Module in Industrial 1 1
Module in Industrial 1 1
Module in Industrial 1 1
NAME OF STUDENT:_________________________
SUBJECT:____________________________________
YEAR/BLOCK:_______________________________
DATE:________________________________________
INSTRUCTOR:________________________________
MODERN PERIOD
A. Henry Fielding- Conducted the first security Survey. He recommended the
security forces be professionally trained and properly compensated. He
recommended the use of foot and mounted patrol, special investigation and
police courts.
B. Allen Pinkerton- He founded the first Detective Agency in Chicago named
“Pinkerton Detective Agency” performing law enforcement functions.
C. William J. Burns- He founded the Burns Detective Agency in 1909 and
become the sole investigating agency for American Banking Association.
D. FBI- this organization came into existence.
What is industry?
- a special branch of productive work or the capital or workers employed in it.
What is Industrial?
- pertaining to or engaged in industry.
What is Security?
-the state or quality of being secured, freedom from fear or danger, assurance or
certainty.
What is Management?
-the planning, deciding or exercising of control and supervision on some functions of
the organization.
PROTECTION SECURITY
A method used in operating systems A method used in operating systems
that manages threats within system to that handles the threats from the
maintain the proper functioning of the outside of the system to maintain the
system. proper functioning of the system.
Focuses on the internal threats of the Focuses on the external threats of the
system. system.
Provides a mechanism for controlling Provides a mechanism to safeguard
the access to programs, processes, and the system resources and user
user resources. resources from external users.
Involves mechanism such as setting involves mechanism such as adding,
or changing protection information of deleting users, verifying whether a
a resource and checking whether that specific user is authorized, using anti
resource is accessible by a user. malware software, etc.
EXERCISES • Enumerate and explain further the 3 major areas of Security and provide an
example for each type.
• Can these 3 major areas of security stand alone? If YES, HOW? IF NO WHY
NOT.
• Among these 3 major areas of security which of them is the most important and
why.
• In your own understanding, differentiate PROTECTION and SECURITY.
• What are the aspects of protective security system and explain each as to your
own understanding.
TYPES OF SECURITY
1. Physical Security- a system of barriers placed between the potential
intruders and the objects/matter to be protected. It is the broadest branch of
security which is concerned with physical measures adapted to prevent
unauthorized access to equipment, facilities, materials and documents and to
safeguards them against espionage, sabotage and theft.
2. Communication Security- the protection resulting from the application on
various security measures which prevent or delay the enemy or unauthorized
persons gaining information through the information system.
This includes:
a. Transmission security- a components of communications security
that results from all measures designed to protect transmission from
the interception, traffic analysis and imitative deception.
b. Cryptographic security- Results from the provisions of technically
sound crypto-systems and their proper use.
c. Physical security- providing of safeguards to equipment and
materials from access by unauthorized persons.
3. Hotel security
➢ the protection of assets, personal effects, guest and other
properties in hotel.
➢ a type of security applied to hotels where its
properties are protected from pilferage, loss damage and the
function in the hotel restaurants are not disturbed and troubled
by outsiders or the guest themselves. This type of security
employs house detectives, uniforms guard and supervisor and
insures that hotel guests and their personal effects are
safeguarded.
WHAT IS BARRIERS?
➢ Barriers refer to any physical structure whether natural or man made
capable of restricting, deterring, delaying or preventing illegal and
unauthorized access to an installation.
INTRODUCTION Perimeter security is the protection of the installation’s inner and the immediate
vicinity. The main purpose of perimeter barrier is to deny or impede access or
exit of unauthorized person.
➢ Solid fence is made of opaque material in such a way that visual access
through the fence structure is denied. Solid fences are constructed with
heavy materials such as bricks, stone and concrete, and usually extended
down into the ground to a point view below the frost line.
Using concertina wire fence – concertina fences are formed like accordions.
BODIES OF WATER like river, lake, cataract, sea, pond or any bodies
of water forming part of the wall, building or fencing should not be
considered an adequate perimeter barrier. Additional security measures
like wire fence, concrete walling, security patrolling and flood lighting at
night may be necessary for the portions of the perimeter.
ADDITIONAL PROTECTIVE MEASURES
PROTECTIVE LIGHTING
✓ Designed to emphasize the illumination of the perimeter barrier and
the outside approaches to it, or to concentrate on the area and the
building within the perimeter.
1. Incandescent lights have low initial cost and provide good color
rendition. A white or glowing light because of great heat.
2. Mercury Vapor lamps emit a purplish-white color caused by an electric
current passing through a tube of conducting and luminous gas.
Considered more efficient and is widespread in exterior lighting.
