Lea 3
Lea 3
The need for security of lives and properties is as old as the history of man. Man’s existence is
characterized by constant exposure to dangers: those hazards caused by nature; and those danger
posed by man’s fellowman. The means and methods of human beings to secure themselves are also
as old as the history of policing.
In the Philippines, “Hacienderos” or owners of large tract of lands often hire farm workers who
often double as protectors of the property against cattle rustlers and robbers. With the entry of the
American mining industries, the American companies started hiring armed security personnel. And
in 1950’s hired security personnel were already widespread after the restoration of the country after
World War 2. There were no strict regulations yet during that period. Security workers then were
still under the city or town mayors who in turn issue working permits to those wanting to be
employed as security guards. Security and Detective agencies also began to prosper and with no
strict regulations, many security guards were convicted of violent crimes. The establishment of the
Philippine Association of Detective and Protective Agency Operators (PADPAO) in 1958 with the
aim of making itself a freely self-governing, self-regulating and self-policing paved way for the
endorsement to Congress a bill to regulate the organization and operation of private detectives,
watchmen, security guards and agencies. Thus, on June 13, 1969, R.A 5487 or the “Private Security
Law” was born. This event started the professionalization of security works in the country.
The RA 5487 underwent numerous revisions so that the industrial security business will suit to
the economic advancement of the country. Today, many college graduates particularly Criminology
graduates are employed in the security business ranging from security guards and watchmen to
security supervisors and managers. The number of persons working in the industrial security even
surpassed the number of personnel of the Philippine National Police. The security guards now are
regarded as closed partner of the PNP and the Armed Forces of the Philippines (AFP) in combating
criminality in the country.
Today, the role of the industrial security business is indispensable as far as the economic
progress of our country is concerned. The economic success of one country depends on the stability
of its society. It can be noted that most are economically secured countries are free from any
external threats. Their socio-economic advancement relied so much on the maintenance of their
peace and order. In this country alone, our economy continues to suffer due to vulnerability to
internal and external threats.
One old adage state that, “Security in every organization is everybody’s business.” This means
that the avoidance of loss and damage to properties as well as the prevention of injury or loss of life
because of hazards is not possible without the active support of all individuals within an
organization. Among the Filipinos personnel of organizations and business enterprises are virtually
leaving their security and protection only to members of their security force. It is unfortune also that
many business establishments regard security personnel as mere compliance and sometimes as lowly
as props in the company.
Many failed to recognize the significance of a blue clad individual often times call “sikyu”.
Most company workers including the management people are not aware that the responsibilities of
an assigned “sikyu” ranges from the single centavo spent for the establishment of the business
enterprises up to the entire investments of the concerned company. This is because the security
personnel should guard the company from the smallest possible lost to the possible total destruction
of the business that could be caused by impending hazards.
On the other hand, lack of security consciousness on the part of the company personnel should
be taken as an act of negligence. Hence, any breach of security that may arise because of a company
personnel’s lack of consciousness, he should be equally liable with the concerned security
personnel.
Therefore, to achieve the objectives of effective security management, the company concerned
and the security personnel assigned should work hand in hand. To this both the security personnel
and the company’s workforce should be educated with the basics of security management.
1
Famous Personalities in Industrial Security Management
1. Allan Pinkerton (1851)
Established the first national private security and investigation company in the US.
2. August Pope (1853)
Patented one of the first burglar alarms.
3. Edwin Holmes (1858)
Introduced the first central station burglar alarms.
4. Washington Perry Brinks (1858)
Introduced the first armored carriages for the transportation of money and valuables.
5. George Wackenhut (1954)
A retired FBI agent formed the Wackenhut Corporation, an enterprise that became
another one of the largest private security companies in the US.
American Society for Industrial Security (ASIS) 1955
The world largest organization of security professionals.
Definition of Terms
1. Industry
The term denotes “earnest or constant application to work or business”, or “a special
branch of productive work, or the capital or workers employed in it.” It is likewise
defined as a large-scale production or organized economic activity connected with the
production, manufacture or construction of a particular product or range of products.
2. Industrial
This is defined as “pertaining to or engaged in industry” or having highly developed
industries.
3. Security
It is the state or condition of being safe or free from fear, harm, danger, loss,
destruction or damages. It is needed for adequate protection because of the prevailing
action of man against man that leads to unsecured and/or unsafe conditions due to
economic reason, revenge, or just plain greed.
4. Management
The term mean skillful use of means to accomplish a purpose. This is the process of
properly utilizing available resources to achieve organizational goals and objectives.
5. Security Management
It is the utilization of all available resources within a security organization in order to
function and attain its goal and objectives. It is the managing of money, men, materials
and methods with in security system.
6. Industrial Security
security measures applied to business industries
the business of providing security and protection to private individuals, business and
enterprises, or government and non-government industries.
7. Industrial Security Management
It is the skillful handling of the security and safety measure of business enterprises and
industrial establishments.
8. Hazard
refers to conditions that may cause damage to property, injury, or loss of life. It is also
defined as “exposure to the chance of loss or injury.”
9. Vigiles (in Rome)
origin of the watchmen although their principal duty was as a fire brigade.
10. Target hardening
the reduction in criminal opportunity, generally through the use of physical barriers,
architectural design and enhanced security measures of a particular location.
11. Defensible Space
2
the range of mechanisms that combine to bring an environment under the control of its
residents.
Historical Background of Industrial Security in the Philippines
In the Philippines, we trace the steps from the signing of the late president Ferdinand E. Marcos
on June 13, 1969 of the RA 5487 known as the “Private Security Agency Law”.
In this law assigned the most important role of the security guard force in assisting the police in
its mission to safeguard lives and properties. With the intention of continuously professionalizing
the security industry, several Presidential Decrees were issued such as PD 11 issued on October
1972, amending certain sections of RA 5487 particularly section 4 as to who may organize a
security and watchman agency; PD 100 on January 17, 1973 further amended sections of RA 5487
which permits the Philippine Constabulary to deputize any private detectives, watchman or security
guard to assist in cases of emergency disaster or calamity.
2. Constitutional Authority
a. The prime duty of the Government is to serve and protect the people (Art. II, sec. 4)
The government may call upon the people to defend the state and, in the fulfillment
thereof, all citizens may be required, under conditions provided by law, or to render
personal military service. Although, the defense of the state is the one contemplated
here, people being one of the elements of the state is directly affected in whatever
protection the state will receive from the government and the people. Take note also
that all citizens who are qualified, including the security guards, may be required by
law to render personal military or civil services. The service required of the citizens is
personal.
b. No person shall be deprived of life, liberty or property without due process of law, nor shall
any person be denied the equal protection of the laws. (Art. III, sec. 1)
This means the life, liberty, freedom and property can only be taken from a person after
the observance of due process of law. Due process of law is of two aspects: substantive
and procedural.
c. Private property shall not be taken for public use without just compensation. (Art. III, sec. 9)
The constitution protects not only ownership but also possession, enjoyment, use and
disposition of private property by their rightful owner’s subject to such limitations
imposed by law. In this regards, private property to be taken by the government in its
exercise of the power of the eminent domain must satisfy two important conditions;
Public use and Just compensation.
d. The right of the people to be secure in their persons, houses, papers, and effects against
unreasonable searcher and seizures of whatever nature and for any purpose shall be inviolable,
an no search warrant or warrant of arrest shall be issued except upon examination under oath or
affirmation of the complainant and the witnesses he may produce, and particularly describing
the place to be searched and the persons or tings to be seized. (Art. III, sec. 2)
3. Statutory Authority
a. Private security agency law (RA 5487)
June 21, 1969)
b. The labor code of the Philippines (PD 442)
3
c. Amending certain sections of republic act numbered fifty-four hundred eighty-
seven otherwise known as, "The private security agency law." (PD 19)
October 3, 1972
d. Department Order no. 150-16 (DOLE)
e. Amending further republic act numbered fifty four hundred eighty seven otherwise
known as “the private security agency law” (PD 1919)
April 28 1984
Necessity of Security
Security measures are in evitable or necessary for the attainment of the goals and
objectives of a certain individual, group or organization. It follows that when an individual
or organization is exposed to hazards, their productivity is adversely affected.
The role of the PNP and other Government Law Enforcement Agencies -
Industrial security is an indispensable part of the Philippine Economy because it serves
as a partner of Law Enforcement Agencies in the country such as the PNP. With its
doubtless significance, the PNP takes responsibilities in the supervision, control, and
training and operations of security agencies and in the issuance of license to operate
and the license to practice the security profession. In addition, the PNP and other
government law enforcement agencies serve as the immediate law enforcement agency
which assist the security guards and security agencies in the performance of their
security function such as accepting and processing crime reports submitted by the
Private Security Agency.
4
The protection resulting from the application of various measures which prevents or delay
the enemy or unauthorized person in gaining information through communication. This
includes transmission, cryptographic and physical security.
Research Work
Other types of Security
2. PASSIVE MEASURES
those that will deter man from committing such act of fear of being caught,charge in court
or get dismissed, such as: security education, programs, investigations, seminars,personnel
security check
Passive Security Measures
Security education programs, investigation, fire prevention seminars,
personal security checks.
Espionage
an act of gathering information
Espion
French word- which means spy
This is used to estimate or determine the best possible means of sabotage.
Spy
is the agent of Espionage.
They are very dangerous because of their skill in deception and undercover works.
Sabotage
is an act of destroying, damaging or any evil motives that will lead to stoppage of the
normal operation of the company, factory, plant and or establishment.
Sabot
French word that means Wooden Slipper.
Saboteur
is the agent of sabotage.
3 types of Saboteur
1. Enemy agent
2. Traitorous person
3. Irresponsible person
Types of Sabotage
1. Mechanical Sabotage
2. Psychological Sabotage
Mechanical Sabotage
is an act wherein they used the object or substance within the area of an establishment.
6
Types of Mechanical Sabotage
1. Contamination
is a type where they used foreign materials to apply in the establishment.
2. Breakage
destroying the vital parts of a machine.
3. Substitution
Substitution or changing of formula to another, which will cause damage or
destructions.
4. Omission
this is committed by means of a doing by an individual, which can cause destruction
inside of the company or establishment.
