Professional Documents
Culture Documents
Page
TITLE PAGE 1
TABLE OF CONTENTS 2
COURSE OUTLINE 4
COURSE OUTLINE POLICY 4
ULO a 7
Metalanguage 7
Essential Knowledge 9
Origin and Development of Security 9
Industrial Security 11
Republic Act 5487 (Rule I, II and III) 13
ULO b 26
Metalanguage 26
Essential Knowledge 27
Physical Security 28
Barriers 29
Perimeter Barrier 33
Security Lighting 36
Protective Alarm 39
Fire Alarm System 42
Basic Concept of Protective Locks and Key Control 43
Key Control 45
2
5 Level of Control in Master Keying Plan 46
Pointers for Effective Locks and Key Control 47
ULO c 59
Metalanguage 59
Essential Knowledge 60
3 Types of Guard Forces 60
What is License to Operate (LTO) 60
Firearm Allowed to PSA 61
The Ranks and Position of the Security Personnel 63
Set of Uniforms for Security Personnel 64
Personnel Security 66
Security Education 69
Document and Information Security 70
Risk Management Alternative and Strategies 74
Hazard 75
Pilferage 75
Security Survey 76
3
Course Outline: CRI 215 – Introduction to Industrial Security Concepts
4
reached more than 30% similarity index, the student may be called for a
disciplinary action in accordance with the University’s OPM on Intellectual
and Academic Honesty.
For group assessment tasks, the course coordinator will require some or
few of the students for online or virtual sessions to ask clarificatory
questions to validate the originality of the assessment task submitted and
to ensure that all the group members are involved.
Assignment Resubmission You should request in writing addressed to the course coordinator his/her
intention to resubmit an assessment task. The resubmission is premised on
the student’s failure to comply with the similarity index and other reasonable
grounds such as academic literacy standards or other reasonable
circumstances e.g. illness, accidents financial constraints.
Re-marking of Assessment You should request in writing addressed to the program coordinator your
Papers and Appeal intention to appeal or contest the score given to an assessment task. The
letter should explicitly explain the reasons/points to contest the grade. The
program coordinator shall communicate with the students on the approval
and disapproval of the request.
If disapproved by the course coordinator, you can elevate your case to the
program head or the dean with the original letter of request. The final
decision will come from the dean of the college.
Grading System All culled from BlackBoard sessions and traditional contact
Course discussions/exercises – 30%
1st formative assessment – 10%
2nd formative assessment – 10%
3rd formative assessment – 10%
Submission of the final grades shall follow the usual University system and
procedures.
Preferred Referencing Style APA 6th Edition.
Student Communication You are required to create a umindanao email account which is a
requirement to access the BlackBoard portal. Then, the course coordinator
shall enroll the students to have access to the materials and resources of
the course. All communication formats: chat, submission of assessment
tasks, requests etc. shall be through the portal and other university
recognized platforms.
5
You can also meet the course coordinator in person through the scheduled
face to face sessions to raise your issues and concerns.
For students who have not created their student email, please contact the
course coordinator or program head.
Contact Details of the Dean Dr. Carmelita B. Chavez
Email: carmelita_chavez@umindanao.edu.ph
Phone: 082-3050647 local 103
Contact Details of the Dr. Roberto R. Magbojos
Program Head Email: rmagbojos@umindanao.edu.ph
Phone: 082-3050647 local 103
Students with Special Students with special needs shall communicate with the course coordinator
Needs about the nature of his or her special needs. Depending on the nature of
the need, the course coordinator with the approval of the program
coordinator may provide alternative assessment tasks or extension of the
deadline of submission of assessment tasks. However, the alternative
assessment tasks should still be in the service of achieving the desired
course learning outcomes.
Online Tutorial Registration You are required to undergo a tutorial on this course. Upon enrolment and
the registration of your name to Blackboard LMS, the Course Coordinator
will contact you on the specific schedule of the tutorial which shall be
conducted within the 1st week of the class.
Help Desk Contact ccje@umindanao.edu.ph
Library Contact library@umindanao.edu.ph
Hotline no. 0951-376-6681
Well-being Welfare Support Hotline: 0905-892-4090 / 0950-466-5431
Help
CC’s Voice: Hello prospective criminologist! Welcome to this course CRI 215: Introduction to
Industrial Security Concept. By now, I am confident that you really wanted to become
a security professionals and that you have visualized yourself already being an
security officer, security advisor, and security consultant helping the economy by
providing security to industry and aiding the law enforcer to maintain peace and order
community.
CO Before the actual practice of your profession, you must have a broad understanding in law
enforcement administration, public safety and criminal justice, which is the ultimate
course outcome of this subject. When we talked about Industrial Security concept as
a crucial component of law enforcement, knowing how the security works, how security
is being utilized properly, how to deal crime incident and accident. Thus, in this course
you are expected to recall your knowledge or read in advance the laws protecting the
Security Agency and Security Professionals, Principle of Security, and Security
strategies. These include different risk and hazard that may occur.
6
Let us begin!
Big Picture
Week 1-9: Unit Learning Outcomes (ULO): At the end of the unit, you are
expected to
a. Rationalize the history, importance of security in every human and
different types of security agencies authorized by law.
b. Discuss relevant technology as barrier in security management
operation, and well define physical security for the protection of lives
and property.
c. Explain the important provisions of RA 5487 and its IRR.
Big Picture in Focus: ULOa. Rationalize the history, importance of security in every
human
METALANGUAGE
The most essential terms relevant to the study of this course and to
demonstrate ULOa are operationally defined to establish a common frame of
reference as to how the texts work in the course. You will encounter these terms as
we go through the study of course. Hence, to be able to fully appreciate the topics
presented in this course, unlocking the meaning of these terms is crucial.
R.A. No. 5487 – approved June 13, 1969, known as Private Security Agency Law
PNP SOSIA (Philippine National Police Supervisory Office for Security and
Investigative Agencies) – unit in the PNP in charges of the supervision,
direction and control of all agencies in the country.
8
ESSENTIAL KNOWLEDGE
To perform the aforesaid big picture (unit learning outcomes) for the first three (3)
weeks of the course, you need to fully understand the following essential knowledge that
will be laid down in the succeeding pages. The topics presented in this section is taken
from the approved textbook of the course. Please note that you are not limited to
exclusively refer to the resources. Thus, you are expected to utilize other books, research
articles and other resources that are available in the university’s library e.g. ebrary,
search.proquest.com etc.
After World War 2, there was a tremendous influx of machineries and other
heavy equipment in the Philippines following the Reparation Act. Government owned
and controlled companies and their subsidiaries, as well as private commercial and
industrial firms could not provide adequate protection to these machineries through
their respective in – house personnel. Hence, they resorted to the used of contract
private watchman and security guards.
9
Main objective is to lobby to the appropriate and competent authority for the
enactment of laws and regulation to standardize the organization, operation, business
of private detective, watchman and security guard agencies in the Philippines.
RA 6975, the DILG Act was established on December 13,1990. – created the
Civil Security Unit under the PNP to provide administrative services and general
supervision over the organization, business operation and activities of all organized
PDA, Watchman, PSA and CGF.
On 01 June 1969, Republic Act 5487 otherwise known as the “Private Security
Agency Law” was enacted making the Philippine Constabulary as the sole authority
to provide administrative services and general supervision over the management and
operations of all organize Private Security Agencies (PSAs), Company Guard Forces
(CGFs), Government Security Forces (GSFs) and their security guards. As such, the
control of Government Security Forces was removed from the NICA.
