You are on page 1of 54

INTRODUCTION TO 

INDUSTRIAL SECURITY 

Origin of Security

Why do we need security?


Origin of security is as old as man himself. From the moment of creation up till
today, humans have biologically sought security. 

As the great psychologist Abraham Maslow identified security and safety as one


of the fundamental needs of humans. 

From earliest known evidence, security became necessary for human existence. 


This is due partially to the relationship between population and resources.
The development of early communities, the accumulation of wealth, and the
improvement of local agricultural lands made existence precarious from outside attack by
those who coveted such assets and resources. 
The fear of attacks led to the evolution of defensive means to protect the community.

1. Security by its own definition is the state of being free from danger or threat. 

2. A concept that is feel sometimes forgotten in the hustle and bustle of daily life in this
modern world.

3. We can go back in time to see early examples in the Ancient Egyptian Pharaohs who hired
private security guards for personal protection. 

4. Or to Ancient Rome where emperors had security guards for personal, family and property
security.

Safety and Security


Security is freedom from, or resilience against, potential harm caused by others.

Safety is the state of being "safe", the condition of being protected from harm or other


non-desirable outcomes.

Theories of Security and Safety

Risk theory is a widely used scientific discipline, based on the identification of a threat,


the specification of risk and the specification of how to overcome the risk. 
The Philosophical Concepts of Security and Safety

The direct etymological antecedent of ‘security’ is the Latin securitas: which


literally translates as “freedom from care” (from the phrase sine cura: without care) (Oxford
Latin Dictionary, 1982). 

LESSON 2 
Concepts of Security in General Scope

What is Security?

Security - is generally agreed to be about feeling of being safe from harm, fear, anxiety,
oppression, danger, poverty, defense, protection and preservation of core values and threat to
those values.

Security- has to do with freedom from danger or threats to a nation's ability to protect and
develop itself, promote its cherished values and legitimate interest and enhance the well-being
of its people. 

Necessity of Security

Security measures are inevitable or necessary for the attainment of the goals and


objectives of a certain individual, group or organization. 

 It is implied that when and individual or organization is exposed to hazards,


the productivity is adversely affected. 
Threat

 A threat is a communicated intent to inflict harm or loss on another person. 

 A threat is considered an act of coercion.


Internal threats – include but not limited to communist aggressions, the Muslim separatists
and the extreme rightists such as the military takeover of the government; the restless mass
actions like demonstrations and protests by civil organizations. 

External threats – this include the country’s capacity to defend itself in case of war. 

Hazards 
The term hazards refer to conditions that may cause damage to property, injury, or loss of
life. 

The concept also includes as the exposure to the chance of loss or injury. 

The relevance of security is to prevent or stop hazardous conditions causing intentional


or unintentional damage to property, injury or loss of life. 

Risk

Risk is ’the possibility of loss, injury, disadvantage, or destruction’ In more specialized literature
’risk’ is also used as a measure of bad outcome. 

We can measure the chance (probability) of the bad (negative) outcome, its negativity
(severity), or a combination of both.

 Risk is the possibility of an unfavorable event.

Accident

Accident, unexpected event, typically sudden in nature and associated with injury, loss, or
harm. 

Accidents are a common feature of the human experience and result in injury or permanent


disability to large numbers of people worldwide every year.
 Many accidents also involve damage to or loss of property. 
Accidents can occur anywhere, including in the home, during transportation, in the hospital, on
the sports field, or in the workplace. 

LESSON 3

Evolution and fundamentals of Industrial Security

Evolution and historical perspective of Industrial Security

 In the Christian era or after the birth of Christ, the watchman, forerunner


of the security guard was known in the Old Testament. 

During the time that countries were governed by royal families, military


bodyguards or guardsmen picked from the elite troops from the
household serving with the royal families.

The known and famous of these troops were the Praetorian Guards of


Ancient Rome and the Mameluks of Egypt. 

The only remaining guardsmen of today are the Swiss guards in Vatican of


Rome.

Philippine Settings

 The brief history of the security industry evolution in the Philippines can be traced back
in the year 1950, the late Dr. Jose B. Maniwang PhD, Registered Criminologist and well
known as the “Father of Philippine Security” first established, as a single proprietor,
a private security agency the National Intelligence and Security Service, a business he
thought of after World War II, being a war veteran under the USAFFE and as the
country recovers and various businesses grew. 
 In 1958, Philippine Association of Detective and Protective Agency Operators, Inc.
(group of private security agencies) or PADPAO was formally organized. 
 In June 13, 1969, Pres. Ferdinand E. Marcos signed into law the Republic Act
5487 otherwise known as the Private Security Agency Law. 
 The Law or the Act is to regulate the organization and operation of private
detective, watchmen or security guard agencies.
 Under the law, it assigned the Philippine Constabulary as the implementing
government agency and to supervise the organization and operations of the private
security agencies. 

