You are on page 1of 9

INDUSTRIAL SECURITY PNPSAG/SD – PNP Security Agency Guards/

Supervision Division – for national and


MANAGEMENT
PNP FE/SAGS – PNP Firearm and Explosives/
Security Agency Guard Services – for local

Security is defined as the means (method) of  it directs the Chief of PNP to issue rules and
defense against crime or a state of being secured or regulations concerning the implementing rules
free from hazard. As defined by RA 5487, it is the of R.A. 5487.
protection against any type of crime to safeguard life  Date of effectivity – Oct. 3, 1972 and Jan. 17,
and assets by various method and device. 1975 and amended by P. D. # 11 and 11A
 And again amended in 2003 with Title 2003
Purpose of Security – is to protect the Revised Rules and Regulations Implementing
R.A. 5487 as amended.
establishment from any form of losses as a result of
theft, robbery, pilferage, sabotage, espionage,
accident, fire and subversive activities. 3 ASPECTS OF SECURITY

1. PHYSICAL SECURITY
It is the sum total of all physical safeguards
Historical Background and Legal Basis of employed or installed to secure the assets
Industrial Security in the Philippines Ex. Safeguard employed – human guard
Safeguard installed – perimeter
Before, there is no law that controls security agencies, fence/barriers and security devices
what they need is only a permit from the city or 2. DOCUMENT AND INFORMATION
municipal mayor to hire a security guard, until RA SECURITY
5487 was created. It is the sum totals of all policies, regulations,
doctrines, practices, enforce to safeguard
R.A. 5487 – is an act that regulates or governs the the contents of any classified information or
organization and operation of the private detective, document from compromise or loss.
watchmen or security guard agencies. It is also known
as Private Security Agency Law.
3. PERSONNEL SECURITY
PADPAO – stands for the Philippine Association of It is the sum of the total procedures
Detective and Protective Agency Operators. It is a followed, inquiries conducted and criteria
non-stock private organization, and it was formed in applied, to determine the work suitably of a
May 1958. particular, an applicant or the retention or
transfer or particular employee.
PCSUSIA – Philippine Constabulary Supervisory Unit
for Security and Investigation Agencies – was formed THREE LINES OF PHYSICAL DEFENSE
as a result of the approval of R.A. 5487, which directs
 FIRST LINE OF DEFENSE
the Chief PC to issue rules and regulations
Ex. like Perimeter fences/barriers or guard at the
concerning the implementation of R.A. 5487 gate
- Later was change to PNPSOSIA- when the  SECOND LINE OF DEFENSE
Philippine Constabulary was dissolved and the Ex. like the doors, floors, windows, walls, roofs
personnel were merged to the PNP. and grills and other entries to a building.

PNPSOSIA – PNP Supervisory Office for Security  THIRD LINE OF DEFENSE


and Investigation Agencies – before it is responsible Ex. the storage system like steel cabinets,
locks, safes, vaults, and interior file rooms.
for the issuance of implementing orders regarding the
rules and regulations affecting security agencies
operation. DIFFERENT TYPES OF SECURITY
At present
1. Physical Security – is a system of barriers
placed between the potential intruder and the matter
to be protected. It is concerned with the physical
measures adopted to prevent unauthorized access
to equipment, facilities, material, and documents,
and to safeguard them against espionage, sabotage,
damage and theft. Physical measures are used to protect and monitor
2. Communication Security – is the protection property rights and objects; they consist of barriers
resulting from the application of various measures and devices that are able to detect, impede and
which prevents or delay the enemy or unauthorized deter potential security threats. These physical
person in giving information through the measures are Protective Barrier & Protective Alarm
communication system.
A. PROTECTIVE BARRIER
3. Hotel Security – is the protection resulting from
the application of various measures which BARRIER - is any structure or physical device
safeguards hotel guests and personnel, hotel capable of restricting, deterring, delaying illegal,
property, and functions in hotel restaurants, bars and access to installation
clubs.
Perimeter Barrier - is a system of protection
4. Bank Security – is the protection resulting from designed to restricted areas by unauthorized
the application of various measures which
person. It is the first line of security or defense by
safeguards cash and assets which are in storage in
establishing structural barriers fence, to protect the
transit and during transactions.
entire establishment.
5. Document Security – is physical security that
involves the protection of documents and classified PURPOSE OF POSITIVE BARRIER
papers from loss, access to unauthorized person,
damage, theft and compromised through disclosure. 1. Controlling vehicular and pedestrian
traffic flow
6. Personal and VIP Security – involve in the 2. Checking identification of personnel
protection of top ranking official the government, entering or departing
visiting persons of illustrious standing and foreign 3. Defining the buzzer zone for more highly
dignitaries. classified areas

