You are on page 1of 16

-a state where people, institution, authority or groups feel fully secured of feeling,

free from any threat or vulnerability from somewhere or someone in his/her life,
liberty, property or activity.
FIRE - It could be in physical, psychological, social or economical form.
- Protection against any type of crime to safeguard life and assets by various
TECHNOLOGY methods and device

AND ARSON Security VS Safety


INVESTIGATI
Definition Aspect: Security is protection against external threats, Safety is
protection from internal harm.
ON Emotional Aspect: feeling of being safe is an emotional aspect while security has
to do with physical aspect.
Fire Technology and Arson Deliberate and Unintended: Security is the protection against deliberate threats
Investigation encompass while safety is protection against unintended threats.
specialized areas within fire Coverage: Security is a major affair that covers a wide area and goes even further
science and forensic to be an international aspect. Safety involves the premises of a house, company,
investigation dedicated to and institution.
understanding fire dynamics,
preventing fires, and BASIC PRINCIPLES OF SECURITY
determining the causes of
1. Command Responsibility- the responsibility of commanders for crimes
fires, including those set
committed by subordinate members. Cannot be delegated but security tasks can
intentionally (arson). These
be assigned.
disciplines combine
2. Compartmentation- Establishment and management of an organization so that
knowledge from various
information about the personnel or activities of one component is made available
fields such as chemistry,
to any other component.
physics, engineering, and
3. Balance between security and efficiency- Security prevails over efficiency
criminal justice to address
4. General principles of security remain constant- Specific measures to suit
fire-related incidents
BSCRIMINOLOGY-QD3A LEA - 3 operations
comprehensively.
5. Security is the concern of all personnel- Regardless of
rank,position,Designation

Brief History of Security in the Philippines


March 11, 1933- The private security business began. The first formally licensed
private security agency was “Special Watchman Agency”. Later it renamed
“Jimenez Security Agency”, founded by brothers Juan and Pedro Jimenez.
Security

