Intro Industrial Security Concept

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 28

INDUSTRIAL SECURITY

It is a concept that refers to a series of security activities that protect resources


and minimize risk and loss to prevent leakage of key technologies and confidential
information at the enterprise level, and affect national problems as well.
It is the status reached when the appropriate measures and procedures are
implemented to gain access to, handle or generate Classified Information during the
performance of a classified contract or program.
A comprehensive workplace security is very important because it will reduce
liabilities, insurance, compensation and other social security expenses to be paid by
the company to the stakeholders. Thus, you increase your business revenue and
reduce the operational charges that incur on your business budgets.
non-stock private organization, and it was formed in May 1958.
R.A. 5487 – It is an act that regulates the organization and operation of the private
detective, watchmen or security guard agencies. it is known as Private Security
Agency Law.
- Before R.A. 5487 there is no law, what they need is only a permit from the city or
municipal mayor to hire a security guard.

PCSUSIA – Philippine Constabulary Supervisory Unit for Security and Investigation


Agencies
- was formed as a result of the approval of R.A. 5487, which directs the Chief PC
to issue rules and regulations concerning the implementation of R.A. 5487.
- later was change to PNPSOSIA- when the Philippine Constabulary was
dissolved and the personnel was merged to the PNP.
PNPSOSIA – PNP Supervisory Office for Security and Investigation Agencies
- Before it is responsible for the issuance of implementing orders regarding the
rules and regulations affecting security agencies operation.
Private Detective Agency - is any person who for hire or reward or on commission
conducts or carries on or holds himself out as conducting or carrying on a detective
agency or detective service.

PNSAG/SD- PNP Security Agency Guards/Supervision Division- For National


PNP FE/SAGS- PNP Firearms and Explosives/ Security Agency Guard Services -for
Local
- It directs the Chief of PNP to issue rules and regulations concerning the
implementation rules of R.A 5487
- Effectivity date – Oct 3, 1972 and Jan 17, 1975 and amended by P.D # 11
and 11A
- And again amended in 2003 with title 2003 Revised Rules and Regulation
Implementing R.A 5487 as amended.

Private Detective - any person who is not a member of a regular police agency or
armed forces who does detective work for hire, reward or commission.

PADPAO - Philippine Association of Detective and Protective Agency Operators.

Watchmen/Security Guard - person who offers or renders personal service to watch


or secure either residential or business establishment or both or any building,
compound or area for hire or compensation or as an employee thereof.

Security Agency - any person, association, partnership or corporation who recruits,


trains, muster ,furnishes, solicit individuals or business firms, private or government
owned or controlled corporation to engage his services or those of its watchmen.

Who May Organize Security Agency

1. Any Filipino Citizen or a corporation, partnership or association.


2. With a minimum capital required by law.
 In case of corporation, association, or partnership - must be 100 % owned and
controlled by Filipino citizen.
 No person shall organize or have interest in more than one agency.
Qualification of an Operator or Manager of a Security Agency:
1. At least 25 years of age
2. College graduate and/or commissioned officer in the inactive service of the AFP
3. Good moral character
4. No previous record of any conviction of any crime/offense involving moral turpitude
5. Not suffering from any of the following disqualifications;
5. Not suffering from any of the following disqualifications:
1. dishonorably discharged or separate from the AFP
2. mentally incompetent
3. addicted to the use of narcotic drugs
4. habitual drunkard
An elective or appointed government employees who may called upon on account of
the function of their respective offices in the implementation and
enforcement of the provision of RA 5487 and person related to such government
employees by affinity or consanguinity in the third civil degree shall not hold
any interest, directly or indirectly in any security guard agency.

Basic Qualification of a security Guard


1. Filipino citizen
2. High school graduate
3. Physically and mentally fit
4. Not less than 21 nor more than 50 years old
5. At least 5'4" in height
6. Not suffering from any disqualification under RA 5487
 Veterans shall be given priority in employment as security guard or private
1. Veterans shall be given priority in employment as security guard or private
detective
2. Person convicted of any crime involving moral turpitude shall be employed as
security guards or private detective
3. Private detective, detective agency, security guard, security agency must first
obtain license from the PNP.
4. Employees employed solely for clerical or manual work need not be licensed.
5. The license shall be displayed at all times in a conspicuous an suitable place
in the agency office.
6. The PNP shall exercise general supervision over the operation of all private
detective and security guard agencies.
7. The City/Municipal Mayors has the power as Director of the City/Municipal
civil defense to deputized private detective and security guards to help
maintain peace and order or prevent pr arrest law violators in case of
emergency or in times of disaster or calamity. They shall take orders from the
chief of Police for the duration of the fire, inundation, earthquakes, riots or
other emergency.
8. A security guard or security agency is entitled to possess firearms.
9. Firearms must not be higher than .45 caliber.
10. Agency is entitled to possess firearms not exceeding one firearm for every
security guard in its employ.
11. Security guard is entitled to possess not more than riot gun or shotgun.
12. Firearms shall be carried by the security guard only during his tour of duty in
proper uniform within the compound of the establishment except when he
escorts big amount of cash or valuable in or out of said compound.
13. The Chief PNP shall prescribe the uniform, ornaments, equipment and
paraphernalia to be worn by the security guards.
14. Uniforms must be different from the PNP/AFP.
15. Salary of security guard-not lower than the minimum wage prescribe by law.

Limitations and Prohibitions on a Security Agency

1. No agency operating in the City of manila and suburbs may employ more than 1000
watchmen or security guards.

2. No agency operating in other cities and first class municipalities may employ more
than 500 watchmen or security guards.

3. No agency operating in municipalities other than first class may employ more than
200 watchmen or security guards.

4. No person, corporation, partnership or association may organize more than one


agency in any one city or municipality.

5. No agency shall offer, render or accept services to gambling dens or other illegal
enterprises.

6. The extent of the security service being provided by any security agency shall not
go beyond the whole compound or property of the person or establishment
requesting the security service except when they escort big amount of cash.

Who can Issue rules and regulations to carry out the purpose of RA 5487?

The chief PNP, in consultation with the Philippines Association of Detective and
Protective Agency Operators.

What are the penal provisions for violation of RA5487 or its implementing rules?

Answer:
1. Suspension, fine or cancellation of license to operate with the forfeiture of bond
filed with the Chief PNP.

2. Imprisonment ranging from 1 to 4 years and fine, in the discretion of the courts.

THE CONCEPT OF SECURITY


Historically, criminology has explored security by focusing its attention on what one
might think of as “hitting and taking” harms, typically thought of as “Crimes”, that
threaten peaceful coexistence along with the governance processes,
particularly criminal justice, that have been developed to respond to them.

