Module in Industrial 1 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 79

UNIVERSITY OF CAGAYAN VALLEY

New Site Campus Tuguegarao City,Cagayan


SCHOOL OF CRIMINOLOGY
INTRODUCTION TO INDUSTRIAL SECURITY

NAME OF STUDENT:_________________________
SUBJECT:____________________________________
YEAR/BLOCK:_______________________________
DATE:________________________________________
INSTRUCTOR:________________________________

MODULE NO.1 PRELIM COVERAGE


TITLE CONCEPT OF SECURITY and PROTECTIVE SECURITY SYSTEMS
INTRODUCTION • SECURITY is a state or condition of being secured. Security - is the state or
quality of being secured, freedom from fear or danger; assurance; certainty. To
secure is to make safe or be protected. From the Greek word SECUROS which
means safe,
safety or secured.
As security is being defined as the state or condition of being secured; there is
freedom from fear, harm, danger, loss, destruction or damages. Basically, it was
the action of man against man that led to many unsecured and unsafe conditions.
Reasons could be economic, revenge, hatred or just being greedy. Whatever the
motives, the civilized man needs security or adequate protection.
• Security and protection system , any various means or devices designed to guard
persons and property against a broad range of hazards, including crime, fire,
accidents, espionage, sabotage, subversion and attack.

PROTECTIVE SECURITY can be defined as those measures taken by an installation


or unit to protect itself against sabotage, espionage or subversion and at the same time
provide freedom of action in order to provide the installation of the unit with the
necessary flexibility to accomplish its mission.
LEARNING The objectives of this modules are;
OBJECTIVES • Understand the concept of security
• Analyse the importance of protective security systems
LEARNING The students should be able to:
OUTCOMES • know the concept of security
• appreciate the importance of protective security systems
DISCUSSION
EVOLUTION OF SECURITY
A. Code of Hammurabi- the earliest recorded of rulers for protection, persons
and properties.
B. Anipostal System- it is organized by the Persians to act as their security
force. The firs example of a national security force protecting a federal
agency.
C. Creek city- First to create a professional security force to protect the local
communities.
D. Sparta- Created last covert and secret undercover security system with law
enforcement authority.
E. Praetorian guards- the centralized security forced organized by Emperor
Augustus.
F. Urban cohorts- they are organized to secure the city.
G. Vigiles- Later, it also organized by Augustus to act as the security forced of
the village and act as fire fighters.

SECURITY UNDER ORGANIZATIONAL DEVELOPMENTS


A. King William- change the shire and reeves into “Constabuli” which
derived from the latin words ‘ comes stabuli” meaning an officer of the
stable.
B. King Henri 1- the son of King William, issued the leges Herrici in which
he gave himself the title of law giver.
C. King Edward- issued the “Statue of Winchester” establishing the ward
and watch system of patrolling and later gave us the word COP meaning
Civilian on Patrol. This system gave birth to mobile patrol and curfew
system.

MODERN PERIOD
A. Henry Fielding- Conducted the first security Survey. He recommended the
security forces be professionally trained and properly compensated. He
recommended the use of foot and mounted patrol, special investigation and
police courts.
B. Allen Pinkerton- He founded the first Detective Agency in Chicago named
“Pinkerton Detective Agency” performing law enforcement functions.
C. William J. Burns- He founded the Burns Detective Agency in 1909 and
become the sole investigating agency for American Banking Association.
D. FBI- this organization came into existence.

What is industry?
- a special branch of productive work or the capital or workers employed in it.

What is Industrial?
- pertaining to or engaged in industry.

What is Security?
-the state or quality of being secured, freedom from fear or danger, assurance or
certainty.

What is Management?
-the planning, deciding or exercising of control and supervision on some functions of
the organization.

What is Industrial security?


-security measures applied to business industries or the business of providing security
and protection to private individuals, government or non-government industries.

What is Industrial security management?


-the skillful handling of the security and safety measures of business enterprises and
industrial establishments.

Why is Security System important?


➢ The first reason why we need to install security system is to secure our
family from potential break -ins by burglars and property against
intruders.
➢ BURGLARY- breaking into the house in order to steal something
➢ ESPIONAGE- spying, to obtain political or military information.

Do we really need a security system?


➢ The most essential reason to invest in a security system is to deter crime
within our home. According to the ELECTRONIC SECURITY
ASSOCIATIONS 9 out of 10 burglars said that if they encountered an
alarm or home security, they would not attack the home.

Three Major Areas of Security
1. Physical Security - this concern with the physical measures
adopted to prevent unauthorized access to equipment, facilities,
material and document and to safeguard them against espionage,
damage, loss and theft
2. Personnel Security - this is as important as physical security.
Personnel security starts even before the hiring of an employee
and remains to be maintained for as long as the person is employed.
Its purpose is to insure that a firm hires those best suited to
assist the firm in achieving its goals and objectives and once
hired assist in providing necessary security to the work force
while carrying out their functions
3. Document and Information Security - this involves the protection
of documents as classified papers from loss, access by unauthorized
persons, damage, theft and compromise through disclosure
What is the difference between protection and security?

PROTECTION SECURITY
A method used in operating systems A method used in operating systems
that manages threats within system to that handles the threats from the
maintain the proper functioning of the outside of the system to maintain the
system. proper functioning of the system.
Focuses on the internal threats of the Focuses on the external threats of the
system. system.
Provides a mechanism for controlling Provides a mechanism to safeguard
the access to programs, processes, and the system resources and user
user resources. resources from external users.
Involves mechanism such as setting involves mechanism such as adding,
or changing protection information of deleting users, verifying whether a
a resource and checking whether that specific user is authorized, using anti
resource is accessible by a user. malware software, etc.

EXERCISES • Enumerate and explain further the 3 major areas of Security and provide an
example for each type.
• Can these 3 major areas of security stand alone? If YES, HOW? IF NO WHY
NOT.
• Among these 3 major areas of security which of them is the most important and
why.
• In your own understanding, differentiate PROTECTION and SECURITY.
• What are the aspects of protective security system and explain each as to your
own understanding.

MODULE NO.2 PRELIM COVERAGE


TITLE Physical Security
INTRODUCTION Physical security is defined as:
• The measures that are being used to define protect and monitor property
rights and assets.
• Physical security addresses design, implementation and maintenance of
countermeasures that protects physical resource of an organization.
• The safeguarding by physical means such as guards, fire protection
measures, of plans, policies, programs, personnel, property, utilities,
information, facilities and installation against compromise, trespass,
sabotage, pilferage, embezzlement, fraud or other dishonest criminal acts.
EMBEZZLEMENT- stealing large amount of money that you are
responsible for, often for a period of time
FRAUD-getting money from people by cheating them
TRESPASS- entering another person’s area; hurting/damaging property
through force
• These physical security measures consist of barriers and devices that
would detect, impede, and prevent unauthorized access to equipment,
facilities, materials, and documents and to safeguard them against
espionage, sabotage, damage or theft.
• Implementing controls that discourage attackers by convincing them that
the cost of attacking is greater than value received from the attack.

LEARNING The objectives of this module are;


OBJECTIVES
• To be familiarize on the different types of barriers
• To know the purposes of barriers
• To identify the principles of physical security
LEARNING At the end of this module the students will be able to;
OUTCOMES
• Appreciate the purposes of barriers
• Clearly distinguish the difference of barriers and physical security.
DISCUSSION What is physical security?
➢ Any physical object that creates a barrier to unauthorized access.
This includes: locks and latches, safe’s, alarms, guards and guard
dog, doors and doors strikes/frames/closers, windows, ceilings and
floors, walls and fences.
➢ Refers to safeguards placed as delaying mechanism between a
prospective intruder and the target installation.
➢ A system of natural or man- made barriers placed between the
potential intruder and the object/person being protected.

What does physical security includes?


➢ Physical access controls- guards, fences, barriers, lightings, keys
and locks, badges, escorts, property controls and
monitoring/detection systems.

TYPES OF SECURITY
1. Physical Security- a system of barriers placed between the potential
intruders and the objects/matter to be protected. It is the broadest branch of
security which is concerned with physical measures adapted to prevent
unauthorized access to equipment, facilities, materials and documents and to
safeguards them against espionage, sabotage and theft.
2. Communication Security- the protection resulting from the application on
various security measures which prevent or delay the enemy or unauthorized
persons gaining information through the information system.
This includes:
a. Transmission security- a components of communications security
that results from all measures designed to protect transmission from
the interception, traffic analysis and imitative deception.
b. Cryptographic security- Results from the provisions of technically
sound crypto-systems and their proper use.
c. Physical security- providing of safeguards to equipment and
materials from access by unauthorized persons.
3. Hotel security
➢ the protection of assets, personal effects, guest and other
properties in hotel.
➢ a type of security applied to hotels where its
properties are protected from pilferage, loss damage and the
function in the hotel restaurants are not disturbed and troubled
by outsiders or the guest themselves. This type of security
employs house detectives, uniforms guard and supervisor and
insures that hotel guests and their personal effects are
safeguarded.

4. Bank Security- a specialized type of physical security protecting the assets,


personnel and operation of a bank with special emphasis on the precaution
and measures to safeguard cash and assets while in storage in transit and
during transactions.

5. Document Security- involve the protection of documents and classified


papers from lost, access by unauthorized persons, damage, theft and
compromised through disclosure.
6. Personal Security- the protection of personnel especially ranking officials
from any harm, kidnapping and other acts.
➢ VIP Security- a type of security applied for the protection of
top-ranking officials of the government or private entity,
visiting persons of illustrious standing and foreign dignitaries.

7. Personnel Security- includes all security measures designed to prevent the


individuals of doubtful, loyalty, integrity, character and judgment from
gaining access to sensitive facilities and classified matters and/or to prevent
the appointment, employment or retention as employees of such individuals.
8. Operational Security- it deals with he protection of processes, formula,
patents and other industrial and manufacturing activities from espionage,
infiltration, loss, compromise or photocopying.
9. Industrial security- deals with the industrial plants and business enterprises
where personnel, processes, properties and operations are safeguarded. It
involves the use of protective barriers, security lightning, personnel
movement control, locks and key management, guard forces, communication
and electronic hardware, fire prevention and control programs, emergency
plans, industrial safety and security education programs.
10. Air cargo security- this is applied to minimize if not prevent, losses of cargo
during in transit storage or transfer.
11. School security- this is applied in response to the increase of violent crimes
committed against students and school personnel and school properties.
12. Supermarket security- this is applied in response to the mushrooming of
bazaars, marts, super malls and the like
➢ Supermarket or Mall Security- a type of security which is concern
with the protection of the stores, warehouses, storage, its
immediate premises and properties as well as the supermarket
personnel and customers. Security personnel are trained to detect
shoplifter, robbery, and bomb detection and customer relation
13. Other Types- this includes all other security matters not covered
in the above enumeration.

PRINCIPLES OF PHYSICAL SECURITY


1. Enemy Agents Must Access - Acquisition of information is the ultimate
results, and the means and form in which the information is obtained.
2. There is No Impenetrable Barrier – For the unfriendly government or
organization, they are willing to devote enough time, money, personnel,
material, and imagination in passing barriers. So physical security
attempts to build defense by using a certain barrier.
3. Defense in depth means barrier after barrier. In order that barrier could
prevent unauthorized access and serve its purpose very well, there should
be an integration of all barriers adopted in the installation.
4. Surreptitious versus Non-Surreptitious Entry – The possibility of
surreptitious entry is the greatest hazard from the standpoint of
counterintelligence security because it is usually difficult to determine
that the information has been compromised.
5. Each Installation is Different - Since each installation is different, each
will have different problems to overcome. The security procedures will
not be adequate for all installations.

SECURITY HAZARDS- it is an act of conditioning which results in a


situation conducive to breach of protection system or that could result to
a loss
Kinds of Hazards
1. Human hazards- acts or conditions affecting the safe
operation of the facility caused by human action.
2. Natural hazards- those caused by natural phenomena which
caused damage, disturbance and problems of normal
functioning of human activities including security. This are
includes Natural catastrophes.
Factors upon which the extent and degree of risk to security is
dependent:
1. CRITICALITY- importance of firm as vital facility
2. VULNERABILITY- the susceptibility o a plant or establishment to
damage. Loss, disruption of operations due to various hazards.

Factors considered in the protection of plant and its producers:


1. Size and location
2. Number and general character personnel
3. Character and kinds of products
4. Cost of security protection

WHAT IS BARRIERS?
➢ Barriers refer to any physical structure whether natural or man made
capable of restricting, deterring, delaying or preventing illegal and
unauthorized access to an installation.

TWO GENERAL TYPES OF PHYSICAL SECURITY BARRIERS

1. Natural Barriers – These are offered by nature which could obstruct or


delay the passage way of potential intruders. These also refer to natural
structures that serve as deterrents or obstructions to intruders such as high
cliff, canyon, desert, or bodies of water.
2. Man-made Barriers – These are structural constructions like fences,
walls, floors, roofs, grills, bars, roadblocks, or other physical means to
deter or impede penetration.

SPECIFIC TYPES OF PHYSICAL SECURITY BARRIERS

➢ Natural Barriers include mountains, cliffs, canyons, ravens, seas,


marshes, deserts, or terrain difficult to traverse.
➢ Structural barriers are those features constructed by man regardless of
their original intent that tend to delay the intruder. Examples of these are:
walls; ceilings; door; and fences.
➢ Human Barriers include guards, charges of quarters, office and shop
workers, who stand between the intruder and the matter to be protected.
➢ Animal Barriers are usually shepherd dogs trained for and used as
guards.
➢ Energy Barriers are usually electrical and electronic devices that could
assist security personnel in detecting intrusions. Examples are: protected
lighting; and anti-intrusion devises.

EXERCISES • What are the purposes of barriers?


• Enumerate and explain the types of barriers and the three line of physical
defense.
• In your own words what is a security hazard?
• Explain the principles of physical security.
• Levels of physical security
• What is a restricted area and identify its types?
• What principle of security states that, “One Security system cannot stand
alone”.

MODULE NO.3 PRELIM COVERAGE

TITLE PERIMETER SECURITY

INTRODUCTION Perimeter security is the protection of the installation’s inner and the immediate
vicinity. The main purpose of perimeter barrier is to deny or impede access or
exit of unauthorized person.

LEARNING The objectives of this module are;


OBJECTIVES
• Define the types of perimeter barriers
• Discuss the different types of fences, perimeter barrier opening and
additional protective measures.
LEARNING At the end of this module the students will be able to;
OUTCOMES
• Understand the different types of perimeter barrier
• Distinguish the types of fences, , perimeter barrier opening and additional
protective measures.
DISCUSSION • Perimeter security basically, it is the first line of defense of an
installation. This may be in the form of fences, building walls or even
bodies of water. The function and location of the facility itself usually
determine the perimeter of the installation for example, if the facility is
located in a city whereby the building occupies all the area where it is
located, the perimeter may be walls of the building itself.
PERIMETER BARRIERS
➢ Perimeter barrier is a medium of structure which defines the physical
limits of an installations or area to restrict or impede access thereto. It
is any physical barrier used to supplement the protection of an inside
or outside perimeter. Perimeter barrier also includes the utilization of
security personnel.

PERIMETER BARRIER OPENINGS

1. Gates and doors should also be guarded or locked as much as possible;


2. Windows and similar openings should also be guarded or grills should
be installed so as not to be used by intruders. Whenever possible,
windows and openings less than 18 ft. above the ground, roofs, and
ledges or less than 14 ft. directly or diagonally opposite uncontrolled
windows in other walls, fire escapes, or other openings of 96 sq. inches
or larger should be grilled or have steel bar protections;
3. Sidewalks elevators are elevated parts of the land near the perimeter
barrier that provides access to areas within the perimeter barriers and
should be locked and guarded;
4. Utilities openings such as sewers, air intakes, exhaust tunnels which
penetrate the barriers and which have cross-sectioned area of 96 sq.
inches or more should be protected by bars, grills, etc.;
5. Clear Zone is an unobstructed area maintained on both sides of the
perimeter barrier. A clear zone of 20 ft. or more is desirable between the
barrier and extension structures and natural covers which may provide
concealment or assistance to a person seeking unauthorized entry. Where
it is impossible to have clear zones because of property lives or natural
features, an increment in the height of the fencing, increased guard
coverage more security lightings or the use of intrusion device in that
portion of the perimeter barrier should be done. Whenever possible, clear
zones should have the following specifications:
- A clear zone of 20 ft. or more should exist between the perimeter barriers
and exterior structures, parking areas and natural or man-made features.
- A clear zone of 50 ft. or more should exist between the perimeter barrier
and structures within the protected areas except when a building wall
constitutes part of the perimeter barrier.

• Perimeter barriers basically are designed to accomplish the


following:
1. They outline the perimeter of the area to be secured
2. They create physical and psychological deterrence to unauthorized entry.
3. They delay intrusion thus facilitating apprehension of intruders.
4. They assist in a more efficient and economical employment of guards.
5. They facilitate the control of pedestrian and vehicular traffic.

TYPES OF PERIMETER BARRIERS – Perimeter barriers include


any of the following:
1. FENCES are independent structures designed to control physical and
visual access between outside areas. Types of fences include Solid Fence
and Full-View Fence.

➢ Solid fence is made of opaque material in such a way that visual access
through the fence structure is denied. Solid fences are constructed with
heavy materials such as bricks, stone and concrete, and usually extended
down into the ground to a point view below the frost line.

➢ Full-view fence is constructed in such a manner that visual access is


permitted such as wire fence, through the fence structure. It is designed
purely to control physical access between two areas.

➢ Wire fence is a type of fence made of chain-link, barbed wire concertina


design with small opening not larger than 2 square inches and made of
number 9 gauge wires or heavier, twisted and barbed salvage at top and
bottom.

