You are on page 1of 51

PAR T V

SECURITY & SAFETY MANAGEMENT


CHAPTER

19

INTRODUCTION TO SECURITY AND SAFETY

===========================================================

Security from a layman’s point of view refers to the


security guards whose main function is to protect an office,
building, installation or equipment against trespass, theft,
arson, and other inimical acts. As a security officer, the
job includes the implementation of a viable security
education program which will sell security measures to the
customer-clientele of the private policing activities. It
is also a must to improve the knowledge, and adopt an open
mind regarding the many faceted problems involved in
industrial security management.

What is a Security

Is the state of quality of being secure; freedom from fear


or danger; assurance of certainty. To secure is to make safe
or be protected.

Types of Security

1. Physical Security

Is the broadest branch of security which is concerned


with the physical measures adopted to prevent unauthorized
access to equipment, facilities, materials and document and
to safeguard it from espionage, sabotage, damage and theft.
Physical security does not only cover types of security to
protect equipment, document, facilities and materials
against damage, sabotage or espionage. It also encompasses
protection of personnel from criminal act.

2. Communications Security
Is the protection resulting from the application of various
measures which prevent or delay the enemy or unauthorized
persons in gaining information through the communication
system. This includes:

1) Transmission Security

A component of communications security which


results from all measures designed to protect transmission
from interception, traffic analysis and imitative deception.

2) Cryptographic Security

Results from the provisions of technically sound


crypto-system and their proper use.

3) Physical Security

Providing a safeguards to equipment and material


from access by unauthorized persons.

3. Hotel Security

The protection of assets, guests, personal effect and


other properties in a hotel.

4. Bank Security

A specialized type of physical security in protecting


the assets, personnel and operation of a bank, with special
emphasis on the precaution and measures to safeguard the
cash and assets while in storage; in transit, and during
transactions.

5. Document Security

Is a physical security involving the protection of


documents and classified matters from loss or access by
unauthorized persons, damages, theft and compromise through
disclosure.

6. Personal Security

It is the protection of personnel, especially the


ranking officials of the company from any harm, kidnapping
and other criminal acts. VIP security is also a type of
personal security.

7. Crises Security

A part of VIP security involving hostage taking and


kidnapping of VIPs.

8. Industrial Security

It is a physical security applied to business groups


engaged in industries like manufacturing, assembling,
research and development, processing, warehousing and even
agriculture. It is a form of physical security involving
industrial plant and business enterprises where the
personnel, processes, properties and operations are
safeguarded. Use of protective barriers, and security
lighting, personnel movement control, locks and key
management, guard forces, communications and electronic
hardware are essential, aside from fire prevention and
control programs, emergency plans, industrial safety and
security education programs.

9. Operational Security

It is part of physical security that deals primarily


with the protection of processes, formulas, patents, and
other industrial and manufacturing activities from
espionage, infiltration, loss, compromise, or photocopying.

10. Other Special Types

1) Air Cargo Security

2) School Security

3) Supermarket Security

4) Personnel Security

What is a Security Hazard

Is an act or conditions which results in a situation


conducive to a breach of the protection system and the
subsequent loss or compromise of defense information,
company secrets, or damage to personnel, property or
facilities.

Kinds of Security Hazards

1. Human Hazard

Are the acts or conditions affecting the safe operation


of the facility caused by human action, accidental or
intentional. It includes sabotage, espionage, pilferage and
theft, disloyalty, disaffection and subversive activity.

2. Natural Hazards

Are those caused by natural phenomena which cause


damage, disturbance and problems of the normal functioning
of human activities, including security. It includes floods,
typhoons, earthquakes, lighting storms, volcanic eruptions,
high-velocity winds, tidal waves, etc. It should be noted
that the real problems actually in industrial plants are the
human or man-made hazards, the most common of which are
pilferage, theft, arson, accidents through carelessness, and
sabotage.

Extent and Degree of Risks to Security will be Dependent on


the Following

1. Relative Criticality

It is the importance of the firm with reference to the


national economy and security.

2. Relative Vulnerability

It is the susceptibility of the plant or establishment


to damage, loss or disruption of operation due to various
hazards.
Types of Pilferers

1. Casual Pilferer

One who steals due to his inability to resist the


unexpected opportunity and has little fear of detection.

2. Systematic Pilferer
One who steals with preconceived plans and takes away
any of all types of items or supplies for economic gain.

Some Common Measures Against Pilferage

1. Package Inspection

2. Body Search

3. Garbage and Trash Checks Before Disposal

4. Personnel ID and Management Control

5. Locks and Key Management

6. Property Audits

7. Inspections

8. Asset Inventories

9. Use of Alarm

10. Security Education


CHAPTER

20

PHYSICAL SECURITY MANAGEMENT

===========================================================

What is a Perimeter Barrier

A medium or structure which defines the physical limits


of an installations or area to restrict or impede access
thereto. It is any physical barrier used to supplement the
protection of an inside or outside perimeter.

Basically, barriers are designed to accomplish the


following:

1. Outline of the perimeter of the area to be


secured;

2. Create a physical and psychological impact to


unauthorized entry;

3. Delay intrusion, thus facilitating apprehension of


intruders;

4. Assist in a more efficient, economical employment


of guards; and

5. Facilitate and impose the control of pedestrian


and vehicular traffic.

Two General Types of Physical Barriers

1. Natural Barrier

Include mountains, cliffs, canyons, rivers, seas,


marshes, deserts or terrain difficult to traverse.

2. Man-Made Barrier
Are structural constructions like fences, walls,
floors, roofs, grills, bars, road blocks, or other physical
means to deter or impede penetration.

Types of Perimeter Barriers

1. Wire Fences

Is a type of perimeter barrier made of chain link


design with mesh openings not larger than two inches square,
and made of #9 gauge wire or heavier, minimum height of
which is 8 feet.

2. Building Wall

Masonry wall should have the same height as the chain


link and surmounted by the barbed wire top guards; if the
height is less than the prescribed, additional chain-link as
“topping” is placed to attain the minimum height
requirement.

3. Bodies of Water

It is an additional security measures, surrounding the


establishment.

Kinds of Perimeter Barrier Openings

1. Gates and doors, it must be guarded and locked.

2. Sidewalk elevators, it provides access to areas


within the perimeter barriers and should be locked or
guarded.

3. Utility openings, it may be composed of sewers,


air intakes, exhaust tunnels which penetrate the barriers
and which have cross-sectioned area of 96 sq. in. or more
should be protected by bar grills, etc.

4. Clear Zones, it is an unobstructed area maintained


on both sides of the perimeter barrier. A clear zone of 20
ft. or more is desirable between the barrier and extension
structures and natural covers which may provide concealment
or assistance to a person seeking unauthorized entry. Where
it is impossible to have clear zones because of property
lines or natural features, an increment in the height of the
fencing, increased guard coverage, more security lighting,
or the use of intrusion devices in that portion of the
perimeter barrier should be done.

Additional Protective Measures

1. Top Guard

It is an additional overhang or barbed wire placed on


vertical perimeter fences facing upward and outward with a
45 degrees angle with three to four strands of barbed wires
spaced 6” apart. This will increase the protective height
and prevent easy access.