7. Crisis Security- is the protection of the rich Types of Perimeter Barriers


person, industrial magnates, and political leaders
against kidnapping for economic, political, emotional 1. Wire fences - solid and full view (chain link,
or nationalistic purposes. barbed wire, concertina wire, barbed tape)
Chain link- for permanent structure
8. Industrial Security- various measures to Barbed wire- for semi-permanent structure
Concertina- used as temporary road block or
safeguard factories, manufacturing establishment, etc.
impediment during strikes and crowd control
2. Building walls
9. Operational Security- is physical which deals
3. Bodies of water
with the protection of processes, formulas, patents
and other activities. Inside and Outside Perimeter
10. Other special type of security- these type of Inside Perimeter – a line protection adjacent to
security are adaptations, variations, innovations and protected area and passing through points of
modifications of physical security which are follows, possible entry into the area such as doors,
to wit: windows, skylights, tunnels, or other points of
access.
 Air cargo security
 Supermarket
Outside Perimeter- a line of protection surrounding
 School Security
but somewhat removed from a protected area, such
 Personnel security- involves the
as a fence.
background check of persons
Perimeter Barrier Openings 6. SIGNS AND NOTICES – control signs should
be erected where necessary in the management
1. Gates and Doors of unauthorized ingress and preclude accidental
2. Sidewalk elevator entry. Should be visible and legible.
3. Utilities openings
4. Clear zone- the exterior and interior parallel area
near perimeter barriers of an industrial B. PROTECTIVE ALARMS
compound to afford better observation and
patrol movements Protective Alarm System- provide an electrical and
mechanical means of detecting and announcing
Other openings proximity of intrusion which endanger the security of a
A. Sewer - a system of pipes used to transport restricted area, a facility of an installation, or its
human waste. components.
B. Air and water intake
C. Exhaust tunnels Security Communication System – facilities provided for
D. Electrical and common tunnels signaling, alerting or alarming workers at any location
throughout the installation as occasion demands. These
TYPES OF PHYSICAL BARRIERS include the use of telephone and radio.

H - human – security guard TYPES OF ALARM SYSTEM


A - animals – dogs, geese, etc.
N - natural- geographical feature like mountain, 1. Metallic foil of wire- using electrically charge
forest, water or cliffs, or any other strips of tinfoil or wire placed in window and
terrain that is difficult to glass surfaces.
overcome 2. Photo electric or electric eye device – light
E - energy- electronic device (alarm system) beam is connected by a wire to a control
S - structural- man made obstacles (fences, station and it activates the alarm when
walls, grilles, doors, roadblock or screens intruder crosses the beam.
3. Audio Detection Device – supersensitive
microphone speaker sensor are installed in
walls, ceilings, and floors of the protected area
The purpose of protective barrier in safeguarding the
of any sound caused by, attempted force
areas, building and the proper utilization of lighting at entry is detected by the sensor.
night has contributed to modern man’s attempt to 4. Vibration Detection Device – any attempted
discourage intruder, pilferer, and other entrants devious force entry is detected by vibration-sensitive
intent, sensor attached to walls, ceilings, or floors of
the protected areas.
5. Microwave Motion Detective Device- radio
ADDITIONAL PROTECTIVE BARRIERS waves that is transmitted and reflected back
into an antenna, and if they strike a moving
1. TOP GUARD –is an additional overhang of object it initiates alarm signal.
barbed wire placed on vertical perimeter fences 6. Ultrasonic Motion Detection Device - it
facing upward and outward w/ a 45 degree
consist of transceiver, amplifier and control
angle with 3 to 4 strands barbed wires
unit, if any motion w/in protected area cause an
2. GUARD CONTROL STATIONS – this is
activation of alarm signal.
normally provided at main perimeter entrance to
secure areas located out of doors, and manned OTHER TYPES OF PROTECTIVE ALARM (BANK
by guard on a full-time basis. ALARMS)