Specifications for Using Chain-link Fences

1. It must be constructed of 7-feet material excluding top guard.


2. It must be 9 gauge or heavier.
3. Mesh openings are not to be larger than 2 inches per side.
4. It should be twisted and barbed salvage at top bottom.
5. It should be security fastened to rigid metal or reinforced concrete.
6. It must reach below surface enough on soft grounds to compensate for
shifting soil or sand.
7. It must reach within 2 inches of hard ground or paving.

Specifications for Using Barbed Wire

1. Standard barbed wire is twisted, double-stand 12 gauge wire with 4 point


barbs spaced on equal distance apart.
2. Barbed wire fencing must be firmly affixed to posts high excluding top
guard.
3. Barbed wire fencing should not be less than 7 ft. high excluding top
guard.
4. The distance between strands will not exceed 6 inches and midway
between parts.

Using concertina wire fence – concertina fences are formed like accordions.

• MINIMUM ACCEPTABLE REQUIREMENTS FOR FENCE USED


AS SECURITY BARRIERS
1. Heights- 8 feet at minimum
2. Slack at the bottom- not exceeds two inches. If the fence is not tight
then should extend even closer to the ground.
3. Wooden fence post- the round type should be at least two inches at
the smallest diameter.
4. Steel fence post- the round type should be at least two inches at the
smallest diameter.
5. Fence post- should be set in concrete or in firm ir roll using
commercial drive anchors, to a depth of three feet and the maximum
distance posts is ten feet.
6. Fence top- there should be something on the top of the fence that
deter that persons attempting to go over the fence, i.e used to barbed
wire or concertina wires overhang. The arms holding the barbed wire
should be two feet and should be extended at a 45 degrees angle in
the direction of the expected approach.
7. Fence gates- gates should be limited to the number necessary foe
deficient and safe operation of the installation.
8. Fence area- it should be cleared tress and vegetation and debris of
other materials which would offer concealment of the intruder or
would aid him scaling the fence.
9. Fence opening- all openings in the fence in excess of 96 inches must
be locked, barbed or screened in such a way that may unlocked and
opened from the inside and only by selected personnel.
10. Multiple fence- if used should be at least ten feet apart and be
overhang on the top inner fence should point inward.

BUILDING WALLS include walls, floor, roofs or their combinations


serve also as barriers and they should be of such constructions to provide
uniform protection just like wire-fencing.

BODIES OF WATER like river, lake, cataract, sea, pond or any bodies
of water forming part of the wall, building or fencing should not be
considered an adequate perimeter barrier. Additional security measures
like wire fence, concrete walling, security patrolling and flood lighting at
night may be necessary for the portions of the perimeter.
ADDITIONAL PROTECTIVE MEASURES

➢ Top Guard is an additional overhang of barbed wire placed on vertical


perimeter fences facing upward and outward with a 45-degree angle with
three to four strands of barbed wires spaced 6-inches apart. This will
increase the protective height and prevent easy access.
➢ Guard Control Stations are normally provided at main perimeter
entrance to secure areas located out of doors, and manned by guards on a
full-time basis. Sentry stations should be near a perimeter for
surveillance at the entrance.
➢ Towers or “Guard towers” are house-like structures above the
perimeter barriers. It gives a psychological effect to violators.
➢ Signs and Notices or “Control signs” should be erected where
necessary in the management of unauthorized ingress, and preclude
accidental entry. It includes entry, ID, prohibited and exclusive areas
signs.

PERIMETER GUARDS are also employed in augmenting the existing


perimeter security or perimeter barriers of a certain establishment. The
two (2) types of employing perimeter guards are:

1. Fixed Post – Security guards are assigned in a particular place of the


compound to guard and watch the area surrounding; and
2. Patrol (Roving) – In this system, the security guard is required to walk
and go around regularly around the company premises.

The most secured system of perimeter guard employment is at mutually


supporting fixed posts. This system would require each guard to be visible to
each adjacent guard and would provide the possibility for the area between to be
under surveillance of either guard. However, this type of employment is
expensive.

A less expensive system is that of employing the guards as patrols. The


security value of this type of employment is considerably reduced unless a
sufficient number of frequency patrols are used to create essentially the same as
that of tower guards.

- In conducting patrols, the guards should be instructed to traverse an


irregular route, providing different intervals between visual or actual
contact with any given point on the fence. However, in practice, there are
observed disadvantages of roving patrol, to wit:
1. Even regular routes, in time, tend to become regular in their irregularity;
2. The use of irregular roving patrol is made for the economy of personnel.
The economy feature is usually carried so far that even the irregular route
patrol fails to serve the purpose; and
3. It is difficult for installation control personnel to determine that the
roving patrol is actually carrying out its functions.
Note: A guard system that cannot be checked on is not a secured guard system.
Double checking guards could be done by:

➢ Personal inspection – Security supervisors conduct on-the-stop and


random inspection of posted guards; or
➢ Artificial inspection – This is done through bounty clocks
strategically installed around the perimeter; and reporting through
handheld two-way radio or similar communication gadget

PROTECTIVE LIGHTING
✓ Designed to emphasize the illumination of the perimeter barrier and
the outside approaches to it, or to concentrate on the area and the
building within the perimeter.

PURPOSES OF PROTECTIVE LIGHTING


1. To provide sufficient illumination to the areas during hours of
darkness.
2. Lighting can help improve visibility so that intruder can be seen and
identified and if possible apprehended.
3. Lighting gives the psychological fear and that serve as a deterrent to
the thieves, pilferer, trespasses and saboteurs.
Importance of protective lighting:
✓ Serve as deterrent to violators
✓ Assisting security force
✓ Serves as an essential of an integrated physical security program.

TYPES OF SECURITY LIGHTINGS

1. Stationary Luminary (Continuous) – most common type consisting of


services of fixed luminous to flood a given area continuously with
overlap. It may either be:
2. Glare–projection type – the intensity is focused to the intruder while the
observer or guard remains in the comparative darkness. The lighting is
toward the approach of an entrance to an installation. Lights with
reflectors increase glare. It is a strong deterrent to a potential intruder
because it makes it difficult for him to see the inside of the area. It also
protects the guard by keeping him in comparative darkness and enabling
him to observe intruders at considerable distance beyond the perimeter.
3. Controlled lighting – the width of the lighted-atop can be controlled and
adjusted to suit the security needs. The lighting is focused; sag, on a pile
of items rather than on the background.
4. Stand-by Lighting – similar to continuous lighting but in turned on
manually or by special device or other automatic means, when there is
suspicion of entry.
5. Movable Lighting – consists of stationary or portable, manually operated
search lights which may be lighted continuously during hours of darkness
or only as needed, and usually supplementary to either of the first 2 types.
6. Emergency Lighting – a stand-by lighting which can be utilized in the
event of electrical failure, either due to local equipment or commercial
power failure.

GENERAL TYPES OF LIGHTING SOURCES

1. Incandescent lights have low initial cost and provide good color
rendition. A white or glowing light because of great heat.
2. Mercury Vapor lamps emit a purplish-white color caused by an electric
current passing through a tube of conducting and luminous gas.
Considered more efficient and is widespread in exterior lighting.
3. Metal Halide is similar in physical appearance to mercury vapor, but
provides a light source of higher luminous efficiency and better color
rendition.
4. Fluorescent Lamp provides good color rendition. However, it cannot
project light over long distances; thus, it is not desirable as flood type
lights.
5. High-pressure Sodium Vapor is introduced in 1965, for exterior lighting
of parking areas, roadways, buildings, and industrial and commercial
installation. It emits golden white to pink color.
6. Low-pressure Sodium Vapor produces yellow color.
7. GASEOUS LAMP- Having the form of gas responsible to form a
brilliant light
8. QUARTZ-IODINE LAMP- A lightbulb consisting of quartz bulb and a
tungsten filament with the bulb containing iodine which reacts with the
vaporized tungtens to prevent excessive blackening of the bulb.

LIGHTING APPLICATIONS/LIGHTING SYSTEMS

1. Fenced Perimeter Lighting is used to illuminate the fence itself and the
area beyond it (“the detection zone”). Its objective is to reveal an
intruder’s approach and produce glare towards him, thus reducing his
ability to see in the site. However, it can be difficult to apply because it
may create nuisance or hazards.
2. Area Lighting is used in a building face perimeters consist of faces of
buildings on or within 20 ft. of the property or area line to be protected
and where the public may approach the building. Guards may be
stationed inside or outside of the building. Doorways or other insets in
the building’s face should receive special attention for lighting to
eliminate shadows.
3. Flood Lighting is used to cast a strong light on the walls of buildings so
that intruders are visible either in silhouette (outline) or by the shadows
which they cast.
4. Gate House Lighting is installed on active entrances for pedestrians and
vehicles to facilitate complete inspection of passengers, cars, trucks and
freight cars as well as their contents and passengers.
5. Topping-up Lighting is used to illuminate dark areas not adequately lit by
area or flood lighting. Areas and structures within the installation
property lines consist of yards, storage spaces, large open working areas,
piers, docks, and other sensitive areas and structures.

TYPES OF LIGTHTING EQUIPMENTS:


1. FLOODLIGHTS- an artificial illumination in bod beam
✓ A light that shines brightly over a wide area.
2. SEARCHLIGHTS- a very bright light that can be aimed in different
directions and that is used to fine people or things in the dark.
3. FRESNEL LIGHTS- originated by AUGUSTIN J. FRESNEL in
the year 1865. A lens usually used for spotlights.
4. STREET LIGHTS- a light on a tall pole next to a public road.
✓ A light usually mounted on an a pole and constituting one of a series
spaced at intervals along a public street or highway.

PROTECTIVE ALARMS/INTRUSION DETECTION SYSTEM

✓ Intrusion detection system are inherent element of corporate and


industrial security and play a vital role in the total protection efforts
of companies; it’s activities, information, equipment and assets.
Basically, these are designed to alert security personnel to
consummated or attempted intrusion into the area, building or
compound. It can be electrical, mechanical or electronics.
✓ Remember, that these system can tell you that this system only tells
you an intrusion occurred, it cannot do anything about it. Whatever
system you choose it is depends on your capability to react positively
to the alarm.
✓ ALARM- A device that signals. Basically alarm systems are
designed to alert security personnel to intrusion into a building or
compound. Each type of alarm is activated in the event that an
intruder tampers with a circuitry, a bearer or radiated waves. Intrusion
alarms can be electrical, mechanical or electronic. Alarms are also use
for fire, smoke and others.

- As used in this lesson and for uniform understanding, the following are
defined:

ALARM (signal) is synonymous to warning of imminent danger. It can


also be defined as a:
1. Security device: a security device fitted to property, especially a house or
car, to make a warning sound if a break-in or theft is attempted; or
2. Sound of security or warning device: the sound made by a security or
warning device

In this lesson, the first definition of alarm (security device) will be the emphasis
of discussion and learning.

PROTECTIVE ALARM – It is an aural or visual signal given by the


enunciator to security guard when intruder actuates device in a protected
area.
ENUNCIATOR - is a visual or audible-signaling device, which initiates
condition of associated circuits.

THREE PARTS OF AN ALARM SYSTEM

Generally all alarming devices have these three (3) basic parts:

1. Sensor or Trigger Device emits the aural or visual signals


2. Circuits which carries messages to the signaling apparatus or the
transmission line.
3. Signaling system, sometimes called the enunciator

TYPES OF ALARM DETECTION SYSTEM

1. Central Station System – A type of protective alarm system where the


central station is located outside the installation. It can be located in an
agency and the installation is one of the subscribers. A system in which
the alarm signal is relayed to remote panel located at the facilities of
private owned protection Service Company manned by its personnel.

Alarm signal is transmitted over telephone lines to the central


station. Here, operator on duty is 24-hours to supervise, record, and
maintain alarms. Several separate compounds tie their alarm system to a
central station so that in case of need, the central station calls for
assistance to the police, fire department, and hospital or with other
government assistance units. The alarm signal could be transmitted to
any of the following:

a. Direct wire systems – Used by high-risks locations (banks, jewelers,


furriers)
b. Circuit party systems – This has a circuit transmission system where as
many as 15 alarm transmitters may send alarm to a single receiving panel
at the central station over the same time. Each alarm has a distinct code.
c. Multiplex system – This reduces leased telephone charges while at the
same time providing higher degree of line security than circuit-loop alarms.
d. Digital communicator is a computer-based which sends its signal
through the regular switch line telephone network. The alarm signal
transmitted series of coded electronic pulses that can only be received on a
computer-type terminal at the central station.
e. Telephone Dialer delivers pre-recorded verbal message to a central
station, answering service, or police department when an alarm is detected.
f. Radio signal transmission – This method takes the alarm signal from the
protected premises and sends it via radio or cellular phone to either a
central station or police dispatch center.
g. Video verification – A video is sent to central station. This provides
higher level of protection while helping to eliminate false alarms by
allowing central station operators to see what is happening inside the
protected area.

2. Proprietary System – This functions in the same way as the central


system except that it is owned and leased by the subscriber, and operated
and located in the facility. Response to all alarms is by facility’s own
security or fire personnel. Since this system is monitored locally, the
response time to an alarm is considerably reduced. Usually, the control
console is located at the security control center where operators are on
continuous duty. Any triggering information on fire, intrusion, or
violation of security rules is monitored by security and then appropriate
action is initiated.
3. Local Alarm System – Consists of rigging up a visual or audible alarm
near the object to be protected, a bell or light indicates an attempted or
successful intrusion. In case of alarm, response will be made by the local
guards and other personnel within sight or hearing. Its success relies on
someone hearing or seeing the signal and calling the responsible
authorities. It also serves to notify burglars that they have been detected.
In this case, the sensor activates the circuit, which in turn activates a horn
or siren or even flashing light located in the immediate vicinity of the
alarmed area.

4. Auxiliary System – In this system installation circuits are led into local
police or fire department by leased telephone lines usually by special
arrangements. The dual responsibility for circuits and the high incidence
of false alarms have made this system unpopular with public fire and
police personnel.

5. Local Alarm-By-Chance System – This is a local alarm system in


which a bell or siren is sounded with no predictable response. These
systems are used in residence or small retail establishments, which cannot
afford a respond system. The hope is that a neighbor or passing will reach
to the alarm and call for police assistance, but such a call is purely a
matter of chance.
6. Dial Alarm System – This system is set to dial a predestined number
when the alarm is activated. The number selected might be the police or
the subscriber’s home number, or both. When the phone is answered, a
recording states that an intrusion is in progress at the location so alarmed.
This system is relatively inexpensive to install and operate, but since it is
dependent on general phone circuits, it could fail if line were busy or if
the phone connection were cut.

TYPES OF INTRUSION ALARM SYSTEM


1. Metallic foil or wire- detects any actions that move the foil or the
wire. Metallic foil or wire in window or glass surfaces. Doors and
windows can be equipped with magnetic or springs activated contacts
which will sound an alarm when the door and the window is opened.
2. Photoelectric or electric eye- an visible or invisible beam that
transmit a frequency of several thousand per second to a special
receiver.
3. Audio detection device- it can detect any sound. It a supersonic
microphone that are installed in walls, ceilings and floors of the
protected area. This can be utilized effectively to safeguard enclosed
areas, vaults, safes, storage bins and similar enclosure. The advantage
of this device is relatively cost and easy installation while the
disadvantage is its limited application to enclosed vaults and
depositories where minimum external exists e.g. noise from a
construction site, aircraft and vehicular movements.
4. Vibration detection device- a sensitive sensor attached in walls to
detect any vibrations. This device is detects any vibrations caused by
any attempt to the protected area.

Other types of alarm usually by the banks:


a. Foot rail activation- placing in the front foot of tellers to
activate the alarm. This device do not require any obvious use
of the tellers hands and their hands may be kept in full view of
the robbers for reason of safety.
b. Bill traps- usually placed in the tellers cash drawer and
connected to the alarm system using a wire connector. When
currency is removes the alarm will be activated.
c. Knee or thigh buttons- these are installed inside the desk or
teller station so they can be activated knee or thigh pressure.
Usually located where the personnel perform his/her duties
from a seated position.
d. Foot buttons- like the foot rail permit the alarm activated
safety whi;e both hands remain clear in view of the robber.
e. Double squeeze button- pressure is required on both side of
the device.

DESIRABLE CHARACTERISTICS OF INTRUSION ALARM


SYSTEMS
The primary considerations on the choice of a particular alarm system
include durability, stability and reliability shall include:

1. A detection unit should initiate the alarm upon instruction of a human


being in the area or vicinity of the protected object.
2. An enunciator console indicating the audible and or aural signal and the
specific location of incident so that proper action can be made by security
and other units.
3. Fail- safe features give alarms in the enunciator when something is
wrong with the system.
4. System should be difficult to tamper or render ineffective by outsiders,
competitors or saboteurs.
5. Panel board central enunciators or operating console monitoring activities
should be removed at all times.

PERIMETER PROTECTION
- This is first line of defense to detect the intruders. This could be done
through any of the following intrusion alarming device.

1. Door switches- these are installed on a door or window in such a way


that opening the door or window causes a magnet to move from a contact
switch that activates the alarm.
2. Metallic foil (window tape)- used to detect glass breakage in show
windows, doors and transom (casement). When the glass crack and
breaks the foil it interrupts the low voltage electrical circuit and activate
the alarm.
3. Glass break detectors- these are attached to the glass and sense the
breakage of the glass by shock or sound.
4. Wooden screens- these are made of wooden dowel sticks in a cage like
fashion not more than 4 inches from each other. A very fine, brittle wire
runs in a wooden dowels and frame. The burglar must break the
dowelling to gain and thus break the low voltage electrical circuit. These
are primarily used in commercial applications.
5. Window screens- these are similar to regular wire window screens in a
home except that a fine, coated wire is a part of the screen and when the
burglar cuts the screen to gain entry. This is usually applied for
residential.
6. Lace and paneling- the surfaces of the door panels and safes are
protected against entry by installing close lacelike pattern of metallic foil
of a fine brittle wire on the surface.