SECURITY – It is freedom from, or resilience against, potential harm caused by


others. Beneficiaries of security may be of persons and social groups, objects
and
institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted
change. (Wikipedia)
Security - the predictable state or condition which is free from harm, injury,
destruction, intimidation or fear. Freedom from fear or danger or defense against
crime.
Purpose of Security – is to protect the establishment from any form of losses as a
result of theft, robbery, pilferage, sabotage, espionage, accident, fire and subversive
activities.
Purpose/Goals of Physical security
1. deter potential intruders - ex. warning signs, perimeter markings
2. distinguish authorized from unauthorized people - ex. using pass card
3. delay or prevent intrusion attempt - ex. wall, door lock, safe
4. detect intrusion and monitor/record intruders - e. CCTV, intrusion alarm
5. trigger appropriate incident responses - ex. security guards
Physical Security System - a barrier or system of barriers placed between the
potential intruder and the matter to be protected. Protective device against hazards,
threats, vulnerability and risks.

DIFFERENT TYPES OF PHYSICAL SECURITY


1. Active- by using different types of barriers.
2. Passive- by using psychological approach
3. Communication Security – is the protection resulting from the application of
various measures which prevents or delay the enemy or unauthorized person in
giving information through the communication system.
4. Hotel Security – is the protection resulting from the application of various
measures which safeguards hotel guests and personnel, hotel property, and functions
in hotel restaurants, bars and clubs.
5. Bank Security – is the protection resulting from the application of various
measures which safeguards cash and assets which are in storage in transit and
during transactions.
6. Document Security – is physical security that involves the protection of documents
and classified papers from loss, access to unauthorized person, damage, theft and
compromised through disclosure.
7. Personal and VIP Security – involve in the protection of top ranking official the
government, visiting persons of illustrious standing and foreign dignitaries.
8. Crisis Security - is the protection of the rich person, industrial magnates, political
leaders against kidnapping for economic, political, emotional or nationalistic
purposes.
9. Industrial Security - various measures to safeguard factories, manufacturing
establishment, etc.
10. Operational Security - is physical which deals with the protection of processes,
formulas, patents and other activities.
11. Other special type of security - these type of security are adaptations, variations,
innovations and modifications of physical security which are follows;
* Air cargo security - Under the Aviation Transport Security Act of 2004, air cargo is
defined as goods, other than baggage or stores, that are transported by aircraft. ... Air
cargo security measures aim to protect cargo from theft, but they also secure
cargo against incoming materials such as bombs or drugs.
* Supermarket - service, which is used by grocery stores for various safety purposes.
Our supermarket security services prevent shoplifting and internal theft, help secure
deliveries, and watch for suspicious activity during non-business hours.
* School Security - encompasses all measures taken to combat threats to people and
property in education environments. One term connected to school security is school
safety, which is defined as the sheltering of students from violence and bullying, as
well as exposure to harmful elements such as drugs and gang activity.
* Personnel security - Personnel Security Program is to make a reasonable
determination that individuals granted access to classified information or assigned
to sensitive positions are and will remain loyal, trustworthy, and reliable.
Protective Security - measures taken by an installation or unit to protect against
sabotage,
espionage or subversion and at the same time provide freedom of action in order to
provide
the installation or unit with the necessary flexibility to accomplish its mission.

Three (3) Aspects of Security


1. Physical Security - measures taken to prevent physical access or entry to an
installation.
2. Personnel Security - measures taken to insure that only authorized personnel
have access to classified documents or information.
3. Document and Information Security - Information security is a set of
practices intended to keep data secure from unauthorized access or
alterations.
(https://www.csoonline.com/article/3513899/what-is-information-security-
definition-principles-and-jobs.html)

Method used in Physical Security

1. Overt – surveillance is performed using devices that are visible and


obvious. It means visible or apparent. It can be observed.

2. Covert - also known as undercover or plain-clothes security, is a specialized


service that provides unsurpassed success in the apprehension of shoplifters,
fraudsters and dishonest employees. Covert security operatives pose as
general shoppers and ensure that only customers are exiting the stores. It
means hidden or concealed. It cannot be observed.
How to deter potential intruders install the following.

 Security warning signs - let workers and visitors in your facility understand
the system you have in place. This is especially crucial if there are emergency
exit doors that will trigger alarms if they're opened. Security warning
signs can also deter trespassing, theft, and other illegal or suspicious activities.

 Security fences - stating that it is fencing a piece of property to


increase security.

 Vehicle barriers - A barrier meant to stop, disable, or


destroy vehicles intentionally driven into the perimeter of a protected area.
These barriers may be active (movable at the push of a button) or static
(permanently in a vehicle-stopping posture) and be located at gate entrances
or along perimeters between vehicle access points.

 Vehicle height restriction - are designed specifically to allow access to a site for
cars and smaller, lighter vehicles. This bar then pre-warns
the vehicles wishing to gain access to the area that their vehicle may be too
high.

 Restricted access point - t means that you can allow only a number of people
who will enter the facility or a building or institution.

 Sight lighting and trenches - security lighting is lighting that intended to deter
or detect intrusions or other criminal activity on a piece of real property. It can
also be used to increase a feeling of safety. Lighting is integral to crime
prevention through environmental design.
How to distinguish authorized from unauthorized people.
Access control at the following:

1. Security gates - shall be defined as any gate, door, or other barrier that limits
or restricts public access to or from a property.
2. Security doors - replace conventional doors and revolving doors in fence lines
and entryways. They are used to allow access only to authorized personnel and
are commonly used for high-security access control at construction sites, data
centers, military bases, and prisons.
3. Locks - A lock is a mechanical or electronic fastening device that is released by
a physical object (such as a key, keycard, fingerprint, RFID card, security
token, coin, etc.), by supplying secret information (such as a number or letter
permutation or password), or by a combination thereof or only being able to be
opened from one side such as a door chain.
How to detect intrusion
1. install alarms
2. install intrusion detection monitor
3. install video monitoring system - ex. cctv
Vigiles (in Rome) - origin of the watchmen although their principal duty was as a
fire brigade.
Frank Wills - detected the Watergate burglars ultimately leading to the resignation
of US president Richard Nixon.
Target hardening - the reduction in criminal opportunity, generally through the use
of physical barriers, architectural design and enhanced security measures of a
particular location.
Defensible Space - the range of mechanisms that combine to bring an environment
under the control of its residents.
Demography - the study of the characteristics of population groups.
Principles of Physical Security
1. An intruder must be able to acquire access to the property in order to benefit.
2. The type of access necessary will depend upon a number of variable factors and
therefore may be achieved in a number of ways.
3. There is no impenetrable barrier.
4. Security is built upon a system of defense in depth resulting to accumulated
delay time which may lead to the apprehension of the intruder.
5. Each installation is different from the others.

