You are on page 1of 23

INDUSTRIAL SECURITY MANAGEMENT (LEA 2)

DEFINITION OF SECURITY
 Generally, the meaning of security is a kind of state where people, institution, authority or
groups feel fully secured of feeling, free from any threat or vulnerability from somewhere or
someone in his/her life, liberty, property or activity. It could be in physical, psychological, social
or economical form.
 It is a state or quality of being secured, freedom from fear or danger, assurance, certainty.
 It is a degree of protection against danger, loss, and criminals.
 Protection against any type of crime to safeguard life and assets by various methods and
device.

BASIC PRINCIPLES OF SECURITY


1. Command Responsibility – Cannot be delegated but the security tasks can be assigned.
2. Compartment – Need to know basis.
3. Balance between security and efficiency – Security prevails over efficiency.
4. General principles of security remain constant – Specific to measures to suit operations.
5. Security is the concern of all personnel – Regardless of rank, position, designation.

TYPES OF SECURITY MEASURES FOR AN EFFECTIVE DEFENSE AGAINST CRIMES:


1. ACTIVE MEASURES – these involve the installation of physical barriers, security lighting,
use of vaults, locks and others.
2. PASSIVE MEASURES – those that will deter man from committing such act of fear of being
caught, charge in court or get dismissed, such as: security education, programs, investigations,
seminars, personnel security check.

Brief History of Security in the Philippines


 The private security business began on March 11, 1933, when the first formally licensed
private security agency “Special Watchman Agency” started operations;
 Later it renamed “Jimenez Security Agency”, founded by brothers Juan and Pedro Jimenez;
 On May 30, 1958, the Philippine Association of Detectives and Protective Agency Operations
(PADPAO) was formally organized’
 RA 5487 was passed on June 13, 1969 through the continuous lobbying of the incorporators
and officer of PADPAO, which set the standards the minimum requirements for the operations
of security agencies.
 P.D. 11 was passed on October 3, 1972, widening the coverage of RA 5487 to include security
guards employed in logging concessions, agricultural, mining and pasture lands;
 P.D. 100 was issued on January 17, 1973, broadening the coverage of the c=security industry
to include employees of the national or local government or any agency who are employed to
watch or secure government building and properties.

 On August 1969, the Philippine Constabulary activated he Security and Investigation


Supervisory office or SIASO to supervise and control the organization and operation of private
security and detective agencies nationwide;
 Later it was renamed Philippine Constabulary Supervisory Office for Security and
Investigation Agencies or PCSUSIA.
 With the passage of RA 6975, this unit was absorbed by the Philippine National Police;
 Later it was made into a division of the PNP Civil Security Group and was renamed Security
Agencies and Guard Supervision Division (SAGSD);
 It was renamed to PNP Supervisory Office for Security Investigation Agency (SOSIA).
THREE MAJOR AREAS OF SECURITY
1. Physical Security
2. Personnel Security
3. Document and Information Security

TYPES OF SECURITY
1. PHYSICAL SECURITY
Definition
 A system of barriers placed between the potential intruder and the objects/matter to be
protected. It is the broadest branch of security, which is concerned with physical measures
adopted to prevent unauthorized access to equipment, facilities, materials and documents and
to safeguard them to against espionage, sabotage, damage and theft.

OBJECTIVES:
a. To protect the organization’s asset;
b. To make access so difficult that an intruder will not dare attempt penetration.

CONCEPTS:
a. Enemy agents will always seek access;
b. Surreptitious entry is the greatest hazard to security;
c. There are no impenetrable barriers;
d. Each installation is different.

FACTORS THAT BRING INSECURE CONDITION:


1. Threat
o An indication of impending danger or harm;
o Positive inimical acts.
2. Hazard
o A chance of being injured or harmed;
o Passive inimical acts.
3. Vulnerability
o Inability to withstand the effects of hostile environment;
o Measures of how open an establishment to intrusion, attack or injury.
4. Risk
o Is the potential that a chosen action or activity (including the choice of inaction) will
lead to a loss (an undesirable outcome).
o Probability of an event to happen that will lead to loss.

SECURITY HAZARD
An act or condition which results in a situation conducive to a breach of the protection system
and the subsequent loss or compromise, or damage to personnel, property or facilities.

KINDS OF HAZARDS
1. Man-Made Hazards – an acts or conditions affecting the safe of operation of the facility
caused by human action, accidental or intentional. It includes sabotage, espionage, pilferage
and theft.
2. Natural Hazard – cause by natural phenomena which cause damage, disturbance and
problems of normal functioning activities, including security. It includes flood, lightning,
storms and volcanic eruptions.
THE EXTENT OF DEGREE OF RISK TO SECURITY WILL BE DEFENDANT ON THE
FOLLOWING:
1. RELATIVE CRITICALITY OF OPERATIONS – Is the importance of the firm which
reference to the national economy and security.
2. RELATIVE VULNERABILITY – The susceptibility of plant or establishment to damage,
loss, or disruption of operation due to various hazard.
BARRIER – can be defined as any structure or physical device capable of restricting,
deterring, delaying, illegal access to an installation.
Generally, a barrier is use for the following purposes:
1. Outline the perimeter of the area to be secured;
2. Create a physical and psychological deterrent to unauthorized entry;
3. Delay intrusion, thus facilitating apprehension of intruders;
4. Assist in more efficient and economical employment of guards;
5. Facilitates and impose the control of pedestrian and vehicular traffic.

1. FIRST LINE OF DEFENSE – Perimeter barrier/fences – a medium or structure which defines


the physical limits of an installation or area to restrict or impede access thereto.

2. SECOND LINE OF DEFENSE – Doors, floors, windows, walls, roofs and grills.

3. THIRD LINE OF DEFENSE – Storage system like steel cabinets, safes, vaults and interior files

GENERAL TYPES OF THE PHYSICAL BARRIER:


1. NATURAL BARRIER – include mountains, rivers, seas, desserts or terrain difficult to
traverse. To be fully effective, these barriers must be under surveillance of guards.
1. STRUCTURAL OR MAN-MADE BARRIER – structural constructions made by man like
fences, wall, floors, roofs, grill or other physical means to deter or impede penetration.

TYPES OF FENCES
1. SOLID FENCE – Constructed in such a way that visual access through the fence is denied. Its
advantage is that it denies the opportunity for the intruder to become familiar with personnel,
activities and the schedule movements of the security personnel. On the other hand, it prevents
the guards from observing the area round the installation and it creates shadow that may be
used by the intruder for cover and concealment.

WALL – Masonry wall should have the same as the chained linked and surrounded by the
barbed wire as top guard.

