Security Module

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 129

ISABELA STATE UNIVERSITY CAUAYAN

VISION, MISSION, GOALS AND OBJECTIVES


UNIVERSITY VISION

The Isabela State University as a leading, vibrant, comprehensive and Research


University in the country and the ASEAN region.

UNIVERSITY MISSION

The Isabela State University is committed to develop highly trained and globally
competent professionals; generate innovative and cutting-edge knowledge and
technologies for people empowerment and sustainable development; engage in viable
resource generation programs; and maintain and enhance stronger partnerships under
good governance to advance the interests of national and international communities.

GOALS OF THE COLLEGE OF ARTS & SCIENCES


1. Provide general education in the arts and sciences for the development of
students mentally, socially, spiritually, and emotionally transforming them
into well-rounded individuals.
2. Develop students into productive citizens both economically and socially with
the end in view of improving the quality of their lives and that of their
fellowmen.
3. Produce graduates, majority of whom are locally and globally competitive in
their chosen fields of their careers.
4. Cultivate and sharpen students’ potentials and hasten their relationship
capabilities to answer the needs of their community and society to which
they belong.

OBJECTIVES OF THE PROGRAM

General Objective
The program provides the community with professionally competent and orally
upright graduates who can deliver efficient and effective services in crime prevention,
crime detection and investigation, law enforcement, and custody and rehabilitation of
offenders, among others.
The program is also envisioned as significant educational institutions actively and
continually involved in producing graduates who have the knowledge and skills in
addressing the problem of criminality in the country and the competence to meet the
challenge of globalization in the field of criminology.

Specific Objectives
The BS Criminology program aims to:
1. Foster the values of leadership, integrity, accountability and responsibility
while serving their fellowmen, community and country.
2. Prepare the students for careers in crime prevention, law enforcement,
scientific crime detection and correctional administration;
3. Encouraged research and inquiry on the nature, causes, treatment or
punishment of criminal justice agencies respond to crime, criminals and
victims.

CHAPTER I

1 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

INTRODUCTION TO INDUSTRIAL SECURITY


MANAGEMENT

LESSON 1
INDUSTRIAL SECURITY MANAGEMENT DEFINITION
AND ITS LEGAL BASIS
INDUSTRIAL SECURITY MANAGEMENT DEFINED
It is the action and measures taken to create a state of safe environment for the
protection of personnel, properties or assets from various perceived threats and danger
using manpower, electronic devices and other forms of security control measures.
It is the process of developing a comprehensive data protection plan. It takes into
account all potential threats, the existing network environment, the future needs of the
origination, and lays out a multi-level blueprint to integrate the security technology
needed to combat any threats.
It is the skillful handling of security and safety measures of business enterprises
and industrial establishment.

INDUSTRIAL SECURITY DEFINED


It is the business of providing security and protection to private individuals,
business and enterprises, or government and non-government industries. Security
measures applied to business industries.
It is a form of physical security involving industrial plants and business
enterprises. It involved the safeguarding of personnel, processes, properties and
operations.

LEGAL BASES OF INDUSTRIAL SECURITY IN THE PHILIPPINES

1. Natural Authority – the highest law is the law of self-preservation. By instinct,


man naturally reacts in order to protect himself, his family, his honors, freedom,
liberty and property from danger, threat or hazard. He does it personally or thru
the help of others.

2. Constitutional Authority

a. Art. II, Section 4 of the 1987 Philippine Constitution – The prime duty of
the government is to serve and protect the people. The Government may call
upon the people to defend the state and in the fulfillment thereof, all citizens
may be required, under conditions provided by law, or to render personal
military service.

b. Art. III, Section 1 of the 1987 Philippine Constitution - No person shall


be deprived of life, liberty or property without due process of law, nor shall
any person be denied the equal protection of the laws.

c. Art. III, Section 9 of the 1987 Philippine Constitution - Private property


shall not be taken for public use without just compensation.

d. Art. III, Section 2 of the 1987 Philippine Constitution - The right of the
people to be secure in their persons, houses, papers, and effects against
unreasonable searches and seizures of whatever nature and for any purpose
shall be inviolable, and no search warrant or warrant of arrest shall issue
except upon probable cause to be determined personally by the judge after
examination under oath or affirmation of the complainant and the witnesses
2 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

he may produce, and particularly describing the place to be searched and the
persons or things to be seized.

3. Statutory Authority
a. Republic Act No. 6975- The law that created the public safety agencies.
b. Republic Act No. 3815 - Otherwise known as the Revised Penal Code of the
Philippines. The law which defines and penalizes crime against property,
persons, public order, national security etc.
c. Republic Act No. 9372 - Otherwise known as the Human Security Act of
2007.
d. Republic Act No. 5487 - Otherwise known as the Private Security Agency Law
of the Philippines. The law which provides for the organization and
management of Private Security Agency, Company Security Force and
Government Security Unit.- Approval and Effectivity – June 21, 1969
e. PD No. 11 – Amending Certain Sections of Republic Act 5487 otherwise known
as “The Private Security Agency Law”.- October 3, 1972
f. PD No. 100 – Amending Further Certain Sections of RA 5487 as Amended by
PD 11. January 17, 1973
g. PD No. 1919 – An Act to Regulate the Organization and Operation of Private
Detective, Watchmen or Security Guards Agencies. April 28 1984
h. Memorandum Circular 2011- Issued by Chief Supt. Diciano

LESSON 2
SECURITY IN GENERAL
SECURITY DEFINED
Security is a protection against any type of crime to safeguard life and assets by
various methods and device. It is a state or conditions of being secured; there is a
freedom from fear, harm, danger, loss, destruction or damages. Basically, it was the
action of man against man that led to many unsecured and unsafe conditions. Reasons
could be economic, revenge, or just plain greed and avarice. Whatever the motives, the
civilized man needs adequate protection.

NECESSITY FOR SECURITY


Security measures are inevitable or necessary for the attainment of the goals and
objectives of a certain individual, group or organization. It allows that when an individual
or organization is exposed to hazards, their productivity is adversely affected.
The economic growth of the Philippines for instance is moving at a turtle-pace
because of the impending internal and external threats. Internal threats include but not
limited to communist aggression, the Muslim Separatist, the extreme rightists such as
the threat of military takeover of the government; and the ruthless mass action like
strikes and protest by civil organizations. External threats include the country’s
incapability to defend itself in case of war. All of these threats if not deterred or reduced,
will bring political instability which surely hampers the economy of the country.
Conversely, among the business enterprises, their productivity is restrained if the
hazards surrounding their personnel, properties, and operation are not eliminated or
controlled.

MAJORS AREAS OR DIVISIONS OF SECURITY


Since security is general is every hard to comprehend, it can be divided into three
majors areas:
1. PHYSICAL SECURITY
It is the broadest type of security.
This concern with the physical measures adopted to prevent unauthorized
access to equipment, facilities, material and document and to safeguard them
against espionage, sabotage, damage, loss and theft. It measures are being used
to define, protect, and monitor property rights and assets. These measures

3 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

consist of barriers and devices that would detect, impede, and prevent
unauthorized access to equipment, facilities, material and document and to
safeguard them against espionage, sabotage, damage and theft.
It may also defined as the safeguarding by physical means, such as guard, fire
protection measures, of plans, policies, programs, personnel, property, utilities,
information, facilities and installation against compromise, trespass, sabotage,
pilferage, embezzlement, fraud or other dishonest criminal act.

2. PERSONNEL SECURITY
This is important as physical security. Personnel security starts even before
the hiring of an employee and remains to be maintained for as long as the person
is employed. Its purpose is to insure that a firm hires those best suited to assist
the firm in achieving its goals and objectives and once hired assist in providing
necessary security to the work force while carrying out their functions.

3. DOCUMENT AND IMFORMATION SECURITY


This involves the protection of documents and classified papers from loss,
access by unauthorized persons, damage, theft and compromise through
disclosure. Classified documents need special handling. Lack of indoctrination and
orientation among the personal handling them can result in the leakage, loss,
theft and unauthorized disclosure of the documents.

TYPES OF SECURITY
Since security in general is very hard to comprehend, it can be divided into three
major areas:

1. Protective Security – It can be defined as those measures taken by an


installation or unit to protect itself against sabotage, espionage or subversion and
at the same time provide freedom of action in order to provide the installation of
the unit with the necessary flexibility to accomplish its mission. The aspects of
protective security can be seen with the application of the following:

a. Industrial Security - A type of security applied to business groups engaged


in industries like manufacturing, assembling, research and development,
processing, warehousing and even agriculture. It may also mean the business
of providing security.

b. Hotel Security - A type of security applied to hotels where its properties are
protected from pilferage, loss, damage, and the function in the hotel
restaurants are not disturbed and troubled by outsiders or the guest
themselves. Application of various means in safeguarding hotel guests and
valuables and other hotel functions. This type of security employs house
detectives, uniforms guard and supervisor and insures that hotel guests and
their personal effects are safeguarded.

c. Bank Security - This type of security is concern with bank operations.


Application of various measures in safeguarding cash and assets of the bank
from storage, during transit and transaction. Its main objective is the
protection of bank cash and assets, its personnel and clientele. Security
personnel are trained to safeguard bank and assets while in storage, in transit
and during transactions.

d. VIP Security - A type of security applied for the protection of top-ranking


officials of the government or private entity, visiting persons of illustrious
standing and foreign dignitaries.

e. School Security - A type of security that is concern with the protection of


students, faculty members, and school properties. Security personnel are
4 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

trained to protect the school property from theft, vandals, handling campus
riots and detecting the use of intoxicated drugs and alcohol by the students.

f. Supermarket Security - A type of security which is concern with the


protection of the stores, warehouses, storage, its immediate premises and
properties as well as the supermarket personnel and customers. Security
personnel are trained to detect “shoplifter”, robbery, and bomb detection and
customer relation.

2. Operational Security - This involves the protection of process, formula and


patents, industrial and manufacturing activities from espionage, infiltration, loss,
compromise or photocopying.

3. Communication Security - The protection resulting from the application of


various measures which prevents or delay the enemy or unauthorized person in
gaining information through communication. This includes transmission,
cryptographic and physical security.

4. Transmission Security – A component of communications security that results


from all measures designed to protect transmission from the interception, traffic
analysis, and initiative deception.

Other special type of security


a. Air cargo security
b. School security
c. Supermarket security
d. Sea marshal

NOTA BENE: Security may also include all other security matters not covered in the
enumeration like; – FIESTA – BIRTHDAYS – PARTY – PARADE – CONCERT – RALLY – COURT
HEARING – INAUGURATION OF PRESIDENT.

THE ROLE OF THE PHILIPPINE NATIONAL POLICE AND OTHER GOVERMNET LAW
ENFORCEMENT AGENCIES
Industrial security is an indispensable part of the Philippine economy because it
serves as a partner of Law Enforcement Agencies in the country such as the PNP. With its
doubles significance, under Republic Act No. 5487, the PNP takes responsibilities in the
supervision, control and training, and operation of security agencies and in the issuance
of license to operate and the license to practice the security profession.
In addition to this, the PNP and other government law enforcement agencies
serve as the immediate law enforcement agency which assist security guards and
security agencies in the performance of their security function such as accepting and
processing crime reports submitted by the private security agency.

LESSON 3
TERMS TO PONDER
The following are the terms to ponder:
1 Access controls - Regulate people, vehicles, and items during movement into,
out of, and within a building or facility.
2 Assets protection Program- sum total of protection scheme encompassing the
entire security spectrum, designed to eliminate, reduce or control threats, hazards
or dangers to company
3 Barrier- A barrier can be defined as any structure or physical device capable of
restricting, deterring, delaying, illegal access to an installation.

5 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

4 Biometrics - digital capture of physical characteristics and conversion into data


for storage. The data are used to validate identity.
5 Biometrics identification system - Computerized systems that capture physical
characteristics and convert them into data for identification purposes.
6 Clear Zone - the exterior and interior parallel area near the perimeter barrier of
an industrial compound to afford better observation and patrol movement.
7 Company Guard Force (CGF) – a security force maintained and operated by any
private company/corporation utilizing any of its employees to watch, secure or
guard its business establishment premises, compound or properties.
8 Control point - An area established for positive personnel identification and
movement control.
9 Crotch-carry - A method of shoplifting in which the criminal carries stolen items
between his or her legs, usually under a loose coat or full skirt or dress.
10 Enunciator – It is a visual or audible –signaling device, which initiates conditioning
of associated circuits.
11 Government Guard Unit (GGU) – a security unit maintained and operated by
any government entity other than military or police, which is established and
maintained for the purpose of securing the office or compound and/or extension of
such government entity.
12 Hazard- It refer to conditions that may cause damage to property, injury, or loss
of life. It is also defined as the exposure to the chance of loss or injury.
13 Identity theft - The criminal act of assuming another person’s identity.
14 Industry - Earnest or constant application to work or business. A special branch of
productive work, or the capital or workers employed in it (Webster, 1993). Large-
scale production or organized economic activity connected with the production,
manufacture, or construction of a particular product or range of products.
(Microsoft Encarta, 2001-2005)
15 Industrial - This is defined as “pertaining to or engaged in industry”. (Webster,
1993)
16 Knock-off goods - Counterfeit goods or products
17 License to Exercise Profession – shall mean any document issued by the Chief,
Philippine National Police or his duly authorized representative recognizing a
person to be qualified to perform his duties as private security or training
personnel.
18 License to Operate (LTO) – is a License Certificate document, issued by the
Chief, Philippine National Police or his duly authorized representative, authorizing a
person to engage in employing security guard or detective, or a juridical person to
establish, engage, direct, manage or operate an individual or a private detective
agency or private security agency/company security force after payment of the
prescribed dues or fees as provided in these Rules and Regulations.
19 Management - the skillful use of means to accomplish a purpose.
20 Master keying system- system used in bid installation whereby keys can open a
groups of locks this is possible by use of interchangeable cylinder cores in the
locks.
21 Operational Security - This involves the protection of process, formulas, patents
and other industrial and manufacturing activities from espionage, infliction or
photocopying.
22 PADPAO - refers to the Philippines Association of Detective and Protective Agency
Operators, Inc., which is an association of all licensed security agencies and
company security forces.
23 Perimeter Barriers - The first line of physical defense of an industrial complex
viewing it from the outside.
24 Person - shall include not only natural persons but also juridical persons such as
corporation, partnership, company or association duly registered with the
Securities and Exchange Commission and/or the Bureau of Commerce.
25 Personnel Security Investigation - Phase of recruitment process that has been
very helpful to industrial firms for it held management in preventing the
assignment of security risks employees to sensitive position.
6 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

26 Physical barrier- any physical means to impede, delay, or prevent intrusion into
a protected area
27 Picklocker - Peterman in England.
28 Pilferage - Acts committed by employees to constitute internal criminal attacks
temptation to steal by employees/dishonesty.
29 Piggybacking - When unauthorized persons closely follow authorized employees
into restricted areas. Also known as tailgating.
30 Private Security Agency (PSA)– shall mean any person association, partnership,
firm or private corporation, who contracts, recruits, trains, furnishes or posts any
security guard, to perform its functions or solicit individuals, businesses, firms, or
private, public or government-owned or controlled corporations to engage his/its
service or those of his/its security guards, for hire, commission or compensation
thru subscription or as a consultant/trainer to any private or public corporation
whose business or transactions involve national security or interest like the
operation and/or management of domestic or ocean vessels, airplanes, helicopters,
seaports, airports heliports, landing strips etc., or as consultant on any security
related matter, or to provide highly specialized security, detective and
investigation services like gangway security, catering security, passenger profiling,
baggage examination, providing security on board vessels or aircraft, or other
security needs that PNP SAGSD may approve.
31 Private Security Guard (PSG) – referred to specifically as private security
guard, company guard and government guard when employed by private security
agencies, company guard forces of private firms and government entities,
respectively.” (PD 1919)
32 Private Detective Agency. A private detective agency is any person, who, for
hire or reward or on commission, conducts or carries on or holds himself or itself
out as conducting or carrying on a detective agency, or detective service.
33 Private Detective. A private detective is any person who is not a member of a
regular police agency of the Armed Forces of the Philippines who does detective
work for hire, reward, or commission.
34 Protective service - The basic role of a security office/department.
35 Remote station System- a system where the alarm signal is transmitted to
remote location manned and operated by independent party or police department.
36 SAGSD or Security Agency and Guard Supervision Division - the PNP Office
that was designated later as the primary office for supervision of the
implementation of the rules and regulations on security and detective agency now
the PNP SOSIA (Supervisory office for Security and investigation
Agencies).
37 Security Agency - any person, association, partnership or corporation who
recruits, trains, muster, furnishes, solicit individuals or business firms, private or
government owned or controlled corporation to engage his services or those of its
watchmen.
38 Security Key Control - Refers to the management of keys used in a plant office
or business organization to prevent unauthorized access and used.
39 Security Education - An industrial organization that insure the employees and
workers aware of the safety measures adopted therein or orientation of employee
to security relevance to their work.
40 Security Guard- is any natural person who offers and render personal service to
watch or guard residential, or business of both, government buildings,
establishment and or their premises for hire and compensation
41 Security supervisor- charged with directing the work and observation the
behavioral performance of the guard under his unit
42 Security Guard Force- group of forces of men selected trained or organized into
functional group for the purpose of protecting operational processes from those
disruption which impede efficiency or halt operation at a particular plant, facility,
institution or special activity
43 Security Planning- it involves knowing the objectives of the security and the
means and the method to reach these objectives or goal must then evolved
7 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

44 Security Survey- the process of conducting an exhaustive physical examination


and thorough inspection of all operation system and procedures of a facility
45 Security Inspection- the process of conducting physical examination to
determine compliance with establishment security policies as a result of security
survey
46 Security Hazard- any act or condition which may result in the compromise of
information, loss of life, loss or destruction of property or disruption of the
objectives of the installation.
47 Security Education program- program given to employees of an installation by
means of lecture pertaining to measures and safeguards to be taken
48 Security Cabinet- added protection of important vital papers, plans, data, special
correspondence, cash, etc such as vault, safe and file room
49 Security Alarm System-combination of compatible intrusion and detection
device so arranged and wired as to support one another
50 Security lighting- providing of sufficient illumination to areas during hours of
darkness to ensure visibility ant to act ads deterrent to intruders
51 Shrinkage - The reduction in inventory due to theft or diversion.
52 Source tagging - Anti-shoplifting tags that are attached to products by
manufacturers before they reach stores.
53 Top guard - It is an additional outwardly inclined fixed structured usually barbed
wires placed as vertical fence to increase physical protection from intruders of a
certain area.
54 Watchman or Security Guard, Watchman or Security Guard Agency - Any
person who offers or renders personal service to watch or secure either residential
or business establishment, or both, or any building, compound, or area including
but not limited to logging concessions, agricultural, mining or pasture lands for hire
or compensation, or as an employee thereof shall be known as watchman or
security guard; and any person, association, partnership, or corporation, who
recruits, trains, muster, furnishes, solicits individuals or business firms, private or
government-owned or controlled corporations to engage his service or those of its
watchmen, shall be known as Watchman of Security Guard Agency.
CHAPTER TWO
PHYSICAL SECURITY

LESSON 1
PHYSICAL SECURITY IN GENERAL

PHYSICAL SECURITY DEFINED


It is the sum total of all physical safeguards employed or installed to secure the
assets. These are used to define, protect and monitor property rights and objects. It
helps to combat the crime-related threats that both employees and outsiders pose to the
organization (for example: robbery, burglary, arson, assault, rape, theft and vandalism).
Physical security measures are being used to define, protect, and monitor
property rights and assets. These measures consist of barriers and devices that would
detect, impede, and prevent unauthorized access to equipment, facilities, material and
document and to safeguard them against espionage, sabotage, damage and theft.

PRINCIPLES OF PHYSICAL SECURITY


1. Type of access necessary will depend upon a number of variable factors and
therefore may be achieved in number of ways.
2. there is not impenetrable barrier
3. Defense- in depth is barriers after barriers
4. Delay is provided against surreptitious and non- surreptitious entry.
5. Each installation is different.

8 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

TWO GENERAL TYPES OF PHYSICAL SECURITY


1. Natural Barriers-These are offered by nature which could obstruct or delay the
passageway of potential intruder.
2. Man-Made Barriers- these are structural construction like fences, walls, floor, grills
bars, road block, or other physical means to deter or impede penetration.

LESSON 2
PROTECTIVE BARRIER AND PERIMETER BARRIER
Protective Barrier defined
It refers to any structure or physical device capable of restricting, deterring, delaying
illegal access to installation. It defines the physical limits of an area and creates a
physical and psychological deterrent to unauthorized entry.

Perimeter Barrier defined


It refers to a medium or structure which define the physical limits of an installation or
area to restrict or impede access thereto. Any physical barrier used to supplement the
protection of an inside or outside perimeter.
 It is the first line of defense of an installation.
 This maybe in the form of fences, walls or even bodies of water.
 Used to deny or impede access or exit of unauthorized person.

PROTECTIVE BARRIER
A Barrier can be defined as any structure or physical device capable of restricting,
deterring, illegal access to an installation. Generally, barrier is use for the following
purposes:
1. Define the limits of boundaries of an area.
2. Create physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of
intruders.
4. Assist in more efficient and economical employment of guards
5. Facilitate and improve the control and vehicular traffic.

TYPES OF PROTECTIVE BARRIER

1. Natural Barriers - It includes bodies of waters, mountains, cliff, terrain, ocean,


marshes, ravines, deserts or other terrain that are difficult to traverse.

2. Structural Barriers - These are features constructed by man regardless of their


original intent that tends to delay the intruder. Examples are walls, doors,
windows, locks, fences, safe, cabinets or containers etc.

3. Human Barriers Persons being used in providing a guarding system or by the


nature of their employment and locations, fulfill security functions.

4. Animal Barriers - Are used in partially providing a guarding system. Dogs are
usually trained and utilized to serve as guard dogs.

5. Energy Barriers - It is the employment of mechanical, electrical, electric energy


imposes a deterrent to entry by the potential intruder or to provide warning to
guard personnel.

PURPOSE OF PROTECTIVE BARRIERS


1. Define the physical limits of an area
2. Create a physical and psychological deterrent to unauthorized entry

9 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of


intruders
4. Assist in more efficient and economical employment of guards
5. Facilitate and improve the control of vehicular traffic

ADITIONAL PROTECTIVE BARRIERS


1. Top Guard- additional overhang of barbed were placed on vertical perimeter
fences upward and outward with a 45 degree angle with 3 to 4 strands of barbed
wires spaced 6 inches apart. This increases the protective height and prevents
easy access.
2. Guard Control Stations- this is normally provided at main perimeter entrances to
secure areas located out- of- doors, and manned by guards on full- time basis.
Sentry station should be near a perimeter for surveillance at the entrance.
3. Tower Guard- this is a house- like structure, above the perimeter barriers. The
higher the tower, the more visibility it provides. Its gives a psychological
unswerving effect to violators. By and large guard towers, whether permanent or
temporary, must have a corresponding support force in the event of need. Towers
as well as guard control stations should have telephones, intercoms, and it
possible two- way radios connected to security headquarters or office call for
reserves in the event of need.
4. Barrier Maintenance- Fencing barriers and protective walls should always be
regularly inspected by security. Any sign or attempts to break in should be
reported for investigation. Destruction of fence or sections thereof should be
repaired immediately and guard vigilance should be increased.
5. Protection in Depth- In large open areas or ground where fencing or wailing is
impractical and expensive, warning signs should be conspicuously placed. The
depth itself is protection Reduction of access roads, and sufficient notices to warn
intruders should be done. Use of animals, as guards and intrusion device, can also
be good as barriers.
6. Signs and Notice- “Control signs” should be erected where necessary in the
management of unauthorized ingress to preclude accidental entry. Signs should
be plainly visible and legible from any approach and in an understood language or
dialect.

THREE LINES OF PHYSICAL DEFENSE

1. First line of defense - This includes perimeter fences, bodies of water or


building walls.
2. Second line of defense - This includes doors, floors, windows, walls, roofs and
grills and other entries to the buildings.
3. Third line of defense - This includes storage system like steel cabinets, safes,
vaults and interior files.

PERIMETER BARRIERS
The main purpose of perimeter barrier is to deny or impede access or exit of
unauthorized person basically; it is the first line of defense of an installation. This maybe
in the form of fences, building walls or even bodies of water. The function and location of
the facility itself usually determine the perimeter of the installation. If facility is located in
a city whereby the building or enterprise occupies all the area where it is located, the
perimeter may be the walls of the building itself. Most of the Industrial companies,
however, are required to have a wide space for warehousing, manufacturing etc.

Inside Perimeter - A line protection adjacent to protected area and passing through
points of possible entry into the area such as doors, windows, skylights or other points of
access.
10 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Outside Perimeter - A line of protection surrounding but somewhat removed from a


protected area, such as a fence.

Objectives of Perimeter Barriers


1. Outline the perimeter of the area to be secured
2. Great physical and psychological deterrent for unauthorized entry
3. Delay intrusion, thus facilitating apprehension of intruders
4. Assist in more economical and efficient employment of guards
5. Facilitate and improve the control of pedestrian and vehicular traffic

TYPES OF PERIMETER BARRIERS


1. Fences- are independent structures designed to control physical and visual
access between outside areas. Types of fences includes:
a. Solid Fence- It is made of opaque material constructed in such a way that
visual access through the fence is denied. Its advantage is that it denies the
opportunity for the intruder to become familiar with the personnel, activities
and the time scheduled of the movements of the guards in the installation. On
the other hand, it prevents the guards from observing the area around the
installation and it creates shadow that may be used by the intruder for cover
and concealment. It is made of bricks, stone and concrete, and usually
extended down into the ground to a point view below the front line.

Advantages:
1. Denies visual access of the installation to the intruder.
2. Denies the intruder the opportunity to become familiar with the personnel,
activities, and the schedule of the movement of the guards.

Disadvantages:
1. Prevent the guards from observing the area around the installation.
2. Creates shadow which may be used by the intruder for cover and
concealment.

b. Full view fence - It is constructed in such a way that visual access is


permitted through the fence structures such as wire fences. It is designed
purely to control physical access between the two areas:

Advantages:
1. It allows the roving patrol and stationary guard to keep the surrounding
area of the installation under observation.
2. It does not create any shadow.

Disadvantages:
1. It allows visual access to the installation.
2. It allows the intruder to become familiar with the movements and time
schedule of the guard patrols thereby allowing him to pick the time that
advantageous on his part.

Wire Fences – It is a type of fence made of chain-link, barbed wire,


concertina design with small opening not larger than 2 square inches and
made of number 9 gauge wire or heavier, twisted and barbed salvage at top
and bottom.
1. Chain-Link - This is considered as permanent fencing.
2. Barbed wires – Semi-permanent fencing. Usually used as top guard.
3. Concertina - Temporary fencing

11 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Chain-Link Barbed Wires Concertina Wire Fence

Specifications of Chain-Link Fence Specification of Barbed Wire Fences:


1. It must be constructed of 7 feet 1. Standard barbed wire is twisted-
material excluding the top guard double-strand 12 gauge wire with
2. It must be 9 gauge or heavier 4 point barb spaced an equal
3. Mess openings are not to be larger distant part
than 2 inches per side. 2. Barbed wire fencing should not be
4. It should be twisted and barbed less than 7 feet high excluding the
salvage at top and bottom. top guard
5. It should be security fastened to 3. Barbed wire fencing must be
rigid metal or reinforced concrete. firmly affixed to posts excluding
6. It must reach below surface deep top guard and at least 6 inches
enough to compensate for shifting apart.
soil or sand. 4. The distance between strands will
7. It must reach within 2 inches of not exceed 6 inches and at least
hard ground or paving. one wire will be interlace vertical
and midway between the posts

Specification of Concertina Wire Specification of Barbed Tape


Fence
1. Standard concertina barbed is a 1. Barbed tape is compose of barbed
commercial manufactured wire wire, barbed tape dispenser and
coil of high strength- steel barbed concertina tape
wire clipped together at intervals 2. Barbed tape is fabricated from a
to from a cylinder steel strip with a minimum
2. Opened concertina wire is 50 feet breaking system of 500 pounds
long and 3 feet in high 3. The overall width ¾ inch
4. The tape has 7/16 inch barbs
spaced ½ inch interval along each

12 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

side.

2. Building walls – it include wall, floor, roof or their combinations serves also as
barriers and they should be of such constructions to provide uniform protection
just like wire fencing.

3. Bodies of water – it include river, lake, cataract, sea, pond or any bodies of
water forming part of the wall, building or fencing. However, it should not be
considered an adequate perimeter barrier. Additional security measures like wire
fence, concrete walling, security patrolling and flood lighting at night may be
necessary for the portions of the perimeter.

TYPES OF PERIMETER BARRIERS OPENINGS


1. Gates and Doors - When noting use and controlled by guards, gates and doors
in the perimeter should be locked and frequently inspected by guards. Locks
should be changed from time and should be covered protective locks and key
control.
2. Windows and similar opening – It should also be guarded or grills should be
installed so as not to be used by intruders.
3. Sidewalk Elevators - Elevated parts of the land near the perimeter barrier that
provides access to areas within the perimeter barriers and should be locked and
guarded.
4. Utilities Opening - Sewers, air intakes, exhast tunnels and other utility opening
which penetrate the barrier and which have cross sectional areas of 96 square
inches or more should be protected by bars, grills, water filled traps or other
structural means providing equivalent protection to that portion of the perimeter
barriers.
5. Clear zone - This is an unobstructed area maintained on both sides of the
perimeter barrier.
a. A clear zone of 20 feet or more should exist between the perimeter barrier
and exterior structure, parking areas and natural or manmade features.
b. A clear zone of 50 feet or more should exist between the perimeter barrier
and the structure within the protected areas, except when the building
constitutes a part of the perimeter barrier.

PERIMETER GUARDS
Perimeter Guards are also employed in augmenting the existing perimeter
barriers of a certain establishment. The two types of employing perimeter guards are:
1. Fixed Post – Security guard are assigned in a particular place of the compound to
guard and watch the surrounding area; and
2. Patrol (Roving) – In this system, the security guard is required to walk and go
around regularly around the company premises.

LESSON 3
PROTECTIVE ALARMS
PROTECTIVE ALARMS DEFINED
It is an aural or visual signal given by the enunciator to security guard when
intruder actuates device in a protected area.

Enunciator – It is a visual or audible –signaling device, which initiates conditioning of


associated circuits.

BASIC CONCEPT OF PROTECTIVE ALARMS

13 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Another safeguard used to assist security to complement if not to supplement


physical security is an array of alarms. These alarms various types and cost can be
installed indoors or outdoors.
Alarms system is designed to alert security personnel to consummated or
attempted intrusion into an area, building or compound. It assists the security in
detecting, impeding, or deterring potential security threat in the installation. Its function
is to alert the security personnel for any attempt of intrusion into a protected area,
building or compound.

Operational zoning
Building being protected has a segmented alarm system, whereby the alarm can
be turned on and off within particular zones depending on usage.

TYPES OF ALARM SYSTEM


1. Metallic foil or wire- In building or compound, all possible point of entry can be
wired by using electrically charge strips of tinfoil or wire. Any action that will move
the foil or wire breaks the circuit and activate an alarm, metallic foil or wire are
used in window or glass surface.
2. Photoelectric or Electric Eye Device - A light beam is transmitted at a
frequency of several thousand vibrations per second. It is connected by a wire a
control station and when an intruder crosses the beam, he breaks the contract
with the photoelectric coil which thus activates the alarm. An invisible or visible
beam is emitted and when this is disturbed or when an intruder break contact
with the beam, it will activate the alarm.
3. Audio Detection Device-supersensitive microphone speaker sensor installed in
walls ceilings and floors of the protected area of any sound caused by attempted
forced entry is detected by the sensor. It will detect any sound caused by
attempted force entry. A supersonic microphone speaker sensor is installed in
walls, ceilings, and floors of the protected area.
4. Vibration Detection Device- vibration sensitive sensors are attached to walls,
ceilings or floors of the protected area. The sensor detects any vibration caused
by attempted forced entry. Any vibration caused by attempted force entry is
detected by the sensor. Can be effective to safeguard enclose areas in sound
detection system.
5. Microwave Motion Detection Device- A pattern of radio waves is transmitted
and partially reflected back to an antenna. If they strike a moving object, they
return at a different frequency which results in initiating an alarm signal. Very
effective for protection of interior areas.
6. Ultrasonic Motion Detection Device- It consists of transceiver, amplifier and
control unit. Any motion within protected area causes an activation of alarm
signal.
7. Capacitance or electrostatic detection device- The body capacitance of any
intruder, who enters the field, unbalances the electronic energy of the field which
in turn activates the alarm. It can be installed on safe, walls or openings therein to
establish an electronic field around object to be protected.
8. Laser Beam Alarm - A laser emitter floods a wall or fencing with a beam so that
when this beam is disturbed by a physical object, an alarm is activated.

OTHER TYPES OF PROTECTIVE ALARMS (Bank alarms)


1. Foot rail activator- It is placed on the floor in such a position that tellers may
activate the alarm by placing the front of their foot to engage the activation bar.
Foot rails do not acquire any obvious use of the teller’s hand and their hand may
be kept in full view of the robbers for reason of safety. Because foot rail can be
activated very obtrusively and safely, it is frequently found in the bank while
standing up.

14 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

2. Bill traps or currency activation devices- Are usually placed in teller’s top,
cash drawer and connected to the alarm system using a wire connector. When

currency is removed from the devices, the alarm is activated. The advantage of
these devices is that the robbers frequently remove the currency and activate the
alarm. This is particularly helpful when the employees are immediately forced to
leave their station without having an opportunity to activate the alarm safely.
3. Knee or thigh buttons- It is installed inside the desk or teller station so they can
be activated by knee or thigh pressure. They are commonly found in location
where personnel usually perform their duties from seated position.
4. Foot button- It permits alarm activation in relatively safety while both hands
remain clear in view of the robbers.
5. Double squeeze buttons- requires pressure on both side of the device and
therefore the probability of accidental alarm is reduced.

TYPES OF ALARM DETECTION SYSTEM


1. Central Station System- central station is located outside the installation. It can
be located in an agency and the installation is one of the subscribers. When alarm
is sounded, central station notifies police and other agency. The alarm signal
could be transmitted to any of the following:
a. Direct Wire system – Used by high-risk locations (Bank, Jewelries and
Furriers)
b. Circuit Party System – This has a circuit transmission system where as
many as 15 alarm transmitter may send alarm to a single receiving panel at
the central station over the same time. Each alarm has a distinct code.
c. Multiplex System – This reduces leased telephone charges while at the
same time providing higher degree of line security than circuit loop alarms.
d. Digital Communicator – It is a computer –based which sends its original
signal through the regular switch line telephone network. The alarm signal
transmitted series of coded electronic pulses that can only be received on a
computer type terminal at the central station.
e. Telephone Dialer – Delivers pre-recorded verbal message to a central
station, answering service, to police department when an alarm is detected.
f. Radio Signal Transmission – This method takes the alarm signal from the
protected premises and sends it via radio or cellular phone to either a central
station or police dispatch center.
g. Video Verification – A video is sent to central station. This provides higher
level of protection while helping to eliminate false alarms by allowing central
station operators to see what is happening inside the protected area.
2. Propriety system-This function in the same way as central system except that it
is owned by, operated and located in the facility. Response to all alarms is by
facility’s own security or fire personnel. Since this system is monitored locally, the
response time to an alarm is considerably reduced. Usually the control center
where operators are on continuous duty. Any triggering information on fire,
intrusion, or violation of security rules is monitored by security and then
appropriate action is initiated.
3. Local alarm system- Consist of rigging up a visual or audible alarm near the
object to be protected, a bell or light indicates an attempted or successful
intrusion. In this case of alarm, response will be made by the local guards and
other personnel within sight or hearing. Its success relies on someone hearing or
seeing the signal and calling the responsible authorities. It also serves to notify
burglars that they have been detected. In this case, the sensor activates circuit,
which in turn activates a horn or siren or even flashing light, located in the
immediate vicinity of the alarmed area.
4. Auxiliary system- In this system installation circuits are led into local police or
fire department by lease telephone lines usually by special arrangements. The

15 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

dual responsibility for circuits and the high incidence of false alarms have made
this system unpopular with public fire and police personnel.
5. Local Alarm By Chance System - This is a local alarm system in which a bell or
siren is sounded with no predictable response. It is used in residence or small
retail establishments. The hope is that a neighbour or passing will reach to the
alarm and call for police assistance, but such a call is purely a matter of chance.
6. Dial Alarm System- This system is set to dial a predestined number when the
alarm is activated. The number selected might be the police or the subscriber’s
home number, or both. When the phone is answered, a recording states that an
intrusion is in progress at the location so alarmed. This system is relatively
inexpensive to install and operate, but since it is dependent on general phone
circuit, it could fail if line were busy or if the phone connection were cut.

