You are on page 1of 85

UNIVERSITY OF MINDANAO

College of Criminal Justice Education


Bachelor of Science in Criminology

Physically Distanced but Academically Engaged

Self-Instructional Manual (SIM) for Self-Directed Learning (SDL)

Course/Subject: CRI 215 – Introduction to Industrial Security Concepts

Name of Teacher: Andre A. Cardenas Jr.

THIS SIM/SDL MANUAL IS A DRAFT VERSION ONLY; NOT FOR


REPRODUCTION AND DISTRIBUTION OUTSIDE OF ITS INTENDED USE. THIS
IS INTENDED ONLY FOR THE USE OF THE STUDENTS WHO ARE OFFICIALLY
ENROLLED IN THE COURSE/SUBJECT.
EXPECT REVISIONS OF THE MANUAL.
TABLE OF CONTENTS

Page
TITLE PAGE 1
TABLE OF CONTENTS 2
COURSE OUTLINE 4
COURSE OUTLINE POLICY 4

ULO a 7
Metalanguage 7
Essential Knowledge 9
Origin and Development of Security 9
Industrial Security 11
Republic Act 5487 (Rule I, II and III) 13

ULO b 26
Metalanguage 26
Essential Knowledge 27
Physical Security 28
Barriers 29
Perimeter Barrier 33
Security Lighting 36
Protective Alarm 39
Fire Alarm System 42
Basic Concept of Protective Locks and Key Control 43
Key Control 45

2
5 Level of Control in Master Keying Plan 46
Pointers for Effective Locks and Key Control 47

ULO c 59
Metalanguage 59
Essential Knowledge 60
3 Types of Guard Forces 60
What is License to Operate (LTO) 60
Firearm Allowed to PSA 61
The Ranks and Position of the Security Personnel 63
Set of Uniforms for Security Personnel 64
Personnel Security 66
Security Education 69
Document and Information Security 70
Risk Management Alternative and Strategies 74
Hazard 75
Pilferage 75
Security Survey 76

3
Course Outline: CRI 215 – Introduction to Industrial Security Concepts

Course Coordinator : Andre A. Cardenas Jr


Email : acardenas@umindanao.edu.ph
Student Consultation : By appointment (thru LMS, or traditional contact)
Mobile : 0997-607-9090
Phone : (082) 2273166 or 3050647 loc. 103
Effectivity Date : June 2020
Mode of Delivery : Blended (On-Line with face to face or virtual
sessions)
Time Frame : 54 Hours
Student Workload : Expected Self-Directed Learning
Requisites : None
Credit : 3
Attendance Requirements : For online sessions: minimum of 95% attendance.
For 1 day on-campus/on-site final exam: 100%
attendance

Course Outline Policy

Areas of Concern Details


Contact and Non-contact This 3-unit course self-instructional manual is designed for blended learning
Hours mode of instructional delivery with scheduled face to face or virtual
sessions. The expected number of hours will be 54 including the face to
face or virtual sessions. The face to face sessions shall include the
summative assessment tasks (exams) since this course is crucial in the
licensure examination for criminologists.
Assessment Task Submission of assessment tasks shall be on 3rd, 5th, 7th and 9th week of
Submission the term. The assessment paper shall be attached with a cover page
indicating the title of the assessment task (if the task is performance), the
name of the course coordinator, date of submission and name of the
student. The document should be emailed to the course coordinator. It is
also expected that you already paid your tuition and other fees before the
submission of the assessment task.
If the assessment task is done in real time through the features in the
Blackboard Learning Management System, the schedule shall be arranged
ahead of time by the course coordinator.

Since this course is included in the licensure examination for criminologists,


you will be required to take the Multiple-Choice Question exam inside the
University. This should be scheduled ahead of time by your course
coordinator. This is non-negotiable for all licensure-based programs.
Turnitin Submission (if To ensure honesty and authenticity, all assessment tasks are required to
necessary) be submitted through Turnitin with a maximum similarity index of 30%
allowed. This means that if your paper goes beyond 30%, the students will
either opt to redo her/his paper or explain in writing addressed to the course
coordinator the reasons for the similarity. In addition, if the paper has

4
reached more than 30% similarity index, the student may be called for a
disciplinary action in accordance with the University’s OPM on Intellectual
and Academic Honesty.

Please note that academic dishonesty such as cheating and commissioning


other students or people to complete the task for you have severe
punishments (reprimand, warning, expulsion).
Penalties for Late The score for an assessment item submitted after the designated time on
Assignments/Assessments the due date, without an approved extension of time, will be reduced by 5%
of the possible maximum score for that assessment item for each day or
part day that the assessment item is late.

However, if the late submission of assessment paper has a valid reason, a


letter of explanation should be submitted and approved by the course
coordinator. If necessary, you will also be required to present/attach
evidences
Return of Assignments/ Assessment tasks will be returned to you two (2) weeks after the
Assessments submission. This will be returned by email or via Blackboard portal.

For group assessment tasks, the course coordinator will require some or
few of the students for online or virtual sessions to ask clarificatory
questions to validate the originality of the assessment task submitted and
to ensure that all the group members are involved.
Assignment Resubmission You should request in writing addressed to the course coordinator his/her
intention to resubmit an assessment task. The resubmission is premised on
the student’s failure to comply with the similarity index and other reasonable
grounds such as academic literacy standards or other reasonable
circumstances e.g. illness, accidents financial constraints.
Re-marking of Assessment You should request in writing addressed to the program coordinator your
Papers and Appeal intention to appeal or contest the score given to an assessment task. The
letter should explicitly explain the reasons/points to contest the grade. The
program coordinator shall communicate with the students on the approval
and disapproval of the request.
If disapproved by the course coordinator, you can elevate your case to the
program head or the dean with the original letter of request. The final
decision will come from the dean of the college.
Grading System All culled from BlackBoard sessions and traditional contact
Course discussions/exercises – 30%
1st formative assessment – 10%
2nd formative assessment – 10%
3rd formative assessment – 10%

All culled from on-campus/onsite sessions (TBA):


Final exam – 40%

Submission of the final grades shall follow the usual University system and
procedures.
Preferred Referencing Style APA 6th Edition.
Student Communication You are required to create a umindanao email account which is a
requirement to access the BlackBoard portal. Then, the course coordinator
shall enroll the students to have access to the materials and resources of
the course. All communication formats: chat, submission of assessment
tasks, requests etc. shall be through the portal and other university
recognized platforms.

5
You can also meet the course coordinator in person through the scheduled
face to face sessions to raise your issues and concerns.

For students who have not created their student email, please contact the
course coordinator or program head.
Contact Details of the Dean Dr. Carmelita B. Chavez
Email: carmelita_chavez@umindanao.edu.ph
Phone: 082-3050647 local 103
Contact Details of the Dr. Roberto R. Magbojos
Program Head Email: rmagbojos@umindanao.edu.ph
Phone: 082-3050647 local 103
Students with Special Students with special needs shall communicate with the course coordinator
Needs about the nature of his or her special needs. Depending on the nature of
the need, the course coordinator with the approval of the program
coordinator may provide alternative assessment tasks or extension of the
deadline of submission of assessment tasks. However, the alternative
assessment tasks should still be in the service of achieving the desired
course learning outcomes.
Online Tutorial Registration You are required to undergo a tutorial on this course. Upon enrolment and
the registration of your name to Blackboard LMS, the Course Coordinator
will contact you on the specific schedule of the tutorial which shall be
conducted within the 1st week of the class.
Help Desk Contact ccje@umindanao.edu.ph
Library Contact library@umindanao.edu.ph
Hotline no. 0951-376-6681
Well-being Welfare Support Hotline: 0905-892-4090 / 0950-466-5431
Help

Course Information – see/download course syllabus in the Black Board LMS

CC’s Voice: Hello prospective criminologist! Welcome to this course CRI 215: Introduction to
Industrial Security Concept. By now, I am confident that you really wanted to become
a security professionals and that you have visualized yourself already being an
security officer, security advisor, and security consultant helping the economy by
providing security to industry and aiding the law enforcer to maintain peace and order
community.
CO Before the actual practice of your profession, you must have a broad understanding in law
enforcement administration, public safety and criminal justice, which is the ultimate
course outcome of this subject. When we talked about Industrial Security concept as
a crucial component of law enforcement, knowing how the security works, how security
is being utilized properly, how to deal crime incident and accident. Thus, in this course
you are expected to recall your knowledge or read in advance the laws protecting the
Security Agency and Security Professionals, Principle of Security, and Security
strategies. These include different risk and hazard that may occur.

6
Let us begin!
Big Picture

Week 1-9: Unit Learning Outcomes (ULO): At the end of the unit, you are
expected to
a. Rationalize the history, importance of security in every human and
different types of security agencies authorized by law.
b. Discuss relevant technology as barrier in security management
operation, and well define physical security for the protection of lives
and property.
c. Explain the important provisions of RA 5487 and its IRR.

Big Picture in Focus: ULOa. Rationalize the history, importance of security in every
human

METALANGUAGE

The most essential terms relevant to the study of this course and to
demonstrate ULOa are operationally defined to establish a common frame of
reference as to how the texts work in the course. You will encounter these terms as
we go through the study of course. Hence, to be able to fully appreciate the topics
presented in this course, unlocking the meaning of these terms is crucial.

R.A. No. 5487 – approved June 13, 1969, known as Private Security Agency Law

PD no. 11 – amending Section 3 (d), Section 4, and Section 8, RA 5487.

PD no. 100 - AMENDING FURTHER CERTAIN SECTIONS OF REPUBLIC ACT


NUMBERED FIFTY-FOUR HUNDRED EIGHTY-SEVEN, OTHERWISE KNOWN AS,
"THE PRIVATE SECURITY AGENCY LAW," AS AMENDED BY PRESIDENTIAL
DECREE NO. 11, DATED OCTOBER 3, 1972 (Section 3 (d), section 4, section 5,
section 8, section 9, and section 1 of RA 5487)
7
PD no. 1919 - AMENDING FURTHER REPUBLIC ACT NUMBERED FIFTY FOUR
HUNDRED EIGHTY SEVEN OTHERWISE KNOWN AS “THE PRIVATE SECURITY
AGENCY LAW” (Section 3 (d), section 18, section 8 (par.3), section 16 (par.1))
R.A. 6975 – The law authorizing the PNP the control and supervision of the security
agencies in the Philippines. Approved into law December 13, 1990.

PNPSAGSD (Philippine National Police Security Agency Guard and


Supervisory Division)

PNP SOSIA (Philippine National Police Supervisory Office for Security and
Investigative Agencies) – unit in the PNP in charges of the supervision,
direction and control of all agencies in the country.

PADPAO (Philippine Association of Detective and Protective Agency Operators Inc)


– authorized to issue the implementing rules and issues pertaining to R.A. 5487.

FEO (Firearms and Explosives Office) – issuance of license of firearms to security


▪ agencies.
SEC (Security and Exchange Commission) – registration of security business.

DTI (Department of Trade and Industry) – registration of security trade name.

SAGSD-CSG (Security Agency Guard and Supervision Division-Civil Security Group)


– application of license to exercise profession as security guard

SAFETY. The word “security” in general usage is synonymous with “safety”.


▪ The state of being “safe”, the condition of being protected against physical, social,
spiritual, financial, political, emotional, etc.

8
ESSENTIAL KNOWLEDGE
To perform the aforesaid big picture (unit learning outcomes) for the first three (3)
weeks of the course, you need to fully understand the following essential knowledge that
will be laid down in the succeeding pages. The topics presented in this section is taken
from the approved textbook of the course. Please note that you are not limited to
exclusively refer to the resources. Thus, you are expected to utilize other books, research
articles and other resources that are available in the university’s library e.g. ebrary,
search.proquest.com etc.

ORIGIN AND DEVELOPMENT OF SECURITY


There is no perfect or absolute security. Such a state of absolute security can
never be fully attained. The purpose of security is to make access so difficult that the
intruder will hesitate to attempt intrusion or to provide for the apprehension should he
be successful.

After World War 2, there was a tremendous influx of machineries and other
heavy equipment in the Philippines following the Reparation Act. Government owned
and controlled companies and their subsidiaries, as well as private commercial and
industrial firms could not provide adequate protection to these machineries through
their respective in – house personnel. Hence, they resorted to the used of contract
private watchman and security guards.

There is the unprecedented growth in the private security industry, chaotic


situation for there is no standard set of laws, rules and regulation. Each cities and
municipalities have its owned covering the business of private detective, watchmen
and security guards so they organized themselves into an association known as the
PADPAO.

