You are on page 1of 9

URDANETA CITY UNIVERSITY

San Vicente West, Urdaneta City


COLLEGE OF CRIMINAL JUSTICE EDUCATION

INDUSTRIAL SECURITY MANAGEMENT AND SECURITY CONCEPTS


(LEA 3)
FINAL Coverage

SECURITY SURVEY AND INSPECTION


 Security Survey – a fact finding probe to determine plant’s adequacy and deficiency in all aspects of
security, with the consequent recommendations.
 Security Inspections or Follow-up Surveys – the term used for succeeding surveys after the initial
survey. The detailed check where physical examination is conducted to determine compliance with
establishes security policies and procedures as a result of security survey.
Security Survey
It is an estimate of the security standards of a unit, and is conducted to enable the responsible
officer to recognize and evaluate security hazards and determine protective measures necessary to the
prevention of sabotage, espionage, subversive activities and other criminal acts inimical towards the
interest and/ or mission of the unit and / or command.
Purpose of Security Survey
The security survey will be used by the senior facility manager or industrial planners in
determining the type and extent of security controls for the facility or areas. Each type of physical
security survey will include the determination of the security level of the facility and a security evaluation
(threat assessment), which addresses the criticality of operations, the vulnerability of the facility or area,
and the probability of compromise of the personnel or property contained therein.
Standard Requirement in a Security Survey
1. Criticality – is the effect that partial or total loss of the facility or area would have on the
facility's mission. The adversity of the effect is directly related to the criticality factor. Examples
of adverse effects include the interruption of a vital function, disruption of the continuity of
operations, or the compromise of national security information. A higher classification level of
information handled or stored in a facility or area will increase the criticality.
2. Vulnerability – is the susceptibility of a facility or area to damage or destruction or the possible
theft or loss of property. Factors used to determine vulnerability include the size, configuration,
and location of the facility or area, the local crime rate, and the proximity of law enforcement and
emergency response services.
3. Probability/Risk – deals with an assessment of the chances or risk that certain events could or
might occur, such as a penetration of the perimeter, compromise of a system, or the occurrence of
a variety of unauthorized activities.
Steps in conducting Security Survey
1. Initial Survey – is conducted before constructing, leasing, acquiring, modifying, or occupying a
facility or area. It describes any modification required to raise the level of security commensurate
with the levels of criticality and vulnerability.
2. Follow-up Survey – is conducted to ensure the completion of modifications. This survey should
be conducted before acceptance of the property or occupancy.
3. Supplemental Survey – is conducted when changes in the organization, mission, facility, or the
level of the facility alter or affect the security posture of the facility or area. This survey is
conducted at the discretion of either the facility manager or senior security officer.
4. Special Survey. Is conducted to examine or resolve a specific issue, such as when there is request
for a Sensitive Compartmented Information (SCI) accredited facility or there is a need to
investigate or assess damage resulting from an incident.

Planning a Security Survey


1. Verify the need
2. Obtain organization support
3. state the survey's executives
4. determine how data will be gathered
5. develop alternatives
6. Prepare a schedule of activities