2. FULL VIEW FENCE – it is constructed in such a way that visuals access is permitted
through the fence. Its advantage is that it allows the security personnel to keep the surrounding
of the installation under observation. On the other hand, it allows the intruder to become
familiar with the movements the security personnel.

TYPES OF FULL VIEW FENCE


1. CAHIN LINK FENCE
o It should be constructed minimum height of 7 feet excluding top guard;
o 9 gauges or heavier;
o Mesh openings of not larger2 inches per side;
o Twisted;
o Securely fastened to rigid material or reinforced concrete;
o Reach within 2 inches of hard ground or paving;
o On soft ground, it must reach below surface deep enough to compensate for shifting
soil or sand.
2. BARBED WIRE FENCE – is a type of fencing wire constructed with sharped edges or points
arranged at intervals around the strand(s). It is used to construct inexpensive fences.

3. CONCERTINA WIRE or DANNERT WIRE – Is a type of barbed wire or razor wire that is
formed in large coils which can be expanded like a concertina.

o Opened concertina wire is 50 feet long and 3 feet diameter.

ADDITIONAL PROTECTIVE MEASURES

Top Guard – an addition overhang or barbed wire place on vertical perimeter fences facing upward
and outward with a 45-degree angle with three to four strands or barbed wire space six inches apart.
This will increase the protective the height and prevent easy access.

4. Entry Stations – provided at main perimeter entrances to secure areas located out of the doors,
and manned by guards on a full time basis.
5. Towers – a house like structures above the perimeter barrier. Height of tower increases the
range of observation during day and night with artificial illumination.
6. Clear Zones – unobstructed area maintain on both sides of the perimeter barrier. It affords
better observation and patrol movement. It should be cleared of anything that may provide
concealment or assistance to a person seeking an authorized entry.

CLEAR ZONE
 20 feet or more between the perimeter barrier and exterior structure.
 50 feet or more between the perimeter barrier and structure within the protected areas.

PROTECTION IN DEPTH
 In large open areas or ground, where fencing or walling is impracticable and expensive,
warning signs should be conspicuously placed.
 The depth itself is protection.
7. Signs and Notices – erected where necessary in the management of unauthorized ingress and
preclude accidental entry.

SECURITY LIGHTING
Provides sufficient illumination to areas during hours of darkness.

PURPOSES OF SECURITY LIGHTING


1. It improves visibility so that intruders can be seen, identified and apprehend;
2. It gives psychological fear, which serves as a deterrent to thieves, pilferers, trespassers, and
sabotage;
3. It makes easier. The routine of work of guards in identifying employees, vehicles during the
night time;
4. If placed in certain areas, may even reduce the number of stationary guards, and instead, may
require only roving patrols at night.

TYPES OF SECURITY LIGHTNING


1. Stationary Luminary – most common type consisting of fixed series of luminaries. It is
commonly used on entry gates of employees and vehicles.
 Glare Protection Type – the intensity is focused to the intruder while the observer or the
guard remain in comparative darkness.
 Controlled lightning – the lightning is focused on certain objects than the background.

2. Standby Lightning – similar to continuous lightning but can be utilized in the event of
electrical failure.

3. Emergency Lightning – stand by lightning which can be utilized in the event of electrical
failure.

PROTECTIVE ALARMS
Is an aural or visual signal given by the annunciator to the security when intruder actuate
certain devices in a protected area. An annunciator is a visual or audible signaling device, which
initiates conditions of associated circuits.
Basically, alarm systems are designed to alert security personnel of a attempted or
consummated intrusion into an area, building or compound. Each type of alarm id activated in the
event that an intruder tampers with the circuitry, a beam or radiated waves. Alarms are also for fire,
smoke, or other emergencies and presence of hazards.

THREE BASIC PARTS OF ALARM


1. Sensors – device that can sense an abnormal condition within the system and provide a signal
indicating the presence or nature of the abnormality.
2. CIRCUIT – is the communication channel that conveys the information from all sensors in the
system to the signal by means of wire, radio waves.
3. Signal – the actual alarm may be audible or silent. A bell. Buzzer, phone ringing, or flashing of
light.

TYPES OF PROTECTIVE ALARM


1. Central Station System – several separate compounds tie their alarm system to a central
station so that in case of need, the central station calls for assistance to the police, fire
department, hospital or with other government assisting units.
2. Proprietary System – similar to the central station type except that the proprietary console is
located inside the subscriber’s installation who owns or bases the system.
3. Auxiliary System – An installation owned system which is a direct extension of the local
enforcement agency and/or fire department by special arrangements.
4. Local Alarm System – consist of rigging up a visual or audible alarm near the object to be
protected. In case of alarm, response will be made by the local guards and other personnel
within sight or hearing.

FIRE PROTECTION
FIRE ALARM – any visual or audible signal produced by a device or system to warn the occupants
of the building or firefighting elements of the presence or danger of fire to enable them to undertake
immediate action to save life and property and to suppress the fire.

DEVICES
1. Smoke Detector – a device placed at the ceiling of the floor that detects smoke, typically as an
indicator of fire.
2. Fire Bell – a hollow device made of metal that makes a ringing sound.

AUTOMATIC SPRINKLER - A type of built in sprinklers which works by the increase of room
temperature and which automatically operates the system to put out the fire. Attached and disturbed in
the ceiling of the rooms. These sprinklers will go into action once a fire starts, and those that will open
are those that are directly above the fire and water is delivered where it is needed.
STAND PIPES – G.I. steel or plastic pipes located inside the building from the lowest to the top floor
with the water under pressure for use in case of fire. Located near the standpipe is a fire hose usually
enclosed in a glass box.

FIRE HYDRANT – it is a mechanical device strategically located in an installation or in a street


where a fire hose will be connected so that the water will be available to extinguish a fire.

FIRE EXTINGUISHER – is a fire equipment which can is a fire fighting which can be portable or in
cart that is used to put out fire depending on the contents to extinguish certain types of fire.

CLASSES OF FIRE
1. CLASS A FIRES – involving ordinary combustible materials such as wood, cloth, and
paper, requires an extinguishing agent which cools. A water or multi-purpose dry chemical can
be used.
2. CLASS B – fires involving flammable and combustible liquids and gasses, such as solvents,
greases, gasoline, and lubricating oil, require an extinguisher which removes oxygen or cuts
the chain reaction. Foam, carbon dioxide, dry chemical, are effectives.
3. CLASS C – fires involve energized electrical equipment (live electrical wires, electrical
appliances). A non-conducting extinguishing agent such as carbon dioxide or multi-purpose
dry chemical must be used.
4. CLASS D FIRES – the result of the combustion of certain materials in firely divided forms.
These metals can be magnesium, potassium, powdered aluminum and zinc.

