Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
125 views114 pages

Lea 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views114 pages

Lea 3

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 114

CHAPTER 1

HISTORICAL BACKGROUND AND BASIC CONCEPTS


OF INDUSTRIAL SECURITY MANAGEMENT

The need for security of lives and properties is as old as the history of man. Man’s existence is
characterized by constant exposure to dangers: those hazards caused by nature; and those danger
posed by man’s fellowman. The means and methods of human beings to secure themselves are also
as old as the history of policing.
In the Philippines, “Hacienderos” or owners of large tract of lands often hire farm workers who
often double as protectors of the property against cattle rustlers and robbers. With the entry of the
American mining industries, the American companies started hiring armed security personnel. And
in 1950’s hired security personnel were already widespread after the restoration of the country after
World War 2. There were no strict regulations yet during that period. Security workers then were
still under the city or town mayors who in turn issue working permits to those wanting to be
employed as security guards. Security and Detective agencies also began to prosper and with no
strict regulations, many security guards were convicted of violent crimes. The establishment of the
Philippine Association of Detective and Protective Agency Operators (PADPAO) in 1958 with the
aim of making itself a freely self-governing, self-regulating and self-policing paved way for the
endorsement to Congress a bill to regulate the organization and operation of private detectives,
watchmen, security guards and agencies. Thus, on June 13, 1969, R.A 5487 or the “Private Security
Law” was born. This event started the professionalization of security works in the country.
The RA 5487 underwent numerous revisions so that the industrial security business will suit to
the economic advancement of the country. Today, many college graduates particularly Criminology
graduates are employed in the security business ranging from security guards and watchmen to
security supervisors and managers. The number of persons working in the industrial security even
surpassed the number of personnel of the Philippine National Police. The security guards now are
regarded as closed partner of the PNP and the Armed Forces of the Philippines (AFP) in combating
criminality in the country.
Today, the role of the industrial security business is indispensable as far as the economic
progress of our country is concerned. The economic success of one country depends on the stability
of its society. It can be noted that most are economically secured countries are free from any
external threats. Their socio-economic advancement relied so much on the maintenance of their
peace and order. In this country alone, our economy continues to suffer due to vulnerability to
internal and external threats.
One old adage state that, “Security in every organization is everybody’s business.” This means
that the avoidance of loss and damage to properties as well as the prevention of injury or loss of life
because of hazards is not possible without the active support of all individuals within an
organization. Among the Filipinos personnel of organizations and business enterprises are virtually
leaving their security and protection only to members of their security force. It is unfortune also that
many business establishments regard security personnel as mere compliance and sometimes as lowly
as props in the company.
Many failed to recognize the significance of a blue clad individual often times call “sikyu”.
Most company workers including the management people are not aware that the responsibilities of
an assigned “sikyu” ranges from the single centavo spent for the establishment of the business
enterprises up to the entire investments of the concerned company. This is because the security
personnel should guard the company from the smallest possible lost to the possible total destruction
of the business that could be caused by impending hazards.
On the other hand, lack of security consciousness on the part of the company personnel should
be taken as an act of negligence. Hence, any breach of security that may arise because of a company
personnel’s lack of consciousness, he should be equally liable with the concerned security
personnel.
Therefore, to achieve the objectives of effective security management, the company concerned
and the security personnel assigned should work hand in hand. To this both the security personnel
and the company’s workforce should be educated with the basics of security management.
1
Famous Personalities in Industrial Security Management
1. Allan Pinkerton (1851)
 Established the first national private security and investigation company in the US.
2. August Pope (1853)
 Patented one of the first burglar alarms.
3. Edwin Holmes (1858)
 Introduced the first central station burglar alarms.
4. Washington Perry Brinks (1858)
 Introduced the first armored carriages for the transportation of money and valuables.
5. George Wackenhut (1954)
 A retired FBI agent formed the Wackenhut Corporation, an enterprise that became
another one of the largest private security companies in the US.
 American Society for Industrial Security (ASIS) 1955
 The world largest organization of security professionals.

Definition of Terms
1. Industry
 The term denotes “earnest or constant application to work or business”, or “a special
branch of productive work, or the capital or workers employed in it.” It is likewise
defined as a large-scale production or organized economic activity connected with the
production, manufacture or construction of a particular product or range of products.
2. Industrial
 This is defined as “pertaining to or engaged in industry” or having highly developed
industries.
3. Security
 It is the state or condition of being safe or free from fear, harm, danger, loss,
destruction or damages. It is needed for adequate protection because of the prevailing
action of man against man that leads to unsecured and/or unsafe conditions due to
economic reason, revenge, or just plain greed.
4. Management
 The term mean skillful use of means to accomplish a purpose. This is the process of
properly utilizing available resources to achieve organizational goals and objectives.
5. Security Management
 It is the utilization of all available resources within a security organization in order to
function and attain its goal and objectives. It is the managing of money, men, materials
and methods with in security system.
6. Industrial Security
 security measures applied to business industries
 the business of providing security and protection to private individuals, business and
enterprises, or government and non-government industries.
7. Industrial Security Management
 It is the skillful handling of the security and safety measure of business enterprises and
industrial establishments.
8. Hazard
 refers to conditions that may cause damage to property, injury, or loss of life. It is also
defined as “exposure to the chance of loss or injury.”
9. Vigiles (in Rome)
 origin of the watchmen although their principal duty was as a fire brigade.
10. Target hardening
 the reduction in criminal opportunity, generally through the use of physical barriers,
architectural design and enhanced security measures of a particular location.
11. Defensible Space

2
 the range of mechanisms that combine to bring an environment under the control of its
residents.
Historical Background of Industrial Security in the Philippines
 In the Philippines, we trace the steps from the signing of the late president Ferdinand E. Marcos
on June 13, 1969 of the RA 5487 known as the “Private Security Agency Law”.
 In this law assigned the most important role of the security guard force in assisting the police in
its mission to safeguard lives and properties. With the intention of continuously professionalizing
the security industry, several Presidential Decrees were issued such as PD 11 issued on October
1972, amending certain sections of RA 5487 particularly section 4 as to who may organize a
security and watchman agency; PD 100 on January 17, 1973 further amended sections of RA 5487
which permits the Philippine Constabulary to deputize any private detectives, watchman or security
guard to assist in cases of emergency disaster or calamity.

LEGAL BASIS OF INDUSTRIAL SECURITY IN THE PHILIPPINES


1. Natural Authority
 The highest law is the law of self-preservation. Man, naturally reacts to protect himself, his
family, his honor, freedom liberty and property from danger, threat or hazard. It became an
unwritten law of the early Filipinos to protect themselves and their property against the
natural and man-made hazards.

2. Constitutional Authority
a. The prime duty of the Government is to serve and protect the people (Art. II, sec. 4)
 The government may call upon the people to defend the state and, in the fulfillment
thereof, all citizens may be required, under conditions provided by law, or to render
personal military service. Although, the defense of the state is the one contemplated
here, people being one of the elements of the state is directly affected in whatever
protection the state will receive from the government and the people. Take note also
that all citizens who are qualified, including the security guards, may be required by
law to render personal military or civil services. The service required of the citizens is
personal.

b. No person shall be deprived of life, liberty or property without due process of law, nor shall
any person be denied the equal protection of the laws. (Art. III, sec. 1)
 This means the life, liberty, freedom and property can only be taken from a person after
the observance of due process of law. Due process of law is of two aspects: substantive
and procedural.

c. Private property shall not be taken for public use without just compensation. (Art. III, sec. 9)
 The constitution protects not only ownership but also possession, enjoyment, use and
disposition of private property by their rightful owner’s subject to such limitations
imposed by law. In this regards, private property to be taken by the government in its
exercise of the power of the eminent domain must satisfy two important conditions;
Public use and Just compensation.

d. The right of the people to be secure in their persons, houses, papers, and effects against
unreasonable searcher and seizures of whatever nature and for any purpose shall be inviolable,
an no search warrant or warrant of arrest shall be issued except upon examination under oath or
affirmation of the complainant and the witnesses he may produce, and particularly describing
the place to be searched and the persons or tings to be seized. (Art. III, sec. 2)

3. Statutory Authority
a. Private security agency law (RA 5487)
 June 21, 1969)
b. The labor code of the Philippines (PD 442)
3
c. Amending certain sections of republic act numbered fifty-four hundred eighty-
seven otherwise known as, "The private security agency law." (PD 19)
 October 3, 1972
d. Department Order no. 150-16 (DOLE)
e. Amending further republic act numbered fifty four hundred eighty seven otherwise
known as “the private security agency law” (PD 1919)
 April 28 1984

 Necessity of Security
 Security measures are in evitable or necessary for the attainment of the goals and
objectives of a certain individual, group or organization. It follows that when an individual
or organization is exposed to hazards, their productivity is adversely affected.
 The role of the PNP and other Government Law Enforcement Agencies -
 Industrial security is an indispensable part of the Philippine Economy because it serves
as a partner of Law Enforcement Agencies in the country such as the PNP. With its
doubtless significance, the PNP takes responsibilities in the supervision, control, and
training and operations of security agencies and in the issuance of license to operate
and the license to practice the security profession. In addition, the PNP and other
government law enforcement agencies serve as the immediate law enforcement agency
which assist the security guards and security agencies in the performance of their
security function such as accepting and processing crime reports submitted by the
Private Security Agency.

COMMON TYPES OF SECURITY


1. Industrial Security
 a type of security applied to business groups engaged in the industries like manufacturing,
assembling, research and development, processing, warehousing and even agriculture.
2. Hotel Security
 a type of security applied to hotels where its properties are protected from pilferage, loss,
damage and the function in the hotel restaurants are not disturbed and troubled by outsiders
or the guest themselves. This type of security employs house detectives, uniform guards
and supervisor and ensures that hotel guests and their personal effects are safeguarded.
3. Bank Security
 a type of security concerned with bank operations. Its main objective is the protection of
bank cask and assets, its personnel and clientele. Security personnel are trained to safeguard
bank and assets wile in storage, in transit and during transactions.
4. VIP Security
 a type of security applied for the protection of top-ranking officials of the government or
private entity, visiting persons of illustration standing and foreign dignitaries.
5. School Security
 a type of security that is concerned with the protection of students, faculty members, and
school properties. Security personnel are trained to protect the school properly from theft,
vandals, handling campus riots and detecting the use of intoxicated drugs and alcohol by
the students.
6. Supermarket and Mall Security
 a type of security which is concerned with the protection of the stores, warehouses, storage,
its immediate premises and properties as well as the supermarket personnel and costumers.
Security personnel are trained to detect shoplifter, robbery and bomb detection and
customer relation.
7. Operational Security
 This involves the protection of process, formula and patents, industrial and manufacturing
activities from espionage, infiltration, loss, compromise or photocopying.
8. Communication Security

4
 The protection resulting from the application of various measures which prevents or delay
the enemy or unauthorized person in gaining information through communication. This
includes transmission, cryptographic and physical security.

Research Work
 Other types of Security

THREE MAJOR DIVISIONS OF SECURITY


1. Physical Security
 a part of security concerned with the physical measures designed to safeguard personnel
and to prevent unauthorized access to equipment, facilities, materials and the documents
and to protects them from espionage, sabotage, damages or theft. This is the broadest type
of security.
2. Document Security or Information Security
 Protection of documents, classified papers and vital record, from loss, access to
unauthorized persons, damages, theft and compromise through proper storage and
procedures.
3. Personnel Security
 This is as important as physical security. Personnel security starts even before hiring of an
employee and remains to be maintained for as long as the person employed. Its purpose is
to ensure that a firm hires those best suited to assist the firm achieving its goals and
objectives and once hired assist in providing necessary security to the work force while
carrying out their functions.

BASIC PRINCIPLES OF SECURITY


1. Command Responsibility
 Cannot be delegated but the security tasks can be assigned.
2. Compartmentation
 Need to know basis.
3. Balance between security and efficiency
 Security prevails over efficiency.
4. General principles of security remain constant
 Specific measures to suit operations.
5. Security is the concern of all personnel
 Regardless of rank, position, designation

TYPES OF SECURITY MEASURES FOR AN EFFECTIVE


DEFENSE AGAINST CRIMES:
1. ACTIVE MEASURES
 these involve the installation of physical barriers, security lighting, use of vaults, locks and
others.

2. PASSIVE MEASURES
 those that will deter man from committing such act of fear of being caught,charge in court
or get dismissed, such as: security education, programs, investigations, seminars,personnel
security check
Passive Security Measures
 Security education programs, investigation, fire prevention seminars,
personal security checks.

Factors that Bring About Unsecured Conditions


1. Threats
 an activity that could lead to a loss.
2. Hazards
5
 a condition that could lead to a loss.
3. Vulnerability
 a weakness that can be used to gain access to an asset.
4. Risk
 a potential loss or damage to an asset.

Factors to be considered in providing the kind and degree of security


1. Relative Criticality
 the importance of the product or services that the company is giving or producing.
2. Relative Vulnerability
 how susceptible the establishment for the particular sabotage, espionage, etc.

Factors to be considered in providing security for the establishment


1. Size, shape and location
2. Number and character of people
3. Kind of product

Espionage
 an act of gathering information
Espion
 French word- which means spy
 This is used to estimate or determine the best possible means of sabotage.
Spy
 is the agent of Espionage.
 They are very dangerous because of their skill in deception and undercover works.

Methods used by the Agents of Espionage


1. Stealing or buying information from the employees.
2. By using various form of threats or extorting information’s.
3. By means of blackmail.
4. Obtaining or gaining information from social gathering.
5. By the use of fake organization as a front.
6. Stealing records or documents.
7. By means of subversive activities.

Sabotage
 is an act of destroying, damaging or any evil motives that will lead to stoppage of the
normal operation of the company, factory, plant and or establishment.
Sabot
 French word that means Wooden Slipper.
Saboteur
 is the agent of sabotage.

3 types of Saboteur
1. Enemy agent
2. Traitorous person
3. Irresponsible person

Types of Sabotage
1. Mechanical Sabotage
2. Psychological Sabotage

Mechanical Sabotage
 is an act wherein they used the object or substance within the area of an establishment.
6
Types of Mechanical Sabotage
1. Contamination
 is a type where they used foreign materials to apply in the establishment.
2. Breakage
 destroying the vital parts of a machine.
3. Substitution
 Substitution or changing of formula to another, which will cause damage or
destructions.
4. Omission
 this is committed by means of a doing by an individual, which can cause destruction
inside of the company or establishment.
5. Abrasive
 a special type of contamination, by using a type of material that will grind metals.

Explosives
 substances that are easily exploded by means of heat, friction, jarring or sparks. They are
highly dangerous because of its damaging effect.

Reasons Why Explosives becomes popular to the Saboteurs;


1. Because of devastating or damaging effect.
2. Because of the availability of delaying devices/detonator.
3. Evidence will disappear and very hard to find.

TYPES OF EXPLOSIVES
According to their sensitivity
1. Low Intensity Explosives
 It is very sensitive to heat. It can be exploded by means of fire, friction or spark.
2. High Intensity Explosives
 is detonated by means of shock, jarring or shake. These are from liquid.

Types of High Intensity Explosives


a. Dynamite
 from liquid it is manufactured and usually homemade and popularly used by
illegal fisherman and miners.
b. TNT (Trinitrotoluene) – popular in the military.
c. Plastic Explosives
d. Molotov Bomb
e. Stench Bomb
 Chemical that is carried out by the racketeers and with disagreeable odor.

Types of Stench Bomb


a. Zinc Valerate
 mix with alcohol, ether or warm water and place it in a vial or bottle. (White
Powder)
b. Valeriana Acid
 white crystal – Valeriana Officinales
c. Butyric Acid
 double fermentation of sugar and milk.
d. Hydrogen Sulfide
 it has a rotten eggs, or rotten fish smell or odor.

Pilferage
 Petty theft
7
 one of the most annoying and common human hazard
 These activity must be immediately put in control

Types of pilferage
1. Casual pilferage
 one who steal due to inability to resist the unexpected opportunity or has little fear that
there is detection.
 for souvenir
2. Systematic pilferage
 one who steal with preconceived plan and take away things for all types of goods,
supplies or merchandise.
 for economic gain

Pilferer
 a thief who steals without using violence. sneak thief, snitcher. stealer, thief - a
criminal who takes property belonging to someone else with the intention of keeping it
or selling it. wharf rat - someone who lives near wharves and lives by pilfering from
ships or warehouses.
Methods used:
1. Classic method
2. Uses fake documents
3. Removal of items
4. Disposal of the same

Limiting factors of pilferage


a. Value of the item- very expensive
b. Ease of concealment – easy to cover
c. Transportation

KLEPTOMANIAC
 The person who is fond of getting the property of other people.
 there is satisfaction on the part of the person committing a crime.
Theft
 is committed by any person who with intent to gain but without violence against or
intimidation of persons nor force upon things shall take personal property of another
without the latter’s consent.
Simple theft
 without violation of trust and confidence
Qualified Theft
 taking the property of another with violation of trust and confidence;
 Example: maid, houseboy, salesgirl, or employees or any person that the victim has trusted.

Shoplifter
 is those people or somebody who gets the things or property displayed in the store
without payment.

CHAPTER 2
PHYSICAL SECURITY
 Physical security measures help to combat the crime-related threats that both employees and
outsiders pose to the organization.
 If measures are properly planned, most potential intruders, whether employees or outsiders,
should see that the risks of detection and punishment for attempting to penetrate a protected area
are significantly greater than whatever they may gain.