Security Inspection

Page | 1
It is a check of how well existing security measures and regulations are being carried out within a
command. A security inspection may also include an investigation of alleged or suspected violations.
Physical security is concerned with forces, entrances and exits, guards, traffic control, lighting, fire
control, and with such other physical measures, which, if properly established and maintained, will deny
access to, unauthorized persons.
Security Survey Distinguish with Security Inspection
Security is defined as a counterintelligence service to assist heads of office in determining the
security measures required to protect key installations from possible sabotage, espionage, subversion, and
unauthorized disclosures of, or access to, classified information or material contained therein while.
Security inspection is a counterintelligence service performed to determine compliance with established
security policies and procedures.
Stages in Conducting Security Inspection
1. Evaluation – the evaluative or fact-finding inspection is generally positive in tone and promotes
liaison and security awareness while taking a broad, general outlook of a facility or program.
Deficiencies, which may be resolved either on the spot or within a no specified time frame, may
be noted and recommendations for further corrective actions may be made. The evaluative
inspection can also help management officials in planning or upgrading their security programs
2. Compliance – is conducted for enforcement purposes. It focuses on compliance with established
standards or regulations.
3. Follow-up – is conducted to ensure that the facility officials have complied with
recommendations from earlier inspections.
4. After-hours Room Check - is a form of compliance inspection. It monitors compliance with
security regulations, especially involving areas where national security information is processed
or stored.
5. Self-inspection – is initiated by the security officer or facility manager to evaluate his/her own
security program. Additionally, self-inspection is required by each Top Secret Control Officer,
Classified Document Custodian, and Special Security Officer to evaluate all security procedures
applicable to their operation. The scope and purpose of the self-inspection for an office, building,
or other facility is determined by the initiator
6. Closeout – is accomplished immediately prior to the action to administratively terminate an
authorized Top Secret Control Station, Classified Control Station, or Sensitive Compartmented
Information Facility if any. During closeout inspections, all areas and containers authorized for
the storage of classified material are checked to ensure all classified material has been removed.
Steps in Conducting Security Inspection
1. Plan an inspection by determining the scope, type, and method. Schedule the inspection, and if
appropriate, provide written notice. The notice should provide the date, purpose, proposed
interview schedule, and request for any information needed by the security officer. Review past
inspection reports and prepare a list of questions or a checklist to structure the inspection.
2. Upon arrival at the site and before departure, the inspector should meet with the senior manager
to discuss the inspection. Collect a sufficient sampling of data from interviews with on-site
employees and contractors and from touring the facility. Obtain information to support findings
in the inspection report. Report favorable findings as well as deficiencies. Check awareness and
adherence to local security procedures. Document any discrepancies corrected on the spot.
3. After sufficient data is collected, the inspector should analyze all findings, compare them with
applicable security regulations, list discrepancies and cite regulatory references, recommend
corrective action, and write the inspection report.
4. The inspection report should be produced within 10 working days of completion of the
inspection. The report should be distributed to the office, facility, or regional manager in a timely
manner and require a response to any recommendations.

Types of Briefing in a Security Inspection


1. Initial orientation Briefings
A verbal orientation briefing preferably supplemented with audio-visuals and handouts is more effective.
Where possible, it should be presented personally. Where this is not practical, it may be presented in the
form of videotape or other recording.
2. Special Briefings
National Security Briefings – these are information security briefings that apply to individuals who
handle classified information. The briefings focus on classifications, markings, transmission, disclosure,
safeguarding and destruction of information
Special Access Briefings – These are briefings related to the various special access programs such as
those administered by the higher management or national offices.
Types of Security Inspection