Brief History of Security in the Philippines


May 30 1958- the Philippine Association of Detectives and Protective Agency Republic Act no. 11917- "The Private Security Services Industry Act." (July
Operators (PADPAO) was formally organized. 2022). An act strengthening the regulation of the private security services
RA 5487 (The Private Security Agency Law) was passed on June 13, 1969 industry, repealing RA 5487.
through the continuous lobbying of the incorporators and officers of PADPAO,
which set the standards and minimum requirements for the operations of security Different Types of Security
agencies. 1. Physical Security – is a system of barriers placed between the potential
intruder and the matter to be protected. It is considered as the broadest type of
Brief History of Security in the Philippines security. It prevents unauthorized access to equipment, facilities, material, and
P.D. 11 was passed on October 3, 1972, widening the coverage of RA 5487 to documents, and to safeguard them against espionage, sabotage, damage and theft.
include security guards employed in logging concessions, agricultural, mining and Types of Physical security;
pasture lands; • A. Active- by using different types of barriers. These involve the installation
P.D. 100 was issued on January 17, 1973, broadening the coverage of the security of physical barriers, security lighting, use of vaults, locks and others.
industry to include employees of the national or local government or any agency Methods used;
who are employed to watch or secure government building and properties. • Overt method
• Covert method
Brief History of Security in the Philippines • B. Passive- by using psychological approach. Those that will deter man from
04 August 1969, Philippine Constabulary (HPC), organized the Philippine committing such act of fear of being caught, charge in court or get dismissed,
Constabulary Security and Investigation Agency Supervisory Office such as: security education, programs, investigations, seminars, personnel security
(PCSIASO). later renamed to PC Supervisory Office for Security and check.
Investigation Agencies (PCSOSIA). On 29 June 1970, the office was renamed to
PC Supervisory Unit for Security and Investigation Different Types of Security
Agencies (PCSUSIA). On 31 May 1996 the Security Agencies and Guards 2. Communication Security – is the protection resulting from the application of
Supervision Division (SAGSD) was created as one division under the Civil various measures which prevents or delay the enemy or unauthorized person in
Security Group (CSG) to exercise supervisory authority and implement the Rules giving information through the communication system.
and Regulations embodied in RA 5487. On Sep 25, 2009, SAGSD was renamed 3. Hotel Security – is the protection resulting from the application of various
as the Supervisory Office for Security & Investigation Agencies (SOSIA) measures which safeguards hotel guests and personnel, hotel property, and
functions in hotel restaurants, bars and clubs.
Brief History of Security in the Philippines 4. Bank Security – is the protection from the application of various measures
At present: which safeguards cash and assets which are in storage in transit and during
• Civil Security Group (CSG)- is the main regulatory transactions.
office of the Philippine National Police (PNP) that 5. Document Security – is physical security that involves the protection of
exercises administrative and operational control over the documents and lassified papers from loss, access to unauthorized person, damage,
firearms, explosives and private security industries. theft and compromised through disclosure.
PNPSOSIA – PNP Supervisory Office for Security and 6. Personal and VIP Security – involve in the protection of top ranking official
Investigation Agencies –responsible for the issuance of implementing orders the government, visiting persons of illustrious standing and foreign dignitaries.
regarding the rules and regulations affecting security agencies operation. 7. Crisis Security- is the protection of the rich person, industrial magnates,
PNP FEO – issues licenses on firearms political leaders against kidnapping for economic, political, emotional or
nationalistic purposes.
8. Industrial Security- various measures to safeguard factories, manufacturing Security Hazard
establishment, etc. - An act or condition which results in a situation conducive to a breach of the
9. Operational Security- is physical which deals with the protection of processes, protection system and the subsequent loss or compromise, or damage to
formulas, patents and other activities. personnel, property or facilities.
10. Other special type of security such as Air cargo security, Supermarket, KINDS OF HAZARDS
School Security, Personnel security, etc. 1. Man –Made Hazards – an acts or conditions affecting the safe of operation of
the facility caused by human action, accidental or intentional. It includes
Physical Security sabotage, espionage, pilferage and theft.
– is a system of barriers placed between the potential intruder and the matter to be 2. Natural Hazard – cause by natural phenomena which cause damage,
protected. It is considered as the broadest type of security. It prevents Mdisturbance and problems of normal functioning activities, including security. It
unauthorized access to equipment, facilities, material, and documents, and to includes flood, lighting, storms and volcanic eruptions.
safeguard them against espionage, sabotage, damage and theft.
OBJECTIVES: The extent of degree of risk to security will be defendant on the
a. To protect the organization’s asset; following:
b. To make access so difficult that an intruder will not dare attempt penetration. 1. Relative criticality of operations- Is the importance of the firm which
CONCEPTS: reference to the national economy and security.
a.Enemy agents will always seek access; 2. Relative Vulnerability – The susceptibility of the plant or establishment to
b. Surreptitious entry is the greatest hazard to security; damage, loss, or disruption of operation due to various hazard.
c.There are no impenetrable barriers;
d. Each installation is different. Barrier
–any structure or physical device capable of restricting, deterring, delaying, illegal
FACTORS THAT BRING INSECURE CONDITION access to an installation.
1. Threat Generally, a barrier is use for the following purposes:
– An indication of impending danger or harm; 1. Outline the perimeter of the area to be secured;
- positive inimical acts 2. Create a physical and psychological deterrent to unauthorized entry;
2. Hazard 3. Delay intrusion, thus facilitating apprehension of intruders;
– A chance of being injured or harmed; 4. Assist in more efficient and economical employment of guards;
-passive inimical acts 5. Facilitates and impose the control of pedestrian and vehicular traffic.
3. Vulnerability
– inability to withstand the effects of a hostile environment
-measure of how open an establishment to intrusion, attack or injury Barrier
1. FIRST LINE OF DEFENSE – Perimeter barrier/fences - a medium or
structure which
4. Risk defines the physical limits of an installation or area to restrict or impede access
– is the potential that a chosen action or activity (including the choice of inaction) thereto.
will lead to a loss (an undesirable outcome). 2. SECOND LINE OF DEFENSE – Doors, floors, windows, walls, roofs and
-probability of an event to happen that will lead to loss. grills.
3. THIRD LINE OF DEFENSE – Storage system like steel cabinets, safes, - Securely fastened to rigid material or reinforced concrete;
vaults and interior files.
GENERAL TYPES OF PHYSICAL BARRIER:
1. NATURAL BARRIER – include mountains, rivers,
seas, desserts or terrain difficult to traverse. To be fully
effective, these barriers must be under surveillance of
guards.
2.STRUCTURAL OR MAN-MADE BARRIER –
structural constructions made by man like fences, walls, floors, roofs, grill or
other physical means to deter or impede
penetration.
- Reach within 2 inches of hard ground or paving;
TYPES OF FENCES
1. SOLID FENCE – Constructed in such away 2. BARBED WIRE FENCE - is a type of fencing wire constructed with sharp
that visual access through the fence is denied. It edges or points arranged at intervals along the strand(s). It is used to construct
denies the opportunity for the intruder to become inexpensive fences.
familiar with the personnel, activities and the
scheduled movements of the security personnel.
WALL – Masonry wall should have the same as the chain linked and surrounded
by the barbed wire as top 3. Concertina Wire or Dannert Wire – is a type of barbed wire or razor
guard. wire that is formed in large coils which can be expanded like a concertina.
-Opened concertina wire is 50 feet long and 3 feet diameter.
2. FULL VIEW FENCE
– It is constructed in such
a way that visuals access
is permitted through the
fence. It allows the security personnel to keep the ADDITIONAL PROTECTIVE MEASURES
surrounding of the installation under observation. On the other hand, it allows the 1. Top Guard- an addition overhang or barbed wire place
intruder to become familiar with the movements the security personnel. on vertical perimeter fences facing upward and outward
with a 45 degree angle with three to four strands of barbed
wires space six inches apart. This will increase the
protective height and prevent easy access.

TYPES OF FULL VIEW FENCE 2. Entry Stations – provided at main perimeter entrances
to
1. CHAIN LINK FENCE secure areas located out of the doors, and manned by
- Should be constructed minimum height of 7 feet guards on a full time basis.
excluding top guard;
- Mesh openings of not larger 2 inches per side;
1. Stationary Luminary – most common type consisting of fixed series of
luminaries. It is commonly used on entry gates of employees and vehicles.
3. Towers – a house like structures above the perimeter >Glare Protection Type – The intensity is focused to the intruder while the
barrier. Height of tower increases the range of observer or the guard remain in comparative darkness.
observation during day and night with artificial >Controlled lighting- The lighting is focused on certain objects than the
illumination. background.
2. Standby Lighting – similar to continuous lighting but can be turned on
manually or by special device or other automatic means, when there is a suspicion
of entry.
3. Emergency Lighting – stand by lighting which can be utilized in the event of
electrical failure.
PROTECTIVE ALARMS
4. Clear Zones – unobstructed area maintain on both sides of the perimeter - an aural or visual signal given by the annunciator to the security when intruder
barrier. It affords better observation and patrol movement. actuate certain devices in a protected area.
- 20 feet or more between the perimeter barrier and exterior structure. Annunciator- a visual or audible signaling device, which initiates conditions of
- 50 feet or more between the perimeter barrier andstructure within the protected associated circuits.
areas.
PROTECTION IN DEPTH THREE BASIC PARTS OF ALARM
-In large open areas or ground, where fencing or walling is impracticable and 1. Sensors- device that can sense an abnormal condition within the system and
expensive, warning signs should be conspicuously placed. provide a signal indicating the presence or nature of the abnormality
2. CIRCUIT- It is the communication channel that conveys the information from
5. Signs and Notices – erected where necessary in the all sensors in the system to the signal by means of wire, radio waves.
management of unauthorized ingress and preclude accidental 3. Signal- The actual alarm may be audible or silent, a bell, buzzer, phone ringing,
entry. or flashing of light.
TYPES OF PROTECTIVE ALARM
1. Central Station System – Several separate compounds tie their alarm system
SECURITY LIGHTING to a central station so that in case of need, the central station calls for assistance to
-Provides sufficient illumination to areas during hours of darkness. the police, fire department, hospital or with other government assisting units.
PURPOSES OF SECURITY LIGHTING 2. Proprietary System – Similar to the central station type excepts that the
1. It improves visibility so that intruders can be seen, identified and apprehend; proprietary console is located inside the subscribers installation who owns or
2. It gives psychological fear, which serves as a deterrent to thieves, pilferers, bases the system.
trespassers, and sabotage; 3. Auxiliary System – An installation owned system which is a direct extension
3. It makes easier. The routine of work of guards in identifying employees, of the local enforcement agency and/or fire department by special arrangements.
vehicles during night time; 4. Local Alarm System – Consists of rigging up a visual or audible alarm near
4. If placed in certain areas, may even reduce the number of stationary guards, the object to be protected. In case of alarm, response will be made by the local
and instead, may require only roving patrols at night. guards and other personnel within sight or hearing.

