Professional Documents
Culture Documents
Security Planning
Planning is the key factor in the successful management of a security program. A
management expert defines planning as pre- determining a course of action. Another
defines it as deciding in advance what to do, how to do it and who should do it. It is
necessary for a security executive to plan; the alternative is obviously to react to events
that have already occurred or try to solve problems that could have been avoided in the
first place. The first requirement in planning is to identify the overall objective and
purpose of the organization. Afterwards, the executive may start his own planning which
PAGE 1
should be objective and supports the organization's goals. One method of security
planning is to create an overall blueprint for security program based on the identified
vulnerabilities or the result of vulnerability assessment. Another method is to write
several plans such as a comprehensive emergency plan covering various anticipated
contingencies and various operational plans, policies, standards and procedures. Still
another way is the use of Action Plans showing three columns: the first column identifies
the planned activities, the second column identifies the action officer involved, while the
third column shows the time frame.
2. In a Company with Union The company recognizes its obligation as a corporate citizen
to the community and thus, practices an aggressive policy of prosecution regarding theft
within the company.
3. Information Security Policy The computer center recognizes the proprietary interest of
the client entities who utilize the facilities of the center, hence, strictly controls
dissemination of management information on strictly need-to-know basis and only to
such persons that have been specifically cleared to receive such information.
PAGE 2
Financing
Managing security requires cash to carry out the various responsibilities involved. A
security executive should be able to have an enlightened view of what activities he plans
for a specific period, the expected operational conditions and the cost involved. A
security executive should have knowledge in forecasting and budgeting to make security
management successful. He should be familiar with the organization's stand on Return on
Investments and spending preferences.
Budgeting
A budget is usually a prepared annual plan stated in financial terms. It is ordinarily
finalized a few months before the start of the budget period. It contains the different items
for which costs are involved. No security organization can operate nor have its program
implemented without the budget.
The process is set off by appropriate guidelines from senior management. The security
executive then prepares his program and various activities and costs. He develops and
recommends alternative courses of action.
The senior management then reviews the recommendations and makes decision on the
fund’s allocation.
2. Sundry Expense - These are non-salary expenses such as supplies, uniforms, travel,
transportation, representation, contract services, professional fees, membership fees,
publications and subscriptions.
PAGE 3
3. Capital Expenditures - These are one-time expenses for physical improvements or
acquisition of equipment such as the purchase of communication equipment, computers,
firearms, vaults, alarm systems and construction of firing range.To justify the budget, the
following questions must be resolved:
Organizing
An organization is the orderly arrangement of manpower and material resources to
effectively carry out their intended purposes. It molds the activities of many people into a
smooth working team and could mean the difference between the success and failure of a
security department or company. A security organization must be planned in such a way
that it meets the needs of the enterprise it is responsible to secure. It must be designed
with the aim of helping a company fulfill its mission. Each sub-unit must be able to carry
out its assigned tasks at an acceptable level of efficiency. A security organization must
also be flexible in such a way that the structure must be able to adapt to necessary
changes without interfering with the major objectives of the organization. In other words,
the structure should enhance instead of impede the work of the department or agency.
Organizational Relationship
The following are the basic forms of organizational relationship:
PAGE 4
Organizational Principle
To come out with an effective security organization, the executive should be aware of the
following principles:
1. The work should be divided according to some logical plan. The five primary ways
are: purpose, process or method, clientele, time and geography.
2. Lines of authority and responsibility should be made as clear as possible. These are
reflected in the pyramid-like structure with blocks and lines known as "organization
chart" and with the positions of greater authority and responsibility located in the upper
levels.
4. One supervisor can effectively control only a number of people, and that limit should
not exceed. This is known as the principle of span of control. At the highest level the
number is normally three and at the lowest level the maximum is 12.
Reporting Levels
Oftentimes, the security director/manager may report directly to the president or at least
one of the senior executives. He may also report to a middle management executive
which tends to limit his stature, authority and scope of his responsibility.