 The Philippine Constabulary created in August 4, 1969 an office known as


the Philippine Constabulary Security and Investigation Agency Supervisory
Office (PCSIASO), but later changed to PCSOSIA.
  On June 29, 1970, PCSOSIA was changed to Philippine Constabulary Supervisory Unit
for Security and Investigation Agencies or PCSUSIA. 
 Then, the private security supervision was transferred from PCSUSIA to
the National Intelligence and Security Agency (NISA) now the National Intelligence
Coordinating Agency or NICA, but this was again back to the Philippine Constabulary. 

 In January 1, 1990, the Philippine National Police was created pursuant to Republic Act


6975 and PCSUSIA became the Philippine National Police Supervisory Office for
Security and Investigation Agencies or PNPSOSIA.

 January 1995 PNPSOSIA was renamed to PNPSAGSD or Philippine National Police


Security Agencies and Guards Supervision Division, however this was again changed
back to PNPSOSIA. 

 Under the Act, the following membership; that no license shall be granted to


any private security agency unless it has a minimum of two hundred licensed private
security guards under its employ nor to any company guard force unless it has
a minimum of thirty company guards: 

 Another institution that requires a license to operate is the private security


training institutions which business operation is to train the security personnel before
acquiring the required license. 
The Role of the Philippine National Police to the industrial security operations and vice versa

 It is a fact that the industrial security played a big role in the economic development in


the Philippines. 

 The primary objective of the industrial security operations is to provide protection of


life and property. 

With this, the role of the Philippine National Police is to supervise the


organization and operations of the industrial security through the Supervisory Office for
Security and Investigation Agencies, as the main PNP office directly tasked to implement
RA 5487. 

The role of the private security industry is to assist the law enforcement


agencies to protect life and property within the assigned jurisdiction.

LESSON 4
CONSTITUTIONAL AND LEGAL BASIS OF INDUSTRIAL SECURITY IN THE PHILIPPINES

Natural Basis

 The law of self-preservation being the highest self-made and natural basis. This is by instinct
and natural reactions of the man in order to protect himself, his family, his honor, freedom,
libertyand property from danger, and threat or hazard. 

Constitutional Basis

 In Article II, Section 4 of the 19867 Philippine Constitution provides that; “The prime duty of
the government is to serve and protect the people. The government may call upon the people
to defend the state, and the fulfillment thereof, all citizens may be required under
conditions provided by law, or to render personal military service.” 

 In Article III Section 1 of the Constitution provides that; “No person shall be deprived of life,
liberty or property without due process of law, nor shall any person be denied the equal
protection of the law.
 Article III Section 9, that; “Private property shall not be taken for public use without
just compensation.

 Article III Section 2, that; “The right of the people to be secured in their persons, houses, papers,
and effects against unreasonable searches and seizure of whatever nature and for any purpose
shall e inviolable, and no search warrant or warrant of arrest shall be issued except upon
examination under oath or affirmation of the complainant and the witnesses he may produce,
and the persons or things to be seized.

Statutory Basis

 The Revised Penal Code Act No. 3815 as Amended


 Republic Act 5487 otherwise known as the Private Security Agency Law.

LESSON V  

The basic concepts of industrial security management                 

 Industry – denotes earnest or constant application to work or business, it also be


termed as a special branch of productive work, or the capital or workers employed
in it.
 Industrial – defined as pertaining or engaged in industry; the term may also be
referred to or used in or created by industry and of industry’s workforce involving
industrial workers.
 Security – as previously defined, the term referred as the state or quality of
being secured, the freedom of being away from fear, danger, assurance, or
certainty

 Industrial security -  is a concept that refers to a series of security activities that


protect resources and minimize risk and loss to prevent leakage of key
technologies and confidential information at the enterprise level, and affect national
problems as well.

 Management – is a process of planning, decision making, organizing, leading,


motivation and controlling the human resources, financial, physical, and
information resources of an organization to reach its goals efficiently
and effectively.
 Industrial Security Management - emphasizes the general security techniques
and the ethical responsibilities of those involved. 

 Personnel - the people who are employed by a company or organization


and skilled/qualified/trained personnel knowing how to handle difficult situations 

 Security personnel - means the personnel directly engaged or employed by the


Contractors for the performance of the Security Services on board the Vessel, for
avoidance of doubt excluding Local Security Personnel.

 Private security personnel - perform functions similar to public law enforcement
officers, they generally have no more formal authority than an average citizen. 

Relativity of Safety and Security

 Safety: The state of being away from hazards caused by natural forces or


human errors randomly. The source of hazard is formed by natural forces
and/or human errors.       
                     
 Security: The state of being away from hazards caused by deliberate intention of
human to cause harm.
IT FIELDS 
LESSON VI 
Classifications of security
Fields of Security 

 Computing Security – is a branch of information security applied to both


theoretical and actual computer systems.