TYPES OF SECURITY LIGHTING


FIRE PROTECTION
FIRE ALARM - - Any visual or audible signal produced by a device or system to
warn the occupants of the building or fire fighting elements of the presence or
danger of fire to enable them to undertake immediate action to save life and HOW TO OPERATE FIRE EXTINGUISHER
property and to suppress the fire. •PULL the pin - Fire extinguishers often have a pin, latch, or puncture lever that
you need to release first.
DEVICES •AIM low - Aim the nozzle or hose of the extinguisher at the base of the fire.
•SQUEEZE the handle - This releases the extinguishing agent.
1. Smoke Detector - a device placed at the ceilings of the •SWEEP from side to side - Move in close, and sweep across the base of the fire.
floor that detects smoke, typically as an indicator of fire. Watch for re-flash of the fire.

CLASSES OF FIRE
2. Fire Bell -a hollow device made of metal that makes a 1. CLASS A FIRES –- involving ordinary combustible materials such as
ringing sound. wood, cloth, and paper, requires an extinguishing agent which cools. A water or
multi-purpose dry chemical can be used.
2. CLASS B - fires involving flammable and combustible liquids and gases,
such as solvents, greases, gasoline, and lubricating oil, require an extinguisher
AUTOMATIC SPRINKLER –built in sprinklers which works by the increase of which removes oxygen or cuts the chain reaction. Foam,
room temperature and which automatically operates the system to put out the fire. carbon dioxide, dry chemical, are effective.
Attached and distributed in the ceiling of the rooms. These sprinklers will go into 3. CLASS C - fires involve energized electrical
action once a fire starts, and those that will open are those that are directly above equipment (live electrical wires, electrical
the fire and water is delivered where it is needed. appliances). A non-conducting extinguishing agent such
as carbon dioxide or multi-purpose dry chemical must be
STAND PIPES- steel or plastic pipes located inside the used.
building from the lowest to the top floor with water under 4. CLASS D FIRES – the result of the combustion of certain materials in firely
pressure for use in case of fire. Located near the standpipe is divided forms. These metals can be magnesium, potassium, powdered aluminum
a fire hose usually enclosed in a glass box. and zinc.

ALARM DEVICES
FIRE HYDRANT- It is a mechanical device 1. Magnetic Door Contact -is a protective device
strategically located in an installation or in a street where usually placed in the door, and window that can
a fire hose will be connected so that the water will be send notification when the opening and closure
available to extinguished a fire. occurs

FIRE EXTINGUISHER- Is a fire fighting equipment which can is a fire fighting 2. Vibration Contact – mounted on barriers and
equipment which can be portable or in cart that is used to put out fire depending are used primarily to detect an attack on the
on the contents to extinguish certain types of fire. structure itself. When movement or vibration
occurs, the unstable portion of the circuit moves and breaks the current flow,  IP cameras are a type of Closed Circuit Television Camera (CCTV) used for
which produces an alarm. capturing images and audio recordings in surveillance for homes and
businesses.
3. Passive Infrared Detector (PIR) or PROTECTIVE LOCKS
Motion Sensor –able to distinguish if an LOCK – defined as mechanical, electrical, hydraulic or electronic device designed to
infrared emitting object is present by first prevent entry to a building or room.
learning the ambient temperature of the Type of Locks
monitored space and then detecting a change 1. Key – Operated Lock
in the temperature caused by the presence of - It uses some sort of arrangement of internal physical barriers which prevent the lock
an object. from operating unless they are properly aligned. The key is the device used to align
these internal barriers so that the lock may be operated.
PADLOCK – a portable and detachable lock having a pivoted or sliding hasp which
4. Panic button -Often located under the counter, the button can be pressed in possess through a staple ring, or the like and is
times of distress (Such as robbery, disruptive or threatening behavior, or a made fast or secured.
situation which may warrant assistance), triggering a silent alarm. 2. COMBINATION LOCK – a lock that requires
manipulation of parts according
to a predetermined combination code of numbers.
3. CARD OPERATED LOCK/CODED LOCK
5. CCTV - A video monitoring system is more – type of lock that can be opened by
commonly known as Closed Circuit Television inserting a coded card in a slot in the lock, or by pushing the correct button on the
Systems. A CCTV system is a system consisting surface of the lock.
of a television camera, video monitor, and 4. ELECTRONIC LOCK – type of lock that can be closed and opened remotely
transmission medium (Cable, fiber or wireless) by electronic means.
connecting the two. It is used to monitor the
premises. BIOMETRICS
•-A machine that can be used for identification of humans by their characteristics or
IP CAMERA traits.
•-It is used as a form of identification and access control.
•- It is equipped with recording device that can identify the person operating the lock
and the time it was operated.

