders or other types of documents to its PSPs shall be given a
period of sixty (60) days after the effectivity of this IRR for its conversion to Short Certificate of Registration.
Section 165. Carrying and Bearing of FAs by Personal Security Escorts or Protection Agents. In the case of
PSA providing Personal Security Escort or Protection Agent, only firearm acquired, possessed, and registered
under the name of the PSA shall be used by subject personal security escort or protection agent in the
performance of his/her protective security duties covered by a Special Duty Detail Order (SDDO) issued by the
Director, PSPG, TDO and CPNP.
Section 166. Carrying and Bearing of FAs by Armored Vehicles Security Crew. In the case of PSA providing
armored vehicle security, only firearms acquired, possessed, and registered under the name of the PSA shall
be used by members of the armored vehicle crew in the performance of their duty to transport large amounts of
cash and other valuables covered by a Duty Detail Order (DDO). One (1) armored vehicle shall only be
allowed to carry and bear a maximum of six (6) firearms. Provided that, the ratio of one (1) FA for one (1)
security personnel shall be maintained.
Section 167. Prohibition on Carrying and Bearing of Personally owned FAs. The personally owned firearm of
the PSP of PSTA, PSA, CSU, and GSF covered by a Permit to Carry Outside of Residence (PTCFOR) or
Letter Order (LO), as the case may be, shall not be utilized or used in the performance of security duties. Any
PSP found violating this provision shall be dealt with by law and this IRR. The carrying and use of rifle,
categorized as small arm, by PSPs during their tour of duty and duly covered by DDO may be allowed when
they escort and secure large amounts of cash or valuables, when in mining site duties, and such other
instances as may be determined and approved by the C, SOSIA.

A Self-Regulated Learning Module 60


Section 168. Limitations in the carrying of firearms. The following are the guidelines to be followed in carrying
of firearms:
1. Unless specified and/or exempted pursuant to provisions of these rules and regulations and/or firearms
laws, no firearm shall be borne nor be in the possession of any private security personnel except when in the
actual performance of duty, in the prescribed uniform, in the place and time so specified in the DDO; and
2. The firearm issued to security personnel of private security agency/ private detective agency/ company
security services/government security unit shall be carried by the security personnel only within the compound
of the establishment where he is assigned to guard, except when the security personnel is escorting big
amount of money or valuables on conduction duties outside its jurisdiction or area of operation, upon prior
coordination with the nearest PNP units/stations, or when in hot pursuit of criminal offenders.
Section 169. Carrying of Firearms of Protection Agents/ Personal Security Escorts. All Private Security Agency
(PSA) duly licensed and authorized by the Philippine National Police (PNP) to operate, own and possess
firearm, as evidenced by a valid and existing License to Operate (LTO) and License to Own and Possess
Firearm for Juridical Entity.
Rule 39. During Election Period.
Section 170. Use of Firearms During Election Period. Possession, Used and/or Disposition of Firearms by
PSPs, PSAs, CSUs, PDAs and Watchmen during Election Period shall be subject to Policies, Rules,
Guidelines and Procedure Promulgated by the Commission on Election.
Section 171. Who may Bear Firearms. During the election period, no person shall bear, carry or transport
firearms or other deadly weapons in public places, including any building, street, park, private vehicle or public
conveyance, even if licensed to possess or carry the same, unless authorized in writing by the Commission.
The issuance of firearms license shall be suspended during the election period. Only regular members of the
Philippine National Police, the Armed Forces of the Philippines and other law enforcement agencies of the
Government who are duly deputized in writing by the Commission for election duty may be authorized to carry
and possess firearms during the election period: Provided, That, when in the possession of firearms, the
deputized law enforcement officer must be: a) in full uniform showing clearly and legibly his name, rank and
serial number, which shall remain visible at all times, and b) in the actual performance of his election duty in
the specific area designated by the Commission.
Section 172. Security Professionals. During the election period, no candidate for public office, including
incumbent public officers seeking election to any public offices, shall employ, avail himself of or engage the
services of security personnel or bodyguards, whether or not such bodyguards are regular members of the
Philippine National Police, the Armed Forces of the Philippines or other law enforcement agency of the
Government: Provided, that when circumstances warrant, including but not limited to threats to life and security
of a candidate, he may be assigned by the Commission, upon due application, regular members of the
Philippine National Police, the Armed Forces of the Philippines or other law enforcement agency who shall
provide him security for the duration of the election period. The officers assigned for security duty to a
candidate shall be subject to the same requirement as to wearing of uniforms prescribed in the immediately
preceding section unless exempted in writing by the Commission. If at any time during the election period, the
ground for which the authority to employ, avail or engage the services of security personnel has been granted
shall cease to exist or for any other valid cause, the Commission shall revoke the said authority.

A Self-Regulated Learning Module 61


Section 173. During the National or Local elections. RA 11917 shall strictly enforce Section 261 of the
Omnibus Election Code particularly the following provisions:
1. Deadly weapons. - Any person who carries any deadly weapon in the polling place and within a radius of
one hundred meters thereof during the days and hours fixed by law for the registration of voters in the polling
place, voting, counting of votes, or preparation of the election returns. However, in cases of affray, turmoil, or
disorder, any peace officer or public officer authorized by the Commission to supervise the election is entitled
to carry firearms or any other weapon for the purpose of preserving order and enforcing the law; and
2. Carrying firearms outside residence or place of business. - Any person who, although possessing a permit to
carry firearms, carries any firearms outside his residence or place of business during the election period,
unless authorized in writing by the Commission: Provided, that a motor vehicle, water or aircraft shall not be
considered a residence or place of business or extension hereof.
This prohibition shall not apply to cashiers and disbursing officers while in the performance of their duties or to
persons who by nature of their official duties, profession, business or occupation habitually carry large sums of
money or valuables.
Section 174. Certificate of Authority – Security Agencies (CA-SA). Members of the Private Security Service
Providers (PSSPs) may bear, carry or transport firearms, provided, that, when in the possession of firearms,
they are:
a. Active regular employees of the Agency and is receiving regular compensation for the services rendered
therein.
b. Performing actual security functions, and not a consultant, part-time, temporary, contractual, casual or job-
order employee, or a confidential agent, whether or not receiving compensation from the said agency for
services rendered.
c. In the agency-prescribed uniform, showing clearly and legibly, at all times, his name, displaying prominently
the agency-issued identification card, showing clearly the name and position, which shall remain visible at all
times.
d. In the exercise of their security functions and duties, Security Personnel are the duly authorized to possess
the agency’s firearm which must be covered by a valid, current and updated Certificate of Firearm Registration
(CFR) or Property Acknowledgement Receipts (PAR)/ Acknowledgement Receipt for Equipment (ARE), as
may be applicable, and other applicable/pertinent firearms licenses/ registrations/permits/ documents as may
be applicable.
e. In possession of a valid, updated and current License to Exercise Security Profession (LESP) accompanied
by a valid, updated and current Duty Detail Order (DDO) or Special Duty Detail Order (SDDO) and/or Monthly
Disposition Report (MDR), as the case may be.
f. In possession of a firearm allowed under existing laws, rules and regulations as assessed and evaluated by
the Philippine National Police.
g. Deployed by Private Security Agencies (PSAs), Private Detective Agencies (PDAs), Company Security Units
(CSUs), Government Guard Units (GGUs), Private Security Canine Service Providers, Private Security
Training Agencies (PSTAs), or Private Security Industry and Training Organizations duly licensed, authorized,
recognized and/or accredited by the Philippine National Police.

A Self-Regulated Learning Module 62


h. In the actual performance of security duty, at his duly designated and specified place or area of duty; and
i. Bearing, carrying or transporting only one (1) firearm as indicated in his/her name in the Agency’s Application
Form and List/Roster of Personnel, unless otherwise allowed under existing laws, rules and regulations.
Section 175. Additional Guidelines for Private Security Services Providers. The following rules shall be strictly
observed by PSAs and CSUs which have been issued with a valid CA-SA:
a. The Authority shall be valid during the prescribed period and strictly under the terms and conditions
specified therein and automatically becomes ineffective upon the expiration of any of the applicable licenses,
registrations, permits, CFR, PTCFOR, LTOPF, MR, DDO, LESP, LO, MO, PAR, ARE and other pertinent
firearms documents.
b. For single posting, the security guard assigned is prohibited to transport his/her firearm from his/her duty
area to his/her dwelling.
c. Firearms may be stationed in armored trucks provided these are fully licensed agency-issued firearms used
in the regular course of business of the security agencies and included in the application; and
d. In case of new posting or termination of posting which entail the transport of firearms to the duty area or
return of firearms to the security agency’s office, the security agency may be authorized to transport the
firearms on a one-time, one-way basis only upon prior application.
Rule 40. Storage of Firearms and Stocking of Ammunition.
Section 176. Maximum Firearms allowed to be Stored at PSAs Respective Vaults. New PSAs or those with
terminated Security Service Contracts/ Agreements shall be allowed to store a maximum of thirty (30) firearms
for a maximum period of 30 days. Provided that, firearms in excess of thirty (30) units or after the lapse of thirty
(30) days shall be deposited by PSA to FEO for storage.
Section 177. Requirements for Release of Deposited FAs from FEO. The PSA shall submit the following
requirements to FEO for the release of deposited FAs:
1. Valid Juridical LTOPF; and
2. Notarized Security Service Contract or Notice to Proceed.
Section 178. Maximum Ammunition allowed to be Stocked. A PSA is only allowed to stock twenty-five (25)
rounds of ammunition per firearm.
Section 179. Maximum Ammunition issued to Security Personnel. A PSA is only allowed to issue twenty-five
(25) rounds of ammunition per firearm. Provided that, fifty (50) rounds may be issued by PSAs to deployed
mine security guards, power plant security guards, armored vehicle crew, PSEs/PAs, critical infrastructure, vital
installation and such other cases as may be determined by C, SOSIA.
Section 180. Vault Requirement. A PSA possessing and owning firearms and ammunition shall provide for
adequate and suitable vault for storage of FAs and stocking of Ammos.
Section 181. Stocking of ammunition. Stocks of ammunition in the agency shall be authorized on a limited and
reasonable quantity that will suit the requirement and need of such agency and shall be subjected to inspection
from time to time by representatives of the Chief, Philippine National Police, and unless otherwise provided for
under existing laws, shall not exceed a load of fifty (50) rounds of ammunition per unit of duly licensed

A Self-Regulated Learning Module 63


firearms. Individual issue to each security guard shall be limited to one half of such load or twenty-five (25)
rounds for every security guard.
Rule 41. Inventory and Inspection of Firearms
Section 182. Submission of Inventory List to FEO. SOSIA shall furnish a copy of the Firearms Inventory List to
FEO in a quarterly basis.
Section 183. Letter Order required for Inspection of Firearms. The Inspection Team shall be covered with a
Letter Order to be headed by a Police Commissioned Officer. The inspection or examination of records and
inventories of the firearms and ammunition shall be conducted during reasonable office hours.
Section 184. Inspection Report. A copy of the Inspection Report shall be provided to the licensed PSTA, PSA,
CGU, and GSF within five (5) working days from the date of inspection. In case of adverse findings, the PSTA,
PSA, CGU, and GSF shall be given ten (10) working days from receipt of the report to comply.
Section 185. Non-Compliance on Findings of Inspection. In case of non-compliance of the findings and
recommendations of the Inspection Team within the given period, denial of the application or suspension of the
LTO and/or LTOPF shall be undertaken, after due process.
Section 186. Submission of Reports. The CPNP or his authorized representative shall require the submission
of monthly, quarterly, and/or annual reports, as the case may be, pertaining to the inventory of Firearms and
ammunition from the licensed PSTA, PSA, CGU, and GSF.
Rule 42. Confiscation of Firearms.
Section 187. Grounds for Confiscation of Firearms. Firearms owned and possessed by the licensed PSTA,
PSA, CGU, and GSF may be confiscated on any of the following instances:
1. Absence of a valid or expired LTOPFs.
2. Absence or expired firearms registration.
3. Firearms with tampered, altered and obliterated Serial Numbers.
4. Absence of a valid LESP; and
5. Absence of a valid DDO.
Section 188. Justification for confiscation of firearms. No firearm issued to any PSP while in the performance of
his duties, shall be confiscated by any member of law enforcement agency, except by uniformed member of
the PNP, when duly authorized by the proper authority and/or under any of the following circumstances,
wherein an appropriate receipt for the firearm shall be issued:
1. When the firearm is about to be used in the commission of a crime.
2. When the firearm is actually being used in the commission of crime.
3. When the firearm has just been used in the commission of a crime.
4. When the firearm being carried by the security guard is unlicensed or a firearm not authorized by law and
regulation for his use.
5. When the confiscation of the firearm is directed by the order of the court.

A Self-Regulated Learning Module 64


6. When the firearm is used or carried outside the property, compound or establishment serviced by the
agency without proper authority.
7. When a security guard does not possess any license to exercise his profession; and
8. In all the above cases, the confiscating officer shall inform immediately the agency concerned.
Section 189. Disposition of confiscated firearms. Any law enforcement officer authorized by law effecting the
confiscation of firearm under any of the circumstances mentioned in the preceding section shall inform the
Chief, Philippine National Police thru the CSG within twenty-four (24) hours after such confiscation. The firearm
shall be turned over immediately to the nearest RCSUs which shall be responsible for the conveyance of same
to the FEO, CSG, except when charges have been filed against the suspect, in which case, the firearm shall
be turned over to the concerned court.
Section 190. Procedure in Confiscation of firearms. The procedure in the confiscation of firearms shall be
indicated on an SOP to be issued by SOSIA.
Rule 43. Penalties and Liabilities.
Section 191. Liability of Juridical Person. The penalty of Prision Mayor in its minimum period to Prision Mayor
in its medium period shall be imposed upon the owner, president, manager, director or other responsible officer
of/any public or private firm, company, corporation or entity who shall willfully or knowingly allow any of the
firearms owned by such firm, company, corporation or entity to be used by any persons found guilty of violating
RA 10591 or willfully or knowingly allow any of them to use unregistered firearm or firearms without any legal
authority to be carried outside of their residence or in their posting as indicated in their Duty Detail Order
(DDO) as evidenced by their Security Service Agreement in the course of their employment.
Section 192. Tampering, Obliteration or Alteration of Firearms Identification. The penalty of Prision
Correctional to Prision Mayor in its minimum period shall be imposed upon any person who shall tamper,
obliterate or alter without authority the barrel, slide, frame, receiver, cylinder, or bolt assembly, including the
name of the maker, model or serial number of any firearm, or who shall replace without authority the barrel,
slide, frame, receiver, cylinder, or bolt assembly including its individual or peculiar identifying characteristics
essential in forensic examination of a firearm or light weapon.
Section 193. Confiscation and Forfeiture. The imposition of penalty for any violation of this Act shall carry with
it the accessory penalty of confiscation and forfeiture of the firearm, ammunition, or parts thereof, machinery,
tool, or instrument in favor of the government which shall be disposed in accordance with law.
Section 194. Illegal possession of firearms. No person employed as security guard or private detective shall
use unlicensed firearms in the performance of his duties, nor be allowed to use firearms with duplicated serial
numbers. Unless otherwise approved by the CPNP, only firearms licensed in the name of the
PSA/PDA/CSU/GSF concerned shall be used.
Section 195. Revocation of license. License to possess firearm may be revoked under any of the following
instances:
1. Failure to submit any issued firearm for verification as required;
2. Carrying of firearms by security personnel without appropriate Duty Detail Order (DDO);

A Self-Regulated Learning Module 65


3. When the firearm serial number has been duplicated on another firearm or using one firearms license for
more than one firearm other than those stipulated in the license;
4. Carrying of firearms outside of the place stated in the permit or in places prohibited under the law;
5. Conviction of the Licensee or Firearm Bonded Custodian (operator or manager) of the agency of any crime;
and
6. When the firearm was reported lost.
Rule 44. Uniform and Paraphernalia.
Section 196. Standard Uniform for Canine Trainer. The following are the Standard Uniform for Canine Trainer:
1. Upper Garment;
a. Barong or Polo barong.
b. Black long-sleeved or polo shirt with “Trainer” markings at the back
2. Lower Garment: Dark pants; and
3. Footwear: Black wet-look mid-cut shoes.
Section 197. Standard Uniform for Training Instructors (Technical and Academic) and Training Officers. The
following are the Standard Uniform for Technical and Academic Training Instructors:
1. Upper Garment: Barong or Polo barong;
2. Lower Garment: Black straight cut pants; and
3. Footwear: Black wet-look mid-cut shoes.
Section 198. Standard Uniform for Training Director. The following are the Standard Uniform for Training
Director:
1. Upper Garment;
a. Barong or Polo barong;
b.Coat and tie (as appropriate);
2. Lower Garment: Black straight cut pants; and
3. Footwear: Black wet-look mid-cut shoes.
Section 199. Standard Uniform for Watchmen/Gateman/Doorman/Unarmed Security Personnel. The
following are the Standard Uniform for Watchman/ Gateman/ Doorman/ Unarmed Security Personnel:
1. Headgear: To be determined by SOSIA Security Uniform Board (SSUB);
2. Upper garment: General Attire (blue with white SOSIA patch at the left breast) and with name cloth at the
right breast;
3. Lower Garment: Dark pants; and

A Self-Regulated Learning Module 66


4. Footwear: Black wet-look mid-cut shoes
Section 200. Standard Uniform for Bouncer/Door Supervisor. The following are the Standard Uniform for
Bouncer/Door Supervisor:
1. Headgear: To be determined by SOSIA Uniform and Equipment Board (SUEB).
2. Upper garment: Polo shirt (yellow or black) with markings Security at the back, SOSIA logo at the left breast
and name cloth at the right breast.
3. Lower Garment: Dark pants;
4. Footwear:
a. Black leather shoes; and
b. Black wet-look mid-cut shoes.
Section 201. Standard Uniform for Event Security Officer. The following are the Standard Uniform for Event
Security Officer:
1. Headgear: To be determined by SOSIA Uniform and Equipment Board (SUEB);
2. Upper garment:
a. Barong with SOSIA logo at the left breast.
b. Coat and tie.
c. Polo shirt (yellow or back) with markings Security at the back, SOSIA logo at the left breast and name cloth
at the right breast.
3. Lower Garment: Dark pants; and
4. Footwear: Black wet-look mid-cut shoes.
Section 202. Standard Uniform for Security Hardware (CCTV) Operator. The following are the Standard
Uniform for Security Hardware (CCTV) Operator:
1. Headgear: To be determined by SOSIA Uniform and Equipment Board (SUEB);
2. Upper garment:
a. Polo barong with SOSIA logo at the left breast and name plate at the right breast
b. Polo shirt (black or yellow) with SOSIA markings at the back and name cloth at the right breast;
3. Lower Garment: Dark pants; and
4. Footwear: Black wet-look mid-cut shoes.
Section 203. Standard Uniform for Security Hardware and Systems Supervisor. The following are the
standard uniform for Security Hardware and Systems Supervisor:
1. Headgear: To be determined by SOSIA Uniform and Equipment Board (SUEB);

A Self-Regulated Learning Module 67


2. Upper garment:
a. Polo barong with SOSIA logo at the left breast and name plate at the right breast.
b. Polo shirt (black or yellow) with SOSIA markings at the back and name cloth at the right breast
3. Lower Garment: Dark pants; and
4. Footwear: Black wet-look mid-cut shoes.
Section 204. Standard Uniform for Security Hardware and Systems Planner. The following are the standard
uniform for Security Hardware and Systems Planner:
1. Headgear: To be determined by SOSIA Uniform and Equipment Board (SUEB);
2. Upper garment:
a. Polo barong with SOSIA logo at the left breast and name plate at the right breast
b. Polo shirt (black or yellow) with SOSIA markings at the back and name cloth at the right breast
3. Lower Garment: Dark pants; and
4. Footwear: Black wet-look mid-cut shoes.
Section 205. Standard Uniform for Security Hardware and Systems Designer. The following are the standard
uniform for Security Hardware and Systems Designer:
1. Headgear: To be determined by SOSIA Uniform and Equipment Board (SUEB);
2. Upper garment:
a. Polo barong with SOSIA logo at the left breast and name plate at the right breast
b. Polo shirt (black or yellow) with SOSIA markings at the back and name cloth at the right breast
3. Lower Garment: Dark pants; and
4. Footwear: Black wet-look mid-cut shoes.
Section 206. Standard Uniform for Sentry Canine Handler. The following are the standard uniform for Sentry
Canine Handler:
1. Headgear: To be determined by SOSIA Uniform and Equipment Board (SUEB);
2. Upper garment: Blue polo shirt with Canine markings at the back, SOSIA patch at the right side, Canine
PSA patch at the left side, and name cloth at the right breast;
3. Lower Garment: Black tactical pants; and
4. Footwear: Tactical Boots.
Section 207. Standard Uniform for Detection Canine Handler. The following are the standard uniform for
Detection Canine Handler:
1. Headgear: To be determined by SOSIA Uniform and Equipment Board (SUEB);

A Self-Regulated Learning Module 68


2. Upper garment: Blue polo shirt with Canine markings at the back, SOSIA patch at the right side, Canine
PSA patch at the left side, and name cloth at the right breast;
3. Lower Garment: Black tactical pants; and
4. Footwear: Tactical Boots.
Section 208. Standard Uniform for Protection Canine Handler. The following are the standard uniform for
Protection Canine Handler.
1. Headgear: To be determined by SOSIA Uniform and Equipment Board (SUEB);
2. Upper garment: Blue polo shirt with Canine markings at the back, SOSIA patch at the right side, Canine
PSA patch at the left side, and name cloth at the right breast;
3. Lower Garment: Black tactical pants; and
4. Footwear: Tactical Boots.
Section 209. Standard Uniform for Standard Armed Security Guard. The following are the standard uniform
for Standard Armed Security Guard:
1. Headgear: To be determined by SOSIA Uniform and Equipment Board (SUEB);
2. Upper garment: General Attire (blue with white SOSIA patch) SOSIA logo at the left breast, and name cloth
at the right breast;
3. Lower Garment: Dark pants; and
4. Footwear: Black wet-look mid-cut shoes.
Section 210. Standard Uniform for Mall and Commercial Guard. The following are the standard uniform for
Mall and Commercial Guard:
1. Headgear: To be determined by SOSIA Uniform Board (SSUB);
2. Upper garment: General Attire (blue with white SOSIA patch) SOSIA logo at the left breast, and name cloth
at the right breast;
3. Lower Garment: Dark pants; and
4. Footwear: Black wet-look mid-cut shoes.
Section 211. Standard Uniform for Maritime Guard. The following are the standard uniform for Maritime
Guard;
1. Headgear: Navy blue ball cap with white security markings in front
2. Upper garment: Navy blue barong with SOSIA logo at the left breast, and name plate at the right breast
3. Lower Garment: Dark pants; and
4. Footwear: Black wet-look mid-cut shoes.
Section 212. Standard Uniform for Aviation Guard. The following are the standard uniform for Aviation Guard:

