You are on page 1of 16

PRECISE REVIEW AND TRAINING CENTRE

PIMSAT Building, Niog Street, Bacoor City, Cavite


09179408842 / 09434710876

INDUSTRIAL SECURITY MANAGEMENT

1. BRIEF HISTORY OF SECURITY MANAGEMENT IN THE PHILIPPINES

1.1. Private security business in the Philippines began on March 1, 1933 when the City
Council of Manila passed City Ordinance No. 2162 granting license and recognition to the
“Special Watchman Agency” owned by the brothers Juan and Pedro Jimenez. The agency
will later be renamed “Jimenez Security Agency”.

1.2. During the outset of the Second World War (WW II), private security business were
hampered and eventually ceased during the Japanese Occupation of the Philippines;

1.3. After the end of WW II law enforcement agencies such as the NBI and Police found
their resources inadequate to cope with rising criminality throughout the country;

1.4. Private security agencies stepped in to fill the gap of securing private individuals,
their estates and industries in the near incapability of law enforcement at the time in
providing adequate protection for their various private interests;

1.5. Due to the absence of proper legislation in monitoring and accounting the actions of
private security agencies, a period of unregulated growth prevail for many years;

1.6. On 30 May 1958, the Philippine Association of Detective and Protective Agency
Operators (PADPAO) was formally organized with the objective of petitioning congress to
formally enact legislation that will regulated the private security agencies throughout the
country;

1.7. Congress eventually passed Republic Act No. 5487 regulating private security agency
services;

1.8. On 1 June 1969, Republic Act No, 5487 was passed directing the Chief of the
Philippine Constabulary (PC) to create a unit with the specific purpose of monitoring and
regulating private security businesses;

1.9. On 4 August 1969, the PC activated the Security and Investigation Supervisory Office
(SIASO);

1.10. The SIASO was later renamed Philippine Constabulary Supervisory Unit for Security and
Investigation Agencies (PCSUSIA);

1.11. Upon the integration of the PC and the INP it was renamed as the PC/INP SOSIA;

1.12. On 3 October 1972 Presidential Decree (PD) No. 11 of former President Ferdinand Marcos
was passed in order to encompass and defined all forms of contracted private security
services within the entire Philippine Archipelago;

1.13. On 17 January 1973, PD No. 100 was passed in order to include government employed
security personnel securing government installations and buildings

1.14. With the abolition of the PC/INP and the creation of the Philippine National Police, the
PC/INP SUSIA was renamed the Security Agencies and Guards Supervision Division or
SAGSD under the PNP – Civil Security Group;

1.15. Recently, the unit had been renamed back to the PNP SOSIA.

1
2. PRIVATE SECURITY AGENCY IN THE PHILIPPINES TODAY

2.1. A continuing growth industry generating not less than P22 Billion pesos per year in
salaries alone;

2.2. With not less than 1,700 private security agencies operating nationwide with a total
manpower employment of 240,000 plus private security practitioners;

2.3. A continuing contributing organization to the country’s peace and order program.

3. DEFINITION OF TERMS

3.1. Security:
a. The state or quality of being secure;
b. Protection against any type of crime to safeguard life, assets and operation by the
use of various methods and devices;
c. Freedom from fear and danger; assurance; certainty
d. Defense against crime

3.2. Threats – positive inimical (harmful) acts.

3.3. Vulnerability – measure of how open an establishment is to intrusion, attack or


injury from the outside.

3.4. Hazards – positive inimical (harmful) conditions.

3.5. Risk – The probability of occurrence of an event that will lead to loss. The risk could be
classified as virtually certain, highly improbable, improbable and probability unknown.

3.6. Security Survey – is the critical, on site examination and analysis to ascertain the
security status, identify deficiencies or excesses, determine protection needed and make
recommendations; a fact-finding probe to determine a plant’s adequacy and deficiency in
all aspects of security, with the consequent recommendations.

4. BASIC SECURITY CONCEPTS

4.1. Elements of Security System


4.1.1. Human guards
4.1.2. Physical barriers
4.1.3. Interior controls/procedures
4.1.4. Devices/equipment

4.2. Barriers
4.2.1. Barriers accomplish the following:
a) Define the boundary of the property to be secured;
b) Create a physical & psychological deterrent;
c) Delays intrusion thus facilitating apprehension;
d) Assists in the more efficient use of manpower;
e) Facilitate improve pedestrian and vehicular flow.

4.2.2. Types of Physical Barriers


a) Natural Barrier – include mountains, cliffs, canyons, seas, marshes, deserts or
terrain difficult to traverse
b) Structural Barrier
c) Human Barrier
d) Animal Barrier
e) Energy Barrier

4.2.3. Types of Perimeter Barriers:


a) Solid
b) Full View

2
c) Bodies of Water/Moats
5. HAZARDS
5.1. Human Hazards – an act or condition caused by humans which affects the safe
operation of a facility. This includes sabotage, theft, pilferage and espionage.