2. Sentry Stations

Normally provided at the main perimeter entrances to


secure areas located out of doors, and manned by guards on a
full time basis. Sentry Stations should be near at the
perimeter for surveillance at the entrance.

3. Guard Towers

Are house-like structure above the perimeter barriers.


It gives a psychological effect to violators.

4. Protection in Depth

In large open areas or ground where fencing or walling


is impracticable and expensive, warning signs should be
conspicuously placed. The dept itself is protection.
Reduction of access roads and sufficient notices to warn
intruders should be done. Use of animal guards and
intrusion devices can also be done.

5. Signs and Notices

Control signs should be erected where necessary in the


management of unauthorized ingress, and preclude accidental
entry, ID, prohibition, and exclusive areas signs.
Specifications for Using Chain-Link Fences

1. It must be constructed in a 8-foot material


excluding top guard.

2. It must be 9 gauge or heavier.

3. Mesh openings are not to be larger than 2 inches


per side.

4. It should be twisted and barbed salvage at top and


bottom.

5. It should be securely fastened to rigid metal or


reinforced concrete.

6. It must reach within 2 inches of hard ground or


paving.

7. It must reach below surface deep enough on soft


grounds to compensate for shifting soil or sand.

Specifications for Using Barbed Wire

1. Standard barbed wire is twisted, double-strand, 12


gauge wire, with 4 point barbs spaced on equal distance
apart.

2. Barbed wire fencing must be firmly affixed to


posts high excluding top guard.

3. Barbed wire fencing should not be less than 8 feet


high excluding top guard.

4. The distance between strands will not exceed 6


inches and midway between parts.

Specifications on Clear Zones

1. A clear zone of 20 feet or more should exist


between the perimeter barriers and exterior structures,
parking areas, natural or man-made features.

2. A clear zone 50 feet or more should exist between


the perimeter barrier and structures within the protected
areas except when a building wall constitutes part of the
perimeter barrier.

Security Specifications for Windows Openings

Windows of openings less than 18 feet above the ground,


roofs, ledges, etc., or less than 14 feet directly or
diagonally opposite uncontrolled windows in other walls,
fire escapes, or other openings of 96 sq. in. or larger
should be grilled or have steel bar protections.

Security Lightings

Security Lighting provides sufficient illumination to


areas during hours of darkness. Among its other purpose
are:

1. It improves visibility so that intruders can be


seen, identified or apprehended.

2. It gives psychological fear which serves as a


deterrent to thieves, pilferers, trespassers, and saboteurs.

3. It makes the routine work of guard easier of


identifying employees, vehicles, etc. during nighttime.

4. If placed in certain areas, may even reduce the


number of stationary guards, and instead, may require roving
patrol only at night.

Security Lightings Techniques

1. Security lighting should enable a guard to observe


clearly the activities around, and inside the premises
within his jurisdictions.

2. In planning, high contrast between intruder and


background should be provided. When contrast is poor,
increase intensity will improve guard’s ability to see.
3. Lighting boundaries and approaches, as well as the
area and structure is useful to discourage unauthorized
entries and reveal identity of persons. Good lighting
should reveal well boundaring areas, glaring to intruders
and adequate for the guard to observe his positions.

4. Effective lighting should: 1) discourage attempts


to enter the premise; and 2) detection were likely if entry
is attempted.

5. If lighting at night cannot be provided due to


impracticability, other means of protection have to be made
like additional guard posts, roving patrols and animal
guards.

Types of Security Lightings

1. Stationary Luminary

Most common type, consisting of series of fixed


luminous to light a given area continuously with overlap.
These two types are used on the entry gate of employees and
vehicles. It may either be:

1) Glare Protection Type

The intensity is focused to the intruder while the


observer or guard remains in the comparative darkness. The
lighting is toward the approach of an entrance to an
installation. Lights with reflectors increase glare.

2) Controlled Lighting

The width of the lighted-atop can be controlled


and adjusted to suit the security needs. The lighting is
focused sag on a pile of items rather than on the
background.

2. Stand-by Lighting

Similar to continuous lighting, in can be turned on


manually or by special devices or other automatic means,
when there is suspicion of entry.

3. Movable Lighting

Consist of stationary or portable, manually operated


search lights which may be lighted continuously during hours
of darkness or only as needed, and usually supplementary to
either of the first two types.

4. Emergency Lighting

A stand-by lighting which can be utilized in the event


of electrical failure, either due to local equipment or
commercial power failure.

Types of Light Lamps

1. Incandescent Lamps

Common light bulbs in which light is produced by the


resistance of a filament to electric current. For better
concentration of light, metal reflectors are used, and
directed on areas to be lighted.

2. Gaseous Discharge Lamps

Economical to use but take two or five minutes to light


which may be a disadvantage in industrial security lighting.
Examples are as follows:

1) Mercury-Vapor Lamps – blue green color light due


to the presence of mercury vapor.

2) Sodium-Vapor Lamps – emits yellow light, placed


usually in areas to connote special concern, like bridges
and streets.

3) Quarts Lamps – very bright light.

Protective Alarms

Alarm, aural or visual signal given by the annunciator


to security when intruder actuates device in a protected
area. An annunciator is a visual or audible signaling
device which initiates conditions of associated circuits.

Basically, alarm system was designed to alert security


personnel to consummated or attempted intrusions into an
area, building or compound. Each type of alarm is activated
in the event that an intruder tampers with the circuitry, a
beam, or radiated waves; intrusion alarm can be electrical,
mechanical, or electronic. Alarms are also used for fire,
smoke or other emergencies and presence of other hazards.

Types of Protective Alarm Systems

1. Central Station System

Several separate compounds tie their alarm system to a


central station so that in case of need, the central station
calls for assistance to the police, fire department,
hospital or with other government assisting units.

2. Proprietory System

Similar to the central station type except that the


proprietory console is located inside the subscriber’s
installation who owns or base the system.

3. Auxillary System

An installation owned system which is a direct


extension of the local enforcement agency and/or fire
department by special arrangement.

4. Local Alarm System

Consist of ringing up of visual or audible alarm near


the object to be protected. In case of alarm, response will
be made by the local guards and other personnel within sight
or hearing.

Desirable Characteristics of Intrusion Alarm System

Intrusion alarm devices are designed to “detect” and


not to prevent criminal acts and should be used normally as
an adjunct and not a replacement of the human guard forces.

The primary considerations on the choice of a


particular alarm system include stability, durability and
reliability. Desirable characteristics, furthermore, should
include:
1. A detection unit should initiate the alarm upon
intrusion of a human being in the area or vicinity of the
protected object.

2. Panel board central annunciator or operating


console monitoring activities should be removed at all
times. Transmission can be by physical wires or by radio.

3. An annunciator console indicating the audible


and/or aural signal and the specific location of incident so
that proper action can be made by security and other units.

4. Fail-safe features give alarms in the annunciator


when something is wrong with the system.

5. System should be difficult to tamper or render


ineffective by outsiders, competitors or saboteurs.

