Professional Documents
Culture Documents
or damages. Basically, it was the action of man against man that led to many unsecured and unsafe conditions.
Reasons could be economic, revenge, or just plain greed and avarice. Whatever the motives, the civilized man
Since security in general is very hard to comprehend, it can be divided into three major areas:
1. Physical Security - this concern with the physical measures adopted to prevent unauthorized access
to equipment, facilities, material and document and to safeguard them against espionage, sabotage, damage,
2. Personnel Security- this is as important as physical security. Personnel security starts even before
the hiring of an employee and remains to be maintained for as long as the person is employed. Its purpose is
to insure that a firm hires those best suited to assist the firm in achieving its goals and objectives and once
hired assist in providing necessary security to the work force while carrying out their functions.
3. Document and Information Security- this involves the protection of documents and classified papers
from loss, access by unauthorized persons, damage, theft and compromise through disclosure. Classified
documents need special handling. Lack of indoctrination and orientation among the personal handling them
can result in the leakage, loss, theft and unauthorized disclosure of the documents.
SECURITY SURVEY
A fact finding probe to determine a plant’s adequacy in all aspects of security, with the
corresponding recommendations.
Security Surveys are often called ‘RISK ANALYSIS SURVEYS’ or ‘RISK ASESSMENT SURVEYS
PURPOSES OF SECURITY SURVEY:
SECURITY EDUCATION
It is defined as the exposure and teaching of employees on security and its relevance to their work.
Security education is conducted to develop security awareness among employees of the company. It should
PHYSICAL SECURITY
Definition: Physical security measures are being used to define, protect, and monitor property rights and
assets. These measures consist of barriers and devices that would detect, impede, and prevent unauthorized
access to equipment, facilities, material and document and to safeguard them against espionage, sabotage,
Physical security may be also defined as the safeguarding by physical means, such as guard, fire protection
measures, of plans, policies, programs, personnel, property, utilities, information, facilities and installation
against compromise, trespass, sabotage, pilferage, embezzlement, fraud, or other dishonest criminal act.
A barrier can be defined as any structure or physical device capable of restricting, deterring, delaying, illegal
access to an installation.
A restricted area is any area in which personnel or vehicles are controlled for reasons of security. Restricted
area is established to provide security for installation or facilities and to promote efficiency of security
Security should establish proper methods of establishing the authority for admission of visitors as well as the
limitation thereat. This security measure would depend on the sensibility of the installation, but could include
the following:
1. Visitor’s logbook – All visitors to any facility should be required to identify them selves and should
be given a visitor’s ID by the security. Visitor’s logbook should be filled up with the named of visitors,
2. Photograph - taking of photographs should also be considered. Extreme caution must be exercised
in areas where classified information is displayed to preclude unauthorized taking of pictures of the
installation. If a visitor has camera and it is prohibited to take picture, said camera should be left in
3. Escort - If possible visitors should be escorted by the security to monitor their activity within the
4. Visitor entrances - separate access for visitors and employees of the establishment should be
provided.
5. Time- traveled - If there is a long delay or time lapse between the departure and arrival, the visitors
residential or business premises or both, government and/or their premises for hire and
compensation.
Security Supervisor – Is charged with directing the work and observing the behavioral performance
2. Second line of defense- doors, floors, windows, walls, roofs and grills and other entries to the
buildings
3. Third line of defense- storage system like steel cabinets, safes, vaults and interior files.
Protective Lighting-The idea that lighting can provide improve protection for people and facilities is as old
as civilization. Protective lighting is the single most cost-effective deterrent to crime because it creates a
TYPES OF BARRIERS
1. Natural barriers - it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain
2. Structural barriers - these are features constructed by man regardless of their original intent that
tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or
containers etc.
3. Human barriers - persons being used in providing a guarding system or by the nature of their
employment and location, fulfill security functions. Examples are guards, office personnel, shop
workers, etc.
4. Animal barriers - animals are used in partially providing a guarding system. Dogs are usually
trained and utilized to serve as guard dogs. German shepherds are best suited for security functions.
deterrent to entry by the potential intruder or to provide warning to guard personnel. These are
protective lighting, alarm system and any electronic devices used as barriers.
Types of keys
1. Change key - a specific key, which operates the lock and has a particular combination of cuts which
2. Sub-master key - a key that will open all the lock within a particular area or grouping in a given facility.
4. Grand Master key - a key that will open everything in a system involving two or more master key
groups.
RELATIVE CRITICALITY OF OPERATIONS- Is the importance of the firm which reference to the national
RELATIVE VULNERABILITY – The susceptibility of the plant or establishment to damage, loss, or disruption
1. Continuous lighting - the most familiar type of outdoor security lighting, this is designed to provide
two specific results: glare projection or controlled lighting. It consists of a series of fixed luminaries
a. Glare projection type- it is being used in prisons and correctional institutions to illuminate
nearby highways or other limitations, it is necessary for the light to be more precisely
focused.
2. Standby lighting - it is designed for reserve or standby use or to supplement continuous systems. A
standby system can be most useful to selectively light a particular area in an occasional basis.
3. Movable or Portable lighting - this system is manually operated and is usually made up of movable
search or floodlights that can be located in selected or special locations which will require lighting
4. Emergency lighting - this system is used in times of power failure or other emergencies when other
TYPES OF SECURITY
1. Industrial Security – A form of physical security that is concerned with the physical measures
designed to safeguard personnel and prevent unauthorized access to equipment, facilities, materials,
2. Bank Security – Is the protection resulting from the application of various measures which safeguards
cash and assets which are in storage, in transit and or during transaction.