5.2. Natural Hazards – caused by natural phenomena which results in damage,


disturbance and problems of the normal functions. These includes floods, fires,
earthquakes, lightning storms, typhoons and volcanic eruptions

5.3. Factors which determines the degree of risk to security:

5.3.1. Relative criticality of operation – refers to the importance of the


establishment with reference to the national economy and security.
5.3.2. Relative vulnerability – refers to the susceptibility of a plant or establishment
to damage, loss or operations due to various hazards.
5.3.3. Other factors considered for protection of plants or installation:
a) Location or size of an installation
b) Number and general characteristics of the personnel
c) Character or kind of products
d) Cost of security protection

6. TYPES OF SECURITY

6.1. Physical Security, defined

6.1.1. A system of barriers placed between the potential intruder and the
object/matter to be protected. It is concerned with the physical measures adopted
to prevent unauthorized access to equipment, facilities, materials and documents
and to safeguard them against espionage, sabotage, damage and theft.

6.1.2. It is concerned with the utilization of physical measures to prevent


unauthorized access to facilities, plants, equipment and safeguard them against
man-made and natural hazards;

a) Three Lines of Physical Defense


i) Perimeter defense – such as barriers, perimeter fences or guards at
the gate are considered as the first line of defense
ii) Inside Perimeter Defense – such as doors, floors, windows, walls,
roofs, grills and other entries to a building is referred to as the second line
of defense
iii) Storage System – such as safes and vaults are considered as the third line
of defense.

b) First Line of defense


i) Barrier – is any structure or physical devise capable of deterring,
delaying illegal access into an installation. If placed to supplement the
protection of an inside or outside perimeter it is used to define limits to
said installation.
1) Kinds of barrier
 Natural – are those natural topographic features that lend
themselves to denying or hindering entry to an installation. The
presence of rivers, seas, cliffs, canyons or other terrain difficult
to traverse is an ideal natural barrier. To fully exploit its positive
contribution to the security system, the natural features must
be evaluated to determine its positive and negative points in
terms of the denial to access into a facility they may provide;
 Structural – is a permanent or semi-permanent structure that
lends itself to hindering access to an installation. It is primarily
constructed for two main purposes, to deny access and to
protect exposure from natural elements;
 Animal – an animal barrier is used in partially providing a
guarding system or in augmentation thereto. The cheapest

3
animal used in security is the geese while sentry dogs like the
German Shepard dogs are usually utilized in the security
business. A sentry dog is valuable due to its keen sense of
smell and hearing. A noise or sound approximately 26 yards are
audible to dogs and it can smell scents at least 100 yards away.
The sentry dog has an incorruptible character and is completely
loyal, he is a predator by instinct hence guarding qualities are
natural. However, its ability to check identity is its perceived
weak points.
 Electrical – popularly utilized is the employment of electrical,
mechanical, electronic energy to impose a deterrent to entry of
the potential intruder and to advertise his presence. Protective
lighting system and protective alarms are commonly used.

ii) Principles of Physical Security


1) There is no impenetrable barrier. If an unfriendly organization is willing
to devote attention, time, money, personnel and devises passing any
type of barrier is conceivable
2) Physical security must be built upon a system of defense in depth. The
accumulation of several barriers or depth after depth will provide
measurable time delay to intrusion into a facility and it will allow
control of any foreseeable penetration.
3) Each installation is different. Variable factors such as location, type of
plant, personnel would make every installation distinct even though
similar security measures are adopted.

iii) Types of perimeter barrier openings:


1) Gates and doors – when frequently used should be controlled by
guards. Inside the perimeter, should be locked when in inactive use.
Preferably, the locked should be changed at least once a year.
2) Sidewalk or utility elevator – These should be made and locked at
times when not in use for it will provide immediate access to an
installation or facility;
3) Utility openings – sewers, air intake, exhaust tunnels should be
protected by bar grills, filter taps particularly if the opening has a cross
section of ninety-six square inches where a man of petit physique may
crawl into;

iv) Types of perimeter barrier:


1) Fence – is an independent structure designed to control physical and/or
visual access between outside areas and are classified into two types:
solid and full view. A solid fence is constructed of opaque material to
deny visual access. A full view fence is constructed to permit visual
access but primarily designed for control or physical access into a
facility.

A chain-link fence with a mesh opening of not larger than two square
inches and made of nine gauge wire or heavier is ideal. The minimum
acceptable overall height for a fence used as security barrier is at least
eight feet. Multiple fences must be nine feet apart to prevent from
jumping from the top of one fence to the other.

 Additional protective barrier:

 Top guard – is an additional outwardly inclined fixed


structure usually made of barbed wires placed above a
vertical fence of 45 degrees angle will increase
protection from intruders to a certain area. The
minimum breaking system should be at least 500 lbs.,
the overall width of the material should be at least ¾
inch and the tape should have at least 7/16 inch barbs
spaced ½ inch intervals along each side.