9
Main objective is to lobby to the appropriate and competent authority for the
enactment of laws and regulation to standardize the organization, operation, business
of private detective, watchman and security guard agencies in the Philippines.

To introduce the concept of administrative fines based on the degree of


delinquencies committed in order for the chief PNP not to resort to the drastic action
of suspending or cancelling the operation of private security agencies.

To continue their business and earned revenues for the govt.

RA 6975, the DILG Act was established on December 13,1990. – created the
Civil Security Unit under the PNP to provide administrative services and general
supervision over the organization, business operation and activities of all organized
PDA, Watchman, PSA and CGF.
On 01 June 1969, Republic Act 5487 otherwise known as the “Private Security
Agency Law” was enacted making the Philippine Constabulary as the sole authority
to provide administrative services and general supervision over the management and
operations of all organize Private Security Agencies (PSAs), Company Guard Forces
(CGFs), Government Security Forces (GSFs) and their security guards. As such, the
control of Government Security Forces was removed from the NICA.
In 04 August 1969, a staff memo was issued by Headquarters, Philippine
Constabulary (HPC), organizing the Philippine Constabulary Security and
Investigation Agency Supervisory Office (PCSIASO) and later renamed to PC
Supervisory Office for Security and Investigation Agencies (PCSOSIA).
And pursuant to GO No. 404 dated 29 June 1970, the office was renamed to
PC Supervisory Unit for Security and Investigation Agencies (PCSUSIA).
Pursuant to Memorandum 07-S96 dated 31 May 1996 the Security Agencies
and Guards Supervision Division (SAGSD) was created as one division under the
Civil Security Group (CSG) to exercise supervisory authority and implement the Rules
and Regulations embodied in RA 5487.
On Sep 25, 2009, SAGSD was renamed as the Supervisory Office for
Security & Investigation Agencies (SOSIA) thru General Orders #DPL-09-10.
10
SECURITY

Is the state or condition of being secured; there is freedom from fear, harm,
danger, loss, destruction or damages.

The quality or state of being secure: as


a. freedom from danger;
b. freedom from fear or anxiety;
c. freedom from the prospect of being laid off.

TYPES OF SAFETY

◼ Normative safety – designed standards (size of stairs).


◼ Substantive Safety – real world safety history (windows, doors, sidewalks).
◼ Perceived Safety – Comfort of Users (traffic signals).

INDUSTRY
➢ The term denotes as serious or constant application to work or business
➢ A special branch of productive work, or the capital or workers employed in it.

INDUSTRIAL SECURITY
➢ Security measure applied to business industries or business providing
security to private individual, business enterprises or government industries.

MANAGEMENT
➢ The skillful use of means to accomplish a purpose
➢ Can be define as planning,, deciding or exercising of control and supervision
on some functions of the organization

INDUSTRIAL SECURITY MANAGEMENT


11
➢ The skillful handling of the security and safety measures of business
enterprises and industrial establishment.
Major Division of Industrial Security

Physical Security
• Are those measures taken to prevent physical access or entry to an
installation by unauthorized person.

Personnel Security
• It is applied to background check the background of person and the protection
of company personnel against potential harmful acts or condition.

Documents and Information Security


• Includes every measure designed to safeguard company document or
information against unauthorized disclosure.

KINDS SECURITY
◼ Human security or VIP Security
◼ School security
◼ Hotel security
◼ Bank security
◼ Mall security
◼ Aviation security
◼ There are other kinds of security

3 D’S OF SECURITY
The basic theory of any Security Program can be summed up in three words;
1. Denial – Takes the form of Physical barriers like fences, walls gates, locked
doors, watch dogs, etc. (When the access is denied, the thing or
area to be protected remains safe.)

12
2. Detection – Takes the form of guards and electronic devices.
3. Deterrence – This can be both physical and psychological.

Republic Act 5487


RULE I DECLARATION OF POLICY

SECTION 1. Scope. The organization, operation, business and activities of


private watchman/security or detective agencies, security training
institutions/systems as well as private security and training personnel shall be
governed by these Rules and Regulations implementing Republic Act 5487, as
amended.

SECTION 2. License Necessary.


a. No person shall engage in the business of or act as a private detective
agency or engage in the occupation, calling or employment of security
personnel or in the business of private security/training agency without first
having obtained the permit from the Chief of the Philippine National Police
which permit as approved is prerequisite in obtaining a license certificate.
b. License is likewise necessary for any person operating, managing,
directing or conducting a licensed private security/detective/training agency.
Any person having any participation in the management or operation thereof
except those employed solely for clerical or manual work, shall also secure a
license.

SECTION 3. Training Required. All applicants for license certificate shall have
received the appropriate training from any public or private training
institution/system duly recognized by the government to conduct private
security or police training.

13
SECTION 4. Prohibitions. No License certificate shall be granted to any
applicant for license to operate or license to exercise security profession with
the following disqualifications:
a. having previous record of any conviction of any crime;
b. having previous record of any conviction of any offense involving
moral turpitude;
c. having been dishonorably discharged or separated from employment
or service;
d. being a mental incompetent;
e. being a user/addicted to the use of prohibited drugs or narcotics;
f. being a habitual drunkard; and
g. dummy of a foreigner RULE

RULE II PENAL PROVISION

SECTION 1. Without prejudice to the imposition of criminal sanctions, any violation of


Republic Act 5487, as amended or its rule or regulation, by license grantees likewise
pursuant thereof, shall be punished by suspension, or fine, or cancellation of his or its
license to operate, conduct, direct or manage a private detective, watchman or security
guard agency and all its members, or penalized pursuant to provisions herein under,
and/or with the forfeiture of its bond filed with the Philippine National Police, at the
discretion of the Chief. PNP.

SECTION 2.
a. Any person not covered by Section 1, Rule II above who commits any act in
violation of Republic Act 5487 as amended and its implementing rules and regulations
shall, on conviction thereof, suffer imprisonment of from ten to fifteen years, and a fine
of not less than ten thousand pesos nor more than fifteen thousand pesos as the Court
may direct.

14
b. If the violation is committed by those persons mentioned in Section 3b, Rule
IV herein under, the penalty shall be imprisonment ranging from one to four years and
a fine ranging from one to four thousand pesos at the discretion of the Court.

SECTION 3. Expired License. For purposes of enforcing sanctions, any private


security, watchman or company guard force agency or private security or training
personnel upon expiration of their respective license to operate or license to exercise
security profession are considered as not possessing license and shall be held
criminally and administratively liable.

RULE III DEFINITION OF TERMS

SECTION 1. Definition – For purposes of and when used in these rules and
regulations, the following terms shall be construed in the sense indicated herein unless
the context of a particular section clearly indicates that a different sense is intended:
a. Person – shall include not only natural but also juridical persons such as
single proprietorships, partnerships, corporations, companies or associations, duly
organized and registered with the Securities and Exchange Commission and/or the
Department of Trade and Industry.
b. Private Security Services – shall include the act of providing or rendering
services to watch an establishment whether public or private, building, compound/area
or property, to conduct access control/denial in any form whether physically, manually
or scientifically by electronic monitoring systems, for the purpose of securing such
area/property and at the same time ensuring safety and protection of persons within
such areas, to maintain peace and order within such areas, to conduct private security
training, and/or to conduct investigation. It shall also include the act of contracting,
recruiting, training, furnishing or posting any security guard, to do its functions or solicit
individuals, businesses, firms, or private, public or government-owned or controlled
corporations to engage his/its service or those of his/its security guards, for hire,
commission or compensation thru subscription or as a consultant/trainer to any private
or public corporation.

15
c. Private Detective Services – shall include among others the act of providing
personal security protection, inquiry and information gathering, pre-employment
verification and individual background profiling, providing assistance in civil liability and
personal injury cases, insurance claims and fraud, child custody and protection cases,
for the purpose of assisting in gathering information leading to determination and/or
prevention of criminal acts and/or resolution of legal, financial and personal problems.
d. Private Security Industry – shall cover those in the legitimate business of
providing private security and detective services.
e. Private Security Guard (SG) – sometimes called private security guard or
watchman shall include any person who offers or renders personal service to watch or
secure either a residence, business establishment, or buildings, compounds, areas, or
property, inspects/monitors bodily checks/searches individuals and/or baggage and
other forms of security inspection, physically/manually or scientifically electronic,
including but not limited to, logging concessions and agricultural, mining or pasture
lands, transportation, for hire or compensation , or as an employee thereof, including
any employee of the national or local governments or agencies or instrumentality’s
thereof and or government owned or controlled firm or corporations who is employed
to watch or secure government buildings, compounds, premises and other properties,
other than members of the Armed Forces of the Philippines, guards of the Bureau of
Jail management and Penology, Municipal or City jail guards, and members of the
Philippine National Police or of any other law enforcement agency of the Government.
f. Private Detective (PD) – shall mean any person who does detective work
for hire, reward or commission, other than members of the Armed Forces of the
Philippines, guards of the Bureau of Jail Management and Penology, municipal or city
jail guards, and members of the Philippine National Police or of any other law
enforcement agency of the government.
g. Private Security Personnel – shall be natural persons which include private
security guards, private detectives, security consultants, security officers and others
that may be classified later, rendering/performing security and/or detective services as
employed by private security agencies and/or private firms.
h. Government Security Personnel – shall be natural persons which include
government security guards, detectives, security consultants, security officers and
16
others that may be classified later, except those of the Armed Forces of the
Philippines, Philippine National Police, Bureau of Jail Management and Penology,
Municipal or City Jail guards rendering/performing security and/or detective services
as employed by government entities.
i. Private Security Agency (PSA) – shall mean any person association,
partnership, firm or private corporation, who contracts, recruits, trains, furnishes or
posts any security guard, to perform its functions or solicit individuals, businesses,
firms, or private, public or government-owned or controlled corporations to engage
his/its service or those of his/its security guards, for hire, commission or compensation
thru subscription or as a consultant/trainer to any private or public corporation whose
business or transactions involve national security or interest like the operation and/or
management of domestic or ocean vessels, airplanes, helicopters, seaports, airports
heliports, landing strips etc., or as consultant on any security related matter, or to
provide highly specialized security, detective and investigation services like gangway
security, catering security, passenger profiling, baggage examination, providing
security on board vessels or aircraft, or other security needs that PNP SAGSD may
approve.
j. Private Detective Agency (PDA) – shall mean any person association,
partnership, firm or private corporation, who contracts, recruits, trains, furnishes or
posts any private detective, to perform its functions or solicit individuals, businesses,
firms, or private, public or government-owned or controlled corporations to engage
his/its service or those of his/its detectives, for hire, commission or compensation thru
subscription or as a consultant/trainer to any private or public corporation or as
consultant on any detective related matter, or to provide highly specialized detective
and investigation services, or other detective needs that SAGSDCSG may approve.
k. License to Exercise Profession – shall mean any document issued by the
Chief, Philippine National Police or his duly authorized representative recognizing a
person to be qualified to perform his duties as private security or training personnel.
l. License to Operate (LTO) – is a License Certificate document, issued by the
Chief, Philippine National Police or his duly authorized representative, authorizing a
person to engage in employing security guard or detective, or a juridical person to
establish, engage, direct, manage or operate an individual or a private detective
17
agency or private security agency/company security force after payment of the
prescribed dues or fees as provided in these Rules and Regulations. m. Company
Guard Force (CGF) – a security force maintained and operated by any private
company/corporation utilizing any of its employees to watch, secure or guard its
business establishment premises, compound or properties.
n. Government Guard Unit (GGU) – a security unit maintained and operated
by any government entity other than military or police, which is established and
maintained for the purpose of securing the office or compound and/or extension of
such government entity.
o. PNP as used herein shall mean the Philippine National Police, which was
organized pursuant to the provision of RA 6975 otherwise known as the National
Police Act of 1991.
p. SAGSD as used herein shall refer to the current PNP Civil Security Group
Security Agency and Guard Supervision Division or any other PNP Office that may be
designated later as the primary office for supervision of the implementation of these
rules and regulations.
q. PADPAO refers to the Philippines Association of Detective and Protective
Agency Operators, Inc., which is an association of all licensed security agencies and
company security forces.
r. Duty Detail Order is a written order/schedule issued by a superior officer
usually the private security agency/branch manager or operations officer assigning the
performance of private security/detective services duties.