Data Security - is the means of ensuring that data is kept safe from corruption

and that access to it is suitably controlled. Thus data security helps to ensure
privacy.
 Application Security – encompasses measures taken to prevent exceptions in
the security policy of an application or the underlying system through flaws in the
design, development, or deployment of the application.
 Information Security – means protecting information and information systems
from unauthorized access, use, disclosure, disruption, modification
or destruction.
 Network Security – consists of the provisions made in an underlying computer
network infrastructure, policies adopted by the network administrator to protect
the network and the network-accessible resources from unauthorized access and
the effectiveness (or lack) of these measures combined together.

PHYSICAL SECURITY

Physical Security – describes measures that prevent or deter attackers from


accessing a facility, resource, or information stored on physical media. 

It can be as simple as a locked door or as elaborated as multiple layers of armed


guard posts.

 Shopping Center Security (Mall or Supermarket) – a type of security which is


concern with the protection of the stores, warehouses, storage, its
immediate premises and properties as well as the supermarket personnel and
customers. Security personnel are trained to detect “shoplifter”, robbery, and
bomb detection and customer relation.
 Airport Security – refers to the techniques and methods used in protecting
airports and by extension aircraft from crime and terrorism.
 Home Security – are those methods use of protecting residential homes or town
sites which include the interior protection of houses against property losses or
damages.

MONETARY FIELD

Financial Security – refers to the methods applied for the protection of fungible,


negotiable instrument representing financial value. It broadly categorized into debt
securities, such as banknotes, bonds and debentures, and equity securities, etc.

COMMUNICATION SECURITY

 Communications security (COMSEC) is the prevention of unauthorized


access to telecommunications traffic, or to any written information that is
transmitted or transferred.
There are several COMSEC disciplines, including:

 Cryptographic security - encrypts data and renders it unreadable until the data


is decrypted.

 Emission Security - prevents the release or capture of equipment emanations


to prevent information from unauthorized interception.
 Physical security - ensures the safety of, and prevents unauthorized access to,
a network’s cryptographic information, documents and equipment.
 Transmission security - protects unauthorized access when data is physically
transferred to prevent issues such as service interruption. (Cole, 2014)

TYPES OF SECURITY

 Industrial Security – a type of security applied to business groups in industries


like manufacturing, assembling, research and development, processing,
warehousing and even agriculture.
 Hotel Security - protects hotel guests, employees, and property. Hotel
security typically works directly on the hotel property, patrolling the grounds, and
in an office, monitoring security cameras or filling out paperwork.

 Bank Security - – this type of security is concern with bank operations. Its main
objective is the protection of bank cash and assets, its personnel and clientele.
Security personnel are trained to safeguard bank and assets while in storage,
in transit and during transactions.

 VIP Security – a type of security applied for the protection of top-ranking officials


of the government or private entity, visiting persons of illustrious standing and
foreign dignitaries.
 Document security - cover measures that are designed to protect access and
discourage improper use of documents. Security measures which are typically
used are:
 Password protection 
 Watermarking
 Document expiry, self-destruct and restriction of access
 Digital Rights Management: Restricting copy, print or forwarding 
 Document tracking of who has viewed
 Personal Security – aims to protect people from physical violence, domestic
abuse, predatory adults or from any harm, kidnap, and other acts. The concept of
personal security involves protection from personal harm rather than protection
from an invasion of privacy.

 Operational security (OPSEC) -  is a security and risk management process


that prevents sensitive information from getting into the wrong hands. Another
OPSEC meaning is a counter measure that identifies seemingly innocuous
actions that could inadvertently reveal critical or sensitive data to a cyber-
criminal. 

Air cargo security – the measures aim to protect cargo from theft, but they also
secure cargo against incoming materials such as bombs or drugs. 

  Personnel security -  means the part of security concerned with procedures


designed to assess procedures which have been laid
down for screening candidacies whether an individual can, taking into account his
loyalty, trustworthiness and reliability, be authorized to have initial and continued
access to classified information and controlled areas without constituting an
unacceptable risk to security;

MAJOR DIVISIONS OF INDUSTRIAL SECURITY


The industrial security primary objective is providing security and protection to
any residential, individual and business enterprises which measures are
based on the following major security factors
Physical
Security

Document
Peronnel and
 Security Information
Security​
INDUSTRIAL SECURITY MANAGEMENT
  Introduction to Industrial Security
 Physical Security

 Personnel Security

 Documentation and Information Security

 Risk Analysis and Security Hazard

 Security Survey, Inspection and Investigation

 RA 5487

Introduction to Industrial Security
 Security, in its semantic and philosophical
sense, implies a stable, relatively
predictable environment in which an individual or
group may purpose its ends without disruption or
harm, and without fear of such disturbance or injury.
The concept of security in an organizational sense, as a
means by which this safety and stability can be
achieved, has evolved gradually throughout the history
of Western civilization, shaped by wide variety of
institutional and cultural patterns.
 In examining the origins and development of security,
it is both obvious and instructive to observe that
security holds a mirror up, not to nature, but to
society and its institutions. Thus, the practice of
utilizing workers and equipment to protect people and
property is age- old. In addition to being concerned
about their own safely, people have wanted, to
protect their belongings and the lives of others
important to them. The types of security measures
that people have taken over the ages appear
to reflect both the resources that were available and
the nature of the dangers that were present during
each period. 