AREA/SPACE PROTECTION

1. This is a type of electronic security device that senses movement and


usually triggers an alarm
2. Many types of motion detectors can sense motion in total darkness,
without an intruder becoming aware that an alarm has been triggered.
3. Motion detectors are important part of motion burglar alarms systems.
They help alert security personnel, especially in situation where in no
obvious break in has occurred.
4. A motion detector will detect the intruders movements as soon as he or
she walks or otherwise moves within the area protected by the detector.

TYPES AND OPERATION OF MOTION DETECTORS


- Motion detectors operate through any of the following:
1. Passive infrared motion detectors- Sensitive to infrared wavelengths of
energy, which are invisible to human eye. It can detect heat and this type
senses the heat of human and animal emits.
2. Active infrared motion detectors- It projects a beam of infrared energy
from one unit to another (transmitter to receiver)
3. Ultrasonic- it can detect sound very high frequency to detect motion.
4. Microwave- this is uses a Doppler effect to detect motion.
5. Video- a video camera views an area and sends the image to a monitor
the motion detectors computer reads the pixels or the tiny picture
elements.

INTRUDERS DETECTION SYSTEM


1. Advantage of IDS provides 24 hour surveillance is used with CCTV
permit guards to remain in protected positions reduce the need of
patrolling , reduce manpower and detect intruders at unmanned sites.
2. Limitations of IDS if not carefully selected and installed, they can be
circumvented or have unacceptable false alarm rates and they requires
skilled maiantenance.

• PERIMETER INTRUDER DETECTION SYSTEM


- These electronic devices for detecting entry or attempted entry across the
external perimeter of a key point or vital point and signaling an alarm.
They provide similar advantages as in IDS but have the following
limitations:
1. Liable to high false alarm alerts
2. Costly to maintain and install
3. May be vulnerable to deliberate alarming
4. Can sometimes be circumvented by knowledgeable intruders.

TYPES OF SENSORS FOR PERIMETER INTRUDER DETECTION


SYSTEM (PIDS)

1. LINEAR MICROWAVE SYSTEM- a cigar shape microwave beam is


established between a transmitter and a receiver.
2. RADIATING CABLE SYSTEM- also known buried cables usually
invisible to intruders. Radio frequency is transmitted along one cable and
leaked through apertures. Disturbance of the radio frequency field by
intrusion causes an alarm signal.
3. VIBRATION SENSORS- provide indication of forced entry through
walls, ceilings, doors, window grills and other rigid structures. These
sensor operate through any of the following:

✓ INERTIA SWITCHES- a capsule enclosed or small gold plated


supported on the electrical contact pins. Vibration causes the ball
to lift off the contacts producing an alarm.
✓ GEOPHONES- a capsule encloses a spring loaded magnet
suspended inside a coil. Vibration causes movement of the
magnet relative to the coil and induces a current and produces
alarm.
✓ CRYSTAL VIBRATION SENSOR- a phezo electric crystal
compressed by vibration and produces a current causing an alarm.
✓ PERSONAL ATTACK ALARM- this allows a door keeper or
guard to give a covert warning that he is under attack or threat of
attack by operating a push-button, kick bar or panic strip. This
device continues to signal an alarm until released by a key.

FIRE ALARM
- are those devices installed to help detect fires or detect anything that
causes fire such as smoke or unusual rising of temperature.
- Apparatus is dispatched according to the nature of the alarm and location
of the fire. May modern departments are no equipped with computer-
aided dispatch systems that can track the status of all units and provide
vital information about the buildings where fires occur.

PRIVATE FIRE PROTECTION SYSTEM


- Private companies and business establishments install fire alarms and
automatic fire extinguishers to avert possible occurrence of fire.

1. AUTOMATIC SPRINGKLING SYSTEM- A hydraulically designed


piping installed in a building, structure or area with outlets arranged in a
systematic pattern which automatically discharges water when activated
by heat or combustion products from a fire.

▪ AUTOMATIC SPRINKLER- a type of built-in sprinklers which


works by the increase of room temperature and which
automatically operates the system to put out the fire. Attached and
distributed is the ceilings of the rooms, these sprinklers will go
into action once a fire starts and those that will open are those
directly above the fire and water id delivered right where it is
needed.
TYPES OF SPRINKLER SYSTEM

A. Wet pipe system- the piping has water with pressure and the
water sprinkler will operate when head is opened and water will
continue to flow until shut off.
B. Dry pipe system- the pipes are filled with air under pressure
which holds the water at a value located in a room. When
sprinklers head goes, into operation, air is released, trapping the
dry pipe value and allowing water to flow through the system
2. FIRE PUMPS- are mechanical device of supplying water which can be
manual or motor-driven. These pumps are ideal when natural supplies of
water are reading available like a river, lake or stream.
3. STAND PIPES- are galvanized iron steel or plastic pipes located inside a
building from the lowest to the top floor wih water under pressure for use
in case of fire. Located near the standpipe is a fire hose usually enclosed
in a glass box handy for use.
4. FIRE HYDRANT- a mechanical device strategically located in an
installation or street where fire hose is connected so that water pressure
will be available to extinguish fire.
5. PORTABLE HAND EXTINGUISHERS- this is the most important
and useful piece of fire-fighting equipment in a plant, building or facility.
It can put out fire depending on the contents extinguish certain types of
fire as class A to D.
6. ALARM SYSTEMS- in buildings may also be equipped with detection
systems that will transmit an alarm. Some detectors are designed to
respond to smoke and others to heat.

• FIRE DETECTION SYSTEM


- This system provides sensors in fire-prone areas in a building whereby
smoke or heat will actuate theses strategically located sensors or
automatic fire detectors so that alarm is automatically sounded warning
the employee and summoning fire-fighting units.

• SMOKE DETECTORS
- Offer some advantage over fire detectors because before fire gest big
there will be smoke. Thus these detectors trigger an alarm ahead of the
heat actuated device or detector. Smoke detectors are classified into the
following types:

1. IONIZATION DEVICE or RADIO ACTIVE DEVICE- This contains


a small radioactive source for ionizing the air molecules between a pair of
electrodes, permitting a very small current to flow between the pair. If
smoke particles from a fire enter this space they reduce the flow of
current by adhering to the ionized molecules. The drop in current sets off
a buzzer or other alarm.
2. SMOKE DETECTOR- this uses photoelectric cell. In some of these
detectors, smoke that enters obscures a steady beam of light; in others the
smoke scatters a light ray from a diode so that the cell can detect it. Both
types can be run by batteries or by building current.

SECOND LINE OF DEFENSE:


✓ After the perimeter barrier the nest line of defense are the doors,
windows, walls, roofs, grills and other entries to the building. It also
includes the use of protective locks and keys. This array of barrier is
only deterrent and can ever exclude the decided and determine. The
following are the specification of the second line of defense.

Specification of windows, doors and roofs:


WINDOWS- It should be protected with grill wire, screening or chain
links. Consideration should be given to hinging or padlocking with protective
coverings.
-DOORS- hinges should be constructed in a such a way that is not
exposed but rather concealed and welded iside to prevent tampering and
removal. If doors contain glass panels, they shoul be protected with grills or a
screen.
ROOFS- entry can be through skylights of by chopping through the
roofs- an activity rarely detected by passerby or even patrol officers. In such
case, roofs should be protected with chain link fenced for barbed wire if there
possibility of gaining access from the neighboring buildings, trees, poles or by
climbing drain pipes and etc.

PROTECTIVE LOCKS AND KEY CONTROL AND


PROTECTIVE CABINETS

1. Lock – A mechanical, electrical, hydraulic or electronic device to prevent


entry into a building, room, container or hiding place and to prevent the
removal of items without the consent of the owner.
2. Key – maybe defined as:
a. instrument for locking and unlocking: a metal bar with notches or
grooves that, when inserted into a lock and turned, operates the
lock’s mechanism; or
b. door or lock opener: a device such as a plastic card with an
encoded magnetic strip that operates a door or lock
3. Padlock – A portable and detachable lock having a sliding hasp which
passes through a staple ring or the like and is then made fast or secured.
4. Peterman – An English term used to describe a lock picker

• TYPES OF LOCKS
1. Warded Locks - The underlying principle is the incorporation of wards
or obstructions inside the lock to prohibit a key from operating the bolt
unless the key has corresponding notches cut in it do that it will pass the
wards. Warded locks offer very little security. This type of lock must
therefore be used only to have privacy but not to provide a high degree of
security.
2. Disc Tumbler Locks – These are also known as wafer locks. They have
flat metal tumblers with open center fitted into slots in a plug that is in
turn fitted into a lock case. When the plug is turned, it activates a cam.
The key is removable at 90 to 180 degrees and may be rotated either right
or left. The disks are under spring tension forcing them partially out of
the plug into recesses in the case thereby preventing the cylinder from
turning. Rectangular openings in the disk tumblers are cut into various,
longitudinal dimensions requiring corresponding cuts in the key to
position the tumblers. Proper unlocking positioning of the tumblers is
accomplished when they are with drawn from the recesses in the body of
the lock to position flush with the plug, allowing the plug to turn the cam
which causes the withdrawal of the bolt. Designed for the use of
automobile industry and are in general used in car doors today. Because
this lock is easy and cheap to be manufactured, its use has expanded to
other areas such as desks, files and padlocks. The delay afforded is
approximately ten minutes.
3. Lever Tumbler Locks - Each lever in the lock hinges on a fixed point
and is held down against a stop by the pressure of a flat spring. Each
lever has a cut in it, and all the gates can be located at different places.
When the proper key is inserted and turned, notches of various depths
raise all the lever whatever distanced is required to line up the entire gate
exactly opposite the fence on the bolt. When the key is turned, a portion
of the key catches the bolt and slides it back. Because there is no
resistance to the post entering the gate, the lock is opened. If the key is
not the correct one and if even one gate does not line up to let the post
slide into it, the lock cannot be opened.

They are used in safe deposit boxes and are for all practical purposes,
pick-proof. The least of these locks are used in desks, lockers and
cabinets and generally less secure than pin tumbler lock.
4. Pin Tumbler Lock – The pin tumbler mechanism depends for its
security, and a number of round pin or tumblers operating on a cylinder.
Each tumbler pin is divided into two parts, the upper which is flat on bolt,
is called the driver; the bottom part called the pin is rounded or slightly
pointed on the lower end to fit the grooves or cuts in the key. A coil
spring above each driver constantly forces it downward. When the right
key is inserted, the various depths of the cuts and the key compensate for
the different lengths in the pins. The dividing point between each of the
two pin segments is brought into line with. The top of the plug, allowing
it to rotate in the cylinder. When the plug turns, it carries with its cam,
which activates the bolt and other lock mechanism.

OTHER TYPES OF LOCKS – Today, numerous innovations in protective


locks are introduced. Some of these are the following:

1. Combination Locks are difficult to defeat, since they cannot be picked


because few experts can manipulate the device to discover the
combination. Most of these locks have three dials, which must be aligned
in the proper order before the lock will open. Some locks may have four
dials for greater security.
2. Code Operated Locks are combination-type locks and that no key is
used. Pressing the series of numbered button in the proper sequence
opens them. Some of them are equipped to alarm if wrong sequence is
pressed. These are high security locking device.
3. Electromagnetic Locks are devices holding a door by magnetism. These
are electrical units consisting of the electromagnetic on metal holding
sequence. When the power is secured on the door, they will resist
pressure of up to 1000 pounds.
4. Card Operated Locks are electronically or more usually magnetic.
Coded card notched, embossed or containing an embedded patter of
copper locks are used to operate such locks. These are frequently fitted
with a recording device, which registers time of use and the identity of
the user.

A. KEY CONTROL
- It is the management of keys in a plant or business organization to
prevent unauthorized individuals access to the keys. Once an effective
key control has been installed, positive control of all keys must be gained
and maintained. This can be accomplished only if it is in conjunction
with the new locking devices. The following can be utilized to maintain
effectively key control:

a. Key Cabinet - is a well-constructed cabinet will have to be


produced. The cabinet will have to be of sufficient size to hold the
original key to every lock in the system. It should be locked at all
times.
b. Key Records - Some administrative means must be set up to
record code numbers of the locks and to whom the keys of a
specific locks was issued.
c. Inventories- Periodic account must be made of all duplicates and
original keys in the hands of the employees whom they have been
issued.
d. Audits- In addition to periodic inventories, an unannounced audit
should be made of all the key control records and procedures by a
member of the management.
e. Daily Report - A regular report must be made to the person
responsible for the key control from the personnel department
indicating all persons who have left or will be leaving the
department or the company. In the event that a key was issued,
steps should be made to recover the key.

TYPES OF KEYS

a. Change Key- is a specific key, which operates the lock and has a
particular combination of cuts, or battings, which match the
tumblers of the tumblers in the lock.
b. Sub-Master Key is a key that could open all the lock within a
particular area or grouping in a particular facility.
c. Master Key is a special key that is capable of opening a series of
locks.
d. Grand Master Key is a type of key that will open everything in a
system involving two or more master key groups.
e.
MASTER KEYING SYSTEM

1. Keying or the use of a pass or a skeleton key. A pass key is used to


operate an expensive lock by moving it in a key hole until it catches a
locking belt and unlocks the mechanism.
2. Master keying is when a lock operates on a master key plus an
individual or changes key. Master keying is made possible due to the
development of interchangeable cylinder Cores. In matters of seconds,
key and lock combination can be changed and this is done by the use of a
“control key”. With the key, all the cores in a locking system can be
changed rendering the existing keys not usable.
3. Mason keying is the use of a key to open the main entrance and the
office.
4. Levels of Control in the Master Keying Plan
a. One-Level - Change Key: All locks operated by change key only
and keyed different or alike or required. Each key operates its own
lock only. Example the houses, stores, cars, warehouse.
b. Two-level – Master key: All levels operated by change keys and
master key. Master key operates all locks generally of one building.
Examples: small school, and apartment.
c. Three-Level - Grand master key: All locks operated by change key,
master keys, and grand master keys. Grand master key operates all
locks generally used in large buildings or a facility with several
buildings. Examples: office buildings, and hospitals.
d. Four-Level - Great grand master key: All locks operated by change
key. Grand master keys and great grand master keys are used in
great or large complex system and similar to 3 levels.
e. Five-Level – Great grand master key: All locks operated by change
key, master keys, grand master key, and great grand master key.
Examples: big universities, complexes, and large industrial
complexes.

THIRD LINE OF DEFENSE


-The final line of defense at any facility is in the high security
storage area where papers, plans or cashable instrument, precious
metals or other especially valuables assets that are protected,
these security cabinets will be of a size quantity which the nature
of the business dictates.

TYPES OF SECURITY CABINETS

1. SAFE – It is a metallic container used for the safekeeping of documents


or small items in an office or installation. Safe can be classified as either
robbery or burglary resistance depending upon the use and need. Its
weight must be at least 750 lbs.; it should be anchored to a building
structure; and its body should at least one inch thick steel.
2. VAULT – This is a heavily constructed fire and burglar resistance
container usually a part of the building structure used to keep and protect
cash, documents and negotiable instruments. Vaults are bigger than safe
but smaller than a security file room. The vault door should be made of
steel at least 6 inches in thickness; the vault walls, ceiling, floor reinforce
concrete at least 12 inches in thickness; and the vault must be resistive
to fire up to 6 hours.
3. FILE ROOM - It is a cubicle in a building constructed a little lighter
than a vault but bigger size to accommodate limited people to work on
the records inside. The file room should at must be 12 feet high; and it
must have a watertight door and at least fire proof for one hour.

EXERCISES • In 500 words, when a key was lost as a Consultant what would be your
recommendation?
• Explain the advantages and disadvantages of a solid fence and full-view
fence.(minimum of 250 words; maximum of 500)
• In 10 paragraph, explain the importance of protective lighting.
• Capture a photo of the general types of lighting sources and types of
security lightings and label them.(minimum of 30 pictures;maximum of
50)
• Under physical security, what should be placed between the prospective
intruder and target installation?
• This type of additional protective measures usually placed above the
perimeter barrier serves as the look- out of the guard forces in giving
security in the area of responsibility.
MODULE NO.1 MIDTERM COVERAGE

• Binibining Marikit owned an establishment located in Tuguegarao City.


One of her proposal is to place fences on the entire area of her property
especially in securing and avoiding any unauthorized person to view the
activity inside of her establishment. What type of fence did Binibining
Marikit plan to have? Justify your answer.
TITLE GUARD FORCE AND GUARD SYSTEM
INTRODUCTION • Security guard is sometimes called as PRIVATE SECURITY GUARD or
WATCHMAN shall include any person who offers or renders personnel service
to watch or secure either a residence or business establishment or both for hire
or compensation and with a license to exercise profession.
• SECURITY GUARD FORCE it is a group of force selected men, trained or
grouped into functional unit for the purpose of protecting operational processes
from those disruption which would impeded efficiency or halt operation at a
particular plant, facility, installation or special activity.

LEARNING The objectives of this module are;


OBJECTIVES
• Discuss the brief history of security in the Ph.
• Explain the legal basis of security in the Ph.
• To identify the different types of security guard force
• Differentiate guard force and guard system
• Discuss what is R.A 5487
LEARNING At the end of this module the students will be able to;
OUTCOMES
• Know the history of security in the Ph.
• To gain knowledge on the different types of security guard force
• To be familiarize on the law related to security agency in the PH.
DISCUSSION • Security guard force is the key element in the overall security system of a
plant or installation. Its basic mission is to protect all the property within the
limits of the facility boundaries and protect employees and other persons on the
installation.

• Brief history of security guard in the Philippines.