Self-Help: You can also refer to the sources below to help you further
understand the lesson:

Reference:
• Bobier (2016). Industrial Security Management. Chapterhouse Publishing.
Quezon City
• Ajero J M (2014) Industrial and corporate security management. Quezon City
:Wiseman's Books Trading
• Badua, J. (2016). Police personnel and records management. (2nd ed).
Wiseman's Books Trading. Quezon City :

18
• Corpus, W.M. &Delizo, DB. (2011). Industrial Security Management.
Wiseman’s Books Trading Inc. Quezon City
• Guevara, R. (2015). Police organization and administration with police
planning. (2nd ed.) Wiseman's Books Trading. Quezon City.
• Noll, G. (2014). Hazardous materials: managing the incident. (4th ed).
Burlington, MA : Jones & Bartlett Learning
• Peckley M F, (2012) Security officers and guards manual (in relation to RA.5487
as amended): with special topic on school security management. Quezon City:
Wiseman's Books Trading, Inc.

Lets check
Activity 1. Read each statement or question below carefully and fill in the blank(s)
with the correct answer
1. Law protecting the rights of all Private Security Agency.
2. It refers to a state or condition which is free from harm, injury,
destruction, intimidation or fear.
3. The law authorizing the PNP the control and supervision of the
security agencies in the Philippines.
4. Association of all licensed security agencies and company security
forces.
5. A person who does detective work for hire, reward or commission.
6. A legitimate business of providing private security and detective
services.
7. One of the security division concerned more about measures to take
In order to prevent physical access or entry to an installation by
unauthorized person.
8. Security measure applied to business industries or business providing
security to private individual, business enterprises or government
industries.
9. A special branch of productive work, or the capital or workers
employed in it.
10. is a written order/schedule issued by a superior officer usually the
private security agency/branch manager or operations officer assigning
the performance of private security/detective services duties.

LET’S ANALYZE

Activity 1. Getting familiar with the essential terms and history in the study of
industrial security is not enough, what also matters is you need to explain it also the
importance. In this activity you are required to explain thoroughly your answer.

1. How important is the security or safety in your life, and when can we consider that
security or safety really exist?

19
.

2. Explain the complementary roles of major division of security.

20
.
Activity 2. Based on what you had read on the topics presented you are required to
write a reflection on your understanding on the principles of security. Your reflection
must utilize all the lines provided below.

21
Activity 3. Discuss the importance of the three major division of security in relation to
crime solution and prevention and control. Use bullet style for the answers.

3 I’s Importance Pros Cons

Physical Security

Personnel
Security

Document
Security

22
IN A NUTSHELL
Activity 1. “Security is everybody’s business”. The study of industrial security
management is indeed needed to provide necessary skills and competence not only
in the field of security profession but also in our daily lives.
Based from the definition of the most essential terms in the study of industrial
security management, please feel free to write your lessons learned below. I have
indicated my lessons learned.

1. Security is a necessity to everyone, absence of this surely we will have a hard


times dealing our daily activity.
2. Industrial security helps the economy, by protecting every establishment or
institution.

Your Turn
3.

4.

5.

Activity 2. The security, despite many risk or hazards encountered in every


establishment or institution, has taken and continues to take concrete steps to promote
a hazard free work place. In this part, you are required to discuss further the three (3)
types of safety in industrial security.

1.

23
.

2.

3.

What are the important insight you had learned from this section?

24
.

Q&A LIST. This part allows you to list down all rising questions or issues. These
questions or issues will be raised in the Blackboard discussion feature. You can write
your answers after the clarification. This will help you in the review of concepts and
essential knowledge.

Questions/Issues Answer

KEYWORDS INDEX

▪ PNP SOSIA ▪ Duty Detail Order

▪ PADPAO ▪ License to Operate

▪ Private Security Guard ▪ License to Exercise Profession

▪ Security ▪ Private Security Agency

▪ Documents and
▪ Private Security Services
Information

▪ Physical Security ▪ Personnel Security

▪ INDUSTRIAL SECURITY ▪ Firearms and Explosives Office

25
▪ SAFETY ▪ Private Detective Agency

▪ Private Detective Services ▪ Government Guard Unit

▪ Private Security Personnel ▪ Physical Security

▪ Document Security ▪ Personnel Interview

Big Picture in Focus: ULOb. Discuss relevant technology as barrier in security


management operation, and well define physical security for the protection of lives
and property.

METALANGUAGE
For you to demonstrate ULOb, you will need to have an operational
understanding of the following terms below. Please note that you will also be required
to refer to the previous definitions found in ULOa section.
SECURITY DEVICE. A security device fitted to property, especially a house or
car, to make a warning sound if a break – in or theft is attempted.
INTRUSION DETECTION. Designed to alert security personnel to consummated
or attempted intrusion into an area, building or compound. It can be electrical,
mechanical or electronics.
ALARM. An aural or visual signal given by the annunciator to security when
intruder activates device in a protected area.
DOPPLER EFFECT. A physical phenomenon that causes frequency shift if an
objects move in the area permeated by radio frequency signals. This change in
a certain type of alarms activates a signalling unit.
FAIL SAFE. A term applied to a device or system that in the event of failure of a
component the incapacity will be signalled.

26
DURESS CODE. A type of code system so that security personnel when forced
by armed men enter an installation can give alarm by the use of certain words in
casual conversation with other personnel in the installation.
FIRE. The heat and light that comes from burning substances produced by the
combustion of substances.
PETERMAN. An English term used to describe a lock picker.
PRIVATE DETECTIVE. Refers to any person who does detective work for hire
reward or commission other than member of military or any Law Enforcement
Unit
CONTROLLED AREA. An area near the adjacent to limited or exclusive areas
where entry is restricted.
COVERAGE FACTOR. The minimum number of directions from which each
point in the area should be lighted depending upon the use of the area.
EXCLUSION AREA. A restricted area containing materials or operation of
security interest.
ACCEST LIST. An authenticated list personnel given to security guard allowing
entry to compound or installation or part thereof.
BLACKLIST. A list or organizations that have incurred disapproval or suspicion
or are to be boycotted or otherwise penalized.
o A blacklist is a list or register of person who, for one reason or another, are being
denied a particular privilege, service, mobility, access or recognition.
WHITELIST. A whitelist or approved list is a register of entities that, for one
reason or another, are being provided a particular privilege, service, mobility,
access, or recognition.
Important terms
PASS SYSYTEM. A method used by security to screen visitors or person
admitted into building premises.
BADGE SYSTEM. A system for personnel movement and control whereby
badges or identification are issued to personnel upon entering and an installation.
Visitors are also issued temporary badges when entering the installation.

27
CONTROLLING. The regulation of many different aspects of business activity,
controls are needed to standardized equality and performance, protect assets,
measures performance, balance plans and programs and motivate individuals.
VISITOR. Person not regularly employed in a plant.
RESTRICTED AREA. Any area access to which is subject to special restriction
control.

ESSENTIAL KNOWLEDGE
Before proceeding further with the industrial security management, there are
several preparations that must be done first. You need to know more the physical
security, perimeter barrier security lighting, protective alarms, fire alarms, Protective
locks, key control and Protective cabinets. The topics presented from this chapter was
taken from the approved textbook of the course. Please note that you are not limited
to exclusively refer to the resources. Thus, you are expected to utilize other books,
research articles and other resources that are available in the university’s library e.g.
ebrary, search.proquest.com etc.

PHYSICAL SECURITY
This concern with the physical measures (gates, windows, fences etc.) adapted
to prevent unauthorized access to an installation.

Broadest type of security

PRINCIPLE OF PHYSICAL SECURITY

➢ Enemy agent must access


➢ There is No Impenetrable Barrier
➢ Defense in depth means barrier after barrier
➢ Surreptitious versus non-surreptitious entry
➢ Each installation is different

28
Elements of Physical Security
1. Obstacles – can be placed in the way of potential attackers and sites can
be hardened against accidents and environmental disasters.
2. Surveillance and alarm can be put in place, such as lighting, sensors,
smoke detector, and cameras.
3. Security response can be implemented to apprehend the intruder and to
recover quickly from accidents, fires, or natural disasters.

BARRIER
Is any specific structure that is capable of restricting, deterring delaying or
preventing illegal and unauthorized access to an installation.

NATURAL BARRIER
• These are offered by nature which could obstruct or delay the passage way of
potential intruders.
• These also refers to natural structures that serve as deterrent or obstruction to
intruders.

MAN-MADE BARRIERS
• These are structural constructions like fences, walls, roofs, grills, bars,
roadblocks, or other physical means to deter or impede penetration.

WHAT IS ACTIVE MEASURES?


Physical barriers, security lightings, use of vaults, locks and others.

WHAT IS PASSIVE MEASURES?


Are those that will stop a man from committing such acts for fear of being

29
caught, charged in court , or get dismissed.

SPECIFIC TYPES OF PHYSICAL SECURITY BARRIERS

1. Natural barriers

2. Human barriers

3. Animal barriers

30
4. Energy barriers

5. Perimeter Barrier

TYPES OF CONTROLLED AREAS

1. Controlled Areas – Are those areas where access is restricted as to


entrance or movement by all authorized personnel and vehicles. It should additionally
marked by a fence or other barrier, and access to it should limited to as few guest as
possible;
2. Limited Areas – Are those within the controlled area where a greater degree
of security is required.
3. Exclusion Areas – Are used only for handling and storage of high value
cargo and classified documents. The number of people authorized to enter this area
should be strictly limited, and the area should always be under surveillance .

LEVEL OF PHYSICAL SECURITY

• Minimum Security

31
• Is a system designed to impede unauthorized external activity such as
simple intrusion to arm attack.

• Low Level Security


• Is a system designed to impede some unauthorized external activity
such on small retail store, storage, warehouses.

• Medium Security
• Designed to impede, detect and assess most external activity and some
unauthorized internal activity that range from simple shoplifting to
conspiracy to commit sabotage. This includes:
• Use of advance intrusion alarm system
• Establishment of perimeter and perimeter barriers; and
• Use of unarmed guard.

• High Level Security

• Is designed to impede, detect and assess most unauthorized external


and internal activities of certain prisons, defense contractors,
pharmaceutical companies and sophisticated electronic manufactures.
This include the utilization of the following:
• Close Circuit Television (CCTV)
• Perimeter alarm system
• High security lighting
• Highly trained armed guards
• Control design; and
• Coordination with local law enforcement agencies.

• Maximum Security
• Includes application of the following:
32
• Sophisticated alarm system; and
• On-site response force

LINE OF PHYSICAL DEFENSE


Security managers and security personnel also consider the various lines of defense
that could delay or stop intruders.

1st Line of Defense

2nd Line of Defense

3rd Line of Defense

PERIMETER BARRIER

33
A medium or structure which defines the physical limits of an installation or
area to restrict or impede access thereto.

PERIMETER BARRIER OPENING (insert picture only)


Windows
Gates
Doors
Clear Zone
Sewers

1. Gates and Doors – When not in use and controlled by guards, gates and doors in
the perimeter should be locked and frequently inspected by guards. Lock should be
changed from time to time and should be covered under protective locks and key
control.
2. Side-walk-elevators – These provide access to areas within the perimeter barrier
and should be locked and guarded.
3. Utilities Opening – sewers, air intakes, exhaust tunnels and other utility openings
which penetrate the barrier and which have cross sectional areas of 96 square inches
or more should be protected by bars, grills, water filled traps or other structural means
providing equivalent protection to that portion of the perimeter barriers.

4 Clear Zones – an obstructed area or a “clear zone” should be maintained on both


sides of the perimeter barrier. A clear zone of 20 feet or more is desirable between the
barriers and exterior structures and natural covers that may provide concealment for
assistance to a person seeking unauthorized entry.

TYPES OF PERIMETER BARRIERS

1. Wire Fences – are independent structures designed to control physical and visual
access between outside areas.
2. Building Wall – Masonry wall should have the same height as the chain link and
surrounded by the barbed wire top guard.

34
3. Bodies of Water – additional security measures is necessary.

TWO TYPES OF FENCES:


➢ Solid fence
➢ bricks, stone , and concrete(way that visual access is denied), minimum
height of which is 7 feet.

➢ Full-view fence
➢ wire fence (a manner that visual access is permitted), however primarily
designed for control or physical access into a facility, it includes chain
links, barbed-wire and concertina wire.
(chain link with mesh opening not larger than 2 square inch and made of
No. 9 gauge wire or heavier, minimum height of which is 7 feet.)

