You are on page 1of 25

INDUSTRIAL SECURITY MANAGEMENT

Table of Specifications:

Industrial Security of Administration


Outcomes:

A. Introduction to Industrial Security.


 Identify the legal bases for Industrial Security in the Philippines,
 and memorize the various types of security,
 and the three (3) major divisions of security.

B. Physical Security.
 Apply the principles of physical security,
 and barriers in utilizing the appropriate protective system in relation to protective
lightning, protective alarm,
 and communication system, protective locks and key control, protective cabinets as
well as salient provisions of RA. No. 5487 in relation to Gard force system.

C. Personnel Security.
 Explain the purpose and importance of personnel security, carry out various methods
of personnel security investigation,
 and implement security education programs.

INRODUCTION

SECURITY
 The state or quality, condition of being secure, freedom from fear, harm, danger, loss, destruction or
damages;
 To secure is to make safe or be protected
 Defense against crime

SAFETY
 Freedom from HAZARDS
 Shall refer to the physical or environmental conditions of work or employment, which substantially comply
with legal requirements.

BASIC PRINCIPLES OF SECURITY


1. Command responsibility
- Cannot be delegated but the security tasks can be assigned
2. Compartmentation
- Need to know basis
3. Balance between security and efficiency
- Security prevails over efficiency
4. General principles of security remain constant
- Specific measures to suit operations
5. Security is the concern of all personnel
- Regardless of rank, position, designation
HISTORICAL BACKGROUND OF SECURITY INDUSTRY

Man in the course of history has always showed that he values property next to his life and loved ones. Centuries
before the modern concept of security and crime prevention came into practice, cave dwellers fought among
themselves to protect life and property. Eventually, families and clans banded together as tribes and later on formed
communities for mutual protection, recognizing that there is strength in numbers.

1|LEA-2
The Great Wall of China, stretching a length of 2,414 kilometers and a height varying from 20 ft. at its lowest point to
50 feet high, serves as a living barrier for man to protect himself. Watch towers are placed in strategic areas at
regular intervals and troops are summoned by beacons of fire passing through the top of the wall.

As early as 27BC-14AD, during the time of Emperor Augustus of the Roman Empire, the Praetorian Guards was
organized to protect the life of the emperor, at the same time, keep peace and order in the streets of Rome.

In the Philippines, after World War II, several factors immensely contributed to the rapid growth of the local security
industry: When surplus amiss found their way into the hands of the populace, tension was created due to the
proliferation of loose unlicensed firearms and aggravated by the uncontrolled ingenious backyard gunsmith of gifted
Filipino technicians; the complacency and/or inability of the state to control urban migration, thus creating squatter
areas breeding places of crime, where poverty, filth and squalor abound; the government's inability to adapt a long
term economic and political solution to alleviate existing and inadequate living conditions. The lack of political will in
eradicating or stopping the formation of quasi-politico-religious lawless groups; protest, crime, terrorism, kidnap for
ransom, carnapping with the perpetrators in cahoots with elements of law enforcement agencies and countless valid
reasons that eroded the moral values of the people.

As of 1999, there are more than 400,000 security personnel, outnumbering the total AFP and PNP personnel
combined. This is the aftermath of the growth of local security industry.
Furthermore, the paradigm shift to globalization and the recent advancement in computer technology pose a greater
challenge to the security industry.

LEGAL BASES OF INDUSTRIAL SECURITY IN THE PHILIPPINES:

A.  Natural Authority
 The highest law is the law of preservation
 By instinct, man naturally reacts to protect himself, his family, his home, freedom, liberty and property from
danger, threat or hazard. He does it personally or thru the help of others.

B. Constitutional Authority

1. The prime duty of the government is to serve and protect people. The government may call upon the people to
defend the state and, in the fulfillment thereof, all citizens may be required under conditions provided by law or
to render personal military or civil service. (Art II, Sec 4 of the 1987 Philippine Constitution)
 Take note also that all citizen who are qualified, including the security guards, may be required by law to
render personal military or civil service. The service required of the citizen is personal.

2. No person shall be deprived of life, liberty or property without due process of law, nor shall any person be denied
the equal protection of the laws. (Art III, Sec1 of the 1987 Philippine Constitution)
 This means that the life, liberty, freedom and property can only be taken from a person after the observance
of due process of law.

3. Private Property shall not be taken for public use without just compensation. (Art III Sec. 9 of the 1987 Philippine
Constitution)
 The Constitution protects not only ownership but also possession, enjoyment, use and disposition of private
property by their rightful owners subject to such limitations imposed by law.
 In this regards, private property to be taken by the government in its exercise of the power of the eminent
domain must satisfy two important conditions, namely: public use and just compensation.

4. The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches
and seizures of whatever nature and for any purpose shall be inviolable, and no search warrant or warrant of
arrest shall be issue except upon probable cause to be determined personally by the judge after examination
under oath or affirmation of the complainant and the witnesses he may produce, and particularly describing the
place to be search and the persons or things to seize. (Art III, Sec 2 of the 1987 Philippine Constitution).

C. Statutory Authority

1. The Revised Penal Code (Act No. 3815, as amended)

2|LEA-2
 The applicable provisions of the Revised Penal Code on Crime Against Persons. Personal liberty, security and
property have bearing on the security and protection of one’s life, liberty and property.

2. Private Security Agency Law (Republic Act No. 5487 as amended)


 “Act to Regulate the Organization and Operation of Private Detective, Watchman or Security Guards
Agencies”
 approved and took effect on JUNE 13, 1969.
 This law governs the operation, administration of security agency, activities and qualifications, duties and
licensing of security guards, watchmen and private detectives.
 In short, it is the intention of this law to professionalize the security services in order to upgrade the level of
security protection.

PROTECTIVE SECURITY

 can be defined as those measures taken by an installation or unit to protect itself against sabotage, espionage
or subversion and at the same time provide freedom of action in order to provide the installation of the unit
with the necessary flexibility to accomplish its mission.

The aspects of protective security can be seen with the application of the following:
A. Industrial Security E. School Security
B. Hotel Security F. Supermarket or Mall Security
C. Bank Security G. Other types – this includes all other security
D. VIP Security matters not covered in the above enumeration

Industrial Security
 a type of security applied to business groups engaged in industries like manufacturing, assembling, research
and development, processing, warehousing and even agriculture.
 It may also mean the business of providing security.

Hotel Security
 a type of security applied to hotels where its properties are protected from pilferage, loss, damage and the
function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves. This
type of security employs house detectives, uniformed guard and supervisor and ensures that hotel guests
and their personal effects are safeguarded.

Bank Security
 this type of security is concern with bank operations.
 Its main objective is the protection of bank cash and assets, its personnel and clientele.

VIP Security
 a type of security applied for the protection of top-ranking officials of the government or private entity,
visiting persons of illustrious standing and foreign dignitaries.

School Security
 a type of security that is concern with the protection of students, faculty members, and school properties.

Supermarket or Mall Security


 a type of security which is concern with the protection of the stores, warehouses, storage, its immediate
premises and properties as well as the supermarket personnel and customers.

MAJOR AREAS OF INDUSTRIAL SECURITY MANAGEMENT


1. Physical Security
2. Personnel Security
3. Document & Information Security

1. PHYSICAL SECURITY
 The broadest branch of security which is concerned with the physical measures adopted to prevent
unauthorized access to equipment, facilities, materials and document and to safeguard them from espionage,
sabotage, damage, loss and theft.