4
 Towers – are house like structures placed above the
fence and manned by guards
 Guard control system – normally installed at main
entrance
and manned by guards at all times to secure areas
located near the immediate inside perimeter.

2) Building Walls – masonry walls commonly made of stone slabs,


concrete when employed as a security barrier should have the same
height prescribed in fences and surmounted by barbed wires and top
guard.

3) Bodies of water – these are natural barriers such as streams, creeks,


rivers, marsh or pond – it must always be augmented by walls in areas
prone to entry and is not considered adequate by terns of security. The
installation of flood lights at the perimeter should be considered in the
security plan.

c) Second line of defense

i) Windows, doors and roofs


1) Specifications of windows – when constructed less than 18 feet from
the and 14 feet away from adjacent structures, it should be reinforced
with steel grills. Screens should be installed to prevent petty thievery
and pilferage of small items.
2) Specification of doors – hinges should be constructed in such a way it
is not exposed but rather concealed and welded inside to prevent
tampering and removal.
 It should be heavily constructed with a wide frame
 If constructed with glass panels, it should be protected by wire
grills
 The jamb must be as strong as the door itself and the locking
bolt must be at least 1 inch to the jamb
3) Specifications of roofs – if there is a possibility from gaining access
from roofs, it should be protected by barbed wires or chain link fences,
particularly if it is adjacent from other buildings, trees, pine line, etc.
 Skylights should be installed with fencing materials, screens or
grills

ii) Locks and keys – Locks are mechanical devices used for fastening doors,
chests and lids consisting essentially of a bolt guarded by a mechanism
released by a key or a combination. It is designed for an entry into an
installation and safeguards the removal of materials contained therein.
1) Types of locks
 Warded locks – the simplest form of lock is a ward lock
which uses a bolt containing a notch called talon. The bolt is
moved backward or forward by engaging a key in the talon. It
offers a little degree of security and is merely used to afford
one for obtaining privacy.
 Disc tumbler locks – it contains one or more pieces of metal
of different heights known as tumblers, which intercepts the
bolt and prevents it from being moved until the tumblers are
raised or released by action. It is usually installed in cars and
would afford delay of at least 5 to 10 minutes.
 Lever locks – similar in design with disk tumbler locks, it is
commonly installed in safe deposit boxes and are deemed
picked proof since it can be operated by utilizing combination
by means of dial.
 Cylinder locks – usually installed at home, also called a night
latch and is operated by a key on the outside and a knob on
the inside.

5
 Magnetic locks – similar in design with cylinder locks, except
that the pins need a suitably magnetized key to bring them
into alignment and allow the plug to be turned to release the
bolt.
 Electromagnetic locks – the doors are closed by magnetism
and the plates are operated by means of electricity. When the
power is on and the door is locked, it can resist the pressure of
more than 1,000 lbs.
 Combination locks – for installation in safe and bank vaults,
it can have an intricate system of at least 1 million possible
combination consisting of more than six dials, it affords the
maximum delay in terms of efficiency
 Code-operated locks – they are keyless locks. They are
opened by pressing a series of buttons in proper sequence. In
several designs, time locks are operated when the series is
incorrectly entered.
 Card operated locks – utilize card which are coded in
notched, embedded in electromagnetic strips. It is fitted with a
recording device which identifies the user and indicates the
time of use.

 Padlocks – is a detachable lock having a sliding hasp


which passes through a staple ring and secures
fixtures and other storage containers
 Peterman – a term used in England for lock pickers,
safe combination crackers and penetrators of
restricted areas

2) Types of keys
 Grand Master Key – a key that will open everything in a
system involving two or more master key groups
 Master key – a key that is capable of opening series of locks
 Sub-master key – a key that will open a lock within a
particular grouping or particular area in a given facility
 Change key – a key to a single lock within a system of locks in
an installation

iii) Protective lighting – usually referred to as protective lighting is


completely a part of standard system in security when fence and guards
are employed. There are four considerations that will influence the
effectiveness of protective lighting. These are brightness, silhouette seeing,
contrast and shadow elimination. Darkness is an ally of potential intruders
and must be approximately assessed to limit hiding places.

Active entrances should have at least 30 foot candles of illumination.