ADDITIONAL PROTECTIVE MEASURES


1. Top Guard – an additional overhang of barbed wire placed on vertical
perimeter fences upward and outward with a 45 degree angle with 3 to 4 strands
of barbed wire spaced 6 inches apart.
2. Towers – “guard towers” are house-like structures above the perimeter
barriers.
3. Protection In Depth – in large open areas of ground where fencing or walling
is impracticable and expensive, warning signs should be conspicuously placed.
4. Sign and Notice – “control sign” should be erected where necessary in the
management of unauthorized ingress, and preclude accidental entry.
5. Guard Control Stations – this is normally provided at main perimeter
entrances to secure areas located out-of-doors, and manned by guards on full-
time basis. Sentry station should be near a perimeter for surveillance at the
entrance.

35
6. Barrier Maintenance – Fencing barriers and protective walls should always
be regularly inspected by security. Any sign or attempts to break in should be
reported for investigation. Destruction of fence or sections thereof should be
repaired immediately and guard vigilance should be increased.

PERIMETER GUARDS
Also employed in augmenting the existing perimeter security or perimeter
barriers of a certain establishment.

The (2) types of employing perimeter guards are:


Fixed Post
➢ Security guards are assigned in a particular place of the compound to guard
and watch the area surrounding; and
Patrol (Roving)
➢ In this system, the security guard is required to walk and go around regularly
around the company premises.

SECURITY LIGHTING

Basic concepts of security or protective lighting.


Protective lighting provides a means of continuing illumination during light of
darkness, a degree of protection that is maintained durinng daylight hours. This
safeguard also has considerable value as a deterrent to thieves and vandals and may
make the job of the saboteur more difficut.
The system must be reliable and designed with overlapping illumination to avoid
creating unprotected area in the event of individual light failure.

Basic requirements
1. Protective or security lighting needs at installations and facilities depends upon
each situations and the areas to be protected.
2. When such lighting provisions are impracticable, additional security post,
patrols , sentry dog patrols, or other security means will be neccessary.
36
3. Protective lighting should not be used as a psychological deterrent only.
4. Protective lighting maybe is protected by a central alarm system. Areas or
structures within the premeter , which are under specific observation.

Characteristics of protective lightings


1. Protective lighting usually requires less intensity than working light, exept for
identification and inspection at authorized portals and in emergencies.
2. Lightings needed may vary because each area of an installations or facility
presents its particular problems based on physical layout terrain, atmospheric
and clamatic conditions, and the protective requirement.
3. The data available from the manufacturers of the light equipment which will
assist in designing a lighting system.

AREAS TO BE LIGHTED
o Vehicular gate o Sensitive area
o Pedestrian gate o Storage area
o Thoroughfare o Perimeter fence
o Parking area

Protective lightings significant to security forces

1. Reduction of the need for security forces.


2. Personal protection for forces by reducing the advantage of concealment and
surprise for a determined intruder.
3. Relieved security forces could be used to better advantage elsewhere.

TYPES OF SECURITY LIGHTINGS


1. Stand-by lighting- similar to continuous lighting but in turned on manually or by
special device or other automatic means, when there is suspiction of entry.

2. Movable Lighting- consists of stationary or portable, manually opered search


lights which may be lighted continuously during hours of darkness or only as needed,
and usually supplementary to either of the first 2 types.

3. Emergency Lighting- a stand-by lighting which can be utilized in the event of


electrical failure, either due to lacal equipment or commercial power failure.

GENERAL TYPES OF LIGHTING SOURCES

1. Incandescent Lights- low initial cost and provide good color rendition.
2. Mercury Vapor Lamps- emit a purplish-white color caused by an electric current
passing through a tube of conducting and luminous gas.
3. Metal Halide- similar in physical appearance to mercury vapor, but provides a light
source of higher luminous efficiency and better color rendition.
4. Fluorescent Lamp- provides good color rendition. However, it cannot project light
over long distances.
5. High-pressure Sodium Vapor- introduce in 1965, for exterior lighting of parking
areas, roadways, bulidings, and industrial and commercial installation.
6. Low-pressure Sodium Vapor- produces yellow color.
7. Quartz Lamps- very bright ight.

TYPES OF LIGHTING EQUIPMENT

1. Floodlights- are used for outdoor security lighting including the illumination of
boundaries, fences, and buildings.
2. Street Lights- produce diffused light rather than directional beam. They are
widely use in prking areas.
3. Searchlights- are incandescent lights that provide a type of crime-related
lighting system.
PROTECTIVE ALARM
• It assists the security in detecting, impeding or deterring potential
security threat in the installation.
• To alert the security personnel for any attempt of intrusion into a
protected area, building or compound.

THREE BASIC PARTS OF ALARM SYSTEM


• Sensor or trigger device – a device that is designed to respond to a certain
change in conditions, movement within a room, or rapid rise in heat.
• Transmission line – a device that sends a signal about whatever is sensed
to some other location. This may be done via an electrical circuit that transmits
the alarm signal over a telephone, fiber optics lines, or through air waves.
• Enunciator/annunciator - a device that alerts someone that the sensor has
detected a change in conditions. The device may be light, a bell, a horn, a self-
dialing phone, or a punch tape.

Purposes of intrusion detection alarm systems are:

• To economize
• To substitute in place of other security measures.
• To supplement by providing additional controls.

THE BASIC PRINCIPLES OF OPERATION OF INTRUSION DETECTION SYSTEMS ARE:


➢ Breaking an electric circuit.
➢ Interrupting a light beam.
➢ Detecting sound.
➢ Detecting vibration.
➢ Detecting a change in capacitance due to penetration of an
electrostatic field.

39
TYPES OF PROTECTIVE ALARM SYSTEM

1. Central Station System – a type of alarm where the control station is located
outside the plant or installation. When the alarm is sounded or actuated by subscriber,
the central station notifies the police and other public safety agencies.

2. Proprietary system – centralized monitor of the proprietary alarm system is in the


industrial firm itself with a duty operator. In case of alarm, the duty operator calls
whatever is the primary need; firefighters, police, an ambulance or a bomb disposal
unit.
3. Local Alarm – this system consist of ringing up a visual or audible alarm near the
object to be protected. When an intruder tries to pry a window, the alarm thereat goes
off.

4. Auxiliary alarm – company-owned alarm systems with a unit in the nearest police
station so that in case of need, direct call is possible. The company maintains the
equipment and lines both for the company and those in the police, fire and other
emergency agencies by special arrangement. The auxiliary system can be availed of
by radio, landlines, or cell phones.

KINDS OF ALARMS

1. Audio Detection Device – it will detect any sound caused by attempted force entry.
A supersonic microphone speaker sensor is installed in walls, ceilings and floors of
the protected area.
2. Vibration Detection Device – it will detect any vibration caused by attempted force
entry. A vibration sensitive sensor is attached to walls, ceilings or floors of the
protected area. This is economical and easily installed, high salvage value, and flexible
in application.
3. Metallic foil or wire – it will detect any action that moves that foil or wire. An
electrically charge strips of tinfoil or wire is used in the doors, windows or glass
surfaces of the protected area. This is consistent trouble free service, and causes few
nuisance alarms.
4. Laser Beam Alarm – a laser emitter floods a wall or fencing with a beam so that
when this beam is disturbed by a physical object, an alarm is activated.
5. Photoelectric or Electric Eye Device – an invisible/visible beam is emitted and
when this is disturbed or when an intruder break contact with the beam, it will activate
the alarm.
6. Microwave Motion Detection Device – A pattern of radio waves is transmitted and
partially reflected back to an antenna. If they strike a moving object, they return at a
different frequency which results in initiating an alarm signal. Very effective for
protection of interior areas. This have a good Coverage, and Not affected by air
currents noise sound.

OTHER TYPES OF PROTECTIVE ALARM (COMMONLY USED BY BANKS)

What is Foot Rail Activator?


Foot rail activators are place on the floor in such a position that tellers may activate
the alarm by placing the front of their foot to engage the activation bar.

What is Bill Traps?

Bill traps or currency activation devices are usually place in the teller’s cash drawer
and connected to the alarm system using a wire connector. When currency is removed
from the devices, the alarm is activated.

What is Knee or Thigh Buttons?


These are installed inside the desk or teller station which can be activated by knee or
thigh pressure. They are commonly found in location where personnel usually perform
their duties from seated position.
What is Double Squeeze Buttons?
Required pressure on both side of the device and therefore the probability of accidental
alarm is reduce.

41
FIRE ALARM SYSTEM
A devices working together to detect and warn people through visual and audio
appliances when smoke, fire, carbon monoxide or other emergencies are present.
These alarms may be activated automatically from smoke detectors, and heat
detectors or may also be activated via manual fire alarm activation devices such as
manual call points or pull stations.

PASSIVE FIRE PROTECTION (PFP)


An integral component of the components of structural fire protection and fire
safety in a building. PFP attempts to contain fires or slow the spread, such as by fire-
resistant walls, floors, and doors. PFP systems must comply with the associated listing
and approval use and compliance in order to provide the effectiveness expected by
building codes.

FIRE PROTECTION
◦ Automatic Sprinkler – type of built-in sprinkler which works by the increase of
room temperature and which automatically operates the system to put out the fire.

◦ Fire Pump – mechanical device of supplying water which can be manual or motor driven.

42
◦ Stand Pipes – GI steel or plastic pipes located inside the building from the lowest
to the top floor with water under pressure for use in case of fire.
◦ Fire Hydrant – mechanical device strategically located in an installation or street
where a fire hose is connected so that water with pressure will be available to
extinguish a fire.
◦ Portable Hand Extinguisher – a fire fighting equipment which can be portable or
in a cart that is used to put out fire depending on the contents to extinguish certain
types of fires
◦ FIRSTS" IN DEVELOPMENT OF LOCKS
◦ The first mechanical locks, made of wood, were probably created by a number of
civilizations at the same time. Records show them in use some 4,000 years ago in
Egypt. Fastened vertically on the door post, the wooden lock contained moveable
pins or "pin tumblers," that dropped by gravity into openings in the cross piece or
"bolt," and locked the door. It was operated by a wooden key with pegs or prongs
that raised the number of tumblers sufficiently to clear the bolt so that it could be
pulled back. This method of locking was the forerunner of modern pin tumbler locks.

BASIC CONCEPT OF PROTECTIVE LOCKS


AND KEY CONTROL
• Locks are the cheapest security investment that can be made.
• Locking device is simply a mechanism that extends the door or window into a
wall that hold destructible, the lock cannot be effective.

◦ LOCK – A mechanical, electrical, hydraulic or electronic device to prevent entry into


a building, room, container and to prevent removal of items without the consent of
the owner.
KEY – maybe defined as:
➢ An instrument for locking and unlocking; a metal bar with notches and
grooves.

43

➢ A door or lock opener: a device such as a plastic card with an encoded magnetic
strip that operates a door or lock.

PADLOCK – A portable and detachable lock having a sliding hasp which passes
through a staple ring or the like and is then made fast or secured.

TYPES OF LOCKS
WARDED LOCK – The underlying principle is the incorporation of wards or obstruction
inside the lock to prohibit a key from operating bolt unless the key has corresponding
notches cut in it do that it will pass the wards. Warden locks very little security. This
type of lock must therefore be used only to have privacy but not to provide a high
degree of security.

DISC TUMBLER LOCKS - These are also known as wafer locks. They have flat metal
have flat metal tumblers with open center fitted into slots in a plug that is in turn fitted
into a lock case. When the plug is turned, it activates a cam. The key is removable at
90 to 80 degrees and may be rotated either right or left.

LEVER TUMBLER LOCK – Each lever in the lock hinges on a fixed point and is held
down against a stop by the pressure of a flat springs. Each lever has as cut in it, and
all the gates can be located at different places.

PIN TUMBLER LOCKS – The pin tumbler mechanism depends for its security, and
several round pin or tumblers operating on a cylinder. Each tumbler pin is divided into
two parts, the upper which is flat on bolt, is called the driver; the bottom part called the
pin is rounded or slightly pointed on the lower end to fit the grooves or cuts in the key.

44
OTHER TYPES OF LOCKS

COMBINATION LOCKS – Are difficult to defeat, since they cannot be picked because
few experts can manipulate the devise to discover the combination. Most of this locks
have three dials which must be aligned in the proper order before the locks will open.
Some locks may have four dials for greater security.

CODE OPERATED LOCKS – Type locks and that no keys and that no key is used.
Pressing series of numbered button in the proper sequence opens them. Some of
them are equipped to alarm if wrong sequence is pressed.