HOW TO OPERATE FIRE EXTINGUISHER?


-If you need to use fire extinguisher, remember the word PASS:
 PULL the pin – Fire extinguishers often have a pin, latch, or puncture lever that you need
to release first.
 AIM low – Aim the nozzle or hose of the extinguisher at the base of the fire.
 SQUEESE the handle – The releases the extinguishing agent.
 SWEEP form side to side – Move in close, and sweep across the base of the fire. Watch
for re-flash of the fire.

ALARM DEVICES
1. Magnetic Door Contact – is a protective device usually placed in the door, and window that
can send notification when the opening and closure occurs.
2. Vibration Contact – devices mounted on barriers and are used primarily to detect an attack on
the structure itself. When the movement or vibration occurs, the unstable portion of the circuit
moves and breaks the current flow, which produces an alarm.
3. Passive Infrared Detector (PIR) or Motion Sensor – PIRs are able to distinguish if an infrared
emitting object is present by first learning the ambient temperature of the monitored space and then
detecting a change in the temperature caused by the presence on an object.
4. Panic Button – Often located under the counter, the button can be pressed in times of distress
(Such as robbery, disruptive or threatening behavior, or a situation which may warrant assistance),
triggering a silent alarm.
5. CCTV – A video monitoring system is more commonly kwon as Closed Circuit Television
Systems. A CCTV system is a system consisting of a television camera, video monitoring, and a
transmission medium (Cable, fiber or wireless) connecting the two. It is used to monitor the
premises.
IP CAMERA
>IP based cameras work by turning images and audio into data then transmitting this data over
a network or internet connection.
>IP cameras are a type of Closed Circuit Television System (CCTV) used for capturing images
and audio recordings in surveillance for homes and businesses.
-The IP name stands for Internet Protocol, a system that allows the transmission of images captured
by a digital video recorder (DVR) to the end destination of computers and these components together
make up a video security system.

PROTECTIVE LOCKS

LOCK – defined as mechanical, electrical, hydraulic or electronic device designed to prevent entry to
a building or room.

Types of Locks
1. Key – operated Lock
-it uses some sort of arrangement of internal physical barriers which prevent the lock from
operating unless they are properly aligned. The key is the device used to align these internal
barriers so that the lock may be operated.

PADLOCK - a portable and detachable lock having a pivoted or sliding hasp which possess
through a staple ring, or the like and is made fast or secured.

2. COMBINATION LOCK – a lock that requires manipulation of parts according to a


predetermined combination code of numbers.

3. CARD OPERATED LOCK/CODED LOCK – type of lock that can be opened by inserting a
coded card in a slot in the lock, or by pushing the correct button on the surface of the lock

4. ELECTRONIC LOCK – type of lock that can be closed and opened remotely by electronic
means.

BIOMETRICS
-A machine that can be used for identification of humans by their characteristics or trails.
-It is used as a form of identification and access control.
-It is equipped with recording device that can identify the person operating the lock and time it was
operated.

KEY CONTROL
-defined as the management of keys in a plant or business organization to prevent unauthorized
individual access to the keys.

Change Key – a key to signal lock

Sub-Master Key – a key that can open all locks within a particular area or grouping.

Master Key – a special key capable of opening a series of locks

Grand Master Key – a key that can open everything in a system involving two or more master key
groups.
PETERMAN-a term used in England for lock picker, safecracker, and penetrators or restricted area or
rooms.

FALSE KEY-Genuine key stolen key from the owner.

HUMAN BARRIER

Security guard – is any natural person who offers or renders personal service to watch or guard
residential or business premises or both, government and/or their premises for hire and compensation.
Security Supervisor – is charged with directing the work and observing the behavioral performance
of the guard under his unit.

ORGANIZATION AND ADMINISTRATION OF SECURITY GUARD FORCE

Republic Act 5487, as amended – The Private Security Agency Law, approved on June 13, 1969.
2003 Revised Implementing Rules and Regulations (IRR) of RA 5487, as amended,

PNP SOSIA – Philippine National Police Supervisory Office for Security Investigation Agency –
office under the Civil Security Group which is charged with the supervision, direction and control of
all security agencies in the Republic.

WHO MAY ORGANIZE AND MAINTAIN PRIVATE SECURITY AGENCY AND PRIVATE
DETECTIVE AGENCY
Any Filipino citizen or corporation, association, partnership, one hundred percent of which is owned
and controlled Filipino citizens.

BASIC REQUIREMENT OF AN OPERATOR OR MANAGER OF SECURITY AGENCY


1. Filipino citizen;
2. Not be less than twenty-five (25) year of age;
3. College graduate and/or a commissioned officer in the inactive service or retired from the AFP
or PNP;
4. Has taken a course/seminar on Industrial Security Management and/or must have adequate
training or experience in security business,
Good moral character;
5. Having no previous record on conviction of crime or offense involving moral turpitude.

QUALIFICATIONS OF SECURITY GUARD OR WATCHMAN


1. Filipino citizen;
2. High school graduate;
3. Physically and mentally fit;
4. At least eighteen (18) years of age but not more than fifty (50) years old;
5. Has undergone Pre-Licensing course or its equivalent.
Veterans and retired military/police personnel honorable discharge including graduates of
ROTC advance (or its equivalent in the PNP) are exempted from the required Basic-Licensing
Training.

QUALIFICATION OF SECURITY OFFICER


1. Filipino citizen;
2. Holder of a Baccalaureate Degree;
3. Physically and mentally fit;
4. Has graduated from a Security Officer Training Course or its equivalent.
QUALIFICATION OF SECURITY CONSULTANT
1. Filipino citizen;
2. Physically and mentally fit;
3. Holder of Master degree either in Criminology, Public Administration, MNSSA, Industrial
Security Administration, or Law;
4. Must have at least ten (10) years of experience in the operation and management of security
business.

PRIVATE DETECTIVE
- Any person who does detective work for hire, reward or commission, other than members of the
AFP, BJMP, PNP or any other law enforcement agencies.

QUALIFICATION OF A PRIVATE DETECTIVE


1. Filipino citizen;
2. Physically and mentally fit;
3. Holder of baccalaureate degree, preferably Bachelor of Laws or Bachelor of Science in
Criminology;
4. Graduate of a Criminal Investigation Course offered by the PNP or NBI or any police training
school, or a detective training in any authorized/recognized training center;
5. Advance ROTC/CMT graduate or its equivalent.