PAGE 5
The Agency Operator/Security Director
The security executive usually wears two hats. First, the perception that he is an expert in
security; and second is the awareness that he is the highest management guy in the
hierarchy. Thus, he should be backed by a track record of success in handling people,
problem solving and professional competence.
1. Leader - His most basic role is to provide leadership, set the right climate, establish
the directions to take, motivate his people and try to bring out the best in them.
4. Innovator - He is expected to be always on the lookout for better and less expensive
ways to do the job. He is not fearful of trying new ways and take risks.
6. Trainer-He establishes professional development and keeps his people attuned with
times and various requirements,
PAGE 6
1. Security Director (SD) - Agency Manager/Chief Security Officer
3. Security Staff Director (SSD) - Staff Director for Operations and Staff Director for
Administration.
4. Security Staff Director for Training - Staff in- charge for Training
B. Line Leader Staff
1. Security Supervisor 3 - Detachment Commander
2. Security Supervisor 2 - Chief Inspector
3. Security Supervisor 1 – Inspector
C. Security Guard
1. Security Guard 1 - Watchman/guard
2. Security Guard 2-Shift-In-Charge
3. Security Guard 3-Post-in-Charge
Staffing Pattern
All security agency owners/managers shall follow the required staffing pattern as
prescribed under Rule IX, Sec. 2, NIRR of RA 5487, as amended.
1. The agency manager is automatically the Security Director who shall be responsible
for the entire operation and administration/management of the security agency. He shall
be the authorized signatory to all Duty Detail Orders, and all other documents and
communications pertinent to the operation and management of a security agency. He may
delegate certain functions to a subordinate, provided the subordinate is qualified to
discharge the given function in accordance with law.
2. Security Agency shall appoint a staff officer as Security Training Officer, who shall
be responsible for the training of the Agency's security personnel in accordance with the
requirements of RA 5487 and the IRR. The Training Officer shall be licensed as a
security officer and likewise accredited as such by the Training and Education Branch of
SOSIA.
3. Staff Director for Operations is the staff assistant of the security manager for the
efficient operation of the agency. This position includes the responsibility to canvass
clientele and the implementation of contract and agreement. He is also responsible for the
conduct of investigation and the conduct of training,
4. The Staff Director for Administration is the staff assistant of the agency manager for
the effective and efficient administration and management of the agency. He is
PAGE 7
responsible for the professionalization of the personal, procurement/recruitment,
confirming of awards, mobility and issuance of FA's.
5. The Detachment Commander is the field or area commander of the agency. The
Detachment shall consist of several posts.
6. The Chief Inspector shall be responsible for inspecting the entire area covered by the
detachment.
7. The Security Inspector is responsible for the area assigned by the Chief Inspector of
the Detachment Commander,
8. The Post-in-charge is responsible for the entire detailed security office within a
certain establishment.
9. The Shift-in-charge is responsible for the security officers who are scheduled in a
certain shift for a particular period.
10. The Security Guard is the one actually posted as watchman and or guard.
Position Standards
One of the major tasks of the corporate security executive which cannot be delegated is
the setting up of standards for key positions in his organization. Also, more often than
not, he himself would establish the standards for his own position especially if it is a
newly created one. Among the areas defined by the Job Description are the job functions,
reporting relationship, skills required, managerial capabilities, education and training,
years of experience and personal circumstance.
Hiring
This process involves sourcing of candidates through advertisements or referrals,
interviewing, short listing, background investigation, selection of the best candidates and
finally preparing the job offer.
PAGE 8
Discipline
Below are some of the basic rules of discipline:
1. Put rules in writing and ensure that employees understood them. Employees are
entitled to know what is expected of them.
2. Do the disciplining in the privacy of the office. Do not chastise one in the presence of
others.
3. Be objective and consistent. Discipline condemns the act and not the person.
5. Keep a file of all employees' infractions. This can come handy later on.
Appraisal of Results
A performance appraisal should be done to measure and evaluate the performance of
subordinates on a regular basis. It can be done annually or semi-annually. This is the
usual basis for administrative actions such as promotions or salary increase or on the
extreme, the basis for separation from the organization.