ELECTROMAGNETIC LOCKS –Devices holding a door by magnetism. These


electrical units consisting of the electromagnetic on metal holding sequence. When
the power is secured on the door, they will resist pressure of up to 100 pounds.

CARD OPERATED LOCKS – Are electronically or more usually magnetic. Coded


card notched, embossed or containing an embedded patter of copper locks are used
to operate such locks. These are frequently fitted with a recording device, which
registers time of used and the identity of the user.

KEY CONTROL
KEY CABINET- A CABINET will have to be of enough size to hold the original key to
every lock in the system. It should always be locked.
KEY RECORDS - Some administrative means must be set up to record code number
of lucks and to whom the keys of a specific locks was issued.
INVENTORIES - Periodic account must be made of all duplicates and original keys in
the hands of the employees whom they have been issued.
MASTER KEYING SYSTEM - It is a system used in big installations whereby keys
can open a group or groups of locks. This is possible using interchangeable cylinder
cores in the locks. Using locks with the same key in a facility is not master.

45
TYPES OF KEYS
Change keys-is a specific key which operates the locks and has a combination of
cuts, or batting, which match the tumbler of the tumblers in the lock.

Sub-master Key - is a key that could open all the locks within the particular area or
grouping in the particular facility.
Grand master key-is a type of key that will open everything in a system involving two
or more master key groups.
3 LEVEL OF CONTROL IN MASTER KEYING PLAN
One level-change key: all locks operated by change key only and keyed different or
required.
Two level-MASTER key: all levels operated by change keys and master key. Master
key operates all locks generally of one building.
Three-level-grand master key: operates all locks generally used in large building or
a facility with several building.
Four level-great grand master key: all locks operated by change key. Grand master
keys and great grand master keys are used in great grand master keys are used in
great or large complex system and like 3 level.
Five level-great grand master key: all locks operated by change key , master key,
grand master key, and great grand master key.

POINTERS FOR EFFECTIVE LOCKS AND KEY CONTROL


• RECORDS- of all keys issued and names of holder should be meticulously
made regardless of the size of the establishment.
• Storage- Duplicate or spare keys should be stored in a securely locked cabinet
in a secure area.
• Master key-should be issued on an absolute minimum number be issued but
kept by an individual responsible for locks and keys.
• Regular checks-should be made in employees with keys, issued.
• Issuance of key and locks-should be carefully controlled, and issuance should
be on a real needing process.
• Periodic re-keying-should be considered as essential security safeguard just
as combination of safes are changed from time to time.
46
• A key depository-should be provided in a big plant. Supervisor taking keys
should register in a registry book.
Note:
STATUTORY PROHIBITION OF KEY:
ART. 304. Possession of Picklocks or similar tools
Any person who shall without lawful cause have in possession of picklocks or
similar tools especially to the commission of the crime or robbery , shall be punished
by arresto mayor in its maximum period to prison correccional in its minimum period
The same penalty shall be imposed upon any person who shall make such tool.
If the offender is a locksmith, shall suffer the penalty of prison correccional in its
medium and maximum period.
ART. 305. False Key:
The term “False Key” shall be deemed to include:
a. The tool mentioned in the next proceeding articles.
b. Genuine keys stolen from the owner.
c. Any key other than those intended by the owner for use in the lock
forcibly opened by the offender.

OTHER PROTECTIVE CONTAINERS


The final line of defense at any facility is in the high security storage where
papers, records, plans or cashable instrument, precious metals or other especially
valuable assets are protected. These security containers will be of a size and quantity,
which the nature of the business dictates.
3 TYPES OF SECURITY CABINET
1. Safe – a metallic container used for the safekeeping of documents or small items in
an office or installation. Safe can be classified as either robbery or burglary resistance
depending upon the use and need.
- Weight must be at least 750 lbs. and should anchored to a building structure.
- It’s body should at least one inch thick steel.
2. Vault – heavily constructed fire and burglar resistance container usually a part of
the building structure used to keep and protect cash, documents and negotiable
instruments. Vaults are bigger than safe but smaller than a file room.
48
-the vault door should be made of steel at least 6 inches in thickness.
-the vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
-the vault must be resistive up to 6 hours.
3. File room – a cubicle in a building constructed a little lighter than a vault but of
bigger size to accommodate limited people to work on the records inside.
-file room must at most 12 feet high.
-it must have a water weight door and at least fire proof for one hour.

Reference
• Bobier (2016). Industrial Security Management. Chapterhouse Publishing.
Quezon City
• Ajero J M (2014) Industrial and corporate security management. Quezon City
:Wiseman's Books Trading
• Badua, J. (2016). Police personnel and records management. (2nd ed).
Wiseman's Books Trading. Quezon City :
• Corpus, W.M. &Delizo, DB. (2011). Industrial Security Management.
Wiseman’s Books Trading Inc. Quezon City
• Guevara, R. (2015). Police organization and administration with police
planning. (2nd ed.) Wiseman's Books Trading. Quezon City.
• Noll, G. (2014). Hazardous materials: managing the incident. (4th ed).
Burlington, MA : Jones & Bartlett Learning
• Peckley M F, (2012) Security officers and guards manual (in relation to RA.5487
as amended): with special topic on school security management. Quezon City:
Wiseman's Books Trading, Inc.

49
LET’S CHECK

Activity 1. Multiple Choice. Encircle the correct answer.

1. Refers to the aural and visual signal given by the enunciator to


security guard when intruder triggers the device in a protected area.
a. Protective alarm
b. Enunciator
c. Barriers
d. None of the forgoing
2. This type of protective alarm system is located outside the area of installation.
a. Auxiliary alarm system
b. Local alarm system
c. Propriety system
d. Central station system
3. This method of alarm in transmitting signal uses radio or cellular phone to
send messages either to the central station or police dispatch center.
a. Multiplex system
b. Radio signal transmission
c. Direct wire system
d. Circuit party system
4. Security lighting that focuses its intensity towards the position of the intruder
while the observer or guard remains in the comparative darkness.
a. Stand-by lighting
b. Movable lighting
c. Emergency lighting
d. Glare projection lighting
5. A type of security lighting similar to continuous lighting but turned on manually
or by special device or other automatic means.
a. Stand-by lighting
b. Movable lighting
c. Emergency lighting
d. Glare projection lighting
6. What type of lighting system is manually operated and usually consist of
stationary or portable search light which may be utilized during hours of
darkness.
a. Stand-by lighting
b. Movable lighting
c. Emergency lighting
d. Glare projection lighting
7. Refers to a mechanical, electrical, hydraulic or electronic device to prevent
entry into a building, room, container or hiding place and to prevent the
removal of items without the consent of the owner.
a. Key
b. Alarm device
c. Vault
d. Lock
8.
9. A portable and detachable lock having a sliding hasp which through a staple
ring or the like and is then made fast or secured.
a. Vault
b. Safe
c. Key
d. Padlock
10. English term for locker picker.
a. Peterpan
b. Pickerman
c. Intuder
d. Peterman

11. Refers to a metallic container used for safekeeping of small items; its weight
must be at least 750 lbs.
a. Safe
b. Vault
c. File room
d. Metal cabinet

LET’S ANALYZE

Activity 1. Based on what you had read on the topics presented you are required to
write a reflection on your understanding on the principle of physical security and
intrusion detection system. Your reflection must utilize all the lines provided below.

___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
____.

Activity 2. In maintaining security and safety to an institution or industry, many factors should
be considered especially the physical security of the industry. At this juncture, you will
ELABORATE the importance of each barrier and protective alarm.

1. Full-view fence
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
________________________________________________________.
50
2 Solid-view fences
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
________________________________________________________.

3 Clear zone
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
________________________________________________________.

4 Top guard
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
________________________________________________________.

5 Tower guard
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
________________________________________________________.

Activity 3. In maintaining a secure and safe industry physical security is one of the
right thing to invest, however, there are some unforeseen event that the physical
security are not enough. What should you do to solve the lacking effectiveness
physical security installed in the establishment?

___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Activity 4. In this activity you are required to list at least 3 kinds of alarms. Give the
advantages and disadvantages. Use bullet forms for your answers.

1. ________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
____________________________________________.

2. ________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
____________________________________________.

3. ________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
____________________________________________.

IN A NUTSHELL
Activity 1. Physical security is very important, and one of the most big division in the
Security. The study of Physical security is concerned about the prevention and
deterrence of intruders.
Based from the definition of the most essential terms in the study of industrial
security management, please feel free to write your lessons learned below.

1. ________________________________________________________________
_______________________________________________________________
2. ________________________________________________________________
_______________________________________________________________
3. ________________________________________________________________
________________________________________________________________
____________________________________________.

52
Activity 2. There are a lot of physical security barriers being utilized in the industry.
Select at least three types of barriers which you think considered as the most important
and must be utilized in any industry. Explain and discuss further your choices.
1. ________________________________________________________________
_______________________________________________________________
2. ________________________________________________________________
_______________________________________________________________
3. ________________________________________________________________
________________________________________________________________
____________________________________________.

Q&A LIST. This part allows you to list down all rising questions or issues. These
questions or issues will be raised in the Blackboard discussion feature. You can write
your answers after the clarification. This will help you in the review of concepts and
essential knowledge.

Questions/Issues Answer

KEYWORDS INDEX

Security Device Exclusion Area

Restricted Area Coverage Factor

Badge System Controlled Area

Pass System Duress Code

Whitelist Fail Safe.

Blacklist Doppler Effect

Access List Alarm

Picklocks Master Keying

54
Big Picture in Focus: ULOc. Explain the important provisions of RA 5487 and its IRR.

METALANGUAGE

Below are the essential terms that you are going to encounter in the pursuit of ULOc:
Explain the important provisions of RA 5487 and its IRR. Please note that you will also
be required to refer to the previous definitions found in ULO a and b section.

RISK. It is the potential damage or loss of an asset.


HAZARD. Refers to any condition that may cause damage to property, injury, or
loss of life.

NATURAL HAZARDS. These are hazards which arise from natural phenomena
HUMAN/MAN-MADE HAZARD. These are hazard which are the result of a state
of mind, attitude, weakness or character of one person or employee which can
disrupt operation of a plant or installation.

PILFERAGE. The act of stealing small things or items of little value, and habitually
doing this. It could be casual or Systematic.

LICENSE TO EXERCISE PROFESSION OR LICENSE CERTIFICATE.


A document issued by the CPNP or his duly authorized representative recognizing a
person to be qualified to perform his duties as security guard or detective.

ESSENTIAL KNOWLEDGE

PERSONNEL SECURITY

Of the three division of security, Personnel Security is considered as the most


important. This is because security involves people, both as an asset to be protected
and as source of security threats.

It is acknowledged fact that losses are attributed mainly to negligence or active


participation of employees, either through theft and sabotage. This emphasizes the
need to set-up a system of hiring people for the company.

55
And this is also the reason why in the security chain personnel security is the
“weakest link” in the security.

Personnel Security includes all the security measures designed to prevent individuals
of doubtful loyalty, character, integrity from gaining access on classified matters and
sensitive facilities. It is composed of conducting personnel security investigation and
security education programs.

Purpose of Personnel Security


1. To insure that a firm hires those employees best suited for the firm; and
2. Once hired, to assist in providing the necessary security to these employees while
they are carrying out them functions.

Types of Personnel Identification


a. Personal recognition
b. Artificial recognition – identification cards, passes, passwords, etc.
Ex. Duress Code – a type of code system so that security personnel when forced by
armed men enter an installation can give alarm using certain words in casual
conversation with other personnel in the installation.

Uses of Pass System


1. Single pass system – the badge or pass coded for authorization to enter specific
areas is issued to an employee who keeps it in his possession until his authorization
is terminates.

2. Pass exchange system – an exchange takes place at the entrance of each


controlled area. Upon leaving the personnel surrenders his badge or passes and
retrieve back his basic identification.
3. Multiple pass system – this provides an extra measure of security by requiring that
an exchange take place at the entrance of each restricted area.

56
Visitors Movement Control
1. Visitor’s logbook – all visitors to any facility should be required to identify them
and should be given a visitor’s ID by the security. Visitor’s logbook should be filled up
with the named of visitors, nature and duration of visit.
2. Photograph – taking of photographs should also be considered. Extreme caution
must be exercised in areas where classified information is displayed to preclude
unauthorized taking of pictures of the installation.
3. Escort – if possible visitors should be escorted by the security to monitor their
activity within the establishment and guide them where to go.
4. Visitor entrances – separate access for visitors and employees of the
establishment should be provided.
5. Time travelled – if there is a long delay or time lapse between the departure and
arrival, the visitors may be required to show cause for the delay.
6. Visitors log- should contain identifying data, reason of visit, time in and out.