Operation of Intrusion Alarm System

Intrusion devices emit certain signals to the


annunciator and operate on the following principles:

1. Breaking an Electric Circuit

In a building or compound, all possible points of entry


can be wired by using electrically charged strips of tinfoil
or wire. Any action that will move the foil or wire breaks
the circuit and activate an alarm. The alarm can be local,
or near the area where circuit is broken, or can be
monitored in a distant annunciator or both.

2. Interruption of a Light Beam

This system uses a photo-electric cell or the “electric


eye” which operates on the principles of light rays. In
this system, an invisible light beam is transmitted to a
special receiver. An infrared filter over the light source
makes the beam invisible to intruders. The source of beam
is hidden, and the rays criss-cross a room by the use of
reflecting mirrors until they contact sensitive cells in the
receiver. This device terminates by wire to a console in
the security control room. When an intruder breaks the
beam, an alarm is activated.
The disadvantages of photo-cell include: the beam can
be bypassed by crawling underneath or climbing over it; its
requirements of a rigid or outdoor installations are not so
effective because of fog, smoke, dust, rain and other
obstructions to vision when defuse enough can interrupt the
light and trigger false alarms.

3. Detection of Sound and Vibration

This can be utilized effectively to safeguard enclosed


areas vaults, safes, storage bins, file rooms, warehouses,
and similar enclosures. Supersensitive tiny microphones are
embedded in the walls, ceilings and floors of the enclosure
to be protected by sound or vibrations. These microphones
distributed evenly can detect sound or vibrations of sound
caused by attempts to force entry into the protected area.

The main advantage of this detector device is its


relatively low cost and easy installation. The amplifier
which monitors the sound from the microphone can be adjusted
to suit the sensitivity level requirements. The obvious
disadvantage is its limited application to enclosed vaults,
and depositories where minimum external sound exists. It is
not satisfactory where minimum external sound exists. It is
not satisfactory where high ambient noise level are
encountered because of the proximity to construction sites,
aircraft traffic, and vehicular movements.

4. Space, Motion and Vibration

These systems usually derive their operating principle


from a physical phenomenon known as “Doppler Effect.”
Constant sound waves in a cubicle disturbed by an object
will cause change of frequency and wave motion thereby
causing an alarm to trigger.

5. Electromagnetic Fence

Is an electronic fence consisting of 3 to 5 strands of


wire spaced from 9 to 24 inches above one another which
serves as an antenna, a monitor panel, and an electric
circuitry. When power is put on, an electro-magnetic field
is set among the wires from the top to the ground. An
intruder about two feet from this field will trigger an
alarm. The fence is zoned to pinpoint areas of intrusion to
a monitor located in the operation room of security. This
system is suggested to be located inside the chain-link
fencing to minimize nuisance alarms caused by animals,
debris blown by the wind, and harmless trespassers.

Security Communication System

In any plant or industrial complex, inter and intra


communications is indispensable not only in security work,
but also in the plant operation itself. It is a good
management policy that security should have its own
communication line officers within the installations and to
the outside.

The security force needs a communication landline to


call local law enforcement agencies, the fire department,
ambulance, mobile patrol and other governmental agencies.
Telephone is also needed to contact the agency’s main office
or security force outposts. The following are some means of
communication that can be a useful part of the protective
system:

1. Local telephone exchange

2. Commercial telephone service

3. Inter-communication

4. Two-way radios for security, i.e., base, portable,


and mobile.

5. Security supervising system and “beep-beep.”

6. Paging and recall system

7. “Bull-horns” or megaphones

8. Amplifier or loud speaker system

Identification and Control

Identification and control objective include precluding


unauthorized entry and facilitating authorized personnel to
enter specific areas, as well as preventing the introduction
of material components of harmful materials,
misappropriation, pilferage of installation properties and
recorded classified information.
Identification and control objectives are achieved by:

1. Initially determining who has valid right in the


areas;

2. Limiting access to those persons who have a right


and need to be there;

3. Establishing procedures for positive


identification of persons authorized access into areas;

4. Issuing passes or badges to those authorized to


enter restricted areas;

5. By using access list, identification codes, and


duress code.

What is a Pass System

A pass or badge is issued by security for personnel to


be admitted in the installation. This system precludes those
visitors with escorts and personnel in the access list. The
pass system is for general use and not for restricted areas
like exclusive, limited and controlled areas. The following
are systems recommended:

1. Single Pass or Badge System

Pass is issued for permission to enter different


specific areas by letters, numerals, or colors. For example,
green backgrounds of current passes in the general area, or
white pass with overprinted blue symbols for a certain
specific areas.

2. Pass of Badge Exchange System

Multiple copies of passes are issued to an individual


with the same photograph. The individual exchange his badge
for another color or numeral at the gate. Once inside, if he
needs to enter a restricted area, he exchanges it for one of
another color acceptable in that area.

Visitor, Property, Movement and Vehicle Control


A visitor is any person not regularly employed in a
plant or firm. Strict precautions are taken with visitor
against pilferage, sabotage and other crimes. Plant visitors
can be suppliers, promoters, collectors, customers,
government inspectors, contractors, job-seekers, group
visitors, guided tours, and others.

Passes or badge may be issued to visitors indicating


area to be visited and escorts requirements. Likewise,
movement of packages should be controlled, closely
inspecting all incoming and outgoing packages, with
inspection to all the vehicles. Trucks entering and leaving
the area should be inspected. Trucks have been found to have
special components, items placed inside the spare tire, tool
boxes, and even in fake gasoline tanks.

What is a Protective Lock

A protective lock is defined as a mechanical,


electrical, hydraulic, or electronic devised designed to
prevent entry to a building, room, container or hiding
place.

Four General Groups of Key Locks

1. The Warded Lock

The underlying principle is the incorporation of wards


or obstructions inside the lock to prohibit a key from
operating the bolt unless the key has corresponding notches
cut in it so that it will pass the wards.

2. The Lever Tumbler Lock

Each lever hinges on a fixed point and is held down


against a stop by the pressure of a flat spring. Each lever
has a cut in tilt, and all the gates can be located at
different places. When the proper key is inserted and
turned, notches of various depths raise all the lever
whatever distance is required to line up all the gates
exactly opposite the fence on the bolt. When the key is
turned, a portion of the key catches the bolt and slides it
back. Because there is no resistance to the post entering
the gate, the lock is opened. If the key is not the correct
one and if even one gate does not line up to let the post
slide into it, the lock cannot be opened.

3. The Disc Tumbler Lock

Also known as the woofer tumbler type, has flat metal


tumblers with open center fitted into slots in a plug which
is in turn fitted into a lock case. When the plug is turned,
it activates a cam. The key is removable at 90 to 180
degrees and may be rotated either right or left. The disks
are under spring tension forcing them partially out of the
plug into recesses in the case thereby preventing the
cylinder from turning. Rectangular openings in the disk
tumblers are out into various longitudinal dimensions
requiring corresponding cuts in the key to position the
tumblers. Proper unlocking positioning of the tumblers is
accomplished when they are withdrawn from the recesses in
the body of the lock to position flush with the plug,
allowing the plug to turn the cam which causes the
withdrawal of the bolt.