DISQUALIFICATIONS
1. Having previous record of any conviction of any crime;
2. Having previous record of any conviction of any offense involving moral turpitude;
3. Having been dishonorably discharged or separated from employment or service;
4. Being a mental incompetent;
5. Being addicted to the use of narcotic drug or drugs, and
6. Being a habitual drunkard.
7. Dummy of a foreigner.

MORAL TURPITUDE
It is an act of baseness, vileness or depravity in the private and social duties which a man owes
to his fellowmen or to society in general, contrary to the accepted and customary rule of right and duty
between a man and man.
Conduct that is considered contrary to community standards of justice, honesty and good
morals. Examples: Rape, Forgery, and Robbery.

TYPES OF SECURITY GUARD FORCE


1. Company Guard Force – security force maintained an operated by any private
company/corporation utilizing any of its employees to watch secure and guard its
establishment.
2. Security Agency Service – security guard belonging to privately licensed agency (contractual
basis);
3. Government Guard Forces – security unit maintained and operated by any government entity
other than military or police.

POSSESSION OF FIREARMS
1. One (1) firearm for every two (2) security guards;
2. Private security agency/private detective agency/company security force/government security
force shall not be allowed to possess firearms in excess of five hundred units.
3. Shotguns not higher than 12 gauge
4. Weapons with bores not bigger than cal. 22 to include pistols and revolvers with bores bigger
than cal. 38
Exemptions: in areas where there is an upsurge of lawlessness and criminality as determined by the
Chief PNP, Regional Office or their authorized representative, they may be allowed to acquire, possess
and use high powered firearms.

NUMBERS OF SECURITY PERSONNEL TO BE MAINTAINED TO SECURE REGULAR


LICENSE TO OPERATE

1. Private Security Agency- minimum of two hundred (200) licensed private security personnel
and a maximum of one thousand (1,000)

2. Company Guard Force/Private Detective Agency- minimum of thirty (30) and a maximum
of one thousand (1,000)

LIMITATION IN THE CARRYNG OF FIREARMS


1. No firearm shall be borne nor be in the possession of any private security personnel except
when in actual performance of duty, in the prescribe uniform, in the place and time so specified
in the Duty Detail Order (DDO).

2. Shall be carried only within the compound of the establishment where he is assigned to guard.

3. While escorting big amount of cash or valuable outside of its jurisdiction or area of operation,
private security agency shall issue an appropriate Duty Detail Order to the security personnel
concerned.

Duty Detail Order (DDO) – is a written order/schedule issued by a superior officer usually the
private security agency/branch manager or operations officer assigning the performance of private
security/detective services duties.
DDP for the purpose of post duties not requiring transport of firearms outside of the physical
compound or property of a client or client establishment shall be issued for not more than thirty (30)
days duration.

CLASSIFICATION OF TRAINING AND ITS DURATION


1. Basic Security Guard Course (Pre-Licensing course) – 150 hours;
2. Re-Training Course – 48 hours;
3. Security Officers Training Course – 300 hours;
4. Basic Security Supervisory Course – 48 hours.
-All License to Operate have a validity of two (2) years;
-All applicants for renewal of License to operate (LTO) shall be filed at least sixty (60) days before
the expiry date of LTO;
-No application shall be approved unless certification is issued by FED-CSG to the effect that all
licenses of firearms of the agency are updated/renewed for at least one (1) year forthcoming during
the validity of the renewed LTO.

Approval, Cancellation, Suspension of LTO


Chief PNP
-Approval of New Regular LTO
-Cancellation of Regular LTO
-Re-instatement of Regular LTO
-Suspension of Regular LTO
Directory Civil Security Group
-Renewal of Regular LTO
-Approval of Temporary LTO
-Reversion of Regular to Temporary LTO
-Cancellation of Temporary LTO
-Suspension of Temporary LTO

SURETY BOND
Agency with 1 – 199 guars – P50, 000 .00
Agency with 200 – 499 guards – P100, 000 .00
Agency with 500 -799 guards – P150, 000 .00
Agency with 800 – 1000 guards – P200, 000 .00

STOCKING OF AMMUNITION
1. Stocks of ammunition in the agency shall be not exceeds fifty (50) rounds of ammunition per
unit of duly licensed firearms.
2. Individual issue to each security guards shall be limited to twenty-five (25) rounds foe every
security guard.

CONFISCATION OF FIREARMS OF SECURITY GUARD


1. When the firearm is about to be used in the commission of a crime;
2. When the firearm is actually being used in the commission of a crime;
3. When the firearm has just been used in the commission of a crime;
4. When the firearm being carried by the security guard is unlicensed or a firearm is not
authorized by law and regulation for his use;
5. When the confiscation of the firearm is detected by the order of the court;
6. When the firearm is used or carried outside the property, compound or establishment serviced
by the agency without the property authority; or
7. When a security guard does not possess any license to exercise his profession.
In all the above cases, the confiscating officer shall inform immediately the agency concerned.

PROVOCATION OF LICENSE TO POSSESS FIREARM


1. Failure to submit any issued firearm for verification as required;
2. Carrying firearms by security personnel without appropriate Duty Detail Order;
3. When the firearm serial number has been duplicated on another firearm or using one firearms
license for more than one firearm other than those stipulated in the license;
4. Carrying of firearm outside of the place stated in the permit or in places prohibited under the
law;

ADVANTAGES OF COMPANY GUARD FORCE


1. High caliber and receives higher salary;
2. Provides better service;
3. Can be trained to handle some of the more complex security duties;
4. More familiar with facilities they protect;
5. Tend to be more loyal with the company.

DISADVANTAGES:
1. May be required to join the union;
2. Cost more;
3. Problem of ensuring availability of back-up personnel.
ADVANTAGES OF AGENCY GUARD SERVICES
1. Less expensive;
2. Use in convenient;
3. Less administrative and personnel problems;
4. Agency assumes full responsibility for the scheduling and supervising of all guard personnel;
5. Can easily obtained extra guard if needed; and
6. Agency easily usually accepts liability of civil suits.

DISADVANTAGES:
1. Lack of training, low caliber employees;
2. No loyalty to the company;
3. Large turnover; and
4. Not familiar with facilities.

ESSENTIAL QUALITIES OF SECURITY GUARD


1. Alertness – being watchful in spotting violator, a person, a vehicle or an incident;
2. Judgment – sound and good judgment to arrive at wise and timely decisions;
3. Confidence – faith in oneself and his abilities;
4. Physical Fitness – always in a condition to render effective service even under the most
strenuous conditions;
5. Tactfulness – ability to deal with others successfully without offending; and
6. Self-Control – ability to take hold of oneself regardless of a provoking situation.