PHYSICAL SECURITY

Definition: Physical security measures are being used to define, protect, and
monitor property rights and assets. These measures consist of barriers and devices that
would detect, impede, and prevent unauthorized access to equipment, facilities,
material and document and to safeguard them against espionage, sabotage, damage
and theft.
Physical security may be also defined as the safeguarding by physical means, such as
guard, fire protection measures, of plans, policies, programs, personnel, property,
utilities, information, facilities and installation against compromise, trespass, sabotage,
pilferage, embezzlement, fraud, or other dishonest criminal act.

What is a Barrier?

A barrier can be defined as any structure or physical device capable of


restricting, deterring, delaying, illegal access to an installation.
Generally, a barrier is use for the following purposes:

1. Define the physical limits of an area.


2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of
intruders.
4. Assist in more efficient and economical employment of guards
5. Facilitate and improve the control and vehicular traffic.

Types of Barriers

1. Natural barriers - it includes bodies of waters, mountains, marshes, ravines,


deserts or other terrain that are difficult to traverse.
2. Structural barriers - these are features constructed by man regardless of their
original intent that tends to delay the intruder. Examples are walls, doors,
windows, locks, fences, safe, cabinets or containers etc.
3. Human barriers - persons being used in providing a guarding system or by the
nature of their employment and location, fulfill security functions. Examples are
guards, office personnel, shop workers, etc.
4. Animal barriers - animals are used in partially providing a guarding system.
Dogs are usually trained and utilized to serve as guard dogs. German shepherds
are best suited for security functions. Goose and turkeys could also be included.
5. Energy barriers - it is the employment of mechanical, electrical, electronic
energy imposes a deterrent to entry by the potential intruder or to provide
warning to guard personnel. These are protective lighting, alarm system and any
electronic devices used as barriers.

Three Line of Physical Defense

1. First line of Defense- perimeter fences/ barriers


2. Second line of defense- doors, floors, windows, walls, roofs and grills and other
entries to the buildings
3. Third line of defense- storage system like steel cabinets, safes, vaults and
interior files.

Principles of Physical Security


1. The type of access necessary will depend upon a number of variable factors and
therefore may be achieved in a number of ways.
2. There is no impenetrable barrier
3. Defense-in depth is barriers after barriers
4. Delay is provided against surreptitious and non-surreptitious entry.
5. Each installation is different.

What is a Restricted Area?

A restricted area is any area in which personnel or vehicles are controlled for
reasons of security. Restricted area is established to provide security for installation or
facilities and to promote efficiency of security operations and economy in the use of
security personnel.

Types of Restricted Areas

Two types of restricted areas may be established to permit different degrees of


security within the same installation or facility, and to provide efficient bases for the
application of different degrees of access, circulation and protection. These restricted
areas are termed Exclusion areas and Limited areas. Exclusion Area- an exclusion
area is a restricted area which contains a security interest to TOP SECRET importance,
and which requires the highest degree of protection. Limited Area Control- a limited
area is a restricted area in which a lesser degree of control is required than in an
exclusion area but which the security interest would be compromised by uncontrolled
movement.

Limited Area Control includes the following:

a. Interior Area Control - Interior area control is generally affected in two ways.
The first method is the system which is initiated and terminated at the outer
limits of the area to determine the movements of a visitor within the area. A
second somewhat less means of accomplishing the same thing is time travel.
This system provides for checking the actual time used by the visitor against
known time requirements for what the visitor is to accomplish.
b. Visitor Identification and Movements Control - Processing and control of
movements of visitor shall be included in the PASS SYSTEM. The control of
movements of visitor will depend on the installation. A visitor register shall be
maintained to include the name of the visitor, date of visit, purpose of visit,
which may be filed for the future reference.
c. Key Control- A system of controlling keys shall be advised and regulations
covering the disposal, storage or withdrawals, shall be issued and imposed.
d. Fire Prevention- fire is so potentially destructive without human assistance,
with assistance it can be caused to devastate those things you are attempting
to secure and, professionally accomplished, often in a way that does not
leave recognizable evidence of sabotage.

What is Perimeter Security?

It is the protection of the installation’s inner and the immediate vicinity. The main
purpose of perimeter barrier is to deny or impede access or exit of unauthorized person.
Basically, it is the first line of defense of an installation. This is maybe in the form of
fences, building walls or even bodies of water.

The function and location of the facility itself usually determine the perimeter of
the installation. If the facility is located in a city whereby the facility is located in a city
whereby the building or enterprise occupies all the area where it is located, the
perimeter may be the walls of the building itself. Most of the Industrial companies,
however, are required to have a wide space for warehousing, manufacturing etc.
Types of Perimeter Barrier

Perimeter barriers includes fences, walls, bodies of water

Types of Fences

Solid fence -constructed in such away that visual access through the fence is
denied. Its advantage is that it denies the opportunity for the intruder to become familiar
with the personnel, activities and the time scheduled of the movements of the guards in
the installation. On the other hand, it prevents the guards from observing the area
around the installation and it creates shadow that may be used by the intruder for cover
and concealment.

Full-view fence - it is constructed in such away that visual access is permitted


through the fence. Its advantages are that it allows the roving patrols and stationary
guard to keep the surrounding are of the installation under observation. On the other
hand, it allows the intruder to become familiar with the movements and time schedule of
the guard patrols thereby allowing him to pick the time that is advantageous on his part.

Types of Full-View Fence

1. Chain link fence


 It must be constructed of 7 feet material excluding top guard.
 It must be of 9 gauges or heavier.
 The mesh openings are not to be larger than 2 inches per side.
 It should be twisted and barbed selvage at top and bottom
 It must be securely fastened to rigid metal or reinforced concrete.
 It must reach within 2 inches of hard ground or paving.
 On soft ground, it must reach below surface deep enough to compensate for
shifting soil or sand.
2. Barbed wire fence
 Standard barbed wire is twisted, double-strand, 12-gauge wire with 4 point
barbs spaces in an equal distance apart.
 Barbed wire fencing should not be less than 7 feet high excluding top guard.
 Barbed wire fencing must be firmly affixed to posts not more than 6 feet apart.

As a standard, the distance between strands must not exceed 6 inches at least
one wire will be interlaced vertically and midway between posts.

