You are on page 1of 13

INDUSTRIAL SECURITY MANAGEMENT GERALD L.

CENIZA,
PhD.
functions in hotel restaurants, bars
and clubs.
4. Bank Security – is the protection
resulting from the
application of
various measures
which safeguards
cash and assets
Security which are in storage in transit and
- Is defined as the state or quality of being during transactions?
secured, freedom from fear or danger, 5. Document Security – is physical security that
assurance, or certainty. To secure is to make involves the protection of
safe or be protected. documents and classified papers
- means the defense against crime or a state of from loss, access to unauthorized
being secured or free from hazard person, damage, and theft and
- A state of being free from hazards causing compromised through disclosure.
intentional or non-intentional damage to 6. Personal and VIP Security – involve in the
property, injury or loss of life. protection of top ranking official
- As any measures taken to keep an individual or the government, visiting persons of
group from dangers or hazards that may cause illustrious standing and foreign
harm, injury, loss of life, and or loss or damage dignitaries.
to property. Other special type of security
Hazard 1. Air cargo security- this is applied to minimize, if
- Refers to conditions that may cause damage to not prevent, losses of cargo during
property, injury, or loss of life. in transit, storage or transfer.
- Exposure to the chance of loss or injury. 2. School security- this is applied in response to the
- It is caused either by nature or by man increase of violent crimes
Industry committed against students and
- The term denotes earnest or constant school personnel, and school
application to work or business properties.
Management 3. Supermarket security- this is applied in response
- the skillful use of means to accomplish a to the mushrooming of bazaars,
purpose marts, super malls and the like
Industrial security 4. Personnel security-this involved in the
- security measures applied to business industries background checks of individuals
Industrial security management commensurate with the security
- the skillful handling of the security and safety requirements of their work.
measures of business enterprises and industrial Major division of industrial security
establishment 1. Physical security- this the broadest type of
Types of security security. As a major division of
1. Physical Security – is a system of barriers placed industrial security, it can be defined
between the potential intruder and as those measures taken to
the matter to be protected. It is prevent physical access or entry to
concerned with the physical an installation or area by
measures adopted to prevent unauthorized personnel
unauthorized access to equipment, 2. Personnel security- this involved in the
facilities, material, and documents, background checks of individuals
and to safeguard them against commensurate with the security
espionage, sabotage, damage and requirements of their work.
theft. 3. Document and information security-this
2. Communication Security – is the protection includes every measures designed
resulting from the application of to safeguard company documents
various measures which prevents from unintentional or intentional
or delay the enemy or harmful acts or against
unauthorized person in giving unauthorized disclosure of
information through the information contained therein
communication system. Principles of physical security
3. Hotel Security – is the protection resulting from
● Enemy agents must access
the application of measures which
safeguards hotel guests and
personnel, hotel property, and
1
INDUSTRIAL SECURITY MANAGEMENT GERALD L. CENIZA,
PhD.
● Perimeter barrier- Is a medium
or structure which defines the
physical limits of an installation
or area to restrict or impede
access thereto.
Lines of physical defense
1. First line of defense-includes all
perimeter barrier
● There is no impenetrable barrier- for the 2. Second line of defense- the building exterior
unfriendly government or organization, they are 3. Third line of defense- internal control measures
willing to devote enough time, money, Perimeter barrier openings
personnel, material and imagination in passing
● Gates and doors- should be guarded or locked
barriers.
as much as possible
● Defense in depth means barrier after barrier- in
● Windows and similar openings-should be
order to that the barrier could prevent
unauthorized access and serve its purpose very guarded or grills should be installed so as not to
well, there should be an integration of all be used by intruders.
barriers adopted in the installation ● Windows and openings less than 18 feet above
● Surreptitious vs. non- surreptitious entry- the ground,
physical security is needed to detect or deny ● Roofs and ledges less than 14 feet
unauthorized access
● Fire escapes or other openings of 96 square
● Each installation is different- since each
inches or larger- Should be grilled and or have
installation is different, each will have different
steel bar protections
problems to overcome
Barrier ● Sidewalk elevators- are elevated parts of the
- Refer to any physical structure whether natural land near the perimeter barrier that provides
or manmade capable of restricting, deterring, access to the areas within the perimeter
delaying or preventing illegal and unauthorized barriers should be locked or guarded
access to installation.
● Clear zone- is an obstructed area maintained on
Two general types of barrier
both sides of the perimeter barrier.
● Natural barrier- these are offered by nature - A clear zone of 20 ft or more should
which could obstruct the passage way of the exist between the perimeter barriers
potential intruders. and the exterior structure, parking
● Manmade barrier- these are structural areas and natural or manmade feature
- A clear zone of 50 ft or more should
construction like fences, walls, floors, grills,
exist between the perimeter barrier
bars, roadblocks or other physical means to
and structures within the protected
deter or impede penetration
areas except when the building wall
Specific types of physical security barriers
constitutes part of the perimeter
● Natural barrier- include mountains, cliff, seas, barrier
deserts or terrain difficult to traverse Types of perimeter barriers
1. Fences- are independent structure designed to
● Structural barrier- includes walls, ceilings, doors control physical and visual access between
and fences areas.
● Human barrier- include guard, charges of Types of fences
A. Solid Fence- is made of opaque
quarters, office and shop workers, who stand
material in such a way that
between the intruders and the matter to be
visual access through the
protected
fence structure is denied.
● Animal barrier-usually shepherd dog trained for Advantages of solid fence
and use as guards * Denies visual access of the
● Energy barrier- usually electrical and electronic installation to intruder
devices that could assist security personnel in * Denies the intruder the opportunity
detecting intrusions. Examples; protective
to become familiar with the
lighting
personnel, activities and the