➢ HISTORICAL BACKGROUND OF INDUSTRIAL SECURITY IN


THE PHILIPPINES
Before the approval of RA 5487 there is no law that regulates the security
guard, detective profession and so with the security agencies or private detective
agency. The security guard or private detective needed only to secure mayor’s permit
and police clearances to exercise profession while business establishment needed only
business permit in their respective city or municipality for them to able to hire security
guards.
In May 1958, the PADPAO or “the Philippine Association of Detective and
Protective Agency operators” was formed. The PADPAO drafted twin bills: House bil
no 1336 and senate bill no. 122 in 1969. These were represented in the chambers of
legislature during the sixth congress of the Philippine republic.
On June 13,1969, the said bill were approved and were then called the RA
5487 otherwise known as “the Private security Agency Law”. This act which
regulates the organization and operation of private detective, watchmen or security
guards (agency).

PRIVATE DETECTIVES- shall mean any person who does detective work for hire,
reward or commission, other than the members of the armed forces of the Philippines,
guards of the BJMP, municipal or city jail guards and members of the PNP or any
other law enforcement agency of the government. (2003 IRR.)

Implementing rules and Regulation of RA 5487 as amended date April 28, 2003
PERSONAL SECURITY PROTECTION SERVICES- commonly terms as
“bodyguard service” the final version of the IRR will permit ths activity to be
serviced by licensed Private Detectives only by specific authority. The basic law does
not prohibits PDs from this service rather it is the private security guard or watchman
that is banned from performing bodyguards task. In providing the delimitation the
committee considered a description of private detective work/service lifted from US
based internet manuscript as that to include others, performing personal, and executive
or celebrity protection.
Under rule 8, section 6 of the revised rules and regulation governing the
organization and operation of private detective, watchman and security guards agencies
throughout the Philippines issued by the chief of Constabulary on February 28, 1976 it
is provide that private detective operate on a covert type of mission on a specific
confidential order issued by his agency. The nature of his mission may depend on the
contract between the clients and the detective agency it shall include:
a. Character background check
b. Locating missing persons
c. Surveillance work
Under the revised IRR of RA 5487 GOVERNING THE ORGANIZATION
AND OPERATION OF PRIVATE SECURITY AGENCIES, COMPANY
SECURITY FORCES AND GOVERNMENT SECURITY FORCES.
The training program for private security personnel was expanded. Aimed at
developing the skillas and knowledge to suit current and future applications. Hence it
now includes specialized courses in intelligence and investigation, basic crisis
management, personal/VIP security, Armored car crew training, Bomb disposal
training, Bank security training and Basic aviation security.

PRIVATE SECURITY PERSONNEL- shall be natural persons which include


private security guards, private detectives and security consultants, security officers
and others that may be classified later, rendering/performing security and/or detective
services as employed by private agencies and/or private firms.

LEGAL BASIS OF INDUSTRIAL SECURITY IN THE PHILIPPINES

1. National authority
a. The highest law is the law of self-preservation. By instinct man, man
naturally reacts in order to protect himself, his family, his honor, freedom,
liberty and property from danger, threat or hazard. He does personally or
thru the help of others.
2. Constitutional authority
a. The prime duty of the government is to serve and protect the people. The
government may call upon the people to defend the state and in the
fulfillment thereof, all citizens may be required, under conditions provided
by aw or to render personal military service (Article 3 of the 1987
constitution)
b. No person shall be deprived of life, liberty or property without due process
of law, nor shall any person be denied the equal protection of the law.
(Article 3 section 1 of the constitution)
c. Private property shall not be taken for public use without just compensation.
(Article 3 section 9 of the constitution)
d. the right of people to be secured in their persons, houses, papers nd effects
against unreasonable searches and seizure of whatever nature and for any
purpose shall be inviolable and no search warrant or warrant of arrest shall
be issued except upon examination under oath or affirmation of the
complainant and the witnesses he may produce and particularly describing
the placed to be searched and the persons or the things to be seized. (Article
3 section 2 of the constitution)
3. Statutory authority
a. RPC
b. RA 5487- The private security agency law

SECURITY GUARD FORCE AND GUARD SYSTEM

The various types of security guard forces will be the emphases of this module.
Relative provisions of R.A. 5487 will also be included particularly on the qualifications
and paraphernalia of security personnel.

SECURITY GUARD FORCES

It is a group of force selected men, trained or grouped into functional unit for
the purpose of protecting operational processes from those disruption which would
impede efficiency or halt operation at a particular plant, facility, installation or special
activity.

R.A. 5487 provided for the organization and management of security guard
forces designed for specific organizations and purposes. The three (3) security guard
forces are the following:

1. Private Security Agency (PSA) refers to any person, association, partnership,


firm or private corporation, who contracts, recruits, trains, furnishes or post any
security guard, to do its functions or solicit individuals, business firms, or
private, public or government-owned or controlled corporations to engage
his/its service or those of his/its security guards, for hire, commission or
compensation.
2. Company Security Force (CSF) is a security force maintained and operated
by any private company or corporation for its own security requirements only.
3. Government Security Unit (GSU) is a security unit maintained and operated
by any government entity other than military and / a police, which is
established and maintained for the purpose of securing the office or compound
and/or extension of such government entity.

THE PHILIPPINE ASSOCIATION OF DETECTIVE AND PROTECTIVE


AGENCY OPERATORS, INC (PADPAO) – This is the national association of
all licensed security agencies and company security forces. This was established as
early as 1958 purposely for the self-regulation of all security agencies.

LICENSE TO OPERATE (LTO) is the document issued by the CPNP or his duly
authorized representative authorizing a person to engage in the occupation, calling or
employment as security guard or detectives, or a juridical person to establish, engage,
direct, manage or operate an individual or a private detective agency or private security
agency/company security force after payment of the prescribed dues or fees.

1. Application of License. New applicants for PSA license shall obtain:


a. a minimum capitalization of P1,000.000.00 only, and
b. a minimum bank deposit of P500,000.00.
2. Where to file? To the Office of the CPNP thru the CPNP-SOSIA
(SAGSD) using form SAGSD Form 01-94 and SAGSD Form 02-94 respectively.
3. Application Form for license to operate - The application shall contain:
a. full name of the applicant;
b. his age, civil status; and
c. residence and location of his business.
In case of corporation, association or partnership copies of the following
shall be appended:
a. Certificate of Registration with the SEC; and
b. BY-Laws and Articles of incorporation.
4. Endorsement of application – It shall be endorsed by the CSF District
Offices found in their respective Regions for and in the name of the Regional
Director.
5. License to Operate – It shall be a requirement prior to engage in the
occupation, calling or employment or engage in the business of PSA or PDA.
6. Graduated Scale of License to Operate - The following graduated scale
shall be approved by the CPNP or his duly authorized representative:
a. PSAs with temporary LTO having 200 or more but not exceeding 1000
shall be issued a regular LTO good for 2 years.
b. New PSA shall be issued a temporary LTO good for 1 year.
c. PSAs with temporary LTO having posted 100 guards or more but less than
200 shall upon expiration of such LTO shall be issued an extension period of 6
mos. However, upon expiration of the extension period, no extension shall be
granted unless the PSA shall submit a certification for additional 50 guards posted
for a 150 guards total.
d. PSAs with temporary LTOs, upon expiration still fail to comply with the
200 guards requirement, shall be granted another 6 mos. period. However, failure
to comply shall serve a basis for the issuance of cease to operate order.
e. LTO of PSAs with less than 100 guards after one year shall not be renewed.
f. PSAs with cancelled/revoked LTOs shall cease to operate and within 7 days
after having been duly notified of such cease to operate order, shall immediately
deposit all its firearms with the FEO (FED) or to the nearest CSFD Office for
eventual turnover to the CSFC HQ Attn: C, FEO (FED), Camp Crame, Q.C..
Thereafter, the CSFC District concerned shall conduct an inventory of surrendered
FAs which shall be receipted, copy furnished, CPNP SOSIA (SAGSD). Otherwise,
the PSA concerned, shall be liable under PD 1866 (RA 8249).

ORGANIZATION AND MANAGEMENT

1. Who may organize and maintain a PSA and Private Detective Agency (PDA)?
Any Filipino citizen or corporation, association, partnership, 100% owned and
controlled by Filipino citizens.
2. Basic Requirement of an operator or manager of agency
a. Filipino citizen
b. At least 25 years old
c. College graduate and/or
d. A commissioned officer in the inactive service or
e. Retired from AFP or PNP or
f. Graduated/taken course in concepts and methods in industrial Security
and Security Management and/or
g. Must have and adequate training or experience in security business
h. Good moral character - not having been convicted of any crime
involving moral turpitude; and
i. Not suffering any of the following disqualifications:
1) dishonorably discharged from AFP/PNP or separated for cause from
any government entity or government owned or controlled
corporation;
2) Being mentally incompetent;
3) Being physically unfit;
4) Addicted to the use of narcotic and/or prohibited drugs and/or
substances;
5) Habitual drunkard and alcoholic;
6) Dummy of any foreigner; and
7) Elective or appointive government officials and employees who may
be called upon on account of the functions of their respective office
in the implementation and enforcement of the provisions of RA
5487 and any person related to such government employees by
affinity or consanguinity in the third civil degree shall not hold any
interest, directly or indirectly in a security guard or watchman
agency on account of the functions of their respective offices in the
implementation and enforcement of RA 5487.
3. Organizational structure of PSAs/CSFs/GSUs

a. PSAs shall conform with the organizational structure, personnel,


equipment, training and clothing as provided for in RA 5487 as
amended and shall comply with the ff:
1) 100 guards shall be contracted during the 1st year of operation; and
2) Minimum of 200 guards for the succeeding year.
b. CSFs shall be organized and conform substantially to the organizational
structure prescribed for private security agencies.
c. GSUs shall be organized to conform with the organizational
structure of the said government firm but not contrary to the
organizational structure as prescribe for GSUs.
4. Establishment of Main/Branch Offices
a. All agencies shall maintain a main office in their registered addresses.
b. Branch offices - at least initial 10 guards during the 1st year of
operation.
c. Until the 30 minimum guards in the 3rd year of operation.
d. That branch offices shall be registered with the CSFC District and
Regional PADPAO (if any).
5. Security Service Contract - PSAs shall render security services to their clients
only after a service contract duly notarized shall have been executed between
them. Such contract stipulates:
a. the money consideration to be paid by the client to the PSA;
b. number of hours of services per guard per day; and
c. the guard’s salary to be received from the Agency.
6. Tenure of Security Personnel - It shall be co-terminus with the service
contract between the PSA and the client. Grounds for termination of the
guard’s services:
a. expiration of contract;
b. revocation of license to exercise profession;
c. conviction of crime involving moral turpitude;
d. loss of trust and confidence;
e. physical and mental disability; and
f. any other violation of the pertinent rules and regulations of RA 5487
7. Payrolls - Payrolls of PSAs, CSFs, and GSUs should follow the following:
a. Name of security guards arranged alphabetically and numbered
consecutively which shall be signed personally by the payees only after
the receipt of the amount indicated therein.
b. Separate payrolls for distant detachment/posts shall be prepared.
c. Payrolls shall be filed with the main office within 15 days after pay day.
d. It shall be in accordance with the standard format as provided for by
law.

SECURITY PERSONEL QUALIFICATIONS, FIREARMS AND EQUIPMENT


1. Person - This includes not only natural but also juridical persons such as
single proprietorships, partnerships, corporations, companies or associations,
duly organized and registered with the Securities and Exchange
Commissions and/or the Department of Trade and Industry.
2. Security Guard – Also known as private security guard or watchman shall
include any person who offers or renders personal services to watch or secure
either a residence or business establishment or both or buildings, compounds or
areas, for hire or compensation or as employee thereof, including any employee
of the national or local governments or agencies or instrumentalities thereof and
or governmental buildings, compounds, premises and other properties, other
than members of the AFP, BJMP, PNP or of any other law enforcement agency
of the government.
3. Private Detective refers to any person who does detective work for hire,
reward or commission, other than members of the AFP, BJMP, provincial
guards, PNP or any law enforcement agency of the government.
4. License to Exercise Profession or License Certificate – The document issued
by the CPNP or his duly authorized representative recognizing a person to be
qualified to perform his duties as security guard or detective.

QUALIFICATIONS OF SECURITY GUARDS AND SECURITY OFFICERS


The minimum qualifications for security guards, security officers and security
consultants are stated below:

1. Basic requisites for security guards – No person shall be licensed as security


guard unless he possesses the following qualifications:

a. Filipino citizen;
b. High school graduate;
c. Physically and mentally fit;
d. At least 18 years old but not more than 50 years old;
e. Has undergone pre-licensing training course; and
f. Must not possess any of the disqualifications.
2. Desirable Qualities of Security Guards – In addition to the minimum
qualifications, security guards must also possess the following:

a. Alertness- A good guard must be alert in spotting violators. This can be


attained by being watchful, dedicated and diligence.
b. Judgment- sound and good judgment is more than the use of common
sense. It is the arriving at wise and timely decision.
c. Confidence- it is the state of being sure; a state of the mind free from
doubt or misgivings. This attribute includes faith in oneself and in his
abilities, which is attained by job knowledge. Thorough and proper
training plus good supervision instills confidence.
d. Physical fitness- security work is strenuous and demanding. Physical
conditioning is essential if he is to be a dependable guard.
e. Tactfulness- ability of the guard to deal with others successfully
without offending. In short, he can be firm but pleasant.
f. Self-control- ability to take hold of oneself regardless of a provoking
situation. With self-control, the guard will do his work without being
angry and the situation will be on hand.
g. Interest, loyalty, responsible and trustworthy, is also important
attributes of a reliable guard.
3. Exemptions from Pre-Licensing – The following need not undergo pre-
licensing training for security guards:
a. Veterans and retired or honorably discharged military/police personnel
possessing all the qualifications mentioned in the preceding section.
b. ROTC advance/basic graduates, and/or its equivalent in the AFP, PNP,
CAFGU/CHDF.

4. Qualifications of a Private Detective – No person shall be licensed as a


private detective, unless, he possesses any of the following qualifications:
a. Holder of baccalaureate degree or Bachelor of Laws; or
b. B.S. Criminology graduate; or
c. Graduate of Criminal Investigation Course offered by the then PC/INP
or the PNP or the NBI or any police training school or detective training
with authorized/recognized training center for security guard; or
d. Advance Reserve Officers Training Course or Citizen Military Training
(ROTC/CMT) graduate.
5. Qualifications for Security Officer – No person shall be licensed as Security
Officer unless he has the following qualifications:
a. Filipino citizen;
b. Holder of Baccalaureate Degree;
c. Physically and mentally fit;
d. Has graduated from a Security Officer Training Course;
e. Retired personnel of the PNP/AFP; and
f. Must not possess any of the disqualification enumerated in Sec. 2,
Rule II.
6. Qualifications of Security Consultant – No person shall be licensed as
Security Consultant unless in addition to those prescribed in Sec. 5 of this rule,
possesses any of the ff:
a. Holder of a Masters degree in either Criminology, Public
Administration, MNSA, Industrial Administration or Law; or
b. Must have at least 10 years experience in the operation and management
of security business.
7. Other Exemptions - Any officer or enlisted man of the AFP or a uniform
member of the PNP honorably discharged/separated or retired from the service
are exempted from the requirements.

USE OF FIREARMS AND EQUIPMENT

1. Possession of Firearms (FA) by PSA – After complying all the requirements,


PSAs are entitled to possess firearms of any of the following:

a. shotguns, not higher than 12 gauge;


b. low-power rifle or revolvers, cal. .22;
c. cal. .38 pistols or revolvers not exceeding one (1) FA for every two (2)
security guard in its employ.
d. Minimum number of firearms:
1) PSA with 100 guards - at least 30 pieces of licensed firearms.
However, after operating 6 mos., the PSA can procure firearms in
proportion to the number of posted guards.
2) For regular License to Operate (LTO) application - at least 70 pieces
of firearms.
3) Use of firearms for Private Detective Agency shall be OPTIONAL.
2. Restriction to possess certain caliber of firearms - The total number of the
prescribed high-powered firearms shall not exceed ten (10) percent of the total
numbers of guards employed. Private Security Agencies are not allowed to
possess high caliber guns/firearms such as: carbine; M16; Cal 45; center fire
magnum cal .41 and .44; and high caliber firearms, except: when such private
PSA/CSF is operating in areas where there is an upsurge of lawlessness and
criminality. Exception is granted by CPNP or Regional Director of Regional
Police Office under the following conditions:

a. Acquisition of the high powered Firearms shall be at expense of the


PSA/CSF concerned;
b. Before the firearms are issued, the same should be registered with the
PNP-FED; and
c. The security personnel who will use such firearms shall first be given
adequate training in the care and use thereof which will be under the
supervision of qualified officers and men of the PNP.
3. Limitations in the carrying of firearms – The issued firearm shall be carried
only by the security guard (SG):
a. During his tour of duty when in proper uniform within the compound of
the establishment, where he is assigned; and
b. Except, when he is escorting big amount of cash or valuables, and upon
prior coordination with the nearest PNP units/stations.
4. Duty Detail Order or DDO – Private Security Agencies or Company
Security Forces detailing security personnel on duties under the circumstances
mentioned in the preceding section or while escorting big amount of cash or
valuable outside its jurisdiction or area of operation, shall issue an appropriate
DDO using SAGSD Form No. 12-94.
5. Confiscation of firearms – Firearms could be confiscated when the it is:
a. about to be used in the commission of a crime;
b. actually being used in the commission of crime;
c. has just been used in the commission of a crime;
d. is being carried by the SG is unlicensed or not authorized by law and
regulation for his use;
e. confiscated by order of the court;
f. used or carried outside the AOR of the SG without proper authority; or
g. the SG is unlicensed.
6. Disposition of confiscated Firearms - The law enforcement officer who
confiscated the FA shall inform the CPNP thru CSG within 24 hours after
such confiscation.
a. The firearm shall be turned over immediately to the nearest PNP
Unit/Station who shall immediately turn over the same to the CSG
District Office.
b. When the confiscation is by order of the court, the same shall be turned
over to the court concerned.
7. Filing of application - It shall be filed with the FED thru the SAGSD and
CSG District Office for Regions outside NCR in accordance with the firearms
laws and implementing executive orders and regulations. In addition, the
following shall be submitted:
a. Duly approved LTO;
b. Certification of safety vault ownership as prescribed by the Chief,
Firearms and Explosive Division or CFED;
c. P40.00 surety bond per firearm to be deposited thru the PNB and a FA
certificate of deposit shall be secured pursuant to Sec. 887 of the
Revised Administrative Code (RAC); and
d. Sworn Statement of the manager or operator of the Agency that its
security personnel shall be required by the management to undertake the
following in case of impending or actual strike:
1) To report to the CPNP or nearest police station such impending
strike;
2) To exercise necessary diligence in the collection and safekeeping of
FAs to include safety vaults to prevent the use of the FA in the
furtherance of the strike;
3) To insure that all FAs and ammunitions in the possession of all
striking security personnel of the agency are immediately collected
and security in the safety vaults under the control of the agency; and
4) To assume responsibility in the proper handling of FAs in order to
prevent misuse of same or that no non-members shall be allowed to
hold said FAs issued or licensed in favor of the Agency.
8. Revocation of license to possess FAs - Reasons of revocation:
a. Failure to submit any issued FA for verification as required by Sec. 897
of RAC;
b. Carrying of FAs by security personnel w/out appropriate DDO;
c. When its serial number (SN) is duplicated or using the SN for more than
one firearm (FA);
d. Carrying of FAs outside the place stated in the permit as required by
E.O. or carrying FA in places prohibited under the law;
e. Conviction of the operator or manager of the agency of any crime
involving moral turpitude; or
f. When the firearm was reported lost.
9. Illegal possession of firearms - No security guard or private detective shall
use unlicensed FAs in the performance of his duty, nor be allowed to use with
duplicated serial numbers (SNs).
10. Stocking of ammunitions - It shall be on a limited and reasonable quantity
that suits the need of the Agency and be subjected to regular inspection by
representatives of the CPNP.
11. It shall not exceed fifty (50) rounds of ammunitions per unit of duly
licensed Fas.
12. Individual issue to security guard shall be limited to twenty-five (25) rounds
per SG.
13. Use of VHF/UHF handheld radios – Optional on the part of management of
the agency/company depending on the prevailing situation provided that such
equipment is properly registered in accordance with the existing law.