4. Pin Tumbler Lock

The pin tumbler mechanism depends for its security, on


a number of round pin or tumblers operating on a cylinder.
Each tumbler or pin is divided into two parts: the upper,
which is flat on both, is called the driver; the bottom part
called the pin is rounded or slightly pointed on the lower
end to fit the grooves or cuts in the key. A coil spring
above each driver constantly forces it downward. When the
right key is inserted, the various depths of the cuts in the
key compensate for the different lengths in the pins. The
dividing points between each of the two pins segment are
brought into line with the top of the plug, and allowing it
to rotate in the cylinder. When the plug turns, it carries
with its cam which activates the bolt and other lock
mechanism.

What is a Padlock

A portable and detachable lock having a pivoted or


sliding hasp which posses through a staple ring, or the
like and is then made fast to secured.

What is a Combination Locks


Is a lock that requires manipulation of parts according
to a predetermined combination code of numbers of letters.

What is Key Control

The management of keys in a plant or business


organization to prevent unauthorized individual access to
the keys.

What is a Master Key

It is a special key capable of opening stories of


locks. This key is capable of opening less number of locks
than the grand master.

What is a Master Keying System

A system used in big installations whereby keys can


open a group or groups of locks. This is possible by the use
of interchangeable cylinder cores in the locks. Using locks
with the same key in a facility is not master keying or the
use of a pass key. It is used to operate an inexpensive lock
by moving it in the key hole until it catches a locking belt
and unlocks the mechanism.

Master keying is when a lock operates on a master key


plus an individual or changes key. Master keying is made
possible due to the development of interchangeable cylinder
cores. In matters of seconds, keys and lock combination can
be changed, and this is done by the use of a “control key”.
With this key, all the cores in a locking system can be
changed rendering the existing keys not usable.

Levels of Control in the Master Keying Plan

1. One-Level–Change Key

All locks operated by the change key only and the keys
are different or alike or required. Each key operates its
own lock only. Examples are the houses, stores, cars,
warehouses.

2. Two-Levels–Master Key

All levels operated by change keys and master key.


Master key operates all locks generally of one building.
Example: small school, apartment.

3. Three-Levels–Grand Master Key

All locks operated by change key, master keys, and


grand master keys. Grand master key operates all locks
generally used in large buildings or a facility with several
buildings. Example: office buildings, hospitals.

4. Four-Levels–Great Grand Master Key

All locks operated by change key. Grand master keys and


great grand master keys. Used in great or large complex
system and similar to three levels.

5. Five-Levels–Great-Great Grand Master Key

All locks operated by change key, master key, grand


master key and great grand master key , and great great
grand master key. Example: big universities, complexes,
large industrial complexes.

Pointers for Effective Locks and Key Control

1. Records of all keys issued and names of holders


must be meticulously made regardless of the size of the
establishment.

2. Storage key is important. Duplicate or spare keys


should be stored in a securely locked cabinet in a secure
area.

3. Master key should be ensued on an absolute minimum


number, and must be kept by an individual responsible for
locks and keys.

4. Regular checks should be made in employees with


keys issued.
5. Issuance of keys and locks should be carefully
controlled, and issuance should be on a real-need basis.

6. Periodic re-keying should be considered as


essential security safeguard just as combination of safes
are changed from time to time.

7. A key depository should be provided in a big


plant. Supervisors taking keys should register in registry
book.

What is Maison Keying

The issue of key to open the main entrance and the


office.

What is a Coded Lock

This is a type of lock that can be opened by inserting


a coded card in a slot in the lock, or by pushing the
correct buttons on the surface of the lock.

What is Electronic Lock

It is a type of lock that can be closed and opened


remotely by electronics means.

Types of Fire Protection

1. Automatic Sprinkling System

It is a type of built-in sprinklers which works by the


increase of room temperature and which automatically
operates to put out the fire. Attached and distributed in
the ceilings of the rooms, these sprinklers will go into
action once a fire starts, and those that will open are
those directly above the fire and water is delivered right
where it is needed.

1) Wet Pipe System


The piping has water with pressure, and the water
sprinkler will operate when head is open and water will
continue to flow until shut off.

2) Dry Pipe System

The pipes are filled with air under pressure which


holds the water at the valve located in a room. When
sprinklers head goes into operation, air is released,
trapping the dry pipe valve and allowing water to flow
through the system.

2. Fire Pump

It is a mechanical device of supplying water which can


be manual or motor-driven. These pumps are ideal when
natural supplies of water are readily available like a
rivers, lakes or streams.

3. Stand Pipe

Are G.I steel or plastic pipes located inside a


building from the lowest to the top floor with water under
pressure for use in case of fire. Located near the standpipe
is a fire hose usually enclosed in a glass box handy for
use. In case of fire, the hose is screwed into the standpipe
outlet and a valve is opened to release the water. The water
for standpipe can come from a storage tank at the roof or
from a series of water pumps.

4. Fire Hydrant

A mechanical device strategically located in an


installation or street where a fire hose is connected so
that water with pressure will be available to extinguished a
fire.

5. Portable Hand Extinguishers

It is a fire fighting equipment which can be portable


or in a cart that is used to put out fire depending on the
contents to extinguish certain types of fires as class A to
D. This is the most important and useful piece of fire
fighting equipment in a plant, building, or facility.
Classes of Fires

1. Class “A” Fires

These fires results from the burning of wood, paper,


textiles and other carbonaceous materials. Extinguishment
of this type is by quenching and cooling. Extinguishers
which have water, sand, acid, foam and the special solution
of alkali methyl dust, as found in the load-stream
extinguisher, should be used for this type of fire.

2. Class “B” Fires

Are those caused by flammable liquids like kerosene,


gasoline, benzene, oil products, alcohol and other
hydrocarbon derivations. This type is put out and
controlled by foam, loaded-stream, carbon dioxide, dry-
chemical and vaporizing liquid. If water is used here, it
might even spread the flame, or explosion may ensue.

3. Class “C” Fires

Are those which start in live electrical wires,


equipment, motors, electrical appliances and telephone
switchboards. The extinguisher that should be used for such
fires are carbon dioxide, dry-chemical and vaporizing
liquid, as the soda-type can even electrocute the
extinguisher holder. In case of class “C” fires, source of
electricity should be shut off. It becomes mandatory and
good practice to put fuses in the circuit so that in case of
ground or short, the power will be put off by the blowing of
the fuse, or if circuit breaker is used, it will trip an
open circuit.

4. Class “D” Fires

This fire is the result of the combustion of certain


metals in finely divided forms. These metals can be
magnesium, potassium, powdered aluminum, zinc, sodium,
titanium, lithium and zirconium. This type of fire can be
put-out by GI type, meth LX, Lith X, meth L KY, dry sand and
dry talc.

Recognizing Fire Hazards


1. Cigarette buts or any other evidence of smoking in
a no-smoking area.”

2. Oily rags. Rags which are used around motors are


particularly dangerous. The heat from the motor can easily
set them afire.