In 04 August 1969, a staff memo was issued by Headquarters, Philippine
Constabulary (HPC), organizing the Philippine Constabulary Security and
Investigation Agency Supervisory Office (PCSIASO) and later renamed to PC
Supervisory Office for Security and Investigation Agencies (PCSOSIA).
And pursuant to GO No. 404 dated 29 June 1970, the office was renamed to
PC Supervisory Unit for Security and Investigation Agencies (PCSUSIA).
Pursuant to Memorandum 07-S96 dated 31 May 1996 the Security Agencies
and Guards Supervision Division (SAGSD) was created as one division under the
Civil Security Group (CSG) to exercise supervisory authority and implement the Rules
and Regulations embodied in RA 5487.
On Sep 25, 2009, SAGSD was renamed as the Supervisory Office for
Security & Investigation Agencies (SOSIA) thru General Orders #DPL-09-10.
10
SECURITY
Is the state or condition of being secured; there is freedom from fear, harm,
danger, loss, destruction or damages.
TYPES OF SAFETY
INDUSTRY
➢ The term denotes as serious or constant application to work or business
➢ A special branch of productive work, or the capital or workers employed in it.
INDUSTRIAL SECURITY
➢ Security measure applied to business industries or business providing
security to private individual, business enterprises or government industries.
MANAGEMENT
➢ The skillful use of means to accomplish a purpose
➢ Can be define as planning,, deciding or exercising of control and supervision
on some functions of the organization
Physical Security
• Are those measures taken to prevent physical access or entry to an
installation by unauthorized person.
Personnel Security
• It is applied to background check the background of person and the protection
of company personnel against potential harmful acts or condition.
KINDS SECURITY
◼ Human security or VIP Security
◼ School security
◼ Hotel security
◼ Bank security
◼ Mall security
◼ Aviation security
◼ There are other kinds of security
3 D’S OF SECURITY
The basic theory of any Security Program can be summed up in three words;
1. Denial – Takes the form of Physical barriers like fences, walls gates, locked
doors, watch dogs, etc. (When the access is denied, the thing or
area to be protected remains safe.)
12
2. Detection – Takes the form of guards and electronic devices.
3. Deterrence – This can be both physical and psychological.
SECTION 3. Training Required. All applicants for license certificate shall have
received the appropriate training from any public or private training
institution/system duly recognized by the government to conduct private
security or police training.
13
SECTION 4. Prohibitions. No License certificate shall be granted to any
applicant for license to operate or license to exercise security profession with
the following disqualifications:
a. having previous record of any conviction of any crime;
b. having previous record of any conviction of any offense involving
moral turpitude;
c. having been dishonorably discharged or separated from employment
or service;
d. being a mental incompetent;
e. being a user/addicted to the use of prohibited drugs or narcotics;
f. being a habitual drunkard; and
g. dummy of a foreigner RULE
SECTION 2.
a. Any person not covered by Section 1, Rule II above who commits any act in
violation of Republic Act 5487 as amended and its implementing rules and regulations
shall, on conviction thereof, suffer imprisonment of from ten to fifteen years, and a fine
of not less than ten thousand pesos nor more than fifteen thousand pesos as the Court
may direct.
14
b. If the violation is committed by those persons mentioned in Section 3b, Rule
IV herein under, the penalty shall be imprisonment ranging from one to four years and
a fine ranging from one to four thousand pesos at the discretion of the Court.
SECTION 1. Definition – For purposes of and when used in these rules and
regulations, the following terms shall be construed in the sense indicated herein unless
the context of a particular section clearly indicates that a different sense is intended:
a. Person – shall include not only natural but also juridical persons such as
single proprietorships, partnerships, corporations, companies or associations, duly
organized and registered with the Securities and Exchange Commission and/or the
Department of Trade and Industry.
b. Private Security Services – shall include the act of providing or rendering
services to watch an establishment whether public or private, building, compound/area
or property, to conduct access control/denial in any form whether physically, manually
or scientifically by electronic monitoring systems, for the purpose of securing such
area/property and at the same time ensuring safety and protection of persons within
such areas, to maintain peace and order within such areas, to conduct private security
training, and/or to conduct investigation. It shall also include the act of contracting,
recruiting, training, furnishing or posting any security guard, to do its functions or solicit
individuals, businesses, firms, or private, public or government-owned or controlled
corporations to engage his/its service or those of his/its security guards, for hire,
commission or compensation thru subscription or as a consultant/trainer to any private
or public corporation.
15
c. Private Detective Services – shall include among others the act of providing
personal security protection, inquiry and information gathering, pre-employment
verification and individual background profiling, providing assistance in civil liability and
personal injury cases, insurance claims and fraud, child custody and protection cases,
for the purpose of assisting in gathering information leading to determination and/or
prevention of criminal acts and/or resolution of legal, financial and personal problems.
d. Private Security Industry – shall cover those in the legitimate business of
providing private security and detective services.
e. Private Security Guard (SG) – sometimes called private security guard or
watchman shall include any person who offers or renders personal service to watch or
secure either a residence, business establishment, or buildings, compounds, areas, or
property, inspects/monitors bodily checks/searches individuals and/or baggage and
other forms of security inspection, physically/manually or scientifically electronic,
including but not limited to, logging concessions and agricultural, mining or pasture
lands, transportation, for hire or compensation , or as an employee thereof, including
any employee of the national or local governments or agencies or instrumentality’s
thereof and or government owned or controlled firm or corporations who is employed
to watch or secure government buildings, compounds, premises and other properties,
other than members of the Armed Forces of the Philippines, guards of the Bureau of
Jail management and Penology, Municipal or City jail guards, and members of the
Philippine National Police or of any other law enforcement agency of the Government.
f. Private Detective (PD) – shall mean any person who does detective work
for hire, reward or commission, other than members of the Armed Forces of the
Philippines, guards of the Bureau of Jail Management and Penology, municipal or city
jail guards, and members of the Philippine National Police or of any other law
enforcement agency of the government.
g. Private Security Personnel – shall be natural persons which include private
security guards, private detectives, security consultants, security officers and others
that may be classified later, rendering/performing security and/or detective services as
employed by private security agencies and/or private firms.
h. Government Security Personnel – shall be natural persons which include
government security guards, detectives, security consultants, security officers and
16
others that may be classified later, except those of the Armed Forces of the
Philippines, Philippine National Police, Bureau of Jail Management and Penology,
Municipal or City Jail guards rendering/performing security and/or detective services
as employed by government entities.
i. Private Security Agency (PSA) – shall mean any person association,
partnership, firm or private corporation, who contracts, recruits, trains, furnishes or
posts any security guard, to perform its functions or solicit individuals, businesses,
firms, or private, public or government-owned or controlled corporations to engage
his/its service or those of his/its security guards, for hire, commission or compensation
thru subscription or as a consultant/trainer to any private or public corporation whose
business or transactions involve national security or interest like the operation and/or
management of domestic or ocean vessels, airplanes, helicopters, seaports, airports
heliports, landing strips etc., or as consultant on any security related matter, or to
provide highly specialized security, detective and investigation services like gangway
security, catering security, passenger profiling, baggage examination, providing
security on board vessels or aircraft, or other security needs that PNP SAGSD may
approve.
j. Private Detective Agency (PDA) – shall mean any person association,
partnership, firm or private corporation, who contracts, recruits, trains, furnishes or
posts any private detective, to perform its functions or solicit individuals, businesses,
firms, or private, public or government-owned or controlled corporations to engage
his/its service or those of his/its detectives, for hire, commission or compensation thru
subscription or as a consultant/trainer to any private or public corporation or as
consultant on any detective related matter, or to provide highly specialized detective
and investigation services, or other detective needs that SAGSDCSG may approve.