2
INDUSTRIAL SECURITY MANAGEMENT GERALD L. CENIZA,
PhD.
* Standard barbed wire is twisted,
double strand 12 gauge with 4
point barbs spaced on equal
distance apart
* Barbed wire fencing must be
firmly affixed to posts high
excluding top guard
schedule of movements of the
guards * Barbed wire fencing should not be less than 7 ft.
Disadvantages of solid fence high excluding top guard
* Prevents the guards from observing * The distance between strands will not exceed 6
the area around the installation inches and midway between parts
* Creates shadow which may be used Additional protective measures
by the intruder for cover and ● Top guard- is an additional overhang of barbed
concealment wire placed on vertical perimeter fences facing
B. Full view fence- is constructed in such upward and outward with 45 degree angle with
a manner that visual access three to four strands of barbed wires spaced 6
is permitted such as wire inches apart. This will increase the protective
fence through the fence height and prevent easy access
structure. It is designed to
● Guard control station- are normally provided at
control physical access
between two areas main perimeter entrance to secure areas
Advantages of full view fence located out of door and manned by guards on
full time basis.
* Guards are able to keep the area
● Towers or guard towers- are house like
surrounding installation under
observation structure above the perimeter barriers. It gives
a psychological effect to violators
* Does not create any shadow
● Signs and notices or control signs-should be
Disadvantages of full view fence
erected where necessary in the management of
* Allows visual access to installation unauthorized ingress and preclude accidental
* Allows the intruder to get familiar entry.
Two types of employing perimeter guard
with the movements and the time
1. Fixed post-security guard are assigned in a
schedule of the guard patrols
particular place of the compound to guard and
Specification of using chain link fences
watch surroundings
* It must be constructed of 7 ft material excluding 2. Patrol (roving) - in this system, the security
top guard guard require to walk and go around regularly
around the company premises
* It must be 9 gauge or heavier Protective lighting
* Mesh openings are not be larger than 2 inches * Provides a means of continuing illumination
per side during hours of darkness, degree of protection
* It should be twisted and barbed salvage at top that is maintained during daylight hours.
bottom * This safe guard also has considerable value as a
* It should be security fastened to rigid metal or deterrent to thieves and vandals and may make
a job of the saboteur more difficult.
reinforced concrete
* It is an essential element of an integrated
* It must reach below surface enough on soft
physical security program
grounds to compensate for shifting soil or
Types of security lighting
ground
● Stationary luminary- series of fixed luminaries
* It must reach within 2 inches of hard ground or
to flood given area-continuously overlap
paving
Specifications of using barbed wire ● Standby lighting- turn on manually or physically
as needed