Where temperature do not go below 100 degree Fahrenheit fluorescent
units are preferred to incandescent lamps due to lower lamp brightness.
For outside perimeter illumination a 300 to 500 watt floodlights will provide
a band of light with a sufficient horizontal

1) Purpose of protective lighting


 To provide sufficient illumination to areas in hours of darkness
 To improve visibility of human guards for identification
purposes and apprehension of intruders
 It gives a psychological deterrence to potential intruders

2) Types of protective lighting


 Stationary – this is commonly used to flood areas continuously
in a fixed position
 Standby/emergency – this system is turned manually or
automatically in cases of sudden power interruption

6
 Movable – are manually operated and portable lights used to
supplement existing lighting fixtures in times of darkness

3) Types of lighting equipment


 Floodlights – it projects light in a concentrated beam. It is ideal
to use in illumination of buildings, fences, perimeter areas and
boundaries
 Search lights – are incandescent lamps which are highly
focused and utilized to pinpoint possible threat areas
 Fresnel lights – it projects wide beam illumination in a long and
narrow horizontal strips, approximately 180 degrees in the
horizontal plane and 15 to 30 degrees in the vertical plane
 Street lights – widely used in parking areas and produces
diffused lights

4) Areas to be lighted
 Vehicular gate
 Pedestrian gate
 Parking areas
 Perimeter
 Sensitive areas
 Thoroughfares

iv) Protective alarms – are devices and contrivance installed inside and
outside a facility or buildings to compliment and provide additional security
measure and operates to advertise entry into sensitive and protected
areas. It signals and alerts the security personnel of intrusions within the
compound. The alarm is activated in cases of tampering into the circuitry
or activated upon intrusion.

1) Parts of alarm system


 Sensor – it serves as the trigger apparatus
 Circuit – carries the message into the signaling device
 Signaling device – the annunciator which produces loud sound
in case the alarm is activated

2) Types of alarm detection system


 Central Station System – this type of alarm system utilizes a
station located outside the compound. When the alarm is
sounded, the security immediately calls the attention of law
enforcement units and fire teams as the case may be. The
alarm panel system is located outside the facility but manned
by company personnel.
 Local alarm system – once the security has been breached,
the siren is sounded or a light flashes in remote stations located
in the immediate vicinity of the installation. It would afford
response of personnel to the areas wherein intruders were able
to penetrate.
 Local alarm by chance system – this is similar in function
with local alarms but the response would depend on persons
who are alerted within the immediate vicinity of the place
where intrusion was committed, hence it gives no predictable
response.
 Proprietary system – this is a system wherein the panel or
station is located inside the premises of the compound. It is
fully owned and operated by the company and response is
assured with the least time of delay.
 Auxiliary system – the circuitry is directly linked to local
police stations or fire stations and when activated it
immediately notifies said personnel for prompt response. This
system is prone to false alarm and is considered unpopular.
However, banks and other vital establishments are fitted with

7
such devices for response in cases where the alarm is
activated.
 Dial alarm system – this system automatically dials the
numbers of personnel concerned in cases of breach of security.
It utilizes phone lines thru fiber optics and inexpensive alarm
system which is easy to install and operate.

3) Component of Alarm Systems. – Alarm is a device that signals.


Basically, alarm systems are designated to alert security personnel to
intrusions into an area, building or compound. Each type of alarm is
activated in the event that an intruder tampers with a circuitry, a
barrier or radiated waves. Intrusion alarms can be electrical,
mechanical or electronic. Alarms are also used for fire, smoke, or other
emergency and presence of other hazards.

 Basic Component of Alarm Systems


 Triggering device
 Types of Triggering Device
o Magnetic, Mechanical, Mercury Switches
o Metallic Foil
o Alarm Screen
o Capacitance Proximity
o Light (photoelectric or laser)
o Weight
o Wafer Switch
o Vibration
o Sonic and Audio
o Heat
o Doppler
o Duress (manually operated)
 Power source
 Transmission lines
 Annunciator

 Means of Transmitting Alarm


 Landline (analog and fiber optic cables)
 Radio signal (VHF, UHF and CB)
 Cellphone
 Internet

v) Protective cabinets – referred to as the final line of defense, it is high


security storage area where papers, plans, cash and other negotiable
instruments are kept.

1) Types of security cabinets


 Safe – it is a metallic container used primarily for safekeeping
of documents and small items. It should be at least 750 lbs. in
weight or anchored to the building if lighter. The walls should
be at least one inch thick and the door 1 ½ inch thick
 Vault – it is heavily constructed fire resistance storage facility
installed four inches higher than the floor and part of the
building structure. The door of vaults should be at least 6
inches thick. The vault wall, ceiling, floor should be reinforced
by concrete at least 12 inch thick. It is normally moisture and
condensation resistant with electrical conduits which should not
exceed 1 ½ inch in diameter. Standard size vaults can store up
to 5,000 cubic feet and fire resistant of at least 6 hours.
 File room – constructed lighter than a vault but bigger in
capacity it is installed as part of the building which holds up to

8
10,000 cubic meters of essential items. At least 12 feet in
height, with enough ventilation and fire proof of at least 1 hour.

6.2. Communication Security – the protection resulting from the application of various
measures which prevent or delay the enemy or unauthorized persons in gaining
information through the communication system.

6.3. Hotel Security – the protection of assets, guests, personnel effects and other
properties in a hotel.

6.4. Bank Security – a specialized type of physical security protecting the assets,
personnel, and operation of a bank with special emphasis on the precaution and measure
to safeguard cash and assets which in storage in transit and during transactions.

6.5. Document Security – involves the protection of documents and classified papers
from loss, access by unauthorized persons, damage, theft, and compromise through
disclosure.

6.5.1. Classification of documents

a) Class I - Vital/Company Confidential/Secret documents. They are considered


irreplaceable official matters the unauthorized disclosure of which would cause
exceptionally grave damage to the interest of an establishment since it is
important to the company’s survival
b) Class II - Important/Private Confidential Documents. The loss or damage of
which will pose a threat to the profitable company operations. The
reproduction of said documents will cause delay and would entail considerable
expense on the part of the firm.
c) Class III - Useful Documents. – Contains operational procedures and
guidelines, wherein loss or compromise would hamper operations but can be
readily restored.
d) Class IV - Non-essential documents. – These refer to day to day recorded
information the disclosure of which would not prejudice company interest due
to the nature of the matters contained therein. These include daily files and
routine papers which are filed and discarded after use.

6.5.2. Requisites of secret information


a) It must be identifiable
b) It must not be available in public/commercial information
c) It must be disclosed by the owner to persons who are under some duty to
protect its secrecy
d) The objective of the owner to indicate or manifest an attempt to prevent its
unauthorized disclosure

6.6. Personal security – the protection of personnel especially ranking officials from
any harm, kidnap and other acts.

6.7. Personnel security – includes all security measures designed to prevent individuals
of doubtful loyalty, integrity, character and judgment from gaining access to sensitive
facilities or classified matters, and/or to prevent the appointment, employment or retention
as employee of such individuals.

6.8. Operational security – deals primarily with protection of processes, formula,


patents and other industrial and manufacturing activities from espionage, infiltration, loss,
compromise or photocopying.

6.9. Industrial security – deals with industrial plants and business enterprises where
personnel, processes, properties, and operation are safeguarded. It involves the use of
protective barriers, security lighting, personnel movement control, locks and key

9
management guard forces, communication and electronic hardware, fire prevention and
control programs, emergency plans, industrial safety and security education program.

7. LICENSING AND OPERATION

7.1. Qualification for Operators


7.1.1. Filipino Citizen with 100% ownership of corporation and capital
7.1.2. At least 25 years old upon application of license
7.1.3. College graduate or a commissioned officer of the AFP in the inactive service
7.1.4. Good moral character

7.2. Grounds for Disqualification


7.2.1. Dishonorable dismissal or discharge without honor from the PNP, AFP, government
entity or government owned or controlled corporation
7.2.2. Mental incompetence
7.2.3. Addiction to the use of narcotic / drugs
7.2.4. Election or appointment in the government whose position may be called upon to
enforce or implement the provisions of RA 5487 as amended.
7.2.5. Conviction of any crime involving moral turpitude.

7.3. Minimum Requirements for agency operation


7.3.1. Security agency should have a minimum of 200 Security Guards (SG) and a
maximum of 1,000 SG’s.
7.3.2. Operators should not have an interest in more than one Security Agency.
7.3.3. Security agency firearms must number not exceeding one firearm per 2 SG.
7.3.4. Cannot use handguns in the .45 caliber category or high powered firearms
such as the 5.56mm M16 which can only be issued and approved by the PNP under
certain circumstances.
7.3.5. Can only employ firearms in the .12 gauge, caliber .22 and .38 only.

7.4. Firearms Restrictions


7.4.1. Firearms issued to SG only when on duty.
7.4.2. SG should be in proper uniform upon assumption of post.
7.4.3. Firearms to be carried only within the confines of his postas stated in his Duty
Detail Order.

7.5. Justification for confiscation of Security Guard Firearm


7.5.1. Firearm is about to be used in the commission of a crime;
7.5.2. Firearm is actually being used in the commission of a crime;
7.5.3. Firearm had just been used in the commission of a crime;
7.5.4. Firearm being carried by SG is unlicensed or not authorized by law;
7.5.5. Security Guard is unlicensed to exercise his profession;
7.5.6. Firearm is carried or used outside of the property being serviced without proper
authority;
7.5.7. Confiscation of firearm is directed by the court.

7.6. Grounds for Cancellation of Agency License to Operate


7.6.1. Submission of falsified documents or reports to the PNP-SAGSD;
7.6.2. Submission of a falsified license to prospective clients;
7.6.3. Engaging in cut-throat competition;
7.6.4. Practice of Kabit system;
7.6.5. Posting of SG outside its jurisdiction ;
7.6.6. Failure to employ the minimum of 200 qualified and license security
guards;
7.6.7. Violation of the minimum wage law;
7.6.8. Employment of unlicensed SG’s;
7.6.9. Engagement in dangerous activities which are inimical to public safety or national
security.