3. TOWERS – guard tower are house like 1. Foot Rail Activator – is place on the floor in
structures above the perimeter barriers. such a position that tellers may activate the
alarm by placing the front to engage the
4. BARRIER MAINTENANCE- fencing barrier and activation bar.
protective walls should be regularly inspected by 2. Bill Traps – or currency activation devices are
security. usually place in the teller’s top cash drawer and
connected to the alarm system using a wire
5. PROTECTION IN DEPTH – when fencing or connector.
walling is impracticable and expensive, warning
signs should conspicuously placed.
3. Knee or thigh buttons – are installed inside the long, horizontal strips to protect the
desk or teller station so they can be activated approaches to the perimeter barrier.
knee or thigh pressure. 4. Street lights – are widely used in parking
4. Foot Button – like the foot rails it permits alarm areas
activation in relatively safety while both hands
remain clear in view of the robbers.
5. Double squeeze button- required pressure on Areas to be lighted:
both side of the device and therefore the
probability of accidental alarm is reduced. 1. Vehicular gate
2. Pedestrian gate
3. Thoroughfare- a road or path forming a
B. PROTECTIVE LIGHTING route between two places
4. Parking area
It is used to increase the effectiveness of the guard 5. Sensitive areas- storage depots, power and
by increasing the guard’s visual range during the light distribution systems
hours of darkness or in location where natural
lighting does not reach or is insufficient to
provide the desired visibility. C. PROTECTIVE LOCKS AND KEYS

Different factors that to be considered in What is lock? – It is a mechanical, electrical,


protective lighting hydraulic, or electronic device designed to prevent the
removal of items without the consent of the owner.
 Size, shape and location
 Kind of product-variable, critical or KINDS OF LOCK
plenty of loses
 Protective advantage 1. Warded lock- old type where the key is open
 Management policy-for security and be seen through
consciousness
2. Disc tumbler lock- used in car doors, desk,
drawers, etc.

PURPOSE OF PROTECTIVE LIGHTING 3. Padlock- a pad and a lock combination.

1. Provides sufficient illumination


2. Lighting can help improve visibility so that
intruder can be seen and identified and if 4. Lever lock- used in locker and safe deposit
possible, apprehended. boxes.
3. Lighting gives psychological fear that serve as a
deterrent to thieves, pilferer, trespassers and 5. Pin tumbler lock –widely used in doors of
saboteurs. offices and houses irregular in shape and the
key.
Types of lighting system: 6. Combination lock- has 3 deals which must be
aligned in proper order before the lock will be
1. Continuous- non-stop open.
2. Stand by- operated manual by security guard or 7. Code-operated lock- this opens by pressing a
operated by an alarm system series of numbers buttons in proper sequence.
3. Movable- search light 8. Electromagnetic Locks – are devices holding
4. Emergency- use in case of emergency a door closed by magnetism.