3. All heating equipment. Any equipment which


produces heat can also produce fire.

4. Flammable boxes and papers stacked or left next


to heating equipment.

5. Open cans of gasoline, paint, paint thinner,


alcohol and other flammable material.

Principles of Extinguishing Fires

1. Cooling or Quenching

Using water or water solution, the temperature of the


substance is lowered below the burning point.

2. Smothering or Blankering

Oxygen content of air is reduced below 15%-from normal


of 21% in volume by using chemicals, fog, sand blankets,
etc.

3. Starving or Cutting-Off

Supply of fuel or material is cut off, as in gas jet.

Types of Fire Extinguishers

1. Dry Chemical Extinguisher

2. Foam Extinguisher

3. Loaded Stream Extinguisher’

Types of Business Records

1. Class 1 – Vital Records


Includes the records that are irreplaceable; records
wherein reproduction of which does not have the same value
as the original; records needed to recover cash to replace
buildings, equipments, raw materials, finished products and
records needed to avoid delay in restoration of production,
sales and services.

2. Class II – Useful Records

Includes records which loss might cause inconvenience


but could be readily replaced and which would not in the
meantime present an insurmountable obstacle to the prompt
restoration of the business.

3. Class III – Important Records

Include records, the reproduction of which will involve


considerable expense and labor, or considerable delays.
Operating and statistical records belong to this class as
well as those to maintain check on efficiencies, operating
costs, etc. Also included are contracts, customer credit
files, sales records, design in process development, records
of experiments in progress, etc.

4. Class IV – Non-Essential Records

Are the daily files, and routine in nature so that even


if lost or destroyed, will not affect operation and
administration of the plants or firms.

Categories of Storage Containers

1. Class 1

Commercial record safes designed for fire protection.

2. Class 2

Commercial money safes designed for robbery and


burglary protection.

3. Class 3

Security cabinets designed to meet specifications for


safeguarding classified materials.
Some Tests for Safes Fire Resistance

1. Fire Endurance Test

A safe should not have any one time a temperature above


350 degrees Fahrenheit.

2. Explain Hazard Test

Test to determine if the sudden rise in temperature


will not cause the safe to rupture. If the safe can
withstand 2000 Degrees Fahrenheit for 30 minutes and will
not crack or open, then it has passed the explosion test.

3. Fire and Impact Test

Aimed at determining the strength of a safe to


withstand the collapse of a building during a fire.

What is a Safe

A metallic container used for the safekeeping of


documents or small items in an office or installation. Safes
can be classified as either robbery and/or burglary
resistant depending upon the use and need. Many safes are
required to be installed in steel-clad concrete blocks to
prevent being carted away by the thieves and robbers.

What is a Vault

A heavily constructed fire and burglar–resistant


container usually a part of the building structure used to
keep and protect cash, documents, and negotiable
instruments. Vaults are bigger than safes but smaller than
security file rooms.

What is a File Room

A cubicle in a building constructed a lighter than a


vault but of bigger size to accommodate limited people to
work on the records inside.
CHAPTER

20

SECURITY SURVEY AND INSPECTION


===========================================================

What is a Security Survey and Inspection

A fact-finding probe to determine the plant’s adequacy


and deficiency in all aspects of security, with the
corresponding recommendations.

What is a Survey

The term applied to the first detailed “look-see”


conducted by a team.

What is Inspection or Follow-up Survey

The term used for succeeding surveys after the initial


survey.

What is a Supplemental Survey

Conducted when there is business reorganization with


corresponding changes in objectives and physical lay-outs of
the complex.

What is a Special Survey

Directed by the management, if the initial survey


appears to have left certain portions or aspects involving
security due to change in policy or operations that will
greatly affect the total security picture.

What is Entrance Conference


A conference or dialogue between the survey team and
the management, and officials of a plant before security
survey is conducted.

What is Exit Conference

A conference similar to entrance conference and it is


done after the completion of the security survey.

Who Performs Security Survey & Inspection

Security survey is performed by qualified security


experts who can be from the organization or outsiders
contracted to do the job. Recommendation will fall into
three categories:

1. human guard;

2. equipment; and

3. procedures.

What is a Security Education Program

The exposure and teaching of employees on security and


its relevance to their work.

What are the Objectives of Security Education Program

1. Guidance for all supervisory and executive levels


of the organization;

2. A mandatory indoctrination on security for all new


personnel before their assignment to their respective jobs;

3. Development of high-degree of security


consciousness among the selected supervisors and other key
personnel in a program that should be containing and
supported by top management;

4. A down-the-line security program aimed at


installing consciousness and dedication through
demonstration, lectures, motivations, and suggestion.
5. To let all the employees informed that they all
belong to the organization and that non-awareness and non-
concern to the security program is tantamount to disloyalty.

6. To develop discipline, loyalty and belongingness.


These attributes when fully imbued will result in
effectiveness and efficiency.

Requisites of Effective Security Education Program

Security education program to be effective must have


the support and sanction of top management, the main thrust
being to acquaint all personnel on the reasons for the
security measures. This program should be given to all
personnel from the work group that has no access to
classified endeavors, to the supervisors and executives
handling sensitive plans and policies of the industrial
firm. The program is given a “follow-through” which will be
continuing and tailored to the specific group levels
depending on their access to restricted work and activity.

Definition of Terms

1. Access List

An authenticated list of personnel given to security


allowing entry to a compound or installation or part
thereof.

2. Audit

An official verification and examinations of accounts


and records.

3. Badge System

A system for personnel movement and control whereby


badges or identification are issued to personnel upon
entering an installation. Visitors are also issued temporary
badges when entering the installations.

4. Background Investigation
A check made on an individual usually seeking
employment through subject’s records in the police files,
educational institutions, places of residence and former
employers.

6. Complete Background Investigation

Same as B.I but more comprehensive to include places of


residence since birth.

7. Controlling

The regulation of many different aspects of business


activity. Controls are needed to standardize quality and
performance, protect assets, measure performance, balance
plans and programs, and motivate individuals.

8. Controlled Area

An area near or adjacent to limited or exclusive areas


where entry is restricted.

9. Coverage Factor

The minimum number of directions from which each point


in the area should be lighted depending upon the use of the
area.

10. Doppler Effect

A physical phenomenon that causes frequency shift if an


object moves in an area permeated by radio frequency
signals. This change in certain types of alarms activates a
signaling unit.

11. Dry-run

Practical test or exercise of a plan or any activity to


test its validity; it is also an operational readiness
exercise.

12. Duress Code

A type of code system so that security personnel when


forced by armed men to enter an installation can give alarm
by the use of certain words in casual conversation with
other personnel in the installation.

13. Exclusion Area

A restricted area containing materials or operation of


security interest.

14. Fail-Safe

A term applied to a device or system that in the event


of failure of a component—the incapacity will be signaled.

15. Peterman

A term used in England for lock pickers, safecrackers,


and penetrators of restricted rooms or areas.

16. Program of Instruction

A list of subjects, number of hours, name of


instructors, venue of training for a certain course.

17. Automated Records

Records accumulated by electronic data processing


system (EDPS) like tapes, memory devices, reels, and storage
cases.

