Advance Security by Aguirre
Advance Security by Aguirre
Advance Security by Aguirre
ilaUniversidaddeManilaUniversidad
Universidad de Manila
CM Palma Street corner Arroceros, Manila
COLLEGE OF CRIMINOLOGY
Functions of Security
1. Risk Management – this is a function of security that provides the guidelines to
identify all the possible risk that may threaten the organization, assess the impact of
these risks to the business and determine the likelihood of their occurring and their
impact.
B. Principles of Security
1. There is no Absolute Security – there is no known place accessible to man or
creation where hazards do not exist. This principle requires the need for the
recognition that hazard in any form will certainly occur.
2. Security is only as good as its weakest link – security risk is greatest or a mishap will
most likely occur where there is the least protection.
3. High Relative security can be achieved in depth – this principle implies that
redundant security measures are necessary. It also requires that each system is
independent from each other.
4. Risk may come from within and without – security against external hazards does not
guarantee protection. This is because most hazards come from within the team or its
area of operation.
5. No two installations are alike – every team has different circumstances from the
other. Each has a different set of values and priorities. This difference is further
extended to their environment and resources. This being so, they also have different
security requirements. This principle requires that security and measure should be
specific to the requirements of a facility so that different approaches to protection must
be made.
6. There is no impenetrable barrier – this principle requires that security systems and
measure must be constantly maintained, continually tested and upgraded as necessary.
7. Security is everybody’s concern - this principle requires that security must be
explicitly stated as one of the duties and responsibilities of every member of the team.
8. Deterrence is only good against the least determined perpetrator – this principle
means that deterrence is good only against a law abiding person but not to determined
offender.
9. All aspects of security must be applied to secure an object – objects of security are
resources or facilities that need to be secured or protected. The specific objectives and
circumstances of these objects or facilities create a need for specialization or a peculiar
security operation.
10. The effectiveness of one aspect of security is dependent on the application of the
other aspects – similarly with the preceding principle of security, the effectiveness of
the Personnel Security Aspect Policy can be obstained only with the application of
information security.
C. Security Aspects
1. Personnel Security – This is the aspect of security which ensures that the members
of a team and those accepted to be members are capable, reliable, trustworthy, loyal
and healthy.
2. Information Security – this is the aspect of security which ensures that no classified,
sensitive or critical information proprietary to the team are disclosed to unauthorized
individuals, distorted, destroyed or lost.
3. Operations Security – this is the aspect of security which ensures that all critical
policies, rule and regulation, systems and procedures are being properly enforced and
followed.
4. Environment Security – this aspect of security ensures that the environments where
the organization exists and operates are supported.
5. Reputation Security – this is an aspect of security which preserves the good
reputation of he team, its brand and all the products and services it stand for. It
ensures that the commitments made to the clients are served as promised.
6. Physical Security – this is a system of physical barriers placed between the hazard
and the assets to be protected.
A. Concepts in Management
Management refers to the functions of facilitation resources to attain the company’s
objectives.
5 M’s of Management
Money
Manpower
Material
Methodology
Machinery
Administration – refers to the policies to obtain company’s objectives.
2. Objectives, Purposes and Uses – this element describes the rational objectives
and the principles of the Guard Force Management and Operations Procedure.
3. Definition of Terms – this elements provides definitions for the terms peculiar to
the described services. It also defines the contexts for which the terms are used.
4. Statement of Security Guard Service Principles – this element describes the
principles such as the detail on the practical expectations and limitations of the
guards. These are based on the accepted principle of guarding that could exempt
them from undue liability.
5. Organizational Relationship – this element describes the line of authority for
both administration and operation.
6. Deployment Schedule – this element states the different post and the shifts to be
manned by security guards.
7. Security Requirement – this element describes the security needs of the
organization.
8. Security Operation Requirements – this element enumerates the different
Security Control Measures and Procedures, which the guards should perform to
address the security requirements of the Organization.
9. Duties and Responsibilities – this element states and describes the individual
duties and responsibilities of the guard in the different post.
10. Revisions, Amendments and Additions – this element provides for the latitude
to make adjustments to the plan as deemed necessary and as demanded by the
circumstances.
11. Appendices – this element refers to the attachment to the plan. It includes the
different Security Policies and procedures of the organization, which the guards
must enforce. They are (but not limited to) the following:
Security Patrol Procedure
Visitor Control Policy Procedure
Incoming and Outgoing Material Control Procedure
Key Control Procedure
Policy Procedure for Vehicle Control
Emergency Procedure
Reporting Procedure
Recording Procedure
Duty Turn-Over Procedure
3. Checks the attendance of the guard and accomplishes the Daily Time Record;
4. Accomplishes and submits the daily, weekly and semi-mothly security
operations reports;
5. Checks the uniforms of all guards for correctness, completeness and
presentability;
6. Checks the fitness of all guards to perform their duties;
7. Maintains the records of all operation and administrative documents of the
detachment;
8. Conducts investigation and adjudication of guard misconduct.
A team leader must at all times be apprised with the level of readiness of the
Security Team. He must have a system to evaluate its readiness. The following are the
elements of the Operational Readiness and Performance Evaluation of the Security Team:
1. Presentable Appearance, Completeness of Uniform and Organizational
Equipment – this element of evaluation is used to determine the completeness,
propriety and the demeanor of the guards.