3
INDUSTRIAL SECURITY MANAGEMENT GERALD L. CENIZA,
PhD.
Interruption of light beam
- An invisible light beam is
transmitted at a frequency of
several thousand per second to
a special receiver.
- It can be bypassed by crawling
underneath or climbing over it.
- it is not fit for external or
● Movable lighting- searchlight; supplementary outdoor installations because fogs, smoke, dust,
rain, and other vision obstructions when devise
top other types of lighting.
enough can interrupt the light and trigger false
● Emergency light - This can be utilized in an alarm
event of electric failure. Detecting sound and vibration through an audio
Types of lighting equipment detection device
- Supersensitive microphone speaker sensors are
● Floodlights- are used for outdoor security installed in walls, ceilings, and floors of the
lighting including the illumination of protected area of any sound caused by
boundaries, fences and buildings attempted forced entry inspected by the
● Street light- produced diffused light rather than sensor.
- this can be utilized effectively to safeguard
direction beam. They are widely used in parking enclosed areas, vaults, safes, storage bins, file
areas. rooms, ware houses and similar enclosures
● Search lights- are incandescent lights that - it is not satisfactory where high ambient noise
provide a type crime related lighting system. levels are encountered proximate to
construction sites, aircraft traffic, and vehicular
● Fresnel light- wide beam units, primary used to movements
extend the illumination in long, horizontal strips Vibration detection device
to protect the approaches to the perimeter - The vibration sensitive sensor is attached to
barrier. Horizontal beam which is approximately walls, ceilings or floors of the protected areas.
180 degrees in the horizontal and from 15-30 Space and motion detectors
degrees in the vertical. - These systems derive their operating principle e
Alarm (signal) usually from a physical phenomenon known as
- a security device fitted to property, especially a Doppler Effect. Constant sound wave in a
house car, to make a warning sound if a break- cubicle disturbed by an object will cause change
in or theft is attempted of frequency and wave motion thereby causing
Protective alarm an alarm to trigger.
- it is the aural or visual signal given by the Penetration of an electron or electromagnetic fence
enunciator to security guard when intruder - It is an electronic fence consisting of 3 to 5
actuates device in a protected area strands of wired spaced from 9 to 24 inches
Enunciator above one another which serves as an antenna,
- Is the visual or audible signaling device which a monitor panel and an electric circuitry. When
initiates condition of associated circuits the power is put on, an electromagnetic field is
Metallic foil or wire alarm set among the wires from the top to the
Interruption of light beam ground. An intruder about two feet from this
Interruption of light beam field will trigger an alarm.
Detecting sound and vibration through an audio - This system is suggested to be located inside
detection device the chain link fencing to minimize nuisance
Vibration Detection device alarms caused by animals, debris blown by the
Space and Motion Detector wind, and harmless trespassers.
Electromagnetic fence Foot rail activator
Foot Rail Activator - Placing the front of their foot to engage the
Bill Traps activation bar placed on the floor in such
Double squeeze button alarm position that tellers may activate the alarm.
Operation and types of intrusion alarm system Bill traps
Breaking an electrical circuit through the metallic foil - are usually placed in the teller’s cash drawer
or wire and connected to the alarm system using a wire
- in a building or compound e, all possible point connector. When the currency is removed from
of entry can be wired by using electrically the devices, the alarm is activated. This is
charge strips of tin foil wire. Any actions that helpful when the employees are immediately
will move the foil or wire break the circuit and forced to leave their station without having an
activate the alarm opportunity to activate the alarm safety
4
INDUSTRIAL SECURITY MANAGEMENT GERALD L. CENIZA,
PhD.
- a metal bar with notches or
grooves that, when inserted into
a lock and turned, operates the
lock mechanism;
Padlock
- a portable and detachable lock
having sliding hasp which passes
through a staple ring or the like
Knee or thigh button and is then made fast or secured
- These are installed inside desk or teller station Peterman
so they can be activated by knee or thigh - an English term used to describe a lock picker
pressure. They are commonly found in a Warded locks
location where personnel usually perform their - offer very little security. This type lock must
duties from a seated position therefore be used only to have privacy but not
Double squeeze buttons to provide a high degree of security.
- pressure is required on both side of the device Disc tumbler locks
and therefore the probability of accidental - these are also known as wafer lock
alarm is reduced Lever tumbler lock
Types of alarm detection system - They are used in safe deposit boxes and are for
● Central station system-a type of protective alarm all practical purposes, pick proof. The least of
these locks are used in desk, lockers and
system where the central station is located
cabinets and generally less secure than pin
outside the installation.
tumbler lock.
● Proprietary system- this function in the same way Pin tumbler lock
as the central station system except that it is Combination lock
owned and leased by the subscriber, and Code operated lock
operated and located in the facility. since this Electromagnetic lock
system is monitored locally, the response time is Card operated lock
monitored locally. Types of keys

● Local alarm system- consist of rigging up a visual ● Change key- which operates the lock and has a
or audible alarm near the object to be protected. particular combination of cuts, or battings which
match the tumblers of the tumblers in the lock
● Auxiliary alarm-in this system installation circuits
● Sub master key- is the key that could open all the
are led into local police or fire department by
leased telephone lines usually by special lock within the particular area or grouping in a
arrangements. particular facility.