3. Concertina wire fence


 Standard concertina barbed wire is commercially manufactured wire coil of
high strength steel barbed wire clipped together at intervals to form a cylinder.
 Opened concertina wire is 50 feet long and 3 feet in diameter.

Perimeter Barrier Opening

 Gates and Doors - when not in use and controlled by guards, gates and
doors in the perimeter should be locked and frequently inspected by guards.
Locks should be changed from time to time and should be covered under
protective locks and key control.
 Side-walk-elevators - these provide access to areas within the perimeter
barrier and should be locked and guarded.
 Utilities Opening - sewers, air intakes, exhaust tunnels and other utility
openings which penetrate the barrier and which have cross sectional areas of
96 square inches or more should be protected by bars, grills, water filled traps
or other structural means providing equivalent protection to that portion of the
perimeter barriers.
 Clear Zones - an obstructed area or a “clear zone” should be maintained on
both sides of the perimeter barrier. A clear zone of 20 feet or more is
desirable between the barriers and exterior structures and natural covers that
may provide concealment for assistance to a person seeking unauthorized
entry.

Additional Protective Measures

 Top Guard - additional overhang of barbed wire placed on vertical perimeter


fences upward and outward with a 45 degree angle with 3 to 4 strands of barbed
wires spaced 6 inches apart. This increases the protective height and prevents
easy access.
 Guard Control stations - this is normally provided at main perimeter entrances
to secure areas located out-of-doors, and manned by guards on full-time basis.
Sentry station should be near a perimeter for surveillance at the entrance.
 Tower Guard - this is a house-like structure above the perimeter barriers. The
higher the tower, the more visibility it provides. It gives a psychological
unswerving effect to violators. By and large guard towers, whether permanent or
temporary, must have a corresponding support force in the event of need.
Towers as well as guard control stations should have telephones, intercoms, and
if possible two-way radios connected to security headquarters or office to call for
reserves in the event of need.
 Barrier Maintenance - fencing barriers and protective walls should always be
regularly inspected by security. Any sign or attempts to break in should be
reported for investigation. Destruction of fence or sections thereof should be
repaired immediately and guard vigilance should be increased.
 Protection in Depth - in large open areas or ground where fencing or walling is
impractical and expensive, warning signs should be conspicuously placed. The
depth itself is protection reduction of access roads, and sufficient notices to warn
intruders should be done. Use of animals, as guards and intrusion device, can
also be good as barriers.
 Signs and notices - “Control signs” should be erected where necessary in the
management of unauthorized ingress to preclude accidental entry. Signs should
be plainly visible and legible from any approach and in an understood language
or dialect.

What is Protective Lighting?

The idea that lighting can provide improve protection for people and facilities is as old
as civilization. Protective lighting is the single most cost-effective deterrent to crime
because it creates a psychological deterrent to the intruders.

Types of Protective Lighting

1. Continuous lighting - the most familiar type of outdoor security lighting, this is
designed to provide two specific results: glare projection or controlled lighting. It
consists of a series of fixed luminaries at range to flood a given area continuously
during the hours of darkness.
a. Glare projection type- it is being used in prisons and correctional
institutions to illuminate walls and outside barriers.
b. Controlled lighting- it is generally employed where, due to surrounding
property owners, nearby highways or other limitations, it is necessary for
the light to be more precisely focused.
2. Standby lighting - it is designed for reserve or standby use or to supplement
continuous systems. A standby system can be most useful to selectively light a
particular area in an occasional basis.
3. Movable or Portable lighting - this system is manually operated and is usually
made up of movable search or floodlights that can be located in selected or
special locations which will require lighting only for short period of time.
4. Emergency lighting - this system is used in times of power failure or other
emergencies when other systems are inoperative.

General Types of Lighting Sources


Listed below are the general lighting sources that are mostly used in providing
indoor or outdoor lighting.

1. Incandescent lamp - it is the least expensive in terms of energy consumed and


has the advantage of providing instant illumination when the switch is on.
2. Mercury vapor lamp - it is considered more efficient that the incandescent and
used widespread in exterior lighting. This emits a purplish-white color, caused by
an electric current passing through a tube of conducting and luminous gas.
3. Metal halide - it has similar physical appearance to mercury vapor but provides a
light source of higher luminous efficiency and better color rendition.
4. Fluorescent - this provides good color rendition, high lamp efficiency as well as
long life. However, it cannot project light over long distance and thus are not
desirable as flood type lights.
5. High-pressure sodium vapor - this has gained acceptance for exterior lighting
of parking areas, roadways, buildings and commercial interior installations.
Constructed on the same principle as mercury vapor lamps, they emit a golden
white to light pink color and this provide high lumen efficiency and relatively good
color rendition.

Types of Lighting Equipment

Three types of lighting equipment are generally used or associated with security
lighting. These are:

1. Floodlights - These can be used to accommodate most outdoor security lighting


needs, including the illumination of boundaries, fences and buildings and for the
emphasis of vital areas or particular buildings.
2. Street lights - This lighting equipment received the most widespread notoriety
for its value in reducing crime.
3. Search lights - These are highly focused incandescent lamp and are designed
to pinpoint potential trouble spots.
4. Fresnel lights - These are wide beam units, primary used to extend the
illumination in long, horizontal strips to protect the approaches to the perimeter
barrier. Fresnel projects a narrow, horizontal beam that is approximately 180
degrees in the horizontal and from 15 to 30 degrees in the vertical plane.

What are Protective Alarms?

Protective alarm is one of the important barriers in security. It assists the security
in detecting, impeding or deterring potential security threat in the installation. Basically,
its function is to alert the security personnel for any attempt of intrusion into a protected
area, building or compound. Once an intruder tampers the circuitry, the beam or
radiated waves of the alarm system, it will activate an alarm signal.
On the other hand, the use of communication equipment in the installation helps
security in upgrading its operational efficiency and effectiveness.

Three Basic Parts of Alarm System

1. Sensor or trigger device - it emits the aural or visual signals or both.


2. Transmission line - a circuit which transmit the message to the signaling
apparatus.
3. Enunciator/annunciator - it is the signaling system that activates the alarm.