A Self-Regulated Learning Module 69


1. Headgear To be determined by SOSIA Uniform Board (SSUB);
2. Upper garment:
a. Barong with SOSIA logo at the left breast and name plate at the right breast
b. Reflectorized vest with security markings at the back (optional
3. Lower Garment: Dark pants; and
4. Footwear: Black leather shoes.
Section 213. Standard Uniform for Mining Guards. The following are the standard uniform for Mining Guard:
1. Headgear: Blue hard hat with face shield.
2. Upper garment: General Attire (blue with white SOSIA patch) SOSIA logo at the left breast, and name cloth
at the right breast.
3. Lower Garment: Dark pants; and
4. Footwear: Black rubber boots.
Section 214. Standard Uniform for Banks and Financial Institutions Guard. The following are the standard
uniform for Banks and Financial Institutions Guard:
1. Headgear: Pershing cap
2. Upper garment: General Attire (blue with white SOSIA patch) SOSIA logo at the left breast, and name cloth
at the right breast;
3. Lower Garment: Dark pants; and
4. Footwear: Black wet-look mid-cut shoes.
Section 215. Standard Uniform for Armored Vehicle Security Personnel and Security Drivers. The following
are the standard uniform for Armored Vehicle Security Personnel and Security Drivers:
1. Headgear:
2. Upper garment: General Attire (blue with white SOSIA patch) SOSIA logo at the left breast, and name cloth
at the right breast
3. Lower Garment: Tactical pants; and
4. Footwear: Black combat shoes.
Section 216. Standard Uniform for Personal Security Escort/Protection Agent, and Personal Close Protection
Drivers. The following are the standard uniform for Personal Security Escort/Protection Agent, and Personal
Close Protection Drivers:
1. Headgear:
2. Upper garment: Barong, bush jacket, suit or any appropriate attire depending on situation.
3. Lower Garment: Dark pants; and

A Self-Regulated Learning Module 70


4. Footwear: Black leather shoes.
Section 217. Standard Uniform for Private Investigator/ Private Detective/ Inquiry Agent. The following are the
standard uniform for Private Investigator/ Private Detective/ Inquiry Agent:
1. Upper garment: Appropriate attire depending on situation;
2. Lower Garment: Appropriate pants; and
3. Footwear: Appropriate shoes.
Section 218. Standard Uniform for Kennel Master. The following are the standard uniform for Kennel Master:
1. Upper Garment:
a. Long-sleeved polo shirt with “Kennel Master” marking at the back;
b. Polo barong/ Barong/ Coat and tie as appropriate.
2. Lower Garment: Black straight cut pants; and
3. Footwear: Appropriate shoes.
Section 219. Standard Uniform for Security Officer. The following are the standard uniform for Security Officer:
1. Headgear: Pershing cap if appropriate.
2. Upper Garment:
a. General Attire.
b. Barong with SOSIA logo at the left breast and name plate at the right;
3. Lower Garment: Appropriate pants; and
4. Black straight cut pants: Appropriate shoes.
Section 220. Standard Uniform for Canine Administrator, Security Manager, Security Director, Security
Consultant, and Security Agency Operator. The following are the standard uniform for Canine Administrator,
Security Manager, Security Director, Security Consultant, and Security Agency Operator:
1. Upper Garment: Polo barong/ Barong/ Coat and tie as appropriate.
2. Accessories:
a. SOSIA pin at the left breast;
b. Name plate at the right breast;
3. Lower Garment: Appropriate pants; and
4. Black straight cut pants: Appropriate shoes.
Section 221. Standard Uniform for Government Security Guards. The following are the standard uniform for
Government Security Guards:

A Self-Regulated Learning Module 71


1. Upper garment: General Attire (blue with white SOSIA patch) SOSIA logo at the left breast, and name cloth
at the right breast Casual attire;
2. Lower Garment: Dark pants; and
3.Footwear: Black wet-look mid-cut shoes.
Section 222. Rain Gear. In the event of rain, appropriate rain gear worn over standard uniform shall be as
follows:
1. Upper garment: Poncho-type Transparent/ Translucent Raincoat with “Security” markings at the back and
reflector strips on both arms; and
2. Footwear: Black rainboots
Section 223. Specific requirements for Standard Footwear. Private Security Professional, whenever
appropriate, shall use black wet-look mid-cut Shoes. The specific requirements shall be as follows:
1. The upper part must be made of synthetic patent leather.
2. The outsole must have undulating ground with good abrasion resistance on all surfaces be it wet, dry,
muddy, asphalt, rocks, and grass.
3. The lining shall be durable and moisture-nicking.
4. The collar is foam padded for added comfort.
5. Total weight per pair must not exceed 990 grams in US#10;
6.The shoe size must be available in wide width US#6-12; and
7. Triple bonded nylon thread shall be used in every stitch for durability.
Section 224. Standard functionality of Standard Footwear. The standard functionality of standard footwear shall
be as follows:
1. Easy to maintain that requires a simple wipe down with water;
2. Good flexibility and the provide stability when worn;
3. Comfortable and snug fit under any condition and in any position; and
4. Shall not hinder or compromise individual’s movement and activity particularly when driving different types of
vehicles especially in stepping on the brakes or accelerator.
Section 225. Special Set of Uniform. The special set of uniform in the above provisions shall be
prescribed/authorized to be issued only on a case-to-case basis at the areas as herein authorized upon prior
request of the clients concerned; provided that the request is predetermined on the need of the workplace for
the use of the special set of uniform and NOT on the individual desire of the agency or client.
Section 226. Provision for uniform. All employers/owners/operators of private security agency/company
security force shall provide at least one (1) set of the prescribed uniform free of charge to their respective
security guard for every year of service with them. Likewise, all licensed security guard shall provide
themselves with one (1) set of the prescribed uniform once a year unless their employers provide it for free.

A Self-Regulated Learning Module 72


Section 227. Manufacture/Tailoring. The heads/operators of the Private Security Agencies. Company Security
Force and Government Security Unit shall be responsible for the manufacture and/or tailoring of the prescribed
uniform for their respective security guard. SOSIA shall accredit manufacturers or tailors authorized to produce
prescribed uniform and other equipment complying with standards set by SOSIA Uniform and Equipment
Board.
Rule 45. Equipment Requirements
Section 228. Equipment of Watchmen and Private Security Personnel. The following are the mandatory
equipment that shall be in possession while performing post, conduction, armored service duties and the like:
1. Prescribe Uniform;
2. Nightstick/baton;
3. Whistle;
4. Timepiece (synchronized);
5. Writing pen;
6. Notebook and duty checklist (electronic or not);
7. Flashlight;
8. First Aid Kit;
9. Service Firearms (as required); and
10. Handcuffs
Section 229. Availability and Issuance of Equipment. The security agency shall have the responsibility of
ensuring the availability and issuance of the equipment to its posted guards.
Section 230. Accountability and Proper Use of Equipment. Private Security Personnel shall be responsible for
inspecting operability of equipment issued to him and be responsible for keeping himself acquainted with the
proper use of these.
Section 231. Special and Other Equipment. Apart from the mandatory equipment, other equipment may be
issued to the security guard as determined necessary following client contract requirement, provided that the
security guard shall have acquired the prior training/knowledge on the proper use of the same but not limited to
the following:
1. Metal detectors.
2. Electronic and/or communication devices.
3. Stun devices/ less-lethal weapons; and
4. Ballistic vests.
Section 232. Electronic and/or communication devices. Electronic and/or communication devices requiring
registration under the jurisdiction of other government agencies shall be complied with prior to issuance for use
of the security guard.

A Self-Regulated Learning Module 73


Rule 46. Vehicles and Mobility Requirements
Section 233. SOSIA CRI Required for Security Motor Vehicles. Security Services Providers (PSA/CSU/GSF)
shall only possess or operate any security motor vehicle with a valid SOSIA Certificate of Registration and
Inventory (CRI). The validity of SOSIA CRI shall coincide with the validity of License to Operate.
Section 234. SOSIA SMV Certificate of Registration and Inventory (CRI) is not equivalent to License to
Operate and does not authorize a person to engage in employing security guard or detective, or a juridical
person to establish, engage, direct, manage or operate an individual or a private detective agency or private
security agency/company security force as stipulated on RA 11917.
Rule 47. Registration and Inventory of Security Motor Vehicles
Section 235. Submission of Documentary Requirements for Non-Armored Vehicles (Patrol Vehicles, Canine
Vehicles, etc). Applicant shall submit the following documentary requirements to PNP SOSIA (Attn: Chief,
Enforcement Management Division):
1. Letter request for Registration and Inventory addressed to Chief, SOSIA indicating the List and description
of security motor vehicles; and
2. Copies of updated and valid Land Transportation Office (LTO) Certificates of Registration (CRs)
and Official Receipts (ORs) of each security motor vehicle indicating name of the Security Service Providers as
owner.
Section 236. Submission of Documentary Requirements for Armored Vehicles. Applicant shall submit all the
following documentary requirements to PNP SOSIA (Attn: Chief, Enforcement Management Division):
1. Letter request for Registration and Inventory addressed to Chief, SOSIA with List and description of armored
vehicles indicating its 1) Make/Brand, 2) Engine Number, Chassis Number, 4) Plate Number, 5) MVR Number,
and 6) Projected Location/Place of Deployment.
2. Authenticated copy of valid License to Operate (for Private Security Agency).
3. Certificate of Membership from a recognized armored vehicle industry association.
4. Clear pictures and location sketch of office/garage/motor pool with email address/ telephone number
showing 6x3 feet business signage.
5. Copies of updated and valid Land Transportation Office (LTO) Certificates of Registration (CRs)
and Official Receipts (ORs) of each armored vehicle and other relevant documents that other government
agencies may require; and
6. Notarized list of armored vehicle security personnel with mandatory training in Comprehensive Bank and
Armored Security Training Course (CBASTRAC) conducted by a SOSIA-accredited Training School (for
Accreditation renewal).
Section 237. Evaluation of Submitted Documents. The evaluating personnel of the Enforcement Management
Division (EMD) shall check on the completeness, correctness and validity of all the submitted documents and
conformity to standards.
Section 238. Payment. EMD shall issue an Order of Payment for Registration and Inventory Fee for each
security motor vehicle. See ANNEX “D” of this IRR for the corresponding fees: The same shall be paid at the

A Self-Regulated Learning Module 74


Landbank of the Philippines after which the pink form copy of the Special Bank Receipt (SBR) shall be
submitted at EMD.
Section 239. Inspection Requirement. The Registration and Inventory Team from Enforcement Management
Division (EMD), SOSIA with a valid Letter Order issued by the Chief, SOSIA will conduct inspection, inventory
and accounting of the security motor vehicle of applicant.
Section 240. Validation/Endorsement of Submitted Documents. Chief, Inspection and Enforcement Section
(IES), EMD, SOSIA shall validate and review the submitted requirements and the results of the security motor
vehicle inventory and accounting.
Section 241. Recommendation. Chief, EMD, and the Assistant Chief, SOSIA shall further review the
application and the results of the armored vehicle inventory and accounting and recommend the approval or
disapproval of the application.
Section 242. Approval. Chief, SOSIA shall have the authority to approve or disapprove the application.
Section 243. Issuance of Certificate of Registration and Inventory. Upon approval of the application,
Certificates of Registration and Inventory shall be issued for each armored vehicle of applicant.
Section 244. Failure to meet the minimum requirements and standards of PNP SOSIA will result in suspension
of the License to Operate (LTO), SOSIA SMV Certificate of Registration and Inventory, without prejudice to the
imposition of sanctions under RA 11917.
Section 245. No License to Operate of any PSA nor CSU utilizing security motor vehicles shall be renewed
unless registered with and inventoried by the PNP SOSIA.
Rule 48. Armored Vehicles Requirements
Section 246. Standards of Armored Vehicles. The following standards shall be complied:
1. Must be bullet resistant or withstanding (not penetrating) the firepower of light weapons (e.g. cal 5.56 or 7.62
and the likes);
2. Vault placed inside the armored vehicle in a fixed manner with dual combination and chute that can
accommodate at least six (6) fully loaded 14” x 14” x 14” duffle bags designed to prevent retrieval of the cargo
while in transit;
3. With at least five (5) gun ports with steel plate windows with locks. Materials to be used on the steel plate
windows must be the same material with the armored plate of the vehicle; and
4. And such other specification that the Board shall prescribe.
Section 247. Deployment and Use. Armored vehicles shall be deployed and/or used by PSA/GSF/CSU, as
appropriate, to carry cash or valuable items and shall refrain from use to ferry bank employees/personnel.
Section 248. Use of Armored Vehicles. Armored vehicle shall not be parked on streets at any time. In
situations that parking is unavoidable, it shall be limited to five (5) minutes only; and in cases, instances or
situations where an armored vehicle suffers any mechanical, electrical or any other similar analogous
breakdown or malfunction shall be reported immediately using any available and fastest means of
communication to the nearest police station. The same shall be reported, in any case as described above, in
any repair shop.

A Self-Regulated Learning Module 75


Section 249. Vehicle Standards. Armored vehicles must be fully air-conditioned and with a minimum of one (1)
vault each for cash and other valuable items. Such other standard and specifications shall be prescribed by the
SUEB.
Section 250. Vehicle Movement. Armored vehicle routes shall be limited to pass through main roads only and
refrain from passing alternate routes from point of origin to point of destination.
Section 251. Vehicle Accident Reporting. In the event of armored vehicle accident, the armored vehicle crew
shall immediately report the incident to the nearest police station/Traffic Management Unit using any
available/fastest means of communication.
Rule 49. Ballistic Resistance Testing and Evaluation (BRTE) of Armored Vehicles/Materials
Section 252. Policies. The following policies and guidelines shall be complied:
1. No Private Armored Vehicle Provider shall be allowed to apply for License to Operate (LTO) (for rephrase in
connection with registration) renewal by the PNP SOSIA without its armored vehicle fleet subjected to and
passing the Ballistic Resistance Testing and Evaluation and issued appropriate Board Resolution by the SUEB
indicating “PASSED” rating;
2. SUEB Resolution is not equivalent to License to Operate and does not authorize a person to engage in
employing private security personnel, or a juridical person to establish, engage, direct, manage or operate an
individual or a private security agency/company security force as stipulated on the RA 11917 and this IRR; and
3. No PSA/GSF/CSU shall be allowed to apply for Ballistic Resistance Testing and Evaluation for its armored
vehicle fleet unless all its armored vehicles are registered with and inventoried by SOSIA.
Section 253. Scope of Implementation. Procedures and guidelines on the Ballistic Resistance Testing and
Evaluation (BRTE) of the Armored Vehicle Fleets is provided under ANNEX “E” of this IRR.
Section 254. Failure in BRTE. Should any of the armor vehicles selected for Ballistic Resistance Testing
and Evaluation fail the tests, SOSIA shall immediately stop the ongoing test and shall not issue the required
License to Operate for the applicant.
Section 255. Request for Re-evaluation. The applicant may however submit anew another written request not
earlier than one (1) week but not later than one (1) month after the failed test. The specific armored vehicle that
failed the said test shall not be allowed to be used/to be deployed unless the same had been modified
specifically to pass future tests. The said modification shall be covered by a Notarized Affidavit of Undertaking
(including Certification from Manufacturer) to be submitted by the owner/ operator/ provider, stating that the
particular Armored Vehicle shall not be used unless necessary repairs or modifications were done to pass set
standards and future tests. Such a Notarized Affidavit shall be included in the list of mandatory requirements to
be submitted for the next application for testing.
Section 256. Expenses relative to BRTE. Expenses relative to ballistic resistance testing and evaluation
shall be shouldered exclusively by the applicant.
Section 257. Testing Report. The Testing Report shall indicate whether the applicant passed or failed the
BRTE. The SUEB shall issue a board resolution signed by simple majority of the members copy furnished to
the applicant.

A Self-Regulated Learning Module 76


Section 258. Testing on Glass Materials. In case of armored glass materials, an applicant shall request from
SOSIA for the testing of sample armor glass windows to be provided for by the armored car manufacturer
chosen by the applicant, which shall also be used subsequently in the manufacture of the
applicant’s fleet of armored vehicles.
Section 259. Other provisions:
1. SOSIA shall conduct inspections on licensed Armored Vehicle Providers to determine continuing compliance
to the provisions of this IRR and other related provisions of RA 11917; and
2. All licensed Private Armored Vehicle Providers shall submit to EMD, SOSIA Monthly Disposition Report
(MDR) every 15th of the month.
Section 260. Standard Specifications of Private Security Patrol Vehicles. The following are the standards to be
followed for Patrol Vehicles:
1. Must only have detachable blinkers with yellow lights.
2. Must indicate the term “Security”; and
3. Patrol vehicles shall only be of white color with company name in black fonts and logo.
Section 261. Limitation on the Use of Blinkers. In addition to the guidelines issued by the PNP Highway Patrol
Group (HPG), the following are the limitations on the use of blinkers:
1. Use of blinkers installed in authorized security patrol vehicles are only allowed in the specific area/s of
deployment as follows:
a. Expressways.
b. Economic Zones.
c. Airports.
d. Seaports.
2. Use of blinkers are not allowed in public highways and roads except for emergency.
Section 262. Standard Specifications of Canine Vehicles. K9 vehicle shall conform to standard specifications
set forth by the SUEB in conjunction with Animal Welfare Act and its IRR and pertinent issuances of the
Bureau of Animal Industry.
Rule 50. Canine Units
Section 263. Limitations for Canine Units. The following limitations shall be followed for Canine Units:
1. Only canine units with proper training and with valid Certificate of Efficiency from SOSIA shall be allowed for
posting and only with the handlers who passed the evaluations as certified as canine units by SOSIA;
2. Government working dogs/handlers may register for purposes of database recording but will be exempted
from payment or fees;
3. A canine shall be registered and issued tags or micro-chips for identification;

A Self-Regulated Learning Module 77


4. Canine registration shall be non- transferable;
5. License number will be coded as k9-00-000 (00indicating the year of registration and 000 indicating the
license number); and
6. License for canine shall display the following:
a. Canine Identity marks
b. Owner’s name
c. Date of license
d. Expiration date
Rule 51. Explosives Detector Dog and Handler Evaluation Test (EDDHET).
Section 264. Conduct of Explosive Detector Dog and Handler Evaluation Test. This Evaluation Test will
determine the proficiency and reliability of explosive detector dog team in the detection of explosive. All canine
units must be tested in all odors. The explosives scents to be tested are:
a. Low explosives (black of smokeless powder);
b. Military Dynamite.
c. C-4 of Flex-X.
d. TNT.
e. Primer cord.
f. Slurries or water-gel; and
g. Others.
Section 265. Weight and Number of Explosives. The maximum weight of explosives shall be proportionate to
the explosive detector dog teams to be tested. However, a minimum of ½ pound of all the types of explosives
specified in Sec. 264 of this IRR shall be used for testing. Each area tested will contain a minimum of two (2)
aids and maximum of four (4) aids with each different explosive. The handler will not be told the number or
type of explosives the team is searching for.
Section 266. Five (5) Areas for Testing. The explosive detector dog team will be tested in at least four (4) of
the five (5) areas of testing. The explosive detector dog team must search the areas of building, vehicles and
baggage. The fourth area will either be open area, aircraft, or watercraft. The five areas will be:
1. Building;
2. Vehicle;
3. Baggage;
4. Open or Perimeter; and
5. Aircraft or Watercraft.

A Self-Regulated Learning Module 78


Section 267. Building (Including Rail Stations/Bus Terminals) Search. The building search will consist of a
minimum of two (2) rooms and a maximum of four (4) rooms and has some type of furniture in it. Only one (1)
aid may be placed in each room. One or more rooms should contain no aids. The aid may be placed
anywhere from eight (8) feet to ground level. The handler may not open cabinet doors, desk drawers, closet
drawers, and etc.
Section 268. Vehicle Search. There shall be used a minimum of six (6) vehicles or a maximum of ten (10)
vehicles of any type or model including pick-up. The vehicles will be parked in park configurations (like parking
lots) so as to allow the team to have access to each vehicle. The training aids will be placed in a manner such
that the EDD cannot retrieve the same. Only one (1) training aid may be placed on or in each vehicle. One
training aid must be placed inside a closed engine compartment. Additional training aids will be placed at the
discretion of the evaluator and may be placed but not limited to:
1) Exterior of gas tank or filler pipe.
2) Drive shaft.
3) Interior of close trunk; and
4) Passenger compartment (closed).
Section 269. Baggage Search. Baggage shall be defined as hard-shell and soft-shell suitcases, attaché case,
clothes bags, briefcases, golf bags, duffel bags, boxes, etc. Ten (10) bags minimum or a maximum of twenty
(20) bags may be used. All training aids will be placed inside the bags in a manner such that the canine
cannot retrieve same.
Section 270. Open or Perimeter Area Search. Open area search shall be defined as:
1) Exterior building.
2) Open fields.
3) Wooden area; and
4) Any outdoor area not covered above.

Training aids will be placed at the discretion of the evaluator and can be placed anywhere from a minimum of
one (1) foot below surface level to a maximum of eight (8) feet above surface level.
Section 271. Aircraft or Watercraft, Rail Coach and Bus Search. The search shall be at the discretion of the
evaluator. It could be interior or exterior of the aircraft along will ground support equipment. All training aids
shall be placed in a manner such that the EDD cannot retrieve the same.
Section 272. Evaluation. The evaluator will determine if the explosive detector dog team will be certified upon
the completion of the test. The handler and EDD will be considered as a team which will be certified. If the
EDD changes handler, a new Team exists and the team needs to be certified anew.
Section 273. Certification. For certification, the explosive detector dog team cannot miss more than one (1)
training aid in all phases of testing. If the tested explosive detector dog team has more than one (1) training
aid missed, which is a FAILURE, then the team must RETEST in all phases. All testing will be done on PASS

A Self-Regulated Learning Module 79


or FAIL basis. All training aids will be placed at least thirty (30) minutes prior to testing. If a training aid has to
be moved to a new location, the previously used area must be excluded as a testing site.
1) Prior to the explosive detector dog team entering the test area, each handler shall inform the evaluator on
the specific dog alert and response to training aids and each indication to a training aid by the canine should
be obvious to the evaluator. The evaluator shall, prior to each phase, brief the handler on the nature of each
problem that will be encountered, such as boundaries, time, starting point, among others; and
2) A maximum time limit of twenty (20) minutes will be allotted to each phase of testing. The time will stop
when the handler indicates his search is complete or the time expires. Conversation between the tested team
and the untested team will not be allowed while testing is on progress. All training aids used in testing should
preferably be of recent manufacture and placed in separate containers. It shall be the responsibility of the
explosive detector dog team being tested to provide the training aids.
Section 274. Evaluation Certificate. Each evaluation certificate shall be valid for six (6) months only from date
of the test. It should be noted that normal training must be conducted to maintain and enhance the team’s
capability. SOSIA will provide canine Explosive Detection Efficiency Certificate (EDEC) patches to all certified
Canine Units for identification.
Section 275. Stewards/Spotters (Optional). There can be two (2) types of stewards used to smooth the
process and to speed the evaluation tests along:
1) Field Stewards: Directs the explosive detector dog teams to any staging area and keep the next explosive
detector dog team ready to render assistance during the certification process when summoned. The steward
checks equipment and support logistics as needed and works at the supervision, control, and direction of the
evaluator;
2) Test Stewards: Works at the direction of the evaluator and conducts such activities as directed;
3) There shall be no lengthy or unnecessary delays caused by either steward/s or explosive detector dog
teams; and
4) In some cases, the evaluator may act as a steward and also as a judge.
Rule 52. Test Requirements
Section 276. Test Requirements. Handlers will be tested using the prescribed duty uniform. Numbered vests
may be provided for ease of identification and required when provided:
1) Handlers shall not carry with them during the test any training aids that are contaminated with any other
substance. Only sterile rewards or toys are to be used. The PSA/CSU/GSF may opt to supply the rewards or
toys.
2) No electric devices, whistles, ultrasonic devices or related training aids not specifically stated herein will be
allowed.
3) All certifications shall permit the handlers the flexibility of working the dog on or off leash, or a combination
of both.
4) Handlers shall notify the steward at the time of occurrence or immediately after the test of phase that a
protest may be entered or lodged, so the steward may note it.