Types of lighting equipment:


THE PURPOSE OF KEY CONTROL
1. Floodlights – for illuminating boundaries, • To control the issue, use and storage of keys
building or fences. and reserve key locks.
2. Searchlights- are incandescent lamps used
• To control reproduction of duplicate keys.
to pinpoint potential trouble spots.
• To control locks rotation and or replacement.
3. Fresnel lights – are wide beam units,
• To maintain record on all of the above.
primary used to extend the illumination in
• To ensures proper supervisions of key control
measures by responsible person
Methods used by the Agents of Espionage

D. PROTECTIVE CABINET  Stealing or buying information from the


employees.
Types of Security Cabinet  By using various forms of threats or extorting
information’s.
1. SAFE – a metallic container used for the
safekeeping of documents or small items in an  By means of blackmail.
office or installation.  Obtaining or gaining information from social
gathering.
2. VAULT – it is a heavily constructed and burglar
container usually a part of a building structure used  By the use of fake organization as a front.
to keep and protect cash, documents and  Stealing records or documents.
negotiable instruments.
 By means of subversive activities.
3. FILE ROOM - a cubicle in a building constructed
a little lighter than a vault but of bigger size to Subversive activities- are dealing with the
accommodate limited people to work on the records weakness of a person.
inside. Parts of Subversive activities:
………………………………………………………  Rumor mongering
…………………………………….........................
 Propaganda
SECURITY HAZARDS  Legal Action

Security Hazard- is any act or condition, which  Arm threats – used of force
may result in the compromise of information, loss of  Murder, Kidnapping, corruption of a certain
life, loss or destruction of property, or disruption of employee or employees
the objectives of the installations.
Sabotage – is an act of destroying, damaging or
Types of security hazards any evil motives that will lead to stoppage of the
normal operation of the company, factory, plant and
 Natural Hazards- types of hazard, which the or establishment. It comes from French word
mere cause is the natural phenomenon. Sabot– that means Wooden Slipper.

Ex. Storm, earthquake, typhoons, floods, Saboteur – is the agent of sabotage.


fire, lightning etc.
3 types of Saboteur
 Human/Manmade Hazards - These are
actually the act of omission or commission  Enemy agent
both overt/covert by an individual or by  Traitorous person
group of an individual.  Irresponsible person
Types of Sabotage
Ex. Espionage and sabotage-because of
the state of mind of an individual  Mechanical Sabotage - is an act wherein
they used the object or substance within the
Espionage- an act of gathering information. From area of an establishment.
the French word- “ESPION” that means spy.
 Economic sabotage - activities of the
Spy – is the agent of Espionage. They are very business establishment against the
dangerous because of their skill in deception and government
undercover works.
Types of mechanical sabotage
 Contamination – is a type where they used  Fraud- losing- by burning the property they
foreign materials to apply in the can recover from losing.
establishment.  Revenge/Spite
 Breakage – destroying the vital parts of a  Pyromaniac- a person who is fond of
machine. looking fire
 Substitution – Substitution or changing of
formula to another, which will cause Fire is classified according to their classes:
damage or destructions.
 Omission – this is committed by means of 1. Class A Fire - are those disposed by ordinary
a doing by an individual, which can cause combustible material (ex. Wood, paper, plastic)
destruction inside of the company or - Fire extinguisher used is water.
establishment.
2. Class B Fire - is disposed or composed of petroleum
 Abrasive – a special type of contamination, product. (Flammable or combustible liquids, ex.
by using a type of material that will grind gasoline)
metals. - CO2 fire extinguisher is used w/c it
 Explosives – substances that are easily serves as blanket to burning material.
exploded by means of heat, friction, jarring 3. Class C Fire - is disposed or composed of electrical
or sparks. They are highly dangerous energy or from electricity related fire (ex. Electrical
because of its damaging effect. appliances)
-Fire extinguisher used is dry chemicals
and carbon dioxide
4. Class D Fire – composed or disposed by combustible
metals (ex. magnesium, potassium, titanium,
TYPES OF EXPLOSIVES (as to sensitivity) and zirconium)
-Fire extinguisher used is Dry powder
 Low Intensity Explosives – It is very and dry sand.
sensitive to heat. It can be exploded by
means of fire, friction or spark. Examples
RIOT - refers to the unlawful assembly that resulted
are black powder and smokeless powder
to violent disturbance of peace.
 High Intensity Explosives – is detonated by
Causes of riot:
means of shock, jarring or shake.  Panic
 Strike
TYPES OF HIGH INTENSITY EXPLOSIVES  Mob- a promiscuous multitude of
people, rude and disorderly.
Molotov bomb – also known as Poor man’s bomb
or Petrol bomb Types of mobs:
Dynamite - usually used in illegal fishing and 1. Aggressive mob
mining 2. Escape mob
Trinotroulene - popular in the military 3. Acquisitive mob
4. Expressive mob