k. License to Exercise Profession – shall mean any document issued by the
Chief, Philippine National Police or his duly authorized representative recognizing a
person to be qualified to perform his duties as private security or training personnel.
l. License to Operate (LTO) – is a License Certificate document, issued by the
Chief, Philippine National Police or his duly authorized representative, authorizing a
person to engage in employing security guard or detective, or a juridical person to
establish, engage, direct, manage or operate an individual or a private detective
17
agency or private security agency/company security force after payment of the
prescribed dues or fees as provided in these Rules and Regulations. m. Company
Guard Force (CGF) – a security force maintained and operated by any private
company/corporation utilizing any of its employees to watch, secure or guard its
business establishment premises, compound or properties.
n. Government Guard Unit (GGU) – a security unit maintained and operated
by any government entity other than military or police, which is established and
maintained for the purpose of securing the office or compound and/or extension of
such government entity.
o. PNP as used herein shall mean the Philippine National Police, which was
organized pursuant to the provision of RA 6975 otherwise known as the National
Police Act of 1991.
p. SAGSD as used herein shall refer to the current PNP Civil Security Group
Security Agency and Guard Supervision Division or any other PNP Office that may be
designated later as the primary office for supervision of the implementation of these
rules and regulations.
q. PADPAO refers to the Philippines Association of Detective and Protective
Agency Operators, Inc., which is an association of all licensed security agencies and
company security forces.
r. Duty Detail Order is a written order/schedule issued by a superior officer
usually the private security agency/branch manager or operations officer assigning the
performance of private security/detective services duties.
Self-Help: You can also refer to the sources below to help you further
understand the lesson:
Reference:
• Bobier (2016). Industrial Security Management. Chapterhouse Publishing.
Quezon City
• Ajero J M (2014) Industrial and corporate security management. Quezon City
:Wiseman's Books Trading
• Badua, J. (2016). Police personnel and records management. (2nd ed).
Wiseman's Books Trading. Quezon City :
18
• Corpus, W.M. &Delizo, DB. (2011). Industrial Security Management.
Wiseman’s Books Trading Inc. Quezon City
• Guevara, R. (2015). Police organization and administration with police
planning. (2nd ed.) Wiseman's Books Trading. Quezon City.
• Noll, G. (2014). Hazardous materials: managing the incident. (4th ed).
Burlington, MA : Jones & Bartlett Learning
• Peckley M F, (2012) Security officers and guards manual (in relation to RA.5487
as amended): with special topic on school security management. Quezon City:
Wiseman's Books Trading, Inc.
Lets check
Activity 1. Read each statement or question below carefully and fill in the blank(s)
with the correct answer
1. Law protecting the rights of all Private Security Agency.
2. It refers to a state or condition which is free from harm, injury,
destruction, intimidation or fear.
3. The law authorizing the PNP the control and supervision of the
security agencies in the Philippines.
4. Association of all licensed security agencies and company security
forces.
5. A person who does detective work for hire, reward or commission.
6. A legitimate business of providing private security and detective
services.
7. One of the security division concerned more about measures to take
In order to prevent physical access or entry to an installation by
unauthorized person.
8. Security measure applied to business industries or business providing
security to private individual, business enterprises or government
industries.
9. A special branch of productive work, or the capital or workers
employed in it.
10. is a written order/schedule issued by a superior officer usually the
private security agency/branch manager or operations officer assigning
the performance of private security/detective services duties.
LET’S ANALYZE
Activity 1. Getting familiar with the essential terms and history in the study of
industrial security is not enough, what also matters is you need to explain it also the
importance. In this activity you are required to explain thoroughly your answer.
1. How important is the security or safety in your life, and when can we consider that
security or safety really exist?
19
.
20
.
Activity 2. Based on what you had read on the topics presented you are required to
write a reflection on your understanding on the principles of security. Your reflection
must utilize all the lines provided below.
21
Activity 3. Discuss the importance of the three major division of security in relation to
crime solution and prevention and control. Use bullet style for the answers.
Physical Security
Personnel
Security
Document
Security
22
IN A NUTSHELL
Activity 1. “Security is everybody’s business”. The study of industrial security
management is indeed needed to provide necessary skills and competence not only
in the field of security profession but also in our daily lives.
Based from the definition of the most essential terms in the study of industrial
security management, please feel free to write your lessons learned below. I have
indicated my lessons learned.
Your Turn
3.
4.
5.
1.
23
.
2.
3.
What are the important insight you had learned from this section?
24
.
Q&A LIST. This part allows you to list down all rising questions or issues. These
questions or issues will be raised in the Blackboard discussion feature. You can write
your answers after the clarification. This will help you in the review of concepts and
essential knowledge.
Questions/Issues Answer
KEYWORDS INDEX
▪ Documents and
▪ Private Security Services
Information
25
▪ SAFETY ▪ Private Detective Agency
METALANGUAGE
For you to demonstrate ULOb, you will need to have an operational
understanding of the following terms below. Please note that you will also be required
to refer to the previous definitions found in ULOa section.
SECURITY DEVICE. A security device fitted to property, especially a house or
car, to make a warning sound if a break – in or theft is attempted.
INTRUSION DETECTION. Designed to alert security personnel to consummated
or attempted intrusion into an area, building or compound. It can be electrical,
mechanical or electronics.
ALARM. An aural or visual signal given by the annunciator to security when
intruder activates device in a protected area.
DOPPLER EFFECT. A physical phenomenon that causes frequency shift if an
objects move in the area permeated by radio frequency signals. This change in
a certain type of alarms activates a signalling unit.
FAIL SAFE. A term applied to a device or system that in the event of failure of a
component the incapacity will be signalled.
26
DURESS CODE. A type of code system so that security personnel when forced
by armed men enter an installation can give alarm by the use of certain words in
casual conversation with other personnel in the installation.
FIRE. The heat and light that comes from burning substances produced by the
combustion of substances.
PETERMAN. An English term used to describe a lock picker.
PRIVATE DETECTIVE. Refers to any person who does detective work for hire
reward or commission other than member of military or any Law Enforcement
Unit
CONTROLLED AREA. An area near the adjacent to limited or exclusive areas
where entry is restricted.
COVERAGE FACTOR. The minimum number of directions from which each
point in the area should be lighted depending upon the use of the area.
EXCLUSION AREA. A restricted area containing materials or operation of
security interest.
ACCEST LIST. An authenticated list personnel given to security guard allowing
entry to compound or installation or part thereof.
BLACKLIST. A list or organizations that have incurred disapproval or suspicion
or are to be boycotted or otherwise penalized.
o A blacklist is a list or register of person who, for one reason or another, are being
denied a particular privilege, service, mobility, access or recognition.
WHITELIST. A whitelist or approved list is a register of entities that, for one
reason or another, are being provided a particular privilege, service, mobility,
access, or recognition.
Important terms
PASS SYSYTEM. A method used by security to screen visitors or person
admitted into building premises.
BADGE SYSTEM. A system for personnel movement and control whereby
badges or identification are issued to personnel upon entering and an installation.
Visitors are also issued temporary badges when entering the installation.
27
CONTROLLING. The regulation of many different aspects of business activity,
controls are needed to standardized equality and performance, protect assets,
measures performance, balance plans and programs and motivate individuals.
VISITOR. Person not regularly employed in a plant.
RESTRICTED AREA. Any area access to which is subject to special restriction
control.