A Self-Regulated Learning Module 80


5) No dog shall be left unattended at any time in such a manner as to create danger or hazard to another dog,
handler or to itself. Each handler shall be responsible for any damage or injury caused or inflicted by his or her
dog.
6) There shall be no training or practice in the areas of certification or other location where it may disturb the
normal tranquility of fellow explosive detector dog teams or citizens not involved in the certification process.
Rule 53. Narcotics Detection Dogs and Handlers Evaluation Test (NDDHET). Narcotics Detection Dogs and
Handlers Evaluation Test and Guidelines shall be prescribed by the SUEB and approved by C, SOSIA.
Rule 54. Security Equipment, Hardware and Software, Less-Lethal Weapons and/or Electronic Security
Devices & Systems.
Section 277. Electronic Security Systems. Refers to a security system that may be stand-alone or comprised of
an interconnected series of devices or components, including systems with audio and/or video signals or other
electronic systems, which emits or transmits audio, visual, electronic signals or other software/artificial
intelligence or other similar or analogous technology warning of intrusion and provides notification of
authorized/unauthorized entry or exit, which is designed to discourage crime or breach of intrusion detection
system. It shall include but not limited to Body-Worn Cameras, Drones, and other surveillance devices utilized
by PSPs.
Section 278. Authority to Supply. Suppliers of Security Equipment, Hardware and Software, Less-Lethal
Weapons and/or Electronic Security Devices & Systems to PSTAs, PSAs, CSUs, and GSFs, shall apply with
SOSIA for Authority to Supply.
Section 279. Responsibility of Supplier. It shall be the responsibility of suppliers of Security Equipment,
Hardware and Software, Less-Lethal Weapons and/or Electronic Security Devices & Systems to conduct
appropriate trainings to PSTAs, PSAs, CSUs, and GSFs that purchased said products from them.
Section 280. Product-specific trainings. Security equipment and other security hardware and software training
programs and courses shall be prescribed by the STB subject to the approval of C, SOSIA. Further, it shall be
the responsibility of suppliers of security equipment and other security hardware and software or electronic
security devices and systems to conduct appropriate trainings to PSTAs, PSAs, CSUs, and GSFs that
purchased said products or systems from them.
Section 281. Training Required on Use of Security Equipment, Hardware and Software, Less-Lethal Weapons
and/or Electronic Security Devices & Systems. All PSPs handling, using or manipulating Security Equipment,
Hardware and Software, Less-Lethal Weapons and/or Electronic Security Devices & Systems shall have the
appropriate training for the proper use of less-lethal devices issued them.
Section 282. Issuance of Training Certificate. Training acquired by PSPs in the proper use and handling of
Security Equipment, Hardware and Software, Less-Lethal Weapons and/or Electronic Security Devices &
Systems shall be evidenced by a training certificate.
Rule 55. Submission of Reports and Records
Section 283. Reports to be submitted. The following reports shall be submitted:
a. Guard/Firearm strength reports shall be rendered periodically in formats and procedures prescribed by the
Chief, Supervisory Office for Security and Investigation Agencies (SOSIA)/ Chief, Firearms and Explosives

A Self-Regulated Learning Module 81


Office (FEO), respectively, through the RCSUs which shall conduct periodic inspections within their respective
areas of responsibility to verify/validate the reportorial requirements submitted to their respective offices;
b. Crime incident reports; and
c. Other reports required shall be prescribed in appropriate orders, circulars or memoranda.
Section 284. Records and Files of Agencies. The following records and files shall be maintained by all
PSA/GSF/CSU and shall be made available for inspection by the Chief, Philippine National Police or his
authorized representatives;
a. Prescribed monthly reports;
b. Current service contracts in individual folders chronologically arranged (for private security agency only);
c. Alphabetically arranged individual folders of guards containing their personal bio-data using the latest SOSIA
Form, photocopies of licenses and other personal documents (i.e., High School diploma, Pre-licensing
certificate, etc.);
d. Individual records of offenses, SOSIA Form; Authenticated photo copy of record of offenses shall support
recommendations for revocation of licenses firearms of undesirable incorrigible security guards;
e. Property book, containing lists of Security Equipment, Hardware and Software, Less-Lethal Weapons and/or
Electronic Security Devices & Systems and other properties supported by proper documentation;
f. Payroll/vouchers of payments;
g. Performance Report/records of conduct of security personnel; and
h. Other records pertinent to the operation, management and administration of the agency as may be required.
Rule 56. Forms, Seals and Logos
Section 285. Types of forms and usages. Document forms and templates to be used by applicants and
licensees as required by SOSIA for LESP and LTO as well as seals and logos shall be prescribed by the
SUEB and approved by C, SOSIA and is attached as Annex “F” and made integral part of this IRR.
Section 286. Use of letterhead. All Private Security Agencies/Private Security Training Agencies/Company
Security Units shall use letterheads in all forms of communications and official transactions.
Section 287. Logos and Company Seals/Emblems. Private Security Agencies, Company Security Units and
Private Security Training Agencies, shall have their respective company/office logos, seals or emblems distinct
from each other as well as from AFP, PNP and other law enforcement agencies, provided that the same shall
have been first registered at the SUEB and approved by C, SOSIA.
Section 288.Changes and Modifications. Any changes, modifications and/or additions relative to Sections
under Rule 56 of this IRR shall be made through SUEB and approved by C, SOSIA.
BOOK VII
PROFESSIONAL CONDUCT, ETHICAL STANDARDS, DUTIES, POWERS, AND RESPONSIBILITIES
Rule 57. Professional Conduct and Ethical Standards of Security Personnel

A Self-Regulated Learning Module 82


Section 289. Adherence of all Security Professionals to the Professional Conduct and Ethical Standards. All
security professionals duly licensed in accordance with RA 11917 and its Implementing Rules and regulations
shall be covered and strictly observe professional conduct and ethical standards.
Section 290. Security Professionals Creed. All security professionals shall abide with the following creed that
states;
As a security professional my fundamental duty is to protect lives and property and maintain order within my
place of duty; protect the interest of my employer and our clients and the security and stability of our
government and country without compromise and prejudice, honest in my actions, words, and thoughts; and do
my best to uphold the principle: MAKADIYOS, MAKAKALIKASAN, MAKATAO, at MAKABAYAN.
Section 291. Ethical Standards of Security Professionals. The following are the ethical standard to be followed
and complied by security professionals;
1. The fundamental duty of a security professional is to obey the laws of the land and to abide by the rules and
regulations, and relevant issuances of the government of the Philippines;
2. He shall be honest in thoughts and deeds both in his personal and official actuations, obeying the
regulations prescribed by his agency and those established by the company he is assigned to protect;
3. He shall serve the interest or mission of his agency in compliance with the contract entered into with clients
or customers of the agency he is assigned to serve;
4. He shall not reveal any confidential information confided to him as a security professional and such other
matters imposed upon him by law;
5. He shall act at all times with decorum and shall not permit personal feelings, prejudices, and undue
friendship to influence his actuation while in the performance of his official functions;
6. He shall not compromise with criminals and other lawless elements to the prejudice of the customers or
clients and shall assist the government in its relentless drive against lawlessness and other forms of criminality;
7. He shall carry out his assigned duties as required by law to the best of his ability and shall safeguard the life
and property of the establishment he is assigned to;
8. He shall report for duty always in proper uniform and neat in his appearance and shall wear his
accoutrements properly as a symbol of public trust and confidence, as an honest and trustworthy security
professional;
9. He shall keep his allegiance first to the government, then to the public, the agency where he is employed,
and to the establishment he is assigned to serve with utmost dedication to the profession;
10. He shall diligently and progressively familiarize himself with the rules and regulations laid down by his
agency and those of the customers or clients;
11. He shall at all times be courteous and respectful in the performance of duty;
12. He shall learn at heart and strictly observe the laws and regulations governing the possession, carrying,
and use of firearms.

A Self-Regulated Learning Module 83


Section 292. Code of Conduct of Security Professionals. The following are the code of conduct to be
followed and complied by security professionals;
1. He shall always be in proper uniform and shall carry with him at all times during his tour of duty his LESP
and other requirements, equipment, and duty detail order with the authority to carry firearms when applicable;
2. He shall not use his LESP and other privileges if any, to the prejudice of the public, the client or customer,
and his agency;
3. He shall not engage in any unnecessary conversation with anybody except in the discharge of his duties nor
sit down unless required by the nature of his work and shall at all times keep himself alert during his tour of
duty;
4. He shall refrain from reading newspapers, magazines, books, and other reading materials, use laptops,
mobile phones, and other gadgets, and/or do or perform distracting activities while actually performing his
duties;
5. He shall refrain from doing janitorial/utility works, parking attendant duties, issuance of tickets/collection of
fees, and other non-security functions;
6. He shall not drink any intoxicating liquor immediately before and during his tour of duty nor use any
dangerous drugs;
7. He shall know the location of the alarm box near his post and sound the alarm in case of fire or disorder and
shall know how to operate any fire extinguisher at his post;
8. He shall know the location of the telephone and know the hotline numbers and/or telephone numbers of the
police precincts as well as fire stations in the locality;
9. He or his group of security professionals, shall not participate or instigate any disorder, strike, riot, or any
violations of the law and shall immediately notify the police in case of any sign of such occurrences.
10. He shall assist the police in the preservation and maintenance of peace and order and in the protection of
life and property having in mind that the nature of his responsibilities is similar to that of the latter.
11. He shall familiarize himself by heart with the Private Security Service Industry Law (RA 11917), its
implementing rules and regulations, and relevant issuances.
12. He shall not lend to anybody the firearm and/or less-lethal weapons issued to him.
13. He shall always endeavor to deserve and be worthy of the trust and confidence of the agency he
represents and the client he serves.
Section 293. Security Agency Operator’s Creed. Aside from the preceding sections, a Security Agency
Operator shall abide with the following creed;
As a Security Agency Operator, my fundamental duty is to constantly uphold the law; abide by the rules and
regulations set by the government in the conduct of my business; serve the interest of my clientele and my
security professionals; protect the interest of the government; and adhere professionally in the conduct of my
business without prejudices and compromises to human rights.

A Self-Regulated Learning Module 84


Section 294. Code of Conduct of Security Agency Operators. Likewise, the following are the code of conduct to
be followed by Security Agency Operators.
1. They shall, at all times, adhere to professional ethics and refrain from practices that negate the best interest
of the private security service industry
2. They shall always consider that unity in the profession is vital and paramount for the attainment of common
objectives;
3. They shall not use deceitful means and/or misrepresentations in all their business transactions. To this end,
they shall avoid granting of rebates, or commissions in securing security service contracts;
4. They shall not indulge in cut-throat competition (is this related to 20% Admin Fee) by undercutting the
existing contract rates between the PSA and the client and/or the minimum contract rate prescribed by the
industry in conformity with existing minimum wage laws.
5. They shall pay their guards in accordance with rates fixed by law particularly labor and wage laws. They
shall not impose any unauthorized deductions on their employed security professionals or commit acts that will
force these security professionals to seek employment elsewhere nor accept a security professional without
clearance and consent from the losing agency;
6. When a prospective client with existing company security force calls/ bids for additional security
professionals, all bidding security agencies shall observe the principle of “equal pay for equal work”
considering the rate of pay of the company security service and their own security professional;
7. Anchored on the principle of securing property, of providing safety of persons and maintaining peace and
order within such property, when accepting contracts with clients having existing conflict of claims,
management, ownership or administration of properties and/or establishments, where there exist or
forthcoming another contracted/contracting agency, they should conduct themselves and their deployed
security professionals in a manner primarily not to be used against each other at the same time without
compromising their respective contracts;
8. They shall endeavor to raise the standard of service in the security profession thru incentive and in-service
training;
9. They shall establish an adequate library of books, magazines and other publications on security subject,
materials, references, etc. in each PSA.
10. They shall always be truthful and accurate in reports required by SOSIA and/or other competent authorities
and be prompt in the submission of the same;
11.They shall not, under any circumstances, employ for guard duty any person without a professional license
as a security professional duly issued by the Chief, SOSIA;
12. They shall at all times exercise vigilance and be prepared to prevent the use of their security professional s
or the agency in activities inimical to the state or national security. When activities of this nature come to their
attention, they shall as a matter of duty render an appropriate report to the PNP authorities.
Section 295. Ethical Standards of Security Agency Operator. Security Agency Operator shall be at all times
uphold the integrity and trust of the security profession and shall;

A Self-Regulated Learning Module 85


1. Abide by the law of the land and endeavor to fulfill their professional duties in accordance with the highest
moral principles, always conforming to the precepts of truth, fairness, and justice;
2. Contribute to the national welfare by securing and preserving properties and facilities of the country, through
competent security services;
3. Promote the well-being of security professionals through adequate wages and other;
4. With faith and diligence, perform their contractual obligations for the protection of life, limb, and property;
5. Constantly endeavor to raise quality standards of private security services; and
6. Continuously work with and assist the law enforcement agencies in the preservation of peace and order in
the country.
Rule 59. Powers, Duties and Responsibilities of Security Professionals
Section 296. Territorial power. A security guard shall watch and secure the property of the person, firm, or
establishment with whom he or his agency has a contract for security services. Such service shall not,
however, extend beyond the property or compound of said person, firm or establishment except when required
by the latter in accordance with the terms of their contract to escort, or in hot pursuit of criminal offenders.
Section 297. Power of a Security Professional to Arrest a Violator or Criminal. A security personnel may effect
arrest only in the following circumstances;
1. When, in his presence, the person to be arrested has committed, is actually committing, or is attempting to
commit an offense, and;
2. When an offense has just been committed and he has reasonable ground to believe, based on personal
knowledge of the facts and circumstances, that the person to be arrested has committed the crime,
Section 298. Responsibility in Effecting Arrest. When making an arrest, the security professional effecting the
arrest shall inform the person being arrested of the cause of the arrest and his rights under the 1987 Philippine
Constitution, unless in situation where, in so doing, it will imperil the arrest. (Section 10,lbid). After the arrest,
the security professional concerned shall turn-over the arrested person to the nearest police station or to any
police officer in the area.
Section 299. Effecting Warrantless Search. Any security professional may, incidental to the arrest, search the
person so arrested for illegal weapon or contraband, in the presence of at least two (2) witnesses. Likewise, a
security professional may also conduct searches without warrant to employees of the person, firm or
establishment where he is posted or his agency has a security service contract when such search is required
by the very nature of the business of the person, firm, or establishment. Provided, that all illegal weapons or
contraband found in the possession of the person being searched shall be immediately turned-over together
with the arrested person to the nearest police station or police officer in the area for proper disposition.
Provided, further that the security professional effecting the search shall make himself available during the
filing of appropriate charges against the person found to be in possession of illegal weapon or contraband and
during the prosecution of the case when the court so requires.
Section 300. Strict Observance of the General Orders. All security professionals performing security services
shall internalize following general orders:

A Self-Regulated Learning Module 86


1. To take charge of the post and all company properties in view and protect/ preserve the same with utmost
diligence;
2. To walk in an alert manner during my tour of duty and observing everything that takes place within sight or
hearing;
3. To report all violations of regulations and orders I am instructed to enforce;
4. To relay all calls from posts more distant from the security house where I am stationed;
5. To quit my post only when properly relieved;
6. To receive, obey and pass on to the relieving guard all orders from company officers or officials, supervisors,
post in charge or shift leaders;
7. To talk to one except in line of duty;
8. To sound or call the alarm in case of fire or disorder;
9. To call the superior officer in any case not covered by instructions;
10. To salute all company officials, superiors in the agency, ranking public officials and officers of Philippine
National Police; and
11. To be especially watchful at night and during the time of challenging, to challenge all persons on or near
my post and to allow no one to pass or loiter without proper authority.
Section 301. Duty to Assist Law Enforcers. Any security guard shall be duty bound to assist any peace officer
in the pursuit of his bounding duty, when circumstances require, provided it is within the territorial jurisdiction of
his (security officer) area of duty.
Section 302. PNP Deputation of Security Professional during Exigencies. In cases of emergency or in times
of disaster or calamities, the Chief, PNP may deputize any security professional to assist the PNP to assist in
the conduct of specified action including but not limited to search and rescue operation, crowd control, disaster
relief and rehabilitation
RULE 60. Limitations and Prohibitions for Security Professionals
Section 303. Security Guard Post Service. Private security guards shall perform personal service to watch or
secure private or public establishments or property, maintain peace and order and protect lives of persons
through any form of access control/denial, sentry operation, patrolling, establishing reaction Units and the like
provided that;
1. No Private Security Guard performing post service shall act or serve as bodyguard or personal security
escort of any person;
2. The private security guard shall always be in the uniform prescribed for guards on post, spe cially when
bearing firearms;
3. The services rendered are confined to the premises and/or property being secured;

A Self-Regulated Learning Module 87


4. Private Security Guards performing as security aides, or back-up/support of guards performing Post Service,
or performing electronic monitor/security system operation shall not bear firearms and may not be required to
use the prescribed uniforms of guards on post.
Section 304. Security Guard Conduction Service. Private security guards shall perform personal service to
watch or secure movable private or public property in transit like but not limited to seafaring/ocean vessels,
aircrafts, land-locked vehicles, or valuables/cash in transit using any means of transportation except armored
vehicles, provided that;
1. No Private Security Guard performing conduction service shall act or serve as bodyguard or personal
security escort of any person;
2. The private security guard must always be in uniform prescribed for guards on post service, specially when
bearing firearms.
Section 305. Armored Vehicle/Guard Service. Private security guards shall perform security escort service
for the protection of large amount of cash or valuables through the operation of armored vehicles, usually for
deposit pick-up or delivery, provided that:
1. No Private Security Guard performing armored service shall act or serve as bodyguard or personal security
escort of any person;
2. The private security guard must always be in uniform prescribed for guards on armored service, specially
when bearing firearms;
3. Over and above the registration required of vehicles and operation of such under existing transportation
laws, all armored vehicles in the fleet of PSA/CGF armored service providers shall be inventoried/reported with
the PNP;
4. All security personnel performing armored vehicle operation shall have a specified training and qualification
requirement over and above the requirements for security guards;
5. Unless inconsistent with other laws or circulars, the minimum built requirement for armored vehicles shall be
of bullet-resistant materials capable of withstanding the effects of high-powered firearms, provided with a vault,
safe or partition wall with combination lock designed in such a way that access to valuables/cash deposit into it
is denied while in transit;
6. The minimum crew shall be composed of a vehicle operator preferably licensed security guard and two (2)
security personnel;
7. Private Security Armored Services providers to the banking and other financial system shall conform with
the requirements of the Banko Sentral ng Pilipinas (BSP);
8. The standards, requirements, organization, operation and training for private security armored services shall
be provided in an SOP issued by the Director, CSG.
Section 306. Investigation and Detective Services. Inherent to the provision of security services, all PSAs,
CGFs, GGUs, and PDAs may offer private investigative and detective services for the purpose of assisting in
gathering information leading to determination and/or prevention of criminal acts and/or resolution of legal,
financial and personal cases/problems, provided that;
1. Only licensed private detectives shall perform or render investigative and detective duties;

A Self-Regulated Learning Module 88


2. No PSA, CGF or, GGU shall provide or offer personal security protection service;
3. Only PDAs and licensed private detectives as qualified and trained, and explicitly/specifically authorized by
the PNP may render personal security protection services;
4. The standards, requirements, organization, operation and training for personal security protection services
shall be provided in an SOP/circular issued by the CPNP through the recommendation of the Director, CSG in
coordination with the PNP Directorate for Operations, Directorate for Intelligence and Police Security and
Protection Office.
Section 307. Electronic Security Systems and Services. Security Agencies in providing security services may
utilize scientifically designed electronic security systems like but not limited to the anti-burglary, robbery, or
intrusion alarms, closed circuit television recording and monitoring under the following conditions;
1. Only licensed private security personnel trained on the security systems shall operate electronic security
systems;
2. PSAs offering the system shall be accountable for the legitimate registration and licensing of these devices
and their operators with the appropriate government agency;
3. Only licensed security personnel shall issue consent for forensic examination purposes. Provided that, a one
(1) year transitory period shall be given to unlicensed security hardware operators to acquire appropriate
trainings and LESP. Provided further, before the lapse of above transitory period and in the absence of
licensed security hardware personnel, it shall be the duty of the Barangay Chairperson or the head of the
security division to issue the consent for forensic examination.
Section 308. Application of the Force Continuum. While situations will vary based on the persons and motives
involved, security personnel shall apply these tactics, if and when necessary, in order to defend the properties
and persons they ought to protect. The following are force continuum to be followed and complied by Security
Professional;
1. Level 1: Alert Presence. The physical presence of a security personnel can prevent crimes. People are
much less likely to commit crimes if they see that there are alert security personnel standing by and vigilant to
catch someone them. The mere appearance of security personnel, in authorized uniform or customized outfit,
already symbolizes authority.
2. Level 2: Verbal Communication. The use of strong ang authoritative voice can help hinder potential crimes.
Asking people to be quiet at an indoor event or directing them to keep away from certain public areas can be
extremely affective in terms of achieving the desired results. The addition of firm voice to alert presence can
be very effective.
3. Level 3: Physical Restraints. In the event that presence and words are not enough, certain types of physical
restraints may become necessary, the use of hands to hold someone may be necessary to prevent further
danger and harm. This shall be limited to use of such reasonable force necessary to restrain an individual.
Actions that escalate the situation is prohibited.
4. Level 4: Use of Chemical Agents. Chemicals such as pepper spray may be used to distract perpetrators to
allow for time to take appropriate actions, like getting others to safety or notifying the police. Pepper spray and
other chemicals can cause blindness as well as other types of serious harm if not used properly. The use of
chemicals shall not be the first go-to method for alleviating disruptions.