19. Restricted Area

Any area, access to which is subject to special


restriction control.

20. Victimology

A special study concerned with what makes an individual


a victim of crime.

Important Factors on Security Survey

1. Surveys must be exhaustive and complete.


2. Hazards must be identified with specific
recommendations for elimination, neutralization or
reduction.

3. Deficiencies found should be described in detail,


and if possible with photos, sketches, diagrams, maps and
other explanatory notes.

4. Early surveys should be reviewed so that the


current survey will determine the improvement in the former
deficiencies.

5. Recommendations should be consistent with the


current situations, facilities, resources available, and
most of all concomitant with the organization’s objectives
and goals. Time-phasing of the recommendations should be
also recommended especially on execution.
CHAPTER

21

HUMAN RESOURCES IN SECURITY


AND SAFETY INDUSTRY

===========================================================

The Security Guard

The key element in the security survey system of a


plant or installations is the human guard. Without this
human element, all the mechanical, electrical, and
electronic protective aids, as well as security techniques
would be worthless. It is the human guard, as a part of the
security enforcement medium, who contributes the thought
processes and all the human senses to the security system.
The electronic device may sound the alarm, the television
camera may spot the culprit, and the mini-computer may
trigger the red button, but it is the guard responds and
initiates the necessary action.

Procedures in the Selection of Guards

The selection of the guards must be done with care and


meticulousness. The guard occupies an important slot in the
whole security system. Such a guard, to be effective and
useful, must be physically able, mentally alert, morally
responsible, reliable, and must be stable under pressure.
Above all, he must be responsive to his work to a point of
dedication.

The Company and the Contract Guards

There are two different ways in which security guards


are hired or employed. Those who are hired directly under
the payroll of an employer to protect the employer’s
property are called company guard, or “in-house” guards, and
they are considered employees of that company. Government
guards are included in this category.
Other individuals or entities prefer to avail the
services of an outside firm providing security guards on
contract basis. These firms are the private security
agencies, specializing in providing trained security guards.
The security guards employed under contract are employees of
the agency.

In the local setting, there are more contract agency


guards than company or government guards. Their jobs are
all basically the same, the only difference are their
employers.

There are more contract guards from private security


agencies hired by government entities and privately owned
companies or corporations for the reasons that it is more
practical, less expensive, and with better trained
personnel.

Advantages and Disadvantages of Agency and Company Guards

1. Advantages of Agency Guard Force

1) More economical;

2) Security administrative problems are reduced;

3) Problems related to recruitment, pre-employment


investigation and training are eliminated;

4) Absenteeism and vacation leaves are eliminated;

5) Security personnel are separated from co-employee;

6) In case of accidents or deaths, the agency takes


care of the cumbersome details;

7) In case of emergencies, extra guards are easily


available, and

8) In case of company strikes, the agency guards will


be on duty to carry out their assigned duties.

2. Disadvantages of Agency Guard Force

1) Lack of training;

2) Low-caliber employees;
3) No company loyalty;

4) Project poor image;

5) Large turn-over, and

6) Not familiar with plans.

3. Advantages of Company Guard Force

1) Generally high caliber as they receive higher


wages;

2) Generally, they provide better services;

3) Can be trained to handle some of the more complex


security duties;

4) Less turn over;

5) They are more familiar with facilities that they


protect, and

6) They tend to be loyal to the company of which they


are a part.

4. Disadvantages of Company Guard Force

1) Cost more;

2) May be required to join a guard union, and

3) Problem of ensuring availability of back-up


personnel.

Importance of Training to Security Guards

Security organization which does not have an adequate


and continuing training program for its personnel will not
be able to offer efficient and reliable security services.
It is not only dangerous but a criminal act to assign a
guard who has not been properly indoctrinated and trained.
Although the extent and type of training for guard forces
will vary according to the importance, type, vulnerability,
size, and other factors affecting a particular plant or
industrial complex, yet, there are basic subjects and skills
that guards must learn before performing their assigned
duties.

The untrained security guard may do unnecessary harm to


employees in the performance of his job. He may use his
firearm while a simple knowledge in martial arts will
suffice. It will require more untrained guards to perform
certain tasks, to meet the same situation than utilizing
trained ones. Efficient and continuing training is the
effective means in improving the proficiency of guard
personnel. Regardless of how careful the recruitment of
guards is made, seldom will they qualify for immediate guard
duty.

Besides, a trained guard may require re-orientation, if


not training, due to new or revised job requirements can be
gapped by proper training. Saving by limiting is poor
investment and a form of criminal negligence.

Benefits Derived from the Training of Security Guards

1. Good training helps provide for more flexibility


and better physical protection. Fewer personnel and less
time may be required for trained men to perform guard
requirements. Training also helps establish systematic and
uniform work habits. An effective program will help create
attitudes and improve morale.

2. Training in whatever form benefits the guard to


the extent that skills are upgraded which provides increased
opportunities for promotion, improves better understanding
of his relationship to management. Training also increases
self-confidence, and an ingredient needed for work
reliability.

3. Training gives the supervisor better tools to do


his tasks efficiently among his guards. Due to increased
supervisory skills, less time is wasted and fewer mistakes
made. Resulting economies are to benefit the organization.
There will be smoother relations with other agencies. A
good program instills confidence which is an important asset
of the guard force.
The Security Officer

A security officer is charged with directing the work


and observing the behavior performance of the men under his
unit. The effective supervisor must posses the necessary
leadership, human understanding, and job knowledge to do his
work. The principal task of leadership within an
organization is to ensure that the efforts of all members
are estimated to capacity and effectively directed toward
the primary objectives of the organization.

The quality of leadership reflected in the appearance,


spirit, bearing, demeanor, words, action and work of
subordinates. Members of a unit under effective
supervisorship enjoys doing their work, hence, they are
proud of their organization, carry out instructions, and
request cheerfully and willingly, and work indefatigably for
long hours under comfortable conditions without question or
complaint.

In contrast, subordinates under inferior leadership are


frequently dissatisfied with their jobs, dislike their
duties, resent instructions and request from their
superiors, and avoid accepting new responsibilities. Good
leadership transforms indifferent, dissatisfied, disloyal,
and inefficient personnel into loyal, agreeable,
hardworking, interested, and efficient men who derived great
satisfaction in the accomplishment of their assigned tasks.

Goals of Security Officer

The most important role that a security officer can do


is to create in each individual a sense of vigilance,
alertness, careful thinking, and the ability to recognize
and report all security infractions to the proper
authorities and make spot corrections of minor security
violations in order that remedial measures can be instituted
right away.

Security is an all-of-the-time job both for the


individual and the security officer. The security officer
must keep every member of his unit alerted to possible
dangers to security. He must stimulate interest in a
security program and generate the willingness on the part of
every man and woman to be more careful in talking about his
or her job, handling classified information, or guarding
restricted areas. The individual must at all times careful,
alert and ready to act. And it is the goal of a security
officer.
CHAPTER

22

REPUBLIC ACT NO. 5487


===========================================================

What is Republic Act No. 5487

This is an “Act to Regulate the Organization and


Operation of Private Detective, Watchman or Security Guards
Agencies” or the “Private Security Agency Law,” approved and
took effect on 13 June 1969, as amended by PD No. 11, dated
03 October 1972, PD No. 100, dated 17 January 1973, PD No.
1919, and EO No. 393, dated 10 May 1972.