Page | 2
1. Continuous Inspection
To keep pace with the constant changes in the organization, changes in our security terms of attitudes,
life-style and moral values, and the rapid advancement of technological modifications are all around us,
the inspection must be an on-going and never ending activity.
2. Formal or Informal
a. Formal Inspection – is one which some fanfare is attached. It is usually preceded by an announcement,
and the unit under inspection “prepares” for events, including some extra housekeeping activities that
would not otherwise happen at that point in time.
b. Informal Inspection – is usually the result of a long and firmly entrenched inspection program,
understood by all and accepted as part of the organizational life. The inspection has been stripped of all
external trappings of importance, but their functional importance has been lessening in any manner. They
are seriously and quietly executed in a spirit of understanding and cooperation.
3. Structured and Unstructured Inspection
a. Structured Inspection – is one that moves systematically from one area to the next and so on. There is a
format or logical sequence to the process.
b. Unstructured Inspection – is conducted in random manner. There is no format or logical sequencing.
Essential considerations in Security Inspection
Preliminary Planning
Initial Briefing
Escort personnel
Preliminary Exterior and Interior Check
History of the unit to be surveyed
Analyzing Existing Security
Final Briefing
Report of security survey
CLOSE PROTECTION AND V.I.P. SECURITY
Close Protection/Executives/VIP Security
It refers to those measures taken by close protection officers or agents, security officers, law
enforcement officers’ agency/officers to protect heads of state, foreign, national or local dignitaries,
civilian or military against any personal injury, assassination, sabotage and espionage. These may include
the protection of any government or civilian officials and individual utilized as government witnesses.
Roles of Close Protection Officers (Bodyguards)
Bodyguards often have training in firearms tactics, unarmed combat, tactical driving, and first
aid. In multi agent units (like those protecting a head of state) one or more bodyguards may specialize in
specific tasks, such as providing a protective escort, crowd screening and control, or searching for
explosives or electronic surveillance devices (bugs).
Bodyguards may also work with other security personnel to conduct threat or risk assessment and
analyze potential security weaknesses.
Bodyguards often examine a premises or venue before their clients arrive, to determine where
exits and entrances are, find potential security weaknesses, and meet the staff. Bodyguards do research to
be aware of potential threats to their client, such as a protest by a radical group or the release from
custody of person who is known threat. While escorting a client, bodyguards have to remain alert so that
they are able to react quickly to threatening situations.
Basic Security Principles in VIP Security
Every phase of security must be carefully in advance, to include the importance of the individual
to be protected, political attitude of the population, obstacles involved, means of transportation, and
duration of the security mission.
Physical protection should consist of a series of protection cordons. These protective cordons
may be composed of a combination of personnel or physical security barriers.
Central direction and unity of effort
The officer in charge should be given full responsibility for all phases of the security mission.
Close coordination must be established with all local military and civilian authorities. Civilian authorities
will include police and other interested city, municipal or other local officials
The agencies responsible for each of the security plan must be clearly defined. Arrangements
should be made for local police to control local inhabitants. All available intelligence channels should be
used to obtain information of potential danger areas, persons or groups
A basic element of VIP/Executive protection is the identification and the elimination of possible
sources of danger of the VIP/Executive before the danger becomes actual.

Preventive Intelligence Measures


The main objective – To collect, processes and evaluates information about persons or groups of
persons who may be a danger to the protectee/VIP.

Page | 3
The methods:
1. Security clearance of all employees and all tradesmen who service the Executive/VIP's
residence, quarters or office. Security processing of gifts sent to the Executive/VIP.
2. Technical Inspection against covert listening devices.
3. Process communications, letters that in any way indicates anyone may have possible
intention of harming the executive/VIP.
4. Maintain an album of photographs and description of individuals who are regarded as
clear risks to the Executives/VIP, including those who are penal or hospital custody.
5. Liaison with other agencies for intelligence information that may come in contact with
that would indicate danger to the Protectee/VIP.

Defense-in-Depth Theory
Organization or government can devote time, money, personnel, material or imagination to
passing a barrier, he can succeed. To achieve the ultimate results from a physical security system, it is
necessary to add barrier-to-barrier, delay time, until sufficient delay time has been accumulated to allow
control of any foreseeable penetration.

Contingency Planning
Security planning should be flexible. Weather conditions, mechanical failures and failure of
lighting systems are three-ever-present potential hazards. The unexpected arrival of large numbers
visitors, audience is another situation frequently encountered. Last-minute changes in the security plan or
schedule of events occur routinely. The security plan therefore must be sufficiently fluid to cover these
and other eventualities, all of which present hazards.
A standard operation order format for preparation of a protective plan should include the
following requirements:
Mission
Concept of operation
Coordination and Liaison
Itinerary area of interest
Personnel and equipment requirements
Cooperation
Communication
Logistical Support
Public relation
Emergency information
Command and control
The order should be in writing, produced in sufficient copies, and duly classified. Only key staff
officers/personnel with whom coordination is necessary should be given a complete copy, however, all
protective personnel are given an orientation on the contents of the order and should be familiar with the
whole operation. And for these reason, these instruction must be simple to understand and easy to
execute.

