Professional Documents
Culture Documents
Dec 2022 Review Notes in Introduction To Industrial Security Concepts Irc Dec 2022
Dec 2022 Review Notes in Introduction To Industrial Security Concepts Irc Dec 2022
COURSE CODE: LEA 3 State and apply the theories, concepts, and philosophy of security and
safety;
COURSE TITLE: Introduction to Organize and assess the related laws in security and detective agency
Industrial Security Concepts operations, management and administration;
Translate and construct the basic industrial security concepts of
security survey, security plan, security test and evaluation, personnel
check, technical surveillance, and security management
INTRODUCTION
Security
The state or quality, condition of being secure, freedom from fear, harm, danger, loss, destruction or damages;
To secure is to make safe or be protected
Defense against crime
Safety
Freedom from HAZARDS
Shall refer to the physical or environmental conditions of work or employment, which substantially comply with
legal requirements.
Man in the course of history has always shown that he values property next to his life and loved ones. Centuries
before the modern concept of security and crime prevention came into practice, cave dwellers fought among
themselves to protect life and property. Eventually, families and clans banded together as tribes and later on formed
communities for mutual protection, recognizing that there is strength in numbers.
The private security business began on March 11, 1933, when the first formally licensed private security agency
“Special Watchman Agency” started its operations.
Later it renamed “Jimenez Security Agency”, founded by brothers Juan and Pedro Jimenez.
On May 30 1958, the Philippine Association of Detectives and Protective Agency Operations (PADPAO) were
formally organized.
In the Philippines, it would be wise to trace the steps leading to the final signing by Ferdinand E. Marcos Sr. on June
13, 1969 of Republic Act 5487.
In this law was assigned the most important role of Security Guard Force in assisting the Police in its mission to
safeguard lives and properties.
Republic Act 5487 otherwise known as the “Private Security Agency Law” was enacted making the Philippine
Constabulary as the sole authority to provide administrative services and general supervision over the management
1
Insight Review Center LEA (Introduction to Industrial Security Concepts)
and operations of all organize Private Security Agencies (PSAs), Company Guard Forces (CGFs), Government
Security Forces (GSFs) and their security guards.
However, the supervision was later on transferred to the National Intelligence and Security Agency (NISA) now
National Intelligence Coordinating Agency (NICA)
In August 04, 1969, a staff memo was issued by Headquarters, Philippine Constabulary (HPC), organizing
the Philippine Constabulary Security and Investigation Agency Supervisory Office (PCSIASO) and later renamed
to PC Supervisory Office for Security and Investigation Agencies (PCSOSIA).
And pursuant to GO No. 404 dated June 29, 1970, the office was renamed to PC Supervisory Unit for Security and
Investigation Agencies (PCSUSIA). With the intention of continuously professionalizing the security industry,
several presidential Decrees were issued such as P.D. No. 11 issued on October 03, 1972, amending certain sections
of R.A. 5487 particularly Section 3, 4, 5, 8 and 9 which permits the Philippine Constabulary to deputize any private
detectives, watchman or security guard to assist in cases of emergency disaster or calamity.
With the creation of the Philippine National Police on January 01, 1991 pursuant to R.A. 6975, PCSUSIA became
PNP SAGSD (Security Agencies and Guards Supervision Division)
Pursuant to Memorandum 07-S96 dated 31 May 1996 the Security Agencies and Guards Supervision Division
(SAGSD) was created as one division under the Civil Security Group (CSG) to exercise supervisory authority and
implement the Rules and Regulations embodied in RA 5487.
On Sep 25, 2009, SAGSD was renamed as the Supervisory Office for Security & Investigation Agencies
(SOSIA) thru General Orders #DPL-09-10. NAPOLCOM RESOLUTION 321 dated 24 Nov 2010 approved GO# DPL-09-
10 entitled “confirming the Restructuring of the PNP CSG”.
SOSIA Seal/Logo
The SOSIA logo illustrates the Office’s foundation and focus. It comprises the symbol and the name depicting the
true nature and origin of the Office. The Sun depicts brightness that serves as beacon of the industry. The Shield shows
the protective nature of the industry with the term “Steadfast” below the symbol of the security guard which means
loyalty and unwavering devotion to his duty. The three (3) stars represent the three (3) main Islands of the
Philippines, namely Luzon, Visayas and Mindanao. The Laurel leaves symbolizes peace which the security guard helps
enforce the rules and regulations in accordance with policies and guidelines.
Safety and security are top priorities in our society and addressing problems in these areas is crucial. Several
different kinds of safety or security exist today, such as international security, cyber security, physical security, fire
safety, and so on. The scientific community is starting to address the creation of a theory of safety and security. The
theory of safety and security will be followed by a series of default theories.
A. RISK THEORY is a widely used scientific discipline, based on the identification of a threat, the specification of risk and
the specification of how to overcome the risk. The essence of risk lies in the objective existence of threats. The risk
comes from consciously controlled acting, or chaotic and uncontrolled acting of each part of a complex. Many
interactions are negative, with devastating impact. This impact is proportional to the magnitude and direction of the
action (measure), where the individual reference objects are involved in negative interactions.
This negative interaction is named “security incident”. The application of the risk theory evaluates which threats (or
negative acts) affect the reference object, and which ones have more or less significant impact.
Risk management has an important position in the field of safety and security. It is focusing on minimization of
damage or impact. The disadvantage of the risk management is that it does not find out the causes of threats. Threats
2
Insight Review Center LEA (Introduction to Industrial Security Concepts)
are taken as a fact and it only focuses on what they can cause. Unacceptable risk is solved by appropriate measures. The
solution comes as acceptance of risk, risk retention, risk transfer and risk avoidance. Despite this disadvantage, risk
theory creates the basis of the theory of safety and security. The main contribution is its well-developed methods of risk
analysis.
What is RISK?
Is the potential damage or loss of an asset.
Types of risk:
1. Pure Risk 2. Dynamic Risk
Risk Analysis
It is the process used by the Security Professionals in determining his priorities in the protection of assets. The
analysis of risk includes examination of the vulnerability, probability and criticality of potential threats and
includes natural and man-made risk.
Major Risk
Among the major categories of risk which are arranged according to Criticality are:
Nuclear Attack Other Crimes
Natural Catastrophe Conflict of Interest
Civil Disturbances and Malicious Destruction Other Risk
Risk Management
The process of selecting and implementing security countermeasures to achieve an acceptable level of risk at an
acceptable cost.
ASSET
Any person, facility, material, information or activity which has a positive value to its owner whether it is an
individual, private or government entity.
The asset may have value to an adversary, as well as to the owner, although the nature and magnitude of those
values may differ.
VULNERABILITY
Any weakness that can be exploited by an adversary to gain access to an asset.