A Self-Regulated Learning Module 89


5. Level 5: Temporary Incapacitation. When the use of bare hands to restrain a person is not sufficient to
properly defend other people as well as the person of security personnel from immediate physical danger, non-
deadly force may be applied, including the use of batons and other less-lethal weapons. If the need to resort
to temporary incapacitation is appropriate, the use of the less-lethal weapon shall be in a manner that is
deemed legally compliant.
6. Level 6: Use of Force. This is the phase wherein the use of firearms is deemed necessary. Firearms shall be
used only when there is imminent danger and in self defense or defense of strangers.
BOOK VII
INSPECTION, ACTION, ARBITRATION, INVESTIGATION, AND ADJUDICATION
Rule 61. Conduct of Inspection.
Section 309. How Inspection is Conducted. Inspections shall be conducted on Private Security Agencies,
Company Security Units, Government Security Forces, and Private Security Training Agencies and/or their
employed or deployed training or security personnel to determine compliance with the provisions of RA 11917,
this IRR, and other issuances.
Section 310. Types of Inspections. Inspections shall be conducted on the following instances;
1. Pre-Licensing Inspection shall be conducted to determine compliance with the provisions of RA 11917, this
IRR, and other issuances prior to the issuance of License to Operate (LTO).
2. Administrative Inspection shall be conducted during the operation of Private Security Agencies, Company
Security Units, Government Security Forces, and Private Security Training Agencies to ascertain whether the
provisions of are complied with, to ensure correction of defects/violations noted, and to recommend to the
Operators appropriate measures to improve their operations.
3. Post-to-Post Inspection shall be conducted on detailed/deployed/posted security guards to determine proper
compliance of RA 11917, this IRR, and other issuances.
4. Inspection in Aid of Investigation shall be conducted motu proprio and/or based on complaints and reported
incidents to assist investigations.
5. Training Inspection shall be conducted before conduct of trainings.
6. Other Inspections as determined by SOSIA.
Section 311. Authority to Conduct Inspection. The Chief, SOSIA or the authorized representative/s shall issue
Letter Order to authorize the conduct of inspections.
Section 312. Composition of Inspection Team. The inspection team shall be composed of at least three (3)
personnel led by a Police Commissioned Officer with a rank of Police Lieutenant or higher as follows;
1. One (1) PCO – Team Leader.
2. One (1) Senior PNCO – Assistant Team Leader.
3. One (1) PNCO – member.

A Self-Regulated Learning Module 90


Section 313. Functions and Responsibilities of the Members of Inspection Team. The functions and
responsibilities of each member of the Inspection Team shall be as follows.
1. Team Leader shall lead the conduct of inspection and ensure the effective gathering and analysis of
evidence across the range of relevant services. He shall issue the appropriate Violation Ticket Report (VTR) if
necessary. He shall also designate duties and responsibilities to other members of the team.
2. Assistant Team Leader shall support the conduct of inspection. He shall act as the evidence collector and
recorder.
3. Other member/s of the team shall be the driver, photographer, security of the inspection team or such other
role/s that the Team Leader shall assign.
Section 314. General Procedures in the Conduct of Inspection. The following procedure shall be followed by
the Inspection Team.
1. The inspection team shall possess and be covered with the appropriate Letter Order with specified purpose,
destination, and period of inspection, among others, duly signed by C, SOSIA or the authorized representative.
2. The inspection team shall introduce themselves to the following personnel during the inspection, state the
purpose of the inspection, and present the appropriate Letter Order (LO):
a. Pre-Licensing Inspection – LTO Applicant;
b. Administrative Inspection – PSA/ PSTA/ CSU/ GSF Operator;
c. Post-to-Post Inspection – Security Officer and posted PSPs.
d. Inspection in Aid of Investigation – PSA/ PSTA/ CSU/ GSF Operator, Security Officer, and/or posted PSPs.
e. Training Inspection – Training Officer
f. Other Inspections - representative.
Section 315. Procedures in the Conduct of Post-to-Post Inspection. The following shall be followed by the
Inspection Team on the conduct of Post-to-Post Inspection:
1. Inspection Team shall inspect the following:
a. Duty Detail Order (DDO);
b. LESP of each Security Personnel.
c. Firearms and Firearms Registration (FR).
d. Juridical LTOPF; and
e. General Appearance.
i. Uniform.
ii. Equipment.
iii. Letter of Authority (LA) for Special Set of Uniform.

A Self-Regulated Learning Module 91


2. The Inspection Team shall coordinate with the office of the CSU or GSF prior to conduct of inspection.
3. During the conduct of actual post to post inspection the documentary requirements shall be presented to the
inspection team (see ANNEX “G” for the list of documentary requirements by category).
4. Violations shall be noted and reflected on the Violation Ticket Report (VTR) prepared in four (4) copies,
signed by the Team Leader, received by appropriate recipients, and distributed as follows:
a. One (1) original copy for SOSIA.
b. One (1) copy retained by the Inspection Team.
c. One (1) copy for security personnel being inspected and.
d. One (1) copy for the PSA, CSU, GSF, or PSTA.
5. Any violation of the provisions of firearms and ammunition under Book VI of this IRR shall warrant the
confiscation of the subject firearm/s and ammunition. The justification, serial number, make and caliber of
firearms, and the number of ammunition shall be indicated on the VTR.
6. Inspection Team shall inform the duty Security Officer or Operations Manager or Agency Operator of a PSA,
CSU, GSF, or PSTA on the issuance of VTR and/or confiscation of firearms.
7. Issuance of violation ticket report shall be per guard violation basis.
8. The inspection team shall conduct exit briefing to the security personnel concerned to ascertain
acknowledgement and correction of violations noted and to recommend appropriate measures to improve their
services.
9. Confiscation of a spurious LESP card shall be effected by the inspection team. Further verification shall be
done at SOSIA to prove the card’s authenticity. Holders of fake LESP shall be dealt with in accordance with
law, rules and regulations.
10. The inspection team can issue violation ticket to security personnel who are hired directly by a company
and the company who are hiring directly security personnel without License to Operate (LTO) issued by
SOSIA.
Section 316. Disposition of Confiscated Licenses, Documents, and/or Firearms. Confiscation of Licenses or
Firearms shall strictly follow the following;
1. Confiscation and disposition of the confiscated items shall be properly documented by the Inspection Team.
2. Confiscated items shall be released only upon presentation of proof of concerned security entity and upon
payment of the required fine, if any,
Section 317. Coordination with Territorial Police Unit Prior to the Conduct of Inspection. All inspections to be
conducted by SOSIA or RCSUs shall be coordinated with the PNP unit having jurisdiction over the area of
inspection. Likewise, the TL shall also inform concerned PNP immediately after the conclusion of the
inspection conducted.
Section 318. Prior Coordination with Security Division of a Government Security Force Subject of Inspection.
The inspecting team shall coordinate with the Security Division of a Government Security Force to be
inspected to prior to the conduct of inspection.

A Self-Regulated Learning Module 92


Section 319. Submission of Inspection Reports. After inspection report shall be submitted by the Inspecting
Team to SOSIA; as follows;
1. After Inspection Reports shall be prepared and submitted upon completion of the inspection or within one (1)
day after the period covering the inspection;
2. In event that the violation/s committed entail the imposition of corresponding fines and penalties, the report
shall be submitted to authorized SOSIA Regional representative (in case of Authorized SOSIA representative -
initiated inspections) or to Chief, SOSIA for approval, disapproval and/or enforcement.; and
3. Accomplished inspection checklists of Administrative Inspections and recommendations thereof, shall form
part of the application for LTO .
Section 320. Disposition of Violations. The following may be the actions on violations noted during the
inspection;
1. Overhaul the Disposition of Violations.
2. Indicate the willing to pay LTO, into the VTR.
3. MDR-based Inspection- check and prepare MDR before conducting inspection.
4. Overhaul the VTR. Include in the VTR, even violations such as Expired LTO, etc.
5. The notice of appearance within seven (7) days as indicated in the acknowledged Violation Ticket Report
(VTR) issued by the inspecting team shall serve as first formal notice to the PSAs, CSUs, GSFs, and PSTAs.
Section 321. Administrative Inspection-related violations.
1. The notice of appearance within seven (7) days as indicated in the acknowledged Violation Ticket Report
(VTR) issued by the inspecting team shall serve as first formal notice to the PSAs, CSUs, GSFs, and PSTAs.
2. In compliance to procedural due process, PSAs, CSUs, GSFs, and PSTAs with pending violations shall be
officially notified either through registered mail or personal service notice.
a) Acknowledging respondent.
b) No-response respondent.
(1) In the event that the PSA concerned shall not comply to the first notice of appearance the Inspection
Section shall send a second notice of appearance and direct the owner or his representatives of said agency to
appear within seven (7) days upon receipt of the notice.
(2) If the PSA concerned failed to comply on the second notice of appearance, the Inspection Report including
all the evidence (e, i, violation report confiscated firearms, affidavit executed by the inspecting team members
and other pertinent documents) shall be submitted for formal investigation.
(3) At the onset of the investigation, a third and final notice shall be sent to PSA concerned, with directive to
appear within seven (7) days upon receipt.
(4) Thereafter, Rule XVI and Memorandum SOP on the Conduct of Investigation shall ensue and be applied.
c) Contesting Respondent.

A Self-Regulated Learning Module 93


(1) In the event that a respondent questions the violation, penalty or fines imposed, and/or any of the
circumstances giving rise to such, and/or refuses to submit under the sanction being imposed, the report shall
be submitted for investigation.
(2) Thereafter, Rule XVI (Investigation of Cases) Conduct of Investigation shall be applied.
b. post-to-post Inspection-related violations.
1) Be it a Private Security Agency, Private Security Training School, Private Security Guard/Watchman or
Private Training Personnel, the procedures set forth in paragraph.
Rule 65. Procedure on Administrative Actions arising from Complaints
Section 322. Complaint. It shall be written in clear, simple, and concise language, under oath before a notary
public, to apprise the respondent of the nature of the charge against him and to enable him to prepare his
defense.
Section 323. Contents of the Complaint. The complaint shall contain:
1. The full name, address, contact number, and current Private Security Agency (if applicable) of the
complainant.
2. The full name, address, contact number, and current Private Security Agency (if applicable) of the
respondent as well as the position and office of employment.
3. Specification of the complaint and allegations; and
4. Narration of the material facts which show specifically the act/s or omission/s attributable to the respondent/s
constituting the offense allegedly committed, the place, date, and time of commission of the offense.
Section 324. Who may Initiate. The following person may initiate a complaint:
1. If aggrieved party is a sole proprietorship or One Person Corporation, complainant shall be the
proprietor/owner or the President, respectively, or its representative authorized through a Special Power of
Attorney (SPA);
2. If aggrieved party is a juridical entity except for One Person Corporation, complainant shall be a natural
person authorized by the Board through a valid Board Resolution with Secretary’s Certificate.
3. If aggrieved party is a private citizen, complainant shall be the private citizen himself/herself; or
4. If violation was found as a result of inspection, complainant shall be the Team Leader of the Inspection
Team through an After-Inspection Report showing the act/s or omission/s allegedly committed.
Section 325. How Initiated. The complaint shall be initiated in the following manner:
1. A complaint shall be initiated upon submission of a notarized complaint affidavit before the SOSIA, or its
authorized representative that has territorial jurisdiction where the offense was allegedly committed,
accompanied by affidavit/s of witness/es, if any, and other evidence in support thereof.
2. The complaint shall be accompanied by a certificate of non-forum shopping duly subscribed and sworn to by
the complainant. If the complaint is not accompanied by a certificate of non-forum shopping, the complainant

A Self-Regulated Learning Module 94


shall be required to submit the same within five (5) days from notice; otherwise the complaint may be
dismissed.
3. Complaint is also initiated through the submission of an After-Investigation Report accompanied by evidence
in support thereof.
Section 326. Grounds for filing an administrative action. Any act or omission in violation of RA 11917 or its
implementing rules and regulations may constitute a ground for administrative action.
Rule 66. Evaluation Proceeding
Section 327. Initial Evaluation of the Complaint. Upon receipt of the complaint, the Evaluator-on-Case shall
immediately record the complaint in the logbook and conduct initial evaluation to determine:
1. Jurisdiction over the complaint. If it was determined that SOSIA or its authorized representative has no
jurisdiction over the complaint the Evaluator-on-Case shall formally refer the case to the concerned office
within three (3) working days upon approval of the C, SOSIA.
2. Sufficiency of the complaint in form and substance (Annex – Checklist on Form and Substance of
Complaint). If it was determined that form and/or substance of complaint is insufficient, Evaluator-on-Case
shall inform the complainant within (3) working days to allow the complainant to rectify the same.
Rule 67. Conduct of Inspection arising from Complaint
Section 328. Authority of Inspection. Upon determination that complaint is sufficient in form and substance, and
that SOSIA or its authorized representative has jurisdiction over the complaint, the C, SOSIA or the authorized
representative shall issue Letter Order to conduct inspection.
Section 329. Jurisdiction of Inspection. SOSIA authorized representative which has territorial jurisdiction of the
area where the incident was committed, shall immediately undertake inspection. However, if the C, SOSIA
deems it necessary, the inspection may be conducted by the Enforcement Management Division and/or other
PNP units.
Section 330. After-Inspection Report. Inspection Team shall submit After-Inspection Report to the Chief,
SOSIA or the authorized representative after the conduct of inspection
Section 1. Administrative Fee of Private Security Agencies. The minimum administrative fee that may be
charged by PSAs to its clients shall not be less than twenty per cent (20%) of the total contract cost, subject to
adjustment by the Department of Labor and Employment: Provided, That additional fees shall be charged for
the acquisition and maintenance of extraneous tools and equipment used for security operation by the agency
required by the clients and for the continuous deployment of private security professionals in hazardous
conditions.
Rule 68. Pre-Charge Evaluation.
Section 331. Submission of Counter-Affidavit of Respondent.
1. Evaluator-on-Case shall, after three (3) working days, send a copy of the complaint, including attached
Affidavits of Witness/es and/or evidence, and After-Inspection Report to the respondent/s.
2. Respondent/s shall be given a period of five (5) working days to submit his/her Counter-affidavit to SOSIA or
its authorized representative.

A Self-Regulated Learning Module 95


3. Upon receipt of Counter-Affidavit from respondent/s, including Affidavits of Witess/es, and evidence,
Evaluator-on-Case shall, within five (5) days, determine if there is existence of probable cause to warrant the
filing of a formal charge.
Section 332. Formal Charge.
1. After a finding of probable cause, the C, SOSIA or its authorized representative shall formally charge the
person complained of.
2. The formal charge shall contain:
a. a specification of charge/s, a brief statement of material or relevant facts,
b. accompanied by certified true copies of the documentary evidence, if any,
c. sworn statements covering the testimony of witnesses, and
d. a directive to answer the charge/s in writing, under oath, within three (3) working days from receipt thereof.
Section 333. Failure to file Answer by Respondent. If the respondent fails or refuses to file his/her answer to
the formal charge within the period provided in the formal charge, he/she shall be considered to have waived
his/her right to submit the same and the case shall be decided based on available records.
Section 334. Effect of Admission by Respondent. When the respondent, in his answer, admits his culpability to
the charge, the Summary Hearing Officer shall determine the penalty commensurate to the offense committed
based on RA 11917 and this IRR.
Section 335. Docket Entries. The formal charge sheet must contain the appropriate docket entries and must be
duly recorded in the official records. The office tasked by the regulatory office to maintain the records of the
administrative case shall enter the case into its official docket by stamping on the face of the formal charge the
time and date of receipt and assigned case number. The case shall be formally filed and pending upon receipt
and entry of the same in the official docket of the Regulatory Office.
Rule 69. Investigation Cases
Section 336. Scope. These rules shall apply to all administrative cases filed before SOSIA and Authorized
SOSIA representative against security and training personnel, security agencies and training institutions for
acts or omissions in violation of RA 11917.
Section 337. Purpose. To provide uniform procedure and expeditious disposition in the conduct of investigation
by SOSIA and Authorized SOSIA representative on administrative cases involving security and training
personnel, security agencies and training institutions.
Section 338. Nature of Proceedings. The investigation and hearing before this regulatory office shall be
summary in nature and shall not strictly adhere to the technical rules of procedure and evidence applicable in
judicial proceedings. The provisions of the Rules and Regulations as well as the Revised Rules of Court shall
be suppletory applicable. Administrative bodies are not bound by the technical niceties of law and procedure
and the rules obtained in courts of law. Administrative tribunals exercising quasi-judicial powers are unfettered
by the rigidity of certain procedural requirements, subject to the observance of fundamental and essential
requirements of due process in justiciable cases presented before them. In administrative proceedings,
technical rules of procedure and evidence are not strictly applied and administrative due process cannot be
fully equated with due process in its strict judicial sense.

A Self-Regulated Learning Module 96


Section 339. Venue. Any complaint shall be filed with the Complaint and Investigation Detection Section,
SOSIA, CSG for acts or omissions committed in the National Capital Region. In all other cases, the complaint
shall be filed with the RCSU having territorial jurisdiction where the acts or omissions were committed.
Provided that it may also be filed before the PNP regulatory office where the complaint works or resides, or
where the respondent’s principal office is located, at the option of the complaint.
Section 340. Role of Recognized Security Association. Except for cases equally cognizable by courts or other
disciplinary agencies or tribunals, all complaints of security agencies against another, security guards against a
security agency or vice-versa shall initiate any arbitration, mediate any dispute that shall arise between their
members and/or Private Security Professional (PSP) under the employ (or formerly employed by the member
of the Association at the discretion of the complainant). The Security Association shall put into writing the result
of the arbitration whether there was no conciliation or settlement has been reached as certified by the
secretary of the organization or unless settlement has been repudiated by the parties.
Section 341. Principle of Exclusivity. When a complaint or charge is filed against a Private Security Agency
(PSA), Private Detective Agency (PDA), Private Security Training Agency (PSTA), Company Guard Force
(CGF) and Private Security Guard (PSG) it shall be heard and decided exclusively by the Regulatory Office
(Chief, SOSIA or Director, CSG) which has acquired original jurisdiction over the case, subject to the following
provisions: Labor Arbiters: resolves labor complaints before the National Labor Relations Commission (NLRC).
The Labor Arbiter has original and exclusive jurisdiction over:
1. Unfair Labor Practice (ULP) cases;
2. Termination disputes;
3. If accompanied with a claim for reinstatement, those cases that workers may file involving wages, rates of
pay, hours of work and other terms and conditions of payment;
4. Claims for actual, moral, exemplary and other forms of damages arising from the employer-employee
relations;
5. Cases arising from any violation of Article 279 (formerly 264) of the Labor Code, as amended, including
questions involving the legality of strikes and lockouts;
6. Except claims for Employees Compensation, Social Security, Medicare and maternity benefits, all other
claims arising from employer-employee relations, including those of persons in domestic or household service,
involving an amount exceeding five thousand pesos (P 5,000.00) regardless of whether accompanied with a
claim for reinstatement;
7. Wage distortion disputes in unorganized establishments not voluntarily settled by the parties pursuant to
R.A. 6727;
8. Enforcement of compromise agreements when there is non-compliance by any of the parties pursuant to
Article 232 (formerly 227) of the Labor Code, as amended;
9. Money claims arising out of employer-employee relationship or by virtue of any law or contract, involving
Filipino workers for overseas deployment, including claims for actual, moral, exemplary and other forms of
damages as provided by Section 10 of R.A. 8042, as amended by R.A. 10022; and
10. Other cases as may be provided by law. (Section 1, Rule V, 2011 NLRC Rules of Procedure, as amended)

A Self-Regulated Learning Module 97


Section 342. Protection of Privacy. While providing for access to information, SOSIA Offices shall afford full
protection to person’s right to privacy, as follows:
a. Ensure that personal information, particularly sensitive personal information, in its custody or under its
control is disclosed only as permitted by existing laws;
b. Protect personal information in its custody or under its control by making reasonable document security
protocol against unauthorized access, leaks or premature disclosure; and
c. Any personnel who has access to records and sensitive information, whether authorized or unauthorized to
personal information, shall not disclose any information except as authorized by a competent authority or
authorized by existing laws.
d. Service Agreements – The SSC/PSA and/or the principal shall produce or submit the original copy of the
Service Agreement when directed to do so by C, SOSIA, C, RCSU, any competent authority or his/her duly
authorized representative. The Service Agreement must conform to the DOLE Standard Computation and
Standard Service Agreement. The Service Agreement shall stipulate the following:
e. The specific description of the kind or nature of security job, work or service being subcontracted;
f. The place of work and terms and conditions governing the contracting arrangement which shall include the
agreed amount of the security services to be rendered and the standard administrative fee of not less than
twenty percent (20%) of the total contract cost;
g. The equipment to be provided by the SSC/PSA shall be provided by the PSA as indicated in the Security
Service Contract;
h. An “automatic crediting provision” which shall immediately give effect to the common provision in wage
orders that prescribed increases in wage rates and other wage-related benefits of security guards and other
private security personnel shall be borne by the principals or clients of the SSC/PSA and the Service
Agreements shall be deemed amended accordingly;
i. Provisions which shall ensure that the client and the SSC/PSA shall uphold the rights and provide all the
benefits of security guards and other private security personnel under the Labor Code, as amended, and other
existing laws, and that violations of which will render the service contractor ineligible to participate in any
bidding and the principal ineligible to engage the services of such SSC/PSA;
j. A provision that the SSC/PSA shall directly remit monthly the employers share and employees contribution to
the Social Security System (SSS), Employees Compensation Commission (ECC), Philippine Health Insurance
Corporation (PhilHealth) and Home Development Mutual Fund (Pag-IBIG); and
k. Other provisions that are just and equitable under existing laws, rules and regulations.
Section 343. Pre-Charge Investigation. If the complaint is approved for pre-charge evaluation, it shall first be
docketed in the Pre-Charge Evaluation Docket book by stamping the time and date of receipt; recording and
assigning a case number and designation of the investigator/evaluator on case who shall conduct the
investigation/evaluation.
The investigation/evaluation shall include the examination of records and documents submitted by the
complainant the Private Security Agency, Private Security Professional, Training Agency, Company Guard
Force and Private Security Guard complained of, as well as documents readily available from other

A Self-Regulated Learning Module 98


government offices for the purpose of determining the existence of probable cause. The investigating officer
shall at his discretion schedule a meeting from both parties for clarificatory matters.
If necessary, both parties may be required to appear for clarificatory questioning provided that they are notified
within three (3) days prior to the scheduled appearance. The investigator before whom the said documents
were identified and affirmed must so indicate such facts in the minutes of proceedings, to include matters
clarified and attach the same with the records of the case.
The Private Security Agency, Private Security Guard, Training Agency Company Guard Force and Private
Security Guard complained of may then submit his comment/counter-affidavit within five (5) days after the
appearance and clarificatory meeting(s) was held, provided however, that failure of the Private Security
Agency, Private Security Guard, Training Agency Company Guard Force and Private Security Guard
complained of to submit his comment/counter-affidavit shall be construed as a waiver thereof.
No motion for extension of time to submit comment/counter-affidavit or any other dilatory motions shall be
allowed except upon meritorious causes and the filing thereof does not interrupt the reglementary period for
the submission of the comment/counter-affidavit.
Any recommendation by the Investigator on case upon approval of their Chief of Office shall in all cases be
approved by Chief, SOSIA Motion for Re-Investigation – The complainant may file a motion for re-investigation
to the concerned office recommending for the dropping and closing of the complaint within five (5) working
days upon receipt of the Report for lack of probable cause on the ground that palpable mistake was committed
in the appreciation of the complaint and other pertinent documents. Only one (1) motion for re-investigation
shall be allowed which shall be resolved within fifteen (15) days from receipt thereof.
If after Pre-Charge Investigation a prima facie case is found to exist, the Case/Investigating Officer shall
recommend for the hearing of the case and the designation of a Hearing Officer to be selected among the
Police Commissioned Officers assigned with SOSIA or RCSU for the approval of their Chiefs of Office. Pre-
Charge Investigation Report shall include the Charge Sheet signed by the Chief, Complaint and Investigation
Section of the office.
Section 344. Pre-Charge Investigation Report. Within Ten (10) days from the termination of the pre-charge
investigation, the investigating officer shall sign and submit his report to the Chief, Complaint Investigation
Detection Section, EMD, SOSIA or C, SAGS of the RCSU to be concurred and upon concurrence of the C,
CIDS it must be approved by the Chief, Enforcement Management Division (EMD) or the Chief, RCSU.
Upon approval of the Chief, Enforcement Management Division (EMD) or the Chief, RCSU the Pre-Charge
Investigation Report shall be forwarded to the Servicing Legal Officer for his legal opinion, upon approval of the
SLO, it shall then be reviewed by the Asst. Chief, SOSIA and upon approval of the Asst. Chief, SOSIA the final
approving authority shall be the C, SOSIA on all administrative cases.
Section 345. Action on the complaint. All complaints for Initial Evaluation and Pre-Charge Investigation shall
be stamped on its face with the date and time of its receipt and assigned reference numbers, and shall be
recorded in a docket book exclusively for that cases and shall maintain a docket book that shall contain in
addition to the data mentioned by the preceding paragraph: the name of the parties, the offense charged, the
hearing officer to whom the case was assigned, the date the Resolution/Decision was rendered, the proof of
service of the Resolution/Decision, date the motion for reconsideration of the appeal was filed, the date the
decision became final and other relevant material data.

