Professional Documents
Culture Documents
By:
DEFINITION OF SECURITY
- Generally, the meaning of security is a kind of state where people, institution, authority or groups feel fully secured of feeling, free from
any threat or vulnerability from somewhere or someone in his/her life, liberty, property or activity. It could be in physical, psychological,
social or economical form.
-It is a state or quality of being secured, freedom from fear or danger, assurance, certainty.
- Protection against any type of crime to safeguard life and assets by various methods and device.
1. Command Responsibility
-Cannot be delegated but the security tasks can be
assigned. 2. Compartmentation
-Need to know basis
3. Balance between security and efficiency
-Security prevails over efficiency
4. General principles of security remain constant
-Specific measures to suit operations
5. Security is the concern of all
personnel
-Regardless of rank, position, designation
1. ACTIVE MEASURES – these involve the installation of physical barriers, security lighting, use of vaults, locks and others.
2. PASSIVE MEASURES – those that will deter man from committing such act of fear of being caught, charge in court or get dismissed, such as:
security education, programs, investigations, seminars, personnel security check.
- The private security business began on March 11, 1933, when the first formally licensed private security agency “Special Watchman Agency”
started operations;
- Later it renamed “Jimenez Security Agency”, founded by brothers Juan and Pedro Jimenez;
- On May 30 1958, the Philippine Association of Detectives and Protective Agency Operations (PADPAO) was formally organized;
-RA 5487 was passed on June 13, 1969 through the continuous lobbying of the incorporators and officers of PADPAO, which set the
standards and minimum requirements for the operations of security agencies.
- P.D. 11 was passed on October 3, 1972, widening the coverage of RA 5487 to include security guards employed in logging concessions,
agricultural, mining and pasture lands;
- P.D. 100 was issued on January 17, 1973, broadening the coverage of the security industry to include employees of the national or local
government or any agency who are employed to watch or secure government building and properties.
- On August 1969, the Philippine Constabulary activated the Security and Investigation Supervisory office or SIASO to supervise and
control the organization and operation of private security and detective agencies nationwide;
- Later it was renamed Philippine Constabulary Supervisory Office for Security and Investigation Agencies or PCSUSIA.
- With the passage of RA 6975, this unit was absorbed by the Philippine National Police;
-Later it was made into a division of the PNP Civil Security Group and was renamed Security Agencies and Guard Supervision Division (SAGSD);
1. Physical Security
2. Personnel Security
3. Document and Information
1. PHYSICAL SECURITY
Definition
– a system of barriers placed between the potential intruder and the objects/matter to be protected. It is the broadest branch of
security, which is concerned with physical measures adopted to prevent unauthorized access to equipment, facilities, materials and
documents and to safeguard them against espionage, sabotage, damage and theft.
OBJECTIVES:
QuestReviewCenter–IndustrialSecurity
Management 1
a. To protect the organization’s asset;
QuestReviewCenter–IndustrialSecurity
Management 2
b. To make access so difficult that an intruder will not dare attempt penetration.
CONCEPTS:
a. Enemy agents will always seek access;
b. Surreptitious entry is the greatest hazard to security;
c. There are no impenetrable barriers;
d. Each installation is different.
SECURITY HAZARD
An act or condition which results in a situation conducive to a breach of the protection system and the subsequent loss or
compromise, or damage to personnel, property or facilities.
KINDS OF HAZARDS
1. Man –Made Hazards – an acts or conditions affecting the safe of operation of the facility caused by human action, accidental or
intentional. It includes sabotage, espionage, pilferage and theft.
2. Natural Hazard – cause by natural phenomena which cause damage, disturbance and problems of normal functioning
activities, including security. It includes flood, lighting, storms and volcanic eruptions.
BARRIER – can be defined as any structure or physical device capable of restricting, deterring, delaying, illegal access to an installation.
1. FIRST LINE OF DEFENSE – Perimeter barrier/fences - a medium or structure which defines the physical limits of an installation or area to
restrict or impede access thereto.
2. SECOND LINE OF DEFENSE – Doors, floors, windows, walls, roofs and grills.
3. THIRD LINE OF DEFENSE – Storage system like steel cabinets, safes, vaults and interior files.
TYPES OF FENCES
1. SOLID FENCE – Constructed in such away that visual access through the fence is denied. Its advantage is that it denies the opportunity for
the intruder to become familiar with the personnel, activities and the scheduled movements of the security personnel. On the other hand, it
prevents the guards from observing the area around the installation and it creates shadow that may be used by the intruder for cover and
concealment.
WALL – Masonry wall should have the same as the chain linked and surrounded by the barbed wire as top guard.
2. FULL VIEW FENCE – It is constructed in such a way that visuals access is permitted through the fence. Its advantage is that it allows the
security personnel to keep the surrounding of the installation under observation. On the other hand, it allows the intruder to become familiar with
the movements the security personnel.
2. BARBED WIRE FENCE - is a type of fencing wire constructed with sharp edges or points arranged at intervals along the strand(s). It is used
to construct inexpensive fences.
3. Concertina Wire or Dannert Wire – is a type of barbed wire or razor wire that is formed in large coils which can be expanded like a concertina.
-Opened concertina wire is 50 feet long and 3 feet diameter.
ADDITIONAL PROTECTIVE MEASURES
Top Guard- an addition overhang or barbed wire place on vertical perimeter fences facing upward and outward with a 45 degree angle
with three to four strands of barbed wires space six inches apart. This will increase the protective height and prevent easy access.
QuestReviewCenter–IndustrialSecurity
Management 3
3. Entry Stations – provided at main perimeter entrances to secure areas located out of the doors, and manned by guards on a full time
basis.
QuestReviewCenter–IndustrialSecurity
Management 4
4. Towers – a house like structures above the perimeter barrier. Height of tower increases the range of observation during day and night
with artificial illumination.
5. Clear Zones – unobstructed area maintain on both sides of the perimeter barrier. It affords better observation and patrol movement. It
should be cleared of anything that may provide concealment or assistance to a person seeking an authorized entry.