3. Metal Halide is similar in physical appearance to mercury vapor, but
provides a light source of higher luminous efficiency and better color
rendition.
4. Fluorescent Lamp provides good color rendition. However, it cannot
project light over long distances; thus, it is not desirable as flood type
lights.
5. High-pressure Sodium Vapor is introduced in 1965, for exterior lighting
of parking areas, roadways, buildings, and industrial and commercial
installation. It emits golden white to pink color.
6. Low-pressure Sodium Vapor produces yellow color.
7. GASEOUS LAMP- Having the form of gas responsible to form a
brilliant light
8. QUARTZ-IODINE LAMP- A lightbulb consisting of quartz bulb and a
tungsten filament with the bulb containing iodine which reacts with the
vaporized tungtens to prevent excessive blackening of the bulb.
1. Fenced Perimeter Lighting is used to illuminate the fence itself and the
area beyond it (“the detection zone”). Its objective is to reveal an
intruder’s approach and produce glare towards him, thus reducing his
ability to see in the site. However, it can be difficult to apply because it
may create nuisance or hazards.
2. Area Lighting is used in a building face perimeters consist of faces of
buildings on or within 20 ft. of the property or area line to be protected
and where the public may approach the building. Guards may be
stationed inside or outside of the building. Doorways or other insets in
the building’s face should receive special attention for lighting to
eliminate shadows.
3. Flood Lighting is used to cast a strong light on the walls of buildings so
that intruders are visible either in silhouette (outline) or by the shadows
which they cast.
4. Gate House Lighting is installed on active entrances for pedestrians and
vehicles to facilitate complete inspection of passengers, cars, trucks and
freight cars as well as their contents and passengers.
5. Topping-up Lighting is used to illuminate dark areas not adequately lit by
area or flood lighting. Areas and structures within the installation
property lines consist of yards, storage spaces, large open working areas,
piers, docks, and other sensitive areas and structures.
- As used in this lesson and for uniform understanding, the following are
defined:
In this lesson, the first definition of alarm (security device) will be the emphasis
of discussion and learning.
Generally all alarming devices have these three (3) basic parts:
4. Auxiliary System – In this system installation circuits are led into local
police or fire department by leased telephone lines usually by special
arrangements. The dual responsibility for circuits and the high incidence
of false alarms have made this system unpopular with public fire and
police personnel.
PERIMETER PROTECTION
- This is first line of defense to detect the intruders. This could be done
through any of the following intrusion alarming device.
AREA/SPACE PROTECTION
FIRE ALARM
- are those devices installed to help detect fires or detect anything that
causes fire such as smoke or unusual rising of temperature.
- Apparatus is dispatched according to the nature of the alarm and location
of the fire. May modern departments are no equipped with computer-
aided dispatch systems that can track the status of all units and provide
vital information about the buildings where fires occur.
A. Wet pipe system- the piping has water with pressure and the
water sprinkler will operate when head is opened and water will
continue to flow until shut off.
B. Dry pipe system- the pipes are filled with air under pressure
which holds the water at a value located in a room. When
sprinklers head goes, into operation, air is released, trapping the
dry pipe value and allowing water to flow through the system
2. FIRE PUMPS- are mechanical device of supplying water which can be
manual or motor-driven. These pumps are ideal when natural supplies of
water are reading available like a river, lake or stream.
3. STAND PIPES- are galvanized iron steel or plastic pipes located inside a
building from the lowest to the top floor wih water under pressure for use
in case of fire. Located near the standpipe is a fire hose usually enclosed
in a glass box handy for use.
4. FIRE HYDRANT- a mechanical device strategically located in an
installation or street where fire hose is connected so that water pressure
will be available to extinguish fire.
5. PORTABLE HAND EXTINGUISHERS- this is the most important
and useful piece of fire-fighting equipment in a plant, building or facility.
It can put out fire depending on the contents extinguish certain types of
fire as class A to D.
6. ALARM SYSTEMS- in buildings may also be equipped with detection
systems that will transmit an alarm. Some detectors are designed to
respond to smoke and others to heat.
• SMOKE DETECTORS
- Offer some advantage over fire detectors because before fire gest big
there will be smoke. Thus these detectors trigger an alarm ahead of the
heat actuated device or detector. Smoke detectors are classified into the
following types:
• TYPES OF LOCKS
1. Warded Locks - The underlying principle is the incorporation of wards
or obstructions inside the lock to prohibit a key from operating the bolt
unless the key has corresponding notches cut in it do that it will pass the
wards. Warded locks offer very little security. This type of lock must
therefore be used only to have privacy but not to provide a high degree of
security.
2. Disc Tumbler Locks – These are also known as wafer locks. They have
flat metal tumblers with open center fitted into slots in a plug that is in
turn fitted into a lock case. When the plug is turned, it activates a cam.