KEY CONTROL
-defined as the management of keys in a plant or business organization to prevent
unauthorized individual access to the keys.
Change Key - a key to a single lock
 IP based cameras work by turning images and audio into data then
Sub-Master Key - a key that can open all locks within a particular area or grouping.
transmitting this data over a network or Internet connection.
Master Key – a special key capable of opening a series of locks
Grand Master Key – a key that can open everything in a system involving two or
more
master key groups. 3. Physically and mentally fit;
PETERMAN -A term used in England for lock picker, safecrackers, and penetrators 4. At least eighteen (18) years of age but not more than fifty (50) years old;
of restricted areas or rooms. 5. Has undergone Pre-Licensing course or its equivalent.
FALSE KEY - Genuine key stolen from the owner Note: Veterans and retired military/police personnel honorably discharge
including graduates of ROTC advance (or its equivalent in the PNP) are
exempted from the required Basic-Licensing Training.

HUMAN BARRIER QUALIFICATIONS FOR SECURITY OFFICER


•Security guard – Is any natural person who offers or renders personal service to 1. Filipino citizen;
watch or guard residential or business premises or both, government and/or their 2. Holder of a Baccalaureate Degree;
premises for hire and compensation. 3. Physically and mentally fit;
•Security Supervisor – Is charged with directing the work and observing the 4. Has graduated from a Security OfficerTraining Course or its equivalent
behavioral performance of the guard under his unit.
QUALIFICATIONS OF SECURITY CONSULTANT
ORGANIZATION AND ADMINISTRATION OF SECURITY GUARD FORCE 1. Filipino citizen;
PNPSOSIA – Philippine National Police Supervisory Office for Security 2. Physically and mentally fit;
Investigation Agency – office under the Civil Security Group which is charged with 3. Holder of Masters degree either in Criminology, Public Administration, MNSA,
the supervision, direction and control of all security agencies in the Republic. Industrial Security Administration, or Law
4. Must have at least ten (10) years experience in the operation and management of
Who May Organize And Maintain Private Security Agency And security business.
Private Detective Agency
 Any Filipino citizen or corporation, association, partnership, one hundred PRIVATE DETECTIVE
percent of which is owned and controlled by Filipino citizens. QUALIFICATIONS OF A PRIVATE DETECTIVE
1. Filipino citizen;
BASIC REQUIREMENT OF AN OPERATOR OR MANAGER OF 2. Physically and mentally fit;
SECURITY AGENCY 3. Holder of baccalaureate degree, preferably Bachelor of Laws or Bachelor of
1. Filipino citizen; Science in Criminology;
2. Not be less than twenty five (25) years of age; 4. Graduate of a Criminal Investigation Course offered by the PNP or NBI or any
3. College graduate and/or a commissioned officer in the inactive service or retired police training school, or a detective training in any authorized/recognized training
from the AFP or PNP; center;
4. Has taken a course/seminar on Industrial Security Management and/or must have 5. Advance ROTC graduate or its equivalent
adequate training or experience in security business,
4. Good moral character; DISQUALIFICATIONS
5. Having no previous record of conviction of crime or offense involving moral 1. Having previous record of any conviction of any crime;
turpitude. 2. Having previous record of any conviction of any offense involving moral turpitude;
3. Having been dishonorably discharged or separated from employment or service;
QUALIFICATIONS OF SECURITY GUARD OR WATCHMAN 4. Being a mental incompetent;
1. Filipino citizen; 5. Being addicted to the use of narcotic drug or drugs, and
2. High School graduate; 6. Being a habitual drunkard
7. Dummy of a foreigner • No firearm shall be borne nor be in the possession of any private security personnel
except when in actual performance of duty, in the prescribed uniform, in the place and
MORAL TURPITUDE time so specified in the Duty Detail Order (DDO).
It is an act of baseness, vileness or depravity in the private and social duties which a • Shall be carried only within the compound of the establishment where he is assigned
man owes to his fellowmen or to society in general, contrary to the accepted and to guard.
customary rule of right and duty between a man and man. These are conducts that are • While escorting big amount of cash or valuable outside of its jurisdiction or area of
considered contrary to community standards of justice, honesty and good morals. operation, private security agency shall issue an appropriate Duty Detail Order to the
Examples . Rape, Forgery, Robbery security personnel concerned
TYPES OF SECURITY GUARD FORCE Duty Detail Order (DDO) – is a written order/schedule issued by a superior officer
• Company Guard Force – security force maintained and operated by any private usually the private security agency/branch manager or operations officer assigning the
company/corporation utilizing any of its employees to watch secure and guard its performance of private security/detective services duties.
establishment.
• Security Agency service – security guard belonging to privately licensed agency CLASSIFICATION OF TRAINING AND ITS DURATION
(contractual basis); 1. Basic Security Guard Course (Pre-Licensing Course) – 150 hours;
• Government Guard Forces –security unit maintained and operated by any 2. Re-Training Course- 48 hours;
government entity other than military or police. 3. Security Officers Training Course – 300 hours
4. Basic Security Supervisory Course – 48 hours
POSSESSION OF FIREARMS
1. One (1) firearm for every two (2) security guards; Notes
2. Private security agency/private detective agency/company security - All Licenses to Operate have a validity of Two (2) years;
force/government security force shall not be allowed to possess firearms in excess of - All applications for renewal of License to operate (LTO) shall be filed at least sixty
five hundred (500) units. (60) days before the expiry date of LTO;
3. Shotguns not higher than 12 gauge - No application shall be approved unless a certification is issued by FED-CSG.
4. Weapons with bores not bigger than cal .22 to include pistols and revolvers with
bores bigger than cal .38 Approval, Cancellation, Suspension of LTO
Exemptions: in areas where there is an upsurge of lawlessness and criminality as Chief PNP