8
 security measures that are designed to deny unauthorized access to facilities, equipment and
resources and to protect personnel and property from damage or harm (such as espionage, theft,
or terrorist attacks).
 Physical security involves the use of multiple layers of interdependent systems that can include
CCTV surveillance, security guards, protective barriers, locks, access control, perimeter
intrusion detection, deterrent systems, fire protection, and other systems designed to protect
persons and property.

Physical security systems for protected facilities are generally intended to:
1. deter potential intruders (e.g. warning signs, security lighting and perimeter markings);
2. detect intrusions and monitor/record intruders (e.g. intruder alarms and CCTV systems); and
3. trigger appropriate incident responses (e.g. by security guards and police).

 It is up to security designers, architects and analysts to balance security controls against risks,
taking into account the costs of specifying, developing, testing, implementing, using, managing,
monitoring and maintaining the controls, along with broader issues such as aesthetics, human
rights, health and safety, and societal norms or conventions. Physical access security measures
that are appropriate for a high security prison or a military site may be inappropriate in an
office, a home or a vehicle, although the principles are similar.

PRINCIPLES OF PHYSICAL SECURITY


1. The type of access necessary will depend upon a number of variable factors and therefor may
be achieved in a number of ways.
2. There is no impenetrable barrier.
3. Defense in-depth is barrier after barriers.
4. Delay is provided against surreptitious and non-surreptitious entry.
5. Each installation is different.

ELEMENTS AND DESIGNS OF PHYSICAL SECURITY


1. Protective Barriers
2. Natural Surveillance
3. Protective Lighting/Security Lighting
4. Video surveillance
5. Access control
PROTECTIVE BARRIERS

BARRIER
 Any physical structure whether natural or man-made capable of restricting, deterring,
delaying or preventing illegal and unauthorized access to an installation

PURPOSES OF BARRIERS
1. Define the physical limits of an area.
2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of guards.
5. Facilitate and improve the control of vehicular traffic.

TYPES OF PHYSICAL BARRIERS


1. Natural Barrier
 Geographical features
2. Structural Barrier
 These are features constructed by man regardless of their original intent that tends to
delay the intruder. Examples are fence, walls, grills, doors, roadblocks, screens, or any
other construction that will serve as a deterrent to unauthorized entry.
9
3. Human Barriers
 persons being used in providing a guarding system or by the nature of their
employment and location, fulfill security functions. Examples are security guards and
employees of the establishment.
4. Animal Barrier
 Animals are used in partial providing a guarding system.
5. Energy Barrier
 It is the employment of mechanical, electrical, electronic energy imposes a deterrent to
entry by the potential intruder or to provide warning to guard personnel. Examples are
protective lighting, alarm system and any electronic devices used as barriers.

THREE LINE OF PHYSICAL DEFENSE


1. First line of defense
 perimeter fences or barriers.
2. Second line of defense (Building Exterior)
 doors, floors, windows, wall, roofs and grills and other entries to the buildings.

Building Exterior - Components:


1. walls
2. Doors
3. Windows
4. Roof Openings
5. Fire Escapes
6. Protective Alarm Systems
7. Protective and Emergency lightnings
8. CCTV Cameras and other Electronic Security Systems/Energy Barriers

3. Third line of defense (Interior Controls)


 Storage system like steel cabinets, safes, vaults and inferior files.

Interior Controls - Components:


1. ID Systems
2. Protective Alarm Systems
3. Protective Emergency Lighting's
4. Communication Systems
5. CCTV Cameras and other Electronic Security Systems/Energy Barriers
6. Restricted Areas (storage areas/utilities)
7. Access Control
8. Key Control
9. Emergency Plans
10.Guards

PERIMETER BARRIER
 A medium or structure which defines the physical limits of an installation or an area to
restrict or impede access thereto. It refers to any physical barrier used to supplement the
protection of an inside perimeter. The main purpose is to deny or impede access or exit of
unauthorized person. Basically, it is the first line of defense of an installation. This may be
in the form of fences, building walls or even bodies of water. The function and location of
the facility itself usually determine the perimeter of the installation.

INSIDE PERIMETER
 A line of protection adjacent to protected area and passing through points of possible entry
into the area such as doors, windows, skylights or other points of access.

10
OUTSIDE PERIMETER
 A line of protection surrounding but somewhat removed from a protected area such as
fence.

PURPOSES OF PERIMETER BARRIER


1. Controlling vehicular and pedestrian traffic flow.
2. Checking identification of personnel entering or departing.
3. Defining the buffer zone for more highly classified areas.
4. Outline the perimeter of the area secured.
5. Great physical and psychological deterrent to unauthorized entry.
6. Delay intrusion, thus facilitating apprehension of intruders.

LAYERS OF SECURITY
1. Perimeter Control
 Security barriers, checkpoints at the outermost layer to anticipate/identify hostile
elements at the vicinity of the communication facility.
2. Area Access control
 Control measures undertaken to prevent entry of unauthorized person inside the
premises of communication security.
3. Control of operation area
 Final measures undertaken prior to the entry into an operating room.
4. Control of Communication Area
 Final security measures undertaken prior to the entry into a communication area.

TYPES OF PERIMETER BARRIER


1. Fence
2. Walls
3. Bodies of Water

FENCES
 a structure that encloses an area, typically outdoors, and is usually constructed from posts
that are connected by boards, wire, rails or netting. A fence differs from a wall in not
having a solid foundation along its whole length. Alternatives to fencing include a ditch
(sometimes filled with water, forming a moat).

TYPES OF FENCES
a. Solid Fences
 It denies visual access to the fencing. It also denies the opportunity for the
intruder to become familiar with the personnel, activities and the time
scheduled of the movements of the guards in the installation.

 Advantages of solid fence


1. Denies visual access of the installation of the intruder.
2. Denies the opportunity for the intruder to become familiar with the
personnel,activities and the time schedule of the movements of guards
in the installations.

 Disadvantages of solid fence


1. It prevents the guards from observing the area around the
installation.
2. It creates shadows which may be used by the intruder for cover and
concealment.

b. Full-view Fences
11
 It permits visual access to the area. It allows the roving patrols and stationary
guard to keep the surrounding area of the installation under observation.
However, it allows intruder to become familiar with the movements and time
schedule of the guard patrols thereby allowing him to pick the time that is
advantageous on his part.

KINDS OF FULL-VIEW FENCE


a. Chain-link
 It must be constructed of 7 feet material excluding the top guard. It must be of
9 gauges or heavier. The mesh openings are not to be longer than 2 inches per
side. It should be twisted and barbed selvage at top and bottom. It must be
securely fastened to rigid metal or reinforced concrete. It must reach within 2
inches of hard group paving. On soft ground, it must reach below surface deep
enough to compensate for shifting soil or sand.
b. Barbed wire
 Standard barbed wire is twisted, double-strand, 12-gauge wire with 4-point
barbs spaces in an equal distance apart. It should not be less than 7 feet high
excluding the top guard. It must be firmly affixed to posts not more than 6 feet
apart. The distance between strands must not exceed 6 inches at least one wire
will be interlaced vertically and midway between posts.
c. Concertina wire
 Standard concertina barbed wire is commercially manufactured wire coil of
high strength steel barbed wire clipped together at intervals to from a cylinder.
Opened concertina wire is 50 feet long and 3 feet in diameter.

 Advantages of a full view fence


1. moving patrols and stationary guards are able to keep area surrounding
of the installation under observation.
2. it does not create shadows which would provide cover and concealment
for the intruder.

 Disadvantages of a full view fence


1. It allows visual access to the installation,its personnel,its guard and its
activities.
2. It allows the intruders to become familiar with the movements and the
time schedule of the guard patrols thereafter allowing him to pick the time
for attempting penetration which would most advantageous to the
intruder.

MINIMUM ACCEPTABLE REQUIREMENTS FOR FENCE USED AS SECURITY


BARRIERS
1. Height
 8 feet at a minimum.
2. Slack at the bottom
 not to exceed 2 inches.If the fences are not tight then it should extend even closer to the
ground.
3. Wooden fence post
 minimum horizontal dimension of 4X4 inches.
4. Steel fence post
 the round type should at least be 2 inches at the smallest diameter.
5. Fence post
 should be set in concrete or in firm soil using commercial drive anchors to a depth of 3
feet and the maximum distance post is 10 feet.
6. Fence top (Top Guard)
12
 there should be something on the top of the fence to deter persons attempting to go
over fence.ex.use of barb wire overhang.The arms holding the barbwire should be
extended at 45 degree angle in the direction of the expected approach.
7. Fence area
 it should be declared trees and vegetation and debris of other materials which would
offer concealment of the intruder or would aid him in scaling the fence.
8. Fence Gates
 gates should be limited to the no. necessary for efficient and sage operation of the
installation.
9. Fence Opening
 all opening in the fence in excess of 96 inches must be locked barbed or screen in such
a way that they may be interlocked and opened from the inside and only by selected
personnel.
10. Multiple fence
 is used should at least be 10 feet apart and the overhang on the top of the inner fence
should point inward.
WALLS
 Walls, floors, roofs or their combination serve also as barriers and they should be of such
construction to provide uniform protection just like the wire fencing.
 Masonry walls as perimeter barrier should have the same height as the chain-link and
surmounted by the barbed wire top guard; if the height of the masonry is less than
prescribed, additional chain-link should be placed as “topping”.
 Walls can be made of stone slabs like hollow blocks bound by concrete with post at regular
intervals to prevent the walls from toppling wind or scouring facilities, security must sit
down with design engineers so that the area where sensitive activity will be done should be
given special emphasis in protective walls.

SPECIFICATIONS FOR INSTALLATION OF WINDOWS


1. Window should be protected with grill, wire, heavy screening or chain-link fencing. In cases
where caution dictates, they may be needed as emergency exits beyond strut requirement of fire law,
consideration should be given to hinging and padlocking with protective coverings.
2. It can also be permanent to screen window to protect against their use as a means by which
employees can temporarily dispose goods for later recovery. The smallest goods being manufactured
or available on the premises, the smaller the mesh in the screen must be to protect against all kind of
pilferage.
3. Any window less than 18 feet from the ground or less than 14 feet from trees, poles or adjoining
buildings should receive same protective treatment such as iron grills or screens.

SPECIFICATION FOR INSTALLATION OF DOORS


1. Door hinges should be installed with the screws concealed and with the hinge pins either welded
or flanged to prevent removal.
2. Door must be or heavy construction, hung in a form sufficiency strong to avoid prying.
3. Hinges must be either located within the door-way or screws or bolts must be set in such a way
that they cannot be removed.
4. If doors contain glass panels they should be protected by grills or screens.
5. It is essential that the jamb be of a strong construction as the door or the lock.
6. The locking bolt must be at least an inch into the jamb for security and to help prevent spreading.
7. Cylinder should be flush or inset to prevent their being wrenched out or popped.

BODIES OF WATER
 like river, lakes, march cataract, sea pond or any other bodies of water forming a part of the
wall, building or fencing should never be considered adequate natural perimeter barrier.
 Additional security measures like wire fence, concrete walling, security patrolling and
floodlighting at night may be necessary for the portions of the perimeter.
13
Types of Perimeter Barrier Openings
1. Gate and Doors
 when not in active use and controlled by guard, gates and doors in the perimeter should
be locked and frequently inspected by the guards. Locks should be changed from time
to time.
2. Sidewalk Elevator
 These provide access to areas within the perimeter barrier and should be locked or
guarded.
3. Utilities Openings
 like sewers, air tanks and exhaust channels which penetrate the barrier and which have
cross sectional areas of 96 square inches or more should be protected by bars, grills,
water filled traps or other structural means providing equivalent protection to that
portion of the perimeter barriers.
4. Clear Zone
 unobstructed area should or a “clear zone” should be maintained on both side of the
perimeter barrier.

Additional Protective Measures


1. Top Guard
 additional overhang of barbed wire placed on vertical perimeter fences upward and
outward with a 45-degree angle with 3 to 4 strands of barbed wires spaced 6 inches
apart. This increase the protective height and prevents easy access.
2. Guard and Control Station
 This is normally provided at main perimeter entrances to secure areas located out-of-
doors and manned by guards on full-time basis. Sentry station should be near a
perimeter for surveillance at the entrance.
3. Tower Guard
 This is a house-like structure above the perimeter barriers. The higher the tower, the
more visibility it provides. It gives a psychological unswerving effect to violators. By
and large guard towers, whether permanent or temporary, must have a corresponding
support force in the event of need. Towers as well as guard control stations should have
telephones, intercoms, and if possible, two-way radios connected to security
headquarters or office to call for reserves.
4. Barrier Maintenance
 Fencing barriers and protective walls should be regularly inspected by security. Any
sign of attempts to break in should be reported for investigation. Destruction of fence
or sections thereof should be repaired immediately and guard vigilance should be
increased.
5. Protection in Depth
 in large open areas or ground where fencing or walling is impractical and expensive,
warning signs should be conspicuously placed. The depth itself is protection reduction
of access roads, and sufficient notices to warn intruders should be done. Use of animals
as guards and intrusion device can also be good as barriers.
6. Sign and notices
 “Control Signs” should be erected where necessary in the management of unauthorized
ingress to preclude accidental entry. Signs should be plainly visible and legible from
any approach and in an understood language or dialect.

PROTECTIVE LIGHTING
Protective lighting provides a means of continuing, during hours of darkness, a degree of
protection approaching that maintained during daylight hours. This safeguard also has considerable
value as a deterrent to thieves and vandals and may make the job of the saboteur more difficult. It is
an essential element of an integrated physical security program. Depending on the nature of the
14
facility, protective lighting is designed to emphasize the illumination of the perimeter. In the case, it
must produce sufficient light to create a psychological deterrent to intrusion as well as to make
detection virtually certain in the event an entry is made. It must avoid glared that would reduce the
visibility of security personnel, while creating glared to detect intruder. This is particularly
important where the facility is within streets, highways or navigable waterways. The system must be
reliable and designed with overlapping illumination to avoid creating unprotected are in the event of
individual light failure. It must be easy to maintain and it must secure itself against attack. Poles
should be within the barrier power lines and the switch box must be protected. It is the single most
cost-effective deterrent to crime because it creates a psychological deterrent to intruders.
Security lighting is another effective form of deterrence. Intruders are less likely to enter
well-lit areas for fear of being seen. Doors, gates, and other entrances, in particular, should be well
lit to allow close observation of people entering and exiting. When lighting the grounds of a facility,
widely distributed low-intensity lighting is generally superior to small patches of high-intensity
lighting, because the latter can have a tendency to create blind spots for security personnel and
CCTV cameras. It is important to place lighting in a manner that makes it difficult to tamper with
(e.g. suspending lights from tall poles), and to ensure that there is a backup power supply so that
security lights will not go out if the electricity is cut off.

PURPOSES OF PROTECTIVE LIGHTING


a. It provides sufficient illumination to the areas during hours of darkness.
b. Lighting can help improve visible so that intruder can be seen and identified and, if possible,
apprehended.
c. It serves as deterrent to would be thieves.

GENERAL CONSIDERATION IN PROTECTIVE LIGHTING


1. Lighting needs must be dependent upon threat, perimeter extremities, surveillance
capabilities and available guard force.
2. Designed to discourage unauthorized entry and facilitate detection of intruders.
3. It must continuously operate during period of reduced visibility and that standby lighting is
maintained.
4. Cleaning and replacement of lamps and luminaries, particularly with respect to costs and
means required and available.
5. Weather condition
6. Fluctuating or erratic voltages in the primary power sources.
7. Requirements for grounding of fixtures and the use of common ground on an entire line to
provide a stable ground potential.

PRINCIPLES OF PROTECTIVE LIGHTING


1. Good protective lighting is achieved by adequate, even light upon bordering areas, glaring
lights in the eyes of the intruder, and relatively little light on security patrol routes. In addition
to seeing long distances, security forces must be able to see low contrasts, such as indistinct
outline or silhouettes and must be able to spot an intruder who may be exposed to view for only
a few seconds. Higher levels of brightness improve all of these abilities.

2. In planning protective lighting, high brightness contrast between intruder and background
should be the first consideration. With predominantly dark dirty surfaces or camouflage type
painted surfaces, more light is needed to produce the same brightness around installations and
buildings than when clean concrete, light brick and grass predominate. When the same amount
of light falls on an object and its background, the observer must depend on contrasts is
significantly improved by increasing the level of illumination.

3. When the intruder is darker than his background, the observer sees primarily the outline or
silhouette. Intruders who depend on dark clothing and even darkened face and hands may be
foiled by using light finishes on the lower parts of buildings and structures. Stripes on walls
15
have also been used effectively, as they provide recognizable breaks the installation, against
which intruders can be seen, can also create good observation conditions.

4. Two basic systems or a combination of both may be used to provide practical and effective
protective lighting. The first method is to light the boundaries and approaches. The second is to
light the area and structures within the general boundaries of the property.