Vehicular Control and Identification


1. Escort
2. Drive Pool- the most secure but most expensive. In this system is driven by
qualified driver employed by the installation from the entrance to its destination
and after transaction of business of the visitors, drivers back to the installation
entrance.
3. Time travelled- generally used in less sensitive area.

4. Grid System – A very complicated system, the installation is divided into grid
squares like a map. Each square is given number or letter designation. The visitors is
given a escort and shown the route, he could be stopped and questioned by the
guards.
5. Search of Vehicles - sign should be put at the entrance of the installation that
any vehicle entering is subjected for search.

57
DOCUMENT AND INFORMATION SECURITY

Protecting crucial documents has become progressively more critical in this age of fast growing
technology. The loss of document and information can cost a company huge amounts of money.
Business competitive badge and national security have been put at risk because proper security
precautions were not implemented. Oftentimes, the importance of document and information
security is not realized until after a loss has been discovered. Owing to this, a comprehensive
document and information security program is important to operating and competing in our modern
society.

Implementing an efficient and effective document and information security program requires
knowledge and skills in the field of document and information technologies as well as management.
Its management relies on a clear understanding of the types and uses of document and information
within an organization. Planned measures are needed to preserve the secrecy and integrity of
documents and information throughout all phases of its existence. To prevent loss of document and
information due to employee or procedural error, security administrators must implement an
effective document and information management plan.

In protecting vital documents and information, one must understand the capabilities and use
of document and information technologies in terms of how technology can be used in the creation,
usage, storage, transmission and disposal of information. One must also understand how
technology can be used in the manipulation and abuse of documents and information.

Types of Documents

• Class I – Vital Document – an irreplaceable record, reproduction of which does not have
the same value as the original

• Class II – Important Document – a record, reproduction of which will involve considerable


expense and labor or considerable delay

• Class III – Useful Document – a record, the loss of which may cause inconvenience but
could be readily replaced and may not present an insurmountable obstacle to the prompt restoration
of the business

• Class IV – Non-essential Document – a record that may include daily files, routine in nature,
the loss of which will not affect the organization’s operation. This class represents the bulk of the
records which can be kept in ordinary files ready for reference if needed and usually discarded after
some period of time.

58
Factors to Consider

2. Document and information security is based on the premise that the government has
the right and duty to protect official papers from unwarranted and indiscriminate
disclosure.

3. The authority and responsibility for the preparation and classification of classified
matters rest exclusively with the originating office.

4. Classified matter shall be categorized according to their content and not to the
classification of file in which they are held or another document to which they are
referred.

5. Classification shall be made as soon as possible by placing appropriate marks on the


matter to be classified.

6. Each individual whose duties allow access to classified matter while it is in his
possession shall ensure the distribution of such matter on the “need to know” basis
only and to properly cleared persons only.

Stages of Information Cycle

Information occurs through various stages. Familiarization of the different stages can
provide significant analysis on how it can be protected.

1. Creation - During this stage, information is discovered and developed. Information can take
the form of handwritten notes, discussion, dictated script, or electronic data. It is commonly
concentrated in laboratories, offices, word processing units and computer centers.
2. Use - Undoubtedly, information is created for use. This stage involves a process wherein
people act on the information for the purpose of making a decision based on the information,
soliciting support or informing others. When information is used, it usually includes duplication
as well as distribution. Duplication can be in the form of photocopying, printing or sending
through electronic mail.
3. Storage and Retrieval – Used information should be put away for future use. Storage and
retrieval methods must ensure the integrity of the information, its timely accessibility to
authorized users, and its protection from criminal intervention and disastrous circumstances.

The security measures that must be taken depend on the type of storage center, the storage
means and the storage technologies used. More importantly, the experience and
dependability of the personnel who will handle the storage and retrieval of information must
be considered.
4. Transfer – This involves the transfer of information from active to inactive storage.
Inactive records are usually located in remote areas less accessible to users. Special
security precautions should be taken at the time of the transfer and when records are on
the way from one place to another.
5. Disposition – This is the last stage of the cycle of information. During this stage, a
decision can be made to retain the information indefinitely at either an active or
inactive storage center or to dispose of it. The method of disposal should depend
on the amount of information and the type of media used. 59
Characteristics of Information (Fay, 2006)

1. Information is expansive. It is unlike other business resources because it can easily


expand to cover a wider scope. Information may age, but it tends not to diminish;
today’s breaking news, for instance, will be an event in history after a few years.
2. Information requires barriers. Just a decade ago, information assets were stored in
computer systems with electronic barriers inside centrally controlled equipment and
located within the protected confines of a computer room. Nowadays, computers have
become widely dispersed through computer networks protected through firewalls.
3. Information is costly and important. Organizations should protect information assets
because it is costly to acquire and maintain, and it is important to the success of the
business enterprise.
4. Information is coveted. When something has value, someone will want an opportunity to
take it away.
5. Information has a limited life. At some point in time, certain information can lose all or
most of its value.
6. Information is difficult to protect. In a world of advanced information technology, several
employees may hold and share sensitive corporate information on their laptops, memory
drives and emails.
7. Information is voluminous. Another reality is that companies are dealing in larger
volumes of information than ever before.

Sensitive Information

Sensitive information refers to information that has value and should be protected, including
the following:
• Proprietary business and technical information.
• Personal data concerning applicants, employees, and former employees.
• Proprietary information owned by partners and obtained through an agreement.

Classification of Sensitive Information

Sensitive information is generally classified into three (Fay, 2006):

1. Secret – This is information the unauthorized disclosure of which could cause serious
damage to the organization’s business. Its use and access to it are strictly limited.
Examples include:
• Trade secrets
• Plans to merge, divest, acquire, sell, or reorganize
• Information that could affect the price of shares
2. Restricted – This is information of such value or sensitivity that its unauthorized
disclosure could have a substantially detrimental effect on the organization’s business.
Examples include:
• Marketing strategies
• Customer files
• Agreements and contracts
3. Private – This is information relating to employees. Examples include:
• Salaries, bonuses, and wages
• Health and medical matters
Proprietary Information
Information is considered proprietary when it is not readily accessible to others; it was
created by the owner through the expenditure of considerable resources; or the owner actively
protects the information from disclosure (Fay, 2006). This can include secret formulas, processes,
and methods used in production; or it could be the company’s business and marketing plans, salary
structure, customer lists, contracts, and details of its computer systems.
Information is considered proprietary when it is not readily accessible to others; it was
created by the owner through the expenditure of considerable resources; or the owner actively
protects the information from disclosure (Fay, 2006). This can include secret formulas, processes,
and methods used in production; or it could be the company’s business and marketing plans, salary
structure, customer lists, contracts, and details of its computer systems.

1. Patents – grants issued by a national government conferring the right to exclude others
from making, using, or selling the invention within that country. Patents may be given for
new products or processes. Violations of patent rights are known as infringement or
piracy.
2. Trademarks – words, names, symbols, devices, or combinations thereof used by
manufacturers or merchants to differentiate their goods and distinguish them from products
that are manufactured or sold by others. Counterfeiting and infringement constitute
violations of trademark rights.
3. Copyrights – protections given by a national government to creators of original literary,
dramatic, musical, and certain other intellectual works. The owner of a copyright has the
exclusive right to reproduce the copyrighted work, prepare derivative works based on it,
distribute copies, and perform or display it publicly. Copyright violations are also known as
infringement and piracy.
4. Trade Secrets – formulas, patterns, compilations, programs, devices, methods,
techniques, and processes that derive economic value from not being generally known and
not ascertainable except by illegal means. A trade secret violation in the vocabulary of the
law is a misappropriation resulting from improper acquisition or disclosure. The key
elements in a trade secret are the owner’s maintenance of confidentiality, limited distribution,
and the absence of a patent.
SECURITY SURVEY AND INSPECTION
Security Survey
• The security survey is a fact-finding process whereby the assessment team gathers data
that reflects the who, what, how, where, when, and why of an organization’s existing
operation and facility. The purpose of a security survey is to identify and measure the
vulnerabilities to the facility or to specific assets by determining what opportunities exist
to exploit current security policies and procedures, physical security equipment, and
security personnel (Vellani, 2007).
• Security surveys include checklists, audits or inventories of security conditions.
Some experts include the risk analysis, but the process should instead begin with a needs
assessment. It identifies people, things, processes that are necessary to the continuation
of the business or work before the focus is directed to the potential threats that may
interrupt operations.
• On-site inspection and analysis are necessary in order to determine if there is existing
security, to identify deficiencies, to determine the level of protection needed, and to
recommend measures to enhance overall security (Hess & Wrobleski, 1996).
• The identification of anomalies implies that the surveyor is able to pinpoint a certain level
of security and that the existing conditions fall short of that. Sequentially, it requires the
need of the enterprise to be recognized as they will determine what actually requires
protection. In this stage, the needs assessment is no longer implicit but explicit. It is in
fact the foundation for the survey.

Importance of Security Survey


• If there is no security plan, a security survey will be useful in determining the need for it,
as well as determine the security measures that should be included in the plan. A
comprehensive survey of the facility’s entire operations and procedures will enable the
organization’s decision-makers to identify critical security factors in the facility. The survey
will also be useful in analyzing vulnerabilities and evaluating cost-effective
countermeasures for protection of assets.
The Value of a Security Professional
• “Crime prevention, the very essence of a security professional’s existence, is another
spoke in the wheel of total loss control. It is the orderly and predictive identification,
abatement, and response to criminal opportunity. It is a managed process which fosters
the elimination of the emotional crisis response to criminal losses and promotes the
timely identification of exposures to criminality before these exposures mature to a
confrontation process”
• By employing the services of security professionals who can facilitate the installation of
appropriate security measures in a facility, an organization will be able to reduce
disruption in the facility’s operations, minimize loss and, ultimately, improve net profits.

Security Inspection
• Security inspection is a tool to determine the possible risks in a facility in order to control
or prevent possible loss or damage of company assets. This thorough assessment of
what is happening from a security point of view ensures that risks are recognized and
cost-effective. Security inspection also deals with the prevention of risk by taking action
or using physical entities to reduce or eliminate one or more vulnerabilities.
Vulnerabilities are weaknesses that can be exploited by an adversary to gain an asset.
They include structural, procedural, electronic, human, and other elements that provide
opportunities to attack assets countermeasures are in place.
• Security inspection deals with the protection any person, facility, material, information,
activity and other assets that have a positive value to the organization. These assets
may also have value to an adversary, possibly in a different nature and magnitude to
how the owners value them.
• Security inspection also deals with the prevention of risk by taking action or using
physical entities to reduce or eliminate one or more vulnerabilities. Vulnerabilities are
weaknesses that can be exploited by an adversary to gain an asset. They include
structural, procedural, electronic, human, and other elements that provide opportunities
to attack assets
Purpose of Security Inspection
1. To determine compliance of security policies.
2. To detect weaknesses in the existing security measures.
3. To assess assets and the probability of risk or the likelihood that loss
will take place.
Phases of Security Inspection:
1. Detection of company policy violations - The acts or practices of employees that
are contrary to policy. For example, tampering on employee time cards or bringing
out company property for unknown reasons.
2. Detection of possible defects in protective devices and other security aids – For
example, empty fire extinguishers, destroyed perimeter fences, busted perimeter
lights, and alarm system defects.
3. Detection of the condition of properties being protected – For example, when
the property being protected is exposed to rain and sunlight.
4. Detection of security hazards – For example, improper storage of waste
materials
Importance of Security Inspection:
1. It can help determine the effectiveness of a risk appraisal.
2. It can identify weaknesses in security countermeasures.
3. It can prevent possible loss of company assets.
Steps in a Security Inspection:
1. Preparation
a. Review the management policy.
b. Review the loss appraisal report.
c. Use equipment needed in this activity.
2. Plan route
a. Identify priority areas.
b. Identify the sequence
Safety Inspection
• Safety is generally defined as the state of being certain that adverse effects will
not be caused by some agent under defined conditions. It means freedom from
danger, risk or injury. It involves measures (people, procedures, or equipment)
used to prevent or detect an abnormal condition that can endanger people,
property, or the enterprise.
• These abnormal conditions include accidents caused by human carelessness,
inattentiveness, lack of training or other unintentional events.
Objectives of Safety Inspection
1. To save life – An organization’s workers are considered its most
valuable asset. It is the obligation of the company to assure the safety
of its workers, as well as its visitors/ clients in its vicinity at all times.
2. To secure properties.
3. To restore the affected facility as soon as possible.
Purpose of Safety Inspection
1. Detection of defects such as materials, equipment, lighting and ventilation.
2. Detection of sub-standard conditions such as poor housekeeping, poor ventilation,
poor lighting, noise, poor maintenance and poor training of workers.
Phases of Safety Inspections
1. Detection of what might be called obvious hazards – actual unsafe conditions created
either by the action of people or physical deterioration; for example, blocked exits and
tripping hazards.
2. Detection of conditions, which, of themselves, may not be the direct cause of an
accident but would be contributory factors - for example, soapy water spilled on the floor.
3. Detection of conditions wherein employees’ performance is deviating from the standard
practice or established policy, which, in themselves, are wrong and unsafe – for example,
not wearing personal protective equipment (PPE)
4. Detection of employee performance, which, by themselves, are not hazardous but can
create hazards either directly or in a contributory manner – for example, storing old
documents in a corner.
SECURITY INVESTIGATION
➢ Security investigation is one of the major functions of a security organization. Most security officers
and supervisors are called upon to conduct preliminary investigation on theft, injury or any other
kind of untoward incident. These investigations are usually non-criminal in nature but still important
since they may result in civil litigation.
➢ The term investigation means a planned and organized determination of facts concerning specific
events, occurrences or conditions for a particular purpose. Security, on the other hand, means the
protection of property from loss through theft, fraud, fires, threats or hazards. While security
investigation is a planned and organized determination of facts concerning specific loss or damage
of assets due to threats, hazards or unsecured conditions.