7.7. Qualifications for Guard


7.7.1. Must be a Filipino citizen

10
7.7.2. At least a High School graduate
7.7.3. Be mentally sound and physically fit
7.7.4. At least 18 years old but not more than 50 years old
7.7.5. At least 5’4” in height and not less than 120lbs in weight

7.8. Qualifications for Private Detective


7.8.1. Must possess all the general qualifications of a Security Guard
7.8.2. Must be a graduate of the following:
a) Bachelor of Laws or B.S. Criminology
b) Criminal investigation course offered by the PNP, NBI other gov’t agency or
training school accredited by government
c) Advance ROTC/CMT graduate

7.9. Qualification for Security Officer


7.9.1. Filipino citizen
7.9.2. Holder of Baccalaureate Degree
7.9.3. Physically and mentally fit
7.9.4. Graduate of a Security Officer Training Course
7.9.5. Retired police or AFP personnel
7.9.6. Must not possess any disqualification for security agency operators

7.10. Qualification for Security Consultants


7.10.1. Must hold the same requirements of a private detective
7.10.2. Holder of Masters Degree in Criminology, Public Administration, MNSA, Industrial
Security, etc.
7.10.3. Must have at least ten (10) years experience in the operation and management of
security business

8. Personnel Security Investigation

8.1. Definition of Personnel Security Investigation - Security measures designed to


prevent unsuitable individuals or persons of doubtful loyalty and character from being
lawfully employed by a company or institution.

8.1.1. Types of Background Investigation


a) Partial Background Investigation – Involves superficial investigation of a
persons character or personal history, often relaying on documents submitted
by the person under investigation.

b) Complete Background Investigation – Involves verification of a person’s


personal history and character, often by conducting interviews, document
authentication, etc.

8.1.2. Documents often subject for verification


a) Birth certificate
b) Baptismal and church records
c) School records
d) Employment records
e) Military or police service records
f) Credit records
g) Character references
h) Social organizations
i) Others

9. Fire Protection
9.1. Automatic sprinklers – these are attached and distributed in the ceilings of rooms,
sprinklers activate by the increase in room temperature and water is delivered right where
it is need.
9.2. Fire pump – a mechanical device for supplying water.
9.3. Stand pipes – are galvanized iron, steel or plastic pipes located inside a building
with water under pressure for use in case of fire. A fire hose, usually enclosed in a glass

11
box is screwed into the stand pipe outlet and a valve is opened to release the water, in
case of fire.
9.4. Fire Hydrant – a mechanical device, strategically located in an installation or street
where a fire hose is connected in case of fire.
9.5. Fire Extinguishers – the most important and useful piece of fire fighting
equipment in a plant.

9.6. Classes of Fires:


9.6.1. Class “A” Fires – result from burning of ordinary combustible materials
such as wood, paper and other carbonaceous materials.
9.6.2. Class “B” Fires – caused by flammable liquids like kerosene, gasoline, oil
products.
9.6.3. Class “C” Fires – those that start in live electrical wires, equipment, motor,
electrical appliance.
9.6.4. Class “D” Fires – result from the combustible of certain metals such as
magnesium, potassium.

10. VIP Security

10.1. VIP Security Defined


10.1.1. Also referred to as Personal Security
10.1.2. Utilized in the protection of ranking officials, foreign dignitaries and prominent
private individuals from harm, kidnapping and other types of threats.

10.2. Definition of Terms in VIP Security:


10.2.1. Close in security – the protective detail that provides close physical security to
principal;
10.2.2. Effectiveness – the desired outcome due to decisive and measurable result;
10.2.3. Principal – Refers to the person who is being protected and secured.
10.2.4. Perimeter Security – The working protective detail that involves placement of
security personnel, alarms, barricades and other means to provide better physical
protection, surveillance and intelligence for the benefit of the principal
10.2.5. Protective Security – An individual or a group assigned to protect a principal.
10.2.6. Threat – Harassment or intimidation specifically targeting the principal.

10.3. Components of VIP Vehicle Convoy:


10.3.1. Escort vehicles – usually positioned at the front portion of the convoy
10.3.2. Counter attack / Recon Vehicle – always fronting the principal vehicle to neutralize
any possible threat
10.3.3. Decoy vehicle – identical vehicle meant to confuse would be assassins
10.3.4. Shield vehicle – shields principals vehicle

10.4. Measures for securing VIPs:


10.4.1. Avoid patterns and routines.
10.4.2. Plan vehicle routes in advance. Study the terrain to and fro.
10.4.3. Always travel in convoy.
10.4.4. Avoid heavily congested roads or thoroughfares.
10.4.5. Always drive near the center lane of a highway or road.
10.4.6. Avoid high profile vehicles which could give away the identity of the VIP.
10.4.7. Be alert for surveillance.
10.4.8. Never discuss details of your travel plans within hearing range of non-security
personnel.