PARTS OF AN ALARM SYSTEM

1. Sensor or Trigger Device - It emits the aural or visual signal or both.


2. Transmission Line - A circuit which transmits the message to the signaling
apparatus.
3. Annunciator - Signaling system that activates the alarm.

UTILIZATION OF ALARM DEVICES


The selection of proper alarm system is not a simple matter, because the needs of
each installation are different, like a set of fingerprints. Some factors that determine the
requirement of the installation will include the following:
1. Nature of the area or installation
2. Criticality of the area or complex
3. Vulnerability of the area or complex
4. Accessibility
5. Location of installation and area to be protected
6. Constructions and types of buildings
7. Hours of normal operations
8. Availability of other types of protection
9. Initial and recurring cost of installation alarm system
10. Design and salvage value of desired equipment
11. Response time of the security force and local police
12. Saving in manpower and money for a period of time if alarm is used

DESIRABLE CHARACTERISTICS OF ALARM SYSTEM


1. A detection unit should initiate the alarm upon intrusion of a human being in the
area or vicinity upon intrusion of a human being in the area or vicinity to the
protected area or object.
2. Panel board central enunciator opening, console monitoring activities should be
manned at all times.
3. An enunciator console indicating the audible and/ or aural signal and the specific
location of incident so that proper action can be made by security and other unit.
4. Fail- safe features which give alarm in the enunciator when something is wrong
with the system.
5. System should be difficult to tamper or render ineffective by outsiders,
competitors or saboteurs.

SUMMING UP PROTECTIVE ALARM DEVICES


1. Alarm devices are physical safeguards used to assist security but not a
replacement in the protection and lives in the installation.
2. It assist the guards to extend their hearing and vision even in areas where they
are not physically present.
3. The alarm system whether a local, a central, proprietary, or an auxiliary type are
to inform the guard either visually or aurally of an attempt or a break-in within the
premises being protected.
16 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

4. Maintenance of alarm system must be regularly made, the signal line must be
protected, and there must be alternate source of power.
5. New and improve intrusion hardwires are being developed and placed in the
market but again, the human guard is irreplaceable in spite of computerization
and the arrival of super sophisticated devices in security alarm systems.

LESSON 4
PROTECTIVE LIGHTING
PROTECTIVE LIGHTING
It is the single most cost-effective deterrent to crime because it creates a
psychological deterrent to the intruders.
It provides a means of continuing illumination during hours of darkness.
The idea that lighting can provide improve protection for people and facilities is as
old as civilization. Protective lighting is the single most cost effective deterrent to crime
because it creates a psychological deterrent to the intruders.

PURPOSES OF PROTECTIVE LIGHTING


1. Provides sufficient illumination to the areas during hours of darkness
2. Lightning can help improve visibility so that intruder can be seen and identified
and, if possible apprehended.
3. Lighting also gives that psychological fear and that serve as a deterrent to
thieves, pilferer, trespassers and saboteurs.

SIGNIFICANCE TO SECURITY FORCE


1. Reduction of the need for security forces.
2. Personnel protection for forces by reducing the advantages of concealment and
surprise for a determine intruder.
3. Relieved security forces could be used to better advantage elsewhere.

TYPES OF PROTECTIVE LIGHTING


1. Continuous lightning - It is otherwise called as stationary luminary. The most
familiar type of outdoor security lighting. This is designed to provide two specific
results: glare projection or controlled lighting. It consists of a series of fixed
luminaries at range to flood a given area continuously during hours of darkness.
a. Glare projection type - The intensity is focused to the intruder while the
observer or guard remains in the comparative darkness. It is being used in
prisons and correctional institutions to illuminate walls and outside barriers.
b. Controlled lighting - It is generally employed where, due to surrounding
property owners, nearby highways or other limitations, it is necessary for the
light to be more precisely focused.
2. Standby lighting- turn on manually or physically as needed. It is designed for
reserve or standby use or to supplement continuous systems. It can be most
useful to selectively light a particular area in an occasional basis.
3. Movable or Portable lighting- - searchlight; supplementary top other types of
lighting. This system is manually operated and is usually made up of movable
search or floodlights that can be located in selected or special locations which will
require lighting only for short period of time.
4. Emergency lightning. This system is used in times of power failure or other
emergencies when other systems are inoperative.

GENERAL TYPES OF LIGHTING SOURCES


1. Incandescent lamp - It is the least expensive in terms of energy consumed and
has the advantage of providing instant illumination when the switch is on.
17 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

2. Mercury vapor lamp - It is considered more efficient than the incandescent and
used widespread in exterior lighting. It emits purplish-white color caused by an
electric current passing through a tube of conducting and luminous gas.
3. Metal Halide - It has similar physical appearance to mercury vapor but provides
a light source of higher luminous efficiency and better color rendition.
4. Fluorescent lamp - This provides good color rendition, high lamp efficiency as
well as long life. It cannot project light over long distance and thus are not
desirable as flood type lights.
5. High Pressure Sodium Vapor Lamp - This has gained acceptance for exterior
lighting of parking areas, roadways, buildings and commercial interior
installations. Requires 2 to 5 minutes to light when cold and longer periods to
relight when hot.
6. Low-pressure Sodium Vapor- Produces yellow color.
7. Quartz Lamp-Produce Very bright light.

TYPES OF LIGHTING EQUIPMENT


1. Floodlights- These light project light in concentrated beams. These can be used
to accommodate most outdoor security lighting needs, including the illumination
of boundaries, fences and buildings and for the emphasis of vital areas or
particular buildings.
2. Searchlight- These are highly focused incandescent lamps used to pinpoint
potential trouble spots.
3. Fresnel light- These are wide beam units, primarily used to extend the
illumination in long, horizontal strips to protect the approaches to the perimeter
barrier. Fresnel projects a narrow, horizontal beam that is approximately 180
degrees in the horizontal and from 15 to 30 degrees in the vertical plane.
4. Street light- this produces diffused rather than directional beam. They are
widely used in parking areas. These lighting equipment received the most
widespread notoriety for its value in reducing crime.

LIGHTING APPLICATION/LIGHTNING SYSTEM


1. Fenced perimeter Lightning – It is used to illuminate the fence itself and the
area beyond it (“the detection zone”). Its objective is to reveal an intruder’s
approach and produce glare towards him, thus reducing his ability to see in the
site. However, it can be difficult to apply because it may create nuisance or
hazards.
2. Area lightning – It is used in a building face perimeter consist of building or
within 20 ft. of the property or area line to be protected and where the public may
approach the building. Guards may be stationed inside or outside of the building.
Doorways or other insets in the building’s face should receive special attention for
lightning to eliminate shadows.
3. Flood lightning – it is used to cast a strong light on the walls of buildings so that
intruders are visible either in silhouette (outline) or by the shadows which they
cast.
4. Gate House Lighting – it is installed on active entrances for pedestrians and
vehicles to facilitate complete inspection of passengers, car, trucks and freight
cars as well as their contents and passengers.
5. Topping-up Lightning – it is used to illuminate dark areas not adequately lit by
area or flood lighting. Areas and structures within the installation property lines
consist of yards, storage spaces, large open working areas, piers, docks, and
other sensitive areas and structures.

LESSON 5
PROTECTIVE LOCKS AND KEYS
(The Cheapest Security Measures)
18 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Lock is one of the most widely used physical security devices in the asset
protection program of an installation. It complements other physical safeguards of the
installation against any possible surreptitious entry. However, the owner of the
installation or his security officer needs to understand the weaknesses and strength of
each type of lock including the door, window or walls to be used to achieve maximum
benefit from its application. This is because highly skilled burglars more often
concentrate on the lock and its surrounding mechanism in order to make a forcible entry.
It is for these obvious reasons that locks are considered as delaying devices which
cannot really stop a determine intruder from destroying the lock just to launch an attack.
Hence, knowledge of the basic principles of locking systems will enable the installation
owner or the security officer to evaluate any lock and determine its quality and
effectiveness in a particular application.

LOCKS DEFINED
A mechanical, electrical, hydraulic or electronic device to prevent entry into a
building, room, container or hiding place and to prevent the removal of items without the
consent of the owner.

PADLOCK DEFINED
A portable and detachable lock having a sliding hasp which passes through a
staple ring or the like and is then made fast or secured.

KEY DEFINED
Instrument for locking and unlocking.
A metal bar with notches or grooves that, when inserted into a lock and turned,
operates the lock's mechanism.

PETERMAN DEFINED - An English term used to describe a lock picker.

TYPES OF LOCKS
1. KEY-OPERATED MECHANICAL LOCK- it uses some sort of arrangement of
internal physical Barriers (wards tumblers) which prevent the lock from operating
unless they are properly aligned. They key is the device used to align these
internal barriers so that the lock may be operated.
2. WARDED LOCK – It offers very little security. This type of lock must therefore be
used only to have privacy but not to provide a high degree of security.
3. DISC TUMBLER LOCK – It is designed for the use of automobile industry and are
in general used in car doors today. Because this lock is easy and cheap to be
manufactured, its use has expanded to other areas such as desks, files and
padlocks. The delay afforded is approximately ten minutes.
4. LEVER TUMBLER LOCK - These are difficult to define in terms of security since
they vary greatly in their effectiveness. They are used in safe deposit boxes and
are for all practical purposes, pick-proof.
5. PIN TUMBLER LOCK- The pin tumbler mechanism depends for its security, and a
number of round pin or tumblers operating on a cylinder. Each tumbler is divided
into two parts, the upper which is flat on bolt, is called the driver; the bottom part
called the pin is rounded or slightly pointed on the lower end to fit the grooves or
cuts in the key.
6. COMBINATION LOCK – It was difficult to defeat they cannot be picked because
few experts can manipulate the device to discover the combination. Most of these
locks have three dials, which must be aligned in the proper order before the lock
will open.
7. CODE-OPERATED LOCK - These are combination-type locks and that no key is
used. Pressing the series of numbered button in the proper sequence opens
them. Some of them are equipped to alarm if wrong sequence is pressed. These
are high security locking device.
19 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

8. ELECTROMAGNETIC LOCKS – Devices holding a door by magnetism. These are


electrical units consisting of the electromagnetic on metal holding sequence.
When the power is secured on the door, they will resist pressure of to 1000
pounds.
9. CARD OPERATED LOCK - These are electronically or more usually magnetic.
Coded card notched, embossed or containing an embedded pattern of copper
locks are used to operate such locks. These are frequently fitted with recording
device, which registers time of use and the identity of the user.

TYPES OF KEYS
1. Master Key - A special key of opening a series locks. A key which will open all
the locks when two or more sub master systems exist.
2. Grand Master Key - a key that will open everything in a system involving two or
more master key groups.
3. Change Key - a key to a single lock within a master keyed system. Specific key,
which operates the lock and has a particular combination of cuts, or biting, which
matches the arrangement of the tumblers in the lock.
4. Sub Master Key - a key will open all lock with a particular area or grouping in a
given facility.

Key Control
Once an effective key control has been installed, positive control of all keys must
be gained and maintained. This can be accomplished only if it is established in
conjunction with the installation of new locking devices. The following methods can be
used to maintain effective key control.
1. Key cabinet – a well-constructed cabinet will have to be procured. The cabinet
Will have to be of sufficient size to hold the original key to every lock in the
system. It should be secured at all times.
2. Key record – some administrative means must be set up to record code numbers
and indicates to whom keys to specific locks have been issued.
3. Inventories – periodic inventories will have to be made of all duplicate and
original keys in the hands of the employees whom they have been issues.
4. Audits- in addition to periodic inventory, an unannounced audit should be made
of all key control records and procedures by a member of management.
5. Daily report- a daily report should be made to the person responsible for key
control from the personnel department indicating all persons who have left or will
be leaving the company. In the event that a key has been issued, steps should be
initiated to insure that the key is recovered

LESSON 6
PROTECTIVE CABINET

SECURITY CABINET
The third and final line of defense at any facility is in the high security storage
where papers, records, plans or cashable instrument, precious metals or other especially
valuable assets are protected. These security containers will be of a size and quantity,
which the nature of the business dictates.
In protecting property, it is essential to recognize that protective containers are
designed to secure against burglary or fire. Each type of equipment has a specialized
function and it will depend on the owner of the facility which type he is going to use.

THREE (3) TYPES OF SECURITY CABINET

20 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

1. Safe- A metallic container used for the safekeeping of documents or small Items
in an office or installation. Safe can be classified as either robbery or burglary
resistance depending upon the use and need.

Specifications:
a. Its weight must be at least 750 lbs. And should be anchored to a building
structure
b. Its body should at least one inch thick steel.
c. It is a small metallic container used to safeguard small items like
documents, money and jewelries.

Categories:
a. Fire safe
b. Burglary and robbery resistive

2. Vault- This is a heavily constructed fire and burglar resistance container usually a
part of the building structure used to keep and protect cash, documents and
negotiable instruments. Vaults are bigger than safe but smaller than a file room.

Specifications:
a. The vault door should be made of steel at least 6 inches in thickness.
b. The vault walls, ceiling, floor reinforce concrete at least12 inches in
thickness.
c. The vault must be resistive up to 6 hours.

3. File room – It is a cubicle in a building constructed a little lighter than a vault but
of bigger size to accommodate limited people to work on the records inside.

Specifications:
a. The file room should at most be 12 feet high.
b. It must have a watertight door and least fire proof for one hour.

Safecracking Methods
a. Drilling or Punching - Accomplished by knocking off combination dial and drilling
hole to expose locking device.
b. Burring - The process of using high temperature oxyacetylene torches or “burning
bars” to cut an opening in the wall or door of the safe.
c. Peeling - It is the process of attacking the seams of metal plates with pry bars and
other tools to peel back layers of metal and thus exposing either locking
mechanism or interior.
d. Ripping - Similar to peeling except ripping can be accomplished against a solid,
metal walled container with a thin wall.
e. X-Ray - Utilized to reveal the position of the combination and mechanism
necessary to open the safe.
f. Explosives - Nitro-glycerine and plastic explosives are still used but not as much
as in the past.
g. Power tools - It involves the use of power drills, hydraulic tools and rotary devices.
h. Manipulation - Very few safe crackers have skill to use this technique.

LESSON 6
FIRE ALARM SYSTEM

21 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

FIRE ALARM DEFINED


Fire alarms are those devices installed to help detect fires or detect anything that
causes fire such as smoke or unusual rising of temperature.

TYPES OF PRIVATE FIRE PROTECTION SYSTEM


1. Automatic Sprinkler System - An integrated network of hydraulically designed
piping installed in a building, structure or area with outlets arranged in a
systematic pattern which automatically discharges water when activated by heat
or combustion products from a fire. Types of Sprinkler System could be classified
into either of the following:
a. Wet Pipe System – the piping has water with pressure and the water sprinkler
will operate when head is opened and water will continue to flow until shut-off.
b. Dry Pipe System – the pipes are filled with air under pressure which holds the
water at a value located in room. When sprinklers head goes, into operation,
air is released, trapping the dry pipe value and allowing water to flow through
system.
2. Fire Pumps - Mechanical device of supplying water which can be manual or
motor-driven. These pumps are ideal when natural supplies of water are readily
available like a river, lake or stream.
3. Standpipes - Galvanized iron steel or plastic pipes located inside a building from
the lowest to the top floor with water under pressure for use in case of fire.
4. Fire Hydrant - Mechanical device strategically located in an installation or street
where fire hose is connected so that water with pressure will be available to
extinguish a fire.
5. Portable Hand Extinguishers - A firefighting equipment which can be portable
or in a cart that is used to put out fire depending on the contents to extinguish
certain types of fire.
6. Alarm systems - Buildings may also be equipped with detection systems that
will transmit an alarm. Some detectors are designed to respond to smoke and
others to heat.
7. Smoke Alarms - Sounds an alarm upon the detection of smoke caused by fire.
Types:
1. Photoelectric Cell (sees the smoke) – In some of these detectors,
smoke that enters obscures a steady beam of light; in others, the
smokes scatters a light ray from a diode so that the cell can detect it.
In either case, the change sets off an alarm. Both eyes can be run
batteries or building current.
2. Ionization Devise or Radio-active device (feels the smoke)-This
contains a small radioactive source for ionizing the air molecules
between a pair of electrodes, permitting a very small current to flow
between the pair. If smokes particles from a fire enter this space, they
reduce the flow of current by adhering to the ionized molecules. The
drop in current sets off a buzzer or other alarm.

CHAPTER THREE
PERSONNEL SECURITY

LESSON 1
DEFINITION AND NATURE OF PERSONNEL
SECURITY
PERSONNEL SECURITY DEFINED

22 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Includes all the security measures designed to prevent unsuitable individuals or


persons of doubtful loyalty to the Philippine Government, from gaining access to
classified matters or to any security facility, and to prevent the appointment,
employment, or retention as employees of such individuals.
Of the three major aspects of security, personnel security is considered as the
most important. This is for the simple reason that security is considered as the assets to
be protected and as source of security involves people; both a losses are attributed
mainly to negligence or active participation of employees, either through theft and
sabotage. This emphasizes the need to set a system of hiring the people for the
company.

PURPOSE OF PERSONNEL SECURITY


1. to insure that a firm hires those employees best suited for the firm; and
2. Once hired, to assist in providing the necessary security to these employees while
they are carrying out their functions.

KEY FUNCTIONS OF PERSONNEL SECURITY


1. It serves as a screening device in hiring suitable employees.
2. It provides background investigation service of both potential and present
employees, for possible assignment to sensitive of wrong doing.
3. It handles investigation of employees.
4. It attempts to ensure the protection of employees from discriminatory hiring or
terminating procedures as well as unfounded allegations of illegal or unethical
activities and conduct.

PRINCIPLES OF PHYSICAL SECURITY


1. Type of access necessary will depend upon a number of variable factors and
therefore may be achieved in number of ways.
2. There is not impenetrable barrier
3. Defense- in depth is barriers after barriers
4. Delay is provided against surreptitious and non- surreptitious entry.
5. Each installation is different.

TTYPES OF PERSONNEL IDENTIFICATION


1. Personal Recognition
2. Artificial Recognition- identification cards, passes, passwords, etc.

USE OF PASS SYSTEM


1. Single pass system- the badge or pass coded for authorization to e enter specific
Areas is issued to an employee who keeps it in his possession until his
authorization is terminates.
2. Pass exchange system- an exchange takes place at the entrance of each
controlled area. Upon leaving the personnel surrenders his badge or passes and
retrieve back his basic identification.
3. Multi pass system- this provides an extra measure of security by requiring that an
exchange take place at the entrance of each restricted area.

SCOPE OF PERSONNEL SECURITY


1. Personnel Security Investigation (PSI)
2. Security Education

LESSON 2
PERSONNEL SECURITY INVESTIGATION

23 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

PERSONNEL SECURITY INVESTIGATION


Personnel Security Investigation (PSI) is a process of inquiry into the character,
reputation, discretion, integrity, morals and loyalty of an individual to determine the
suitability for appointment of access to classified matter.

Types of Personnel Security Investigation


1. National Agency Check
2. Local Agency Check
3. Background Investigation

GENERAL TECHNIQUES OF PSI


1. Background Investigation (BI) – this technique is very expensive but
necessary in personnel security. It serves to verify information on the application
form and to obtain other information pertinent to the decision to employ.

FACTORS TO CONSIDER IN THE CONDUCT OF BI


- Loyalty, Integrity, Discretion, Morals, Character, Reputation

COMPONENTS OF COMPLETE BI
- Applicants Name, Organization Membership, date of Birth, Neighborhood
Investigation, Present Residence Address, Character Reference, Personal
History, Employment History, Martial History, Military History, Residence
History, Foreign Travel History, Citizenship, Criminal Record, Physical Data,
Credit Records, Educational History, Applicant’s signature, Date of Application.

TYPES OF LOCAL AGENCY CHECK (LAC)


a. Barangay Clearance
b. City Municipal Clearance
c. Local Police Clearance
d. Court Clearance

TYPES OF NATIONAL AGENCY CHECK (NAC)


a. National Bureau of Investigation (NBI) Clearance
b. PNP Directorate for Intelligence (DI) Clearance
c. Intelligence Service, AFP (ISAFP) Clearance

2. Positive Vetting – Is the process of inspecting or examining with careful


thoroughness. The essence of vetting that it is a personal; interview conducted
under stress. It is based on information previously given by the applicant. Other
information is sued during the interview, such as those discovered in the BI, which
confirms or denies this given by the applicant.
3. Profiling – Is the process whereby a subject’s reaction in a future critical situation
is predicted by observing his behavior, or by interviewing him, or analyzing his
responses to a questionnaire, such as an honesty test. The Reid Report is an
example of honesty test.
4. Deception Detection Techniques – This a process of using devices in detecting
deception during the interview stage. This includes the use of a Polygraph,
Psychological Stress Evaluator and Voice Analyzer.
5. Financial and Lifestyle inquiry – This type of investigation seeks to gather
information on income and mode of living, sometimes referred to as the earning
to debt ratio.
6. Undercover Investigation – This is the placement of an agent in a role in which
the agent’s true identity and role remains unknown, in order to obtain information
for criminal prosecution or for recovery or limitation of asset losses.
7. Exit Interview – This is a valuable tool because it gives departing employees an
opportunity to list grievances. It offers security managers an opportunity to learn
of problems not previously known. Incorporating a checklist of company- issued
property and confronting a departing employee of this has resulted in reducing
24 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

losses of company property. Debriefing an employee is also incorporated into the


exit interview to remind employees of their continuing legal obligation to
safeguard confidential company information.

LESSON 3
SECURITY EDUCATION
SECURITY EDUCATION is conducted to develop security awareness among employees
of the company. It should cover all employees, regardless of rank or position.

OBJECTIVES OF SECURITY EDUCATION


1. Guidance for all supervisory and executive levels of the organization
2. A mandatory indoctrination on security for all new personnel before their
assignment of their respective jobs
3. Development of high degree of security consciousness among the selected
supervisors and other key personnel in a program that should be continuing and
supported by top management.
4. A down-the –line security program aimed at instilling consciousness and
dedication through demonstration, lectures, motivations and suggestions
5. To let all employees force informed that they all belong to the organization and
that non-awareness to the security program is tantamount to disloyalty
6. That the program is also to develop discipline, loyalty and belongingness.

PHASES OF SECURITY EDUCATION PROGRAM


1. Initial interview- it is the first time contact of the prospective employee wherein the
interviewer determine the suitability of the applicant for employment through his give
answers on the different type of question is being conducted. It is in this stage where
the interviewer may start providing the necessary information as to the overview of
company security policies and at the same time on the employee accountability and
corresponding penalties that could result from violation there from.
2. Orientation and training- it is in this stage where new employees receive detailed
presentation of personnel security policy. Usually harvest or employees manual is
being distributed for reference. New employees also requested to sign
acknowledgement that they have been aware of the exiting company policies and will
abide the same.
3. Refresher conference – it is design to remind employees of the company about
their responsibilities, review the guidelines and policies, introduction of new policies
and regulations and a moment of getting employees feedback about the company
policies that is being implemented.
4. Security Reminders – a phase which employs an indirect approach of educating the
employees such as posting security posters and distributing fliers.
5. Security Promotion – it is the act of emphasizing the importance and role of
employee cooperation and support.

LESSON 4
BADGE AND PASS CONTROL
1. The system should have a complete record of all badges and identification cards
issued return, mutilated or lost by serial number and cross-indexed alphabetically.
2. The supervisor from time to time for its accuracy and authenticity should check
the lists.
3. Passes and badges reported lost should be validated and security at entrance be
informed through conspicuous posting.
25 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

LESSON 5
VISITORS MOVEMENT CONTROL
Security should establish proper methods of establishing the authority for
admission of visitors as well as the limitation thereat. This security measure would
depend on the sensibility o9f the installation, but could include the following:
1. Visitor’s logbook – All visitors to any facility should be required to identify them
and should be given a visitor’s ID by the security. Visitors logbook should be filled
up with the named of visitors, nature and duration of visit.
2. Photograph – taking of photographs should also be considered. Extreme caution
must be exercised in areas where classified information is displayed to preclude
unauthorized taking of pictures of the installation. If a visitor has camera and it is
prohibited to take picture, said camera should be left in the care of security either
corresponding receipt.
3. Escort – If possible visitors should be escorted by the security to monitor their
activity within the establishment and guide them where to go.
4. Visitor entrances- separate access for visitors and employees of the
establishment should be provided.
5. Time-traveled- If there is a long delay or time lapse between the departure and
arrival, the visitors may be required to show cause for the delay.

LESSON 6
PACKAGE MOVEMENT CONTROL
Every facility must establish a system for the control of package entering or
leaving the premises. However, desirable it might seem it is simply unrealistic to suppose
that a blanket rule forbidding packages either in or out would be workable. Such a rule
would be damaging to the employee morale and, in many cases, would actually work
against the efficient operation in the facility. Therefore, since the transporting of
packages through the portals is a fact of life, they must be dealt with in order to prevent
theft land misappropriation of company properties. Thus.
1. No packages shall be authorized to be brought inside the industrial
installation, offices and work area without proper authority. This basic
precept help reduce if not eliminate pilferage, industrial espionage or
sabotage.
2. Outgoing packages carried by personnel should be closely inspected and
those in vehicles should also be checked as many pilfered items are hidden
in the surface of the vehicles leaving the compound.
3. Any personnel/ visitor entering the installation with a package should deposit
the same to the security and in return receives a numbered tag, which he/
she will use in claiming his/ her package upon departing.

LESSON 7
VEHICLE MOVEMENT CONTROL AND
IDENTIFICATION
Vehicular traffic within the boundaries of any facility must be carefully controlled
for safety as well as to control the transporting of pilfered goods from the premises.
Thus;
1. Privately owned vehicle of personnel/ visitor should be registered and are subject
to the identification and admittance procedure.

26 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

2. Vehicle should be subjected for search at the entrance and exit of the
installation.
3. All visitors with vehicle should provide the security as to the complete details of
their duration of stay, person to be visited, and other information.
4. All vehicles of visitors should be given a sign/ sticker to be placed on the
windshield.
5. Traffic warning signs should be installed in all entrances in or led to guide the
precautions while they are inside the installation
6. Security personnel must constantly supervise parking areas and make frequent
spots searchers of vehicles found there.

LESSON 8
BUILDING ACCESS CONTROL
At any physical barrier, a security system must possess the ability to distinguish
among authorized persons, unauthorized visitors, and other unauthorized persons. This is
to assist the security personnel protects sensitive are and information within the
installation.
Appropriate warning signs should be posted at the building perimeter. Special
restricted entry facilities to public access should be provided. This will be dependent on
the degree of security needed for the protection of property, activity and other processes
within the building.
The access to the restricted area shall be limited to authorize personnel who have
the direct involvement with the installation, construction and operation and maintenance
of the equipment and systems and/ or use of the materials contained within the
restricted area. A clear- cut policy on the access control should be disseminated to all
personnel of this installation.

LESSON 9
COMMUNICATION SYSTEM IN SECURITY
The regular communications facility of a plant is not adequate for protective
security purposes. Security needs a special communication system that will vary in
size, type, nomenclature, and cost commensurate with the importance, vulnerability,
size, location, radio propagation, and other factors affecting the security of the
installation.

EQUIPMENT USED IN COMMUNICATIONS


The following are some means of communication that can be useful part of the
protective systems:
1. Local telephone exchange
2. Commercial telephone service
3. Intercommunication
4. Two-way radios
5. Paging and recall systems
6. Bullhorns or megaphones
7. Amplifier or loud speaker system
8. Cellular or mobile phones

27 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

CHAPTER FOUR
DOCUMENTS AND INFORMATION SECURITY
In every installation, document and information are indispensable for their daily
operations and activities, be it in the form of a paper, film, and magnetic media or in the
computer system. Once there is a leakage in the contents of a company’s document and
information, the business operation stability is at stake. It may be a st

art of bankruptcy that would lead to its total disclosure.


The leakage of document and information cost government, business and industry
alike, billions of pesos. A rival company or an enemy agent might use an illegally obtain
document and information for their own advantage. For this reason, a comprehensive
and information security program is very essential to the installation in order to focus
freely on the attainment of its goal and objectives.
Protection of document and information entails a massive task on the part of the
executives and the staff of the installation. There should be a clear understanding on all
the types of documents and information of the organization. Security measures in the
classification, handling, care and proper disposition of classified documents and
information must be a primary concern in order to preserve the confidentiality and
integrity of document and information throughout all phases of its existence.

LESSON 1
DOCUMENT SECURITY
What is Document Security?

It is the protection of records from its entire document life cycle. It also connotes in
this context the safeguarding classified matters.
In the Philippines, security of documents and information is based on the premise
that the government has the right and duty to protect official papers from unwarranted
and indiscriminate disclosure.

TERMS TO PONDER

28 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

1. Document – any recorded information regardless of its physical from ore


characteristics, including but not limited to the following:
a. Written matters whether hand written, printed or typed
b. All painted, drawn, or engraved matters.
c. All printed photographs and exposed or printed films, still or moving
d. All products of the forgoing for whatever purpose
2. Classified matters – Information or material in any form of any nature, the
safeguarding of which is necessary in the interest of the national security.
3. Security Clearance – an administrative determination from a security standpoint
that an individual is eligible fro access to classified matter of specific category.
4. Compartmentation – the granting of access to classified document or
information to properly cleared persons when such classified documents or
information are required in the performance of their official duties, and restricting
it to specified physical confines when feasible.
5. Need-to know – the term given to the requirement that the dissemination of
classified matters be limited strictly to those persons whose official police or other
government duty requires knowledge or possession thereof.
6. Compromise – lose of security that results to unauthorized person obtaining
knowledge on classified matter.
7. Damage to property – the prejudice embarrassment or injury to the republic of
the Philippines resulting from any act or omission.
8. Classify – the assigning of an information or material to one of the four security
classification
9. Upgrading – the changing of the classification of classified matter to category
higher that the previously assigned to it.
10. Reclassify or regrading – the act of changing the assigned classification of a
document or materials.
11. Declassify – The removal of the security classification from classified or material
12. Security officer – a properly trained and cleared individual who assists the chief
of office in discharging the responsibilities of safeguarding classified documents
and materials.
13. Custodian – a cleared individual charged with the responsibility of safeguarding
and accounting classified materials.

What are the Standard Rules for Document Security?

1. The authority and responsibility for the preparation and classification of classified
matter rest exclusively with the originating office.
2. Classified matter should be classified according to their content and not to the file
in which they are held or of another document to which they refer, except
radiograms or telegrams referring to previously classified radiograms or telegram.
3. Classification should be made as soon as possible by placing the appropriate
marks of the matter to be classified.
4. Each individual whose duties allow access to classified matter, or each individual
who possesses knowledge of classified matter while it is in his possession and
shall insure that dissemination of such classified matter is on the “need-to-know”
basis and to property cleared persons only.

Document Security Systems

Documents Security is that aspect of security which involves the application of


security measures for the proper protection and safeguarding of classified information.
Classification Categories – Official matter which requires protection in the
interest of national security shall be limited to four categories of classification which in
descending order of importance shall carry one of the following designations:

CATEGORIES OF CLASSIFIED DOCUMENTS

29 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

(TOP SECRET – SECRET - CONFIDENTIAL – RESTRICTED)


In Document and Information Security, a matter includes everything, regardless
of its physical character, or in which information is recorded or embodied. Documents,
equipment ,projects, books, reports, articles, notes, letters, drawings, drawings,
sketches, plan, photographs, recordings, machinery, models, apparatus, devices, and all
other products or substances fall within the general term “matter”. Information which is
transmitted orally is considered “matter” for purposes of security.

Security Clearance is the certification by a responsible authority that the


person described is cleared for access to classified matter the appropriate level. Need-
to –know is the principle whereby access to classified matter may only be only given to
those persons to whom it is necessary for the fulfillment of their duties. Persons are not
entitled to have access to classified matter solely by virtue of their status or office. It is a
requirement that the dissemination of classified matters be limited strictly to persons
whose official duty requires knowledge or possession thereof.

Certificate of Destruction is the certification by a witnessing officer that the


classified matters described therein has been disposed of in his presence, approved
destruction methods.

Classified refers to assign information by one of the four classification


categories. Security Clearance refers to administrative determination that an individual
is eligible for access to classified matter. Compromise means lose of security, which
results from authorized persons obtaining knowledge of classified matter.
Compartmentation is the grant of access to classified matter only to properly cleaved
persons in the performance pf their official duties.

Declassify is the removal of security classification from classified matter.


Reclassify/Regrading is the act of changing the assigned classification of matter of
higher classification to a classified document.

What are Top Secret Matter?

These are information and material (matter), the unauthorized of disclosure of


which would cause exceptionally grave damage to the nation, politically or economically
or from a security aspect. This category is reserve for the nation’s closest secrets and is
to be used with great reserve.

Classification Authority

The original classification authority for assignment of TOP SECRET classification


rests exclusively with the head of the department. This power may however, be
delegated to authorized offices in instances when the necessity for such arises.
Derivative classification authority for TOP SECRET classification (authority for) may be
granted those officers who are required to give comments ore responses to a
communication that necessitates TOP-SECRETS response.

Examples of Top Secrets Documents

1. Very important political documents regarding negotiation for major alliances.


2. Major governmental projects such as proposal to adjust the nation’s economy.
3. Military – Police defense class/plans
4. Capabilities for major successes of Intel services.
5. Compilations of data individually classified as secret or lower but which
collectively should be in higher grade.
6. Strategies plan documenting overall conduct of war.
7. Intel documents revealing major Intel production effort permitting an evaluation
by recipients of the success and capabilities of Intel agencies.
30 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

8. Major government project like drastic proposals.

What are Secret Matters

These information and material (matter), the unauthorized disclosure of which


would endanger national security, cause serious injury to the interest or prestige of the
nation or of any governmental activity or would be of great advantage to a foreign
nation.

A Secret grading is justified if:

1. It materially influences a major aspect of military tactics;


2. it involves a novel principle applicable to existing important projects;
3. It is sufficiently revolutionary to result in a major performance of existing secret
weapons;
4. It is liable to compromise some other projects so already graded.

Classification Authority – same as TOP SECRET matter.