Elements of Investigation
1. Investigator
2. Purpose
3. Subject of Investigator
The Three I’s of Investigation
1. Information – The knowledge which the investigator gathers from different sources.
a. Acquired from regular sources. Conscientious and public spirited citizens, company files,
school files, or records file of other agencies.
b. Acquired from cultivated sources. Paid informants, bartenders, cab drivers,
acquaintances, etc.

2. Interrogation – The skillful questioning of witnesses as well as suspects. This is different from
an interview. An interview means the simple questioning of a person who has no personal reason
to withhold information. Interrogation, in contrast means the questioning of a suspect or other
person who is reluctant to divulge information concerning the offense under investigation.

3. Instrumentation – It is the application of instruments and methods of physical sciences to the


detection of crimes. In other words, the summation of the application of all sciences in crime
detection known as criminalistics.

Purpose of Investigation
1. To identify the offender
2. To locate the offender
3. To provide evidence
Qualities of Effective Investigation
1. Objectivity
2. Thoroughness
3. Relevance
4. Accuracy
5. Timeliness

Characteristics of a Successful Investigator


1. Observant 2. Resourceful 3. Patient 4. People-oriented
5. Understanding of human behavior 6. Understanding of legal implication of the work
7. Possesses good communication skill 8. Self-starting 9. Healthfully skeptical
10. Intuitive 11. Energetic 12. A good actor
13. Possesses good judgment 14. Logical 15. Intelligent
16. Creative 17. Receptive 18. Possesses sense of well-being
19. Dedicated 20. Possesses good character 21. Professional

Systematic Approach to an Investigation


1. Define the investigative problem. Identify the requirements:
a. the reason for the investigation
b. the particular phases or elements of investigation assigned to the investigator
c. discern whether the investigation is to be handled overtly or discreetly
d. the priority and suspense date assigned to the investigation
e. the origin of the information
2. Collection of relevant data
a. Prepare a written investigative plan that includes:
• Information needed
• Methods used in gathering information
• Location of sources to furnish this information
3. Methods and sources to be used by the investigator:
• Personal Observation
• Study of documents or records
• Use of interrogation and interview
• Use of recruited informants
• Liaison with agencies that possess the information
3. Analysis and verification of the information gathered a. Analysis involves a study
of the information in terms of the questions set out to answer.
Data collected should be complete
• Supplied information must be based on facts
b. Verification method include the following:
• Personal observation of the agent
• Secure reliable statements from individuals making personal
observation through experience
• Documents or physical evidence
4. Drawing the conclusion is the function and responsibility of the person
requesting the investigation.

Guidelines in Investigation (refer to page 118)


1. Preliminary Investigation
2. Investigation Proper
3. Methods of Investigation

Investigation Report
➢ Report writing is a crucial part of the investigation. The most diligent and professionally
conducted investigation loses its value if the effort is not properly reported. An investigative
report is a written document in which the investigator records the activity in the
investigation and the evidence gathered. A competent investigator writes a report so that
a reader can readily understand what the investigator did, why it was done and the results
of the action.
Purpose of the Investigation Report
➢ The following are the rationale of an investigation report. 1. To provide a permanent official
record of the investigation 2. To provide other investigators with information necessary to
further advance the investigation 3. To uphold the statements as facts on which designated
authorities may base a criminal corrective or disciplinary action.
Qualities of an Investigation Report
1. The report serves as an objective statement of the investigation findings.
2. The report is an official record of the information relevant to the
investigation which the investigator submits to his superior.
3. The report is clear, brief, accurate, impartial but complete.
4. The report is sans of the investigator’s opinion or other irrelevant facts
foreign to the case.
5. The report is accurate and is a true representation of the facts of the case.
6. The report is clear and is logically and chronologically developed.

Parts of the Report


The investigation report contains the following components:
1. Administrative data
a. Date
b. File number
c. Subject
d. Complaint
e. Reporting investigator
f. Office of origin
g. Status
h. Distribution
2. Synopsis – a brief description of the actions of the perpetrator as
established in the body of the report.
3. Details of the report – objective of the investigation
4. Conclusion and recommendation – include the investigator’s
opinion, conclusion and recommendations
5. Enclosures – photographs, sketches, sworn statement, etc.

Sample Report Format (please refer to page 120-126)


MANAGEMENT AND PLANNING

Management in General and Planning Function


The security executive is no longer a private practitioner who impresses people with his
courageous deeds, skill in apprehending criminals or expertise in handling weapons. Rather, he
is a modern manager entrusted with the twin tasks of protecting corporate assets and ensuring
that business interruptions, if at all, are kept to the minimum. In fact, his most challenging role is
to predict the opportunities to manageable proportions. In this role, he is backed by his years and
years of technical expertise as well as the seasoning and sensitivity that come with long years of
exposure in the field.

Security Management and Cost Effectiveness


Cost effectiveness means spending the least possible amount consistent with required
results and, at the same time, assuring that each item of expense is fully justified as the best
available way to commit the funds. Akin to profit-center orientation with which it is closely aligned,
cost effectiveness in security management definitely enhances the profitability of a business
enterprise.

Security Planning (please see page 132)


Planning is the key factor in the successful management of a security program. A
management expert defines planning as pre determining a course of action. Another defines it
as deciding in advance what to do, how to do it and who should do it. It is necessary for a security
executive to plan, the alternative is obviously to react to events that have already occurred or try
to solve problems that could have been avoided in the first place.

Development of Security Polices (Please see page 132)


A policy is a broad guide to management decision-making in situations of a repetitive
nature. Its purpose is to orient decision making towards the organization’s ultimate objective.

Illustrations of Security Policies


1. In a Non-Union Company. The company recognizes the loyalty of its employees and its
obligation as a corporate citizen to the community and thus fosters a cooperative attitude in the
protection of personnel and property.
2. In a Company with Union The company recognizes its obligation as a corporate citizen
to the community and thus, practices an aggressive policy of prosecution regarding theft within
the company.
3. Information Security Policy The computer center recognizes the proprietary interest of
the client entities who utilize the facilities of the center, hence, strictly controls dissemination of
management information on strictly need-to-know basis and only to such persons that have been
specifically cleared to receive such information.
Operating Level Policies
Major policies and procedures covering various areas of security will have to be
developed. The need to draw up specific policies such as “Access Control”, “Key Control”, “How
to Handle a Bomb Threat”, etc., may be written as short as possible as a basis for common
interpretation or may include specific procedures in implementation of a particular mandate from
management.
Financing (Please see page 133)
Managing security requires cash to carry out the various responsibilities involved.
Budgeting
A budget is usually a prepared annual plan stated in financial terms. It is ordinarily finalized
a few months before the start of the budget period. It contains the different items for which costs
are involved. No security organization can operate nor have its program implemented without the
budget.

RA 5487 – PRIVATE SECURITY AGENCY LAW AND ITS IRR


3 TYPES OF GUARD FORCES:

Private Security Agency (PSA)


• It refers to individual or corporation who contract, recruit, train security guard to
engage security service for hire or commission.

Company Guard Force (CSF)


• A security force maintain and operated by private company.

Government Security Unit (GSU)


• A security unit maintained and operated by any government entity other than
police and military.

What is License to Operate (LTO)?


• A document issued by CPNP or his duly authorized representative authorizing


a person to engage and operate PSA/PDA.
• A minimum of 1 million capitalization and bank deposit of 500,000 is required.
• Shall be filed to CPNP thru CSG-SAGSD.
• Regular LTO has a validity of 2 years.
• Temporary LTO is issued if security guard is less than 200 and automatically
revoked within 2 year if the required number of guard does not obtain.

PSA shall be owned by 100% Filipino Citizen.


PSA shall render security services to their clients only after a service contract
executed by both parties.

Tenure of Security personnel shall be co—terminus with the service contract


between PSA and the client and it can be terminated under the following ground:
• Expiration of contracts
• Revocation of license to exercise profession
• Conviction of crime involving, moral turpitude
• Lost of trust and confidence
• Physical and mental disability
• Other violation of RA 5487

Exempted from Pre-licensing


• Veterans and retired or honorably discharged from military or police.
• ROTC advance/basic graduates, and/or its equivalent in AFP,PNP,
CAFGU/CHDF.

RENEWAL OF LICENSE TO OPERATE


• All applications for renewal of license to operate shall filed at least sixty (60)
days before expiry date of LTO subject of the renewal application
Filed/accepted thereafter shall penalized for late filing.
FIREARM ALLOWED TO PSA

• Shotgun, not higher than 12 gauge


• Low-power rifle or revolver, cal. 22
• Cal. 38 pistols or revolver
• 1 firearm for two (2) security guard in
• Only 10 % high caliber firearm is allowed by CPNP or RD of PNP as
exemption
• Firearm of security guard is only allowed within the compound and with proper
uniform
• PSA is allowed for 50 rounds of ammunition
• 25 ammunition is allowed for every security guard
• High-powered –when the agency is operating in areas where there is upsurge
of lawlessness and criminality as determined by the Chief PNP.

RESTRICTION TO POSSESS HIGH POWERED FIREARMS:


• The firearm first be registered with the FED before issuance and shall not be
used or transferred in places other than those specially authorized by the
Director, CSG.
• The total number of high-powered firearms that an agency or security force/unit is
authorized to possess shall not exceed ten percent (10%) of the total number of
security guards of watchmen in its employ.

UNDER WHAT CIRCUMSTANCES WHERE THE FIREARMS ISSUED TO ANY


SECURITY GUARD ON DUTY BE CONFISCATED BY PROPER
AUTHORITIES?
• When firearm is to be used or being used in the commission of crime.
• If carried while guard is not on tour of duty.
• There is written court order.
• Firearms is carried outside the property, compound or establishment serviced by
the agency without proper authority

UNDER WHAT CIRCUMSTANCES WHERE THE LICENSE TO POSSESED


FIREARMS BE REVOKED?
• Failure to submit any issued firearms for verification.
• Failure to report loss of any firearm, for whatever use.
• Carrying of firearm outside of the place stated in the permit.
• Conviction of the operator or manager of the agency of any crime involving
moral turpitude.

RULES IN STOCKING OF AMMUNITION BY SECURITY AGENCIES.


• PSA shall not exceed fifty (50) rounds of ammunition per unit of duly licensed
firearms. Individual issue to each security guard shall be limited to one half of
such basic load or twenty five (25) rounds for every security guard.