ESSENTIAL KNOWLEDGE
Before proceeding further with the industrial security management, there are
several preparations that must be done first. You need to know more the physical
security, perimeter barrier security lighting, protective alarms, fire alarms, Protective
locks, key control and Protective cabinets. The topics presented from this chapter was
taken from the approved textbook of the course. Please note that you are not limited
to exclusively refer to the resources. Thus, you are expected to utilize other books,
research articles and other resources that are available in the university’s library e.g.
ebrary, search.proquest.com etc.
PHYSICAL SECURITY
This concern with the physical measures (gates, windows, fences etc.) adapted
to prevent unauthorized access to an installation.
28
Elements of Physical Security
1. Obstacles – can be placed in the way of potential attackers and sites can
be hardened against accidents and environmental disasters.
2. Surveillance and alarm can be put in place, such as lighting, sensors,
smoke detector, and cameras.
3. Security response can be implemented to apprehend the intruder and to
recover quickly from accidents, fires, or natural disasters.
BARRIER
Is any specific structure that is capable of restricting, deterring delaying or
preventing illegal and unauthorized access to an installation.
NATURAL BARRIER
• These are offered by nature which could obstruct or delay the passage way of
potential intruders.
• These also refers to natural structures that serve as deterrent or obstruction to
intruders.
MAN-MADE BARRIERS
• These are structural constructions like fences, walls, roofs, grills, bars,
roadblocks, or other physical means to deter or impede penetration.
29
caught, charged in court , or get dismissed.
1. Natural barriers
2. Human barriers
3. Animal barriers
30
4. Energy barriers
5. Perimeter Barrier
• Minimum Security
31
• Is a system designed to impede unauthorized external activity such as
simple intrusion to arm attack.
• Medium Security
• Designed to impede, detect and assess most external activity and some
unauthorized internal activity that range from simple shoplifting to
conspiracy to commit sabotage. This includes:
• Use of advance intrusion alarm system
• Establishment of perimeter and perimeter barriers; and
• Use of unarmed guard.
• Maximum Security
• Includes application of the following:
32
• Sophisticated alarm system; and
• On-site response force
PERIMETER BARRIER
33
A medium or structure which defines the physical limits of an installation or
area to restrict or impede access thereto.
1. Gates and Doors – When not in use and controlled by guards, gates and doors in
the perimeter should be locked and frequently inspected by guards. Lock should be
changed from time to time and should be covered under protective locks and key
control.
2. Side-walk-elevators – These provide access to areas within the perimeter barrier
and should be locked and guarded.
3. Utilities Opening – sewers, air intakes, exhaust tunnels and other utility openings
which penetrate the barrier and which have cross sectional areas of 96 square inches
or more should be protected by bars, grills, water filled traps or other structural means
providing equivalent protection to that portion of the perimeter barriers.
1. Wire Fences – are independent structures designed to control physical and visual
access between outside areas.
2. Building Wall – Masonry wall should have the same height as the chain link and
surrounded by the barbed wire top guard.
34
3. Bodies of Water – additional security measures is necessary.
➢ Full-view fence
➢ wire fence (a manner that visual access is permitted), however primarily
designed for control or physical access into a facility, it includes chain
links, barbed-wire and concertina wire.
(chain link with mesh opening not larger than 2 square inch and made of
No. 9 gauge wire or heavier, minimum height of which is 7 feet.)
35
6. Barrier Maintenance – Fencing barriers and protective walls should always
be regularly inspected by security. Any sign or attempts to break in should be
reported for investigation. Destruction of fence or sections thereof should be
repaired immediately and guard vigilance should be increased.
PERIMETER GUARDS
Also employed in augmenting the existing perimeter security or perimeter
barriers of a certain establishment.
SECURITY LIGHTING
Basic requirements
1. Protective or security lighting needs at installations and facilities depends upon
each situations and the areas to be protected.
2. When such lighting provisions are impracticable, additional security post,
patrols , sentry dog patrols, or other security means will be neccessary.
36
3. Protective lighting should not be used as a psychological deterrent only.
4. Protective lighting maybe is protected by a central alarm system. Areas or
structures within the premeter , which are under specific observation.
AREAS TO BE LIGHTED
o Vehicular gate o Sensitive area
o Pedestrian gate o Storage area
o Thoroughfare o Perimeter fence
o Parking area
1. Incandescent Lights- low initial cost and provide good color rendition.
2. Mercury Vapor Lamps- emit a purplish-white color caused by an electric current
passing through a tube of conducting and luminous gas.
3. Metal Halide- similar in physical appearance to mercury vapor, but provides a light
source of higher luminous efficiency and better color rendition.
4. Fluorescent Lamp- provides good color rendition. However, it cannot project light
over long distances.
5. High-pressure Sodium Vapor- introduce in 1965, for exterior lighting of parking
areas, roadways, bulidings, and industrial and commercial installation.
6. Low-pressure Sodium Vapor- produces yellow color.
7. Quartz Lamps- very bright ight.
1. Floodlights- are used for outdoor security lighting including the illumination of
boundaries, fences, and buildings.
2. Street Lights- produce diffused light rather than directional beam. They are
widely use in prking areas.
3. Searchlights- are incandescent lights that provide a type of crime-related
lighting system.
PROTECTIVE ALARM
• It assists the security in detecting, impeding or deterring potential
security threat in the installation.
• To alert the security personnel for any attempt of intrusion into a
protected area, building or compound.
• To economize
• To substitute in place of other security measures.
• To supplement by providing additional controls.
39
TYPES OF PROTECTIVE ALARM SYSTEM
1. Central Station System – a type of alarm where the control station is located
outside the plant or installation. When the alarm is sounded or actuated by subscriber,
the central station notifies the police and other public safety agencies.
4. Auxiliary alarm – company-owned alarm systems with a unit in the nearest police
station so that in case of need, direct call is possible. The company maintains the
equipment and lines both for the company and those in the police, fire and other
emergency agencies by special arrangement. The auxiliary system can be availed of
by radio, landlines, or cell phones.
KINDS OF ALARMS
1. Audio Detection Device – it will detect any sound caused by attempted force entry.
A supersonic microphone speaker sensor is installed in walls, ceilings and floors of
the protected area.
2. Vibration Detection Device – it will detect any vibration caused by attempted force
entry. A vibration sensitive sensor is attached to walls, ceilings or floors of the
protected area. This is economical and easily installed, high salvage value, and flexible
in application.
3. Metallic foil or wire – it will detect any action that moves that foil or wire. An
electrically charge strips of tinfoil or wire is used in the doors, windows or glass
surfaces of the protected area. This is consistent trouble free service, and causes few
nuisance alarms.
4. Laser Beam Alarm – a laser emitter floods a wall or fencing with a beam so that
when this beam is disturbed by a physical object, an alarm is activated.
5. Photoelectric or Electric Eye Device – an invisible/visible beam is emitted and
when this is disturbed or when an intruder break contact with the beam, it will activate
the alarm.
6. Microwave Motion Detection Device – A pattern of radio waves is transmitted and
partially reflected back to an antenna. If they strike a moving object, they return at a
different frequency which results in initiating an alarm signal. Very effective for
protection of interior areas. This have a good Coverage, and Not affected by air
currents noise sound.
Bill traps or currency activation devices are usually place in the teller’s cash drawer
and connected to the alarm system using a wire connector. When currency is removed
from the devices, the alarm is activated.
41
FIRE ALARM SYSTEM
A devices working together to detect and warn people through visual and audio
appliances when smoke, fire, carbon monoxide or other emergencies are present.
These alarms may be activated automatically from smoke detectors, and heat
detectors or may also be activated via manual fire alarm activation devices such as
manual call points or pull stations.