● Local alarm by chance system- this is a local alarm ● Master key- is a special key that is capable of
system in which a bell or siren is sounded with no opening a series of locks
predictable response. The hope is that a neighbor ● Grand master key- is a type of key that will open
or passing persons will reach to the alarm and call
everything in a system involving two or more
for the police assistance, but such a call is purely
master key groups
a matter of chance
Protective containers
● Dial alarm system- This system is set to dial a
● Safe- It is a metallic container used for the
predestined number when the alarm is activated.
safekeeping of documents or small items in an
It could fail if line were busy or if the phone
office or installation. Its weight must be at least
connection were cut.
750 lbs and its body should at least inch thick
Three parts of alarm system
steel
Sensor or trigger device
Circuits which carries messages to the signaling ● Vault-This is a heavily constructed fire and vulgar
apparatus resistance container usually a part of building
Signaling system, sometimes called the enunciator structure used to keep and protect cash,
Lock documents and negotiable instruments. It is
- a mechanical, electrical, hydraulic or electronic bigger than safe but smaller than file room. The
device to prevent entry into a building, room, or door should be made of steel at least 6 inches in
container or hiding place and to prevent the thickness. The wall, ceiling, floor reinforce
removal of items without the consent of the concrete at least 12 inches in thickness; the vault
owner. must be resistive to fire up to six hours.
Key

5
INDUSTRIAL SECURITY MANAGEMENT GERALD L. CENIZA,
PhD.
✔ A minimum capitalization of
1,000,000.00 only
✔ A minimum bank deposit of
500,000.00
Where to file:
✔ To the office of the CPNP
● File room-It is a cubicle in a building a little lighter thru the CPNP SOSIA (SAGSD) using SAGSD
form 01-94 and SGSD form 02-94
than a vault but bigger size to accommodate
respectively
limited people to work inside. It should 12 feet
Where to register:
high. It must have a water tight door and at least
fire proof for one hour ✔ Security and Exchange Commission
Security guard forces Graduated scale of license to operate
- It is a group of force selected men, trained or
✔ PSA with temporary LTO having 200 or more
group into functional unit for the purpose of
protecting operational processes from those but not exceeding 1000 shall be issued a regular
disruption which would impede efficiency or LTO good for 2 years
halt operation at particular plant, facility, ✔ New PSA shall be issued a temporary LTO good
installation, or special activity
for 1 year
Kinds of security guard force
✔ PSA with temporary LTO having posted 100
● Private security agency- refers to any person,
guards or more but less than 200 shall upon
association partnership, firm or private
expiration of such LTO shall be issued an
corporation, who contracts, recruits, trains,
extension period of six months. However, upon
furnishes or post any security guard, to do its
expiration of extension period, no extension
functions or solicit individuals, business or firms
shall be granted unless a certification for
or private or public or government owned or
additional 50 guards posted for 150 guards
controlled corporation to engage his/its service
total.
or those of his/its security guards, for hire,
commission or compensation ✔ PSA with temporary LTO upon expiration still
● Company security force- is a security force fail to comply with the 100 guards requirement,
shall be granted another 6 mos. Period.
maintained and operated by any private company
However failure to comply shall serve a basis for
or corporation for its own security requirements
the issuance of cease to operate order.
only
✔ LTO of PSA with less than 100 after 1 year shall
● Government security unit-is a security unit
not be renewed.
maintained and operated by any government
entity other than military and / a police which is ✔ PSA with cancelled/revoked LTO shall ceased to
established and maintained for the purpose of operate and within 7 days after having been
securing the office or compound and/or duly notified of such ceased to operate , shall
extension of such government entity. immediate deposit all its fire arms with the FEO(
Philippine Association of Detective and Protective FED) or to the nearest CSFD office.
Agency Operators (PADPAO) Basic requirement of an operator or manager of
- This is the national association of all licensed agency
security agencies and company security forces.
✔ Filipino citizen
License to operate (LTO)
- is a document issued by the CPNP or his duly ✔ At least 25 years old
authorized representative authorizing a person
to engage in the occupation, calling or ✔ College graduate or
employment as security guard or detectives, or
juridical person establish, engage, direct, ✔ A commissioned officer of an inactive service
manage or operate an individual or a private ✔ Retired from PNP or AFP or
detective agency or private security
agency/company security force after payment ✔ Graduated/ taken course in concepts and
of the prescribed dues or fees. methods in industrial security and security
Application of license: management and/or
New applicants for PSA license shall obtain
✔ Must have an adequate training or experienced
in security service

