Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
20 views4 pages

LEA102 Chapter Summary

LEA 102 – Introduction to Industrial Security Concepts provides a comprehensive overview of industrial security, emphasizing the importance of protecting assets, personnel, and information in the face of various threats. The course covers key topics such as the historical evolution of security, legal frameworks, physical and information security, personnel screening, and ethical standards for security professionals. It aims to equip learners with foundational knowledge and practical skills necessary for effective security management in diverse organizational contexts.

Uploaded by

Cheska Casale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views4 pages

LEA102 Chapter Summary

LEA 102 – Introduction to Industrial Security Concepts provides a comprehensive overview of industrial security, emphasizing the importance of protecting assets, personnel, and information in the face of various threats. The course covers key topics such as the historical evolution of security, legal frameworks, physical and information security, personnel screening, and ethical standards for security professionals. It aims to equip learners with foundational knowledge and practical skills necessary for effective security management in diverse organizational contexts.

Uploaded by

Cheska Casale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Summary of LEA 102 – Introduction to

Industrial Security Concepts


Introduction
The field of industrial security has become an essential component in the protection of
assets, personnel, and information across both private and public sectors. In an era marked
by increasing threats such as terrorism, cybercrime, corporate espionage, and internal
misconduct, the implementation of effective security measures is not merely optional but a
critical organizational requirement. The course LEA 102 – Introduction to Industrial
Security Concepts offers a foundational exploration of the principles, frameworks, and
practices that underpin the discipline of security management. It emphasizes the
integration of legal standards, ethical guidelines, physical protection systems, and personnel
protocols to mitigate risks and ensure organizational resilience.

This academic overview presents a systematic summary of the key topics addressed in the
course, structured by chapter. It covers a wide range of subject matter including the
historical development of security, legal provisions governing private security practice,
physical and information security systems, personnel screening and investigations, as well
as the ethical and operational standards expected of security professionals. Through this
synthesis, the overview aims to provide a coherent understanding of the theoretical
foundations and applied practices that define modern industrial security in the Philippine
context and beyond.

Chapter 1: Concept of Security


Security is a fundamental necessity for individuals, organizations, and governments. It
signifies a condition of safety where there is freedom from danger, harm, or loss. The term
"security" derives from the Latin words se (free from) and cura (care), which reflects its
core purpose: peace of mind. Security encompasses both tangible and intangible forms of
protection. To understand it fully, one must grasp related concepts such as assets (valuable
entities), risks (potential losses), threats (sources of potential harm), and vulnerabilities
(weaknesses that threats can exploit). Security is categorized into various forms: physical,
personnel, document and information, and political, which includes public, national, and
international security. Private sector security covers areas such as industrial plants, malls,
hotels, VIPs, and communication systems. Effective security management in organizations
involves not only uniformed guards but also systems like CCTV, employee screening, and
emergency planning. The growing role of private security in preventing corporate crimes
highlights the importance of professionalism and competence in the field.
Chapter 2: History of Security
The concept of security has evolved over millennia. In prehistoric times, individuals
developed rudimentary security measures such as using fire and weapons for self-defense.
Organized security began in ancient civilizations, with the Greeks forming city-state police
(polis) and the Romans creating the vigiles for firefighting and public order. The English had
a significant influence with innovations like the sheriff system and citizen patrols. In the
Philippines, pre-colonial leaders like the datu had servants for protection, while the Spanish
established the Guardia Civil. During the American era, constables laid the foundation for
the current police force. After World War II, private watchmen emerged to guard
establishments. Today, private security agencies play a vital role alongside public police,
especially in areas like event security and emergency response. Modern challenges such as
terrorism and technological advances necessitate strong collaboration between police and
private security professionals.

Chapter 3: Legal Context of Security


Security is rooted in the universal right to life, liberty, and personal safety. The Universal
Declaration of Human Rights and the Philippine Constitution affirm this right, mandating
due process and protection against unlawful searches and property seizure. The Revised
Penal Code also addresses crimes that threaten personal and property security. Republic
Act No. 5487, the Private Security Agency Law, and its amendments (e.g., PD 1919) provide
legal frameworks for organizing, licensing, and regulating security agencies. These laws
recognize private security personnel as "protection specialists" and "force multipliers" of
the police, particularly in times of calamities. They emphasize the professionalization of the
security industry, including mandatory training and compliance with operational standards.