Promotions
Promoting deserving employees is one of the important functions of a security executive.
If there's a vacancy, he has the option to fill tup by promoting a staff member based on
his track record and his expected performance in the higher position.
Communication
Continuing communication within the security organization and with other subdivisions
of the company is major responsibility of the security executive. He should be able to
communicate upward, downward and laterally; as well as receive communications from
above below and laterally.
PAGE 9
Some Management Principles
Security practitioners should be conversant with the following
"Ten Management Rules."
5. Orders should never be given to subordinates over the head of a responsible executive.
The management should instead supplant the officer-in-question.
10. Any executive whose work is subject to regular inspection should whenever
practicable, be given the assistance and facilities necessary to enable him to maintain an
independent check of the quality of his work.
PAGE 10
Chapter 11
IMPLEMENTAION, PROBLEM-SOLVING AND AUDIT/INSPICTION
Learning Objectives
PAGE 11
At the end of this chapter, the student will be able to:
Program Implementation
Top Management's Responsibility
The top management should always be interested in the implementation of any security
program. They must extend complete support to the program on a continuing basis. They
must be willing to take actions to ensure that employees at the other levels comply with
requirements that have been established for the protection of personnel and other assets.
The responsibility and accountability for the implementation are delegated to the security
executive. Thus, he would function as a steward doing the necessary management work
for and on behalf of top management. Involvement of Others Non-security employees
can be of great assistance in the implementation of the security program and their active
participation can contribute to its success. Thus, it is important to keep other employees
aware and involved.
Setting Priorities and Meeting Schedules The higher the criticality rating of the identified
vulnerability, the higher is its priority in the implementation of countermeasures. It is
important also that the time frame established be met otherwise it could affect the entire
program.
PAGE 12
During program implementation, opportunities arise to improve countermeasures or
reinforce those found effective. If new conditions present themselves, necessary
adjustments sometimes need to be made in the security program.
Program Evaluation
At the end of the timetable or drills, rehearsals, the security program or part of it need to
be evaluated. Issues such as relevance or adequacy of countermeasures, cost
effectiveness, etc, need to be addressed to check the existence of vulnerability which may
trigger the need for a much responsive security program.
1. Clearly Defining Problem - He ensures he has the complete grasp of the problem
at hand. He is able to define and clarify issues involved.
4. Developing Solutions - The security executive may come out with a solution and
several alternatives. In this step he should be guided by the principles and techniques
of effective management and company polices.
5. Selecting the Best Solution - From several alternatives the security executive
selects the best practical solution considering the short- and long-term effect of each
possible solution.
6. Putting the Solution into Operation-One the most appropriate solution is chosen,
implementation is next. This is critical as it may involve changes be difficult to
accept. There might be a need to sell the solution to others.
PAGE 13
Some Pitfalls in Decision Making
The appropriate decision and taking responsibility for it is a critical function of any
executive, much more a security professional, The security executive should avoid
the following:
4. Procrastinating
2. Self Interest-One's own interest may not be the best for others. The ideal situation
here is to balance one's interest with those of the others.
3. Tradition - There are good traditions but there are those that limit the way of
doing things and become the basis for decision because they form the easiest way out.
PAGE 14
5. Authority or Expert Opinion -This should be given great consideration.
However, the security executive should make certain that they are really experts
rather than products of media hype.
6. Logical Thinking - The decision is based on sufficient facts and thorough analysis
leading to clear conclusion and good decision.
7. Emotion and Prejudice - The decision should be free from bias and sentiment. It
may lead to favoritism and irrational decision-making.
2. Must we do it all?
PAGE 15
A formal security inspection is announced and is communicated to the organization
or unit in advance. All documents needed are prepared beforehand. An informal audit
is the result of an entrenched and institutionalized system understood and accepted as
part of the organizational life conducted in the spirit of cooperation and
understanding.
The inspector should establish that the countermeasures are as they ought to be. It is
possible that the unit or people being audit do not do what is expected of them.
Deficiencies note should always be highlighted and follow through scheduled and
implemented, otherwise, vulnerabilities will persist.
PAGE 16