FIRE PROTECTION
◦ Automatic Sprinkler – type of built-in sprinkler which works by the increase of
room temperature and which automatically operates the system to put out the fire.
◦ Fire Pump – mechanical device of supplying water which can be manual or motor driven.
42
◦ Stand Pipes – GI steel or plastic pipes located inside the building from the lowest
to the top floor with water under pressure for use in case of fire.
◦ Fire Hydrant – mechanical device strategically located in an installation or street
where a fire hose is connected so that water with pressure will be available to
extinguish a fire.
◦ Portable Hand Extinguisher – a fire fighting equipment which can be portable or
in a cart that is used to put out fire depending on the contents to extinguish certain
types of fires
◦ FIRSTS" IN DEVELOPMENT OF LOCKS
◦ The first mechanical locks, made of wood, were probably created by a number of
civilizations at the same time. Records show them in use some 4,000 years ago in
Egypt. Fastened vertically on the door post, the wooden lock contained moveable
pins or "pin tumblers," that dropped by gravity into openings in the cross piece or
"bolt," and locked the door. It was operated by a wooden key with pegs or prongs
that raised the number of tumblers sufficiently to clear the bolt so that it could be
pulled back. This method of locking was the forerunner of modern pin tumbler locks.
43
➢
➢ A door or lock opener: a device such as a plastic card with an encoded magnetic
strip that operates a door or lock.
PADLOCK – A portable and detachable lock having a sliding hasp which passes
through a staple ring or the like and is then made fast or secured.
TYPES OF LOCKS
WARDED LOCK – The underlying principle is the incorporation of wards or obstruction
inside the lock to prohibit a key from operating bolt unless the key has corresponding
notches cut in it do that it will pass the wards. Warden locks very little security. This
type of lock must therefore be used only to have privacy but not to provide a high
degree of security.
DISC TUMBLER LOCKS - These are also known as wafer locks. They have flat metal
have flat metal tumblers with open center fitted into slots in a plug that is in turn fitted
into a lock case. When the plug is turned, it activates a cam. The key is removable at
90 to 80 degrees and may be rotated either right or left.
LEVER TUMBLER LOCK – Each lever in the lock hinges on a fixed point and is held
down against a stop by the pressure of a flat springs. Each lever has as cut in it, and
all the gates can be located at different places.
PIN TUMBLER LOCKS – The pin tumbler mechanism depends for its security, and
several round pin or tumblers operating on a cylinder. Each tumbler pin is divided into
two parts, the upper which is flat on bolt, is called the driver; the bottom part called the
pin is rounded or slightly pointed on the lower end to fit the grooves or cuts in the key.
44
OTHER TYPES OF LOCKS
COMBINATION LOCKS – Are difficult to defeat, since they cannot be picked because
few experts can manipulate the devise to discover the combination. Most of this locks
have three dials which must be aligned in the proper order before the locks will open.
Some locks may have four dials for greater security.
CODE OPERATED LOCKS – Type locks and that no keys and that no key is used.
Pressing series of numbered button in the proper sequence opens them. Some of
them are equipped to alarm if wrong sequence is pressed.
KEY CONTROL
KEY CABINET- A CABINET will have to be of enough size to hold the original key to
every lock in the system. It should always be locked.
KEY RECORDS - Some administrative means must be set up to record code number
of lucks and to whom the keys of a specific locks was issued.
INVENTORIES - Periodic account must be made of all duplicates and original keys in
the hands of the employees whom they have been issued.
MASTER KEYING SYSTEM - It is a system used in big installations whereby keys
can open a group or groups of locks. This is possible using interchangeable cylinder
cores in the locks. Using locks with the same key in a facility is not master.
45
TYPES OF KEYS
Change keys-is a specific key which operates the locks and has a combination of
cuts, or batting, which match the tumbler of the tumblers in the lock.
Sub-master Key - is a key that could open all the locks within the particular area or
grouping in the particular facility.
Grand master key-is a type of key that will open everything in a system involving two
or more master key groups.
3 LEVEL OF CONTROL IN MASTER KEYING PLAN
One level-change key: all locks operated by change key only and keyed different or
required.
Two level-MASTER key: all levels operated by change keys and master key. Master
key operates all locks generally of one building.
Three-level-grand master key: operates all locks generally used in large building or
a facility with several building.
Four level-great grand master key: all locks operated by change key. Grand master
keys and great grand master keys are used in great grand master keys are used in
great or large complex system and like 3 level.
Five level-great grand master key: all locks operated by change key , master key,
grand master key, and great grand master key.
Reference
• Bobier (2016). Industrial Security Management. Chapterhouse Publishing.
Quezon City
• Ajero J M (2014) Industrial and corporate security management. Quezon City
:Wiseman's Books Trading
• Badua, J. (2016). Police personnel and records management. (2nd ed).
Wiseman's Books Trading. Quezon City :
• Corpus, W.M. &Delizo, DB. (2011). Industrial Security Management.
Wiseman’s Books Trading Inc. Quezon City
• Guevara, R. (2015). Police organization and administration with police
planning. (2nd ed.) Wiseman's Books Trading. Quezon City.
• Noll, G. (2014). Hazardous materials: managing the incident. (4th ed).
Burlington, MA : Jones & Bartlett Learning
• Peckley M F, (2012) Security officers and guards manual (in relation to RA.5487
as amended): with special topic on school security management. Quezon City:
Wiseman's Books Trading, Inc.
49
LET’S CHECK
11. Refers to a metallic container used for safekeeping of small items; its weight
must be at least 750 lbs.
a. Safe
b. Vault
c. File room
d. Metal cabinet
LET’S ANALYZE
Activity 1. Based on what you had read on the topics presented you are required to
write a reflection on your understanding on the principle of physical security and
intrusion detection system. Your reflection must utilize all the lines provided below.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
____.
Activity 2. In maintaining security and safety to an institution or industry, many factors should
be considered especially the physical security of the industry. At this juncture, you will
ELABORATE the importance of each barrier and protective alarm.
1. Full-view fence
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
________________________________________________________.
50
2 Solid-view fences
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
________________________________________________________.
3 Clear zone
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
________________________________________________________.
4 Top guard
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
________________________________________________________.
5 Tower guard
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
________________________________________________________.
Activity 3. In maintaining a secure and safe industry physical security is one of the
right thing to invest, however, there are some unforeseen event that the physical
security are not enough. What should you do to solve the lacking effectiveness
physical security installed in the establishment?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Activity 4. In this activity you are required to list at least 3 kinds of alarms. Give the
advantages and disadvantages. Use bullet forms for your answers.
1. ________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
____________________________________________.
2. ________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
____________________________________________.
3. ________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
____________________________________________.
IN A NUTSHELL
Activity 1. Physical security is very important, and one of the most big division in the
Security. The study of Physical security is concerned about the prevention and
deterrence of intruders.
Based from the definition of the most essential terms in the study of industrial
security management, please feel free to write your lessons learned below.
1. ________________________________________________________________
_______________________________________________________________
2. ________________________________________________________________
_______________________________________________________________
3. ________________________________________________________________
________________________________________________________________
____________________________________________.
52
Activity 2. There are a lot of physical security barriers being utilized in the industry.
Select at least three types of barriers which you think considered as the most important
and must be utilized in any industry. Explain and discuss further your choices.
1. ________________________________________________________________
_______________________________________________________________
2. ________________________________________________________________
_______________________________________________________________
3. ________________________________________________________________
________________________________________________________________
____________________________________________.
Q&A LIST. This part allows you to list down all rising questions or issues. These
questions or issues will be raised in the Blackboard discussion feature. You can write
your answers after the clarification. This will help you in the review of concepts and
essential knowledge.