3|LEA-2
 defined as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies,
programs, personnel, property, utilities, information, facilities and installation against compromise, trespass,
sabotage, pilferage, embezzlement, fraud, or another dishonest criminal act.
 It is the sum total of all physical protection employed or installed to secure assets.
 Ex. Human Guards, perimeter fence/barrier and security devices

BARRIER
 defined as any physical structure whether natural or man-made, capable of restricting, deterring, delaying or
preventing illegal and unauthorized access to an installation.

Two General Types of Physical Barriers:


A. Natural Barrier
B. Man-Made Barrier

Natural Barrier
 it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to traverse
which delay or make more difficult the entry of the intruder.
Man-Made Barrier
 Structural constructions like fences, walls, floors, roofs, grills, bars, road blocks, or other physical means to
deter or impede penetration.

Kinds of Barriers:
A. Natural barriers D. Animal barriers
B. Structural barriers E. Energy barriers
C. Human barriers

Natural barriers
 it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to
traverse.
Structural barriers
 these are features constructed by man regardless of their original intent that tends to delay the intruder.
 Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
Human barriers
 persons being used in providing a guarding system or by the nature of their employment and location, fulfill
security functions.
 Examples are guards, office personnel, shop workers, etc.
Animal barriers
 animals are used in partially providing a guarding system.
 Dogs are usually trained and utilized to serve as guard dogs. German shepherds are best suited for security
functions.

Energy barriers
 it is the employment of mechanical, electrical, electronic energy imposes a deterrent to entry by the potential
intruder or to provide warning to guard personnel.
 These are protective lighting, alarm system and any electronic devices used as barriers.

Three Lines of Physical Defense:


1. First line of Defense
 perimeter fences/ barriers
2. Second line of defense
 doors, floors, windows, walls, roofs and grills and other entries to the buildings
3. Third line of defense
 storage system like steel cabinets, safes, vaults and interior files.
1. PERIMETER BARRIER
 (1st Line of Defense)

MAIN PURPOSE
 To deny, to delay or impede access or exit unauthorized person/s. 

OTHER PURPOSE OF PERIMETER BARRIER


4|LEA-2
 Defines the boundary of the property to be secured
 Creates a physical and psychological deterrent to unauthorized entry
 Delays intrusion, thus facilitating apprehension of intruders
 Assists in a more efficient and economical employment of guards
 Facilitates and improves the control of pedestrian and vehicular traffic

TYPES OF FENCING
1. SOLID
2. FULL-VIEW

Solid fence
 constructed in such a way that visual access through the fence is denied.
 Its advantage is that it denies the opportunity for the intruder to become familiar with the personnel,
activities and the time scheduled of the movements of the guards in the installation.
 On the other hand, it prevents the guards from observing the area around the installation and it creates
shadow that may be used by the intruder for cover and concealment.
Full-view fence
 it is constructed in such a way that visual access is permitted through the fence.
 Its advantages are that it allows the roving patrols and stationary guard to keep the surrounding are of the
installation under observation.
 On the other hand, it allows the intruder to become familiar with the movements and time schedule of the
guard patrols thereby allowing him to pick the time that is advantageous on his part.

Types of Full-View Fence:


A. Chain link fence
B. Barbed wire fence
C. Concertina wire fence

CHAIN LINK FENCE


 Must be constructed of 7 - foot material excluding top guard
 Must be of 9-gauge or heavier
 Mesh opening are not larger than 2" per side
 Should be twisted and barbed salvage of top and bottom
 Must be securely fastened to rigid metal or reinforced concrete
 Must reach within 2" of hard ground or paving
 On soft ground, must reach below surface deep enough to compensate for shifting soil or sand

BARED WIRE FENCE


 Standard barbed wire is twisted, double strand, 12-gauge wire within 4-point barbs spaced an equal distant
apart.
 Barbed wire fencing should not be less than 7 feet high, excluding top guard
 Barbed wire fencing must be firmly affixed to posts not more than 6 feet apart.
 The distance between strands must an exceed 6" and at least one wire will be interlaced vertically and
midway between posts.

CONCERTINA WIRE FENCE

 Standard concertina barbed wire is commercially manufactured wire coil of high strength steel barbed wire
clipped together at intervals to form a cylinder.
 Opened concertina wire is 50 feet long and 3 feet in diameter.

THE TOP GUARD

5|LEA-2
 A top guard is an overhead of barbed wire along the top of the fence, facing outward and upward at
approximately 45-degree angle.
 Top guard supporting arms will be permanently affixed to the top of fence posts to increase the overall
height of the fence by at least one foot.
 Three strands of barbed wire, spaced 6" apart, must be installed supporting arms.

CLEAR ZONES

A. A clear zone of 20 feet or more should exist between the perimeter barrier and exterior structures, parking
areas and natural or man-made features.
B. A clear zone of 50 feet or more should exist between the perimeter and structures within the protected
areas except when a building constitutes part of the perimeter barrier.

2. BUILDING EXTERIORS 
(2nd Line of Defense)
1. Walls
2. Doors
3. Windows
4. Roof Openings
5. Fire Escapes

3. INTERIOR CONTROLS 
(3rd Line of Defense)
1. ID System
2. Entrance
3. Exit
4. Restricted Area
5. Alarm Sensors
6. Communication Systems
a. Local Tel Exchange
b. Two-Way Radio
c. Commercial Tel Service
d. Call Boxes
e. Intercommunications
f. Paging & Recall System
7. Guards 

DOGS AND ASSET PROTECTION (K9)


1. Basic Instincts
a. Hunting, attack without fear
b. Pack, sees human as a member of his pack and will protect him

2. Primary Value
a. Sensor mechanism, 100X better than man
b. Hearing 2X that of man

3. Secondary Value
a. Attack/Pursue, attack/hold

4. Dog's Sense
a. Smell
b. Hearing
c. Sight
d. Touching
 
5. Deployment
a. With Handlers
b. Without Handlers

6|LEA-2
PROTECTIVE LIGHTING
 is the single most cost-effective deterrent to crime because it creates a psychological deterrent to the
intruders.

Types of Protective Lighting


A. Continuous lighting C. Movable or Portable Lighting
B. Stand-by Lighting D. Emergency Lighting

A. Continuous lighting
 the most familiar type of outdoor security lighting
 this is designed to provide two specific results: glare projection or controlled lighting.
 it consists of a series of fixed luminaries at range to flood a given area continuously during the hours of
darkness.

1. Glare Protection Type


o The intensity is focused to the intruder while the observer or guard remains in
the comparative darkness. The lighting is toward the approach of an entrance to
an installation. Lights with reflectors increase glare. It is being used in prisons
and correctional institutions to illuminate walls and outside barriers.
2. Controlled Lighting
o The lighting is focused on a pile of items rather than on the background. The
width of the lighted strip can be controlled and adjusted to suit the security
needs.

B. Stand-by Lighting
 it is designed for reserve or standby use or to supplement continuous systems. A standby system can be most
useful to selectively light a particular area in an occasional basis.
C. Movable or Portable Lighting
 this system is manually operated and is usually made up of movable search or floodlights that can be located
in selected or special locations which will require lighting only for short period of time.
D. Emergency Lighting
 A stand-by lighting which can be utilized in the event of electrical failure or other emergencies when other
system is inoperative, either due to local equipment or commercial power failure.