Types of Protective Alarm System

1. Central Station System - a type of alarm where the control station is located
outside the plant or installation. When the alarm is sounded or actuated by
subscriber, the central station notifies the police and other public safety agencies.
2. Proprietary system - centralized monitor of the proprietary alarm system is
located in the industrial firm itself with a duty operator. In case of alarm, the duty
operator calls whatever is the primary need; firefighters, police, an ambulance or
a bomb disposal unit.
3. Local Alarm – This system consist of ringing up a visual or audible alarm near
the object to be protected. When an intruder tries to pry a window, the alarm
thereat goes off.
4. Auxiliary alarm - company-owned alarm systems with a unit in the nearest
police station so that in case of need, direct call is possible. The company
maintains the equipment and lines both for the company and those in the police,
fire and other emergency agencies by special arrangement. Radio, landlines, or
cell phones can avail of the auxiliary system.

Kinds of Alarms

1. Audio Detection Device - it will detect any sound caused by attempted force
entry. A supersonic microphone speaker sensor is installed in walls, ceilings and
floors of the protected area.
2. Vibration Detection Device - it will detect any vibration caused by attempted
force entry. A vibration sensitive sensor is attached to walls, ceilings or floors of
the protected area.
3. Metallic foil or wire - it will detect any action that moves the foil or wire. An
electrically charge strips of tinfoil or wire is used in the doors, windows or glass
surfaces of the protected area.
4. Laser Beam Alarm - a laser emitter floods a wall or fencing with a beam so that
when this beam is disturbed by a physical object, an alarm is activated.
5. Photoelectric or Electric Eye Device - an invisible/visible beam is emitted and
when this is disturbed or when an intruder breaks contact with the beam, it will
activate the alarm.
What is Protective Lock and Key Control?

Lock is one of the most widely used physical security devices in the asset
protection program of an installation. It complements other physical safeguards of the
installation against any possible surreptitious entry. However, the owner of the
installation or his security officer needs to understand the weaknesses and strength of
each type of lock including the door, window or walls to be used to achieve maximum
benefit from its application. This is because highly skilled burglars more often
concentrate on the lock and its surrounding mechanism in order to make a forcible
entry. It is for this obvious reasons that locks are considered as delaying devices which
can not really stop a determine intruder from destroying the lock just to launch an
attack. Hence, knowledge of the basic principles of locking systems will enable the
installation owner or the security officer to evaluate any lock and determine its quality
and effectiveness in a particular application.

What is a Lock?

A lock is defined as a mechanical, electrical, hydraulic or electronic device


designed to prevent entry into a building, room, container or hiding place.

Types of Locks

1. Key-operated mechanical lock - it uses some sort of arrangement of internal


physical barriers (wards tumblers) which prevent the lock from operating unless
they are properly aligned. The key is the device used to align these internal
barriers so that the lock may be operated.

Three (3) Types of Key-operated Lock

a. Disc or wafer tumbler mechanism


b. Pin tumbler mechanism
c. Lever tumbler mechanism

2. Padlock - a portable and detachable lock having a sliding hasp which passes
through a staple ring and is then made fasten or secured.
3. Combination lock - instead of using the key to align the tumblers, the
combination mechanism uses numbers, letters or other symbols as reference
point which enables an operator to align them manually.
4. Code-operated lock - a type of lock that can be opened by pressing a series of
numbered button in the proper sequence.
5. Electrical lock - a type of lock that can be opened and closed remotely by
electrical means.
6. Card-operated lock - a type of lock operated by a coded card.

Types of keys
1. Change key - a specific key, which operates the lock and has a particular
combination of cuts which match the arrangement of the tumblers in the lock.
2. Sub-master key - a key that will open all the lock within a particular area or
grouping in a given facility.
3. Master key - a special key capable of opening a series of lock.
4. Grand Master key - a key that will open everything in a system involving two or
more master key groups.

Key Control

Once an effective key control has been installed, positive control of all keys must
be gained and maintained. This can be accomplished only if it is established in
conjunction with the installation of new locking devices. The following methods can be
used to maintain effective key control;

1. Key cabinet- a well-constructed cabinet will have to be procured. The cabinet


will have to be of sufficient size to hold the original key to every lock in the
system. It should be secured at all times.
2. Key record- some administrative means must be set up to record code numbers
and indicates to whom keys to specific locks have been issued.
3. Inventories- periodic inventories will have to be made of all duplicate and
original keys in the hands of the employees whom they have been issued.
4. Audits- in addition to periodic inventory, an unannounced audit should be made
of all key control records and procedures by a member of management.
5. Daily report- a daily report should be made to the person responsible for key
control from the personnel department indicating all persons who have left or will
be leaving the company. In the event that a key has been issued, steps should
be initiated to insure that the key is recovered.

What is a Security Cabinet?

The final line of defense at any facility is in the high security storage where
papers, records, plans or cashable instrument, precious metals or other especially
valuable assets are protected. These security containers will be of a size and quantity,
which the nature of the business dictates.
In protecting [property, it is essential to recognize that protective containers are
designed to secure against burglary or fire. Each type of equipment has a specialized
function and it will depend on the owner of the facility which type ha is going to use.

Three (3) Types of Security Cabinet


1. Safe - a metallic container used for the safekeeping of documents or small items
in an office or installation. Safe can be classified as either robbery or burglary
resistance depending upon the use and need.
a. Its weight must be at least 750 lbs. And should be anchored to a building
structure.
b. Its body should at least one inch thick steel.

2. Vault - heavily constructed fire and burglar resistance container usually a part of
the building structure used to keep and protect cash, documents and negotiable
instruments. Vaults are bigger than safe but smaller than a file room.
a. The vault door should be made of steel at least 6 inches in thickness.
b. The vault walls, ceiling, floor reinforce concrete at least 12 inches in
thickness.
c. The vault must be resistive up to 6 hours.

3. File room - a cubicle in a building constructed a little lighter than a vault but of
bigger size to accommodate limited people to work on the records inside.
a. The file room should at most be 12 feet high.
b. It must have a watertight door and at least fire proof for one hour.

Control of Personnel in the Physical Facility

In every installation, the use of protective barriers, security lighting,


communication and electronic hardware provides physical safeguards but these are
insufficient to maximize the effort of the guard force. A control point must be established
for positive personnel identification and check system. This is to insure that only those
persons who have the right and authority will be given the necessary access to the
area.
The most practical and generally accepted system of personnel identification is the use
of identification cards badges or passes. Generally speaking, this system designates
when and where and how identification cards should be displayed, and to whom. This
helps security personnel eliminate the risk of allowing the access of unauthorized
personnel within the establishments.

Types of Personnel Identification

1. Personal recognition
2. Artificial recognition- identification cards, passes, passwords, etc.

Use of Pass System

1. Single pass system - the badge or pass coded for authorization to enter specific
areas is issued to an employee who keeps it in his possession until his
authorization is terminates.
2. Pass exchange system - an exchange takes place at the entrance of each
controlled area. Upon leaving the personnel surrenders his badge or passes and
retrieve back his basic identification.
3. Multiple pass system - this provides an extra measure of security by requiring
that an exchange take place at the entrance of each restricted area.