Questions/Issues Answer
KEYWORDS INDEX
54
Big Picture in Focus: ULOc. Explain the important provisions of RA 5487 and its IRR.
METALANGUAGE
Below are the essential terms that you are going to encounter in the pursuit of ULOc:
Explain the important provisions of RA 5487 and its IRR. Please note that you will also
be required to refer to the previous definitions found in ULO a and b section.
NATURAL HAZARDS. These are hazards which arise from natural phenomena
HUMAN/MAN-MADE HAZARD. These are hazard which are the result of a state
of mind, attitude, weakness or character of one person or employee which can
disrupt operation of a plant or installation.
PILFERAGE. The act of stealing small things or items of little value, and habitually
doing this. It could be casual or Systematic.
ESSENTIAL KNOWLEDGE
PERSONNEL SECURITY
55
And this is also the reason why in the security chain personnel security is the
“weakest link” in the security.
Personnel Security includes all the security measures designed to prevent individuals
of doubtful loyalty, character, integrity from gaining access on classified matters and
sensitive facilities. It is composed of conducting personnel security investigation and
security education programs.
56
Visitors Movement Control
1. Visitor’s logbook – all visitors to any facility should be required to identify them
and should be given a visitor’s ID by the security. Visitor’s logbook should be filled up
with the named of visitors, nature and duration of visit.
2. Photograph – taking of photographs should also be considered. Extreme caution
must be exercised in areas where classified information is displayed to preclude
unauthorized taking of pictures of the installation.
3. Escort – if possible visitors should be escorted by the security to monitor their
activity within the establishment and guide them where to go.
4. Visitor entrances – separate access for visitors and employees of the
establishment should be provided.
5. Time travelled – if there is a long delay or time lapse between the departure and
arrival, the visitors may be required to show cause for the delay.
6. Visitors log- should contain identifying data, reason of visit, time in and out.
4. Grid System – A very complicated system, the installation is divided into grid
squares like a map. Each square is given number or letter designation. The visitors is
given a escort and shown the route, he could be stopped and questioned by the
guards.
5. Search of Vehicles - sign should be put at the entrance of the installation that
any vehicle entering is subjected for search.
57
DOCUMENT AND INFORMATION SECURITY
Protecting crucial documents has become progressively more critical in this age of fast growing
technology. The loss of document and information can cost a company huge amounts of money.
Business competitive badge and national security have been put at risk because proper security
precautions were not implemented. Oftentimes, the importance of document and information
security is not realized until after a loss has been discovered. Owing to this, a comprehensive
document and information security program is important to operating and competing in our modern
society.
Implementing an efficient and effective document and information security program requires
knowledge and skills in the field of document and information technologies as well as management.
Its management relies on a clear understanding of the types and uses of document and information
within an organization. Planned measures are needed to preserve the secrecy and integrity of
documents and information throughout all phases of its existence. To prevent loss of document and
information due to employee or procedural error, security administrators must implement an
effective document and information management plan.
In protecting vital documents and information, one must understand the capabilities and use
of document and information technologies in terms of how technology can be used in the creation,
usage, storage, transmission and disposal of information. One must also understand how
technology can be used in the manipulation and abuse of documents and information.
Types of Documents
• Class I – Vital Document – an irreplaceable record, reproduction of which does not have
the same value as the original
• Class III – Useful Document – a record, the loss of which may cause inconvenience but
could be readily replaced and may not present an insurmountable obstacle to the prompt restoration
of the business
• Class IV – Non-essential Document – a record that may include daily files, routine in nature,
the loss of which will not affect the organization’s operation. This class represents the bulk of the
records which can be kept in ordinary files ready for reference if needed and usually discarded after
some period of time.
58
Factors to Consider
2. Document and information security is based on the premise that the government has
the right and duty to protect official papers from unwarranted and indiscriminate
disclosure.
3. The authority and responsibility for the preparation and classification of classified
matters rest exclusively with the originating office.
4. Classified matter shall be categorized according to their content and not to the
classification of file in which they are held or another document to which they are
referred.
6. Each individual whose duties allow access to classified matter while it is in his
possession shall ensure the distribution of such matter on the “need to know” basis
only and to properly cleared persons only.
Information occurs through various stages. Familiarization of the different stages can
provide significant analysis on how it can be protected.
1. Creation - During this stage, information is discovered and developed. Information can take
the form of handwritten notes, discussion, dictated script, or electronic data. It is commonly
concentrated in laboratories, offices, word processing units and computer centers.
2. Use - Undoubtedly, information is created for use. This stage involves a process wherein
people act on the information for the purpose of making a decision based on the information,
soliciting support or informing others. When information is used, it usually includes duplication
as well as distribution. Duplication can be in the form of photocopying, printing or sending
through electronic mail.
3. Storage and Retrieval – Used information should be put away for future use. Storage and
retrieval methods must ensure the integrity of the information, its timely accessibility to
authorized users, and its protection from criminal intervention and disastrous circumstances.
The security measures that must be taken depend on the type of storage center, the storage
means and the storage technologies used. More importantly, the experience and
dependability of the personnel who will handle the storage and retrieval of information must
be considered.
4. Transfer – This involves the transfer of information from active to inactive storage.
Inactive records are usually located in remote areas less accessible to users. Special
security precautions should be taken at the time of the transfer and when records are on
the way from one place to another.
5. Disposition – This is the last stage of the cycle of information. During this stage, a
decision can be made to retain the information indefinitely at either an active or
inactive storage center or to dispose of it. The method of disposal should depend
on the amount of information and the type of media used. 59
Characteristics of Information (Fay, 2006)
Sensitive Information
Sensitive information refers to information that has value and should be protected, including
the following:
• Proprietary business and technical information.
• Personal data concerning applicants, employees, and former employees.
• Proprietary information owned by partners and obtained through an agreement.
1. Secret – This is information the unauthorized disclosure of which could cause serious
damage to the organization’s business. Its use and access to it are strictly limited.
Examples include:
• Trade secrets
• Plans to merge, divest, acquire, sell, or reorganize
• Information that could affect the price of shares
2. Restricted – This is information of such value or sensitivity that its unauthorized
disclosure could have a substantially detrimental effect on the organization’s business.
Examples include:
• Marketing strategies
• Customer files
• Agreements and contracts
3. Private – This is information relating to employees. Examples include:
• Salaries, bonuses, and wages
• Health and medical matters
Proprietary Information
Information is considered proprietary when it is not readily accessible to others; it was
created by the owner through the expenditure of considerable resources; or the owner actively
protects the information from disclosure (Fay, 2006). This can include secret formulas, processes,
and methods used in production; or it could be the company’s business and marketing plans, salary
structure, customer lists, contracts, and details of its computer systems.
Information is considered proprietary when it is not readily accessible to others; it was
created by the owner through the expenditure of considerable resources; or the owner actively
protects the information from disclosure (Fay, 2006). This can include secret formulas, processes,
and methods used in production; or it could be the company’s business and marketing plans, salary
structure, customer lists, contracts, and details of its computer systems.
1. Patents – grants issued by a national government conferring the right to exclude others
from making, using, or selling the invention within that country. Patents may be given for
new products or processes. Violations of patent rights are known as infringement or
piracy.
2. Trademarks – words, names, symbols, devices, or combinations thereof used by
manufacturers or merchants to differentiate their goods and distinguish them from products
that are manufactured or sold by others. Counterfeiting and infringement constitute
violations of trademark rights.