COUNTERMEASURE
An action taken or a physical entity used to reduce or eliminate one or more vulnerabilities.
The cost of a possible countermeasure may be monetary, but may also include nonmonetary costs such as:
reduced operational efficiency, adverse publicity, unfavorable working conditions and political consequences.
DEFINING THE PROBLEM
Useful definition of a security problem requires that three things be recognized and evaluated in quantitative
terms:
1) The kinds of threats or risks affecting the assets to be safeguarded;
2) The likelihood or probability of those threats becoming actual loss events;
3) The impact or effect upon the assets or upon the enterprise responsible for the assets if the loss occurs.
The first we may call Loss Event Profile, the second Loss Event Probability or Frequency and the third
Loss Event Criticality.
LOSS EVENT PROFILE
The kinds of threats or risks affecting the assets to be safeguarded.
SECURITY VULNERABILITY
No security plan or program can be effective unless it is based upon a clear understanding of the actual risks it is
designed to control.
That statement should be the basis for all security activity. It makes no difference whether the problem being
considered involves quick assets like cash or negotiable instruments, more permanent assets such as equipment,
inventory and fixtures or intangible assets like trade secrets.
Until the actual act threat to those assets is assessed accurately, precautions and countermeasures, even those of
the highest quality, reliability and repute, cannot be chosen expect by guesswork.
3
Insight Review Center LEA (Introduction to Industrial Security Concepts)
The value of a security program depends not only upon the excellence of the resources but upon their
appropriateness and relevance. Problem definition comes first; then comes countermeasures design. Reversing
this order would result in needless expense and possibly, a substantially non-responsive security program.
PROBABILITY
The change or likelihood that a loss will take place.
Indicated by a mathematical statement concerning the possibility of an event occurring.
CRITICALITY
The impact of a loss as measured in financial terms. How important it is in terms of the survival or existence of
the organization.
CRITICALLY KNOWN OR UNKNOWN
Percentage of Impact:
100% Fatal 75% Very Serious 50% Average 25% Less Serious 0% Unimportant
Risk Avoidance
• Eliminating or removing the risk totally from the business, government or industrial environment for which the
risk manager has responsibility.
Risk Reduction
• Decreasing the risk by minimizing the probability of the potential loss. The reduction of criminal opportunity is
often accomplished by situational crime prevention strategies to discourage, deter or deny criminal incidents.
Risk Spreading
• Spreading the risk(s) through compartmentation or decentralization to limit the impact (criticality) of the
potential loss.
Risk Transfer
• Moving the financial impact of the potential loss over to an insurance company.
Risk Self Assumption
• Planned assumption and acceptance of the potential risk(s) by making a deliberate managerial decision of;
a. doing nothing about the threat or
b. setting aside resources for use in case of a specific loss incident.
Combination of the above
• Using a combination of two or more of the above strategies to manage potential risk and threats.
B. A CRISIS THEORY is an important phenomenon, which has negative influence on human society. The negative effect
is a common sign of security breach and crisis. For the safety and security research, it is important to determine
what is the reason and nature of safety and security problems. Crisis theory is a scientific discipline focused on the
theoretic aspects of crisis research, mainly on nature and causes of crisis. The crisis theory is the basis for successful
management of a crisis.
These terms are similar. They are appropriate for designation of a time period when existential complications arise.
The crisis is considered as a state or period when danger is coming out and simultaneously the aim function of the
reference object is threatened. The crisis arises when there is a significant change in conditions for the reference object.
Changing conditions occurs due to the chaotic or uncoordinated behavior of each part of the system. During this time
period, the configuration of conditions and environment are changing. If the changes are expected, the system can be
4
Insight Review Center LEA (Introduction to Industrial Security Concepts)
prepared for them and after that; it also can have a suitable reaction. The situation is different when a rapid change has
a higher-than-expected value. During this situation, the system can have an inappropriate reaction and, following that
complications or crisis may arise.
Basically, the crisis is created due to:
a. unexpected and large negative b. unmanaged control.
situation,
b. Unmanaged Control
The nature of the crisis arising is based on the unmanaged control. The crisis usually includes periods (stages) of
latent symptoms, acute, chronic and resolved/unresolved crisis. In the stage of latent symptoms, the accumulation of
unresolved problems happens. If the managing system is not catching up or is not solving the crisis symptoms, the crisis
comes out. In the acute stage, problems culminate. The unsolved problems accumulate, too. The control system should
start solving these problems slowly. This breakpoint is based on the capacity of the system, especially on the control
system. The crisis is eliminated if the system is capable of activating and ensuring plenty of resources for appropriate
measures.
C. THE CAUSALITY is a scientific discipline which researches relations between cause and effect. The term causality has
evolved from the Latin word ‘’causa “. The cause is relation, where cause and effect are mutually connected. The law
of causality determines that anything that happens has at least one cause, and also any cause has future
consequences. The same causes create the same effects. It is structured by a causal relationship (causal nexus).
Causality is an expression of the relationship between two events, where one of them raises and the second is
called the "cause". Basically, the reason is the term, which causes effect. Causality is key for the theory of safety and
security. It allows establishing a logic chain of causes of security or safety violation. From this point of view of safety or
security, there is inadequate position of causality. A role of causality is neglected. It is important to focus on this
problem.
SAFETY INDUSTRY
Accident theories guide safety investigations. They describe the scope of an investigation. Understanding
accident causation is intrinsic to their successful prevention.
Accident prevention is the most basic of ail safety management paradigms. If safety management is effective,
then there should be an absence of accidents. Conversely, if accidents are occurring then effective safety management
must be absent. Therefore, understanding how accidents occur is fundamental to establishing interventions to prevent
their occurrence. A simple nexus it would seem, yet the reality is accidents are complex events, seldom the result of a
single failure, and that complexity has made understanding how accidents occur problematic since the dawn of the
industrial evolution.
Definition of Terms:
Accident
— a short, sudden and unexpected event or occurrence that results in an unwanted and undesirable outcome and
must directly or indirectly be the result of human activity rather than a natural event.
Incident
— an unexpected and usually unpleasant thing that happens.
Near miss
— is an unplanned event that did not result in injury, illness, or damage - but had the potential to do so.
Fault of Persons
5
Insight Review Center LEA (Introduction to Industrial Security Concepts)
— created by social environment or acquired by ancestry.
Social Environment/Ancestry
— where and how a person was raised and educated.
Theory
— collections of concepts about some real-world area of concern or interest which facilitate explaining, predicting,
or intervening. With theories we explain why and how things occur as they do.
EVOLUTION OF MODEL OF ACCIDENT CAUSATION
The history of accident models to date can be traced from the 1920s through three distinct phases:
1. Simple linear models 2. Complex linear models 3. Complex non-linear models
The new generation of thinking about accident modelling has moved towards recognizing that accident models need to
be non-linear; those accidents can be thought of as resulting from combinations of mutually interacting variables which
occur in real world environments and it is only through understanding the combination and interaction of these multiple
factors that accidents can truly be understood and prevented. (Hollnagei, 2010).
