Republic Act No. 11917, “The Private Security Services Industry Act.
" Approved: July 30,
2022
“An act strengthening the regulation of the private security services industry, repealing
for the purpose, Republic Act No. 5487, entitled “an act to regulate the organization and
operation of private detective watchmen or security guard agencies”, as amended
Policies and Definitions (Sections 2-3):
-Recognizes the vital role of the private sector in protection, safeguarding property, and
maintaining peace and order.
- Aims to strengthen regulation and establish quality standards for competent private
security personnel.
- Defines key terms like License to Exercise Security Profession (LESP), License to Operate
(LTO), Pre-Licensing Training Programs, Private Security Agency (PSA), Private Security
Industry, Private Security Professional (PSP), Private Security Services, Private Security
Training Agency (PSTA), Security Consultant, Security Hardware, and Security Hardware
and Systems Designers and Planners.
Registration and Licensing of Private Security Agency (Sections 4-11):
- Filipino citizens or wholly Filipino-owned entities can organize a PSA with up to 2,000
PSPs. (Section 4)
- Qualifications for PSA operator or licensee include age, education, ownership, good moral
character, no criminal convictions, and physical/mental fitness. (Section 5)
- LTO from the PNP Chief is required to operate a PSA or PSTA, valid for up to 5 years.
(Sections 6-7)
- PSAs must pay fees and post a bond determined by the PNP Chief. (Section 8)
- PSAs must charge at least 20% of the total contract cost as administrative fee. (Section 9)
- PSAs can possess firearms under PNP regulations, limited to small arms not exceeding
one per PSP. (Section 10)
- PSP uniforms must be different from law enforcement and prescribed by the PNP. (Section
11)
Private Security Professionals (Sections 12-15):
- Qualifications for LESP include legal age, Filipino citizenship, physical/mental fitness, good
moral character, and no criminal convictions. (Section 12)
- LESP is valid for 5 years. (Section 13)
- Pre-Licensing Training Program is required for LESP. (Section 14)
- PNP and accredited institutions shall develop ladderized training and education for PSPs.
(Section 15)
Penal Provisions (Section 16):
- Penalties for violations include cancellation, revocation or suspension of LTO, fines from
P50,000 to P5,000,000, and imprisonment from 6 months to 20 years, depending on the
offense.
Miscellaneous Provisions (Sections 17-20):
- PNP shall promulgate implementing rules and regulations within 90 days, in consultation
with stakeholders. (Section 17)
- Separability clause. (Section 18)
- Repealing clause for Republic Act No. 5487 and other inconsistent laws. (Section 19)
- Effectivity 15 days after publication in the Official Gazette or newspaper. (Section 20)
● RA No. 11917 strengthens the regulation of the private security services industry in the
Philippines, establishing quality standards for competent private security personnel and
providing penalties for violations, intending to protect people, property and maintain
peace and order.
Salient Points:
o Addressing all security personnel as Private Security Professionals (PSP).
ex. those who are engaged or in the practice of security profession are not just
called security guard
o Ladderized Training and Education under Sec. 15, giving the security professional a
level up from his current position.
There will be a developmental study for security personnel, ex. compiled training
modules or manuals will undergo a thorough inspection or analysis by the
Philippine National Police (PNP) through the Supervisory Office for Security and
Investigation Agencies (SOSIA) that will be adopted by the Technical Education
and Skill Development Authority (TESDA)
o Allowing the Private Security Agency (PSA) to employ not more than 2,00 private
security professionals as compared to RA No. 5487 which is limited only to 1,000
security personnel.
o Period of Validity of License to Operate (LTO) for both PSA and PSTA is a maximum of 5
years under Chapter ll Sec, 7.
o License to Exercise Security Profession (LESP) of duly qualified PSPs shall be valid for
a period of 5 years from the date of its issuance under Chapter lll, Sec 13.
o Minimum administrative fee that may be charged by PSAs to its clients shall not be less
than 20% of the total contract cost, subject to adjustment by the Department of Labor
and Employment (Sec. 9).
o Additional fees shall be charged for the acquisition and maintenance of extraneous tools
and equipment used for security operation by the agency or required by the clients and
for the continuous deployment of PSPs in hazardous conditions.
o Under Sec. 1o, PSAs are allowed to possess small arms not exceeding one (1) firearm
for each PSP, to include single post in its employ (in accordance with RA No. 10591:
Comprehensive Firearms and Ammunition and Regulation Act).
Possessions of Firearms:
1. During tour of duty
2. In proper uniform
3. Within the compound of the establishment
4. When escorting large amounts of cash or valuables
Customer Service
1. Consistent Reliability: The Bedrock of Trust
Insight: Customers rely on security personnel to keep them safe and secure. Consistency in
service delivery is paramount. Whether it's ensuring timely response to incidents, maintaining
a visible presence, or adhering to protocols, reliability builds trust.
Example: Imagine a hotel security team that consistently patrols the premises, greets guests
with a smile, and promptly addresses any concerns. Guests feel secure and trust that their
safety is a priority.
2. Effective Communication: Bridging the Gap
Insight: Clear communication fosters trust. Security professionals must convey information
effectively, whether it's explaining emergency procedures, providing directions, or addressing
complaints.
Example: A mall security guard who calmly guides shoppers during a fire alarm evacuation,
assuring them that exits are accessible, builds trust through effective communication.
3. Empathy and Understanding: Seeing Through Their Eyes
Insight: Empathy is key to understanding customers' needs and emotions. Acknowledge their
feelings, validate their concerns, and show genuine care.
Example: A residential security officer who listens attentively to a resident's noise complaint,
empathizes with their frustration, and takes appropriate action demonstrates trustworthiness.
4. Transparency and Honesty: No Hidden Agendas
Insight: transparency builds trust by dispelling doubts. Be honest about security policies,
procedures, and limitations.
Example: A corporate security team that openly communicates about access control
measures, explaining why certain areas are restricted, gains employees' trust.
5. Personalization: Treating Each Customer as Unique
Insight: Tailor your interactions to individual preferences. Remember names, acknowledge
repeat visitors, and customize service
Example: A museum security guard who greets regular patrons by name, shares interesting
facts about exhibits, and remembers their interests creates a personalized experience.
1. problem-Solving mindset: turning Challenges into opportunities
Insight: Rather than seeing complaints or issues as obstacles, view them as chances to
strengthen trust. Solve problems promptly and learn from them.
Example: A concert venue security team that swiftly resolves seating disputes, ensures crowd
safety, and learns from past incidents builds trust with concertgoers.
2. Consistent Professionalism: Upholding Standards
Insight: Professionalism instills confidence. Dress appropriately, maintain a positive attitude,
and uphold ethical standards.
Example: A casino security officer who remains calm during a disruptive incident, handles it
discreetly, and maintains a professional demeanor earns patrons' trust.
Basic Security and Safety Protocols
- Regularly patrol premises and check for unusual behavior
- Note and report any safety hazards, such as broken doors or malfunctioning
security equipment
- Keep records of incidents and observations for future reference
- Wear a neat and clean uniform
- Use appropriate language and behavior at all times
- Treat all customers with respect and courtesy
Corporate Intelligence and Investigation
- Conduct personnel security investigations to determine an individual's suitability for
security clearance
- Perform National Agency Checks (NAC) by checking files and records of national
agencies
- Conduct Local Agency Checks (LAC) by sending written inquiries to local
government agencies, former employers, references, and schools
- Perform comprehensive Background Investigations (BI) on individuals
- Gather intelligence through active listening, keen observation, and analyzing situations
quickly
- Investigate incidents, preserve crime scenes, and write detailed report
Security Survey and Plan
- To effectively conduct a security survey and develop a comprehensive security plan,
consider the following types of security.
A comprehensive security plan should address the following key areas:
Physical Security - Protects facilities and equipment from theft and damage through measures
like locks, alarms, and surveillance. Access control systems (e.g. locks, fences, barriers)
- Surveillance cameras and alarm systems
- Security lighting and perimeter protection
- Visitor management procedures.
Personnel Security -Involves background checks and training to ensure staff adhere to security
protocols and maintain a security-conscious culture.
- Background checks and security clearances for employees
- Security awareness training and education programs Insider threat mitigation strategies
- Procedures for handling sensitive information.
Document and Information Security - Safeguards sensitive data through access controls,
encryption, and cybersecurity measures against threats like phishing and malware.Data
encryption and access controlsSecure storage and disposal of documentsIncident response and
disaster recovery plans
Risk Management and Business Continuity Management - Identify critical functions and
threats, conduct risk assessments, and develop a Business Continuity Plan (BCP) to ensure
operations can continue during disruptions.