3. Copyrights – protections given by a national government to creators of original literary,
dramatic, musical, and certain other intellectual works. The owner of a copyright has the
exclusive right to reproduce the copyrighted work, prepare derivative works based on it,
distribute copies, and perform or display it publicly. Copyright violations are also known as
infringement and piracy.
4. Trade Secrets – formulas, patterns, compilations, programs, devices, methods,
techniques, and processes that derive economic value from not being generally known and
not ascertainable except by illegal means. A trade secret violation in the vocabulary of the
law is a misappropriation resulting from improper acquisition or disclosure. The key
elements in a trade secret are the owner’s maintenance of confidentiality, limited distribution,
and the absence of a patent.
SECURITY SURVEY AND INSPECTION
Security Survey
• The security survey is a fact-finding process whereby the assessment team gathers data
that reflects the who, what, how, where, when, and why of an organization’s existing
operation and facility. The purpose of a security survey is to identify and measure the
vulnerabilities to the facility or to specific assets by determining what opportunities exist
to exploit current security policies and procedures, physical security equipment, and
security personnel (Vellani, 2007).
• Security surveys include checklists, audits or inventories of security conditions.
Some experts include the risk analysis, but the process should instead begin with a needs
assessment. It identifies people, things, processes that are necessary to the continuation
of the business or work before the focus is directed to the potential threats that may
interrupt operations.
• On-site inspection and analysis are necessary in order to determine if there is existing
security, to identify deficiencies, to determine the level of protection needed, and to
recommend measures to enhance overall security (Hess & Wrobleski, 1996).
• The identification of anomalies implies that the surveyor is able to pinpoint a certain level
of security and that the existing conditions fall short of that. Sequentially, it requires the
need of the enterprise to be recognized as they will determine what actually requires
protection. In this stage, the needs assessment is no longer implicit but explicit. It is in
fact the foundation for the survey.
Security Inspection
• Security inspection is a tool to determine the possible risks in a facility in order to control
or prevent possible loss or damage of company assets. This thorough assessment of
what is happening from a security point of view ensures that risks are recognized and
cost-effective. Security inspection also deals with the prevention of risk by taking action
or using physical entities to reduce or eliminate one or more vulnerabilities.
Vulnerabilities are weaknesses that can be exploited by an adversary to gain an asset.
They include structural, procedural, electronic, human, and other elements that provide
opportunities to attack assets countermeasures are in place.
• Security inspection deals with the protection any person, facility, material, information,
activity and other assets that have a positive value to the organization. These assets
may also have value to an adversary, possibly in a different nature and magnitude to
how the owners value them.
• Security inspection also deals with the prevention of risk by taking action or using
physical entities to reduce or eliminate one or more vulnerabilities. Vulnerabilities are
weaknesses that can be exploited by an adversary to gain an asset. They include
structural, procedural, electronic, human, and other elements that provide opportunities
to attack assets
Purpose of Security Inspection
1. To determine compliance of security policies.
2. To detect weaknesses in the existing security measures.
3. To assess assets and the probability of risk or the likelihood that loss
will take place.
Phases of Security Inspection:
1. Detection of company policy violations - The acts or practices of employees that
are contrary to policy. For example, tampering on employee time cards or bringing
out company property for unknown reasons.
2. Detection of possible defects in protective devices and other security aids – For
example, empty fire extinguishers, destroyed perimeter fences, busted perimeter
lights, and alarm system defects.
3. Detection of the condition of properties being protected – For example, when
the property being protected is exposed to rain and sunlight.
4. Detection of security hazards – For example, improper storage of waste
materials
Importance of Security Inspection:
1. It can help determine the effectiveness of a risk appraisal.
2. It can identify weaknesses in security countermeasures.
3. It can prevent possible loss of company assets.
Steps in a Security Inspection:
1. Preparation
a. Review the management policy.
b. Review the loss appraisal report.
c. Use equipment needed in this activity.
2. Plan route
a. Identify priority areas.
b. Identify the sequence
Safety Inspection
• Safety is generally defined as the state of being certain that adverse effects will
not be caused by some agent under defined conditions. It means freedom from
danger, risk or injury. It involves measures (people, procedures, or equipment)
used to prevent or detect an abnormal condition that can endanger people,
property, or the enterprise.
• These abnormal conditions include accidents caused by human carelessness,
inattentiveness, lack of training or other unintentional events.
Objectives of Safety Inspection
1. To save life – An organization’s workers are considered its most
valuable asset. It is the obligation of the company to assure the safety
of its workers, as well as its visitors/ clients in its vicinity at all times.
2. To secure properties.
3. To restore the affected facility as soon as possible.
Purpose of Safety Inspection
1. Detection of defects such as materials, equipment, lighting and ventilation.
2. Detection of sub-standard conditions such as poor housekeeping, poor ventilation,
poor lighting, noise, poor maintenance and poor training of workers.
Phases of Safety Inspections
1. Detection of what might be called obvious hazards – actual unsafe conditions created
either by the action of people or physical deterioration; for example, blocked exits and
tripping hazards.
2. Detection of conditions, which, of themselves, may not be the direct cause of an
accident but would be contributory factors - for example, soapy water spilled on the floor.
3. Detection of conditions wherein employees’ performance is deviating from the standard
practice or established policy, which, in themselves, are wrong and unsafe – for example,
not wearing personal protective equipment (PPE)
4. Detection of employee performance, which, by themselves, are not hazardous but can
create hazards either directly or in a contributory manner – for example, storing old
documents in a corner.
SECURITY INVESTIGATION
➢ Security investigation is one of the major functions of a security organization. Most security officers
and supervisors are called upon to conduct preliminary investigation on theft, injury or any other
kind of untoward incident. These investigations are usually non-criminal in nature but still important
since they may result in civil litigation.
➢ The term investigation means a planned and organized determination of facts concerning specific
events, occurrences or conditions for a particular purpose. Security, on the other hand, means the
protection of property from loss through theft, fraud, fires, threats or hazards. While security
investigation is a planned and organized determination of facts concerning specific loss or damage
of assets due to threats, hazards or unsecured conditions.
Elements of Investigation
1. Investigator
2. Purpose
3. Subject of Investigator
The Three I’s of Investigation
1. Information – The knowledge which the investigator gathers from different sources.
a. Acquired from regular sources. Conscientious and public spirited citizens, company files,
school files, or records file of other agencies.
b. Acquired from cultivated sources. Paid informants, bartenders, cab drivers,
acquaintances, etc.
2. Interrogation – The skillful questioning of witnesses as well as suspects. This is different from
an interview. An interview means the simple questioning of a person who has no personal reason
to withhold information. Interrogation, in contrast means the questioning of a suspect or other
person who is reluctant to divulge information concerning the offense under investigation.
Purpose of Investigation
1. To identify the offender
2. To locate the offender
3. To provide evidence
Qualities of Effective Investigation
1. Objectivity
2. Thoroughness
3. Relevance
4. Accuracy
5. Timeliness
Investigation Report
➢ Report writing is a crucial part of the investigation. The most diligent and professionally
conducted investigation loses its value if the effort is not properly reported. An investigative
report is a written document in which the investigator records the activity in the
investigation and the evidence gathered. A competent investigator writes a report so that
a reader can readily understand what the investigator did, why it was done and the results
of the action.
Purpose of the Investigation Report
➢ The following are the rationale of an investigation report. 1. To provide a permanent official
record of the investigation 2. To provide other investigators with information necessary to
further advance the investigation 3. To uphold the statements as facts on which designated
authorities may base a criminal corrective or disciplinary action.