Mission Orientation
An orientation/briefing must be conducted by the officer in charge or the protection plan, during
which he explains fully the contents of the plan. Some topics to be emphasized are: conduct of security
personnel, use of weapons and crowd control.

Security preparations in Local/Foreign Travel


Advance Preparations
Arranging for timetable/itinerary and coordinating with those concerned with visit, local or
foreign law enforcement security men.
Conduct security survey and inspection of routes quarters, conference, luncheon and or inaugural
site.
Arrange for security measures for motorcade routes, quarters, conference site, etc.
Confer with local or foreign security men about potential danger to the executive, such as
persons, organizations or obtain copies of photographs and place these persons under surveillance.
Motorcades
Select and consider the best motorcade route, preferably the most direct route to destination.
Select a route, which afford a chance to have alternate routes if something happened on the
motorcade route.
Review or dry run the route and take notes on the requirements for controlling the crowd and
traffic and deployment of foot patrolmen and motorcycle police at various positions along the route.

Page | 4
Arrange for police or buildings custodian to inspect buildings along the motorcades routes.
Security in Inaugural/Conference/Luncheon Sites
1. Control access to the building/sites
2. Closing off and policing areas around it
3. Securing rooftops and adjoining buildings
4. Ensure the presence of numerous police officers inside and around the building/site
Security in VIP office/Quarters/Residence
1. Defense-in-Depth Barriers – Concentric Patterns (Any attack will have to penetrate layer after
layer of defenders, the heaviest layer of defense, being closest to the Executive/VIP)
2. Outer ring – sidewalks, stationed in front of quarters/residence/office, covering all entrances,
front, center, side and rear.
3. Middle ring – inside quarters, office/residence, covering all stairways and elevators.
4. Inner ring – immediately outside executive/VIP's door, or close to Executive/VIP if outside.
Personnel Duty
1. To hold ones position no matter what happens outside of his own ring.
2. Be ready to place his own body between the Executive/VIP and any danger to him.
3. Be prepared to intercept a bullet, knife, or other weapon with his own flesh.
4. The final defense against an attack on the person of the Executive/VIP( as a human shield)

VIP Security Measures in all Areas


1. Establish screening points to allow only authorized person's access to the protected area/person
and to keep out those who have no valid reasons to enter the same.
2. Duty stations or posts should be marked on a floor/ground plan or sketch/map.
3. If an unusually large crowd are expected along a parade route security men may call on the armed
forces to station troops along the line of March.
4. If the Protectee/VIP travels by train, a pilot engine must run the trucks in advice of the VIP train.
5. Every manhole and sewer along the route should be sealed.
6. Every single building and all its occupants along the route should be checked.
7. Bellboys, waiters, cooks should be cleared.
8. Food to be cooked must be examined and samples be sent to laboratory for analysis.
9. Inspect for time bombs, radio – active materials and fire hazards.
10. Inspect closets and under the tables.
11. Never allow the VIP to stop his car in a crowd if it can be avoided.
12. Drivers for the VIP can be competent, reliable and well trained in protective driving and must be
alert for dangers and to take instant action.
13. While walking, it is necessary to increase the number of guards because the VIP becomes an easy
target.
14. In case the VIP is going to speak at hasty made stage, its strength and capacity should be
inspected to limit the persons going up to stage
15. During afternoon sessions, lighting facilities must be checked or installed. It is estimated that the
program may reach up to nighttime.
16. An alternate generator for emergency use is made available if source of electric power is from a
central source. Designate qualified electrician to watch main source or switch.
17. If travelling by air, close the door of VIP plane when parked and place constant guards every
time.
18. If traveling by watercraft, select boats of type and size capable of facing danger at the ocean.
Thorough inspection is made on the ship and checks the adequacy of lifesavers and emergency
facilities.
19. All non-uniformed men must wear signs or countersigns for identification
20. Checklist of all security hazards noted in the course of security survey or inspection should be
given to OIC for reference/planning.
21. Security plans and specific duties of men assigned or details must be stated.
22. All written instructions must be classified SECRET.