WHAT IS SECURITY?
Security, in a collective sense, is the same as protection and safety; it is a state or quality,
condition of being secured, freedom from fear, harm, danger, loss, destruction or damages, to
secure is to make safe or be protected.
It is an assurance, guarantee and certainty of being safeguard and free from fear of danger.
WHAT IS SECURITY PLANNING?
The decision making process made by executives in preparation of accomplishing goals and
objectives within an Organization.
In Security Management, a security plan is composed of the following:
1. The Situation - It explains in a short paragraph the historical background of the organization
and its security force.
2. The Mission - Covers what plan is all about and what tends to do.
3. Execution-The concept of the project will outlined and explain
4. Administration and Logistics - Involves the listing of Security equipment and facilities to be
used.
5. Command and Signal-pertains to the channel of Communication needed when
implementing the project.
Example : Architectural Security
Basic Concepts
❖ The Need for Security
● During pre-historic times man has realized the need to protect himself from his enemies,
his environment, and from ferocious animals. He invented stone weapons, built fires,
stayed in caves, and built tree houses, fences or dwelling in the middle of the lake or
river for protection.
● Thus, civilized man adopts security measures to have adequate protection against
unsecured and unsafe conditions.
● In these modern times private security today plays a major protective role in the nation's
life, due to socio economic changes that have made life more complex. Private security
complements police efforts to assist in burglar alarm responses, prosecution policies
against theft, hazardous materials, counter terrorism and security for public events and
protection of assets.
Layers of Security
1. Perimeter Control – Security barriers, checkpoints at the outermost layer to
anticipate/identify hostile elements at the vicinity of the communication facility.
2. Area Access Control-Control measures undertaken to prevent entry of unauthorized person
inside the premises of communication security.
3. Control of operation Area – Final measures undertaken prior to the entry into an operating
room.
4. Control of Communication Area – Final security measures undertaken prior to the entry
into a communication area.
Physical Security - refers to tangible objects, such as walls, fences, locks, and building design,
that promotes the protection of persons and property.
This is the broadest branch of security which is concerned with the physical measures adopted
to prevent unauthorized access to equipment, facilities, material and documents and to
safeguard them against espionage, sabotage, damage, loss and theft.
❖ Principles of Physical Security
1. The type of access necessary will depend upon a number of variable factors and therefore
may be achieved in a number of ways.
2. There is no impenetrable barrier.
3. Defense-in depth is barriers after barriers.
4. Delay is provided against surreptitious and non-surreptitious entry.
5. Each installation is different.
● Barriers
Barrier can be defined as any physical structure whether natural or man-made capable of
restricting, deterring, delaying, or preventing illegal and unauthorized access to an installation
What are the three Line of Physical Defense?
1. First line of defense perimeter fences / barriers
2. Second line of defense – doors, floors, windows, walls, roofs and grills and other entries to
the buildings.
3. Third line of defense storage system like steel cabinets, safes, vaults and interior files.
WHAT IS PERIMETER BARRIER?
It is a medium or structure which defines the physical limits of an installation, or area to restrict
or impede access thereto. It is any physical barrier used to supplement the protection of an
inside or outside perimeter.
The main purpose of perimeter barrier is to deny or impede access or exit of unauthorized
person. Basically, it is the first line of defense of an Installation. This is maybe in the form of
fences, building walls or even bodies of water. The function and location of the facility itself
usually determine the perimeter of the installation.
Two general types of Physical Barriers:
1. Natural Barriers -– Such as rivers, cliffs, and ravines, etc. which delay or make more difficult
the entry of the intruder.
2. Man-made Barriers – are structural construction like fences, walls, floors, roofs, grills, bars,
roadblocks, or other physical means to deter or impede penetration.
1. Natural Barriers
Advantage:
a. They provide a protection system without additional cost to the installation.
b. The difficulty to penetrate an installation increase according to the barrier.
Disadvantage:
a. Trees, ravines, vegetation could serve as a hiding place to any possible intruder.
b. Installation that has as barrier a body of water could be subject to penetration through a team
of divers.
2. Man-made Barriers – are structural construction like fences walls, floors, roofs, grills, bars,
roadblocks, or other physical means to deter or impede penetration.
Fences: Fences are independent structures, generally in a vertical plane, designed for the
physical and or visual control of access to external