3. Operational Security – Involves the protection of processes, formulas and patents, industrial and
Partial Background Investigation – Consist of the investigation of the background of an individual but
limited only to some of the circumstances of his personal life which are deemed pertinent to the investigation.
Normally, the request for the investigation will indicate the specific personal circumstances to be covered.
This type of BI is also used to further develop questionable information contained in another investigation
report.
Signal
- The actual alarm may be audible or silent, a bell, buzzer, phone ringing, or flashing of light.
Protective alarm is one of the important barriers in security. It assists the security in detecting, impeding or
deterring potential security threat in the installation. Basically, its function is to alert the security personnel for
any attempt of intrusion into a protected area, building or compound. Once an intruder tampers the circuitry,
the beam or radiated waves of the alarm system, it will activate an alarm signal.
1. Central Station System - a type of alarm where the control station is located outside the plant or
installation. When the alarm is sounded or actuated by subscriber, the central station notifies the
2. Proprietary system - centralized monitor of the proprietary alarm system is located in the
industrial firm itself with a duty operator. In case of alarm, the duty operator calls whatever is the
3. Local Alarm – This system consist of ringing up a visual or audible alarm near the object to be
protected. When an intruder tries to pry a window, the alarm thereat goes off.
4. Auxiliary alarm - company-owned alarm systems with a unit in the nearest police station so that in
case of need, direct call is possible. The company maintains the equipment and lines both for the
company and those in the police, fire and other emergency agencies by special arrangement. Radio,
CLASSIFICATION OF DOCUMENTS
-Memorandum Circular No. 196, dated 07/19/1968 (Security of Classified Matter in government offices.)
1. TOP SECRET – any information and material, the unauthorized disclosure of which would cause
2. SECRET- any information and material, the unauthorized disclosure of which would endanger
national security, cause serious injury to the interest or prestige of the nation or any governmental
activity.
3. CONFIDENTIAL – any information and materials, the unauthorized disclosure of which would be
prejudicial to the interest or prestige of the nation or governmental activity or would cause
4. RESTRICTED – any information and material which requires special protection other than those
access to an installation.
Chief PNP
Profession
1. License to Operate- before a Private Security Agency (PSA) can operate; it has to secure a License to
Operate (LTO) categorized as either temporary or regular. A temporary license is issued by the PNP
thru Civil Security Croup Directorate after the applicant /licensee should have complied with all the
requirements while it has less than two hundred guards. A Regular license to operate is issued to the
PSA once it is qualified of having two hundred (200) or more license security guard in its employ
2. Security Guard License- before a security guard can practice his profession; he shall possess valid
security license. The use of expired license is not allowed. In case of doubt, licenses may be verified at
3. Firearm’s license- all firearms of the security agency should be covered with firearms license issued
by the PNP through its Firearms Explosive Division under the Civil Security Group, renewable every
two years. No duplication of two or more firearms with the same make and serial number shall be
Security Agency:
commercial private security and/or detective services for hire, commission or compensation.
b. Company Guard Force LTO. License certificate issued to persons, corporations, associations,
partnerships not doing business nor organized purposely or principally as a private security guard or
detective agency who/which is utilizing for its security purpose any of his/its employees to render
License certificate issued to national or local government or any agency or instrumentality thereof, or
of government owned or controlled corporation not doing business nor organized purposely or
principally as a private security guard or detective agency who/which is utilizing for its purpose any
a. No regular license shall be granted to any private security agency unless it has a minimum of two
SECTION 5. On Membership.
- All applications for renewal of License to operate (LTO) shall be filed at least sixty (60) days before the
- No application shall be approved unless a certification is issued by FED-CSG to the effect that all licenses of
firearms of the agency are updated/renewed for at least one (1) year forthcoming during the validity of the
renewed LTO.
Top Guard - additional overhang of barbed wire placed on vertical perimeter fences upward and
outward with a 45 degree angle with 3 to 4 strands of barbed wires spaced 6 inches apart. This
Guard Control stations - this is normally provided at main perimeter entrances to secure areas
located out-of-doors, and manned by guards on full-time basis. Sentry station should be near a
Tower Guard - this is a house-like structure above the perimeter barriers. The higher the tower, the
more visibility it provides. It gives a psychological unswerving effect to violators. By and large guard
towers, whether permanent or temporary, must have a corresponding support force in the event of
need. Towers as well as guard control stations should have telephones, intercoms, and if possible
two- way radios connected to security headquarters or office to call for reserves in the event of need.
Barrier Maintenance - fencing barriers and protective walls should always be regularly inspected
by security. Any sign or attempts to break in should be reported for investigation. Destruction of
fence or sections thereof should be repaired immediately and guard vigilance should be increased.
Protection in Depth - in large open areas or ground where fencing or walling is impractical and
expensive, warning signs should be conspicuously placed. The depth itself is protection reduction of
access roads, and sufficient notices to warn intruders should be done. Use of animals, as guards and
Signs and notices - “Control signs” should be erected where necessary in the management of
unauthorized ingress to preclude accidental entry. Signs should be plainly visible and legible from any
SURETY BOND