Who is In-Charge with the Implementation of RA No. 5487

The Chief, Philippine National Police (C, PNP) through


the SAGSD, CSG or the former Supervisory Office for Security
and Investigative Agencies, Civil Security Unit (SOSIA, CSU)
as provided by Sec. 35, RA No. 6975, in close coordination
with PADPAO, Inc.

SAGSD is an administrative support unit of the PNP


which is in charge with the supervision, direction and
control of all Private Security Agencies (PSA) and Private
Detective Agencies in the country. The Group Director (CG,
CSG) acts in the name of the C, PNP on matters, duties, and
powers delegated by him to the latter.

Definition of a “Person,” as Provided by RA No. 5487

As used in RA 5487, a person shall include not


only natural persons but also a juridical person such as
corporation, partnership, company or association duly
registered with the Securities and Exchange Commission
(SEC).

Who are the Watchmen or Security Guards


They are any persons who offers or renders personal
service to watch or secure either residential or business
establishment, or both, or any building, compound, or area,
including, but not limited to, logging concessions,
agricultural mining or pasture lands, for hire or
compensation, or as an employee thereof, including any
employee of the national or local government or any agency
or instrumentality thereof and of government-owned or
controlled firms or corporations, who is employed to watch
or secure government buildings, compounds, premises and
other properties other than members of the Armed Forces of
the Philippines, guards of the Bureau of Prisons, Provincial
and City Jail Guards, and members of city and municipal
police forces.

Who are the Private Detectives

A private detectives are any persons who are not a


member of a regular police agency or the Armed Forces of the
Philippines who does detective work for hire, reward, or
commission.

What is a Private Detective Agency

A PDA is any person who for hire or reward or on


commission, conducts or carries on or holds himself out as
conducting or carrying on a detective agency or detective
service.

What is a Private Security Agency

Any person, association, partnership, firm or private


corporation, who/which recruit, trains, furnishes, or
employs any watchman or security guard, or solicits
individual, business firm, private, public or government-
owned or controlled corporation to engage his/its watchmen
or security guards.

License to Exercise Security and Detective Profession

License or certificate to exercise profession is any


document issued by the C, PNP or his duly authorized
representative recognizing a person to be qualified to
perform his duties as security guard or detective.

License to Operate a Security and Detective Agency

It is a document issued by the C, PNP or his duly


authorized representative authorizing a person to engage in
the occupation, calling or employment as security guard or
detective, or a juridical person to establish, engage,
direct, manage or operate an individual or a private
detective agency, private security agency or company
security force after payment of the prescribed dues or fees.

What is a Company Security Force

It is a security force maintained and operated by any


private company/corporation for its own security
requirements.

What is a Government Security Unit

It is a security unit maintained and operated by any


government entity other than military and/or police, which
is established and maintained for the purpose of securing
the office or compound and/or extension of the government
entity.

What do you mean by the term PADPAO, Inc.

The term PADPAO, Inc., means Philippine Association of


Detectives and Private Agencies, Incorporated, the umbrella
organization for PSA and PDA.

What do your mean by the term SAGSD, CSG, PNP

The term SAGSD, CSG, PNP, means Security Agency and


Guards Supervisory Division, Civil Security Group,
Philippine National Police, a government agency involved in
the personal supervision of the affairs of the PSA and PDA.
What are the Branches of SAGSD, CSG, PNP

The branches of the SAGSD, CSG, PNP are as follows: 1)


Administrative Branch; 2) Operations Branch; 3) Research,
Records & Statistics Branch; AND 4) Special Action Branch.

Who May Organize and Maintain PSA and PDA

Any Filipino citizen or a corporation, partnership, or


association, one hundred percent of which is owned and
controlled by Filipino citizens may organize and maintain a
private security agency or private detective agency.

Basic Requirements of Operator or Manager of PSA and PDA

The operator or manager of an agency including managers


of branch offices, must be a Filipino citizen, shall not be
less than 25 years of age, a college graduate and/or a
commissioned officer in the inactive service or retired from
the Armed Forces of the Philippines or the Philippine
National Police, or graduated/taken a course in concepts and
methods in Industrial Security and Security Management
and/or must have adequate training or experience in security
business, of good moral character, not having been convicted
of any crime involving moral turpitude and not suffering
from any of the following disqualifications:

1. Dishonorably discharged or separated from the


Armed Forces of the Philippines or Philippine National
Police or separated for cause from any government entity or
government-owned or controlled corporations;

2. Being mentally incompetent;

3. Being physically unfit;

4. Addicted to the use of narcotic and/or prohibited


drugs and/or substances;

5. Habitual drunkard or alcoholic

6. Elective or appointive government employees who


may be called upon on account of the functions of their
respective offices in the implementation and enforcement of
the provisions of RA 5487, and any person related to such
government employees by affinity or consanguinity in the
third civil degree shall not hold any interest, directly or
indirectly in any security guard or watchman agency on
account of the functions of their respective offices in the
implementation and enforcement of the provisions of RA 5487
as amended, and the rules and regulations implementing the
Private Security Agency Law.

Typical Organizational Structure of PSA, PDA, CSF and GSU

1. Private security agencies shall conform with the


organizational structure, personnel, equipment, training and
clothing as provided for in RA 5487, as amended and its
implementing rules and regulations. The initial; requirement
of 100 guards shall be contracted during the 1 st year of
operation until the 200 guards minimum requirement shall
have been complied with for the succeeding year of
operation.

2. Company security forces shall be organized to


conform substantially with the organizational structure
prescribed for private security agencies.

3. Government security unit shall be organized to


conform with the organizational structure of the government
firm but not contrary to the organizational structure as
prescribed for private security agencies.

Where are the Main/Branch Offices of PSA, PDA, CSF and GSU

All agencies shall maintain a main office in their


registered addresses. Branch offices shall be established
and maintained in other provinces/cities where they have at
least an initial employment of 10 guards during the 1st year
until the 30 minimum guard requirement shall have been
complied in the 3rd year operation. Branch offices
established in region outside NCR shall be required to
register their presence at SAGS District Office and Regional
PADPAO.

What is a Security Service Contract


Private security agencies shall render security
services to their clients only after a service contract duly
notarized shall have been executed between them. Such
contract must stipulate among other things; the money
consideration to be paid by the client to the agency; the
number of hours of security service per guard per day which
the guard himself shall render to the client, and the salary
each individual security guard shall received from agency.

What is the Tenure of Security Personnel

The tenure of security personnel shall be co-terminus


with the service contract between the PSA and the client.
However, the services of any security personnel shall be
terminated on the following grounds:

1. Expiration of contracts;

2. Revocation of license to exercise profession;

3. Conviction of crime involving moral turpitude;

4. Loss of trust and confidence;

5. Physical and mental disability, and

6. Any other violation of the pertinent rules and


regulations.