LEGAL BASES OF
INDUSTRIAL SECURITY IN THE
PHILIPPINES
 Natural Authority.
 Constitutional Authority
 Statutory Authority
TYPES OF SECURITY

Physical Security 
 Part of security concerned with the physical

measures designed to safeguard personnel to


prevent unauthorized access to equipment,
facilities, materials, documents, and to protect
them from espionage, sabotage, damage or theft

Industrial Security
 A form of physical security involving industrial

plants and business enterprises. This involves the


safeguarding of personnel, processes, properties
and operation. 

V.I.P Security
 Involves the protection of top-ranking officials of

the government, visiting persons of illustrious


standing and foreign dignitaries

Document Security  
 Protection of documents, classified papers and

vital records from loss, access to unauthorized


persons, damage, theft and compromise through
proper storage and procedures.
 
Three Line of Physical Defense 

 First line of Defense


  Example: 

 Like perimeter fences/ barriers or guard at

the gate

  Second line of Defense


 Example : 

 Like the doors, floors, windows, walls, roofs,

and grills and other entries to a building.

   Third line of Defense


   Example:

 The storage system like steel cabinets,

lacks, safes, vaults and interior file rooms.


PHYSICAL SECURITY

 Physical measures are used to define, protect, and


monitor properly rights and objects; they consist of
barriers and devices that are able to detect, impede,
and deter potential security threats. Physical security
measures also help to combat the crime-related threats
that both employees and outsiders pose to
the organization (for example, robbery,
burglary, arson, assault, rape, theft of services,
and automobile theft and vandalism). 

Principles of Physical Security 

  The type of access necessary will defend


upon a number of variable factors & 
therefore may be achieve in a number of
ways.
 There is no impenetrable barrier.

 Defense is depth- barriers after barrier.

 Delay provided against surreptitious and

non- surreptitious entry.
 Each installation is different.
Define Barrier
Any structure or physical device capable
of restricting, deterring delaying
illegal access to an installation

Types of Perimeter Barriers


 SOLID FENCE- deny visual access
 Wire Fences- permits visual access
Wire fencing can be barbed wire,
chain link or concertina. Chain link are
for permanent structure, barbed wire is
for semi-permanent, and concertina for
the least permanent, and also can be
used as a temporary road block or
impediment during strikes and crowd
control. 
Specification regulating the use
of Chain- link fences: 

 Must be constructed of 7 foot


material excluding the top guard.
 Must be of 9 gauges or heavier.
 Meshes opening are not being larger
than 2 inches per aide.

Specification regarding the use


of Barbed Wire fences
 1. Standard barbed wire is twisted
double strand, 12 gauge wire, with 4      
    point barb spaced an equal distant part
2. Barbed wire fencing should not be less than 7
feet high, excluding the top   
    guard
3. Barbed wire fencing must be firmly affixed to
post not  more than 6 feet   
Specification regarding the use
of Concertina Wire fences:

  1. Standard concertina barbed is a commercial


manufactured wire coil of high-    strength- steel
barbed wire clipped together at intervals to form
a cylinder.
  2. Opened concertina wire is 5 feet long and 3
feet in high.

Types of Physical Barriers

 1. Natural
 2. Structural 
 3. Human 
 4. Animal 
 5. Energy 
 PROTECTIVE LIGHTING
depending the nature of the facility,
protective lighting will designed either to
emphasize the illumination of the perimeter
barrier and the outside approaches to it, or to
concentrate on the area and the building within
the perimeter. In either case it must produce
sufficient light to create a psychological deterrent
to intrusion as well as to make detection virtually
certain in the event an entry is made. It must
avoid glare that would reduce the visibility or
security personnel, while creating glare to detect
intruder

Types of Protection Lighting  

Stationary Luminary  
This is common type consisting of series
of fixed luminaries to flood given area
continuously overlap. 

Glare- projection Type


 The intensity is focused to the
intruder while the observer or guard
remained in the comparative
darkness.
Controlled Lighting 
 The lighting is focused on the pile of
items, rather than the background. 

Standby Lighting 
This system is similar to
continuous lighting but us turn on
manually or by special device or other
automatic means.
 Movable Lighting  
This consists of stationary or
portable, manually operated search-
lights. 

Emergency Lighting 
This type may duplicative of
existing system. This a standby which
can be utilized in the event of electric
failure, either due to local
equipment or commercial power
failure.