GENERAL FUNCTIONS OF A SECURITY GUARD


1. Enforce company rules and regulations;
2. Operate and enforce the personnel identification system;
3. Patrol and observe designated areas, perimeter, structures, installation;
4. Take into custody a person attempting or giving unauthorized access in restricted, limited and
controlled areas;
5. Check rooms, buildings, storage rooms of security interest and after work hours, check proper
locking of doors and gates;
6. Perform escort duties when required;
7. Respond to alarm signals or other indications suspicious activities and emergencies;
8. Safeguard equipment and material against sabotage, unauthorized access, loss, theft or damage;
9. At quickly in situations affecting the security of installation and personnel, to fire accidents,
internal disorder, attempts to commit criminal acts;
10. Control and regulate vehicle and personal traffic within the compound as well as parking of
vehicle; and
11. Other duties that are necessary in the security guard function.

POWER AND DUTIES OF SECURITY GUARD


1. Territorial Power – a security guard shall watch and secure the property of a person, firm or
establishment with whom he or his agency has a contact of security services. Such services
shall not extend beyond the property or compound of aid person, firm or establishment except
when required by the latter in accordance with the terms of their contact, or in hot pursuit of
criminal offenders.
2. Arrest by Security Guard – a security guard or private detective is not a police officer and is
not, therefore, clothed with police authority. However, he may arrest a person under the
circumstances mentioned in section 5, Rule 113, Revised Rules of Criminal Procedure.
3. Search without Warrant – any security guard may, incident to the arrest, search the person so
arrested in the presence of at least two (2) witnesses. He may search employees of the firm or
establishment with which he or his agency with a contract, when such search is required by the
very nature of the business of the person, firm or establishment.
FUNCTIONS OF A PRIVATE DETECTIVE
1. Background Investigation;
2. Locating missing person;
3. Conduct surveillance work; and
4. Such other detective work as may become the subject matter of contract between the agency
and its clients. Except not contrary to law, public order, public policy morale and good custom.

POWERS OF CITY, MUNICIPAL MAYORS IN CASE OF EMERGENCY


>In case of emergency or in times of disaster or calamity when the services of any security
agency/entity and his personnel are needed. The city or municipal mayor may muster or incorporate
the members of the agency or agencies nearest the area of such disaster or calamity to help in the
maintenance of peace and order, prevention of crime, or apprehension of violators of laws and
ordinance, and in the protection of lives and properties.
>They shall receive direct orders from the Chief of Police of the city or municipality for the
duration of the emergency, disaster or calamity.

SUPERVISION OF THE PNP


In case of emergency or in times of disaster or calamities, the Chief, PNP may deputized any
security guard to assist the PNP in the performance of police duties for the duration of such
emergency, disaster or calamity. License guards, who are actually assigned to clients with DDO, shall
be deputized by the Chief, PNP, and clothed with authority to enforce laws, rules and regulations
within his area of responsibility.

INTER-RELATIONSHIP BETWEEN PRIVATE SECURITY PERSONNEL AND MEMBERS


OF THE PNP
1. Private security personnel are always subordinates to members of the PNP on matters
pertaining to law enforcement and crime prevention. They cannot enforce any provision of the
law except in executing citizen’s arrest and/or conducting initial investigation of a commission
of a crime. In such case, any arrested person shall be turned over immediately to the nearest
PNP unit/station.
2. Criminal investigation is the responsibility of the PNP. All results of the initial investigation
conducted by the private security personnel and all evidence gathered by them shall be turned
over to the PNP unit/station concerned as a matter of course without delay.

GROUNDS FOR CANCELLATION OF SECURITY GUARD LICENSE


1. Assisting or protecting criminals during on or off duty status;
2. Providing confidential information to unauthorized person;
3. Posted security guard found drunk and drinking intoxicating liquor; and
4. Other similar acts.

THEFT AND PILFERAGE


Theft – committed by any person, who with intent to gain but without violence, against, or
intimidation of persons nor force upon things shall take personal property or another without the latter
consent.
PSYCHOLOGICAL EXPLANATIONS ON THEFT
1. The need or desire - an individual may need or desire to commit the act because of financial
problem, inadequate income, extravagant living, gambling.
2. The psychological need (Kleptomania) - is an irresistible urge to steal item or trivial value.
People with this disorder are compelled to steal things, generally, but not limited to, objects of
little or no significant value.
3. The criminal tendency - the individual with such tendency may be more tempted to steal if
security control is inadequate.

THE CASUAL AND SYSTEMATIC PILFERER

Casual Pilferer – one who steals due to his inability to resist the unexpected opportunity and has a
little fear of detection.

Systematic Pilferer – one who steals with preconceived plans and take away any or all types of items
or supplies for economic gain.

COMMUNICATION SECURITY – is the protection resulting from the application of various


measures which prevent or delay the enemy or unauthorized persons in gaining information through
the communication system. These includes:
a. Transmission Security – component of communication security which results from all
measures designed to protect transmission from interception.

b. Cryptographic Security – results from the provisions of technically sound crypto-system and
their proper use.

c. Physical Security – providing safeguards to equipment and material from access by


unauthorized persons.

THREATS IN COMMUNICATION SECURITY


1. Wiretapping – is the monitoring of telephone conservations by a third party, often by covert
means.
2. Bugging – means to secretly listen to or record a conservation using a hidden electronic
device.
3. Eavesdropping (unauthorized listening) – is the unauthorized real-time interception of a
private communication, such as a phone call, instant message, videoconference or tax
transmission.

RA No. 4200, Approved June 19, 1965


-An Act to prohibit and penalize wiretapping and other related violations of privacy of
communication, and other purposes.

UNLAWFUL ACTS

Section 1
It shall be unlawful for any person, not being authorized by all the parties to any private
communication or spoken word, to top any wire or cable, or by using any other device or arrangement,
to secretly overhear, intercept. Or record such communication or spoken word by using a device
commonly known as a Dictaphone or Dictagraph or walkie-talkie or tape recorder.
Section 2
It shall be also unlawful for any person, be he a participant or not in the act or acts penalized in
the next preceding sentence, to knowingly possess any tape record, wire record, disc record, or any
other such record, or copies thereof, of any communication or spoken word secured either before or
after the effective date of this Act in the manner prohibited by this law; or to replay the same for any
other person or persons; or to communicate the contents thereof, either verbally or in writing, or to
furnish transcription thereof, whether complete or partial, to any other person:
Provided, That the use of such record or any copies thereof as evidence in any civil, criminal
investigation or trial of offenses mentioned in section 3 hereof, shall not be covered by this
prohibition.