TYPES OF PROTECTIVE LIGHTING


1. Stationary Luminary Lighting
 This is common type consisting of a series of fixed luminaries to continuously flood a given
area.
Kinds of Stationary Luminary Lighting
a. Glare Projection Type
 the intensity is focused to the intruder while the observer or guard remained in
the comparative darkness.
 The lighting is toward the entrance to an installation.
 The glare projection method is useful where the glare of lights directed across
surrounding territory will not be annoying nor interfere with the adjacent
operations. It is a strong deterrent to a potential intruder because it makes it
difficult for him to see the inside of the area. It also protects the guard by
keeping him in comparative darkness and enabling him to observe intruders at
considerable distance beyond the perimeter.
b. Controlled lighting
 The lighting is focused on the pile of items rather than the background.
 The width of the lighted strip can be controlled and adjusted to suit the
security needs.
 Controlled lighting is best when it’s necessary to limit the width of the lighted
strip outside the perimeter because of adjoining property or nearby highways,
railroads, navigable water, or airports.
 In controlled lighting, the width of the lighted strip can be controlled and
adjusted to fit the particular need, such as illumination of a wide strip inside a
fence and a narrow strip outside; or floodlighting a wall or roof.
 This method of lighting often illuminates or silhouettes security personnel as
they patrol their routes.
2. Standby lighting
 This system is similar to continuously lighting but it is turned on manually or by a special
device or other automatic means.
3. Movable lighting
 This consists of stationary and portable manually operated searchlights. The searchlights
may be lighted continuously during the hours of darkness or only as needed. And are
usually supplementary to other types of search lighting.
4. Emergency Lighting
 This type may be duplicative of existing systems. This is at stand by, which can be utilized
in the event of electronic failure, either due to local equipment or commercial power failure.

GENERAL TYPES OF LIGHTING SOURCES


1. Incandescent Lamp
 It is the least expensive in terms of energy consumed and has the advantage of
providing instant illumination when the switch is on.
2. Mercury Vapor Lamp

16
 It is considered more efficient than the incandescent and used widespread in exterior
lighting. This emits a purplish-white color, caused by an electric current passing
through a tube of conducting and luminous gas.
3. Metal Halide
 It has similar physical appearance to mercury vapor but provides a light source of
higher luminous efficiency and better color rendition.
4. Fluorescent
 This provides good color rendition high lamp efficiency as well as long life. However,
it cannot project light over long distance and thus, are not desirable as flood type lights.
5. High-pressure Sodium Vapor
 This has gained acceptance for exterior lighting of parking areas, roadways, buildings
and commercial interior installation. Constructed on the same principle as mercury
vapor lamps, they emit a golden to light pink color and this provide high lumen
efficiency and relatively good color rendition.

Other Types of Lighting Sources


1. Gaseous-Discharge Lamp
 The use of gaseous discharge lamps in protective lighting is somewhat limited since
they require a period from two (2) to five (5) minutes to light when they are cold and
even longer to relight when hot or after a power interruption. This is very economical
to use but for industrial security, it is not acceptable due to long time in the lighting in
case it is turned off by accident or by low voltage or brown-out.
2. Quartz Lamp
 This lamp emits a very bright white and snap on almost as rapidly as the incandescent
lamp. They are frequently used at very high voltage and they are excellent for use
along the perimeter barrier and in troublesome areas.

Types of Lighting Equipment


1. Floodlights
 These can be used to accommodate most outdoor security lighting needs, including the
illumination of boundaries, fences and buildings and for the emphasis of vital areas or
particular buildings.
 These are wide beam nits, primarily used to extend the illumination in long, horizontal
strips to protect the approaches to the perimeter barrier. Floodlights are most
commonly found in outdoor areas like parks or stadiums where there is a need for good
bright over a large area.
 Most sports are played under floodlights and even if you are having party outdoors you
need to install at least one of these.
 Floodlights are also used in security to light up the outside of commercial
establishments and parking lots and to bring out something against the background of
the sky, like a statue or even part of a building. In homes flood lights are mostly used
as a security measure because one single light will be more effective than a number of
ordinary lights.
2. Street Lights
 This lighting equipment received the most widespread notoriety for its value in
reducing crime. This produce diffused rather than directional beam. They are widely
used in parking areas.
3. Search Lights
 These are highly focused incandescent lamp and are designed to pinpoint potential
trouble spots.
4. Fresnel Lights
 These are wide beam units, primarily used to extend the illumination in long,
horizontal strips to protect the approaches to the perimeter barrier. Fresnel projects a

17
narrow, horizontal beam that is approximately 180 degrees in the horizontal and from
15 to 30 degrees in the vertical plane.

Areas to be Lighted
1. Vehicular gate
 Normally by guards inspecting credentials, as well as inspecting for contraband or
stolen property, it is critical that the area to be lighted to at least one foot-candle.
2. Pedestrian gate
 should be lighted about 25 feet on either side of the gate, if possible and the range for
vehicular gates should be twice that of street lighting is recommended in these
applications but flood lights can also be sued if glare is strictly controlled.
3. Thoroughfare
 used for pedestrians, vehicles or forklifts should be lighted to 0.01 foot-candles for
security purpose.
4. Parking area
5. Sensitive areas
 this includes vital buildings, storage depots, and vulnerable control points in
communication, power, light and water distribution systems.

Lighting Maintenance
 Periodic checks should be made on all electrical circuits. Luminaries should be cleaned
and replacement should be made as soon as possible. When eighty percent of their life
is used in sensitive areas, replacement should be made and the bulbs are used in less
sensitive locations. To do this, strict recording is necessary.

PROTECTIVE ALARMS
Another safeguard used to assist security to competent if not to supplement physical security
is an array of alarms. These alarms of various types and cost can be installed indoors or outdoors.
Basically, alarm systems are designed to alert security personnel to consummated or attempted
intrusion into an area, building or compound. Each type of alarm is activated in the event that an
intruder tampers the circuity, a beam or radiated waves. In short, intrusion alarms can be electrical,
mechanical or electronic.
Alarm systems can be installed to alert security personnel when unauthorized access is
attempted. Alarm systems work in tandem with physical barriers, mechanical systems, and security
guards, serving to trigger a response when these other forms of security have been breached. They
consist of sensors including perimeter sensors, motion sensors, contact sensors, and glass break
detectors.
However, alarms are only useful if there is a prompt response when they are triggered. In the
reconnaissance phase prior to an actual attack, some intruders will test the response time of security
personnel to a deliberately tripped alarm system. By measuring the length of time it takes for a
security team to arrive (if they arrive at all), the attacker can determine if an attack could succeed
before authorities arrive to neutralize the threat. Loud audible alarms can also act as a psychological
deterrent, by notifying intruders that their presence has been detected. In some jurisdictions, law
enforcement will not respond to alarms from intrusion detection systems unless the activation has
been verified by an eyewitness or video. Policies like this one have been created to combat the 94–
99 percent rate of false alarm activation in the United States.

DEFINITIONS OF TERMS
1. Actuator
 the button, magnetic switch or thermostat that will cause system to alarm.
2. Annunciator
 this is the monitor. Technically, it is the visual or audible signaling device that
indicates conditions of the associated circuits.
3. Capacitance
18
 the property of two or more objects which enables them to store electrical energy in an
electroscopic field between them.
4. Capacitance Proximity Sensor
 records a change in capacitance or electrostatic fields to detect attempted penetration
into safer or storage cabinets.
5. Conductor
 material which transmit electric current; examples are wire and cable.
6. Control unit
 the terminal box for all sensors.
7. Fail-Safe
 a term applied to a system designed so that if a component fails to function properly,
the system will signal or otherwise indicate its capacity.
8. False alarm
 Activation of sensors for which no cause can be determined,
9. Intrusion Detection System
 the combination of components including sensors, control units, transmission lines and
monitor units integrated to operate in a specific manner.
10. Intrusion detection Sensors
 devices that initiate alarm signals by sensing the stimulus, change or condition for
which designed.
11. Local Audible Alarm
 an electric bell for outdoor use in the vicinity of the protected area.
12. Microwave Sensor
 a radio or radar frequency (RF) transceiver having a frequency range of GHy(billion
cycles per second) which detect motion.
13. Monitor
 a device that senses and reports in the condition of a system.
14. Monitor Sensor
 detects movement inside the area to be protected.
15. Passive Ultrasonic Sensor
 detects the sounds of forced entry throughout walls, ceiling and doors.
16. Penetration Sensor
 detects entry through doors, windows, wall or any other openings into the protected
area.
17. Photoelectric System
 consist of 2 separate units; (a) transmitter, (b) receiver. An interruption of light beam
transmitted to the receiver causes alarm.
18. Ultrasonic
 the frequency range of sound that is above the capabilities of normal human hearing. In
intrusion detection systems, it usually varies between 21,500 and 26,000 Hy (cycles per
second)
19. Ultrasonic Motion Sensor
 detect the frequency systems, it usually shifts the motion of an intruder inside the
protected area.
20. Vibration Sensor
 detects forced entry through metal barriers placed over windows and ventilators or
attempts to drill saw or cut through walls, ceilings, floors, or doors.

TYPES OF ALARM SYSTEM


1. Metallic Foil or Wire
 in building or compound, all point of entry can be wired by using electrically charges
strips of tinfoil wire. Any actions that will move the foil or wire break the circuit and
activate an alarm. Metallic foil or wire is used in window or glass surfaces. Doors and

19
windows can be equipped with magnetic or spring activated contacts, which will sound
an alarm when the door or window is opened.
2. Photoelectric or Electric Eye Device
 a light beam is transmitted at a frequency of several thousand per second. It is
connected by a wire to a control station and when an intruder crosses the beam, he
makes contact with the photo electronic coil which thus activates the alarm.
3. Audio Detection Device
 Supersensitive microphone speaker sensor is installed in walls; ceiling and floors of the
protected area of any sound caused by attempted forced entry inspected by the sensor.
4. Vibration Detection Device
 the vibration sensitive sensor is attached to walls, ceiling or floors of the protected
areas. The sensor detects any vibration caused by attempted forced entry.
5. Microwave Motion Detection Device
 a pattern of radio waves is transmitted and partially reflected back to antenna. If they
strike a moving object, they return at a different which result in initiating an alarm
signal. Very effective for protection of interior areas.
6. Foot Rail Authority
 placing the front of their foot to engage the activation bar places foot rail activator on
the floor in such a position that tellers may activate the alarm. Foot rails do not acquire
any obvious use of the teller’s hand and their hands may be kept in full view of the
robbers for reason of safety. Because foot rail can be activated very obtrusively and
safety, it is frequently found in the banks where tellers normally operate while standing
up. The disadvantage with platform shoes, itchy feet or using brooms and other articles
will often in advertently cause a false alarm.
7. Bill Traps
 Bill traps or currency activation devices are usually placed in the teller’s cash drawer
and connected to the alarm system using wire connector. When currency is removed
from the devices, the alarm is activated. The advantage of these devices is that the
robbers frequently remove the currency and activate the alarm. This is particularly
helpful when the employees are immediately forced to leave their station without
having an opportunity to activate the alarm safely.
8. Knee or Thigh Button
 These are installed inside the desk or teller station so they can be activated by knee or
thigh pressure. They are commonly found in location where personnel usually perform
their duties from a seated position.
9. Foot Button
 Like the foot rail permit alarm activation safety while both hands remain clear in view
of the robbers.
10. Double Squeeze Buttons
 Pressure is required on both side of the device and therefore the probability of
accidental alarm is reduced.

TYPES OF PROTECTIVE ALARM DETECTION SYSTEM


1. Central Station System
 A type of protective alarm system where the central station is located outside the
installation. It can be located in an agency and the installation is one of the subscribers.
When alarm is sounded, central station notifies police and another agency. A system n
which the alarm signal is relayed to remote panel located at the facilities of private
owned protection. Service company manned by its personnel.
2. Propriety System
 Centralized monitor of the propriety alarm system is located in the industrial firm itself
with a duty operator. In case of alarm, the duty operator calls whatever is the primary
need; firefighters, police, an ambulance or a bomb disposal unit.
3. Local Alarm System
20
 This system consists of ringing up a visual or audible alarm near the object to be
protected. When the intruder tries to pry a window, the alarm threat goes off.
4. Auxiliary alarm
 company-owned alarm systems with a unit in the nearest police station so that in case
of need, direct call is possible. The company maintains the equipment and lines both
the company and those in the police, fire and emergency agencies by special
arrangement. The auxiliary system can be availed of by radio, landlines or cellphones.
5. Local Alarm-by-Chance System
 This is a local alarm system in which a bell or siren is sounded with no predictable
response. These systems are used in residence or small retail establishments, which
cannot afford a respond system. The hope is that a neighbor or passing will reach to the
alarm and call for the assistance, but such a call is purely a matter of chance.
6. Dial Alarm System
 This system is set to dial a predestined number when the alarm is activated. The
number selected might be the police or the subscriber’s home number, or both. When
the phone is answered, a recording states that an intrusion is in progress at the location
so alarmed. This system is relatively inexpensive to install and operate, but since it is
dependent on general phone circuit, it could fail if line were busy or if the phone
connection were cut.

THREE PARTS OF AN ALARM SYSTEM


1. Sensor or Trigger Device
2. Circuit which carries messages to the signaling apparatus.
3. Signaling system sometimes called as the anunciator.

ALARM
 It is an aural or visual signal given by the annunciator to security when intruder actuates
device in a detected area. An annunciator is a visual or audible signaling device which
initiates conditions of associated circuits.

KINDS OF ALARMS (AUTOMATICALLY ALARMED SYSTEMS)


1. Audio Detection Device
 It will detect any sound caused by attempted force entry. A supersonic microphone
speaker sensor is installed in walls, ceilings and floors of the protected area.
2. Vibration Detection Device
 It will detect any vibration caused by attempted force entry. A vibration sensitive
sensor is attached to walls, ceilings or floors of the protected area.
3. Metallic foil or wire
 It will detect any action that moves that foil or wire. An electrically charge strips of
tinfoil or wire is used in the doors, windows or glass surfaces of the protected area.
4. Laser Beam Alarm
 a laser emitter floods a wall or fencing with a beam so that when this beam, is disturbed
by a physical object, an alarm is activated.
5. Photoelectric or Electric Eye Device
 an invisible/visible beam is emitted and when this is disturbed or when an intruder
break contact with the beam, it will activate the alarm.

Concept of Alarm
 Alarm devices are physical safeguards used to assist security but not a replacement in the
protection sets and lives in the installation. It assists the guards to extend their hearing and
vision even in areas where they are not physically present.
TELECOMMUNICATIONS

21
 Any process which enables a telecommunication to relay and receive voice data, electronic,
messages, written or printed matter, fixed or moving pictures, words, music or visible or
audible signals or any control signals of any design and for any purpose by wire, radio or
other electromagnetic, spectral, optical or technological means.

1. Broadcasting
 An undertaking the object of which is to transmit over-the-air commercial
radio or television messages for reception of a broad audience in a geographic
area.
2. Franchise
 A privilege conferred upon a telecommunications entity by Congress,
authorizing that entity to engage in a certain type of telecommunications
service.

PUBLIC TELECOMMUNICATIONS ENTITY


 Any person, firm, partnership or corporation, government or private, engaged in the
provision of telecommunications services to the public for compensation.

1. Local Exchange Operator


 An entity providing transmission and switching of telecommunications service,
primarily but not limited to voice-to-voice service, in a geographic area anywhere in
the Philippines.
2. Inter-exchange Carrier
 An entity, sometimes referred to as carrier’s carrier or national backbone network
operator, authorized to install, own and operate facilities which connect local
exchanges within the Philippines and to engage in the business of inter-exchange
national long-distance services.
3. International Carrier
 An entity primarily engaged in the business of providing transmission and switching of
any telecommunications service between the Philippines and any other point of the
world to which it has an existing correspondent or prospective interconnection
agreements.
4. Value-added Service Provider (VAS)
 An entity which relying on the transmission, switching and local distribution facilities
of the local exchange and inter-exchange operators and overseas carriers, offers
enhanced services beyond those ordinarily provided for by such carriers.
5. Public Toll Calling Station
 A non-exclusive facility at which the public may, by the payment of appropriate fees,
place as well as receive telephone calls and/or telegrams or other messages.

6. Mobile Radio Telephone System


 A wide are mobile, radio telephone system with its own switch, base stations and
transmission facilities capable of providing high capacity mobile telecommunications
by utilizing radio frequencies.

THREE ESSENTIAL COMPONENT OF COMMUNICATION SECURITY


1. Physical Security
 All measures designed to protect classified communications, equipment and material
from access to unauthorized persons.
2. Transmission Security
 Results from all measure designed to protect transmission from interception traffic
analysis and imitative deception.
3. Cryptography Security

22
 Results from the development of technically sound cryptosystem, their proper use and
application of proper crypto techniques.

PROTECTIVE LOCKS AND KEYS


The best defense against lock picking and making of key by impression is the installation of
special pick-resistant, impression-resistance lock cylinders. Generally speaking, locks are the
cheapest security investment that can be made. Locking device is simply a mechanism that extends
the door or window into a wall that hold them. Therefore, the wall or the door itself is weak or easily
destructible, the lock cannot be effective. It must be recognized that any lock will eventually yield to
attack. They must be thought of only as delaying services. But this delay is of primary importance.
The longer the intruder is stalled in an exposed position while he works to gain entry, the greater the
chances of discovery. Even the highest locking devices are only one part of door and entrance
security locks, cylinders, door and frame construction, and key control are inseparable element; all
must equally be effective. If one element is weak, the system will breakdown.

LOCK
 a mechanical, electrical, hydraulic or electronic device to prevent entry into a building,
room, container or hiding place and to prevent the removal of items without the consent of
the owner.
PETERMAN
 An English term used to describe a lock picker.

TYPES OF LOCKS
1. Key Operated Mechanical Lock
 it uses some sort of arrangement of internal physical barriers (wards tumblers) which
prevent the lock from operating unless they are properly aligned. The key is the device
used to align these internal barriers so that the lock may be operated.
2. Padlock
 a portable and detachable lock having a sliding hasp which passes through a staple ring
or the like and is then made fast or secured.
3. Combination Locks
 are difficult to defeat, since they cannot be picked because few experts can manipulate
the device to discover the combination. Most of these locks have three dials, which
must be aligned in the proper order before the lock will open. Some locks may have
four dials for greater security.
4. Code – Operated Locks
 These are combination-type locks and that no key is used. Pressing the series of
numbered button in the proper sequence opens them. Some of them are equipped to
alarm if wrong sequence is pressed. These are high security locking device.
5. Electrical Lock
 a type of lock that can be opened and closed remotely by electrical means.
6. Card – Operated lock
 a type of lock operated by coded card.