6
INDUSTRIAL SECURITY MANAGEMENT GERALD L. CENIZA,
PhD.
✔ ROTC advance/basic graduates,
and /or its equivalent in the
AFP,PNP,CAFGU
Basic qualification for private detective
✔ Holder of baccalaureate degree
or bachelor of laws or
✔ BS criminology graduate or;
✔ Good moral character
Tenure of security personnel ✔ Graduate of criminal investigation course
✔ It shall be co-terminus with the service contract offered by the PC/INP or the PNP or the NBI or
any police training with authorized or
between the PSA and the client.
recognized training center for security guard; or
Grounds for termination of guards services:
✔ Advance reserve officers training course or
� Expiration of contract
citizen military training (ROTC or CMT) graduate
� Revocation of license to exercise profession Qualification of security officer

� Conviction of crime involving moral turpitude ✔ Filipino citizen

� Loss of trust and confidence ✔ Holder of baccalaureate degree

� Physical and mental disability ✔ Physically and mentally fit

� Any other violation of the pertinent rules and ✔ Has graduated from a security officer training
regulations of RA 5487 course
Security guard ✔ Retired personnel of the PNP/AFP; and
- also known as private security guard or
watchman shall include any person who offers ✔ Must not posses any of the disqualification
or renders personal services to watch or secure Qualifications of security consultant
either a residence or business establishment or
✔ Holder of masters degree in either Criminology,
both or buildings for hire or compensation or as
employee thereof. public administration, industrial administration
Private detective or law; or
- refers to any person who does detective work ✔ Must have at least 10 years experience in the
for hire, reward or commission, other than
operation and management of security
members of the AFP, BJMP,provicial guards ,
business.
PNP or other law enforcement agency of the
Note: Any officer or enlisted man of the AFP or a
government.
uniform member of the PNP honorably
License to exercise profession or license certificate
discharge/separated or retired from the service are
- the document issued by the CPNP or his duly
exempted from the requirements
representative recognizing a person to be
PSA are entitled to possess firearms of any of the
qualified to perform his duties as security guard
following:
or detective
Basic requisites for security guards ● Shotgun not higher than 12 gauge;
✔ Filipino citizen ● Low-power rifle or revolver, cal .22
✔ High school graduate ● Cal .38 pistols or revolvers not exceeding 1 FA
✔ Physically and mentally fit for every security guard in its employ
Minimum number of FA:
✔ At least 18 years old but not more than 50 years - PSA with 100 guards- at least 30 pieces of
old licensed FA.However after operating 6 mos. The
PSA can procure firearms in proportion to the
✔ Has undergone pre -licensing training course: number of posted guards
and - For regular license to operate- at least 70 pieces
✔ Must not posses any of the following of FA
- Private detective agency- optional
disqualification
Exception is granted by the CPNP or regional director of
Exemption from pre-licensing:
RPO to possess high powered firearm under the
✔ Veterans and retired or honorably discharged following conditions
military/police personnel
7
INDUSTRIAL SECURITY MANAGEMENT GERALD L. CENIZA,
PhD.
- Individual issue to security guard
shall be limited to 25 rounds
Uniform for Security guard
* Service uniform

* Private security guard- fast navy


blue
* Company security guard- light
● Acquisition of the high powered FA shall be at
gray
the expense of the PSA/CSF concerned
* Government security unit- white
● Before the FA are used, the same should be
registered with the PNP-FED * Gala uniform- for ceremonial purposes only at
● The security personnel who will use such FA the expense of the establishment conducting
the ceremonies
shall first be given adequate training in the care
Ranks and Positions
and use thereof which will be under the
supervision of qualified officers and men of the * Security management staff
PNP
* Security director- agency manager/ chief
Limitations in carrying the FA
security of officer
● The issued FA shall be carried only by the
* Security executive director- assistant agency
security guard:
manager/ assistant security officer
● During his tour of duty when in proper uniform
* Security staff director- staff director for
within the compound of the establishment,
when he is assigned operation and staff director for administration
● Except when he is escorting big amount of cash * Line leadership staff
valuables, and prior coordination with the * Security supervisor 3-detachment commander
nearest PNP units
Duty Detail Order * Security supervisor 2-chief inspector
- PSA and CSF detailing security personnel on
* Security supervisor 1- inspector
duties under the circumstances mentioned or
while escorting bid amount of cash or valuable * Security guard
outside its jurisdiction or area of operation shall
issue an appropriate DDO using SAGSD form no * Security guard 1-watchman/guard
12-94
Reasons of revocation of license to possess FA * Security guard 2- shift-in-charge