5. Abrasive
a special type of contamination, by using a type of material that will grind metals.
Explosives
substances that are easily exploded by means of heat, friction, jarring or sparks. They are
highly dangerous because of its damaging effect.
TYPES OF EXPLOSIVES
According to their sensitivity
1. Low Intensity Explosives
It is very sensitive to heat. It can be exploded by means of fire, friction or spark.
2. High Intensity Explosives
is detonated by means of shock, jarring or shake. These are from liquid.
Pilferage
Petty theft
7
one of the most annoying and common human hazard
These activity must be immediately put in control
Types of pilferage
1. Casual pilferage
one who steal due to inability to resist the unexpected opportunity or has little fear that
there is detection.
for souvenir
2. Systematic pilferage
one who steal with preconceived plan and take away things for all types of goods,
supplies or merchandise.
for economic gain
Pilferer
a thief who steals without using violence. sneak thief, snitcher. stealer, thief - a
criminal who takes property belonging to someone else with the intention of keeping it
or selling it. wharf rat - someone who lives near wharves and lives by pilfering from
ships or warehouses.
Methods used:
1. Classic method
2. Uses fake documents
3. Removal of items
4. Disposal of the same
KLEPTOMANIAC
The person who is fond of getting the property of other people.
there is satisfaction on the part of the person committing a crime.
Theft
is committed by any person who with intent to gain but without violence against or
intimidation of persons nor force upon things shall take personal property of another
without the latter’s consent.
Simple theft
without violation of trust and confidence
Qualified Theft
taking the property of another with violation of trust and confidence;
Example: maid, houseboy, salesgirl, or employees or any person that the victim has trusted.
Shoplifter
is those people or somebody who gets the things or property displayed in the store
without payment.
CHAPTER 2
PHYSICAL SECURITY
Physical security measures help to combat the crime-related threats that both employees and
outsiders pose to the organization.
If measures are properly planned, most potential intruders, whether employees or outsiders,
should see that the risks of detection and punishment for attempting to penetrate a protected area
are significantly greater than whatever they may gain.
8
security measures that are designed to deny unauthorized access to facilities, equipment and
resources and to protect personnel and property from damage or harm (such as espionage, theft,
or terrorist attacks).
Physical security involves the use of multiple layers of interdependent systems that can include
CCTV surveillance, security guards, protective barriers, locks, access control, perimeter
intrusion detection, deterrent systems, fire protection, and other systems designed to protect
persons and property.
Physical security systems for protected facilities are generally intended to:
1. deter potential intruders (e.g. warning signs, security lighting and perimeter markings);
2. detect intrusions and monitor/record intruders (e.g. intruder alarms and CCTV systems); and
3. trigger appropriate incident responses (e.g. by security guards and police).
It is up to security designers, architects and analysts to balance security controls against risks,
taking into account the costs of specifying, developing, testing, implementing, using, managing,
monitoring and maintaining the controls, along with broader issues such as aesthetics, human
rights, health and safety, and societal norms or conventions. Physical access security measures
that are appropriate for a high security prison or a military site may be inappropriate in an
office, a home or a vehicle, although the principles are similar.
BARRIER
Any physical structure whether natural or man-made capable of restricting, deterring,
delaying or preventing illegal and unauthorized access to an installation
PURPOSES OF BARRIERS
1. Define the physical limits of an area.
2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of guards.
5. Facilitate and improve the control of vehicular traffic.
PERIMETER BARRIER
A medium or structure which defines the physical limits of an installation or an area to
restrict or impede access thereto. It refers to any physical barrier used to supplement the
protection of an inside perimeter. The main purpose is to deny or impede access or exit of
unauthorized person. Basically, it is the first line of defense of an installation. This may be
in the form of fences, building walls or even bodies of water. The function and location of
the facility itself usually determine the perimeter of the installation.
INSIDE PERIMETER
A line of protection adjacent to protected area and passing through points of possible entry
into the area such as doors, windows, skylights or other points of access.
10
OUTSIDE PERIMETER
A line of protection surrounding but somewhat removed from a protected area such as
fence.
LAYERS OF SECURITY
1. Perimeter Control
Security barriers, checkpoints at the outermost layer to anticipate/identify hostile
elements at the vicinity of the communication facility.
2. Area Access control
Control measures undertaken to prevent entry of unauthorized person inside the
premises of communication security.
3. Control of operation area
Final measures undertaken prior to the entry into an operating room.
4. Control of Communication Area
Final security measures undertaken prior to the entry into a communication area.
FENCES
a structure that encloses an area, typically outdoors, and is usually constructed from posts
that are connected by boards, wire, rails or netting. A fence differs from a wall in not
having a solid foundation along its whole length. Alternatives to fencing include a ditch
(sometimes filled with water, forming a moat).
TYPES OF FENCES
a. Solid Fences
It denies visual access to the fencing. It also denies the opportunity for the
intruder to become familiar with the personnel, activities and the time
scheduled of the movements of the guards in the installation.
b. Full-view Fences
11
It permits visual access to the area. It allows the roving patrols and stationary
guard to keep the surrounding area of the installation under observation.
However, it allows intruder to become familiar with the movements and time
schedule of the guard patrols thereby allowing him to pick the time that is
advantageous on his part.
BODIES OF WATER
like river, lakes, march cataract, sea pond or any other bodies of water forming a part of the
wall, building or fencing should never be considered adequate natural perimeter barrier.
Additional security measures like wire fence, concrete walling, security patrolling and
floodlighting at night may be necessary for the portions of the perimeter.
13
Types of Perimeter Barrier Openings
1. Gate and Doors
when not in active use and controlled by guard, gates and doors in the perimeter should
be locked and frequently inspected by the guards. Locks should be changed from time
to time.
2. Sidewalk Elevator
These provide access to areas within the perimeter barrier and should be locked or
guarded.
3. Utilities Openings
like sewers, air tanks and exhaust channels which penetrate the barrier and which have
cross sectional areas of 96 square inches or more should be protected by bars, grills,
water filled traps or other structural means providing equivalent protection to that
portion of the perimeter barriers.
4. Clear Zone
unobstructed area should or a “clear zone” should be maintained on both side of the
perimeter barrier.
PROTECTIVE LIGHTING
Protective lighting provides a means of continuing, during hours of darkness, a degree of
protection approaching that maintained during daylight hours. This safeguard also has considerable
value as a deterrent to thieves and vandals and may make the job of the saboteur more difficult. It is
an essential element of an integrated physical security program. Depending on the nature of the
14
facility, protective lighting is designed to emphasize the illumination of the perimeter. In the case, it
must produce sufficient light to create a psychological deterrent to intrusion as well as to make
detection virtually certain in the event an entry is made. It must avoid glared that would reduce the
visibility of security personnel, while creating glared to detect intruder. This is particularly
important where the facility is within streets, highways or navigable waterways. The system must be
reliable and designed with overlapping illumination to avoid creating unprotected are in the event of
individual light failure. It must be easy to maintain and it must secure itself against attack. Poles
should be within the barrier power lines and the switch box must be protected. It is the single most
cost-effective deterrent to crime because it creates a psychological deterrent to intruders.
Security lighting is another effective form of deterrence. Intruders are less likely to enter
well-lit areas for fear of being seen. Doors, gates, and other entrances, in particular, should be well
lit to allow close observation of people entering and exiting. When lighting the grounds of a facility,
widely distributed low-intensity lighting is generally superior to small patches of high-intensity
lighting, because the latter can have a tendency to create blind spots for security personnel and
CCTV cameras. It is important to place lighting in a manner that makes it difficult to tamper with
(e.g. suspending lights from tall poles), and to ensure that there is a backup power supply so that
security lights will not go out if the electricity is cut off.
2. In planning protective lighting, high brightness contrast between intruder and background
should be the first consideration. With predominantly dark dirty surfaces or camouflage type
painted surfaces, more light is needed to produce the same brightness around installations and
buildings than when clean concrete, light brick and grass predominate. When the same amount
of light falls on an object and its background, the observer must depend on contrasts is
significantly improved by increasing the level of illumination.
3. When the intruder is darker than his background, the observer sees primarily the outline or
silhouette. Intruders who depend on dark clothing and even darkened face and hands may be
foiled by using light finishes on the lower parts of buildings and structures. Stripes on walls
15
have also been used effectively, as they provide recognizable breaks the installation, against
which intruders can be seen, can also create good observation conditions.
4. Two basic systems or a combination of both may be used to provide practical and effective
protective lighting. The first method is to light the boundaries and approaches. The second is to
light the area and structures within the general boundaries of the property.
16
It is considered more efficient than the incandescent and used widespread in exterior
lighting. This emits a purplish-white color, caused by an electric current passing
through a tube of conducting and luminous gas.
3. Metal Halide
It has similar physical appearance to mercury vapor but provides a light source of
higher luminous efficiency and better color rendition.
4. Fluorescent
This provides good color rendition high lamp efficiency as well as long life. However,
it cannot project light over long distance and thus, are not desirable as flood type lights.
5. High-pressure Sodium Vapor
This has gained acceptance for exterior lighting of parking areas, roadways, buildings
and commercial interior installation. Constructed on the same principle as mercury
vapor lamps, they emit a golden to light pink color and this provide high lumen
efficiency and relatively good color rendition.
17
narrow, horizontal beam that is approximately 180 degrees in the horizontal and from
15 to 30 degrees in the vertical plane.
Areas to be Lighted
1. Vehicular gate
Normally by guards inspecting credentials, as well as inspecting for contraband or
stolen property, it is critical that the area to be lighted to at least one foot-candle.
2. Pedestrian gate
should be lighted about 25 feet on either side of the gate, if possible and the range for
vehicular gates should be twice that of street lighting is recommended in these
applications but flood lights can also be sued if glare is strictly controlled.
3. Thoroughfare
used for pedestrians, vehicles or forklifts should be lighted to 0.01 foot-candles for
security purpose.
4. Parking area
5. Sensitive areas
this includes vital buildings, storage depots, and vulnerable control points in
communication, power, light and water distribution systems.