There are several major theories concerning accident causation, each of which has some explanatory and predictive
value.
1. The domino theory developed by H. W. Heinrich, a safety engineer and pioneer in the field of industrial accident
safety.
According to Heinrieh, an “accident” is one factor in a sequence that may lead to an injury. The factors can be visualized
as a series of dominoes standing on edge; when one fails, the linkage required for a chain reaction is completed. Each of
the factors is dependent on the preceding factor.
Based on the domino model, accidents could be prevented by removing one of the factors and so interrupting the
knockdown effect. Heinrich proposed that unsafe acts and mechanical hazards constituted the central factor in the
accident sequence and that removal of this central factor made the preceding factors ineffective. He focused on the
human factor, which he termed "Man Failure", as the cause of most accidents.
Giving credence to this proposal, actuarial analysis of 75,000 insurance claims attributed some:
6
Insight Review Center LEA (Introduction to Industrial Security Concepts)
a. 88% of preventable accidents to unsafe acts of persons
b. 10% to unsafe mechanical or physical conditions,
c. with the last 2% being acknowledged as being unpreventable giving rise to Heinrich's chart of direct and
proximate causes
2. Human Factors Theory - Heinrich posed his model in terms of a single domino leading to an accident. The
premise here is that human errors cause accidents. These errors are categorized broadly as:
OVERLOAD
- The work task is beyond the capability of the worker
a. Includes physical and psychological factors
b. Influenced by environmental factors, internal factors, and situational factors
INAPPROPRIATE ACTIVITIES
- Lack of training and misjudgment of risk
- But the structure of this theories still a cause/effect format
3. Accident/Incident Theory - Extension of human factors theory. Here the following new elements are
introduced:
Ergonomic traps - These are incompatible work' stations, tools or expectations (management failure)
Decision to err - Unconscious or conscious (personal failure)
Systems failure - Management failure (policy, training, etc.)
4. Epidemiological Theory - Epidemiology - This field studies relationship between environmental factors and
disease can be used to study causal factors in a relationship
Together these characteristics can cause or prevent accidents that a person predisposed to a given situation or
condition may succumb to.
A. Natural Authority
The highest law is the law of preservation
By instinct, man naturally reacts to protect himself, his family, his home, freedom, liberty and property from
danger, threat or hazard. He does it personally or through the help of others.
B. Constitutional Authority
1. The prime duty of the government is to serve and protect people. The government may call upon the people to
defend the state and, in the fulfillment thereof, all citizens may be required under conditions provided by law or to
render personal military or civil service. (Art II, Sec 4 of the 1987 Philippine Constitution)
Take note also that all citizens who are qualified, including the security guards, may be required by law to render
personal military or civil service. The service required of the citizen is personal.
2. No person shall be deprived of life, liberty or property without due process of law, nor shall any person be denied
the equal protection of the laws. (Art III, Sec.1 of the 1987 Philippine Constitution)
This means that life, liberty, freedom and property can only be taken from a person after the observance of due
process of law.
7
Insight Review Center LEA (Introduction to Industrial Security Concepts)
3. Private Property shall not be taken for public use without just compensation. (Art III Sec. 9 of the 1987 Philippine
Constitution)
The Constitution protects not only ownership but also possession, enjoyment, use and disposition of private
property by their rightful owners subject to such limitations imposed by law.
In this regard, private property to be taken by the government in its exercise of the power of the eminent
domain must satisfy two important conditions, namely: public use and just compensation.
4. The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and
seizures of whatever nature and for any purpose shall be inviolable, and no search warrant or warrant of arrest shall
be issue except upon probable cause to be determined personally by the judge after examination under oath or
affirmation of the complainant and the witnesses he may produce, and particularly describing the place to be search
and the persons or things to seize. (Art III, Sec 2 of the 1987 Philippine Constitution).
C. Statutory Authority
DEFINITION OF TERMS
(RA 5487 as amended)
PERSON
shall include not only natural but also juridical persons such as single proprietorships, partnerships,
corporations, companies or associations, duly organized and registered with the Securities and Exchange
Commission and/or the Department of Trade and Industry.
PRIVATE SECURITY SERVICES
shall include the act of providing or rendering services to watch an establishment whether public or private,
building, compound/area or property, to conduct access control/denial in any form whether physically, manually
or scientifically by electronic monitoring systems, for the purpose of securing such area/property and at the
same time ensuring safety and protection of persons within such areas, to maintain peace and order within such
areas, to conduct private security training, and/or to conduct investigation. It shall also include the act of
contracting, recruiting, training, furnishing or posting any security guard, to do its functions or solicit individuals,
businesses, firms, or private, public or government-owned or controlled corporations to engage his/its service or
those of his/its security guards, for hire, commission or compensation thru subscription or as a
consultant/trainer to any private or public corporation.
PRIVATE DETECTIVE SERVICES
shall include among others the act of providing personal security protection, inquiry and information gathering,
pre-employment verification and individual background profiling, providing assistance in civil liability and
personal injury cases, insurance claims and fraud, child custody and protection cases, for the purpose of
assisting in gathering information leading to determination and/or prevention of criminal acts and/or resolution
of legal, financial and personal problems.
PRIVATE SECURITY INDUSTRY
shall cover those in the legitimate business of providing private security and detective services.
PRIVATE DETECTIVE AGENCY
Any person, association, partnership, firm or private corporation, who contracts, recruits, trains, furnishes, or
post any private detective, to perform its functions or solicit individuals, business, firms, or private, public or
government-owned or controlled corporations to engage his/its service or those of his/its detectives, for hire,
commission or compensation.
Notes:
1. All person used in a private detective work must be licensed
2. All person employed solely for clerical or manual work need no private detective license.
8
Insight Review Center LEA (Introduction to Industrial Security Concepts)
3. License (LTO) shall be displayed at all times in a conspicuous and suitable place in the agency office or
headquarters of the agency and shall be exhibited at the request of any person whose jurisdiction is in
relation with the business of the agency or the employees thereof, or of the Chief of the PNP or his duly
authorized representative or any peace officer.
4. The PNP shall exercise general supervision over the operation of all private detective and private detective
agency.
Moral Turpitude
— A phrase used in Criminal Law to describe conduct that is considered contrary to community standards of
justice, honesty, or good morals. Crimes involving moral turpitude have an inherent quality of baseness,
vileness, or depravity with respect to person's duty to another or to society in general.
