Lesson 2 and 3
Lesson 2 and 3
Lesson 2 and 3
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
INTRODUCTION TO INDUSTRIAL SECURITY
CONCEPTS
After World War II there was a tremendous influx of machineries and other heavy
equipment in the Philippines Following the Reparation act. Government-owned or
controlled corporation companies and their subsidiaries as well as private commercial
and industrial firms, could not provide adequate protection to these machineries through
their respective in house security personnel. Hence they resorted to the use of contract
private watchman and security guards.
The great demand for private watchman and security guards saw the
unprecedented growth in the private security agencies. Private detective, watchman and
security guard agencies grew in leaps and bounds. This resulted to a chaotic situation in
the security because there was no standard set of laws; rules and regulations that
government operation and business of private detective, watchman and security guard
agencies in the Philippines. Each city and municipality had its own ordinances, rules
and regulations covering the business of private detective watch man and security
guards which in most part were in variance to each other.
Prior to the promulgation of Procalamation No. 1081 (Martial Law) there was
pending before the congress House Bill No. 4606. The house bill sought to amend
Section 3(d) 4 and * of RA. 5478. The amendments were necessited because of the
following conditions.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
PD No. 1919
Further amended section 3(d) , 8 (par.3), 16 (par.1), 18 of RA 5487 as amended
in order to make it more responsive to the demands of the private security industry.
PD No. 1919 introduced the concept of administrative fines based on the degree
of delinquencies committed in order for the Chief executive of the Philippine
Constabulary (Now the PNP) not to result to drastic action of suspending or cancelling
the operations of private security agencies and company guard forces, afford them a
chance to continue their business operation and earn revenues for the government.
There was also necessary to redefine the meaning of watchman or security
guard into more specific terms to clarify the status of the three categories of security
guards covered by RA. 5487.
RA No. 6975
Established the Philippine National Police under the Reorganized Department of
the Interior and Local Government.
As a result, the Act abolished the National Police Commission (NAPOLCOM) and
the Philippine Constabulary – Integrated National Police (PC-INP).
The Act also created the Civil Security Unit under the PNP to provide
administrative services and general supervision over the organization, business
operation and activities of all organized private detectives, watchmen, security guard
agencies and company guard forces.
Definition of terms:
1. Administration – the supervision, direction and control of a security agency of its
human and other resources to carry out its functions.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
2. Agency – an office, entity or bureau which can be private or government. In private
security work, this is the administering or directing the office for security guards.
3. Alarm System – combination of intrusion and detection devices arranged and wired
so as to support one another to detect intrusion or attempt threat.
4. Annunciator – a single device in an alarm system which initiates conditions by means
of associated circuitry. The signal may be an oral like bell, siren it may be visual like a
steady or blinking colored lamp.
5. Audio – referring to sound within human being.
6. Audio Alarm –a device using microphones or listening devices which can monitor
sounds or vibrations like hammering, explosions and other noises caused by man or
machines.
7. Badge System – a system used by security for personnel movement and control
within a plant/ facility whereby or identification tags are issued to employees, visitors,
contractual workers and even vehicles. These badges may be colored – coded,
temporary, semi-permanent or permanent.
8. EDPS – electronic data processing system; a computer
9. Safety Engineers – work in a field of accident prevention. They design structures and
equipment to male home, schools, jobs, highways and communication safer.
10. Management – is the process of directing and facilitating the work of people
organized in formal groups in order to achieve a desired goal.
11. Security Management – is the act of preparing, organizing and directing the efforts
of members of security force in order that they achieve the accomplishment of the
security purposes.
12. Supervision – is the direction accompanied by authority of the work of others. It is
the act of overseeing and instructing persons in the detailed performance of their work.
13. Security Supervision – is the direction and control of security personnel in the
performance of their studies and functions.
14. Scientific Management – the application of science to work which demands facts,
instead of guesswork, which establishes standards and methods which are scientifically
determined and through the aid of records sees that they are carried out.
15. Planning – the process of finding adequate solutions to management problems,
preparing outline the things to be done how they will be done to achieve results.
16. Organizing – the process of allocating authority, responsibility and accountability to
people establishment of channel of inter group communication to secure coordination
and efficiency.