Other Guidelines for VIP Security


Security Formations assist and allowing the Protectee/VIP to have the best possible protection
and defensible position even for the limited amount of manpower while protectee is mobile/in transit, or
static.
Threat Evaluation is to ascertain at varying times and function which will give the best
information sequence or set. Other considerations are threat levels, type, and advance planning for staff
levels.

Page | 5
STATUTORY AUTHORITY ON INDUSTRIAL SECURITY: REPUBLIC ACT 5487 AS
AMMENDED
"AN ACT GOVERNING THE ORGANIZATION AND MANAGEMENT OF PRIVATE
SECURITY AGENCY, COMPANY GUARD FORCES AND GOVERNMENT SECURITY
FORCES."
A careful study on Industrial security would entail a working knowledge of the law which has
laid down the foundation to set-up security. The comprehension of the pertinent contents of RA 5487 is
essential for future criminologists for it is the fundamental statute concerning industrial security. To aide
and promptly guide conformity with the law, the REVISED RULES AND REGULATIONS
IMPLEMENTING RA 5487 AS AMANDED was codified last October 8, 1994. The pertinent
components of the law were specifically covered to wit:
ORGANIZATION AND MANAGEMENT:
Who may organize and maintain a Private Security Agency and Private Detective Agency?
Any Filipino citizen or corporation, association, partnership one hundred percent (100%) of
which is owned and controlled by Filipino citizens, may organize and maintain a Private Security Agency
or Private Detective Agency.
Basic Requirements of an operator or manager of agency.
The operator or manager of an agency including managers of branch offices, must be a Filipino
citizen, shall not be less than twenty five(25) years of age, college graduate and/ or a commissioned
officer in the inactive service or retired from the AFP or the PNP, or graduate/taken a course in concepts
and methods in Industrial Security and security Management and/or must have adequate training or
experience in security business, of good moral character not having been convicted of any crime
involving moral turpitude and not suffering from any of the following disqualifications:
a. Dishonorably discharge from the AFP or PNP or separated for cause from any government
entity or government owned or controlled corporation;
B. Being mentally incompetent;
c. Being physically fit
D. Addicted to the use of narcotics and/or prohibited drugs and/or substances;
e. Habitual drunkard and alcoholic;
f. Dummy of any foreigner; and
g. Elective or appointive government officials who may be called upon on account of the
functions of their respective officer in the implementation and enforcement of RA 5487 and any
person related to such government employees by affinity or consanguinity in the third civil
degree shall not hold any interest, directly or indirectly, in any security guard or watchman
agency on account of the functions of their respective offices in the implementation and
enforcement of the provisions of RA 5487 as amended.
QUALIFICATIONS
Basic requisites of a security guard
a. Filipino citizen;
b. High school graduate;
c. Physically and mentally fit;
d. At least (18) years of age but not more than (50) years old;
e. Has undergone pre-licensing training course; and
f. Must not possess any of the disqualifications for security operators.
Exemptions from pre-licensing training:
A. Veterans and retired military/police personnel or honorably discharged military/police
personnel possessing all the qualifications mentioned above shall be exempted from pre-licensing
seminar which is a requirement for the Issuance of license to exercise profession as security
guard.
B. Graduates of ROTC advance/basic, and/or its equivalent in the AFP, CAFGU/CHDF (or its
equivalent in the PNP) Training graduates shall be exempted from the required Basic Licensing
Seminar.
Qualifications of Private Detective:
a. Holder of a baccalaureate degree or Bachelor of laws; or
b. Holder of a Degree of Bachelor of Science in Criminology; or
c. Graduate of a Criminal Investigation Course offered by the then PC/INP or the PNP or the NBI
or any police training school or detective training with authorized/recognized training center for a
security guard;
d. Advance ROTC/CMT graduate.
Qualifications for Security Officer:
a. Filipino citizen;
b. Holder of a Baccalaureate Degree;