� Failure to submit any issued FA for verification * Security guard 3- post-in-charge


as required by sec 897 of RAC * Security consultant-optional
� Carrying of FA by security guard without Job description
appropriate DDO Agency manager/chief security officer
- responsible for the entire operation and
� When its serial number is duplicated or using 1
administration of the security agency
SN for more than 1 FA - It is vested the authority and responsibility
� Carrying of FA outside the place stated in the of running the security force by authority of
the president of the company/corporation
permit
- He is the principal adviser to the president
� Conviction of the manager or operator of the on matters involving security operations and
agency of ant crime involving moral turpitude administration of security force
Assistant agency manager
� When the firearm was reported lost
- Assist the agency manager and takes the
Illegal possession of firearm operational and administrative management
- shall be committed by the security guard or when the manger is absent.
private detective who use unlicensed FA in the - He performs the duties as directed by the
performance of his duty, or use 1 FA with GM
duplicated SN Security staff director for operation
- It shall not exceed 50 rounds per unit of a duly - He is responsible for the conduct of
licensed FA investigation, intelligence and the conduct of
training.
8
INDUSTRIAL SECURITY MANAGEMENT GERALD L. CENIZA,
PhD.
go beyond the property or
compound, except:
● when required by the
clientele in accordance
with the terms of their
contract to escort big an
amount of money or
Security staff director for administration valuables or
- He is responsible for the professionalization ● In some cases of hot pursuit of criminals
of the personnel, procurement, recruitment,
Duty of SG making arrest
confirming of awards, mobility and issuance
- He shall immediately turnover the person
of firearms
arrested to the nearest peace officer.
Detachment commander
Search without warrant
- The field or area commander of the
Any security guard may;
company. Detachment shall consist of
several post * Incident to the arrest, search the person in
- He prepares and executes the security plan the presence of at least 2 witnesses.
of his detachment
* Also search the person, firm or
- He receives instruction from the GM and
implements the same as required establishment with which such search is
- He conducts inspection of his units and required by very nature of the business of
institutes corrective measures on the spot the clientele.
on those problems he may detect or brought General scope of detective work:
to his attention. If not possible he brings the Personnel security investigation
problem to the security manager of the ✔ Locating missing person
establishment.
Chief inspector ✔ Surveillance work
- shall be responsible for inspecting the entire Personnel security
area covered by the detachment - Includes all the security measures designed to
Security inspector prevent unsuitable individuals or persons of
- Responsible for the area assigned by the doubtful loyalty to the government, from
chief inspector of the detachment. gaining access to classified matter or to any
- He forms his men at least 30 minute before security facility, and to prevent appointment, or
posting time seeing that all are in proper retention as employees of such individuals.
uniform and presentable - The weakest link in security chain.
- He inspects the posts as often as he can to
* This weakness can best be minimize by
ensure that his men are on the alert and
performing their duties effectively making the personnel security conscious
Post- in-charge through good training program
- responsible for the entire detailed security * The superior must instruct his subordinates
officer/personnel within a certain
so they will know exactly what security
establishment
measures to take in every instance. An
Shift- in- charge
individual must be properly instructed and
- is responsible for the security officers who
must do a locking
are scheduled in a certain shift for a
Control of personnel in physical Security
particular period
Types of personnel identification
Watchman/guard
- The one actually posted as watchman or * Personal identification- familiarity of the
guard. person’s characteristics
- Is manning a fixed post especially entrance
or exit points, he must maintain a guard’s * Artificial identification-identification cards,
logbook and enters in the same logbook all passes, passwords.
events/ passages of VIP’s vehicles and Use of pass system
inspections or visits of security manager/ * Single pass system- the badge or pass code
director of the client/firm
for authorization to enter specific areas is
Territorial power
issued to an employee who keeps it in
- perform duties within the firm or
possession until his authorization terminates
establishment with whom he/his agency has
a contract for security service and shall not * Pass exchange system- an exchange takes
place at the entrance of each controlled
9
INDUSTRIAL SECURITY MANAGEMENT GERALD L. CENIZA,
PhD.
Control of vehicle in the installation
● Privately owned vehicle of
personnel/visitor should be
registered and are subject to the
identification and admittance
procedure
● Vehicles should be subjected for
area. Upon leaving the personnel surrenders
searched at the entrance and exit of the
his badge or passes and retrieve back his
installation
basic identification
● All visitors with vehicle should provide the
* Multiple pass system- this provides an extra
security the complete details of their duration
measure of security by requiring that an
to stay, person to be visited, and other
exchange take place at the entrance of each
information
restricted area
Visitor’s movement control ● All vehicles visitors should be given a sign or
* Visitor’s logbook- all visitors to any facility sticker to be placed on the windshield
should be required to identify themselves and ● Security personnel must constantly supervise
should be given a visitor’s ID by the security. parking areas and make frequent spot searches
Visitor’s logbook should be filled up with the and vehicles found there
name of visitors, nature and duration of visit. Personnel security investigation
* Photograph- taking of photographs should also - It is an inquiry into the character, reputation,
discretion and loyalty of individual in order to
be considered. Extreme caution must be
determine a person’s suitability to be given
exercised in areas where classified information
security clearance.
is displayed to preclude unauthorized taking of
- Types of PSI
pictures of an installation. If the visitor has a
camera and is prohibited to take the picture, * National agency check (NAC) - inquiry with
said camera should be left in the care of the the ff:
security with corresponding receipt.
✔ National Intelligence Coordinating Agency
* Escort- If possible visitors should be escorted by (NICA)
the security to monitor their within the
✔ National Bureau of Investigation
establishment and guide them where to go.
* Visitors entrances- separate access for visitors ✔ CIDG camp Crame
and employees of the establishment should be * Local Agency Check (LAC)- inquiry with ff:
provided
✔ Place of the locality where the individual
* Time travelled- If there is a long delay or time
is a resident
lapse between the departure and arrival, the
visitors may be required to show cause of the ✔ Mayor, police, fiscal, judge of the locality
delay. where the individual is a resident
* Access list- record of pre-determined visitors. Background investigation
Package movement control ✔ This more comprehensive investigation than the
● No packages shall be authorized to be brought NAC and LAC. A thorough and complete
investigation of all or some of the circumstances
inside the industrial installation, offices and
or aspects of a person’s life is conducted
work area without proper authority
Types of BI