Visitors Movement Control

Security should establish proper methods of establishing the authority for


admission of visitors as well as the limitation thereat. This security measure would
depend on the sensibility of the installation, but could include the following:

1. Visitor’s logbook – All visitors to any facility should be required to identify them
selves and should be given a visitor’s ID by the security. Visitor’s logbook should
be filled up with the named of visitors, nature and duration of visit.
2. Photograph - taking of photographs should also be considered. Extreme caution
must be exercised in areas where classified information is displayed to preclude
unauthorized taking of pictures of the installation. If a visitor has camera and it is
prohibited to take picture, said camera should be left in the care of security with
corresponding receipt.
3. Escort - If possible visitors should be escorted by the security to monitor their
activity within the establishment and guide them where to go.
4. Visitor entrances - separate access for visitors and employees of the
establishment should be provided.
5. Time- traveled - If there is a long delay or time lapse between the departure and
arrival, the visitors maybe required to show cause for the delay.

Package Movement Control

Every facility must establish a system for the control of package entering or
leaving the premises. However, desirable it might seem it is simply unrealistic to
suppose that a blanket rule forbidding packages either in or out would be workable.
Such a rule would be damaging to the employee morale and, in many cases, would
actually work against the efficient operation in the facility. Therefore, since the
transporting of packages through the portals is a fact of life, they must be dealt with in
order to prevent theft and misappropriation of company properties. Thus;

a. No packages shall be authorized to be brought inside the industrial installation,


offices and work area without proper authority. This basic precept help reduce if
not eliminate pilferage, industrial espionage or sabotage.
b. Outgoing packages carried by personnel should be closely inspected and those
in vehicles should also be checked as many pilfered items are hidden in the
surface of the vehicles leaving the compound.
c. Any personnel/visitor entering the installation with a package should deposit the
same to the security and in return receives a numbered tag, which he/she will
use in claiming his/her package upon departing.
Control of Vehicle in the Installation

Vehicular traffic within the boundaries of any facility must be carefully controlled
for safety as well as to control the transporting of pilfered goods from the premises.
Thus

1. Privately owned vehicle of personnel/visitor should be registered and are subject


to the identification and admittance procedure.
2. Vehicles should be subjected for search at the entrance and exit of the
installation.
3. All visitors with vehicle should provide the security as to the complete details of
their duration of stay, person to be visited, and other information.
4. All vehicles of visitors should be given a sign/sticker to be placed on the
windshield.
5. Traffic warning signs should be installed in all entrances in order to guide the
visitors in their destination as well to provide them with the necessary safety
precautions while they are inside the installation.
6. Security personnel must constantly supervise parking areas and make frequent
spots searches of vehicles found there.

Building Access Control

At any physical barrier, a security system must posses the ability to distinguish
among authorized persons, unauthorized visitors, and other unauthorized persons. This
is to assist the security personnel protects sensitive are and information within the
installation. Appropriate warning signs should be posted at the building perimeter.
Special restricted entry facilities to public access should be provided. This will be
dependent on the degree of security needed for the protection of property, activity and
other processes within the building. A clear-cut policy on the access control should be
disseminated to all personnel of the installation.

PERSONNEL SECURITY

Personnel Security includes all the security measures designed to prevent


unsuitable individuals or persons of doubtful loyalty to the government, from gaining
access to classified matter or to any security facility, and to prevent appointment, or
retention as employees of such individuals,

The Security “Chain”: Personnel Security is the “weakest link” in the security
“chain”. This weakness can best be minimized or eliminated by making init personnel
security conscious through good training program. Security depends upon the action of
the individuals. The superior must instruct his subordinates so that they will know
exactly what security measures to take in every instance, a safe will not lock itself. An
individual must be properly instructed and must do the locking.

Control of Personnel

Access to “restricted Areas” can be partially controlled by fences, gates and


other physical means, but the individual working in the area is the key to the bringing
out of classified matter to unauthorized personnel. Written information does not have
the power of speech. Only the individual has knowledge of this written information can
pass it to an unauthorized personnel if he unguardedly talks about information.

What is Personnel Security Investigation?

It is an inquiry into the character, reputation, discretion and loyalty of individual in


order to determine a person’s suitability to be given security clearance.

Types of Personnel Security Investigation (PSI)

National Agency Check (NAC). – This is an investigation of an individual made


upon the basis of written information supplied by him in response to official inquiry, and
by reference to appropriate national agencies. It is simply a check of the files and record
of national agencies. The national agencies checked under this type of investigation are
the following:
 National Intelligence Coordinating Agency (NICA)
 National Bureau of Investigation (NBI)
 ISAAFP or J2 Division, GHQ AFP
 CIDG PNP Camp Crame., etc.

Local Agency Check (LAC) – This type of investigation consist of the first type
plus written inquiries sent to appropriate local government agencies, former employees,
references and schools listed by the person under investigation. The local agencies
normally check besides the past employment, schools and references are the following:
 Place of the locality where the individual is a resident.
 Mayor, Police, Fiscal, Judge of the locality where the individual is a resident.

Background Investigation (BI) This is more comprehensive investigation than


the NAC or the NAC and LAC. A through and complete investigation of all or some of
the circumstances or aspects of a person’s life is conducted.
This type of personnel Security Investigation may either be a complete (CBI) or a
partial Background Investigation (PBI).

1. Complete Background Investigation – Consist of the investigation of the


background of a person, particularly all the circumstances of his personal life.

2. Partial Background Investigation – Consist of the investigation of the


background of an individual but limited only to some of the circumstances of his
personal life which are deemed pertinent to the investigation. Normally, the
request for the investigation will indicate the specific personal circumstances to
be covered. This type of BI is also used to further develop questionable
information contained in another investigation report.

Factors considered in Background Investigation.

1. Loyalty – faithful allegiance to the country, government and its duly constituted
authority.
2. Integrity- uprightness in character, soundness of moral principles, freedom from
moral delinquencies, ore more simply stated-honesty.
3. Discretion- the ability of tendency to act or decide with prudence; the habit of
wise judgment or simply stated- good judgment
4. Moral- distinctive identifying qualities which serve as an index to the essential or
intrinsic nature of a person; his outward manifestation, personal traits or moral
habits.
5. Character- the sum of the traits that serves as an index of the essential intrinsic
nature of a person. It is the aggregate of distinctive mental and moral qualities
that have been impressed by nature, education and habit upon the individual.
6. Reputation- opinion or estimation in which one is generally held. It is what one
reported to be, whereas character is what a person is.