Section 3
Nothing contained in this Act, however, shall render it unlawful; or punishable for any peace
officer, who is authorized by a written order of the Court, to execute any of the acts declared to be
unlawful in the two preceding sections in cases involving the crimes of treason, espionage, provoking
war and disloyalty in case of war, piracy, mutiny in the high seas, rebellion, conspiracy and proposal
to commit rebellion, inciting to rebellion, sedition, conspiracy to commit sedition, inciting to sedition,
kidnapping as defined by the Revised Penal Code, and violations of Commonwealth Act. No. 616,
punishing espionage and other offenses against national security:

AUTHORIZATION - The authorization shall be effective for the period specified in the order which
shall not exceed sixty (60) days from the date of issuance of the order, unless extended or renewed by
the court upon being satisfied that such extension or renewal in the public interest.
The court referred to in this section shall be understood to mean the Court of First Instance within
whose territorial jurisdiction the acts for which authority is applied for are to be executed.

BANK SECURITY - A specialized type of physical security to protecting the assets, personnel and
operations of a bank, with special emphasis on the precaution and measures to safeguard the cash and
assets while in storage, in transit, and during transaction.

>Bangko Central ng Pilipinas (BSP) Circular No. 820 Issued on September 3, 2008 – a Circular
issued by BSP concerning regulations on Bank protection which aims to promote maximum protection
of life and property against crime (robbery, theft, and etc.), and other destructive causes.

Guard System – BSP requires that all banking offices be manned by adequate number of security
personnel to be determined by the bank, taking into consideration its size, location, costs and overall
bank protection requirement.

Security Devices – Banks are required to have a robbery alarm or other appropriate device for
promptly notifying law enforcement office either directly or through an intermediary of an attempted,
ongoing or perpetrated robbery.

In armored Car operations – all armored vehicles are required to be built with bullet resistant
materials capable of withstanding the firepower of high powered firearm (M16, M14). Also equipped
with a vault or safe or a partition wall with a combination lock designed to prevent retrieval of the
cargo while in transit.
DOCUMENT AND INFORMATION SECURITY – Security involving the protection of
documents and information loss, access by unauthorized persons.
 Prescribes the policies and establishes the standard basic procedures governing the
classification and security of official matter.

GENERAL PRINCIPLES
1. The authority and responsibility for the preparation and classification of classified matter rest
exclusively with the originating office;
2. Classified matter should be classified according to content and not the classification of the file
in which there are held or of another document to which they refer;
3. Classification should be made as soon as possible by placing the appropriate marks on the
matter to be classified; and
4. Each individual whose duty allows access to be classified matter in responsible for the
protection of the classified matter while it is in his/her possession and shall insecure that
dissemination of such classified matter is on the “need to know” basis and to “property cleared
personnel only”.

DEFINITION OF DOCUMENT
- Any material that contains marks, symbols, and signs, either visible, partially visible or
completely invisible that may be presently or ultimately convey a meaning or message to
someone.

CLASSIFY – refers to the act of assigning to information or material one of the four security
classification categories after determination has been made that the information requires the security
protection as provided for in the regulation;

SECURITY CLEARANCE – is an administrative determination that an individual is eligible from a


security standpoint for access is classified matter of a specified category;

COMPARTMENTATION – refers to the grant of access to classified matter only to property cleared
persons when such classified information is required in the performance of their official duties, and
restricting it to specific physical confine when feasible.

NEED TO KNOW – term given to the requirement that the dissemination of classified matters be
limited strictly to those persons whose official duties require knowledge thereof.

SECURITY CLASSIFIED MATTER

CLASSIFICATION OF DOCUMENTS
-Memorandum Circular No. 196, dated 07/19/1968 (Security of Classified Matter in government
offices.)

1. TOP SECRET – any information and material, the unauthorized disclosure of which would cause
exceptionally gave damage to the nation, politically, economically or militarily;

2. SECRET – any information and material, the unauthorized disclosure of which would endanger
national security, cause serious injury to the interest or prestige of the nation or any governmental
activity.

3. CONFIDENTIAL – any information and materials, the unauthorized disclosure of which would be
prejudicial to the interest or prestige of the nation or governmental activity or would cause
administrative embarrassment or unwarranted injury.
4. RESTRICTED – any information and material which requires special protection other than those
determined to be Confidential, Secret, and Top Secret matters.

METHOD OF TRANSMISSION
1. By direct contact of officer or personnel concerned;
2. By official courier;
3. Electrical means of cryptographic form; and
4. Registered Mail

DESTRUCTION
1. Burning
2. Shredding

STORAGE
Shall be in a safe, steel filling cabinet with built in a dial type combination lock of such weight,
size and construction as to minimize the possibility of physical theft or damage to fire.

OPERATIONAL SECURITY – part of physical security that deal primarily with the protection of
processes, formulas, patents, and other industrial and manufacturing activities that espionage,
infiltration, loss, compromise or photocopying;

INFORMATION CYCLE
1. The Creation – information is discovered and develop;
2. Used – some action is takes with the information;
3. Storage and Retrieval – stored for future use;
4. Transfer – transferring of information from active to inactive use; and
5. Disposition – decision may be made to retrain the information indefinitely.

KINDS OF SENSITIVE INFORMATION

PROPRIETARY INFORMATION
- Information which some special way is related to the status, operations or activities of the
possessor over which the possessor asserts ownership.

TRADE SECRETS
- It may consist of any formula, pattern, device or compilation of information which is used in
one’s business and which gives one opportunity to gain an advantage over competitors who do
not know or use it.

PATENT
- A grant given by the government to an inventor, conveying and securing to him the exclusive
rights to make, use and sell his invention for term of twenty (20) years.

LAW ON INTELLECTUAL PROPERTY

INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES [Republic Act No. 8293]


Approved on June 6, 1997
AN ACT PRESCRIBING THE INTELLECTUAL PROPERTY CODE AND ESTABLISHING THE
INTELLECTUAL PROPERTY OFFICE, PROVIDING FOR ITS POWERS AND FUNCTIONS,
AND FOR OTHER PURPOSES
THREAT TO PROTECTION OF SENSITIVE INFORMATION
Competitive Intelligence – systematic program for gathering and analyzing information about
competitor’s activities and general business trends to further company’s goals.

Types of Competitive Intelligence


1. White – Information available from company publication, public records or commercial
reporting sources;
2. Gray – not readily available but which is usually can be obtained without acquiring any
civil/criminal liability in the process.
3. Black – obtained through clearly unethical or illegal means.