Lighting Maintenance
Periodic checks should be made on all electrical circuits. Luminaries should be cleaned
and replacement should be made as soon as possible. When eighty percent of their life
is used in sensitive areas, replacement should be made and the bulbs are used in less
sensitive locations. To do this, strict recording is necessary.
PROTECTIVE ALARMS
Another safeguard used to assist security to competent if not to supplement physical security
is an array of alarms. These alarms of various types and cost can be installed indoors or outdoors.
Basically, alarm systems are designed to alert security personnel to consummated or attempted
intrusion into an area, building or compound. Each type of alarm is activated in the event that an
intruder tampers the circuity, a beam or radiated waves. In short, intrusion alarms can be electrical,
mechanical or electronic.
Alarm systems can be installed to alert security personnel when unauthorized access is
attempted. Alarm systems work in tandem with physical barriers, mechanical systems, and security
guards, serving to trigger a response when these other forms of security have been breached. They
consist of sensors including perimeter sensors, motion sensors, contact sensors, and glass break
detectors.
However, alarms are only useful if there is a prompt response when they are triggered. In the
reconnaissance phase prior to an actual attack, some intruders will test the response time of security
personnel to a deliberately tripped alarm system. By measuring the length of time it takes for a
security team to arrive (if they arrive at all), the attacker can determine if an attack could succeed
before authorities arrive to neutralize the threat. Loud audible alarms can also act as a psychological
deterrent, by notifying intruders that their presence has been detected. In some jurisdictions, law
enforcement will not respond to alarms from intrusion detection systems unless the activation has
been verified by an eyewitness or video. Policies like this one have been created to combat the 94–
99 percent rate of false alarm activation in the United States.
DEFINITIONS OF TERMS
1. Actuator
the button, magnetic switch or thermostat that will cause system to alarm.
2. Annunciator
this is the monitor. Technically, it is the visual or audible signaling device that
indicates conditions of the associated circuits.
3. Capacitance
18
the property of two or more objects which enables them to store electrical energy in an
electroscopic field between them.
4. Capacitance Proximity Sensor
records a change in capacitance or electrostatic fields to detect attempted penetration
into safer or storage cabinets.
5. Conductor
material which transmit electric current; examples are wire and cable.
6. Control unit
the terminal box for all sensors.
7. Fail-Safe
a term applied to a system designed so that if a component fails to function properly,
the system will signal or otherwise indicate its capacity.
8. False alarm
Activation of sensors for which no cause can be determined,
9. Intrusion Detection System
the combination of components including sensors, control units, transmission lines and
monitor units integrated to operate in a specific manner.
10. Intrusion detection Sensors
devices that initiate alarm signals by sensing the stimulus, change or condition for
which designed.
11. Local Audible Alarm
an electric bell for outdoor use in the vicinity of the protected area.
12. Microwave Sensor
a radio or radar frequency (RF) transceiver having a frequency range of GHy(billion
cycles per second) which detect motion.
13. Monitor
a device that senses and reports in the condition of a system.
14. Monitor Sensor
detects movement inside the area to be protected.
15. Passive Ultrasonic Sensor
detects the sounds of forced entry throughout walls, ceiling and doors.
16. Penetration Sensor
detects entry through doors, windows, wall or any other openings into the protected
area.
17. Photoelectric System
consist of 2 separate units; (a) transmitter, (b) receiver. An interruption of light beam
transmitted to the receiver causes alarm.
18. Ultrasonic
the frequency range of sound that is above the capabilities of normal human hearing. In
intrusion detection systems, it usually varies between 21,500 and 26,000 Hy (cycles per
second)
19. Ultrasonic Motion Sensor
detect the frequency systems, it usually shifts the motion of an intruder inside the
protected area.
20. Vibration Sensor
detects forced entry through metal barriers placed over windows and ventilators or
attempts to drill saw or cut through walls, ceilings, floors, or doors.
19
windows can be equipped with magnetic or spring activated contacts, which will sound
an alarm when the door or window is opened.
2. Photoelectric or Electric Eye Device
a light beam is transmitted at a frequency of several thousand per second. It is
connected by a wire to a control station and when an intruder crosses the beam, he
makes contact with the photo electronic coil which thus activates the alarm.
3. Audio Detection Device
Supersensitive microphone speaker sensor is installed in walls; ceiling and floors of the
protected area of any sound caused by attempted forced entry inspected by the sensor.
4. Vibration Detection Device
the vibration sensitive sensor is attached to walls, ceiling or floors of the protected
areas. The sensor detects any vibration caused by attempted forced entry.
5. Microwave Motion Detection Device
a pattern of radio waves is transmitted and partially reflected back to antenna. If they
strike a moving object, they return at a different which result in initiating an alarm
signal. Very effective for protection of interior areas.
6. Foot Rail Authority
placing the front of their foot to engage the activation bar places foot rail activator on
the floor in such a position that tellers may activate the alarm. Foot rails do not acquire
any obvious use of the teller’s hand and their hands may be kept in full view of the
robbers for reason of safety. Because foot rail can be activated very obtrusively and
safety, it is frequently found in the banks where tellers normally operate while standing
up. The disadvantage with platform shoes, itchy feet or using brooms and other articles
will often in advertently cause a false alarm.
7. Bill Traps
Bill traps or currency activation devices are usually placed in the teller’s cash drawer
and connected to the alarm system using wire connector. When currency is removed
from the devices, the alarm is activated. The advantage of these devices is that the
robbers frequently remove the currency and activate the alarm. This is particularly
helpful when the employees are immediately forced to leave their station without
having an opportunity to activate the alarm safely.
8. Knee or Thigh Button
These are installed inside the desk or teller station so they can be activated by knee or
thigh pressure. They are commonly found in location where personnel usually perform
their duties from a seated position.
9. Foot Button
Like the foot rail permit alarm activation safety while both hands remain clear in view
of the robbers.
10. Double Squeeze Buttons
Pressure is required on both side of the device and therefore the probability of
accidental alarm is reduced.
ALARM
It is an aural or visual signal given by the annunciator to security when intruder actuates
device in a detected area. An annunciator is a visual or audible signaling device which
initiates conditions of associated circuits.
Concept of Alarm
Alarm devices are physical safeguards used to assist security but not a replacement in the
protection sets and lives in the installation. It assists the guards to extend their hearing and
vision even in areas where they are not physically present.
TELECOMMUNICATIONS
21
Any process which enables a telecommunication to relay and receive voice data, electronic,
messages, written or printed matter, fixed or moving pictures, words, music or visible or
audible signals or any control signals of any design and for any purpose by wire, radio or
other electromagnetic, spectral, optical or technological means.
1. Broadcasting
An undertaking the object of which is to transmit over-the-air commercial
radio or television messages for reception of a broad audience in a geographic
area.
2. Franchise
A privilege conferred upon a telecommunications entity by Congress,
authorizing that entity to engage in a certain type of telecommunications
service.
22
Results from the development of technically sound cryptosystem, their proper use and
application of proper crypto techniques.
LOCK
a mechanical, electrical, hydraulic or electronic device to prevent entry into a building,
room, container or hiding place and to prevent the removal of items without the consent of
the owner.
PETERMAN
An English term used to describe a lock picker.
TYPES OF LOCKS
1. Key Operated Mechanical Lock
it uses some sort of arrangement of internal physical barriers (wards tumblers) which
prevent the lock from operating unless they are properly aligned. The key is the device
used to align these internal barriers so that the lock may be operated.
2. Padlock
a portable and detachable lock having a sliding hasp which passes through a staple ring
or the like and is then made fast or secured.
3. Combination Locks
are difficult to defeat, since they cannot be picked because few experts can manipulate
the device to discover the combination. Most of these locks have three dials, which
must be aligned in the proper order before the lock will open. Some locks may have
four dials for greater security.
4. Code – Operated Locks
These are combination-type locks and that no key is used. Pressing the series of
numbered button in the proper sequence opens them. Some of them are equipped to
alarm if wrong sequence is pressed. These are high security locking device.
5. Electrical Lock
a type of lock that can be opened and closed remotely by electrical means.
6. Card – Operated lock
a type of lock operated by coded card.
TYPES OF KEYS
1. Change Key
a specific key, which operates the lock and has a particular combination of cuts, or
biting, which match the arrangements of the tumblers in the lock.
2. Sub-master Key
A key that will open all the lock within a particular area or grouping in a particular
facility.
3. Master Key
A special key that will capable of opening a series of locks.
4. Grand Master Key
a type of key that will open everything in a system involving two or more master key
groups.
KEY CONTROL
Once an effective key control has been installed, positive control of all keys must be gained
and maintained. This can be accomplished only if it is in conjunction with the new locking
devices. The following principles can be utilized to maintain effectively key control;
1. A key depository for securing key during non-working should be centrally located,
locked and kept under the supervision of security personnel.
2. Key issued on daily basis, or basis, or this issued for a specific on-time purpose,
should be accounted for daily.
3. Key should be counted and signed for by the security supervisor at the beginning of
each working day.
4. When the key is lost, the circumstances should be investigated and set forth in
writing. In some instances, If the lost key provides access to sensitive area, Locks
should be changed.
5. All keys should be physically inspected periodically to ensure that they have not
been lost through unreported such.
6. Careful record should be kept of such issuance. The list should be reviewed
periodically to determine whether all those authorized should continue to hold such
key.
24
7. Master key should be in minimum. If possible, sub-master key should be used, and
they should be issued only to a limited list of personnel especially selected by the
management.
8. Key should be not marked or should not identify doors of locks they can open. Code
should be made to this effect.
9. Master keys should be marked identifying them as a master key.
10. Keys and locks should be changed at least once in 12 months.
11. Key should be accessible only to those whose official duties require access.
12. Combination to safe locks and padlocks securing containers for classified
information should be changed at least once each twelve (12) months and at earliest
during:
a. Loss or possible compromise.
b. Discharge suspension or reassignment of any person having knowledge of
combination.
c. Receipt of a container with build in combination lock.
d. More frequent rotation of key padlocks may be required in certain instances.
e. In selecting combination numbers, multiples and simple ascending or
descending arithmetical series should be avoided.
f. Records containing combination should be placed in the same security
classification as the highest classification of the material authorized for storage in
the container which the lock secures.
g. Use of keys must be based on the same general concept as applied to safe
combinations.
h. Inventories of key system should be conducted at least annually.