 Types of Light Lamp

Incandescent Lamp
These are common lights bulbs of the found
in the home. They have the advantage of
providing instant illumination when the switch is
thrown and are thus the most commonly used
protective lighting system.

Gaseous- discharge Lamp


The use of gaseous, discharge lamps
in protective lighting is somewhat limited, since
they require a period of from two to five minutes
to light when they are cold and even longer
period to light, when hot, after a power
interruption, it is very economical to use but for
industrial security it is not acceptable due to
long time in the lighting in case it is turn
off accident or low voltage or brown-out.

Types of Gaseous- discharge Lamps 

 Mercury – Vapor Lamps
 These lamps give a blue- green color light

due to the presence of mercury vapor

 Sodium- Vapor Lamps
 These lamps emits yellow light. It is an
efficient bulb and due to its color, these light
lamps are used also in areas where
insect predominate.

  Quarts Lamp 
 These lamps emit a very bright white light

and snap on almost as rapidly as the


incandescent lamp. 

Types of Lighting Equipment 

 Floodlights 
 These lights project light in a concentrated

beam. They are appropriate to use in


instances which call for illumination of
boundaries, building or fences.

 Searchlights
 These are highly focused incandescent

lamps used to pinpoint potential trouble


spots.
Fresnel Lights
These are wide beam units, primary
used to extend the illumination in long,
Horizontal strips to protect the approaches to
the perimeter barrier. Fresnel project a
narrow, horizontal beam which is
approximately 180 degrees in the horizontal
and from 15 to 30 degrees in the vertical
plane.

Street Lights  
These produce diffused light rather
than direction beam. They are widely used in
parking areas.

PROTECTIVE ALARMS 
Another safeguard used to assist security
to complement if not supplement physical
barriers is an array of alarms. These alarms
of various types and cost can be installed
indoors or outdoors. Basically, alarms system
is designed to alert security or compound. 

What is protective alarm?


Device and contrivance installed inside and
outside a facility to compliment and provide
additional security measures and operates to
advertise entry into sensitive and protected
area.

Types of protective alarm detection


system
 Central station system – The control station
is located outside the plant or installation. When
the alarm is activated, the central station notifies
the police or other public safety agency.

Proprietary system – centralized monitor of


the alarm system located in the installation with a
duty operator. In case of alarm, the duty operator
calls whatever is the primary need. This is owned
and operated by the installation.

Local alarm – this system consist of ringing up


a visual or audible alarm near the object to be
protected. Only guards within hearing can
respond to such alarm.

 Auxiliary alarm – in this system installation of


circuits is led into the nearest police station.

Kinds of alarm system


1. Audio detection device – it detects
any sound caused by attempted force entry.
A supersonic microphone speaker in walls,
ceiling and floors of the protected area.

2. Vibration detection device – detect


any vibration caused by forcible entry.
Effective to safeguard enclosed areas.

3. Metallic foil/ wire – an electrically


charged strips of tinfoil or wire is used in
doors, windows or glass surface.

4. Photoelectric/ electric eye device –


activated when the intruder crosses the
beam that breaks contact and  activates the
alarm.

Bank alarm system

Foot rail – place on the floor in such


a position that tellers may activate the
alarm by placing the front of their feet
to engage the activation bar.
Bill traps – currency is usually place
in the teller’s cash drawer and
connected to the alarm system. When
the currency is removed, the device is
activated.
Double squeeze button – requires
pressure on both side of the device
and reduces the probability of
accidental activation.

Protective Lock
 Lock is one of the most widely used physical
security devices in the asset protection program of an
installation. It complements other physical safeguards
of the installation against any possible surreptitious
entry. However, the owner of the installation or his
security officer needs to understand the weaknesses
and strength of each type of lock including the door,
window or walls to be used to achieve maximum
benefit from its application. This is because burglars
more often concentrate on the lock and its application
mechanism in order to make a forcible entry. It is for
this obvious reasons that locks are considered as
delaying devices which cannot really stop a determine
intruder from destroying the lock

 What is lock?
Known as mechanical, electrical, hydraulic or
electric device designed to prevent entry and
removal of essential items into a building, room,
and container of hiding place.
 What is padlock?

Portable and detachable lock having a sliding


hasp which passes through a staple ring and is
then made secured.

What are the types of lock? 

 Warded lock – is a type of lock that uses


a set of obstruction, or wards, to prevent the
lock from opening unless the correct key is
inserted. The correct key has notches or slots
corresponding to the obstructions in the lock,
allowing it to rotate freely inside the lock.