UNIFORM, EQUIPMENT AND PARAPHERNALIA

1. Uniform for males - It shall consist of: Headgear; service shirt; service
trousers; service belt; and footwear. The uniform shall be made of fast navy
blue thick fabric for the trouser for daily security officers wear and for service
shirts of field or perimeter guards while a choice of:
a. Light blue and/or white service shirts for internal guards for PSA;
b. Light gray for company security force; and
c. White for government security unit.
Further, the following shall be observed as part of the uniform of security personnel:

a. Head gear for daily wear - Pershing cap which is fast navy blue with
gold strap, black visor, octagonal nylon net top and prescribed SAGSD
metal cap device. For ceremonial purposes, use it with the black strap.
b. Service Bush jacket – It shall be worn only by the Directorial and Staff
Officers of agency.
c. Service Shirt for Security Officers
1) Service uniform.
a) Private Security Guard - fast navy blue.
b) Company Security Force - light gray.
c) Government Security Unit - white.
2) Field Uniform. (Optional for cold weather areas only)
a) PSA - long sleeves and detachable hoods.
b) CSF - same for PSA but color is white.
c) GSU - same with PSA except the color is white.
3) Gala Uniform - for ceremonial purposes only and at the expense of
the establishment conducting the ceremonies.
1) Pershing cap
2) Blouse - shall be tailored as an open coat, long sleeves, it shall
have shoulder straps and guard officers shall wear shoulder
boards with the authorized rank design.
3) Buttons - with four (4) big brass buttons to close dress and four
(4) small buttons for the pockets.
4) Shirt - white long sleeves.
5) Necktie - shall conform to the color of the blouses five (5)
centimeters wide.
6) Trousers - same design and materials as the service trousers.
a) Service Trouser - fast navy blue, straight cut, slanted pockets and two
back pockets without flaps.
b) Service Belt - leather measuring 4 1/2 centimeters in width.
c) Footwear
(1) Service shoes - black leather shoes with rubber heals and sole.
(2) Rubber rain boots - optional as the nature of the post requires.
2. Uniform for Females – It shall be made of thick fabric and it shall consist of a
modified overseas cap two (2) ply similar to the women police service, service
skirts (palda) and blouse, service belt, and black leather shoes.

a. Headgear – Fast navy blue (2 ply) cap without piping but with
regulation cap device.
b. Service Shirt
1) PSA – Fast navy blue, light blue or white, thick fabric short sleeves,
shoulder straps, two breast pockets with cover flaps and navy blue
front buttons, tucked in.
2) CSF – Sewn in similar manner as of the PSA except that the shirting
materials shall be fabric “light gray” in color.
3) GSU – Similarly sewn but shall be white fabric.
c. Service Trousers – Fast navy blue thick fabric trousers straight cut with
slanted side pocket and two back pockets without cover flaps. It may be worn
during night duty/inclement weather.
d. Service Skirt – (Optional) Navy blue A-line skirt with two front side
pockets. It may be worn indoors.
e. Service Belt – Leather and it shall be used as pistol belt measuring four
and one-half (4½) centimeters in width.
f. Footwear
1) Service shoes – plain black shoes, low-cut, rubber soles and heel
(maximum of five centimeters) and black shoe laces.
2) Rubber rain boots black – optional as the nature of post so requires.
3. Ornaments and patches
a. National badge
b. Cap device (brass) shall be attached on the pershing cap of officers
c. Regulation buckle – with agency name
d. Collar device
e. Name cloth shall consist of embroidered navy blue block-lettered
surname and initials of the first and middle names on yellow
background with blue borderline, the name shall be preceded by the
word “SG”. The letter shall be one and one-half (1½) centimeters in
height and the name cloth shall be sewn on the right top pocket
f. Agency/unit name cloth – similarly sewn as the name cloth
g. Equipment and paraphernalia.

Security Director/Inspector
a) leather pistol belt with regulation buckle; and
b) Holster, black leather.
Security Guard (male/female)
a) Black leather belt for pistol and night stick with regulation buckle;
b) Holster, black leather for pistol, night stick and handheld radio;
c) Night stick (baton) with horizontal handle;
d) Whistle with lanyard; and
e) Pocket book with writing pen.
4. Special Set of Uniform – It shall be prescribed for security personnel posted at
department stores noted as tourist-heavy areas, banks and other foreign clientele.
a. Uniform (male) – The special set of uniform shall consist of
pershing cap, ball cap, service bush, jacket, service shirt, service trousers,
service belt, necktie, lanyard and footwear.
1) Pershing cap – Fast navy blue with gold strap, black visor, octagonal
nylon net top and prescribed metal cap device. It shall be worn by security
agency officers and guards while wearing a complete special type of
uniform.
2) Service Bush Jacket – White ramie polyester fabric and shall be
sewn short sleeves with shoulder straps, two each breast and front pockets
with cover flaps and fixed cloth belt fastened with metal buckle. It shall be
worn by security agency officer while on duty at indoor places with
complete prescribed paraphernalia and agency/client patches.
3) Service Shirt – White cotton/cotton polyester fabric and shall be
sewn short sleeves or long sleeves as the case maybe, shoulder straps, two
breast pockets with cover flaps and white front buttons. Be worn by security
guards tuck-in while on duty at designated indoor places with complete
prescribed paraphernalia and agency/client patches.
4) Service Trousers – Fast navy blue color, straight cut, slanted pockets
and two back pockets with cover flaps. It shall be worn by security agency
officer and security guard.
5) Service belt – Black in color, leather, to be used as pistol belt
measuring four and one-half centimeters in width. It shall be worn by both
security officers and security guards while in complete special type of
uniform.
6) Necktie – Plain fast navy blue and five centimeters wide. It shall be
worn by security guards while in complete special type of uniform.
7) Lanyard – Navy blue in color, same style as used by AFP of PNP
Personnel. It shall be worn by security agency officers and security guards
while in complete special type of uniform.
8) Footwear – Black leather shoes with rubber heels and soles, plain
top low-cut and black shoe lace to be worn with plain black socks.
9) Ball cap – Fast navy blue round nylon net top with visor and
prescribed embroidered cloth cap device (optional in lieu of the pershing
cap).
b. Uniform (Female) – It shall consist of an oversea cap two (2)
ply service bush jacket, service blouse, service belt, lanyard and black
leather shoes.
1) Bush cap – Fast navy blue (2 ply) without piping but with regulation
cap device.
2) Service Bush Jacket – White in color and shall be sewn in same
style as that of security agency officer. It shall be worn by security lady
officer with complete prescribed paraphernalia, name cloths and
agency/client patches.
3) Service Shirt – White ramie polyester fabric and shall be sewn short
sleeves or long sleeves as the case maybe, shoulder straps, two breast
pockets with cover flaps and navy blue front buttons. It shall be worn by
private security lady guard with complete prescribed paraphernalia, name
cloths, agency/client patches, service belt, and lanyard.. This type of
uniform shall be worn tuck in only at indoor places.
4) Service Belt
5) Lanyard
6) Service Skirt – A line skirt with two front slide pockets. It shall be
worn when posted indoors.
7) Footwear – Plain black leather shoes, low-cut rubber soles and heel
(maximum of five cm) and black shoe laces.
c. Paraphernalia – The proposed special set of uniform for
security shall be prescribed or authorized to be issued only on a case to
case basis at the areas as herein authorized upon prior request of the clients
concerned.
5. Provision for uniform - All employers/owners/operators of PSA/CSF shall
provide at least one (1) set of the prescribed uniform free of charge to their
respective security guard for every year of service with them. Likewise, all
licensed security guard shall provide themselves with one (1) set uniform once
a year unless their employers provide it for free.

RANKS, POSITIONS, STAFFING PATTERN AND JOB DESCRIPTION

RANKS AND POSITIONS


The organization of private security agencies, company guard forces, and
government security units are patterned from the organizational structures of the PNP
and the AFP. Hence, security officers and personnel too are distinguished by means of
ranks and position. The ranks and positions described in this lesson are in accordance
with Sec. 1, Rule VII of R.A. 5487. It is mandated that the security agency operator or
owner must observe the required major ranks and positions in the organization of the
agency.

1. Security Management Staff

a. Security Director (SD) - Agency Manager/Chief Security Officer.


b. Security Executive Director (SED) - Asst. Agency Manager/asst. Chief
Security Officer.
c. Security Staff Director (SSD) - Staff Director for Operation and Staff
Director for Administration.
2. Line Leadership Staff

a. Security Supervisor 3 - Detachment Commanders


b. Security Supervisor 2 - Chief Inspector
c. Security Supervisor 1 – Inspector
3. Security Guard

a. Security Guard 1 - watchman/guard


b. Security Guard 2 - Shift-in-charge
c. Security Guard 3 - Post-in-charge
4. Security Consultant is optional but must possess all qualifications listed in
Sec. 6, Rule III of R.A. 5487.

STAFFING AND JOB DESCRIPTION


The structure of the PSA, CSF, and GSU also follows a vertical line staff
model. The pattern of staffing and their respective job descriptions are based on Sec.
2, Rule VII of R.A. 5487.
1. Security Management Staff
a. Agency manager/Chief Security Officer. He is responsible for the entire
operation and administration/management of the security agency and
directly responsible to the agency operator/owner/Board of Directors.
b. Assistant Agency Manager assists the agency manager and takes the
operational and administrative management when the manager is absent.
c. Security Staff Director for Operation - The staff assistant for the
efficient operation of the agency. It includes canvassing of clientele and
the implementation of contract and agreement - He is also responsible for
the conduct of investigation and the conduct of training.
d. Security Staff Director for Administration - He is the assistant for the
effective and efficient administration and management of the agency. He
is also responsible for the professionalization of the personnel,
procurement/recruitment, confirming of awards, mobility and issuance of
Firearms.
2. Line Leadership Staff
a. The Detachment Commander - The field or area commander of the
Agency. Detachment shall consist of several posts.
b. The Chief Inspector - shall be responsible for inspecting the entire area
covered by the Detachment.
c. The Security Inspector – is responsible for the area assigned by the
Chief Inspector of the Detachment Commander.
3. Security Guard
a. Security Guard 3 or The Post-in-charge - responsible for the entire
detailed security officer/personnel within a certain establishment.
b. Security Guard 2 or The Shift-in-charge – is responsible for the
security officers who are scheduled in a certain shift for a particular
period.
c. Security Guard 1 or The Security Guard (watchman/guard) - The one
actually posted as watchman and or guard.

A. SPECIFIC DUTIES AND RESPONSIBILITIES

1. Office of the General Manager/Security Director


a. It is vested the authority and responsibility of running the security force
by authority of the President of the Company/Corporation.
b. He is directly responsible to the President of the Company/Corporation
in the operations and administration of the security force.
c. He is the principal adviser to the president on matters involving security
operations, administration of the security force.
d. He is the overall head of both various staff departments and field units
where he may delegate corresponding authority commensurate to their
assigned responsibility.
e. He implements policies promulgated by the policy making body and
executed by the President.
f. He directs controls and supervises all offices and field units of the force
in their respective assigned tasks.
g. He performs other functions as directed by the President of the
Company/Corporation.
2. Office of the Executive secretary of the General Manager
a. He is the principal administrative assistant to the General
Manager/Security Director.
b. He prepares communications initiated by the General Manager/Security
Director.
c. He maintains records of scheduled conferences, appointments and other
engagements and advises the GM/SD of such activities.
d. He records and checks outgoing communications signed by the GM/SD
as to its completeness (attachments to be considered) as well as to
ensure the timely dispatch to the addressee through the administrative
section.
e. To perform other duties as directed by the General Manager
(GM)/Security Director (SD).
3. Office of the Assistant General Manager/Security Executive Director
a. He takes the Operational and Administrative Management of the
security force in the absence of the GM/SD
b. He is directly responsible to the GM/SD.
c. He performs other duties as directed by GM/SD.
4. Office of the Human Resources and Administrative Manager/Staff
Director for Personnel and Administration – He is the principal staff assistant to
the General Manager/Security Director for planning and supervising matters or
activities pertaining to personnel management and miscellaneous administrative
functions such as:
a. Personnel Strengths
b. Replacement
c. Discipline, Law and Order
d. Morale and Personnel Services
e. Personnel Procedures
f. Interior Management
g. Personnel Adviser
5. Office of the Operations Manager/Staff Director for Operations - This
office is the principal staff on Operations, training, intelligence and investigation.
6. Office of the Finance - This office is principally concerned with budgeting,
finance, reports control and program review and analysis. Exercises supervision
over the management engineering activities of the company and the accounting
office. Renders advice, assistance and guidance to GM/SD on financial
management. Specific duties and functions of the Finance Office are:
a. Accounting
b. Credit and collection
c. Bookkeeping
d. Billing
e. Payroll
f. Disbursing
7. Office of the Logistic Manager - This office:
a. Coordinates plan and supervise the implementation of directive and
guidance determines divisional responsibility and evaluates in logistical
planning and related planning programs.
b. Develops, administers, and coordinates research and development on
logistical matters.
c. Collects and computes statistical data on logistical matters.
d. Recommends logistics budget policy including budget planning.
e. Prepares estimates and/or requirements to ensure that logistical plans
support for corporate plans.
f. Performs necessary program and fiscal administration.
g. Supervise all matters pertaining to supply.
h. Determine the organization, allocation of service personnel
i. Plans for maintenance and repair of supplies and equipment.
8. Office of the Inspectorate and Special Projects (Special Staff)
a. This office assists the General Manger in inquiring into, and reports
upon matters pertaining to the performance of the different staff, units,
towards the attainment of corporate objectives. It also inquires on the
state of discipline, efficiency and economy of the company.
b. The Inspectorate Staff conducts inspections, investigations and submits
reports to the General Manager. In the performance of its duties and
functions, the General Manger is provided relevant information
pertaining to meritorious conduct and performance of a unit or
individual.
c. This office is also tasked to conduct overt and covert inspections and
investigations and other related services.
9. Office of the Communications Officer - The Communications Officer who
is a licensed radio operator is the principal adviser of the General Manager on
communication on matters pertaining to radio communication.
10. The Detachment Commander/Officer-in-Charge - Detachment
Commander shall command and responsible for a certain detachment, with fifteen
(15) or more security personnel under him. He is directly responsible to the
Security Manager of the installation.
a. He prepares and executes the security plan of his Detachment in relation
to the security requirements of the establishment being guarded.
b. He is responsible for the enforcement and implementation of Rules and
Regulations/Policies.
c. He receives instructions from the Security Manager and implements the
same as required.
d. He has full operational and administrative control of all his units to
include his assistant and shift-in-charge/supervisor.
e. He conducts inspection of his units and institutes corrective measures on
the spot on those problems he may detect or brought to his attention. If
not possible, he brings the problem to the Security Manager of the
establishment.
11. Assistant Detachment Commander (ADC)
a. Detachment with more than twenty (20) security personnel assigned
may be provided with an Assistant Detachment Commander who will
be the principal assistant of the Detachment Commander.
b. In the absence of the Detachment Commander, he performs the duties of
the Detachment Commander.
12. Shift-in-Charge (SIC)
a. The Shift-in-Charge shall be responsible to the Detachment Commander
as far as his shift is concerned.
b. He forms his men at least 30 minute before posting time seeing that all
are in proper uniform and presentable.
c. He disseminates instructions coming form his Detachment
Commander/OIC or those relayed to him by his counter-part, the
outgoing SIC.
d. He inspects the posts as often as he can to ensure that his men are on the
alert and performing their duties effectively.
e. He performs other duties as may be directed by the Detachment
Commander or by the ADC.
13. Security Guard on Duty/Post
a. The Security Guard (SG) on Duty/Post must always carry his license to
practice his profession, Xerox copy of the firearm’s license assigned to
him, and his duty detail order, authorizing him to carry his issued
firearm within his area of jurisdiction.
b. If the Security Guard is manning a fixed post especially entrance or exit
points, he must maintain a guard’s logbook and enters in the same
logbook all events/passages of VIP’s vehicles and inspections or visits
of Security Manager/Director of the Client/Firm.
c. Guards must observe and apply religiously the provisions of the Code of
Ethics, Code of Conduct, and the General Orders of the Security Guard
when on post.
d. He may perform special task as may be directed by his shift supervisor,
DC and or ADC like control of visitors, inspections of bags of persons
coming in and going out of the establishment, vehicle cargoes, or
prevents the intrusion of unauthorized person in a particular area, etc.