13. When key is issued the ff should be recorded: key number, name of person, his
position, date of issuance, any other relevant data.
25
ART. 305 FALSE KEY
The term false key shall be deemed to include;
a. the tool mentioned in the next proceeding articles.
b. genuine keys stolen from the owner.
c. Any key other than those intended by the owner for use in the lock forcibly open by the
offender.
LOCK PICKING
Is the art of unlocking a lock by analyzing and manipulating the components of the lock
device without the original key. Although lock picking can be associated with the criminal
intent, it is an essential skill for locksmith. Lock picking is the ideal way of opening a lock
without the correct key, while not damaging the lock, allowing it to be rekeyed for later use,
which is especially important with antique locks that would be impossible to replace if
destructive entry methods were used. The move towards combination locks for high
security items such safes was intended to remove the weakest part of the locks: its keyhole.
SOME TYPES OF PICK LOCKS
1. Tension wrench
often called a torque wrench, is used to apply torque to the plug of a lock; in order to
hold any picked pins in place. Once all pins are picked, the tension wrench is then used
to turn the plug and open the lock. It is typically shaped like a letter “L”, although the
vertical part of the letter is elongated in the comparison to the horizontal part.
2. Feather touch wrench
are coiled into a spring at the bend in the “L” ; which helps the user apply constant
torque. Some users however, maintain that such wrenches reduce torque control and
the feedback available to the user.
3. Ball Pick
similar to half diamond pick, except the end of the pick has a circular shape. This pick
is commonly used to open wafer locks.
4. half-diamond pick
the most basic and common pick, this versatile pick is included in all kits and is mainly
used for picking individual pins, but can also be used for raking and for wafer and disk
locks. The half diamonds are usually o.1 to o.5 inches long. Each of the ends of the
triangular half diamond of this pick can be either steep or shallow in angle, depending
on the need for picking without affecting neighboring pins, or raking as appropriate. A
normal set could compromise around three half diamond picks and a double pick.
5. Hook Pick
is similar to the half diamond pick but has a hook shaped tip rather than a half diamond
shape. The hook pick is sometimes referred to as a feeler or finger and is not used
raking. This is the most basic pick picking tool and is all that a professional will
usually need if the lock is to be picked in the traditional sense rather than opened by
raking or using a pick gun. A variety of different sized and shaped hooks will be
available in normal set.
6. Rake Pick
this pick, such as the common snake rake are designed to rake pins rapidly by sliding
the pick past all the pins, repeatedly, in order to bounce the pins until they reach the
shear line. This method requires much less skill than picking pins individually and
generally works well on cheaper locks. When the pins are excited, they bounce all
around the shear line and with the skillful application of a tension tool this is the easiest
way to pick a lock. This is also how beginners start. Advanced rakes are available
which are shaped to mimic various different pin height key positions and are
considerably easier to use than traditional rakes. Such rakes are typically machined
from a template a common key configuration, since not all permutations of pin heights
for adjacent pins are possible given the process by which keys are manufactures.
7. Slagel Pick
26
The rarely used slagel pick is mainly used for opening electronic locks. It is often made
with small magnetic regions. The Slagel pick is named after James Slagel, a leading
security technician for IBM. The Slagel pick works by selectively pulling internal parts
of the lock to the correct positions.
8. Decoder Pick
is a key which has been adapted such that the height of its notches can be changed,
either by screwing them into the blade base or by adjusting them from the handle while
the key is in the lock. This will allow not only access to the lock but also a template for
cutting a replacement key.
9. Bump keys
the simplest way to open the majority of pin locks is to insert a key (or variety of keys)
which have been but so that each peak of the key is equal and has been cut down to the
lowest groove of the key. This key is then struck sharply with a hammer whilst
applying torque, the force of the blow is carried down the length of the key and will
force the top pins only to jump above the shearling leaving the bottoms pins in place.
Some modern high security locks include bumping protection such as a false setting
pins and impact absorbent foam
10. Warded Pick
also known as skeleton key, used in opening warded locks. Generally made to conform
to a generalized key shape relatively simpler that the actual key used to open lock; this
simpler shape allows for internal manipulations. This style of pick can also be used to
rip the lock. This is where the pick is placed at the back of the lock and then pulled out
in one sharp fast ripping action. The keys for warded locks only require the end section
which actually open the locks. The other parts are there to distinguish between different
variations of their locks.
11. Pick Guns
Often see in movies in the tool box of locksmiths, manual and electronic guns are a
popular method used today for quick and easy ways of opening doors. The higher end
electric pick guns are usually made of aircraft aluminum and hard steel. The pick is
operated by simply pressing a button that vibrates while the normal tension wrench is
being used. A manual pick gun (snap gun) is used in a similar way but usually has
trigger that creates a movement which (like bump keys) operates on the same principle
as Newton’s cradle. It transfers sudden energy to the key pins which communicate this
to the driver pins causing those pins only to jump, allowing the cylinder to turn freely
for a brief moment, until the pin springs return the pins to their locking position. A pick
gun is used in conjunction with a tension tool and the only skill required here is
learning the timing.
PROTECTIVE CABINET
The final line of defense at any facility is in the high security storage area where records,
papers, plans or cashable instruments, previous metals or other especially valuable assets are
protected, these security cabinets will be of a sized and quantity which the nature of the business
dictates.
VIDEO SURVEILLANCE
Surveillance cameras can be a deterrent when placed in highly visible locations and are useful
for incident assessment and historical analysis.
For example, if alarms are being generated and there is a camera in place, security personnel
assess the situation via the camera feed. In instances when an attack has already occurred and a
camera is in place at the point of attack, the recorded video can be reviewed. Although the term
closed-circuit television (CCTV) is common, it is quickly becoming outdated as more video systems
lose the closed circuit for signal transmission and are instead transmitting on IP camera networks.
Video monitoring does not necessarily guarantee a human response. A human must be
monitoring the situation in real time in order to respond in a timely manner; otherwise, video
monitoring is simply a means to gather evidence for later analysis. However, technological advances
like video analytics are reducing the amount of work required for video monitoring as security
personal can be automatically notified of potential security events.
ACCESS CONTROL
Access control methods are used to monitor and control traffic through specific access points
and areas of the secure facility.
This is done using a variety of systems including CCTV surveillance, identification cards,
security guards, biometric readers, and electronic/mechanical control systems such as locks, doors,
turnstiles and gates.
CHAPTER 3
SECURITY GUARD FORCE SYSTEM
SECURITY GUARD FORCE
A group of forces of men selected, trained or grouped into functional unit for the
purpose of protecting operational process from the disruption which would impede
efficiency or halt operations at a particular plant, facility, installations or special
activity.
SECURITY GUARD
Any person who offers or renders personal service to watch or secure either a residence
of business establishment or both buildings, compounds or areas, inspects/monitor
bodily checks/searches individuals and or baggage and other forms of security
inspection, physically or manually or scientifically by T.V. monitors, including not
limited to, logging concessions and agricultural mining or pasture lands, for hire or
compensation or, as an employee thereof, including any employee or national or local
government or agencies instrumentally thereof and/or government buildings,
compound premises and other properties, other than member of the armed forces of the
Philippines, guars of BOP, Provincial Guards and member of the PNP or of any other
enforcement agency of the government.
He may serve as a sub-contractor of a private security agency which is under service
contract with a client and shall serve as basis of “No Work No Pay” and whose security
of tenure is co-terminus of the service contract between the PSA and the client.
CHAPTER 4
SALIENT FEATURES OF PRIVATE SECURITY AGENCY LAW (RA 5487)
AND OTHER LEGAL BASIS
The act that regulates the organization and operation of private detective, watchman and
security guard agencies in the Philippines. Approved on October 3, 1972.
DEFINITION OF TERMS
1. Person
shall include not only natural but also juridical person such as single proprietorship,
partnerships, corporations, companies or associations, organized and registered with
the Securities and Exchange Commission an or Department of Trade and Industry.
2. Private Detective
31
Any person who does detective work for hire, rewards or commission, other than
member of the armed forces of the Philippines, guards of the Bureau of Prisons,
provincial guards and member of the Philippine National Police or any other Law
Enforcement Agency of the Government.
3. License to Exercise Profession or License Certificate
Any document issued by then Philippine National Police or his duly authorized
representative recognizing a person to be qualified to perform his duties as security
guard or detective.
4. License to Operate
A document issued by the Philippine National Police or his duly authorized
representative authorizing a person to engage in the occupation, calling or employment
as security guard or detective or juridical person to establish engage, manage or operate
an individual or a detective agency or private security agency/company force after
payment of the prescribed dues to fees .
5. Watchmen/Security Guard
person who offers or renders personal service to watch or secure either residential or
business establishment or both or any building, compound or area for hire or
compensation or as an employee thereof.
6. Security Agency
any person, association, partnership or corporation who recruits, trains,
muster ,furnishes, solicit individuals or business firms, private or government owned or
controlled corporation to engage his services or those of its watchmen.
7. Private Detective Agency
is any person who for hire or reward or on commission conducts or carries on or holds
himself out as conducting or carrying on a detective agency or detective service.
8. Permit
a document issued by the CPNP or his duly authorized representative recognizing a
person or persons to be qualifying to obtain license certificate.
9. License
A document issued by CPNP or his duly authorized representatives authorizing a
person to engage in the occupation calling or employment of watchmen, security guard,
private detective after payment of dues of fees.
10. Security Guard
Refers to any person who offers or renders personal service to watch or secure a
residence, business establishment, building, compound, any other are or property; or
inspects, monitors or performs body checks or searches of individuals or baggage and
other forms of security inspection.
11. Private Security Personnel
refers to natural persons, including private detectives, security consultants and security
officers, employed by private security agency firm, to render and/or detective services.
12. Right to Control
refers to the right reserved to the Security Service Contractor to determine not only the
end to be achieved as required by the principal, but also the manner and means to be
used in reaching that end within the limits of the law.