Qualities of an Investigation Report
1. The report serves as an objective statement of the investigation findings.
2. The report is an official record of the information relevant to the
investigation which the investigator submits to his superior.
3. The report is clear, brief, accurate, impartial but complete.
4. The report is sans of the investigator’s opinion or other irrelevant facts
foreign to the case.
5. The report is accurate and is a true representation of the facts of the case.
6. The report is clear and is logically and chronologically developed.
COLOR OF UNIFORMS
• Private Security Agency – fast Navy blue (upper and lower)
• Company Security Forces – light gray for upper and navy blue for lower.
• Government Security Forces – white for upper and navy blue for lower
UNDER WHAT CIRCUMSTANCES WHERE THE MUNICIPAL OR CITY OF
MAYORS CAN MUSTER OR INCORPORATE THE MEMBERS OF THE SECURITY
AGENCY?
In case of emergency or in time of disaster or calamity, to help in the
maintenance of peace and order in the protection of lives and property.
The deputized security guard shall receive direct orders from the chief of police
of the city or municipality for the duration of the emergency disaster or calamity.
EMERGENCY DEPUTATION
In case of emergency or in time of disaster or calamity, the Chief of PNP may
deputized any security guard to assist the PNP in the performance of its duties for the
duration of the emergency, disaster or calamity.
Reference:
❖ Badua, J. (2016). Police personnel and records management. (2nd ed).
Wiseman's Books Trading. Quezon City :
❖ Corpus, W.M. &Delizo, DB. (2011). Industrial Security Management.
Wiseman’s Books Trading Inc. Quezon City
❖ Guevara, R. (2015). Police organization and administration with police
planning. (2nd ed.) Wiseman's Books Trading. Quezon City.
❖ https://www.officialgazette.gov.ph/featured/about-the-pnp/
❖ https://www.chanrobles.com/IMPLEMENTING%20RULES%20OF%20REPUB
LIC%20ACT%20NO.%205487.pdf
❖ http://caraga.bfp.gov.ph/brief-history/
❖ https://www.sosia.com.ph/index.php/about-us/2-uncategorised/8-sosia-
general-background
LET’S CHECK
1. Which of the following is qualified to own and operate a security in the country?
A. Smith an American citizen
B. Gerry, a British who has married a Pilipino
C. Jose, a very rich Spanish tourist
D. Victor, who is a very poor Pilipino
2. What is the allowed maximum number of security personnel that a private security
agency/company guard force/private detective may employ?
A. 2000
B. 1500
C. 1000
D. 500
3. What is the required minimum age for one to be an operator or manager of a security
agency in the country?
A. 35
B. 30
C. 25
D. 20
4. What is the required minimum capitalization and the minimum bank deposit for new
applicants to license to operate?
A. 2,000,000.00 minimum capitalization and 1,500,000.00 minimum bank deposit
B. 1,500,000.00 minimum capitalization and 1,000,000.00 minimum bank deposit
C. 1,000,000.00 minimum capitalization and 1,000,000.00 minimum bank deposit
D. 1,000,000.00 minimum capitalization and 500,000.00 minimum bank deposit
5. It refers to a Security Force maintained and operated by any private
company/corporation utilizing any of its employees to watch, secure or guard its
business establishment, premises compound or properties.
A.Private detective Agency
B. law enforcement services
C. private security agency
D. company security force
6. It refers to a document issued by the Chief PNP or his duly authorized representative
recognizing a person to be qualified to perform his duties as private security or training
personnel.
A.License to operate
B. regular license to operate
C. license to exercise profession
D. duty detail order
7. Guard/detective, or a juridical person to establish, engage, direct, manage or
operate an individual or a private detective agency or private security
agency/Company Security Force shall have.
A. License to operate
B. regular license to operate
C. license to exercise profession
D. duty detail order
8. Which of the following may constitute the “kabit system?
A. Private security agency owned by corporation
B.Private security agency with no benefits
C. Private security agency with underrate wage
D. Maintaining a separate branch, unit or subsidiary office aside from the main
office of the agency situated within the same locality
9. What is the required minimum number of license security personnel employed in a
private security agency to acquire a Regular License to Operate?
A. 400
B. 300
C. 200
D. 150
10. What is the required number minimum number of license security personnel
employed in a company guard force or private detective agency to acquire a Regular
License to Operate?
A. 60
B.50
C.40
D.30
At this juncture, you will EXPLAIN the following provision of this law.
2. Security guard bringing his service firearms outside his Area of responsibility is
possible. When?
3. Security guard bringing his service firearms outside his Area of responsibility is
prohibited. When?
82
.
.
Activity 3. Based on what you had read on the topics presented on this section, you
are required to elaborate and explain the given words below. It must be at least 2-3
sentences in every given word.
1. Pass System
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
2. Security Clearance
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
3. Information Cycle
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
4. Passive Fire Protection
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
Activity 4. Getting acquainted with the essential terms, part and process in the making
of security survey is not enough, what also matters is you should also be able to write.
Now, I will require you to apply those learning in the previous topic and make your own
security survey.
I’ll let you choose your own establishment, nearest and accessible to your place.
84
CONFIDENTIAL
FROM:
DATE:
FOR:
SUBJECT:
Dear ,
Submitted hereunder is the security survey report of the survey made by our
team for checking and approval.
I. PRELIMINARIES
(Authority, Date and duration of survey, weather condition, survey personnel)
V. ENCLOSURES/EXHIBITS:
A. (Picture of particular area or hazard, put name or tittle)
It is believed that this Security Survey report will suffice your requirements for
adequate security of your establishment.
Respectfully yours,
Questions/Issues Answer
KEYWORDS INDEX
Since this is a board examination course, you are required to the Multiple-
Choice Final Examination inside the University as required by the policy. Accordingly,
this is non-negotiable for all licensure-based programs. You will be informed ahead of
the schedule.
Lastly, for any concerns or issues arising from this module, feel free to contact the
course administrator, program head or dean using the contact details provided in this
material.
COURSE SCHEDULES. This section calendars all the activities and exercises,
including readings and lectures, as well as time for making assignments and doing
other requirements.
Activity Date Where to Submit
Big Picture A: Quiz June 1, 2020 BB’s Quiz Feature
Big Picture A: Let’s Check Activities June 1, 2020 CF’s Email
Big Picture A: Let’s Analyze Activities June 4, 2020 CF’s Email
Big Picture A: In a Nutshell Activities June 4, 2020 BB’s Forum Feature
Big Picture A: QA List June 9, 2020 BB’s Discussion Feature
Prelim Exam June 11, 2020 CF’s Email
Big Picture B: Quiz June 17, 2020 BB’s Quiz Feature
Big Picture B: Oral Recitation June 17, 2020 Face to Face Discussion
Big Picture B: Let’s Check Activities June 19, 2020 CF’s Email
Big Picture B: Let’s Analyze Activities June 19, 2020 CF’s Email
Big Picture B: In a Nutshell Activities June 23, 2020 BB’s Forum Feature
Big Picture B: QA List June 23, 2020 BB’s Discussion Feature
Mid-term Exam June 26, 2020 CF’s Email
Big Picture C: Quiz July 6, 2020 BB’s Quiz Feature
Big Picture C: Oral Recitation July 6, 2020 Face to Face Discussion
Big Picture C: Let’s Check Activities July 8, 2020 CF’s Email
Big Picture C: Let’s Analyze Activities July 8, 2020 CF’s Email
Big Picture C: In a Nutshell Activities July 20, 2020 BB’s Forum Feature
Big Picture C: QA List July 20, 2020 BB’s Discussion Feature
Approved by:
88