Motives that cause people to be disloyal

1. Revenge- a real or fancied wrong can create a hatred which will stop at nothing
to obtain revenge of the offender. Hatred wraps the sense of moral values until
the hater will go to any lengths, even betrayal of his country, to avenge himself
on the person or class of people hated.
2. Material Gain- some people are so avid for material gain that they will stop at
nothing to achieve this end.
3. Personal Prestige- this motivation applies to those whose main desire is for
power-power over others-to prove to the world what leaders they are. However,
their desire for power makes them especially vulnerable to subversion.
4. Friendship –through close attachment to another person, many people,
otherwise of high integrity, will do things inimical to their country’s interest.
5. Ideological Beliefs- If a person holds inimical to their country, they are of course
vulnerable to approach by subversive groups of agents.

THE GUARD FORCE AND GUARD SYSTEM

The security guard force is the key element in the overall security system of a
plant or installation. Its basic mission is to protect all the property within the limits of the
facility boundaries and protect employees and other persons on the installation.

Security Guard Defined

Sometimes called private security guard or watchman shall include any person
who offers or renders personal service to watch or secure either a residence or
business establishment or both for hire or compensation, and with a license to exercise
profession.

Security Guard Force

It is a group of force selected men, trained or grouped into functional unit for the
purpose of protecting operational processes from those disruption which would impeded
efficiency or halt operation at a particular plant, facility, installation or special activity

Types of Security Guard Forces

1. Private Security Agency - any person, association, partnership, firm or private


corporation, who contracts, recruits, trains, furnishes or post any security guard,
to do its functions or solicit individual s, business firms, or private, public or
government-owned or controlled corporations to engage his/its service or those
of his/its security guards, for hire commission or compensation.
2. Company Security Force - A security force maintained and operated any
private company/ corporation for its own security requirements only.
3. Government Security Unit - a security unit maintained and operated by any
government entity other than military and/a police, which is established and
maintained for the purpose of securing the office or compound and/or extension
such government entity.

Typical Structure of a Security Organization

The security force of any installation must be organized in accordance with the
principles of responsibility and authority. Each personnel must be assigned to a position
that corresponds to his experience, skills, training and knowledge. This is to carry out
different functions efficiently and effectively and thus insures smooth flow of the
organization.

The security positions may be classified into the following:


1. Office of the General Manager/Security Director
a. The office of the General Manager/Security Director is vested the authority
and responsibility of running the security force by authority of the
President of the Company/Corporation.
b. The General Manager/Security Director is directly responsible to the
President of the Company/Corporation in the operations and
administration of the security force/
c. He is the principal adviser to the president on matters involving security
operations, administration of the security force.
d. He is the overall head of both various staff departments and field units
where he may delegate corresponding authority commensurate to their
assigned responsibility.
e. He implements policies promulgated by the policy making body and
executed by the President.
f. He directs controls and supervises all offices and field units of the force in
their respective assigned tasks.
g. He performs other functions as directed by the President of the
Company/Corporation.

2. Office of the Executive secretary of the General Manager


a. He is the principal administrative assistant to the General
Manager/Security Director.
b. He prepares communications initiated by the General Manager/Security
Director.
c. He maintains records of scheduled conferences, appointments and other
engagements and advises the GM/SD of such activities.
d. He records and checks outgoing communications signed by the GM/SD as
to its completeness (attachments to be considered) as well as to ensure
the timely dispatch to the addressee through the administrative section.
e. To perform other duties as directed by the General Manager/Security
Director.

3. Office of the Assistant General Manager/Security Executive Director


a. The Security Executive Director is the Assistant Manger of the Security
Force and takes the Operational and Administrative Management of the
security force in the absence of the GM/SD
b. He is directly responsible to the GM/SD
c. He performs other duties as directed by GM/SD

4. Office of the Human Resources and Administrative Manager/Staff Director


for Personnel and Administration
a. The principal staff assistant to the General Manager/Security Director for
planning and supervising matters or activities pertaining to personnel
management and miscellaneous administrative functions such as:
b. Personnel Strengths
c. Replacement
d. Discipline, Law and Order
e. Morale and Personnel Services
f. Personnel Procedures
g. Interior Management
h. Personnel Adviser

5. Office of the Operations Manager/Staff Director for Operations


a. This office is the principal staff on Operations, training, intelligence and
investigation.

6. Office of the Finance


a. This office is principally concerned with budgeting, finance, reports control
and program review and analysis. Exercises supervision over the
management engineering activities of the company and the accounting
office. Renders advice, assistance and guidance to GM/SD on financial
management. Specific duties and functions of the Finance Office are:
b. Accounting
c. Credit and collection
d. Bookkeeping
e. Billing
f. Payroll and disbursing

7. Office of the Logistic Manager


a. This office is in charge with the following:
b. Coordinates plan and supervise the implementation of directive and
guidance determines divisional responsibility and evaluates in logistical
planning and related planning programs.
c. Develops, administers, and coordinates research and development on
logistical matters.
d. Collects and computes statistical data on logistical matters.
e. Recommends logistics budget policy including budget planning.
f. Prepares estimates and/or requirements to ensure that logistical plans
support for corporate plans.
g. Performs necessary program and fiscal administration.
h. Supervise all matters pertaining to supply.
i. Determine the organization, allocation of service personnel
j. Plans for maintenance and repair of supplies and equipment.

8. Office of the Inspectorate and Special Projects (Special Staff)


a. This office assists the General Manger in inquiring into, and reports upon
matters pertaining to the performance of the different staff, units, towards
the attainment of corporate objectives. It also inquires on the state of
discipline, efficiency and economy of the company.
b. The Inspectorate Staff conducts inspections, investigations and submits
reports to the General Manager. In the performance of its duties and
functions, the General Manger is provided relevant information pertaining
to meritorious conduct and performance of a unit or individual.
c. This office is also tasked to conduct overt and covert inspections and
investigations and other related services.

9. Office of the Communications Officer


a. The Communications Officer who is a licensed radio operator is the
principal adviser of the General Manager on communication on matters
pertaining to radio communication.