Examples of Secret Documents

1. Those that jeopardize or endanger Intel relations of a nation.


2. Those that compromise defense plans, scientific or technological development.
3. Those that reveal important intelligence operations.
4. War plans or complete pans for future war operations not included in top secret.
5. Documents showing disposition of forces.
6. New designs of aircraft projections, tanks, radar and other devices.
7. Troop movement to operational areas.
8. Hotel plans and estimates
9. Order of battle info.

What are Confidential Matters?

These are information and material (matter) the unauthorized disclosure of which,
while not endangering the national security, would be prejudicial to the interest or
prestige of the nation or any governmental activity, or would cause administrative
embarrassment or unwarranted injury to an individual or would be advantage to a
foreign nation.

Confidential grading is justified if:

1. It is more than a routine modification or logical improvement of existing materials and


is sufficiently advanced to result in substantial improvement in the performance of
existing CONFIDENTIAL weapons.
2. It is sufficiently important potentially to make it desirable to postpone knowledge of its
value reaching a foreign nation.
3. It is liable to compromise some other project already so graded.

Classification Authority- Any officer is authorized to assign confidential classification


to any matter in the performance of his duties

Examples of confidential Documents

1. Plans of government projects such as roads, bridges, building, etc.


2. Routine service reports like operations and exercise of foreign power.
3. Routine intelligence reports.
31 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

4. Certain Personnel records, Staff matters.

What are Restricted Matters?

These are information and material (matter), which requires special protection other
than that determined to be TOP SECRET, SECRET, or CONFIDENTIAL.
Authority to classify shall be the same as for CONFIDENTIAL matter. Reproduction is
authorized. Transmission shall be through the normal dissemination system.

Control of Classified Matters


Custody and accounting of classified matter - Heads of departments handling
classified matter shall issue orders designating their respective custodians of classified
matter. Custodian shall:
1. Store all classified matter.
2. Maintain a registry of classified matter showing all classified matter received
and to whom transmitted.
3. Maintain current roaster of persons authorized access to classified matter for
each classification in the office.
4. Insure physic cal security for classified matter.
5. Conduct an inventory of all TOP SECRET matter as specified in paragraph 7
(Memo Cir Nr 78/ 196).
6. Upon his relief, account for all TOP SECRET and SECRET matter by inventory
and transmit the same to his successor.

Unauthorized keeping of private records – All government personnel are prohibited


from keeping private records, diaries, or papers containing statement of facts or
opinions, either official or personal, concerning matters which are related to or which
affects national interest or security: Also prohibited are the collecting of souvenirs or
obtaining for personal use whatsoever any matter classified in the interest of national
security.
Dissemination

Discussion Involving classified matter

1. Indiscreet discussion or conversation involving classified matter shall not be


engaged in within the presence of or with unauthorized persons.
2. When lecture, address or informal talk to a group includes classified matter, the
speaker shall announce the classification at the beginning and end of the period.
3. All personnel leaving the government service shall be warned against unlawful
disclosures of classified matter.

Disclosures to other departments of classified information originating from


another department

Classified matter originating from another department shall not be disseminating to


other departments without the consent of the originating department.

Release of Classified matter outside a department

General Policy- No person in the government shall convey orally, visually or by written
communication any classified matter outside his own department unless such disclosures
has been proceed and cleared by the department head or his authorized
representative.

Release of classified matter to congress


Government personnel, when giving oral testimony before Congressional Committee
involving classified matter, shall advice the committee of the classification thereof.

32 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Government personnel called upon to testify shall obtain necessary and prior instruction
from his department head concerning disclosure.
When congressional members visit government offices, department heads are authorized
to release classified matter which is deemed and adequate response to an inquiry
provided that it is required in the performance of official functions.

Disclosure to Foreign Government or Nationals


1. Its use shall be solely for the purpose for which h the classified matter is requested.
2. It shall be treated or handled in accordance with the classified categories of the
originating office.
3. Handling shall be made by security-cleared personnel
4. Reproduction and dissemination shall not be made without the consent of the
department head.

Disclosure of classified matter for publication


Classified matter shall be released for public consumption only upon the consent of
the department head or his authorized representative. However, in instances where
there is a demand or need for releasing classified information, extreme caution must be
exercised to analyze in detail contents of the classified matter before release. Normally
all information are released through Public Information Officers. Public Information
Officers should be assisted in the analysis of classified information by the Security
Officer.

What are the purposes of protecting Classified Materials?


1. Deter and impede potential spy
2. Assist in security investigations by keeping accurate records of the moments of
classified materials
3. Enforce the use of “Need to Know” principle

Categories of Document for Security Purposes


1. Category A
 Information which contains reportable time sensitive, order of battle,
and significant information.
 It should be given priority because it is critical information.
 It must be forwarded without delay.
 It is critical to friendly operations.
 It requires immediate action.
2. Category B
 Anything that contains communications, cryptographic documents, or
systems that should be classified as secret and requires special
handling.
 Higher authorities should declassify it.
3. Category C
 Other information, which contains something that, could be an
intelligence value.
 Contains exploitable information regardless of its contents.
 Unscreened materials/documents should be categorized as Category C.
4. Category D
 No value, yet lower level will never classify documents as category D.
 No decision must be made at the lower echelon that document has no
value. It is the responsibility of the higher Headquarters.

What are the rules for classification of documents?


1. Documents shall be classified according to their content.
2. The overall classification of a file or of a group of physically connected therein.
Pages, paragraphs, sections or components thereof may bear different

33 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

classifications. Documents separated from file or group shall be handled in


accordance with their individual classification.
3. Transmittal of documents or endorsements which do not contain classified
information or which contain information classified lower than that of the
preceding element or enclosure shall include a notation for automatic
downgrading.
4. Correspondence, Indexes, receipts, reports of possession transfer or destruction,
catalogs, or accession list shall not be classify if any reference to classified
matter does not disclosed classified information.
5. Classified matter obtained from other department shall retain the same original
classification.

THREE (3) SECURITY CONCEPTS


1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel conscious and realize the value
of document.
3. Training is necessary for the practice of “Need to Known” principle.

RULES FOR CLASSIFICATION OF DOCUMENTS


1. Documents shall be classified according to their content.
2. The overall classification of a file or a group of physically connected therein.
Pages, paragraphs, sections or components thereof may bear different
classifications. Documents separated from file or group shall be handled in
accordance with individual classification.
3. Transmittal of documents or endorsements which do not contain classified
information or which contain information classified lower for than that of the
preceding element or enclosure shall include a notation for automatic
downgrading.
4. Correspondence, Indexes, receipts, report of possession transfer or destruction,
catalogs, or accession list shall not classify if any reference to classified matter
does not disclosed classified information.
5. Classified matter obtained from other department shall retain the same original
classification.

LESSON 2
INFORMATION SECURITY
What is Information Security?
Information security means protecting information systems from unauthorized
access, use, disclosure, disruption, modification or destruction.
The terms information security, computer security and information assurance are
frequently used interchangeably. These fields are interrelated and share the common
goals of protecting the confidentiality, integrity and availability of information: however,
there are some subtle differences between them. These differences lie primarily in the
approach to the subject, the methodologies used, and areas of concentration.
Information security is concerned with the confidentiality, integrity and availability of
data regardless of the form the data may take: electronic, print or other forms.
Governments, military, financial institutions, hospital and private businesses amass
a great deal of confidential information about their employees, customers, products,
research, and financial status. Most of this information is now collected, processed and
stored on electronic computers and transmitted across networks to other computers.
Should confidential information about a business’s customers or finances or new product
line fall into the hands of a competitor, such a breach of security could lead to lost
business, law suits or even bankcruptcy of the business. Protecting confidential
information is a business requirement, and in many cases also an ethical and legal

34 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

requirement. For the individual, information security has a significant effect on Privacy,
which is viewed very differently in different cultures.
The field of information security has grown and evolved significantly in recent
years. As a career choice there are many ways of gaining entry into the field. It offers
many areas for specialization including Information System Auditing, Business Continuity
Planning and Digital Forensics Science, to name a few.

What are the basic principles of Information Security?

1. Confidentiality

Confidentiality is a requisite for maintaining the privacy of the people whose


personal information the organization holds.

Information that is considered to be confidential in nature must only be accessed,


used, copied, or disclosed by persons who have been authorized to access, use, copy, or
disclose the information, and then only when only when there is a genuine need to
access, use, copy or disclose the information. A breach of confidentiality occurs when
information that is considered to be confidential in nature has been, or may have been,
accessed, used, copied, or disclosed to, or, by, someone who was not authorized to have
access to the information.

For example: permitting someone to look over your shoulder at your computer screen
while you have confidential data displayed on it would be a breach of confidentiality if
they were not authorized to have the information. Giving out confidential information
over the telephone is a breach of confidentiality if the caller id not authorized to have the
information.

2. Integrity

In information security, integrity means that data cannot be created, changed, or


deleted without authorization. It also means that data stored in one part of a database
system is in agreement with other related data stored in another part of the database
system (or another system).

For example; a loss of integrity can occur when a database system is not properly
shut down before maintenance is performed or the database server suddenly loses
electrical power. A loss of integrity also occurs when an employee accidentally, or with
malicious intent, deletes important data files. A loss of integrity can occur if a computer
virus is released onto the computer.

3. Availability

The concept of availability means that the information, the computing systems used to
process the information, and the security controls used to protect the information are all
available and functioning correctly when the information in needed. The opposite of
availability is denial of service.

Three types of control in Information Security

When management chooses to mitigate a risk, they will do so by implementing


one or more of three different types of controls.

1. Administrative Control – Consist of approved written policies, procedures,


standards and guidelines. Administrative controls from the framework for running
the business and managing people. They inform people on how the business is to
be run and how day to day operations are to be conducted. Laws and regulations
created by government bodies are also a type of administrative control because
35 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

they inform the business. Some industry sectors have policies, procedures,
standards and guidelines that must be followed - the Payment Card Industry (PCI)
Data Security Standard required by Visa and Master Card is such an example.
Other examples of administrative controls include the corporate security policy,
password policy, hiring policies, and disciplinary policies.
Administrative controls form the basis for the selection and
implementation of logical and physical controls. Logical and physical
controls are manifestation of administrative controls. Administrative
controls are of paramount importance.

2. Logical controls (also called technical controls) – use software and data to
monitor and control access to information and computing systems. For example:
passwords, network and host based firewalls, network intrusion detection
systems, access control lists, and data encryption are logical controls.

An important logical control that is frequently overlooked is the principle of least


privilege. The principle of least privilege requires that an individual, program or
system process is not granted any more access privileges than are necessary to
perform the task. A blatant example of the failure to adhere to the principle of
least privilege is logging into Windows as user Administrator to read email and
surf the web. Violations of this principle can also occur when an individual collects
additional access privileges over time. This happens when employees’ job duties
change, or another department. The access privileges required by their new
duties are frequently added into their already existing access privileges which
may no longer be necessary or appropriate.

3. Physical controls – monitor and control the environment of the work


place and computing facilities. They also monitor and control access to and from
such facilities. For example: doors, locks, heating and air conditioning, smoke and
fire alarms, fire suppression system, cameras, barricades, fencing, security
guards, cable locks, etc. separating the network and work place into functional
areas are also physical controls.

An important physical control that is frequently overlooked is the


separation of duties. Separations of duties ensures that an individual cannot
complete a critical task by himself. For example: an employee who submits a
request for reimbursement should not also be able to authorize payment or print
the check. An application programmer should not also be authorize payment or
print the check. An applications programmer should not also be the server
administrator or the database administrator – these roles and responsibilities
must be separated from one another.

What is cryptography in the information security?

Cryptography is the practice and study of hiding information. Information


security uses cryptography to transform usable information into a form that
renders it unusable by anyone other than an authorized user; this process is
called encryption. Information that has been encrypted (rendered unusable) can
be transformed back into its original usable form by an authorized user, who
possesses the cryptographic key, through the process of decryption.

Cryptography is used in information security to protect information from


unauthorized or accidental discloser while the information is in transit (either
electronically or physically) and while information is storage.
Cryptography provides information security with other useful application as Well
including improved authentication methods, message digests, digital signatures,
non-repudiation, and encrypted

36 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

LESSON 3
PROTECTION OF SENSITIVE INFORMATION
INTRODUCTION

In the business community it is seldom heard about the protection of such


information which we believe should be given enough protection. In the security
protection, a security professional should deal with this squarely and fairly as in other
security aspects like physical security and personnel. In our discussion, we will try to
understand why this should be and what kind of information should be given ample
protection and distinguish them from one another. Also, why and in what way we are
losing them.

PROPRIETARY INFORMATION DEFINED


Proprietary information is information that in some special way relates to the
status or activities of the possessor and over which the possessor asserts ownership. In
the business community, proprietary information relates to the structure, products or
business methods of the organization. It is usually protected in some way against causal
or disclosure.

PRIMARY DISTINCTIONS BETWEEN PROPRIETARY INFORMATION AND


CONFIDENTIAL DATA
The most basic distinction in regard to proprietary information is between trade-
secret data and all other types of confidential data.
The difference is of great importance because the rights and remedies available to
one which proprietary information is improperly disclosed or exploited depends upon the
legal status of that information.
Generally, trade secrets are afforded greater legal protection than confidential
information not amounting to trade secrets. Of practical importance is the test applied to
determine whether information is a trade secret.
All proprietary information is confidential, but not all confidential information is
proprietary. For example, confidential personnel data in employee files is not considered
as proprietary although the companies treat it as confidential.

PROPRIETARY INFORMATION PROTECTION PROGRAM


Realizing that the most serious threat to trade secrets is the employees a measure of
protection is often realized through the use of employee agreements which the company.
The following countermeasures may be adopted:
1. Policy and procedure statement regarding all sensitive information.
2. Pre and post-employment screening and review.
3. Non- disclosure agreements form employees, vendors, contractors and visitors.
4. Awareness programs
5. Physical security measures
6. Informed monitoring

TYPES OF PROPRIETARY INFORMATION

TRADE SECRETS
This consist of any formula, pattern, device or compilation of information which is
used in one’s business and which gives him an opportunity to again an advantage very
competitors who do not know or use it. It may be a formula for a chemical compound a
process of manufacturing, treating or preserving materials, a pattern for machine or
device, or ephemeral events. A trade secret is a process or device for continuous used in
the protected of the business.

37 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Trade Secret means information including a formula, pattern, compilation, program,


device, method, technique or process that:
(1) Derives independent economic value, actual or potential, from not being generally
known to, and not being readily ascertainable by proper means, by other persons
who can obtain economic value from its disclosure or use, and
(2) Is the subject of efforts that are reasonable under the circumstances to maintain
its secrecy.
(3) The definition of “trade secret” contains a reasonable departure from the
Restatement of Torts definition which required that a trade secret be
“continuously used in one’s business”. The broader definition in the
proposed Act extends protection to a plaintiff who has not yet had an opportunity
or acquired the means to put a trade secret to use.
A more recent legal definition of a Trade Secret is found in Section 1(4) of the
Uniform Trade Secret Act. It reads:
1) “Trade Secret” means information including a formula, pattern, compilation,
program device, method, technique or process that
2) derives independent economic value, actual or potential from not being generally
known to and not being readily ascertainable by proper means, by other persons
who can obtain economic value from its disclosure or use, and
3) Is the subject of efforts that are reasonable under the circumstances to maintain
its secrecy.

THE ESSENTIAL ELEMENTS OF A TRADE SECRET:


1. It is not to be generally known to others and
2. Some advantages are gained by the user from its use or possession.

WHAT IS SECRET?
This question is taken up first because it is relevant even in cases where the data
involved are not trade secrets but merely simple facts. If information is not novel or
secret, it is not entitled to any protection; it is the property of everyone and it is in the
public domain.

To be secret, information must generally meet the following tests:


1. It must be identifiable.
2. It must not be already available in public sources.
3. It must be disclosed by the owner only to persons who are under some duty to
protect its secrecy.
4. Persons to whom it is disclosed must know it is a secret.
5. There must be some objective indication that the owner is attempting to prevent
its unauthorized disclosure

IDENTIFIABLE
The amount of information or data defined as secret or confidential should be as
small as possible while remaining consistent with the business’s real objectives and
operating needs.

NOT ALREADY IN PUBLIC


If information claimed as secret is found in publicly accessible sources such
technical journals, trade meeting minutes, encyclopedias, and documents filed with
public agencies, then it is very hard to achieve protection.

DISCLOSED TO PERSONS WITH A DUTY TO PROTECT


One person cannot make another person the unwilling possessor of the first
person’s secret.
There must be a relationship between the persons that requires receiving the
disclosure to safeguard it, or there must be an agreement, expressed or implied,
imposing that obligation.
38 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Otherwise, a disclosure of a secret cannot build the one to whom it is disclosed to


protect it.
This class of persons under a duty to safeguard-fiduciaries - as the law terms
them - must first be shown the existence of a secret. Then the relationship must be
shown as well as the fact that the fiduciary, the trusted person, knew that the
information involved was secret. Subsequent disclosure during the relationship and
knowledge or pressurized knowledge, is wrongful.

EMPLOYEES
Under common laws employees are presumed to be fiduciaries to the extent that
they may disclose the secrets of their employers without authorization.
As a class, the employees are the largest group of persons bound to secrecy
because of their status or relationship.
In general, employees are bound to protect their employer’s secret.

PERSONS OTHER THAN EMPLOYEES


Other than employees, persons to be bound to secrecy must agree to be so
bound. Agreement may be implied from the acts and conduct of the parties, and need
not be written or expressed.
The wiser course in such cases is to reduce the agreement in writing. Even the
acceptance of a purchase order by return of an acknowledgement copy is already
enough to hold the vendor to all the terms and conditions of the order which are recited
on it.

DISCLOSEES MUST KNOW THE INFORMATION IS CONFIDENTIAL


Any company may require employees not to disclose any information about the
company not already known outside, whether such information is a trade secret or not.

OBJECTIVE INDICATIONS OF ATTEMPTS TO PROTECT SECRECY


The owner of the secret information must be able to show that he or she undertakes
to protect the information claimed to be secret. There is no single “laundry list” of
protective measures, but the following have been recognized at one time or another, by
one court or another:
1) Restricting non-employee access to places containing secret information.
2) Placing warning signs and instructions to alert employees to the sensitivity of
certain things and places.
3) Informing employees and visitors that information obtained or things seen in
certain locations within a facility are secret.
4) Storing sensitive documents separately in containers for which special security
precautions are taken.
5) Imposing area controls within a facility among different classes of employees with
respect to certain information or operations.

Obviously, the more precaution the owner of secret information takes to prevent
unauthorized disclosure, the better the information is protected and the easier it is to
show that an unauthorized person must have done something wrongful to obtain access.

PATENTS
This is a grant made by the government to an inventor, conveying or securing or
securing to him the exclusive right to make, use, or sell his invention for term of years.

It refers to any technical solution of a problem in any field of human activity, which is
new, involves an inventive step and is industrially applicable. It may be, or refer to, any
product, process, or an improvement of any of the foregoing. [Sec. 21, RA 8293] It is
vested from the issuance of letters of patent.

39 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

PRIMARY DISTINCTIONS BETWEEN PATENTS AND TRADE SECRETS


The main differences between a Trade Secret and a Patent are:
a) The requirement for obtaining a patent are specific, to qualify for a patent, the
invention has to represent a positive contribution beyond the skill of the average
person, whereas the trade secret needs a much lower novelty.
b) A trade secret can remain a secret for as long as it continues to meet the “trade
secret test”, whereas an exclusive right patent expires after a period of 17 years.
c) Since anyone can purchase a patent, they are not industrial espionage targets,
whereas trade secrets are.

VULNERABILITIES OF SENSITIVE DATA


There are three broad threats to sensitive data or information:
1. It can be lost through inadvertent disclosure.
2. It can be deliberately stolen by an outsider– an industrial espionage agent in the
classic sense.
3. It can be deliberately stolen by an insider entrusted with access to it.

INADVERTENT DISCLOSURE
Inadvertent Disclosure usually occurs in one of its following context:
1. Sales Presentations
2. Trade Association Meetings/Shows
3. Discussion with Suppliers
4. Off Premises Statements by Employees
5. Press & Public Relations

INTENTIONAL THEFT BY INSIDERS


In addition to theft by a current employee, there is also the problem that a former
employee may obtain a better position with a competitor and, once there, expose the
former employer’s sensitive data. This typically arises in the trade secrets situation and,
as was pointed out earlier, is then important for the original owner to establish a
proprietary position and also to establish the former employee’s breach of trust.
Litigating trade secret cases involving former employees now working for a
competitor poses three serious threats.
The original owner may have to expose the very trade secret data he or she wishes to
protect in order to prove ownership. Secrecy precautions invoked in court may not
safeguard the owner against further compromise.
Legal action may be much costlier than protective steps properly taken.
The owner may lose the litigation because the new employer in the course of the new
employment relationship is better achieved by requiring noncompetitive covenants from
key employees. This technique is more fully developed in the later discussion of
countermeasures.

PROTECT SENSITIVE INFORMATION


Effective Programs of information security involve considerations touching on
physical, personnel, and communications countermeasures.

COMPETITIVE INTELLIGENCE COLLECTORS


The most important function of competitive intelligence is to alert senior
management to marketplace changes to prevent surprise.

A single element of information may mean little, but the compilation and analysis
of many elements of many sources can provide an astonishingly accurate portrait of a
highly sensitive proprietary process. For example:
 Newspaper classified advertising for new employees can provide the types of
workers required and facilitate deducing the probable production start date.
 Documents filed with local planning authorities can provide the physical
dimensions of the facility and interior layout.

40 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

 Technical journal articles by the engineering staff offer information on advanced


manufacturing process to be employed.
 A presentation by a member of the marketing staff, published in the proceedings
of a marketing seminar, may detail a statistical formula for pricing and product
distribution and
 Casual conversations with construction workers can reveal the intended layout of
a manufacturing line for a new project.

In general, complete programs of data protection include the following


elements:
1. Policy and procedural statements which cover the recognition, classification, and
handling of sensitive information.
2. Pre-employment screening techniques and incumbent employee review
procedures to assure that persons entrusted with sensitive data do not have any
ascertainable motive or reason to exploit such data and are basically stable.
3. Awareness programs in which all employees are made aware of the existence of
sensitive data in the company, their responsibilities in protecting it, and the
required procedures.
4. Nondisclosure agreements from employees, in which they acknowledge their
fiduciary responsibility.
5. Nondisclosure agreements from employees to whom significant kinds and
amounts of sensitive data are released. These records may also include periodic
reaffirmations of non-disclosure responsibility.
6. Noncompetitive agreements from specified classes of personnel to prevent their
taking employment with defined competitors within a stated future period.
7. Physical measures such as area and access controls, admittance controls,
identification devices and routines, secure storage containers, regulated
reproduction facilities, controlled trash disposal, and restrictions on use of
communications media to minimize the probability that unauthorized persons will
gain access to sensitive data on or off the premises.
8. Follow up efforts with new employers of former employees who were exposed to
sensitive data but who were not required to execute non-competitive agreements.
Such programs include notices to the new employer of the former employee’s
exposure and responsibility to protect
9. Continuous and informed monitoring of routine activities in the field to detect
appearances of one’s sensitive data.

POLICY STATEMENT
The model policies utilize two familiar principles of military security, those of
classification and need-to-know.
1. PRE EMPLOYMENT SCREENING
2. MODEL AGREEMENTS
3. NONCOMPETITIVE COVENANTS

ELECTRONIC EAVESDROPPING

Knowingly and without lawful authority:


a) Entering into a private place with intent to listen surreptitiously to private
conversations or to observe the conduct of any other person or persons therein;
or
b) Installing or using outside a private place any device for hearing, recording or
amplifying, or broadcasting sounds originating in such place, which sounds would
not ordinarily be audible or comprehensible outside, without the consent of the or
persons entitled to privacy therein;
c) Installing or using any device or equipment for the interception of any telephone,
telegraph, or other wire communication without the consent of the person in
possession or control of the facilities for such wire communication.

41 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

EAVESDROPPING TACTICS AND EQUIPMENTS


The term eaves-dropping includes wiretapping and bugging.
WIRE TAPPING
It is the interception of communications over a wire without the consent of the
participants and requires physical entry into the communication circuit.
Some devices however use induction as a means of intercepting the signal and
therefore do not need physical entry into the circuit. In most states you only need the
consent of one of the parties.

BUGGING
It is the interception of communications without the consent of the parties by
means of electronic devices without penetration of the circuit.

WIRED MICROPHONES
Carbon Microphone, commonly used in a standard (old fashioned) telephone
handset.
Crystal Microphone, this generates a small electric current when the crystal is
vibrated by sound waves. They are used in two different ways.

1) Contact Microphones installed on a common wall with the target area.


2) Spike Microphones installed in a hole in the common wall (not so that they
penetrate).

Dynamic Microphones, these operate by the movement of a small wire near a


permanent magnet which converts the vibration (caused by the sound) into electrical
energy (self-powering). A good eaves-dropping device and it operates like a loud speaker
in reverse.
Pneumatic Cavity Device, has a specifically designed small cavity which picks up
surface vibrations (like the glass tumbler effect).

Condenser Microphone, used primarily in personnel address (PA) systems and


audio recording – it is extremely small.
Electret Microphone, used primarily in conferences, picks up sound from many
directions around the room.
Cardioid Microphone, picks up sound from directly in front of the microphone.
Parabolic Microphone, gathers audio energy and directs it to a conventional
microphone in the center of a dish type reflector.
Shotgun Microphone, a bulky arrangement of tubes gathers sound and sends it
to a microphone connected to the tubes.

WIRELESS MICROPHONES
A radio frequency (RF) device consisting of a microphone, transmitter, power
supply, antenna and in some applications a receiver as well (BUG).

CURRENT CARRIER DEVICES


Carry audio signals over virtually every type of wire path (e.g., wireless home
intercom system). Signal is usually blocked by power transformers.

LIGHT TRANSMISSION
Laser beam focused on a window pane, the vibrating glass modulates the
reflected beam and the sound signal is extracted from the reflected light signal.

ELECTRO-MAGNETIC RADIATIONS
Detectable electro-magnetic energy is generated by electronic information
processing devices.
Detection of the energy and extracting the information, is possible over several
hundred feet.
42 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

The ‘Faraday Cage’ method of screening is used for very sensitive processing.
(Tempest Shielding).

SPEAKERS
Ordinary speakers in TV’s, radios, PA systems, intercoms, etc., can be used in
reverse to pick up sounds from the room they are located.

TELEPHONE EAVESDROPPING
Interceptions from the line. Information is acquired from the line and includes voice, fax,
teletype and other data.

Two main principles used are:


1) Direct physical connection anywhere on the line between the target area and the
telephone exchange.
2) Inductive coupling which does not require a physical connection.

Use of target’s telephone equipment requires physical entry into the target area.
Three types of attack are:
1) Wiring alterations of the telephone require technical knowledge.
2) Drop-in transmitter, used on older types of telephones (bug).
3) Infinity transmitter, can be accessed from anywhere in the world using another
telephone. Cannot be used in electronic telephone switching systems.

DEFENSE AGAINST ELECTRONIC EAVESDROPPING


Scrambler, an encryption equipment used to disguise information.
“VOCODER” is the best available scrambler in the market.
Sound Barrier (not acoustic tiles)
Partitions, floors, ceilings, use non-porous material or staggered stud
construction.
Windows and doors, double panes with curtains, solid doors with rubber or felt
gaskets.
It is better if two doors are used in series and are properly sealed.
Cracks, holes, and ducts. Seal all openings, line ducts and install acoustic baffles. (A/C
duct!!)

PHYSICAL SEARCH
Detailed, time consuming, and an expensive task conducted in special areas only.
It is required for a complete counter measures survey.
Includes:
1) All furniture and equipment moved and examined.
2) Baseboards examined for signs of modification.
3) Walls examined in detail for holes, mismatch paint, new plaster, etc.
4) All wiring traced and accounted for, any not in use to be removed.
5) Light switches, telephone jack sockets and main outlets pulled out and examined.
6) Ventilation duct covers removed and ducts examined.
7) Space above plenum ceiling, and below raised floors, stages, etc. examined.

TELEPHONE SEARCH
This task is carried out by a technician who is familiar with the telephone equipment
used.
Areas covered:
1) Handsets inspected for drop-in transmitter or writing alterations.
2) All cables inspected for unusual attachments or bulges.
3) Junction boxes and writing cupboards examined and all connections verified.
4) Telephone distribution room wiring verified (probably the most sensitive and
vulnerable area).

ELECTRONIC SEARCH
43 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

No electronic sweeping equipment (scanners etc.) or techniques can guarantee to find a


well installed device installed by an experienced technician.

The types of equipment employed in electronic searches are:


1) Time Domain Reflectometry, an electronic picture of the telephone line at a
particular time which is compared to the same line at a future time.
2) Telephone Analyzer, an electronic analysis of the telephone instrument and of
the telephone line for wiring modifications or an installed radio transmitter.
3) Field Strength Meter, measures the relative radio frequency energy present at
a given point, not as good as a countermeasures receiver.
4) Counter-measures Radio Receiver, searches a large part of the RF Spectrum
to isolate and identify a signal.
5) Spectrum Analyzer, displays a large part of the RF spectrum and the
corresponding side bands. It is used in conjunction with the Counter-measures
Receiver to find and give a visual analysis of the signal.
6) Non-linear Junction Detector, this detects such devices as microphones,
recorders, transmitters (when not transmitting) etc. It looks for the ‘nonlinear’
junctions between dissimilar metals.
7) Metal Detectors are not very reliable.
8) A Pen-Register is a device used to monitor telephone calls by providing a record
of all telephone numbers dialed from a particular phone and the date and time
the calls were made.

AUDIO MASKING
The generation of noise at the perimeter of the secure area to cover or mask
conversations.
Music is not used, as it is fairly easy to filter out from a recording, best to use ‘white’ or
‘pink’ noise.

POST SEARCH SECURITY


After a search is completed, the room must be kept very secure, or else survey
cannot guarantee the room to clean when next used. If a device, or wiring alteration is
found, then a decision is needed on what action is to be taken; removal or use to provide
dis-information.

SAFES, VAULTS & OTHER STORAGE CONSIDERATIONS

Safes are designated either fire resistive or burglary resistive. There is no


federal or state law or code mandating the rating of safes, and two organizations
currently rate safes in the US: Safe Manufacturers National Association (SMNA),
and Underwriters Laboratories (UL).

Fire Resistant Safes - Fire Resistant Safes offer very little protection against the
safe cracker and once exposed to a fire the original degree of protection offered is lost,
and it must be replaced. For tables which list the various
categories and ratings see the Physical Security Section.
Burglar Resistant Safes - They are available in the market for the purpose of
storing.

Vaults - Defined as enlarged safes, usually made of high quality reinforced


concrete, except the door. The five sides should be twice as thick as the door but never
less than 12”. The vault door is usually made of high grade steel and normally 6” thick.
Vaults are normally installed at or below ground level because of their heavy weight. It is
also usual to have a clear sterile walkway around the five above base sides when
installed below a buildings foundations. Ratings for vaults are established by the
Insurance Services Office (ISO).

44 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

DESIGNING A PROPRIETARY INFORMATION PROTECTION PROGRAM


In developing a proprietary information protection program, it is important to
remember the following:
1) There is no such thing as a permanent secret of nature.
2) Any scientific discovery is a link to the future, which if kept secret, can impede the
next step, but does not prevent others from creating their own links.
3) Restrictions on the dissemination of information may jeopardize true security by
attempting to protect non-essentials.
4) Research and development (R&D) cannot be envisioned without communication
of the results of that effort. This principle also applies to most other forms of
competitive business information as well.
5) The printed word, particularly in the form of complete reports or documents, has
ceased to be the principal means of communicating information. More and more
vital data are being processed and analyzed electronically. This has increased the
difficulty of preventing its outright loss or undetected compromise, because of the
interdependence of many functions which can be remote in time and place to
each other.

PROPRIETARY INFORMATION AREAS OF VULNERABILITY

PEOPLE
1) Disgruntled employee or former employee
2) Moonlighter
3) Mobile employee
4) Marketing, sales representative, etc.
5) Purchasing agents, buyers, subcontract administrators
1. 6)Consultants
6) Vendor
7) Clerical
8) Applicants
9) Visitors & customers

ACTIVITIES OR EVENTS
10) Publications, public releases, etc.
11) Seminars, conventions or trade shows
12) Handling of trash or scrap
13) Survey or questionnaire
14) Merger, acquisitions, joint ventures, licensing
15) Reverse engineering
16) Term papers, Master’s thesis, etc.
17) Plant tours, “open house”

AMOUNT OF INFORMATION LOSS


ACCORDING TO SOURCES:
1) Inadvertent Disclosure 95%
2) Competitive Intelligence 3%
3) Industrial Espionage 2%

45 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

CHAPTER FIVE
SECURITY SURVEY AND INSPECTION
The information pertaining to one of the most important security services offered
to a head of office is the conduct of security surveys and security inspections.
Every unit chief desires a security system that will reduce to an absolute
minimum the possibility of espionage, sabotage and compromise of classified information
on his office or unit. Since there are many security countermeasures to be considered,
head of offices should utilized specially trained personnel, if the effort of espionage and
sabotage agents and other criminal elements are to be negated. Security is an extremely
complex program an objective analysis of an office head’s security program by security
survey and inspection personnel can be of great assistance in determining the efficiency
of any established security program.

LESSON 1
SECURITY SURVEY
What is Security Survey?
It is an estimate of the security standards of a unit, and is conducted to enable the
responsible officer to recognize and evaluate security hazards and determine protective
measures necessary to the prevention of sabotage, espionage, subversive activities and
other criminal acts inimical towards the interest and/or mission of the unit and/or
command.

What is the purpose of Security Survey?


The security survey will be used by the senior facility manager of industrial planners
in determining the type and extent of security controls for the facility or areas. Each type
of physical security survey will include the determination of the security level of the
facility and a security evaluation (threat assessment), which addresses the criticality of
operations, the vulnerability of the facility of area, and the probability of compromise of
the personnel or property contained therein.

What is the standard rule, no survey is considered complete until all three of the
factors below have been given consideration and weight.
1. Criticality- is the effect that partial or total loss of the facility or area would have
on the facility’s mission: The adversity of the effect is directly related to the
critically factor. Examples of adverse effects include the interruption of the
continuity of operations, or the compromise of national security information. A
higher classification level of information handled or stored in a facility or area will
increase the criticality.
2. Vulnerability – is the susceptibility of a facility or area to damage or destruction
or the possible theft or loss of property. Factors used to determine vulnerability
include the size, configuration, and location of the facility or area, the local crime
rate, and the proximity of law enforcement, and emergency response services.
46 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

3. Probability/Risk – deals with an assessment of the chances or risk that certain


events could or might occur, such as a penetration of the perimeter, compromise
of a system, or the occurrence of a variety of unauthorized activities.

What are the steps in conducting security survey?

1. Initial Survey- the initial physical security survey is conducted before


constructing, leasing, acquiring, modifying, or occupying a facility or area. It
describes any modification required to raise the level of security commensurate
with the levels of criticality and vulnerability.
2. Follow-up Survey- when recommendation is made in the initial physical security
survey, a follow-up survey is conducted to ensure the completion of modifications.
The survey should be conducted before acceptance of the property or occupancy.
3. Supplementary Survey- is conducted when changes in the organization,
mission, facility or the threat level of the facility alter or affect the security
posture of the facility or area. This survey is conducted at the discretion of either
the facility manager or senior security officer.
4. Special survey- the special survey is conducted to examine or resolve a specific
issue, such as when there is a request for a Sensitive Compartmented information
(SCI) accredited facility or there is a need to investigate or assess damage
resulting from an incident.