OTHER TYPES OF LOCKS


1. Warded Locks
 Offer very little security. This type of lock must therefore be used only to have privacy
but not to provide a high degree of security. Most warded locks manufactured in the
US are padlocks. Both the padlock and the warded door lock are easily picked.
2. Disc Tumbler Locks
 Designed for the use of automobile industry and are in general used in car doors today.
Because this lock is easy and cheap to be manufactured, its use has expanded to other
23
areas such as desks, files and padlocks. The delay afforded is approximately ten
minutes.
3. Wafer Lock
 Invented in the US in the late 1800’s. Its low manufacturing cost and mass production
capability have led to its widespread use for many different applications; locks for
luggage, showcases, desks, cabinets and some types of padlocks and switch locks.
4. Lever Locks
 are difficult to define in terms of security since they vary greatly in their effectiveness.
They are used in safe deposits boxes and are for all practical purposes, pick-proof. The
least of these locks are used in desks, locker and cabinets and generally less secure than
pin tumbler lock. Lever Locks originated in Europe in the late 1700’s and are still
widely used. In the US, their principal application is in locks for post office letterboxes,
pay telephone coin boxes, safe deposit boxes and several types of padlocks. Lever
locks can provide medium to high resistance to picking.
5. Pin-tumbler Locks
 The standard pin-tumbler lock consists of a cylinder case containing a cylinder plug or
core. Pin-tumbler locks, patented by Linus Yale in the late 1800s, offer more security
than do warded of wafer locks. In their standard form, however, pin-tumbler locks are
also vulnerable to picking and impressioning. Pin-tumbler locks can easily be master-
keyed for tens of thousands of possible combinations. Very complex master-keying
systems can be developed using pin-tumbler locks. The pin-tumbler lock is widely used
in the US in padlocks and door locks, and for special applications.

TYPES OF KEYS
1. Change Key
 a specific key, which operates the lock and has a particular combination of cuts, or
biting, which match the arrangements of the tumblers in the lock.
2. Sub-master Key
 A key that will open all the lock within a particular area or grouping in a particular
facility.
3. Master Key
 A special key that will capable of opening a series of locks.
4. Grand Master Key
 a type of key that will open everything in a system involving two or more master key
groups.

KEY CONTROL
 Once an effective key control has been installed, positive control of all keys must be gained
and maintained. This can be accomplished only if it is in conjunction with the new locking
devices. The following principles can be utilized to maintain effectively key control;
1. A key depository for securing key during non-working should be centrally located,
locked and kept under the supervision of security personnel.
2. Key issued on daily basis, or basis, or this issued for a specific on-time purpose,
should be accounted for daily.
3. Key should be counted and signed for by the security supervisor at the beginning of
each working day.
4. When the key is lost, the circumstances should be investigated and set forth in
writing. In some instances, If the lost key provides access to sensitive area, Locks
should be changed.
5. All keys should be physically inspected periodically to ensure that they have not
been lost through unreported such.
6. Careful record should be kept of such issuance. The list should be reviewed
periodically to determine whether all those authorized should continue to hold such
key.
24
7. Master key should be in minimum. If possible, sub-master key should be used, and
they should be issued only to a limited list of personnel especially selected by the
management.
8. Key should be not marked or should not identify doors of locks they can open. Code
should be made to this effect.
9. Master keys should be marked identifying them as a master key.
10. Keys and locks should be changed at least once in 12 months.
11. Key should be accessible only to those whose official duties require access.
12. Combination to safe locks and padlocks securing containers for classified
information should be changed at least once each twelve (12) months and at earliest
during:
a. Loss or possible compromise.
b. Discharge suspension or reassignment of any person having knowledge of
combination.
c. Receipt of a container with build in combination lock.
d. More frequent rotation of key padlocks may be required in certain instances.
e. In selecting combination numbers, multiples and simple ascending or
descending arithmetical series should be avoided.
f. Records containing combination should be placed in the same security
classification as the highest classification of the material authorized for storage in
the container which the lock secures.
g. Use of keys must be based on the same general concept as applied to safe
combinations.
h. Inventories of key system should be conducted at least annually.
13. When key is issued the ff should be recorded: key number, name of person, his
position, date of issuance, any other relevant data.

Methods Used to Maintain Effective Key Control


1. Key Cabinet
 a well-constructed cabinet will have to be produced. The cabinet will have to be
sufficient size to hold the original key to every lock in the system. It should be locked
at all times.
2. Key records
 Some administrative means must be set up to record code number of the locks and to
whom the keys of a specific locks were issued.
3. Inventories
 periodic account must be made of all duplicates and original keys in the hands of the
employees whom they have been issued.
4. Audits
 in addition to periodic inventories, an unannounced audit should be made of all the key
control records and procedures by a member of the management.
5. Daily Report
 a regular report must be made to the person responsible for the key control from the
personnel department indicating all persons who have left or will be leaving the
department or the company. In the event that a key was issued, steps should be made to
recover the key.
STATUTORY PROHIBITION OF KEY:
ART. 304. Possession of Picklocks or similar tools
 Any person who shall without lawful cause have in possession of picklocks or similar tools
especially to the commission of the crime robbery, shall be punished by arresto mayor in its
maximum period to prison correctional in its minimum period. The same penalty shall be
imposed upon any person who shall make such tool. If the offender is a locksmith, shall
suffer the penalty of prison correctional in its medium and maximum period.

25
ART. 305 FALSE KEY
 The term false key shall be deemed to include;
a. the tool mentioned in the next proceeding articles.
b. genuine keys stolen from the owner.
c. Any key other than those intended by the owner for use in the lock forcibly open by the
offender.

LOCK PICKING
 Is the art of unlocking a lock by analyzing and manipulating the components of the lock
device without the original key. Although lock picking can be associated with the criminal
intent, it is an essential skill for locksmith. Lock picking is the ideal way of opening a lock
without the correct key, while not damaging the lock, allowing it to be rekeyed for later use,
which is especially important with antique locks that would be impossible to replace if
destructive entry methods were used. The move towards combination locks for high
security items such safes was intended to remove the weakest part of the locks: its keyhole.
SOME TYPES OF PICK LOCKS
1. Tension wrench
 often called a torque wrench, is used to apply torque to the plug of a lock; in order to
hold any picked pins in place. Once all pins are picked, the tension wrench is then used
to turn the plug and open the lock. It is typically shaped like a letter “L”, although the
vertical part of the letter is elongated in the comparison to the horizontal part.
2. Feather touch wrench
 are coiled into a spring at the bend in the “L” ; which helps the user apply constant
torque. Some users however, maintain that such wrenches reduce torque control and
the feedback available to the user.
3. Ball Pick
 similar to half diamond pick, except the end of the pick has a circular shape. This pick
is commonly used to open wafer locks.
4. half-diamond pick
 the most basic and common pick, this versatile pick is included in all kits and is mainly
used for picking individual pins, but can also be used for raking and for wafer and disk
locks. The half diamonds are usually o.1 to o.5 inches long. Each of the ends of the
triangular half diamond of this pick can be either steep or shallow in angle, depending
on the need for picking without affecting neighboring pins, or raking as appropriate. A
normal set could compromise around three half diamond picks and a double pick.
5. Hook Pick
 is similar to the half diamond pick but has a hook shaped tip rather than a half diamond
shape. The hook pick is sometimes referred to as a feeler or finger and is not used
raking. This is the most basic pick picking tool and is all that a professional will
usually need if the lock is to be picked in the traditional sense rather than opened by
raking or using a pick gun. A variety of different sized and shaped hooks will be
available in normal set.
6. Rake Pick
 this pick, such as the common snake rake are designed to rake pins rapidly by sliding
the pick past all the pins, repeatedly, in order to bounce the pins until they reach the
shear line. This method requires much less skill than picking pins individually and
generally works well on cheaper locks. When the pins are excited, they bounce all
around the shear line and with the skillful application of a tension tool this is the easiest
way to pick a lock. This is also how beginners start. Advanced rakes are available
which are shaped to mimic various different pin height key positions and are
considerably easier to use than traditional rakes. Such rakes are typically machined
from a template a common key configuration, since not all permutations of pin heights
for adjacent pins are possible given the process by which keys are manufactures.
7. Slagel Pick
26
 The rarely used slagel pick is mainly used for opening electronic locks. It is often made
with small magnetic regions. The Slagel pick is named after James Slagel, a leading
security technician for IBM. The Slagel pick works by selectively pulling internal parts
of the lock to the correct positions.
8. Decoder Pick
 is a key which has been adapted such that the height of its notches can be changed,
either by screwing them into the blade base or by adjusting them from the handle while
the key is in the lock. This will allow not only access to the lock but also a template for
cutting a replacement key.
9. Bump keys
 the simplest way to open the majority of pin locks is to insert a key (or variety of keys)
which have been but so that each peak of the key is equal and has been cut down to the
lowest groove of the key. This key is then struck sharply with a hammer whilst
applying torque, the force of the blow is carried down the length of the key and will
force the top pins only to jump above the shearling leaving the bottoms pins in place.
Some modern high security locks include bumping protection such as a false setting
pins and impact absorbent foam
10. Warded Pick
 also known as skeleton key, used in opening warded locks. Generally made to conform
to a generalized key shape relatively simpler that the actual key used to open lock; this
simpler shape allows for internal manipulations. This style of pick can also be used to
rip the lock. This is where the pick is placed at the back of the lock and then pulled out
in one sharp fast ripping action. The keys for warded locks only require the end section
which actually open the locks. The other parts are there to distinguish between different
variations of their locks.
11. Pick Guns
 Often see in movies in the tool box of locksmiths, manual and electronic guns are a
popular method used today for quick and easy ways of opening doors. The higher end
electric pick guns are usually made of aircraft aluminum and hard steel. The pick is
operated by simply pressing a button that vibrates while the normal tension wrench is
being used. A manual pick gun (snap gun) is used in a similar way but usually has
trigger that creates a movement which (like bump keys) operates on the same principle
as Newton’s cradle. It transfers sudden energy to the key pins which communicate this
to the driver pins causing those pins only to jump, allowing the cylinder to turn freely
for a brief moment, until the pin springs return the pins to their locking position. A pick
gun is used in conjunction with a tension tool and the only skill required here is
learning the timing.

MASTER KEYING SYSTEM


 used in big installation where keys can open a group of locks.

MAISON KEYING SYSTEM


 permits a lock to be open with no. of unique individual keys.

PROTECTIVE CABINET
 The final line of defense at any facility is in the high security storage area where records,
papers, plans or cashable instruments, previous metals or other especially valuable assets are
protected, these security cabinets will be of a sized and quantity which the nature of the business
dictates.

Three Types of Security Cabinet


1. Safe
 A metallic container used for the safekeeping of documents or small items in an office
or installation. Safe can be classified as either robbery or burglary resistance depending
27
upon the use and need. It weight must be at least 750lbs and should be anchored to a
building structure and its body should at least be one inch thick steel.
2. Vault
 Heavily constructed fire and burglar resistance container usually part of the building
structure used to keep and protect cash, documents and negotiable instruments. Vaults
are bigger than safe but smaller than a security file room. The vault door should be
made of steel at least 6 inches in thickness. Vault walls, ceiling, floor reinforce
concrete at least 12 inches in thickness and the vault must be resistive up to 6 hours.
3. File Room
 A cubicle in a building constructed a little lighter than a vault but bigger size to
accommodate limited people to work on the records inside. The file room should at
most be 12 feet high and it must have a watertight door and at least fire proof for one
hour.

VIDEO SURVEILLANCE
 Surveillance cameras can be a deterrent when placed in highly visible locations and are useful
for incident assessment and historical analysis.
 For example, if alarms are being generated and there is a camera in place, security personnel
assess the situation via the camera feed. In instances when an attack has already occurred and a
camera is in place at the point of attack, the recorded video can be reviewed. Although the term
closed-circuit television (CCTV) is common, it is quickly becoming outdated as more video systems
lose the closed circuit for signal transmission and are instead transmitting on IP camera networks.
 Video monitoring does not necessarily guarantee a human response. A human must be
monitoring the situation in real time in order to respond in a timely manner; otherwise, video
monitoring is simply a means to gather evidence for later analysis. However, technological advances
like video analytics are reducing the amount of work required for video monitoring as security
personal can be automatically notified of potential security events.

ACCESS CONTROL
 Access control methods are used to monitor and control traffic through specific access points
and areas of the secure facility.
 This is done using a variety of systems including CCTV surveillance, identification cards,
security guards, biometric readers, and electronic/mechanical control systems such as locks, doors,
turnstiles and gates.

 Mechanical access control systems


 Mechanical access control systems include turnstiles, gates, doors, and locks. Key
control of the locks becomes a problem with large user populations and any user
turnover. Keys quickly become unmanageable, often forcing the adoption of electronic
access control.

 Electronic access control systems


 Electronic access control manages large user populations, controlling for user life
cycles times, dates, and individual access points. For example, a user's access rights
could allow access from 0700h to 1900h Monday through Friday and expire in 90 days.
These access control systems are often interfaced with turnstiles for entry control in
buildings to prevent unauthorized access. The use of turnstiles also reduces the need for
additional security personnel to monitor each individual entering the building allowing
faster throughput.
 An additional sub-layer of mechanical/electronic access control protection is reached
by integrating a key management system to manage the possession and usage of
mechanical keys to locks or property within a building or campus.

 Identification systems and access policies


28
 Another form of access control (procedural) includes the use of policies, processes and
procedures to manage the ingress into the restricted area. An example of this is the
deployment of security personnel conducting checks for authorized entry at
predetermined points of entry. This form of access control is usually supplemented by
the earlier forms of access control (i.e. mechanical and electronic access control), or
simple devices such as physical passes.

CHAPTER 3
SECURITY GUARD FORCE SYSTEM
SECURITY GUARD FORCE
 A group of forces of men selected, trained or grouped into functional unit for the
purpose of protecting operational process from the disruption which would impede
efficiency or halt operations at a particular plant, facility, installations or special
activity.

ESSENTIAL QUALITIES OF SECURITY GUARDS


1. Alertness
2. Judgment
3. Confidence
4. Physical Fitness
5. Self-control

TYPES OF SECURITY GUARD FORCE


1. Private Security Agency
 any person, association, partnership, firm or private corporation, who contracts,
recruits, trains, furnishes or post any security guard, to do its functions or solicit
individuals, business firms, or private, public or government-owned or controlled
corporations to engage his/its service or those of his/its security guards, for hire
commission or compensation.
Advantages
a. More economical
b. Security administrative problems are reduced.
c. Problems related to recruiting, pre-employment investigation and training are
eliminated.
d. Problems involving absenteeism and vacation leaves are eliminated.
e. If in case of accidents and deaths, agency takes care of the cumbersome details.
f. In case of emergencies, extra guards are easily available.
g. In case of company strikes, the agency guards will be on duty to carry out their
assigned duties.
Disadvantages
a. Lack of training or low caliber employees.
b. No company loyalty
c. Large turnover
d. not familiar with the facilities to protect
e. security personnel are separated from employees. Camaraderie is eliminated.

2. Company Security Force


 maintained and operated by any private company/corporation for its own security
requirements only.
Advantages
a. Generally higher caliber as they can receive higher wage
b. Generally they provide better services
c. Can be trained to handle of the more complex security duties
d. Less turn-over
29
e. Are more familiar with facilities they protect
f. Tend to be more loyal to the company
Disadvantages
a. Cost more
b. Maybe required to join guard force
c. Problem of ensuring availability of back-up personnel
3. Government Security Unit
 maintained and operated by any government entity other than military and/a police,
which is established and maintained for the purpose of securing the office or compound
and/or extension such as government entity.

 SECURITY GUARD
 Any person who offers or renders personal service to watch or secure either a residence
of business establishment or both buildings, compounds or areas, inspects/monitor
bodily checks/searches individuals and or baggage and other forms of security
inspection, physically or manually or scientifically by T.V. monitors, including not
limited to, logging concessions and agricultural mining or pasture lands, for hire or
compensation or, as an employee thereof, including any employee or national or local
government or agencies instrumentally thereof and/or government buildings,
compound premises and other properties, other than member of the armed forces of the
Philippines, guars of BOP, Provincial Guards and member of the PNP or of any other
enforcement agency of the government.
 He may serve as a sub-contractor of a private security agency which is under service
contract with a client and shall serve as basis of “No Work No Pay” and whose security
of tenure is co-terminus of the service contract between the PSA and the client.

 Security Guard Functions/Guarding Procedures


1. Fixed Post
2. Post
3. Reserve
4. Administration Work
5. Investigations
6. Escorts
7. General functions

CHAPTER 4
SALIENT FEATURES OF PRIVATE SECURITY AGENCY LAW (RA 5487)
AND OTHER LEGAL BASIS
 The act that regulates the organization and operation of private detective, watchman and
security guard agencies in the Philippines. Approved on October 3, 1972.