2. Operational Provisions – this element is used to determine the readiness of the
operational equipment of the security unit such as radios, firearms, metal detector
and watchman’s clock are accessible, deployed, operational and well maintained.
3. Security Operations Records and References – this element of evaluation is
used to determine the discipline of the unit in the proper use, accomplishment and
maintenance of records and manuals and to establish their accessibility for
reference in the performance of duties, investigation or policy formulation.
4. Security Reporting and Compliance to Procedures – this element is used to
determine if all security incidents, where losses were incurred, have been resolved
and were given proper disposition.
5. Compliance to contract Provision – this element is used to determine if the
detachment had satisfied all the provisions of the service contract.
5. The supervisor shall synchronize the time of the timepieces of the guards.
6. The supervisor shall dismiss all incoming guards for deployment to their
respective posts.
7. The supervisor shall then form all outgoing guards and conduct a cursory
inspection of the guards on their appearance.
8. The supervisor shall solicit and receive debriefing for significant events,
observations and instruction by officials, from the guards.
9. The supervisor shall give the basic reminder and the lesson for the day.
10. The supervisor shall dismiss the guards. He shall then make them sight the
time cards or sheets, as applicable.
11. The formal way of guard mounting is when the supervisor shall lead the
incoming guards to all the post and he supervises the turnover of guards in
each post.
12. The supervisor shall ensure that all outgoing guards are out of the facility
within 15 minutes unless there is a valid or authorized reason.
13. The supervisor shall then patrol and inspect all posts to ensure that proper
turnover of duties was carried out.
A security program provides for the detail on how a security plan for an
organization should be carried out. A security program aims to provide the members of
the organization a clear understanding of security in relation to the objectives of the
organization. It is based on the security philosophy that the organization has adopted.
Moreover, it provides the members a clear understanding of their individual and
collective roles in security and the rationale for such roles. Lastly, it provides them the
guidelines by which their roles are performed. All of these are done with the end in view
of developing and instituting a Corporate Security Cultrure.
B. Developing a Security Program
1. Adopt a security policy – this policy shall be based on the basic security needs of
a team. It shall define how the organization plans to address its security needs.
2. Create and Organize a Security Committee – the security committee shall be
the collegial body that will oversee the development and implementation of the
organizational security program and the security policies and procedure.
3. Create a Business Integrity Office – this office shall monitor the execution of
the security program, its main objective is to conduct oversight monitoring of the
different operating units to check for proper execution of the Security Programs of
the Organization.
4. Designate a full time Business Integrity Officer – this officer is the head of
Business Integrity Office.
5. Write and adopt the Organization’s Security Philosophy and the Model by
which the philosophy shall be practiced. – this philosophy should embody the
belief of the leaders of the organization. It is based on the principles of security
upon which all the security programs, policies, procedures and method should be
based.
6. Designate the team and unit leaders to be responsible for the security
program implementation to protect the resources of their respective teams –
performance of this function must be included in the job description of the leader.
Knowledge of security must be a required competency for all leaders.
7. Cascade the Security Philosophy to all the team members and explicitly state
that security of company resources is among their basic responsibilities - all
new hires must have a learning session on security. Involve the team members in
all the succeeding steps in the development of a security plan from the
determination of the risks and their analysis to their suggestions on how to
mitigate those risks.
8. Conduct a security assessment – this step involves Asset Criticality Assessment,
Risk Assessment, Vulnerability Assessment and Acceptability. This should be a
corporate wide undertaking where every member of the team is involved.
9. Create a General Security Plan for the Organization – create specific security
plans, plicies, and procedures to address specific security risks or condition.
10. Determine the Security Awareness Level of all the Employees – survey and
monitor the members’ awareness and practice of security.
11. Write a Security Manual for Procedures – this manual is for general
applications such as security invidents reporting procedure and investigation
procedures.
12. Monitor the cost of losses of the company caused by untoward incidents,
mishaps, missed opportunities, penalties and wastage – this should be
compared with previous periods when there was no established security program.
Determining the actual losses of the company and monitoring it will provide the
basis to determine the effectiveness and cost of efficiency of the security program.
B. Security Assessment
Security Assessment is a series of processes to determine the security condition of
a facility or the organization. It describes the situation upon which the security plan is
made. A security Assessment involves the following activities:
1. Asset Criticality Assessment – this is a process which involves the identification,
assessment and rating of all the company resources.
2. Hazard and Threat Definition – this is a process where all the hazards and
threats to which the organization and its resources are susceptible to are
determined.
3. Mishap Occurrence Likelihood Analysis – this is a process of determining and
rating the likelihood of a mishap to occur based on the obtaining factors and
conditions surrounding the asset.