17. Security Officer – any properly trained security officer shall be appointed in every
Department of the Government which handles classified matter. He shall undergo
training to be conducted by the National Intelligence Coordinating Agency or Armed
Forces of the Philippines Intelligence Agencies. He shall be responsible to the head of
the Department for the implementation and enforcement of these regulations and the
necessary action on breaches of security. Before appointment as a Security Officer, an
officer must first be cleared by the Head of the Department is authorized to handle.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
18. Organization - is the arrangement of people with common objective or purpose,
manner to make possible the establishment if areas of responsibility with clearly defined
channels of communication and authority.
19. Staffing - the task of providing competent men to do the job and choosing the right
men through harmonious adjustments or functioning of tasks directed towards a
common goal.
20. Directing – the giving of authoritative instructions, orders, or commands to working
me, relative to specific , procedures or activities which are to be performed in a
particular manner or time.
21. Coordinating – the accomplishment of an orderly pattern of group of effort among
working men, relative to specific adjustment or functioning of tasks, directed toward a
common goal.
22. Reporting – the making detail account of activities, work progress, investigation and
unusual things in order to keep everyone informed of what is going on.
23. Budgeting – the forecasting in detail of the results of an officially recognized
program of operations based on the highest reasonable expectations of operating
efficiency.
24. Security Clearance – is the certification be a reasonable authority that the person
described is cleared for access to classified matter as the appropriate level.
25. Custodian – an individual who has possession of or in otherwise charged with the
responsibility for safeguarding and accounting of classified material.
26. Officer – includes government or Armed Forces Official or officer permanently or
temporarily employed in a department defined.
27. Department – used to cover any Philippine Government Service or Instrumentality.
28. Trade Secret – consists of formula, pattern, devise or compilation of information
which is used in one’s business and which gives him opportunity to gain an advantage
over competitors who do not know or to use it.
29. Order/ Mission – a written authority issued by the agency directing a guard to
perform certain lawful task.
These are the important points you have to take note for Lesson 1 that will come out
during premid and midterm examinations.
- Purpose of RA 5487
- Composition of Philippine Association of Detective and Protective Agency Operations
( PADPAO)
- Objectives of PADPAO
- Why did Presidential Decree No.11 amended RA 5487?
- What are those Presidential Decrees that further amended RA 5487.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
- Purpose of PD. No. 1919
- Purpose of Republic Act No. 6975
- Definition of Terms.
• Alarm System
• Audio Alarm
• Badge System
• Safety Engineers
• Security Management
• Security Supervision
• Security Officer
• Order/Mission
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
Draw your own concept of the evolution of the Philippine Setting Security History.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 1. ACTIVITY NO. 2
What is the relevance of learning the Philippine Setting Security History in the
study of Industrial Security Concepts?
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 2. SECURITY
Security Defined
Is a protection against any type of crime to safeguard life and property and assist
various methods and devices.
Is the state of equality of being secure, freedom from fear or danger assurance ,
certainty. This means that to be secure is to make safe or protected.
Security in a collective sense, is the same as protection and safety, the state of
being safe and the condition of being protected against physical , social, spiritual ,
financial, political, emotional, occupational , psychological or other types or
consequences of failure, damage, error, accidents harm or any other event which could
be considered not considerable.
Basically it is the action of man against man that led to many unsecured and
unsafe conditions. Reasons could be economic, revenge or just plain greed and
avarice. Whatever the motives, the civilized man needs adequate protection.
Security has its main purpose to safeguard life and property by the use of methods and
devices.
When can you say that you are already secure? – you are secured when there is
freedom from fear, there is freedom from fear when you feel safe from your
surroundings that danger will not arise from it.
Based on the above definition, it stated that some reasons why there is unsecured and
unsafe situations is also due to acts of men.
For example, unsecured situations due to crime of theft, theft is mainly caused by acts
of men due to their personal wants to benefit from someone. So this is when need of
security arise. In order to deter acts of theft others will install CCTV cameras in order to
mitigate or stop these acts.
1. Philip Sorensen of Sweden – provided personnel trained to deal with in the limited
kingdom and Wester Europe.
Ex.
a. loses from crime.
b. fire
c. accident
d. flood waste
Philip Sorensen’s way to deal with security is by training his personnel who to deal with
unsecured situations.
2. Allan Pinkerton of United States – built security measures to private and government
until the advent of collective bargaining.
Ex.
a. intelligence
b. counter intelligence
c. investigators
d. internal security
e. law enforcement services
Intelligence in the study of criminology is just like a Spy, wherein a person keeps a
secret watch on a person or thing to obtain information.
Investigators conducts thorough search of facts, especially those that are hidden.
Internal security is providing security against internal threats like those that are harmful
to company’s information system.
Law Enforcement are group of people who enforce laws, investigate crimes and make
arrest for those who violate laws.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
Field of Security
1. IT Field
Take note on the definitions below. These are the methods of securing important
Informations.
For computing security this is mainly focused on the measures how to protect
information that will pass through a computer system,
b. Data Security – is the means of ensuring that the data is kept safe from corruption
and that access to it is suitably controlled. It also helps in protecting personal data.
For Data Security this is focused on the ensuring that datas or documents that are kept
are safe, that no person may able to access it aside from those who have authority to
do so.
Example for this is like Viruses from USB’s, for data security they will ensure that none
of these may get into datas to avoid corruption.
Application Security this where they apply or enforce the security system they have
made and to check whether it is effective or not.
For information security the same as well, it also involves the measures on how to
protect information from unauthorized access.
Network Security involves the measures on how to protect the network of information or
group of information related with each other against unnecessary access
2. Physical Field
For Physical Field this involves security for the prevention of crimes committed against
infrastructures like shopping centers, warehouses, airports and also houses for home
security. Take note on the definitions below.
Involves measures to avoid, prevent or mitigate attacks from buildings or facilities from
its physical features like doors, windows and others.
b. Shopping Center Security – concern with the protection of the stores, warehouses,
storage its immediate premises and properties as well as the supermarket personnel
and customer relation.
Measures to avoid theft in shopping centers and other business related facilities.
Protect the storage of goods and other things inside warehouses.
d. Home Security – methods use of protecting residential homes or town sites which
includes the interior protection of houses against property losses or damages.
Involves measures for prevention of attacks from home especially against robbers. This
will involve providing protections on the external and internal parts of houses.
3. Political Field
For political field this involves security measures taken by nations to maintain peace
and order between other nations and deter commission of crimes.
b. National Security – refers to the requirement to maintain the survival of the nation
state through the use of economic, military and political power and the exercise of
diplomacy.
Security are measures taken by nations to protect their lands and people against any
attacks from other nations. One way of providing such is by putting up a strong military
power to fight against any attack.
For human security, they will study herein what are the reasons why human are
vulnerable to attacks. They will determine herein their weakness and formulate ideas
how to avoid such.
4. Monetary Field
a. Financial Security – refers to the methods applied for the protection of fungible
negotiable instrument representing financial value, it broadly categorized into debt
securities such as banknotes, binds and debentures and equity securities.
For Financial Security, they will determine herein what measures are to be applied to
protect those instruments containing money.
2. Hotel Security - applied to hotels where its properties from pilferage, loss, damage
and the function in the hotel restaurants are not disturbed, troubled by outsiders or
guests themselves are safe guard and supervisor and insures that hotel guests and
their personal effects are safeguarded.
Security measures applied to hotels in order to prevent attacks from outsiders in order
to maintain peace and order for their guests and important information are remained
confidential. As Hotel’s maintain confidentiality on those who went in and out of their
facilities.
3. Bank Security –concern with bank operations. Its main objective are the protection of
bank case and assets, its personal clientele.
Measures taken for protection of their personnel and money inside banks.
4. VIP Security – a type of security applied for the protection of Top Ranking officials of
the government or private entity, visiting persons of illustrious standing and foreign
dignitaries.
5. School Security – concerns with the protection of students, faculty members and
school properties.
Divisions of Security
1. Personnel or personal Security – starts even before the hiring of an employee and
remains to be maintained for as long as the person is employed. This division is
important than physical security. Its purpose is to ensure that a firm hires those best
suited to assist the firm in achieving its goals and objectives and once hired assist in
providing necessary security to the work force while carrying out their functions.
Security starts from the moment of hiring of security personnel. They have to see to it
that personnel they will be hiring contains all the qualifications the looked for and
capable of enforcing directions they will give thereto in order to achieve their goals.
Give one actual scenario related to the following concepts among the field of
security.
1. Risk
2. Threat
3. Vulnerability
4. Exploit
5. Countermeasure
7. Assurance
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 2. ACTIVITY NO.2
In your own words what is the importance of Security? How does it affects our
daily lives?
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 3. SECURITY HAZARD AND RISK MANAGEMENT
Lesson 3 is pure definitions, familiarize and memorize the following important definitions
hereinafter.