“Fire can be a natural or a man-made hazard.” PILFERAGE- means Petty theft. It is one of the
most annoying and common human hazard.
Causes of fire:
TYPES OF PILFERAGE:
 Flame a) Casual pilferage- one who steal due to
 Gas or Electricity inability to resist the unexpected opportunity
 Chemicals or has little fear that there is detection
 Heat of the sun b) for souvenir
 Spark c) for economic gain
d) Systematic pilferage – one who steal with
Arson – is the malicious burning of one’s property. preconceived plan and take away things for
all types of goods, supplies or merchandise.
Some Objectives of Arson are:
Methods used in Systematic SECURITY PERSONNEL
Pilferage:
 Classic method TYPES OF GUARD FORCES/SECURITY GUARD
 Uses fake documents
 Removal of items ◦ Company guard- proprietary or in house
security, and they are directly under
 Disposal of the same
the payroll of the company
SHOPLIFTING- is a popular term used for theft of ◦ Security Agency guard- they are hired by
goods from a retail establishment. Shoplifting is an agency, and they are paid by
typically undertaken by amateurs, and involves contract
concealing an item and leaving the store without
QUALIFICATIONS FOR: ◦ Government Guard Forces- they are
SECURITY SECURITY SECURITY considered as government
PERSONNEL GUARD OFFICER employees and paid by the
government
- must a Filipino -must be a -must be a Security Guard Forces- maybe define as a group
citizen Filipino citizen Filipino citizen
- not less 18 years -at least High - holder of a of forces of men selected, trained and organized
of age School Baccalaureate into a functional group for the purpose of protecting
- must have taken a graduate Degree operational processes from those disruptions which
private security - must be - Physically and
impede efficiency or halt operations at a particular
course/seminar/ mentally mentally fit
and must have sound and - has graduated plant, facility, institution or special activity.
adequate training physically from a security
or experience in fit officer training The Essential Qualities of Security Guards:
security business or - must be not course
rendering less than ◦ Alertness
security/detective 18 years of ◦ Judgment
services age nor
- of good moral more than ◦ Confidence
character and must 50 y.o. ◦ Physical Fitness
not have been ◦ Self-control
convicted of any
crime
- must be physically
and mentally fit Different entries that are need to be controlled
paying for it. by the Security Guards

THEFT- is committed by any person who with intent ◦ Restricted area- is an area access to which is
to gain but without violence against or intimidation of subject to special restriction to the flow of
neither persons nor force upon things shall take pedestrian or vehicular traffic to safeguard
personal property of another without the latter’s property or material.
consent. ◦ Limited area- a restricted area containing a
security interest or other matter in which
Simple theft- without violation of trust and confidence uncontrolled movement will permit access to
such security interest or matter; but within
Qualified Theft – taking the property of another with which and controlled.
violation of trust and confidence;
◦ Exclusive area- a restricted area containing a
security interest or matter, which is of such
Example: maid, houseboy, salesgirl, or
nature or of such vital importance that access
employees or any person that the victim has trusted. to the area of proximity resulting from access
to the area, constitutes access to the security
KLEPTOMANIAC – The person who is fond of getting interest or matter.
the property of other people. There is satisfaction
on the part of the person committing a crime