TYPES OF DOCUMENTS

Class I – Vital Document - this is an irreplaceable record, reproduction of which does not have the
same value as the original;

Class II – Important Document – This is the record, reproduction of which cause considerable
expense and labor, or considerable delay;

Class III – Useful Document – This is a record, the loss of which may cause inconvenience but could
be readily replaced and may not present insurmountable obstacle to the prompt restoration of the
business; and

Class IV – Non-essential Document – This record may include daily files, routine in nature, lost of
which will not affect the organization.

STORAGE
1. SAFE – a metallic container used for safekeeping of documents or small items in office or
installation.
2. VAULT – a heavily constructed fire and burglar resistant container usually part of the building
structure use to keep and protect cash, documents and negotiable documents.
3. FILE ROOM – a cubicle in a building constructed a little lighter than a vault but a bigger size
to accommodate limited people to work on the records inside.

PERSONNEL SECURITY
- Refers to the procedure followed, inquires conducted, and criteria applied to determine the
work suitability of a particular applicant or the retention of a particular employee.

PURPOSE
1. To ensure that hired employees are best suited to assist the organization in achieving its
mission and vision;
2. To assist in providing the necessary security to the employees while they carry out their
functions.

PERSONNEL SECURITY INVESTIGATION (PSI)


It is an inquiry into the character, reputation, discretion, integrity, morals, and loyalty of an
individual in order to determine a person’s suitability for appointment or access to classified matter.
TYPES OF PSI
1. National Agency Check
2. Local Agency Check
3. Partial Background Investigation
4. Complete Background Investigation

BACKGROUND INVESTIGATION (BI) – it is an injury which aim to verify applicant’s


information written at the applicant’s form, to ascertain his/her past employment experiences and to
obtain other information pertinent to the decision to employ.

FACTORS TO BE CONSIDERED IN THE CONDUCT OF BI

TYPES OF SECURITY
1. Industrial Security – A form of physical security that is concerned with the physical measures
designed to safeguard personnel and prevent unauthorized access to equipment, facilities,
materials, documents, and to protect them from espionage, sabotage, damage or theft.

2. Bank Security – Is the protection resulting from the application of various measures which
safeguards cash and assets which are in storage, in transit and during transaction.

3. Operational Security – Involves the protection of processes, formulas and patents, industrial
and manufacturing activities from espionage, infiltration, loss, compromise or photocopying.
- Security Surveys are often called ‘RISKS ANALYSIS SURVEYS’ or ‘RISKS
ASESSMENT SURVEYS’

PURPOSES OF SECURITY SURVEY:


1. To determine the existing state of security;
2. Identifying weaknesses in defense;
3. To determine the degree of protection required; and
4. To produce recommendations for a total security system.

The survey should be undertaken by either suitability trained staff security personnel, or a fully
qualified independent security specialist. No universal checklist can be applied to all sites for
survey purposes, as no two facilities are alike.
INDUSTRIAL SECURITY MANAGEMENT

INSTRUCTIONS: Select the correct answer in each of the following questions. Mark only one answer on
each item by a putting a circle corresponding to the letter of your choice.