9
Insight Review Center LEA (Introduction to Industrial Security Concepts)
PRIVATE SECURITY GUARD AGENCY
any person, association partnership, or corporation, who recruits, trains, muster, furnishes, solicits individuals
or business firms, private or government-owned or controlled corporations to engage his service or those of its
watchmen.
Notes:
1. All person used in a private detective work must be licensed
2. All person employed solely for clerical or manual work need no private detective license.
3. License (LTO) shall be displayed at all times in a conspicuous and suitable place in the agency office or
headquarters of the agency and shall be exhibited at the request of any person whose jurisdiction is in
relation with the business of the agency or the employees thereof, or of the Chief of the PNP or his duly
authorized representative or any peace officer.
4. The PNP shall exercise general supervision over the operation of all private detective and private detective
agency.
Note: One can’t be a Commissioned officer in the inactive service of the AFP unless college graduate. The law used the
word and/or.
— New applicant for license to operate shall be required to obtained minimum capitalization of one million (Php
1,000,000.00) pesos with minimum bank deposit of five hundred thousand (Php 500,000.00) pesos in order to start
its business operation
10
Insight Review Center LEA (Introduction to Industrial Security Concepts)
PNP
as used herein shall mean the Philippine National Police, which was organized pursuant to the provision of RA
6975 otherwise known as the National Police Act of 1991.
SAGSD
has used herein shall refer to the current PNP Civil Security Group Security Agency and Guard Supervision
Division or any other PNP Office that may be designated later as the primary office for supervision of the
implementation of these rules and regulations.
PADPAO
refers to the Philippines Association of Detective and Protective Agency Operators, Inc., which is an association
of all licensed security agencies and company security forces.
DUTY DETAIL ORDER
is a written order/schedule issued by a superior officer usually the private security agency/branch manager or
operations officer assigning the performance of private security/detective services duties.
1. On Membership:
— No regular license shall be granted to any PRIVATE SECURITY AGENCY unless it has a minimum of two hundred
(200) licensed private security personnel under its employ;
— nor to any COMPANY GUARD FORCE or PRIVATE DETECTIVE AGENCY unless it has a minimum of thirty (30)
licensed private security personnel under its employ;
— Provided, that the maximum number of private security personnel that a PSA/CGF/PDA may employ shall be one
thousand (1,000):
2. On Organization:
— No person, corporation, partnership or association may organize more than one agency in any one city or
municipality.
3. On Service:
— No agency shall offer, render or accept its services to gambling dens or other illegal enterprises.
— The extent of the security service being provided by any security agency shall not go beyond the whole
compound or property of the person or establishment requesting the security service except when they escort
big amount of cash.
A. License to Operate
Is license certificate document, issued by the Chief, PNP or his duly authorized representative, authorizing a
person to engage in employing security guard or detective, or a juridical person to establish, engage, direct,
manage, or operate an individual or a private detective agency or private security agency/company security
force after payment of the prescribed dues or fees as provided.
Application of LTO:
To the Chief, PNP through the PNP Security and Guard Supervision Division, Civil Security Group (SAGSD-CSG).
Using license application form PNPSF1, the application shall contain the full name of the applicant, his age, civil
status, his residence and location of business
11
Insight Review Center LEA (Introduction to Industrial Security Concepts)
All applications for renewal of license to operate shall be filed at least sixty (60) days before expiry date of LTO
subject of the renewal application filed/accepted thereafter shall be penalized for late filing.
In addition to other renewal requirements under provision of these rules and regulation, no application shall be
approved unless a certification is issued by FED-CSG to the effect that all licensed firearms of the agency
concerned are updated/renewed for at least one (1) year forthcoming during the validity of the renewed LTO
C. Firearms License
All firearms of the security agency should be covered with firearms license issued by the PNP through Firearms
Explosives Division under the Civil Security Group
Renewable every two years.
Possession of Firearms:
— one firearm for every two security guards (1:2) in its employ;
— No PSA/CSF/GSU shall be allowed to possess firearms in excess of 500 units
Stocking of ammunition:
— PSA shall not exceed fifty (50) rounds of ammunition per unit of duly licensed firearms.
— Individual issue to each a security guard shall be limited to one half of such basic load or twenty-five (25) rounds
for every security guard
TYPES OF SECURITY
In the field of industrial security, various types of security are applied depending on the installation and the
security needs of the installation. The types of security are the following:
1. Physical Security
The broadest branch of security which is concerned with the physical measures adopted to prevent
unauthorized access to equipment, facilities, materials and documents and to safeguard them from espionage,
sabotage, damage, loss and theft.
defined as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies,
programs, personnel, property, utilities, information, facilities and installation against compromise, trespass,
sabotage, pilferage, embezzlement, fraud, or another dishonest criminal act.
It is the sum total of all physical protection employed or installed to secure assets.
Ex. Human Guards, perimeter fence/barrier and security devices
2. Communication Security
It is the protection resulting from the application of various measures that prevent or delay the enemy or
unauthorized persons in gaining information through the communication system. This includes:
12
Insight Review Center LEA (Introduction to Industrial Security Concepts)
a. Transmission Security- a component of communication security that results from all measures designed
to protect transmission from the interception, traffic analysis, and imitative deception.
b. Cryptographic Security- result from the provisions of technically sound crypto-systems and their proper
use.
3. Hotel Security
a type of security applied to hotels where its properties are protected from pilferage, loss, damage and the
function in the hotel restaurants are not disturbed and troubled by outsiders or the guest themselves. This type
of security employs house detectives, uniformed guard and supervisor and ensures that hotel guests and their
personal effects are safeguarded.
4. Bank Security
This type of security is concerned with bank operations.
Its main objective is the protection of bank cash and assets, its personnel and clientele.
5. Document Security
is that aspect of security which involves the application of security measures for the proper protection and
safeguarding of classified information.
6. VIP Security
a type of security applied for the protection of top-ranking officials of the government or private entity, visiting
persons of illustrious standing and foreign dignitaries.
7. Industrial Security
a type of security applied to business groups engaged in industries like manufacturing, assembling, research and
development, processing, warehousing and even agriculture.
It may also mean the business of providing security.
8. Operational Security
This is a type of security that deals primarily with the protection of processes, formula, patents and other
industrial and manufacturing activities from espionage, infiltration, loss, compromise, or photocopying.
1. Physical Security
2. Personnel Security
3. Document & Information Security
PHYSICAL SECURITY
The broadest branch of security which is concerned with the physical measures adopted to prevent
unauthorized access to equipment, facilities, materials and documents and to safeguard them from espionage,
sabotage, damage, loss and theft.
defined as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies,
programs, personnel, property, utilities, information, facilities and installation against compromise, trespass,
sabotage, pilferage, embezzlement, fraud, or another dishonest criminal act.
It is the sum total of all physical protection employed or installed to secure assets.
Ex. Human Guards, perimeter fence/barrier and security devices
13
Insight Review Center LEA (Introduction to Industrial Security Concepts)
BARRIER
— defined as any physical structure whether natural or man-made, capable of restricting, deterring, delaying or
preventing illegal and unauthorized access to an installation.
Kinds of Barriers:
Natural barriers
it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that are difficult to traverse.
Structural barriers
These are features constructed by man regardless of their original intent that tends to delay the intruder.
Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
Human barriers
persons being used in providing a guarding system or by the nature of their employment and location, fulfill
security functions.
Examples are guards, office personnel, shop workers, etc.
Animal barriers
animals are used in partially providing a guarding system.
Dogs are usually trained and utilized to serve as guard dogs. German shepherds are best suited for security
functions.
Energy barriers
It is the employment of mechanical, electrical, electronic energy that imposes a deterrent to entry by the
potential intruder or to provide warning to guard personnel.
These are protective lighting, alarm systems and any electronic devices used as barriers.
1) PERIMETER BARRIER
(1st Line of Defense)
MAIN PURPOSE
To deny, to delay or impede access or exit unauthorized person/s.
TYPES OF FENCING
1. SOLID 2. FULL-VIEW
Solid fence
14
Insight Review Center LEA (Introduction to Industrial Security Concepts)
constructed in such a way that visual access through the fence is denied.
Its advantage is that it denies the opportunity for the intruder to become familiar with the personnel, activities
and the time scheduled of the movements of the guards in the installation.
On the other hand, it prevents the guards from observing the area around the installation and it creates
shadows that may be used by the intruder for cover and concealment.
Full-view fence
it is constructed in such a way that visual access is permitted through the fence.
Its advantages are that it allows the roving patrols and stationary guard to keep the surrounding area of the
installation under observation.
On the other hand, it allows the intruder to become familiar with the movements and time schedule of the
guard patrols thereby allowing him to pick the time that is advantageous on his part.
6) Communication Systems
a. Local Tel Exchange d. Call Boxes
b. Two-Way Radio e. Intercommunications
c. Commercial Tel Service f. Paging & Recall System
15
Insight Review Center LEA (Introduction to Industrial Security Concepts)
7) Guards
2) Primary Value
a. Sensor mechanism, 100X better than man
b. Hearing 2X that of man
3) Secondary Value
a. Attack/Pursue, attack/hold
4) Dog's Sense
a. Smell c. Sight
b. Hearing d. Touching
5) Deployment
a. With Handlers b. Without Handlers
PROTECTIVE LIGHTING
— is the single most cost-effective deterrent to crime because it creates a psychological deterrent to the intruders.
A. Continuous lighting
The most familiar type of outdoor security lighting
This is designed to provide two specific results: glare projection or controlled lighting.
It consists of a series of fixed luminaries at range to flood a given area continuously during the hours of
darkness.
B. Stand-by Lighting
It is designed for reserve or standby use or to supplement continuous systems. A standby system can be most
useful to selectively light a particular area on an occasional basis.
C. Movable or Portable Lighting
This system is manually operated and is usually made up of movable search or floodlights that can be located in
selected or special locations which will require lighting only for a short period of time.
D. Emergency Lighting
A stand-by lighting which can be utilized in the event of electrical failure or other emergencies when another
system is inoperative, either due to local equipment or commercial power failure.
Four types of lighting equipment are generally used or associated with security lighting.
These are:
A. Flood lights
These can be used to accommodate most outdoor security lighting needs, including the illumination of
boundaries, fences and buildings and for the emphasis of vital areas or particular buildings.
B. Street lights
This lighting equipment received the most widespread notoriety for its value in reducing crime.
C. Search lights
These are highly focused incandescent lamps and are designed to pinpoint potential trouble spots.
16
Insight Review Center LEA (Introduction to Industrial Security Concepts)
D. Fresnel lights
These are wide beam units, primarily used to extend the illumination in long, horizontal strips to protect the
approaches to the perimeter barrier.
Fresnel projects a narrow, horizontal beam that is approximately 180 degrees in the horizontal and from 15 to
30 degrees in the vertical plane.
ALARM
is an aural or visual signal given by the annunciator to security when intruder actuates the device in a protected
area.
designed to alert security personnel to consummated or attempted intrusions into an area, building or
compound
PROTECTIVE ALARM
It assists the security in detecting, impeding or deterring potential security threat in the installation.
Basically, its function is to alert the security personnel for any attempt of intrusion into a protected area,
building or compound. Once an intruder tampers the circuitry, the beam or radiated waves of the alarm system,
it will activate an alarm signal.
17
Insight Review Center LEA (Introduction to Industrial Security Concepts)
it will detect any vibration caused by attempted force entry. A vibration sensitive sensor is attached to walls,
ceilings or floors of the protected area.
C. Metallic foil or wire
it will detect any action that moves the foil or wire. An electrically charged strip of tin foil or wire is used in the
doors, windows or glass surfaces of the protected area.
LOCK
— defined as a mechanical, electrical, hydraulic, or electronic device designed to prevent entry into a building,
room, container or hiding place.
PETERMAN
— a term in England for lock picker, safecracker, and penetrator of restricted areas or rooms.
Types of Locks:
Types of Keys:
1. Change key - a specific key, which operates the lock and has a particular combination of cuts or biting, which match
the arrangement of the tumblers in the lock.
2. Sub-master key - a key that will open all the locks within a particular area or grouping in a given facility.
3. Master key - a special key capable of opening a series of locks.
4. Grand Master key - a key that will open everything in a system involving two or more master key groups.
KEY CONTROL
Once an effective key control has been installed, positive control of all keys must be gained and maintained.
This can be accomplished only if it is established in conjunction with the installation of new locking devices.
The following methods can be used to maintain effective key control;
a. Key cabinet- a well-constructed cabinet will have to be procured. The cabinet will have to be of sufficient
size to hold the original key to every lock in the system. It should be secured at all times.
18
Insight Review Center LEA (Introduction to Industrial Security Concepts)
b. Key record- some administrative means must be set up to record code numbers and indicate to whom keys
to specific locks have been issued.
c. Inventories- periodic inventories will have to be made of all duplicate and original keys in the hands of the
employees whom they have been issued.
d. Audits- in addition to periodic inventory, an unannounced audit should be made of all key control records
and procedures by a member of management.
e. Daily report- should be made to the person responsible for key control from the personnel department
indicating all persons who have left or will be leaving the company. In the event that a key has been issued,
steps should be initiated to ensure that the key is recovered.
STATUTORY PROHIBITION OF KEY
Art. 305 (RPC) False keys. — The term "false keys" shall be deemed to include:
The tools mentioned in the preceding articles.
Genuine keys stolen from the owner.
Any keys other than those intended by the owner for use in the lock forcibly opened by the offender.