13. Security Service Contractor (SSC)
is synonymous with Private Security Agency (PSA) which refers to any person,
association, partnership, firm or private corporation engaged in contracting,
recruitment, training, furnishing or posting of security guard and other private security
personnel to individuals, corporations, offices and organizations, whether private or
public, for their security needs as the PNP may approve.
14. Service Agreement
refers to the contract between the principal and the SSC/PSA containing the terms and
conditions governing the performance or completion of security service hob or work
being farmed out for a definite or predetermined period.
32
15. Solidarity Liability
refers to the liability of the principal, in the same manner and extent that he/she is liable
to his/her direct employees, to the extent of the work performed under the contract
when the SSC/PSA fails to pay the wages of his.her employees, as provided for in
Article 106 of the Labor Code as amended.
16. Total Contract Cost
refers to the payment of wage and wage related benefits including social welfare
benefits of security guards and other private security personnel in conformity with the
standard computation of the DOLE using the form prescribed in the guidelines.
17. Trilateral Relationship
refers to the relationship in contracting or subcontracting arrangement where there is a
contract for specific job, work or service between the principal and the SSC/PSA and a
contract of employment between the latter and its security guards. There are three (3)
parties involved in these arrangements; the principal who decides to farm out a security
job, work, or service to a security service contractor, the SSC/PSA who has the
capacity to independently undertake the performance of the security job, work or
service and the security guards and other private security personnel engaged by the
SSC/PSA to accomplish the security job, work, or services.
An elective or appointive government employees who may be called upon on account of the
function of their respective offices in the implementation and enforcement of the provision of
RA 5487 and person related to such government employees by affinity or consanguinity in the
third civil degree shall not hold any interest, directly or indirectly in any security guard agency.
(As amended by Pres. Decree No. 11.)
WHO CAN ISSUE RULES AND REGULATIONS TO CARRY OUT THE PURPOSE OF RA
5487?
the chief PNP, in consultation with the Philippines Association of Detective and Protective
Agency Operators.
34
Provided, That foreigners who are already employed as watchmen or security guards prior to
the approval of this Act shall not be subject to the above-mentioned requirements: Provided,
further, That veterans shall be given priority in employment as security guard, watchman or
private detective: And provided, finally, That person convicted of any crime involving moral
turpitude shall not be employed as security guard, watchman or private detective.
PAYROLL
35
Private Security agencies shall prepare payrolls with the name of the security guards
arranged alphabetically and numbered consecutively. These payrolls shall be
personally signed by the payees only after receipt of the amount shown therein.
Separated payrolls for distant detachments/post shall be prepared and similarly signed
by the payees or his duly authorized representatives as the case maybe. Payrolls shall
be filed with the main office within fifteen (15) days after pay day. The use of payroll
form shall be in accordance with the standard format as prescribe by law.
EMPLOYMENT STATUS
EMPLOYER-EMPLOYEE RELATIONSHIP
The SSC/PSA is the employer of its security guards and other private security
personnel on duty detail to a principal or client under a service agreement
PROBATIONARY EMPLOYMENT
The probationary period of newly-hired security guard and other private security
industry shall not exceed six (6) months. While engaged on probationary basis, their
services may be terminated for failure to meet reasonable standards or criteria made
known by the SSC/PSA to the security guards and other private security personnel at
the time of their engagement or for any just cause contained in the probationary
contract.
REGULAR EMPLOYMENT
Any security guard or other private security personnel who is allowed to work after the
probationary period or in the absence of a valid probationary contract shall be
considered a regular employee. Security guards and other private security guards and
other private security personnel affected by repeated hiring-firing-rehiring scheme for
short periods of time, the aggregate duration of which is at least six (6) months, shall be
considered regular employees.
WHERE TO FILE?
PNP SAGSD
36
GRADUATE SCALE OF LICENSE FOR PRIVATE SECURITY/DETECTIVE
AGENCY
1. PSA’s with temporary license to operate having 200 – 1000 guards shall be issued a regular
license to operate good for two years.
2. New PSA’s – issue temporary license good for 1 year.
POSSESSION OF LICENSE
The individual license shall be carried by the security guard or private detective at all times
while in the performance of his duty.
For Individual
a. One hundred pesos (100) per year for security consultant, officer and private
detectives
b. fifty pesos (50) per year for SG’s
SURETY BOND
Secured at any Reputable Insurance Company
a. Agency with 1-199 guards – 50,000
b. agency with 200-499 guards – 100,000
c. Agency with 500-799 guards – 150,000
d. Agency with 800-1000 guards – 200,000
No Regular License shall be granted to any Private or Company Security force unless it
has under its employ the following number of duly licensed security guards;
a. Private security agencies – 200 – 1000
b. Company security force – 30 – 100
FEMALE UNIFORM
a. made of thick fabric
b. modified overseas cap similar to the women of PNP
37
c. service skirts, blouse, service belt and black leather shoes.
d. The color of service shirt shall be fast navy blue, light blue or white for PSA’s lady
guard, Light gray for Company lady guard and white for government lady guard.
e. It shall be made of thick fabric, short sleeves, shoulder straps, tow breasts pockets
with cover flaps and navy-blue front buttons, tucked in.
TYPES OF UNIFORM
1. TYPE A - GENERAL SERVICE UNIFORM
As the standard uniform to be used by all posted private security personnel
during their day to day duties and functions unless otherwise specifically
provided below.
MALE SECURITY GUARD
a. Headgear
Pershing cap, navy blue cap with black strap, black visor and
navy blue nylon net top, and with prescribed SOSIA metal cap
device. It shall be the daily headgear of security guards.
b. Upper Garment
Blue or white gabardine polyester fabric and shall be sewn short
or long sleeves, as the case maybe, shoulder tab, two breast
pockets with pocket flaps and white buttons for white uniform
and navy blue buttons for navy blue uniform with zipper inside
and with two shoulder loops. The upper Garment shall include
the following;
b.1. Name Cloth
shall include the surname and the initials of first and
middle name and shall be 4 3/8” x 1” with white
background for white uniform and yellow background
for navy blue uniform and navy blue “Arial” font (1.5
cms) and border.
b.2. Agency Name Cloth
Shall be the same size and color as b.1.
b.3. SOSIA patch
as prescribed by SOSIA, in sublimation
b.4. Agency Patch
as appropriate
b.5. National Badge
Shall be brass and placed in loop above the left breast
pocket
b.6. SOSIA Collar Device
Placed at the left and right collar approximately 1/2 inch
from the edge
b.7. Whistle with Chain
One end clipped at the left shoulder loop and the other
end placed at the left breast pocket flap.
b.8. Undershirt
Shall be plain white v-neck
b.9. Necktie and necktie clip
Optional
NOTE
38
In the event that the government makes a pronouncement on the wearing of
appropriate light materials by government workers during the summer months
of March, April and May, SOSIA may issue similar pronouncement allowing
security personnel of “summer uniform” in luie of the upper garment with
white collared shirt as may be provided for through a resolution.
c. Lower Garment
Navy blue, straight cut trouser, with side pockets and two back
welt pockets with button.
c.1. Notebook - shall be small enough to fit in the back welt pocket
c.2. Writing pen
c.3. Handkerchief - shall be white in color
c.4. Inner Belt - shall be blue with skeleton brass buckle
d. Service Belt
It shall be black in color, leather, to be used as leather pistol belt
measuring 1 3/4 inches.
d.1. Regulation Service Buckle - shall be brass depicting a SOSIA
logo
d.2. Belt Clips
d.3. Ammo Holder
d.4. Handcuffs with holder
d.5. Nightstick/baton with holder
d.6. Flashlight with holder
d.7. First Aid Kit/Pouch (optional)
d.8. Teargas with holder
d.9. Radio with holder
d.10. Holster
e. Foot Wear
PNP patrol shoes type or clarino to be worn with plain block
socks.
39
FOR SECURITY OFFICER
a. Headgear
pershing cap, navy blue cap with yellow band/strap, black visor and navy
blue nylon net topw with prescribed SOSIA metal cap device. It shall be
the daily headgear of security officers.
b. Upper Garment
White or navy blue gabardine polyester fabric and shall be sewn short
sleeves, shoulder tab, two breast pockets with three-pointed curved pocket
flaps and white/blue front buttons, with belt loops (Front-2 and Back-1)
and 2 lower pockets with flap.
c. Lower Garment
Shall be the same lower garment of the male security guard to include its
accoutrements.
d. Belt
White or blue fabric belt (1 3/4 inches) with flat brass buckle.
e. Footwear
PNP patrol shoes type to be worn with plain block socks.
Note: Coat and Tie as an alternative to long sleeved barong subject to the
approval of SOSIA may be allowed only for the following:
a. Detachment Commander and/or Assistant Detachment Commander
b. Inspector
c. Shift-in-Charge
b. Lower Garment
shall be straight-cut black trousers (pants)
c. Footwear
shall be black military type glossy low cut shoes with black socks
d. Name Plate
shall be black with gold printing for security officer and black with silver
printing for security guard, indicating the Surname and initials of the First
and Middle Name of the security personnel and the word “SECURITY
OFFICER” for Security Officer and “SECURITY” for security guard. It
shall measure three inches in width and one inch by height (3”X1”)
41
embroidered on front left chest. Upper garment shall be worn
tucked-in.
c. Lower Garment
shall be black tactical (six-pocket) shorts and shall be above the
knee.
d. Footwear
as may be appropriate.
Heavy industrial areas and establishments where for safety issues, the personal
protective equipment (PPE) is required.
a. Head gear
shall be hard helmet
b. Upper Garment
shall be blue field tropical (SWAT - Type Designed) and shall
have four pockets with long sleeves. SOSIA logo must placed in
the upper right arm while PSA logo must be place at the upper
left arm. The name cloth of security guard must be placed on the
upper right breast pocket and the PSA name on the left over the
flap of the left breast pocket Orange Bikino-Type/Skeleton Type
reflectorized vest shall be worn indicating name of agency in
front and the word SECURITY at the back.
c. Lower Garment
shall have six pockets and ticked inside the boots. (Balloon Type)
d. Footwear
Shall be combat boots or steel toe shoe.