POWERS AND FUNCTIONS - Security guards have the following powers and
duties:

1. Territorial Power - Perform duties within the firm or establishment with


whom he or his agency has a contract for security services and shall not go beyond
the property or compound, except:
a. when required by the clientele in accordance with the terms of their
contract to escort big sums of money or valuables or
b. in some cases, in hot pursuit of criminal offenders.
2. Arrest by security guard - He is not a peace officer and is not, therefore
clothed with police authority. However, he may effect arrest under any of the ff.:
a. When the person to be arrested has committed, is actually committing,
or is about to commit an offense in his presence.
b. When an offense has in fact been committed, and he has a reasonable
ground/personal knowledge to believe that the person to be arrested has
committed it; or
c. When the person to be arrested is a prisoner who has escaped from a
penal establishment or place where he is serving final judgment or
temporarily confined while his case is pending or has escaped while
being transferred from one confinement to another.
3. Method of Arrest - The watchman/security guard or private detective shall
inform the person to be arrested of the intention to arrest him and cause of the
arrest, unless the person to be arrested is as previously stated, or when the giving of
such information will imperil the arrest. )
4. Duty of SG making arrest – He shall immediately turn over the person
arrested to the nearest peace officer, police outpost or headquarters for custody
and/or appropriate action, or he may without delay and within the time prescribed
by Art. 125 of the RPC.
5. Search without warrant - Any security guard may:
a. Incident to the arrest, search the person in the presence of at least two
(2) witnesses.
b. Also search the person, firm or establishment with which such search is
required by the very nature of the business of the clientele.
6. General scope of detective work - A private detective shall operate on a
covert type of mission on a specific confidential order issued by his agency. The
nature of his mission may depend on the contract between the client and the
detective agency. It shall include:
a. Personnel security investigation/background investigation;
b. Locating missing person;
c. Surveillance work; and
d. Other detective work as may become the subject matter of contract
between the agency and its client provided it is not contrary to law,
public order, public policy, morale and good customs.
7. General Orders similar to AFP/PNP GOs
8. Duty to Assist Law Enforcers - Any security shall be bound to assist any
peace officer in the pursuit of his bounding duty, when requested, provided it is
within the territorial jurisdiction of his (SG) area of duty.

PROFESSIONAL CONDUCT AND ETHICS OF SECURITY GUARDS – As


with other professions, security personnel also are guided by their profession’s conduct
and ethics in the performance of their duties. Their professional conduct and ethics are
stipulated in Secs. 1-3, Rule VIII of the R.A. 5487.

1. Security Guard Creed, Code of Ethics, and Code of Conduct – All


members of PSA and private detective agency/CSF/GSU shall strictly observe their
creed, Code of Ethics and Code of Conduct.

SECURITY GUARDS CREED


As a security guard my fundamental duty is to protect lives and property and
maintain order within the vicinity/my place of duty; protect the interest of my employer
and our clients and the security and stability of our government and country without
compromise and prejudice, honest in my action, words and thought; and do my best to
uphold the principle: MAKADIOS, MAKABAYAN at MAKATAO.

ETHICAL STANDARD

a. As a security guard/detective his fundamental duty is to serve the interest or


mission of his agency in compliance with the contract entered into with clients
or customers of the agency he is supposed to serve;
b. He shall be honest in thoughts and deeds both in his personal and official
actuations, obeying the laws of the land and the regulations prescribed by his
agency and those established by the company he is supposed to protect;
c. He shall not reveal any confidential information confided to him as a security
guard and such other matters imposed upon him by law;
d. He shall act at all times with decorum and shall not permit personal feelings,
prejudices and undue friendship to influence his actuation while in the
performance of his official functions;
e. He shall not compromise with criminals and other lawless elements to the
prejudice of the customers or clients and shall assist the government in its
relentless drive against lawlessness and other forms of criminality;
f. He shall carry out his assigned duties as required by law to the best of his
ability and shall safeguard life and property the best of the establishment he is
assigned to;
g. He shall wear his uniform, badge, patches and insignia properly as a symbol of
public trust and confidence, as an honest and trustworthy security guard and
private detectives;
h. He shall keep his allegiance first to the government he is assigned to serve with
loyalty and utmost dedication;
i. He shall diligently and progressively familiarize himself with the rules and
regulations lay down by his agency and those of the customers or clients;
j. He shall at all times be courteous, respectful and salute his superior officers,
government officials and officials of the establishment where he is assigned and
the company he is supposed to serve;
k. He shall report for duty always in proper uniform and neat in his appearance;
and
l. He shall learn at heart and strictly observe the laws and regulations governing
the use of firearm.

CODE OF CONDUCT

a. He shall carry with him at all times during his tour of duty his license
identification card and duty detail order with an authority to carry firearms;
b. He shall not use his license and privileges to the prejudice of the public, the
client or customer and his agency;
c. He shall not engage in any unnecessary conversation with anybody except in
the discharge of his work and shall at all times keep himself alert during his
tour of duty;
d. He shall not read newspapers, magazines, books, etc., while actually
performing his duties;
e. He shall not drink any intoxicating liquor immediately before and during his
tour of duty;
f. He shall know the location of the alarm box near his post and sound the alarm
in case of fire or disorder;
g. He shall know how to operate any fire extinguishers at his post;
h. He shall know the location of the telephone and/or telephone number of the
police precincts as well as the telephone number of the fire stations in the
locality;
i. He shall immediately notify the police in case of any sign of disorder, strike,
riot or any serious violations of the law;
j. He or his group or guards shall not participate or integrate any disorder, strike,
riot or any serious violations of the law;
k. He shall assist the police in the preservation and maintenance of peace and
order and in the protection of life, property/having in mind that the nature of his
responsibilities is similar to that of the latter;
l. He shall familiarize himself with the Private Security Agency Law (RA5487) as
amended, and the PNP SAGSD implementing rules and regulations;
m. When issued a pass he should not lend his pass to anybody;
n. He shall always in proper uniform and shall always carry with him his basic
requirements, and equipment such as writing notebook, ball pen, nightstick
(baton) and/or radio; and
o. He shall endeavor at all times to merit and be worthy of the trust and
confidence of the agency he represents and the client he serves.

GENERAL ORDERS – These are patterned after the 11 GOs of the AFP and PNP.

1. To take charge of the post and all company properties in view.


2. To walk during his tour of duty in a military manner, keeping always on the
alert and observing everything that takes place within sight or hearing.
3. To repeat all calls from post more distant from the guardhouse where I am
stationed.
4. To report all violations of orders I am instructed to enforce.
5. To quit my post only when properly relieved.
6. To receive, obey and pass on to the relieving guard all orders from company
officers or officials, supervisors, post in charge or shift leaders.
7. To talk to one except in line of duty.
8. To sound or call the alarm in case of fire or disorders.
9. To call the officer in any not covered by instructions.
10. To salute all company officials, superiors, in the agency ranking public officials
and commissioned officers of the Armed Forces of the Philippines and officers
of the integrated National Police; and
11. To be especially watchful at night and during the time of challenging, to
challenge all persons on or near my post and to allow no one to pass or loiter
without proper authority.

C. PROFESSIONAL CREED, CODE OF ETHICS AND CODE OF CONDUCT


OF AGENCY PROPRIETOR AND PSA/CSF AND GSU – The Proprietors of
Security Agencies too have their own creed and the PSAs/CSFs and GSUs are also
covered by their Codes of Ethics and Conduct.

2. Creed of Security Agency Proprietor, Code of Ethics and Code of Conduct


for Private Security Agencies/Company Security Force and Government Security
Unit.

SECURITY AGENCY OPERATOR’S CREED


As a security agency proprietor my fundamental duty is to serve the interest of
my clientele and my security guard; protect the interest of the government; adhere
professionally in the conduct of my business without prejudices and compromises to
human rights and uphold constantly the law and abide the rules and regulations set by
the government in the conduct of my business.
ETHICAL STANDARD
As a licensed PSA/CSF, it shall be its prime concern to share with other
licensed agencies and company security forces, the burden of responsibility in
upholding the integrity and trust of the private security profession at all times. In
discharging this responsibility, its officials shall:

a. Endeavor to fulfill their professional duties in accordance with the highest moral
principles, always conforming to the precepts of truth, fairness and justice;
b. Contribute to the national welfare by securing and preserving industrial facilities
of the country, through competent guarding services;
c. Promote the well being of security guard thru adequate wages and other
emoluments;
d. With faith and diligence, perform their contractual obligations for the protection
of life, limb and property;
e. Constantly endeavor to raise quality standards of private security services; and
f. Continuously work with and assist the law enforcement agencies in the
preservation of peace and order in the country.

CODE OF CONDUCT

a. They shall at all times adhere to professional ethics and refrain from practices that
negate the best interest of the private security service industry. They shall always
consider that unity in the profession is vital and paramount for the attainment of
common objectives;
b. They shall not use deceitful means and/or misrepresentations in al their business
transaction. To this end, they shall avoid granting of rebates, or commissions in
securing guarding contracts;
c. They shall not indulge in cut-throat competition by undercutting the existing
contract rate between the PSA and the client and/or the minimum contract rate
prescribed under the PADPAO Memorandum Agreement.
d. They shall pay their guards in accordance with rates fixed by law. They shall not
impose any unauthorized deductions on the guard’s earnings. They shall not
obstruct the freedom of guards to seek employment elsewhere as they choose,
subject to existing laws, nor accept a guard without clearance from the losing
agency;
e. When a prospective client with existing company security force calls/bids for
additional security guard, all bidding security agencies shall observe the principle
of “equal pay for equal work” considering the rate of pay of the company security
service and their own guards;
f. They shall endeavor to raise the standard of service in the security profession thru
incentives and in-service training;
g. They shall establish an adequate library of books, magazines and other
publications on security subjects, materials, references, etc. in each PSA.
h. They shall always be truthful and accurate in reports required by SOSIA and/or
other competent authorities and be prompt in the submissions of the same;
i. They shall not, under any circumstances, employ for guard duty any person
without a professional license as a security guard duly issued by the Chief, PNP;
and
j. They shall at all times exercise vigilance and be prepared to prevent the use of
their guards or the agency in activities inimical to the state or national security.
When activities of this nature come to their attention, they shall as a matter of duty
render and appropriate report to the Philippine National Police authorities.
EXERCISES
• Two Instances when the Chief PNP may deputize any security guard to
assist the PNP in the performance of police duties.
• Agency name can be located on _________uniform of Security Guard.
Right Chest – SG name
Left Chest – Agency Name
Left Shoulder – Agency Logo
Right Shoulder – PADPAO logo
• A security guard has to turn over his firearm to whom?
• What is the first thing that a security expert will do before he can
recommend what types of security will be needed responsive to the
firm’s protective requirements?
• Can a security guard apprehend/arrest an intruder? Justify your answer.
• Draw a female and male security guard wearing their prescribed
uniforms and paraphernalia’s and label them accordingly. Below the
illustration give their desirable traits as a security guard.
• They are referred to as the BLUE ARMY?
• A new private security agency shall be issued a temporary licensed to
operate that is good for _______.
• The person who has the power to revoke for cause the licensed issued
to security guard is_______.
• A PSA who is applying for regular license to operate must possess at
least 70 licensed firearm and a minimum of_________guards.
• Branch offices of PSA shall established and maintained in other
provunces and cities with a minimum of10 security guards and
maximum of _________.
MODULE NO.1 FINAL COVERAGE

TITLE DOCUMENT AND INFORMATION SECURITY

INTRODUCTION • Document security system is that aspect of security which involves the
application of security measures for the proper protection and
safeguarding of classified information.
• Document and information security is the loss of document and
information cost billions of pesos. The importance of document and
information security in not realized until after a loss has been
discovered in many instances one that has already cause irreparable
damage. For this reasons comprehensive document and information
security program is vital to operate.
• The leakage of document and information cost the government, business
and industry alike, billions of pesos. A rival company or an enemy agent
might use an illegally obtained document and information for their own
advantage. For this reason, a comprehensive and information security
program is very essential to an installation in order to focus freely on
the attainment of its goals and objectives.

LEARNING The objectives of this study are;


OBJECTIVES
• Explain the classification of document security
• Analyse the categories of document for security purposes
• Discuss who is a pilferer and its types
• Explain what is Personnel Security Investigation and its importance and
purpose.
LEARNING At the end of this module the students will be able to;
OUTCOMES
• Familiarize themselves on the different classification of security
documents
• Categorized the purposes of document security

• Know more about the importance of PSI.


DISCUSSION PERSONNEL, DOCUMENT AND INFORMATION SECURITY

PERSONNEL SECURITY

1. Definition: Personnel Security includes all the security measures


designed to prevent unsuitable individuals or persons of doubtful loyalty to
the government, from gaining access to classified matter or to any security
facility, and to prevent appointment, or retention as employees of such
individuals.
2. Scope and Purpose: Personnel security generally embraces such
security measures as personnel security investigation, security orientation
and indoctrination and security education as will ensure the prevention of
unsuitable individuals or persons of doubtful loyalty to the government,
from gaining access to classified matter or being appointed, employed or
retained as employees.
3. Principle: Just any other control technique, security must start from
a given foundation or basis and this basis shall be referred to as the
principles of security. Security principles are normally disseminated by
regulations or directives to insure uniformity of purpose, logical and similar
methods of operation and appropriate and continuous placement of
responsibility.
4. The Security “Chain”: Personnel Security is the “weakest link” in
the security “chain”. This weakness can best be minimized or eliminated by
making the personnel security conscious through good training program.
Security depends upon the action of the individuals. The superior must
instruct his subordinates so that they will know exactly what security
measures to take in every instance, a safe will not lock itself. An individual
must be properly instructed and must do the locking.

CONTROL OF PERSONNEL
Access to “Restricted Areas” can be partially controlled by fences,
gates and other physical means, but the individual working in the area is the
key to the bringing out of classified matter to unauthorized personnel. Written
information does not have the power of speech. Only the individual has
knowledge of this written information can pass it to an unauthorized personnel
if he unguardedly talks about information.
It is the individual responsibility to insure that he knows security
procedures and safeguards, and it is the commander’s responsibility to motivate
each individual to insure that he complied with this procedures and safeguards.
Instructions on security procedures, principles and concepts are valueless unless
one impresses upon each individual having access to classified information the
necessity of practicing the “need-to-know” concept.
“No person is entitled to knowledge or possession of classified
information solely by his rank, office, or position. Such matter is entrusted
only to individuals whose official duties require knowledge or possession.”
Responsibility for determining whether a person’s official duties require access
to item to classified information rests upon each individual who has knowledge,
possession, or command control of the information involved and not upon the
prospective recipient.

OBJECTIVES OF PERSONNEL SECURITY


1. To provide the standards and procedures necessary to insure the
appointment, employment of retention of suitable and loyal individuals.
1. To develop the necessary and proper security discipline among the
applicants and employee as well as protect and preserve the security interest
of the organization.
2. Inculcate the desirable security attitudes and habits among the
applicants and employees.

CONTROL OF PERSONNEL IN THE PHYSICAL FACILITY


In every installation, the use of protective barriers, security lighting,
communication and electronic hardware provides physical safeguards but these
are insufficient to maximize the effort of the guard force. A control point must
be established for positive personnel identification and check system. This is to
insure that only those persons who have the right and authority will be given
the necessary access to the area.
The most practical and generally accepted system of personnel
identification is the use of identification cards badges or passes. Generally
speaking, this system designates when and where and how identification cards
should be displayed, and to whom. This helps security personnel eliminate the
risk of allowing the access of unauthorized personnel within the establishments.

Two (2) Types of Personnel Identification


❖ Personal recognition – familiarity of the person’s characteristics.
❖ Artificial recognition- identification cards, passes, passwords, etc.

Use of Pass System

▪ Single pass system - the badge or pass coded for authorization to enter
specific areas is issued to an employee who keeps it in his possession
until his authorization is terminates.
▪ Pass exchange system - an exchange takes place at the entrance of each
controlled area. Upon leaving the personnel surrenders his badge or
passes and retrieve back his basic identification.
▪ Multiple pass system - this provides an extra measure of security by
requiring that an exchange take place at the entrance of each restricted
area.
o Badge and Pass Control
• The system should have a complete record of all badges and
identification cards issued, return, mutilated or lost by serial number and
cross-indexed alphabetically.
• The supervisor from time to time for its accuracy and authenticity
should check the lists.
• Passes and badges reported lost should be validated and security at
entrance be informed through conspicuous posting.

VISITORS MOVEMENT CONTROL

1. Visitor’s logbook – All visitors to any facility should be required to


identify them selves and should be given a visitor’s ID by the security.
Visitor’s logbook should be filled up with the named of visitors, nature
and duration of visit.
2. Photograph - taking of photographs should also be considered.
Extreme caution must be exercised in areas where classified
information is displayed to preclude unauthorized taking of pictures of
the installation. If a visitor has camera and it is prohibited to take
picture, said camera should be left in the care of security with
corresponding receipt.
3. Escort - If possible visitors should be escorted by the security to
monitor their activity within the establishment and guide them where to
go.
4. Visitor entrances - separate access for visitors and employees of the
establishment should be provided.
5. Time-traveled - If there is a long delay or time lapse between the
departure and arrival, the visitors maybe required to show cause for the
delay.
6. Access List – record of pre-determined visitors

PACKAGE MOVEMENT CONTROL

a. No packages shall be authorized to be brought inside the industrial


installation, offices and work area without proper authority. This basic
precept help reduce if not eliminate pilferage, industrial espionage or
sabotage.
b. Outgoing packages carried by personnel should be closely inspected
and those in vehicles should also be checked as many pilfered items
are hidden in the surface of the vehicles leaving the compound.
c. Any personnel/visitor entering the installation with a package should
deposit the same to the security and in return receives a numbered tag,
which he/she will use in claiming his/her package upon departing.