ROLE OF SECURITY OFFICER IN OFFICES


With the exception of the office head, the security officer is more interested in the
survey that any other individual of the office. It is the security officer who is directly
responsible to the head of office for proper maintenance of security of the security
program of the office.
A Survey Specialist must be cognizant of established security procedures relative
of the office since much of the survey including the resulting recommendations will be
affected by these measures.
This knowledge will enable him to recognize the present or potential hazards in
the area, answer most of the security questions put forth by the head of office personnel,
suggest minor recommendations during the survey which can be implemented on the
spot and to discuss completely his tentative recommendations with office personnel.

AUTHORITY IN CONDUCTING SECURITY SURVEY


`The unit head may request a survey of his entire office or of specific function of a
unit within the office.
When higher authorities directs a security survey to be conducted for of its subordinate
office, an information copy of the correspondence may also be forwarded to the unit to
be surveyed.
It must be remembered that a security survey is not conducted solely for the
purpose of establishing a security program of an office. The head of the office is directly
responsible for establishing a security system for his officer after which a survey may be
conducted to determine if the program is adequate in comparison with the importance of
the office to the overall national objective.
Some of the situations under which a security survey may be requested or
directed:
 Activation of organization or office.
 Reactivation of an organization or office.
 A substantial change the mission, number of personnel, structures or real
estate of the office.
 Indications of laxity in the security program which would indicate the need
for a complete revaluation of the security system.
 When no record exists of a prior survey having been conducted.

47 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Report of Security Survey


A security Inspection is a service performed to determined compliance with
established security policies and procedures and is conducted on recurring schedule or a
follow-up to a security survey.

LESSON 2
SECURITY INSPECTION
What is Security Inspection?
It is a check of how well existing security measures and regulation are being
carried out within a command. A security inspection may also include investigations of
alleged or suspected security violations. Physical security is concerned with forces,
entrances and exits, guards, traffic, control, lighting, fire control, and with such other
physical measures, which, if properly established and maintained, will deny access to,
unauthorized persons.

What is the Purpose of Security Inspection?

Security Inspection, which may be announced or unannounced, are usually


conducted to determine the extent of compliance with security regulations or
procedures, including those recommended during surveys. The security officer shall
inspect facilities and programs under the security officer’s cognizance as often as
necessary to ensure compliance with the provisions of the applicable standards. The
inspections should result in written inspection reports.

Security Survey Distinguish with Security Inspection

The terms “Security Survey” and ‘Security Inspection” to accentuate the


particular differences between the two types of services, are defined as follows:
Security Survey is defined as a counterintelligence service to assist heads of office
in determining the security measures required to protect key installations from possible
sabotage, espionage, subversion, and unauthorized disclosures of, or access to, classified
information or material contained therein.
Security Inspection is a counterintelligence service performed to determine
compliance with established security policies and procedures.

In Security Inspection
The inspection, although akin to the security survey, is much more restricted in
scope. As observed, the security survey considers everything pertaining to an office’s
security, but the security inspection is limited to determination of the degree of
compliance buy unit personnel with established policies and procedures.
The preliminary land investigative procedures involved in the conduct of a
security inspection are essentially the same as those required for a security survey; this
is the selection of inspection personnel, the necessary file checks and other preparation,
the duties of the In-charge, the use of checklists and the coordination with the Security
Officer. The actual inspection will closely parallel the same procedures followed during
the conduct of a security survey. Prior to the actual conduct of the inspection the agent
conducts preliminary checks of the office or offices to be inspected to determine what
security regulations are enforced at the unit.
There are three specific types of security inspections, to wit: Announce –
Unannounced – Penetration

- Announced Inspection – is one has been so published to the office that all
concerned personnel are usually aware of its imminence and may consequently,
make such preparations as are necessary.

48 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

- Unannounced Security Inspection - is an inspection whose imminence is


known only to certain selected personnel, normally the office head and
intelligence personnel of the office to be inspected. It is usually conducted during
non-duty hour periods.

- Penetration Security Inspection - is an inspection conducted in such a manner


that office personnel are not aware that such action is taking place.

What are the stages in Conducting Security Inspections?

1. Evaluation- the evaluation or fact-finding inspection is generally positive in tone


and promotes liaison and security awareness while taking a broad, general
outlook of a facility or program. Deficiencies, which may be resolved either on the
spot or within a non-specified time frame, may be noted and recommendations
for further corrective actions may be made. The evaluative inspection can also
help management officials in planning or upgrading their security programs.
2. Compliance- the full compliance inspection generally is conducted for
enforcement purposes. It focuses on compliance with established standards or
regulations.
3. Follow-up- another form of compliance is the follow-up inspection, conducted to
ensure that facility officials have complied with recommendations from earlier
inspections.
4. After-hours Room Check- the after-hours room check is a form of compliance
inspection. It monitors compliance with security regulations, especially involving
areas where national security information is processed or stored.
5. Self-Inspection- the self-inspection is initiated by the security officer or facility
manager to evaluate his/her own security program. Additionally, self-inspections
are required by each Top Secret Control Officer, Classified Documents Custodian,
and Special Security Officer to evaluate all security procedures applicable to their
operation. The scope and purpose of the self-inspection for an officer, building, or
other facility is determined by the initiator.
6. Closeout- A closeout self-inspection is accomplished immediately prior to the
action to administratively terminate an authorized Top Secret Control Station,
Classified Control Station, or Sensitive Compartmented inspections, all areas and
containers authorized for the storage of classified material are checked to ensure
all classified material has been removed.

What are the basic steps in conducting Security Inspection?

1. Plan an inspection by determining the scope, type, and method. Schedule the
inspection, and if appropriate, provide written notice. The notice should provide
the date(s), purpose, proposed interview schedule, and request for any
information needed by the security officer. Review past inspection reports and
prepare a list of questions or a checklist to structure the inspection.
2. 2. Upon arrival at the site and before departure, the inspector should meet with
the senior manager to discuss the inspection. Collect a sufficient sampling of data
from interviews with on-site employees and contractors and from touring the
facility. Obtain information to support findings in the inspection report. Report
favorable findings in the inspection report. Report favorable findings as well as
deficiencies. Check awareness and adherence to local security procedures.
Document any discrepancies corrected on the spot.
3. After sufficient data is collected, the inspector should analyze all findings,
compare them with applicable security regulations, list discrepancies and cite
regulatory references, recommend corrective action, and write the inspection
report.
4. The inspection report should be produced within 10 working days of completion of
the inspection (standard). The report should be distributed to the office

49 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

facility, or regional manager in a timely manner and require a response to any


recommendations. Copies of final inspection reports shall be provide to the
Security Management Office.

What are the types of briefing in a Security Inspection?

1. Initial Orientation Briefings.

Simply providing printed security regulations is not an effective way to promote


complete understanding of security responsibilities. A verbal orientation briefing,
preferably supplemented with audio-visuals and handouts, is more effective. Where
possible, it should be presented personally. Where this is not practical, it may be
presented in the form of videotape or other recording.
The initial orientation, whether written or verbal, should address general physical
security principles, including common security hazards, building security and crime
prevention, key system or other site-specific access controls, vehicle control, and
property accountability or package inspection programs.

2. Special Briefings

National Security Briefings – there are information security briefings that apply
to individuals who handle classified information. The briefings focus on classifications,
markings, transmission, disclosure, safeguarding, and destruction of information.
Special Access Briefings – these are briefings related to the various special access
programs such as those administered by the higher management or national offices.

What are the essential considerations in security inspection?

Preliminary Planning

1. To assure as much as possible the successful completion of a security survey, a


chronological plan of action is developed. The first action taken by the security
survey agent is to prepare for and conduct those preliminary courses of action that
precede the actual conduct of the survey.
2. Avery important consideration during the preliminary planning stage is the use of a
checklist. This is a list of general considerations or specific points that must be
covered during the survey. Checklists may be either the general type or the
specific/derailed type.

Initial Briefing

After completion of the preliminary stage, the specialist is prepared to visit the
office. It is to be recalled as mentioned previously that contact is made with the
security officer of the office for the purpose of establishing a time and date for the
initial briefing of the office head. It would be ideal to have at this conference not only
the office head but also his entire staff and other key personnel of the office.

Escort Personnel

It is often desirable for both the specialist and the office that escort accompanies
the specialist during the survey. Preferably, this escort should be the security office of
the office or his representative. In any event, he should be a person conversant with
the security practice and procedures employed as the office.

Preliminary Exterior and Interior Check


50 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

As soon as possible after the initial briefing, the specialist conducts a tour of the
area surrounding the office. The purpose of such an inspection is to gain a general
knowledge of those elements outside the office, which do or could conceivably have
either a direct or an indirect influence upon the security of the office.
It is often in the areas adjacent to the office that you find many of the office
personnel congregating for relaxation or entertainment, often under circumstances
conductive to loose talk. The agent also checks geographical features: terrain, road
and railroad networks, bridges and natural o man-made hazards near the office.

History of the unit to be surveyed

When the survey specialist completes his check of the surrounding area of the
installation and preliminary survey of the interior of the installation, he is ready to
commence the analysis of the office’s security program.
The specialist first determines the history of the organization to be surveyed and
or the office which may direct affect the security situation as it exists during the
current survey.

Analyzing Existing security

Having completed the preliminaries and determined the level of required


security, the specialist must no ascertain the existing level of security of the
installation. This portion of the survey is a minute examination of all factors pertaining
to the physical security, security of personnel and the security of information. It
includes the collection of all factual data that affects the security of the office. This
data will include all preventive measures as well as hazards and deficiencies any of the
security measures the specialist examine are not based upon existing requirements.
The specialist arrives at his own conclusion and this conclusion is reflected in his
recommendations.
Final Briefing

The final conference is an oral to the chief wherein the specialist determines
whether or not his tentative recommendations can be realistically implemented. The
Specialist discusses the recommendations with the command since information may
exist which may negate or change the recommendations. In many instance the chief
may have unsuccessfully attempted to implement corrective measures or the
recommendations are not feasible for some reason unknown to the agent. If the chief
has unsuccessfully attempted to correct its certain security weakness, a report of
these attempts is included in the specialist’s final report.

CHAPTER SIX
EXECUTIVE/VIP PROTECTION

LESSON 1
EXECUTIVE/VIP SECURITY DEFINITION

Executive/VIP Security Defined


It refers to those measures taken by Agents, Security Officers, Law Enforcement
officers or an Agency / officers to protect heads of state, foreign national or local

51 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

dignitaries, civilian or military against any personal injury, assassination, sabotage, and
individual utilized as government witnesses.

LESSON 2
THE NEED FOR VIP SECURITY
With increased incidence of kidnapping/hostage taking and other violent crimes
such as assault, armed robbery, murder and even political assassination, the security of
local and foreign dignitaries, designated individuals or very important persons (VIP) is of
extreme importance.
Problems of person’s security vary with each individual case in terms of potential
hazards and threats, political and sociological consideration, geography, environment,
mode of transportation, etc., the preparation of a comprehensive. Standing operating
procedures (SOP) becomes virtually impossible. However there are basic factors that
must be considered which can be applied to all situations regarding personal security.

Basic Security Principles in VIP Security


Every phase of security must be carefully in advance; to include the importance of
the individual to be protected, political attitude of the population, obstacles involved
means of transportation, and duration of the security mission.
Physical protection should consist of a series of protection cordons. These protective
cordons may be composed of a composition of personnel or physical security barriers.

Central Direction and Unity of Effort


The officer in charge should be given full responsibility for all phases of the
security mission.
Close coordination must be established with all local military and civilian
authorities. Civilian authorities will include police and other interested city, municipal or
other local officials.
The agencies responsible for each of the security plan must be clearly defined.
Arrangements should be made for local police to control local inhabitant. All
available intelligence channels should be used to obtain information of potential danger
areas, persons, or groups.
Coordination must be accomplished by an advance party after the official itinerary
is received.
Protective measures must be through but inconspicuous and afford security
without impending the protectee/VIP’s performance of his functions.
The degree of protection is dependent upon the degree of contact with the
general public desired by the protectee.
A basic element of VIP/Executive protection is the identification and the
elimination of possible sources of danger of the VIP/Executive before the danger
becomes actual.
Plans for a perimeter of protection must be surprise proof and flexible enough to
allow a quick response to any emergency.

PREVENTIVE INTELLIGENCE MEASURES

The main objective – To collect, processes and evaluates information about persons or
groups of persons who may be a danger to the protectee/VIP.

The methods:
1. Security clearance of all employees and all tradesmen who service the
Executive/VIP’s residence, quarter or office. Security processing of gifts sent to
the Executive/VIP.

52 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

1. Technical inspection against covert listening devices.


2. Process communications, letters that in any way indicates anyone may have
possible intention of harming the Executive/ VIP.
3. Maintain an album of photographs and description of individuals who are regarded
as clear risks to the Executive/VIP, including those who are penal or hospital
custody
4. Liason with other agencies for intelligence information that may come in contact
with that would indicate danger to the protectee/ VIP.

Defense-in-Depth Theory
There is no impenetrable barrier. If an unfriendly individual, organization or
government can devote time, money, personnel, material or imagination to passing a
barrier, he can succeed.
To achieve the ultimate results from a physical security system, it is necessary to
add barrier, delay time, until sufficient delay time has been accumulated to allow control
of any foreseeable penetration.

THEREFORE, rather than attempting to achieve exclusion through the use of a single
barrier, security must be built upon accumulated time or a system of “Defense-in-Depth.

Contingency Planning
Security planning should be flexible. Weather conditions, mechanical failures and failure
of lighting system are three-ever-present potential hazards. The unexpected arrival of
large numbers visitors, audience is another situation frequently encountered. Last-
minute changes in the security plan or schedule of events occur routinely. The security
plan therefore must be sufficiently fluid to cover these and other eventualities, all of
which present hazards.

LESSON 3
STANDARD OPERATION ORDER
A Standard Operation Order (SOP) Format for preparation of a protective plan
should include the following requirements.
 Mission
 Concept of Operation
 Coordination and Liaison
 Itinerary area of interest
 Personnel and equipment requirements
 Cooperation
 Communication
 Logistical support
 Public relation
 Emergency information
 Command and control

The order should be in writing and produced in sufficient copies and duly classified.
Only key staff officers/ personnel with whom coordination is necessary should be given a
complete copy, however, all proactive personnel are given an orientation on the contents
of the order and should be familiar with the whole operation. Each participant commits to
memory the requirements his specific mission. And for this reason, these instruction
must be simple to understand and easy to execute.
The itinerary and other information pertaining to the travel of the protectee/VIP,
which is often attached as an annex, May under certain conditions, are also classified.
Sufficient time must be allowed for dissemination of travel information to permit
suitable security measures to be taken.

53 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

The key to successful accomplishment of a security mission is detailed continuous


planning a careful selection, training and use of personnel.

Mission Orientation
An orientation/ briefing must be conducted by the offer in charge or the protection
plan, during which he explains fully the contents of the plan. Some topics to be
emphasized are:

Conduct of Security Personnel


Police/ Security personnel assigned to their duties are selected to the basis of the
appearance, alertness, and intelligence, as well as their ability to act quickly and
correctly in unforeseen circumstances.
Restriction on the approach the protectee or his effects, the person is checked
carefully for identification and the authority for his presence is established.

Use of weapons
There is always the danger of accidental discharge and hurt innocent persons
when weapons are carried. All protective personnel must be qualified to fire the weapons
with they are armed.
Crowd Control
Protective personnel should understand the principles of crowd control. They
should not show prejudice or sympathy, or become involved in any grievances expressed
by the crowd.

LESSON 4
SECURITY PREPARATION IN LOCAL/FOREIGN
TRAVEL
Advance Preparations
Arranging for timetable/ itinerary and coordinating with those concerned with
visit, local or foreign law enforcement security men.
Conduct security survey and inspection of routes, quarters, conference luncheon and
inaugural site.
Arrange for security measures for motorcade routes, quarters, conference site,
etc.
Confer with local or foreign security men. About potential danger to the Executive,
such as persons, organizations or obtain copies of photographs and place these persons
under surveillance.

Motorcades
Select and consider the best motorcade route, preferably the most direct route to
destination.
Select a route which affords a chance to have alternate routes if something
happened on the motorcade route.
Review or dry run the route and take notes on the requirements for controlling the
crowd and traffic and deployment of foot patrolmen and motorcycle police at various
positions along the route.
Arrange for police or buildings custodian to inspect buildings along the motorcade
routes.

Security in Inaugural/ Conference/ Luncheon sites


1. Control access to the building/ sites
2. Closing off and policing areas around it,
3. Securing rooftops and adjoining buildings.
4. Ensure the presence of numerous police officers inside and around the
building/site.

54 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Security in VIP Officer/Quarters/Residence.


1. “Defense-in-Depths” Barriers – Concentric patterns (Any attack will have to
penetrate layer after of defenders, the heavies’ layer of defense, being closest,
being closest to the Executive/VIP.)
2. outer ring- sidewalks, stationed in front of quarters/ residence/office, covering all
entrances, front, center, side and rear
3. Middle ring- inside quarters, office/ residence, covering all stair ways and
elevators.
4. Inner ring- immediately outside executive/VIP’S door, or close to Executive/VIP if
outside.

Personnel Duty
1. To hold ones position no matter what happens outside of his own ring
2. Be ready to place his own body between the Executive/VIP and any danger to him.
3. Be prepared to intercept a bullet, knife, or other weapon with his own flesh.
4. The final defense against an attack on the person of the Executive/VIP (as human
shield).

VIP Security Measures in all Areas


1. Establish screening points to allow only authorized persons access to the
protected area/ person and to keep out those who have no valid reasons to enter
same.
2. Duty stations or posts should be marked on a floor/ ground plan or sketch/ map.
3. If an unusually large crowd are expected along a parade route security men may
call on the armed forces to station troops along the line of March.
4. If the Protectee/VIP travels by train, a pilot engine must run the trucks IN advance
of the VIP train.
5. Every manhole and sewer along the route should be sealed
6. Every single building and all its occupants along the route should be checked.
7. Bellboys, waiters, cooks should be cleared.
8. Food to be cooked must be examined and samples be sent to laboratory for
analysis.
9. Inspect for time bombs, radio- active materials and hazards.
10. Inspect closets and under the tables
11. Never allow the VIP to stop his car a crowd if can be avoided.
12. Drivers for the VIP can be competent, reliable, and well trained in protective
driving and must be alert for dangers and to take instant action.
13. While walking, it is necessary to increase the number of guards because the VIP
becomes an easy target.
14. In case the VIP is going to speak at hasty made stage, its strength and capacity
should be inspected to limit the persons going up to stage.
15. During afternoon sessions, lightning facilities must be checked or installed. It is
estimated that the program may reach up to nighttime.
16. An alternate generator fore emergency use made available if source of electric
power is from a central source. Designate qualified electrician to watch main
source or switch.
17. If traveling by air, close the door of VIP plane when parked and place constant
guards every time.
18. If traveling by water craft, select boats of type and size capable of facing danger
at the ocean. Thorough inspection is made on the ship and check the adequacy of
life saver and emergency facilities.
19. All non-uniformed men must wear signs or countersigns for identification.
20. Checklist of all security hazards noted in the course of security survey or
inspection should be given to the OIC for reference/planning.
21. Security plans and specific duties of men assigned or details must be stated.
22. All written instructions must be classified SECRET.

55 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

LESSON 5
OTHER GUIDELINES FOR VIP SECURITY
1. Security Formation assists in allowing the Protectee/VIP to have the best possible
protection and defensible position even for the limited amount of manpower while
protectee is mobile/ in transit, or static.
2. Threat evaluation is to ascertain at varying times and function which will give the
best formation sequence or set. Other considerations are threat levels and type and
advance planning for staff levels.
3. The Need for Close in /Escort security officers, such as first and requirements
{which differs from location to location} and special weapon ns (a real headache-the
less you need to rely on them, the better), and other logistical needs must be
considered. One must have the ability to use a lot of common sense and attention to
detail, to give the possible protection, without overbearing or on top of the
protectee/principal. Fully aware with this information, the close-in/ Security Escort
team will be well equipped, with an understanding of their respective position,
alternatives and functions. These could be varied hourly, in response to current
threat level, and areas of coverage or occasion in any of the following:
 Crowds, restaurants, home, office – Public transport, bus, taxi
 Friends of protectee/principal, business
 Movie theatre
 Functions: private, public, business
 Huge crowds: a tight-packed area of swirling bodies
 Elevators: opening a door to the unknown, Turn side on, so that you can see
the front at one side and the area behind before you. Are you rising with the
escalator; you will become level with the floor behind before you, giving you
something to watch.
 Stairs: give way, standing, doors on way
 Doors: can’t see through them, an unknown reality.
 Streets lights: workmen, doorways, shops you are working past

THREAT ANALYSIS AND REACTION


1. Concentration do not get loss or be left behind, it takes only a second or two to
get killed;
2. Anticipation – anticipate your fellow officer/Escort’s moves you can keep the
protective formation together nice and well-coordinated. Because of obstacles,
obstruction, and areas of threats, the movement of Close in security Escorts will
be spasmodic and spontaneous.
3. Relaxation / Observation - Observation should be done in relaxed manner. Be very
attentive but looking relaxed. One that is nervous, sweating; Fidgety with quick
spasmodic movements over his shoulder is very unnerving for everybody,
including the protectee/principal. You will stand out for the entire public to see.
This will lessen with experience and time.
4. Common Sense – Most important part. Common sense comes from using your
brain, foresight, experience, and good training.
5. Participation within the Team – The team must train together and understand
completely what their job is and their responsibilities. There will be big gaps in the
defenses if we do not have participation within the team.

Multi-Position/Formation
 Knowing your position
 Responsibility of that position
 Ability of that position
 Ability to respond to all position

56 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

CHAPTER SEVEN
SECURITY HAZARD AND RISK MANAGEMENT
This chapter presents an insight on the general concepts of hazards analysis is a
process used to characterize the elements of risk. The result of a hazard analysis is the
means of controlling or eliminating them.

Security hazards and risk management are two interrelated fields in the context
of industrial security. Many organizations and businesses, by nature, are exposed to
hazards. Thus, in order to prevent industrial hazards, risk management is necessary.

LESSON 1
SECURITY HAZARD
What is Hazard?
A hazard is a situation, which poses a level of threat to life, health, property or
environment. Most hazards are dormant or potential, with only a theoretical risk of harm,
however, once a hazard becomes ‘active’ it can create an emergency situation. Any
act or condition which may result in the compromise of information, loss of life, loss or
destruction of property or disruption of the objective of the installation.

A hazard is usually used to describe a potentially harmful situation, although not


usually the e vent itself once the incident has started it is classified as an emergency or
incident. There are a number of modes for a hazard, which include.

 Dormant – the situation has the potential to be hazardous, but no people,


property or environment is currently affected by this. For instance, a hillside may
be unstable, with the potential for a landslide, but there is nothing below or on the
hillside that could be affected.
 Potential – this is situation where the hazard is in the position to affect persons,
property or environment. This type of hazard is likely to require further risk
assessment.

57 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

 Active - the hazard is certain to cause harm, as no intervention is possible before


the incident occurs.
 Mitigated – A potential hazard has been identified, but actions have been taken
in order to ensure it does not become an incident. This may not be an absolute
guarantee of no risk, but it is likely to have been undertaken to significantly
reduce the danger.

TYPES OF HAZARD
1. Natural Hazard - these are hazards which arise from natural phenomena. The
following are

Types of hazards or disasters:


 Floods caused by typhoons
 Earthquakes
 Fire (not caused by human action)
 Storms (typhoons, cyclones, tornado and hurricane)
 Lighting storms
 Extreme temperature and humidity

2. Human-Man made Hazards – These are hazards which are result of a state of
mind, Attitude, weaknesses or character traits of one or more persons. They can
be acts of commission or omission, both overt and covert, which can disrupt
operation of a plant or installation. The following are types of human or man-
made hazards.
 Carelessness-accidents and dissatisfaction
 Disloyalty-subversion and sabotage
 Espionage, pilferage and theft
 Vandalism, etc.

What is an Industrial Hazard?

In this context, industrial hazards are workplace hazards and are often grouped
into physical hazards, physical agents, chemical agents, biological agents, and
psychological issues.

Physical hazards include:


 Slips and trips
 Fall from height
 Workplace transport
 Dangerous machinery
 Electricity
 Heavy metals

Physical agents include:


 Noise
 Vibration
 Ionizing radiation

Chemical agents, include


 Solvents
 Biological agents

Psycholosocial issues include:


 Work related stress, whose causal factors include excessive working time and
overwork
 Violence from outside the organization

58 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

 Bullying (sometimes called mobbing) which may include emotional, verbal, and
Sexual harassment

Other issues include:


 Reproductive hazards
 Work environment factors, such as temperature, humidity, lighting,
welfare
 Avoidance of musculoskeletal disorders by the employment of good ergonomic
design

SABOTAGE AS A SECURITY HAZARD


Sabotage is a deliberate action aimed at weakening an enemy, oppressor or
employer through subversion, obstruction, disruption, and /or destruction.
When disgruntled works damage or destroy equipment or interfere with the
smooth running of a workplace, it is called workplace sabotage. This can be as part of an
organized group activity, or the action of one or a few workers in response to personal
grievances.

Description of a Saboteur
1. He is the most dangerous foe whom security will have to deal with while planning
and implementing security measures and techniques.
2. He is an ordinary looking as the next guy but in his mind, he has the training in
deception, knowledgeable in incendiaries, explosives, chemistry, bacteriology,
mechanics and psychology.
3. He can work alone, in-groups, or simultaneously in several places.

POSSIBLE TARGETS OF SABOTEUR


1. Armed Forces Installation
2. Natural resources mines, forest, farms and farm products
3. Industries- buildings, power sources, machinery, fuel etc.
4. Warehouses dépôts, communications, public utilities, etc.

COUNTERMEASURES AGAINST SABOTAGE


1. Use of an efficient, alert and trained guard force.
2. Use of physical security aids like barriers, personnel and vehicular control,
intrusion devices, communication systems, and electric aids.
3. Proper screening of personnel.
4. Identification and movement control system
5. Searches on incoming vehicles
6. Safeguarding of classified information
7. Designation of restricted areas
8. Investigation of breaches of security
9. Security education and indoctrination
10. Good housekeeping methods
11. Effective and compatible emergency planning
12. Regular audit
13. Continuing background checks

ESPIONAGE AS A SECURITY HAZARD


Generally, espionage is the practice of gathering information about an
organization or a society that is considered secret or confidential without the permission
of the holder of the information.

Description of an espionage agent


1. He is very dangerous adversary and his skills in deception and his cunning should
never be under estimated.

59 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

2. He is usually a person of extensive training and will be highly effective in gaining


the confidence of people and of extracting information of value to be relayed to
his employer or handler.
3. Even how well-trained and espionage agent he might be, he is human like the
saboteur and he can be defeated in his own game if proper methods and
techniques are undertaken.

SOME METHODS EMPLOYED BY ESPIONAGE AGENT


1. Stealing or information from employees.
2. Stealing information from records or other sources.
3. Using various methods of reproducing documents products equipment or working
models.
4. Using “front” as commercial concerns, travel agencies, associations, business
groups and other organizations to obtain confidential information or data.
5. Using various form or threats to obtain information.
6. Using blackmail techniques by exposing intimate and personal details concerning
an individual or organization.
7. Penetration and operational tactics.

COUNTERMEASURE AGAINST INDUSTRIAL ESPIONAGE


1. Careful and complete pre-employment measures designed to control threats of
industrial espionage.
2. Continuing personnel check on employees and particularly personnel on sensitive
positions even already employed.
3. Prevention of unauthorized entry to the plant or industrial installation.
4. Restricting of movement of personnel in the premises of the plant.
5. Controlled disposal of waste papers including carbons in classified work.
6. Only properly cleared personnel should handle classified document.

SUBVERSIVE ACTIVITY AS A SECURITY HAZARD


Subversion refers to an attempt to overthrow structures of authority, including
the state. Subversive activity is the lending of aid, comfort and moral support to
individuals, groups, or organizations that advocate the overthrow of incumbent
governments by forces and violence. All willful acts that are intended to be detrimental
to the best interests of the government and that do not fall into the categories of
treason, sedition, sabotage, or espionage are placed in the category of subversive
activity.

Threats of Subversive Activity


1. It can be local or national in nature and their mission is to undermine the
authority weaken the organization, and eventually take over. This can be in
business or any activity.
2. This can be in the form of rumor, mongering, propaganda undermining, morale,
and injecting defeatist attitudes, and other emotional approaches
3. It is an activity not easy to detect.

COUNTERMEASURES TO SUBVERSIVE ACTIVITY


1. The spreading of rumors, written materials, slogans or any other devices to
confuse the work population and discredit the government should be immediately
reported.
2. Labor and other company unions can be infiltrated so that strikes and “slow
downs” can be called to disrupts the normal operation of a plant or installation.
3. Security force should be alerted for person trying to recruit others in organizing
movements for peace, anti-colonials, anti trade and anti-imperialism.
4. Employees or outside personnel seeking memberships in “paper organizations”
should report this activity to security.
5. Other methods of subversion like united fronts, mob action, terrorism and
sabotage will be done to gain the subversive ends.
60 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

PILFERAGE AS A BUSINESS HAZARD


1. Pilferage is one of the most annoying and common human hazards which security
has to deal with. This activity if uncontrolled can become financial drain if not a
menace to smooth and orderly operation.
2. Failure to detect shortage and inaccurate inventories will cause inventory losses,
which may be labeled as pilferage.

TYPES OF PILFERERS
1. Casual Pilferer – one who steals due to his inability to resist the unexpected
opportunity and has little fear of detection is no plan or premeditation and he
usually a “loner” on the job. The temptation to pick up the article is basically due
to poor security measure. The implication of casual pilfering is the big cumulative
cost if it remains unchecked.
2. Systematic Pilferer – one who steals with preconceived plans and takes away
any or all types of items or supplies for economic gain. Pilferers of this kind can be
employees or outsiders of the establishment.

FACTORS CONSIDERED IN PILFERAGE


1. Location of items to be pilfered – the systematic pilferer surveys shopping and
store areas, or through contacts from the firms.
2. Access to the items - techniques can be from fake documents, bribing of guards,
outsmarting security, creating disturbance and other methods to divert attention
while pilferage goes on.
3. Removal of item - this can be done as wearing the stolen shoes or shorts,
concealment in body or vehicles, use of false documents, etc. Driver may conceal
pilfered items in his vehicle.
4. Disposal of items - there is a need for “fences” “brokers” or “clearing houses” for
these “hot “items.

COUNTERMEASURES FOR CASUAL PILFERAGE


1. “Spot”: check on outgoing vehicles and persons.
2. An aggressive security education and indoctrination program with emphasis that
“crime does not play”.
3. Superiors should set example of integrity and desirable moral climate for
employees in the establishment.
4. All employees must be enjoined to report or any loss to security.
5. Inventory and control methods should be done especially to pilferable items.
6. Control of tools equipment and sets.

COUNTERMEASURES FOR SYSTEMATIC PILFERAGE


1. Guards and electronics surveillance on all exist.
2. Package and material control system.
3. Parking area outside perimeter fence of establishment.
4. Careful screening and background checks on applicants to weed out potential
thieves.
5. Investigation of all losses quickly and efficiently to determine “modus operandi”
or obtain clues.
6. Alert all patrols to check areas and buildings for possible concealment of stolen
properties.
7. Install mechanical, electrical, electronic detention and alarm devices where
needed and applicable.
8. Establish an effective lock and key control system.
9. Use of appropriate perimeter fencing and lighting for parking facilities and areas
for vehicles and persons.
10. Store bulk quantities of pilferable items enclosed security areas and distribute
them to using section limited quantities.

61 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

11. Establish accurate inventory and accounting methods for procurement, use and
disposal.
12. Establish close liaison with governmental law enforcement and intelligence
agencies.

COMMON MEASURES AGAINST PILFERAGE


1. Package inspection
2. Assets inventories
3. Body search
4. Uses of alarms
5. Personnel ID &management control
6. Security education
7. Lock and key management
8. regular reporting
9. Property audits
10. Garbage & trash check before disposal
11. Inspections

LESSON 2
RISK MANAGEMENT
What is a Risk?

Risk is the likelihood that something bad will happen that causes harm to an
informational asset (or the loss of the asset). Vulnerability is a weakness that could be
used to endanger or cause harm to an informational asset. A threat is anything (man-
made or act of nature) that has the potential to cause harm.
The likelihood that a threat will use a vulnerability to cause harm creates a risk.
When a threat does use a vulnerability to inflict harm, it has an impact.
In the context of security, the impact is a loss lost income, loss of life, loss of
real property, loss of availability, integrity, and confidentiality, and possibly other losses.
It is therefore necessary that a risk assessment is carried out by a team of people who
have knowledge of specific areas of the business. Membership of the team may vary over
time as different parts of the business are assessed. The assessment may use a
subjective qualitative analysis based on informed opinion, or where reliable cost figures
and historical information is available, the analysis may use quantities analysis.

The level of risk is a combination of two factors:


The value placed on that asset by its owner and the consequence, impact adverse
effect of the loss or damage to that asset and; the likelihood that a specific vulnerability
will be exploited by a particular threat.

What is Risk Management?


Risk management is the process of identifying vulnerabilities and threats from
resources used by an organization in achieving business objectives, and deciding what
countermeasures, if any, to take in reducing risk to an acceptable level.
There are two things in his definition that may need some clarification. First the
process. It must be repeated indefinitely. The business environment is constantly
changing and new threats and vulnerabilities emerge every day. Second, the choice of
countermeasures (controls) used to manage risks must strike a balance between
productivity, cost, effectiveness of the countermeasure and the value of the
informational asset being protected.

What is risk analysis?

62 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Analysis of risk includes examinations of the vulnerability, probability and


criticality of potential threats and include natural and man-made risk.
The entity should assess the risk of a terrorist attack. The assessment should
include a determination of the likelihood of an act or attack, the type of terrorist action,
and consequences, depending on the size and location of the system. The assessment
should include potential risks to the following:
 Workers
 Environment and surrounding community
 Impact to the local, regional and national economics
 Adjacent and/or interdependent facilities and infrastructure.

A key element of the security management framework is in the integration of all


available information into the decision making process. Information that can impact an
operator’s understand ding of the important risks to a control system comes from a
variety of sources. The operator is in the best position to gather and analyze this
information, the operator can assist in determining where the risk of an incident is the
greatest and support prudent decisions to reduce the risk.
Another consideration should be closely safeguarding such information and
restricting it to only a few individuals with a “need to know”. Vulnerability analyzes and
risk assessments provide a method of prioritizing the criticality of assets ( or the impact
of the loss of the asset), threats, and counter measure strategies. In many cases, a
checklist survey is used in conducting a risk and vulnerability assessment. The checklist
includes an overview of a fairly standard approach to concepts of risk assessment, and
includes questions and considerations for use during each step of the process. The
assessment helps identify those facilities
That may be critical to overall operations, as well as their vulnerabilities.

What is an Adversary?
An individual, group, organization, or government that conducts activities or has
the intention and capability to conduct activities detrimental to the individual, private or
government entity.

What is Asset?
Any information, facility, material, information, or activity which has a positive
value to its owner whether it is an individual, private o0r government entity.

What is Vulnerability?
Any weakness that can be exploited by an adversary to gain access to an asset.

What are Countermeasures?