The key is removable at 90 to 180 degrees and may be rotated either right
or left. The disks are under spring tension forcing them partially out of
the plug into recesses in the case thereby preventing the cylinder from
turning. Rectangular openings in the disk tumblers are cut into various,
longitudinal dimensions requiring corresponding cuts in the key to
position the tumblers. Proper unlocking positioning of the tumblers is
accomplished when they are with drawn from the recesses in the body of
the lock to position flush with the plug, allowing the plug to turn the cam
which causes the withdrawal of the bolt. Designed for the use of
automobile industry and are in general used in car doors today. Because
this lock is easy and cheap to be manufactured, its use has expanded to
other areas such as desks, files and padlocks. The delay afforded is
approximately ten minutes.
3. Lever Tumbler Locks - Each lever in the lock hinges on a fixed point
and is held down against a stop by the pressure of a flat spring. Each
lever has a cut in it, and all the gates can be located at different places.
When the proper key is inserted and turned, notches of various depths
raise all the lever whatever distanced is required to line up the entire gate
exactly opposite the fence on the bolt. When the key is turned, a portion
of the key catches the bolt and slides it back. Because there is no
resistance to the post entering the gate, the lock is opened. If the key is
not the correct one and if even one gate does not line up to let the post
slide into it, the lock cannot be opened.
They are used in safe deposit boxes and are for all practical purposes,
pick-proof. The least of these locks are used in desks, lockers and
cabinets and generally less secure than pin tumbler lock.
4. Pin Tumbler Lock – The pin tumbler mechanism depends for its
security, and a number of round pin or tumblers operating on a cylinder.
Each tumbler pin is divided into two parts, the upper which is flat on bolt,
is called the driver; the bottom part called the pin is rounded or slightly
pointed on the lower end to fit the grooves or cuts in the key. A coil
spring above each driver constantly forces it downward. When the right
key is inserted, the various depths of the cuts and the key compensate for
the different lengths in the pins. The dividing point between each of the
two pin segments is brought into line with. The top of the plug, allowing
it to rotate in the cylinder. When the plug turns, it carries with its cam,
which activates the bolt and other lock mechanism.
A. KEY CONTROL
- It is the management of keys in a plant or business organization to
prevent unauthorized individuals access to the keys. Once an effective
key control has been installed, positive control of all keys must be gained
and maintained. This can be accomplished only if it is in conjunction
with the new locking devices. The following can be utilized to maintain
effectively key control:
TYPES OF KEYS
a. Change Key- is a specific key, which operates the lock and has a
particular combination of cuts, or battings, which match the
tumblers of the tumblers in the lock.
b. Sub-Master Key is a key that could open all the lock within a
particular area or grouping in a particular facility.
c. Master Key is a special key that is capable of opening a series of
locks.
d. Grand Master Key is a type of key that will open everything in a
system involving two or more master key groups.
e.
MASTER KEYING SYSTEM
EXERCISES • In 500 words, when a key was lost as a Consultant what would be your
recommendation?
• Explain the advantages and disadvantages of a solid fence and full-view
fence.(minimum of 250 words; maximum of 500)
• In 10 paragraph, explain the importance of protective lighting.
• Capture a photo of the general types of lighting sources and types of
security lightings and label them.(minimum of 30 pictures;maximum of
50)
• Under physical security, what should be placed between the prospective
intruder and target installation?
• This type of additional protective measures usually placed above the
perimeter barrier serves as the look- out of the guard forces in giving
security in the area of responsibility.
MODULE NO.1 MIDTERM COVERAGE
PRIVATE DETECTIVES- shall mean any person who does detective work for hire,
reward or commission, other than the members of the armed forces of the Philippines,
guards of the BJMP, municipal or city jail guards and members of the PNP or any
other law enforcement agency of the government. (2003 IRR.)
Implementing rules and Regulation of RA 5487 as amended date April 28, 2003
PERSONAL SECURITY PROTECTION SERVICES- commonly terms as
“bodyguard service” the final version of the IRR will permit ths activity to be
serviced by licensed Private Detectives only by specific authority. The basic law does
not prohibits PDs from this service rather it is the private security guard or watchman
that is banned from performing bodyguards task. In providing the delimitation the
committee considered a description of private detective work/service lifted from US
based internet manuscript as that to include others, performing personal, and executive
or celebrity protection.