● Outgoing packages carried by personnel should
● Complete background investigation- consist of
be closely inspected and those in vehicles
the investigation of the background of a person,
should also be checked as many pilfered items
particularly all the circumstances of his personal
are hidden in the surface of the vehicles leaving
life.
the compound.
● Partial background investigation- consist of the
● Any personnel/ visitor entering the installation
investigation of the background of an individual
with a package should deposit the same to the
but limited only to some of the circumstances
authority and in return receives a numbered
of his personal life which are deemed pertinent
tag, which he/she will use in claiming his/her
to the investigation
package upon departing
Security education
10
INDUSTRIAL SECURITY MANAGEMENT GERALD L. CENIZA,
PhD.
● Reclassify/regrading- is the act
of changing the assigned
classification of matter
● Upgrading- is the act of
assigning to a matter of a higher
classification
● Dissemination- shall be
● a seminar type given to employees of an
restricted to a properly cleared persons whose
installation pertaining to protective measures,
official duties required knowledge or possession
security procedures, personnel safety and
thereof. Responsibility for the determination of
protection of properties of the company or
need to know rest upon both individual, who
installation
has possession, knowledge or command control
● It has been stated previously that human of the information involve and the recipient
barriers includes shop workers, utility workers, ● Purging- is the process of destroying a
rank and file employees, and management staff
document which is no longer significant in the
of companies and business establishment
organization
● With these, company employees should be Risk
educated and made aware of their roles in the ● It is the potential damage or loss of an asset
security of their own company. The ultimate
Risk management
purpose is to make everybody security
conscious because “security is everybody’s ● It is the process of selecting and implementing
business” security countermeasures to achieve an
Types of business records acceptable level of risk at an acceptable cost
● Class I (vital records) - these include records Adversary
that are liable records of which reproduction ● an individual, group, or organization or
does not have the same value as the original, government that conducts activities or has the
records needed to recover cash, and records to intention and capability to conduct activities
avoid delay in restoration of production, sales detrimental to the individual, private or
and services. government
● Class II( useful records)-these include records Asset
which loss might cause inconvenience but ● Any information, facility, material or activity
could readily replace Ex. Procedures, policies which has a positive value to its owner whether
and plan it is individual, private or government entity.
● Class III (important records) These include Countermeasures
record of the reproduction of which will involve ● an action taken or physical security used to
considerable delay. Operating , statistical record reduce or eliminate one or more vulnerabilities
and contracts belong to this class Criticality
● Class IV( non-essential records)- these are the ● It is the impact of a loss as measured in financial
daily files, routine in nature so that if even if terms
lost or destroyed will not affect operation or Risk management alternatives and strategies
administration. Ex; daily report
● Risk avoidance- This is the eliminating or
● Classified- refers to assign information by one removing the risk totally from the business,
of the four categories government, or industrial environment for
● Compromise- means loss of security, which which the risk manager has responsibility. A
good example is the proper disposal of
results from unauthorized person obtaining
inflammable substances
knowledge of classified matter
● Risk reduction- This the decreasing the risk by
● Compartmentation- is the grant of access to
minimizing the probability of the potential loss.
classified matter only to properly cleaved
A good example is the construction of fences
persons in the performance of their official
and similar physical barrier
duties
● Risk spreading- This is the spreading of risk
● Declassify- is the removal of the security
through compartmentation or decentralization
classification from classified matter
to limit the impact of the potential loss. This
11
INDUSTRIAL SECURITY MANAGEMENT GERALD L. CENIZA,
PhD.
1. Location of items to be
pilfered- the
systematic pilferer
surveys shopping and
store areas.
2. Access to the items-
techniques can be
from fake documents,
could be done by using numerous vaults and bribing of guards, outsmarting
safe for the safe keeping of valuables such as security, creating disturbance and
documents and bills. other methods to divert attention
● Risk transfer- this is the moving the financial while pilferage goes on.
3. Removal of item- this can be done as
impact of the potential loss over to an
wearing the stolen shoes or shorts,
insurance company. This is done by availing of
concealment in the body or vehicle
property and life insurances. Hiring security
4. Disposal of item- there is a need for
agency is good example.
“fences” brokers or “clearing houses”
● Risk self- assumption- This the planned for these hot items.
assumption and acceptance of the potential risk 5. Security system- this the set of
by making a deliberate managerial decision of policies, procedures and rules and
doing nothing about the threat, or setting aside regulations designed to reduce to an
resources for the use in case of a specific loss absolute minimum the possibility of
incident. espionage, sabotage, and compromise
Types of hazards of classified information of an office or
a whole establishment
● Natural hazards- these are hazards which arise 6. Security survey- this also known as
from natural phenomena security audit which is actually a fact-
● Human- man made hazards- these are hazards finding probe to determine a plant’s
adequacy and deficiency in all aspects
which are result of a state of mind, attitude, of security, with the corresponding
weaknesses or character traits of one or more recommendations.
person. This includes; Countermeasure for casual pilferage
* Sabotage- It can be described as the ✔ Spot check on outgoing vehicles and
deliberate destruction or the deliberate persons
damaging or destroying of property or
equipment. For example by resistance ✔ An aggressive security education and
fighter, enemy agents, or disgruntled indoctrination program with emphasis the
workers. “crime does not pay”
* Espionage- It is the activity of spying or the ✔ Inventory and control methods should be
use of spying or spies to gather secret done especially to pilfer able items
information Countermeasures for systematic pilferage
* Pilferage- the act of stealing small things or ✔ Guards and electronic surveillance on all
items of little value, especially habitually. exits
Types of pilferer
✔ Package and material control system
1. Casual pilferer- is one who steals due
his inability to resist the unexpected ✔ Parking area outside perimeter fence
opportunity and has a little fear of
Countermeasure against sabotage
detection is no plan or premeditation
and he is usually a loner on the job. ✔ Use of an efficient , alert and trained guard
The temptation to pick up the article is forces
basically due to poor security measure
✔ Use of physical security aids like barriers,
2. Systematic pilferer- is one who steals
with preconceived plans and takes personnel and vehicular control, intrusion
away any or all types of items or devices, communication system
supplies for economic gain. Pilferer of ✔ Identification and movement control
this kind can be employees or outsider
system
of the establishment
Factors considered in pilferage ✔ Searches on incoming vehicle