Types of Lighting Equipment:


Four types of lighting equipment are generally used or associated with security lighting. These are:
A. Flood lights C. Search lights
B. Street lights D. Fresnel lights

A. Flood lights
 These can be used to accommodate most outdoor security lighting needs, including the illumination
of boundaries, fences and buildings and for the emphasis of vital areas or particular buildings.
B. Street lights
 This lighting equipment received the most widespread notoriety for its value in reducing crime.
C. Search lights
 These are highly focused incandescent lamp and are designed to pinpoint potential trouble spots.
D. Fresnel lights
 These are wide beam units, primary used to extend the illumination in long, horizontal strips to
protect the approaches to the perimeter barrier.
 Fresnel projects a narrow, horizontal beam that is approximately 180 degrees in the horizontal and
from 15 to 30 degrees in the vertical plane.
ALARM
 is an aural or visual signal given by the annunciator to security when intruder actuates device in a
protected area.
 designed to alert security personnel to consummated or attempted intrusions into an area, building
or compound

PROTECTIVE ALARM
 It assists the security in detecting, impeding or deterring potential security threat in the installation.

7|LEA-2
 Basically, its function is to alert the security personnel for any attempt of intrusion into a protected
area, building or compound. Once an intruder tampers the circuitry, the beam or radiated waves of
the alarm system, it will activate an alarm signal.

Three Basic Parts of Alarm System:


1. Sensor or trigger device
 it emits the aural or visual signals or both.
2. Transmission line
 a circuit which transmits the message to the signaling apparatus.
3. Enunciator/ annunciator
 it is the signaling system that activates the alarm.

Types of Protective Alarm System:


A. Central Station System D. Auxiliary alarm
B. Proprietary system E. Local alarm by chance system
C. Local alarm F. Dial alarm system

A. Central Station System


 a type of alarm where the control station is located outside the plant or installation. When the
alarm is sounded or actuated by subscriber, the central station notifies the police and other
public safety agencies.
B. Proprietary system
 centralized monitor of the proprietary alarm system is located in the industrial firm itself with a
duty operator. In case of alarm, the duty operator calls whatever is the primary need;
firefighters, police, an ambulance or a bomb disposal unit.

C. Local Alarm
 This system consists of ringing up a visual or audible alarm near the object to be protected. When an intruder
tries to pry a window, the alarm thereat goes off.
D. Auxiliary alarm
 company-owned alarm systems with a unit in the nearest police station so that in case of need, direct call is
possible. The company maintains the equipment and lines both for the company and those in the police, fire
and other emergency agencies by special arrangement. The auxiliary system can be availed of by radio,
landlines, or cell phones.
E. Local alarm by chance system
 This is local alarm system in which a bell or siren is sounded with no predictable response.
 This system is used in residence or small retail establishment which affords a respond system.
 The hope is that a neighbor or passing patrol car will reach to alarm and call for police assistance, but such a
call is purely a matter of chance.

F. Dial alarm system


 This system is set to dial a predetermined number or numbers when the alarm activate. The numbers
selected might be the police or the subscriber’s home number, or both.
 When the phone is answered, a recording states that an intrusion in progress at the location so alarmed.

Kinds of Alarms Devices:


A. Audio Detection Device D. Laser Beam Alarm
B. Vibration Detection Device E. Photoelectric or Electric Eye Device
C. Metallic foil or wire F. Microwave Motion Detection Device

A. Audio Detection Device


 it will detect any sound caused by attempted force entry. A supersonic microphone speaker sensor is installed
in walls, ceilings and floors of the protected area.
B. Vibration Detection Device
 it will detect any vibration caused by attempted force entry. A vibration sensitive sensor is attached to walls,
ceilings or floors of the protected area.
C. Metallic foil or wire
 it will detect any action that moves the foil or wire. An electrically charge strips of tinfoil or wire is used in the
doors, windows or glass surfaces of the protected area.
8|LEA-2
D. Laser Beam Alarm
 a laser emitter floods a wall or fencing with a beam so that when this beam is disturbed by a physical object,
an alarm is activated.
E. Photoelectric or Electric Eye Device
 an invisible/visible beam is emitted and when this is disturbed or when intruder breaks contact with
the beam, it will activate the alarm.
F. Microwave Motion Detection Device
 a pattern of radio waves is transmitted and partially reflected back to an antenna. If they strike a
moving object, they return at a different frequency which results in initiating an alarm signal.

Other forms of alarm:

Foot rail activator:


 Are place on the floor in such a position that tellers may activate the alarm by placing the front of their foot
to engage the activation bar.
 Foot rail do not acquire any obvious use of the teller’s hand and their hands may kept in full view of the
robbers for reason of safety, because foot rail can be activated very obtrusively and safely then will frequently
be found in the banks where tellers normally operate while standing up.
Bill Traps:
 Or currency activation devices
 Usually place in the tellers’ cash drawer and connected to the alarm system using a wire connector. When
currency is removed from the devices, the alarm is activated
Knee or thigh buttons:
 These are installed inside the desk or teller station which can be activated by knee or thigh pressure. They are
commonly found in location where personnel usually perform their duties from seated position.

Foot button:
 Like the foot rail, permit alarm activation in relatively safety while both hands remain clear in view of the
robbers.
Double squeeze buttons:
 Required pressure on both side of the device and therefore the probability of accidental alarm is reduced.

PROTECTIVE LOCK and KEY CONTROL

LOCK
 defined as a mechanical, electrical, hydraulic, or electronic devised designed to prevent entry into a building,
room, container or hiding place.
PETERMAN
 a term in England for lock picker, safecracker, and penetrator of restricted areas or room.

Types of Locks:
A. Key-operated mechanical lock E. Electrical lock
B. Padlock F. Card-operated lock
C. Combination lock G. Biometric system
D. Code-operated lock

1. Key-operated mechanical lock


 it uses some sort of arrangement of internal physical barriers (wards tumblers) which prevent the lock from
operating unless they are properly aligned.
 The KEY is the device used to align these internal barriers so that the lock may be operated.
Three (3) Types of Key-operated Lock:
A. Lever tumbler lock C. Pin tumbler lock
B. Disc tumbler lock D. Warded lock

A. Lever Tumbler Lock


 is a type of lock that uses a set of levers to prevent the bolt from moving in the lock.
 In the simplest of these, lifting the tumbler above a certain height will allow the bolt to slide past.
 The number of levers may vary, but is usually an odd number for a lock that can be opened from each side of
the door in order to provide symmetry.
 A minimum number of levers may be specified to provide an anticipated level of security
9|LEA-2
B. Disc Tumbler Lock
 are composed of slotted rotating detainer discs.
 An especially cut key rotates these discs like the tumblers of a safe to align the slots, allowing the sidebar to
drop into the slots, thus opening the lock.
 Unlike a wafer tumbler lock or a pin tumbler lock, this mechanism does not use springs. Because they do not
contain springs, they are better suited for areas with harsh conditions and are often used at outdoor locations
like railroad and public utility installations.
C. Pin Tumbler Lock
 The pin tumbler lock (or Yale lock, after lock manufacturers Yale) is a lock mechanism that uses pins of
varying lengths to prevent the lock from opening without the correct key.
 Pin tumblers are most commonly employed in cylinder locks, but may also be found in tubular pin tumbler
locks (also known as radial locks).
D. Warded lock
 also called a ward lock
 is a type of lock that uses a set of obstructions, or wards, to prevent the lock from opening unless the correct
key is inserted?
 The correct key has notches or slots corresponding to the obstructions in the lock, allowing it to rotate freely
inside the lock.