CLEAR ZONE
- 20 feet or more between the perimeter barrier and exterior structure.
- 50 feet or more between the perimeter barrier and structure within the protected areas.
PROTECTION IN DEPTH
-In large open areas or ground, where fencing or walling is impracticable and expensive, warning signs should be conspicuously placed.
- The depth itself is protection.
6. Signs and Notices – erected where necessary in the management of unauthorized ingress and preclude accidental
entry. SECURITY LIGHTING
Provides sufficient illumination to areas during hours of darkness.
PURPOSES OF SECURITY LIGHTING
1. It improves visibility so that intruders can be seen, identified and apprehend;
2. It gives psychological fear, which serves as a deterrent to thieves, pilferers, trespassers, and
sabotage; 3. It makes easier. The routine of work of guards in identifying employees, vehicles
during night time;
4. If placed in certain areas, may even reduce the number of stationary guards, and instead, may require only roving patrols at night.
TYPES OF SECURITY LIGHTING
1. Stationary Luminary – most common type consisting of fixed series of luminaries. It is commonly used on entry gates of employees and
vehicles.
>Glare Protection Type – The intensity is focused to the intruder while the observer or the guard remain in
comparative darkness.
>Controlled lighting- The lighting is focused on certain objects than the background.
2. Standby Lighting – similar to continuous lighting but can be turned on manually or by special device or other automatic means, when
there is a suspicion of entry.
3. Emergency Lighting – stand by lighting which can be utilized in the event of electrical
failure. PROTECTIVE ALARMS
Is an aural or visual signal given by the annunciator to the security when intruder actuate certain devices in a protected area. An
annunciator is a visual or audible signaling device, which initiates conditions of associated circuits.
Basically, alarm system are designed to alert security personnel of a attempted or consummated intrusion into an area,
fire,building or other
smoke, or compound. Each type
emergencies of alarm is
and presence of activated
hazards. in the event that an intruder tampers with the circuitry, a beam or radiated
THREE BASIC PARTS OF ALARM
1. Sensors
- device that can sense an abnormal condition within the system and provide a signal indicating the presence or nature of the
abnormality
2. CIRCUIT
- It is the communication channel that conveys the information from all sensors in the system to the signal by means of wire, radio waves.
3. Signal
- The actual alarm may be audible or silent, a bell, buzzer, phone ringing, or flashing of light.
FIRE PROTECTION
FIRE ALARM - - Any visual or audible signal produced by a device or system to warn the occupants of the building or fire fighting elements
of the presence or danger of fire to enable them to undertake immediate action to save life and property and to suppress the fire.
DEVICES
1. Smoke Detector - a device placed at the ceilings of the floor that detects smoke, typically as an indicator of
fire. 2. Fire Bell -a hollow device made of metal that makes a ringing sound.
AUTOMATIC SPRINKLER – a type of built in sprinklers which works by the increase of room temperature and which automatically
operates the system to put out the fire. Attached and distributed in the ceiling of the rooms. These sprinklers will go into action once a fire
starts, and those that will open are those that are directly above the fire and water is delivered where it is needed.
STAND PIPES
G.I. steel or plastic pipes located inside the building from the lowest to the top floor with water under pressure for use in case of fire.
Located near the standpipe is a fire hose usually enclosed in a glass box.
FIRE HYDRANT
It is a mechanical device strategically located in an installation or in a street where a fire hose will be connected so that the water will be
available to extinguished a fire.
FIRE EXTINGUISHER
Is a fire fighting equipment which can is a fire fighting equipment which can be portable or in cart that is used to put out fire depending on
the contents to extinguish certain types of fire.
CLASSES OF FIRE
1. CLASS A FIRES –- involving ordinary combustible materials such as wood, cloth, and paper, requires an extinguishing agent which cools.
A water or multi-purpose dry chemical can be used.
2. CLASS B - fires involving flammable and combustible liquids and gases, such as solvents, greases, gasoline, and lubricating oil, require
an extinguisher which removes oxygen or cuts the chain reaction. Foam, carbon dioxide, dry chemical, are effective.
3. CLASS C - fires involve energized electrical equipment (live electrical wires, electrical appliances). A non-conducting extinguishing
agent such as carbon dioxide or multi-purpose dry chemical must be used.
4. CLASS D FIRES – the result of the combustion of certain materials in firely divided forms. These metals can be magnesium,
potassium, powdered aluminum and zinc.
QuestReviewCenter–IndustrialSecurity
Management 5
PULL the pin - Fire extinguishers often have a pin, latch, or puncture lever that you need to release first.
AIM low - Aim the nozzle or hose of the extinguisher at the base of the fire.
SQUEEZE the handle - This releases the extinguishing agent.
SWEEP from side to side - Move in close, and sweep across the base of the fire. Watch for re-flash of the fire.
ALARM DEVICES
1. Magnetic Door Contact -is a protective device usually placed in the door, and window that can send notification when the opening and
closure occurs
2. Vibration Contact – devices mounted on barriers and are used primarily to detect an attack on the structure itself. When movement or
vibration occurs, the unstable portion of the circuit moves and breaks the current flow, which produces an alarm.
3. Passive Infrared Detector (PIR) or Motion Sensor –PIRs are able to distinguish if an infrared emitting object is present by first
learning the ambient temperature of the monitored space and then detecting a change in the temperature caused by the presence of an
object.
4. Panic button -Often located under the counter, the button can be pressed in times of distress (Such as robbery, disruptive or threatening
behavior, or a situation which may warrant assistance), triggering a silent alarm.
5. CCTV - A video monitoring system is more commonly known as Closed Circuit Television Systems. A CCTV system is a system
consisting of a television camera, video monitor, and a transmission medium (Cable, fiber or wireless) connecting the two. It is
used to monitor the premises.
IP CAMERA
>IP based cameras work by turning images and audio into data then transmitting this data over a network or Internet connection.