10. The Detachment Commander/Officer-in-Charge


a. A Detachment Commander shall command and responsible for a certain
detachment, with fifteen (15) or more security personnel under him. He is
directly responsible to the Security Manager of the installation.
b. He prepares and executes the security plan of his Detachment in relation
to the security requirements of the establishment being guarded.
c. He is responsible for the enforcement and implementation of Rules and
Regulations/Policies.
d. He receives instructions from the Security Manager and implements the
same as required
e. He has full operational and administrative control of all his units to include
his assistant and shift-in-charge/supervisor.
f. He conducts inspection of his units and institutes corrective measures on
the spot on those problems he may detect or brought to his attention. If
not possible, he brings the problem to the Security Manager of the
establishment.

11. Assistant Detachment Commander


a. Detachment with more than twenty (20) security personnel assigned may
be provided with an Assistant Detachment Commander who will be the
principal assistant of the Detachment Commander.
b. In the absence of the Detachment Commander, he performs the duties of
the Detachment Commander.

12. Shift-in-Charge
a. The Shift-in-Charge shall be responsible to the Detachment Commander
as far as his shift is concerned.
b. He forms his men at least 30 minute before posting time seeing that all are
in proper uniform and presentable.
c. He disseminates instructions coming form his Detachment
Commander/OIC or those relayed to him by his counter-part, the outgoing
SIC.
d. He inspects the posts as often as he can to ensure that his men are on the
alert and performing their duties effectively.
e. He performs other duties as may be directed by the Detachment
Commander or by the ADC.

13. Security Guard on Duty/Post


a. The Security Guard (SG) on Duty/Post must always carry his license to
practice his profession, Xerox copy of the firearm’s license assigned to
him, and his duty detail order, authorizing him to carry his issued firearm
within his area of jurisdiction.
b. If the Security Guard is manning a fixed post especially entrance or exit
points, he must maintain a guard’s logbook and enters in the same
logbook all events/passages of VIP’s vehicles and inspections or visits of
Security Manager/Director of the Client/Firm.
c. Guards must observe and apply religiously the provisions of the Code of
Ethics, Code of Conduct, and the General Orders of the Security Guard
when on post.
d. He may perform special task as may be directed by his shift supervisor,
DC and or ADC like control of visitors, inspections of bags of persons
coming in and going out of the establishment, vehicle cargoes, or prevents
the intrusion of unauthorized person in a particular area, etc.

Security Guard’s Professional Conduct and Ethics

Security Guard’s Creed:

As a Security Guard, my fundamental duty is to protect lives and properties and


maintained order within the vicinity or place of duty, protect the interest of my
employer and our clients and the security and stability of our government and
country without compromise and prejudice, honest in my action, words and
thought, and do my best to uphold the principle: MAKADIOS, MAKABAYAN AT
MAKATAO.

Ethical Standard: As security guard/detective, his fundamental duty is to serve


the interest or mission of his agency in compliance with the contract entered into with
the clients or customers of the agency he is to serve thus,

1. He shall be honest in thoughts and deeds both in his official actuation, obeying
the laws of the land and the regulations prescribed by his agency and those
establish by the company he is suppose to serve.
2. He shall not reveal any confidential matter committed to him as a security guard
and such other matters imposed upon him by law.
3. He shall act all times with decorum and shall not permit personal feelings,
prejudices and undue friendship to influence his actuation in the performance of
his official functions.
4. He shall not compromise with criminal and other lawless elements to the
prejudice of the customers or clients and shall assist government relentless drive
against lawlessness and other forms of criminality.
5. He shall carry out his assigned duties as required by law to the best of his ability
and shall safeguard life and property of the establishment he is assigned to.
6. He shall wear his uniform, badge, patches and insignia properly as a symbol of
public trust and confidence as an honest and trustworthy security guard,
watchman and private detective.
7. He shall keep his allegiance first to the government he is assigned to serve with
loyalty and utmost dedication.
8. He shall diligently and progressively familiarize himself with the rules and
regulations lay down by his agency and those of the customers or clients.
9. He shall at all times be courteous, respectful and salute his superior officers,
government officials and officials of the establishment where he is assigned and
the company he is supposed to serve.
10. He shall report for duty always in proper uniform and neat in his appearance
11. He shall learn at heart and strictly observe the laws and regulations governing
the use of firearm.

Code of Conduct: The watchman should abide by the following code of conduct:

1. He shall carry with him at all times during his tour of duty his license identification
card and duty detail order with an authority to carry firearms.
2. He shall not use his license and privileges to the prejudice of the public, the client
or customer and his agency.
3. He shall not engage in any unnecessary conversation with anybody except in the
discharge of his work and shall at all times keep himself alert during his tour of
duty.
4. He shall not read newspapers, magazines, books, etc., while actually performing
his duties.
5. He shall not drink any intoxicating liquor immediately before and during his tour
of duty.
6. He shall know the location of the alarm box near his post and sound the alarm in
case of fire or disorder.
7. He shall know how to operate any fire extinguishers at his post.
8. He shall know the location of the telephone and/or telephone number of the
police precincts as well as the telephone number of the fire stations in the
locality.
9. He shall immediately notify the police in case of any sign of disorder, strike, riot
or any serious violations of the law.
10. He or his group or guards shall not participate or integrate any disorder, strike,
riot or any serious violations of the law.
11. He shall assist the police in the preservation and maintenance of peace and
order and in the protection of life, property/having in mind that the nature of his
responsibilities is similar to that of the latter.
12. He shall familiarize himself with the Private Security Agency Law (RA5487) as
amended, and the PNP SAGSD implementing rules and regulations.
13. When issued a pass he should not lend his pass to anybody.
14. He shall always in proper uniform and shall always carry with him his basic
requirements, and equipment such as writing notebook, ball pen, nightstick
(baton) and/or radio. He shall endeavor at all times to merit and be worthy of the
trust and confidence of the agency he represents and the client he serves.

The 11 General Orders (GO’s)

1. To take charge of this post and all companies property in view and
protect/preserve the same with utmost diligence.
2. To walk during tour of duty in military manner, keeping always in the alert and
observing everything that takes place within sight or hearing.
3. To report all violations of orders I am instructed to enforce.
4. To repeat all calls from post more distant from the guardhouse where I am
station.
5. To quit my post only when properly relieved.
6. T o receive, obey and pass out to the relieving guard all order from company
officers or officials, supervisors post in charge or shift leaders.
7. To talk to no one except in the line of duty
8. To sound or call the alarm in case of fire or disorder
9. To call the superior officer in any case not covered by instructions.
10. To salute all company officials, superiors in the agency, ranking public officials
and commission officer of the AFP and officers of the PNP.
11. To be especially watchful at night and during the time of challenging to challenge
all persons on or near my post and to allow no one to pass or loiter without
proper authority.

You might also like