The Term “Payrolls” as Provided by RA No. 5487

Private security agencies shall prepare payroll with


the name of security guards arranged alphabetically and
numbered consecutively. These payrolls shall be personally
signed by the payees only after receipt of the amounts shown
therein. Separate payrolls for distant detachments/posts
shall be prepared and similarly signed by the payees or his
duly authorized representatives as the case maybe. Payrolls
shall be filed with the main office within 15 days after pay
day. The use of the payroll form shall be in accordance
with the standard format as prescribed by law.
Qualifications of a Watchmen or Security Guards

No person shall be licensed as Security Guard unless he


possesses the following qualifications:

1. Filipino citizen;

2. High school graduate;

3. Physically and mentally fit;

4. At least eighteen (18) years of age but not more


than fifty (50) years old;

5. Has undergone pre-licensing training course, and

6. Must not possess any disqualification

Foreigner or any another person who was already


employed as security guard or private detective prior to the
approval of RA 5487, as amended, shall not be subject to
the above qualifications.

The qualifications of a government security guard who


shall apply for license to exercise his/her profession shall
be as prescribed by the implementing rules and regulations.

Person Exempted from the Pre-licensing Training

1. Veterans and retired military/police personnel or


honorably discharged military/police personnel possessing
all the qualifications mentioned shall be exempted from pre-
licensing seminar which is a requirement for the issuance of
license to exercise profession as a security guard;

2. Graduates of ROTC advance/basic, and/or its


equivalent in the AFP, CAFGU/CHDF, or its equivalent in the
PNP. Training graduates shall be exempted from the required
basic licensing seminar.

What are the Qualifications of a Private Detective


No person shall be licensed as a private detective,
unless, in addition to the initial qualifications, shall
possesses the following:

1. Holder of a baccalaureate degree of Bachelor of


Law, or

2. Holder of a degree of Bachelor of Science in


Criminology, or

3. Graduate of a Criminal Investigation Course


offered by the then PC/INP or the NBI or any police training
school or detective training with authorized/recognized
training center for security guard.

4) Advance ROTC/CMT graduates.

What is the General Scope of Detective Work

A Private Detective shall operate on a covert type of


mission on a specific confidential order issued by his
agency. The nature of his mission may defend on the
contract between the client and the detective agency. It
shall include:

1. Personal Security Investigation/Background


Investigation;
2. Locating missing persons;

3. Surveillance work, and

4. Such other detective work as may become the


subject of contract between the agency and its clients
provided it is not contrary to law, public order, public
policy, morale and good custom.

What is the Territorial Power of the Security Guard

A security guard shall watch and secure the property of


the person, firm or establishment with whom he is or his
agency has a contract for security services. Such services
shall not however, extend beyond the property or compound of
said person, firm or establishment except when required by
the latter in accordance with the terms of their contract to
escort big sums of money or valuables or in some cases, in
hot pursuit of criminal offenders.

What are the Qualifications of Security Officers

No person shall be licensed as a security officer


unless he has the following qualifications:

1. Filipino citizen,

2. Holder of baccalaureate degree;

3. Physically and mentally fit;

4. Has graduated from security officer training


course;

5. Retired personnel of the PNP or AFP; and

6. Must not possess any disqualifications;

What are the Basic Requisites in Applying for License

1. Any person possessing all the qualifications and


none of the disqualifications, may apply for a license or
license certificate to engage in the occupation, calling or
employment as certified guard or private detective.

2. Any person qualified under the rule to engage in


business of private security agency or private detective
agency may file a license to operate.

3. Applicants for Private Security Agency license to


operate shall be required to present a minimum
capitalization of one million pesos (P1,000,000.00) and a
minimum bank deposit of five hundred thousand pesos
(P500,000.00) in order to start its business operation.

Where an Application for License to Exercise Profession or


Permit to Operate a PSA, PDA, CSF and GSU can be Filed

The application to operate a private security


agency/company guard force shall be filed with the office of
the C, PNP thru the C, SAGSD using SAGSD Form No. 01-94 and
SAGSD Form No. 02-94, respectively.

What is the Graduated Scale of License for PSA and PDA

The issuance of license to operate a private security


agency and private detective agency shall conform with the
following graduated scale which shall be approved by the C,
PNP or his duly authorized representatives.

1. PSAs with temporary license to operate having 200


guards or more but not exceeding 1,000 shall be issued a
regular license to operate good for 2 years.

2. New PSAs shall be issued a temporary license to


operate good for 1 year.

3. PSAs with temporary license to operate having


posted 100 guards or more but less than 200 guards shall
upon expiration of such license be issued an extension
period to operate good for 6 months period. No additional
extension of license shall be granted unless the PSAs
concerned shall submit a certification for the posting of at
least an additional 50 guards thereby making a total of 150
or more guards.
4. PSAs with extended temporary license to operate
shall upon expiration of such license but still fail to
comply the 200 guards requirement, shall be granted
additional extension of another 6 month period in order to
complete the 200 guards requirement for the issuance of a
regular license. Otherwise, failure to comply with the 200
guards requirement, shall serve as a basis for the issuance
of cease operation order.

5. License of PSAs which less than 100 guards shall


not be renewed after 1 year of operation.

6. PSAs with cancelled/revoked licenses shall cease


to operate, and within 7 days after having been duly
notified of such cease operation order, shall immediately
deposit all its firearms with the Firearms and Explosive
Division or the ROPD. Thereafter, the C, ROPD shall conduct
an inventory of surrendered firearms which shall receipted,
copy furnished C, SAGSD. Failure of the PSA concerned to
comply shall be liable under PD 1866.
What are the Penalties for Violation of the IRR of RA No.
5487

Without prejudice in the filing of the appropriate


criminal action, the following penalties shall be imposed
after investigation of any guard or detective, private
security guard agency or company security service and
thereafter found guilty of committing any of these offenses
enumerated:

1. For Light Offense

One (1) to thirty (30) days suspension or a fine


ranging from one hundred pesos minimum to five hundred pesos
maximum (P100.00 – P500.00) or both..

2. For Less Grave Offense

One (1) month and one (1) day to six (6) months
suspension or a fine ranging from five hundred pesos minimum
to one thousand pesos maximum (P500.00 – P1,000.00) or both,
and

3. For Grave Offenses

Six (6) months and one (1) day to one (1) year
suspension or a fine ranging from ten thousand pesos minimum
to fifty thousand pesos maximum (P10,000.00 – P50,000.00),or
both or cancellation of license permit.

Summary Power of the Chief, PNP as Provided by RA No. 5487

The Chief, PNP may at any time suspend or cancel the


licenses/permits of private watchman/detective or security
guard agency found violating any of the provisions of RA
5487, as amended, and the Rules and Regulations promulgated
by the Chief, PNP pursuant thereto. The Chief, PNP upon
prior recommendation of PADPAO as concurred by the Director
CSG through SAGSD, may refuse issuance or renewal of
license/permit to operate to any security agency and/or
security guard summarily found to have violated the
provision of RA 5487 and its implementing rules and
regulations.

You might also like