An action taken or a physical entity used to reduce or eliminate one or more
vulnerabilities. The cost of possible countermeasures may be monetary, but may also
include non-monetary cost such as reduced operational efficiency, adverse publicity
unfavorable working conditions, and political consequences.

What is Probability?
It is the chance or likelihood that a loss will take place. Indicated by a mathematical
statement concerning the possibility of an event occurring.

What is Criticality?
It is the impact of a loss as measured in financial terms. How important it is in terms
of the survival or existence of the organization.

What are alternatives and strategies in Risk Management?


1. Risk Avoidance - eliminating or removing the risk totally from the business,
government, or industrial environment for which the risk manager has
responsibility.

63 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

2. Risk reduction – decreasing the risk by minimizing the probability of the


potential loss. The reduction of criminal opportunity is often accomplished by
situational crime [prevention strategies to discourage, deter, or deny criminal
incidents.
3. Risk spreading – spreading the risk through compartmentation or
decentralization to limit the impact (critically) of the potential loss.
4. Risk Transfer _ moving the financial impact of the potential loss-over to an
insurance company.
5. Risk Self assumption- planned assumption and acceptance of the potential
risk by making a deliberate managerial decision of doing nothing about the
threat, or setting aside resources for use in case of specific loss incident.

CHAPTER EIGHT
GUARD FORCE AND GUARD SYSTEM

LESSON 1
GUARD FORCE AND GUARD SYSTEM IN GENERAL
64 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

The security guard force is the key element in the overall security system of a
plant or installation. Its basic mission is to protect all the property within the limits of the
facility boundaries and protect employees and other persons on the installation.
The security guard who will become a part of a guard force must be required to
meet minimum criteria to assure that they will effectively perform their assigned security
related duties. It is the responsibility of the security director of the installation to insure
that is guard force is of a high caliber to make a judgment that could save multi-million
pesos facility from total destruction.
The security guard force must be ready to meet the new challenges with new
concepts, bold innovation, and unrelenting insistence on high standards.

SECURITY GUARDS DEFINED


Sometimes called private security guard or watchman shall include any person
who offers or renders personal service to watch or secure either a residence or business
establishment or both for hire or compensation, and with a license to exercise profession.

SECURITY GUARD FORCE DEFINED


It is a group of force selected men, trained or grouped into functional unit for
the purpose of protecting operational processes from those disruption which would
impede efficiency or halt operation at a particular plant, facility, installation or special
activity.

TYPES OF SECURITY GUARD FORCES


Republic Act no. 5487 provided for the organization and management of
security guard forces designed for specific organizations and purposes. The three (3)
security guard forces are the following:
1. Private Security Agency (PSA)- any person, association, partnership, firm or
private corporation who contacts, recruits, trains, furnishes or post any security
guard, to do its functions or solicit individuals, business firms, or private, public or
government – owned or controlled corporations to engage his its service or those
of his its security guards, for hire commission or compensation.
2. Company Security Force (CSF) - A security force maintained and operated by
any private company/ corporation for its own security requirements only.
3. Government Security Unit (GSU) - A security unit maintained and operated by
any government entity other than military and/a police, which is established and
maintained for the purpose of securing the office or compound and/or extension
of such government entity.

TYPES OF SECURITY GUARDS


1. Company guard- a security guard recruited and employed by the company
2. Agency guard- a guard hired by the company belongs to a privately license
security agency
3. Government guard forces- a security guard recruited and employed by the
government.

PHILIPPINES ASSOCIATION OF DETECTIVE AND PROTECTIVE AGENCY OPERATORS, INC.


(PADPAO) – It is an association of all licensed security agencies and company security forces. This
was established as early as 1958 purposely for the regulation of all security agencies.

TYPICAL STRUCTURE OF A SECURITY ORGANIZATION


The security force of any installation must be organized in accordance with the
principles of responsibility and authority. Training and knowledge. This is to carry out
different functions efficiently and effectively and thus insures smooth flow of the
organization. The security positions may be classified into the following:

1. Office of the general manager/ security director


65 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

a. The office of the General Manager / Security Director is vested the authority
and responsibility of running the security force the authority of the President
of the Company/ Corporation.
b. The General Manager/ Security Director is directly responsible to the President
of the Company/ Corporation in the operations and administration of the
security force/
c. He the principal adviser to the President on matters involving security
operations, administration of security force.
d. He is the overall head or both various staff departments and field units where
he may delegate corresponding authority commensurate to their assigned
responsibility.
e. His implements policies promulgate by the policy making body and excited by
the President.
f. He direct, controls and supervises all offices and field units in the force in their
respective assigned tasks.
g. He performs other functions as directed by the President of the Company/
Corporation.

2. Office of the Executive secretary of the General Manager


a. He is the principal administrative assistant to the General Manager/ Security
Director.
b. He prepares communications initiated by the General Manager / Security
Director.
c. He maintains records of scheduled conferences, appointments and other
engagements and advisers the GM/ SD of such activities.
d. He records and checks outgoing communications signed by the GM/ SD as to
its completeness’ (attachments to be considered) as well as to ensure the
timely dispatch to the addressee through the administrative section.
e. To perform other duties as directed by the General Manager / Security
Director.

3. Office of the assistant General Manager / Security Executive Director


a. The Security Executive Director is the assistant Manager of the Manager of the
Security Force and takes the Operational and Administrative Management of
the Security force in the absence of the GM/ SD.
b. He is directly responsible to the GM/ SD.
c. He performs other duties as directed by GM/ SD.

4. Office of the Human Resources and Administrative Manager / Staff Director


for Personnel and Administration
a. Replacement
b. Discipline, Law in Order

5. The principle staff assistant to the General Manager / Security Director for
planning and supervising matters or activities pertaining to personnel
management and miscellaneous administrative functions such as:
a. Personnel Strengths
b. Morale and Personnel Service
c. Personnel Procedures
d. Interior Management
e. Personnel Adviser

6. Office of the Operations Manager / Staff Director for Operations


a. This office of the principal staff on Operations, training intelligence and
investigation.

7. Office of Finance

66 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

a. This office is principally concerned with budgeting, finance, reports control and
program review and analysis.
b. Exercises supervision over the management engineering activities of the
company and the accounting office.
c. Renders advice, assistance and guidance to GM/ SD on financial management.
Specific duties and function of the Finance Office are:
1. Accounting
2. Credit and Collection
3. Bookkeeping
4. Billing
5. Payroll
6. Disbursing

8. Office of the Logical Manager


This office is in charge with the following:
b. Coordinates plan and supervise the implementation of directive and guidance
determines divisional responsibility and evaluates in logistical planning in
related planning programs.
c. Develops, administers, and coordinates research and development on logical
matters.
d. Collect computes and evaluates statistical data on logical matters.
e. Recommends logistic budget policy including budget planning.
f. Prepares statements and / or requirements to ensure that logistical plants
support for corporate plans.
g. Performs necessary program and fiscal administration.
h. Supervise all matters pertaining to supply.
i. Determine the organization, allocation of service personnel
j. Plans for maintenance and repair of supplies and equipment.

9. Office of Inspectorate and Special Project (Special Staff)


a. This office assists the General Manager in inquiring into, and reports upon
matters pertain to the performance of the different staff, units, towards the
attainment of corporate objectives. It also inquires on the states of discipline,
efficiency and economy of the company.
b. The Inspectorate Staff conducts inspections, investigations and submits
functions; The General Manager is provided relevant importation pertaining to
meritorious conduct and performance of a unit or individuals.
c. His office is also tasked to conduct overt and covert inspections and
investigations and other related services.

10. Office of the Communications Officer


a. The communication officered who is licensed radio operator is the principal
adviser of the General Manager on communication on matters pertains to
radio communications.

11. The Detachment Commander Officer-in-charge - A Detachment Commander


shall command and responsible for a certain detachment, with fifteen (15) or more
security personnel under him. He is directly responsible to the security manager of
the installation.
a. He prepares and executes the security plan of his Detachment in relation to the
security requirements of the establishment being guarded.
b. He responsible for the enforcement in implementation of Rules and Regulations/
Policies.
c. He receives instruction for the Security Manager and implements the same as
required.
d. H e has full operational and administrative control of all his units to include his
assistant and shift-in-charge/ supervisor.

67 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

e. He conducts inspection of his units and institutes corrective measures on the spot
on those problems he may detect or brought to his attention. If not possible, he
brings the problem to the Security Manager of the establishment.

12.Assistant Detachment Commander


- Detachment with more than twenty 20 security personnel assigned may be
provided with and Assistant Detachment Commander who will the principal
assistant of the Detachment Commander. In the absence of Detachment
Commander, he performs the duties of the Detachment Commander.

13.Shift-in-Charge
- The Shift-in Charge shall be responsible to the Detachment Commander as far as
his shift is concern.
- He form his men at least 30 minute before posting time seeing that all are in
proper uniform and presentable.
- He disseminates instructions coming his Detachment Commander / OIC or those
related to him by his counter – part, the outgoing SIC.
- He inspects the post as often as he can to ensure that his men are on the alert
and performing their duties effectively.
- He performs others duties as may be directed by the Detachment Commander or
by the ADC

13. Security Guard on Duty /Post


- The Security Guard (SG) on Duty/ Post must always carry his license to practice
his profession, Xerox, copy of the firearm’s license assigned to him, and his duty
detail order, authorizing him to carry his issued firearm within his area of
jurisdiction.
- If the Security Guard is manning a fixed post especially entrance or exit points he
must maintain a guard’s logbook and enters in the same logbook all event/
passage of VIP’s vehicles and inspections or visits of Security Manager /Director of
the Client /Firm.
- -Guards must observe and apply religiously the provision of the Code of Ethics,
Code of Conduct, and the General Orders of the Security Guards when on post.
- He may perform special task as may be directed by his shift supervisor, DC and or
ADC like control of visitors, inspections of bags of persons coming in and going
out of the establishment, vehicles cargoes, or prevents the instruction of
authorized person in a particular area, etc

LESSON 2
SELECTION OF GUARDS: QUALIFICATIONS
AND DESIRABLE ATTRIBUTES OF SECURITY
GUARDS AND CONSULTANT
R.A. 5487 and its implementing rules and regulations prescribed the minimum
requirements for guards to be able to secure a license to exercise profession as a
security guard, private detective, security officer and security consultant.

GENERAL REQUISITES IN THE SECURITY PROFESSION


a. Filipino Citizen
b. Physical and Mentally fit
c. Good moral character
d. Must not posses any disqualification

68 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

GENERAL DISQUALIFICATION
a. Dishonorably discharge from the service in the PNP/AFP or any private
government entities.
b. Physical and mentally unfit
c. Conviction of Crime
d. Addicted to drugs or alcohol dummy of a foreigner
e. Elective or appointive government officials

BASIC QUALIFICATIONS OF SN AGENCY OPERATORS/ MANAGER


In addition to the general qualification, an operator should be:
1. At least 25 years of age.
2. Commissioned officer, inactive or retired from AFP or PNP or a graduate of
industrial Security Management with adequate training and experience in the
security business.

BASIC QUALIFICATION OF A SECURITY CONSULTANT


In addition to the general qualification, a consultant should be:
1. Holder of Master degree of Criminology, MPA, MNSA, Industrial Management or
LL.B.
2. Must have at least ten (10) years experience in the operation and management of
security business.

BASIC QUALIFICATION OF A SECURITY OFFICER


In addition to general qualification, a security officer should be:
1. At least graduated from Security Officers Training Course
2. A retired personnel in the AFP/PNP.
3. Must not posses any of the disqualification.

BASIC QUALIFICATION OF A PRIVATE DETECTIVE


In addition to the general qualification, a detective should posses any of the
following:
1. BS Criminology Graduate
2. LL.B. Holder
3. Graduate of a Criminal Investigation Course
4. Advance ROTC Graduate

BASIC QUALIFICATION OF SECURITY GUARD


In addition to the general qualification, a security guard should:
1. Be atleats Highschool Graduate
2. Be atleast 18 years of age but not more than 50 years old.
3. Unkdergone pre-licensing examination
4. Be locally cleared with PNP or NBI

DESIRABLE QUALITIES OF SECURITY GUARDS


1. Alertness- A good guard must be alert in spotting violators. This can be attained
by being watchful, dedicated and diligence.
2. Judgment- sound and good judgment is more than the use of common sense. It is
the arriving at wise and timely decisions.
3. Confidence- it is the state of being sure; a state of the mind free from doubt or
misgivings. This attribute includes faith in oneself and his abilities, which is
attained by job knowledge. Thorough and proper training plus good supervision
instills confidence.
4. Physical Fitness- security work is strenuous and demanding physical conditioning
is essential if he is to be a dependable guard.
5. Tactfulness- ability of the guard to deal with other successfully without offending,
In short, he can be firm but pleasant.

69 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

6. Self-control ability to take hold of oneself regardless of provoking situation. With


self-control, the guard will do his work without being angry and the situation will
be on hand.
7. Interest, loyalty, responsible and trustworthy, is also important attributes of an
reliable guard.

ATTRIBUTES OF SECURITY GUARDS/PRIVATE DETECTIVE


1. Honesty
2. Presence Of Mind
3. Moral Courage
4. Reliability And Dependability
5. Endurance
6. Calmness
7. Trustworthiness
8. Ability
9. Attitude
10. Courtesy
11. Discipline
12. Interest
13. Loyalty
14. Devotion
15. Dedication

DESIRABLE QUALITIES OF SECURITY SUPERVISOR


1. Physical and nervous energy
2. Sense of purpose and direction
3. Enthusiasm
4. Friendliness and affection
5. Integrity
6. Decisiveness
7. Technical mastery
8. Intelligence
9. Teaching skills
10. Faith

LICENSES IN THE SECURITY PROFESSION


a. License to Operate- before a Private Security Agency (PSA) ca operate, it has to
secure a License to Operate (LTO) categorized s either Temporary or Regular. A
temporary license is issued by the PNP thru Civil Security Group Directorate after
the applicant / licensee should have complied with all the requirements while it
has less than two hundreds guards. A regular licensee to operate is issued to the
PSA once it is qualified of having two hundred (200) or more license security
guard in its employ duty posted. Regular license is renewable
b. Security Guard License- before a security guard can practice this profession, he
shall possess valid security license. The use of expired license is not allowed. In
case of doubt, licenses may be verified at the PNP SAGSD whether valid or fake.
c. Firearms License- all firearms of the security agency should be covered with
firearms license issued by the PNP through it Firearms Explosive Division under
the Civil Security Group. Renewable every two years. No duplication of two or
more firearms with the same make and serial number shall be covered by one
license.

FIREARMS AND WEAPONS AUTHORIZED FOR USED OF THE SECURITY GUARD


WHILE ON DUTY

70 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

1. Handguns / Low-powered (cal.22 and cal.38) not exceeding one PA for every two
guards employed.
2. Shotguns(not bigger than 12 gauge)
3. High-powered- when the agency is operating in areas where there upsu9rge of
lawlessness and criminality as determined by the chief PNP.

GUARDS UNIFORMS, EQUIPMMENT AND PARAPHERNALIA

Set of Uniforms for Security Color of Uniforms


Personnel
Headgear- perishing cap for men and 2  Private Security Agency- Navy Blue
ply cap for women (upper and lower)
Service Bush Jacket – intended for  Company Security Forces- Light blue /
directorial and Staff officers light gray for upper and navy blue
Service Shirt for lower
Service trouser  Government Security Forces- white
Service Belt for upper and navy blue for lower
Footwear

Ornaments and Patches Equipment and Paraphernalia


National Badge  Leather pistol belt with regulation
 Cap Device buckle
 Regulation Buckle  Holster, black leather for pistol
 Collar Device  Night stick with horizontal handle
 Name cloth  Handheld radio
 Agency/Unit name cloth  Pocket notebook and ball pen
 Arrival of super sophisticated
devices in security alarm systems.

71 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

CHAPTER NINE
THE PRIVATE SECURITY AGENCY LAW AND ITS
IMPLEMENTING RULES AND REGULATION

LESSON 1
REPUBLIC ACT No. 5487
AN ACT TO REGULATE THE ORGANIZATION AND
OPERATION OF PRIVATE DETECTIVE, WATCHMEN
OR SECURITY GUARDS AGENCIES.
(Rep. Act No. 5487, as amended by Presidential
Decree No. 11.)
Section 1. Short Title of Act. This Act shall be known as "The Private Security Agency
Law."

Section 2. Scope of this Act. The organization, operation, business and activities of
private detectives, watchmen or security guards agencies shall be governed by the
provisions of this Act.

Section 3. Definition of Terms.


(a) Person. As used in this Act, person shall include not only natural persons but also
juridical persons such as corporation, partnership, company or association duly
registered with the Securities and Exchange Commission and/or the Bureau of
Commerce.
(b) Private Detective Agency. A private detective agency is any person, who, for hire
or reward or on commission, conducts or carries on or holds himself or itself out as
conducting or carrying on a detective agency, or detective service.
(c) Private Detective. A private detective is any person who is not a member of a
regular police agency of the Armed Forces of the Philippines who does detective
work for hire, reward, or commission. (

72 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

d) Watchman or Security Guard, Watchman or Security Guard Agency. Any person


who offers or renders personal service to watch or secure either residential or
business establishment, or both, or any building, compound, or area including but
not limited to logging concessions, agricultural, mining or pasture lands for hire or
compensation, or as an employee thereof shall be known as watchman or security
guard; and any person, association, partnership, or corporation, who recruits,
trains, muster, furnishes, solicits individuals or business firms, private or
government-owned or controlled corporations to engage his service or those of its
watchmen, shall be known as Watchman of Security Guard Agency. (As amended
by Pres. Decree No. 11, October 3, 1972.)

Section 4. Who May Organize a Security or Watchman Agency? Any Filipino citizen or a
corporation, partnership, or association, with a minimum capital of five thousand pesos,
one hundred per cent of which is owned and controlled by Filipino citizens may organize
a security or watchman agency: Provided, That no person shall organize or have an
interest in, more than one such agency except those which are already existing at the
promulgation of this Decree: Provided, further, That the operator or manager of said
agency must be at least 25 years of age, a college graduate and/or a commissioned
officer in the inactive service of the Armed Forces of the Philippines; of good moral
character; having no previous record of any conviction of any crime or offense involving
moral turpitude and not suffering from any of the following disqualifications:
(1) Having been dishonorably discharged or separated from the Armed Forces of
the Philippines;
(2) Being a mental incompetent;
(3) Being addicted to the use of narcotic drug or drugs; and
(4) Being a habitual drunkard.1awphil.net
For purposes of this Act, elective or appointive government employees who may
be called upon on account of the functions of their respective offices in the
implementation and enforcement of the provisions of this Act and any person related to
such government employees by affinity or consanguinity in the third civil degree shall
not hold any interest, directly or indirectly in any security guard or watchman agency.
(As amended by Pres. Decree No. 11.)

Section 5. Qualifications Required.


No person shall be employed as security guard or watchman or private detective
unless he is:
1. Filipino citizen
2. High school graduate
3. Physically and mentally fit
4. Not less than 21 nor more than 50 years old
5. At least 5'4" in height
6. Not suffering from any disqualification under RA 5487
 Veterans shall be given priority in employment as security guard or private
detective.
 Person convicted of any crime involving moral turpitude shall not be employed as
security guard or private detective.
 Private detective, detective agency, security guard, security agency must first
obtain license from the PNP.
 Employees employed solely for clerical or manual work need not be licensed.
 The license shall be displayed at all times in a conspicuous and suitable place in
the agency office.
 The PNP shall exercise general supervision over the operation of all private
detective and security guard agencies.
 The City/Municipal Mayors has the power as director of the City/Municipal civil
defense to deputize private detective and security guards to help maintain peace
and order or prevent or arrest law violators in case of emergency or in times of
disaster or calamity. They shall take orders from the Chief of Police for the
duration of the fire, inundation, earthquakes, riots or other emergency.
73 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

 A security guard or security agency is entitled to possess firearms.


 Firearm must not be higher than .45 calibers.
 Agency is entitled to possess firearm not exceeding one firearm for every security
guard in its employ.
 Security guard is entitled to possess not more than one riot gun or shotgun.
 Firearms shall be carried by the security guard only during his tour of duty in
proper uniform within the compound of the establishment except when he escorts
big amount of cash or valuables in or out of said compound.
 The Chief PNP shall prescribe the uniform, ornaments, equipment and
paraphernalia to be worn by the security guards.
 Uniforms must be different from the PNP/AFP.
 Salaries of security guard - not lower than the minimum wage prescribe by law.

NOTA BENE:
(a) Foreigners who are already employed as watchmen or security guards prior to the
approval of this Act shall not be subject to the above-mentioned requirements.
(b) Veterans shall be given priority in employment as security guard, watchman or
private detective.
(c) Person convicted of any crime involving moral turpitude shall not be employed as
security guard, watchman or private detective. (Section 5)

Qualification of an Operator or Manager of a Security Agency:


1. At least 25 years of age
2. College graduate and/or commissioned officer in the inactive service of the AFP
3. Good moral character
4. No previous record of any conviction of any crime/offense involving moral
turpitude
5. Not suffering from any of the following disqualifications:
6. dishonorably discharged or separate from the AFP
7. mentally incompetent
8. addicted to the use of narcotic drugs
9. habitual drunkard

An elective or appointive government employees who may be called upon on account


of the function of their respective offices in the implementation and enforcement of the
provision of RA 5487 and person related to such government employees by affinity or
consanguinity in the third civil degree shall not hold any interest, directly or indirectly in
any security guard agency.

Section 6. License Necessary. No person shall engage in the business of, or act either as
a private detective, or detective agency; and either engage in the occupation, calling or
employment of watchman or in the business of watchman's agency without first having
obtained the necessary permit from the Chief, Philippine Constabulary which permit as
approved is prerequisite in obtaining a license or license certificate: Provided, That all
existing private detective or watchman or security guard agencies shall have a period of
one (1) year from the approval of this Act to secure the said license: Provided, further,
That existing agencies, and any new agency which may hereafter apply for a license,
certify under oath that their private detectives, watchmen or security guards, have
received the appropriate training from either the Philippine Constabulary, the National
Bureau of Investigation, any local police department, or any other public institution duly
recognized by the government to conduct police training.

Section 7. Application for License. The application shall be made in writing and shall be
filed with the Chief, Philippine Constabulary. It shall contain the full name of the
applicant, his age, civil status, his residence, and location of business. If the applicant is a
corporation, association or partnership, a copy of the certificate of registration with the
Securities and Exchange Commission together with its by-laws and articles of
incorporation, with the Bureau of Commerce.
74 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Section 8. Fees to be Paid and Bonds. When all requisites for the issuance of the license
have been complied with, the Chief of the Philippine Constabulary or his duly authorized
representative shall issue a permit for the issuance of such license and register the same
in his office, upon payment by the applicant of the fee in accordance with the following
schedule:
(d) the sum of one hundred pesos per annum as national license;
(e) the sum of fifty pesos per annum as municipal license fee in any city where it may
operate, the said fee to be payable to the city treasurer concerned;
(f) the sum of twenty-five pesos per annum as municipal license fee for any
municipality where it may operate, the said fee to be payable to the municipal
treasurer concerned;
(g) the private Detective and Watchman Agency shall in addition to the above pay a
fixed Internal Revenue Tax of one hundred pesos per annum in lieu of percentage
taxes;
(h) the individual private detective and/or watchman shall pay for Mayor's Permit,
Health and/or Sanitary fee an amount not exceeding three pesos per annum and
the agency shall pay the sum not exceeding ten pesos for the Mayor's Permit and
Health and/or Sanitary fees; and
(i) the Chief of the Philippine Constabulary or his duly authorized representative shall
issue an appointment over his signature and affix the seal of his office, to each
license and for each such appointment, the sum of one peso shall be paid.

The application shall further be accompanied by a bond issued by any competent or


reputable surety or fidelity or insurance company duly accredited by the office of the
Insurance Commissioner in the sum of not less than five thousand pesos nor more than
ten thousand pesos in the discretion of the Chief, Philippine Constabulary, which bond
shall answer for any valid and legal claim against the agency by its clients or employees:
Provided, That licenses issued in the province of an authorized representative of the
Chief of Constabulary is subject to review by the Chief of Constabulary.
Any provision of this or other law to the contrary notwithstanding, the Chief of
Constabulary may, at any time suspend or cancel the licenses of private watchman or
security guard agency found violating any of the provisions of this Act or of the rules and
regulations promulgated by the Chief of Constabulary pursuant thereto. (This paragraph
was inserted by Sec. 3, Pres. Decree No. 11.)

Other provisions of Pres. Decree No. 11


Any person who commit any act in violation of Republic Act No. 5487 and of this
Decree, and the implementing rules and regulations already promulgated which are not
in conflict herewith, and those to be promulgated by the Chief of Constabulary pursuant
hereto, shall, on conviction thereof, suffer imprisonment of from ten to fifteen years and
a fine of not less than ten thousand pesos nor more than fifteen thousand pesos as a
military court/tribunal or commission may direct.
The Chief of Constabulary shall promulgate the necessary rules and regulations to carry
out the provisions of this Decree.

Section 9. Employees Need Not be Licensed. Every person operating, managing,


directing or conducting a licensed private detective or watchmen agency shall also be
considered licensed private detective, or watchman and no person shall be employed or
used in a private detective work unless he be a licensed private detective or watchman:
Provided, That nothing in this section shall be construed as requiring detective license for
persons employed solely for clerical or manual work.

Section 10. Display of License. The license shall be displayed at all times in a
conspicuous and suitable place in the agency office or headquarters of the agency and
shall be exhibited at the request of any person whose jurisdiction is in relation with the
business of the agency or the employees thereof, or of the Chief of the Philippine
Constabulary or his duly authorized representative or any peace officer.
75 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Section 11. Supervision of the Philippine Constabulary. Upon approval of this Act, the
Philippine Constabulary shall exercise general supervision over the operation of all
private detective and watchman or security guard agencies.

Section 12. Powers of City or Municipal Mayors in Cases of Emergency. In case of


emergency or in times of disaster or calamities where the services of such agencies
arise, the City or Municipal Mayor, as director of Civil Defense, may muster or incorporate
the services of the agency nearest the area where such emergency, disaster or calamity
arises and its duly licensed personnel to help maintain peace and order; and/or the
prevention or apprehension of law violators and in the preservation of life and property.
Deputized private detectives, watchmen or security guards shall take direct orders from
the Chief of Police for the duration of the fire, inundation, earthquakes, riots or other
emergencies.

Section 13. Issuance of Firearms. A watchman or security agency shall be entitled to


posses firearms after having satisfactorily passed the requirements prescribed by the
Chief, Philippine Constabulary pertinent to the possession of firearm of any caliber not
higher than 45 caliber in a number not exceeding one firearm for every two watchmen or
security guards in its employ: Provided, however, That a watchman or security agent
shall be entitled to possess not more than one riot gun or shotgun in order to provide
adequate security when circumstances so demand: Provided, further, That all the
firearms mentioned herein shall be carried by the watchman or security guard only
during his tour of duty in proper uniform within the compound of the establishment
except when he escorts big amounts of cash or valuables in and out of said compound.

Section 14. Uniform. The uniform of watchman or security guard as well as those
organized, maintained or under the employment of the government or any government-
owned and/or controlled corporations, agencies or entities, shall be different from the
uniform worn and prescribed for members of the Armed Forces of the Philippines, City
and Municipal Police Force. The Chief, Philippine Constabulary, through his duly
authorized representative shall prescribed the uniform or ornaments, equipment and
paraphernalia to be worn by the security guards and watchmen throughout the
Philippines.

Section 15. Compensation of Watchmen or Security Guards. Watchmen or security


guards shall receive a salary not lower than that prescribed in the Minimum Wage Law.

Section 16. Limitations and Prohibitions.


2. On Membership:
(a) No agency operating in the City of Manila and suburbs may employ more than
1,000 watchmen or security guards;
(b) No agency operating in other cities and first class municipalities may employ more
than 500 watchmen or security guards;
(c) No agency operating in municipalities other than first class may employ more than
200 watchmen or security guards.
3. On Organization:
(a) No person, corporation, partnership or association may organize more than one
agency in any one city or municipality.
4. On Service:
(a) No agency shall offer, render or accept its services to gambling dens or other
illegal enterprises.
(b) The extent of the security service being provided by any security agency shall not
go beyond the whole compound or property of the person or establishment
requesting the security service except when they escort big amount of cash.

Section 17. Rules and Regulations by Chief, Philippine Constabulary. The Chief of the
Philippine Constabulary, in consultation with the Philippine Association of Detective and
76 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Protective Agency Operators, Incorporated and subject to the provisions of existing laws,
is hereby authorized to issue the rules and regulations necessary to carry out the
purpose of this Act.
Who can Issue rules and regulations to carry out the purpose of RA 5487? The
chief PNP, in consultation with the Philippines Association of Detective and Protective
Agency Operators.

Section 18. Penal Provisions. Any violation of this Act or the rule or regulation issued
hereunder shall be punished by suspension, or fine not exceeding P200.00 or
cancellation of his or its licenses to operate, conduct, direct or manage a private
detective, watchman or security guard agency and all its members in the discretion of
the court together with the forfeiture of its bond filed with the Philippine Constabulary.
If the violation is committed by those persons mentioned under paragraph two, section
four of this Act the penalty shall be imprisonment ranging from one to four years and fine
ranging from one to four thousand pesos in the discretion of the court.

What are the penal provisions for violation of RA5487 or its implementing
rules?
1. Suspension, fine or cancellation of license to operate with the forfeiture f bond
filed with the Chief PNP.
2. Imprisonment ranging from 1 to 4 years and fine, in the discretion of the courts
vehicles.

For visitors, the following systems are used:


a. Escort
b. Driver pool - the most secure but the most expensive. In this system, car is
driven by qualified driver employed by the installation from the entrance to its
destination and after the conclusion of the business of the visitor car is driven
back to the installations entrance.
c. Time travel - used in less sensitive installations
d. Grid system - a very complicated system.The installation is divided into grid
ad squares like a map. Each square is given a no. or letter designation. The
visitor is then given a map and shown the route to take to his destination
and should not deviate from the prescribed route, otherwise he could be
stopped and questioned by the guards.
e. Search of vehicles - sign should be put at the entrance to the installation that
any vehicle entering is subject to search anytime.

Section 19. Repealing Clause. All laws, rules, resolutions, municipal ordinances,
regulations and administrative orders contrary or inconsistent with the provisions hereof
are hereby repealed.

Section 20. Effectivity. This Act shall take effect upon its approval.

77 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

LESSON 2
THE 2003 REVISED RULES AND
REGULATIONS IMPLEMENTING REPUBLIC ACT
5487
RULE I
DECLARATION OF POLICY

SECTION 1. Scope. The organization, operation, business and activities of private watchman/security
or detective agencies, security training institutions/systems as well as private security and training
personnel shall be governed by these Rules and
Regulations implementing Republic Act 5487, as amended.

SECTION 2. License Necessary.


a. No person shall engage in the business of or act as a private detective agency or engage in
the occupation, calling or employment of security personnel or in the business of private
security/training agency without first having obtained the permit from the Chief of the
Philippine National Police which permit as approved is prerequisite in obtaining a license
certificate.
b. License is likewise necessary for any person operating, managing, directing or conducting a
licensed private security/detective/training agency. Any person having any participation in the
management or operation thereof except those employed solely for clerical or manual work,
shall also secure a license.

SECTION 3. Training Required. All applicants for license certificate shall have received the
appropriate training from any public or private training institution/system duly recognized by the
government to conduct private security or police training.

SECTION 4. Prohibitions. No License certificate shall be granted to any applicant for license to
operate or license to exercise security profession with the following disqualifications:
a. having previous record of any conviction of any crime
b. having previous record of any conviction of any offense involving moral turpitude
c. having been dishonorably discharged or separated from employment or service
d. being a mental incompetent
e. being a user/addicted to the use of prohibited drugs or narcotics
f. being a habitual drunkard
g. dummy of a foreigner

RULE II
PENAL PROVISION

SECTION 1. Without prejudice to the imposition of criminal sanctions, any violation of Republic Act
5487, as amended or its rule or regulation, by license grantees likewise pursuant thereof, shall be
punished by suspension, or fine, or cancellation of his or its license to operate, conduct, direct or
manage a private detective, watchman or security guard agency and all its members, or penalized
pursuant to provisions herein under, and/or with the forfeiture of its bond filed with the Philippine
National Police, at the discretion of the Chief. PNP.

SECTION 2.
f. Any person not covered by Section 1, Rule II above who commits any act in violation of
Republic Act 5487 as amended and its implementing rules and regulations shall, on
conviction thereof, suffer imprisonment of from ten to fifteen years, and a fine of not less
than ten thousand pesos nor more than fifteen thousand pesos as the Court may direct.
g. If the violation is committed by those persons mentioned in Section 3b, Rule IV herein
under, the penalty shall be imprisonment ranging from one to four years and a fine
ranging from one to four thousand pesos at the discretion of the Court.
78 Industrial Security Management Instructional Material
ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

SECTION 3. Expired License. For purposes of enforcing sanctions, any private security, watchman or
company guard force agency or private security or training personnel upon expiration of their
respective license to operate or license to exercise security profession are considered as not
possessing license and shall be held criminally and administratively liable.

RULE III
DEFINITION OF TERMS
SECTION 1. Definition – For purposes of and when used in these rules and regulations, the following
terms shall be construed in the sense indicated herein unless the context of a particular section
clearly indicates that a different sense is intended:

a. Person – shall include not only natural but also juridical persons such as single
proprietorships, partnerships, corporations, companies or associations, duly organized
and registered with the Securities and Exchange Commission and/or the Department
of Trade and Industry.
b. Private Security Services – shall include the act of providing or rendering services to
watch an establishment whether public or private, building, compound/area or
property, to conduct access control/denial in any form whether physically, manually or
scientifically by electronic monitoring systems, for the purpose of securing such
area/property and at the same time ensuring safety and protection of persons within
such areas, to maintain peace and order within such areas, to conduct private security
training, and/or to conduct investigation. It shall also include the act of contracting,
recruiting, training, furnishing or posting any security guard, to do its functions or solicit
individuals, businesses, firms, or private, public or government-owned or controlled
corporations to engage his/its service or those of his/its security guards, for hire,
commission or compensation thru subscription or as a consultant/trainer to any private
or public corporation.
c. Private Detective Services – shall include among others the act of providing personal
security protection, inquiry and information gathering, preemployment verification and
individual background profiling, providing assistance in civil liability and personal injury
cases, insurance claims and fraud, child custody and protection cases, for the purpose
of assisting in gathering information leading to determination and/or prevention of
criminal acts and/or resolution of legal, financial and personal problems.
d. Private Security Industry – shall cover those in the legitimate business of providing
private security and detective services.
e. Private Security Guard (SG) – sometimes called private security guard or watchman
shall include any person who offers or renders personal service to watch or secure
either a residence, business establishment, or buildings, compounds, areas, or
property, inspects/monitors bodily checks/searches individuals and/or baggage and
other forms of security inspection, physically/ manually or scientifically electronic,
including but not limited to, logging concessions and agricultural, mining or pasture
lands, transportation, for hire or compensation , or as an employee thereof, including
any employee of the national or local governments or agencies or instrumentality’s
thereof and or government owned or controlled firm or corporations who is employed
to watch or secure government buildings, compounds, premises and other properties,
other than members of the Armed Forces of the Philippines, guards of the Bureau of
Jail management and Penology, Municipal or City jail guards, and members of the
Philippine National Police or of any other law enforcement agency of the Government.
f. Private Detective (PD) – shall mean any person who does detective work for hire,
reward or commission, other than members of the Armed Forces of the Philippines,
guards of the Bureau of Jail Management and Penology, municipal or city jail guards,
and members of the Philippine National Police or of any other law enforcement agency
of the government.
g. Private Security Personnel – shall be natural persons which include private security
guards, private detectives, security consultants, security officers and others that may
be classified later, rendering/performing security and/or detective services as
employed by private security agencies and/or private firms.

79 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

h. Government Security Personnel – shall be natural persons which include government


security guards, detectives, security consultants, security officers and others that may
be classified later, except those of the Armed Forces of the Philippines, Philippine
National Police, Bureau of Jail Management and Penology, Municipal or City Jail
guards rendering/performing security and/or detective services as employed by
government entities.
i. Private Security Agency (PSA) – shall mean any person association, partnership, firm
or private corporation, who contracts, recruits, trains, furnishes or posts any security
guard, to perform its functions or solicit individuals, businesses, firms, or private, public
or government-owned or controlled corporations to engage his/its service or those of
his/its security guards, for hire, commission or compensation thru subscription or as a
consultant/trainer to any private or public corporation whose business or transactions
involve national security or interest like the operation and/or management of domestic
or ocean vessels, airplanes, helicopters, seaports, airports heliports, landing strips
etc., or as consultant on any security related matter, or to provide highly specialized
security, detective and investigation services like gangway security, catering security,
passenger profiling, baggage examination, providing security on board vessels or
aircraft, or other security needs that PNP SAGSD may approve.
j. Private Detective Agency (PDA) – shall mean any person association, partnership,
firm or private corporation, who contracts, recruits, trains, furnishes or posts any
private detective, to perform its functions or solicit individuals, businesses, firms, or
private, public or government-owned or controlled corporations to engage his/its
service or those of his/its detectives, for hire, commission or compensation thru
subscription or as a consultant/trainer to any private or public corporation or as
consultant on any detective related matter, or to provide highly specialized detective
and investigation services, or other detective needs that SAGSD-CSG may approve.
k. License to Exercise Profession – shall mean any document issued by the Chief,
Philippine National Police or his duly authorized representative recognizing a person to
be qualified to perform his duties as private security or training personnel.
l. License to Operate (LTO) – is a License Certificate document, issued by the Chief,
Philippine National Police or his duly authorized representative, authorizing a person
to engage in employing security guard or detective, or a juridical person to establish,
engage, direct, manage or operate an individual or a private detective agency or
private security agency/company security force after payment of the prescribed dues
or fees as provided in these Rules and Regulations.
m. Company Guard Force (CGF) – a security force maintained and operated by any
private company/corporation utilizing any of its employees to watch, secure or guard
its business establishment premises, compound or properties.
n. Government Guard Unit (GGU) – a security unit maintained and operated by any
government entity other than military or police, which is established and maintained for
the purpose of securing the office or compound and/or extension of such government
entity.
o. PNP as used herein shall mean the Philippine National Police, which was organized
pursuant to the provision of RA 6975 otherwise known as the National Police Act of
1991.
p. SAGSD as used herein shall refer to the current PNP Civil Security Group Security
Agency and Guard Supervision Division or any other PNP Office that may be
designated later as the primary office for supervision of the implementation of these
rules and regulations.
q. PADPAO refers to the Philippines Association of Detective and Protective Agency
Operators, Inc., which is an association of all licensed security agencies and company
security forces.
r. Duty Detail Order is a written order/schedule issued by a superior officer usually the
private security agency/branch manager or operations officer assigning the
performance of private security/detective services duties.

RULE IV
LICENSE TO OPERATE

80 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

PART 1
SECTION 1. Who may organize and maintain a Private Security Agency and Private Detective
Agency. - Any Filipino citizen or corporation, association, partnership, one hundred percent (100%) of
which is owned and controlled by Filipino citizens, may organize and maintain a Private Security
Agency or Private Detective Agency.

SECTION 2. Basic requirement of an operator or manager of agency –


a. The operator or manager of an agency including, managers of branch offices, must be:
1. Filipino citizen;
2. Not be less than twenty five (25) years of age;
3. College graduate and/or a commissioned officer in the inactive service or retired from
the Armed Forces of the Philippines or the Philippine National police;
4. Has taken a course/seminar on industrial Security Management and/or must have
adequate training or experience in security business; and,
5. Good moral character

b. New applicants for license to operate shall be required to obtain a minimum capitalization
of one million pesos (P1, 000,000.00) with a minimum bank deposit of five hundred
thousand (P500, 000.00) pesos in order to start its business operation.

SECTION 3. Limitations, Disqualifications and Prohibitions.


a. No person shall organize or have an interest in more than one agency.
b. Elective or appointive government employees who may be called upon on account of the
functions of their respective offices in the implementation and enforcement of the
provisions of Republic Act 5487 as amended and its implementing rules and regulations,
and any person related to such government employee by affinity or consanguinity in the
third civil degree, shall not hold an interest, directly or indirectly, in any security or
watchman agency.
c. No agency shall offer, render or accept services in gambling dens or other illegal business
establishments or enterprises.
d. The extent of the security guard service being furnished by the security agency shall not
go beyond the compound and/or property of the person or establishment contracting the
security service except when the security guards is escorting big amount of money or
valuables.
e. Main/branch offices. - All agencies shall maintain a main office in their registered
addresses. Branch offices may be established and maintained in other provinces/ cities
where the security agency has deployed security guards.
f. Authority to operate outside principal offices. The following measures are promulgated to
promote the healthy growth of the private security industry in general, as well as to
minimize proliferation of marginal agencies in particular.
1. No new or moribund but previously licensed private security agency shall be granted
license to operate unless its business viability is supported by evidence of assured
clientele, adequate capitalization and the like.
2. Private Security Agency operating at regions outside its main office shall be required
to register with the nearest Police Provincial Office and shall submit an authenticated
machine copy of the following documents:
a) License to Operate
b) License of the FA’s to be issued
c) List of the officers and security guards
d) Appointment Order of Branch/Detachment Manager (if any)
g. All applicants for license to operate shall, in addition to the requirements imposed pursuant
to RA 5487 as amended and these rules and regulations, be required to attend a private
security agency/company guard force operators’ and management seminar/workshop.

h. Prohibition on “KABIT SYSTEM” operators.

81 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

1. No licensed security agency shall operate, promote and enter into an agreement of
“merger“ (kabit system) with any person or a group of persons for the purpose of
organizing a branch unit or subsidiary under separate control and ownership. Merger
of security and detective agencies shall not be recognized without prior approval from
the Securities and Exchange Commission with respect to their Articles of Incorporation
and the Department of Trade and Industry, with regards their business name.
2. Any of the following circumstances or a combination thereof shall be considered
prima-facie evidence of the existence of “Kabit System”.
a) Maintaining a separate branch, unit or subsidiary office aside from the main office
of the agency situated within the same locality;
b) Receiving direct payments from the agency’s clientele and issuing officials receipt
of their own distinct from that issued by the agency concerned;
c) Remitting directly Social Security System premiums, Medicare contributions and
other premium for other policy insurance benefits by the aforementioned branch,
unit or subsidiary office;
d) Existence of an agreement between the licensee and a branch manager thereof,
whereby the latter obligates himself to pay a certain percentage of his income to
the former on the condition that the control and supervision of the guards posted
by said branch shall course on the manager thereof and that the licensee shall be
exempt from liabilities/ obligations attendant to the operation of said branch.
e) Keeping/maintaining separate payrolls for the branch employees signed and/or
approved by the branch manager only;
f) Absence of record of monthly income remittances to the main office when said
branch is authorized to make collections from the clients of the licensee; and
g) All other similar acts tending to show separate and distinct relationship/
personality/ ownership/ management.

SECTION 4. Organizational structure of private security agencies/company security services/


government security units.
a. Private security agencies shall conform with the organizational structure, personnel,
equipment, training and clothing as provided for hereinafter.
b. Company security forces shall be organized to conform substantially with the organizational
structure prescribed for private security agencies.
c. Government Guard Unit shall be organized to conform with the organizational structure of the
said government firm but not contrary to the organizational structure as prescribed for
government security units.

SECTION 5. On Membership.
a. No regular license shall be granted to any private security agency unless it has a minimum of
two hundred (200) licensed private security personnel under its employ.
b. No regular license shall be granted to any company guard force or private detective agency
unless it has a minimum of thirty (30) licensed private security personnel under its employ.
c. The maximum number of private security personnel that a PSA/CGF/PDA may employ shall be
one thousand (1000).

PART 2

SECTION 6. Application for License to Operate (LTO).


a. The application shall be made in writing by the owner (for single proprietorships) or authorized
person duly designated by the corporation or partnership (through a board resolution or joint
affidavit, respectively) and shall be filed with the Chief of the Philippine National Police
(CPNP) through the PNP Security Agency and Guard Supervision Division, Civil security
Group (SAGSD-CSG). Using license application form PNPSF1, the application shall contain
the full name of the applicant, his age, civil status, his residence and location of business.
b. Applications of corporations, associations, partnerships shall furthermore include a copy of
the certificate of registration together with its by-laws and articles of incorporation.

82 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

c. All applications shall be accompanied by a bond issued by any competent or reputable surety
or fidelity or insurance company duly accredited by the Office of the Insurance Commissioner,
which bond shall answer for any valid and legal claim against the agency by its clients or
employees.

SECTION 7. License to Operate (LTO). License to Operate (LTO) shall be issued corresponding to
the purpose of the organized Private Security Agency:
a. Private Security/Detective Agency LTO. License certificate issued to persons, corporations,
associations, partnerships whose primary purpose is to provide/offer commercial private
security and/or detective services for hire, commission or compensation.
b. Company Guard Force LTO. License certificate issued to persons, corporations,
associations, partnerships not doing business nor organized purposely or principally as a
private security guard or detective agency who/which is utilizing for its security purpose any
of his/its employees to render private security or detective services.
c. Government Guard Unit Certificate of Registration (CR). License certificate issued to national
or local government or any agency or instrumentality thereof, or of government-owned or
controlled corporation not doing business nor organized purposely or principally as a private
security guard or detective agency who/which is utilizing for its purpose any of his/its
employees to render private security or detective services.

SECTION 8. Status and Validity of License to Operate. The status of license certificate in Section 7
above shall be issued in conformity with the following:
a. Regular LTO – issued, after complying with licensing requirements, to private security
agencies having obtained and maintained in its employ at least two hundred
a. (200) security personnel, and to company guard forces and private detective agencies
having obtained and maintained in its employ at least thirty (30) security personnel and
private detectives respectively. Such license may be renewed following conformity with
renewal requirements prescribed in a Standard Operating Procedure (SOP).
b. Temporary LTO – initial and conditional issuance to new private security agencies and to
PSAs holding regular LTO not able to maintain the minimum number of security personnel or
conform to standards, for them to be able to attain the 200 minimum number of security
personnel or comply with licensing standards, prior to issuance/re-issuance of regular LTO.
Such issuance shall not be renewable nor be extendible.
c. Unless sooner cancelled or revoked and provisions hereof modified, all licenses to operate
shall have a validity of two (2) years. Temporary LTOs upon expiration are automatically
cancelled.
d. The expiry date of Regular Licenses to Operate shall be on the last day of the month of the
second year corresponding to the last number before the year series number of the assigned
number/LTO number of the License. (i.e. hereto in bold numbers PSA-00001-02 and PSA-
00050-03 representing expiry on January 31, 2004 and October 31, 2005 respectively). For
this purpose the appropriate transition period shall be provided after the effectivity of these
Rules and Regulations.

SECTION 9. LTO Processing.


a. All applications for Licenses to Operate filed shall be processed by SAGSDCSG for approval
and subsequent issuance of the appropriate LTO, and/or for disapproval.
b. When all requisites for the issuance of License to Operate have been complied with,
corresponding license certificate shall be issued upon payment by the applicant of applicable
fees and bond, prescribed/to be prescribed following existing administrative laws:
National License Fee
Security Personnel Registration Fee
Annual Internal Revenue tax
Local Government Business tax
Bond issued by any competent or reputable surety or fidelity or insurance company
duly accredited by the Insurance Commission in the sum of ten thousand pesos in the
discretion of the CPNP which bond shall answer for any valid and legal claim against
the agency by its clients or employees

83 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

c. Applications with lacking requirements shall not be accepted for processing.


d. All accepted applications for license to operate shall be processed for completeness of
documentary requirements and conformity to standards.

SECTION 10. Supporting Documentary Requirements


a. Supporting Documents accompanying applications for New License To Operate:
1. Sketch of Office Location
2. Application Form (SAGSD 02-94)
3. Registration Form DTI/SEC
4. Bio-Data/Information Sheet for Director/Partners
5. Indorsement from RD/ARDO (for provincial application only)
6. College Diploma or Retirement Order (AFP/PNP)
7. List of Prospect Clients
8. Project Feasibility Study
9. Letter Request for Authority to Purchase FA's From Authorized Gun Dealers/Store
10. Official Receipt National License Fee (P 2, 500 per year)
11. Registration Fee (P 50 per guard)
12. Surety Bond for the period of license
13. Bank Certificate (Minimum P 500, 000)
14. Certificate from RD/Provincial Director that there is a demand for security services or a
need to CSF
15. PADPAO Membership Fee or PADPAO Membership Certificate
16. Affidavit that the agency applying has a furnished office and PNP approved FA's vault.
17. Affidavit that PSA will have at least 200 guards posted within 2 years after date of
approval of Temp LTO
18. PNP Intelligence Clearance
19. NBI Clearance
20. Neuro-Psychiatric Clearance
21. Drug Test

b. Supporting Documents accompanying applications for Regular License To Operate:


1. Indorsement from RD, PNP PROs with Inspection Checklist
2. Sketch of Office Location
3. Application form (SAGSD 02-04)
4. Notarized Disposition of Guards, Clients & Fire Arms
5. List of Licensed FA's Noted/Certified By FED
6. Alphabetical Listing of Guards By Birth month
7. Official Receipt for National License Fee
8. Official Receipt for PNP Registration Fee
9. VAT Payments
10. Agency's /Company's FAs License Fee
11. Surety Bond for the period of license
12. PNP Intelligence Clearance
13. Neuro-Psychiatric Clearance
14. Drug Test
15. National SSS Clearance with R-5 & R-3
16. BIR Clearance
17. DOLE Clearance
18. Certificate of fm FED of No Unclaimed FA's Licenses
19. Certification of PADPAO Membership (PADPAO)
20. Certification of Seminar re-RA 5487 (PADPAO)
21. Mayor's Permit (Where main office is located)
22. License to Operate (Previous)
c. LTO processing, standards and documentary requirements shall be prescribed in a Standard
Operating Procedure (SOP) issued by the Director, CSG.

SECTION 11. Renewal of License to Operate.

84 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

a. Filing of Applications for Renewal and Late Filing. All applications for renewal of License to
Operate shall be filed at least sixty (60) days before expiry date of LTO subject of the renewal
application. Applications filed/accepted thereafter shall be penalized for late filing.
b. Failure to Conform to the Standards for Renewal. Renewal applicants/holders of regular
license not able to maintain the 200 minimum number of security personnel under its employ
or license renewal requirements at the time of filing of application, shall be reverted to
temporary status and issued temporary LTO. Within its duration the agency-applicant may
comply with the required minimum number of employed security personnel or license renewal
requirements prior to reissuance/ renewal of its regular LTO.
c. Failure to file for renewal. The Licenses to Operate of applications for renewal of regular
Licenses to Operate who fail to file applications sixty (60) days after the expiry date of LTO
subject of the renewal application, SHALL AUTOMATICALLY BE
a. CANCELLED.
d. In addition to other renewal requirements under provisions of these rules and regulations, no
application shall be approved unless a certification is issued by FEDCSG to the effect that all
licenses of firearms of the agency concerned are updated/renewed for at least one (1) year
forthcoming during the validity of the renewed LTO.

SECTION 12. Approval, Cancellation and Suspension of LTO. Unless revoked or modified by the
Chief, PNP, the authority to approve, cancel or suspend the license to operate shall be exercised by
the following:
a. Approval of New Regular LTO CPNP
b. Cancellation of Regular LTO CPNP
c. Re-instatement of Regular LTO CPNP
d. Suspension of Regular LTO CPNP
e. Renewal of Regular LTO DCSG
f. Approval of Temporary LTO DCSG
g. Reversion of Regular to Temporary LTO DCSG
h. Cancellation of Temporary LTO DCSG
i. Suspension of Temporary LTO DCSG

SECTION 13. Cancelled LTO. All cancellations shall be issued the corresponding Cease to Operate
(CTO) orders. Thereafter the concerned agency shall stop its operation and deposit its firearms with
the Firearms and Explosives Division (FED-CSG) or nearest Police Regional Office for safekeeping
until legal disposition thereof by the agency in accordance with existing firearms laws, rules or
regulations.

SECTION 14. Voluntary Cease to Operate. Anticipated cessation of operations voluntarily and
officially submitted by the agency shall be issued the corresponding CTO bearing the effectivity date
of such anticipated cessation. Thereafter the concerned agency shall stop its operation and deposit its
firearms (if any remains) with the Firearms and Explosives Division (FED-CSG) or nearest Police
Regional Office for safekeeping until legal disposition thereof by the agency in accordance with
existing firearms laws, rules or regulations.

PART 3

SECTION 15. Display of License. The LTO shall be displayed at all times in a conspicuous and
suitable place in the agency office or headquarters and shall be exhibited at the request of any person
whose jurisdiction is in relation with the business of the agency or the employees thereof.

SECTION 16. Security service contract. Private security agencies shall render security services to
their clients only after a service contract shall have been executed between them. Such contract shall
include among other things: the money consideration to be paid by the client to the agency; the
number of hours of security services per guard per day which the guard himself shall render to the
client and the salary each individual security guard shall receive from the agency.

85 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

SECTION 17. Tenure of Security Personnel. - The tenure of security personnel shall be co-terminus
with the service contract between the PSA and the client. Services of any security personnel shall be
terminated on the following grounds:
a. Expiration of contract;
b. Revocation of license to exercise profession;
c. Conviction of a crime or offense involving moral turpitude;
d. Loss of trust and confidence;
e. Physical and mental disability; and
f. Violation of the pertinent rules and regulations promulgated by the PNP.

SECTION 18. Payrolls. - Private security agencies shall prepare payrolls with the name of security
guards arranged alphabetically and numbered consecutively. These payrolls shall be personally
signed by the payees only after receipt of the amounts shown therein. Separate payrolls for distant
detachments/posts shall be prepared and similarly signed by the payees or his duly authorized
representative as the case maybe. Payrolls shall be filed with the main office within fifteen (15) days
after payday. The use of payroll form shall be in accordance with the standard format as prescribed by
law.

SECTION 19. Security Personnel-Employee Benefits. The employer Private


Security/Training/Detective Agency, Company Guard Force, Government Guard Unit shall be
responsible and held accountable for the compensation of the following benefits due their respective
security personnel as required by law:
a. salary and wage prescribed in the minimum wage law;
b. health, medical and insurance benefits;
c. separation and retirement pay and benefits;
d. Pag-ibig benefits
e. others as may be prescribed later

SECTION 20. Mandatory Insurance Coverage - It shall be the responsibility of private security
agency/company guard forces operators/ owners to ensure that all posted security personnel under
their employ shall be covered with adequate insurance. In case of death of any security personnel,
monetary benefits may be granted to his dependents/ beneficiaries by the PSA/CGFs concerned.

RULE V
LICENSE TO EXERCISE PRIVATE SECURITY PROFESSION

SECTION 1. Who may apply for a License to Exercise Private Security Profession. Any Filipino citizen
may apply for License to Exercise Private Security Profession to engage in the occupation, calling or
employment either as a Private Security Guard, Private Security Officer, Private Detective and/or
Private Security Consultant, after complying with both academic/scholastic and skills/training
requirements subject to other requirements prescribed hereinunder provisions.

SECTION 2. Basic requirements of private security personnel -


a. Filipino citizen;
b. Not be less than eighteen (18) years of age.
c. Must have taken a private security course/seminar and/or must have adequate training or
experience in security business or rendering security/detective services;
d. Of good moral character and must not have been convicted of any crime or violation of these
rules and regulations carrying a penalty of prohibition to be licensed; and
e. Must be physically and mentally fit.

SECTION 3. Qualifications a Private Security Guard. No person shall be licensed as security guard
unless he possesses the following qualifications:
a. Filipino citizen;
b. High school graduate;
c. Physically and mentally fit;
d. Not less than eighteen (18) years of age nor more than fifty (50) years of age (for new
applicants and SGs in non-supervisory position); and

86 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

e. Has undergone a pre-licensing training course or its equivalent.

SECTION 4. Qualifications for Security Officer. - No person shall be licensed as


Security Officer unless he has the following qualifications:
a. Filipino citizen;
b. Holder of a Baccalaureate Degree;
c. Physically and mentally fit; and
d. Has graduated from a Security Officer Training Course or its equivalent.

SECTION 5. Qualifications of Security Consultants. - No person shall be licensed as a


Security Consultant unless he possesses the following qualifications:
a. Filipino citizen;
b. Physically and mentally fit;
c. Holder of a Masters degree in either Criminology, Public Administration, MNSA, Industrial
Security Administration, or Law;
d. Must have at least ten (10) years experience in the operation and management of security
business.

SECTION 6. Qualifications of a private detective.- No person shall be licensed as a private detective


unless possesses the following qualifications:
a. Filipino citizen;
b. Physical and mentally fit;
c. Holder of a baccalaureate degree preferably Bachelor of laws or Bachelor of
a. Science in Criminology;
d. Graduate of a Criminal Investigation Course offered by the Philippine National Police or the
National Bureau of Investigation or any police training school, or a detective training in any
authorized/recognized training center;
e. Advance ROTC/CMT graduate or its equivalent.

SECTION 7. Exemptions from Basic Pre-Licensing Training. -


a. Veterans and retired military/police personnel or those honorably discharged military/police
personnel possessing all the qualifications mentioned in the preceding Section shall be
exempted from pre-licensing training/seminar and academic/scholastic attainment which is a
requirement for the initial issuance of License to exercise private security profession but shall
not however be exempted from taking the refresher training courses or its equivalent.
b. Likewise, graduates of ROTC advance/CHDF (or its equivalent in the PNP) Training
graduates shall be exempted from the required Basic-licensing Training/Seminar.

SECTION 8. Processing SOP. License to exercise profession processing, standards and


documentary requirements shall be prescribed in a Standard Operating Procedure (SOP) issued by
the Director, CSG.

SECTION 9. Types of License.


a. Temporary License – initial and conditional issuance while awaiting issuance of regular
license identification cards or in the interim for purposes not covered by Rule V.
b. Regular License – generated Private Security Personnel License Card, duration or validity of
which shall be for two (2) years.

SECTION 10. Government Security Personnel – no person shall be licensed asGovernment Security
Personnel unless he possesses the qualifications as prescribed in Section 3, 4, 5 of this rule, provided
he submits an appointment order coming from the
Civil Service Commission.

SECTION 11. Processing.


a. All applications for Licenses to Exercise Profession filed shall be processed by SAGSD-CSG
for approval and subsequent issuance of the appropriate License to
a. Exercise Profession, and/or for disapproval.

87 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

b. When all requisites for the issuance of License to Exercise Profession have been complied
with, corresponding license certificate shall be issued upon payment by the applicant of
applicable fees.

SECTION 12. New Applicant – applicants from NCR may file their application for license to exercise
profession with the Personnel Licensing Section, SAGSD, Civil Security Group, Camp Crame,
Quezon City. Applicants from the provinces may file their applications with the Firearms, Explosives,
Security Agencies and Guards Section
(FESAGS), Regional Operation and Plans Division (ROPD) of the Police Regional Office concerned.
The requirements are as follows:
a. Application Form for Social Security ID (E-6 Rev 11-2000);
b. Application for License of Private Security Guard;
c. General Knowledge Examination Result (PASSED);
d. Training Certificate (Pre-Licensing Training Certificate);
e. Training Closing Report;
f. Neuro-Psychiatric Test Clearance;
g. Drug Test Result/Clearance;
h. Physical Fitness Certificate;
i. PNP Intelligence Clearance (DI);
j. NBI Clearance;
k. Court Clearance;
l. Police Clearance;
m. High School Diploma or Transcript of Record and College Diploma; and
n. Birth Certificate

SECTION 13. Renewal of License


a. Deadline for Filing and Late Filing. The deadline for filing of applications for renewal of
License to Exercise Profession shall be sixty (60) days prior to the month of the expiry date.
Applications filed/accepted thereafter shall be penalized for late filing.
b. Failure to file for renewal. The Licenses to Exercise Profession of those who fail to file
renewal applications SHALL AUTOMATICALLY BE CANCELLED upon expiry.
c. Renewal of license to exercise profession shall also be filed with SAGSD, CSG, Camp
Crame, Quezon City or through the Firearms, Explosives, Security Agencies and Guards
Section (FESAGS), Regional Operation and Plans Division (ROPD) of the Police Regional
Office concerned after the completion of the required retraining and requirements for renewal
of license. The requirements are as follows:
1. Application for Social Security ID (E-6 Rev 11-2000 Form);
2. Application for License of Private Security Guard (PNPSF-01 Revised 2000);
3. General Knowledge Examination Result (PASSED);
4. Proof of Training;
5. Neuro-Psychiatric Test Clearance;
6. Drug Test Result/Clearance;
7. PNP Intelligence Clearance (DI) or NBI Clearance
d. All licensed security personnel must undergo in-service re-training at least once in every two
(2) years preferably two months before his/her birth month. The certificate of in-service
training shall be a prerequisite among others, for the renewal of license to exercise
profession.

SECTION 14. Disposition of Applications for License. All license to exercise private security
profession shall be processed for the appropriate Approval, Disapproval, Cancellation or Suspension
by the Chief, SAGSD.

SECTION 15. Possession of License.


a. All licensed private security personnel while in the exercise of their profession shall have in
his body and possession his/her valid license to exercise private security profession together
with the corresponding proof of payment of license fee.
b. The License issued shall be the proof of authority of the grantee to engage or exercise private
security profession.

88 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

c. In no case shall the authority of the License be used in violation of laws.

RULE VI
PAYMENT OF FEES

SECTION 1. License Fees. – Consistent with laws existing during this formulation, the Chief of
Philippine National Police or his authorized representative, after receipt of the application for license
and after finding the applicant qualified under these rules and regulations, shall approve the
application upon payment of the annual fees in accordance with the following schedules:
a. For agency. –
1. The sum of two thousand five hundred pesos (P2, 500.00) as annual national license fee;
2. The sum of fifty pesos (P50.00) as payment for annual registration fee for each security
guard employed.
b. For individual. - The amount of one hundred fifty pesos (P150.00) per year for Security
Consultant, Security Officer and Private Detectives and the amount of one hundred (P100)
pesos per year for Security Guard as annual license fee.

SECTION 2. Exemptions. Employees of the national or local governments or the agencies or


instrumentalities thereof, as well as of government-owned or controlled corporations, who are
employed or utilized as licensed security personnel as herein defined, shall not pay the fees nor file
the prescribed bonds.

SECTION 3. Payment System. All payments of fees relative to the licensing of private
security/training/detective agencies, company guard forces, and private security/training personnel
shall be made by the respective applicant or his duly authorized representative following an approved
revenue and collection system in the PNP.

SECTION 4. Changes. Any adjustments, modifications and/or additions to the fees provided in section
1 above may be initiated through the SAGSD or CSG, and approved for adoption following current
laws on revenue and collection of fees.

RULE VII
USE OF FIREARMS

SECTION 1. Possession of Firearms by Private Security Agency /Private Detective Agency/


Company Security Force/ Government Security Unit. – Private Security Agency /Private Detective
Agency/ Company Security Force/ Government Security Unit shall be entitled to possess firearms
after satisfactorily complying with the requirements prescribed by the Chief, Philippine National Police
pertinent to the possession of firearms, provided that the number of firearms shall not exceed one (1)
firearm for every two (2) security guard in its employ. No private security agency/private detective
agency/company security force/government security unit shall be allowed to possess firearms in
excess of 500 units.

SECTION 2. Restriction to possess high-powered firearms. – A private detective agency/private


security agency/ company security services/ government security unit is not allowed to possess high
caliber firearms considered as military-type weapons such as M16, M14, cal .30 carbine, M1 Garand,
and other rifles and special weapons with bores bigger than cal .22, to include pistols and revolvers
with bores bigger than cal .38 such as cal .40, cal .41, cal .44, cal .45, cal .50, except cal .22
centerfire magnum and cal .357 and other pistols with bores smaller than cal .38 but with firing
characteristics of full automatic burst and three-round burst. However, when such entities are
operating in areas where there is an upsurge of lawlessness and criminality as determined by the
Chief, PNP, Police Regional Office Regional Director or their authorized representative, they may be
allowed to acquire, possess and use high-powered firearms under the following conditions:
a. The acquisition of the high-powered firearms shall be at the expense of the private security
agency/private detective agency/company security force/government security unit concerned;
b. The firearms should first be registered with the Firearms and Explosives Division before
issuance and shall not be used or transferred in places other than those specially authorized
by the Director, CSG;

89 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

c. The total number of high-powered firearms that an agency or security force/unit is authorized
to possess shall not exceed ten percent (10%) of the total number of security guards of
watchmen in its employ; and
d. The duly licensed security guards or watchmen who will use the firearm shall first be given
adequate training in the care and use thereof and will be under the supervision of qualified
officers and men of the Philippine National Police.

SECTION 3. Limitations in the carrying of firearms.


a. Unless specified and/or exempted pursuant to provisions of these rules and regulations
and/or firearms laws, no firearm shall be borne nor be in the possession of any private
security personnel except when in the actual performance of duty, in the prescribed
uniform, in the place and time so specified in the DDO.
b. The firearm issued to security personnel of private security agency/private detective
agency/company security services/government security unit shall be carried by the security
personnel only within the compound of the establishment where he is assigned to guard,
except when the security personnel is escorting big amount of money or valuables on
conduction duties outside its jurisdiction or area of operation, upon prior coordination with
the nearest PNP units/stations, or when in hot pursuit of criminal offenders.

SECTION 4. Duty Detail Order (DDO) - Private security agency/private detective agency / company
security services/ government guard unit detailing their security personnel on duty under the
circumstances mentioned in the preceding section or while escorting big amount of cash or valuable
outside its jurisdiction or area of operation, shall issue an appropriate duty detail order to the security
personnel concerned using SAGSD Form No. 12-94 under the following conditions:

a. DDOs for the purpose of transporting agency licensed firearms from agency vault/office to
post and back for posting, for routine rotation, replacement of firearms or for conduction
service duties, shall be issued for not more than a duration of twenty-four (24) hours;
b. DDOs for the purpose of post duties not requiring transport of firearms outside of the
physical compound or property of a client or client establishment/firm shall be issued for not
more than a thirty (30) day duration;
c. Transport of firearm other than those covered in paragraph a and b, Section 4, Rule VII
above, shall require the appropriate transport permit issued by the Firearms and Explosives
Division or Police Regional, Provincial or City Office nearest the place of origin;
d. The issuance of DDOs for private detective personal protection service duties shall be
prescribed in an SOP to be issued by NHPNP in consideration of Rule XII of these rules
and regulations; and
e. All DDOs shall indicate the following:
1. Name, address and telephone number of agency
2. Issue serial number and date of DDO
3. Complete name and designation of grantee
4. Purpose
5. Inclusive dates of detail
6. Firearms description and license number
7. Authorized uniform to be used
8. Other specific instructions/remarks
9. Signature and designation of issuing officer

SECTION 5. Justification for confiscation of firearms. No firearm issued to any security guard or
private detective while in the performance of his duties, shall be confiscated by any law enforcement
agency, except by uniformed member of the PNP when duly authorized by the proper authority and/or
under any of the following circumstances, wherein an appropriate receipt for the firearm shall be
issued:
a. When the firearm is about to be used in the commission of a crime;
b. When the firearm is actually being used in the commission of crime;
c. When the firearm has just been used in the commission of a crime;
d. When the firearm being carried by the security guard is unlicensed or a firearm not
authorized by law and regulation for his use;

90 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

e. When the confiscation of the firearm is directed by the order of the court;
f. When the firearm is used or carried outside the property, compound or establishment
serviced by the agency without proper authority; or
g. When a security guard does not possess any license to exercise his profession.

In all the above cases, the confiscating officer shall inform immediately the agency concerned.

SECTION 6. Disposition of confiscated firearms. Any law enforcement officer authorized by law
effecting the confiscation of firearm under any of the circumstances mentioned in the preceding
section shall inform the Chief, Philippine National Police thru the CSG within twenty-four (24) hours
after such confiscation. The firearm shall be turned over immediately to the nearest Philippine
National Police unit/station which shall be responsible for the conveyance of same to the FED, CSG,
except when charges have been filed against the suspect, in which case, the firearm shall be turned
over to the concerned court.

SECTION 7. Filing of application for firearms license. Application for licensing of firearms by any
private security agency, private detective agency, or company security force, shall be filed with the
Firearms and Explosives Division through the SAGSD and Police Regional Offices for other Regions
outside NCR in accordance with the usual procedure prescribed by the firearms laws and
implementing executive orders and regulations. In addition, the following shall be submitted:
a. License to Operate a private security agency, private detective agency or company security
force duly approved by the Chief, Philippine National Police;
b. Certification that such agency has provided a safety vault as prescribed by the Chief of the
Firearms and Explosives Division;
c. Required surety bond per firearm pursuant to Sec. 887 of the Revised Administrative
Code;
d. Sworn Statement of the manager or operator of the agency that its security personnel shall
be required by the management to undertake the following in case of impending or actual
strike:
1. To report to the Chief, Philippine National Police or to the nearest police agency such
impending strike;
2. To exercise necessary diligence in the collection and safekeeping of firearms of the
agency to include firearm safely vaults provided thereof to prevent the use of the
firearm thereon in the furtherance of the strike;
3. To insure that all firearms and ammunition in the possession of all striking security personnel of the
agency are immediately collected and secured in the safety vaults under control of the agency; and
4. To assume responsibility in the proper handling of firearms in order to prevent misuse of same or
that no non-members shall be allowed to hold said firearms issued or licensed in favor of the agency.

SECTION 8. Revocation of license. License to possess firearm may be revoked under any of the
following instances:
a. Failure to submit any issued firearm for verification as required.
b. Carrying of firearms by security personnel without appropriate Duty Detail Order (DDO).
c. When the firearm serial number has been duplicated on another firearm or using one firearms
license for more than one firearm other than those stipulated in the license.
d. Carrying of firearms outside of the place stated in the permit or in places prohibited under the
law; or
e. Conviction of the operator or manager of the agency of any crime.
f. When the firearm was reported lost.

SECTION 9. Illegal possession of firearms. No person employed as security guard or private detective
shall use unlicensed firearms in the performance of his duties, nor be allowed to use firearms with
duplicated serial numbers. Unless otherwise approved by the CPNP, only firearms licensed in the
name of the PSA/PDA/CGF/GGU concerned shall be used.

SECTION 10. Stocking of ammunition. Stocks of ammunition in the agency shall be authorized on a
limited and reasonable quantity that will suit the requirement and need of such agency and shall be
subjected to inspection from time to time by representatives of the Chief, Philippine National Police,

91 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

and unless otherwise provided for under existing laws, shall not exceed a basic load of fifty (50)
rounds of ammunition per unit of duly licensed firearms. Individual issue to each security guard shall
be limited to one half of such basic load or twenty five (25) rounds for every security guard.

SECTION 11. Instructional Firearms. Accredited Private Security Training Schools/Centers after
conformity with licensing requirements, may be licensed firearms for instructional, training or
classroom purposes, in a number and type as prescribed under existing firearms laws, rules or
regulations.

RULE VIII
UNIFORM, EQUIPMENT AND PARAPHERNALIA

PART 1
Uniform And Paraphernalia

SECTION 1. Uniform (male). The uniform of private security guard/either from the private security
agency/company security force/ government security unit shall consist of headgear, service shirt,
service trousers service belt and footwear as herein prescribed.
The uniform shall be made of fast navy blue thick fabric for the trouser for daily security
officers wear and for service shirts of field or perimeter guards while a choice of light blue and/or white
service shirts for internal guards for a private security agency; light gray for company security force
and white for government security unit.

a. Headgear
Pershing cap - Fast navy blue cap with gold strap, black visor, octagonal nylon net top
and prescribed SAGSD metal cap device. It shall be the headgear for daily wear by
security guards. It may be used by the security guard for ceremonial purposes with the
black strap. (See illustration, Fig.1).
b. Service Bush jacket - Service jacket shall be worn only by the Directorial and Staff
Officers of agency, color of trousers and shirt shall conform with the color prescribed in
Section 1 in the above rule.
(1) Private Security Agency. - Trousers and shirt short sleeves with shoulder straps, two
each breast and front pockets with cover flaps and fixed cloth belt fastened by brass
metal buckle. (See illustration, Fig. 2).
(2) Company Security Force. - It shall be sewn in the same manner as in Para. b,
Section 1, this rule.
(3) Government Security Unit. - It shall be sewn in the same manner as prescribed in
para. b (1) section 1 of this rule.
c. Service Shirt for Security Officer
(1) Service uniform. –
(a) Private Security Guard - Fast navy blue, short sleeves, shoulder straps, two
breast pockets with cover flaps and navy blue front buttons, tucked in (Fig. 3)
(b) Company Security Force. - It shall be sewn in the same manner as prescribed
for private security agency except that the color is light gray and the fabric for
shirt.
(c) Government Security Unit. - It shall be sewn in the same manner as prescribed
for private security agency except that the color is white and the shirt shall be
fabric “white”.
(2) Field Uniform. - (Optional for cold weather areas only);
(a) Private Security Agency. - Fast navy blue, long sleeves with buttoned cuffs,
shoulder straps, two breast pockets with cover flaps, navy blue front buttons and
shirt-jacket style with overlap waist strap. Detachable hoods shall be adopted for
cold weather area use. (Fig. 4)
(b) Company Security Force. - It shall be sewn in the same manner as prescribed for
private security agency except that the color is light gray and the fabric materials
for the shirt.

92 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

(c) Government Security Unit. - It shall be sewn in the same manner as prescribed
for private security agency except that the color is white and the shirting
materials shall be fabric. (Note: A single strand yellow lanyard may be used to
secure sidearm to the shoulder).
(3) Gala Uniform. - It shall be worn for ceremonial purposes only and at the expense of
the establishment conducting the ceremonies.
(a) Pershing cap. - This shall be same specifications and distinctions as provided for
under Sec. 1a of this Rule.
(b) Blouse. - The material shall be of fabric with colors as prescribed for
private/company/government security officers. It shall be tailored as an open
coat, long sleeves with a center flap at the back of the unsewed part of which
shall be the same level with the waistline. It shall have shoulder straps as the
service Bush Jacket,. Security guard officers shall wear shoulder boards with the
authorized rank design. (Fig.5).
(c) Buttons. - There shall be four (4) big brass buttons to close dress and four (4)
small buttons for the pockets. The buttons shall be plain brass.
(d) Shirt. - The shirt shall be white long sleeves.
(e) Necktie. - It shall conform to the color of the blouse five (5) centimeters wide.
(f) Trousers. - It shall be of the same design, style and materials as the service
trousers.
(4) Service Trouser. - Fast Navy blue color, straight cut, slanted pockets and two back
pockets without over flaps.
(5) Service Belt. – Of leather material which shall be used as pistol belt measuring four
and a half (4-1/2 centimeters in with.
(6) Footwear. –
(a) Service shoes. - Black leather shoes with rubber heels and soles, plain top low-
cut and black shoelace to be worn with plain black socks. (Fig 6).
(b) Rubber rain boots. - Optional as the nature of the post requires. (Fig.7)

SECTION 2. Uniform (Female). - The uniform of the lady security guard shall be made of a thick
fabric. It shall consist of a modified overseas cap two (2) ply similar to the women police service,
service skirts (palda) and blouse, service belt and black leather shoes as herein described and/or
illustrated.
B. Headgear. - Fast navy blue (2 ply) cap without piping but with regulation cap device. (Figure 8)
a. Service shirt –
(1) Private Security Agency. - Fast navy blue, light blue or white, thick fabric, short
sleeves, shoulder straps, two breast pockets with cover flaps and navy blue front
buttons, tucked in. (See illustration, Fig.9).
(2) Company Security Force. - It shall be sewn in the same manner as prescribed for
private security agency except that the shirting materials shall be fabric “Light Gray” in
color.
(3) Government Security Unit. - It shall be sewn in the same manner as the
private/company agency except that the shirting materials shall be white fabric.
b. Service trousers. - Fast navy blue thick fabric trousers, straight cut with slanted side pocket
and two back pockets without cover flaps. It may be worn during night duty/inclement
weather. (Fig.10)
c. Service skirt. - (Optional) Navy blue A-line skirt with two front slide pockets. It may be worn
when posted indoors.
d. Service belt. - Of leather material which shall be used as pistol belt measuring four and
one half (4-1/2 centimeters in width. (Fig. 11)
e. Footwear. -
(1) Service shoes - Plain black shoes, low-cut rubber soles and heel (maximum of five
cms.) and black shoes laces.(Fig. 12)
(2) Rubber rain boots black - Optional as the nature of post so requires.

SECTION 3. Ornaments and patches. -


a. National badge. - as approved by C, PNP (As illustrated in Fig. 13)

93 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

b. Cap device. - The brass cap device as approved by the Chief of Philippine National Police
shall be attached on the Pershing cap of officers (Figure 14)
c. Regulation Buckle - as approved by C, PNP without agency name (as illus. in Fig.15)
d. Collar device - (as illustrated in Figure 16)
e. Name cloth - shall consist of embroidered navy blue black-lettered surname and initials of first
and middle names on yellow background with blue borderline, his names on yellow
background with blue borderline, his name shall be preceded by the word: Security Guard” or
“SG”. The letter shall be one and one half (1-1/2) centimeters in height and the name cloth
shall be sewn on the right top pocket (as illustrated in Fig. 17).
f. Agency/unit name cloth. - A similarly embroidered agency/unit cloth shall be sewn on the top
of the left breast pocket, navy blue block-lettered on yellow background. (As illustrated in Fig.
18).
g. Equipment and paraphernalia. –
(1) Security Director/Inspector
(a) Leather pistol belt with regulation buckle; and
(b) Holster, black leather.
(2) Security Guard (male or female):
(a) Black leather belt for pistol and nightstick with regulation buckle (as illus. in Fig. 19);
(b) Holster, black leather for pistol, night stick and handheld radio;
(c) Nightstick (Baton) with horizontal handle (Fig. 20).
(d) Whistle with lanyard (Fig. 21);
(e) Pocket notebook with writing pen.

SECTION 4. Design and Use of White Uniform. – A special set of security personnel uniform shall be
prescribed for security personnel posted at hotels, resorts, cultural and entertainment areas and other
sites noted as tourist-heavy areas.
A special set of security personnel uniform shall be prescribed for security personnel posted at
department stores noted as tourist-heavy areas, banks and other foreign clientele.
a. Uniform (male)- The special set of uniform for security agencies officer/guard and lady guard
shall consist of pershing cap, ball cap, service bush, jacket, service shirt, service trousers,
service belt, necktie, lanyard and footwear.
(1) Pershing cap – same as defined in Section 1 a (2), Rule VI. It shall be fast navy blue with
gold strap, black visor, octagonal nylon net top and prescribed metal cap device. It shall
be worn by security agency officers and guards while wearing a complete special type of
uniform. (See illustration in Fig.1).
(2) Service Bush Jacket - It shall be white ramie polyester fabric and shall be sewn short
sleeves with shoulder straps, two each breast and front pockets with cover flaps and
fixed cloth belt fastened with metal buckle. It shall be worn by security agency officer
while on duty at indoor places with complete prescribed paraphernalia and agency/client
patches. (Fig.2)
(3) Service Shirt - It shall be white cotton/cotton polyester fabric and shall be sewn short
sleeves as the case maybe, shoulder straps, two breast pockets with cover flaps and
white front buttons. It shall be worn by security guards while on duty as designated indoor
places with complete prescribed paraphernalia and agency/client patches. Tuck-in. (Fig.
3)
(4) Service Trousers - Fast navy blue color, straight cut, slanted pockets and two back
pockets with cover flaps. It shall be worn by security agency officer and security guards.
(Fig. 2)
(5) Service Belt - It shall be black in color, leather, to be used as pistol belt measuring four
and one-half centimeters in width. (Fig. 5) It shall be worn by both security officers and
security guards while in complete special type of uniform.
(6) Necktie - Plain fast navy blue and five centimeters wide. It shall be worn by security
guards while in complete special type of uniform. (Fig. 23)
(7) Lanyard - Navy blue in color, same style as used by AFP or PNP Personnel. It shall be
worn by security agency officers and security guards while in complete special type of
uniform. (Fig. 21)
(8) Footwear - Black leather shoes with rubber heels and soles, plain top low-cut and black
shoelace to be worn with plain black socks. (Fig.6)

94 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

(9) Ball cap - It shall be fast navy blue round nylon net top with visor and prescribed
embroidered cloth cap device. It shall be optional in lieu of the pershing cap. (See Fig.
24)
b. Uniform (Female) - The uniform for a lady security guard shall consist of an oversea cap two
(2) ply service bush jacket, service belt, lanyard and black leather shoes.
(1) Bush cap - Fast navy blue (2 ply) without piping but with regulation cap device. (Fig. 25)
(2) Service Bush Jacket - It shall be white in color and shall be sewn in same style as that of
security agency officer. It shall be worn by security lady officer with complete prescribed
paraphernalia, name cloths and agency/ client patches. (Fig. 10.)
(3) Service Shirt - White ramie polyester fabric and shall be sewn short sleeves or long
sleeves as the case maybe, shoulder straps, two breast pockets with cover flaps and
navy blue front buttons. It shall be worn by private security lady guard with complete
prescribed paraphernalia, name cloth agency/client patches, service belt, lanyard. Tuck
in. This type of uniform shall be worn only at indoor places (Fig.9).
(4) Service Belt - (See illustration in Fig.19)
(5) Lanyard - (See Fig. 21)
(6) Service Skirt - A line skirt with two front slide pockets,. It shall be worn when posted
indoors (Fig.11).
(7) Footwear - Plain black leather shoes, low-cut rubber sole and heel (maximum of five cm)
and black shoelaces. (Fig. 12)
c. Paraphernalia - As prescribed under Sec.3 Rule VI, IRR, RA 5487, as amended. (See
illustrations in Fig.13, 14,15,16,17).

SECTION 5. The special set of uniform in Section 4 above shall be prescribed/ authorized to be
issued only on a case to case basis at the areas as herein authorized upon prior request of the clients
concerned; provided that the request is predetermined on the need of the workplace for the use of the
special set of uniform and NOT on the individual desire of the agency or client.

SECTION 6. Provision for uniform. – All employers/owners/ operators of private security


agency/company security force shall provide at least one (1) set of the prescribed uniform free of
charge to their respective security guard for every year of service with them. Likewise, all licensed
security guard shall provide themselves with one (1) set of the prescribed uniform once a year unless
their employers provide it for free.

SECTION 7. Manufacture/tailoring. - The heads/operators of the Private Security Agencies. Company


Security Force and Government Security Unit shall be responsible for the manufacture and/or tailoring
of the prescribed uniform for their respective security guard.

PART 2
BASIC EQUIPMENT
SECTION 8. Basic Equipment.
a. The following shall comprise of the Basic Equipment of a security guard which shall be made
mandatory and ready for his/her use while performing post, conduction, armored service duties
and the like:
1. Prescribed Basic Uniform
2. Nightstick/baton
3. Whistle
4. Timepiece (synchronized)
5. Writing pen
6. Notebook and duty checklist (electronic or not)
7. Flashlight
8. First Aid Kit
9. Service Firearms (as required)
b. The security agency shall have the responsibility of ensuring the availability and issuance of
the basic equipment to its posted guards.
c. Security Guards shall be responsible for inspecting operability of basic equipment issued to
him, and be responsible for keeping himself acquainted with the proper use of these.

95 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

SECTION 9. Other Equipment.


a. Apart from the mandatory basic equipment, other equipment may be issued to the security
guard as determined necessary following client contract requirement, provided that the
security guard shall have acquired the prior training/knowledge on the proper use of the same
but not limited to the following:
1. Handcuffs
2. Metal detectors
3. Communications Radio
4. Stun devices
5. Armor vests
6. canine (k-9) units
b. Electronic and/or communication devices requiring registration under the jurisdiction of other
government agencies shall be complied with prior to issuance for use of the security guard.
c. Live units such as canine (dogs), shall require prior training confirmation and registration with
the PNP before utilization by any security agency purposely to ensure truthful deployment
versus client requirement or purpose of operation.

PART 3
UNIFORM AND EQUIPMENT BOARD

SECTION 10. Modifications, Additions and Exemptions. Any changes or additions to the above
described uniforms, paraphernalia and equipment, and/or exemptions to the prescribed uniforms,
equipment and/or paraphernalia may be made through or through the initiation of SAGSD-CSG for the
approval of a Private Security Personnel Uniform and Equipment Board organized by the Chief,
SAGSD.

SECTION 11. Composition and Representation. The Board shall at least be composed of
representatives from the PNP, PADPAO and/or concerned sector of the private security industry,
Licensed Security Personnel Practitioners and if needed representative client/clients of distinguished
reputation.

SECTION 12. Effectivity and Transition. Changes or modifications of basic uniform, paraphernalia or
equipment shall be made effective only with ample transition to temper the cost of adoption. Provided
that, approved exemptions for alternatives to operative provisions may be made effective on the date
of approval.

RULE IX
RANKS, POSITIONS, STAFFING PATTERN AND JOB DESCRIPTION

SECTION 1. Ranks and Position - The security agency operator/owner must observe the required
major ranks and positions in the organization of the agency.
a. Security Management Staff
1. Security Director (SD) – Agency Manager/Chief Security Officer.
2. Security Executive Director (SED) – Assistant Agency Manager /Assistant Chief
Security Officer;
3. Security Staff Director (SSD) – Staff Director for Operation and Staff Director for
Administration.
4. Security Staff Director for Training – Staff in-Charge for Training
b. Line Leadership Staff
1. Security Supervisor 3 – Detachment Commanders
2. Security Supervisor 2 – Chief Inspector
3. Security Supervisor 1 – Inspector
c. Security Guard
1. Security Guard 1 – Watchman/guard
2. Security Guard 2 – Shift in-charge
3. Security Guard 3 – Post in-charge
d. Security Consultant – (optional)

96 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

SECTION 2. Staffing Pattern. – Security agency owner/manager shall follow the required staffing
pattern as follows:
a. The agency manager is automatically the Security Director who shall be responsible for the
entire operation and administration/management of the security agency. He shall be the
authorized signatory to all Duty Detail Orders, and all other documents and communications
pertinent to the operation and management of a security agency. He may delegate certain
functions to a subordinate, provided the subordinate is qualified to discharge the given
function in accordance with law.
b. The Security Agency shall appoint a staff officer as Security Training Officer, who shall be
responsible for the training of the Agency’s security personnel in accordance with the
requirements of RA 5487 and the IRR. The Training Officer shall be licensed as a Security
Officer and likewise accredited as such by the Training and Education Branch, SAGSD.
c. The Staff Director for Operation is the staff assistant of the security manager for the efficient
operation of the agency. This position includes the responsibility to canvass clientele and the
implementation of contract and agreement. He is also responsible for the conduct of
investigation and the conduct of training.
d. The Staff Director for Administration is the staff assistant of the agency manager for the
effective and efficient administration and management of the agency. He is responsible for
the professionalization of the personal, procurement/recruitment, confirming of awards,
mobility and issuance of FA’s.
e. The Detachment Commander is the field or area commander of the agency. The Detachment
shall consist of several posts.
f. The Chief Inspector shall be responsible for inspecting the entire area covered by the
detachment.
g. Security Inspector is responsible for the area assigned by the Chief Inspector of the
Detachment Commander.
h. Post-in-Charge is responsible for the entire detailed security office within a certain
establishment.
i. Shift in-Charge is responsible for the security officers who are scheduled in a certain shift for
a particular period.
j. Security Guard is the one actually posted as watchman and or guard.

SECTION 3. License Requirement. No person shall be designated nor be allowed to fill-up the
positions enumerated and described in the preceding sections unless he is licensed security
personnel as follows:
a. must at least be a licensed Private Security Officer to occupy Security Management Staff
position as Security Director, Security Executive Director, or Security Staff Director;
b. must at least be a licensed Private Security Training Officer to occupy Security Management
Staff position as Security Staff Director for Training; and
a. must at least be a licensed Private Security Guard with Supervisory Training to occupy any
positions in the Line Leadership Staff.

RULE X
PROFESSIONAL CONDUCT AND ETHICS

SECTION 1. Security Guard Creed, Code of Ethics, and Code of Conduct. - All members of the
private security agency and private detective agency/company security force/government security unit
duly licensed in accordance with RA 5487, as amended, and it’s implementing rules and regulations
shall strictly observe the following:

A. SECURITY GUARDS CREED


As a security guard my fundamental duty is to protect lives and property and maintain order
within my place of duty; protect the interest of my employer and our clients and the security and
stability of our government and country without compromise and prejudice, honest in my action, words
and thought; and do my best to uphold the principle: MAKADIOS, MAKABAYAN, MAKATAO at
MAKAKALIKASAN.

97 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

B. ETHICAL STANDARD
a. As a security guard/detective his fundamental duty is to serve the interest or mission of
his agency in compliance with the contract entered into with clients or customers of the
agency he is supposed to serve;
b. He shall be honest in thoughts and deeds both in his personal and official actuations,
obeying the laws of the land and the regulations prescribed by his agency and those
established by the company he is supposed to protect;
c. He shall not reveal any confidential information confided to him as a security guard and
such other matters imposed upon him by law;
d. He shall act at all times with decorum and shall not permit personal feelings, prejudices
and undue friendship to influence his actuation while in the performance of his official
functions;
e. He shall not compromise with criminals and other lawless elements to the prejudice of the
customers or clients and shall assist the government in its relentless drive against
lawlessness and other forms of criminality;
f. He shall carry out his assigned duties as required by law to the best of his ability and shall
safeguard the life and property of the establishment he is assigned to;
g. He shall wear his uniform, badge, patches and insignia properly as a symbol of public
trust and confidence, as an honest and trustworthy security guard and private detectives;
h. He shall keep his allegiance first to the government, then to the agency where he is
employed and to the establishment he is assigned to serve with loyalty and utmost
dedication;
i. He shall diligently and progressively familiarize himself with the rules and regulations laid
down by his agency and those of the customers or clients;
j. He shall at all times be courteous, respectful and salute his superior officers, government
officials and officials of the establishment where he is assigned or the company he is
supposed to serve;
k. He shall report for duty always in proper uniform and neat in his appearance; and
l. He shall learn at heart and strictly observe the laws and regulations governing the use of
firearms.

C. CODE OF CONDUCT
a. He shall carry with him at all times during his tour of duty his license, identification card
and duty detail order with an authority to carry firearm;
b. He shall not use his license and other privileges if any, to the prejudice of the public, the
client or customer and his agency;
c. He shall not engage in any unnecessary conversation with anybody except in the
discharge of his duties or sit down unless required by the nature of his work and shall at
all times keep himself alert during his tour of duty;
d. He shall refrain from reading newspapers, magazines, books, etc, while actually
performing his duties;
e. He shall not drink any intoxicating liquor immediately before and during his tour of duty;
f. He shall know the location of the alarm box near his post and sound the alarm in case of
fire or disorder.
g. He shall know how to operate any fire extinguisher at his post;
h. He shall know the location of the telephone and/or telephone number of the police
precincts as well as the telephone numbers of the fire stations in the locality;
i. He shall immediately notify the police in case of any sign of disorder, strike, riot or any
serious violation of the law;
j. He or his group of guards, shall not participate or integrate any disorder, strike, riot, or
any serious violations of the law;
k. He shall assist the police in the preservation and maintenance of peace and order and in
the protection of life and property having in mind that the nature of his responsibilities is
similar to that of the latter.
l. He shall familiarize himself by heart with the Private Security Agency Law (RA 5487, as
amended) and these implementing rules and regulations;
m. When issued a Fas, he should not lend his FA s to anybody.

98 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

n. He shall always be in proper uniform and shall always carry with him his basic
requirements, and equipment’s such as writing notebook, ballpen, night stick (baton)
and/or radio.
o. He shall endeavor at all times, to merit and be worthy of the trust and confidence of the
agency he represents and the client he serves.

SECTION 2. Rules of Engagement. For the matter of performance of duties by security personnel,
rules of engagement shall be formulated through an SOP to be issued by the
Director, CSG.

SECTION 3. Creed of Security Agency Proprietor, Code of Ethics and Code of Conduct for Private
Security Force and Government Security Agencies/Company Security Force and Government
Security Unit. - All private security agencies, company security service and government guard unit
licensed to operate under RA 5487, as amended, and its implementing rules and regulations, shall
adhere to the following Code of Ethics and Code of Conduct:

A. SECURITY AGENCY OPERATOR’S CREED


As a security agency proprietor, my fundamental duty is to serve the interest of my clientele
and my security guard; protect the interest of the government; adhere professionally in the conduct of
my business without prejudices and compromises to human rights, and uphold constantly the law and
abide by the rules and regulations set by the government in the conduct of my business.

B. ETHICAL STANDARD
As a licensed private security agency /company security force, it shall be its prime concern to
share with other licensed agencies and company security forces, the burden of responsibility in
upholding the integrity and trust of the private security profession at all times. In discharging this
responsibility its officials shall:
c. Endeavor to fulfill their professional duties in accordance with the highest moral
principles, always conforming to the precepts of truth, fairness and justice;
d. Contribute to the national welfare by securing and preserving industrial facilities of the
country, through competent guarding services;
e. Promote the well-being of security guard thru adequate wages and other emoluments;
f. With faith and diligence, perform their contractual obligations for the protection of life, limb
and property;
g. Constantly endeavor to raise quality standards of private security services; and
h. Continuously work with and assist the law enforcement agencies in the preservation of
peace and order in the country.

C. CODE OF CONDUCT
a. They shall at all times adhere to professional ethics and refrain from practices that negate
the best interest of the private security service industry.
b. They shall always consider that unity in the profession is vital and paramount for the
attainment of common objectives;
c. They shall not use deceitful means and/or misrepresentations in all their business
transactions. To this end, they shall avoid granting of rebates, or commissions in securing
guarding contracts;
d. They shall not indulge in cut-throat competition by undercutting the existing contract rates
between the PSA and the client and/or the minimum contract rate prescribed under the
PADPAO Memorandum Agreement in conformity with existing minimum wage laws.
e. They shall pay their guards in accordance with rates fixed by law. They shall not impose
any unauthorized deductions on the guards to seek employment elsewhere as they
choose, subject to existing laws, nor accept a guard without clearance from the losing
agency;
f. When a prospective client with existing company security force calls/ bids for additional
security guard, all bidding security agencies shall observe the principle of “equal pay for
equal work” considering the rate of pay of the company security service and their own
guards;

99 Industrial Security Management Instructional Material


ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

g. Anchored on the principle of securing property, of providing safety of persons and


maintaining peace and order within such property, when accepting contracts with clients
having existing conflict of claims, management, ownership or administration of properties
and/or establishments, where there exist or forthcoming another contracted/contracting
agency, they should conduct themselves and their deployed guards in a manner primarily
not to be used against each other at the same time without compromising their respective
contracts;
h. They shall endeavor to raise the standard of service in the security profession thru
incentive and in-service training;
i. They shall establish an adequate library of books, magazines and other publications on
security subject, materials, references, etc. in each PSA.
j. They shall always be truthful and accurate in reports required by SAGSD and/or other
competent authorities and be prompt in the submission of the same;
k. They shall not, under any circumstances, employ for guard duty any person without a
professional license as a security guard duly issued by the Chief, PNP;
l. They shall at all times exercise vigilance and be prepared to prevent the use of their
guards or the agency in activities inimical to the state or national security. When activities
of this nature come to their attention, they shall as a matter of duty render an appropriate
report to the PNP authorities.

SECTION 4. Sanction. – Any private security agency operator or guard who violates the creeds,
ethical standards and codes as set forth in the preceding sections, shall be subject to the penalties
provided in these implementing rules and regulations.

RULE XI
PRIVATE SECURITY TRAINING

PART 1
General Provisions
SECTION 1. Policy. The following provisions encompass all persons, natural or juridical, who conduct
and/or provide private security training and/or training services.

SECTION 2. Private Security Training. It shall refer to training and academic programs and courses
duly approved or prescribed by the Philippine National Police and adopted by the Technical Education
and Skills Development Authority. It includes the prelicensing requirements of individual security
guards and other security personnel approved by RA 5487, the periodic and non-periodic in-service
skill refreshers for such security personnel, and other specialized, individual or group, private security
personnel skills development.

SECTION 3. Private Security Training Services. These shall refer to the conduct of Private Security
Training, provision of the physical facilities and installation necessary in the conduct thereof, and the
provision of the appropriate management, administrative, and instructor/training staffs therefore, the
actual performance and/or exercise of which requires the appropriate permit and/or authority as
herein provided.

SECTION 4. Private Security Training Institutions. These shall refer to all persons, natural and/or
juridical, who/that provide and/or conduct private security training, and/or services.

SECTION 5. Categories of Private Security Training. The following are the general categories of
Private Security Training:
a. Pre-Licensing Training Programs. As a matter of licensing prerequisite, Pre- Licensing
Training Programs include all training and/or academic programs and courses whose
objective is to indoctrinate the individual with the basic skills and educational backgrounds
necessary in the effective exercise and performance of his/her elected/ would-be
security/detective profession. It includes but is not limited to the Basic Security Guard
Course, the Security Officers Training Course, Private Security Agency Operators
Training/Seminar, Private Security Training Trainors’ Course.

10 Industrial Security Management Instructional Material


0 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

b. Refresher Training Programs. This shall refer to periodic and non-periodic training programs
and courses designed with the objective of reinvigorating and/or developing basic skills and
knowledge gained previously or gained while in the exercise of his/her profession as a
matter of experience, to enhance current in-service and future individual and/or collective
exercise of profession. This includes mandated periodic inservice training to be initiated by
employer-security agencies which is further a prerequisite for the renewal of individual
professional security licenses. It includes but is not limited to the periodic Re- Training
Course, Basic Security Supervisory Course, and Security Supervisor Development Course.
c. Specialized Training Programs. This shall refer to training program and courses other than
those described in the preceding categories designed at developing previously-gained skills
and knowledge, designed at augmenting or expanding current skills and knowledge, and/or
designed at developing current skills and knowledge to suit identified future applications. It
includes but is not limited to such courses as the Intelligence/Investigator Training Course,
Basic Crises Management Course, Personal/VIP Security Training Course, Armoured Car
Crew Training Course, Bomb Disposal Training Course, Bank Security Training Course, and
Basic Aviation Security Specialist Course.

SECTION 6. Categories of Private Security Training Institutions.


a) Private Security Training Systems. Government or duly registered private training
establishments, associations, firms, partnerships, corporations and the like, which provide the
physical facilities and installations, and the appropriate management, administrative, and
instruction/training staff necessary and for the purpose of conducting Private Security Training:
1) Private Security Training Centers – Private Security Training Systems whose primary
purpose is to provide private security training and training services, may be qualified to
offer and conduct Private Security Training Programs in all categories provided that, it has
secured Regular Accreditation from the SAGSD upon compliance and conformity with the
latter’s application and approval requirements, and prior TESDA registration/accreditation.
2) Other Juridical Entities - Private Security Training Systems whose primary purpose is not
to provide private security training and training services, may be qualified, on interim basis,
to offer and conduct Private Security Training for a specific course/class and duration
under Refresher and Specialized programs only, provided that, it has secured prior Interim
Accreditation from the SAGSD upon compliance and conformity the latter’s application and
approval requirements. Such Interim Accreditation is also issued to those with Regular
Accreditation but which cannot comply with the renewal requirements.
3) Watchman/Security and/or Detective Agencies defined under RA 5487 as amended, which
shall not be required prior accreditation to operate, by virtue of their License to Operate as
Private Security Agency, Company Security Force or Government Security Force, may be
authorized to conduct only in-house refresher or specialized training for its own security
personnel, upon compliance and conformity with application and approval requirements of
SAGSD.
4) Police Offices/Units assigned/designated to conduct Private Security Training, which shall
not be required TESDA registration but shall require prior official authority of SAGSD, may
conduct training in all categories but subject to requirements of Rule XI of these rules and
regulations or as may be prescribed by SAGSD.
5) Police Supervisory Office (presently the SAGSD) as having the primary responsibility of
the conduct, supervision, and control of all private security training and training services.
b) Training Instructor. Any person who renders personal and/or professional trainor, instructor,
and/or teacher services relative to private security training by virtue of his profession,
expertise, knowledge, and/or experience in a particular field of knowledge. Training Instructor
includes but is not limited to currently or retired licensed or accredited private security training
instructors, professional educators, and/or field/practicing experts.

SECTION 7. Validity and Duration of Accreditation.


a. Accreditation/recognition certificates issued except those under interim status, shall b valid for
not more than two (2) years unless sooner terminated, cancelled, or revoked.
b. Letter Authority (LA) shall be a one-time-use authority issued to security training systems, to
conduct, open, offer one (1) course/class, shall be valid for not more than six (6) months.

10 Industrial Security Management Instructional Material


1 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

c. Interim accreditation shall be valid for nor more than six (6) months, unless sooner terminated,
cancelled or revoked, and may be renewed only thrice.

SECTION 8. Organization for Private Security Training. The following are the minimum staff/personnel
requirements for the conduct of a particular Private Security Training Program or Course conducted
by Regular and Interim Accredited Training Centers:

Administration Staff:
a. Center or School Superintendent/Director/Administrator.
b. Course/Training Director.

Training Staff:
a. Training Officer, Regular/Special Accreditation
b. Training Instructors, Regular/Special Accreditation
c. Guest Instructors. Persons other than accredited private security training instructors, who
render personal or professional instructor, trainor, or teacher services in a particular field of
knowledge, subject, or training in a private security training program/course as a resource
because of his profession, expertise, education, and/or experience.

SECTION 9. Limitations and Prohibitions.


a. No private security training course or class shall be conducted without the appropriate Letter
Authority (LA) to conduct training issued by SAGSD;
b. The maximum number of students, trainees or participants for every class shall not exceed
sixty (60);
c. All training courses/classes shall be conducted only in the place/venue approved;
d. Person(s)/applicant(s) likewise suffering from disqualifications enumerated in Section 4 of Rule
I of these rule and regulation above, shall not be allowed to participate in any private security
training course/class;
e. Corollary to Section 9 (d) above, training institutions shall not accept for enrollment disqualified
applicants for training, and consequently shall be responsible for confirming the qualifications
of all training applicants;
f. Responsibility for Training and Progressive Development of Personnel - It is the primary
responsibility of all operators of private security agencies and company security forces to
maintain and upgrade the standards of efficiency, discipline, performance and competence of
their personnel. To attain this end, each duly licensed private security agency and company
security force shall establish a staff position for training and appoint a training officer whose
primary functions are to determine the training needs of the agency/guards in relation to the
needs of the client/market/industry, and to supervise and conduct appropriate training
requirements. All private security personnel shall be re-trained at least once every two years.
g. PSAs without a Training Officer - In the event that a private security agency and company
security force shall fail to hire a Training Officer, the Security Director assumes responsibility/
accountability for the training needs of the Agency. In order that the training shall be conducted
in accordance with the provisions of the IRR, subject security agency shall undertake a
Memorandum of Agreement with an accredited training school to undertake the functions of
the training officer as provided herein, shall be executed. Provided that the aforesaid
agreement may be canceled or suspended the moment the private security agency/company
security force shall be able to hire a competent training officer.
h. Accredited active members of the PNP/AFP or other government agencies shall exercise
Private Security Training profession only to the extent as officially allowed by their respective
offices, after office hours or as authorized by law.

PART 2
Conduct of Private Security Training

SECTION 10. Preparations before the Conduct of Training


a. A request for Letter Authority to Conduct Training shall be submitted to Chief, SAGSD with the
following attachments:
1. A photocopy of TESDA Recognition Certificate

10 Industrial Security Management Instructional Material


2 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

2.
Appointment of accredited Training Director
3.
Photocopies of SAGSD accreditation of the teaching staff
4.
Training Schedule
5.
SSS Employment History Certificate of trainees/participants
6.
Clearances (NP, Drug Test, PNP DI, Court & NBI)
7.
Subsequently on the second request for LA, the SBR (Training Fee) of the previously
conducted course/class shall be attached.
b. All Region based applicants requests shall be endorsed by respective PNP Police Regional
Office.

SECTION 11. Conduct of Training


a. The School Director/Guest shall formally open each class.
b. One (1) day after its opening, a report containing the following data (name of student, age,
sex, height, status educational attainment, agency, address and remarks) shall be submitted
to Chief, SAGSD
c. Participants shall be graded thru written, oral and practical examinations.
d. Participants who accumulate absences exceeding twenty (20%) percent of the total number
of training shall be dropped.
e. School/Center policies shall be enforced at all times.
f. The School, Center or, PSA shall also ensure the maintenance of orderliness, presentability,
discipline and security of its training facilities and all persons therein.
g. A General Knowledge Examination (GKE) shall be administered by SAGSD (Private Security
Training Management Branch) one (1) day before the closing of each class provided a
photocopy of the proof of payment (SBR) for the ongoing class is submitted.
h. Any student who fails the GKE may be given three (3) chances to retake, after which if he
fails, he shall repeat the course.

SECTION 12. General Knowledge Examination


a. A General Knowledge Examination (GKE) shall be administered by the PNP and shall be
given each graduate after completion of each training course as a matter of evaluating the
graduate’s assimilation of the course in relation to his qualification for license to exercise
private security profession. The GKE shall also be used among others, to evaluate the quality
of training of or transmission of the course by the accredited training systems.
b. For region-based Training Centers/Schools, FESAGS, ROPD will administer the GKE and
submit. After GKE Result to SAGSD five (5) days after the closing of each class for reference
and disposition.

SECTION 13. After Training


a. Each course must be formally closed by the Training Director or by an invited Guest.
b. A Closing report in a prescribed format, shall be submitted five (5) days after graduation of
each class to Chief, SAGSD.
c. Upon completion of the course, the School shall furnish all students the following documents:
1. Declaration of Graduates
2. Order of Merit
3. Certificate of Completion (Diploma)
4. GKE Certificate
5. Opening Report/Closing Report (indicating therein name of student, age, height, weight,
status, sex, educational attainment, grade and remarks)
6. School Accreditation Number
7. Name of School, telephone number/address
8. Course title, Class Number, Letter Authority Number and Control Number and Inclusive
dates of training.