12
INDUSTRIAL SECURITY MANAGEMENT GERALD L. CENIZA,
PhD.
- This is a planned and organized
determination of facts
concerning specific loss or
damage of assets due to threats,
hazards or unsecured condition

✔ Effective and compatible emergency


planning
Countermeasures against industrial espionage
✔ Continuing personnel check on employees
and particularly personnel on sensitive
position even already employed.
✔ Prevention of unauthorized entry to the
plant or industrial installation
✔ Restricting of movement of personnel in
the premises of the plant
✔ Controlled disposal of waste papers
including carbon in classified work
✔ Only properly cleared personnel should
handle classified work
Survey
- the term applied in the detailed “look see”
conducted by a team.
Security inspection or follow up surveys
- this the term referring to the succeeding
surveys after the initial survey
Special survey
- This is directed by management, if the initial
survey appears to have left certain portion or
aspects involving security due to change in
policy or operation that greatly affect the total
security picture
Entrance conference
- a conference or dialogue between the survey
team and management officials of a plant
before security survey is conducted.
Exit conference
- a conference similar to entrance conference
done after the completion of the security
survey.
Who performs security survey and audit?
- This should be conducted by qualified experts
who can be from the organization or outsiders
contracted to do the job.
Generally recommendations from the security survey
will fall into three categories;
a. Human guards
b. Equipment
c. Procedures
Security inspection
- This a check of how well security measures and
regulations are being carried out within a
detachment or establishment.
Security investigation

13

You might also like