>IP cameras are a type of Closed Circuit Television Camera (CCTV) used for capturing images and audio recordings in surveillance
for homes and businesses.
-The IP name stands for Internet Protocol, a system that allows the transmission of images captured by a digital video recorder (DVR) to
the end destination computers and these components together make up a video security system.
PROTECTIVE LOCKS
LOCK – defined as mechanical, electrical, hydraulic or electronic device designed to prevent entry to a building or room.
Type of Locks
1. Key – Operated Lock
- It uses some sort of arrangement of internal physical barriers which prevent the lock from operating unless they are properly aligned. The key
is the device used to align these internal barriers so that the lock may be
PADLOCK – a portable and detachable lock having a pivoted or sliding hasp which possess through a staple ring, or the like and is made fast or
secured.
2. COMBINATION LOCK – a lock that requires manipulation of parts according to a predetermined combination code of numbers.
3. CARD OPERATED LOCK/CODED LOCK – type of lock that can be opened by inserting a coded card in a slot in the lock, or by pushing the
correct button on the surface of the lock.
4. ELECTRONIC LOCK – type of lock that can be closed and opened remotely by electronic means.
BIOMETRICS
- A machine that can be used for identification of humans by their characteristics or traits.
- It is used as a form of identification and access control.
- It is equipped with recording device that can identify the person operating the lock and the time it was operated.
KEY CONTROL
– defined as the management of keys in a plant or business organization to prevent unauthorized individual access to the keys.
PETERMAN
-A term used in England for lock picker, safecrackers, and penetrators of restricted areas or rooms.
FALSE KEY
- Genuine key stolen from the owner
HUMAN BARRIER
Security guard – Is any natural person who offers or renders personal service to watch or guard residential or business premises or both,
government and/or their premises for hire and compensation.
Security Supervisor – Is charged with directing the work and observing the behavioral performance of the guard under his unit.
Republic Act 5487, as amended – The Private Security Agency Law, approved on June 13, 1969.
PNPSOSIA – Philippine National Police Supervisory Office for Security Investigation Agency – office under the Civil Security Group which
is charged with the supervision, direction and control of all security agencies in the Republic.
WHO MAY ORGANIZE AND MAINTAIN PRIVATE SECURITY AGENCY AND PRIVATE DETECTIVE AGENCY
Any Filipino citizen or corporation, association, partnership, one hundred percent of which is owned and controlled by Filipino citizens.
1. Filipino citizen;
2. Not be less than twenty five (25) years of age;
3. College graduate and/or a commissioned officer in the inactive service or retired from the AFP or PNP;
QuestReviewCenter–IndustrialSecurity
Management 6
4. Has taken a course/seminar on Industrial Security Management and/or must have adequate training or experience in security
QuestReviewCenter–IndustrialSecurity
Management 7
business,
4. Good moral character;
5. Having no previous record of conviction of crime or offense involving moral turpitude.
1. Filipino citizen;
2. High School graduate;
3 Physically and mentally fit;
4. At least eighteen (18) years of age but not more than fifty (50) years old;
5. Has undergone Pre-Licensing course or its equivalent.
Veterans and retired military/police personnel honorably discharge including graduates of ROTC advance (or its equivalent in the PNP)
are exempted from the required Basic-Licensing Training.
1. Filipino citizen;
2. Holder of a Baccalaureate Degree;
3. Physically and mentally fit;
4. Has graduated from a Security Officer Training Course or its
1. Filipino citizen;
2. Physically and mentally fit;
3. Holder of Masters degree either in Criminology, Public Administration, MNSA, Industrial Security Administration, or Law
4. Must have at least ten (10) years experience in the operation and management of security business.
PRIVATE DETECTIVE
Any person who does detective work for hire, reward or commission, other than members of the AFP, BJMP, PNP or any other law enforcement
agencies.
1. Filipino citizen;
2. Physically and mentally fit;
3. Holder of baccalaureate degree, preferably Bachelor of Laws or Bachelor of Science in Criminology;
4. Graduate of a Criminal Investigation Course offered by the PNP or NBI or any police training school, or a detective training in
any authorized/recognized training center;
5. Advance ROTC/CMT graduate or its
equivalent DISQUALIFICATIONS
MORAL TURPITUDE
It is an act of baseness, vileness or depravity in the private and social duties which a man owes to his fellowmen or to society in
general, contrary to the accepted and customary rule of right and duty between a man and man.
Conduct that is considered contrary to community standards of justice, honesty and good morals.
Examples . Rape, Forgery, Robbery
2. Security Agency service – security guard belonging to privately licensed agency (contractual basis);
3. Government Guard Forces –security unit maintained and operated by any government entity other than military or police.
POSSESSION OF FIREARMS
1. One (1) firearm for every two (2) security guards;
2. Private security agency/private detective agency/company security force/government security force shall not be allowed to
possess firearms in excess of five hundred (500) units.
3. Shotguns not higher than 12 gauge
4. Weapons with bores not bigger than cal .22 to include pistols and revolvers with bores bigger than cal .38
Exemptions: in areas where there is an upsurge of lawlessness and criminality as determined by the Chief PNP, Regional Office or their
authorized representative, they may be allowed to acquire, possess and use high powered firearms.
1. Private Security Agency – minimum of two hundred (200) licensed private security personnel and a maximum of one thousand
(1,000).
2. Company Guard Force/Private Detective Agency – minimum of thirty (30) and a maximum of One thousand
QuestReviewCenter–IndustrialSecurity
Management 8
1. No firearm shall be borne nor be in the possession of any private security personnel except when in actual performance of duty,
in the prescribed uniform, in the place and time so specified in the Duty Detail Order (DDO).
2. Shall be carried only within the compound of the establishment where he is assigned to guard.
3. While escorting big amount of cash or valuable outside of its jurisdiction or area of operation, private security agency shall issue
an appropriate Duty Detail Order to the security personnel concerned
Duty Detail Order (DDO) – is a written order/schedule issued by a superior officer usually the private security agency/branch manager or
operations officer assigning the performance of private security/detective services duties.
DDO for the purpose of post duties not requiring transport of firearms outside of the physical compound or property of a client or
client establishment shall be issued for not more than a thirty (30) days duration
Chief PNP
-Approval of New Regular LTO
-Cancellation of Regular LTO
-Re-instatement of Regular LTO
-Suspension of Regular LTO
SURETY BOND
Agency with 1 -199 guards – P50,000.00
Agency with 200-499 guards –
P100,000.00 Agency with 500-799 guards
– P150,000.00 Agency with 800-1000
guards – P200,000.00
STOCKING OF AMMUNITION
1. Stocks of ammunition in the agency shall not exceed fifty (50) rounds of ammunition per unit of duly licensed firearms.
2. Individual issue to each
security guards shall be limited to twenty five (25) rounds for every security
CONFISCATION OF FIREARMS OF SECURITY GUARD
1. When the firearm is about to be used in the commission of a
crime; 2. When the firearm is actually being used in the commission of a
crime; 3. When the firearm has just been used in the commission of a
crime;
4. When the firearm being carried by the security guard is unlicensed or a firearm is not authorized by law and regulation for
his use; 5. When the confiscation of the firearm is directed by the order of the court;
6. When the firearm is used or carried outside the property, compound or establishment serviced by the agency without proper
authority; or
7. When a security guard does not possess any license to exercise his profession.
In all the above cases, the confiscating officer inform immediately the agency
REVOCATION OF LICENSE TO POSSESS FIREARM
1. Failure to submit any issued firearm for verification as required;
2. Carrying firearms by security personnel without appropriate Duty Detail Order;
3. When the firearm serial number has been duplicated on another firearm or using one firearms license for more than one firearm
other than those stipulated in the license;
4. Carrying of firearms outside of the place stated in the permit or in places prohibited under the
law; 5. When the firearm was reported lost.
3. Security guard
3.1 Security Guard 1 – Watchman/guard- the one actually posted as watchman and or guard
3.2 Security Guard 2 – Shift in- charge – responsible for the security officers who are scheduled in a certain shift for a particular
QuestReviewCenter–IndustrialSecurity
Management 9
period
3.3 Security Guard Post in- charge –responsible for the entire detailed security office within a certain
QuestReviewCenter–IndustrialSecurity
Management 10
RA 5487. Note: Security Agency operator/manager/owner can put its own staffing pattern provided it is consistent with the provisions of
DISADVANTAGES:
1. May be required to join the
union; 2. Cost more;
3 Problem of ensuring availability of back-up personnel.
DISADVANTAGES:
1. Lack of training, low caliber
employee; 2. No loyalty to the company;
3. Large turnover
4. Not familiar with facilities
1. Territorial Power – A security guard shall watch and secure the property of the person, firm or establishment with whom he or his
agency has a contract for security services. Such services shall not extend beyond the property or compound of said person, firm or
establishment except when required by the latter in accordance with the terms of their contract, or in hot pursuit of criminal offenders.
2. Arrest by Security Guard – A security guard or private detective is not a police officer and is not, therefore, clothed with police
authority. However, he may arrest a person under the circumstances mentioned in Section 5, Rule 113, Revised Rules of Criminal
Procedure.
3. Search without Warrant – Any security guard may, incident to the arrest, search the person so arrested in the presence of at least
two (2) witnesses. He may search employees of the firm or establishment with which he or his agency has a contract, when such search
is required by the very nature of the business of the person, firm or establishment.
1. All private security personnel in direct confrontation with strikers, marchers or demonstrators shall not carry firearms. They may
carry only night sticks (baton) which may or may not be provided with tear gas canister and dispenser. Security personnel not in
direct confrontation with the strikers may carry in the usual prescribed manner their issued firearm.
2. Private Security personnel shall avoid direct contact either physically or otherwise with the strikers;
3. They shall stay only within the perimeter of the installation which they are protecting at all times;
4. In protecting and securing the assets and persons of their clients, shall only use sufficient and reasonable force necessary to
overcome the risk or danger posed by strikers or hostile crowds.
5. They shall refrain from abetting or assisting acts of management leading to physical clash of forces between labor and management.
6. They must at all times be in complete uniform with their names and agency’s name shown on their shirts above the breast pockets.
QuestReviewCenter–IndustrialSecurity
Management 12
calamityoftolives
protection helpand
in the maintenance of peace and order, prevention of crime, or apprehension of violators of laws and ordinance, and in the
properties.
>They shall receive direct orders from the Chief of Police of the city or municipality for the duration of the emergency, disaster
or calamity.
In case of emergency
INTER-RELATIONSHIP BETWEEN orPRIVATE
in times of disaster or
SECURITY calamities, the
PERSONNEL ANDChief, PNP may
MEMBERS OFdeputize
THE PNPany security guard to assist the PNP
in the performance of police duties for the duration of such emergency, disaster or calamity. Licensed guards, who are actually
1.assigned to clientspersonnel
Private security with DDO,are
shall be deputized
always by the
subordinate to Chief, PNP,ofand
members the clothed
PNP on with authority
matters to enforce
pertaining laws,enforcement
to law rules and regulations
and crime
prevention. They cannot enforce any provision of the law except in executing citizen’s arrest and/or conducting initial investigation of a
commission of a crime. In such case, any arrested person shall be turned over immediately to the nearest PNP unit/station.
2. Criminal investigation is the responsibility of the PNP. All results of initial investigation conducted by the private security personnel and
all evidence gathered by them shall be turned over to the PNP unit/station concerned as a matter of course without delay.
Theft – committed by any person, who with intent to gain but without violence, against, or intimidation of persons nor force upon
things shall take personal property of another without the latter consent.
1. The need or desire . An individual may need or desire to commit the act because of financial problem, inadequate income, extravagant living,
gambling.
2. The psychological need (Kleptomania) -is an irresistible urge to steal items of trivial value. People with this disorder are compelled
to steal things, generally, but not limited to, objects of little or no significant value.
3. The criminal tendency. The individual with such tendency may be more tempted to steal if security control are
Casual Pilferer – One who steals due to his inability to resist the unexpected opportunity and has a little fear of detection.
Systematic Pilferer – One who steals with preconceived plans and takes away any or all types of items or supplies for economic gain.
COMMUNICATION SECURITY – is the protection resulting from the application of various measures which prevent or delay the enemy or
unauthorized persons in gaining information through the communication system. This includes:
a. Transmission Security – component of communications security which results from all measures designed to protect
transmission from interception.
b. Cryptographic Security – results from the provisions of technically sound crypto-system and their proper use.
c. Physical Security – providing safeguards to equipment and material from access by unauthorized
UNLAWFUL ACTS
Sec. 1
It shall be unlawful for any person, not being authorized by all the parties to any private communication or spoken word, to
tapa any
using wire
device or cable,known
commonly or by using any other or
as a dictaphone device or arrangement,
dictagraph to secretly
or dictaphone overhear,
or walkie-talkie intercept,
or tape or record such communication or
recorder
to communicate the contents thereof, either verbally or in writing, or to furnish transcriptions thereof, whether complete or partial, to any
It shall also be unlawful for any person, be he a participant or not in the act or acts penalized in the next preceding sentence, to
other
knowingly possess any tape record, wire record, disc record, or any other such record, or copies thereof, of any communication or
person:
spoken word secured either before or after the effective date of this Act in the manner prohibited by this law; or to replay the same for
Provided, That the use of such record or any copies thereof as evidence in any civil, criminal investigation or trial of offenses mentioned in
section 3 hereof, shall not be covered by this prohibition.
Sec. 3
Nothing contained in this Act, however, shall render it unlawful or punishable for any peace officer, who is authorized by a written order of the
Court, to execute any of the acts declared to be unlawful in the two preceding sections in cases involving the crimes of treason, espionage,
provoking war and disloyalty in case of war, piracy, mutiny in the high seas, rebellion, conspiracy and proposal to commit rebellion, inciting to
rebellion, sedition, conspiracy to commit sedition, inciting to sedition, kidnapping as defined by the Revised Penal Code, and violations of
Commonwealth Act No. 616, punishing espionage and other offenses against national security:
AUTHORIZATION
The authorization shall be effective for the period specified in the order which shall not exceed sixty (60) days from the date of issuance
of the order, unless extended or renewed by the court upon being satisfied that such extension or renewal is in the public interest.
QuestReviewCenter–IndustrialSecurity
Management 13
The court referred to in this section shall be understood to mean the Court of First Instance within whose territorial jurisdiction the acts for
which authority is applied for are to be executed.
BANK SECURITY – a specialized type of physical security protecting the assets, personnel and operation of a bank, with special emphasis
on the precaution and measures to safeguard the cash and assets while in s storage, in transit, and during transaction.
causes.
>Bangko Sentral ng Pilipinas (BSP) Circular No. 620 Issued on September 3, 2008 – a Circular issued by BSP concerning
regulations
Guard on Bank
System protection
– BSP requireswhich aims
that all to promote
banking maximum
offices protection
be manned of life and
by adequate property
number against crimes
of security (robbery,
personnel to betheft, etc), and
determined by the
bank, taking into consideration its size, location, costs and overall bank protection requirement.
Security Devices – Banks are required to have a robbery alarm or other appropriate device for promptly notifying law enforcement office either
directly or through an intermediary of an attempted, ongoing or perpetrated robbery.
In armored Car operations – all armored vehicles are required to be built with bullet resistant materials capable of withstanding the
firepower of high powered firearm (M16, M14). Also equipped with a vault or safe or a partition wall with a combination lock designed to
prevent retrieval of the cargo while in transit.
DOCUMENT AND INFORMATION SECURITY – Security involving the protection of documents and information from loss, access by
unauthorized persons
> prescribes the policies and establishes the standard basic procedures governing the classification and security of official matter.
GENERAL PRINCIPLES
1. The authority and responsibility for the preparation and classification of classified matter rest exclusively with the originating office;
2. Classified matter should be classified according to content and not the classification of the file in which they are held or of another
document to which they refer;
3. Classification should be made as soon as possible by placing the appropriate marks on the matter to be classified;
4. Each individual whose duty allows access to classified matter is responsible for the protection of the classified matter while it is in his/her possession and sha
DEFINITION OF DOCUMENT
- Any material that contains marks, symbols, or signs, either visible, partially visible or completely invisible that may be presently or
ultimately convey a meaning or message to someone.
CLASSIFY – refers to the act of assigning to information or material one of the four security classification categories after determination
has been made that the information requires the security protection as provided for in the regulation;
SECURITY CLEARANCE – Is an administrative determination that an individual is eligible from a security standpoint for access to
classified matter of a specific category;
COMPARTMENTATION – Refers to the grant of access to classified matter only to properly cleared persons when such classified information is
required in the performance of their official duties, and restricting it to specific physical confine when feasible.
NEED TO KNOW – term given to the requirement that the dissemination of classified matters be limited strictly to those persons whose
official duties require knowledge thereof.
CLASSIFICATION OF DOCUMENTS
-Memorandum Circular No. 196, dated 07/19/1968 (Security of Classified Matter in government offices.)
1. TOP SECRET – any information and material, the unauthorized disclosure of which would cause exceptionally grave damage
to the nation, politically, economically or militarily;
2. SECRET- any information and material, the unauthorized disclosure of which would endanger national security, cause serious injury
to the interest or prestige of the nation or any governmental activity.
3. CONFIDENTIAL – any information and materials, the unauthorized disclosure of which would be prejudicial interest or prestige
to the of the nation or governmental activity or would cause administrative embarrassment or unwarranted
injury.
4. RESTRICTED – any information and material which requires special protection other than those determined to be Confidential,
Secret, and Top Secret matters.
METHOD OF TRANSMISSION
1. By direct contact of officer or personnel concerned;
2. By official courier;
3. Electrical means in cryptographic
form 4. Registered Mail
DESTRUCTION
1. Burning
2. Shredding
STORAGE
shall be in a safe, steel filing cabinet with built in dial type combination lock of such weight, size and construction as to minimize
the possibility of physical theft or damage to fire.
OPERATIONAL SECURITY – part of physical security that deals primarily with the protection of processes, formulas, patents, and other
industrial and manufacturing activities from espionage, infiltration, loss, compromise or
INFORMATION CYCLE
1. The Creation – Information is discovered and
develop; 2. Used – Some action is take with the
information;
3. Storage and Retrieval – Stored for future use;
4. Transfer – transferring of information from active to inactive use;
5. Disposition – decision may be made to retain the information indefinitely.
QuestReviewCenter–IndustrialSecurity
Management 14
KINDS OF SENSITIVE INFORMATION
PROPRIETARY INFORMATION
– information which some special way is related to the status, operations or activities of the possessor over which the possessor asserts
ownership.
TRADE SECRETS
- It may consist of any formula, pattern, device or compilation of information which is used in one’s business and which gives one
opportunity to gain an advantage over competitors who do not know or use it.
PATENT
– A grant given by the government to an inventor, conveying and securing to him the exclusive rights to make, use and sell his invention for term
of twenty (20) years.
INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES [Republic Act No. 8293] Approved on June 6, 1997
Competitive Intelligence – systematic program for gathering and analyzing information about competitor’s activities and general business
trends to further company’s goals.
TYPES OF DOCUMENTS
Class I – Vital Document – This is an irreplaceable records , reproduction of which does not have the same value as the original;
Class II – Important Document- This is a record, reproduction of which cause considerable expense and labor, or considerable
delay.
Class III – Useful Document – This is a record, the loss of which may cause inconvenience but could be readily replaced and may not
present insurmountable obstacle to the prompt restoration of the business;
Class IV- Non essential Document – This record may include daily files, routine in nature, lost of which will not affect the organization.
STORAGE
1. SAFE – a metallic container used for safekeeping of documents or small items in office or installation.
2. VAULT – a heavily constructed fire and burglar resistant container usually part of the building structure use to keep and protect cash,
documents and negotiable instruments.
3. FILE ROOM – a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited people to work
on the records inside,
PERSONNEL SECURITY
- refers to the procedure followed, inquiries conducted, and criteria applied to determine the work suitability of a particular applicant or
the retention of a particular employee.
PURPOSE
1. To ensure that hired employees are best suited to assist the organization in achieving its mission and
vision; 2. To assist in providing the necessary security to the employees while they carry out their
functions.
TYPES OF PSI
1. National Agency Check
2. Local Agency Check
3. Partial Background Investigation
4. Complete Background Investigation
BACKGROUND INVESTIGATION (BI) – It is an inquiry which aims to verify applicant’s information written at the applicants form, to
ascertain his/her past employment experiences and to obtain other information pertinent to the decision to employ.
INVESTIGATIVE COVERAGE
1. Prior Employment;
2. Claimed education;
3. Claimed residence for the period covered in the employment and educational
institutes; 4. If the candidate indicates a criminal record, then the details should be
checked.
INVESTIGATIVE STANDARDS
1. Information sought should be relevant;
2. Information should be reliable;
3. If unfavorable, the information should be confirmed by at least two sources.
QuestReviewCenter–IndustrialSecurity
Management 15
SECURITY SURVEY
- A fact finding probe to determine a plant’s adequacy in all aspects of security, with the corresponding recommendations.
- Refers to checklist, audits, or inventories of security conditions.
- Security Surveys are often called ‘RISK ANALYSIS SURVEYS’ or ‘RISK ASESSMENT SURVEYS
QuestReviewCenter–IndustrialSecurity
Management 16
PURPOSES OF SECURITY SURVEY:
1. To determine the existing state of
security; 2. Identifying weaknesses in
defense;
3. To determine the degree of protection required;
4. To produce recommendations for a total security systems.
The survey should be undertaken by either suitably trained staff security personnel, or a fully qualified independent security specialist.
No universal checklist can be applied to all sites for survey purposes, as no two facilities are alike.
After completing the survey an immediate review of the findings should be undertaken with the plant supervisor so that urgent
deficiencies can be addressed.
> A follow-up survey should always be conducted to ensure improvements
> Any survey report including lists of recommendations is incomplete without including a cost-benefit analysis, which is ;
“ a direct comparison of the cost of operation of the security unit and all the existing security measures with the amount of the corporate
assets saved or recovered as well as reduction of losses caused by injuries and lost production and recommendations have been made”.
PLANNING
-Process of developing methods or procedures or an arrangement of parts intended to facilitate the accomplishment of a definite objective.
-The process of setting goals, developing strategies, and outlining tasks and schedules to accomplish the goals.
SECURITY PLANNING
It is PRE-DETERMINING a course of action;
It is deciding IN ADVANCE what to do, how to do it, and who is to do it.
SECURITY EDUCATION
It is defined as the exposure and teaching of employees on security and its relevance to their work. Security education is
conducted to develop security awareness among employees of the company. It should cover all employees, regardless of rank or
position.
PERSONAL SECURITY
Protection of personnel especially ranking official from any harm, kidnap, and others act. VIP security is type of personnel security;
Security Group (PSG) in securing the President and the members of the First Family.
POLICE SECURITY PROTECTION GROUP (PSPG) - is mandated by law to provide protective security to government officials, foreign
dignitaries, and
PROTECTIVE private individuals
CUSTODY – state or authorized to besecured
quality of being given protection anddanger.
or freed from also provide physical
It may also security
includes to vital means
the various installations, anddesigned
or device assist to
guard a persons and property against a broad range of security hazard.
THREAT – is an indication of something impending and usually undesirable or unpleasant, with an intention to inflict evil, injury or damage
on another, usually as retribution or punishment for something done or left undone. It is an expression of an intention
inflict
to loss or harm on
another by illegal means, and especially by involving coercion or duress over the person or his welfare.
THREAT ASSESSMENT – the process of investigation/validating the truthfulness of the existence of threat to an individual.
EMERGENCY SITUATION – condition or state that danger has already occurred which resulted to loss of life/liberty and/or there is
imminent danger or threat to life and property where delay will endanger or may cause the loss of life/property.
DEFINITION OF TERMS:
1. Access List – authenticated list of personnel given to the security allowing entry to a compound or installation or part
thereof; 2. Controlled Area – an area near or adjacent to limited or exclusive areas where entry is restricted;
3. Dry-run – practical test or exercise of plans or any activity to test its validity, an operational readiness exercise;
installation
QuestReviewCenter–IndustrialSecurity
Management 17
4. Duress Code – type of code system so that security personnel or any employee when forced by armed men intending to enter an
QuestReviewCenter–IndustrialSecurity
Management 18
can five alarm by the use of certain words in casual conversation with personnel in the installation.
5. Exclusion Area – a restricted area containing materials or operation of security
interest; 6. Restricted area – any area access to which is subject to special
restriction control;
7. Security Hazard – Is any act or condition, which may result in the compromise of information, loss of life, loss or destruction of
property or disruption of objectives of the installation.
TYPES OF SECURITY
1. Industrial Security – A form of physical security that is concerned with the physical measures designed to safeguard personnel and
prevent unauthorized access to equipment, facilities, materials, documents, and to protect them from espionage, sabotage, damage
or theft.
2. Bank Security – Is the protection resulting from the application of various measures which safeguards cash and assets which
are in storage, in transit and or during transaction.
3. Operational Security – Involves the protection of processes, formulas and patents, industrial and manufacturing activities from
espionage, infiltration, loss, compromise or photocopying.
STATISTICS
Meaning of Research
= scientific investigation of phenomena which includes collection, presentation, analysis and interpretation of facts that links man’s
speculation with reality.
= systematic, controlled, empirical and critical investigation of hypothetical proposition about the presumed relations among natural
phenomena.
B. According to Goal
1. Basic or pure Research – is done for the development of theories and Principles.
2. Applied Research – is the application of the results of pure search. This is testing the efficacy of theories and principles. aims to test
theories and concepts developed for verification, application, development and support and their relationship to the existing fund of
knowledge
E. According to Scope – Under this category is Action Research. This type of research is done on a very limited scope to solve a
particular problem which is not so big. It is almost problem solving.
QuestReviewCenter–IndustrialSecurity
Management 19
1. The Problem and the Setting
2. Related Literature and Studies
3. Methods of Research and Procedures
4. Analysis, Presentation, and Interpretation of Data
5. Summary, Conclusions, and Recommendations.
QuestReviewCenter–IndustrialSecurity
Management 20
Principles of the Scientific Method
1. Rigid control – is the manipulation of the research variables.
2. Objectivity – is that there should be no bias or partiality in treating the result of inquiry.
3. Systematic organization – refers to proper and accurate tabulation of data as well as presenting them in statistical tables
ready for interpretation.
4. Rigorous standards – refers to the setting up of standards or principles which serve as Basis for the evaluating the findings of a
study. This also refers to the accurate statistical computation and
interpretation of qualified data.
Avoid Plagiarism
Plagiarism is an act of incorporating into one’s work the work of another without indicating the source
= the unacknowledged used of somebody else’s words or ideas
= an act wherein the writer uses passages, ideas, writings, and statements of others without giving due credit
Theoretical Framework
Theoretical framework is the foundation of the study.
The theory should have a relationship with the issues posted in the study
Types of Theories
1. Descriptive Theory = seeks to describe a phenomenon
2. Prescriptive Theory = seeks to tell how and sometimes why one should or ought to behave in certain ways
Conceptual Framework
= an illustration of how research problems are generated from the theoretical framework of the study
= it may be some sort of modification of the theoretical framework or personally conceptualized by the researcher
Types of Hypothesis
1. Descriptive Hypothesis = use to answer descriptive questions
QuestReviewCenter–IndustrialSecurity
Management 21
Ex. Sub-problem:
1. Whatistheprofileofthepolygraphexaminersoflawenforcementagenciesintermsof:
QuestReviewCenter–IndustrialSecurity
Management 22
1.1. age;
1.2.maritalstatus;
1.3.educationalattainment;and
1.4.LengthofService
Ex. Hypothesis
“Majorityoftherespondentsbelongtotheagebracketof30to40,male,collegegraduateandabout20yearsinservice.”
2. Statistical Hypothesis = use to answer questions on the relationship or differences of data obtained in descriptive questions.
NondirectionalHypothesis–indicates that the researcher is not interested on whether one variable is greater or lesser than the other, but
only in the difference.
Ex. Drug A and Drug B have significant effects on the cure of fever.
Ha: A = B
PositiveDirectionalHypothesis
Ex. Drug A is more effective than Drug B on the treatment of fever.
Ha: A > B
NegativeDirectionalHypothesis
Ex. Drug B is more effective that Drug A on the treatment of fever.
Ha: A < B
Formulating Hypothesis
A hypothesis is formulated after the problem has been stated and the literature study has been concluded. It is formulated
when the researcher is totally aware of the theoretical and empirical background of the problem.
Hypothesis:
The is no significant difference on the assessment of the groups of respondents with regards to the extent of application of polygraph examination in the attainment of accurate results to
be presented as evidence in court in terms of examiner’s competency, facility and
instrument,techniquesandprocedures,andsubject’scondition.
Research Designs
A. Qualitative Research Design = involves in depth analysis of the problems. Its focused is to provide accurate description of
problems w/o attempting to treat or employ sophisticated statistical tools or describe problems.
B. Quantitative Research Design = its focused is to describe problems descriptively and numerically. It utilizes more statistical tests to
explain the nature, characteristics, relationships and differences of variables.
Sampling Designs
A. Scientific Sampling = each member of the population is given the chance of being included in the sample.
QuestReviewCenter–IndustrialSecurity
Management 23
Population = specific aggregation of the elements
= also known as universe
Sample=representativeportionofawhole
=subsetofapopulation
Types of Questionnaire
a. Open-Ended = respondents are forced to answer the questions asked in the questionnaire.
=best suited to a qualitative research study
b. Closed-Ended = also referred as guided response type, closed form or restricted.
= respondents are guided in answering questions
= options may be provided like in multiple choice test while answers are based on the rating scales provided
2. Interview = involves face to face contact between the interviewee and the
3. Observation = may be defined as perceiving data through the sense: sight, hearing, taste, touch and smell
=sense of sight is the most important and most used
= most direct way and most widely used in studying behavior
Types of Observation
a. Formal Observation = researcher makes a guide on what to observe. Possible responses may also be outlined
b. Informal Observation = needs critical evaluation of the observation made to avoid biased results
= recommended for qualitative research
Types of Validity
a. Content-Related Validity = refers to content and format of the instrument which must answer the following criteria: appropriateness;
logical; adequate; and, proper format
b. Criterion-Related Validity = refers to the relationship between scores obtained using one or more instruments or measures
c. Construct-Related Validity = refers to the nature of psychological construction or characteristics being measured by the instrument
Statistics = science which deals with the systematic process of collecting, organizing, classifying, presenting, interpreting and analyzing data
Types of Statistics
A. Descriptive Statistics = it is used to determine the nature of variables without any attempt to critically compare the extent of
relationships or differences with other variables
B. Correlational Statistics = used to determine the degree or magnitude of association between two variables.
=treats bivariate and multivariate problems
C. Inferential Statistics = used when in making inferences on the magnitude of differences of the samples from a large universe.
= used in testing hypothesis like differences bet. two or more variables
= treats bivariate and multivariate problems
Types of Parametric
a. T-Test and Z-Test = used to determine two variable means which differ significantly
b. F-test = (Analysis of Variance – ANNOVA) used to determine significant differences between three or more variables
Interpretation of Data = an act or instance of interpreting an explanation. This is done to give meaning to data generated from the
instrument to answer the problems raised in the study
Levels of Interpretation
1. Table Reading
2. Implications or Meaning of Data
3. Cross referencing or corroboration wherein the results are to be compared with the existing knowledge or finished
Preliminary Pages
a. Title Page
b. Approval Sheet
c. Acknowledgment
d. Dedication
e. Table of Contents
f. List of Tables
g. List of Figures
QuestReviewCenter–IndustrialSecurity
Management 25
h. Abstract
QuestReviewCenter–IndustrialSecurity
Management 26
CHAPTER 1
THE PROBLEM AND ITS SETTNG
Introduction
Presents the problem. What the problem is all
about Rational or reasons for conducting the
study Setting of the Study
Locality of the study. Place where the study is to be conducted
Theoretical / Conceptual Framework
Theoretical / conceptual foundation of the
study Statement of the Problem
General and specific statement of the problem determined in the study
Assumption or Hypothesis
Self-evident truth based upon known fact or phenomenon (Assumption)
Tentative conclusion or answer to specific questions (Hypothesis)
Significance of the Study
Contribution of the result of the study to individuals, institutions, administrators, society, etc…
Scope and Limitation of the Study
Boundaries in terms of time, sample, location (Scope)
Weakness of the study beyond the control of the researcher (Limitation)
Definition of Terms
It can be lexical or operational definition or a combination thereof of different terms used in the study which are arranged alphabetically
CHAPTER 2
REVIEW OF RELATED LITERATURE AND STUDIES
Foreign Literature
Published articles from foreign countries
Local Literature
Locally published articles
Foreign Studies
Foreign unpublished articles
Local Studies
Locally unpublished articles
Synthesis
Relevance of literature and studies to the present research
CHAPTGER 3
RESEARCH METHODS AND PROCEDURES
Research Method
Brief description and justification of the research method used in the study
Population and Sampling Scheme
Brief presentation of the entire population of the study and the type of sampling techniques used in selecting sample
respondents Description of the Respondents
Contains detailed description of the respondents as to age, sex, marital status, nature of employment, etc…
Research Instrument
Explanation on how the instrument used in gathering data was develop as well as its detailed description.
Validation of Instrument
States brief discussion on how the instrument was validated
Instrument is tested on individuals who are knowledgeable of the subject matter but are not part of the respondents of the study
Procedures in Gathering Data
Contains the step by step procedures used by the researcher in reaching the respondents in order to gather data
Statistical Treatment
Contains discussion on the statistics used in consonance with the specific problem and hypothesis to be tested
CHAPTER 4
PRESENTATION, ANALYSIS AND INTERPRETATION OF DATA
Contains the answers to all the sub-problems of the study
Answers to the problems are stated one by one according to the arrangement of sub-problems for clarity and understanding
Answers are presented in textual and tabular forms. Textual explanations come after the tables
CHAPTER 5
SUMMARY OF FINDINGS, CONCLUSIONS AND RECOMMENDATIONS
Theintroductoryparagraphshouldcontainthesummaryofstatementoftheproblem,hypothesisaswellasresearchdesign.
Summary of Findings
Contains the specific findings/results of the study
Presented as they were organized and categorized in the sub-problems of the study
Written in past tense
Conclusions
Written in present tense
Should be based on the findings of the
study Logical and valid outgrowth of the
findings
Should not contain any numerals from the findings
Organized and categorized according to the sub-problems
Recommendations
An appeal to people or institutions concerned to solve the problems discovered in the
study No recommendations that will be made for problems that were not discovered in
the study Practical and attainable
QuestReviewCenter–IndustrialSecurity
Management 27