determined by the Chief PNP, Regional Office or their authorized representative, they -Approval of New Regular LTO
may be allowed to acquire, possess and use high powered firearms. -Cancellation of Regular LTO
-Re-instatement of Regular LTO
NUMBERS OF SECURITY PERSONNEL TO BE MAINTAINED TO SECURE -Suspension of Regular LTO
REGULAR LICENSE TO OPERATE Director Civil Security Group
1. Private Security Agency (PSA). — Any Filipino citizen or juridical entity wholly - Renewal of Regular LTO
owned and controlled by Filipino citizens may organize a private security agency and - Approval of Temporary LTO
provide security services: Provided, That they shall not employ more than two - Reversion of Regular to Temporary LTO
thousand (2,000) private security professionals as defined in RA 11917. - Cancellation of Temporary LTO
2. Company Guard Force/Private Detective Agency – minimum of thirty (30) - Suspension of Temporary LTO
and a maximum of One thousand (1,000)
CONFISCATION OF FIREARMS OF SECURITY GUARD
LIMITATION IN THE CARRYING OF FIREARMS 1. about to be used in the commission of a crime;
2. is used in the commission of a crime; Chief Inspector or the Detachment Commander.
3. has just been used in the commission of a crime;
4. firearm being carried by the security guard is unlicensed; ADVANTAGES OF COMPANY GUARD FORCE
5. confiscation of the firearm is directed by the order of the court; 1. High caliber and receives higher salary;
6. firearm is used or carried outside the property, compound or establishment serviced 2. Provides better service;
by the agency without proper authority; or 3. Can be trained to handle some of the more complex security duties;
7. security guard does not possess any license to exercise his profession. 4. More familiar with facilities they protect;
5. Tend to be more loyal with the company.
REVOCATION OF LICENSE TO POSSESS FIREARM
1. Failure to submit any issued firearm for verification as required; DISADVANTAGES:
2. Carrying firearms by security personnel without appropriate Duty Detail Order; 1.May be required to join the union;
3. When the firearm serial number has been duplicated on another firearm or using 2. Cost more;
one firearms license for more than one firearm other than those stipulated in the 3 Problem of ensuring availability of back-up personnel.
license;
4. Carrying of firearms outside of the place stated in the permit or in places prohibited ADVANTAGES OF AGENCY GUARD SERVICES
under the law; 1. Less expensive;
5. When the firearm was reported lost. 2. Use is convenient;
3. Less administrative and personnel problems;
SECURITY PERSONNEL RANKS, POSITIONS, STAFFING PATTERN AND 4. Agency assumes full responsibility for the scheduling and supervising of all guard
JOB DESCRIPTION personnel
1.1 Security Director (SD) –Agency Manager/Chief Security Officer – responsible 5. Easily obtain extra guard if needed;
for the entire operation and administration/management of the security agency. 6. Agency easily usually accepts liability of civil suits.
1.2 Security Executive Director (SED) – Assistant Agency Manager/Asst. Chief DISADVANTAGES:
Security Officer – Assist the Security Director 1.Lack of training, low caliber employee;
1.3 Security Staff Director (SSD) – consists of: 2. No loyalty to the company;
>Staff Director for operation -assistant of the security manager for the efficient 3. Large turnover
operation of the agency.
>Staff Director for Administration - is the staff assistant of the agency manager for ESSENTIAL QUALITIES OF SECURITY GUARD
the effective and efficient administration and management of the agency. 1. Alertness – being watchful in spotting violator, a person, a vehicle or an incident;
1.4Security Staff Director for Training- Staff in charge for Training – responsible 2. Judgment – sound and good judgment to arrive at wise and timely decisions;
for the training of the Agency’s security personnel 3. Confidence – faith in oneself and his abilities;
4. Physical Fitness – always in a condition to render effective service even under the
SECURITY PERSONNEL RANKS, POSITIONS, STAFFING PATTERN AND most strenuous conditions;
JOB DESCRIPTION 5. Tactfulness – ability to deal with others successfully without offending;
2.1 Security Supervisor 3 – Detachment Commander – is the field or area 6. Self Control – ability to take hold of oneself regardless of a provoking situation.
commander of the agency;
2.2 Security Supervisor 2 – Chief Inspector – responsible for inspecting the entire GENERAL FUNCTIONS OF A SECURITY GUARD
area covered by the detachment; 1. Enforce company rules and regulations;
2.3 Security Supervisor 1 – Inspector – responsible for the area assigned by the 2. Operate and enforce the personnel identification system;
3. Patrol and observe designated areas, perimeter, structures, installation;  Private Security personnel shall avoid direct contact either physically or
4. Take into custody a person attempting or giving unauthorized access in restricted otherwise with the strikers;
areas  They shall stay only within the perimeter of the installation which they are
5. Check rooms, buildings, storage rooms of security interest and after working hours, protecting at all times;
check proper locking of doors and gates.  shall only use sufficient and reasonable force necessary to overcome the risk
6. Perform escort duties when required; or danger posed by strikers or hostile crowds.
7. Respond to alarm signals or other indications suspicious activities and  They shall refrain from abetting or assisting acts of management leading to
emergencies; physical clash of forces between labor and management.
8. Safeguard equipment against sabotage, unauthorized access, theft or damage;  They must at all times be in complete uniform with their names and agency’s
9. At quickly in situations affecting the security of installation and personnel, to fire name shown on their shirts above the breast pockets.
accidents, internal disorder, attempts to commit criminal acts; FUNCTIONS OF A PRIVATE DETECTIVE
10. Control and regulate vehicle and personnel traffic and parking within the 1. Background Investigation;
compound; 2. Locating missing person;
11. Other duties that is necessary in the security guard function. 3. Conduct surveillance work;
4. Such other detective work as may become the subject matter of contract between
POWER AND DUTIES OF SECURITY GUARD the agency and its clients.
1. Territorial Power –shall watch and secure the property of the person, firm or