Traffic Personnel
a. Head gear
shall be the prescribed Type “A” Head gear or matte black
stetson hat with silver/gray trims.
b. Upper Garment
shall be the upper garment of the Type A uniform with orange
bikini-type reflectorized vest indicating the name of agency in
front and the word SECURITY at the back.
c. Lower Garment
shall be the same lower garment of the type A uniform or
“breeches” pants.
d. Footwear
shall be the same as the foot wear of Type A uniform or
motorized boots.
Historical Places
Security personnel may wear an appropriate uniform as designed by their
clients subject to the approval of SOSIA in coordiantion with National
Historical Institute.
Protection Agents
shall wear barong and civilian clothes, unless another uniform is
prescribed by SOSIA.
Canine Handlers
as prescribed under SOSIA Resolution no 01-2012
Armored Security Personnel
as prescribed under SOSIA resolution no. 01-2012 and SOSIA Resolution
03-2012.
42
Quick Response Team (QRT) Personnel
same uniform as prescribed for armored security personnel under SOSIA
resolution No. 01-2012 and SOSIA resolution 03-2012.
a. Headgear
Pershing cap, navy blue cap with black strap, black visor and
navy blue nylon net top, and with prescribed SOSIA metal cap
device. It shall be the daily headgear of security guards.
b. Upper Garment
navy blue or white gabardine polyester fabric and shall be sewn
short or long sleeves as the case maybe, shoulder straps, two
breast pockets with cover flaps and navy blue or white front
buttons.
c. Lower Garments
Navy blue color, straight cut, slanted pockets and two back
pockets with cover flaps.
d. Belt
it shall be black in color, leather, to be used as pistol belt
measuring four and one-half centimeters in width.
e. Footwear
black leather shoes with rubber heels and soles plain top lo cut
and black shoelace to be worn with plain black socks.
NOTE
43
Not exceeding one firearm for every 2 security guards in its employ.
CONDITIONS
1. Private security agency with 100 guards
initially procure at least 30 pieces of licensed firearms.
after six months of operation – can procure licensed firearms in proportion to number
of guards.
2. Private security agencies applying for regular license to operate shall possess at least 70
pieces of firearms.
3. Use of Private detective agency of firearms is optional.
EXCEPTIONS
When Private Security Agency or company’s security force guards are operating in an
upsurge of lawlessness and criminality.
Contents of DDO
a. Name, Address and Telephone number of Agency
b. Issue serial number and date of the DDO
c. Complete name and designation of grantee
d. Purpose
e. Inclusive dates of detail
f. Firearms description and license number
g. Authorized uniform to be used
h. Other specific instructions or remarks and
i. Signature and designation of issuing officer.
MISSION ORDER
A written instruction issued by the agency to its guard to perform activity at specific
time, place and date. It shall include the name and serial number of the firearms issued
to the guard and the name of the officer or manager of the agency.
Research work
Justification for confiscations of firearms.
STOCKING OF AMMUNITION
not exceed a basic load of 50 rounds of ammunition per unit
25 rounds for every security guard.
3. SECURITY GUARD
a. Security guard 1
watchman/guard
b. Security guard 2
Shift in-Charge
c. Security guard 3
Post in-charge
4. Security Consultant
optional
CLASSIFICATION OF TRAINING
1. Basic Security Guard Course
Pre-licensing Course (150 hours)
2. Re-training Course
renew license (48 hours)
3. Security Officers Training Course
For Security supervisor/officer license (300 hours)
4. Basic Security Supervisory Course
for supervisory positions (48 hours)
5. Security Supervisor Development Course
present holder of Supervisory positions (48 hours)
PROHIBITIONS
1. No agency shall offer, render or accept services in gambling dens or other illegal business
establishments or enterprises. The extent of the security service being furnished by securing
agency shall not get beyond the compound or property of the person or establishment
contracting the security service except when the security guard is escorting big amount of
money or valuables or in hot pursuit of criminal offenders.
2. No watchman, security guard or private detective shall serve as body guard of any person.
3. “kabit system” operators – No licensed security agency shall operate, promote and enter into
an agreement of “merger” (kabit system) with any person or a group of persons for the purpose
of organizing a branch unit or subsidiary under separate control and ownership.
INSPECTION
1. Pre-Licensing Inspection
no inspection is required when an application secures a temporary license to operate a
private security agency. However, no regular license shall be issued unless prior
inspection is conducted on the applicant agency. The purpose of such inspection is to
determine whether the applicant agency and the personnel thereof have complied with
the provisions of republic act 5487, as amended and it’s implementing rules and
regulations.
2. Post-licensing Inspection
All licensed private security/detective agencies shall be inspected periodically. The
objectives of such inspection is to ascertain whether the provisions of republic act
5487, as amended and tis implementing rules and regulations are compiled with and to
further ascertain and analyze the over all performance of the agency, effect corrections
of defects noted on the spot, and to recommend to the manager or operator of the
agency appropriate measures to improve the agency operation.
WORK STOPPAGE
a condition of an enterprise whereby normal work operation is stopped as a result of a
strike and lockout.
STRIKE
temporary stoppage of work concerted by action or employees as a result of current
labor industrial dispute
LOCK OUT
is a temporary refusal of any employer to furnish work unless employees accept certain
conditions.
Research Works:
Research RA 5487 Policies in times of lock outs
Eleven GeneralSecurity guards creed
CHAPTER 5
PERSONNEL SECURITY INVESTIGATION
PERSONNEL SECURITY
Includes all security measure designed to prevent unsuitable individuals or persons of
doubtful loyalty to the Government, from gaining access to classified matter or to any
security facility, and to prevent appointment, or retention as employees of such
individual.
It is also considered as the most important aspect of security. This is for the simple
reason that security involves people both as asset to be protected and as source of
security threats. It is an acknowledge fact that losses are attributed mainly to
negligence or active participation of employees, either through theft and sabotage. This
emphasized the need to set up a system of hiring the people for the company
47
A process of inquiry into the character, reputation, discretion, integrity, morals and loyalty of an
individual to determine the suitability for appointment or access to classified matter.
2. Positive Vetting
The process of inspecting or examining with careful thoroughness. The essence of
vetting is that a personal interview conducted under stress. It is based on information
48
previously given by the applicant. Other information is sued during the interview, such
as those discovered BI which confirms or denies this given by the applicant.
3. Profiling
A process whereby a subject’s reaction in a future critical situation is predicted by
observing his behavior, or by interviewing him, or analyzing his responses to a
questionnaire, such as honesty test. The reid report is an example of an honesty test.
4. Deception Detection Techniques
A process of using devices in detecting deception during the interview stage. This
includes the use of polygraph, Psychological Stress Evaluator and Voice Analyzer.
5. Financial and Lifestyle Inquiry
A type of investigation that seeks to gather information on income and mode of living,
sometimes referred to as the earning to debt ratio.
6. Undercover Intelligence
The placement of an agent in a role in which the agent’s true identity and role remains
unknown, in order to obtain information for criminal prosecution or for recovery or
limitation of asset losses.
7. Exit Interview
This is a valuable tool because it gives departing employees an opportunity to list
grievances. It offers security managers an opportunity to learn problems not previously
known. Incorporating a checklist of company-issued property and confronting a
departing employee of this has resulted in reducing losses of company property.
Debriefing an employee is also incorporated into the exit interview to remind
employees of their continuing legal obligation to safeguard confidential company
information.
Photography
extreme caution must be exercised in areas where classified information is displayed to
preclude unauthorized taking of pictures of the installation.
50
SECURITY EDUCATION
It is conducted to develop security awareness among employees of the company. It
should cover all employees, regardless of rank or position.
OBJECTIVES
1. Guidance for all supervisory and executive levels of the organization.
2. A mandatory indoctrination on security for all new personnel before their assignment to their
respective jobs.
3. Development of a high degree of security consciousness among the selected supervisors and
other key personnel in a program that should be continuing and supported by top management,
4. A down-the-line security program aimed at instilling consciousness and dedication through
demonstration, lectures, motivations and suggestions.
5. To let all employee force be informed that they all belong to the organization and that non-
awareness to the security program is tantamount to disloyalty.
6. That the program is also to develop discipline, loyalty and belongingness.
3. Refresher Conference
A design to remind employees of the company about their responsibilities, review the
guidelines and policies introduction of new policies and regulations and a moment
getting employees feedback about the company policies that is being implemented.
4. Security Reminders
A phase which employs an indirect approach of educating the employees such as a
posting security poster and distributing fliers.
5. Security Promotion
The act of emphasizing the importance and role of security achieving the company
goals and objectives. It involves securing employee cooperation and support.
CHAPTER 6
DOCUMENT AND INFORMATION SECURITY
1. Document Security
It involves the protection of documents and classified papers from loss, access by
authorized persons, damage, theft and compromise through disclosure.
2. Classified Information
Includes all information concerning document, cryptographic devices developed
projects and materials following on the categories of Top Secret, Confidential,
Restricted, Secret, Unclassified.
3. Classified Matter
It refers to any information or material or of any nature, the safeguarding of which is
necessary in the interest of security and which is classified for such purpose by the
responsible classifying authority.
51
4. Classify
This refers to the assigning of information or material, one of the four security
categories after determination has been made that the information requires the security
protection as provided.
5. Declassify
The act of removing the security classification from classified information or matter.
6. Reclassifying or Regarding
Refers to the act of changing the assigned classification from classified information or
matter.
7. Upgrading
it refers to the act of assigning the information or matter to the higher classification
than that of previously assigned to it.
8. Compartmentation
It refers to the grant of access to the classified matter only to properly cleared
information is required in their performance of their official duties.
9. Need to Know
it is the dissemination of classified information or matter to be limited strictly to those
people whose duties requires knowledge or possession thereof.
10. Unauthorized
it refers to any person not authorized to have access on classified matters.
11. Compromise
This takes place through the loss of security which results from unauthorized persons
obtaining knowledge of classified matters.
12. Damage to National Security
It refers to prejudice, embarrassment or injury to the country resulting from the act or
omission.
KINDS OF DOCUMENTS
1. Personal
Letters, Diary and notebooks. These should be treated usually the same with official
document.
2. Official
orders, manuals, letters, overlays maps and magazines. Careful and follow the chain of
command.