SECURITY CABINET
— The final line of defense at any facility is in the high security storage where papers, records, plans or cashable
instruments, precious metals or other especially valuable assets are protected.
— These security containers will be of a size and quantity, which the nature of the business dictates.
Safe
a metallic container used for the safekeeping of documents or small items in an office or installation.
Its weight must be at least 750 lbs. and should be anchored to a building structure.
Its body should at least one-inch-thick steel.
Vault
heavily constructed fire and burglar resistance container usually a part of the building structure used to keep
and protect cash, documents and negotiable instruments.
Vaults are bigger than safe but smaller than a file room.
The vault door should be made of steel at least 6 inches in thickness.
The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
The vault must be resistive for up to 6 hours.
File room
a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited people
to work on the records inside.
The file room should at most be 12 feet high.
It must have a watertight door and at least fireproof for one hour.
PERSONNEL SECURITY
— Of the three key security processes, personnel security is considered the most important simply because
security involves people, both as assets to be protected and as sources of security threats.
Purpose
To ensure that a firm hires those employees best suited to assist the firm in achieving its goals; and
Once hired, assist in providing the necessary security to them
19
Insight Review Center LEA (Introduction to Industrial Security Concepts)
Personnel Security is the “weakest link” in the security “chain”.
This weakness can best be minimized or eliminated by making initial personnel security conscious through a
good training program.
Security depends upon the action of the individuals.
The superior must instruct his subordinates so that they will know exactly what security measures to take in
every instance; A safe will not lock itself.
Control of Personnel:
Access to “Restricted Areas” can be partially controlled by fences, gates and other physical means, but the
individual working in the area is the key to the bringing out of classified matter to unauthorized personnel.
Written information does not have the power of speech.
Only the individual has knowledge of this written information can pass it to unauthorized personnel if he
unguardedly talks about information.
Background Investigation
20
Insight Review Center LEA (Introduction to Industrial Security Concepts)
— It serves to verify information on the application form and to obtain other information pertinent to the decision
to employ.
— Factors to consider in a Bl:
a. Loyalty - quality of faithfulness to the organization, superiors, subordinates and peers.
b. Integrity - uprightness of character, soundness of moral principles and truthfulness.
c. Discretion - ability to act or decide with prudence; habit of wise judgment.
d. Morals - distinctive identifying qualities that serve as an index to the essential nature of a person.
e. Character-sum of traits impressed by nature, education and habit of a person.
f. Reputation - opinion which one is generally held. Reputation is what a person is reported while
character is what a person is.
— Motives That Cause People to be Disloyal
a. Revenge d. Friendship
b. Material Gain e. Ideological Beliefs
c. Personal Prestige
B. Positive Vetting
The process of inspecting or examining with careful thoroughness.
The essence of vetting is a personal interview conducted under stress.
It is based on the information previously given by the applicant.
C. Profiling
The process whereby a subject’s reaction in a future critical situation is predicted by observing his behavior, or
by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test.
D. Financial and Lifestyle Inquiry
This type of investigation seeks to gather information on income and mode of living, sometimes referred to as
the earning to debt ratio.
E. Undercover Investigation
This is the placement of an agent in a role in which the agent’s true identity and role remains unknown in order
to obtain information for criminal prosecution or for recovery or limitation of asset losses
F. Exit Interview
It gives departing employees an opportunity to list grievances.
It offers security managers an opportunity to learn of problems not previously known.
Debriefing an employee to remind their continuing legal obligation to safeguard confidential company
information
Proprietary Information
Information which in some special way relates to the status of activities of the possessor and over which the
possessor asserts ownership. In the business community proprietary information relates to the structure, products or
business methods of the organization.
What kind of information needs protection?
Trade Secret
A trade secret may consist of any formula, pattern, device or compilation of information which is used on one’s
business and which gives one an opportunity to gain advantage over competitors who do not know or use it. It may be a
formula for a chemical compound, a process of manufacturing, treating or preserving materials, a pattern for a machine
or other device, or a list of customers.
The most basic distinction in regard to proprietary information is between trade-secret data and all other types
of confidential data.
All proprietary information is confidential, but not all confidential information is proprietary.
21
Insight Review Center LEA (Introduction to Industrial Security Concepts)
For example, confidential personnel data in employee files is not proprietary information even though the
company treats it as confidential.
The definition of trade secret contains a reasonable departure from the Restatement of Torts definition which
required that a trade secret be “continuously used in one’s business”.
What is Secret?
This question is taken up first because it is relevant even in cases where data involved are not trade secrets but
merely simple facts. If information is not novel or secret, it is not entitled to any protection; it is the property of
everyone and it is in the public domain.
A Patent is a grant made by the government to an inventor, conveying and securing to him exclusive rights to make, use
and sell his invention for a term of 20 years.
The main differences between a Trade Secret and a Patent are:
a. A trade secret can remain a secret for as long as it continues to meet the trade secret test, whereas an exclusive
right patent expires after a period of 20 years.
b. Since anyone can purchase a patent, they are not industrial espionage targets, whereas trade secrets are.
Standard Rules
The authority and responsibility for the preparation and classification of classified matter rest exclusively with
the originating office. Classified matter shall be classified according to their content and not to the classification
of files in which they are held or another document to which they referred;
Classification shall be made as soon as possible by placing the appropriate marks on the matter to be classified.
Each individual whose duties allow access to classified matter, or each individual who possesses knowledge of
classified matter while it is in his possession shall insure that dissemination of such classified matter is on the
“need-to-know” basis and to properly cleared persons only.
Matter
In Document and Information Security, it includes everything, regardless of its physical character, or in which
information is recorded or embodied.
A general term referring to documents, equipment, projects, books, reports, articles, notes, letters, drawings,
drawings, sketches, plans, photographs, recordings, machinery, models, apparatus, devices, and all other
products or substances.
For purposes of security, it is also information which is transmitted orally.
Classified
refers to assigning information by one of the four classification categories.
Security Clearance
is the certification by a responsible authority that the person described is cleared for access to classified matter
in the appropriate level.
Need-to-know
22
Insight Review Center LEA (Introduction to Industrial Security Concepts)
is the principle whereby access to classified matter may only be only given to those persons to whom it is
necessary for the fulfillment of their duties? Persons are not entitled to have access to classified matter solely by
virtue of their status or office. It is a requirement that the dissemination of classified matters be limited strictly
to persons whose official duty requires knowledge or possession thereof.
Certificate of Destruction
the certification by a witnessing officer that the classified matters describe therein has been disposed of in his
presence, approved destruction methods.
Compromise
means loss of security, which results from unauthorized persons obtaining knowledge of classified matter.
Compartmentation
the grant of access to classified matter only to properly cleared persons in the performance of their official
duties.
Declassify
the removal of security classification from classified matter.