 Disc tumbler lock – is a type of lock that


utilizes a set of flat disc to prevent the lock
from opening unless the correct key is
inserted.
 Pin tumbler lock – is a lock mechanism
that uses pins of varying lengths to prevent
the lock from opening without the correct
key. Pin tumbler are most commonly
employed in cylinder lock, but may also be
found in tubular or radial locks.
 Combination lock – instead of using key
to align the tumblers, the combination
mechanism uses numbers, letters or
symbols as reference point which enable an
operator to align them manually

Code operated lock – type of lock than


can be operated by pressing a series
of numbered button in the proper sequence.
Electromagnetic lock – can be opened
and closed remotely by electrical means.
 Card operated lock – operated by a
coded card.

What are the types of Keys?

Change key – a specific key which


operates the lock and has a particular
combination of cuts, which match the
arrangement of the tumblers
in the lock

Sub – master key – a key that will


open all the lock within a particular
area or grouping in a given facility.

Master key – a special key capable


of opening a series of locks.
 Grand master key – a key that will
open everything in a system involving
two or more master key groups.

What is key control?


The management of keys in plant or business
organization to prevent unauthorized access to the
key

What is security cabinet?


The final line of defense at any facility is in security
storage where papers, records plans or cashable
instrument, precious metals or other especially
valuable assets are protected. These security
containers will be of a size quantity, which nature
of the business dictates.
Three types of security cabinet
 Safe – a metallic container used for
the safekeeping of documents or small
items in an office or installation. Safe can
be classified as either burglary of fire
proof depending upon the used and need
Specification for Safe 
 1. Its weight must be at least 750 lbs.  
2. It less than  750 lbs it should
be anchored to building structure 
3. Its body should be atleast 1 inch
thick steel

Vault – Heavily constructed fire and burglar


resistance container usually part of the building
structure used to keep and protect cash,
documents and negotiable instruments. It is
bigger than safe but smaller than file room.

Specification for Vault

1. The vault door should be made of


steel at least 6 inches in thickness
2. The walls, ceilings, and floors
must be reinforced by concrete at
least 12 inches in thickness

3. It must be fire resistive up to 6


hours

 File room – a cubicle in a


building constructed a little lighter than vault
but bigger in size to accommodate
limited people to work on the records inside.

Guard Force system


Private Security Agency (PSA)
shall mean any person association, partnership,
firm or private corporation, who contracts,
recruits, trains, furnishes or posts any security
guard, to perform its functions or solicit
individuals, businesses, firms, or private, public or
government- owned or controlled corporations to
engage his/its service or those of his/its security
guards, for hire, commission or
compensation thru subscription or as a
consultant/trainer to any private or public
corporation whose business or
transactions involve national security or interest

Government Security Personnel — shall


be natural persons which include
government security guards, detectives, security
consultants, security officers and others that may
be class Tied later, except those of the Armed
Forces of the Philippines, Philippine National
Police, Bureau of Jail Management and
Penology, Municipal or City Jail
guards rendering/performing security and/or
detective services as employed by government
entities.

 Company Guard Force (CGF) — a security


force maintained and Operated by any
private company/corporation utilizing any of
its employees to watch, secure or guard
its business establishment premises, compound
or properties.
Control of personnel in the physical
facility

The most practical and generally


accepted system of personnel identification is
the use of identification cards, badges or
passes. Generally  speaking, this system
designates when and where and how
identification cards should be displayed, and
to whom. This helps security personnel
eliminate the risk of allowing the access of
unauthorized personnel within
the establishment.

Two types of personnel identification


 1. Personal recognition
 2. Artificial recognition

Use of Pass system


1. Single pass system – the badge or
pass coded for authorization to enter specific
areas is issued to an employee who keeps it
in his possession until his authorization
terminates.

2. Pass exchange system – an exchange


takes place at the entrance of each
controlled area. Upon leaving the personnel
surrenders his badge or passes and retrieve
back his basic identification.

3. Multiple pass system – This provides


an extra measure of security by requiring
that an exchange take place at the entrance
of each restricted area.

Visitors Movement control


1. Visitor’s logbook – all visitors to any
facility should be required identification card
and filled up the logbook.
2. Photography – taking photography
should also be considered especially in
controlled areas.
3. Escort – if possible visitors should be
escorted by the security to monitor their
activity and guide them.
4. Visitors entrance – separate access for
visitors and employees should be provided 
 5. Time traveled – if there is long delay or
time lapse between the departure and
arrival, the visitor may be require to show
cause for the delay.

Personnel Security
It includes all the security
measures designed to prevent unsuitable
individuals or persons of doubtful loyalty to
the government, from gaining access
to classified matter or to any security
facility, and to prevent appointment or
retention as employees of such individuals.

Security Chain
Personnel security it  is the weakest link
in the security chain. This weakness can
be best minimized or eliminated by
making personnel security conscious
through training program.

What is Personnel
Security Investigation?
 It is inquiry into the character,
reputation, discretion and loyalty of individual in
order to determine a person’s suitability to
be given a security clearance.

What are the types of PSI?