1. This is a medium or structures that define the physical limits on installations or are to restrict of impede
access thereto.
A. natural barrier B. perimeter barrier
C. man-made barrier D. security barrier
2. The three basic lines of physical security are the following, sometimes all of these lines of defense are
available, other times only one or defense are available, and they are as follows, EXCEPT:
A. concrete walls and fences B. building interior
C. perimeter barrier D. building exterior
3. These are structural constructions like fences, walls, floors, roofs, grills, bars, road blocks, op other
physical means to deter or impede penetration, and prevent unauthorized access.
A. natural barriers B. man-made barriers
C. perimeter barrier D. all of these
4. It is a type of perimeter barrier made of chain link design with mesh openings design not larger than
two inches square of #9-gauge wire or heavier, twisted and has barbed wire salvage at top and bottom.
A. garrison wire B. barbed wire
C. wire fence D. Marcelo wire
5. It is an unobstructed area maintained at both sides of the perimeter barrier, consisting of twenty feet or
more between the barrier and exterior structure which provide concealment and assistance to a person seeking
unauthorized entry.
A. restricted zone B. clear zone
C. unblemished zone D. transparent zone
6. This is house-like structures above the perimeter barriers, as the height of this structure increases, and
the visibility of guards of duty likewise improves.
A. guard house B. sentry station
C. security tower D. guard towers
7. It is an additional overhang barbed wire placed on vertical perimeter fences facing upward and outward
with a forty-five-degree angle, and with three to four strands of barbed wire spaced six inches apart.
A. topguard B. topping
C. barbed wires D. wire fence
8. This includes the records that are irreplaceable, records wherein reproduction of which does not have
the same value as the original.
A. non-essential records B. useful records
C. vital records D. important records
9. These are designed to meet the specifications for safeguarding classified materials, and it is included
some of the categories of safe.
A. record safes B. security cabinets
C. money safes D. all of these
10. It is another procedure important in controlling access to restricted areas and this is due to the fact that
lock is only as secure as this is also secure.
A. card control B. lock control
C. access control D. key control
11. Effective _________ should also use a distinctive intricate background design difficult to reproduce,
and have some characteristics known only to management
A. identification cards B. access cards
C. badges or passes D. biometric cards
12. It can be used with employee, as well as visitors, and this system requires the person seeking entrance
to sign in with receptionist or security guard, and present identification.
A. check-in and check-out register
B. security log books
C. visitors log register
D. entry and exit record books
13. These include identifying, directing or limiting the movement of vehicles, employees, contractors,
vendors, and visitors.
A. security control B. entry & exit control
C. access control D. perimeter control
14. It is otherwise known as the Private Security Law in the Philippines, as amended, and was enacted on
July 13, 1969, and has provided for the qualifications of security operators and guards.
A. R.A. No. 7548 B. R.A. No. 4857
C. P.D. No. 1919 D. R.A. No. 5487
15. In the City of Manila, the first formally licenses private security agency with the business name of
“Special Watchman Agency,” was set up, and it was later to be known as the __________.
A. Bombay Serene B. Manila Security Agency
C. Jimenez Security Agency D. none of these
16. It is the first private detective agency formed in the United States, and which is specializing in
providing investigative and security services for railroads and industrial organizations.
A. Wells Fargo & Company B. Pinkerton Detective Agency
C. Bow Street Runners D. Evangelical Police
17. It is a government agency in-charge with the supervision of the operation of Private Detective Agencies
and Private Security Agencies through the enforcement of the Implementing Rules and Regulations of the
Private Security Agency Law.
A. PADPAO, Inc. B. SOSIA
C. SEC D. CSG
18. It is the consultant of the C, PNP in the enforcement of the Implementing Rules and Regulations of the
Private Security Agency Law, and serve as the umbrella organization of the Private Detective Agencies, Private
Security Agencies and Government Security Forces.
A. PADPAO, Inc. B. NAPOLCOM
C. PNP D. Local Government
19. Briefly, it is an approach that brings to bear—in an organized manner—all of the security components
and resources with loss prevention, protection of employees, physical assets, business, or personal integrity,
reputations, proprietary information, and other intangible assets.
A. physical security B. comprehensive security
C. private policing D. public policing
20. It has been defined as the use of measures designed to safeguard personnel, to prevent unauthorized
access and entry to equipment, facilities, and documents, and to safeguard these against espionage, sabotage,
theft and fraud by intruders.
A. bodyguards B. guards
C. private police D. security
21. These include those self-employed individuals and privately funded business entities and organizations
providing services to a specific clientele for a fee.
A. private policing B. private security
C. private detective D. private agency
22. It is the broadest branch of security which is concerned principally with the physical measures adopted
to prevent unauthorized access.
A. physical security B. security officers
C. security watchman D. security guards
23. It is a type of physical security involving the protection of documents and classified information from
loss, access by unauthorized persons, damage, theft, and compromise through disclosure.
A. communications security B. document security
C. records security D. information security
24. They are the common and highly visible type of security, and who is usually in uniform and is
sometimes armed, and they control access to private property, maintain order on the premises, and enforce the
rules and regulations of the employer.
A. watchman B. security officers
C. security guards D. private security
25. It is part of physical security that deals primarily with the protection of processes, formulas, patents,
and other industrial and manufacturing activities from espionage, infiltration, loss, compromise, or
photocopying.
A. tactical security B. activities security
C. management security D. operational security
26. It is the importance of the firm or establishment with reference to the national security and economy.
A. relative criticality B. relative vulnerability
C. relative probability D. all of these
27. It is the susceptibility of the plant or establishment to damage, loss or destruction of operation, and the
likes due to various hazards.
A. relative criticality B. relative vulnerability
C. relative probability D. none of these
28. It is the conditions or a set of conditions that may worsen or increase the business or establishment’s
assets exposure to hazard or loss.
A. relative criticality B. relative vulnerability
C. relatively probability D. relative possibility
29. It is a complex challenge to security and safety activities, and consequently it is essential to define and
to analyze all hazards that might be encountered to make it possible to restrict the number and scope of such
disturbance, either natural or man-made.
A. security hazard management
B. handling security hazard
C. hazard management cycle
D. hazard management balance
30. It is a fact finding probe to determine the plants adequacy and deficiency in all aspects of security with
the corresponding recommendations.
A. security operations B. security inspection
C. security survey D. security check
31. It is term used for the succeeding surveys after the conduct of initial survey, and it is also termed as
follow up survey.
A. detailed looks and see B. security inspection
C. security observation D. security visitation
32. It is one directed by the management if the initial survey appears to have left certain portions or aspects
involving security due to change in policy or operation that will greatly affect the total security picture.
A. common survey B. ordinary survey
C. special survey D. regular survey
33. These are the counter-measures for vulnerabilities, and which are of four types, i.e., deterrent,
preventive, corrective, and detective.
A. controls B. mechanism
C. measures D. security
34. These make a system more prone to attack by a threat or make an attack more likely to have some
success or impact, e.g., the occurrence or natural or man-made hazard.
A. probabilities B. vulnerabilities
C. criticalities D. susceptibilities
35. It is a dialogue between the survey teams and the management, and official of plant before the security
survey is conducted.
A. coordinating conference B. command conference
C. entrance conference D. management conference
36. Before an actual security survey is conducted a __________ it is made with the appropriate officials in
the manufacturing installations or business concerns.
A. regular contact B. preliminary contact
C. initial contact D. continuous contact
37. After the security survey is developed, someone should __________ the establishment, observing and
talking to personnel to obtain the required information.
A. initial walk through B. walk through facility
C. preliminary walk through D. physical walk through
38. All potential targets of attack should be identified and the means of eliminating or reducing hazard to
those targets specified, and __________ should also be identified.
A. potential hazard B. actual hazard
C. pure hazard D. security hazard
39. It is similar to entrance conference, and it is done after the completion of the security survey.
A. exit conference B. debriefing conference
C. command conference D. briefing conference
40. Security survey is performed by qualified security experts who can be from the organization or
outsiders contracted to do the job, and recommendations will fall into the following categories, EXCEPT:
A. human guard B. equipment
C. procedures D. security hazard
41. The popular television series have glamorized their profession, but in reality, today criminal
investigation is only a small part of their work.
A. private detectives B. private investigator
C. public investigator D. none of these
42. It is the protection resulting from the application of various measures which prevent or delay the enemy
or unauthorized person in gaining information through the communication system.
A. building security B. installation security
C. transmission security D. communications security
43. This is a part of personal security, and this work involves not only the safety of the high ranking
officials of the land but it also involves diplomatic implications in the event that any untoward incident happens
to a visiting dignitaries.
A. political security B. crisis security
C. personal and VIP security D. government security
44. It is another specialized line to physical security, and due to the peculiar nature of the business
operations, the main objective of the protection of the life of employees and company assets.
A. school security B. hotel security
C. supermarket security D. bank security
45. In any plant of industrial complex, this is indispensable not only in security work but in the plant
operation itself, and it is numerous types are available for use.
A. inter-communications B. intra-communications
C. all of these D. none of these
46. This type of security, are those hired directly under the payroll of an employer to protect the employer’s
property, and they are considered employees of the company.
A. company guards B. in-house guards
C. govt. security guards D. all of these
47. There are other individuals or entities prefer to avail the services of an outside firm on contract basis,
specializing in providing trained security guards, and these firms are:
A. private security guard B. private security agency
C. private detective D. government security unit
48. They are charge with directing the work and observing the behavior performance of the men under his
unit, and the principal task is providing leadership within an organization.
A. security officer B. security consultant
C. security supervisor D. security manager
49. It is a physical security as applied to business groups engaged in industries, like manufacturing
assembling, research and development, processing, warehousing, and even agriculture and pasture lands.
A. bank security B. operational security
C. industrial security D. hotel security
50. In addition to doing background checks on employees, sometimes using deception detection instrument,
they can also provide advice on risk management.
A. security manager B. security consultant
C. security officer D. security supervisor

You might also like