B. CONTROL OF VEHICLE IN THE INSTALLATION

Vehicular traffic within the boundaries of any facility must be


carefully controlled for safety as well as to control the transporting of pilfered
goods from the premises. Thus:
1. Privately owned vehicle of personnel/visitor should be registered
and are subject to the identification and admittance procedure.
2. Vehicles should be subjected for search at the entrance and exit of
the installation.
3. All visitors with vehicle should provide the security as to the
complete details of their duration of stay, person to be visited, and other
information.
4. All vehicles of visitors should be given a sign/sticker to be placed on
the windshield.
5. Traffic warning signs should be installed in all entrances in order to
guide the visitors in their destination as well to provide them with the
necessary safety precautions while they are inside the installation.
6. Security personnel must constantly supervise parking areas and
make frequent spots searches of vehicles found there.

C. BUILDING ACCESS CONTROL

At any physical barrier, a security system must posses the ability to


distinguish among authorized persons, unauthorized visitors, and other
unauthorized persons. This is to assist the security personnel protects sensitive
are and information within the installation. Appropriate warning signs should
be posted at the building perimeter. Special restricted entry facilities to public
access should be provided. This will be dependent on the degree of security
needed for the protection of property, activity and other processes within the
building. A clear-cut policy on the access control should be disseminated to all
personnel of the installation.

PERSONNEL SECURITY INVESTIGATION

It is an inquiry into the character, reputation, discretion and loyalty of


individual in order to determine a person’s suitability to be given security
clearance.

1. Types of Personnel Security Investigation (PSI)

a. National Agency Check (NAC). – This is an investigation of an


individual made upon the basis of written information supplied by him
in response to official inquiry, and by reference to appropriate national
agencies. It is simply a check of the files and record of national
agencies. The national agencies checked under this type of investigation
are the following:
1) National Intelligence Coordinating Agency (NICA)
2) National Bureau of Investigation (NBI)
3) ISAAFP or J2 Division, GHQ AFP
4) CIDG PNP Camp Crame., etc.
b. Local Agency Check (LAC) – This type of investigation
consist of the first type plus written inquiries sent to appropriate local
government agencies, former employees, references and schools listed
by the person under investigation. The local agencies normally check
besides the past employment, schools and references are the following:
1) Place of the locality where the individual is a resident.
2) Mayor, Police, Fiscal, Judge of the locality where the
individual is a resident.

D. BACKGROUND INVESTIGATION
This is more comprehensive investigation than the NAC and LAC. A
thorough and complete investigation of all or some of the circumstances or
aspects of a person’s life is conducted.

1. Types of BI - It may either be a complete (CBI) or a partial


Background Investigation (PBI).
a. Complete Background Investigation – Consist of the
investigation of the background of a person, particularly all the
circumstances of his personal life.
b. Partial Background Investigation – Consist of the
investigation of the background of an individual but limited only to
some of the circumstances of his personal life which are deemed
pertinent to the investigation. Normally, the request for the investigation
will indicate the specific personal circumstances to be covered. This
type of BI is also used to further develop questionable information
contained in another investigation report.

2. Factors considered in Background Investigation.

a. Loyalty – faithful allegiance to the country, government and its


duly constituted authority.
b. Integrity - uprightness in character, soundness of moral
principles, freedom from moral delinquencies, ore more simply stated-
honesty.
c. Discretion - the ability of tendency to act or decide with
prudence; the habit of wise judgment or simply stated - good judgment
d. Moral - distinctive identifying qualities which serve as an index
to the essential or intrinsic nature of a person; his outward
manifestation, personal traits or moral habits.
e. Character - the sum of the traits that serves as an index of the
essential intrinsic nature of a person. It is the aggregate of distinctive
mental and moral qualities that have been impressed by nature,
education and habit upon the individual.
f. Reputation - opinion or estimation in which one is generally
held. It is what one reported to be, whereas character is what a person is.

SECURITY EDUCATION
Oftentimes, employees of companies or business establishments rely on
the assigned security personnel for their security and protection. This attitude
normally results to vulnerability and susceptibility of the concerned company to
security hazards. When a loss or damage to property occurs, company
management puts the blame on the security personnel. One thing is always
forgotten, “Security is everybody’s business.”
It has been stated previously that human barriers includes shop workers,
utility workers, rank-and-file employees, and management staff of companies
and business establishments.
With these, company employees should be educated and made aware of
their roles in the security of their own company. The ultimate purpose is to
make everybody “security conscious.”

OBJECTIVES OF SECURITY EDUCATION


1. Guidance for all supervisory indoctrination and executive levels of
the organization.
2. A mandatory indoctrination on security for all new personnel before
their assignment to their respective jobs.
3. Development of high-degree of security consciousness among the
selected supervisors and other key personnel in a program that
should be containing and supported by top management.
4. A down-the-line security programmed at installing consciousness
and dedication through demonstration, lectures, motivations and
suggestions.
5. To let all the employees force know that they all belong to the
organization and that non-awareness and non-concern to the security
program is tantamount to disloyalty.
6. To develop discipline, loyalty and belongingness. These attributes
fully imbued will result in be effectiveness and efficiency.

Security Education Program to be effective must have the support and


personnel on the reasons, the main thrust being to acquaint all personnel on the
reasons for the security measures.
This program should be given to all personnel from the work group that
has no access to classified endeavors to the supervisors and executives handling
sensitive plans and policies of the industrial firm. The program is given a
“follow-through” which will be continuing and tailored to the specific group
levels depending on their access to restricted work and activity.

TYPES OF SECURITY EDUCATION PROGRAMS


Security managers or company security coordinators should design
programs that will enhance the security consciousness of the employees. In
addition, identification of hazards and handling of crises should also be taught.
The security education programs include:

a. Company’s Role in the prevention and/or reduction of loss;


b. Integration of Security Education during Company Employees’
Orientation;
c. Fire Prevention programs and drills;
d. Natural Disasters/Calamities Drills;
e. Coordination with the Security Department;
f. Creation of Safety or Security Committee;
g. Proper Waste Disposal – This is to prevent chances of pilferage;
espionage by proper disposal of documents (shredding of waste
documents); and destructive fire by segregating flammable waste
substances;
h. Regular In-Service Retraining where provisions of company security is
integrated; and
i. Posting of Security Awareness Posters/Notices, issuance of pamphlets
and brochures.

DOCUMENT AND INFORMATION SECURITY


Document and information in whatever form plays a significant role
in the daily operations and activities of an installation. Once the contents of a
company’s document and information are divulged and reached the hands of an
adversary, the business operational stability is at stake. It may cause huge losses
on the company’s assets that could lead to its total closure.
In this particular lesson, document and information security are
discussed in the light of security management for private industrial
establishments.

A. BASIS OF DOCUMENT AND INFORMATION SECURITY

On the part of the government, “Security of documents and information


is based on the premise that the government has the right and duty to protect
official papers from unwarranted and indiscriminate disclosure.
On the other hand, private individuals and private business
establishments stand on the constitutional provisions on the “right of privacy”
where it is stated that “the right of a person to be free from unwarranted
publicity, or disclosure and as the right to live without unwarranted interference
by the public in matters with which the public is not necessarily concerned.

In addition, business enterprises have the right over their properties


including intellectual rights of their company operations and production
operations.

PURPOSE OF PROTECTING CLASSIFIED MATTERS


In government and non-government organizations, classified matters are
protected for the following purposes:
1. Deter and impede potential spy or prevent espionage;
2. Assist in security investigations by keeping accurate records of the
moments of classified materials; and
3. Enforce the use of “Need to Know” principle.

B. DOCUMENT SECURITY SYSTEMS

This is the aspect of security which involves the application of security


measures for the proper protection and safeguarding of classified information.

In Document and Information Security, a matter includes everything,


regardless of its physical character, or in which information is recorded or
embodied. Documents, equipment, projects, books, reports, articles, notes,
letters, drawings, drawings, sketches, plans, photographs, recordings,
machinery, models, apparatus, devices, and all other products or substances fall
within the general term “matter”. Information, which is transmitted orally, is
considered “matter” for purposes of security.

C. TYPES OF BUSINESS RECORDS

In some business establishments, documents and records are classified


to determine the degree of security needed. The classifications are:
1. Class I (Vital Records) – These include records that are liable
records of which reproduction does not have the same value as the original,
records needed to recover cash to replace buildings, equipment, raw
materials, finished products and records needed to avoid delay in restoration
of production, sales and services.
2. Class II (Useful Records) - These include records which loss might
cause inconvenience but could be readily replaced and which would not in
the meantime present an insurmountable obstacle to the prompt restoration
of the business.
3. Class III (Important Records) – These include records of the
reproduction of which will involve considerable expense and labor, or
considerable delay. Operating and statistical records belong to this class as
well as those to maintain check on efficiencies, operating costs, etc. Also
included are contracts, customer’s credit files, sales records, designs in
process development, records of experiments in progress, etc.
4. Class IV (Non-Essential Records) – These are the daily files,
routine in nature so that even if lost or destroyed, will not affect operation
or administration.

SECURITY CLEARANCE
Security Clearance is the certification by a responsible authority that the
person described is cleared for access to classified matter the appropriate level,
or Security Clearance ref ers to the admin istrative determin ation
that an indiv idual is elig ible for access to class ified matter. Need-
to-know is the principle whereby access to classified matter may only be only
given to those persons to whom it is necessary for the fulfillment of their duties.
Persons are not entitled to have access to classified matter solely by
virtue of their status or office. It is a requirement that the dissemination of
classified matters be limited strictly to persons whose official duty requires
knowledge or possession thereof.

D. CERTIFICATE OF DESTRUCTION - Th is is the


certif ication by a witn es sing officer th at the classified matters
describe therein has been disposed of in his presence in an
approved destruction methods.

E. OTHER TERMINOLOGIES – The fo llowing are o ther


termino logies relative to do cument and info rmation security :

1. Classified ref ers to assign information by one of th e four


classification categor ies.
2. Compromise means lose of security, which results from an
authorized persons obtaining knowledg e of classified
matter.
3. Compartmentation is the grant of access to classified matter
only to proper ly cleav ed persons in the perf ormance of their
official duties.
4. Declassify is the removal of security classification from
classified matter.
5. Reclassify/R e-grading is the act of changing the assigned
classification of matter.
6. Upgrading is the act of assigning to a matter of higher
classification to a classified
7. Dissemination – Dissemination of classified matter shall be
restricted to properly clear ed persons whose official duties
required knowledge or possession ther eof . Responsibility
for the determin ation of “need - to-know” rests upon both
each individu al, who has possession, knowledge or
command con trol of the information in volve, and the
recipient.
8. Purging is the pro cess of destroying a docu ment which is no
longer significant in the org anizatio n.
RULES FOR CLASSIFICATION OF DOCUMENTS – Private institutions
adopt the rules applied by government organizations in classification of
documents such as:

1. Documents shall be classified according to their content.


2. The overall classification of a file or of a group of physically connected
therein such as pages, paragraphs, sections or components thereof may
bear different classifications. Documents separated from file or group
shall be handled in accordance with their individual classification.
3. Transmittal of documents or endorsements which do not contain
classified information or which contain information classified lower
than that of the preceding element or enclosure shall include a notation
for automatic downgrading.
4. Correspondence, indexes, receipts, reports of possession, receipt of
transfer or destruction, catalogs, or accession list shall not be classified
if any reference to classified matter does not disclosed classified
information.
5. Classified matter obtained from other department shall retain the same
original classification.

DISCUSSION INVOLVING CLASSIFIED MATTER – Whenever


classified matters are discussed, the following shall be taken into consideration:

1. Indiscreet discussion or conversation involving classified matter shall


not be engaged in within the presence of or with unauthorized persons.
2. When a lecture, address or informal talk to a group includes classified
matter, the speaker shall announce the classification at the beginning
and end of the period.
3. All personnel leaving the government service or in cases of private
institutions, those who resign shall be warned against unlawful
disclosures of classified matter.
When disclosures of classified matters to another department or section
of the organization is necessary, it shall be done only with the consent of the
originating department or office.

RECORDS AND DOCUMENTS PROTECTION – In addition, documents


and information could be protected by proper storage like using steel cabinets,
safes, vaults, and file rooms as discussed in earlier lessons.
1. Categories of Storage Containers – Storage containers too are
categorized or classified according to what should be stored.
a. Class 1. Commercial record safes designed for fire protection.
b. Class 2. Commercial money safes designed for robbery and
burglary protection.
c. Class 3. Security cabinets designed to meet specifications for
safeguarding classified materials.
2. Tests for Safe’s Fire Resistance – Documents are at risk not only
against unauthorized disclosures but also against destruction that may be
caused by fire or explosion. Hence, safes usually undergo the following
tests:
a. Fire Endurance Test is done at a temperature above 350 degrees
Fahrenheit.
b. Explosion Hazard Test is done to determine if the sudden rise in
temperature will not cause the safe to repute. If the safe can withstand
2000 degrees Fahrenheit for 30 minutes and will not crack or open, then
it has passed the explosion test.
c. Fire and Impact Test is aimed at determining the strength of a
safe to withstand the collapse of a building during a fire.

PROTECTION OF SENSITIVE MATERIALS AND INFORMATION

PROPRIETARY INFORMATION
This is information that in some special way relates to the status or
activities of the possessor and over which the possessor asserts ownership. In
the business community, proprietary information relates to the structure,
products or business methods of the organization. It is usually protected in
some way against causal or general disclosure.

TYPES OF PROPRIETARY INFORMATION


In the business world, proprietary matters are classified into:

1. Trade Secrets- This consist of any formula, pattern, device or


compilation of information which is used in one’s business and
which gives him an opportunity to gain an advantage over
competitors who do not know or use it. It may be a formula for a
chemical compound, a process of manufacturing, treating or
preserving materials, a pattern for machine or device, or a list of
customers. It differs from other secret information as to single or
ephemeral events. A trade secret is a process or device for
continuous use in the protection of the business.
2. Patents - This is a grant made by the government to an inventor,
conveying or securing to him the exclusive right to make, use, or
sell his invention for term of years.

DISTINCTIONS BETWEEN PATENTS AND TRADE SECRETS


Under the law, patents and trade secrets are distinguished by the
following characteristics:
1. Requirements for obtaining a patent are specific. To qualify for a
patent the invention must be more than novel and useful. It must
represent a positive contribution beyond the skill of the average person.
2. A much lower of novelty is required of a trade secret.
3. A trade secret remains secret as long as it continues to meet trade secret
tests while the exclusive right to patent protection expires after 17
years.

RISKS ANALYSIS AND SECURITY HAZARDS

1. Hazards – exposure to the chance of loss or injury; synonymous to risk


and or peril.
2. Security Hazards - Any act or condition which may result in the
compromise of information, loss of life, loss or destruction of property
or disruption of the objective of the installation. It can also be defined as
an act or condition affecting the safe operation of the facility caused by
human action accidental or intentional.
3. Risk - It is the potential damage or loss of an asset. The level of risk is a
combination of two factors: The value placed on that asset by its owner
and the consequence, impact adverse effect of the loss or damage to that
asset and; the likelihood that a specific vulnerability will be exploited
by a particular threat.
4. Risk Management - It is a process of selecting and implementing
security countermeasures to achieve an acceptable level of risk at an
acceptable cost.
5. Risk Analysis - It is the analysis of risk which includes examinations of
the vulnerability, probability and criticality of potential threats and
include natural and man made risk.
6. Adversary - An individual, group, organization, or government that
conducts activities or has the intention and capability to conduct
activities detrimental to the individual, private or government entity.
7. Asset - Any information, facility, material, information, or activity
which has a positive value to its owner whether it is an individual,
private or government entity.
8. Countermeasures - An action taken or a physical security used to
reduce or eliminate one or more vulnerabilities. The cost of possible
countermeasures may be monetary, but may also include non-monetary
cost such as reduced operational efficiency, adverse publicity
unfavorable working conditions, and political consequences.
9. Probability - It is the chance or likelihood that a loss will take place.
Indicated by a mathematical statement concerning the possibility of an
event occurring.
10. Criticality - It is the impact of a loss as measured in financial terms.
How important it is in terms of the survival or existence of the
organization.

RELATIVITY OF RISK AND SECURITY


The extent and degree of risks to security is dependent on the following:
1. Relative criticality of operation – This pertains to the importance of
the firm with reference to the natural economy and security. Example is
gasoline depots, communication transmission lines, and power plants.
2. Relative vulnerability – This is the susceptibility of the plant or
establishment to damage, loss or disruption of operation due to various
hazards. A good example is the location of the building; the machines;
or presence of possible poisons. Security managers and planners
normally consider the above relativity in determining the degree of
security measures needed to reduce or eliminate the potential risks or
hazards.

RISK MANAGEMENT ALTERNATIVES AND STRATEGIES


1. Risk Avoidance – This is the eliminating or removing the risk totally
from the business, government, or industrial environment for which the
risk manager has responsibility. A good example of this is the proper
disposal of inflammable substances.
2. Risk Reduction – This is the decreasing the risk by minimizing the
probability of the potential loss. The reduction of criminal opportunity
is often accomplished by situational crime prevention strategies to
discourage, deter, or deny criminal incidents. A good example is the
construction of fences and similar physical barriers.
3. Risk Spreading – This is the spreading the risk through
compartmentation or decentralization to limit the impact (criticality) of
the potential loss. This could be done by using numerous vaults or safes
for the safekeeping of valuables such as documents and paper bills.
4. Risk Transfer – This is the moving the financial impact of the potential
loss-over to an insurance company. This is done by availing of property
and life insurances. Hiring security agencies is also a good example of
this.
5. Risk Self-assumption – This is a planned assumption and acceptance of
the potential risk by making a deliberate managerial decision of doing
nothing about the threat, or setting aside resources for use in case of a
specific loss incident.

SECURITY HAZARDS
TYPES OF HAZARDS

There are various forms and causes of hazards. Generally however,


they can be classified into:
1. Natural Hazard- these are hazards which arise from natural
phenomena. The following are types of natural hazards or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Fire (not caused by human action) – such as those cause by lightning.
d. Storms (typhoons, cyclones, tornado and hurricane)
e. Lightning storms
f. Extreme temperature and humidity
2. Human-Man made Hazards - These are hazards which are the
result of a state of mind, attitude, weaknesses or character traits of
one or more persons. They can be acts of commission or omission,
both overt and covert, which can disrupt operation of a plant or
installation. It includes but not limited to the following:
a. Sabotage – It can be described as the deliberate destruction or the
deliberate damaging or destroying of property or equipment, for example
by resistance fighters, enemy agents, or disgruntled workers; or action to
hinder or an action taken to undermine or destroy somebody’s efforts or
achievements.
b. Espionage – It is describes as the activity of spying or the use of spying
or spies to gather secret information. This is a hazard because people
may come to know the confidential processes or procedures of a certain
organization or business establishment (Microsoft, Encarta, 2001-2005).
c. Pilferage - the act of stealing small things or items of little value,
especially habitually.
d. Theft and Robbery – Both acts involve the taking of another’s property
with intent to gain without the owner’s consent. Theft is committed
without violence against or intimidation of persons nor force upon things
while robbery involves intimidation of persons or force upon things.
e. Disloyalty – This is the act of unfaithfulness to one’s organization. This
is hazardous because it may lead to unauthorized disclosure of
information to other people.
f. Disaffections – This is manifested by losing satisfaction thereby causing
the dissatisfied person to commit acts that may cause peril to his own
organization.
g. Subversive activities - These are activities designed to overthrow
government or intended or likely to undermine or overthrow a
government or other institution. These are hazards because they may
cause disruption of the normal operations of an institution or
organization.

PERSON’S INTERNAL HAZARDS


Every employee of the company or business establishment including but
not limited to the assigned security personnel are all possible causes of security
hazards. This is because of the following that are innate to every human being:

1. Faith – In the sphere of security operations, faith can be a questionable


virtue. Those persons in which trust of their fellowmen is an abiding
instinct, and who consider themselves a definite threat to effective
security, for the entire training an enemy is aimed at deceiving this type
of person. He may do this through an infinite number of ways, but it is
often the most common place and unexpected that prove most dangerous
to the company’s and most often productive to him.
2. Conceit – It is the desire to satisfy the ego or impress someone, provides
the enemy agent with his best source of information. An individual may
unconsciously disclose sensitive information to unauthorized persons
because of conceit.
3. Enthusiasm and Pride – These are common causes of indiscretion.
Anyone who is truly interested in his job finds it difficult not to talk and
write about it. The foreign agent and/or criminal elements by touching
upon the individual’s pride in his unit or mission can learn much about
the equipment, training operation, personnel, and its strength.
4. Ignorance – Many people compromise vital information simply because
they do not realize its value and do not know the methods by which
intelligence agencies operate. Through security education and
indoctrination, one can combat this.

PILFERAGE AS A SECURITY HAZARD


As earlier described, pilferage is the act of stealing small items or items
of little value. However, these little items when accumulated become a great
loss to a business establishment.

1. Types of Pilferers

a. Casual Pilferer is one who steals due to his inability to resist the
unexpected opportunity and has little fear of detection is no plan or
premeditation and he is usually a “loner” on the job. The temptation to
pick up the article is basically due to poor security measure. The
implication of causal pilfering is the big cumulative cost if it remains
unchecked.
b. Systematic Pilferer is one who steals with preconceived plans and
takes away any or all types of items or supplies for economic gain.
Pilferers of this kind can be employees or outsiders of the establishment.

2. Factors considered in Pilferage

a. Location of items to be pilfered - the systematic pilferer


surveys shopping and store areas, or through contacts from the
firms.
b. Access to the items - techniques can be from fake documents,
bribing of guards, outsmarting security, creating disturbance and
other methods to divert attention while pilferage goes on.
c. Removal of item - this can be done as wearing the stolen shoes
or shorts, concealment in body or vehicles, use of false
documents, etc. Driver may conceal pilfered items in his vehicle.
d. Disposal of items - there is a need for “fences” brokers” or
“clearing houses” for these “hot” items.
3. Countermeasures for Casual Pilferage
a. “Spot”: check on outgoing vehicles and persons.
b. An aggressive security education and indoctrination program
with emphasis that “crime does not pay”.
c. Superiors should set example of integrity and desirable moral
climate for employees in the establishment.
d. All employees must be enjoined to report or any loss to security.
e. Inventory and control methods should be done especially to
pilferable items.
f. Control of tools equipment and sets.
4. Countermeasures for Systematic Pilferage
a. Guards and electronic surveillance on all exits.
b. Package and material control system.
c. Parking area outside perimeter fence of establishment.
d. Careful screening and background checks on applicants to weed
out potential thieves.
e. Investigation of all losses quickly and efficiently to determine
“modus operandi” or obtain clues.
f. Alert all patrols to check areas and buildings for possible
concealment of stolen properties.
g. Install mechanical, electrical, electronic detection and alarm
devices where needed and applicable.
h. Establish an effective lock and key control system.
i. Use of appropriate perimeter fencing and lighting for parking
facilities and areas for vehicles and persons.
j. Store bulk quantities of pilferable items in enclosed security
areas and distribute them to using section in limited quantities.
k. Establish accurate inventory and accounting methods for
procurement, use and disposal.
l. Establish close liaison with governmental law enforcement and
intelligence agencies.
SABOTAGE AS A SECURITY HAZARD – As earlier defined, sabotage
is the deliberate destruction or the deliberate damaging or destroying of
property or equipment.

1. Description of a Saboteur:
a. He is the most dangerous foe that security will have to deal with
while planning and implementing security measures and
techniques.
b. He is an ordinary looking as the guy next door but in his mind,
he has the training in deception, knowledgeable in incendiaries,
explosives, chemistry, bacteriology, mechanics and psychology.
c. He can work alone, in-groups, or simultaneously in several
places.

2. As initial security measure, saboteurs target are any of the


following:
a. Armed Forces Installations
b. Natural resources- mines, forests, farms and farm products
c. Industries like the buildings, power sources, machinery, fuel,
etc.
d. Warehouses depots, communications, public utilities, etc.

3. Countermeasures Against Sabotage


a. Use of an efficient, alert and trained guard force.
b. Use of Physical security aids like barriers, personnel and
vehicular control, intrusion devices, communication systems,
and electric aids.
c. Proper screening of personnel.
d. Identification and movement control system.
e. Searches on incoming vehicles.
f. Safeguarding of classified information.
g. Designation of restricted areas.
h. Investigation of breaches of security.
i. Security education and indoctrination.
j. Good housekeeping methods.
k. Effective and compatible emergency planning.
l. Regular audit.
m. Continuing background checks.

ESPIONAGE AS A SECURITY HAZARD – As earlier stated, espionage is a


hazard because it may cause unauthorized disclosures of company information,
processes and procedures.

1. Description of an Espionage Agent


a. He is very dangerous adversary and his skills in deception and
his cunning should never be under estimated.
b. He is usually a person of extensive training and will be highly
effective in gaining the confidence of people and of extracting
information of value to be relayed to his employer or handler.
c. Even how well-trained an espionage agent he might be, he is
human like the saboteur and he can be defeated in his own game
if proper methods and techniques are undertaken.
2. Some Methods Employed by Espionage Agent
a. Stealing or information from employees
b. Stealing information from records or other sources.
c. Using various methods of reproducing documents products,
equipment or working models.
d. Using “front” as commercial concerns, travel agencies,
associations, business groups and other organizations to obtain
confidential information or data.’
e. Using various form or threats to obtain information.
f. Using blackmail techniques by exposing intimate and personal
details concerning an individual or organization.
g. Picking or securing information in social and other gatherings
h. Penetration and operational tactics.
3. Countermeasures against Industrial Espionage
a. Careful and complete pre-employment measures designed to
control threats of industrial espionage.
b. Continuing personnel check on employees and particularly
personnel on sensitive positions even already employed.
c. Prevention of unauthorized entry to the plant or industrial
installation.
d. Restricting of movement of personnel in the premises of the
plant.
e. Controlled disposal of waste papers including carbons in
classified work.
f. Only properly cleared personnel should handle classified
document.

SUBVERSIVE ACTIVITY AS A SECURITY HAZARD – This is clearly a


security hazard because it disrupts normal operation within a certain
organization or institution.

1. Threats of Subversive Activity


a. It can be local or national in nature and their mission is to
undermine the authority weaken the organization, and eventually
take over. This can be in business or any activity.
b. This can be in the form of rumor mongering, propaganda,
undermining morale, and injecting defeatist attitudes, and other
emotional approaches.
c. It is an activity not easy to detect.
2. Countermeasures to Subversive Activity
a. The spreading of rumors, written materials, slogans or any other
devices to confuse the work population and discredit the
government should be immediately reported.
b. Labor and other company unions can be infiltrated so that strikes
and “slow downs” can be called to disrupt the normal operation
of a plant or installation.
c. Security force should be alerted for person trying to recruit
others in organizing movements for peace, anti-colonials, anti-
trade and anti-imperialism.
d. Employees or outside personnel seeking memberships in “paper
organizations” should report this activity to security.
e. Other methods of subversion like united fronts, mob action,
terrorism and sabotage will be done to gain the subversive ends.

SECURITY SURVEY, SECURITY INSPECTION AND SECURITY


INVESTIGATION
SECURITY SYSTEM – This is the set of policies, procedures and rules and
regulations designed to reduce to an absolute minimum the possibility of
espionage, sabotage and compromise of classified information of an office or a
whole establishment.

SECURITY SURVEY – This is also known as security audit which is actually


a fact-finding probe to determine a plant’s adequacy and deficiency in all
aspects of security, with the corresponding recommendations.
It is also referring to an estimate of the security standards of a unit, and
is conducted to enable the responsible officer to recognize and evaluate security
hazards and determine protective measures necessary to the prevention of
sabotage, espionage, subversive activities and other criminal acts inimical
towards the interest and/or mission of the unit and/or command.
In the field of police and military intelligence, Security Survey is
defined as a counterintelligence service to assist heads of office in determining
the security measures required to protect key installations from possible
sabotage, espionage, subversion, and unauthorized disclosures of, or access to,
classified information or material contained therein.

RELATED TERMINOLOGIES – For better comprehension, the following


terminologies are hereby defined:

1. Survey – the term applied to the first detailed “look see” conducted by a
team.
2. Security Inspections or Follow-up Surveys – This is the term referring to
the succeeding surveys after the initial surveys.
3. Supplements Surveys – It is conducted when there is business
reorganization with corresponding changes in object and physical by-outs
of the complex.
4. Special Surveys – This is directed by management, if the initial survey
appears to have left certain portions or aspects involving security due to
change in policy or operation that will greatly affect the total security
picture.
5. Entrance Conference – A conference or dialogue between the survey
team and management officials of a plant before security survey is
conducted.
6. Exit Conference – A conference similar to entrance conference done after
the completion of the security survey.
WHO PERFORMS SECURITY AUDIT AND SURVEY? This should be
conducted by qualified security experts who can be from the organization or
outsiders contracted to do the job. Generally, recommendations from security
survey will fall into three categories:

1. Human guard – refers to the number of guards needed and their


respective qualifications like female guards for searching female
employees.
2. Equipment – this includes the type and number of firearms needed,
communications gadgets, metal detectors and other devices necessary in
the implementation of the proposed security system.
3. Procedures – these are the detailed rules and regulations and steps
necessary in the implementation of the proposed or existing security
system.

THE ROLE OF SECURITY OFFICERS- With the exception of the office


head, the security officer is more interested in the survey that any other
individual of the office. It is the security officer who is directly responsible to
the head of office for proper maintenance of security of the security program of
the office.
A survey Specialist must be cognizant of established security
procedures relative of the office since much of the survey including the
resulting recommendations will be affected by these measures.
This knowledge will enable him to recognize the present or potential
hazards in the area, answer most of the security questions put forth by the head
of office personnel, suggest minor recommendations during the survey which
can be implemented on the spot and to discuss completely his tentative
recommendations with office personnel.

AUTHORITY IN CODUCTING SECURITY SURVEY - The Unit head


may request a survey of his entire office or of specific function of a unit within
the office. When higher authorities directs a security survey to be conducted for
one of its subordinate office, an information copy of the correspondence may
also be forwarded to the unit to be surveyed. It must be remembered that a
security survey is not conducted solely for the purpose of establishing a security
program of an office. The head of office is directly responsible for establishing
a security system for his office after which a survey may be conducted to
determine if the program is adequate in comparison with the importance of the
office to the overall national objective.
The following are some of the situations under which a security survey
may be requested or directed:
1. Activation of an organization or office.
2. Reactivation of an organization or office.
3. A substantial change on the mission, number of personnel,
structures, or real estate of the office.
4. Indications of laxity in the security program which would indicate
the need for a complete revaluation of the security system.
5. When no record exists of a prior survey having been conducted.

SECURITY SURVEY PROCEDURES – Security surveys are conducted by


considering the following steps:
1. Preliminary Planning - To assure as much as possible the
successful completion of a security survey, a chronological plan of action is
developed. The first action taken by the security survey agent is to prepare
for and conduct those preliminary courses of action that precede the actual
conduct of the survey.

A very important consideration during the preliminary Planning stage is the


use of a checklist. This is a list of general considerations or specific points that
must be covered during the survey. Checklists may be either the general type or
the specific or detailed type.
2. Initial Briefing (Entrance Conference) - After completion of the
preliminary stage, the specialist is prepared to visit the office. It is to be
recalled as mentioned previously that contact is made with the security
officer of the office for the purpose of establishing a time and date for the
initial briefing of the office head. It would be ideal to have at this
conference not only the office head but his entire staff and other key
personnel of the office.

3. Escort Personnel - It is often desirable for both the specialist and


the office that an escort accompany the specialist during the survey.
Preferably, this escort should be the security office of the office or his
representative. In any event he should be a person conversant with the
security practice and procedures employed as the office.
4. Preliminary Exterior and Interior Check - As soon as possible
after the initial briefing, the specialist conducts a tour of the area
surrounding the office. The purpose of such an inspection is to gain a
general knowledge of those elements outside the office which do or could
conceivably have either a direct or indirect influence upon the security of
the office.
5. Analyzing Existing Security - Having completed the preliminaries
and determined the level of required security, the specialist must now
ascertain the existing level of security of the installation.
6. Final briefing (Exit conference) - The final conference is an oral to
the chief wherein the specialist determines whether or not his tentative
recommendations can be realistically implemented. The specialist discusses
the recommendations with the command since information may exist which
may negate or change the recommendations.

REPORT OF SECURITY SURVEY - A Security Inspection is a service


performed to determine compliance with established security polices and
procedures and is conducted on a recurring schedule or a follow-up to a
security survey.

SECURITY INSPECTION
SECURITY INSPECTION – This is a check of how well existing security
measures and regulations are being carried out within a detachment or
establishment. A security inspection may also include an investigation of
alleged or suspected security violations. Physical security is concerned with
forces, entrances and exists, guards, traffic control, lighting, fire control, and
with such other physical measures, which, if properly established and
maintained, will deny access to unauthorized persons.

CHARACTERISTICS OF SECURITY INSPECTION - The security


inspection, although akin to the security survey, is much more restricted in
scope. As observed, the security survey considers everything pertaining to an
office’s security, but the security inspection is limited to determination of the
degree of compliance by unit personnel with established polices and
procedures.
TYPES OF SECURITY INSPECTIONS - There are three specific types of
security inspections are:
1. Continuous Inspection
- To keep pace with the constant changes in the
organization, changes in our security terms of attitudes,
life-style and moral values, and the rapid advancement
of technological modifications are all around us, the
inspection must be an on-going and never ending
activity.
2. Formal or Informal
- For the company which has just upgraded the security
function, hired a new security administrator, or
initiated a security department and program. The
formal approach to inspection is most desirable,
primary because it tells the company how senior
management feels about protection, and thus
establishes the desirable climate.

 Formal Inspection is one which some fanfare is attached. It is


usually preceded by an announcement, and the unit under inspection
“prepares” for events, including some extra housekeeping activities
that would not otherwise happen at that point in time.

 Informal Inspection is usually the result of a long and firmly


entrenched inspection program, understood by all and accepted as
part of the organizational life. The inspection has been stripped of
all external trappings of importance, but their functional importance
has not been lessen in any manner. They are seriously and quietly
executed in a spirit of understanding and cooperation.

3. Structured or Unstructured Inspection


Structured Inspection is one that moves systematically from one
area to the next and so on. There is a format or logical sequence to
the process. For instance, the audit may start with the first line of
defense, then the second line, then the third line, etc.
Unstructured inspection is conducted in a random manner.
There is no format or logical sequencing. For example, the
inspection may start with countermeasures for proprietary
information, then emergency plan, followed by investigation and so
forth.

EXERCISES • What are the classifications of document security?


• What are the categories of document for security purposes?
• Types of proprietary information
• What is a pilferer?
• Types of pilferers.
• What is security system and security inspection?
• Differentiate security system and security inspection.
• Explain the security survey procedure.
• A system of personnel movement and control whereby badges o
identification are issued to personnel upon entering an installation?
• A code system using certain word in casual conversation with other
personnel in an installation to alarm him that the installation was
entered through force by armed men?

You might also like