Reclassify/Regrading
the act of changing the assigned classification of matter.
Up-grading
is the act of assigning a matter of higher classification to a classified document.
Documents Security
is that aspect of security which involves the application of security measures for the proper protection and
safeguarding of classified information.
Classification Categories
Official matter which requires protection in the interest of national security shall be limited to four categories of
classification which in descending order of importance shall carry one of the following designations:
1. TOP SECRET 3. CONFIDENTIAL
2. SECRET 4. RESTRICTED
Top Secret
Green Color Code
If any information and materials (matter), the unauthorized disclosure of it would cause exceptionally grave
damage to the nation, politically, economically and military operation.
Secret
Red Color Code
If any information and material (matter), the unauthorized disclosure of it would endanger national security,
cause serious injury to the interest or prestige of the nation or any governmental activity or advantage to a
foreign nation.
Confidential
Blue Color Code
Is any information and material (matter) the unauthorized disclosure of it, would be prejudicial to the interest
and prestige of the national or governmental activity, or would cause administrative embarrassment or
unwarranted injury to and be of advantage to a foreign country.
Restricted
White or No Color
Is any information and material (matter), which requires special protection other than that determined to be
TOP SECRET, SECRET, or CONFIDENTIAL.
1. Category A
Information which contains reportable time sensitive, order of battle and significant information.
It should be given priority because it is critical information.
It must be forwarded without delay.
It is critical to friendly operations. It requires immediate action.
2. Category B
23
Insight Review Center LEA (Introduction to Industrial Security Concepts)
Anything that contains communications, cryptographic documents should be classified as secret and requires
special handling.
Higher authorities should declassify it
3. Category C
Other information, which contains something that, could be an intelligence value.
Contains exploitable information regardless of its contents.
Unscreened materials should be categorized as Category C.
4. Category D
No value, yet lower level will classify documents as category D.
No decision must be made at the lower echelon that document has no value. It is the responsibility of the higher
Headquarters.
TRANSLATE AND CONSTRUCT THE BASIC INDUSTRIAL SECURITY CONCEPTS OF SECURITY SURVEY, SECURITY PLAN,
SECURITY TEST AND EVALUATION, PERSONNEL CHECK, TECHNICAL SURVEILLANCE, AND SECURITY MANAGEMENT
SECURITY MANAGEMENT
The Security executive is no longer a private practitioner who impresses people with his courage deeds, skill in
apprehending criminals or expertise in handling weapons. Rather he is a modern manager entwisted with the twin tasks
of Protecting corporate assets and ensuring that business interruption if at all, is kept to the minimum. In fact, his most
challenging role is to predict the opportunities for the loss of corporate assets and/or business disruptions and reduce
those opportunities to manageable - proportions in this role, he is backed by his years and years of technical expertise as
well as the seasoning and sensitivity that come with long year of exposure in the field. It is this seasoned and sensitive
application of expertise that we will try to delve with in this discussion. Particularly, as it relates to the results that the
security executive has targeted for himself and his organization.
Management Defined
It is the art of achieving results through people.
It involves two types of work:
a. Technical Work- Does work by himself
b. Management Work - Oversees or supervises the job.
SECURITY PLANNING
It is PRE-DETERMINING a course of action.
It is deciding IN ADVANCE what to do, how to do it and who is to do it.
The initial requirement in a planning process is to identify the overall objectives and purpose of the enterprise. This is
also referred to as the "MISSION STATEMENT".
FINANCING
24
Insight Review Center LEA (Introduction to Industrial Security Concepts)
Financial Forecast
• Requires knowledge of forecasting and • Budgeting
budgeting. • It is a plan stated in financial terms
• Determining future activities & costs involved.
Justification
What must be done? When must it be done?
How are we going to do it? How much will it cost?
ORGANIZATION
It is the orderly arrangement of manpower and material resources to effectively carry out their intended
purposes.
A security organization should be designed to meet company needs.
The structure should ENHANCE rather than impede the work of the department/agency.
Organizational Relationships
3 Basic Forms
1. Line Authority - Right & power to issue commands, exact accountability and discipline for violators.
2. Staff Authority - Authority over the staff but limited to support activities (like planning, recommending, advising,
assisting, etc.)
3. Functional Authority - Right to command but does not carry the right to discipline. (E.g., Fire safety procedure,
guidelines when receiving a bomb threat call.)
Organizational Principles
1. Work should be divided according to some logical plan.
2. Lines of authority & responsibility should be made as clear as possible.
3. There should be UNITY OF COMMAND.
4. Under the direct control of one supervisor (only) at any given time.
5. Limit SPAN OF CONTROL
o Highest Level-3
o Lowest Level -12
6. Delegate with commensurate authority and accountability.
7. All efforts of subordinate units and personnel must be coordinated into the HARMONIOUS achievement of the
organization's objectives.
Reporting Levels
1. As a General Rule, a Security Executive should 4. Customers they serve
NOT be less than two levels removed from the 5. Nature of business activities
Chief Executive Officer. 6. Identification of vulnerabilities
2. Factors Affecting Security Organization. 7. Location of company facilities
3. Corporate philosophy & purpose
Promotions
- key to motivation.
- "Promote from within or recruit from outside?"
Morale and Welfare
- taking care of your men
- motivate subordinates; make them function as a team
- instill pride in them as a member of the organization/company
Communication
- fast and complete
- upward, downward, horizontal & grapevine
PROGRAM IMPLEMENTATION
Top management responsibility - where it Drills and rehearsals.
should start. Validation and updating of plans.
Involvement of others. Program evaluation.
Setting priorities and meeting schedules.
26
Insight Review Center LEA (Introduction to Industrial Security Concepts)
PROBLEM SOLVING AND DECISION MAKING - Seven Steps
Clearly define the problem. Select the best practical solution.
Gather information. Implement the solution.
Interpret/analyze the information. Evaluate
Develop solutions.
SECURITY AUDIT/INSPECTION
Rationale
To check on the degree of compliance with the recommended countermeasures.
To determine the effectiveness and adequacy of the countermeasures.
Conduct of Audit - based on security survey and vulnerability assessment report. Questions to Ask:
Why are we doing it? Is there a better way?
Must we do it at all? Is there a cheaper way?
SECURITY SURVEY
1. Security Surveys are often called 'RISK ANALYSIS SURVEYS / or 'RISK ASSESSMENT SURVEYS'
2. A Security Survey is defined as the process of conducting an exhaustive physical examination of all operational
systems and procedures of a facility for the following purposes:
a. To determine existing state of security
b. Identifying weaknesses in defenses;
c. To determine the degree of protection required;
d. To produce recommendations for a total security system.
3. The survey should be undertaken by either suitably trained staff security personnel or a fully qualified independent
security specialist.