 SCOPE OF THIS ACT


 The organization, operation, business and activities of private detectives, watchmen or
security guards agencies shall be governed by the provisions of this Act.
 PADPAO (Philippine Association of Detective and Protective Agency Operators)
 Authorized to issue the implementing rules and regulations pertaining to RA 5487
 PNP SAGSD (Philippine National Police Agency Guard Supervising Division)
 Unit under Philippine National Police (PNP) which is charge with the supervision,
direction and control of all security agencies in the Philippines. Formerly PCSUSIA
(PC Supervising Unit for Security and Investigative Agencies)
 PNP SOSIA (Philippine National Police Supervisory Office for Security and Investigation
Agencies
 Sept. 25, 2009
30
 Formerly known as SAGSD

 PNP SOSIA MISSION


 To provide quality administrative services and operational supervision over
security providers making them effective partners of the police in the
maintenance of peace and order.
 PNP SOSIA VISION
 By 2030, SOSIA shall be a highly efficient and effective regulatory office,
regarded as the best Philippine National Police National Operation Support
Unit, implementing quality management system providing administrative
services and general supervision over stakeholders of private security industry.
 PNP SOSIA CORE VALUES
1. Service Excellence
 fast and efficient processing time; consistent improvement of systems and
processes to enhance service quality; and strengthened partnership with
stakeholders by advocating business friendly services.
2. Output Based
 we ensure that every performed task has positive result translated to customer
satisfaction.
3. Steadfast
 resolute and unyielding in enforcing applicable laws and policies to maintain
quality standard of private security services.
4. Integrity Imbued
 SOSIA personnel are imbued with the highest ethical standards, demonstrating
honesty and fairness in every action they take.
5. Automation Oriented
 using modern technology and database management system for globally
competitive private security services
PNP SOSIA ORGANIZATIONAL STRUCTURE

DEFINITION OF TERMS
1. Person
 shall include not only natural but also juridical person such as single proprietorship,
partnerships, corporations, companies or associations, organized and registered with
the Securities and Exchange Commission an or Department of Trade and Industry.
2. Private Detective

31
 Any person who does detective work for hire, rewards or commission, other than
member of the armed forces of the Philippines, guards of the Bureau of Prisons,
provincial guards and member of the Philippine National Police or any other Law
Enforcement Agency of the Government.
3. License to Exercise Profession or License Certificate
 Any document issued by then Philippine National Police or his duly authorized
representative recognizing a person to be qualified to perform his duties as security
guard or detective.
4. License to Operate
 A document issued by the Philippine National Police or his duly authorized
representative authorizing a person to engage in the occupation, calling or employment
as security guard or detective or juridical person to establish engage, manage or operate
an individual or a detective agency or private security agency/company force after
payment of the prescribed dues to fees .
5. Watchmen/Security Guard
 person who offers or renders personal service to watch or secure either residential or
business establishment or both or any building, compound or area for hire or
compensation or as an employee thereof.
6. Security Agency
 any person, association, partnership or corporation who recruits, trains,
muster ,furnishes, solicit individuals or business firms, private or government owned or
controlled corporation to engage his services or those of its watchmen.
7. Private Detective Agency
 is any person who for hire or reward or on commission conducts or carries on or holds
himself out as conducting or carrying on a detective agency or detective service.
8. Permit
 a document issued by the CPNP or his duly authorized representative recognizing a
person or persons to be qualifying to obtain license certificate.
9. License
 A document issued by CPNP or his duly authorized representatives authorizing a
person to engage in the occupation calling or employment of watchmen, security guard,
private detective after payment of dues of fees.
10. Security Guard
 Refers to any person who offers or renders personal service to watch or secure a
residence, business establishment, building, compound, any other are or property; or
inspects, monitors or performs body checks or searches of individuals or baggage and
other forms of security inspection.
11. Private Security Personnel
 refers to natural persons, including private detectives, security consultants and security
officers, employed by private security agency firm, to render and/or detective services.
12. Right to Control
 refers to the right reserved to the Security Service Contractor to determine not only the
end to be achieved as required by the principal, but also the manner and means to be
used in reaching that end within the limits of the law.
13. Security Service Contractor (SSC)
 is synonymous with Private Security Agency (PSA) which refers to any person,
association, partnership, firm or private corporation engaged in contracting,
recruitment, training, furnishing or posting of security guard and other private security
personnel to individuals, corporations, offices and organizations, whether private or
public, for their security needs as the PNP may approve.
14. Service Agreement
 refers to the contract between the principal and the SSC/PSA containing the terms and
conditions governing the performance or completion of security service hob or work
being farmed out for a definite or predetermined period.
32
15. Solidarity Liability
 refers to the liability of the principal, in the same manner and extent that he/she is liable
to his/her direct employees, to the extent of the work performed under the contract
when the SSC/PSA fails to pay the wages of his.her employees, as provided for in
Article 106 of the Labor Code as amended.
16. Total Contract Cost
 refers to the payment of wage and wage related benefits including social welfare
benefits of security guards and other private security personnel in conformity with the
standard computation of the DOLE using the form prescribed in the guidelines.
17. Trilateral Relationship
 refers to the relationship in contracting or subcontracting arrangement where there is a
contract for specific job, work or service between the principal and the SSC/PSA and a
contract of employment between the latter and its security guards. There are three (3)
parties involved in these arrangements; the principal who decides to farm out a security
job, work, or service to a security service contractor, the SSC/PSA who has the
capacity to independently undertake the performance of the security job, work or
service and the security guards and other private security personnel engaged by the
SSC/PSA to accomplish the security job, work, or services.

 WHO MAY ORGANIZE A SECURITY OR WATCHMAN AGENCY? (SECTION 4)


1. Any Filipino Citizen or a corporation, partnership or association.
2. With a minimum capital required by law.
 In case of corporation, association, or partnership - must be 100 % owned and
controlled by Filipino citizen.
 No person shall organize or have interest in more than one agency.

 QUALIFICATION OF AN OPERATOR OR MANAGER OF A SECURITY AGENCY


1. At least 25 years of age
2. College graduate and/or commissioned officer in the inactive service of the AFP
3. Good moral character
4. No previous record of any conviction of any crime/offense involving moral turpitude
5. Not suffering from any of the following
 DISQUALIFICATIONS
1. dishonorably discharged or separate from the AFP
2. mentally incompetent
3. addicted to the use of narcotic drugs
4. habitual drunkard

 An elective or appointive government employees who may be called upon on account of the
function of their respective offices in the implementation and enforcement of the provision of
RA 5487 and person related to such government employees by affinity or consanguinity in the
third civil degree shall not hold any interest, directly or indirectly in any security guard agency.
(As amended by Pres. Decree No. 11.)

LIMITATIONS AND PROHIBITIONS ON A SECURITY AGENCY


1. No agency operating in the City of manila and suburbs may employ more than 1000
watchmen or security guards.
2. No agency operating in other cities and first class municipalities may employ more than 500
watchmen or security guards.
3. No agency operating in municipalities other than first class may employ more than 200
watchmen or security guards.
4. No person, corporation, partnership or association may organize more than one agency in any
one city or municipality.
33
5. No agency shall offer, render or accept services to gambling dens or other illegal enterprises.
6. The extent of the security service being provided by any security agency shall not go beyond
the whole compound or property of the person or establishment requesting the security service
except when they escort big amount of cash.

WHO CAN ISSUE RULES AND REGULATIONS TO CARRY OUT THE PURPOSE OF RA
5487?
 the chief PNP, in consultation with the Philippines Association of Detective and Protective
Agency Operators.

WHAT ARE THE PENAL PROVISIONS FOR VIOLATION OF RA5487 OR ITS


IMPLEMENTING RULES?
1. Suspension, fine or cancellation of license to operate with the forfeiture f bond filed with the
Chief PNP.
2. Imprisonment ranging from 1 to 4 years and fine, in the discretion of the courts.

BASIC QUALIFICATION OF A SECURITY GUARD


1. Filipino citizen
2. High school graduate
3. Physically and mentally fit
4. Not less than 21 nor more than 50 years old
5. At least 5'4" in height
6. Not suffering from any disqualification under RA 5487

 Veterans shall be given priority in employment as security guard or private detective.


 Person convicted of any crime involving moral turpitude shall not be employed as
security guard or private detective.
 Private detective, detective agency, security guard, security agency must first obtain
license from the PNP.
 Employees employed solely for clerical or manual work need not be licensed.
 The license shall be displayed at all times in a conspicuous and suitable place in the
agency office.
 The PNP shall exercise general supervision over the operation of all private detective
and security guard agencies.
 The City/Municipal Mayors has the power as director of the City/Municipal civil
defense to deputize private detective and security guards to help maintain peace and
order or prevent or arrest law violators in case of emergency or in times of disaster or
calamity. They shall take orders from the Chief of Police for the duration of the fire,
inundation, earthquakes, riots or other emergency.
 A security guard or security agency is entitled to possess firearms.
 Firearm must not be higher than .45 caliber
 Agency is entitled to possess firearm not exceeding one firearm for every security
guard in its employ.
 Security guard is entitled to possess not more than one riot gun or shotgun.
 Firearms shall be carried by the security guard only during his tour of duty in proper
uniform within the compound of the establishment except when he escorts big amount
of cash or valuables in or out of said compound.
 The Chief PNP shall prescribe the uniform, ornaments, equipment and paraphernalia to
be worn by the security guards.
 Uniforms must be different from the PNP/AFP.
 Salary of security guard - not lower than the minimum wage prescribe by law.

34
 Provided, That foreigners who are already employed as watchmen or security guards prior to
the approval of this Act shall not be subject to the above-mentioned requirements: Provided,
further, That veterans shall be given priority in employment as security guard, watchman or
private detective: And provided, finally, That person convicted of any crime involving moral
turpitude shall not be employed as security guard, watchman or private detective.

 EXEMPTIONS FOR PRE-LICENSING TRAINING


1. Veterans and retired military/personnel or honorably discharge military police personnel
possessing all the qualifications mention in the preceding section shall be exempted from
pre-licensing seminar which is requirement for the issuance of license to exercise
profession as security guard.
2. Graduates of ROTC advance/basic and/or its equivalent in the AFP or PNP training
graduates shall be exempted.

 RIGHTS OF SECURITY GUARDS AND OTHER PRIVATE SECURITY PERSONNEL


(DEPT. ORDER 150-16)
a. Safe and healthful working conditions
b. Labor standards such as but not limited to service incentive leave, premium pay,
overtime pay, holiday pay, night shift differential, 13 th month pay and separation pay as
may be provided in the Service Agreement or under the Labor Code as amended;
c. Retirement benefits under RA 7641, RA 1161 as amended RA 8282, and retirement
plans of the security service contractor; if any
d. Social Security and welfare benefits
e. Right to self-organization and collective bargaining, subject to the provisions of
existing laws
f. Security of tenure.

 MAIN AND BRANCH OFFICES


 All agencies shall maintain a main office in their registered address. Branch offices
shall be established and maintained in other provinces/cities where they have at least an
initial employment of ten (10) guards during the first year until the thirty (30)
minimum guard requirements have been complied in the 3 rd year of operation. Branch
offices established in region outside NCR shall be required to register their presence of
CSF District and Regional PADPAO.

 SECURITY SERVICE CONTRACT


 Private security agencies shall render security services to their client only after a
service contract duly notarized shall have been executed between them, such contract
must stimulate among other things; the money consideration to be paid by the client to
the agency; the number of the hours of security per guard per day which the guard
himself shall render to the client and the salary each individual security guards shall
receive from the agency.

 TENURE OF SECURITY GUARD


 The tenure is co-terminus of the service contract between the PSA and the client.
However, services of any security guard shall be terminated on the following grounds:
1. expiration of contract
2. revocation of license to exercise profession
3. conviction of crime involving moral turpitude
4. loss of trust and confidence
5. Physical and mental disability
6. Any other violation of the pertinent rules and regulations

 PAYROLL
35
 Private Security agencies shall prepare payrolls with the name of the security guards
arranged alphabetically and numbered consecutively. These payrolls shall be
personally signed by the payees only after receipt of the amount shown therein.
Separated payrolls for distant detachments/post shall be prepared and similarly signed
by the payees or his duly authorized representatives as the case maybe. Payrolls shall
be filed with the main office within fifteen (15) days after pay day. The use of payroll
form shall be in accordance with the standard format as prescribe by law.

EMPLOYMENT STATUS

 EMPLOYER-EMPLOYEE RELATIONSHIP
 The SSC/PSA is the employer of its security guards and other private security
personnel on duty detail to a principal or client under a service agreement
 PROBATIONARY EMPLOYMENT
 The probationary period of newly-hired security guard and other private security
industry shall not exceed six (6) months. While engaged on probationary basis, their
services may be terminated for failure to meet reasonable standards or criteria made
known by the SSC/PSA to the security guards and other private security personnel at
the time of their engagement or for any just cause contained in the probationary
contract.
 REGULAR EMPLOYMENT
 Any security guard or other private security personnel who is allowed to work after the
probationary period or in the absence of a valid probationary contract shall be
considered a regular employee. Security guards and other private security guards and
other private security personnel affected by repeated hiring-firing-rehiring scheme for
short periods of time, the aggregate duration of which is at least six (6) months, shall be
considered regular employees.

 QUALIFICATIONS FOR SECURITY OFFICER


1. Filipino Citizen
2. holder of Baccalaureate degree
3. Physically and mentally fit
4. Retired personnel of the PNP or AFP
5. Has graduated from security officer training course
6. Must not possess any of the disqualification listed in sec 2, rule 11.

 QUALIFICATIONS OF SECURITY CONSULTANTS


1. Holder of a master degree in either criminology, public administration, MNSA, industrial
Security Administration or Law.
2. Must have at least ten (10) years’ experience in the operation and management of security
business.

 MINIMUM CAPITALIZATION AND BANK DEPOSIT REQUIRED FOR NEW


APPLICANTS FOR PRIVATE SECURITY AGENCY LICENSE TO OPERATE:
 Minimum capitalization – one million pesos (1,000,000)
 Minimum bank deposit – Five Hundred pesos (500,000)

 WHERE TO FILE?
 PNP SAGSD

 WHO WILL ENDORSE APPLICATIONS?


 The civil service security district offices of the CSFC found in their respective regions
and in the name of the regional director.

36
 GRADUATE SCALE OF LICENSE FOR PRIVATE SECURITY/DETECTIVE
AGENCY
1. PSA’s with temporary license to operate having 200 – 1000 guards shall be issued a regular
license to operate good for two years.
2. New PSA’s – issue temporary license good for 1 year.

 POSSESSION OF LICENSE
 The individual license shall be carried by the security guard or private detective at all times
while in the performance of his duty.

PAYMENT OF FEES AND LICENSE


 For Agency
a. Two Thousand pesos (2,000) as national license fee payable to the national treasurer
of his authorized representative.
b. twenty pesos (20) – registration fee for each SG’s employed

 For Individual
a. One hundred pesos (100) per year for security consultant, officer and private
detectives
b. fifty pesos (50) per year for SG’s

 SURETY BOND
Secured at any Reputable Insurance Company
a. Agency with 1-199 guards – 50,000
b. agency with 200-499 guards – 100,000
c. Agency with 500-799 guards – 150,000
d. Agency with 800-1000 guards – 200,000

 No Regular License shall be granted to any Private or Company Security force unless it
has under its employ the following number of duly licensed security guards;
a. Private security agencies – 200 – 1000
b. Company security force – 30 – 100

USE OF UNIFORM, EQUIPMENT AND PARAPHERNALIA


 UNIFORM
 The uniform of Private security guard either from the private security agency/company
security force/government security unit shall consist of the ff;
a. Headgear
b. Service shirts
c. Service trousers
d. service belt
e. Foot wear
 MALE UNIFORM
a. Made of fast navy blue thick for the trousers for daily security officers wear and
service Shirts for field and perimeter guards
b. Light blue or white service shirts for PSA’s Internal Security guards
c. Light gray for Company Security Force
d. White for Government Security guards.

 FEMALE UNIFORM
a. made of thick fabric
b. modified overseas cap similar to the women of PNP
37
c. service skirts, blouse, service belt and black leather shoes.
d. The color of service shirt shall be fast navy blue, light blue or white for PSA’s lady
guard, Light gray for Company lady guard and white for government lady guard.
e. It shall be made of thick fabric, short sleeves, shoulder straps, tow breasts pockets
with cover flaps and navy-blue front buttons, tucked in.

 USE OF UNIFORM OF PRIVATE SECURITY PERSONNEL (SOSIA PRIVATE


SECURITY PERSONNEL UNIFORM AND EQUIPMENT BOARD RESOLUTION NO.
2017-001)
 Effective January 1, 2018

 TYPES OF UNIFORM
1. TYPE A - GENERAL SERVICE UNIFORM
 As the standard uniform to be used by all posted private security personnel
during their day to day duties and functions unless otherwise specifically
provided below.
 MALE SECURITY GUARD
a. Headgear
 Pershing cap, navy blue cap with black strap, black visor and
navy blue nylon net top, and with prescribed SOSIA metal cap
device. It shall be the daily headgear of security guards.
b. Upper Garment
 Blue or white gabardine polyester fabric and shall be sewn short
or long sleeves, as the case maybe, shoulder tab, two breast
pockets with pocket flaps and white buttons for white uniform
and navy blue buttons for navy blue uniform with zipper inside
and with two shoulder loops. The upper Garment shall include
the following;
b.1. Name Cloth
 shall include the surname and the initials of first and
middle name and shall be 4 3/8” x 1” with white
background for white uniform and yellow background
for navy blue uniform and navy blue “Arial” font (1.5
cms) and border.
b.2. Agency Name Cloth
 Shall be the same size and color as b.1.
b.3. SOSIA patch
 as prescribed by SOSIA, in sublimation
b.4. Agency Patch
 as appropriate
b.5. National Badge
 Shall be brass and placed in loop above the left breast
pocket
b.6. SOSIA Collar Device
 Placed at the left and right collar approximately 1/2 inch
from the edge
b.7. Whistle with Chain
 One end clipped at the left shoulder loop and the other
end placed at the left breast pocket flap.
b.8. Undershirt
 Shall be plain white v-neck
b.9. Necktie and necktie clip
 Optional
 NOTE
38
 In the event that the government makes a pronouncement on the wearing of
appropriate light materials by government workers during the summer months
of March, April and May, SOSIA may issue similar pronouncement allowing
security personnel of “summer uniform” in luie of the upper garment with
white collared shirt as may be provided for through a resolution.

c. Lower Garment
 Navy blue, straight cut trouser, with side pockets and two back
welt pockets with button.
c.1. Notebook - shall be small enough to fit in the back welt pocket
c.2. Writing pen
c.3. Handkerchief - shall be white in color
c.4. Inner Belt - shall be blue with skeleton brass buckle

d. Service Belt
 It shall be black in color, leather, to be used as leather pistol belt
measuring 1 3/4 inches.
d.1. Regulation Service Buckle - shall be brass depicting a SOSIA
logo
d.2. Belt Clips
d.3. Ammo Holder
d.4. Handcuffs with holder
d.5. Nightstick/baton with holder
d.6. Flashlight with holder
d.7. First Aid Kit/Pouch (optional)
d.8. Teargas with holder
d.9. Radio with holder
d.10. Holster

e. Foot Wear
 PNP patrol shoes type or clarino to be worn with plain block
socks.