THE RANKS AND POSITION OF THE SECURITY PERSONNEL


a. Security Officer:
1. Chief Security officer- He shall be the highest ranking security officer, security
director, manager or chief of a security unit/organization in given PSA/CSA or
government entity.
2. Senior Security officer- He shall perform the duties and responsibilities of an
executive officer to coordinate the activities of the unit and take over the duties
of the chief Security officer in the latter's absences or when incapacitated.
3. Security Guard Officer – He shall occupy the position equivalent to a unit staff
officer , Private detective, Inspector or chief investigator, Detachment
Commander of not less than 30 security guards.
b. Guard Supervisor
1. Guard Supervisor –he/she shall perform the duties of supervising not more than
15 posted guards, or another commensurate task within the unit.
RANKS, POSITIONS, STAFFING PATTERN AND JOB DESCRIPTION

1. Security Management Staff:


1. Security Director(SD)- Agency Manager/Chief Security Officer;
2. Security Executive Director (SED)-Asst.Agency Manager/Asst.Chief Security
Officer;
3. Security Staff Director (SSD)- Staff director for opreation and staff director for
administration.

2. Line Leadership Staff:


1. Security Supervisor 3 – Detachment Commander
2. Security Supervisor 2 – Chief Inspector
3. Security Supervisor 1 - Inspector
3. Security Guard:
1. Security Guard 3 – Post-in-charge
2. Security Guard 2 - Shift-in-charge
3. Security Guard 1- Watchman/Guard

WHAT IS A MISSION ORDER?


Is a written instructions issued by the agency to its guards to perform lawful
activity at specific time, place and date. It shall include the make, model and
serial no. of the firearm issued to the guard and the name of the operation officer
or manager of the agency.
WHAT IS DUTY DETAIL ORDER
Agencies detailing their security personnel on duties or while escorting big
amount of cash or valuables outside its jurisdiction or area of operation, shall
issue an appropriate duty detail order to the security personnel concerned.
HOW MANY SET OF UNIFORM WILL BE GIVEN FREE BY AN EMPLOYER OF
PRIVATE SECURITY GUARDS/WATCHMEN/PRIVATE DETECTIVE?
One set of uniform prescribed for every year of service.
SET OF UNIFORMS FOR SECURITY PERSONNEL
Headgear – pershing cap for men and 2 ply cap for women.
Service Bush Jacket – intended for Directorial and staff officers.
Service Shirt
Service Trouser
Service belt
Footwear

COLOR OF UNIFORMS
• Private Security Agency – fast Navy blue (upper and lower)
• Company Security Forces – light gray for upper and navy blue for lower.
• Government Security Forces – white for upper and navy blue for lower
UNDER WHAT CIRCUMSTANCES WHERE THE MUNICIPAL OR CITY OF
MAYORS CAN MUSTER OR INCORPORATE THE MEMBERS OF THE SECURITY
AGENCY?
In case of emergency or in time of disaster or calamity, to help in the
maintenance of peace and order in the protection of lives and property.
The deputized security guard shall receive direct orders from the chief of police
of the city or municipality for the duration of the emergency disaster or calamity.

EMERGENCY DEPUTATION
In case of emergency or in time of disaster or calamity, the Chief of PNP may
deputized any security guard to assist the PNP in the performance of its duties for the
duration of the emergency, disaster or calamity.

INTER-RELATIONSHIP BETWEEN PNP AND SECURITY PERSONNEL


Security Personnel are always subordinate to members of the PNP on matters
pertaining to law enforcement and crime prevention. They cannot impose any
provisions of law except in executing citizen arrest.
Responsibility of Security Personnel – responsible purely for enforcing company
policies, rules and regulations of management and client.
Self-Help: You can also refer to the sources below to help you further understand the
lesson:

Reference:
❖ Badua, J. (2016). Police personnel and records management. (2nd ed).
Wiseman's Books Trading. Quezon City :
❖ Corpus, W.M. &Delizo, DB. (2011). Industrial Security Management.
Wiseman’s Books Trading Inc. Quezon City
❖ Guevara, R. (2015). Police organization and administration with police
planning. (2nd ed.) Wiseman's Books Trading. Quezon City.
❖ https://www.officialgazette.gov.ph/featured/about-the-pnp/
❖ https://www.chanrobles.com/IMPLEMENTING%20RULES%20OF%20REPUB
LIC%20ACT%20NO.%205487.pdf
❖ http://caraga.bfp.gov.ph/brief-history/
❖ https://www.sosia.com.ph/index.php/about-us/2-uncategorised/8-sosia-
general-background
LET’S CHECK

Activity 1. Multiple Choice. Encircle the correct answer.

1. Which of the following is qualified to own and operate a security in the country?
A. Smith an American citizen
B. Gerry, a British who has married a Pilipino
C. Jose, a very rich Spanish tourist
D. Victor, who is a very poor Pilipino
2. What is the allowed maximum number of security personnel that a private security
agency/company guard force/private detective may employ?
A. 2000
B. 1500
C. 1000
D. 500
3. What is the required minimum age for one to be an operator or manager of a security
agency in the country?
A. 35
B. 30
C. 25
D. 20
4. What is the required minimum capitalization and the minimum bank deposit for new
applicants to license to operate?
A. 2,000,000.00 minimum capitalization and 1,500,000.00 minimum bank deposit
B. 1,500,000.00 minimum capitalization and 1,000,000.00 minimum bank deposit
C. 1,000,000.00 minimum capitalization and 1,000,000.00 minimum bank deposit
D. 1,000,000.00 minimum capitalization and 500,000.00 minimum bank deposit
5. It refers to a Security Force maintained and operated by any private
company/corporation utilizing any of its employees to watch, secure or guard its
business establishment, premises compound or properties.
A.Private detective Agency
B. law enforcement services
C. private security agency
D. company security force
6. It refers to a document issued by the Chief PNP or his duly authorized representative
recognizing a person to be qualified to perform his duties as private security or training
personnel.
A.License to operate
B. regular license to operate
C. license to exercise profession
D. duty detail order
7. Guard/detective, or a juridical person to establish, engage, direct, manage or
operate an individual or a private detective agency or private security
agency/Company Security Force shall have.
A. License to operate
B. regular license to operate
C. license to exercise profession
D. duty detail order
8. Which of the following may constitute the “kabit system?
A. Private security agency owned by corporation
B.Private security agency with no benefits
C. Private security agency with underrate wage
D. Maintaining a separate branch, unit or subsidiary office aside from the main
office of the agency situated within the same locality
9. What is the required minimum number of license security personnel employed in a
private security agency to acquire a Regular License to Operate?
A. 400
B. 300
C. 200
D. 150
10. What is the required number minimum number of license security personnel
employed in a company guard force or private detective agency to acquire a Regular
License to Operate?
A. 60
B.50
C.40
D.30

Activity 2. Write the correct answer.


1. This is known as security audit which is actually a fact-finding probe
to determine a plant’s adequacy and deficiency in all aspects of security,
with the corresponding recommendations

2. It is conducted when there is business reorganization with


corresponding changes in object and physical by-outs of a complex.

3. Dialogue between the survey team and management officials of a


plant before security survey is conducted.

4. Conference done after the completion of the security survey.

5. The appraisal on how well existing security measures and regulations


are being carried out within a detachment or establishment.

6. A type of security inspection that is on-going and never ending activity.

7. Refers to announced inspection which enables the security personnel


to prepare.

8. Refers to unannounced inspection which enables the inspection team


to know the actual security condition.
9. Is one that moves systematically from one area to the next and so on.

10. This is a planned and organized determination of facts concerning


specific loss or damage of assets due to threats, hazards or unsecured
conditions.
LET’S ANALYZE

Activity 1. In implementing of RA 8357, engaging security agency, practicing


security profession and regulating them is the main purpose of such law.

At this juncture, you will EXPLAIN the following provision of this law.

1. What is a “Kabet” system?

2. Security guard bringing his service firearms outside his Area of responsibility is
possible. When?

3. Security guard bringing his service firearms outside his Area of responsibility is
prohibited. When?

4. Personnel Security is the weakest link in security chain.

82
.

5. Security education as a means for prevention of crime and accident.

Activity 2. In personnel security, losses are attributed mainly to negligence or active


participation of employee, either through sabotage or theft. What should you do to
solve this security problem?

.
Activity 3. Based on what you had read on the topics presented on this section, you
are required to elaborate and explain the given words below. It must be at least 2-3
sentences in every given word.

1. Pass System
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
2. Security Clearance
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
3. Information Cycle
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
4. Passive Fire Protection
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

5. Visitors Movement Control


_________________________________________________________________
_________________________________________________________________
_________________________________________________________________

Activity 4. Getting acquainted with the essential terms, part and process in the making
of security survey is not enough, what also matters is you should also be able to write.
Now, I will require you to apply those learning in the previous topic and make your own
security survey.

I’ll let you choose your own establishment, nearest and accessible to your place.

Below is a sample of Security survey form.

84
CONFIDENTIAL

FROM:
DATE:
FOR:
SUBJECT:

Dear ,

Submitted hereunder is the security survey report of the survey made by our
team for checking and approval.

I. PRELIMINARIES
(Authority, Date and duration of survey, weather condition, survey personnel)

II. ESTABLISHMENT SURVEYED


(Name of establishment surveyed, objective of the company, affiliation with other
organization and total number of workplace)

III. SECURITY SYSTEM


(Physical security, Personnel security, and Document Security and Information
security)

IV. OTHER SITUATION AND RECOMMENDATIONS:


(Base on Finding)

V. ENCLOSURES/EXHIBITS:
A. (Picture of particular area or hazard, put name or tittle)

It is believed that this Security Survey report will suffice your requirements for
adequate security of your establishment.

Respectfully yours,

Security Officer / Consultant


Q&A LIST. This part allows you to list down all rising questions or issues. These
questions or issues will be raised in the Blackboard discussion feature. You can write
your answers after the clarification. This will help you in the review of concepts and
essential knowledge.

Questions/Issues Answer

KEYWORDS INDEX

▪ Risk ▪ Security Officer

▪ Patents ▪ Security Education

▪ Trade Secrets ▪ Escort

▪ Proprietary Information ▪ Pass System

▪ Information Security ▪ Relative Criticality Of Operation

▪ Personal Recognition ▪ Security Guard

▪ Security Management ▪ License To Operate

▪ Guard Supervisor ▪ Security Survey

▪ Pilferage ▪ Risk Management

▪ Man-Made Hazard ▪ Relative Vulnerability

▪ Natural Hazards ▪ Security Inspection


Final Written Exam

Since this is a board examination course, you are required to the Multiple-
Choice Final Examination inside the University as required by the policy. Accordingly,
this is non-negotiable for all licensure-based programs. You will be informed ahead of
the schedule.

Lastly, for any concerns or issues arising from this module, feel free to contact the
course administrator, program head or dean using the contact details provided in this
material.
COURSE SCHEDULES. This section calendars all the activities and exercises,
including readings and lectures, as well as time for making assignments and doing
other requirements.
Activity Date Where to Submit
Big Picture A: Quiz June 1, 2020 BB’s Quiz Feature
Big Picture A: Let’s Check Activities June 1, 2020 CF’s Email
Big Picture A: Let’s Analyze Activities June 4, 2020 CF’s Email
Big Picture A: In a Nutshell Activities June 4, 2020 BB’s Forum Feature
Big Picture A: QA List June 9, 2020 BB’s Discussion Feature
Prelim Exam June 11, 2020 CF’s Email
Big Picture B: Quiz June 17, 2020 BB’s Quiz Feature
Big Picture B: Oral Recitation June 17, 2020 Face to Face Discussion
Big Picture B: Let’s Check Activities June 19, 2020 CF’s Email
Big Picture B: Let’s Analyze Activities June 19, 2020 CF’s Email
Big Picture B: In a Nutshell Activities June 23, 2020 BB’s Forum Feature
Big Picture B: QA List June 23, 2020 BB’s Discussion Feature
Mid-term Exam June 26, 2020 CF’s Email
Big Picture C: Quiz July 6, 2020 BB’s Quiz Feature
Big Picture C: Oral Recitation July 6, 2020 Face to Face Discussion
Big Picture C: Let’s Check Activities July 8, 2020 CF’s Email
Big Picture C: Let’s Analyze Activities July 8, 2020 CF’s Email
Big Picture C: In a Nutshell Activities July 20, 2020 BB’s Forum Feature
Big Picture C: QA List July 20, 2020 BB’s Discussion Feature

Course prepared by:

ANDRE A. CARDENAS JR.


Course Facilitator/Faculty

Course reviewed by:

ROBERTO R. MAGBOJOS, Ph.D


Program Head

Approved by:

CARMELITA B. CHAVEZ, Ph.D


Dean

88

You might also like