A Self-Regulated Learning Module 99


Section 346. Authority to conduct Motu Proprio Investigation. SOSIA and the RCSU that has jurisdiction on the
place of incident shall conduct motu proprio investigation on the following cases:
1. Incidents where a Private Security Guard (Security Officer, Security Guard, Company Guard Force) illegally
discharges a firearm;
2. Incidents where death, serious physical injury, violence of human rights and any serious incidents that
needs immediate action;
3. Incidents when the Agency issued firearm is lost, stolen or taken while in the performance of duty, while off-
duty or during travel from Security Agency to place of posting area;
4. Illegal Posting with imminent threat or stand-off between and among two (2) or more Private Security
Agency;
5. Court Order from a competent court that has jurisdiction over the case; and
6. Other justifiable orders coming from the C, PNP, D, CSG and C, SOSIA.
Section 347. Prohibition Against Forum Shopping or Multiple Filing of Complaints. To avoid multiplicity of cases
for the same cause of action, the complainant shall certify under oath in his pleading, or in a sworn certification
annexed thereto and simultaneously filed therewith, to the truth of the following facts and undertaking:
a. That the complaint has not filed or commenced any complaint involving the same cause of action in any
other regulatory office (SOSIA or RCSUs);
b. That to the best of the complainant’s knowledge, no such complaint is pending before any other regulatory
office (SOSIA or RCSUs);
c. That if there is any such complaint which us either pending or may have been terminated, the complainant
must state the status thereof; and
d. That if the complainant should thereafter learn that a similar action or proceeding has been filed or is
pending before any other regulatory office (SOSIA or RCSUs), the complainant shall report such facts within
five (5) days from knowledge.
Section 348. Application of the Principle of Res Judicata / Bar by Prior Judgement.
a. For a prior judgment in an administrative case to constitute a bar to a subsequent administrative action, the
following requisites must concur;
b. It must be a final judgment or order;
c. The Regulatory Office rendering the same must have jurisdiction over the subject matter and over the
parties;
d. It must be a judgment on the merits; and
e. There must be between the two (2) cases, identity of parties, subject matter and cause/s of action.
Rule 70. Filing And Assignment Of Cases To Summary Hearing Officers

A Self-Regulated Learning Module 100


Section 349. Formal Charge. After a finding of probable cause, the investigating office shall formally charge,
under oath, the concerned Private Security Agency or Private Security Guard or Training Agency or Company
Guard Force or Private Security Guard complained of. The formal charge shall contain the following:
a. A specification of the charge(s);
b. A brief statement of material or relevant facts; and
c. The presence, if any, of other details relative to the charges.
Section 350. Docket Entries. The formal charge sheet must contain the appropriate docket entries and must
be duly recorded in the official records. The office tasked by the regulatory office to maintain the records of the
administrative case shall enter the case into its official docket by stamping on the face of the formal charge the
time and date of receipt and assigned case number. The case shall be formally filed and pending upon receipt
and entry of the same in the official docket of the Regulatory Office.
Section 351. Maintenance of a Docket Book. A docket book shall be maintained by the Regulatory Office or
Authorized personnel and shall contain, among others, the following:
1. Date and time of receipt of the pre-charge investigation report;
2. The case number;
3. The name of the parties;
4. Offense charged;
5. The summary hearing officer to whom it was assigned;
6. The date and time of receipt of the case folder by the summary hearing officer;
7. Date and time the report of investigation of the summary hearing officer was received by the Disciplinary
Authority;
8. The date the decision was received by the parties;
9. The date the decision became final and the issuance of the certificate of finality;
10. The date the implementing order was issued;
11. The date the motion for reconsideration, if any was received by the regulatory office;
12. The date the motion for reconsideration, if any, was resolved by the regulatory office;
13. The date the notice of appeal, if any, was received by the regulatory office;
14. Other matters relevant to the case.
Section 352. Assignment of Summary Hearing Officers. The Regulatory Office or authorized officer shall within
five (5) days from receipt and docketing of the complaint, assign and transmit the entire case folder to the
designated Summary Hearing Officer.
Rule 71. Formal Hearing and Disposition of Cases

A Self-Regulated Learning Module 101


Section 353. Venue. The Administrative complaints or cases against Private Security Agency, Private Security
Guard, Company Guard Force, Private Security Training Agency shall be filed before the Office of SOSIA and
RCSU that has territorial jurisdiction over the incident.
Section 354. Transfer of Venue. Upon proper motion of either party with sufficient justification, the venue of the
complaint either on-going investigation or Summary Hearing Proceedings may upon approval from the D, CSG
or C, SOSIA be changed and transferred to the Office of CIDS, EMD, SOSIA or RCSUs that either party
resides on the following grounds:
a. When any of the parties is exerting efforts to harass, intimidate, coerce or unduly influence the other party,
his witnesses or immediate members of the family to withdraw the complaint or retract their statements; or
b. When there is an imminent and direct threat to the life and limb of any of the parties so as to frustrate the
successful investigation of the administrative case; or
c. When any of the parties is harmed and the cause of which or the motive is closely related to the pending
case; or
d. To better serve the ends of justice.
Section 355. Summons. Within three (3) days upon receipt of the formal complaint and the records of the case
by the Hearing Officer, he shall issue the summons to be served upon the respondent, directing him to submit
his answer within five (5) days from receipt thereof, together with whatever documentary evidence the
respondent may have in support of his defense.
Section 356. Answer. The answer shall be in writing, under oath and must contain material facts, which may
either be a specific denial or affirmation of the allegations in the complaint. It shall be accompanied by
documentary or other evidence, if there be any, in support of the defense, copy furnished the complainant. It
shall also contain a list of witnesses and their individual addresses, whenever appropriate.
The answer shall be filed in two (2) copies either personality or by registered mail, with proof of appropriate
service to the complainant. If the answer is sent by registered mail, it is deemed filed on the date and hour of
receipt stamped by the post office on the envelope. Said envelope shall be kept and made an integral part of
the answer and records of the case. The proceedings being summary in nature, no motion to dismiss, motion
for bill of particulars or any other motion shall be allowed, and the filing of the same shall not interrupt the
running of the reglementary period for filing an answer.
Section 357. Effect of Failure/Refusal to File Answer. Failure of the respondent to file an answer within the
reglementary period shall be considered as a general denial of the charges.
Section 358. Effect of Admission by Respondent. When the respondent in his answer admits its culpability to
the charge, the hearing shall, nonetheless, proceed in order to determine the degree of his responsibility, and
the appropriate penalty to be imposed.
Section 359. Pre-Hearing Conference. Within fifteen days from receipt of the answer, the Summary Hearing
Officer shall conduct the pre-hearing conference for the purpose of:
a. Defining and simplifying the issues of the case;
b. Entering into admissions and/or stipulations of facts;
c. Marking of exhibits after proper identifications by the parties/ signatories; and

A Self-Regulated Learning Module 102


d. Threshing out other matters relevant to the case.
The conference shall be completed within two (2) days and the proceedings shall be duly recorded and
attested by the parties and/or counsel.
Whether the parties are represented by counsel or not, they shall be made to sign the certificate of readiness
to appear at the scheduled hearings. In the said certification, the date of hearing agreed upon by the parties
shall be strictly followed to avoid unnecessary delay in the proceedings.
Section 360. Order of Summary Hearing. The order of summary hearing shall be as follows:
a. The complainant shall adduce evidence with proper identification and marking thereof of his exhibits;
b. The respondent shall then present evidence in support of his defense with proper identification and marking
thereof of his exhibits;
c. The proceedings being summary in nature, direct examination of witnesses shall be dispensed with and the
sworn statements/affidavits of witnesses, after proper identification and affirmation on the truth of the contents
thereof, shall take the place of their oral testimony, except for witnesses who appeared pursuant to a
subpoena; and
d. Clarificatory questions may be allowed, if requested by either party, but shall be confined strictly to material
and relevant matters and, insofar, as may be compatible with the ends of justice.
Section 361. Submission of Position Papers. The hearing officer shall require the parties to submit their
respective position papers within ten (10) days from the date the summary hearing is terminated. The position
paper shall only contain those charges, defenses, and other claims contained in the affidavits and relevant
pleadings filed by the parties. Any additional relevant affidavits and/or documentary evidence may be attached
by the parties to their position papers. Upon receipt of the position papers the Summary Hearing Officer shall
consider the case submitted for resolution. The failure of any party to submit position paper shall be considered
as a waiver thereof. No motion for extension of time shall be entertained unless with valid grounds and
approval of the other party.
Section 362. Clarificatory Hearing. Within Five (5) days from receipt of the position paper of the parties or after
the expiration of the period to file the same, a party may move or the Summary Hearing Officer may issue an
order, for the conduct of a one-time clarificatory hearing where the parties shall be afforded the opportunity to
be present and submit written clarificatory questions to the Summary Hearing Officer which will determine
whether or not the questions are necessary and relevant to the fact in issue.
Section 363. Right to Counsel. Parties have the right to avail of counsel. If the parties at the start of the
proceedings appear without counsel, they shall be informed of the right to avail of one if they so desire.
However, the hearings shall proceed as scheduled even in the absence of counsel. If a party is not
represented by counsel, the Hearing Officer shall mark the exhibits presented during the pre-hearing
conference and may propound clarificatory questions, if necessary. Parties may be assisted by a counsel in
the preparation and submission of their pleadings and during the clarificatory hearing.
Section 364. Postponement. Postponement of hearing should be discouraged and shall be allowed only in
meritorious cases, such as illness of a party or his/her counsel and/or other similar unavoidable causes. A
request for postponement on the ground of illness shall be supported by a duly sworn medical certificate.

A Self-Regulated Learning Module 103


Regardless of the ground invoked, not more than two (2) postponements shall be allowed for either of the
parties. Thereafter, the hearing shall proceed as scheduled.
Section 365. Effect of Forum Shopping. Violation of the prohibition against forum shopping shall be a ground
for the dismissal of the case motu proprio or upon motion of the respondent.
Section 366. Effect of Absence/Non-Appearance of Complainant. If the complainant fails or refuses to appear
during the two (2) consecutive scheduled hearings, despite due notice, it shall be a sufficient ground to drop
the complaint for failure to prosecute where the culpability of the respondent could not be established or
proven without the testimony of the complainant. However, before dropping the complaint, the designated
hearing officer shall exert best efforts to locate the complainant and his witnesses and to inquire into the
reason (s) for their failure to prosecute the case.
In cases where the culpability of the respondent can be established by evidence other than the testimony of
the complainant, non-appearance of the letter shall not be a ground to terminate the proceedings.
Section 367. Effect of Desistance of the Complaint. If the complainant desists prior to the presentation of the
evidence by the prosecution, the case shall be dismissed for failure to prosecute; Provided that the affidavit of
desistance must be affirmed personally by the summary hearing officer who shall ask searching questions
regarding the execution and facts therein.
Section 368. Effect of Failure or Refusal of Respondent to Appear. If the respondent, despite due notice, fails
or refuses to appear without justifiable reason during the scheduled hearings, he is deemed to have waived his
right to be present and to submit evidence.
Section 369. Application of the Principle of Res Judicata/ Bar by Prior Judgment. For a prior judgment in an
administrative case to constitute a bar to a subsequent administrative action, the following requisites must
concur:
a. It must be a final judgment or order;
b. The Disciplinary Authority rendering the same must have jurisdiction over the subject matter and over the
parties;
c. It must be a judgment on the merits; and
d. There must be between the two (2) cases, identity of parties, subject matter and cause/s of action.
Section 370. Effect of Death. The administrative case against the respondent who dies during the pendency
thereof must be resolved as follows:
A. In situation where death occurred while the case is pending investigation:
1. The administrative case should not be dismissed when the death of the respondent occurred when the
formal investigation reached the stage where respondent is considered to have been afforded due process, as
when the following concur:
i. Respondent was notified of the complaint/charge against him/her; and
ii. When he has filed an answer or has waived his/her right to file the same (as this is the stage when
respondent has been afforded the opportunity to explain his/her side).

A Self-Regulated Learning Module 104


2. If the respondent dies before he/she could explain his/her side through an answer complaint/charge, the
administrative case shall be dismissed on account of the death of the respondent as he/she cannot be deemed
to have been accorded the opportunity to be heard which is a element of due process.
B. In situations where the death occurred after the respondent has perfected his/her appeal before the
Appellate body, the appeal shall continue until its final determination. In the event the deceased respondent-
appellant wins the appeal, material and/or pecuniary benefits arising from the case, if any, shall accrue to the
legal heirs of the deceased respondent-appellant subject to the Law on Succession and the law on
Corporation.
Section 371. Submission of Resolution. The hearing officer shall have thirty (30) days to submit to the Chief,
SOSIA or D, CSG the copy of the Resolution for approval accompanied by the complete records from the date
the case is submitted for resolution. Once approved, the said Resolution shall constitute the Decision in the
case. Copies of which shall be served to all parties within five (5) days upon approval of the resolution.
Resolution with recommendation for the suspension or cancellation of a Temporary License to Operate shall
be approved by the Director, CSG while for Regular License To Operate, by the Chief, PNP.
Section 372. Contents of Resolution. Resolutions shall be clear and concise; and shall include the following:
a. Facts of the case
b. Issues involved
c. Applicable laws, rules and regulations
d. Findings and conclusions
e. Recommendations (Disposition thereof)
Section 373. Contents of Decision. The decision shall contain the full name of the parties, the Agency name,
the offense charged, a brief statement of the material relevant facts, the findings established by the evidence
on record, the conclusion, the applicable laws, rules and regulations, jurisprudence, disposition of the
regulatory office and other pertinent details relevant to the case.
Section 374. Service of Decision. The Decision shall be served either personally, by registered mail or any
private courier at the complainant’s and respondent’s place of business or at his last known address within
there (3) days from approval thereof. In all cases, proof of such service shall be attached to the records of the
case for purposes of determining jurisdiction in case of appeal.
Section 375. Respondent Found liable for an Offense Separate and Distinct from he was Charged. A
respondent may be found culpable of an offense separate and distinct from that which he was charged:
Provided that the acts constituting the offense of which he was found culpable were alleged in the complaint
and the respondent was given the opportunity to answer.
Section 376. Motion for Reconsideration. The party adversely affected may file a motion for reconsideration
from the decision rendered within ten (10) days from receipt of a copy of the decision on the following grounds:
a. Newly discovered evidence which, if presented, would materially affect the decision rendered; or
b. Errors of law or irregularities have been committed prejudicial to the substantial rights and interest of the
movant; and

A Self-Regulated Learning Module 105


c. The decision is not supported by the evidence on record.
The filing of a timely motion for reconsideration shall stay the execution of the decision sought to be
reconsidered. Only one (1) motion for reconsideration shall be allowed and the same shall be considered and
decided by the regulatory office within fifteen (15) days from receipt thereof.
Section 377. Finality of Decision. The Decision rendered by the regulatory office (SOSIA) shall be final and
executory if no appeal or motion for reconsideration is filed within the time provided in these Rules. Within one
(1) day after the lapse of the said reglementary period, the final order signed by the Chief, SOSIA or D, CSG or
in cases of cancellation of Regular License To Operate, by the Chief, PNP together with the copies of the
Resolution/Decision shall be served to the respondent either personally or by registered mail at the
respondent’s place of business or at his last known address.
Section 378. Nature of Proceedings. The administrative proceedings shall be non litiguous in nature, subject to
the requirements of due process of law. The technical rules of criminal or civil procedure, and the rules
obtaining in the courts of law shall not apply. The Case/Investigating Officer may avail himself of all reasonable
means to ascertain the facts of the case, including ocular inspections and testimony of expert witnesses.
Administrative bodies are not bound by the technical niceties of law and procedure and the rules obtained in
courts of law. Administrative tribunals exercising quasi-judicial powers are unfettered by the rigidity of certain
procedural requirements, subject to the observance of fundamental and essential requirements of due process
in justiciable cases presented before them. In administrative proceedings, technical rules of procedure and
evidence are not strictly applied and administrative due process cannot be fully equated with due process in its
strict judicial sense.
Rule 72. Service of Notices and Summons
Section 379.To whom and by Whom it will be served.
a. All notices and summons shall be served to the respondent in person by the process server or by registered
mail or by private courier at his/her last known registered business address or last known residential address
as stated in the records;
b. If personal service is not possible or when the respondent refuses to receive the notices or summons,
service may be made by leaving a copy of the same with the Administrative Officer or employee at his
registered business address or with any responsible member of the respondent’s household at his last known
address provided that if the latter also refuses to receive the summons or notices, service may be made to the
official address of the barangay office in that area.
In all instances, a Return of Service by the server (proof of service) shall be made within twenty-four (24) hours
from service to the private complainant and respondent, either personally or registered mail or private courier.
Rule 72. Filing And Service of Pleadings, Processes and Decisions
Section 380. Filing of Pleadings. The filing of pleadings by the parties shall be made by presenting the
original copies thereof to the concerned regulatory office or authorized officer or by sending them by registered
mail or private courier with proof that the other party was served with a copy. The date and time of the receipt
shall be indicated on the face of the original document and the receiving copies. In case the documents were
sent by registered mail or private courier, the date and time of actual receipt shall be the time and date of
receipt as stamped on the envelop which is required to be attached to the document as part of the record.

A Self-Regulated Learning Module 106


Section 381. Service of Subpoenas and Interlocutory Orders. Subpoenas and other interlocutory orders shall
be served personally, provided however, that if the complainant and/or respondent is represented by counsel,
service of orders to the counsel shall be deemed service to his client.
Section 382. Service of Final Orders / Decisions / Resolutions. Final orders, decisions or resolutions shall be
docketed before its release by the regulatory office or appellate body and copies thereof shall be served upon
the parties personally or by registered mail.
Section 383. Implementation of Orders / Decisions / Resolutions Which have Become Final and Executory.
Orders, decisions, or resolutions which have become final and executory shall be referred to the office
concerned under the regulatory office or authorized officer tasked to handle the implementations (Attn: C, SLD)
for implementation within five (5) days from receipt of the request or order of the Regulatory Office or Appellate
Body to implement the same, copy furnished the private complainant, respondent, C, SOSIA and D, CSG.
Section 384. The concerned authorized personnel to whom the implementation is tasked must make the
appropriate return to the Disciplinary Authority or Appellate Body indicating the action taken on the referral /
order for implementation.
Rule 73. Appeal
Section 385. Perfection of Appeal. An appeal shall be perfected by the party adversely affected by filing and
serving upon the C, PNP or D, CSG or C, SOSIA a Notice of Appeal within ten (10) days from receipt of the
Resolution subject of appeal and furnishing a copy thereof to the other party. Within three (3) days upon
receipt of the notice of appeal, the C, PNP or D, CSG or C, SOSIA shall forward the complete original records
of the case to the appellate body which shall be systematically and chronologically arranged, paged and
securely bound to prevent loss of any piece of document thereof.
Section 386. Notice of Appeal and Memorandum on Appeal.
a. A Notice of Appeal together with the memorandum on appeal shall contain the following: 1) the material
dates showing that it was filed on time; 2) the assignment of the specific errors of fact or law, or both, allegedly
committed by the regulatory office; 3) the specific Appellate Body to which the appeal is being taken; and 4)
the complete mailing address and contact information of the appellant or counsel.
b. In all appealed cases, the title of the case shall remain as it was before the Regulatory Office with the party
appealing the case referred to as the “appellant” and the prevailing party as the “appellee”.
c. The appellant shall submit a Memorandum on Appeal in three (3) legible copies simultaneous with the
Notice of Appeal or not later than fifteen (15) days from the filing of the notice of appeal, copy furnished the
other party.
Section 387. Dismissal of Appeal. When the Appellant fails to comply with the requirements provided in
Sections 1 and 2 of this rule, the Appellate Body shall direct compliance thereof within ten (10) from receipt of
the order with a warning that non-compliance with the requirements shall be construed as failure to perfect an
appeal and shall cause the dismissal of the appeal with prejudice to its filing.
Section 388. Transmittal of the Records. Within fifteen (15) days from receipt of the Notice of Appeal, the
concerned Regulatory Office shall forward the complete original records of the case to the appellate body,
which shall be systematically and chronologically arranged, paged and securely bound to prevent loss of any

A Self-Regulated Learning Module 107


piece of documents and evidence thereof. The transmittal of the records shall be a ministerial duty and the
movement of the case folders shall be properly logged.
Section 389. Docketing of Appealed Cases. Upon receiving the complete original record of the case from the
investigating office, the appellate body shall immediately docket the same by stamping the time and date of
receipt on its cover, assigning the appellate the case number and entering the same on the docket book which
shall be purposely maintained for appealed cases only.
Section 390. At any time before the appellate body renders its decision resolving the appeal, the appellant,
as a matter of right, can withdraw the same; which shall consequently, render the appealed decision final and
executory. No motion to reinstate the appeal shall be allowed.
Section 391. Period to Decide an Appeal. The appellate body shall decide the appeal within thirty (30) days
after the receipt of the entire records of the case from D, CSG or C, SOSIA. Failure of the appellate body to
decide the appeal within that period shall render the decision of the investigating office final and executor
without prejudice to the filing of an appeal by the party adversely affected to the Chief, PNP. The officer or
board designated by the appellate body to resolve the appeal shall make a written explanation to the Director,
CSG on its failure to do so.
Rule 74. Miscellaneous Provisions
Section 392. Effect of a Pending Case and Non-Compliance to Final Order. Pendency of a case before
SOSIA or RCSU for a grave offense respondent shall be a ground for suspension of the documentary
processing of the License to Operate (LTO) of respondent agency, accreditation for training institution and
license to exercise profession for security and training personnel. Furthermore, the Chief, SOSIA or Chief,
RCSU shall issue a Cease and Desist Operation to the particular post of the security agency or the training
institution where the respondent in all cases, it shall also be a bar for the processing of the application for the
renewal of licenses and accreditation.
Section 393. Status of application under suspension. Chief, SOSIA or Chief, RCSU may issue an interim
license to operate or exercise profession to the licensee who applied for the renewal of his license until the
final disposition of the case has been rendered.
Section 394. Issuance of Clearance/Certification. The Chief, SOSIA or the Chief, RCSU, upon written request
and the payment of the legal fee shall issue a clearance or certification indicating the pendency or non-
pendency of an administrative case against security and training personnel or security agency.
Section 395. Role of company security guards and similar personnel when strike/lockouts occur. SOSIA or
RCSU shall reiterate the strict observance by any Private Security Guards, company security guards and
Private Security Professional to refrain from joining any picket\strike/lockout or any modes of participation in
mass gatherings that would violate the peace and order in their area of responsibility.
Section 396. Regulatory Power of the Chief, SOSIA. The Chief, SOSIA whether as Acting Chief or in Officer-in-
Charge (OIC) capacity shall have the power to restrict and regulate any unlawful acts in violation of any law,
rules and regulations of all Private Security Agencies, Private Security Training Agency, Company Guard
Force, Private Security Guard or any Private Security Professional all over the Philippines. Chief, SOSIA is
authorized to issue orders, authorize change of venue, and promulgate rules and regulations to carry out the
objectives and implement all the provision of this law (RA 11917).