Chapter 4: Physical Security


Physical security involves tangible barriers and systems designed to prevent unauthorized
access to people, property, and sensitive information. It begins with defining what needs
protection, followed by directing people and materials, deterring intruders, denying entry,
detecting threats, disseminating information, delaying intrusions, detaining offenders, and
defending the facility. The layered defense approach includes perimeter barriers (fences,
walls), building exteriors (walls, doors, roofs), and interior controls (locks, ID systems,
alarms). Factors such as location, environment, crime patterns, and natural forces influence
the selection of security measures. Physical barriers include natural obstacles, structural
installations, human and animal forces, and active or passive anti-vehicle barriers. Lighting
systems, alarm sensors, and security containers like safes and vaults further enhance
protection. Physical security is a crucial element in any comprehensive security plan.
Chapter 5: Document and Information Security
Documents and information are vital to any organization’s operations. A breach or leakage
can result in severe financial and reputational damage. Document and information security
involves protecting classified materials throughout their lifecycle. Classification levels
include Top Secret, Secret, Confidential, and Restricted, depending on the potential damage
from unauthorized disclosure. Security clearance is essential, granting access based on the
principle of "need to know." Information security also extends to proprietary data such as
trade secrets and patents. Organizations must implement strict protocols for handling,
storing, and disposing of sensitive information to preserve confidentiality and operational
integrity.

Chapter 6: Personnel Security


Personnel security addresses threats from within an organization, such as internal theft or
misconduct. Pre-employment screening, including background checks, interviews, and
identity verification, helps prevent the hiring of individuals who may pose risks. Methods
include local and national agency checks, vetting, profiling, and the use of deception
detection tools. During employment, ongoing monitoring, access controls, and training
ensure that staff maintain high standards of behavior. Exit procedures are equally critical to
protect sensitive assets when employees leave. Measures such as revoking access and
retrieving company property are essential. Personnel security is vital for mitigating insider
threats, which can be motivated by ideology, revenge, or financial gain.

Chapter 7: Guard Force and Guarding System


Security guards form the frontline of any security system. They are deployed in various
locations to protect personnel, property, and processes. A competent and professional
guard force acts as a deterrent and a responsive unit against threats. Guards must be well-
trained, disciplined, and respected. The private security industry includes private agencies,
company security forces, and government security units. To operate legally in the
Philippines, agencies must comply with licensing requirements under RA 5487. Guards
represent the company and its security posture, and their effectiveness depends on
continuous training, evaluation, and leadership. The success of any security plan relies
heavily on the quality and commitment of the guard force.

Chapter 8: Security Personnel


Security personnel are essential in enforcing the protection of people, property, and
information within an organization. The responsibilities of security guards vary depending
on the type of establishment and conditions, but generally include enforcing company rules,
managing personnel identification systems, patrolling assigned areas, and safeguarding
assets against theft, sabotage, or unauthorized access. Guards are also expected to respond
to alarms and emergencies, perform escort duties, and regulate traffic within the facility. To
ensure effectiveness, security personnel undergo several training programs: pre-licensing
training to acquire basic knowledge and skills, refresher courses to update knowledge, and
specialized programs tailored to specific roles such as VIP protection, crisis management, or
aviation security.

Chapter 9: Code of Ethics and Conduct


This chapter outlines the professional and moral guidelines that govern private security
agencies and their personnel. The Private Security Agency’s Creed emphasizes the duty to
serve clients and guards while upholding government interests, human rights, and legal
standards. Ethical standards dictate that agencies must act with integrity, fairness, and
justice; contribute to national welfare; support the well-being of security guards through
fair compensation; and collaborate with law enforcement agencies. The Code of Conduct
discourages unethical practices like misrepresentation, undercutting rates, and
unauthorized deductions from guards’ pay.

Chapter 10: Security Investigation


Security investigation is a vital function within a security organization. While most of these
investigations are non-criminal, they address important matters like theft, injuries, or
unusual incidents that may lead to civil or internal consequences. A security investigation is
defined as the planned and organized determination of facts concerning specific losses or
threats. Its primary purpose is to identify and locate offenders and provide necessary
evidence. Investigative work involves three critical components: information, interrogation,
and instrumentation. Effective investigations require objectivity, thoroughness, and an
understanding of the investigator’s own biases.

You might also like