You are on page 1of 67

Industrial Security

Management
Hazel Ann C. Asoy, MSCA, CSP
RA 5487 (amended by PD 11)
The Private Security Agency Law

The organization, operation, business and activities of private


detectives, watchmen or security guards agencies shall be
governed by the provisions of this Act.

2
Private Detective Agency
any person who for hire or reward or on
commission conducts or carries on or
holds himself out as conducting or
carrying on a detective agency or
detective service

3
Private Detective
any person who is not a member of a
regular police agency or armed forces
who does detective work for hire,
reward or commission

4
PADPAO
Philippine
NOTE: Supervisory Office for Security and
Association of Investigation Agencies (SOSIA), which is under
the Civil Security Group of the Philippine National
Detective and Police, is the regulatory entity of PSAs, not
PADPAO.
Private
Agency
Operators

5
Watchmen/Security Guard
person who offers or renders personal
service to watch or secure either
residential or business establishment or
both or any building, compound or area
for hire or compensation or as an
employee thereof

6
Security Agency
any person, association, partnership or
corporation who recruits, trains, muster,
furnishes, solicit individuals or business
firms, private or government owned or
controlled corporation to engage his
services or those of its watchmen

7
Who May Organize Security Agency
1) Any Filipino Citizen or a
corporation, partnership or
association.
2) With a minimum capital required
by law.

8
Qualification of an Operator or Manager
of a Security

Agency
1. At least 25 years of age
○ 2. College graduate and/or commissioned officer in the inactive service of the
AFP
○ 3. Good moral character
○ 4. No previous record of any conviction of any crime/offense involving moral
turpitude
○ 5. Not suffering from any of the following disqualifications:
○ dishonorably discharged or separate from the AFP
○ mentally incompetent
○ addicted to the use of narcotic drugs
○ habitual drunkard

9
Basic Qualification of a Security Guard
1. Filipino citizen
2. High school graduate
3. Physically and mentally fit
4. Not less than 21 nor more than 50 years old
5. At least 5'4" in height
6. Not suffering from any disqualification under RA 5487

10
Limitations and Prohibitions on a
Security Agency
○ No agency operating in the City of manila and suburbs may employ more
than 1000 watchmen or security guards.
○ No agency operating in other cities and first class municipalities may
employ more than 500 watchmen or security guards.
○ No agency operating in municipalities other than first class may employ
more than 200 watchmen or security guards.

11
Limitations and Prohibitions on a
Security Agency
○ No person, corporation, partnership or association may organize more than
one agency in any one city or municipality.
○ No agency shall offer, render or accept services to gambling dens or other
illegal enterprises.
○ The extent of the security service being provided by any security agency
shall not go beyond the whole compound or property of the person or
establishment requesting the security service except when they escort big
amount of cash.

12
Who can Issue rules and regulations to
carry out the purpose of RA 5487?

○ The chief PNP, in consultation with the Philippines Association of


Detective and Protective Agency Operators.

13
Physical security
○ describes the measures that are designed to deny access to unauthorized
personnel from physically accessing a building, facility, stored information
and guidance on how to design structures to resist potentially hostile acts.
○ a system of barriers placed between a potential intruder and the material or
installation to be protected.

14
Security
○ The predictable state or condition which is free from harm, injury,
destruction, intimidation or fear.
○ Freedom from fear or danger or defense against crime.

15
Purpose/Goals of
Physical Security
1. Deter potential intruders - ex. warning signs, perimeter markings
2. Distinguish authorized from unauthorized people - ex. using pass card
3. Delay or prevent intrusion attempt - ex. wall, door lock, safe
4. Detect intrusion and monitor/record intruders - e. CCTV, intrusion alarm
5. Trigger appropriate incident responses - ex. security guards

16
How to deter potential
intruders
1. Install warning signs
2. Build fences
3. Put vehicle barriers
4. Install vehicle height restriction
5. Implement restricted access point
6. Install sight lighting and trenches

17
Target hardening
○ the reduction in criminal opportunity, generally
through the use of physical barriers, architectural
design and enhanced security measures of a particular
location.

18
Defensible Space
○ the range of mechanisms that combine to bring an
environment under the control of its residents.

19
Demography
○ the study of the characteristics of population groups.

20
Principles of Physical
Security
1. An intruder must be able to acquire access to the property in order to benefit.
2. The type of access necessary will depend upon a number of variable factors and
therefore may be achieved in a number of ways.
3. There is no impenetrable barrier.
4. Security is built upon a system of defense in depth resulting to accumulated delay time
which may lead to the apprehension of the intruder.
5. Each installation is different from the others.