Under rule 8, section 6 of the revised rules and regulation governing the
organization and operation of private detective, watchman and security guards agencies
throughout the Philippines issued by the chief of Constabulary on February 28, 1976 it
is provide that private detective operate on a covert type of mission on a specific
confidential order issued by his agency. The nature of his mission may depend on the
contract between the clients and the detective agency it shall include:
a. Character background check
b. Locating missing persons
c. Surveillance work
Under the revised IRR of RA 5487 GOVERNING THE ORGANIZATION
AND OPERATION OF PRIVATE SECURITY AGENCIES, COMPANY
SECURITY FORCES AND GOVERNMENT SECURITY FORCES.
The training program for private security personnel was expanded. Aimed at
developing the skillas and knowledge to suit current and future applications. Hence it
now includes specialized courses in intelligence and investigation, basic crisis
management, personal/VIP security, Armored car crew training, Bomb disposal
training, Bank security training and Basic aviation security.
1. National authority
a. The highest law is the law of self-preservation. By instinct man, man
naturally reacts in order to protect himself, his family, his honor, freedom,
liberty and property from danger, threat or hazard. He does personally or
thru the help of others.
2. Constitutional authority
a. The prime duty of the government is to serve and protect the people. The
government may call upon the people to defend the state and in the
fulfillment thereof, all citizens may be required, under conditions provided
by aw or to render personal military service (Article 3 of the 1987
constitution)
b. No person shall be deprived of life, liberty or property without due process
of law, nor shall any person be denied the equal protection of the law.
(Article 3 section 1 of the constitution)
c. Private property shall not be taken for public use without just compensation.
(Article 3 section 9 of the constitution)
d. the right of people to be secured in their persons, houses, papers nd effects
against unreasonable searches and seizure of whatever nature and for any
purpose shall be inviolable and no search warrant or warrant of arrest shall
be issued except upon examination under oath or affirmation of the
complainant and the witnesses he may produce and particularly describing
the placed to be searched and the persons or the things to be seized. (Article
3 section 2 of the constitution)
3. Statutory authority
a. RPC
b. RA 5487- The private security agency law
The various types of security guard forces will be the emphases of this module.
Relative provisions of R.A. 5487 will also be included particularly on the qualifications
and paraphernalia of security personnel.
It is a group of force selected men, trained or grouped into functional unit for
the purpose of protecting operational processes from those disruption which would
impede efficiency or halt operation at a particular plant, facility, installation or special
activity.
R.A. 5487 provided for the organization and management of security guard
forces designed for specific organizations and purposes. The three (3) security guard
forces are the following:
LICENSE TO OPERATE (LTO) is the document issued by the CPNP or his duly
authorized representative authorizing a person to engage in the occupation, calling or
employment as security guard or detectives, or a juridical person to establish, engage,
direct, manage or operate an individual or a private detective agency or private security
agency/company security force after payment of the prescribed dues or fees.
1. Who may organize and maintain a PSA and Private Detective Agency (PDA)?
Any Filipino citizen or corporation, association, partnership, 100% owned and
controlled by Filipino citizens.
2. Basic Requirement of an operator or manager of agency
a. Filipino citizen
b. At least 25 years old
c. College graduate and/or
d. A commissioned officer in the inactive service or
e. Retired from AFP or PNP or
f. Graduated/taken course in concepts and methods in industrial Security
and Security Management and/or
g. Must have and adequate training or experience in security business
h. Good moral character - not having been convicted of any crime
involving moral turpitude; and
i. Not suffering any of the following disqualifications:
1) dishonorably discharged from AFP/PNP or separated for cause from
any government entity or government owned or controlled
corporation;
2) Being mentally incompetent;
3) Being physically unfit;
4) Addicted to the use of narcotic and/or prohibited drugs and/or
substances;
5) Habitual drunkard and alcoholic;
6) Dummy of any foreigner; and
7) Elective or appointive government officials and employees who may
be called upon on account of the functions of their respective office
in the implementation and enforcement of the provisions of RA
5487 and any person related to such government employees by
affinity or consanguinity in the third civil degree shall not hold any
interest, directly or indirectly in a security guard or watchman
agency on account of the functions of their respective offices in the
implementation and enforcement of RA 5487.
3. Organizational structure of PSAs/CSFs/GSUs
a. Filipino citizen;
b. High school graduate;
c. Physically and mentally fit;
d. At least 18 years old but not more than 50 years old;
e. Has undergone pre-licensing training course; and
f. Must not possess any of the disqualifications.
2. Desirable Qualities of Security Guards – In addition to the minimum
qualifications, security guards must also possess the following:
1. Uniform for males - It shall consist of: Headgear; service shirt; service
trousers; service belt; and footwear. The uniform shall be made of fast navy
blue thick fabric for the trouser for daily security officers wear and for service
shirts of field or perimeter guards while a choice of:
a. Light blue and/or white service shirts for internal guards for PSA;
b. Light gray for company security force; and
c. White for government security unit.
Further, the following shall be observed as part of the uniform of security personnel:
a. Head gear for daily wear - Pershing cap which is fast navy blue with
gold strap, black visor, octagonal nylon net top and prescribed SAGSD
metal cap device. For ceremonial purposes, use it with the black strap.
b. Service Bush jacket – It shall be worn only by the Directorial and Staff
Officers of agency.
c. Service Shirt for Security Officers
1) Service uniform.
a) Private Security Guard - fast navy blue.
b) Company Security Force - light gray.
c) Government Security Unit - white.
2) Field Uniform. (Optional for cold weather areas only)
a) PSA - long sleeves and detachable hoods.
b) CSF - same for PSA but color is white.
c) GSU - same with PSA except the color is white.
3) Gala Uniform - for ceremonial purposes only and at the expense of
the establishment conducting the ceremonies.
1) Pershing cap
2) Blouse - shall be tailored as an open coat, long sleeves, it shall
have shoulder straps and guard officers shall wear shoulder
boards with the authorized rank design.
3) Buttons - with four (4) big brass buttons to close dress and four
(4) small buttons for the pockets.
4) Shirt - white long sleeves.
5) Necktie - shall conform to the color of the blouses five (5)
centimeters wide.
6) Trousers - same design and materials as the service trousers.
a) Service Trouser - fast navy blue, straight cut, slanted pockets and two
back pockets without flaps.
b) Service Belt - leather measuring 4 1/2 centimeters in width.
c) Footwear
(1) Service shoes - black leather shoes with rubber heals and sole.
(2) Rubber rain boots - optional as the nature of the post requires.
2. Uniform for Females – It shall be made of thick fabric and it shall consist of a
modified overseas cap two (2) ply similar to the women police service, service
skirts (palda) and blouse, service belt, and black leather shoes.
a. Headgear – Fast navy blue (2 ply) cap without piping but with
regulation cap device.
b. Service Shirt
1) PSA – Fast navy blue, light blue or white, thick fabric short sleeves,
shoulder straps, two breast pockets with cover flaps and navy blue
front buttons, tucked in.
2) CSF – Sewn in similar manner as of the PSA except that the shirting
materials shall be fabric “light gray” in color.
3) GSU – Similarly sewn but shall be white fabric.
c. Service Trousers – Fast navy blue thick fabric trousers straight cut with
slanted side pocket and two back pockets without cover flaps. It may be worn
during night duty/inclement weather.
d. Service Skirt – (Optional) Navy blue A-line skirt with two front side
pockets. It may be worn indoors.
e. Service Belt – Leather and it shall be used as pistol belt measuring four
and one-half (4½) centimeters in width.
f. Footwear
1) Service shoes – plain black shoes, low-cut, rubber soles and heel
(maximum of five centimeters) and black shoe laces.
2) Rubber rain boots black – optional as the nature of post so requires.
3. Ornaments and patches
a. National badge
b. Cap device (brass) shall be attached on the pershing cap of officers
c. Regulation buckle – with agency name
d. Collar device
e. Name cloth shall consist of embroidered navy blue block-lettered
surname and initials of the first and middle names on yellow
background with blue borderline, the name shall be preceded by the
word “SG”. The letter shall be one and one-half (1½) centimeters in
height and the name cloth shall be sewn on the right top pocket
f. Agency/unit name cloth – similarly sewn as the name cloth
g. Equipment and paraphernalia.
Security Director/Inspector
a) leather pistol belt with regulation buckle; and
b) Holster, black leather.
Security Guard (male/female)
a) Black leather belt for pistol and night stick with regulation buckle;
b) Holster, black leather for pistol, night stick and handheld radio;
c) Night stick (baton) with horizontal handle;
d) Whistle with lanyard; and
e) Pocket book with writing pen.
4. Special Set of Uniform – It shall be prescribed for security personnel posted at
department stores noted as tourist-heavy areas, banks and other foreign clientele.
a. Uniform (male) – The special set of uniform shall consist of
pershing cap, ball cap, service bush, jacket, service shirt, service trousers,
service belt, necktie, lanyard and footwear.
1) Pershing cap – Fast navy blue with gold strap, black visor, octagonal
nylon net top and prescribed metal cap device. It shall be worn by security
agency officers and guards while wearing a complete special type of
uniform.
2) Service Bush Jacket – White ramie polyester fabric and shall be
sewn short sleeves with shoulder straps, two each breast and front pockets
with cover flaps and fixed cloth belt fastened with metal buckle. It shall be
worn by security agency officer while on duty at indoor places with
complete prescribed paraphernalia and agency/client patches.
3) Service Shirt – White cotton/cotton polyester fabric and shall be
sewn short sleeves or long sleeves as the case maybe, shoulder straps, two
breast pockets with cover flaps and white front buttons. Be worn by security
guards tuck-in while on duty at designated indoor places with complete
prescribed paraphernalia and agency/client patches.
4) Service Trousers – Fast navy blue color, straight cut, slanted pockets
and two back pockets with cover flaps. It shall be worn by security agency
officer and security guard.
5) Service belt – Black in color, leather, to be used as pistol belt
measuring four and one-half centimeters in width. It shall be worn by both
security officers and security guards while in complete special type of
uniform.
6) Necktie – Plain fast navy blue and five centimeters wide. It shall be
worn by security guards while in complete special type of uniform.
7) Lanyard – Navy blue in color, same style as used by AFP of PNP
Personnel. It shall be worn by security agency officers and security guards
while in complete special type of uniform.
8) Footwear – Black leather shoes with rubber heels and soles, plain
top low-cut and black shoe lace to be worn with plain black socks.
9) Ball cap – Fast navy blue round nylon net top with visor and
prescribed embroidered cloth cap device (optional in lieu of the pershing
cap).
b. Uniform (Female) – It shall consist of an oversea cap two (2)
ply service bush jacket, service blouse, service belt, lanyard and black
leather shoes.
1) Bush cap – Fast navy blue (2 ply) without piping but with regulation
cap device.
2) Service Bush Jacket – White in color and shall be sewn in same
style as that of security agency officer. It shall be worn by security lady
officer with complete prescribed paraphernalia, name cloths and
agency/client patches.
3) Service Shirt – White ramie polyester fabric and shall be sewn short
sleeves or long sleeves as the case maybe, shoulder straps, two breast
pockets with cover flaps and navy blue front buttons. It shall be worn by
private security lady guard with complete prescribed paraphernalia, name
cloths, agency/client patches, service belt, and lanyard.. This type of
uniform shall be worn tuck in only at indoor places.
4) Service Belt
5) Lanyard
6) Service Skirt – A line skirt with two front slide pockets. It shall be
worn when posted indoors.
7) Footwear – Plain black leather shoes, low-cut rubber soles and heel
(maximum of five cm) and black shoe laces.
c. Paraphernalia – The proposed special set of uniform for
security shall be prescribed or authorized to be issued only on a case to
case basis at the areas as herein authorized upon prior request of the clients
concerned.
5. Provision for uniform - All employers/owners/operators of PSA/CSF shall
provide at least one (1) set of the prescribed uniform free of charge to their
respective security guard for every year of service with them. Likewise, all
licensed security guard shall provide themselves with one (1) set uniform once
a year unless their employers provide it for free.
POWERS AND FUNCTIONS - Security guards have the following powers and
duties:
ETHICAL STANDARD
CODE OF CONDUCT
a. He shall carry with him at all times during his tour of duty his license
identification card and duty detail order with an authority to carry firearms;
b. He shall not use his license and privileges to the prejudice of the public, the
client or customer and his agency;
c. He shall not engage in any unnecessary conversation with anybody except in
the discharge of his work and shall at all times keep himself alert during his
tour of duty;
d. He shall not read newspapers, magazines, books, etc., while actually
performing his duties;
e. He shall not drink any intoxicating liquor immediately before and during his
tour of duty;
f. He shall know the location of the alarm box near his post and sound the alarm
in case of fire or disorder;
g. He shall know how to operate any fire extinguishers at his post;
h. He shall know the location of the telephone and/or telephone number of the
police precincts as well as the telephone number of the fire stations in the
locality;
i. He shall immediately notify the police in case of any sign of disorder, strike,
riot or any serious violations of the law;
j. He or his group or guards shall not participate or integrate any disorder, strike,
riot or any serious violations of the law;
k. He shall assist the police in the preservation and maintenance of peace and
order and in the protection of life, property/having in mind that the nature of his
responsibilities is similar to that of the latter;
l. He shall familiarize himself with the Private Security Agency Law (RA5487) as
amended, and the PNP SAGSD implementing rules and regulations;
m. When issued a pass he should not lend his pass to anybody;
n. He shall always in proper uniform and shall always carry with him his basic
requirements, and equipment such as writing notebook, ball pen, nightstick
(baton) and/or radio; and
o. He shall endeavor at all times to merit and be worthy of the trust and
confidence of the agency he represents and the client he serves.
GENERAL ORDERS – These are patterned after the 11 GOs of the AFP and PNP.
a. Endeavor to fulfill their professional duties in accordance with the highest moral
principles, always conforming to the precepts of truth, fairness and justice;
b. Contribute to the national welfare by securing and preserving industrial facilities
of the country, through competent guarding services;
c. Promote the well being of security guard thru adequate wages and other
emoluments;
d. With faith and diligence, perform their contractual obligations for the protection
of life, limb and property;
e. Constantly endeavor to raise quality standards of private security services; and
f. Continuously work with and assist the law enforcement agencies in the
preservation of peace and order in the country.
CODE OF CONDUCT
a. They shall at all times adhere to professional ethics and refrain from practices that
negate the best interest of the private security service industry. They shall always
consider that unity in the profession is vital and paramount for the attainment of
common objectives;
b. They shall not use deceitful means and/or misrepresentations in al their business
transaction. To this end, they shall avoid granting of rebates, or commissions in
securing guarding contracts;
c. They shall not indulge in cut-throat competition by undercutting the existing
contract rate between the PSA and the client and/or the minimum contract rate
prescribed under the PADPAO Memorandum Agreement.
d. They shall pay their guards in accordance with rates fixed by law. They shall not
impose any unauthorized deductions on the guard’s earnings. They shall not
obstruct the freedom of guards to seek employment elsewhere as they choose,
subject to existing laws, nor accept a guard without clearance from the losing
agency;
e. When a prospective client with existing company security force calls/bids for
additional security guard, all bidding security agencies shall observe the principle
of “equal pay for equal work” considering the rate of pay of the company security
service and their own guards;
f. They shall endeavor to raise the standard of service in the security profession thru
incentives and in-service training;
g. They shall establish an adequate library of books, magazines and other
publications on security subjects, materials, references, etc. in each PSA.
h. They shall always be truthful and accurate in reports required by SOSIA and/or
other competent authorities and be prompt in the submissions of the same;
i. They shall not, under any circumstances, employ for guard duty any person
without a professional license as a security guard duly issued by the Chief, PNP;
and
j. They shall at all times exercise vigilance and be prepared to prevent the use of
their guards or the agency in activities inimical to the state or national security.
When activities of this nature come to their attention, they shall as a matter of duty
render and appropriate report to the Philippine National Police authorities.
EXERCISES
• Two Instances when the Chief PNP may deputize any security guard to
assist the PNP in the performance of police duties.
• Agency name can be located on _________uniform of Security Guard.
Right Chest – SG name
Left Chest – Agency Name
Left Shoulder – Agency Logo
Right Shoulder – PADPAO logo
• A security guard has to turn over his firearm to whom?
• What is the first thing that a security expert will do before he can
recommend what types of security will be needed responsive to the
firm’s protective requirements?
• Can a security guard apprehend/arrest an intruder? Justify your answer.
• Draw a female and male security guard wearing their prescribed
uniforms and paraphernalia’s and label them accordingly. Below the
illustration give their desirable traits as a security guard.
• They are referred to as the BLUE ARMY?
• A new private security agency shall be issued a temporary licensed to
operate that is good for _______.
• The person who has the power to revoke for cause the licensed issued
to security guard is_______.
• A PSA who is applying for regular license to operate must possess at
least 70 licensed firearm and a minimum of_________guards.
• Branch offices of PSA shall established and maintained in other
provunces and cities with a minimum of10 security guards and
maximum of _________.
MODULE NO.1 FINAL COVERAGE
INTRODUCTION • Document security system is that aspect of security which involves the
application of security measures for the proper protection and
safeguarding of classified information.
• Document and information security is the loss of document and
information cost billions of pesos. The importance of document and
information security in not realized until after a loss has been
discovered in many instances one that has already cause irreparable
damage. For this reasons comprehensive document and information
security program is vital to operate.
• The leakage of document and information cost the government, business
and industry alike, billions of pesos. A rival company or an enemy agent
might use an illegally obtained document and information for their own
advantage. For this reason, a comprehensive and information security
program is very essential to an installation in order to focus freely on
the attainment of its goals and objectives.
PERSONNEL SECURITY
CONTROL OF PERSONNEL
Access to “Restricted Areas” can be partially controlled by fences,
gates and other physical means, but the individual working in the area is the
key to the bringing out of classified matter to unauthorized personnel. Written
information does not have the power of speech. Only the individual has
knowledge of this written information can pass it to an unauthorized personnel
if he unguardedly talks about information.
It is the individual responsibility to insure that he knows security
procedures and safeguards, and it is the commander’s responsibility to motivate
each individual to insure that he complied with this procedures and safeguards.
Instructions on security procedures, principles and concepts are valueless unless
one impresses upon each individual having access to classified information the
necessity of practicing the “need-to-know” concept.
“No person is entitled to knowledge or possession of classified
information solely by his rank, office, or position. Such matter is entrusted
only to individuals whose official duties require knowledge or possession.”
Responsibility for determining whether a person’s official duties require access
to item to classified information rests upon each individual who has knowledge,
possession, or command control of the information involved and not upon the
prospective recipient.
▪ Single pass system - the badge or pass coded for authorization to enter
specific areas is issued to an employee who keeps it in his possession
until his authorization is terminates.
▪ Pass exchange system - an exchange takes place at the entrance of each
controlled area. Upon leaving the personnel surrenders his badge or
passes and retrieve back his basic identification.
▪ Multiple pass system - this provides an extra measure of security by
requiring that an exchange take place at the entrance of each restricted
area.
o Badge and Pass Control
• The system should have a complete record of all badges and
identification cards issued, return, mutilated or lost by serial number and
cross-indexed alphabetically.
• The supervisor from time to time for its accuracy and authenticity
should check the lists.
• Passes and badges reported lost should be validated and security at
entrance be informed through conspicuous posting.
D. BACKGROUND INVESTIGATION
This is more comprehensive investigation than the NAC and LAC. A
thorough and complete investigation of all or some of the circumstances or
aspects of a person’s life is conducted.
SECURITY EDUCATION
Oftentimes, employees of companies or business establishments rely on
the assigned security personnel for their security and protection. This attitude
normally results to vulnerability and susceptibility of the concerned company to
security hazards. When a loss or damage to property occurs, company
management puts the blame on the security personnel. One thing is always
forgotten, “Security is everybody’s business.”
It has been stated previously that human barriers includes shop workers,
utility workers, rank-and-file employees, and management staff of companies
and business establishments.
With these, company employees should be educated and made aware of
their roles in the security of their own company. The ultimate purpose is to
make everybody “security conscious.”
SECURITY CLEARANCE
Security Clearance is the certification by a responsible authority that the
person described is cleared for access to classified matter the appropriate level,
or Security Clearance ref ers to the admin istrative determin ation
that an indiv idual is elig ible for access to class ified matter. Need-
to-know is the principle whereby access to classified matter may only be only
given to those persons to whom it is necessary for the fulfillment of their duties.
Persons are not entitled to have access to classified matter solely by
virtue of their status or office. It is a requirement that the dissemination of
classified matters be limited strictly to persons whose official duty requires
knowledge or possession thereof.
PROPRIETARY INFORMATION
This is information that in some special way relates to the status or
activities of the possessor and over which the possessor asserts ownership. In
the business community, proprietary information relates to the structure,
products or business methods of the organization. It is usually protected in
some way against causal or general disclosure.
SECURITY HAZARDS
TYPES OF HAZARDS
1. Types of Pilferers
a. Casual Pilferer is one who steals due to his inability to resist the
unexpected opportunity and has little fear of detection is no plan or
premeditation and he is usually a “loner” on the job. The temptation to
pick up the article is basically due to poor security measure. The
implication of causal pilfering is the big cumulative cost if it remains
unchecked.
b. Systematic Pilferer is one who steals with preconceived plans and
takes away any or all types of items or supplies for economic gain.
Pilferers of this kind can be employees or outsiders of the establishment.
1. Description of a Saboteur:
a. He is the most dangerous foe that security will have to deal with
while planning and implementing security measures and
techniques.
b. He is an ordinary looking as the guy next door but in his mind,
he has the training in deception, knowledgeable in incendiaries,
explosives, chemistry, bacteriology, mechanics and psychology.
c. He can work alone, in-groups, or simultaneously in several
places.
1. Survey – the term applied to the first detailed “look see” conducted by a
team.
2. Security Inspections or Follow-up Surveys – This is the term referring to
the succeeding surveys after the initial surveys.
3. Supplements Surveys – It is conducted when there is business
reorganization with corresponding changes in object and physical by-outs
of the complex.
4. Special Surveys – This is directed by management, if the initial survey
appears to have left certain portions or aspects involving security due to
change in policy or operation that will greatly affect the total security
picture.
5. Entrance Conference – A conference or dialogue between the survey
team and management officials of a plant before security survey is
conducted.
6. Exit Conference – A conference similar to entrance conference done after
the completion of the security survey.
WHO PERFORMS SECURITY AUDIT AND SURVEY? This should be
conducted by qualified security experts who can be from the organization or
outsiders contracted to do the job. Generally, recommendations from security
survey will fall into three categories:
SECURITY INSPECTION
SECURITY INSPECTION – This is a check of how well existing security
measures and regulations are being carried out within a detachment or
establishment. A security inspection may also include an investigation of
alleged or suspected security violations. Physical security is concerned with
forces, entrances and exists, guards, traffic control, lighting, fire control, and
with such other physical measures, which, if properly established and
maintained, will deny access to unauthorized persons.