A Self-Regulated Learning Module 108


Section 397. Visitorial Power. The Chief, SOSIA or his duly authorized representatives may, at any time upon
issuance of a valid Letter Order shall conduct inspection anywhere in the Philippines to prevent any conflict of
interest, undue advantage to a certain party, undue disadvantage to any party and to at the best interest of
justice.
Section 398. The foregoing procedure/process is without prejudice to the filing of appropriate criminal case
when violation committed is penalized under Republic Act 11917 the Revised Penal Code and other existing
laws.
Rule 75 Duties during Strikes and Lockouts
Section 399. Policies. The following policies shall be taken into consideration:
a. All private security personnel in direct confrontation with strikers, marchers, or demonstrators shall not carry
firearms. They may, at best, carry only night sticks (batuta) which may or may not be provided with tear gas
canister and dispensers.
b. Private security personnel of strike-bound establishments not in direct confrontation with the strikers may
carry in the usual prescribed manner their issued firearms.
c. Private security personnel shall avoid direct contact, either physically or otherwise, with the strikers.
d. Private security personnel shall stay only within the perimeter of the installation which they are protecting at
all times.
e. Private security personnel, in protecting and securing the assets and persons of their clients, shall use only
sufficient and reasonable force necessary to overcome the risk or danger posed by strikers or hostile crowds.
f. Private security personnel shall refrain from abetting or assisting acts of management leading to physical
clash of forces between labor and management. These hostile acts include breaking of the strike; smuggling in
of scabs (strikebreakers) and preventing strikers from conducting peaceful pickets.
g. Private security personnel shall not enforce the provisions of the Revised Labor Code pertaining to
strikers/lockouts.
h. Private security personnel on duty must at all times be in complete uniform with their names and agency’s
name shown on their shirts above the breast pockets.
Section 400. For Private Security Agencies/Company Security Force Chief Security Officers:
a. Upon declaration of a strike, or upon the establishment of a picket line or mass action at the vicinity of a
firm/establishment, the Detachment Commander or the Chief Security Officer of the company guard force,
shall immediately collect all firearms of the guards in direct or about to have a direct confrontation with the
crowd and deposit these firearms in their vault; or reissue these firearms to other private security personnel not
issued firearms but assigned to and performing guard duties away from and not visible to strikers or the crowd
as may be required by the circumstances.
b. The Detachment Commander or Security Director shall account for all the firearms in a logbook.
c. In instances where there is no Detachment Commander or Security Director, as in a compound where there
are only a few guards, the agency operator or Security Officer in the case of company security forces, shall
immediately be informed by the guards of the declaration of strike or about the approach of strikers or a crowd;

A Self-Regulated Learning Module 109


whereupon the agency operator/security officer shall immediately assess the situation and take appropriate
action to forestall violence, but at the same time insuring security of the premises.
d. The Detachment Commander or Security Director shall maintain constant contact with the management and
if he notices or observes the strikers or the crowd to be up to something unlawful or are clearly violating the
provisions of the Revised Labor Code, the Revised Penal Code and/or local ordinances, this information to the
Commander of the Peace Keeping Force for his appropriate action.
e. If it becomes unavoidable for private security personnel to talk to strikers or member of the crowd, only the
Detachment Commander or Security Director shall talk to the leader or leaders of the strikers or crowd. What
transpires in this dialogue shall be reported to the management immediately. At no instances shall private
security personnel negotiate with the strikers or unfriendly crowd in relation to the labor-management dispute.
This is a function of management.
f. If the situation worsens or becomes untenable for the private security personnel to cope with, the
Detachment Commander or Security Director, the guard on post, shall immediately advise the management to
request for PNP security assistance.
g. The Detachment Commander and Security Director shall publish emergency telephone numbers (Police,
Fire, Hospital) at all guard posts and detachments.
Section 401. Inter-relationship between Private Security Personnel and members of the PNP:
a. Private Security personnel are always subordinate to members of the PNP on matters pertaining to law
enforcement and crime prevention. They cannot enforce any provision of the law except in executing citizen’s
arrest and/or conducting initial investigation of a commission of a crime. In such case, any arrested person
shall be turned over immediately to the nearest PNP unit/station.
b. Criminal investigation is the responsibility of the PNP. All results of initial investigation conducted by private
security personnel and all evidence gathered by them shall be turned over to the PNP unit/station concerned
as a matter of course without delay.
c. Responsibilities of Private Security Personnel:
1. Private security personnel are responsible purely for enforcing company policies, rules and regulations of
management and clients with the ultimate objective of providing security to the assets and persons of clients.
2. Private security personnel are authorized and empowered by law to act as such and in the manner
prescribed by the Chief, PNP on within their specifically assigned areas to be secured, as provided for in the
contract between the client and the private security agency, and, in the case of company security services, as
specifically stated in their private security firm licenses.
Section 402. Punitive Clause. Individual acts of private security personnel in violation of the provisions of
appropriate laws shall be subject to criminal prosecution, administrative penalties and such other sanctions
provided by law.
Rule 76 Penal Provisions
Section 403. Without prejudice to the imposition of criminal sanctions, any violation of Republic Act 11917 or its
rule or regulation, by license grantees likewise pursuant thereof, shall be punished by suspension, or fine, or
cancellation of his or its license to operate, conduct, direct or manage a private detective, watchman or security

A Self-Regulated Learning Module 110


guard agency and all its members, or penalized pursuant to provisions herein under, and/or with the forfeiture
of its bond filed with the Philippine National Police, at the discretion of the Chief, PNP.
Section 404. Other Violation. If the licensee committed the following acts:
a. Any person not covered by RA 11917 and its implementing rules and regulations shall, on conviction
thereof, suffer imprisonment of from ten to fifteen years, and a fine of not less than ten thousand pesos nor
more than fifteen thousand pesos as the Court may direct.
b. If the violation is committed by those persons mentioned in Section 3b, Rule IV herein under, the penalty
shall be imprisonment ranging from one to four years and a fine ranging from one to four thousand pesos at
the discretion of the Court.
Section 405. Expired License. For purposes of enforcing sanctions, any private security, watchman or
company guard force agency or private security or training personnel upon expiration of their respective
license to operate or license to exercise security profession are considered as not possessing license and shall
be held criminally and administratively liable.
Section 406. Expired License to Operate. Upon expiration of the License to Operate (LTO) it shall be
considered as not authorized to operate by law. The registered licensee shall be administratively and criminally
held liable as grave offense and a violation of law for operating, deploying and allowing the possession of
firearm (Whether or not the Juridical LTOFP is valid or expired and the license of the firearm is valid or has
already expired) to its employed Private Security Guard or any person under employment to the Private
Security Agency.
Rule 77 Deployment of Security Personnel on Properties/Establishments with Conflicting Claims, Ownership,
Management, or Administration
Section 407. Power of SOSIA to issue Status Quo Ante Order.
a. Whenever a property is declared to have existing Conflict of Claims, no deployment of SUBSEQUENT PSA
shall be conducted when Conflict of Claims exists unless there is lawful order of court, quasi-judicial,
administrative agency, or similar authority.
b. Incumbent PSA was contracted by “illegal” claimant prior to the Conflict. The following are the requirements
to be submitted:
1. Board Resolution or SPA to establish Locus Standi;
2. Land Title or other Proof of Ownership/ Claim;
3. Affidavit of No Conflict;
4. Land Use Certificate from DENR (for inalienable lands, forest lands, etc.)
c. Power of SOSIA to confiscate Firearms of PSA deployed in Property with conflicting Claims. Based on
invalid Duty Detail Order (DDO) albeit valid Juridical LTOPF and FRs. Procedures are hereby promulgated to
prescribe the specific guidelines pertaining to the Private Security Agencies in any property or establishments
of their clients under existing security service agreement (SSA) or any other kind of arrangement and is the
subject of conflicting claims, ownership, management, administration of properties or establishments in order
to ensure the preservation and maintenance of peace and order and the protection of lives thereat before,

A Self-Regulated Learning Module 111


during and after judicial, quasi-judicial or administrative action(s) or issuance of appropriate applicable legal
orders coming from a competent court that has jurisdiction over the concerned property.
Section 408. Procedures and Guidelines. The following are the procedures and guidelines to be followed:
1. Private Security Agency and its Private Security personnel shall always protect all lives and properties or
establishments they are assigned or posted, they shall preserve and maintain peace and order thereat and
assist local authorities in securing the stability of the government;
2. Private Security Agency and its Private Security personnel shall not be used, in any manner whatsoever, by
their clients as a tool for oppression, violence, and any other acts that are against public order and/or inimical
to national interest.
3. In the event of a conflicting claim, ownership, administration, or management Private Security Agency and
its Private Security personnel shall adhere to the following provision subject to the prevailing
circumstances/situations before, during and after the issuance of the legal order from court, quasi-judicia,l or
administrative bodies but not limited to the following:
a. It is the responsibility of the concerned Private Security Agency to ensure that all their security personnel
have their valid LESP, Duty Detail Order, and licensed Firearms prior to their deployment;
b. All concerned Private Security Agency should refrain from abetting or assisting any act of its currently
recognized client that is considered contrary to law, morals, good customs, public order, or public safety so as
to avoid possible confrontations between the contending parties that could lead to chaos, injuries, loss of lives,
and/or damage to properties.
c. No Private Security Agencies shall enter into a contract with any client whose property/establishment has an
existing conflict of claims, ownership, management or administration of properties/establishments with another
party, considering the dangerous tendency rule which is akin to the maintenance of public order. In any case,
security service agreement (SSA)/ security contract must contain a certain provision that in case that there is
an existing conflict of claims, the concerned PSA(s) shall terminate its services without any liability on its part
either voluntarily or upon receipt of a decision coming from a competent office (SOSIA/RCSU).
d. The incumbent PSA must inform the Chief, SOSIA, C, RCSU about the presence of a new Private Security
Agency in the same property, establishment, Office or any other place that has existing conflicting claim,
ownership, management or administration of properties/establishments which may result to a violent incident.
Any fast and available means of communication must be resorted to and the concerned office shall
immediately direct the complaining party to submit their notarized affidavit and other pertinent documents
relevant to their complaint;
(9) It acted in a manner which renders the private security agency a detriment to the maintenance of peace
and order. (From mother law)
e. The incumbent PSA shall, with due diligence required by the prevailing circumstances/situation within the
property/establishment shall maintain status quo ante and continue to carry out its duties and obligations to the
currently recognized client based on the security services agreement they entered into until the issuance of
legal orders terminating its SSA or the expiration of the same, whichever comes first.
f. Should there be any complaint filed by a security agency against another before SOSIA/RCSU as a result of
the existing conflict, the same shall be referred to PADPAO for arbitration and adjudication of the issues raised.

A Self-Regulated Learning Module 112


All settlement made between or among the parties shall be made in writing signed by the parties and attested
by the President of PADPAO. The Regional PADPAO offices shall take cognizance of cases having similar
circumstances in their respective areas of jurisdiction. Complaint shall only be referred back to SOSIA/RCSU in
case there is no conciliation or settlement reached by the parties and in such a case, PADPAO shall issue a
certification citing the result thereof.
g. The complaint filed before SOSIA/RCSU shall be accompanied by a certification issued by PADPAO before
an investigation shall be conducted.
h. SOSIA/RCSU shall conduct post to post inspection in aid of investigation with proper authorization from the
C, SOSIA/C, RCSU and proper investigation shall commence to determine if probable cause exist to elevate
the case to summary hearing proceedings. SOSIA/RCSU shall exercise utmost caution in order to level-off the
understanding of all parties involved in the conflict. They shall remain neutral throughout the implementation of
any legal action/order. SOSIA/RCSU has the right to conduct post to post inspection and pro-active inspection
anytime throughout the period of conflict.
i. Without any valid order from the court that has jurisdiction over the case or quasi-judicial or administrative
bodies the incumbent PSA shall not unilaterally exclude the complainants, its employees/residents or any
concerned individual from access to property/establishment because of conflict, but may initiate appropriate
control measures on their entry and exit without jeopardizing the SSA they entered into with the currently
recognized client.
j. The incumbent PSA shall not in any manner whatsoever bring in additional number of security personnel
contrary to the SSA provisions, especially those that are not organic to the agency. Expanding the guard force
may increase opportunities for hostile actions.
k. The incumbent PSA must fully understand the need to balance the interests and responses to the requests
of contending parties for effective security management of the property/establishment.
l. The incumbent PSA must consider the unique characteristics of the community where the
property/establishment is located such as traffic flow, specialized facilities, specific by-laws and
residents/employees’ preferences in implementing access control measures thereat.
m. All issued firearms to security guards manning the property/establishment must be recalled immediately
otherwise SOSIA/RCSU shall confiscate to prevent any untoward incident. The principle of maximum tolerance
and compassion are hereby encouraged among the parties to avoid jeopardizing the rights of any party.
n. All concerned PSA, whether incumbent or new must heed to the legal order/call from the competent
authority, requiring and directing them to vacate/change/modify its current posts for justifiable reasons or
authorized causes.
o. No security personnel shall be actively involved in the demolition, removal, destruction or recovery of the
properties/establishments/physical structures. They shall only ensure that no property shall be stolen, looted or
taken from the premises.
p. Following the final order of the court, quasi-judicial or administrative body, both the incumbent PSA and the
new PSA’s must be professional in the conduct of peaceful turnover pf the property/establishment to the party
adjudged to be the rightful owner, manager or administrator. The PSA whose client has lost the case should
relinquish peacefully and properly its authority to the PSA who was contracted by the winning party.

A Self-Regulated Learning Module 113


4. Status Quo Ante Order
1. Notice to Vacate (Constructive Notice) 24 hours to Vacate.
2. Order to Vacate
3. Due Process (Inspection, Summary Hearing, Resolution, Decision, MR, Appeal)
4. Revocation of LTO and LESP of Operator, and Tagging of Operator. And Incorporators. And Officers of the
Juridical Entity.
Section 409. Sanctions. Without prejudice to the filing of appropriate criminal actions, the following penalties
shall be imposed to any Private Security Agency found guilty of violating the above provisions:
a. For first offense - a fine of Three Hundred Thousand (300,000.00) Pesos for the Private Security Agency or
Six (6) months suspension of License to operate (LTO);
b. For second offense – a fine of Five Hundred Thousand (500,000.00) Pesos for the Private Security Agency
and a fine of Ten Thousand (10,000.00) Pesos to each posted Private Security Practitioner or One (1) Year
suspension of License to Operate of the Private Security Agency; and
c. For Third offense – a fine of one (1) million Pesos and revocation of license to operate of the Private
Security Agency and confiscation of all the Firearms under the ownership of the PSA or filing of criminal action
in relation to this provision with a corresponding Prision Correctional in its minimum period to Prision Mayor in
its maximum period.
Rule 78. Criminal Aspects of RA 11917
Section 410. With reference to the Revised Penal Code this act shall adopt the criminal offense and its penalty
of imprisonment but not limited to the following:
a. Direct Assault - Any person or persons who, without a public uprising, shall employ force or intimidation for
the attainment of any of the purpose enumerated in defining the crimes of rebellion and sedition, or shall
attack, employ force, or seriously intimidate or resist any person in authority or any of his agents, while
engaged in the performance of official duties, or on occasion of such performance, shall suffer the penalty of
prison correccional in its medium and maximum periods and a fine not exceeding P1,000 pesos, when the
assault is committed with a weapon or when the offender is a public officer or employee, or when the offender
lays hands upon a person in authority. If none of these circumstances be present, the penalty of prison
correccional in its minimum period and a fine not exceeding P500 pesos shall be imposed. (In relation with
Article 148 of Revised Penal Code) Elements of Direct Assault:
1. The victim is with authority and directly vested with jurisdiction, i.e., having the power and authority to govern
and execute the laws or who is the agent of the person in authority.
2. The victim was assaulted on occasion or because or by reason of the performance of official business.
3. The attack made on one of the persons in authority or their agents against one among them is on occasion
or by reason of official performance or decision.
4. The offender has knowledge that the victim is a person in authority or his agent.
5. Other analogous acts

A Self-Regulated Learning Module 114


b. Indirect Assault — The penalty of prisioncorreccional in its minimum and medium periods and a fine not
exceeding P500 pesos shall be imposed upon any person who shall make use of force or intimidation upon
any person coming to the aid of the authorities or their agents on occasion of the commission of any of the
crimes defined in the next preceding article. (In relation with Article 149 of Revised Penal Code). Elements of
Indirect Assault:
1. A person in authority or his agent is the victim of direct assault.
2. A person comes to the aid of such authority or his agent.
3. The offender uses force or intimidation upon such person coming to the aid of the authority of his agent.
4. Other analogous acts
c. Resistance and disobedience to a person in authority or the agents of such person. — The penalty of arresto
mayor and a fine not exceeding 500 pesos shall be imposed upon any person who not being included in the
provisions of the preceding articles shall resist or seriously disobey any person in authority, or the agents of
such person, while engaged in the performance of official duties. Elements of Resistance and Serious
Disobedience:
1. Offender seriously resists or disobeys the person in Authority or his agent.
2. The disobedience is the failure or refusal to obey a direct order from the authority or his agent.
3. The offender must have knowledge that the person arresting him is a peace officer.
4. The force employed by offender is not deliberate or the offender has no intention to ignore or defy the
authority or his agents.
5. Other analogous acts
d. Tumults and other disturbance of public orders; Tumultuous disturbance or interruption liable to cause
disturbance. - The penalty of arresto mayor in its medium period to prision correctional in its minimum period
and a fine not exceeding 1,000 pesos shall be imposed upon any person who shall cause any serious
disturbance in a public place, office, or establishment, or shall interrupt or disturb public performances,
functions or gatherings, or peaceful meetings. Elements of tumults and other public disturbance:
1. The tumultuous act is caused by more than three (3) armed persons.
2. The tumultuous act is a spontaneous or unconscious outburst.
3. The tumultuous act creates public disturbance.
4. Other analogous acts
e. Alarms and scandals. — The penalty of arresto menor or a fine not exceeding P200 pesos shall be imposed
upon:
1. Any person who within any town or public place, shall discharge any firearm, rocket, firecracker, or other
explosives calculated to cause alarm or danger;
2. Any person who shall instigate or take an active part in any charivari or other disorderly meeting offensive to
another or prejudicial to public tranquility;

A Self-Regulated Learning Module 115


3. Any person who, while wandering about at night or while engaged in any other nocturnal amusements, shall
disturb the public peace; or
4. Any person who, while intoxicated or otherwise, shall cause any disturbance or scandal in public places,
provided that the circumstances of the case shall not make the provisions of Article 153 applicable.
Acts of Alarms and Scandals:
1. Discharge of firearms and rockets calculated to cause alarm.
2. Charivari or other disorderly meetings offensive and prejudicial to public tranquility.
3. Disturbance of public places.
4. Disturbance caused by inebriated persons in a manner not tumultuous in nature.
5. Other analogous acts
f. Using fictitious name and concealing true name. - The penalty of arresto mayor and a fine not to exceed 500
pesos shall be imposed upon any person who shall publicly use a fictitious name for the purpose of concealing
a crime, evading the execution of a judgment or causing damage.
Any person who conceals his true name and other personal circumstances shall be punished by arresto menor
or a fine not to exceed 200 pesos. (In relation with Article 178 of Revised Penal Code)
g. Illegal use of uniforms or insignia. - The penalty of arresto mayor shall be imposed upon any person who
shall publicly and improperly make use of insignia, uniforms or dress pertaining to an office not held by such
person or to a class of persons of which he is not a member. (In relation with Article 179 of Revised Penal
Code)
h. False testimony in other cases and perjury in solemn affirmation. — The penalty of arresto mayor in its
maximum period to prisioncorreccional in its minimum period shall be imposed upon any person, who
knowingly makes untruthful statements and not being included in the provisions of the next preceding articles,
shall testify under oath, or make an affidavit, upon any material matter before a competent person authorized
to administer an oath in cases in which the law so requires.
Any person who, in case of a solemn affirmation made in lieu of an oath, shall commit any of the falsehoods
mentioned in this and the three preceding articles of this section, shall suffer the respective penalties provided
therein. (In relation with Article 183 of Revised Penal Code). Elements of Perjury:
1. The statement is made under oath or in an affidavit must be on a material matter.
2. The statement is made before one authorized to administer oath.
3. The Statement is a willful and deliberate falsehood.
4. The execution thereof is required by law.
5. Other analogous acts
i. Grave threats. — Any person who shall threaten another with the infliction upon the person, honor or
property of the latter or of his family of any wrong amounting to a crime, shall suffer:

A Self-Regulated Learning Module 116


1. The penalty next lower in degree than that prescribed by law for the crime be threatened to commit, if the
offender shall have made the threat demanding money or imposing any other condition, even though not
unlawful, and said offender shall have attained his purpose. If the offender shall not have attained his purpose,
the penalty lower by two degrees shall be imposed.
If the threat be made in writing or through a middleman, the penalty shall be imposed in its maximum period.
2. The penalty of arresto mayor and a fine not exceeding 500 pesos, if the threat shall not have been made
subject to a condition. (In relation with Article 282 of Revised Penal Code)
j. Light threats. — Any threat to commit a wrong not constituting a crime, made in the manner expressed in
subdivision 1 of the next preceding article, shall be punished by arresto mayor. (In relation with Article 283 of
Revised Penal Code). Other light threats. — The penalty of arrestomenor in its minimum period or a fine not
exceeding 200 pesos shall be imposed upon:
1. Any person who, without being included in the provisions of the next preceding article, shall threaten another
with a weapon or draw such weapon in a quarrel, unless it be in lawful self-defense.
2. Any person who, in the heat of anger, shall orally threaten another with some harm not constituting a crime,
and who by subsequent acts show that he did not persist in the idea involved in his threat, provided that the
circumstances of the offense shall not bring it within the provisions of Article 282 of this Code.
3. Any person who shall orally threaten to do another any harm not constituting a felony. (In relation with Article
285 of Revised Penal Code)
k. Grave coercions. — The penalty of arresto mayor and a fine not exceeding 500 pesos shall be imposed
upon any person who, without authority of law, shall, by means of violence, prevent another from doing
something not prohibited by law, or compel him to do something against his will, whether it be right or wrong.
(In relation with Article 286 of Revised Penal Code)
BOOK IX
AWARDS, RECOGNITIONS, AND DECORATIONS
Rule 82. Awards and Recognition
Section 442. Types of Awards. All PSPs are entitled to the following awards for their outstanding feat/
accomplishment /achievement during the performance of their duties and/or while serving in the exercise of
profession (see ANNEX “I” for the description of Action for Respective Awards)
a. Medalya ng Kagitingan (PSP Medal of Valor).
b. Medalya ng Katapatan sa Paglilingkod (PSP Distinguished Service Medal).
c. Medalya ng Katapangan (PSP Bravery Medal).
d. Medalya ng Pambihirang Paglilingkod (PSP Special Service Medal
e. Medalya ng Kadakilaan (PSP Heroism Medal).
f. Medalya ng Katangitanging Asal (PSP Special Action Medal).
g. Medalya ng Kasanayan (PSP Efficiency Medal).