2. Padlock
 a portable and detachable lock having a sliding hasp which passes through a staple ring and is then made
fasten or secured.

3. Combination lock
 instead of using the key to align the tumblers, the combination mechanism uses numbers, letters or other
symbols as reference point which enables an operator to align them manually.
4. Code-operated lock
 a type of lock that can be opened by pressing a series of numbered button in the proper sequence.
5. Electronic lock
 a type of lock that can be opened and closed remotely by electrical means.
6. Card-operated lock
 a type of lock operated by a coded card.
7. Biometric System

Types of Keys:

1. Change key - a specific key, which operates the lock and has a particular combination of cuts or biting, which
match the arrangement of the tumblers in the lock.
2. Sub-master key - a key that will open all the lock within a particular area or grouping in a given facility.
3. Master key - a special key capable of opening a series of lock.
4. Grand Master key - a key that will open everything in a system involving two or more master key groups.

Key Control
 Once an effective key control has been installed, positive control of all keys must be gained and maintained.
 This can be accomplished only if it is established in conjunction with the installation of new locking devices.
 The following methods can be used to maintain effective key control;
a) Key cabinet- a well-constructed cabinet will have to be procured. The cabinet will have to be of
sufficient size to hold the original key to every lock in the system. It should be secured at all times.
b) Key record- some administrative means must be set up to record code numbers and indicates to
whom keys to specific locks have been issued.
c) Inventories- periodic inventories will have to be made of all duplicate and original keys in the hands
of the employees whom they have been issued.
d) Audits- in addition to periodic inventory, an unannounced audit should be made of all key control
records and procedures by a member of management.
e) Daily report- should be made to the person responsible for key control from the personnel
department indicating all persons who have left or will be leaving the company. In the event that a
key has been issued, steps should be initiated to ensure that the key is recovered.

STATUTORY PROHIBITION OF KEY

10 | L E A - 2
Art. 304 (RPC) Possession of picklocks or similar tools.
 Any person, who shall without lawful cause have in his possession picklocks or similar tools especially
adapted to the commission of the crime of robbery, shall be punished by arresto mayor in its maximum
period to prision correccional in its minimum period.
 The same penalty shall be imposed upon any person who shall make such tools. If the offender be a
locksmith, he shall suffer the penalty of prision correccional in its medium and maximum periods.

Art. 305 (RPC) False keys. — The term "false keys" shall be deemed to include:
 The tools mentioned in the next preceding articles.
 Genuine keys stolen from the owner.
 Any keys other than those intended by the owner for use in the lock forcibly opened by the offender.

SECURITY CABINET
 The final line of defense at any facility is in the high security storage where papers, records, plans or
cashable instrument, precious metals or other especially valuable assets are protected.
 These security containers will be of a size and quantity, which the nature of the business dictates.

Three (3) Types of Security Cabinet:


A. Safe B. Vault C. File Room

Safe
 a metallic container used for the safekeeping of documents or small items in an office or installation.
 Its weight must be at least 750 lbs. and should be anchored to a building structure.
 Its body should at least one-inch-thick steel.
Vault
 heavily constructed fire and burglar resistance container usually a part of the building structure used to keep
and protect cash, documents and negotiable instruments.
 Vaults are bigger than safe but smaller than a file room.
 The vault door should be made of steel at least 6 inches in thickness.
 The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
 The vault must be resistive up to 6 hours.

File room
 a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited
people to work on the records inside.
 The file room should at most be 12 feet high.
 It must have a watertight door and at least fire proof for one hour.

PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL

Personnel Identification:
1. Personal Recognition
2. Artificial Recognition
a) Use of Pass System b) Badge and Pass Control

Movement Control:
1. Traffic Control
a) Visitors Movement Control c) Vehicle Movement Control
b) Package Movement Control d) Building Access Control

Use of Pass System:

1) Single pass system


 the badge or pass coded for authorization to enter specific areas is issued to an employee who keeps it in his
possession until his authorization is terminates.
2) Pass exchange system
 an exchange takes place at the entrance of each controlled area. Upon leaving, the personnel surrenders his
badge or passes and retrieve back his basic identification.
3) Multiple pass system

11 | L E A - 2
 this provides an extra measure of security by requiring that an exchange take place at the entrance of each
restricted area.

Restricted/Controlled Area
 any area in which personnel or vehicles are controlled for reasons of security.
 Are those areas where access is restricted as to entrance or movement by all authorized personnel and
vehicles

Types of Restricted Areas:


 Two types of restricted areas may be established to permit different degrees of security within the same
installation or facility, and to provide efficient basis for the application of different degrees of access,
circulation and protection.

These restricted areas are termed Exclusion areas and Limited areas

EXCLUSION AREA
 which contains a security interest to TOP SECRET importance, and which requires the highest degree of
protection.

LIMITED AREA
 a lesser degree of control is required than in an exclusion area but which the security interest would be
compromised by uncontrolled movement.

Visitors Movement Control:


 Security should establish proper methods of establishing the authority for admission of visitors as well as the
limitation thereat. This security measure would depend on the sensibility of the installation, but could include
the following:

1. Visitor’s logbook
 All visitors to any facility should be required to identify themselves and should be given a
visitor’s ID by the security. Visitor’s logbook should be filled up with the named of visitors,
nature and duration of visit.

2. Photograph
 taking of photographs should also be considered. Extreme caution must be exercised in areas
where classified information is displayed to preclude unauthorized taking of pictures of the
installation. If a visitor has camera and it is prohibited to take picture, said camera should be
left in the care of security with corresponding receipt.
3. Escort
 If possible, visitors should be escorted by the security to monitor their activity within the
establishment and guide them where to go.
4. Visitor entrances
 separate access for visitors and employees of the establishment should be provided.
5. Time- traveled
 If there is a long delay or time lapse between the departure and arrival, the visitors may be
required to show cause for the delay.

Package Movement Control:


 Every facility must establish a system for the control of package entering or leaving the premises.
 However, desirable it might seem it is simply unrealistic to suppose that a blanket rule forbidding packages
either in or out would be workable.
 Such a rule would be damaging to the employee morale and, in many cases, would actually work against the
efficient operation in the facility.
 Therefore, since the transporting of packages through the portals is a fact of life, they must be dealt with in
order to prevent theft and misappropriation of company properties. Thus;
a) No packages shall be authorized to be brought inside the industrial installation, offices and work area
without proper authority. This basic precept help reduce if not eliminate pilferage, industrial
espionage or sabotage.

12 | L E A - 2
b) Outgoing packages carried by personnel should be closely inspected and those in vehicles should also
be checked as many pilfered items are hidden in the surface of the vehicles leaving the compound.
c) Any personnel/visitor entering the installation with a package should deposit the same to the security
and in return receives a numbered tag, which he/she will use in claiming his/her package upon
departing.