establishment with whom he or his agency has a contract for security services. Such POWERS OF CITY, MUNICIPAL MAYORS IN CASE OF EMERGENCY
services shall not extend beyond the property or compound of said person, firm or >The city or municipal mayor may incorporate the members of the security agency
establishment except when required by the latter in accordance with the terms of their nearest the area of such disaster or calamity to help in the maintenance of peace and
contract, or in hot pursuit of criminal offenders. order, or apprehension of violators of laws and ordinance, and in the protection of
2. Arrest by Security Guard – A security guard or private detective is not a police lives and properties.
officer and is not, therefore, clothed with police authority. However, he may arrest a >They shall receive direct orders from the Chief of Police of the city or municipality
person under the circumstances mentioned in Section 5, Rule 113, Revised Rules of for the duration of the emergency, disaster or calamity.
Criminal Procedure. SUPERVISION OF THE PNP
3. Search without Warrant – Any security guard may, incident to the arrest, search Licensed guards, who are actually assigned to clients with DDO, shall be deputized
the person so arrested in the presence of at least two (2) witnesses. He may search by the Chief, PNP, and clothed with authority to enforce laws, rules and regulations
employees of the firm or establishment with which he or his agency has a contract, within his area of responsibility.
when such search is required by the very nature of the business of the person, firm or INTER-RELATIONSHIP BETWEEN PRIVATE SECURITY PERSONNEL
establishment. AND MEMBERS OF THE PNP
1. Private security personnel are always subordinate to members of the PNP on
DUTIES DURING STRIKES AND LOCKOUTS matters pertaining to law enforcement and crime prevention.
 All private security personnel in direct confrontation with strikers, marchers or 2. Criminal investigation is the responsibility of the PNP. All results of initial
demonstrators shall not carry firearms. They may carry night sticks (baton). investigation conducted by the private security personnel and all evidence gathered by
Security them shall be turned over to the PNP unit/station concerned as a matter of course
personnel not in direct confrontation with the strikers may carry in the usual without delay.
prescribed
manner their issued firearm. GROUNDS FOR CANCELLATION OF SECURITY GUARD LICENSE
1. Assisting or protecting criminals during on or off duty status;
2. Providing confidential information to unauthorized person; •Wiretapping - is the monitoring of telephone conversations by a third party, often by
3. Posted security guard found drunk or drinking intoxicating liquor; and covert means.
4. Other similar acts •Bugging – means to secretly listen to or record a conversation using a hidden
electronic device.
THEFT AND PILFERAGE •Eavesdropping (unauthorized listening)- is the unauthorized real-time interception
Theft – committed by any person, who with intent to gain but without violence, of a private communication, such as a phone call, instant message, videoconference or
against, or intimidation of persons nor force upon things shall take personal property fax transmission.
of another without the latter consent.
RA No. 4200 (Anti Wiretapping Law)
UNLAWFUL ACTS
PSYCHOLOGICAL EXPLANATIONS ON THEFT 1. to tap any wire or cable, or by using any other device or arrangement, to secretly
1. The need or desire . An individual may need or desire to commit the act because overhear, intercept, or record such communication or spoken word by using a device
of commonly known as a dictaphone or dictagraph or dictaphone or walkie-talkie or tape
financial problem, inadequate income, extravagant living, gambling. recorder.
2. Kleptomania -is an irresistible urge to steal items of trivial value. People with this 2. to knowingly possess any tape record, wire record, disc record, or any other such
disorder are compelled to steal things, generally, but not limited to, objects of little or record, or copies thereof
no significant value. Exception: That the use of such record or any copies thereof as evidence in any civil,
3. The criminal tendency. The individual with such tendency may be more tempted criminal investigation or trial of offenses mentioned in section 3 hereof, shall not be
to steal if security control are inadequate. covered by this prohibition.
Note: Nothing contained in this Act, however, shall render it unlawful or punishable
THE CASUAL AND SYSTEMATIC PILFERER for any peace officer, who is authorized by a written order of the Court, to execute
•Casual Pilferer – One who steals due to his inability to resist the unexpected any of the acts declared to be unlawful in the two preceding sections
opportunity and has a little fear of detection.
•Systematic Pilferer – One who steals with preconceived plans and takes away any BANK SECURITY
or all types of items or supplies for economic gain. – a specialized type of physical security protecting the assets, personnel and operation
of a bank, with special emphasis on the precaution and measures to safeguard the cash
COMMUNICATION SECURITY and assets while in s storage, in transit, and during transactions.
– is the protection resulting from the application of various measures which prevent BSP) Circular No. 620 Issued on September 3, 2008 – a Circular which aims to
or delay the enemy or unauthorized persons in gaining information through the promote maximum protection of life and property against crimes (robbery, theft, etc),
communication system. This includes: and other destructive causes.
a. Transmission Security – component of communications security which results Guard System – BSP requires that all banks be manned by adequate number of
from all measures designed to protect transmission from interception. security personnel to be determined by the bank, taking into consideration its size,
b. Cryptographic Security – results from the provisions of technically sound crypto- location, costs and overall bank protection requirement.
system and their proper use. Security Devices – Banks are required to have a robbery alarm or other appropriate
c. Physical Security – providing safeguards to equipment and material from access device for promptly notifying law enforcement
by In armored Car operations – all armored vehicles are required to be built with
unauthorized persons. bullet