21
Kinds of Barriers
1. Natural
2. Artificial

22
Types of Barriers
1. Human
2. Animal
3. Natural
4. Energy/Electrical/Electronic
5. Structural

23
How to detect intrusion
1. install alarms
2. install intrusion detection monitor
3. install video monitoring system - ex. cctv

24
Barriers
any kind of boundary serving as limitation

25
Structural Barriers
features constructed by man regardless of their
original intent that tends to delay the intruder.
Ex: walls, ceilings, locks, safe, windows

26
Human barriers
guards, charges of quarters, office personnel, shop
workers etc. who stand between the intruder and
the matter to be protected.

27
Animal barriers
usually guard dog, goose, and turkeys

28
Energy barriers
electrical or electronic devices used to provide
assistance to guard personnel. Ex: protective
lightings, anti-intrusion devices.

29
Full view fence
it is designed primarily to prevent physical access
between two areas.

30
Physical
Security
Features
Natural barriers
natural terrains features must be considered from
the stand point of their values to intruder as cover
and concealment. Normally the first type
considered very often we have to accept and work
around them.

32
Fences
a. solid fence- one is constructed in such a way
that visual access through the fenced structure is
denied.
b. full view fence- constructed in such a way that
usual access is permitted through the fence.

33
Advantages of a Full View Fence
1. Removing patrols and stationary guards are able
to keep area surrounding of the installation under
observation.
2. It does not create shadows which would provide
cover and concealment for the intruder.

34
Disadvantages of a Full View Fence
1. It allows visual access to the installation, personnel,
guards and activities.
2. It allows the intruders to become familiar with the
movements and the time schedule of the guard patrols
thereafter allowing him to pick the time for attempting
penetration which would most advantageous to the
intruder.

35
Advantages of Solid Fence
1. Denies visual access of the installation of the
intruder.
2. Denies the opportunity for the intruder to
become familiar with the personnel, activities and
the time schedule of the movements of guards in
the installations.

36
Disadvantages of Solid Fence
1. It prevents the guards from observing the area
around the installation.
2. It creates shadows which may be used by the
intruder for cover and concealment.

37
Basic Functions that must be Accomplished
by the Guard System
1. Detect intruders
2. Sound alarms
3. Apprehend unauthorized personnel
4. Identify authorized personnel

38
Types of Identification
1. Personal Recognition- is the most effective
2. Artificial Identification - badges, passes etc.

39
System of Employment of Personnel
Control Identification

1. Pass system - a method used by security to screen visitors or person


admitted into building premises.
2. Single pass or Badge system - the least expensive and the least
secure.
3. Group pass and Badge system - one ID for one group.
4. Multiple pass system - separate pass is required for access to
various areas in need ex. color coding

40
5. Spot magnetized identification passes - a code may
be placed in the device and when passes through a
machine, the code on the device is read, if it contains
wrong code or no code at all, it will alarm.
6. Access list - it contains the names of authorized
persons or personnel and is checked against identification
cards such as drivers licenses, draft registration etc.

41
Visitor control- the measures used would depend on the
sensibility of the installation but could include the
following:
1. Escort- expensive but most secure
2. Time traveled- if there is a long delay or time lapse between the
departure and arrival, the visitor may be required to show cause for the
delay.
3. Visitors logs- should contain identifying data, reasons of visit, time
in and hour etc.
4. Visitors entrances- separate access for visitors and separate for
employees.

42
Utility and maintenance personnel- escort system could be used. If these
people visit the installations on a regular basis some of the systems
previously could be used.

Package control- there should be provisions made to check packages being


taken in and taken out.

Photography- extreme caution must be exercised in areas where classified


information is displayed to preclude unauthorized taking of pictures of the
installation.

43
Types of Protective Alarm Systems
1. Central station system - the control station is located outside the installations. When the
alarm is sounded by a subscriber, the central station notifies the police or protection agency.
2. Property system - the control system is located inside the installations with its own
firefighter, law enforcer, ambulance, or bomb disposal unit.
3. Local alarm - the signaling is near the alarm itself. When the intruder enters the
installation, the alarm goes off scaring the intruder. Purpose is just to scare not to apprehend
intruder.
4. Auxiliary alarm - the installation owned the protective alarm with a unit in the nearest
police station so that in case of need, direct call is possible.

44
Kinds of Alarms
○ 1. Intrusion alarm- any detecting devices using electric and their
combinations to signal an alarm when actuated.
○ 2. Laser beam alarm- a laser emitter floods the wall or fence with a
beam so that when this beam is disturbed by a physical object, an
alarm is activated
○ 3. Photocell alarm- an invisible or visible beam is emitted and when
disturbed, it activates an alarm or mechanical device that opens a door
or lift movable barriers, activated by light.

45
Basic Component of an Alarm System
1. Annunciation- the heart of the system of the detecting device and is the
component that activates the triggering unit.
2. Transmission- it transmit what is detected.
3. Triggering device- the one which emits those aural or visual signals or
both.