 FEMALE SECURITY GUARD


 Uniform shall consist of the upper and lower garment belt and footwear.
a. Headgear
 Prescribed navy blue headgear in nylon net top and with
prescribed SOSIA metal cap device. It shall be the daily headgear
of female security guards. It may also be used by “Lady Guards”
for ceremonial purposes with the black strap.
b. Upper Garment
 Shall be the same with the upper garment of male security guard
including its accoutrements.
c. Lower Garment
 Navy blue color, straight cut trouser, with side pockets and two
back welt pockets with button, Skirts shall only be used during
ceremonial activities.
d. Service Belt
 shall be the same with the service belt of male security guard
including its accoutrements.
e. Footwear
 PNP patrol shoes type or clarino to be worn with plain block
socks.

39
 FOR SECURITY OFFICER
a. Headgear
 pershing cap, navy blue cap with yellow band/strap, black visor and navy
blue nylon net topw with prescribed SOSIA metal cap device. It shall be
the daily headgear of security officers.
b. Upper Garment
 White or navy blue gabardine polyester fabric and shall be sewn short
sleeves, shoulder tab, two breast pockets with three-pointed curved pocket
flaps and white/blue front buttons, with belt loops (Front-2 and Back-1)
and 2 lower pockets with flap.
c. Lower Garment
 Shall be the same lower garment of the male security guard to include its
accoutrements.
d. Belt
 White or blue fabric belt (1 3/4 inches) with flat brass buckle.
e. Footwear
 PNP patrol shoes type to be worn with plain block socks.

 FOR SECURITY GUARDS DESIGNATED AS POST-IN-CHARGE (PIC)


AND/OR SHIFT-IN-CHARGE (SIC):
a. Uniform is similar to TYPE A (Male and Female Security Guard)
b. Additional accoutrements/paraphernalia;
b.1. for PIC
 Red shoulder board with white arm band, 2 inches in height with letters
PIC (blue color) to be placed at the left arm.
b.2. For SIC
 Navy blue shoulder board with white arm band, 2 inches in height with
letters SIC (blue color) to be placed at the left arm.
 GALA UNIFORM
 it shall consist in the same manner as prescribed for the security guards strictly
with necktie.
 When to use?
 All poster private security personnel assigned/detailed shall wear
the Type A uniform.
 During Ceremonies and Special Occasions - GALA Uniform
shall be worn at the expense of the establishment conducting the
ceremonies.
 Note: Proper grooming shall be observed by all posted private
security personnel, to wit:
a. Haircut - barber’s cut for male; with ponytail for lady
guards with long hair.
b. Nail - properly trimmed and no colored nail polish.
c. Make-up- No heavy make-up
d. Jewelry - No ostentatious display

2. TYPE B - LONG SLEEVED BARONG UNIFORM


 To be worn only by indoor posted private security personnel in the following
establishments:
a. DOT- accredited hotels, serviced-apartments hotels, hospital./medical
tourism establishments and/or government licensed gaming
establishments.
b. Diplomatic establishments
c. All other indoor based security services in private establishments as
may be considered by SOSIA.
40
 MALE AND FEMALE SECURITY GUARD/SECURITY OFFICER:
a. Upper Garment
 Long Sleeved Barong (Navy blue or Santana White) with a nameplate
placed on the upper right breast of the uniform about seven and a half
inches (7’ 1/2”) from the highest point of shoulder of the barong and a
SOSIA logo embroidered at the left breast of the uniform. The SOSIA
logo shall measure one and a half inches in width and one and a half
inches by height (1.5” X 1.5”)
 The barong should be half placket and the button color shall correspond to
the color of the barong; white buttons for white colored barong and navy
blue buttons for any blue colored barong.
 The barong shall be worn with a tucked-in inner plain white, V-neck shirt.

Note: Coat and Tie as an alternative to long sleeved barong subject to the
approval of SOSIA may be allowed only for the following:
a. Detachment Commander and/or Assistant Detachment Commander
b. Inspector
c. Shift-in-Charge
b. Lower Garment
 shall be straight-cut black trousers (pants)
c. Footwear
 shall be black military type glossy low cut shoes with black socks
d. Name Plate
 shall be black with gold printing for security officer and black with silver
printing for security guard, indicating the Surname and initials of the First
and Middle Name of the security personnel and the word “SECURITY
OFFICER” for Security Officer and “SECURITY” for security guard. It
shall measure three inches in width and one inch by height (3”X1”)

3. TYPE C - FIELD UNIFORM


 May be worn depending on the operational category and/or area of
deployment posted pribvate security personnel, such as:
 DOT - accredited resorts
 Heavy industrial areas and establishments where for safety issues, the
personal protective equipment (PPE) is required.
 Historical Places
 Protective Agents
 Canine Handlers
 Armored Security Personnel
 All other similar functions as maybe determined by SOSIA

 Resorts to be worn only by indoor-posted private security personnel in above


mentioned establishments.
a. Head gear
 shall be black ball cap with yellow gold “SECURITY” marking
on front panel. Size of security marking shall be 1” height,
“Arial” font. Agency logo may be embroidered at the back of the
ball cap.
b. Upper Garment
 shall be a white or navy blue polo/collared shirt with the word
Security (2 1/2 “height in yellow gold color, “Arial” font,
embroidered at the back of the shirt. Agency logo may be

41
embroidered on front left chest. Upper garment shall be worn
tucked-in.
c. Lower Garment
 shall be black tactical (six-pocket) shorts and shall be above the
knee.
d. Footwear
 as may be appropriate.

 Heavy industrial areas and establishments where for safety issues, the personal
protective equipment (PPE) is required.

a. Head gear
 shall be hard helmet
b. Upper Garment
 shall be blue field tropical (SWAT - Type Designed) and shall
have four pockets with long sleeves. SOSIA logo must placed in
the upper right arm while PSA logo must be place at the upper
left arm. The name cloth of security guard must be placed on the
upper right breast pocket and the PSA name on the left over the
flap of the left breast pocket Orange Bikino-Type/Skeleton Type
reflectorized vest shall be worn indicating name of agency in
front and the word SECURITY at the back.
c. Lower Garment
 shall have six pockets and ticked inside the boots. (Balloon Type)
d. Footwear
 Shall be combat boots or steel toe shoe.

 Traffic Personnel
a. Head gear
 shall be the prescribed Type “A” Head gear or matte black
stetson hat with silver/gray trims.
b. Upper Garment
 shall be the upper garment of the Type A uniform with orange
bikini-type reflectorized vest indicating the name of agency in
front and the word SECURITY at the back.
c. Lower Garment
 shall be the same lower garment of the type A uniform or
“breeches” pants.
d. Footwear
 shall be the same as the foot wear of Type A uniform or
motorized boots.

 Historical Places
 Security personnel may wear an appropriate uniform as designed by their
clients subject to the approval of SOSIA in coordiantion with National
Historical Institute.
 Protection Agents
 shall wear barong and civilian clothes, unless another uniform is
prescribed by SOSIA.
 Canine Handlers
 as prescribed under SOSIA Resolution no 01-2012
 Armored Security Personnel
 as prescribed under SOSIA resolution no. 01-2012 and SOSIA Resolution
03-2012.
42
 Quick Response Team (QRT) Personnel
 same uniform as prescribed for armored security personnel under SOSIA
resolution No. 01-2012 and SOSIA resolution 03-2012.

4. TYPE D - TRAINING UNIFORM


 To be worn by private security personnel undergoing Basic Security Course.

a. Headgear
 Pershing cap, navy blue cap with black strap, black visor and
navy blue nylon net top, and with prescribed SOSIA metal cap
device. It shall be the daily headgear of security guards.
b. Upper Garment
 navy blue or white gabardine polyester fabric and shall be sewn
short or long sleeves as the case maybe, shoulder straps, two
breast pockets with cover flaps and navy blue or white front
buttons.
c. Lower Garments
 Navy blue color, straight cut, slanted pockets and two back
pockets with cover flaps.
d. Belt
 it shall be black in color, leather, to be used as pistol belt
measuring four and one-half centimeters in width.
e. Footwear
 black leather shoes with rubber heels and soles plain top lo cut
and black shoelace to be worn with plain black socks.

USE OF FIREARMS AND EQUIPMENT

 ALLOWED FIREARMS TO BE CARRIED BY SG’S


a. Shot guns not higher than 12 gauge
b. Low-power rifle or revolvers
c. caliber 22
d. caliber 38 piston or revolvers

 NOTE
43
 Not exceeding one firearm for every 2 security guards in its employ.

 CONDITIONS
1. Private security agency with 100 guards
 initially procure at least 30 pieces of licensed firearms.
 after six months of operation – can procure licensed firearms in proportion to number
of guards.
2. Private security agencies applying for regular license to operate shall possess at least 70
pieces of firearms.
3. Use of Private detective agency of firearms is optional.

 EXCEPTIONS
 When Private Security Agency or company’s security force guards are operating in an
upsurge of lawlessness and criminality.

 LIMITATIONS IN CARRYING OF FIREARMS


 The Firearms issued shall be carried by SG’s only during tour of duty while in proper
uniform and with in the compound of the establishment where he is assigned except
when he is escorting big amount of cash or valuables, and upon prior coordination with
the nearest police station.

 DUTY DETAIL ORDER


 Agencies shall issue duty detail order on security personnel assigned to escort big
amount of cash or valuable outside the jurisdiction or area of operation.

 Contents of DDO
a. Name, Address and Telephone number of Agency
b. Issue serial number and date of the DDO
c. Complete name and designation of grantee
d. Purpose
e. Inclusive dates of detail
f. Firearms description and license number
g. Authorized uniform to be used
h. Other specific instructions or remarks and
i. Signature and designation of issuing officer.

 MISSION ORDER
 A written instruction issued by the agency to its guard to perform activity at specific
time, place and date. It shall include the name and serial number of the firearms issued
to the guard and the name of the officer or manager of the agency.

Research work
 Justification for confiscations of firearms.

 STOCKING OF AMMUNITION
 not exceed a basic load of 50 rounds of ammunition per unit
 25 rounds for every security guard.

RANKS AND POSITION


1. SECURITY MANAGEMENT STAFF
a. Security Director (SD)
 agency manager/chief security officer
b. Security executive director (SED)
 assistance agency manager / assistance chief security officer
44
c. Security Staff Director (SSD)
 staff director for operation and staff director for administration
2. LINE LEADERSHIP STAFF
a. Security Supervisor 3
 detachment commanders
b. Security Supervisor 2
 chief inspector
c. Security Supervisor 1
 Inspector

3. SECURITY GUARD
a. Security guard 1
 watchman/guard
b. Security guard 2
 Shift in-Charge
c. Security guard 3
 Post in-charge
4. Security Consultant
 optional

 ARREST BY A SECURITY GUARD


 A security guard or private detective is not peace officer and is not, therefore, clothed
with the police authority. However, he may arrest under any of the ff circumstance:
1. When the person to be arrested has just committed, is actually committing, or is
about to commit an offense in his presence.
2. When an offense has in fact been committed and he has reasonable ground to
believe that the person to be arrested has committed it.
3. When the person to be arrested is a prisoner who has escaped from a penal
establishment or place where he is serving final judgement or temporarily confined
while his case is pending or has escaped while being transferred from one
confinement to another.

 CLASSIFICATION OF TRAINING
1. Basic Security Guard Course
 Pre-licensing Course (150 hours)
2. Re-training Course
 renew license (48 hours)
3. Security Officers Training Course
 For Security supervisor/officer license (300 hours)
4. Basic Security Supervisory Course
 for supervisory positions (48 hours)
5. Security Supervisor Development Course
 present holder of Supervisory positions (48 hours)

SUBJECT AREAS OF STUDY FOR TRAININGS


1. Public Relation – first contact with the public on office hours
2. Courtesy and Discipline
3. First Aid
4. Report Writing
5. Crisis management
6. Proper maintenance and law on use of Firearms

UTILIZATION OF AGENCIES DURING EMERGENCY


1. Power of City or Municipal Mayors
45
 In case of emergency or in times of disaster or calamity when the services of any
security agency and its personnel are needed, the city or municipal mayor may muster
or incorporate the members of the agencies nearest the area such disaster or calamity to
help in the maintenance of peace and order, prevention of crime, or apprehensive of
violators of laws or ordinance, and in the protection of lives and properties. The
deputized security guard shall receive direct orders from the chief of police of the city
or municipality for the duration of the emergency, disaster or calamity.
2. The Chief of the Philippine National Police may deputize any security guards as herein
defined to assist the PNP in the performance of its duties.

PROHIBITIONS
1. No agency shall offer, render or accept services in gambling dens or other illegal business
establishments or enterprises. The extent of the security service being furnished by securing
agency shall not get beyond the compound or property of the person or establishment
contracting the security service except when the security guard is escorting big amount of
money or valuables or in hot pursuit of criminal offenders.
2. No watchman, security guard or private detective shall serve as body guard of any person.
3. “kabit system” operators – No licensed security agency shall operate, promote and enter into
an agreement of “merger” (kabit system) with any person or a group of persons for the purpose
of organizing a branch unit or subsidiary under separate control and ownership.

INSPECTION
1. Pre-Licensing Inspection
 no inspection is required when an application secures a temporary license to operate a
private security agency. However, no regular license shall be issued unless prior
inspection is conducted on the applicant agency. The purpose of such inspection is to
determine whether the applicant agency and the personnel thereof have complied with
the provisions of republic act 5487, as amended and it’s implementing rules and
regulations.
2. Post-licensing Inspection
 All licensed private security/detective agencies shall be inspected periodically. The
objectives of such inspection is to ascertain whether the provisions of republic act
5487, as amended and tis implementing rules and regulations are compiled with and to
further ascertain and analyze the over all performance of the agency, effect corrections
of defects noted on the spot, and to recommend to the manager or operator of the
agency appropriate measures to improve the agency operation.

AWARDS AND DECORATIONS FOR SECURITY PERSONNEL


1. Medalya ng Kagitingan (Blueguards medal of Valor)
 Secretary of DILG
2. Medalya ng Katapatan sa Paglilingkod (Blueguards distinguished service medal)
 Chief, PNP
3. Medalya ng Katapangan (Bluegaurds Bravery Medal)
 Chief, PNP
4. Medalya ng Pambihirang Paglilingkod (Bluegaurds Special Service Medal)
 RD, PNP Regional Command/director, Civil Security Force Command (CSFC)
5. Medalya ng Kadakilaan ( Bluegaurds Heroism Medal)
 RD, CSFC
6. Medalya ng Katangi-tanging Asal (Blueguards Special action medal)
 RD, CSFC
7. Medalya ng Kasanayan (Blueguards Efficiency Medal)
8. Medalya ng Papuri (blueguards Commendation Medal)
 RD,CSFC
46
9. Medalya ng Pagtulong sa Nasalanta (Blueguards Disaster Relief and Rehabilitation Medal)
 PD, PNP CSFC
10. Medalya ng Sugatang Magiting (Blueguards Wounded Medal)
11. Letter of Commendation – any good activity done
 Agency Manager

WORK STOPPAGE
 a condition of an enterprise whereby normal work operation is stopped as a result of a
strike and lockout.

STRIKE
 temporary stoppage of work concerted by action or employees as a result of current
labor industrial dispute

LOCK OUT
 is a temporary refusal of any employer to furnish work unless employees accept certain
conditions.

Research Works:
 Research RA 5487 Policies in times of lock outs
 Eleven GeneralSecurity guards creed

CHAPTER 5
PERSONNEL SECURITY INVESTIGATION
PERSONNEL SECURITY
 Includes all security measure designed to prevent unsuitable individuals or persons of
doubtful loyalty to the Government, from gaining access to classified matter or to any
security facility, and to prevent appointment, or retention as employees of such
individual.
 It is also considered as the most important aspect of security. This is for the simple
reason that security involves people both as asset to be protected and as source of
security threats. It is an acknowledge fact that losses are attributed mainly to
negligence or active participation of employees, either through theft and sabotage. This
emphasized the need to set up a system of hiring the people for the company

OBJECTIVES OF PERSONNEL SECURITY


1. To provide the standards and procedures necessary to insure the appointment, employment or
retention of suitable and loyal individuals.
2. To develop the necessary and proper security discipline among the applicants and employee
as well as protect and preserve the security of interest of the organization.
3. Indicate the desirable security attitudes and habits among the applicants and employees.