Vehicle Movement Control and Identification


 Vehicular traffic within the boundaries of any facility must be carefully controlled for safety as well as to
control the transporting of pilfered goods from the premises. Thus
a) Privately owned vehicle of personnel/visitor should be registered and are subject to the identification
and admittance procedure.
b) Vehicles should be subjected for search at the entrance and exit of the installation.
c) All visitors with vehicle should provide the security as to the complete details of their duration of stay,
person to be visited, and other information.
d) All vehicles of visitors should be given a sign/sticker to be placed on the windshield.
e) Traffic warning signs should be installed in all entrances in order to guide the visitors in their
destination as well to provide them with the necessary safety precautions while they are inside the
installation.
f) Security personnel must constantly supervise parking areas and make frequent spots searches of
vehicles found there.

Building Access Control:


 At any physical barrier, a security system must possess the ability to distinguish among authorized persons,
unauthorized visitors, and other unauthorized persons.
 This is to assist the security personnel protects sensitive area and information within the installation.
 Appropriate warning signs should be posted at the building perimeter.
 Special restricted entry facilities to public access should be provided. This will be dependent on the degree of
security needed for the protection of property, activity and other processes within the building.
 A clear-cut policy on the access control should be disseminated to all personnel of the installation.

PERSONNEL SECURITY

 Of the three key security processes, personnel security is considered the most important simply because
security involves people, both as assets to be protected and as sources of security threats.

Purpose
 To ensure that a firm hires those employees best suited to assist the firm in achieving its goals; and
 Once hired, assist in providing the necessary security to them

Scope of Personnel Security


• Personnel Security Investigation
• Security Education

The Security “Chain”:


 Personnel Security is the “weakest link” in the security “chain”.
 This weakness can best be minimized or eliminated by making initial personnel security conscious through
good training program.
 Security depends upon the action of the individuals.
 The superior must instruct his subordinates so that they will know exactly what security measures to take in
every instance; A safe will not lock itself.

Control of Personnel:
 Access to “Restricted Areas” can be partially controlled by fences, gates and other physical means, but
the individual working in the area is the key to the bringing out of classified matter to unauthorized
personnel.
 Written information does not have the power of speech.
 Only the individual has knowledge of this written information can pass it to unauthorized personnel if
he unguardedly talks about information.

Personnel Security Investigation (PSI)


13 | L E A - 2
 An inquiry into the character, reputation, discretion, integrity, morals and loyalty of an individual in order to
determine a person's suitability for appointment or access to classified matter.

Types of Personnel Security Investigation (PSI):


A. National Agency Check (NAC) C. Background Investigation (BI)
B. Local Agency Check (LAC)

National Agency Check (NAC).


 This is an investigation of an individual made upon the basis of written information supplied by him in
response to official inquiry, and by reference to appropriate national agencies. It is simply a check of the files
and record of national agencies. The national agencies checked under this type of investigation are the
following:
a) National Bureau of Investigation (NBI) clearance
b) PNP Directorate for Intelligence (DI) clearance
c) Intelligence Service, AFP (ISAAFP) clearance

Local Agency Check (LAC)


 This type of investigation consists of the first type plus written inquiries sent to appropriate local government
agencies, former employees, references and schools listed by the person under investigation. The local
agencies normally check besides the past employment, schools and references are the following:
a) Barangay clearance c) Local Police clearance
b) City or Municipal clearance d) Court clearance

General Techniques of PSI:


A. Background Investigation
B. Positive Vetting
C. Profiling
D. Financial and Lifestyle Inquiry
E. Undercover Investigation
F. Exit Interview

Background Investigation (BI)


 This is more comprehensive investigation than the NAC or the NAC and LAC.
 A through and complete investigation of all or some of the circumstances or aspects of a person’s life is
conducted.

This type of Personnel Security Investigation may either be a complete (CBI) or a partial Background
Investigation (PBI).
a) Complete Background Investigation - Consist of the investigation of the background of a person,
particularly all the circumstances of his personal life.
b) Partial Background Investigation – Consist of the investigation of the background of an individual but
limited only to some of the circumstances of his personal life which are deemed pertinent to the
investigation. Normally, the request for the investigation will indicate the specific personal
circumstances to be covered. This type of BI is also used to further develop questionable information
contained in another investigation report.

Background Investigation
 It serves to verify information on the application form and to obtain other information pertinent to the
decision to employ.
Factors to consider in a Bl:
• Loyalty - quality of faithfulness to the organization, superiors, subordinates and peers.
• Integrity - uprightness of character, soundness of moral principles and truthfulness.
• Discretion - ability to act or decide with prudence; habit of wise judgment.
• Morals - distinctive identifying qualities that serve as an index to the essential nature of a person.
• Character-sum of traits impressed by nature, education and habit of a person.
• Reputation - opinion which one is generally held.

Reputation is what a person is reported while character is what a person is.


14 | L E A - 2
Motives That Cause People to be Disloyal
• Revenge
• Material Gain
• Personal Prestige
• Friendship
• Ideological Beliefs

Positive Vetting
 The process of inspecting or examining with careful thoroughness.
 The essence of vetting is a personal interview conducted under stress.
 It is based on the information previously given by the applicant.
Profiling
 The process whereby a subject’s reaction in a future critical situation is predicted by observing his behavior,
or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test.

Financial and Lifestyle Inquiry


 This type of investigation seeks to gather information on income and mode of living, sometimes
referred to as the earning to debt ratio.

Undercover Investigation
 This is the placement of an agent in a role in which the agent’s true identity and role remains
unknown in order to obtain information for criminal prosecution or for recovery or limitation of
asset losses

Exit Interview
 It gives departing employees an opportunity to list grievances.
 It offers security managers an opportunity to learn of problems not previously known.
 Debriefing an employee to remind their continuing legal obligation to safeguard confidential
company information

THE GUARD FORCE and GUARD SYSTEM

SECURITY GUARD
 The key element in the security survey system of a plant or installations is the human guard. Without this
human element, all the mechanical, electrical, and electronic protective aids, as well as security techniques
would be worthless.
 It is the human guard, as a part of the security enforcement medium, who contributes the thought processes
and all the human senses to the security system.
 The electronic device may sound the alarm, the television camera may spot the culprit, and the mini-
computer may trigger the red button, but it is the guard responds and initiates the necessary action.
 Sometimes called private security guard or watchman shall include any person who offers or renders
personal service to watch or secure either a residence or business establishment or both for hire or
compensation and with a license to exercise profession.

Security Guard Force


 is the key element in the overall security system of a plant or installation.
 Its basic mission is to protect all the property within the limits of the facility boundaries and protect
employees and other persons on the installation.

Types of Security Guard Forces:


A. Private Security Agency C. Government Guard Unit
B. Company Guard Force

Private Security Agency


 any person, association, partnership, firm or private corporation, who contracts, recruits, trains,
furnishes or post any security guard, to perform its functions or solicit individuals, business, firms, or
private, public or government-owned or controlled corporations to engage his/its service or those of
his/its security guards, for hire, commission or compensation.

15 | L E A - 2
Company Guard Force
 A security force maintained and operated by any private company/corporation utilizing any of its
employees to watch, secure or guard its business establishment premises, compound or properties.
Government Guard Unit
 a security unit maintained and operated by any government entity other than military or police,
which is established and maintained for the purpose of securing the office or compound and/or
extension of such government entity.