A Self-Regulated Learning Module 117


h. Medalya ng Papuri (PSP Commendation Medal).
i. Medalya ng Sugatang Magiting (PSP Wounded Medal).
j. Medalya sa Pagtulong sa Nasalanta (PSP Disaster Relief and Rehabilitation Medal).
k. Letter of Commendation.
Section 443. Authority to Grant Award. The following are authorized to approve/issue awards:
a. Medalya ng Kagitingan - Secretary of the Interior and Local Government.
b. Medalya ng Katapatan sa Paglingkod - Chief, Philippine National Police. Chanroblespublishingcompany
c. Medalya ng Katapangan - Chief, Philippine National Police.
d. Medalya ng Pambihirang Paglilingkod - Regional Director, PNP Police Regional Office/Director, Civil
Security Force Office. Chanroblespublishingcompany
e. Medalya ng Kadakilaan - Regional Director, PNP Police Regional Office/Director, Civil Security Group.
f. Medalya ng Katangi-tanging Asal - Regional Director, PNP Police Regional Office/Director, Civil Security
Group.
g. Medalya ng Kasanayan - Regional Director, PNP Police Regional Office/Director, Civil Security Group.
Chanroblespublishingcompany
h. Medalya ng Papuri - Provincial Director, PNP Provincial Office/Chief, SOSIA/ CSG Regional Office
Directors.
i. Medalya Sa Pagtulong sa Nasalanta - Provincial Director, PNP Provincial Office/Chief, SOSIA/ CSG
Regional Office Directors.
j. Letter of Commendation - PSAs/ CGFs Operators/ Managers concerned.
Section 444. Wearing of Medals. All security guard who are recipients of awards shall wear them as part of
their uniform and miniature thereof and shall be worn of the above left pocket of the uniform.
Section 445. Special Award. A Private Security Agency/Company Security Services/Government Security Unit
selected as Outstanding Agency the SOSIA, CSG or by the NHQ, PNP shall be authorized to wear the Chief,
PNP agency citation badge. Such badge shall be worn also as part of the uniform in a miniature type of the
security personnel.
Section 446. The categories for recognition of the Most Outstanding PSP, Private Security Agency and
Company Guard Forces of the Year are the following:
a. Male PSP (Security Personnel) of the Year.
b. Male PSP (Training Personnel) of the Year.
c. Female PSP (Security Personnel) of the Year.
d. Female PSP (Training Personnel) of the Year.
e. Private Security Agency of the Year.

A Self-Regulated Learning Module 118


f. Company Guard Force of the Year.
Section 447. The categories for recognition of the Most Outstanding PSP Training School are the following;
a. Pre-Licensing Trainee Graduates
b. PSP Trainee Graduates
c. Outstanding PSP Training School.
Section 448. Determination of Awards. Awards shall be determined by a committee created for the purpose
to be designated by D, CSG in coordination with PADPAO. Prospective awardees shall be duly recommended
by the PSA/CSU/GSF concerned.
PART II
Management
Management - in all business and organizational activities is the act of getting people together to accomplish
desired goals and objectives efficiently and effectively. The skillful use of means to attain a purpose.

Concept of Management:
The process of planning, organizing, actuating and controlling an organization’s operations in order to achieve
coordination of the human and material resources essential in the effective and efficient attainment of
objectives.
Five general functions:
1. planning
2. organizing
3. staffing
4. leading
5. controlling.

The modern concept of management:


The functions and activities of managers must be directed towards the achievement of organizational goal and
this goal should be the goal of every employee and must be considered as group or common goal.

Security Management- The broad field of management related to asset management, physical security, and
human resource safety functions. It entails the identification of an organization's information assets and the
development, documentation and implementation of policies, standards, procedures, and guidelines. Security
management is the identification of an organization's assets (including people, buildings, machines, systems,
and information assets), followed by the development, documentation, and implementation of policies and
procedures for protecting assets.
Security management concepts and principles:
1. These are inherent elements in a security policy and solution deployment.
2. They define the basic parameters needed for a secure environment.
3. They also define the goals and objectives that both policy designers and system implementers must achieve
to create a secure solution.

Security's fundamental principles are:


1. confidentiality,
2. integrity, and
3. availability.

A Self-Regulated Learning Module 119


There are three primary areas or classifications of security controls.
1. management security:
1. operational security, and
2. physical security controls.

Industrial Security Management - The utilization of all available resources within a security organization in
order to function and attain its goal and objectives. It is the managing of money, men, materials, and methods
within security system.
"Industrial Security Management emphasizes the general security techniques and the ethical responsibilities of
those involved, and “the skillful handling of the security and safety measures of business enterprises and
industrial establishments.”

The work covers:


1. general security management,
2. security personnel management,
3. operational management, and
4. public relations and the perils of mismanagement.

Importance:
Corporations are always at a risk of intrusion and information leakage hence vast knowledge in security and
protection is required to execute and manage an entire security system. Security systems are a compulsory
necessity in all types of industries.

Industrial:
Relating to industry: of or relating to factories, the people who work in factories, or the things made in
factories.: having a developed industry: having factories that actively make a product. : coming from or used
in industry : made or used in factories also : stronger than most other products of its kind.

Security Planning/Security Hazard


Security planning is designing, implementing, monitoring, reviewing and continually improving practices
for security risk management. A security plan specifies the approach, responsibilities and resources applied to
managing protective security risks. The decision-making process made by executives in preparation of
accomplishing goals and objectives within an organization.
Security Planning:

The decision-making process made by executives in preparation of accomplishing goals and objectives within
an organization.

In Security Management, a security plan is composed of the following:


1. The Situation – It explains in a short paragraph the historical background of the organization and its security
force.
2. The Mission – Covers what plan is all about and what tends to do.
3. Execution – The concept of the project will be outlined and explain
4. Administration and Logistics – Involves the listing of Security equipment’s and facilities to be used.
5. Command and Signal – pertains to the channel of Communication needed when implementing the project.

BASIC PRINCIPLES OF SECURITY


1.Command Responsibility
-Cannot be delegated but the security tasks can be assigned.

A Self-Regulated Learning Module 120


2.Compartmentation
-Need to know basis
3.Balance between security and efficiency
-Security prevails over efficiency
4.General principles of security remain constant
-Specific measures to suit operations
5.Security is the concern of all personnel
-Regardless of rank, position, designation

SECURITY HAZARD
someone who could damage an organization by giving information to an enemy or competitor.

Hazard:
Is any source of potential damage, harm or adverse health effects on something or someone. Basically,
a hazard is the potential for harm or an adverse effect (for example, to people as health effects, to
organizations as property or equipment losses, or to the environment).

Definition of terms:
Risk – is the potential damage or loss of an asset. The level of risk is a combination of two factors: The value
placed on that asset by its owner and the consequence, impact adverse effect of the loss or damage to that
asset and the likelihood that a specific vulnerability will be exploited by a particular threat.

Risk Management – is a process of selecting and implementing security countermeasures to achieve an


acceptable level of risk at an acceptable cost.
Risk Analysis – the analysis of risk includes examinations of the vulnerability, probability and criticality of
potential threats and include natural and man-made risk.

Adversary – an individual, group, organization, or government that conducts activities or has the intention and
capability to conduct activities detrimental to the individual, private or government entity.

Asset – any information, facility, material, information, or activity which has a positive value to its owner
whether it is an individual, private or government entity.

Vulnerability – any weakness that can exploit by an adversary to gain access to an asset.

Countermeasures – an action taken, or a physical entity used to reduce or eliminate one or more
vulnerabilities. The cost of possible countermeasures may be monetary but may also include non-monetary
cost such as reduced operational efficiency, adverse publicity unfavorable working conditions, and political
consequences.

Probability – The chance or likelihood that a loss will take place. Indicated by a mathematical statement
concerning the possibility of an even occurring.

Criticality – the impact of a loss as measured in financial terms. How important it is in terms of the survival or
existence of the organization.

Risk Management Alternatives and Strategies

A Self-Regulated Learning Module 121


Risk Avoidance – eliminating or removing the risk totally from the business, government, or industrial
environment for which the risk manager has responsibility.

Risk Reduction – decreasing the risk by minimizing the probability of the potential loss. The reduction of
criminal opportunity is often accomplished by situational crime prevention strategies to discourage, deter, or
deny criminal incidents.

Risk Spreading – spreading the risk through compartmentation or decentralization to limit the impact (criticality)
of the potential loss.

Risk Transfer – moving the financial impact of the potential loss-over to an insurance company.

Risk-Self assumption – planned assumption and acceptance of the potential risk by making a deliberate
managerial decision of doing nothing about the threat or setting aside resources for use in case of a specific
loss incident.

SECURITY HAZARDS
Any act or condition, which may result in the compromise of information, loss of life, loss or destruction of
property or disruption of the objective of the installation.

Types of Hazards
1. Natural Hazards – these are hazards which arise from natural phenomena. The following are types of
natural hazards or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Fire (not caused by human action)
d. Storms (typhoons, cyclones, tornado and hurricane)
e. Lighting storms
f. Extreme temperature and humidity

2. Human-man made Hazards – These are hazards which are the result of a state of mind, attitude,
weaknesses, or character traits of one or more persons. They can be acts of commission or omission, both
overt and covert, which can disrupt operation of a plant or installation. The following are types of human or
man-made hazards:
a. Carelessness – accidents and dissatisfaction
b. Disloyalty –subversion and sabotage
c. Espionage, pilferage, and theft
d. Vandalism, etc.

SABOTAGE AS A SECURITY HAZARD


Description of a Saboteur
1. He is the most dangerous for whom security will have to deal with while planning and implementing security
measures and techniques.
2. He is an ordinary looking as the next guy but, in his mind, he has the training in deception, knowledgeable in
incendiaries, explosives, chemistry, bacteriology, mechanics and psychology.
3. He can work alone, in-groups, or simultaneously in several places.

Possible Targets of Saboteur


1. Armed Forces Installation

A Self-Regulated Learning Module 122


2. Natural resources – mines, forests, farms, and farm products
3. Industries – buildings, power sources, machinery, fuel, etc.
4. Warehouses depots, communications, public utilities, etc.

Countermeasures against Sabotage


1. Use of an efficient, alert, and trained guard force.
2. Use of Physical security aids like barriers, personnel and vehicular control, intrusion devices, communication
systems, and electric aids.
3. Proper screening of personnel.
4. Identification and movement control system.
5. Searches on incoming vehicles.
6. Safeguarding of classified information.
7. Designation of restricted areas.
8. Investigation of breaches of security.
9. Security education and indoctrination.
10. Good housekeeping methods.
11. Effective and compatible emergency planning.
12. Regular audit.
13. Continuing background checks.

ESPIONAGE AS A SECURITY HAZARD


Description of an Espionage Agent
1. He is very dangerous adversary and his skills in deception ad his cunning should never be underestimated.
2. He is usually a person of extensive training and will be highly effective in gaining the confidence of people
and of extracting information of value to be relayed to his employer or handler.
3. Even how well-trained an espionage agent he might be, he is human like the saboteur, and he can be
defeated in his own game if proper methods and techniques are undertaken.

Some methods Employed by Espionage Agent


1. Stealing or information from employees.
2. Stealing information from records or other sources.
3. Using various methods of reproducing documents products, equipment or working models.
4. Using “front” as commercial concerns, travel agencies, associations, business groups and other
organizations to obtain confidential information or data.
5. Using various form or threats to obtain information.
6. Using blackmail techniques by exposing intimate and personal details concerning an individual or
organization.
7. Picking or securing information in social and other gatherings.
8. and operational tactics.

Countermeasures against Industrial Espionage


1. Careful and complete pre-employment measures designed to control threats of industrial espionage.
2. Continuing personnel check on employees and particularly personnel on sensitive positions even already
employed.
3. Prevention of unauthorized entry to the plant or industrial installation.
4. Restricting of movement of personnel in the premises of the plant.
5. Controlled disposal of waste papers including carbons in classified work.
6. Only properly cleared personnel should handle classified document.

A Self-Regulated Learning Module 123


SUBVERSIVE ACTIVITY AS A SECURITY HAZARD
Threats of Subversive Activity
1. It can be local or national in nature and their mission is to undermine the authority weaken the organization,
and eventually take over. This can be in business or any activity.
2. This can be in the form of rumor mongering, propaganda, undermining morale, and injecting defeatist
attitudes, and other emotional approaches.
3. It is an activity not easy to detect.

Countermeasures to Subversive Activity


1. The spreading of rumors, written materials, slogans, or any other devices to confuse the work population
and discredit the government should be immediately reported.
2. Labor and other company unions can be infiltrated so that strikes, and “slowdowns” can be called to disrupt
the normal operation of a plant or installation.
3. Security force should be alerted for person trying to recruit others in organizing movements for peace, anti-
colonials, anti-trade, and anti-imperialism.
4. Employees or outside personnel seeking memberships in “paper organizations” should report this activity to
security.
5. Other methods of subversion like untied fronts, mob action, terrorism and sabotage will done to gain the
subversive ends.

Pilferage as a Business Hazard


1. Pilferage is one of the most annoying and common human hazards which security has to deal with.
2. Become financial drain if not a menace to smooth and orderly operation.
3. Failure to detect shortage and inaccurate inventories will cause inventory losses, which may be labeled as
pilferage.

Pilferage:
This is one of the most annoying and common human hazards which security has to deal with. This activity it
uncontrolled can become a financial drain if not a menace to smooth and orderly operation. Due to this,
security force has to concentrate large number men to check this nefarious and disconnecting activity. Petty
pilferage is frequent, hard to detect, difficult to prove and win conviction but dangerous to ignore.

Types of Pilferers
1. Casual Pilferer – one who steals due to his inability to resist the unexpected opportunity and has little fear of
detection is no plan or premeditation and he is usually a “loner” on the job. The temptation to pick up the
article is basically due to poor security measure. The implication of causal pilfering is the big cumulative cost if
it remains unchecked.
2. Systematic Pilferer – one who steals with preconceived plans and takes away any or all types of items or
supplies for economic gain. Pilferers of this kind can be employees or outsiders of the establishment.
Anatomy of Pilferage
1. Where need or desire exists and opportunity is present, theft is almost sure to result.
2. Pilferage occurs everywhere. Opportunities for pilferage increase when supplies or goods are transported
or transferred from one place to another.

Factors considered by a Pilferer to be Successful on his Act


a. Location of items to be pilfered – the systematic pilferer surveys shopping and store areas, or through
contracts from the firms.
b. Access to the items – techniques can be from fake documents, bribing of guards, outsmarting security,
creating disturbance and other methods to divert attention while pilferage goes on.

A Self-Regulated Learning Module 124


c. Removal of item – this can be done as wearing the stolen shoes or shorts, concealment in body or vehicles,
use of false documents, etc. Driver may conceal pilfered items in his vehicle.
d. Disposal of items – there is a need for “fences” “brokers” or “clearing houses” for these “hot” items.

Countermeasures for Casual Pilferage


1. “Spot” check on outgoing vehicles and persons.
2. An aggressive security education and indoctrination program with emphasis that “crime does not pay”.
3. Superiors should set example of integrity and desirable moral climate for employees in the establishment.
4. All employees must be enjoined to report or nay loss to security.
5. Inventory and control methods should be done especially to pilferable items.
6. Control of tools equipment and sets.

Countermeasures for Systematic Pilferage


1. Guards and electronic surveillance on all exits.
2. Package and material control system.
3. Parking area outside perimeter fence of establishment.
4. Careful screening and background checks on applicants to weed out potential thieves.
5. Investigation of all losses quickly and efficiently to determine “modus operandi” or obtain clues.
6. Alert all patrols to check areas and buildings for possible concealment of stolen properties.
7. Install mechanical, electrical, electronic detection and alarm devices where needed and applicable.
8. Establish an effective lock and key control system.
9. Use of appropriate perimeter fencing and lighting for parking facilities and areas for vehicles and persons.
10. Store bulk quantities of pilferable items in enclosed security areas and distribute them to using section in
limited quantities.
11. Establish accurate inventory and accounting methods for procurement, use and disposal.
12. Establish close liaison with governmental law enforcement and intelligence agencies.

PART III
Guard Force Administration

Guard and Guard System:


A. Four basic function that must be accomplished by this guard System:
1. Detect intruders.
2. Sound Alarm.
3. Apprehend unauthorized personnel; and
4. Identify authorized personnel.

B. Human Barriers:
1. Guard Procurement: Selection criteria:
a. Must be eligible for security clearance.
b. Vigorous and physically able to serve in the capacity of a guard.
c. Intelligence necessary to accomplish the guard function.
d. The ability to make rapid decisions and react in a calm way to emergencies:
e. Loyalty and discretion are required attributes; and
f. experience is highly desirable although not usually mandatory.

2. Guard training: Programs of training should include:


a. General orientation
b. Instruction in security procedures of the installation, first aid, and communication

A Self-Regulated Learning Module 125


c. Instruction in traffic control, riot control, self-defense.
d. Weapons qualifications to include maintenance and safety.
e. Refresher course and advance training in specific subjects.

3. Guard employment: Two basic techniques of guard employment:


a. Fixed post
b. Patrols

4. Guard supervision:
a. Personal supervision: Personal inspection of all guards prior to their starting tour of duty. Periodic checks of
guards during their tour by the senior member of each relief or his representative.
b. Artificial Supervision:
1. Recorded tour – guard takes with him on his tour of duty a form which must have the time punched on it at
each station.
2. Supervisory Tour – This is where the guard sends signals to guard headquarters from each station that he
checks.

5. Guard equipment’s:
a. Distinctive uniform
b. Credentials
c. Weapons – 38 revolvers, 45 pistols
d. Whistle
e. Notebook
f. Flashlights
g. Nightsticks
h. other uniform or equipment’s as may be directed by the unit SOP.

6. Guard communication:
a. Primary Communication – direct line telephone or in some instance radio.
b. Emergency Communication – ex. Messengers

A Self-Regulated Learning Module 126


CHAPTER 2
ACTIVITY 2

DISCUSSION:

1. Define and Discuss RA 11917. (10 PTS)

2. Define and Discuss Security Management (10 PTS)

3. Define and Discuss Guard Force Administration. (10 PTS)

A Self-Regulated Learning Module 127


CHAPTER 3.FINAL GRADING LESSONS

Objectives:

At the end of this module, the students should be able to:


1. Understand how to conduct Security Survey and Inspection
2. Conceptualized Security Risk analysis
3. Conduct security Investigation/Report Writing/Logbook

CHAPTER 3: INDUSTRIAL SECURITY CONCEPT OF SECURITY


SURVEY, SECURITY PLAN, SECURITY TEST AND EVALUATION,
PERSONNEL CHECK, TECHNICAL SURVEILLANCE, AND
SECURITY MANAGEMENT

Part 1
Security Survey and Inspection

SECURITY SURVEY AND INSPECTION


The basic instrument for determining security vulnerability is the security survey. Most description of security
surveys refers principally to checklists, audits, or inventories of security conditions.

Security Survey is defined as a critical on-site physical examination and analysis of an industrial plant,
business, a home or public or private institution done to ascertain the facility’s current security status, to
identify deficiencies or excess in current practices, to determine what protection is needed and to make
recommendations for improving the overall level of security at that installation. As previously noted, security
survey is a general term that often encompasses other related procedures.

Objectives of Security Survey


1. To determine existing vulnerabilities to injury, death, damage, or destruction by natural causes.
2. To determine existing vulnerabilities of corporate assets due to outside criminal activity.
3. To determine existing vulnerabilities of corporate assets due to criminal activity within the organization.
4. To determine existing conditions of physical security of corporate property.
5. To measure compliance of employees to security.

Planning a Security Survey


1. Verify the need
2. Obtain organization support
3. State the survey’s executives
4. Determine how data will be gathered
5. Develop alternatives

A Self-Regulated Learning Module 128


6. Prepare a schedule of activities.

SECURITY INSPECTION
Another important activity, which is necessary to ensure the integrity of the overall security programs, is
security inspection. This complements security survey in its attempt to prevent losses of company properties.

Security inspection is the process of conducting physical examination to determine compliance with
established security policies and procedures as a result of security survey.

Security inspection is conducted for two reasons: to check on the degree of compliance with the recommended
countermeasures and to determine the effectiveness and adequacy of the countermeasures which are in
effect.

Types of Security Inspection


1. Continuous Inspection
To keep pace with the constant changes in the organization, changes in our security terms of attitudes, lifestyle
and moral values, and the rapid advancement of technological modifications are all around us, the inspection
must be an on-going and never-ending activity.

2 Formal or Informal
For the company which has just upgraded the security function, hired a new security administrator, or initiated
a security department and program. The formal approach to inspection is most desirable, primary because it
tells the company how senior management feels about protection, and thus establishes the desirable climate.
a. Formal Inspection is one which some fanfare is attached. It is usually preceded by an announcement, and
the unit under inspection “prepares” for events, including some extra housekeeping activities that would not
otherwise happen at that point in time.
b. Informal Inspection is usually the result of a long and firmly entrenched inspection program, understood by
all and accepted as part of the organizational life. The inspection has been stripped of all external trappings of
importance, but their functional importance has not been lessened in any manner. They are seriously and
quietly executed in a spirit of understanding and cooperation.