4. No universal checklist can be applied to all sites for survey purposes, as no two facilities are alike.
5. Before commencing a security survey:
a. Written authority should be obtained from the site director;
b. Previous surveys should be reviewed;
c. An orientation tour should be made;
d. Photographs should be taken of things will be difficult to describe in a report.
(Only with authority)
6. After completing the survey an immediate review of the findings should be undertaken with the plant supervisor so
that urgent deficiencies can be addressed.
7. A follow-up survey should always be conducted to ensure improvements and recommendations have been made.
8. Any survey report including lists of recommendations is incomplete without including a cost-benefit analysis, which
is; "A direct comparison of the cost of operation of the security unit and all the existing security measures with the
27
Insight Review Center LEA (Introduction to Industrial Security Concepts)
amount of the corporate assets saved or recovered as well as reduction of losses caused by injuries and lost
production."
9. No security measure should be recommended which is not cost effective.
10. Key stages in the risk assessment process are:
a. To determine the value, impact and cost of any asset should it be lost due to natural or man-made forces;
b. To determine the degree of vulnerability of the facility to damage or attach by natural or man-made forces;
and
c. To determine the degree of probability that natural or man-made forces will strike any given facility.
11. The vulnerability of a facility to damage or attack may be determined in a number of ways: (Only with authority)
a. By an inspection of the facility by an experienced inspector;
b. An examination of the facility's record of losses; and
c. Determining whether the high-value property or items are properly protected from theft by insiders.
SURVEILLANCE
Surveillance which can be conducted either covertly or overtly is the secretive and continuous process of
observing people, places or activities during the course of an investigation and the results of such surveillance can be
admitted into evidence in accordance with "rules of evidence"
It should be realized that surveillance operations are very costly. In fact, the two most expensive items in an
investigators budget are personnel and communications.
28
Insight Review Center LEA (Introduction to Industrial Security Concepts)
*Use of video surveillance without public knowledge is a difficult area and some States do not permit its use.
The most difficult type of surveillance is when the subject is on the move and there are three kinds of 'moving
surveillance':
1. Keeping the subject under observation regardless of whether you have been spotted or 'made'
2. Carrying out discreet surveillance and discontinuing as necessary to prevent being 'made' and;
3. In such a manner as to keep subject under observation at all times without being made.
Report Writing
• Use short paragraphs and sentences, simple words, be accurate, clear, ensure that confidential informants are
not identified and do not include suspicions or conclusions in the main body of the report.
• Reports are more usually in a narrative style and when reporting interviews include the name, address and any
other identifying information of the interviewee.
• There is no specific format for the taking of notes during an investigation, although, concise accurate and
chronologically ordered notes assist in both report writing and as an aide memoir giving evidence.
Written statements used in recording investigative facts are primarily of the following types:
• Affidavit
• Question/Answer Statement
• Un-sworn statement; and
• Memorandum of Interview
The need for records: There is many reasons to create and maintain accurate and timely records of the investigative
work, some are:
1. The subject of the investigation may end up in court; the private sector investigator should be prepared to
present their finding in the event of civil or criminal litigation.
2. The file can protect the investigator from charges brought by disgruntled employees or others wishing to
discredit the investigation, by being able to demonstrate, with documented evidence, that the investigative
process is, pr was properly carried out.
3. To enable the investigator to quantify their work product, aid in budget planning and rationalization.
Identification and labeling: Instituting a case file management system that aids location and maintains complete
records of the case. It is not recommended that the suspects' name appears as part of the file/label, (e.g., 01-01-
91 Theft of Product, ABC Division) Case files should be maintained in a convenient yet secure location.
It is important to protect and keep confidential the information in the file for several reasons:
29
Insight Review Center LEA (Introduction to Industrial Security Concepts)
1. Risk of losing vital and sometimes irreplaceable information. Possibility of the file being stolen, tampered with,
destroyed or otherwise compromised.
2. Ineffective security of the file could lead to improper disclosure or leakage as sensitive information; this could
lead to claims of defamation by individuals named in the file.
3. To establish a credible 'chain of custody'. A 'chain of custody 7 refers simply to a traceable record of how
evidence was stored.
Recent Developments:
DNA Profiling
1. The ability to identify a person through the DNA Profile or DNA fingerprint.
2. Samples of Hair, Blood and Semen are tested in laboratories.
Offender Profiling:
• Looking at the profile of the offender from the evidence of the act. Can for example indicate whether the
offender is organized or disorganized. It can also provide a personality assessment.
Types of Strikes:
• The "Economic Strike', is the most frequent type, it takes place when there is a vote to stop work because a
satisfactory employment agreement has not been negotiated. The strike action must be preceded by at least 60
days’ notice that the union desires to modify the existing collective bargaining agreement. A strike without the
60-day notice would be unlawful.
• The "Unfair Labor Practices Strike", takes place when workers strike to force discontinuance of an alleged
violation by an employer of the labor laws. It is a no strike and therefore does not permit effective planning by
security.
• Also, during this type of strike all striking employees who request to return to work, must be allowed to do so by
the employer.
• Any improper actions by security could result in unfair-practices charges and if proved, the striking employees
are guaranteed their jobs even if through permanent replacement have been hired.
• Because of the possibility of allegations of unfair labor practice being brought by the unions against the
company, it is important that security only engage in recording and documenting illegal activities by the union
and workers.
• Certain routine duties or the documentation and recording of legal activities could be seen as attempting to
interfere with an employee's rights during the strike period; for example, handling access control duties;
handling matters relating to the distribution of union literature on company property and background
investigations or investigation of activities of employees.
• It is recommended that background checks should not seek to obtain information concerning union activities
and undercover operations or surveillance type investigations should be avoided during intense union activity.
• Investigative reports should not include information concerning union affiliations of applicants or employee. An
employer may not reject applicants who have union history and may not discriminate against employees
because of union affiliations.
30
Insight Review Center LEA (Introduction to Industrial Security Concepts)
• Documentation of illegal activities would be useful in the following instances: to support criminal charges,
support of injunctive relief and support to defend against unfair labor practice complaints. It should be noted
that when taking statements from employees, Miranda warnings are not required among private parties.
• Before conducting any investigation, which involves clandestine searches of lockers or desks, it is good policy to
have a published rule covering the fact that lockers, desks and the like are subject to no notice search by
management.
-------END-------
DISCLAIMER:
This document does not claim any originality and cannot be used as a substitute for prescribed textbooks. The information presented here is merely a
collection by the committee members for their respective teaching assignments. Various sources as mentioned at the end of the document as well as freely available
material from internet were consulted for preparing this document. The ownership of the information lies with the respective authors or institutions.
31
Insight Review Center LEA (Introduction to Industrial Security Concepts)
32
Insight Review Center LEA (Introduction to Industrial
Security Concepts)