4. Asset Vulnerability Assessment – ths is an activity which involves the
determination and rating of how vulnerable the resources of the organization all to
the specific hazards that threaten the identified resources.
5. Risk Assessment – this is the process of determining and rating the degree of risk
that threatens the organizations’ resources.
6. Risk acceptance – this is the process of deciding which of the assessed risk and
conditions are acceptable or not to the organization.
B. Risk Assessment
Risk Assessment is a thorough look at your workplace to identify those things,
situations, processes that may cause harm, particularly to people. After identification is made,
you evaluate how likely and severe the risk is, and then decides what measures should be in
place to effectively prevent or control the harm from happening. The aim of the risk
assessment process is to remove a hazard or reduce the level of its risk by adding precautions
or control measures, as necessary. By doing so, you have created a safer and healthier
workplace. Assessments should be done by a competent team of individuals who have a good
working knowledge of the workplace. Staff should be involved always include supervisors
and workers who work with the process under review as they are the most familiar with the
operation.
In general, to do an assessment, you should:
Identify hazards.
Evaluate the likelihood of an injury or illness occurring, and its severity.
Consider normal operational situations as well as non-standard events such as
shutdowns, power outages, emergencies, etc.
Review all available health and safety information about the hazard such as MSDSs,
manufacturers literature, information from reputable organizations, results of testing,
etc.
Identify actions necessary to eliminate or control the risk.
The methods and procedures used in the processing, use, handling or storage of the
substance, etc.
The actual and the potential exposure of workers.
The measures and procedures necessary to control such exposure by means of
engineering controls, work practices, and hygiene practices and facilities.
By determining the level of risk associated with the hazard, the employer and the joint
health and safety committee can decide whether a control program is required.
It is important to remember that the assessment must take into account not only the
current state of the workplace but any potential situations as well.
mishap, to prevent stoppage of business operations, recover from the disruption and to bring
the organization back to its course towards its original objectives.
VII. Emergency Planning and Crisis Management
A. Forms and Characteristics of Crisis
Characteristics of a Crisis
1. It can happen anytime, anywhere, to anyone for whatever cause;
2. It is bound to happen when you are least prepared
3. It can happen fast;
4. It can generate a lot of attention from the public;
5. It can cause a breakdown of communication between team members;
6. It can escalate to other untoward consequences;
7. It can severely disrupt the operation of the organization;
8. It has the potential to become worse.
B. Crisis Management
There are two basic elements of Crisis management:
1. Crisis Preparedness Program – this is a proactive undertaking that involves the
assigning and commissioning of the organization’s resources to be dedicated for
the execution of a Crisis Contingency Plan.
2. Crisis Contingency Plan – this is the preemptive action that provides for the
execution of various procedures and utilization of resources allocated to prevent a
crisis.
2. Objectives of the Plan – this element is the statement of the specific ojectives of
the plan.
3. Implementation – this element states the different procedures necessary to
address the obtaining conditions. It has the following sub-elements or
procedures:
a. Organization – this sub-element identifies the leadership and the
membership of the Contingency Team and their respective functions. A
typical Crisis Contingency Team is composed of the following:
i. Team Leader
ii. Secretariat
iii. Operating teams
1. Reaction Team
2. Rescue Team
3. Medical Team
4. Security Team
5. Transportation
6. Billeting Team/Security Team
iv. Support Team
1. Finance Team
2. Government Liaison Team
3. Media Desk
b. Procedure on what to do and who to inform in cases of detection of an
emergency condition
c. Statement and description of the different levels of emergency
d. Procedures on the mobilization of the Crisis Contingency Team
4. Administration and Logistics – this element provides the definition of each
member of the Crisis Contingency Team and their respective functions.
5. Command and Communication – this element provides for the relationships of
the members and units of the Crisis Contingency Team.
6. Appendages – the appendages to the plan include procedures and the detailed
instruction on how to address a specific requirement.
E. Business Continuity
Business Continuity is a concept or undertaking, which prescribes or ensures the
availability of resources for the organization to produce and deliver its products or
services in the event of a prolonged interruption or disruption of operation as a
consequence of a mishap.
people and institutions, and our sovereignty and territorial integrity are protected and
enhanced
The purpose of the National Security Policy is to indetifu the strategic priorities
to establish the correct balance in the “guns or butter” debate for the allocation of
scarce resources; and to establish the prioritization, among others, between external
and internal defense.
The National Security Policy lays down the fundamental and comprehensive
framework on inter-related issues and concerns that may impinge on national
security. This comprehensive national security policy shall provide general guiles for
revisiting, enhancing, and formulating our related national policies.
The formulation of this policy is a task that is reposed in the President. As
Head-of-State, Head-of-Government, and Commander-in-Chief of the Armed Forces
of the Philippines, the President is primarily responsible for the management of our
national security and the decision making attendant thereto.
The NSP focuses on four elements namely Governance , Delivery of Basic
Services, Economic Reconstruction and Sustainable Development, and Security
Sector Reform.
REFERENCES: