You are on page 1of 145

INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS

Dexter C.Nicolas, Rcrim, CSMS, MSCJ (u)


Definition of Security
Security – The state of quality of being secure, freedom from fear or
danger, Certainty To secure is to make safe or be protected.

- Concerned with the protection and defense of life, assets and processes
against attack, espionage and interference by utilizing various methods
and devices.
INDUSTRIAL SECURITY MANAGEMENT

- Concerned in preparation by utilizing methods and devises to curtail


or minimize loss to a company due to security breach.
BRIEF HISTORY OF SECURITY IN THE PHILIPPINES
-The private security business began on 11 March 1933 when the first formally-licensed private
security agency, “Special Watchman Agency”, started operations.

- Later, it was renamed “Jimenez Security Agency”, founded by brothers Juan and Pedro Jimenez.
- RA 5487 was passed on 13 June 1969 through the continuous lobbying of the incorporators and
officers of PADPAO, which set the standards and minimum requirements for the operation of
security agencies

- PD 11 was passed on 3 October 1972, widening the coverage of RA 5487 to include security guards
employed in logging concessions, agricultural, mining and pasture lands
- PD 100 was issued on 17 January 1973, broadening the coverage of the security industry to include
employees of the national or local government or any agency who are employed to watch or secure
government buildings and properties.
Types of Security Measures for an Effective Defense Against Crimes:

1. Active-Measures – These involves the installation of physical


barriers, security lighting, use of vaults, locks and others.

2. Passive-Measures – Those that will deter man from committing such


act of fear of being caught, change in court or dismissed such as: security
education, programs, investigations, fire prevention seminars, personnel
security checks etc.
Types of Security
Physical Security – Is the broadest branch of security to prevent
unauthorized access to equipment, facilities, materials and documents,
and to safeguard them against espionage, sabotage, damage and theft,
physical security covers other types of security to protect equipment,
document, facilities, and materials against theft damage, sabotage, or
espionage. It also encompasses protection of personnel from any criminal
act.
Communication Security
Is the protection resulting from the application of various measures,
which prevent or delay the enemy or unauthorized persons in gaining
information through the communication system.
Transmission security
- A component of communications security, which results from all
measures designed to protect transmissions from interception, traffic
analysis, and imitative deception.
Cryptographic security
– Results from the provisions technically sound crypto-system and their
proper use.
Physical security
– Providing of safeguards to equipment and materials from access by
authorized persons.
Bank Security
– A specialized type of physical security protecting the assets, personnel,
and operation of a bank, with special emphasis on the precaution and
measures to safeguard the cash and assets while in a storage, in transit,
and during transactions.
Document Security
– Is physical security involving the protection of documents and
classified papers from loss, access by unauthorized persons, damage,
theft and compromise through disclosure.
Personal security
– Protection of personnel especially ranking officials from any harm,
kidnap, and other acts. VIP security is a type of personnel security.
Crises Security
– A part of VIP security involve in hostage and kidnapped of VIP
Industrial Security
– Is physical security as applied to business groups engaged in industries
like manufacturing, assembling, research and development, processing,
warehousing, and even agriculture. It is a form of physical security
involving industrial plants and business enterprises where the personnel,
processes, properties and operations are safeguard. Use of protecting
barriers, and security lighting, personnel movement control, looks and key
management, guard forces, communication and electronic hardware are
essential, aside from a fire prevention and control programs, emergency
plans, industrial safety and security education programs.
Operational Security
– Is a part of physical security that deals primarily with the protection of
processes, formulas, patents, and other industrial and manufacturing
activities from espionage, infiltration, loss, compromise, or
photocopying.
Air Cargo Security
– To minimize, if not prevent, losses of cargo during in transit, storage,
or transfer.
Personnel Security
– Is involved in the background checks of individuals commensurate
with the security requirements of their work.
Factors that Bring About Insecure Condition:
1. Threat – Positive inimical acts

2.Hazards – Passive inimical conditions

3.Vulnerability – Measure of how open is establishment to intrusion


attack or injury.

4.Risk – Probability of an event to happen that will lead to losses.


Comprehensive Security Program

1.Policies and Procedures – Statements of security goals and the


required means of achieving them.
2.Personnel – People to monitor, administer and implement the system.
3.Barriers – Access control devices or structures.
4.Equipment – Detection, alarm, communication and control systems.
5.Records – Past incident reports, access records and transaction logs.
Security Hazards
Security Hazards – An act or condition which results in a situation
conducive to a breach of the protection system and the subsequent loss or
compromise secrets, or damage to personnel, property or facilities.

Kinds of Security Hazards


1. Man-Made Hazards
– An act or conditions affecting the safe operation of the facility, caused
by human action, accidental, or intentional. It includes sabotage,
espionage, pilferage, and theft, disloyalty, disaffection, and subversive
activity.
2. Natural Hazards
– Those caused by natural phenomena which cause damage, disturbance
and problems of the normal functioning of human activities, including
security. It includes flood, lighting storms, volcanic eruptions, high
velocity winds, tidal waves, etc.
The Extent and Degree of risk to Security will be Dependent:

1. Relative Criticality of operations


– Is the importance of the firm with reference to the national economy
and security.

2. Relative Vulnerability
– The susceptibility of the plant or establishment to damage, loss or
disruption of operation due to various hazards.
Theft and Pilferage
Theft is the taking away of another’s personal property with intent to
gain, and without the consent of the owner.
Psychological Explanations on Thefts
The Psychological need (kleptomania)- is an irresistible urge to steal
items of trivial value , People with this disorder are compelled to steal
things, generally but not limited to, objects of little or no significant
value
The Criminal Tendency – an individual with such tendency may be
more tempted to steal if security controls are inadequate or non-existent.
Signs or Symptoms Shown by Thieves in the Workplace

1. Increase standard of living or change spending habits


2. Show an unreasonable devotion to work.
3. Resistance to procedural changes that would result in closer
supervision, limiting their capabilities of consuming the crime.
Common Targets:
Cash, Negotiable Instruments, Merchandise that can be turned into cash,
Others
Security Measures on the Prevention of Theft
1. Screen, identify, control and record all personnel that come in and go out of the premises
2. Suspicious looking personnel especially at night near the vicinity must be monitored
3. During office hours, permit no one to loiter without proper authority
4. Most of the time, secured the restricted areas.
5. Conduct patrol inspections from time to time so the movement of people inside is monitored.
6. Be sure to close and lock the doors, rooms and windows after office hours
7. People staying overnight in the area must be monitored
8. Make sure that gates and entrance are properly guarded
9. Make sure be familiar with client’s property
10. Conduct search and inspection both on the body of the person and the property or items with him
11. Look for a gate pass or any document on any item that is being brought out.
12. Be sure to know the person in charge for the release of goods and property, so as to familiarize with
their signature.
The Casual and Systematic Pilferer
1. Casual Pilferer

– One who steals due to his inability to resist the unexpected


opportunity and has little fear by detection

2. Systematic Pilferer

– One who steals with perceived plans and takes away any or all types
of items or supplies for economic gain.
Common Methods of Pilferage :

Trash disposal and salvage disposal activities, Shipping and receiving


operations, packing property and sending it to the outside addresses
through mail channels, Substitution or switching method, Pass on,
Sweetheartening method, Concealing the item on sensitive or private
parts, Throwing items over fences to be retrieved later by themselves or
by a confederate, Undervaluing or altering the original price of the item
Psychological Deterrents to Control Casual Pilferers

Search individuals and vehicles rearing the installation of unannounced


items and places “ Spot Searches”, Aggressive security education, To a
proper example and maintain a desirable moral climate for all employee,
All employees must be impressed with the fact that they have
responsibility to report any losses to proper authorities Adequate
inventory and control measures should be instituted to account al
materials, supplies and equipment
Shoplifting

-Shoplifting is a kind of stealing being committed in a retail


environment. Reasons for the commission of the crime varies. Ranging
from mental and emotional problems to perceived need, greed and peer
pressure.
Profile of the Shoplifters Juveniles Kleptomaniacs, Amateurs, Vagrants,
Professionals, Drug Addicts
Common Methods Used in Shoplifting

1. Maneuvering the merchandise- this includes concealing merchandise


under garments or inside suitcases, umbrellas, handbags or lunch
pails.

2. Blocking the view- this method is usually done by a group of


shoplifters. They hang around inside the store blocking the sale clerk’s
view, or distract the sales clerk by arguing or using acts that can cover
an actual shoplifting incident.
Procedures to be followed During an Actual Shoplifting Incident
1. See to it that the suspect takes at least one item and conceals it
2. Know where the stolen item is on the shoplifter
3. Make sure that the suspect fails to pay for what has been stolen
4. The security officer should apprehend the suspect after checkout location
5. The security officer should always take another employee along when accosting a shoplifter
6. When apprehending a suspect, security personnel should always begin by addressing the
shoplifter politely and directly
7. Reasonable force can always be used if the shoplifter refuses to return to the store
8. The Decisiveness to arrest
9. Know the decision of the management, whether to let the shoplifter go upon payment of his
obligation or he turned over to the police authorities after your inquiry
Three Aspects of Industrial Security
A. Physical Security
- A barrier or system placed between the potential intruder and the
matter to be protected.

1. Perimeter Barrier (1st line of defense) – A medium or structure which


defines the physical limits of an installations or area to restrict or impede
access thereto. It is any physical barrier used to supplement the
protection of an inside or outside perimeter.
Purpose of Perimeter Barrier
1) Outline the perimeter of the area to be secured;

2) Create a physical and psychological deterrent to unauthorized entry:

3) Delay intrusion, thus facilitating apprehension of intruders;

4) Assist in a more efficient and economical employment of guards

5) Facilities and impose the control of pedestrian and vehicular traffic.


Two General Types of Physical Barriers
1) Natural Barrier
– Include mountains, cliffs, cannons, rivers, seas, marshes, dessert or
terrain difficult to traverse.
2) Man-Made Barriers
– Structural constructions like fences, walls, floors, roofs, grills, bars,
road blocks, or other physical means to deter or impede penetration
Types of Perimeter Barrier
1) Wire Fences
– A type of perimeter barriers made of chain link designed with mesh
openings not longer than two inches squares, and made of No. 9 gauge
wire or heavier, minimum height, which is 7 ft.
2) Building Wall
– Masonry wall should have the same as the chain linked and surrounded
by the barbed wire top guard; if the height is less than the prescribe
additional chain linked as “toppings” is placed to attain the minimum
height requirement.
3) Bodies of Water
– A necessary additional security measures .
Additional Protective Measures
1) Top Guard
– An addition overhang or barbed wire place on vertical perimeter
fences facing upward and outward with a 45-degree angle with three to
four strands of barbed wires space six inches apart. This will increase the
protective height and prevent easy access.
2) Entry Stations – Provided at main perimeter entrances to secure areas located out of doors,
and manned by guards on a full-time basis.

3) Towers – A house-like structures above the perimeter barriers. It gives the psychological
effects to violators.
4) Protection in Depth
– In large open areas or ground where fencing or walling is impratical
and expensive, warning signs should be conspicuously placed. The depth
is protection, reduction of access roads and sufficient notice to warn
intruders should be done. Use of animal guards and intrusion devices can
also be done.
5) Clear Zones
– Un obstructed area maintain on both sides of the perimeter barrier. A
clear zone of 20 feet or more is desirable between the barrier and
extension structures and natural covers which may provide concealment
or assistance to a person seeking unauthorized entry.
6) Signs and Notices
– Control signs should be erected where necessary in the management of
unauthorized ingress and preclude accidental entry. It includes I.D.,
prohibitions and exclusive area signs.
2. Building Exteriors (2nd Line of Defense)
Walls, Doors, Windows- Windows below 18 feet must be grilled, Roof
Openings, Fire Escapes- Maximum of 100 feet
3. Interior Controls (3rd Line of defense)
ID System, Entry/Exit of employees, visitor, suppliers, customers and their vehicles.
Visitor, Property Movement, and Vehicle Control
1) A visitor is any person not regularly employed in a plant or concern. Strict precautions are
taken with visitor against pilferage, sabotage and other crimes. Plant visitors may and they can
be suppliers, promoters, collectors, customers, government inspectors, contractors, job-seekers,
group visitors, guided tours etc.
2) Passes or badge may be issued to visitors indicating area to be visited and escort
requirements. Likewise movement of packages should be controlled, closely inspecting all
incoming and outgoing packages, with inspection to vehicles. Trucks have been found to have
special components, items placed inside the spare tire, tool boxes, and even in fake gasoline
tanks.
The Pass/Badge System

A pass or badge is issued by security personnel to be admitted in the


installation. This system precludes those visitors with escorts and
personnel in the access list. The pass system is for general use and not for
the restricted areas like exclusive, limited and controlled areas. The
following are recommended:
1) Single Pass or Badge System
- Pass is issued for permission to enter differing in specific areas by
letters, numerals, or colors e.g. green background of current passes in
the general area, or white pass with overprinted blue symbols for a
certain specific area.
2) Pass of Badge Exchange System
- Multiple copies of passes are issued to an individual with the same
photograph. The individual exchange his badge for another color or
marking at the gate. Once inside, if he needs to enter a restricted area, he
exchanges it for one another color acceptable in that area.
Specification for Using Chain – Link Fences
1) It must be constructed of 7-foot material excluding top guard.
2) It must be 9 gauge or heavier.
3) Mesh openings are not to be larger than 2 inches per side.
4) It should be twisted and barded salvage at top and bottom
5) It should be securely fastened to rigid metal or reinforced concrete.
6) It must reach within 2 inches of hand ground or paving.
7) It must reach below surface deep enough on soft grounds to compensate for shifting sail
or sand.
Specification for using Barbed wire
1) Standard barbed wire is twisted, double standard, 12-gauge wire, with 4-point
barbs spaced on equal distance apart.
2) Barbed wire or fencing must be firmly affixed to post high excluding top guards.
3) Barbed wire fencing should not be less than 7 feet high excluding top guard
4) The distance between the strands will not exceed 6 inches and midway between
parts.
Specification on Clear Zones
1) A clear zone of 20 feet or more should exist between the perimeter barriers and
exterior structures, parking areas and natural or man-made features.
2) A clear zone of 50 feet or more should exist between the perimeter barriers and
exterior structures within the protected areas expect areas when a building wall
constitutes parts of the perimeter barrier.
Specification for Windows or Opening
Windows and openings must be less than 18 feet above the ground, roofs, ledges,
etc. or less than 14 feet directly or diagonally opposite in controlled windows in
other walls, fire escapes, or other openings of 96 square inches or larger should be
grilled or have steel bar protections.
Security Lighting
Security Lightning provides sufficient illumination to areas during hours of
darkness.
Purpose of security Lightning
1) It improves visibility so that intruders can be seen, identified or apprehend.
2) It gives psychological fear, which serves as a deterrent to thieves, pilferers,
trespassers, and sabotage.
3) It makes easier. The routine work of guards in identifying employees, vehicles
etc. during night time.
4) If placed in certain areas, may even reduce the number of stationary guards,
and instead, may require only roving patrols at night.
Types of Security Lightning
Stationary Luminary
- Most common type consisting of series of fixed luminous flood a given
area continuously with overlap. It is commonly used on entry gates of
employees and vehicles.
1 Glare projection type
- The intensity is focused to the intruder while the guard remains in the
comparative darkness. The lightning is toward the approach of an
entrance to an installation.
2 Controlled lightning
- The width of a lighted can be controlled and adjusted to suit the
security needs. The lightning is focused on a pile of items, rather than
on a background.

Stand-by-Lightning
- Similar to continuous lightning but it turned on manually or by special
devise or other automatic means, when there is a suspicion of entry.
Movable Lightning
- Consist of stationary or portable, manually operated search lights which
may be lighted continuously during hours of darkness or only as needed,
and usually supplementary to either of the stationary luminary and stand
by lightning.

Emergency Lightning
- A stand-by lightning which can be utilized in the vent of electrical
failure, either due to local equipment or commercial power failure.
Protective Alarms
Alarm is an aural or visual signal given by the annunciator to security when
intruder actuates device in protected at area. An annunciator is a visual or
audible signaling device, which initiates conditions of associated circuits.
Basically, alarm systems are designed to alert security personnel to
consummated or attempted intrusion into an area, building, or compound.
Each type of alarm is activated in the event that an intruder tampers with
the circuitry, a beam, or radiated waves: intrusion alarm can be electrical,
mechanical, or electronic. Alarms are also fire, smoke, or other emergencies
and presence of other hazards.
Types of Protective Alarm
1) Central Station System
- Several separate compounds tie their alarm system to central station so
that in case of need, the central station calls for assistance to the police,
fire department, hospital or with other government assisting units.
2) Propriety System
- Similar to the central station type except that the propriety console is
located inside the subscriber’s installation who owns or bases the system.
3) Auxiliary System
- An installation-owned system which is direct extension of the local
enforcement agency and/or fire department by special arrangements.
4) Local Alarm System
- Consists of rigging up a visual or audible alarm near the object to be
protected. In case of alarm, response will be made by the local guards
and other personnel within sight or hearing.
Operation of Intrusion Alarm System
1) Breaking an electrical circuit ( Metallic fore or wire )- In a building
or compound, all possible points of entry can be wired by using
electrically charged strips of t wire. Any action that will move the foil or
wire breaks the circuit and activate the alarm.
2) Interruption of a light beam ( photoelectric or electric eye)
- This system uses a photoelectric-cell or the “Electric Eye” which
operates on the principal of light of rays. In this system an invisible light
beam is transmitted to a special receiver. An infra-red filter over the light
source makes the beam invisible to intruders.
3) Detection of sound and vibration (audio detection device)
- This can be utilized effectively to safeguard enclosed area such as vaults,
safes, storage bins, file rooms, warehouses and similar enclosures.
Supersensitive tiny microphones are embedded in the walls, ceilings and
floors of the enclosure to be protected by sound vibrations. These
microphones distributed evenly can detect sound or vibrations of sound
caused by attempts to force entry into the protected area.
Space and motion detection (vibration detection device)
– This system derived their operating principle usually from a physical
phenomenon known as “ Doppler Effect”. Constant sound waves in
cubicle disturbed by an object will cause change of frequent and wave
motion thereby causing an alarm to trigger.
Electronic/Electromagnetic fence (microwave motion detection)
– An electronic fence consisting of 3 to 5 strands of wire spaced from 9 to 24 inches
above one another which serves as antenna, a monitor panel, and an electric
circuitry. When power is put on, an electro-magnetic field is set among the wires
from the top to the ground. An intruder about 2 fee from this field will trigger an
alarm. This system is suggested to be located inside the chain-link fencing to
minimize nuisance alarms caused by animals, debris blown by the wind etc.
Protective Locks and Key Control
Lock is defined as mechanical, electrical, Hydraulic, or electronic device
designed to prevent entry to building, room, container, or hiding place.
General Groups of Locks
1. Warded Lock
– The underlying principle is the incorporation of wards or obstructions
inside the lock to prohibit a key from operating the bolt unless the key
has corresponding notches cut in it that it will pass the words.
2. Lever Tumble Lock
– Each lever hinges on a fixed point and is held against a stop by the
pressure of flat spring.

3. Disc Tumbler Lock


– Also known as the wofer tumbler type, has flat metal tumblers with
open center fitted into a lock case.
Pin Tumbler Lock
– The pin tumbler mechanism depends for its security, on a number of
round pin or tumblers operating on cylinder.

Padlock
– A portable and detachable lock having a pivoted or sliding hasp which
possess through a staple ring, or the like and is made fast or secured.
Combination Locks
– A lock that requires manipulation of parts according to a predetermined
combination code of numbers or letters.

Coded Lock
- A type of lock that can be opened by inserting a coded card in a slot in
the lock, or by pushing the correct buttons on the surface of the lock.
Electronic Lock
– Type of lock that can be closed and opened remotely by electronic
means.
Key Control Defined
Key Control is being defined as the management of keys in a plant or
business organization to prevent unauthorized individual access to the
keys.
Master Key
– A special key capable of opening a series of locks. This key is capable
of opening less number of locks than the grand master

Maison Keying
– The issue of key to open the main entrance and the office

Master Keying System


– A system used in a big installation whereby keys can open a group or
groups of locks.
Levels of control in the Master Keying Plan
1) 1st Level (Change Key)
– All locks operated by change key only and keyed different or alike or
required. Each key operates its own lock only, e.g. house, stores, cars,
warehouses.

2) 2nd levels (Master Key)


– All levels operated by change keys and master key. Mater key
operates all locks generally of one building, e.g. small school apartment.
3) Third Levels (Grand Master Key)
– All locks operated by change key, master keys, and grand master keys.
Grand master operates all locks generally used in large buildings or a facility
with several buildings e.g. office buildings and hospitals.
4) Fourth Levels (Great Grand Master Key)
– All locks operated by change key, Grand master key and great grand master
keys. Used in great or large complex system and similar to three levels.
5) Fifth Levels (Great Great Grand Master Key)
– All locks operated by change key, master key, grand master key and great
grand master key, e.g. big universities, complexes, large industrial complexes.
• PETERMAN
• -A TERM USED IN ENGLAND FOR LOCK
PICKER, SAFECRACKERS, AND
PENETRATORS OF RESTRICTED AREAS OR
ROOMS.
• 
• FALSE KEY
• - GENUINE KEY STOLEN FROM THE OWNER
Fire Protection
1) Automatic Sprinkling System
Automatic Sprinkler is a type of built in sprinklers which works by the
increase of room temperature and which automatically operates the
system to put out of fire. Attached and distributed in the ceiling of the
rooms, these sprinklers will go into action once a fire starts, and those
that will open are that are directly above the fire and water is delivered
where it is needed.
Types of Sprinkler System
Wet pipe system
– The piping has water with pressure, and the water sprinkler will operate when
head is open and water will continue to flow until shut off.

Dry-pipe system
– The pipes are filled with air under pressures which holds the water at a value
located room. When sprinklers head goes into operation, air is released trapping the
dry pipe valve and allowing water to flow through the system.
Fire Pump
Fire pump is a mechanical device of supplying water which can be
manual or motor-driven. These pumps are ideal when natural supplies of
water are readily available like a river, lake or stream.
Stand Pipes
Stand Pipes are G.I. steel or plastic pipes located inside a building from the lowest to the top
floor with water under pressure for use in case of fire. Located near a standpipe is a fire hose
usually enclosed in glass box handy for use. In case of fire, the hose is screwed into the
standpipe can come form a storage tank at the roof or from a series of water pumps.

Fire Hydrant
Fire Hydrant is a mechanical device strategically located in an installation or street where
a fire hose is connected so that water with pressure will be available to extinguished a fire.
Fire Extinguisher
Fire Extinguisher is a fire fighting equipment which can be portable or in
a cart that is used to put out fire depending on the contents to extinguish
certain types of fire as class A to D. this is the most important and useful
piece of fire fighting equipment in plant, building or facilities.
Classes of fire
1) Class A Fires
– Results from burning of woods, paper, textiles and other carbonaceous materials.
Extinguishments of this type is by quenching and cooling, Extinguisher which have
water sand, acid, foam and the special solution of alkalai methyl dust, as found in
the load stream extinguisher, should be use for this type of fire.

2) Class B Fires
– Those caused by flammable liquids like kerosene, gasoline, benzene, oil
products, alcohol and other hydrocarbon derivations. This type is put out and
controlled by foam, load stream, carbon dioxide, dry chemical and vaporizing
liquid. If water is used, it might even spread the flame, explosion may ensure.
3) Class C Fires
– Those which start in live electrical wire, equipment, motors, electrical
appliances, and telephone switchboards. The extinguisher that should be used
for such fires are carbon dioxide, dry chemical and vaporizing liquid, as the
soda type can even electrocute the extinguisher holder. In case of fires, source
of electricity should be cut off.
4) Class D fires
- The result of combustion of certain metals in firely divided forms. These
metals can be magnesium, potassium, powder aluminum, zinc, sodium,
titanium, lithium, and zirconium. This type of fire can be put out by G.I Type
meth LX, Lith X, meth L KYL, dry sands.
Use of fire Extinguisher
1) Soda Acid (Class A Fire)
- It is carried to fire by top handle. Operate by turning extinguishers upside
down. Don’t invert until ready to see. Aim stream at base of flame working
around the edge. Soak to prevent rekindling.
2) Carbon DioxideCO2 (Class B, C Fire)
– Operates by squeezing handle or trigger or turning wheel to discharge gas and
snow. When using, keep hands on horn, gets cold, be ready for a “ROAR” its
normal. Avoid close blasting on liquid fires. Attack fire at base of flame, moving
discharge horn slowly back and forth in sweeping motion. Continue after fire is
out; prevent flare up
3) Dry Chemical-Multi-Purpose (Class A,B,C Fires )
– Operates same as the dry chemical type above. Coat class A
combustible thoroughly. DO not mix with dry chemical designed only
for class B and C fires.

4) Foam (Class A,B, Fires)


– Operates like soda acid; operates by turning extinguisher upside down.
Personnel Security Defined
Personnel Security is involved in a background check of individuals
commensurate with the security requirements of their work.

Purpose of Personnel Security


1) To insecure that a firm hires those employees best suited for the firm;
and

2) Once hired, to assist in providing the necessary security to these


employees while they are carrying out their functions
Key Functions of Personnel Security
1) It serves as screening device in hiring a suitable employees

2) It Provides background investigation services both potential and present employees, for
possible assignment to a sensitive position

3) It handles investigation of employees suspected of wrongdoing

4) It develops security awareness among employees

5) It attempts to ensure the protection of employees from discriminatory hiring or


terminating procedures as well as unfounded allegations of illegal or unethical activities
and conduct.
Applicant Screening
The most effective tools in employee selection are:
1) The application form; and
2) The interview
The governing standards are:
1) The needs of the company, and
2) The fairness of the applicant
In screening an applicant for a position, the most expensive technique
should be used last. That is why, a background investigation shall only be
conducted after the applicant has already undergone interview.
Major Scope of Personnel Security
1. Personnel Security Investigation
Personnel Security Investigation (PSI) - Is a process of inquiry into
the character, reputation, discretion, integrity, morals and loyalty of an
individual to determine his suitability for appointment or access to
classified matter.
Types of PSI
1) National Agency Check
2) Local Agency Check
3) Partial Background Investigation
4)Complete Background Investigation
General Techniques in Personnel Security Investigation
1) Background Investigation – It is an inquiry which aims to verify applicant’s information written at the
applications form; to ascertain his/her past employment experiences and to obtain other information pertinent to the
decision to employ.
Factors to be Considered in the Conduct of BI
Loyalty – Faithful allegiance to the Philippine Government and its duly constituted authorities.
Integrity – Uprightness in character, soundness of moral principle and freedom from moral delinquencies
Discretion – The ability or tendency to act or decide with prudence, habits of wise judgment.
Morals – Distinctive identifying qualities which serve as an index to the essential or intrinsic nature of a person.
Character – The sum of traits that have impressed by nature, eduation and habit upon the individual
Reputation – Opinion or estimation in which one is generally held. It is what a person is reported to be.
Profiling – The process whereby a subject’s reaction in a future critical situation is predicted by observing his
behavior, or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty.
Security Education
Security education is defined as the exposure and teaching of employees
on security and its relevance to their work. Security education is
conducted to develop security awareness among employees of the
company. It should cover all employees, regardless of rank or position.
Objectives of Security Education Program
1) Guidance for all supervisory and executive levels of the organization.
2) A mandatory indoctrination on security for all new personnel before their assignments to their
respective jobs;
3) Development of high-degree of security consciousness among the selected supervisors and
other key personnel in a program that should be containing and supported by top management.
4) A down-the-line security program aimed at installing consciousness and dedication through
demonstration, lectures, motivations, and suggestions.
5) To let all the employees force be informed that they all belong to the organization and that non-
awareness and non-concern to the security program is tantamount to disloyalty.
6. To develop discipline, loyalty, and belongingness. This attributes when fully imbued will result
in effectiveness and efficiency.
Protection of Sensitive Information (Information Security)
Information is an asset that requires protection different from other kinds
of assets. The fact that information need not lost in order to be
compromised requires that a different attitude be adopted for its security.
There are different kinds of information that one may consider valuable.
It may be an idea, a formula or set of drawing, certain key findings from
secret experiments, or even knowledge of the whereabouts of key
elements.
Businesses can actually claim ownership over certain types of
information. These types of information are referred to as “Proprietary
Information”
Information Cycle
1. The Creation – Information is discovered and develop

2. Used – Some action is taken with the information

3. Storage and Retrieval – Stored for future use

4.Transfer – Transferring of information from active to inactive use

5. Disposition – Decision may be made to retain the information indefinitely at


either an active or an inactive storage center or to dispose it
Kinds of Sensitive Information
1. Proprietary Information

– An information which in some special way is related to the status,


operations or activities of the possessor over which the possessor asserts
ownership. In the business community, it relates to the structure,
products, or business methods of the organization.
2. Trade Secret
– Trade secret may consist of any formula, pattern device or compilation of
advantage over competitors who do not know or use it. It may be a formula for a
chemical compound, a process of manufacturing, treating or preserving materials, a
pattern for a machine or other device, or a list of customers. A trade secret is a
process or device for continuous use in the operation of the business.
3. Patent
– A grant made by a Government to an inventor, conveying and securing to him the
exclusive rights to make, use and sell his invention for a term of twenty (20) years.
In the Philippines, patent protection is covered by the Intellectual Property Rights
(IPR) Act of 1998.
General Types of Competitive Intelligence
1) White
– That which is available from company publications, public records or
commercial reporting sources.
2) Grey
– That is not readily available but which is usually can be obtained
without acquiring any civil/criminal liability in the process.
3) Black
– That which is obtained through clearly unethical or illegal means and
if discovered can result in civil and/or criminal sanctions
Eavesdropping(Unauthorized listening)
– Knowingly and without lawful authority, entering into a private place with
intent to listen surreptitiously to private conversations or to observe to of any
other persons or persons there or installing or using outside a private place any
device for hearing, recording, amplifying, or broadcasting sounds originating in
such place, which sounds would not ordinarily be audible or comprehensible
outside, without consent of any person or persons entitled to privacy.

Wiretapping – Interception of a communication’s circuit.

Bugging – Interception of communication using an electronic device.


Areas Where Sensitive Information May Be Lost:
Trash, Fake proposals for mergers, joint ventures or licensing
arrangements, Fake job interviews, plant tours, Irresponsible
company sales representative, Suppliers, Consultants, Company in-
house publications, Employees
Business Records Protection
Types of Business Records
1) Class I – Vital Records
– Include records that are irreplaceable; records of which reproduction does not have the
same value as the original; records needed to recover cash to replace buildings, equipment,
raw materials, finish products and records needed to avoid delay and restoration of product,
sales, and services.
2) Class II – Important Records
– Include records of the reproduction of which will involve considerable expense and labor, or
considerably be delay that operating statistical records belong to this class as well as those to
maintain checks on efficiencies, operating cost, etc. Also included are contracts, customer’s
credit files, sales record, designs in process development, records of experiments in progress,
etc.
3) Class III – Useful Records
– Includes records which loss might cause inconvenience but could be
readily replaced and which would not in the meantime present an
insurmountable obstacle to prompt restoration of business.

4) Class IV – Non-Essential Records


– Are the daily files routine in nature so that even if lost or destroyed,
will not affect operation or administration.
The Storage Containers
1) Safe – A metallic container used for the safekeeping of documents or
small items in office or installation. Safes can be classified as either
robbery resistance and burglary resistance depending upon the use and
need. Many safes are required to be installed in steel-lad concrete blocks
to prevent being carted away by burglars.
2) Vault
– A heavily constructed fire and burglar-resistant container usually a part
of the building structure used to keep and protect cash, documents, and
negotiable instrument. Vaults are bigger than safes but smaller than
security file room.
3) File Room
– A cubicle in a building constructed a little lighter than a vault but of
bigger size to accommodate limited people to work on the records inside.
Categories of Storage Container
1) Class 1.
– Commercial record safes designed for fire protection

2) Class 2.
– Commercial money safes designed for robbery and burglary protection
3) Class 3.
– Security cabinets designed to meet specifications for safeguarding
classification materials.
Some Test for Safe’s Fire Resistance
1) Fire Endurance Test
- A safe should not have at any one time a temperature above 350 degrees Fahrenheit.

2) Explain Hazard Test


- Test to determine if the sudden rise in temperature will not cause the safe to rupture. If
the safe can withstand 2000 degrees Fahrenheit for 30 minutes and will not crack or
open, then it has passed the explosion test.
3) Fire and Impact Test
- Aimed at determining the strength of a safe to withstand the collapse of a building during
fire.
Security Surveys and Inspections
Definitions
Security Surveys – A fact finding probe to determine a plant’s adequacy and
deficiency in all aspects of security, with the corresponding recommendations.
 
Supplemental Surveys - One conducted when there is a business reorganization
with corresponding changes in objectives and physical by-outs of the complex.
Special surveys- One directed by management, if the initial survey appear s to
have left certain proportions or aspects involving security due to change in policy
or operations that will greatly affect the total security picture.
Emergency - An unforeseen combination of circumstances or the resulting state that calls for immediate
action.
Disaster - A condition involving serious and widespread threat to life, health or property.
B. Goals of Emergency Planning
1. To minimize the effects of any incident of disaster proportion upon plant and community personnel.
2. To keep property and equipment loss at a minimum.
3. To ensure cooperation of all plant departments charged with specific activities in time of an emergency
4. To ensure appropriate cooperative action by and with outside civic and government agencies
Types of Industrial Emergency
Earthquake, Fire, Building collapse, Exposure Hazard, Explosion, Leakage of Gas or Toxic Fumes, Flood
and Heavy Rain, Volcanic eruption, Typhoon, Bomb Threat, Strike, Work accidents, Enemy Attack
Priorities in Case of Emergency
First Priority- Protect Human Life
Evacuation and Shelter- Move out people not needed in the operation
Personnel protection –Those who remain must be protected.
Rescue and Relief – Support assistance to those who may be injured.
Second Priority – Prevent or minimized personal injury
Design Safety – Eliminate things which could increase likelihood f
injury.
Third Priority – Reduce the exposure of physical assets.
Organization and Administration of Security Guard Force
R.A. 5487
- The Private Security Agency Law- the act which regulates the
organization and operation of private detective, watchman , and security
guard agencies in the Philippines which was approved on June 21, 1969?
.
PNP SAGSD - Philippine National Police Security Agency and Guard
Supervision Division formerly known as Supervision Office Security Investigation
Agency (SOSIA) – This is an office under the Chief of PNP through the Civil
Security Group (CSG) which is charged with the supervision, direction and control
of all security agencies in the Republic. The head of this division acts in the name of
the Chief of PNP on matters, duties and powers delegated by the latter.
In matters of licensing and in compliance with the prescribed rules and regulation
issued by the chief of PNP, the security personnel of government corporation/
agencies also fall under the supervision of the PNP SAGSD.
Note: SAGSD was already restored to its old name SOSIA (Supervisory Office for
Security Investigation Agency)
Branches of the PNP SAGSD
1) Administrative
2) Operations
3) Research, records, and statistics
4) License
5) Special Action
Different government security guards are covered by the same rules and
regulations for the private security guards; the only exception is that
government guards are exempted from the municipal and registration
fees as provided in R.A. 5487.
Persons Who Are Qualified to Organize a Security or Watchman Agency.
1. Any Filipino citizen or a corporation, partnership, or association, one hundred percent
(100%) of which is owned and controlled by Filipino citizens, may organize and maintain
a Private Security Agency or Private Detective Agency.
2. The operator or manager of an agency including managers of branch offices must be a
Filipino Citizen, shall not be less than twenty five (25) years of age; college graduate and
or a commissioned officer in the inactive service or retired from the Armed Forces of the
Philippines or the Philippine National Police, or graduated/ taken a course in concepts and
methods in Industrial Security and Security Management and/ or must have adequate
training or experience in security business , of good moral character not having been
convicted of any crime involving moral turpitude.
Disqualification for the Operator or Manager of Security Agency
1. Having been dishonorably discharged or separated from the Armed Forces of the Philippines or
Philippine National Police or separated for cause from any government entity or government owned
or controlled corporation.
2. Being mental incompetent;
3. Being physically unfit;
4. Addicted o the use of narcotic drug and/ or prohibited drugs and/or substances;
5. Habitual drunkard and alcoholic;
6. Dummy of any foreigner;
7. Elective or appointive government officials and employees who may be called upon on account of
the functions of their respective offices in the implementation and enforcement of RA 5487 and any
person related to such government employees by affinity or consanguinity in the third civil degree
shall not hold any interest, directly or indirectly in any security guard or watchman agency on account
of the functions of their respective offices in the implementation and enforcement of the provisions of
Republic Act No. 5487 as amended.
Security Guard
- Sometimes called watchman shall include any persons who offers or render
personal service to watch or secure either a residence or business establishment
or both, or building or compound, or areas, inspects/ monitors bodily check
searches individual and/ or baggage and other forms of security inspection,
physically, manually, or scientifically by TV monitors including but not limited
to logging concessions and agriculture, mining or pasture lands, for hire or for
compensation.
Private Detective
- Any person who does work for hire, reward or commission, other than members
of the Armed Forces of the Philippines, guards of the Bureau of Prisons, Bureau of
Jail Management and Penology and members of the Philippine National Police or
by any other law enforcement agency of the government.

Private Detective Agency


- Any person, association, partnership, firm or private corporation, who contracts,
recruits, trains furnishes or post any security guards, to do its functions or solicit
individuals, business firms or private or public corporations to engage his/its
services or those of his/its security guards, for hire or compensation through
subscriptions.
License to Exercise Profession or License Certificate
– Any document issued by the Chief PNP or his duly authorized representative
recognizing a person to be qualified to perform his/her duties as security guard
or private detective.
License to Operate
– A document issued by the Chief PNP, or his authorized representative
authorizing a person to engage in the occupation, calling or employment as
security guard, detective, or juridical person to establish, engage direct
manage or operate an individual or a private detective agency or private
security agency/company security force after payment of prescribe fees.
Company Security Force
– A security force maintained and operated by any private
company/corporation for its own security requirements only.

Government Security Unit


– A security force maintained and operated by any government entity
other that military and a police, which is established and maintained for
the purpose of securing the office or compound and/or extension of such
government entity.
Status of Security Guards
1) In consonance with the existing laws, PDs, Eos and issuance of proper authorities, the security
guards are part of the Citizen’s Armed Force, and auxiliary unit of the PNP in maintenance of
peace and order.
2) Under P.D. 1016, as armed component of the AFP reserved force, it may be called upon during
emergency to render military service/duties to assist in the defense of the state.
3) Under the specific provisions of R.A. 5487, the Governor and Mayor are vested the authority to
deputize the security guards to do police work, assisting the PNP in the maintenance of peace and
order during disasters, calamities and emergencies.
4) Each security guard on duty is part of the intelligence network of the PNP in gathering
information on crimes and criminals in their respective area of jurisdiction.
Qualification of Security Guard or Watchman
1) Filipino citizen
2) High school graduate
3) Physically and mentally fit
4) At least eighteen (18) years of age but not more than fifty (50) years
old
5) Has undergone Pre-licensing course
Note:Veterans and retired military/police personnel honorably discharge
including graduates of ROTC advance/basic or its equivalent in the AFP,
and B.S. Criminology are exempted
Qualifications of a Private Detective
1) Holder of baccalaureate degree or Bachelor of Laws;
2) Holder of a degree of Bachelor of Science in Criminology
3) Graduate of a Criminal Investigation Course offered by then PC-INP
or the Philippine National Police or the National Bureau of Investigation
or any police training school or detective training with
authorized/recognized center for security guard
4) Advance ROTC/CMT graduate
Qualifications for Security Consultants
1) Holder of Masters Degree either in Criminology, Public
Administration, MNSA, Industrial Security Administration or Law.

2) Must have at least ten (10) years experience in the operation and
management of security business
Numbers of Security Personnel to be Maintained to Secure Regular
License to Operate
1) Private Security Agencies – A minimum of two hundred (200) and a
maximum of one thousand (1000)
2) Company Security Force – A minimum of thirty (30) and a maximum of
one thousand (1000)
Use of Firearms and Equipment by Private Security Agency
Types of Firearms the PSA can possess
1) Shotguns not higher than 12 gauge
2) Low power rifles and revolvers such as: .22 caliber; .38 caliber pistols or
revolvers not exceeding one (1) firearm for every two (2) security guards in its
employ.
Numbers of Firearms the PSA can possess
1) For 100 guards, an initial number of at least 30 licensed firearms
2) For regular licensed (200 guards) at least 70 pieces of licensed
firearms
3) Use of firearm by Private Detective Agency is optional.
Confiscation of Firearms of Security Guard
1) When the firearm is about to be used in the commission of a crime
2) When the firearm is actually being used in the commission of a crime
3) When the firearm has just been used in the commission of a crime
4) When the firearm being carried is unlicensed or a firearm not authorized by law and
regulation for its use
5) When the confiscation of the firearm is directed by the order of the court
6) When the firearm is used or carried outside the property, compound or
establishment serviced by the agency without proper authority
7) When the security guard does not possess any license to exercise his profession
Revocation of License to Possess Firearms
1) Failure to submit any issued firearm for verification
2) Carrying of firearms by security personnel without appropriate Duty
Detailed Order (DDO)
3) When the firearm serial number has been duplicated on another firearm or
using one firearm license for more than one firearm other than those stipulated
in the license.
4) Carrying of firearms outside of the place stated in the permit
5) Conviction of the operator or manager of the agency of any crime involving
moral turpitude
6) When the firearm was reported lost
Security Personnel Ranks, Positions, Staffing Pattern and Job
Description
A. Security Management Staff
1. Security Director (SD) – Agency manager/chief security officer –
responsible for the entire operation and administration/management of the
security agency. Directly responsible to the agency operator/owner/Board of
Directors
2. Security Executive Director (SED) – Asst. Agency manager/asst. chief
security officer – automatically the security executive director, assist the
agency security director and take the operational and administrative
management when the manager is absent.
3. Security Staff Director (SSD)
– Staff director for operation and staff director for administration – the staff
director for operation is the staff assistant of the security manager for the
efficient operation of the agency. It includes the responsibility to canvass
clientele and the implementation of contract and agreement. He is also
responsible for the conduct of investigation and training; while the staff
director for administration is the staff assistant of the agency manager for the
effective and efficient administration and management of the agency. He is
responsible for the professionalization of the personnel,
procurement/recruitment, confirming of awards, mobility and issuance of
firearms.
Security Guard
1. Security Guard 1 – Watchman/Guard Person posted as watchman and/or
guard
2. Security Guard 2 – Shift In-Charge – Responsible for the security
officers who are scheduled in a certain shift for a particular period.
3. Security Guard 3 – Post In-Charge – Responsible for the entire detailed
security office with a certain establishment
Security Consultant – Optional but must possess all qualification.
Note: Security agency operator/manager/owner can put its own staffing
pattern provided it is consistent with the provision of IR of R.A. 5487.
The Security Guard Force
Is a group of forces of men selected, trained and/or grouped into a
functional unit for the purpose of protecting operational processes from
disruptions which would impede efficiency or halt operations at a
particular plant, facility, installation or special activity.
Types of Guard Forces:
1. Company Guard Forces – Proprietary or in-house security

2. Agency Guard Services – Contractual

3. Government Guard Forces – New type


Advantages of Organizing and Operating of Company Guard Forces
1) Loyalty to the organization is more intense than in agency guards
2) Generally, higher caliber men are employer is they received higher wages, benefits and
other allowances, and may be even required to undergo specialized training at company’s
direction.
3) Highly classified work can be given to guards after proper training and indoctrination
due to non-rotation of organic guards.
4) Company guards are more familiar with the facilities they protect, and can be trained to
handle some of the more complex security duties
Disadvantages of Company Guard Force
1) Cost more
2) Problem of insuring availability of back up personnel
3) May be required to join a guard union
Advantages of Agency Guard Services
1.It is more economical
2) Security administrative problems are reduced investigation and training are eliminated
3) Problems related to recruiting, re-employment investigation and training are eliminated
4) Problems involving absentees and vacation leaves are eliminated
5) Security personnel are separated from employees. Camaraderie is eliminated
6) In case of accidents or deaths, agency takes care of the cumbersome details
7) In case of emergencies, extra guards are easily available
8) In case of company strikes, the agency guards will on duty to carry out their assigned duties
Arrest by Security Guards
1) A security guard or private detective is not a peace officer and is not, therefore,
clothed with police authority. However, he may effect arrest/apprehension under
any of the following circumstances:
2) When the person to be arrested is actually committing, or is about to commit an
offense in his presence;
3) When an offense has in fact been committed, and he has reasonable ground to
believe that the person to be arrested has committed it;
4) When the person to be arrested is a prisoner who has escaped from a penal
establishment or place where he is serving final judgment or temporarily confined
while his case is pending, or has escaped while being transferred from one
confinement to another
General orders (11 GOs)
1) To take charge of the post and all company properties in view and protect the same with outmost diligence;
2) To walk in an alert manner during my tour of duty and observing everything that takes place within sight and hearing;
3) To report all violations of regulations and orders I am instructed to enforce;
4) To relay all calls from post more distant from the security house where I am stationed;
5) To quit my post only when properly relieved;
6) To receive, obey and passed on to the relieving guard all orders from company officers or officials, supervisors, post in-
charge or shift leaders;
7) To talk to no one except in the line of duty;
8) To sound or call the alarm in case of fire or disorder;
9) To call the superior officer in any case not covered by instructions
10) To salute and/or bow all company officials, superiors in the agency, ranking public officials and officers of the Philippine
National Police;
11) To be specially watchful at night during the time of challenging, to challenge all persons on or near my post and to allow
no one to pass or loiter without proper authority
Training System and Its Duration Period
Objectives of Training
1) To upgrade the discipline, competence and efficiency of
security guards/private detectives;
2) To educate them on the importance of national and community
security needs on prevention of losses;
3) To enhance a highly professionalized security industry in the
country
Classification and Duration Period of Training

1) Basic security guard course (pre-licensing training course) – 150


hours

2) Re-training course – 48 hours

3) Security officers training course – 300 hours

4) Basic security supervisory course – 48 hours


Glossary of Terms:
Access List – An authenticated list of personnel given to security allowing entry to compound
or installation or party thereof
Audit – An official verification and examination of accounts and records.
Automated records – Records accumulated by electronic data processing system (EDPS) like
types, memory drives, reels, and storage cases
Badge system – A system for personnel movement and control where badges or
identifications are issued to personnel upon entering and installations. visitors are also issued
temporary badges when entering the installation.
B.I. (Background Investigation) –A check made on an individual usually seeking
employment through subjects record in the police files, educational institutions, places of
residence and former employer
C.B.I. (Complete Background Investigation) – Same as B.I. but more
comprehensive to include places or residence since birth
Controlled Area – A area near or adjacent to limited or exclusive areas where entry
is restricted
Coverage Factor – The minimum number of directions from which each point in
the area should be lighted depending upon the use of the area.
Doppler Effect – The physical phenomenon that causes frequency shift in an object
moves in an area permitted by radio frequency signals. This change in certain types
of alarm activates a signaling unit.
Dry Run – Practical test or exercise of a plan or any activities to test its validity; an
operational readiness exercise
Duress Code – A type of code system so that the security personnel when
forced by armed men to enter an installation can give alarm by the use of
certain words in casual conversation with other personnel in the installation
Fail Safe – A term applied to device or system that in the event of failure of a
competent, the incapacity would be signaled.
Peterman – A term used in England for lock pickers
Restricted Area – Any area, access to which is subject to special restriction
control.
R.A. 5487 – An act governing the organization and management of private
company guard force and government security forces. It is otherwise known
as the “Private Security Agency Law”

You might also like