KEY FUNCTIONS OF PERSONNEL SECURITY


1. Serves as screening device in hiring
2. Provides background investigation services of both potential and present employees, for
possible assignment to sensitive position.
3. Handles investigation of employees suspected of wrong doing.
4. Develops security awareness among employees.
5. It attempts to ensure the protection of employees from discriminatory hiring or terminating
procedures as well as unfounded allegations of illegal or unethical activities and conduct.

PERSONNEL SECURITY INVESTIGATION

47
 A process of inquiry into the character, reputation, discretion, integrity, morals and loyalty of an
individual to determine the suitability for appointment or access to classified matter.

GENERAL TECHNIQUES OF PERSONNEL SECURITY INVESTIGATIONS

1. Background Investigation (BI)


 This technique is very expensive but necessary in personnel security. It serves to verify
information on the application form and to obtain other information pertinent to
decision to employ.

 Factors to Consider in the Conduct of Background Investigation


a. Loyalty
b. Integrity
c. Discretion
d. Morals
e. Character
f. Reputation

 Components of Background Investigation


a. Applicants Name
b. Date of Birth
c. Present residence address
d. Personal History
e. Marital History
f. Residence History
g. Citizenship
h. Physical Data
i. Educational History
j. Organizational Membership
k. Neighborhood investigation
l. character reference
m. Employment History
n. Military History
o. Foreign Travel History
p. criminal record
q. credit records
r. Applicant’s signature
s. Date of Application

 TYPES OF LOCAL AGENCY CHECK


a. Barangay Clearance
b. City/Municipal Clearance
c. Local Police Clearance
d. Court Clearance

 TYPES OF NATIONAL AGENCY CHECK


a. National Bureau of Investigation (NBI) Clearance
b. PNP Directorate for Intelligence Clearance
c. Intelligence Service, AFP (ISAFP) Clearance

2. Positive Vetting
 The process of inspecting or examining with careful thoroughness. The essence of
vetting is that a personal interview conducted under stress. It is based on information
48
previously given by the applicant. Other information is sued during the interview, such
as those discovered BI which confirms or denies this given by the applicant.
3. Profiling
 A process whereby a subject’s reaction in a future critical situation is predicted by
observing his behavior, or by interviewing him, or analyzing his responses to a
questionnaire, such as honesty test. The reid report is an example of an honesty test.
4. Deception Detection Techniques
 A process of using devices in detecting deception during the interview stage. This
includes the use of polygraph, Psychological Stress Evaluator and Voice Analyzer.
5. Financial and Lifestyle Inquiry
 A type of investigation that seeks to gather information on income and mode of living,
sometimes referred to as the earning to debt ratio.

6. Undercover Intelligence
 The placement of an agent in a role in which the agent’s true identity and role remains
unknown, in order to obtain information for criminal prosecution or for recovery or
limitation of asset losses.
7. Exit Interview
 This is a valuable tool because it gives departing employees an opportunity to list
grievances. It offers security managers an opportunity to learn problems not previously
known. Incorporating a checklist of company-issued property and confronting a
departing employee of this has resulted in reducing losses of company property.
Debriefing an employee is also incorporated into the exit interview to remind
employees of their continuing legal obligation to safeguard confidential company
information.

 PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL


 The most practical and generally accepted system of personnel identification is the use
of identification cards, badges or passes. Generally speaking, this system designates
when and where and how identification cards should be displayed and to whom. This
helps security personnel eliminate the risk of allowing the access of unauthorized
personnel within the establishments.

TYPES OF PERSONNEL IDENTIFICATION


1. Personal recognition
 familiarity of the person’s characteristics.
2. Artificial recognition
 identification cards, passes, passwords and others.

SYSTEM OF EMPLOYMENT OF PERSONNEL CONTROL IDENTIFICATION


1. Pass system
 a method used by security to screen visitors or person admitted into building premises.
2. Single pass or Badge system
 the least expensive and the least secure.
3. Group pass and Badge system
 one ID for one group.
4. Multiple pass system
 separate pass is required for access to various areas in need ex.color coding
5. Spot magnetized identification passes
 a code may be placed in the device and when passes through a machine,the code on the
device is read,if it contains wrong code or no code at all,it will alarm.
6. Access list
 it contains the names of authorized persons or personnel and is checked against
identification cards such as drivers licenses,draft registration etc
49
VISITOR’S CONTROL
1. Visitor’s Logbook
 All visitors to any facility should be required to identify them and should be given a
visitor’s ID by the security. Visitors logbook should be filled up with the name of
visitors, nature and duration of visit.
2. Photograph
 Taking photographs should be considered. Extreme caution must be exercised in areas
where classified information is displayed to preclude unauthorized taking of pictures of
the installation. If a visitor has came and it is prohibited to take picture, said camera
should be left in the care of security with the corresponding receipt.
3. Escort
 If possible, visitors should be escorted by the security to monitor their activity within
the establishment and guide them where to go.
4. Visitors Entrance
 separate access for visitors and employees of the establishment should be provided.
5. Time-Travelled
 If there is a long delay or time lapse between the departure and arrival, the visitors may
be required to show cause for the delay.

PACKAGE MANAGEMENT CONTROL


1. No packages shall be authorized to be brought inside and outside the industrial installation,
offices and work area without proper authority. This basic precept help reduce if not eliminate
pilferage, industrial espionage or sabotage.
2. Outgoing packages carried by the personnel should be closely inspected and those in vehicles
should also be checked as many pilfered items are hidden in the surface on the vehicles leaving
the compound.
3. Any personnel or visitor entering the installation with a package should deposit the same to
the security and in return receives a numbered tag, which he or she will use in claiming his or
her package upon departing.

UTILITY AND MAINTENANCE PERSONNEL


 escort system could be used.If these people visit the installations on a regular basis some of
the systems previously could be used.

Photography
 extreme caution must be exercised in areas where classified information is displayed to
preclude unauthorized taking of pictures of the installation.

VEHICULAR MOVEMENT CONTROL AND IDENTIFICATION


1. Privately owned vehicle of personnel or visitor should be registered and are subject to the
identification and admittance procedure.
2. Vehicles should be subjected for search at the entrance and exit of the installation.
3. All visitors with vehicle should provide the security as to the complete details of their
duration of stay, person to be visited and other information.
4. All vehicles of visitors should be given a sign or sticker to be placed on the windshield.
5. Traffic warning signs should be installed in all entrances in order to guide the visitors in their
destination as to provide them with the necessary safety precautions while they are inside the
installation.
6. Security personnel must constantly supervise parking areas and make frequent spots searches
found there.

50
SECURITY EDUCATION
 It is conducted to develop security awareness among employees of the company. It
should cover all employees, regardless of rank or position.

OBJECTIVES
1. Guidance for all supervisory and executive levels of the organization.
2. A mandatory indoctrination on security for all new personnel before their assignment to their
respective jobs.
3. Development of a high degree of security consciousness among the selected supervisors and
other key personnel in a program that should be continuing and supported by top management,
4. A down-the-line security program aimed at instilling consciousness and dedication through
demonstration, lectures, motivations and suggestions.
5. To let all employee force be informed that they all belong to the organization and that non-
awareness to the security program is tantamount to disloyalty.
6. That the program is also to develop discipline, loyalty and belongingness.

PHASE OF SECURITY EDUCATION PROGRAM


1. Initial Interview
 it is the first contact of the prospective employee wherein the interviewer determines
the suitability of the applicant for the employment through his answers on the different
type of questions being conducted. It is in this stage where the interviewer may start
providing the necessary information as to the overview of company security policies
that could result from violation there from.
2. Orientation and training
 New employees receive detailed presentation of personnel security policy. Usually
handouts or employee’s manual are being distributed for reference. New employees
also requested to sign acknowledgement that they have been aware of the existing
company policies and will abide the same.

3. Refresher Conference
 A design to remind employees of the company about their responsibilities, review the
guidelines and policies introduction of new policies and regulations and a moment
getting employees feedback about the company policies that is being implemented.
4. Security Reminders
 A phase which employs an indirect approach of educating the employees such as a
posting security poster and distributing fliers.
5. Security Promotion
 The act of emphasizing the importance and role of security achieving the company
goals and objectives. It involves securing employee cooperation and support.

CHAPTER 6
DOCUMENT AND INFORMATION SECURITY
1. Document Security
 It involves the protection of documents and classified papers from loss, access by
authorized persons, damage, theft and compromise through disclosure.
2. Classified Information
 Includes all information concerning document, cryptographic devices developed
projects and materials following on the categories of Top Secret, Confidential,
Restricted, Secret, Unclassified.
3. Classified Matter
 It refers to any information or material or of any nature, the safeguarding of which is
necessary in the interest of security and which is classified for such purpose by the
responsible classifying authority.
51
4. Classify
 This refers to the assigning of information or material, one of the four security
categories after determination has been made that the information requires the security
protection as provided.
5. Declassify
 The act of removing the security classification from classified information or matter.
6. Reclassifying or Regarding
 Refers to the act of changing the assigned classification from classified information or
matter.
7. Upgrading
 it refers to the act of assigning the information or matter to the higher classification
than that of previously assigned to it.
8. Compartmentation
 It refers to the grant of access to the classified matter only to properly cleared
information is required in their performance of their official duties.
9. Need to Know
 it is the dissemination of classified information or matter to be limited strictly to those
people whose duties requires knowledge or possession thereof.
10. Unauthorized
 it refers to any person not authorized to have access on classified matters.
11. Compromise
 This takes place through the loss of security which results from unauthorized persons
obtaining knowledge of classified matters.
12. Damage to National Security
 It refers to prejudice, embarrassment or injury to the country resulting from the act or
omission.

PURPOSE OF PROTECTING CLASSIFIED MATERIALS


1. Deter and impede potential spy.
2. Assist in security investigation by keeping accurate records of the moments of classified
materials.
3. Enforce the use of “Need to Know” principle.

KINDS OF DOCUMENTS
1. Personal
 Letters, Diary and notebooks. These should be treated usually the same with official
document.

2. Official
 orders, manuals, letters, overlays maps and magazines. Careful and follow the chain of
command.
3. Public
DOCUMENT OR INFORMATION CYCLE
1. Creation
2. Classification
3. Storage
4. Retrieval
5. Retention/Purging
6. Transfer
7. Disposition
CATEGORIES OF DOCUMENT
1. Category A
 Information which contains reportable time sensitive, order of battle and significant
information.
52
 It should be given priority because it is critical information.
 It must be forwarded without delay.
 It is critical to friendly operations
 It requires immediate action.
2. Category B
 Anything that contains communications, cryptographic documents, or systems that
should be classifies as secret and requires special handling.
 Higher authorities should declassify it.
3. Category C
 Other information which contains something that could be an intelligence value.
 Contains exploitable information regardless of its contents.
 Unscreen materials or documents
4. Category D
 No value.
 No decision must be made at the lower echelon that document has no value. It is the
responsibility of the higher headquarters.
THREE SECURITY CONCEPTS
1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel conscious and realize the value of
document.
3. Training is necessary for the practice of the “Need to Know” principle.
FOUR TYPES OF CLASSIFIED MATTERS
1. Top Secret (green)
 Any information and materials, the unauthorized disclosure of it would cause
exceptionally grave damage to the nation, politically, economically and military
operation.
2. Secret (red)
 It is any information and material, the unauthorized disclosure of it would endanger
national security, causes serious injury to the interest and prestige of the nation of any
government activity.
3. Confidential (blue)
 It is any information or material, the unauthorized disclosure of it would be prejudicial
to the interest and prestige of the national or governmental activity or would cause
administrative embarrassment or unwanted injury to and be of advantage to a foreign
country.
4. Restricted (White)
 Any information and material which requires special protection other than those
determines confidential, secret, and top secret.
PROPRIETARY INFORMATION
 An information that in some special way relates to the status or activities of the
possessor and over which the possessor asserts ownership. In the business community,
proprietary information relates to the structure, products or business method of the
organization. It is usually protected in some way against causal a=or general disclosure.
All proprietary information is confidential, but not all confidential are proprietary. For
example, Confidential personnel data in employee files is not considered as proprietary
although the company treats it as confidential.

2 TYPES OF PROPRIETARY INFORMATION


1. Trade Secrets
 This consist of any formula, pattern, device or compilation of information which is
used in one’s business and which gives him an opportunity to gain an advantage versus
competitors who do not know or use it. It may be a formula for a chemical compound,
a process of manufacturing, treating or preserving materials, a pattern for machine or

53
device, or a list of customers. A trade secret is a process or device for continuous use in
the protection of the business.
2. Patents
 This is a grant made by the government to an inventor, conveying or securing to him
the exclusive right to make, use or sell his invention for term of years.
CHAPTER 7
RISK ANALYSIS and SECURITY HAZARD
1. Risk
 it is the potential damage or loss of an asset. The level of risk is a combination two
factors: the value placed on that asset by its owner and the consequence, impact
adverse effect of the loss or damage to that asset and the likelihood that a specific
vulnerability will be exploited by a particular threat.
2. Hazards
 “exposure to the chance of loss or injury”. It is synonymous to risk or peril.
Conversely, Microsoft Encarta describes hazard as a “potential danger or something
that is potentially very dangerous.”
3. Security hazards
 Any act or condition which may result in the compromise of information, loss of life,
loss or destruction of property or disruption of the objective of the installation. It can
also be defined as an act or condition affecting the safe operation of the facility caused
by human action accidental or intentional.
4. Risk Management
 A process of selecting and implementing security countermeasures to achieve an
acceptable level of risk at an acceptable cost.
5. Risk Analysis
 The analysis of risk includes examination of the vulnerability, probability and
criticality of potential threats and include natural and man-made risk.
6. Adversary
 Refers to any individual, group, organization or government that conducts activities or
has the intention and capability to conduct activities detrimental to the individual,
private or government entity.
7. Asset
 any information, facility, material, information or activity which has a positive value to
its owner whether it is an individual private or government entity.
8. Vulnerability
 any weakness that can be exploited by an adversary to gain access to an asset.
9. Countermeasures
 an action taken or physical entity used to reduce or eliminate one or more
vulnerabilities. The cost of possible countermeasures may be monetary, but may also
include non-monetary cost such as reduced operational efficiency, adverse publicity
unfavorable working conditions, and political consequences.
10. Probability
 It is the chance or likelihood that a loss will take place.
11. Criticality
 the impact of a loss as measured in financial terms.
12. Relative criticality of operation
 This pertains to the importance of the firm with reference to the natural economy and
security.
 Example is gasoline depots, communication transmission lines and power plants.
13. Relative Vulnerability
 this is the susceptibility of the plant or establishment to damage, loss or disruption of
operation due to various hazards. A good example is the location of the building, the
machines or presence of possible poisons.

54
 The extent and degree of risks to security is dependent on relative criticality of operation and
relative vulnerability.

RISK MANAGEMENT ALTERNATIVES AND STRATEGIES


1. Risk Avoidance
 eliminating or removing the risk totally from the business, government or industrial
environment for which the risk manager has responsibility.
2. Risk Reduction
 Decreasing the risk by minimizing the probability of potential loss. The reduction or
criminal opportunity is often accomplished by situational crime. (prevention strategies
to discourage, deter, or deny criminal incidents)
3. Risk Spreading
 Spreading the risk through compartmentation or decentralization to limit the impact
(criticality) of the potential loss.
4. Risk Transfer
 moving the financial impact of the potential loss-over to an insurance company.
5. Risk Self-Assumption
 planned assumption and acceptance of the potential risk by making a deliberate
managerial decision of doing nothing about the threat, or setting aside resources for use
in case of a specific loss incident.

SECURITY HAZARDS
 Any act or condition which may result in the compromise of information, loss of life,
loss or destruction of property or disruption of the objective of the installation.

TYPE OF HAZARDS
1. Natural Hazard
 These are hazard which arise from natural phenomena. The following are types of
natural hazards or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Fire (not cause by human action)
d. Storms typhoons, cyclones, tornado and hurricane
e. Extreme temperature and humidity.
2. Human or man-made Hazards
 result of a state of mind, attitude, weaknesses or character traits of one or more persons.
They can be acts of commission or omission, both overt and covert, which can disrupt
operation of a plant or installation. The following are the types of human or man mand
hazards:
a. Carelessness – accidents and dissatisfaction
b. Disloyalty – subversion and sabotage
c. Espionage, pilferage and theft
d. Vandalism

CHAPTER 8
SECURITY SURVEY, INSPECTION AND SECURITY PLANNING
 The basic instrument for determining security vulnerability is the security survey. Most
description of security surveys refers principally to checklist, audits or inventories of security
conditions.
Security System
 This is the set of policies, procedures and rules and regulations designed to reduce to an
absolute minimum the possibility of espionage, sabotage and compromise of classified
information of an office or a whole establishment.
Survey
55
 This term applied to the first detailed “look see” conducted by a team.
Security Survey
 A critical onsite examination and analysis of an industrial plant, business, a home or
public or private institution done to ascertain the facility’s current security status, to
identify deficiencies or excess in current practices, to determining what protection is
needed and to make recommendations for improving the overall level of security that
installation. A general term that often encompasses other related procedures.
Entrance Conference
 A conference or dialogue between the survey team and management officials of a plant
before security survey is conducted.
Exit Conference
 A conference similar to entrance conference done after the completion of the security
survey.
Security Inspection
 An important activity to ensure the integrity of the overall security programs. It
complements security survey in its attempt to prevent losses of company properties. It
is conducted for two reasons: To check on the degree compliance with the
recommended countermeasures and to determine the effectiveness and adequacy of the
countermeasures which are in effect.