46
Security Survey- the detailed
check and audit of what an
installation or plant does not have
in relation to its protection from
hazards.
Security Inspection- a process
where physical examination is
conducted to determine
compliance with established
security policies and
procedures as a result of
security survey.
Security
hazards
an act or condition which result in a situation
conductive to a breach of the protection
system and the subsequent loss or compromise
of defense, information, company secrets, or
damage to property, personnel, or facilities.
Hazards
exposure to loss or injury
Two General Categories of
Security Hazards

1. Human Hazard - caused by


human action. Ex: sabotage,
pilferage, theft
2. Natural Hazard - caused by
natural phenomena.
Types of Human Hazards
1. Human carelessness 8. Pilferage
2. Accident 9. Theft
3. Disaffection 10. Vandalism
4. Disloyalty
5. Subversion
6. Sabotage
7. Espionage

52
○ Protective Security- measures taken by

“ an installation or unit to protect against


sabotage, espionage or subversion and
at the same time provide freedom of
action in order to provide the
installation or unit with the necessary
flexibility to accomplish its mission.

53
Aspects of Security
1. Physical Security - measures taken to prevent
physical access or entry to an installation.
2. Personnel Security - measures taken to insure that
only authorized personnel have access to classified
documents or information.
3. Document and Information Security

54
Types of Security
1. Physical Security- the broadest type of security.
2. Industrial Security- security of business installations and industrial plants.
3. VIP Security- protection of high level officers and important personnel.
4. Bank Security- security of money and assets stored or in transit.
5. Hotel Security- security for hotel guest and their personal belongings and
property as well as properties of the hotel.
6. Document security- protection of vital records from loss or unauthorized access.
7. Communication Security- measures to prevent or delay the unauthorized person
in gaining information through communication.

55
Physical Security
Barrier- any structure or physical
device capable of restricting,
deterring, delaying illegal access
into installations.
Perimeter barrier - a medium or
structures which define the physical
limits of an installation or area to
restrict or impede access thereto.
Any physical barrier used to
supplement the protection of the
inside perimeter.
Inside Perimeter- a line of protection
adjacent to the protected area and passing
through points of possible entry into the
area.
Ex: doors and windows
Outside perimeter- a line of protection but
somewhat removed from the protected area.
Ex: fence
Types of Perimeter
Barrier Opening
1. Gates and Doors 6. Guard Control
2. Elevators Stations
3. Air intakes, Exhaust 7. Tower
tunnels 8. Barrier maintenance
4. Clear Zone 9. Sign and Notices
5. Top Guard

59
Protective Alarms- supplemental physical
barriers in a form of sound that cause alarm
installed indoors or outdoors in an
installation.

60
Ultrasonic
detection
device

Types of
Alarm
Systems
Audio
Metallic detection
foil wire device

61
Kinds of Alarms
1. Bill Traps
2. Foot Rail Activator
3. Knee or thigh button
4. Foot button
5. Double squeeze button

62
Types of Protective Lighting
1. Stationary luminary - consist of series of fixed
luminaries to flood given area continuously Example: glare
protection type
2. Standby Lighting - provides continuous lighting through
manual operations.
3. Movable Lighting - stationary or portable manually
operated search lights.
4. Emergency Lighting - duplication of existing lighting
system that is utilized in the event of electric failure.

63
Types of Lighting Equipment
1. Street lights - used in parking areas
2. Search Lights - highly focused incandescent lamps used to
pinpoint potential trouble spot.
3. Flood Lights - project light in a concentrated beam used in
boundaries and fences.
4. Fresnel Lights - wide beam units primarily used to extend
illumination in long horizontal strips to protect approaches to
perimeter barrier.

64
Protective Locks and Keys
○ Lock- a mechanical, hydraulic, electrical or electronic
device designed to prevent entry into a building, room,
container or hiding place and to prevent the removal of
items without the consent of the owner.
○ Padlock- portable and detachable lock having or sliding
hasp that passes through a staple ring.
○ Peterman- A term used in England for lock picker, safe
cracker and penetrators of restricted areas or rooms.

65
Types of Locks
1. Lever locks - used in cabinets, drawers, safe deposit box.
2. Disc-Tumble Locks - used in car doors.
3. Warded Locks - offer little security, used only to provide
privacy.
4. Combination Locks
5. Card Operated Locks
6. Electromagnetic Locks
7. Code operated Locks

66
Types of Keys
1. Master Key- a special key of opening a series locks.
2. Grand Master Key- a key that will open everything in a
system involving two or more master key groups.
3. Change Key- a key to a single lock within a master keyed
system.
4. Sub Master Key- a key will open all lock with a particular
area or grouping in a given facility.

67

You might also like