Definition of:
Security Hazard
Hazard
Types of hazard
Sabotage
Saboteur
Types of Sabotage
Espionage as Security Hazard
Electronic Surveillance as Security Hazard
Pilferage
Subversive Activity
Security hazard and risk management are two interrelated fields in the context of
industrial security. Many organization and businesses by nature are exposed to hazard.
Thus, in order to prevent industrial hazards, risk management is necessary.
Hazard Defined
Is a situation which poses a level of threat to life, health, property or environment.
Most hazards are dormant or potential with only a theoretical risk of harm. However
once a hazard becomes active, it can create emergency situation.
Dormant - the situation has the potential to be hazardous but no people property or
environment is currently affected by this. For instance, a hillside may be unstable with
the potential for landslide but there is nothing below or on the hillside that could be
effected.
Potential – this is a situation where the hazard is in the position to effect persons,
property or environment. This type of hazard is likely to require further risk
management.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
Active – the hazard is certain to cause harm as no intervention is possible before the
incident occurs.
Mitigated – a potential hazard has been identified but actions have been taken into
order to ensure it does not become an incident. This may not be an absolute guarantee
of no risk but it is likely to have been undertaken to signify reduce the danger.
Types of Hazard
1. Natural Hazard – these are hazard which arise from natural phenomena like as:
2. Man-made Hazard
Carelessness
Disloyalty
Espionage
Vandalism
Noise
Vibration
Radiation
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
Solvents
Reproductive hazards
Work environment factors such as temperature, humidity, lighting, welfare
Saboteur Description
He is an ordinary looking guy but in his mind he has the training in deception,
knowledgeable in mechanics and psychology. He is the most dangerous for whom
security will have to deal with while planning and implementing security measures and
techniques.
Can work alone, in groups or simultaneously us several places , also a fact
“saboteur” no matter how trained has also his limit actions weaknesses and therefore he
cannot be deterred and denied access to get his target.
Categories of Saboteur
1. trained agents of an outside agency. Like as:
a. hostile power in time of war
b. power politically opposed to our country in peacetime
c. representative of an unscrupulous business rival
d. in case of labor disputes
Types of Sabotage
1. Mechanical Method – done by means of breakage failure to lubricate, insertion of
abrasive parts and substitution or contamination. Etc
3. Incendiary Method – use of fire, anything flammable is a target. The tools are many. It
can be ,match, cigarette, lighter or anything that you can think of start a fire.
4. Electrical Method – use of electrical powers sources to damage the plant or its
products or to interfere with communications.
7. Bacteriological Method
Countermeasure of Pilferage
1. Spot check on outgoing surveillance on all exits.
2. An aggressive security education and indoctrination program with emphasis that cime
does not pay.
3. Superiors should set sample of integrity and desirable moral climate for employees in
the establishment.
4. All employees must be enjoined to report of any loss to security.
5. Inventory and control methods should be done especially to pilferage items.
6. Control of tools equipment and set.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 3. ACTIVITY NO.1
1. Sabotage
2. Espionage
3. Electronic Surveillance
4. Subversive Activity
5. Pilferage
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 3 ACTIVITY NO. 2
Risk is the likelihood that something bad will happen that causes harm to an
informational asset.
Threat is anything that has the potential to cause harm. Threat will use
vulnerability to inflict harm, it has an impact.
Risk Management
The process of identifying vulnerabilities and threats from resources used by an
organization in achieving business objectives and deciding what countermeasures if any
to take in reducing risk to an acceptable level.
Risk Analysis
Includes examination of the vulnerability, probability and criticality of potential
threat and includes natural and manmade risk.
The entity should assess the risk of a terrorist attack. The assessment should
include a determination of the likelihood of an attack, the type of terrorist action and
consequences, deepening on the size and location of the system. The assessment
should include potential risks to the following.
Workers
Environment and surrounding community
Impact and/or interdependent facilities and infrastructure
Site one example of a risk to security, and resolve the same by using the
alternative strategies in risk management.
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
LESSON 4 ACTIVITY 2.
In your own words, what is the importance of knowing what is risk, vulnerability
and threat? How is it related to the study of industrial security concepts?
Saint Joseph College
CRIMINOLOGY DEPARTMENT
Maasin City, Southern Leyte
“All your dreams will come true if you have the courage to pursue them.”
- Cloie Anne C. Sulla, RC