3. Structured or Unstructured Inspection


a. Structured Inspection is one that moves systematically from one area to the next and so on. There is a
format or logical sequence to the process. For instance, the audit may start with the first line of defense, then
the second line, then the third line, etc.
b. Unstructured Inspection is conducted in a random manner. There is no format or logical sequencing. For
example, the inspection may start with countermeasures for proprietary information, then emergency plan,
followed by investigation and so forth.

Part 2
EMERGENCY and DISASTER MANAGEMENT
Emergency planning is one of the harsh realities that an installation will encounter is the occurrence of a
disaster or emergency. Any of these can be regarded as a potential event, occurrence or condition outside the
scope of normal business activities with significant potential for death, injury, property damage, assets
diversions or other favorable impact upon the installation. It is for this reason that the owner of the installation
or its executives will decide in advance what to do and how to counter the effects of any emergency in order to
assure continuity of operations.

Emergency Defined

A Self-Regulated Learning Module 129


Emergency is a sudden, generally unexpected occurrence or set of circumstances demanding immediate
action.

Disaster Management Defined


Is the systematic management of disaster from the initial stage to its termination using various tools to
minimizes loss of lives, damage to property and enhance rehabilitation?

Disaster Defined
Disaster is the unscheduled event that causes by emergency. It upsets the performance of valued activities of
the community in two ways: there is a drastic increase in demand for certain services and there is reduction in
the capability to perform services.

Crisis Defined
Crisis is the turning point of a disaster or emergency, if not contained or controlled.

Types of Emergencies
1. Earthquake
2. Typhoon
3. Tsunamis
4. Volcanic eruption Fire
5. Fire
6. Explosion (Bomb, flammable liquids, gases, etc.)
7. Building collapse
8. Leakage of gas or toxic fumes
9. Bomb threat
10. Strikes
11. Work accidents
12. Enemy attack/action

Key Steps in Emergency Planning


1. Get in touch with local civil authorities.
2. Visit neighboring plant/installation.
3. Survey the installation for possible hazard and take immediate action to lessen or eliminate them.
4. Call an organization meeting of heads of services, employee representatives and key personnel.
5. Establish an organization with specific task to function immediately before, during and following a disaster.

Define the disaster programs.


1. Establish a method for utilizing resources on hand and for obtaining additional resources at the time of
disaster or emergency.
2. Provide a recognizable means for moving from normal operation to the emergency mode of operation.

Basic Considerations in Emergency Planning


1. Goals of the emergency plan.
2. Emergency plan should be in writing.
3. The plan should be precise and specific.
4. A separate plant should be prepared for each type of disaster, which has a probability of occurring.
5. Key elements of plan: what to do who will do it.
6. General and individual awareness.
7. Checklist before formulating a detailed emergency plan.

A Self-Regulated Learning Module 130


Emergency Response Team
An Emergency Response Team must be established to become active during increased threat levels or when
an emergency occurs. Your special threat plant must describe the organization, training and function of the
team. The ERT must consider the following:
1. Who will make decisions and have final authority for the team as a whole.
2. Who will be members of the team and what are their responsibilities?
3. What will be the missions of the team?
4. The tasks of the other agencies or individuals.
5. The training needed to prepare team members to operate in stressful situations.
6. Contingency planning beyond that involved in normal day-to-day operations against threats.
7. The unexpected – the incident will not take place as planned.

Responding to an emergency situation requires special capabilities and considerations. First, the ERT must
identify the kind of emergency. Then, the operation plan (OPLAN) formulated for the said emergency must be
put into effect as quickly as possible.

Don’ts in Handling Suspected Bomb Packages


1. Don’t attempt to open package.
2. Do not submerge in water due to conductivity of electrical circuit and /or possible violent reaction of chemical
agent.
3. Do not indiscriminately shake or jar suspected package due to the possibility of disturbing the trigger
mechanism.
4. Do not cut the string or unwrapped package due to the possibility of pressure release type device.
5. Do not puncture or cut the box with metallic object as the possibility of electric power maybe employed.
6. Do not accept identifications markings on any suspected package as legitimate.
7. Do not allow radio transmission within the vicinity.
8. Do not switch on the lights or any electrical switches just to light up dark room/areas.
9. Do not use sirens, megaphone, or any loud noise-emitting device.

Responding to Bomb Threats


Each threat received through any means of communications should be treated as real and must be forwarded
immediately to the proper authorities. Training is essential to deal properly with a bomb threat incident.
Instruct all personnel, especially those at the telephone switch board on what to do if a bomb threat is received.
The receiving party must remain calm and courteous. Try to obtain as much information as possible from the
caller. Take not of the following procedures:
1. Get the identity of the caller.
2. Take note of the following characteristics: male or female voice; young middle age, or old sounding voice;
accent of voice; speech impediments or peculiar voice characteristics; any background noise; does the voice
sound familiar.
3. The exact words of the person placing the call.
4. Show no emotion on the phone.
5. Know the exact location of the bomb.
6. Ask for the description of the bomb/composition of the explosive.
7. Repeat the message to the caller whenever possible and ask for confirmation.
8. The receiving party should remain calm and courteous. He should listen carefully and write down accurately
the information the caller provides.
9. If possible, refer the caller to a supervisor in authority to extract more information.
10. Apply delaying tactics and engage the caller in prolonged conversation.

A Self-Regulated Learning Module 131


11. Take note of the exact time the caller hung up.

The person receiving the bomb threat should attempt to ask the caller certain questions: when is the bomb
going to explode? Where is the bomb right now? What type of bombs it is? What does the bomb look like?
What will cause the bomb to explode? Why did you place the bomb?
Remember that the caller may not answer your question, but any additional information that he may relate will
be helpful. It may be advisable to inform the caller that the building is occupied and the detonation of a bomb
could result in death or serious injury to many innocent people.
Once the telephone threat is received, notify your local police at once.

Handwritten or Typed Notes


Documents and other materials received should be carefully handled to preserve marks, fingerprints, etc., for
examination by competence authorities. These should be forwarded immediately to proper authorities for
analysis and evaluation. Written messages should never be ignored.

Person to Person or Direct Threat


1. Notify security supervisor immediately.
2. Keep the person making the threat or indicating knowledge of a threat under surveillance until relieved by
the superior.
3. Take note of the age, height, weight, sex, color of eyes/hair/skin, clothing, unusual characteristics such as
lameness or any peculiarities of the person under surveillance.
4. Observe other personal behavior, if any.
5. If the person leaves the scene; take note of the make, model, color, plate number and marking of the vehicle
used.
6. Do not underestimate the size of the package like just a pack of cigarette or lighter, it could be a powerful
explosive.
7. Above all, DON’T PANIC.

What to do if a suspected bomb is located


1. Evacuate personnel at least 300 feet away from the bomb.
2. Turn off the electrical and gas units.
3. Do not touch or move unknown objects.
4. Secure the area.

Part 3
Report Writing /Security Investigation/Logbook

Report:
It is a story of actions performed by men.
- A chronological, step by step, account entirely or almost entirely a factual account of the incidents that took
place in a given event. Or it is the story of actions that were actually performed by flesh and blood human
beings.

Note Taking:
The process of jotting down important matters and events of a certain incident or activities.

Report Writing:
The processes of finalizing note taking where in the six important elements of reports writing are present.

A Self-Regulated Learning Module 132


Elements of Good report writing:
5W’s and 1H

WHO - This pertains to some information regarding the victim, suspect, witness, owner, and property?
Complete and correct name. Wrong names result in failure to locate a witness or apprehend a suspect. The
spelling should be correct; name, including the middle initial or name should be exact.
Exact home address (be it a residence or a hotel) and telephone numbers.
Relative questions under WHO may include the following:
a. Who was present at the crime scene: witness, suspects, victims, etc?
b. Who was apprehended?
c. Who discovered the evidence?

WHAT - This question considers the following factors:


1. Type of property attacked, e.g., building, residence, alley, vacant lot, etc.
2. Type of property stolen, lost or found. What items related to the crime were found at the scene? There
should be an accurate description of all such property stolen, lost or found. An accurate description of all such
property should be entered in the notes.
3. Offense committed, e.g., robbery, theft, etc.
4. What type of evidence was found?

WHERE - This question is concerned with the geographical location of the crime scene, property or evidence.
1. Where was the offense committed?
2. Where was the property found?
3. Where was the evidence found?

WHEN - This question includes the date and time when the offense was committed; property found; suspect
apprehended.
1. When did the police officer arrive?
2. When was the crime discovered?
3. When was the suspect apprehended?

HOW - This question refers to the general manner in which the crime was committed.
1. How was the crime reported?
2. How were certain tools used?
3. How was the crime committed and discovered?

WHY - Under this heading is listed the object or desire which was motivated the offense. For example:
1. In the crime against persons, the object of the attack might be revenge, ransom or rape.
2. In crimes for gain, the reason may be to acquire money or property.

Generally, the WHO, WHEN, and WHERE will appear at the beginning of the report. The reader needs to
know the persons involved, the time the incident happened and the location at which it took place.

WHAT HAPPENED is usually unfolded throughout the report. The HOW is closely related to WHAT. The
WHY may belong before or after the WHAT, depending on the situation.

Cardinal Principles of good Report writing:


1. Accuracy- Investigator must conform to the truth.
2. Completeness – requires the inclusions of all relevant, pertinent and material information.

A Self-Regulated Learning Module 133


3. Brevity- eliminates all irrelevant, unessential, and unnecessary materials. It includes ability to make report
unified, coherent, and emphatic.
4. Fairness- the investigator should take the facts as he finds them and if these are his theories, it must be
consistent with the facts.
5. Forms and style- the arrangement of materials presented should make the report easy to read and
comprehend.

Sample Report:
BENJAMIN SECURITY AGENCY CORPORATION (Company Name)
Gen Luna Rd. Baguio City (Address)
Tel.444-1234(Tel/Cel.Number)

FOR : Mr. Benjamin Dulipas (name of recipient)


General Manager, BSAC (designation/company recipient)

THRU : Col. University of Baguio


Operation Manager, BSAC

SUBJECT : SPOT REPORT RE: FIRE INCIDENT BESIDE CENTENNIAL BLDG. (type of report)

DATE : 28 November 2015 (day month, year)

On or about 1745H, 28 November 2015, there was a fire incident occurs beside University of Baguio
Centennial Building. Located at Assumption Road Baguio City.

Prior to the incident, I observed a big smoke and flame to a private property besides Centennial building. This
prompted the undersigned to proceed and check /inspect the area that turned out to be a fire from the
mentioned area. Upon assessment, it was learned that the fire originated from a grass fire burned by the
caretaker of the said private property beside Centennial building, So I, with the Security Marshall, and student
from the Graduate School who are police officers who aid us to put out the fire. After the fire was eliminated,
the undersigned immediately call the superior officer to report the incident.

For your information.

Respectfully yours;

SG. Diak Ammo (name of sender)


Head Guard, BSAC (Designation of the sender)

Cc: Col. University of Baguio


Chief Security, University of Baguio
File

A Self-Regulated Learning Module 134


Security Investigation - is a planned and organized determination of facts concerning specific loss or damage
of assets due to threats, hazards, or unsecured conditions.

Elements of Investigation
Investigator
Purpose
Subject of Investigator

Tools of Investigation
1. Information – knowledge which the investigator gathers from other persons.
-Acquired from regular sources – conscientious and public-spirited citizens, company files, school files
or records file of other agencies.
-Acquired from cultivated sources – paid informants, bartenders, cab drivers, acquaintances, etc.
2. Interrogation – the skillful questioning of a person who is reluctant to divulge information concerning the
offense under investigation.
3. Interview – the simple questioning of a witness who has no personal reason to withhold information.
4. Instrumentation – the application of instruments and methods of physical sciences to the detection of
crimes. In other words, the sum total of the application of all sciences in crime detection otherwise
known as criminalistics.

Three-Fold aims of Investigation


1. To identify the offender
2. To locate the offender
3. To provide evidence for his guilt

Methods Identifying the Offended


1. Confession – acknowledged, disclosed or admitted.
2. Eyewitness/testimony – solemn declaration.
3. Circumstantial evidence – evidence which gives ground for belief as to fact or guilt.
4. Associative evidence

Standard Methods of Recording Investigative Data


1. Photography
2. Sketching the crime scene
3. Written notes
4. Developing and lifting fingerprints
5. Gathering physical evidence
6. Plaster cast
7. Tape recording of sound
8. Video tape recording of objects and sound
9. Written statement of subjects and witnesses

Difficulties in the Investigation


1. Absence of eyewitness/witnesses
2. Motives Unknown
3. Lack of physical clues (evidence)

A Self-Regulated Learning Module 135


Qualities of an Effective Investigation
1. Objective – all facts are discussed as perceived without any distortion and the manner of presentation
is free from unwarranted opinion.
2. Thorough – full detail, exhaust all available means, factual to arrive in a sound and convincing
conclusion.
3. Relevant – significant and demonstrated its relation to one another.
4. Accurate – free from error.
5. Current – terminology is generally accepted.
Investigation Report
Purpose
1. Record – the report provides a permanent official record of the investigation.
2. Leads – the report provides other investigators with information necessary to further advance the
investigation.
3. Prosecutive action – the report is a statement of facts on which designated authorities may base a
criminal, corrective or disciplinary action.

Nature and Qualities


1. The report must be objective statement of the investigation findings.
2. The report must be an official record of the information relevant to the investigation that the investigator
submits to his superior.
3. The report must be clear, brief accurate, Impartial but complete.
4. The report must not be a place of the investigator’s opinion or other irrelevant facts foreign to the case.
5. The report is complete when it answers the questions of when, where, who, what, why and how.
6. The report is accurate when it is a true representation of facts of the case.
7. The report is clear when it is developed logically and chronologically.

Parts of the Report


1. Administrative Data
-Date
-File Number
-Complaint
-Reporting Investigator
-Office of Origin
-Status
-Distribution
2. Synopsis – brief in description of the actions of the perpetrator as established in the body of the report.
3. Details of the report – Objective of the investigation.
4. Conclusion and Recommendation – Includes the investigator opinion, conclusions and recommendations.
5. Enclosures – Photographs, sketches, sworn statement, etc.

A Self-Regulated Learning Module 136


Format of Report
INVESTIGATION REPORT FORMAT
CONFIDENTIAL
(Letterhead)
_____________________
Date
FOR: (The Chief or Commander who assigned the case)

SUBJECT:

AUTHORITY
This section should contain a brief statement of when, where and by whom the investigation was made and
should cite the authority for making it.

MATTERS INVESTIGATED
This section of the report represents the mission of the investigator. In essence, it answers the question: what
is the investigation all about?

FACTS OF THE CASE


This presents the real truth respecting the matters investigated. The description “completeness”, clarity are
particular applicable to this section. It should be coherent presentation of all pertinent facts that shall be free
form argument or bias and fully supported by evidence.

DISCUSSION
This section set forth when appropriate, the presumption and inferences from all the circumstances in the case
to give the directing authority the clearest possible picture. It should contain such related factual matter of
argument as may be necessary in addition to the facts presented, to establish the conclusions and
recommendation based thereon.

CONCLUSION
This represents concise summary of the results of the investigation directly consequent from and supported by
facts. These logically follow from the facts of case of found and set forth in the report. They are usually stated
in the order naturally suggested by the statement of the allegations or facts.

RECOMMENDATIONS
This should contain the practical suggestions as to appropriate action to be taken to make suitable position of
all phases of the case. They should follow, as far as practicable, the same sequence as was used in the
presentation of conclusion.

______________________
Investigator

Logbook:
A record book used by security personnel while in the actual service of duty.
1. Events to be recorded:
1. Movements of people.
2. Transfer of properties both internal and external.
3. Accidents.

A Self-Regulated Learning Module 137


4. Incidents like theft, shooting, robbery and others.
5. Personal tour of duty.
2. Proper procedure in logbook entry:
1. Penmanship must eligible.
2. Hours must be chronological arranged.
3. Facts must be entered accurately.
4. It must be concise.

3. The importance of logbook:


1. It serves as evidence.
2. It serves as a guide.
3. It serves as a reminder.
4. It serves as a daily journal.

4. Proper Method of handling the logbook:


1. It must be kept clean and covered
2. No unnecessary entry must be made.
3. No page must be removed or detached.
4. No person must be allowed to read the contents of for the purpose of preserving the confidentiality of the
information except those authorized one.
5. It must be kept in a safe place once consumed.

Note: All logbooks property of “security agency name” (in front cover) should have label tags, duties and
responsibilities (Inside front cover), and emergency numbers (inside back cover).

A Self-Regulated Learning Module 138


CHAPTER 3
ACTIVITY 3

INSTRUCTIONS:
Multiple Choices: Read each statement in every number and identify what is being described, defined or asked
and select the letter which corresponds to your answer, then write your answer before the number. NO
ERASURES ALLOWED:

1. The value placed on that asset by its owner and the consequence, impact adverse effect of the loss or
damage to that asset and the likelihood that a specific vulnerability will be exploited by a particular threat.
A. Security hazard C. Risk Management
B. Risk D. Risk Analysis

2. Who has the primary responsibility of determining the classification level for information?
A. The functional manager C. The owner
B. Senior Management D. The user

3. A conference or dialogue between the survey team and management officials of a plant before security
survey is conducted.
A. Fail Safe C. Exclusion area
B. Exit Conference D. Entrance Conference

4. Any sudden, extraordinary misfortune in nature that can result to injuries death, and property loss.
A. natural disaster C. natural occurrence
B. natural calamity D. natural damage
5. This occurs when an individual or group disrupts the normal place and tranquility of a community or the
operations of a business or organization.
A. civil disturbance C. civil disorder
B. human disturbance D. rallies and demonstrations

6. The simple questioning of a witness who has no personal reason to withhold information.
A. Information C. Interrogation
B. Instrumentation D. Interview

7. The report is a statement of facts on which designated authorities may base a criminal, corrective or
disciplinary action.
A. Record C. Leads
B. Information D. Prosecutive action

8. The following are the difficulties in the Investigation: except:


A. Body of the Crime
B. Absence of eyewitness/witnesses
C. Motives Unknown
D. Lack of physical clues (evidence)

A Self-Regulated Learning Module 139


5. All facts are discussed as perceived without any distortion and the manner of presentation is free from
unwarranted opinion.
A. Objective C. Thorough
B. Relevant D. Accurate

9. The Elements of Good report writing is:


A. 2W’s and 1H C. 4W’s and 1H
B. 3W’s and 1H D. 5W’s and 1H

10. Evidence which gives ground for belief as to fact or guilt.


A. Associative evidence C. Confession
B. Eyewitness/testimony D. Circumstantial evidence

11. The Cardinal Principles of good Report writing which eliminates all irrelevant, unessential, and
unnecessary materials. It includes ability to make report unified, coherent, and emphatic.
A. Accuracy C. Completeness
B. Brevity D. Fairness

12. The processes of finalizing note taking where in the six important elements of reports writing are present.
A. Report Writing C. Note Taking
B. Report D. Logbook

13. A record book used by security personnel while in the actual service of duty.
A. Report Writing C. Note Taking
B. Report D. Logbook

14. Any act or condition, which may result in the compromise of information, loss of life, loss or destruction of
property or disruption of the objective of the installation.
A. Security hazard C. Risk Management
B. Risk D. Risk Analysis

15. It upsets the performance of valued activities of the community in two ways: there is a drastic increase in
demand for certain services and there is reduction in the capability to perform services.
A. Disaster C. Emergency
B. Crisis D. Typhoon

A Self-Regulated Learning Module 140


REFERENCES
a. Books

• Ajero, J M. Bank Security Management. Quezon City; Wiseman’s Book Trading Inc, c2011
• Banlaoi ,R C. Philippine Security in the Age of Terror; National, Regional, and Global in the post.9/11
World.Boca Raton CRC press,c2010
• Bermas, D S. Criminology Licensure Examination Review. Quezon City Central Professional
Book.c2003
• Bosworth, S.Computer Security Handbook. Canada.c2002
• Cordova, R V. Police intelligence. Manila: Mindshapers, c2010.
• Corpuz,W.M., and D.B.S. Delizo. Industrial Security Management Manual. Quezon City; Wiseman’s
c2011
• Delizo ,Bernard and Manwong,Rommel K. The Law Enforcement Administration Text Book in
Criminology.RK Manwong Publication 2006.
• Domingo, WC. Module in Industrial Security Management, Manila Mindshipers, c2010
• Dulipas, Benjamin O. and Peckley Miller F. Industrial Security Management Review Hand
book.Wiseman’s Books Trading.c2008
• Dulipas, Benjamin O. and Peckley Miller F . Industrial Security Management, Review Handbook for
Criminologist licensure examination. Baguio City Phil.,2007
• Guevara, Dean Ricardo M. Police intelligence and secret service Quezon City: Wiseman's Books
Trading. C2010
• Hill, Bryan, Rebecca Paynich. Fundamentals of crime mapping, 2nd ed. Burlington, Mass.: Jones &
Bartlett Learning, c2014.
• Manlusoc, A C. Police intelligence. Muntinlupa City: Stronghold Enhancement Center, c2013.
• Supan JJ (2012) The Art and Science of Security. Stone Wall Security Concepts, 63 Magnolia St.
Roxas District Quezon City 1103 Philippines.
• The Revised rules and regulation Governing the organization the Organization and Operation P.D.
Watchman, and PSA throughout the Philippines. 2003
• Compilation: Reviewer on Industrial Security Management and disaster Control. Law Enforcement
Academy 2022
b. Journals / Magazines

• RA 11131
• RA11917

• 2012-01-18/NPM 013-2012:f Philippine Association of Detective and Protective Agency Operators


(PADPAO) Rate
• Executive Order No. 21 Series of 2020 adopting the Omnibus Guidelines on the Implementation of
Community Quarantine, the
• DTI issued Memo Circular No. 20-21 providing for guidelines in the operation of malls, shopping centers
and establishments that are allowed to operate under GCQ.
c. Electronic Sources

A Self-Regulated Learning Module 141


• https://sosia.com.ph/index.php/downloads/security-training-forms/2-uncategorised/42-chief-pnp-s-
additional-guidelines-on-the-operations-of-malls-

• https://www.tpb.gov.ph/alpha_listing/philippine-association-of-detective-protective-agency-operators-
padpao/
• https://lawphil.net/statutes/repacts/ra1969/ra_5487_1969.html
• https://lawphil.net/statutes/repacts/ra2013/ra_10591_2013.html
• https://www.officialgazette.gov.ph/2013/12/07/implementing-rules-and-regulations-of-republic-act-no-
10591/

A Self-Regulated Learning Module 142


EVALUATION OF THE COURSE
After finishing the modules, please answer the following questions:

1. What lesson or activity did I enjoy most? Why?

2. What is the most important lesson which I can apply in my daily life?

3. What are the new insights/discoveries that I learned?

4. What topic/s do I find least important?

5. What possible topics should have been included?

A Self-Regulated Learning Module 143

You might also like