THREATS IN COMMUNICATION SECURITY


resistant materials capable of withstanding the firepower of high powered firearm • SECRET- any information and material, the unauthorized disclosure of which
(M16, M14). Also equipped with a vault or safe or a partition wall with a combination would
lock. endanger national security, cause serious injury to the interest or prestige of the nation
or any governmental activity.
DOCUMENT AND INFORMATION SECURITY • CONFIDENTIAL – any information and materials, the unauthorized disclosure of
– Security involving the protection of documents and information from loss, access which would be prejudicial to the interest or prestige of the nation or governmental
by activity or would cause administrative embarrassment or unwarranted injury.
unauthorized persons. It prescribes the policies and establishes the standard basic • RESTRICTED – any information and material which requires special protection
procedures governing the classification and security of official matter. other than those determined to be Confidential, Secret, and Top Secret matters.
GENERAL PRINCIPLES
1. The authority and responsibility for the preparation and classification of classified METHOD OF TRANSMISSION
matter rest exclusively with the originating office; 1. By direct contact of officer or personnel concerned;
2. Classified matter should be classified according to content; 2. By official courier;
3. Classification should be made as soon as possible by placing the appropriate marks 3. Electrical means in cryptographic form
on the matter to be classified; 4. Registered Mail
4. Each individual whose duty allows access to classified matter is responsible for the DESTRUCTION
protection of the classified matter while it is in his/her possession and shall insure that 1. Burning
dissemination of such classified matter is on the “need to know” basis and to 2. Shredding
“property cleared personnel only”. STORAGE- Shall be in a safe, steel filing cabinet with built in dial typecombination
lock.
• CLASSIFY – refers to the act of assigning to information or material one of the
four security classification categories after determination has been made that the OPERATIONAL SECURITY
information requires the security protection as provided for in the regulation; part of physical security that deals primarily with the protection of processes,
• SECURITY CLEARANCE – Is an administrative determination that an individual formulas, patents, and other industrial and manufacturing activities from espionage,
is eligible from a security standpoint for access to classified matter of a specific infiltration, loss, compromise or photocopying;
category; INFORMATION CYCLE
• COMPARTMENTATION – Refers to the grant of access to classified matter only 1. The Creation – Information is discovered and develop
to properly cleared persons when such classified information is required in the 2. Used – Some action is take with the information
performance of their official duties, and restricting it to specific physical confine 3. Storage and Retrieval – Stored for future use
when feasible. 4. Transfer – transferring of information from active to inactive use;
• NEED TO KNOW – term given to the requirement that the dissemination of 5. Disposition – decision may be made to retain the information indefinitely.
classified matters be limited strictly to those persons whose official duties require
knowledge thereof. KINDS OF SENSITIVE INFORMATION
•PROPRIETARY INFORMATION – information which some special way is
SECURITY OF CLASSIFIED MATTER related to the status, operations or activities of the possessor over which the possessor
• TOP SECRET – any information and material, the unauthorized disclosure of asserts ownership.
which would cause exceptionally grave damage to the nation, politically, •TRADE SECRETS - It may consist of any formula, pattern, device or compilation
economically or militarily; of information which is used in one’s business and which gives one opportunity to
gain an advantage over competitors who do not know or use it.
•PATENT – A grant given by the government to an inventor, conveying and securing
to him the exclusive rights to make, use and sell his invention for term of twenty (20) • 2. VAULT – a heavily constructed fire and burglar resistant
years. container usually part of the building structure use to keep and
protect cash, documents and negotiable instruments.
LAW ON INTELLECTUAL PROPERTY
INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES
[Republic Act No. 8293] Approved on June 6, 1997- an Act Prescribing The • 3. FILE ROOM – a cubicle in a building constructed a little
Intellectual Property Code And Establishing The Intellectual Property Office, lighter than a vault but of bigger size to accommodate limited
Providing For Its Powers And Functions, And For Other Purposes. people to work on the records inside,