Colors of Uniform:
Private Security Agency = Navy blue (upper and lower)
Company Guard Force = light blue/light gray for upper and navy blue for lower
Government Guard Unit = white for upper and navy blue for lower

Definition of Terms:

PERSON
 shall include not only natural persons but also juridical persons such as single proprietorship,
corporations, companies or association duly organized and registered with the Security Exchange
Commission and/or the Department of Trade and Industry.

PRIVATE DETECTIVE AGENCY


 Any person, association, partnership, firm or private corporation, who contracts, recruits, trains,
furnishes, or post any private detective, to perform its functions or solicit individuals, business, firms,
or private, public or government-owned or controlled corporations to engage his/its service or those
of his/its detectives, for hire, commission or compensation.

PRIVATE DETECTIVE
 any person who does detective work for hire, reward, or commission other than members of the AFP,
Guard of the BJMP, Municipal or City jail guards, and members of the PNP or of any other Law
Enforcement Agency of the government
Who May Organize and maintain PSA and PDA?
 Any Filipino citizen or corporation, partnership, or association, one hundred per cent (100%) of which is
owned and controlled by Filipino citizens
 Provided, that no person shall organize or have an interest in, more than one such agency except those which
are already existing at the promulgation of this Decree:
 Provided, further, That the operator or manager of said agency must be:
a) at least 25 years of age;
b) a college graduate; and/or
c) a commissioned officer, inactive or retired service or retired from the Armed Forces of the Philippines
or PNP.
d) Has taken a course/seminar on Industrial Security Management and/or must have adequate training or
experience in the security business; and
e) Good moral character
 New applicant for license to operate shall be required to obtained minimum capitalization of one million (Php
1,000,000.00) pesos with minimum bank deposit of five hundred thousand (Php 500,000.00) pesos in order to
start its business operation

Limitations and Prohibitions:

1. On Membership:
 No regular license shall be granted to any PRIVATE SECURITY AGENCY unless it has a minimum of two
hundred (200) licensed private security personnel under its employ;
 nor to any COMPANY GUARD FORCE or PRIVATE DETECTIVE AGENCY unless it has a minimum of thirty (30)
licensed private security personnel under its employ;
 Provided, that the maximum number of private security personnel that a PSA/CGF/PDA may employ shall be
one thousand (1,000):
2. On Organization:
 No person, corporation, partnership or association may organize more than one agency in any one city or
municipality.
3. On Service:
16 | L E A - 2
 No agency shall offer, render or accept its services to gambling dens or other illegal enterprises.
 The extent of the security service being provided by any security agency shall not go beyond the whole
compound or property of the person or establishment requesting the security service except when they
escort big amount of cash.

License to Exercise Profession:


 shall mean any document issued by the Chief, PNP or his duly authorized representative recognizing a
person to be qualified to perform his duties as private security or training personnel

Licenses in the Security Profession:


A. License to Operate C. Firearms License
B. Security Guard License

1. License to Operate
 Is license certificate document, issued by the Chief, PNP or his duly authorized representative,
authorizing a person to engage in employing security guard or detective, or a juridical person to
establish, engage, direct, manage, or operate an individual or a private detective agency or private
security agency/company security force after payment of the prescribed dues or fees as provided.

Application of LTO:
 To the Chief, PNP through the PNP Security and Guard Supervision Division, Civil Security Group
(SAGSD-CSG). Using license application form PNPSF1, the application shall contain the full name of
the applicant, his age, civil status, his residence and location of business

For new applicant:


 Applicant from NCR may file their application for license to exercise profession with the personnel
licensing section, SAGSD, Civil Security Group, Camp Crame, Quezon City.
 Applicants from the Province may file their application with the Firearms, Explosives, Security
Agencies and Guards Section (FESAGS), Regional Operation and Plan Division (ROPD) of the Police
Regional Office concerned.

Renewal of License to Operate:


 All applications for renewal of license to operate shall filed at least sixty (60) days before expiry date
of LTO subject of the renewal application filed/accepted thereafter shall penalized for late filing.
 In addition to other renewal requirements under provision of these rules and regulation, no
application shall be approved unless a certification is issued by FED-CSG to the effect that all licensed
firearms of the agency concerned are updated/renewed for at least one (1) year forthcoming during
the validity of the renewed LTO

Two Categories of LTO:


A. Temporary License B. Regular License

Temporary License
 Is issued by the PNP thru CSG Directorate after the applicant/licensee should have complied with all the
requirements while it has less than two hundred guards.

Regular License
 Is issued to the PSA once it is qualified of having two hundred (200) or more licensed security guard in its
employ duly posted.
 It is renewable every two years

2. Security Guard License


 Before a security guard can practice his profession, he shall possess valid security license.

3. Firearms License
 All firearms of the security agency should be covered with firearms license issued by the PNP through
Firearms Explosives Division under the Civil Security Group
 Renewable every two years.

Qualifications Required:
17 | L E A - 2
 No person shall be licensed as SECURITY GUARD unless he is:
a) a Filipino citizen;
b) a high school graduate;
c) physically and mentally fit;
d) not less than 18 years of age nor more than 50 years of age;
e) Has undergone a pre-licensing training course or its equivalent

Possession of Firearms:
 one firearm for every two security guards (1:2) in its employ;
 No PSA/CSF/GSU shall be allowed to possess firearms in excess of 500 units

Restriction to possess high powered firearms:


 The firearm first be registered with the FED before issuance and shall not be used or transferred in places
other than those specially authorized by the Director, CSG.
 The total number of high – powered firearms that an agency or security force/unit is authorized to possess
shall not exceed ten percent (10%) of the total number of security guards or watchmen in its employ.

Stocking of ammunition:
 PSA shall not exceed fifty (50) rounds of ammunition per unit of duly licensed firearms.
 Individual issue to each a security guard shall be limited to one half of such basic load or twenty-five
(25) rounds for every security guard

SAGSD
 Security Agency, Guard and Supervision Division
SOSIA
 Supervisory Officer for Security and Investigative Agencies

PADPAO
 Philippines Association of Detective and Protective Agency Operators, Inc.,
 An association of all licensed security agencies and company security forces.
 The one who are authorized to issue the implementing rules and regulations pertaining to R.A. No. 5487.
DDO (Duty Detail Order)
 A written order/schedule issued by a superior officer usually the private security agency/branch manager or
operation officers assigning the performance of private security detective.

DOCUMENT & INFORMATION SECURITY


 The leakage of document and information cost government, business and industry alike, billions of pesos.