10.5. Security Measures for the Office:


10.5.1. Do not place desk near windows or stand near windows that are not bullet proof
or have blinds.
10.5.2. Vary routes going to and fro within the building.
10.5.3. Utilize package control and inspection measures.
10.5.4. Conduct thorough background checks of all employees.

12
10.5.5. Be discreet in conversing publicly regarding your plans within hearing of persons
with doubtful loyalty.

10.6. Security Measures for Home and Family:


10.6.1. Consider security of the immediate vicinity of your home.
10.6.2. Make your residence burglar proof.
10.6.3. Be wary of telephone lines, it maybe tapped.
10.6.4. Instruct household help regarding basic security precautions.
10.6.5. Do not entertain people wanting to photograph you, your family and your home.
10.6.6. Ensure family members have escorts when leaving the premises.
10.6.7. Background check all household help.
10.6.8. Do not let in strangers without verification of his/her identity.
10.6.9. Do not hand out business cards.

11. IMPORTANT TERMS:


11.1. Access list – an unauthenticated list of personnel given to security allowing entry to a
compound or installation or part thereof.
11.2. Controlled area – an area near or adjacent to limited or exclusive areas where entry is
restricted.
11.3. Doppler effect – a physical phenomenon that caused frequency shift if an object moves
in an area permeated by radio frequency signals.
11.4. Dry run – practical test or of exercise of a plan or any activity to test its validity; and
operational readiness exercise;
11.5. Duress code – a type of code system so that security personnel when forced by armed
men intending to enter an installation can alarm by the use of certain words in casual
conversation with other personnel in the installation
11.6. Exclusion area – a restricted area containing materials or operation of security interest
11.7. Peterman – a term used in England for lock pickers, safecrackers and penetrators of
restricted rooms or area.
11.8. Restricted area – any area access to which is subject to special restriction control

12. RA 5487 otherwise known as “An Act to Regulate the Organization and Operation of
Private Detective, Watchmen or Security Guards Agencies,” 1 as amended by PD No.
11.

12.1. This law governs the organization, operation, business and activities of private detectives,
watchmen or security guards agencies.2

12.2. Prohibitions to operate

12.2.1. No License certificate shall be granted to any applicant for license to operate or
license to exercise security profession with the following disqualifications:
a) having previous record of any conviction of any crime;
b) having previous record of any conviction of any offense involving moral
turpitude;
c) having been dishonorably discharged or separated from employment or
service;
d) being a mental incompetent;
e) being a user/addicted to the use of prohibited drugs or narcotics;
f) being a habitual drunkard;
g) dummy of a foreigner.

12.3. License to Operate

12.3.1. Who may organize and maintain a Private Security Agency and Private
Detective Agency. – Any Filipino citizen or corporation, association, partnership,
one hundred percent (100%) of which is owned and controlled by Filipino citizens,
may organize and maintain a Private Security Agency or Private Detective Agency.
1
June 21, 1969.
2
Implementing Rules and Regulations of RA 5487 otherwise known as “An Act to Regulate the Organization and Operation of
Private Detective, Watchmen or Security Guards Agencies,” as amended by PD No. 11.

13
12.3.2. Basic requirement of an operator or manager of agency – The operator or
manager of an agency including, managers of branch offices, must be:
a) Filipino citizen;
b) Not be less than twenty five (25) years of age;
c) College graduate and/or a commissioned officer in the inactive service or
retired from the Armed Forces of the Philippines or the Philippine National
police;
d) Has taken a course/seminar on industrial Security Management and/or must
have adequate training or experience in security business; and,
e) Good moral character

New applicants for license to operate shall be required to obtain a minimum


capitalization of one million pesos (P1, 000,000.00) with a minimum bank deposit
of five hundred thousand (P500, 000.00) pesos in order to start its business
operation.

12.4. Definition of terms

12.4.1. Person – shall include not only natural but also juridical persons such as single
proprietorships, partnerships, corporations, companies or associations, duly
organized and registered with the Securities and Exchange Commission and/or
the Department of Trade and Industry.

12.4.2. Private Security Services – shall include the act of providing or rendering
services to watch an establishment whether public or private, building,
compound/area or property, to conduct access control/denial in any form whether
physically, manually or scientifically by electronic monitoring systems, for the
purpose of securing such area/property and at the same time ensuring safety and
protection of persons within such areas, to maintain peace and order within such
areas, to conduct private security training, and/or to conduct investigation. It shall
also include the act of contracting, recruiting, training, furnishing or posting any
security guard, to do its functions or solicit individuals, businesses, firms, or
private, public or government-owned or controlled corporations to engage his/its
service or those of his/its security guards, for hire, commission or compensation
thru subscription or as a consultant/trainer to any private or public corporation.