SECURITY PLANNING
Security Planning- is a corporate and executive  To determine the degree of probability that
responsibility. It is a decision-making process that natural or man-made forces will strike at any
involves knowing the objectives of security and the given facility.
means and methods to reach those objectives or
goals must then be evolved.
INFORMATION NECESSARY IN CONDUCTING A
CONTENTS OF SECURITY PLANNING SURVEY

 The situation- this part of security planning  A plot plan of the area to be surveyed
 A map of the city or locality in which the facility is
explains the historical background of the
located, this becomes very important if the
organization of its security picture
facility consist of more than one location.
 The mission (Purpose, Goals, Objectives) -
 The number of employees working on each shift
this part of security will cover what the plan is
by category
all about and what it intends to do, This  The operational flow plans of the facility if they
mission is further subdivided into: are available in writing
 Execution- this part of security plan will  Maps and description of guard tours and
explains and outline the concept of the stations if available
security project  Guard orders and the facility’s security manuals
 Administrative and Logistics- This part of the if there are such
security plan involves listing of security  Locations of the nearest fire department and
equipment police headquarters
 Command and signal- this last portion of the
security plan pertains to the channel of SECURITY INSPECTION- is a process of
communication needed, when implementing conducting physical examination to determine
to the project until in full view. compliance with established security policies and
procedures as a result of a security survey.

SECURITY SURVEY
SURVEY REPORTS – itemizes the condition which
Security Survey- is the process of conducting an are conducive to breaches of security, records the
exhaustive physical examination and thorough preventive measures currently in effect and when
inspection of all operational systems and required--- makes specific practical and reasonable
procedures of a facility. It is also known as risk recommendations to bring the physical security to
analysis or risk assessment. the desired standard.

Purposes of Security Survey


THE FOLLOWING AREAS NEEDS TO BE
 To determine existing state of INSPECTED, TO DETERMINE THE DEGREE OF
security PROTECTION TO BE APPLIED IN THE
ESTABLISHMENT
 To locate weaknesses in defenses
 To determine degree of protection  Perimeter
required.  Building Security
 To produce recommendations,  Key Control
establishing a total security program  Protective lighting
 Communication and alarm system
Persons responsible to conduct security survey
 Staff security personnel  Personnel identification and control
 Qualified security specialist  Vehicular identification and control
 Safety for personnel
KEY STEP IN A RISK ASSESSMENT PROCESS  Adequacy of existing guard forces

 To determine value, impact and cost of any


Control of authorized entry
asset should it be lost due to natural or
man-made forces. • Screening of personnel
• Identification of personnel duty to carry out
• Identification of visitors their assigned
duties.
• Control of truck/vehicle
• Control of packages
• Container control Advantages of a company Disadvantages of
Guard Forces Company Guard
Forces
 Generally higher
caliber as they can  It costs more
COMPARISON BETWEEN SECURITY SURVEY AND receive higher  Maybe required to
SECURITY INSPECTION wage join guard force
 Generally they Problem of
Security Survey Security Inspection provide better ensuring
 Defensive type services availability of
process/service  Defensive type  Can be trained to back-up person
 Detailed study of service handle of the more
the existing security  Limited check of complex security
measures the security duties
 Conducted to measures already  Less turn-over
determine the level adopted  Are more familiar
of security required  Conducted to with facilities they
consistent with the determine the protect
mission degree of  Tend to be more
 Broader in scope compliance with loyal to the
 Non-recurring type directed security company
of service measures
 Limited in scope
 Recurring type of
service

Advantages of an Agency Disadvantages of


Guard Services Agency Guard
Services
 More economical
 Security  Lack of training marymelmargimolatanteves
administrative  Low caliber
problems are employees
reduced  No company
 Problems related to loyalty
recruiting, pre-  Project poor
employment image
investigation and  Large turn-over
training are  Not familiar with
eliminated plans
 Absenteeism and
vacation leaves are
eliminated
 Security personnel
are separated from
co-employees
 Incase of
emergencies, extra
guards are easily
available
 In case of company
strike, the agency
guards will be on

You might also like