3. Public
DOCUMENT OR INFORMATION CYCLE
1. Creation
2. Classification
3. Storage
4. Retrieval
5. Retention/Purging
6. Transfer
7. Disposition
CATEGORIES OF DOCUMENT
1. Category A
Information which contains reportable time sensitive, order of battle and significant
information.
52
It should be given priority because it is critical information.
It must be forwarded without delay.
It is critical to friendly operations
It requires immediate action.
2. Category B
Anything that contains communications, cryptographic documents, or systems that
should be classifies as secret and requires special handling.
Higher authorities should declassify it.
3. Category C
Other information which contains something that could be an intelligence value.
Contains exploitable information regardless of its contents.
Unscreen materials or documents
4. Category D
No value.
No decision must be made at the lower echelon that document has no value. It is the
responsibility of the higher headquarters.
THREE SECURITY CONCEPTS
1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel conscious and realize the value of
document.
3. Training is necessary for the practice of the “Need to Know” principle.
FOUR TYPES OF CLASSIFIED MATTERS
1. Top Secret (green)
Any information and materials, the unauthorized disclosure of it would cause
exceptionally grave damage to the nation, politically, economically and military
operation.
2. Secret (red)
It is any information and material, the unauthorized disclosure of it would endanger
national security, causes serious injury to the interest and prestige of the nation of any
government activity.
3. Confidential (blue)
It is any information or material, the unauthorized disclosure of it would be prejudicial
to the interest and prestige of the national or governmental activity or would cause
administrative embarrassment or unwanted injury to and be of advantage to a foreign
country.
4. Restricted (White)
Any information and material which requires special protection other than those
determines confidential, secret, and top secret.
PROPRIETARY INFORMATION
An information that in some special way relates to the status or activities of the
possessor and over which the possessor asserts ownership. In the business community,
proprietary information relates to the structure, products or business method of the
organization. It is usually protected in some way against causal a=or general disclosure.
All proprietary information is confidential, but not all confidential are proprietary. For
example, Confidential personnel data in employee files is not considered as proprietary
although the company treats it as confidential.
53
device, or a list of customers. A trade secret is a process or device for continuous use in
the protection of the business.
2. Patents
This is a grant made by the government to an inventor, conveying or securing to him
the exclusive right to make, use or sell his invention for term of years.
CHAPTER 7
RISK ANALYSIS and SECURITY HAZARD
1. Risk
it is the potential damage or loss of an asset. The level of risk is a combination two
factors: the value placed on that asset by its owner and the consequence, impact
adverse effect of the loss or damage to that asset and the likelihood that a specific
vulnerability will be exploited by a particular threat.
2. Hazards
“exposure to the chance of loss or injury”. It is synonymous to risk or peril.
Conversely, Microsoft Encarta describes hazard as a “potential danger or something
that is potentially very dangerous.”
3. Security hazards
Any act or condition which may result in the compromise of information, loss of life,
loss or destruction of property or disruption of the objective of the installation. It can
also be defined as an act or condition affecting the safe operation of the facility caused
by human action accidental or intentional.
4. Risk Management
A process of selecting and implementing security countermeasures to achieve an
acceptable level of risk at an acceptable cost.
5. Risk Analysis
The analysis of risk includes examination of the vulnerability, probability and
criticality of potential threats and include natural and man-made risk.
6. Adversary
Refers to any individual, group, organization or government that conducts activities or
has the intention and capability to conduct activities detrimental to the individual,
private or government entity.
7. Asset
any information, facility, material, information or activity which has a positive value to
its owner whether it is an individual private or government entity.
8. Vulnerability
any weakness that can be exploited by an adversary to gain access to an asset.
9. Countermeasures
an action taken or physical entity used to reduce or eliminate one or more
vulnerabilities. The cost of possible countermeasures may be monetary, but may also
include non-monetary cost such as reduced operational efficiency, adverse publicity
unfavorable working conditions, and political consequences.
10. Probability
It is the chance or likelihood that a loss will take place.
11. Criticality
the impact of a loss as measured in financial terms.
12. Relative criticality of operation
This pertains to the importance of the firm with reference to the natural economy and
security.
Example is gasoline depots, communication transmission lines and power plants.
13. Relative Vulnerability
this is the susceptibility of the plant or establishment to damage, loss or disruption of
operation due to various hazards. A good example is the location of the building, the
machines or presence of possible poisons.
54
The extent and degree of risks to security is dependent on relative criticality of operation and
relative vulnerability.
SECURITY HAZARDS
Any act or condition which may result in the compromise of information, loss of life,
loss or destruction of property or disruption of the objective of the installation.
TYPE OF HAZARDS
1. Natural Hazard
These are hazard which arise from natural phenomena. The following are types of
natural hazards or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Fire (not cause by human action)
d. Storms typhoons, cyclones, tornado and hurricane
e. Extreme temperature and humidity.
2. Human or man-made Hazards
result of a state of mind, attitude, weaknesses or character traits of one or more persons.
They can be acts of commission or omission, both overt and covert, which can disrupt
operation of a plant or installation. The following are the types of human or man mand
hazards:
a. Carelessness – accidents and dissatisfaction
b. Disloyalty – subversion and sabotage
c. Espionage, pilferage and theft
d. Vandalism
CHAPTER 8
SECURITY SURVEY, INSPECTION AND SECURITY PLANNING
The basic instrument for determining security vulnerability is the security survey. Most
description of security surveys refers principally to checklist, audits or inventories of security
conditions.
Security System
This is the set of policies, procedures and rules and regulations designed to reduce to an
absolute minimum the possibility of espionage, sabotage and compromise of classified
information of an office or a whole establishment.
Survey
55
This term applied to the first detailed “look see” conducted by a team.
Security Survey
A critical onsite examination and analysis of an industrial plant, business, a home or
public or private institution done to ascertain the facility’s current security status, to
identify deficiencies or excess in current practices, to determining what protection is
needed and to make recommendations for improving the overall level of security that
installation. A general term that often encompasses other related procedures.
Entrance Conference
A conference or dialogue between the survey team and management officials of a plant
before security survey is conducted.
Exit Conference
A conference similar to entrance conference done after the completion of the security
survey.
Security Inspection
An important activity to ensure the integrity of the overall security programs. It
complements security survey in its attempt to prevent losses of company properties. It
is conducted for two reasons: To check on the degree compliance with the
recommended countermeasures and to determine the effectiveness and adequacy of the
countermeasures which are in effect.
Security Investigation
It is planned and organized determination of facts concerning specific loss or damage
of assets due to threats, hazards or unsecured conditions.
TOOLS OF INVESTIGATION
1. Information
Knowledge which the investigation gathers from other persons
2. Interview
The simplest questioning of a witness who has no personal reason to withhold
information.
3. Interrogation
the skillful questioning of a person who is reluctant to divulge information concerning
the offense under investigation.
4. The application of instruments and methods of physical sciences to the detection of crimes. In
other words, the sum total of the application of all sciences in crime detection otherwise known
as criminalistics.
SECURITY PLANNING
56
Security Planning
is a corporate and executive responsibility. It involves knowing the objectives of security and
the means and methods to reach those objectives or goals must then be evolved. In short,
security planning is a decision-making process.
REFERENCES
Electronic Books/Sources
A. Industrial Security Management retrieved from https://www.bigwas.com/2014/10/industrial-
security-management-reviewer.html
B. Fence retrieved from https://en.wikipedia.org/wiki/Fence
C. Physical Security retrieved from https://en.wikipedia.org/wiki/Physical_security
D. Private Security Agency Law retrieved from file:///C:/Users/user/Desktop/1(20-21)/LEAD
%203%20Introduction%20to%20Industrial%20Security%20Management/Learning%20Materials/
Notes/RA%205487%20summary.pdf
E. RA 5487 retrieved from https://www.lawphil.net/statutes/repacts/ra1969/ra_5487_1969.html
F. PD 1919 retrieved from https://www.officialgazette.gov.ph/1984/04/28/presidential-decree-no-
1919-s-1984/
G. PD 11 retrieved from https://www.officialgazette.gov.ph/1972/10/03/presidential-decree-no-11-s-
1972/
H. Departmental Order No. 150 Series of 2016 retrieved from
https://blr.dole.gov.ph/news/department-order-no-150-series-of-2016-revised-guidelines-governing-
the-employment-and-working-conditions-of-security-guards-and-other-private-security-personnel-
in-the-private-security-industry/
I. PD 442 retrieved from http://hrlibrary.umn.edu/research/Philippines/PD%20442%20-%20Labor
%20Code%20of%20the%20Philippines.pdf
J. PNP SOSIA Patch retrieved from http://philippinesecurityguard.weebly.com/blog/pnp-sosia-
patch-on-the-security-guard-uniform-memorandum
Books
A. Ajero. (2014). Industrial & Corporate Security Management. Quezon City: Wiseman’s Books
Trading, Inc.
B. The revised guidelines governing the employment and working conditions of security guards and
other private security personnel in the private security industry (2016), Department order no. 150.
57
Other Resources
A. SOSIA Private Security Personnel Uniform and Equipment Board Resolution no. 2017-001
58
WORKSHEETS
GENERAL INSTRUCTIONS
1. Read the instructions in each activities before answering. Instructions are part of the activity. Not
following the instructions tantamount to deduction of points.
2. This worksheet is not required to be printed out. You may use any pieces of paper available at
home so long as outputs should be presentable and readable. Neatness and legibility of outputs are
considered in giving scores.
59
3. Questions may be printed/ encoded or handwritten. However, it is required that all answers are to
be handwritten.