12.4.3. Private Detective Services – shall include among others the act of providing
personal security protection, inquiry and information gathering, preemployment
verification and individual background profiling, providing assistance in civil
liability and personal injury cases, insurance claims and fraud, child custody and
protection cases, for the purpose of assisting in gathering information leading to
determination and/or prevention of criminal acts and/or resolution of legal,
financial and personal problems.

12.4.4. Private Security Industry – shall cover those in the legitimate business of
providing private security and detective services.

12.4.5. Private Security Guard (SG) – sometimes called private security guard or
watchman shall include any person who offers or renders personal service to
watch or secure either a residence, business establishment, or buildings,
compounds, areas, or property, inspects/monitors bodily checks/searches
individuals and/or baggage and other forms of security inspection, physically/
manually or scientifically electronic, including but not limited to, logging
concessions and agricultural, mining or pasture lands, transportation, for hire or
compensation , or as an employee thereof, including any employee of the national
or local governments or agencies or instrumentality’s thereof and or government
owned or controlled firm or corporations who is employed to watch or secure
government buildings, compounds, premises and other properties, other than
members of the Armed Forces of the Philippines, guards of the Bureau of Jail
management and Penology, Municipal or City jail guards, and members of the

14
Philippine National Police or of any other law enforcement agency of the
Government.

12.4.6. Private Detective (PD) – shall mean any person who does detective work for
hire, reward or commission, other than members of the Armed Forces of the
Philippines, guards of the Bureau of Jail Management and Penology, municipal or
city jail guards, and members of the Philippine National Police or of any other law
enforcement agency of the government.

12.4.7. Private Security Personnel – shall be natural persons which include private
security guards, private detectives, security consultants, security officers and
others that may be classified later, rendering/performing security and/or detective
services as employed by private security agencies and/or private firms.

12.4.8. Government Security Personnel – shall be natural persons which include


government security guards, detectives, security consultants, security officers and
others that may be classified later, except those of the Armed Forces of the
Philippines, Philippine National Police, Bureau of Jail Management and Penology,
Municipal or City Jail guards rendering/performing security and/or detective
services as employed by government entities.

12.4.9. Private Security Agency (PSA) – shall mean any person association,
partnership, firm or private corporation, who contracts, recruits, trains, furnishes
or posts any security guard, to perform its functions or solicit individuals,
businesses, firms, or private, public or government-owned or controlled
corporations to engage his/its service or those of his/its security guards, for hire,
commission or compensation thru subscription or as a consultant/trainer to any
private or public corporation whose business or transactions involve national
security or interest like the operation and/or management of domestic or ocean
vessels, airplanes, helicopters, seaports, airports heliports, landing strips etc., or
as consultant on any security related matter, or to provide highly specialized
security, detective and investigation services like gangway security, catering
security, passenger profiling, baggage examination, providing security on board
vessels or aircraft, or other security needs that PNP SAGSD may approve.

12.4.10. Private Detective Agency (PDA) – shall mean any person association,
partnership, firm or private corporation, who contracts, recruits, trains, furnishes
or posts any private detective, to perform its functions or solicit individuals,
businesses, firms, or private, public or government-owned or controlled
corporations to engage his/its service or those of his/its detectives, for hire,
commission or compensation thru subscription or as a consultant/trainer to any
private or public corporation or as consultant on any detective related matter, or
to provide highly specialized detective and investigation services, or other
detective needs that SAGSD-CSG may approve.

12.4.11. License to Exercise Profession – shall mean any document issued by the
Chief, Philippine National Police or his duly authorized representative recognizing
a person to be qualified to perform his duties as private security or training
personnel.

12.4.12. License to Operate (LTO) – is a License Certificate document, issued by the


Chief, Philippine National Police or his duly authorized representative, authorizing
a person to engage in employing security guard or detective, or a juridical person
to establish, engage, direct, manage or operate an individual or a private
detective agency or private security agency/company security force after payment
of the prescribed dues or fees as provided in these Rules and Regulations.

12.4.13. Company Guard Force (CGF) – a security force maintained and operated by
any private company/corporation utilizing any of its employees to watch, secure
or guard its business establishment premises, compound or properties.
Government Guard Unit (GGU) – a security unit maintained and operated by any
government entity other than military or police, which is established and

15
maintained for the purpose of securing the office or compound and/or extension
of such government entity.

12.4.14. SAGSD as used herein shall refer to the current PNP Civil Security Group Security
Agency and Guard Supervision Division or any other PNP Office that may be
designated later as the primary office for supervision of the implementation of
these rules and regulations.

12.4.15. PADPAO refers to the Philippines Association of Detective and Protective Agency
Operators, Inc., which is an association of all licensed security agencies and
company security forces.

12.4.16. Duty Detail Order is a written order/schedule issued by a superior officer


usually the private security agency/branch manager or operations officer
assigning the performance of private security/detective services duties.

16

You might also like