THREAT TO PROTECTION OF SENSITIVE INFORMATION


Competitive Intelligence – systematic program for gathering and analyzing
information about competitor’s activities and general business trends to further PERSONNEL SECURITY
company’s goals. - Refers to the procedure followed, inquiries conducted, and criteria applied to
Types of Competitive Intelligence determine
1. White – information available from company publication, public records or the work suitability of a particular applicant or the retention of a particular employee.
commercial reporting sources;
2. Gray – not readily available but which is usually can be obtained without acquiring PURPOSE
any civil/criminal liability in the process. 1. To ensure that hired employees are best suited to assist the organization in
3. Black – obtained through clearly unethical or illegal means achieving its mission and vision;
2. To assist in providing the necessary security to the employees while they carry out
TYPES OF DOCUMENTS their functions.
Class I – Vital Document – This is an irreplaceable records , reproduction of which PERSONNEL SECURITY INVESTIGATION (PSI)- It is an inquiry into the
does not have the same value as the original; character, reputation, discretion, integrity, morals, and loyalty of an individual in
Class II – Important Document- This is a record, reproduction of which cause order to determine a person’s suitability for appointment or access to classified matter.
considerable expense and labor, or considerable delay.
Class III – Useful Document – This is a record, the loss of which may cause TYPES OF PSI
inconvenience but could be readily replaced and may not present insurmountable 1. National Agency Check
obstacle to the prompt restoration of the business; 2. Local Agency Check
Class IV- Non essential Document – This record may include daily files, routine in 3. Partial Background Investigation
nature, lost of which will not affect the organization. 4. Complete Background Investigation
BACKGROUND INVESTIGATION (BI) – It is an inquiry which aims to verify
STORAGE applicant’s information written at the applicants form, to ascertain his/her past
employment experiences and to obtain other information pertinent
• 1. SAFE – a metallic container used for safekeeping of documents or small items in to the decision to employ.
office or installation.
FACTORS TO BE CONSIDERED IN THE CONDUCT OF
BI
Loyalty – faithful allegiance to the Philippine government and its duly constitutional 1. Written authority should be obtained from proper authority.
authorities; 2. Previous surveys should be reviewed;
Integrity – uprightness in character, soundness of moral principle, freedom from 3. An orientation tour should be made;
moral delinquencies. 4. Photographs should be taken of things which will be difficult to describe in a
Morals – distinctive identifying qualities which serve as an index to the essential or report.
intrinsic nature of a person After completing the survey an immediate review of the findings should be
Character – the sum of traits that have been impresses by nature, education and habit undertaken with the plant supervisor so that urgent deficiencies can be addressed.
upon the individual. > A follow-up survey should always be conducted to ensure improvements
Discretion – the ability or tendency to act or to decide with prudence, the habit of > Any survey report including lists of recommendations is incomplete without
wise judgment; including a cost-benefit analysis.
Reputation – opinion or estimation in which one is generally held. It is what a person Cost-Benefit Analysis- a direct comparison of the cost of operation of the security
is reported to be whereas character is what a person is. unit and all the existing security measures with the amount of the corporate assets
saved or recovered as well as reduction of losses caused by injuries and lost
INVESTIGATIVE COVERAGE production and
1. Prior Employment; recommendations have been made”.
2. Claimed education;
3. Claimed residence for the period covered in the employment and educational PLANNING-Process of developing methods or procedures or an arrangement of
institutes; parts
4. If the candidate indicates a criminal record, then the details should be checked. intended to facilitate the accomplishment of a definite objective.
INVESTIGATIVE STANDARDS -The process of setting goals, developing strategies, and outlining tasks and schedules
1. Information sought should be relevant; to accomplish the goals.
2. Information should be reliable;
3. If unfavorable, the information should be confirmed by at least two sources. SECURITY PLANNING
It is PRE-DETERMINING a course of action;
SECURITY SURVEY It is deciding IN ADVANCE what to do, how to do it, and who is to do it.
- A fact finding probe to determine a plant’s adequacy in all aspects of security, with GOALS OF SECURITY PLANNING
the corresponding recommendations. • To minimize effects of any incident upon plant and personnel;
- Refers to checklist, audits, or inventories of security conditions. • To keep property and equipment loss at a minimum;
-often called ‘RISK ANALYSIS SURVEYS’ or ‘RISK ASESSMENT SURVEYS • To ensure cooperation of all plant departments charged with specific activities of an
PURPOSES OF SECURITY SURVEY: emergency;
1. To determine the existing state of security; • To ensure appropriate cooperative action by and with outside civic and government
2. Identifying weaknesses in defense; agencies.
3. To determine the degree of protection required;
4. To produce recommendations for a total security systems. KEY STEPS IN PLANNING
Note: The survey should be undertaken by trained staff security personnel, or a 1. Get in touch/coordinate with your Local Civil Authorities. (Tie your programs with
independent security specialist. No universal checklist can be applied to all sites for theirs and standardize equipment with them thus creating compatibility.);
survey purposes, as no two facilities are alike. 2. Visit neighboring Plants/offices (coordinate your activities with theirs.);
3. Survey your plant for possible hazards and take immediate action to lessen or
BEFORE COMMENCING A SECURITY SURVEY eliminate them;
4. Appoint a disaster Director or Disaster coordinator; EMERGENCY SITUATION – condition or state that danger has already occurred
5. Early in the planning stage, present the Program to your Employees and enlist their which resulted to loss of life/liberty and/or there is imminent danger or threat to life
active support; and property where delay will endanger or may cause the loss of life/property.
6. Call an organization meeting of Heads of services, employee representatives and
key personnel. (out line purpose of the program and explain how the plant should Other Definition of Terms
organize for protection; 1. Access List – authenticated list of personnel given to the security allowing entry to
7. Define the Program. a compound or installation or part thereof;
2. Controlled Area – an area near or adjacent to limited or exclusive areas where
TESTING THE PLAN entry is restricted;
Benefits in testing the plan 3. Dry-run – practical test or exercise of plans or any activity to test its validity, an
>Deficiencies will be uncovered; operational readiness exercise;
>People involved in the implementation of the plan will receive valuabletraining. 4. Duress Code – type of code system so that security personnel or any employee
TWO TYPES OF TESTING THE PLAN when forced by armed men intending to enter an installation can five alarm by the use
> partial (by elements); of certain words in casual conversation with personnel in the installation.
> complete (entire organization)
KEEPING THE PLAN UP TO DATE Other Definition of Terms
>Changes in Personnel and Facilities 5. Exclusion Area – a restricted area containing materials or operation of security
interest;
SECURITY EDUCATION- defined as the exposure and teaching of employees on 6. Restricted area – any area access to which is subject to special restriction control;
security and its relevance to their work. Security education is conducted to develop 7. Security Hazard – Is any act or condition, which may result in the compromise of
security awareness among employees of the company. It should cover all employees, information, loss of life, loss or destruction of property or disruption of objectives of
regardless of rank or position. the installation.
PERSONAL SECURITY - Protection of personnel especially ranking official from
any harm, kidnap, and others act. VIP security is type of personnel security;
POLICE SECURITY PROTECTION GROUP (PSPG) - is mandated by law to
provide protective security to government officials, foreign dignitaries, and private
individuals authorized to be given protection and also provide physical security to
vital installations, and assist the Presidential Security Group (PSG) in securing the
President and the members of the First Family.

PROTECTIVE CUSTODY – state or quality of being secured or freed from danger.


It may also includes the various means or device designed to guard a persons and
property against a broad range of security hazard.
THREAT –an indication of something impending and usually undesirable or
unpleasant, with an intention to inflict evil, injury or damage on another. It is an
expression of an intention to inflict loss or harm on another by illegal means.
THREAT ASSESSMENT – the process of investigation/validating the truthfulness
of
the existence of threat to an individual.

You might also like