 National Agency Check (NAC) – this is
an investigation of an individual made upon
the basis of written information supplied by
him in response to official inquiry, and by
reference to appropriate national agencies.
 Local Agency Check (LAC) – this type
of investigation consist of the NAC plus
written inquiries sent to appropriate local
government agencies, former employees,
reference and school listed by the person
under investigation.

Background Investigation

This is more comprehensive


investigation than the NAC & LAC. A
thorough and complete investigation of
all or some of the circumstances or
aspects of a person’s life is conducted.

What are the two Types of BI


 Complete background Investigation (CBI) –
Consist of the investigation of the background of
a person, particularly all the circumstances of his
personal life
 Partial Background Investigation (PBI) – Consist

of the investigation of the background of an


individual but limited  only to some of the
circumstances of his personal life which are
deemed pertinent to the investigation.

Security Education Program 


The basic goal of security
education program is to acquaint all
the employees the rationale behind
the security measures and to insure
their cooperation at all times.

Objectives of Security Education
Program

 Guidance for all supervisory and executive levels


of the organization;
 A mandatory indoctrination of security for all new

personnel before their assignment to their


respective jobs;
 Development of high degree of

security consciousness among the selected


supervisors and other key personnel in a program
that should be continuing and supported by
top management,

 A down- the- line security program aimed


at instilling consciousness and dedication through
demonstrations, lectures, motivations,
and suggestions,
 To let all the employee force be informed

that they all belong to the organization and


that non- awareness and non- concern to
the security program is tantamount to disloyalty.
 That the program is also to develop

discipline, loyalty and belongingness.

Phases of Security Education
 Initial Interview
 Training Conference 
 Refresher Conference 
 Security Reminders 
 Security Promotion
 Special Interviews
 Debriefing 

DOCUMENT AND INFORMATION
SECURITY
 The information cycle consists of five stage namely : (a)
creation (b) use, (c) storage and retrieval (d) transfer, and
(e) disposition. 

Types of Documents
 Class1- Vital Document 
 In this category are records that are irreplaceable;

records of which reproduction does not have the


same value as the original;  
 Class II- Important Document 
 This includes records the production of which will close
considerable expense and the labor, or considerable delay.
 Class III – Useful Documents
 This include records whose loss might cause inconvenience
but could be  reality replace and which would not in
the meantime present an insurmountable   obstacle to the
prompt restoration of the business.
 Class IV- Non- essential Documents
 These records are daily files, routine in nature even if lost or
destroyed,   will not effect operation or administration.
This class represent the bulk of the records which should not
even attempted to protect in the event of disasters.
They should   however, be kept in ordinary files ready for
reference if needed and usually discarded  after some period
of time.   

SECURITY HAZARDS 
Type of Hazards 
 Natural Hazards

These are hazards which arise from natural


phenomena. 
 Human or Man-made Hazards 

Human or man-made hazards are the greatest concern


to personnel charge with the responsibility of safeguarding
and protecting a plant or installation. 
Types of Pilferer
 Casual Pilferer
Is one who steals due to his inability to resists the
unexpected opportunity and has little by detection.
  Systematic Pilferer
Is one who steals with preconceived plan takes away
any or all types of items or supplies for economic gain.

SECURITY SURVEY
 A security survey is a critical on- site examination and
analysis of an industrial plant, business, home, or public or
private institution done to ascertain the facility’s current
security status, to identify deficiencies or excesses in
current practices, to determine what protection is needed, and
to make recommendations for improving the overall level of
security at that location. 

Objectives of Security Survey 
 To determine existing state of security 
 To locate weakness in defense

 To determine degree of protection required

 To produce recommendations establishing a total security

program.

Security Survey Sequence of Action 

 Examine and analyze the site and the organization


 Ascertain the organization/s current security status. 
 Determine the level of protection needed
 Make recommendations

SECURITY INSPECTION
 Types of Security Inspection
 A. Continuous Inspection 
 B. formal
 C. informal
 D. structured
 E. unstructured

 Continuous Inspection
To keep pace with constant changes in the organization,
changes in our security in term of attitudes, life-styles and
moral values, and the rapidly advancing technological
modifications all around us, the  inspection process must be
an on –going, never ending activity.
 B. formal

Is one to which some fanfare is attached: it is usually


preceded by an announcement, and the unit under inspection
“prepares” for events, including some extra
housekeeping activities that would not otherwise happen at
that point in time.

 . informal 
Are usually the result of a long and firmly entrenched
inspection program, understood by all and accepted as a
part of the organizational life. 
 Structured
As opposed to an unstructured inspection, is one that
moves systematically, perhaps even rigidly, from one
designated inspection point to the next. The following could
be part of such a structured inspections.
 Unstructured Inspections
In contrast, would approach the warehouse
unit in a more random manner, with less methodical
attention to small specifics. The experience eye of a top
security professional would note a glance,
without following a checklist, the weeds and
other vegetations against the fence needed clearing.