Page | 6
c. Physically and mentally fit;
d. Has graduated from a Security Officer Training Course;
e. Retired personnel of the PNP or AFP;
f. Must not possess any disqualifications for security agency operators;
Qualifications for Security Consultants:
In addition to the qualifications of a private detective:
a. Holder of a Master’s degree in Criminology, Public Administration, MNSA, Industrial Security
Administration or Law;
b. Must have at least ten (10) years’ experience in the operation and management of security
business.
RANKS, POSITION, STAFFING PATTERN AND JOB DESCRIPTION
A. Security Management Staff
(1) Security Director (SD) - Agency Manager/ Chief Security Officer
(2) Security Executive Director (SED) - Asst. Agency manager/ Assist. Chief security officer
(3) Security Staff Director (SSD) - Staff director for operations and staff director for
administration.
B. Line Leadership Staff
(1) Security Supervisor 3- Detachment Commanders
(2) Security Supervisor 2- Chief Inspector
(3) Security Supervisor 1- Inspector
C. Security Guard
(1) Security Guard 1- Watchman/guard
(2) Security Guard 2- Shift-in-charge
(3) Security Guard 3- Post-in-charge
D. Security Consultant- optional but must possess all qualifications as prescribed by the Implementing
rules on RA 5487 as amended.
STAFFING PATTERN
 Agency Manager- is automatically the chief security director who shall be responsible for the
entire operation and administration/management of the security agency. He shall be directly
responsible to the agency operator/owner/Board of Directors.
 Assistant Agency Manager- is automatically the security executive director and takes the
operational and administrative management when the manager is absent.
 Staff Director for Operations- is the staff assistant of the security manager for the efficient
operation of the agency. This position includes the responsibility to canvass clientele and the
implementation of contract and agreement. He is also responsible for the conduct of investigation
and the conduct of training.
 Staff Director for Administration- is the staff assistant of the agency manager for the
effective efficient administration and management of the agency. He is responsible for the
professionalization of the personnel, procurement/recruitment, confirming of awards, mobility
and issuance of FAs.
 Detachment Commander- is the field or area commander of the agency.
 Chief Inspector- shall be responsible for inspecting the entire area covered by the detachment.
 Security Inspector- is responsible for the area assigned by the chief inspector of the detachment
commander.
 Post-in-charge- is responsible for the entire detailed office within a certain establishment.
 Shift-in-charge- is responsible for the security officer who is scheduled within a certain
establishment.
 Security Guard- is the one actually posted as watchman or guard.
SECURITY FORCE STRENGTH AND USE OF FIREARMS AND EQUIPMENT
A. No regular license shall be granted to any security agency or company security force unless it has
under its employ the following numbers of duly licensed security guards:
1) For private security agencies- a minimum of two hundred (200) and a maximum of one
thousand (1,000).
2) For company security force- a minimum of thirty (30) and a maximum of one thousand
(1,000).
Possession of firearms by agency:

Private Security Agency shall be entitled to possess firearms after satisfactorily complying with the
requirements prescribed by the Chief, PNP pertinent to the possession of firearms of any of the following:
shotgun, not higher than 12 gauge, low power rifles and revolvers, caliber .22, caliber .38 pistols or
revolvers not exceeding one (1) firearm for every (2) security guard in its employ.