TYPES OF SECURITY INSPECTION


1. Continuous Inspection
 It is an on-going and never-ending activity.
2. Formal Inspection
 It is usually preceded by an announcement and the unit under inspection “prepares “for
events, including some housekeeping activities that would not otherwise happen at that
point in time.
3. Informal Inspection
 it is usually the result of a long and firmly entrenched inspection program. It is
seriously and quietly executed in a spirit of understanding and cooperation.
4. Structured Inspection
 It is one that moves systematically from one area to the next and so on. There is a
format or a logical sequence to the process.
5. Unstructured Inspection
 It is conducted in a random manner. There is no formal or logical sequencing.

Security Investigation
 It is planned and organized determination of facts concerning specific loss or damage
of assets due to threats, hazards or unsecured conditions.

TOOLS OF INVESTIGATION
1. Information
 Knowledge which the investigation gathers from other persons
2. Interview
 The simplest questioning of a witness who has no personal reason to withhold
information.
3. Interrogation
 the skillful questioning of a person who is reluctant to divulge information concerning
the offense under investigation.
4. The application of instruments and methods of physical sciences to the detection of crimes. In
other words, the sum total of the application of all sciences in crime detection otherwise known
as criminalistics.

SECURITY PLANNING
56
Security Planning
 is a corporate and executive responsibility. It involves knowing the objectives of security and
the means and methods to reach those objectives or goals must then be evolved. In short,
security planning is a decision-making process.

Contents of Security planning


1. The situation
 this part of security planning explains the historical background of the organization of
its security picture
2. The mission
 this part of security will cover what the plan is all about and what it intends to do, This
mission is further subdivided into:
a. Purpose
b. Goals
c. Objectives
3. Execution
 this part of security plan will explains and outline the concept of the security project.
4. Administrative and Logistics
 This part of the security plan involves listing of security equipment
5. Command and signal
 this last portion of the security plan pertains to the channel of communication needed,
when implementing to the project until in full view.

REFERENCES

Electronic Books/Sources
A. Industrial Security Management retrieved from https://www.bigwas.com/2014/10/industrial-
security-management-reviewer.html
B. Fence retrieved from https://en.wikipedia.org/wiki/Fence
C. Physical Security retrieved from https://en.wikipedia.org/wiki/Physical_security
D. Private Security Agency Law retrieved from file:///C:/Users/user/Desktop/1(20-21)/LEAD
%203%20Introduction%20to%20Industrial%20Security%20Management/Learning%20Materials/
Notes/RA%205487%20summary.pdf
E. RA 5487 retrieved from https://www.lawphil.net/statutes/repacts/ra1969/ra_5487_1969.html
F. PD 1919 retrieved from https://www.officialgazette.gov.ph/1984/04/28/presidential-decree-no-
1919-s-1984/
G. PD 11 retrieved from https://www.officialgazette.gov.ph/1972/10/03/presidential-decree-no-11-s-
1972/
H. Departmental Order No. 150 Series of 2016 retrieved from
https://blr.dole.gov.ph/news/department-order-no-150-series-of-2016-revised-guidelines-governing-
the-employment-and-working-conditions-of-security-guards-and-other-private-security-personnel-
in-the-private-security-industry/
I. PD 442 retrieved from http://hrlibrary.umn.edu/research/Philippines/PD%20442%20-%20Labor
%20Code%20of%20the%20Philippines.pdf
J. PNP SOSIA Patch retrieved from http://philippinesecurityguard.weebly.com/blog/pnp-sosia-
patch-on-the-security-guard-uniform-memorandum

Books
A. Ajero. (2014). Industrial & Corporate Security Management. Quezon City: Wiseman’s Books
Trading, Inc.
B. The revised guidelines governing the employment and working conditions of security guards and
other private security personnel in the private security industry (2016), Department order no. 150.

57
Other Resources
A. SOSIA Private Security Personnel Uniform and Equipment Board Resolution no. 2017-001

58
WORKSHEETS

GENERAL INSTRUCTIONS

1. Read the instructions in each activities before answering. Instructions are part of the activity. Not
following the instructions tantamount to deduction of points.

2. This worksheet is not required to be printed out. You may use any pieces of paper available at
home so long as outputs should be presentable and readable. Neatness and legibility of outputs are
considered in giving scores.

59
3. Questions may be printed/ encoded or handwritten. However, it is required that all answers are to
be handwritten.

4. Submission of outputs will be through email. Further instructions will be delivered on


synchronous session.

60
RUBRICS

1. Essay Writing Type Activities


 Legibility/Neatness - 20%
 Content - 40%
 Organization - 40%

2. Video Presentations
 Content - 35%
 Organization - 30%
 Creativity - 35%

3. Drawings/Illustrations/Pictures
 Content - 35%
 Creativity - 35%
 Neatness - 30%

4. Research Works
 Content - 35%
 Organization - 35%
 Legibility/Neatness - 20%

61
ACTIVITY 1
Name: Date:
Year and Section: Score:

Instruction: Create a flow chart showing the history of Industrial Security Management in the
Philippines. (20 points)

62
ACTIVITY 2
Name: Date:
Year and Section: Score:

Instruction: Cite at least five (5) famous personalities in Industrial Security Management and
present their contribution on the table provided below. (5 points each)

NAME YEAR CONTRIBUTIONS

63
ACTIVITY 3
Name: Date:
Year and Section: Score:

Instruction: Answer the following questions below. Limit your answers minimum of 2 sentences
and maximum of 5 sentences. (3 points each)

1. In your own words, discuss the difference between security management with industrial security.

2. In your own words, discuss the difference between target hardening with defensible space.

3. What is the role of the PNP in Industrial Security Management in the Philippines?
64
4. Is studying Industrial Security Management necessary for you as a Criminology student? Why did
you say so?

5. What is “Law of Self-Preservation”?

6. Discuss what does this paragraph stated under the Philippine Constitution and relate it to
Industrial Security Management. “The prime duty of the Government is to serve and protect the
people”.

65
7. Discuss what does this paragraph stated under the Philippine Constitution and relate it to
Industrial Security Management. “No person shall be deprived of life, liberty or property without
due process of law, nor shall any person be denied the equal protection of the laws”.

8. Enumerate at least 3 laws governing or related to Industrial Security Management in the


Philippines.

Law (Number) Title

ACTIVITY 4
Name: Date:
Year and Section: Score:

Instruction: Cite at least 6 Types of Security and present it on the table provided below. (5 points
each)
Type of Security Definition Examples (Give at least 2)

66
ACTIVITY 5
Name: Date:
Year and Section: Score:

Instruction: Answer the following questions below. Discuss your answers minimum of 2 sentences
and maximum of 5 sentences. (3 points each)

67
1. Discuss the difference between Physical Security and Personnel Security.

2. Discuss what does the “Principle of compartmentation” means in Industrial Security


Management.

3. In your own words, what does this statement pointing out. “Security is the concern of all
personnel”.

4. What is the difference of Active Security Measures with Passive Security Measures?

68
5. Enumerate at least 3 examples of active security measures.

6. Enumerate at least 3 examples of passive security measures.

7. Discuss the difference between relative critically and relative vulnerability.

8. What is the difference of Sabotage with Espionage?

9. What is the difference of Enemy Agent with Traitorous person type of saboteur.

69
10. Enumerate at least 3 types of mechanical sabotage.

11. What is Kleptomaniac? Is it curable? If yes, how?

12. What is the difference of Theft with Qualified Theft?

13. What is the difference of Casual Pilferage with Systematic Pilferage?

14. Imagine you’re an owner of a grocery store in a city. What are the measures you will be doing to
prevent being victimized by a pilferer or saboteur?

70
15. What are the factors to be considered in providing security for a establishment?

ACTIVITY 6
Name: Date:
Year and Section: Score:

Instruction: Answer the following questions below. Discuss your answers minimum of 2 sentences
and maximum of 5 sentences. (3 points each)

1. What is Physical Security?

2. What are the purposes of installing physical security systems?

3. Is there such thing as “impenetrable barriers”? Why did you say so?

71
4. Differentiate natural surveillance with video surveillance?

5. What is the difference between protective barriers and security lighting?

6. Cite at least three (3) examples of buildings exteriors or the second line of defense.

7. Cite at least three (3) examples of Interior controls or the third line of defense.

8. Differentiate inside perimeter with outside perimeter.

72
9. What are the purposes of perimeter barrier?

10. Does installing physical security to your establishment ensures security? Why did you say so?

ACTIVITY 7
Name: Date:
Year and Section: Score:

Instruction: Complete the table below. ( 5 points each)

Type of Physical Definition Example (Give at least 2)


Barrier

73
ACTIVITY 8
Name: Date:
Year and Section: Score:

Instruction: Present the advantages and disadvantages of the following type of fences. (30 points)

Full View Fence


Advantages Disadvantages

74
Solid Fence
Advantages Disadvantages

 Generalization/Personal Views/Summarization: Which of the following type of fences is


better? Why?

ACTIVITY 9
Name: Date:

75
Year and Section: Score:

Instruction: Present the three kinds of full-view fence using the table provided below. (20 points)

Kind of Full-view Definition Purposes/Uses


Fence

 Generalization/Personal Views/Summarization: Which among the three kinds of full view


fences is better? Why?

76
ACTIVITY 10
Name: Date:
Year and Section: Score:

Instruction: Answer the following questions below. Limit your answers minimum of 2 sentences
and maximum of 5 sentences. (3 points each)

1. What is the minimum height of fences to be installed as security barriers? What do you think are
the reason behind that minimum height requirement?

2. The standard slack at the bottom of the fences should not exceed 2 inches from the ground.
Discuss your personal view why it is recommended.

3. What are the minimum acceptable requirements for installing top guards?

77
4. What are the minimum requirement in installing windows to maintain security?

5. What are the minimum requirement to be considered in installing doors to maintain security?

78
ACTIVITY 11
Name: Date:
Year and Section: Score:

Instruction: Answer the following questions below. Limit your answers minimum of 2 sentences
and maximum of 5 sentences. (3 points each)

1. What is protective lighting?

2. What are the purposes of protective lighting?

3. What are common things that must be considered in installing protective lighting?
79
4. How can we achieve goo protective lighting?

5. What should be considered in planning protective lighting?

ACTIVITY 12
Name: Date:
Year and Section: Score:

Instruction: Present the different types of protective lighting using the table provided below. (5
points each)

Kind of Protective Description and Example Photo/Picture/Drawing


Lighting

1. Glare Projection Type

80
2. Controlled Lighting

3. Standby Lighting

4. Emergency Lighting

5. Incandescent Lamp

81
6. Mercury Vapor Lamp

7. Metal Halide

8. Flourescent Lamp

9. High-pressure Sodium
Vapor

10. Gaseous-Discharge
Lamp

82
11. Quartz Lamp

12. Floodlights

13. Street Lights

14. Search Lights

15. Fresnel Lights

83
ACTIVITY 13
Name: Date:
Year and Section: Score:

Instruction: Research on the following terms provided and present it below. (2 points each)
Terminology Description/Definition
1. Fail Safe

2. False Alarm

3. Capacitance
Proximity Sensor

4. Local audible Alarm

5. Ultrasonic Motion
Sensor

6. Intrusion Detection
Sensor

7. Vibration Sensor

8. Intrusion Detection
System

9. Control Unit

84
10. Actuator

ACTIVITY 14
Name: Date:
Year and Section: Score:

Instruction: Research on the following types of alarm system provided and present it below. (2
points each)

Type of Alarm System Description

1. Audio Detection
Device

2. Photoelectric Device

3. Metallic Wire

4. Vibration Detection
Device

85
5. Microwave Motion
Detection Device

6. Foot Rail Authority

7. Bill Traps

8. Double Squeeze
Buttons

86
9. Foot Foot Button

10. Thigh Button

ACTIVITY 15
Name: Date:
Year and Section: Score:

Instruction: Compare the following types of alarm detection systems. Limit your answers minimum
of 2 sentences and maximum of 5 sentences.(5 points each)

1. What is the difference between Central Station System with Propriety System?

2. What is the difference between Local Alarm System with Auxiliary Alarm System?

87
3. What is the difference between Dial Alarm System with Local Alarm by Chance System?

4. What is the difference between Propriety Alarm System with Auxiliary Alarm System?

ACTIVITY 16
Name: Date:
Year and Section: Score:

Instruction: Present the different types of locks using the table provided below. (5 points each)

Type of Lock Description Picture/Drawing


1. Key Operated
Mechanical Lock

88
2. Pin Tumbler
Locks

3. Combination
Locks

4. Code-Operated
Locks

5. Electrical Locks

89
6. Card-Operated
Locks

7. Lever Locks

8. Disc Tumbler
Locks

9. Wafer Locks

10. Warded Locks

90
ACTIVITY 17
Name: Date:
Year and Section: Score:

Instruction: Present the different types of pick locks using the table provided below. (5 points each)

Type of Pick Lock Description Picture/Drawing


1. Tension Wrench

2. Feather Touch
Wrench

3. Ball Pick

91
4. Half-Diamond
Pick

5. Hook Pick

6. Rake Pick

7. Slagel Pick

8. Warded Pick

92
9. Bumb Key

10. Pick Guns

ACTIVITY 18
Name: Date:
Year and Section: Score:

Instruction: Present the disadvantages and advantages of the following types of security guard
force. (5 points each)

Private Security Agency


Advantages Disadvantages

Company Security Guard Force


Advantages Disadvantages

93
 Which among the two (2) kinds of security guard force is better? Why did you say so?

ACTIVITY 19
Name: Date:
Year and Section: Score:

Instruction: Read on the salient features of Private Security Agency Law and other legal basis on
industrial security management in the Philippines. Then, answer the following questions below.
Limit your answers minimum of 2 sentences and maximum of 5 sentences. (3 points each)

1. What Agency is authorized to issue implementing rules and regulations pertaining to RA 5487?
What law created the Agency?

94
2. Who is a private detective?

3. Differentiate permit with license.

4. What is solidarity liability?

5. As stated under the private security agency law as amended, who may organize a private security
agency? What are the qualifications?

95
6. What are the disqualifications on the privilege to organize a private security agency law?

7. Who are exempted from pre-licensing training of security guards?

8. How many guards should a branch offices maintained and established in provinces or cities must
at least have during the first year? How about during the third year of operation?

9. What is the difference between probationary with regular employment?

10. What are the functions of a security officer?

96
11. What are the functions of a security consultant?

12. What are the functions of a security guard?

13. What is the minimum capitalization and minimum bank deposit required for new applicants for
Private Security Agency License to Operate?

14. When should a security guard carry his/her license to exercise profession?

15. What is security service contract?

97
98
ACTIVITY 20
Name: Date:
Year and Section: Score:

Instruction: Research and present below a picture of Type A or General Service Uniform (GOA)
for Male and Female Private Security Personnel. (20 points)

99
ACTIVITY 21
Name: Date:
Year and Section: Score:

Instruction: Research and present below a picture of Type B or Long Sleeved Barong Uniform for
Male and Female Private Security Personnel. (20 points)

100
ACTIVITY 22
Name: Date:
Year and Section: Score:

Instruction: Research and present below a picture of Type C or Field Uniform for Male and Female
Private Security Personnel. (20 points)

101
ACTIVITY 23
Name: Date:
Year and Section: Score:

Instruction: Research and present below a picture of Type D or Training Uniform for Male and
Female Private Security Personnel. (20 points)

102
ACTIVITY 24
Name: Date:
Year and Section: Score:

Instruction: Research and present below a picture of a firearms allowed to be carried by security
guards on duty. (20 points)

103
ACTIVITY 25
Name: Date:
Year and Section: Score:

Instruction: Research and present below the justifications of confiscations of firearms of a security
guard. (20 points)

104
105
ACTIVITY 26
Name: Date:
Year and Section: Score:

Instruction: Research and present below the General Orders of a security guard. (20 points)

106
ACTIVITY 27
Name: Date:
Year and Section: Score:

Instruction: Research and present below the Security Guards Creed. (20 points)

 Generalization/Personal View

107
ACTIVITY 28
Name: Date:
Year and Section: Score:

Instruction: Research and present below the Policies in Time of Lockouts that a security guard
must consider. (20 points)

108
ACTIVITY 29
Name: Date:
Year and Section: Score:

Instruction: Read on Personnel Security Investigation and answer the following questions below.
Discuss your answers minimum of 2 sentences and maximum of 5 sentences. (3 points each)

1. What are the objectives of Personnel Security?

2. What is positive vetting?

3. Is exit interview for a leaving security guard necessary? Why did you say so?

109
4. Is positive vetting necessary in personnel security? Why?

5. What is the difference between artificial and personal recognition?

6. What are the procedures that must be observed in managing packages brought inside Area of
Responsibility?

7. What are the things to be observed in vehicular movements control and identification?

110
8. Is visitor’s logbook necessary in maintaining security in the facility? Why?

9. What is the difference between single pass with multiple pass system?

10. Is background investigation on the applicant for security personnel necessary? Why?

ACTIVITY 30
Name: Date:
Year and Section: Score:

Instruction: Present the definition/description of each terminologies stated below. (2 points each)

Terminology Definition/Description

111
1. Classified Information

2. Declassify

3. Compartmentation

4. Category A Document

5. Top Secret

6. Secret

7. Confidential

112
8. Restricted

9. Patents

10. Risk management

11. Risk Spreading

12. Formal Inspection

13. Security Planning

14. Security Inspection

113
15. Security Survey

114

You might also like