PROTECTION OF SENSITIVE INFORMATION


In the business community it is seldom heard about the protection of such information which we believe should be
given enough protection. In the security protection, a security professional should deal with this squarely and fairly as
in other security aspects like physical security and personnel. In our discussion, we will try to understand why this
should be and what kind of information should be given ample protection and distinguish them from one another.
Also, why and in what we are losing them.
Proprietary Information
Information which in some special way relates to the status of activities of the possessor and over which the
possessor asserts ownership. In the business community proprietary information relates to the structure, products or
business methods of the organization.
What kind of information needs protection?
Trade Secret
A trade secret may consist of any formula, pattern, device or compilation of information which is used on one’s
business and which gives one an opportunity to gain advantage over competitors who do not know or use it. It may
be a formula for a chemical compound, a process of manufacturing, treating or preserving materials, a pattern for a
machine or other device, or a list of customers.
The most basic distinction in regard to proprietary information is between trade-secret data and all other types of
confidential data.
18 | L E A - 2
All proprietary information is confidential, but not all confidential information is proprietary.
For example, confidential personnel data in employee files is not proprietary information even though the company
treats it as confidential.
The definition of trade secret contains a reasonable departure from the Restatement of Torts definition which
required that a trade secret be “continuously used in one’s business”.
Essential elements of a Trade Secret
a. It is not to be generally known to other and
b. Some advantages are gained by the user from its use or possession

What is Secret?
This question is taken up first because it is relevant even in cases where data involved are not trade secrets but
merely simple facts. If information is not novel or secret, it is not entitled to any protection; it is the property of
everyone and it is in the public domain.
To be secret, information must generally meet the following tests:
a. It must be identifiable
b. It must not be already available in public sources
c. It must be disclosed by the owner only to persons who under some duty to protect its secrecy
d. Persons to whom it is disclosed must know it is a secret
e. There must be some objective indication that the owner is attempting to prevent its unauthorized disclosure

A Patent is a grant made by the government to an inventor, conveying and securing to him exclusive rights to make,
use and sell his invention for a term of 20 years.
The main differences between a Trade Secret and a Patent are:
a. A trade secret can remain a secret for as long as it continues to meet the trade secret test, whereas an
exclusive right patent expires after a period of 20 years.
b. Since anyone can purchase a patent, they are not industrial espionage targets, whereas trade secrets are.
Basis of Document, Information, and Communication Security:
 Security of documents and information is based on the premise that the government has the right and duty
to protect official papers from unwarranted and indiscriminate disclosure.
 In answer to this problem, Malacañang, Manila dated August 14, 1964 entitled “Promulgating rules
governing security of classified matters in Government Offices” was promulgated in order to safeguard our
secrets as secrets.

Standard Rules
 The authority and responsibility for the preparation and classification of classified matter rest exclusively
with the originating office. Classified matter shall be classified according to their content and not to the
classification of files in which they are held or another document to which they referred;
 Classification shall be made as soon as possible by placing the appropriate marks on the matter to be
classified.
 Each individual whose duties allow access to classified matter, or each individual who possesses knowledge
of classified matter while it is in his possession shall insure that dissemination of such classified matter is on
the “need-to-know” basis and to properly cleared persons only.

Matter
 In Document and Information Security, it includes everything, regardless of its physical character, or in which
information is recorded or embodied.
 A general term referring to documents, equipment, projects, books, reports, articles, notes, letters, drawings,
drawings, sketches, plans, photographs, recordings, machinery, models, apparatus, devices, and all other
products or substances.
 For purposes of security, it is also information which is transmitted orally.
Classified
 refers to assign information by one of the four classification categories.
Security Clearance

19 | L E A - 2
 is the certification by a responsible authority that the person described is cleared for access to classified
matter in the appropriate level.
Need-to-know
 is the principle whereby access to classified matter may only be only given to those persons to whom it is
necessary for the fulfillment of their duties? Persons are not entitled to have access to classified matter solely
by virtue of their status or office. It is a requirement that the dissemination of classified matters be limited
strictly to persons whose official duty requires knowledge or possession thereof.
Certificate of Destruction
 the certification by a witnessing officer that the classified matters describe therein has been disposed of in his
presence, approved destruction methods.
 Compromise
 means loss of security, which results from unauthorized persons obtaining knowledge of classified matter.
Compartmentation
 the grant of access to classified matter only to properly cleared persons in the performance of their official
duties.
Declassify
 the removal of security classification from classified matter.
Reclassify/Regrading
 the act of changing the assigned classification of matter.
Up-grading
 is the act of assigning to a matter of higher classification to a classified document.

DOCUMENT SECURITY SYSTEMS

Documents Security
 is that aspect of security which involves the application of security measures for the proper protection and
safeguarding of classified information.

Classification Categories
 Official matter which requires protection in the interest of national security shall be limited to four categories
of classification which in descending order of importance shall carry one of the following designations:
1. TOP SECRET 3. CONFIDENTIAL
2. SECRET 4. RESTRICTED

4 Types of Classified Matter:


A. TOP SECRET C. CONFIDENTIAL
B. SECRET D. RESTRICTED
Top Secret
 Green Color Code
 Is any information and materials (matter), the unauthorized disclosure of it would cause exceptionally grave
damage to the nation, politically, economically and military operation.

Secret
 Red Color Code
 Is any information and material (matter), the unauthorized disclosure of it would endanger national
security, cause serious injury to the interest or prestige of the nation or any governmental activity or
advantage to a foreign nation.
Confidential
 Blue Color Code 
 Is any information and material (matter) the unauthorized disclosure of it, would be prejudicial to the interest
and prestige of the national or governmental activity, or would cause administrative embarrassment or
unwarranted injury to and be of advantage to a foreign country.
Restricted
 White or No Color
 Is any information and material (matter), which requires special protection other than that
determined to be TOP SECRET, SECRET, or CONFIDENTIAL.

Memorandum Circular No. 78 dated August 14, 1964 and Memorandum Circular No. 196 dated July 19, 1968

20 | L E A - 2
 Were promulgated to ensure against unauthorized access or disclosure of information and classified matters
which could cause grave damage to the government or national interest;

EXECUTIVE ORDER NO. 608


 ESTABLISHING A NATIONAL SECURITY CLEARANCE SYSTEM FOR GOVERNMENT PERSONNEL WITH ACCESS TO
CLASSIFIED MATTERS AND FOR OTHER PURPOSES.
 SECTION 6. Administrative Liability
 Any unauthorized disclosure, sharing, publication or use of the information contained in the classified
documents or materials shall be considered a grave offense and shall be punishable in accordance with civil
service rules and regulations. The filing of an administrative case against an erring personnel or officer does
not preclude the filing of any other appropriate criminal or civil case for the same violation/s.

DISCOVERY AND REVELATION OF SECRETS (RPC)

Art. 290. Discovering secrets through seizure of correspondence.


 The penalty of prision correccional in its minimum and medium periods and a fine not exceeding 500
pesos shall be imposed upon any private individual who in order to discover the secrets of another,
shall seize his papers or letters and reveal the contents thereof.
 If the offender shall not reveal such secrets, the penalty shall be arresto mayor and a fine not exceeding
500 pesos.
 The provision shall not be applicable to parents, guardians, or persons entrusted with the custody of
minors with respect to the papers or letters of the children or minors placed under their care or study,
nor to spouses with respect to the papers or letters of either of them.

Art. 291. Revealing secrets with abuse of office.


 The penalty of arresto mayor and a fine not exceeding 500 pesos shall be imposed upon any manager,
employee, or servant who, in such capacity, shall learn the secrets of his principal or master and shall reveal
such secrets.

Art. 292. Revelation of industrial secrets.


 The penalty of prision correccional in its minimum and medium periods and a fine not exceeding 500 pesos
shall be imposed upon the person in charge, employee or workman of any manufacturing or industrial
establishment who, to the prejudice of the owner thereof, shall reveal the secrets of the industry of the
latter.

SECURITY HAZARD
 Any act or condition which may result in the compromise of information, loss of life, and loss or
destruction of property or disruption of the activity of the installation.

The Extent and Degree of Risk to Security will dependent on the following:
A. Relative Criticality of Operation
 It is the importance of the firm with reference to the natural economy and security.
B. Relative Vulnerability
 It is the susceptibility of the plant or establishment to damage, loss or disruption of operation due to
various hazards.