Page | 7
a. PSA with one hundred (100) guards must initially procure at least thirty (30) pieces of licensed
firearms for use of its security guards.
b. PSA who has been applying for regular license to operate must possess at least seventy (70)
pieces of licensed firearms.
c. Use of firearms by Private Detective Agency shall be optional.
Restriction to possess certain caliber of firearms and exemption.
a. A PSA/ company security service/ government security/private detective agency unit are not allowed to
possess high caliber firearm considered as military firearms like carbine, M16, cal. .45, center fire
magnum cal .41 and .44 and other high caliber weapons.
b. The use of the restricted firearms may be granted in cases wherein the areas guarded are in an
upsurge of lawlessness and criminality as determined by the Chief, PNP or Regional Director, PNP
Regional Command under the following conditions:
1. The acquisition of the high caliber firearms shall be at the expense of the PSA/company guard
force concerned;
2. Before issuance the same must be registered with the PNP, Firearms and Explosives Offices;
and
3. The duly licensed security guards who will use such firearms shall be given adequate training
in the care and use thereof and will be under the supervision of qualified officers and men of the
PNP.
4. The total number of the prescribed high-powered firearms that a PSA/ company guard forces is
authorized to possess shall not exceed ten percent (10%) of the total number of guards employed
by the agency/forces concerned and shall not be transferred in places other than those specifically
authorized by the Director, CSFC.
c. The firearm issued to security personnel of the agency shall be carried by the security guard only
during his tour of duty while in proper uniform and within the compound of the establishment, where he
is assigned to guard except, when he is escorting a big amount of cash or valuables, and upon prior
coordination with the nearest PNP units/stations.
d. Agencies detailing their security personnel under the circumstances mentioned shall issue an
appropriate duty detail order to the security personnel concerned.
e. Firearms of the agency which is authorized to possess may be confiscated under the following
circumstances:
1. When the firearm is about to be used in the commission of a crime;
2. When the firearm is actually being used in the commission of a crime;
3. When the firearm has just been used in the commission of a crime;
4. When the firearm being carried by the security guard is unlicensed or a firearm not
authorized by law and regulation for its use;
5. When the confiscation of the firearm is directed by the order of the court;
6. Where the firearm is used or carried outside the property, compound or establishment serviced
by the agency without proper authority; or
7. When the security guard does not possess any license to exercise his profession.
UTILIZATION OF AGENCIES DURING EMERGENCY
A. Powers of city or municipal mayor in case of emergency- In case of emergency or in times of
disaster or calamity when the services of any security agency/entity or its personnel are needed,
the city or municipal mayor may muster or incorporate the members of the agency or agencies
nearest the area of such disaster or calamity to help in the maintenance of peace and order,
prevention of crime and apprehension of violators of laws or ordinances, in the protection of lives
and properties. The deputized security guard shall receive direct orders from the Chief of
Police of the city or municipality for the duration of the emergency, disaster or calamity.
B. Emergency Deputation- In case of emergency or times of disaster or calamity, the Chief, PNP
may deputize any security guard to assist the PNP in the performance of its duties for the duration
of the emergency, disaster or calamity.
LIMITATIONS AND PROHIBITIONS
A. On membership- PSA shall not deploy/post more than one thousand (1,000) security
guards to include its branches.
B. On organization- No person shall organize/operate or have interest in more than one security
agency in any city or municipality.
C. On service - No agency shall offer, render or accept services in gambling dens or other illegal
business establishments or enterprises. The extent of the security service shall not go beyond the
compound or property of the person or establishment contracting the security service except when
the security guard is escorting a big amount of money or valuables or in hot pursuit of
criminal offenders. No security watchman or private detective shall serve as bodyguard of any
person.

Page | 8
D. Prohibition on "KABIT SYSTEM" operators- No licensed security agency shall operate,
promote or enter into an agreement of "merger" (kabit system) with any person or a group of
person for the purpose of organizing a branch unit or subsidiary under separate control and
ownership. Merger of security and detective agencies shall not be recognized without prior
approval from the Securities and Exchange Commission with respect to their articles of
incorporation and the Department of Trade and Industry, with regards their business name.
Amendments to RA 5487:
 Presidential Decree No. 11
 Presidential Decree No. 100
 Presidential Decree No. 1919
Quasi Police and Military Personality:
 Letter of Implementation (AFP M 7-3)- Issued by the AFP Chief of staff stating that security
guards have acquired a para- military status.
 Presidential Decree No. 1061- promulgated on September 22, 1976 designating security guards as
armed components of the AFP reserve force.
 Executive Order No. 264- Issued by Pres. Aquino in July 1987 which promulgated that security
guards are considered as auxiliary units and declared them as part of the citizens Armed Force.

Page | 9

You might also like