Republic Act 5487


 An Act governing the organization and management of
private security agencies, company guard forces and
government security forces, it prescribed the
minimum requirements for security personnel to be secure a
license to exercise profession.

What are the general requisites in the


security profession?
 1. Filipino citizen
 2. Not less than 18 years of age
 3. Physically and mentally fit
 4. Good moral character
 5. Must not possess any disqualification

What are the


general disqualifications? 
 1. Dishonorably discharge from the service in the PNP/AFP
 2. Physically and mentally unfit
 3. Conviction of a crime
 4. Addiction to drugs/ alcohol
 5. Dummy of foreigner
 6. Elective or appointed government official

What are the basic qualification of


an agency operator/manager
 1. Atleast 25 years of age
 2. College graduates and/or commissioned officer in the
inactive service or retired from the AFP/PNP
 3. Has taken a course/seminar on seminar on industrial
security management and / or must have adequate training
or experience in security business

 Now applicants for license to operate shall be required to


obtain a minimum capitalization of one million pesos
(P1 000,000.00) with a minimum bank deposit of five
hundred thousand (P500,000.00) pesos in order to start its
business operation.

What are the basic qualification of a


security consultant? 
 1. Holder of masters degree of criminology, MPA, MNSA,
industrial security administration or law
2. Must have atleast 10 years experience in the operation
and management of security business

Rule IV License to operate 


Sec 5. Membership
 No regular license shall be granted unless the PSA has a
minimum of 200 licensed private security personnel.
 No regular license shall be granted unless the CGF/PDA has
a minimum of 30 licensed private security personnel.
 The maximum number of private personnel that
PSA/CGF/PDA may employ shall be 1000

Status and Validity of License


to Operate. 
 Regular LTO - issued, after complying with licensing
requirements, to private security agencies having obtained
and maintained in its employ at least two hundred (200)
security personnel, and to company guard forces and private
detective agencies having obtained and maintained in its
employ at least thirty (30) security personnel and private
detectives respectively. Such license may be
renewed following conformity with renewal
requirements prescribed in a Standard Operating
Procedure (SOP).
 Temporary LTO — initial and conditional issuance to new
private security agencies and to PSAs holding regular LTO
not able to maintain the minimum number of security
personnel or conform to standards, for them to be able to
attain the 200 minimum number of security personnel or
comply with licensing standards, prior to issuance/re-
issuance of regular LTO. Such issuance shall not
be renewable nor be extendible.
 Unless sooner cancelled or revoked and provisions hereof
modified, all licenses to operate shall have a validity of two
(2) years Temporary LTOs upon expiration are automatically
cancelled.

Rule VII
Sec 1. Possession of firearms
by PSA,PDA,CSF,GSU
 Shall be entitled to possess firearms after satisfactory
complying with the requirements prescribed by the
C,PNP provided that the number of firearm shall not exceed 1
firearm for every 2 security guard. NO security agency shall
be allowed to possess firearms in excess of 500 units.

Sec II. Restriction to possess high –


powered firearms by PSA, PDA, CSF,
GSU
 Generally they are not allowed to possess
high caliber firearms considered as military type weapons
such as M16, M14, cal .22 to include pistols and bores smaller
than cal .38 but with firing characteristics of full automatic
burst. However, when such entities are operating in areas
where there is upsurge of lawlessness and criminality as
determined by the C, PNP and police regional offices, they
may be allowed to acquire, possess, and use high –
powered fire arms.
 The acquisition shall be at the expense of the entity, the
firearms should be registered, the total number of
firearms shall not exceed 10% of the total number of
security guards employed and the security guards who will
use the firearm shall be given adequate training in the
use of it

Stocking of ammunition
 Stocks of ammunition in the agency shall be authorized on a
limited and reasonable quantity that will suit the requirement
and need of such agency and shall be subjected to inspection
from time to time by representatives of the Chief,
Philippine National Police unless otherwise provided for under
existing laws
 , shall not exceed a basic load of fifty (50) rounds of
ammunition per unit of duly licensed firearms. Individual
issue to each security guard shall be limited to one half of
such basic load or twenty five (25) rounds for every security
guard.

RULE VI
UTILIZATION OF PRIVATE SECURITY
AGENCIES
AND PERSONNEL
 Powers of city municipal mayors in case of emergency – In
case of emergency or in times of disaster or calamity when
the services of any security agency/entity and its personnel
are needed, the city or municipal mayor
 may muster or incorporate the members of the agency or
agencies nearest the area of such disaster or calamity to help
in the maintenance of peace and order, prevention of crime,
or apprehension of violators of laws or ordinance, and in
the protection of lives and properties.

Duty to Assist Law Enforcers


 - Any security guard shall be duty bound to assist any peace
officer in the pursuit of his bounding duty, when
requested, provided it is within the territorial jurisdiction of his
(security officer) area of duty.

You might also like