You are on page 1of 1

Name: Robianes, Zyrah B.

CP 1

Section: 4- Charlie

WEBINAR ON ROLES OF ICT IN INDUSTRIAL SECURITY MANAGEMENT

(Reflection Paper)

The REPUBLIC ACT No. 5487 or “AN ACT TO REGULATE THE ORGANIZATION AND OPERATION OF
PRIVATE DETECTIVE, WATCHMEN OR SECURITY GUARDS AGENCIES.” Or also known as the "The Private
Security Agency Law." This act serves as the organization, operation, business and activities of private
detectives, watchmen or security guard/s agencies shall be governed by the provisions of this Act.

On the webinar, we have learned that there are qualifications upon joining in the security
agencies such as : No person shall be employed as security guard or watchman or private detective
unless he is: (a) a Filipino citizen; (b) a high school graduate; (c) physically and mentally fit; (d) not less
than 21 nor more than 50 years of age; (e) at least 5 feet and 4 inches in height; and (f) suffering none of
the disqualifications provided for in the preceding section: Provided, That foreigners who are already
employed as watchmen or security guards prior to the approval of this Act shall not be subject to the
above-mentioned requirements: Provided, further, That veterans shall be given priority in employment
as security guard, watchman or private detective: And provided, finally, That person convicted of any
crime involving moral turpitude shall not be employed as security guard, watchman or private detective.

Moreover, many countries are investing in offensive and defensive ICT capabilities, which adds
another layer of complexity to interstate relations. Reconnaissance and information operations, as well
as the disruption of essential networks and services, as well as control and command skills, are examples
of such capabilities.

In addition to the cyber/ICT security CBMs, the OSCE and its institutions also focus on tackling
cyber/ICT security threats from non-state actors, such as organized criminals and terrorists. A key
emphasis here is on promoting adequate and timely responses by national authorities to these evolving
threats, ranging from better forensics to innovative approaches to prevent ICTs from becoming tactical
facilitators for terrorists.

Above all, In the Webinar entitled Roles of ICT in Industrial Security Management, I have learned
that every organization must be protected from cyber-attacks and security threats. Cybercrime and
malware are ongoing threats to anyone with an Internet presence, and data breaches are both time-
consuming and costly. The services of a reliable information security provider will help to reduce digital
information risks and keep systems running smoothly.

You might also like