Types of Hazards:
A. Human/Man-made Hazard B. Natural Hazard

Human/Man-made Hazard
 These are hazards which are the result of a state of mind, attitude, weaknesses or character traits of one or
more persons.
 They can be acts of commission or omission, both overt and covert, which can disrupt operation of a plant or
installation
 The following are types of human/man – made hazards
a) Carelessness – accident and c) Espionage, pilferage and theft
dissatisfaction d) Vandalism, etc.
b) Disloyalty – subversion and sabotage
Natural Hazard

21 | L E A - 2
 Those caused by natural phenomena which cause damage, disturbance and problems of the normal
functioning of human activities, including security.
 It includes floods caused by typhoons, earthquakes, lighting storms, volcanic eruptions, high-velocity winds,
tidal waves, etc.

Sabotage as a Security Hazard Subversive Activity as a Security Hazard


Espionage as a Security Hazard Pilferage as a Business Hazard

Types of Pilferers:
1. Casual Pilferer
 one who steals due to his inability to resist the unexpected opportunity and has little fear of detection;
 are no plan or premeditation and he being usually a “loner” on the job?
2. Systematic Pilferer
 one who steals with preconceived plans and takes away any or all types of items or supplies for economic
gain.
 Pilferers of this kind can be employees or outsiders of the establishment.

RISK ANALYSIS
Risk
 It is the potential damage or loss of an asset. The level of risk is a combination of two factors:
a) The value placed on that asset by its owner and the consequence, impact adverse effect of the loss or
damage to that asset and;
b) the likelihood that a specific vulnerability will be exploited by a particular threat.
Risk Management
 It is a process of selecting and implementing security countermeasures to achieve an acceptable level
of risk at an acceptable cost.
Risk Analysis
 It is the analysis of risk includes examinations of the vulnerability, probability and criticality of
potential threats and includes natural and man-made risk.
Adversary
 An individual, group, organization, or government that conducts activities or has the intention and capability
to conduct activities detrimental to the individual, private or government entity.
Asset
 Any information, facility, material, information, or activity which has a positive value to its owner whether it is
an individual, private or government entity.
Countermeasures
 An action taken or a physical entity used to reduce or eliminate one or more vulnerabilities.
 The cost of possible countermeasures may be monetary, but may also include non-monetary cost such as
reduced operational efficiency, adverse publicity unfavorable working conditions, and political consequences.

Risk Management Alternatives and Strategies:


A. Risk Avoidance E. Risk Self-assumption
B. Risk Reduction
C. Risk Spreading
D. Risk Transfer
Risk Avoidance
 eliminating or removing the risk totally from the business, government, or industrial environment for which
the risk manager has responsibility
Risk Reduction
 decreasing the risk by minimizing the probability of the potential loss. The reduction of criminal opportunity
is often accomplished by situational crime prevention strategies to discourage, deter, or deny criminal
incidents.
Risk Spreading
 spreading the risk through compartmentation or decentralization to limit the impact (criticality) of the
potential loss
Risk Transfer
 moving the financial impact of the potential loss over to an insurance company.
Risk Self-assumption
 planned assumption and acceptance of the potential risk by making a deliberate managerial decision of doing
nothing about the threat, or setting aside resources for use in case of a specific loss incident.
22 | L E A - 2
SECURITY SURVEY AND INSPECTION
 The basic instrument for determining security vulnerability is the security survey.
 Most description of SECURITY refers principally to checklists, audits or inventories of security conditions

Security Survey
 defined as a critical on-site examination and analysis of an industrial plant, business, a home or public or
private institution, done to ascertain the facility’s current security status, to identify deficiencies or excess in
current practices, to determine what protection is needed and to make recommendation for improving the
over-all level of security at that installation.
 It is an estimate of the security standards of a unit, and is conducted to enable the responsible officer to
recognize and evaluate security hazards and determine protective measures necessary to the prevention of
sabotage, espionage, subversive activities and other criminal acts inimical towards the interest and/or
mission of the unit and/or command.
Security Inspection
 This complements security survey in its attempt to prevent losses of company properties.
 Is conducted for two reasons:
a) to check on the degree of compliance with the recommended countermeasures; and
b) to determine the effectiveness and adequacy of the countermeasures which are in effect

Types of Security Inspection:


A. Continuous Inspection C. Structured or Unstructured Inspection
B. Formal or Informal Inspection

Continuous Inspection
 To keep pace with the constant changes in the organization, changes in security terms of attitudes, lifestyle
and moral values, and the rapid advancement of technological modifications all around us, the inspection
must be an on-going and never-ending activity.

Formal or Informal Inspection


Formal inspection
 It is usually preceded by an announcement, and the unit under inspection “prepares” for events, including some
extra housekeeping activities that would not otherwise happen at that point in time.
Informal inspection
 Usually, the result of a long and firmly entrenched inspection program, understood by all and accepted as part of
the organizational life.

Structured or Unstructured Inspection


Structured inspection
 Is one that moves systematically from one area to the next and so on.
 There is a formal or logical sequence to the process.
 For instance, the audit may start with the 1 st line of defense, then the 2nd line, then the 3rd line, etc.

Unstructured inspection
 Conducted in a random manner. There is no formal or logical sequencing.
 For example, the inspection may start with countermeasures for proprietary information, then
emergency plan, followed by investigation and so forth.

Who Performs Security Survey & Inspection?


 Security survey is performed by qualified security experts who can be from the organization or
outsiders contracted to do the job.
 Recommendation will fall into three categories:
a) human guard; b) equipment; and c) procedures

Entrance Conference
 A conference or dialogue between the survey team and management officials of a plant before security
survey is conducted
Exit Conference
 A conference similar to entrance conference, done after the completion of the security survey

23 | L E A - 2
SECURITY EDUCATION
 Is conducted to develop security awareness among employees in the company.
 It should cover all employees, regardless of rank or position.

Security Education Program


 Its basic goal is to acquaint all the employees the rationale behind the security measures and to insure their
cooperation at all times. The exposure and teaching of employees on security and its relevance to their work.

Phases of Security Education Program:


A. Initial Interview C. Refresher Conference E. Security Promotion
B. Orientation and Training D. Security Reminders

Initial Interview
 The first contact of the prospective employee wherein the interviewer determines the suitability of the
applicant for employment through his given answers on the different type of questions being conducted.
 It is in this stage where the interviewer may start providing the necessary information as to the overview of
company security policies and at the same time on the employee accountability and corresponding penalties
that could result from violation therefrom.
Orientation and Training
 It is in this stage where new employees receive detailed presentation of personnel security policy.
 Usually, hand-outs or employee’s manual are being distributed for reference.
 New employees also requested to sign acknowledgement that they have been aware of the existing company
policies and will abide the same.

Refresher Conference
 It is design to remind employees of the company about their responsibilities, review the guidelines and
policies, introduction of new policies and regulations and a movement of getting employees feedback about
the company policies that is being implemented.

Security Reminders
 This employed as an indirect approach of educating the employees, such as posting security posters and
distributing fliers.

Security Promotion
 The act of emphasizing the importance and role of security achieving the company goals and objectives.
 It involves security employees’ cooperation and support.

-------END-------

24 | L E A - 2
25

25 | L E A - 2

You might also like