60
RUBRICS
2. Video Presentations
Content - 35%
Organization - 30%
Creativity - 35%
3. Drawings/Illustrations/Pictures
Content - 35%
Creativity - 35%
Neatness - 30%
4. Research Works
Content - 35%
Organization - 35%
Legibility/Neatness - 20%
61
ACTIVITY 1
Name: Date:
Year and Section: Score:
Instruction: Create a flow chart showing the history of Industrial Security Management in the
Philippines. (20 points)
62
ACTIVITY 2
Name: Date:
Year and Section: Score:
Instruction: Cite at least five (5) famous personalities in Industrial Security Management and
present their contribution on the table provided below. (5 points each)
63
ACTIVITY 3
Name: Date:
Year and Section: Score:
Instruction: Answer the following questions below. Limit your answers minimum of 2 sentences
and maximum of 5 sentences. (3 points each)
1. In your own words, discuss the difference between security management with industrial security.
2. In your own words, discuss the difference between target hardening with defensible space.
3. What is the role of the PNP in Industrial Security Management in the Philippines?
64
4. Is studying Industrial Security Management necessary for you as a Criminology student? Why did
you say so?
6. Discuss what does this paragraph stated under the Philippine Constitution and relate it to
Industrial Security Management. “The prime duty of the Government is to serve and protect the
people”.
65
7. Discuss what does this paragraph stated under the Philippine Constitution and relate it to
Industrial Security Management. “No person shall be deprived of life, liberty or property without
due process of law, nor shall any person be denied the equal protection of the laws”.
ACTIVITY 4
Name: Date:
Year and Section: Score:
Instruction: Cite at least 6 Types of Security and present it on the table provided below. (5 points
each)
Type of Security Definition Examples (Give at least 2)
66
ACTIVITY 5
Name: Date:
Year and Section: Score:
Instruction: Answer the following questions below. Discuss your answers minimum of 2 sentences
and maximum of 5 sentences. (3 points each)
67
1. Discuss the difference between Physical Security and Personnel Security.
3. In your own words, what does this statement pointing out. “Security is the concern of all
personnel”.
4. What is the difference of Active Security Measures with Passive Security Measures?
68
5. Enumerate at least 3 examples of active security measures.
9. What is the difference of Enemy Agent with Traitorous person type of saboteur.
69
10. Enumerate at least 3 types of mechanical sabotage.
14. Imagine you’re an owner of a grocery store in a city. What are the measures you will be doing to
prevent being victimized by a pilferer or saboteur?
70
15. What are the factors to be considered in providing security for a establishment?
ACTIVITY 6
Name: Date:
Year and Section: Score:
Instruction: Answer the following questions below. Discuss your answers minimum of 2 sentences
and maximum of 5 sentences. (3 points each)
3. Is there such thing as “impenetrable barriers”? Why did you say so?
71
4. Differentiate natural surveillance with video surveillance?
6. Cite at least three (3) examples of buildings exteriors or the second line of defense.
7. Cite at least three (3) examples of Interior controls or the third line of defense.
72
9. What are the purposes of perimeter barrier?
10. Does installing physical security to your establishment ensures security? Why did you say so?
ACTIVITY 7
Name: Date:
Year and Section: Score:
73
ACTIVITY 8
Name: Date:
Year and Section: Score:
Instruction: Present the advantages and disadvantages of the following type of fences. (30 points)
74
Solid Fence
Advantages Disadvantages
ACTIVITY 9
Name: Date:
75
Year and Section: Score:
Instruction: Present the three kinds of full-view fence using the table provided below. (20 points)
76
ACTIVITY 10
Name: Date:
Year and Section: Score:
Instruction: Answer the following questions below. Limit your answers minimum of 2 sentences
and maximum of 5 sentences. (3 points each)
1. What is the minimum height of fences to be installed as security barriers? What do you think are
the reason behind that minimum height requirement?
2. The standard slack at the bottom of the fences should not exceed 2 inches from the ground.
Discuss your personal view why it is recommended.
3. What are the minimum acceptable requirements for installing top guards?
77
4. What are the minimum requirement in installing windows to maintain security?
5. What are the minimum requirement to be considered in installing doors to maintain security?
78
ACTIVITY 11
Name: Date:
Year and Section: Score:
Instruction: Answer the following questions below. Limit your answers minimum of 2 sentences
and maximum of 5 sentences. (3 points each)
3. What are common things that must be considered in installing protective lighting?
79
4. How can we achieve goo protective lighting?
ACTIVITY 12
Name: Date:
Year and Section: Score:
Instruction: Present the different types of protective lighting using the table provided below. (5
points each)
80
2. Controlled Lighting
3. Standby Lighting
4. Emergency Lighting
5. Incandescent Lamp
81
6. Mercury Vapor Lamp
7. Metal Halide
8. Flourescent Lamp
9. High-pressure Sodium
Vapor
10. Gaseous-Discharge
Lamp
82
11. Quartz Lamp
12. Floodlights
83
ACTIVITY 13
Name: Date:
Year and Section: Score:
Instruction: Research on the following terms provided and present it below. (2 points each)
Terminology Description/Definition
1. Fail Safe
2. False Alarm
3. Capacitance
Proximity Sensor
5. Ultrasonic Motion
Sensor
6. Intrusion Detection
Sensor
7. Vibration Sensor
8. Intrusion Detection
System
9. Control Unit
84
10. Actuator
ACTIVITY 14
Name: Date:
Year and Section: Score:
Instruction: Research on the following types of alarm system provided and present it below. (2
points each)
1. Audio Detection
Device
2. Photoelectric Device
3. Metallic Wire
4. Vibration Detection
Device
85
5. Microwave Motion
Detection Device
7. Bill Traps
8. Double Squeeze
Buttons
86
9. Foot Foot Button
ACTIVITY 15
Name: Date:
Year and Section: Score:
Instruction: Compare the following types of alarm detection systems. Limit your answers minimum
of 2 sentences and maximum of 5 sentences.(5 points each)
1. What is the difference between Central Station System with Propriety System?
2. What is the difference between Local Alarm System with Auxiliary Alarm System?
87
3. What is the difference between Dial Alarm System with Local Alarm by Chance System?
4. What is the difference between Propriety Alarm System with Auxiliary Alarm System?
ACTIVITY 16
Name: Date:
Year and Section: Score:
Instruction: Present the different types of locks using the table provided below. (5 points each)
88
2. Pin Tumbler
Locks
3. Combination
Locks
4. Code-Operated
Locks
5. Electrical Locks
89
6. Card-Operated
Locks
7. Lever Locks
8. Disc Tumbler
Locks
9. Wafer Locks
90
ACTIVITY 17
Name: Date:
Year and Section: Score:
Instruction: Present the different types of pick locks using the table provided below. (5 points each)
2. Feather Touch
Wrench
3. Ball Pick
91
4. Half-Diamond
Pick
5. Hook Pick
6. Rake Pick
7. Slagel Pick
8. Warded Pick
92
9. Bumb Key
ACTIVITY 18
Name: Date:
Year and Section: Score:
Instruction: Present the disadvantages and advantages of the following types of security guard
force. (5 points each)
93
Which among the two (2) kinds of security guard force is better? Why did you say so?
ACTIVITY 19
Name: Date:
Year and Section: Score:
Instruction: Read on the salient features of Private Security Agency Law and other legal basis on
industrial security management in the Philippines. Then, answer the following questions below.
Limit your answers minimum of 2 sentences and maximum of 5 sentences. (3 points each)
1. What Agency is authorized to issue implementing rules and regulations pertaining to RA 5487?
What law created the Agency?
94
2. Who is a private detective?
5. As stated under the private security agency law as amended, who may organize a private security
agency? What are the qualifications?
95
6. What are the disqualifications on the privilege to organize a private security agency law?
8. How many guards should a branch offices maintained and established in provinces or cities must
at least have during the first year? How about during the third year of operation?
96
11. What are the functions of a security consultant?
13. What is the minimum capitalization and minimum bank deposit required for new applicants for
Private Security Agency License to Operate?
14. When should a security guard carry his/her license to exercise profession?
97
98
ACTIVITY 20
Name: Date:
Year and Section: Score:
Instruction: Research and present below a picture of Type A or General Service Uniform (GOA)
for Male and Female Private Security Personnel. (20 points)
99
ACTIVITY 21
Name: Date:
Year and Section: Score:
Instruction: Research and present below a picture of Type B or Long Sleeved Barong Uniform for
Male and Female Private Security Personnel. (20 points)
100
ACTIVITY 22
Name: Date:
Year and Section: Score:
Instruction: Research and present below a picture of Type C or Field Uniform for Male and Female
Private Security Personnel. (20 points)
101
ACTIVITY 23
Name: Date:
Year and Section: Score:
Instruction: Research and present below a picture of Type D or Training Uniform for Male and
Female Private Security Personnel. (20 points)
102
ACTIVITY 24
Name: Date:
Year and Section: Score:
Instruction: Research and present below a picture of a firearms allowed to be carried by security
guards on duty. (20 points)
103
ACTIVITY 25
Name: Date:
Year and Section: Score:
Instruction: Research and present below the justifications of confiscations of firearms of a security
guard. (20 points)
104
105
ACTIVITY 26
Name: Date:
Year and Section: Score:
Instruction: Research and present below the General Orders of a security guard. (20 points)
106
ACTIVITY 27
Name: Date:
Year and Section: Score:
Instruction: Research and present below the Security Guards Creed. (20 points)
Generalization/Personal View
107
ACTIVITY 28
Name: Date:
Year and Section: Score:
Instruction: Research and present below the Policies in Time of Lockouts that a security guard
must consider. (20 points)
108
ACTIVITY 29
Name: Date:
Year and Section: Score:
Instruction: Read on Personnel Security Investigation and answer the following questions below.
Discuss your answers minimum of 2 sentences and maximum of 5 sentences. (3 points each)
3. Is exit interview for a leaving security guard necessary? Why did you say so?
109
4. Is positive vetting necessary in personnel security? Why?
6. What are the procedures that must be observed in managing packages brought inside Area of
Responsibility?
7. What are the things to be observed in vehicular movements control and identification?
110
8. Is visitor’s logbook necessary in maintaining security in the facility? Why?
9. What is the difference between single pass with multiple pass system?
10. Is background investigation on the applicant for security personnel necessary? Why?
ACTIVITY 30
Name: Date:
Year and Section: Score:
Instruction: Present the definition/description of each terminologies stated below. (2 points each)
Terminology Definition/Description
111
1. Classified Information
2. Declassify
3. Compartmentation
4. Category A Document
5. Top Secret
6. Secret
7. Confidential
112
8. Restricted
9. Patents
113
15. Security Survey
114