SECTION 14. Processing of Students. Accredited Training Schools, Centers or PSAs shall have the
responsibility of and be accountable for the initial processing for the qualification and fitness of all
applicants/registrants for enrollment to the corresponding class/course being applied for with their
respective schools, centers or PSAs.

10 Industrial Security Management Instructional Material


3 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

SECTION 15. Duration of Courses. Duration of courses shall conform with the corresponding
Program of Instructions (POI) for each type of course/training/seminar, prescribed by the PNP and
adopted by the TESDA.

SECTION 16. Basic Guarding Subjects. The following shall at least be the basic knowledge and/or
subject requirements on guarding or providing security that private security personnel trainees should
be imparted with:
a. Principles, definitions, aspects and risks of guarding and security
b. General Orders and Functions of a Guard
c. Patrolling, observation and description, recording and reporting, investigation
d. Visitor, material and vehicle movement/access control/denial
e. Inspection and key control procedures
f. Public relations, regulation/law enforcement and arrests
g. Communications and other equipment
h. Reaction to emergencies (bomb threat, disaster, fire, injury or sickness etc)

SECTION 17. Fees and Charges


a. Consistent with laws existing during this formulation, the Chief of Philippine National Police or
his authorized representative shall impose the following fees and charges relative to private
security training:
1) Pre-Licensing Training Programs
a. Basic Scty Guard Training Course P 200.00/participant
b. Security Officer Training Course P 300.00/participant
c. Private Scty Trng Trainor’s Course P 300.00/participant
d. Private Detective Training P 300.00/participant
e. Refresher Training Programs SG In-Service Training P 100.00/participant
f. Other refresher/re-training courses P 50.00/participant
2) Specialized Training Courses (all) P 100.00/participant

b. The same schedule of fees will also be charged from individual walk-in applicants who will
avail of the private security training programs.
c. Serialized certificates of completion/participation shall be given to each participant which
issuance shall be managed by SAGSD.
d. The following shall be collected as permit fees from among the Private Security Training
Institutions which are conducting Private Security Training, for every Letter of Authority /
Training Directive for:
a. Pre-licensing Training P 100.00
b. Refresher Training P 100.00
c. Any Specialized Training P 100.00
e. The following shall be collected as accreditation fees from among the approved applicants for:
a. Accreditation of Training Systems P 2,500.00/yr
b. Accreditation of Training Personnel:
c. Training Consultant P 150.00/yr
d. Training Officer P 150.00/yr
e. Training Instructor P 150.00/yr
f. The fees collected shall accrue to the PNP in accordance with the provisions of Rule VI
hereof Rules and Regulations.

PART 3
Accreditation and Processing

SECTION 18. Private Security Training Related Processing. All processing, standards and
documentary requirements relative to the conduct of private security training shall be prescribed in a
Standard Operating Procedure (SOP) to be issued by SAGSD.

SECTION 19. Accreditation of Training Schools or Centers


a. Pre-inspection

10 Industrial Security Management Instructional Material


4 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

1. A joint Inspection Team composed of two (2) Technical Experts each from PNP SAGSD
and TESDA shall be designated as inspectors to check the following:
a. Physical appearance of the school/center
b. Training aids & materials/references/books
c. Training staffs (SAGSD accreditation)
d. Program of Instructions
e. Training Facilities (drills & ceremonies, Unarmed defense)
f. MOA with Firing Range Owner
2. A Letter Order duly signed by the Chief, SAGSD will be the authority in the conduct of
inspection indicating therein as specified in the Inspection Checklist (Name of Training
School, venue, date of inspection, name of Inspectors, courses offered, list of mandatory
requirements, additional findings, recommendations/remarks and acknowledgement
receipt by the school staff/representative).
b. Conduct of Inspection
1. The Joint Inspection Team will introduce themselves to the School Director and/or
Training Staff.
2. If defects are noted, it shall be properly indicated on the Inspection Checklist and shall be
acknowledged by the school representative present during the inspection, after which a
re-inspection shall be recommended by the inspectors.
3. If the defects were complied during the re-inspection, it shall be properly documented
(pictorials to be attached).
c. Post Inspection
1. The results of inspection shall be the basis for the granting of Recognition Certificate
issued by TESDA.
2. The Certificate of TESDA Recognition shall be submitted with the application for
Accreditation to Chief, SAGSD with the following attachments:
(a) Corporate & Administrative Documents
(b) Board Resolution to offer the Program
(c) SEC Registration & Articles of Incorporation
(d) Proof of building ownership or Lease Contract at least 5 yrs
(e) Fire Safety Certificate
(f) Curricular Requirements
(g) Curriculum (including job titles & competencies developed)
(h) Course and subjects description
(i) List of Supplies, tools and equipment for the Program
(j) List of instructional materials (books, videotapes, internet access, unarmed defense
equipment, others)
(k) Training Schedules
(l) Faculty and Personnel (with resume/biodata)
(m) List of Officials & their Qualifications
(n) List of Faculty for the Program & their Qualifications
(o) Academic Rules and Student-Instructor Conduct
(p) Schedule of Tuition & other Fees
(q) Grading System
(r) Entrance Requirements
(s) Rules on Attendance
(t) Other Support Services
(u) Health Services
(v) Career Guidance/Placement Services
(w) Community Outreach Program
d. Issuance of Accreditation.
1. The Chief, SAGSD shall have the authority to approve, disapprove, cancel or suspend
accreditations of private security training schools/centers.
2. Approved applications for accreditations shall be issued the corresponding Certificates of
Accreditation following a design and format prescribed in a circular by Chief, SAGSD.

SECTION 20. Accreditation of Training Personnel


a. Qualifications of the Teaching Staff:

10 Industrial Security Management Instructional Material


5 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

1. Training Director
(a) Holder of Masteral Degree, Board /Bar Passers
(b) Must have at least five (5) years experience in the operation and management of a
security business
(c) Must have no criminal record
(d) Must be physically and mentally fit
2. Training Officer
(a) Baccalaureate Degree holder (4 years)
(b) Must have taken/passed the Private Security Trainor’s Course
(c) Must have served at least five (5) years in the security industry
(d) Must have no criminal record
(e) Must be physically and mentally fit
3. Training Instructor
(a) A graduate of a Baccalaureate Degree Course (preferably BSEEd)
(b) Must have taken the Private Security Trainor’s Course sponsored by
CSG/SAGSD/PARSTS
(c) Must have served the security industry for at least three (3) years
(d) Must be physically and mentally fit
(e) Must have no criminal record
b. Requirements for Accreditation of the Teaching Staff. The following shall be the supporting
documents accompanying the application for accreditation:
1. Training Director
(a) Basic letter request addressed to Chief, SAGSD (Attn: C, PSTM Branch)
(b) Transcript of Records
(c) College Diploma and/or Post Grad Studies)
(d) Certification from Private Security Training School/Agency that he has five (5) years
experience in the security industry
(e) Documentary Clearances (NP & Drug Test, Barangay, Mayor, Court, PNP DI & NBI)
(f) Latest updated Resume with 2X2 ID picture (colored)
2. Training Officer
(a) Basic letter request addressed to Chief, SAGSD (Attn: C, PSTM Branch)
(b) Transcript of Records
(c) College Diploma
(d) Must have actual experience in Security Management or government service for at
least five (5) years continuous service
(e) Certificate of Security Trainor’s Course
(f) Documentary Clearances (NP, Drug Test, Barangay, Mayor, PNP DI, Court & NBI)
(g) Latest updated Resume with 2X2 ID picture (colored)
(h) Certification from Private Security Training School/Center/ and/or Agency that he has
five (5) years experience in the security industry
3. Training Instructor
(a) Basic letter request addressed to Chief, SAGSD (Attn: C, PSTM Branch) indicating
the subject of expertise
(b) Transcript of Records
(c) College Diploma
(d) Certificate of Private Security Trainor’s Course
(e) Documentary Clearances (NP, Drug Test, Barangay, Mayor, PNP DI, Court & NBI)
(f) Certification from Private Security Training School/Center and/or Agency that he has
served five (5) years in the security industry.
c. All applicants from the Region must be properly endorsed by the C, ROPD.
d. Issuance of Accreditation.
a. The Chief, SAGSD shall have the authority to approve, disapprove, cancel or
suspend accreditations of private security training personnel.
b. Approved applications for accreditations shall be issued the corresponding
Certificates of Accreditation following a design and format prescribed in a circular by
Chief, SAGSD.

PART 4

10 Industrial Security Management Instructional Material


6 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Private Security Training Board

SECTION 21. Private Security Training Board. The Chief, SAGSD upon determination of need, may
organize a Private Security Training Board with at least one (1) representation from the PADPAO,
Philippine Association of Recognized Security Training Schools (PARSTS) and TESDA for the
following purposes relative to private security training:
a. Conduct of random training visitation
b. Prescribe accreditation processing procedures, standards and requirements
c. Prescribe course POIs and subjects
d. Prescribe training procedures, guides and regulations
e. Prescribe exemptions and waivers
f. Prescribe course equivalents
g. Others as may be directed by Chief, SAGSD

RULE XII
UTILIZATION OF PRIVATE SECURITY AGENCIES
AND PERSONNEL

PART 1
SECTION 1. Powers of city municipal mayors in case of emergency - In case of emergency or in
times of disaster or calamity when the services of any security agency/entity and its personnel are
needed, the city or municipal mayor may muster or incorporate the members of the agency or
agencies nearest the area of such disaster or calamity to help in the maintenance of peace and order,
prevention of crime, or apprehension of violators of laws or ordinance, and in the protection of lives
and properties. The deputized security guard shall receive direct orders from the Chief of Police of the
city or municipality for the duration of the emergency, disaster or calamity.

SECTION 2. Supervision of the PNP. The PNP shall exercise general supervision over the operators
of all security agencies and guards. In case of emergency or in times of disaster or calamities, the
Chief, PNP may deputize any security guard to assist the PNP in the performance of police duties for
the duration of such emergency, disaster or calamity. Licensed guards, who are actually assigned to
clients with Duty Detail Orders (DDO), shall be deputized by the Chief, PNP, and clothed with
authority to enforce laws, rules and regulations within his area of responsibility.

PART 2

SECTION 3. Security Guard Post Service. Private security guards shall perform personal service to
watch or secure private or public establishments or property, maintain peace and order and protect
lives of persons through any form of access control/denial, sentry operation, patrolling, establishing
reaction teams and the like provided that:
a. No Private Security Guard performing post service shall act or serve as bodyguard or
personal security escort of any person;
b. The private security guard shall always be in the uniform prescribed for guards on post,
specially when bearing firearms;
c. The services rendered are confined to the premises and/or property being secured;
d. Private Security Guards performing as security aides, or back-up/support of guards
performing Post Service, or performing electronic monitor/security system operation shall not
bear firearms and may not be required to use the prescribed uniforms of guards on post.

SECTION 4. Security Guard Conduction Service. Private security guards shall perform personal
service to watch or secure movable private or public property in transit like but not limited to
seafaring/ocean vessels, aircrafts, land-locked vehicles, or valuables/cash in transit using any means
of transportation except armored vehicles, provided that:
a. No Private Security Guard performing conduction service shall act or serve as bodyguard or
personal security escort of any person;
b. The private security guard must always be in uniform prescribed for guards on post service,
specially when bearing firearms.

10 Industrial Security Management Instructional Material


7 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

SECTION 5. Armored Vehicle/Guard Service. Private security guards shall perform security escort
service for the protection of large amount of cash or valuables through the operation of armored
vehicles, usually for deposit pick-up or delivery, provided that:
a. No Private Security Guard performing armored service shall act or serve as bodyguard or
personal security escort of any person;
b. The private security guard must always be in uniform prescribed for guards on armored
service, specially when bearing firearms;
c. Over and above the registration required of vehicles and operation of such under existing
transportation laws, all armored vehicles in the fleet of PSA/CGF armored service providers
shall be inventoried/reported with the PNP;
d. All security personnel performing armored vehicle operation shall have a specified training
and qualification requirement over and above the basic requirements for security guards;
e. Unless inconsistent with other laws or circulars, the minimum built requirement for armored
vehicles shall be of bullet-resistant materials capable of withstanding the effects of high-
powered firearms, provided with a vault, safe or partition wall with combination lock designed
in such a way that access to valuables/cash deposit into it is denied while in transit;
f. The minimum crew shall be composed of a vehicle operator preferably licensed security
guard and two (2) security personnel;
g. Private Security Armored Services providers to the banking and other financial system shall
conform with the requirements of the Banko Sentral ng Pilipinas (BSP);
h. The standards, requirements, organization, operation and training for private security
armored services shall be provided in an SOP issued by the Director, CSG.

SECTION 6. Investigation and Detective Services. Inherent to the provision of security services, all
PSAs, CGFs, GGUs, and PDAs may offer private investigative and detective services for the purpose
of assisting in gathering information leading to determination and/or prevention of criminal acts and/or
resolution of legal, financial and personal cases/problems, provided that:
a. Only licensed private detectives shall perform or render investigative and detective duties;
b. No PSA, CGF or, GGU shall provide or offer personal security protection service;
c. Only PDAs and licensed private detectives as qualified and trained, and explicitly/specifically
authorized by the PNP may render personal security protection services;
d. The standards, requirements, organization, operation and training for personal security
protection services shall be provided in an SOP/circular issued by the CPNP through the
recommendation of the Director, CSG in coordination with the PNP Directorate for
Operations, Directorate for Intelligence and Police Security and Protection Office.

SECTION 7. Electronic Security Systems and Services. Security Agencies in providing security
services may utilize scientifically designed electronic security systems like but not limited to the anti-
burglary, robbery, or intrusion alarms, closed circuit television recording and monitoring under the
following conditions:
a. Only trained licensed private security guards may operate electronic security systems;
b. PSAs offering the system shall be accountable for the legitimate registration and licensing of
these devices and their operators with the appropriate government agency;

SECTION 8. Other services. Requirements, standards, organization, operation and training for
services which are covered by this Rule, Rule III (definition of terms) and elsewhere in these rules and
regulations shall be prescribed in an SOP issued by the Director, CSG.

RULE XIII
POWERS AND DUTIES

SECTION 1. Territorial power - A security guard shall watch and secure the property of the person,
firm, or establishment with whom he or his agency has a contract for security services. Such service
shall not, however, extend beyond the property or compound of said person, firm or establishment
except when required by the latter in accordance with the terms of their contract to escort, or in hot
pursuit of criminal offenders.

10 Industrial Security Management Instructional Material


8 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

SECTION 2. Arrest by security guard. - A security guard, or private detective is not a police officer and
is not, therefore, clothed with police authority. However, he may effect arrest under any of the
following circumstances:
a. When, in his presence, the person to be arrested has committed, is actually committing, or is
attempting to commit an offence;
b. When an offense has just been committed and he has probable cause to believe based on
personal knowledge of facts and circumstances that the person to be arrested has committed
it; and
c. When the person to be arrested is a prisoner who has escaped from a penal establishment or
place where he is serving final judgment or temporarily confined while his case is pending or
has escaped while being transferred from one confinement to another (Section 6, Rule 113,
Rule of Court).

SECTION 3. Method of Arrest. - When making an arrest, the watchman, security guard or private
detective shall inform the person to be arrested of the intention to arrest him and cause of the arrest,
unless the person to be arrested is then engaged in the commission of an offense or after an escape,
or flees, or forcibly resists before the person making the arrest has opportunity so to inform him, or
when the giving of such information will imperil the arrest. (Section 10,lbid).

SECTION 4. Duty of security guard making arrest. -Any security guard making arrest, shall
immediately turn over the person arrested to the nearest peace officer, police outpost or headquarters
for custody and/or appropriate action, or he may without necessary delay and within the time
prescribed in Article 125 of the Revised Penal Code, as amended, take the person arrested, to the
proper Court of Law or judge for such action as they may deem proper to take. (Section 17, bid).

SECTION 5. Search without warrant. - Any security guard may, incident to the arrest, search the
person so arrested in the presence of at least two (2) witnesses. He may also search employees of
the person firm or establishment with which he is or his agency has a contract of private detective,
watchman or security services, when such search is required by the very nature of the business of the
person, firm or establishment.

SECTION 6. General Orders. - All security guards shall memorize and strictly keep by heart the
following general orders:
a. To take charge of the post and all company properties in view and protect/ preserve the same
with utmost diligence;
b. To walk in an alert manner during my tour of duty and observing everything that takes place
within sight or hearing;
c. To report all violations of regulations and orders I am instructed to enforce;
d. To relay all calls from posts more distant from the security house where I am stationed;
e. To quit my post only when properly relieved;
f. To receive, obey and pass on to the relieving guard all orders from company officers or
officials, supervisors, post in charge or shift leaders;
g. To talk to one except in line of duty;
h. To sound or call the alarm in case of fire or disorder;
i. To call the superior officer in any case not covered by instructions;
j. To salute all company officials, superiors in the agency, ranking public officials and officers of
Philippine National Police; and
k. To be especially watchful at night and during the time of challenging, to challenge all persons
on or near my post and to allow no one to pass or loiter without proper authority.

SECTION 7. Duty to Assist Law Enforcers - Any security guard shall be duty bound to assist any
peace officer in the pursuit of his bounding duty, when requested, provided it is within the territorial
jurisdiction of his (security officer) area of duty.

RULE XIV
REPORTS AND RECORDS
SECTION 1. Reports. The following reports shall be submitted:

10 Industrial Security Management Instructional Material


9 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

a. Guard/Firearm strength reports shall be rendered periodically in formats and procedures


prescribed by the Chief, Security Agencies and Guards Supervision Division (SAGSD)/ Chief,
Firearms and Explosives Division (FED), respectively, through the Regional Offices who shall
conduct periodic inspections within their areas of responsibility to verify the strength reports
furnished their respective offices.
b. Crime incident reports.
c. Other reports required shall be prescribed in appropriate orders, circulars or memoranda.

SECTION 2. Records and Files of Agencies. - The following records and files shall be maintained by
all private security agency, company security force and government security unit of offices and shall
be made available for inspection by the Chief, Philippine
National Police or his authorized representatives:
a. Prescribed monthly reports;
b. Current service contracts in individual folders chronologically arranged (for private security
agency only);
c. Alphabetically arranged individual folders of guards containing their personal bio-data using
the latest SAGSD Form 01-94, photocopies of licenses and other personal documents (i.e.
High School diploma, Pre-licensing certificate, etc.);
d. Individual records of offenses, SAGSD Form 13-94; Authenticated photo copy of record of
offenses shall support recommendations for revocation of licenses of undesirable incorrigible
security guards;
e. Property book, containing lists of firearms and other properties supported by proper
documentation;
f. Payroll/vouchers of payments;
g. Performance Report/records of conduct of security personnel; and,
h. Other records pertinent to the operation of the agency as maybe required.

RULE XV
INSPECTIONS

SECTION 1. Policy.
a. Periodic and non-periodic inspections shall be conducted on all Security Agencies (Private
Security/Detective Agency, Company Guard Force, Government Security Force), Security
Training Schools (Private Security Training Institutions) and Security and/or Training
Personnel.
b. Inspections shall be conducted based on the following:
1) Pre-Licensing Inspection – Periodic inspections conducted to determine compliance with
the provisions of R.A. 5487 prior to the issuance of License to Operate (LTO) a Security
Agency and/or Accreditation to operate a Security Training School.
2) Post-Licensing Inspection – Periodic and/or non-periodic inspections conducted during
the operation of Security Agencies and/or Security Training Schools to ascertain whether
the provisions of R.A. 5487 and its IRR are complied with, to ensure correction of
defects/violations noted, and to recommend to the operators appropriate measures to
improve their operations.

SECTION 2. Authority.
a. The Chief, SAGSD or his representative shall conduct the appropriate inspection hereto
prescribed.
b. Regional Directors of Police Regional Offices (PNP PROs), thru the Firearms, Explosives,
Security Agencies and Guards Section (FESAGS), within jurisdiction, shall conduct the
inspections
c. The Chief, PNP and/or the Director, PNP Civil Security Group (CSG) thru SAGSD, or their
authorized representatives, may authorize the conduct of inspections.

SECTION 3. Types of Inspections.


a. Post to Post Inspection – Inspection conducted on detailed/posted security guards to
determine proper compliance of regulations related to uniforms, general physical appearance,

11 Industrial Security Management Instructional Material


0 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

documentation and other requirements in the actual service of duty. This may also be an
inspection conducted as an aid to investigation.

b. Administrative Inspection (Office, Files and Records Inspection) – Inspection conducted to


determine compliance with records, files and other administrative requirements for operating
a security agency and/or exercising security profession.

SECTION 4. Procedures.
a. Organization for the Inspection
1) The inspection shall be composed of at least three (3) personnel organized as a team and
led by a Police Commissioned Officer.
2) The designation, functions and responsibilities of the inspecting team shall be organized
as follows;
One (1) PCO – Team Leader
One (1) Senior PNCO – Asst Team Leader/inspector-recorder
One (1) PNCO – Driver/inspector-evidence custodian
3) Members of the inspection team shall be in complete uniform with proper identification
and preferably using a marked/uniformed vehicle for easy identification, except however
during covert operation/inspection.
4) The inspection team shall be covered with the appropriate Letter Order with specified
purpose, destination and period of inspection, among others, duly signed by the following
or their authorized representative:
a) Chief, PNP
b) Director, CSG
c) Regional Director, Police Regional Office
d) Chief, SAGSD
b. Conduct of Inspection
1) Administrative Inspection
a) The inspection team shall introduce themselves to the operator or to his
representative available during the inspection, state the purpose of the inspection and
present the appropriate Letter Order (LO).
b) The inspection will be conducted by using the inspection checklist (PNP SAGSD form
# 9 and/or PNP SAGSD Training Inspection Checklist) as guide and may demand
other pertinent documents related to the purpose of the inspection.
c) Administrative defects/violations observed or noted, shall be reflected on
comments/findings portion of the inspection checklist. Separate inspection report
maybe rendered if deemed necessary.
d) Appropriate recommendations shall be likewise indicated at the portion provided in
the checklist.
e) The inspection team shall conduct exit briefing to ascertain acknowledgement of
defects by the operator and to recommend to the operator to institute appropriate
corrective measures.
f) If the inspection is a pre-licensing administrative inspection initiated by SAGSD, a
transmittal/endorsement shall be forwarded C, SAGSD together with the application
folder and the inspection checklist. If initiated at the Police Regional Offices, the
inspection report shall form part of the application to be transmitted to SAGSD.
g) In the event that defects/violations noted are penalized by fines under the IRR to RA
5487, as amended, procedures in Section 6 Rule XV (Disposition of Violations) of this
rule.
h) In the event that the result of inspection may serve as grounds for disapproval of
application or cancellation of LTO/accreditation, a formal investigation shall be
conducted. If initiated at the region, the FESAGS shall conduct the investigation prior
to endorsement to C, SAGSD.
2) Post to Post Inspection
a) Upon arrival at the post subject of inspection, the inspection team shall introduce
themselves to the duty guards or detachment commander, state the purpose of the
inspection, and present the appropriate letter order.
b) The conduct of inspection shall be with the purview of existing rules and regulations.

11 Industrial Security Management Instructional Material


1 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

c) Violations noted be reflected on the Violation Ticket Report (SAGSD form 13-94)
prepared in four (4) copies and distributed as follows original and one copy for
PNPSAGSD, one (1) copy for security personnel being inspected and one (1) copy
for the agency.
d) If the violation warrants confiscation of issued firearms, justification for confiscation of
firearms is under Rule VII, IRR of RA 5487. The serial number, make and caliber of
firearms shall be indicated at left side portion of Violation Report.
e) Issuance of violation ticket report shall be per guard violation basis.
f) The inspection team shall conduct exit briefing to the security personnel concerned to
ascertain acknowledgement and correction of defects noted and to recommend
appropriate measures to improve their services.
g) Confiscation of License to Exercise Security Profession may be effected particularly
those considered as falsified/faked.
h) Procedures in Section 6, Rule XV (Disposition of Violations) below shall apply when
violations and defects are penalized pursuant to the IRR to RA 5487, as amended.

c. Disposition of Confiscated Licenses, Documents and/or Firearms


1) Confiscations (particularly firearms) shall be effected only after properly informing the
concerned (licensee, holder, owner, and/or client) and after their acknowledgement.
2) All confiscations shall be appropriately documented (ie. inventoried and receipted) and
stored by the official office/unit custodian.
3) Likewise, disposition of all items, whether released or confiscated in favor of the
government, shall be appropriately documented.
4) Confiscated items shall be released upon presentation of proof of or upon confirmation of
legality of such document (in case of documents or licenses), or of proof of validity of
firearm license, SG license or DDO (in case of firearms), or upon payment/settling of
fines/penalties, as the case may be.

d. Coordination
1) SAGSD-initiated inspections conducted in the regions including NCR:
a) As a general rule or whenever feasible prior to the conduct of inspection, the
inspection team shall make a call and/or coordinate with the Police Regional Office
(Attn: ROPD) the inspection to be conducted by presenting the issued Letter Order,
and if necessary to make arrangements for appropriate counterpart assistance.
b) A corresponding exit/after inspection call should be made to the Police Regional
Office. Results of the inspection may be reported when follow-up and/or consequent
operation is needed or requested to be performed by the PNP PRO.

2. Police Regional Office-initiated inspections, conducted outside of its area of operations


(AOR)/jurisdiction:
a) Provisions of Section 4d, Rule XV above, shall similarly apply to inspections
conducted pursuant to Section 1b Rule XV, where inspections are necessitated
outside the AOR/jurisdiction of the initiating PNP PRO.

SECTION 5. Reports.
a. After Inspection Reports shall be prepared and submitted upon completion of the inspection
or within one (1) day after the period covering the inspection.
b. In event that the violation/s committed entail the imposition of corresponding fines and
penalties, the report shall be submitted to Chief, ROPD thru C, FESAGS (in case of PRO-
initiated inspections) or to Chief, SAGSD for approval, disapproval and/or enforcement.
c. Accomplished inspection checklists of Administrative Inspections and recommendations
thereof, should form part of the application for LTO or Accreditation.

SECTION 6. Disposition of Violations.


a. Administrative Inspection-related violations.
1) In compliance to procedural due process, Private Security Agencies with pending
violations shall be officially notified either thru registered mail or personal notice.

11 Industrial Security Management Instructional Material


2 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

2) The notice of appearance within seven (7) days as indicated in the acknowledged
Violation Ticket Report issued by the inspecting team shall serve as first formal notice
to the agency.
a) Acknowledging respondent.
(1) If respondent acknowledges violations/defects and penalties/ fines resulting
from the inspection, appropriate payment orders shall be issued and thereafter
proofs of payments be required to be presented to serve as proofs settlement
of penalty/fine.
(2) Copy of proofs of settlement shall form part of the respondent’s application for
LTO/Accreditation.
(3) Summary Report/Consolidated Report of settlement with reference to the prior
After Inspection Report shall be submitted to C, SAGSD for notation and/or
information. In case settlement resulted from PRO-initiated inspection, report
shall be submitted to the ROPD copy furnished RD, PRO (when required) and
C, SAGSD.
b) No-response respondent.
(1) In the event that the PSA concerned shall not comply to the first notice of
appearance the Inspection Section shall send a second notice of appearance
and direct the owner or his representatives of said agency to appear within
seven (7) days upon receipt of the notice.
(2) If the PSA concerned failed to comply on the second notice of appearance, the
Inspection Report including all the evidences (e, i, violation report confiscated
firearms, affidavit executed by the inspecting team members and other
pertinent documents) shall be submitted for formal investigation.
(3) At the onset of the investigation, a third and final notice shall be sent to PSA
concerned, with directive to appear within seven (7) days upon receipt.
(4) Thereafter, Rule XVI and Memorandum SOP on the Conduct of Investigation
shall ensue and be applied.
c) Contesting Respondent.
(1) In the event that a respondent questions the violation, penalty or fines
imposed, and/or any of the circumstances giving rise to such, and/or refuses to
submit under the sanction being imposed, the report shall be submitted for
investigation.
(2) Thereafter, Rule XVI (Investigation of Cases) and Memorandum SOP on the
Conduct of Investigation shall be applied.
b. Post-to-post Inspection-related violations.
1) Be it a Security Agency, Security Training School, Security or Training Personnel, the
procedures set forth in paragraph 7a above shall apply.

SECTION 7. Miscellaneous. The foregoing procedure/process is without prejudice to the filing of


appropriate criminal case when violation committed is penalized under Republic Act 5487 the Revised
Penal Code and other existing laws.

RULE XVI
INVESTIGATION OF CASES

PART 1
General
SECTION 1. Purpose. To ensure guidance and uniformity in the conduct of administrative
investigation involving security agencies, guards and training institutions, these rules shall set forth
the policies and specific procedures to be observed in the conduct of investigation of cases involving
Private Security Agencies, Company Guard Forces, Private Detective Agencies, Private Security
Training Institutions, Private Security Personnel and Private Security Training Personnel.

SECTION 2. Scope. These rules shall apply to all administrative complaints, violations of the laws,
rules and regulations and such other investigative matters cognizable by the PNP particularly SAGSD
and the Regional FESAGS as well as the right to administrative due process of both complainant and

11 Industrial Security Management Instructional Material


3 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

respondent in every administrative proceedings under Section 17 of Republic Act No. 5487, as
amended.

SECTION 3. Complaint.
a. It shall be written in clear, simple and concise language and in a systematic manner as to
apprise the respondent of the nature of the charge against him and to enable him to
prepare his defense.
b. How Initiated – It can be initiated by any of the following:
1. The Chief, PNP, Director, CSG, Regional Director or through their respective
representative through an Official Report or Memorandum showing the acts or
omissions allegedly committed;
2. The Chief, SAGSD, CSG or Chief, Regional FESAGS or any of their authorized
representative through an Official Report showing the acts or omissions arising from
the results of inspection conducted by any of the Branches or Sections of SAGSD,
CSG or Regional FESAGS; or
3. Upon sworn and verified complaint of any person, accompanied by sworn statements
of witnesses and other pieces of evidence in support of the complaint.
c. Contents of a complaint – The complaint shall contain:
d. Grounds for Filing the Administrative Complaint – Any act or omission in violation of the
Revised Rules and Regulations Implementing Republic Act No. 5487, as amended may
constitute a ground for filing the complaint.
1. the full name and address of the complainant;
2. the full name and address of the respondent as well as the position and office of
employment;
3. specification of charges; and
4. a narration of relevant and material facts which show the acts or omissions constituting
the offense allegedly committed by the respondent.
e. Venue – Any complaint may be filed with the Complaint and Investigation Section, SAGSD,
CSG for acts or omissions committed in the National Capital Region.

In all other cases, complaint shall be filed with the Regional FESAGS where the
complainant’s workplace or the respondent’s principal office is located.

PART 2
Conduct of Investigation
SECTION 4. Procedure.
a. Initial Evaluation – Within one (1) day upon receipt of the complaint, the Case/Investigating
Officer shall initially evaluate the complaint and shall recommend to the Chief, Complaint and
Investigation Section any of the following actions:
1. Dismiss outright the complaint for lack of merit or a prima facie case is found not to exist
or the complaint is insufficient in form and substance;
2. Refer officially to other government agency if the complaint falls under the jurisdiction of
DOLE, SSS or other forum;
3. Proceed with the investigation if a prima facie case is found to exist.
b. Notice – After the complaint has been determined to be the subject of appropriate summary
hearing, the Case/Investigating Officer shall notify the respondent of the complaint by
sending to him summons not later than three (3) days upon the filing of the complaint.
Respondent shall be required to appear before the Case/Investigating Officer not later than
five (5) days upon receipt of the notice or summons, during which he shall be furnished
copies of the complaint, sworn statements of the witnesses and other pieces of evidence.
c. Answer/Reply – Within five (5) days from receipt of copies of the complaint, sworn statement
of witnesses and other pieces of evidence, the respondent shall forthwith submit his answer
or reply consisting of his counter-affidavit, sworn statement of witnesses and other
controverting evidence.

SECTION 5. Administrative Adjudication, How Conducted


a. If, on the basis of the sworn statements and the pieces of evidence presented by both parties,
the Case/Investigating Officer finds no sufficient cause to warrant further proceedings, the

11 Industrial Security Management Instructional Material


4 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

complaint may outright be dismissed. Otherwise, he shall send, within three (3) days,
summonses to all parties and their witnesses for a preliminary conference on a specific date
and time not to exceed five (5) days therefrom with the end in view of arriving at an amicable
settlement, or of simplifying the issues, marking of evidence and stipulation of facts.
b. If the Case/Investigating Officer believes that there are matters to be clarified, he may
profound clarificatory questions, or may set a summary hearing on a specific date and time
not to exceed five (5) days therefrom.
c. If respondent fails to file his answer/reply with the reglamentary period, he shall be deemed to
have waived his right to present controverting evidence, and the case shall immediately
proceed ex-parte.
d. Being summary in nature, direct examination of witnesses shall be dispensed with and the
sworn statements of witnesses shall take the place of their oral testimony subject to cross-
examination. Either party shall limit cross-examination to the sworn statements on hand.
Cross examination must be confined only to material and relevant matters contained in the
sworn statements. Prolonged arguments and other dilatory proceedings shall not be
entertained. Cross examination shall be limited to not more than fifteen (15) minutes for each
witness.
e. On agreement of parties, direct or cross examination may be dispensed with and instead, the
parties may just submit their verified position papers or memoranda within then (10) days
upon such agreement, afterwhich the case is deemed submitted for resolution.

SECTION 6. Nature of Proceedings – The administrative proceedings shall be nonlitiguous in nature,


subject to the requirements of due process of law. The technical rules of criminal or civil procedure,
and the rules obtaining in the courts of law shall not apply. The Case/Investigating Officer may avail
himself of all reasonable means to ascertain the facts of the case, including ocular inspections and
testimony of expert witnesses.

SECTION 7. Resolution.
a. Within ten (10) days after the conclusion of the summary hearing or transmission of position
papers or memoranda, the Case/Investigating Officer shall submit the Resolution together
with the complete records of the case to Chief, SAGSD, CSG for his approval, in cases filed
in the National capital Region, and to Chief, Regional FESAGS for his approval, in cases filed
in the other regions. Once approved, the said Resolution shall constitute the decision in the
case. Copies thereof shall be served to all parties within five (5) days upon approval of the
resolution.
b. Contents of Resolution – Resolutions shall be clear and concise, and shall include the
following:
1. facts of the case
2. issues involved
3. applicable laws, rules and regulations
4. findings and conclusions
5. disposition thereof
c. Service of Resolution – The Resolution shall be served either personally or by registered mail
at complainant and respondent’s place of business or at his last known address within three
(3) days from approval thereof. In all cases, proof of such service shall be attached to the
records of the case for purposes of determining jurisdiction in case of appeal.

SECTION 8. Penalties – In meting out penalties, like penalties shall be imposed for like offenses. One
penalty shall be imposed for every charge or count in each case. “Each case” shall mean one
administrative case which may involve one or more charges or counts.

SECTION 9. Motion for Reconsideration – Either party may file a motion for reconsideration within ten
(10) days from receipt of a copy of the approved Resolution. Only one (1) motion for reconsideration
is allowed which shall be resolved within five (5) days from the filing thereof.

SECTION 10. Appeal.


a. Grounds for Appeal – Should the motion for reconsideration be denied, either party may file an
appeal with the Director, CSG, in cases resolved by Chief, SAGSD,

11 Industrial Security Management Instructional Material


5 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

a. CSG, or with the Regional Director, in cases resolved by the Regional FESAGS, on any of the
following grounds:
1. That new and material evidence has been discovered which the appellant could not, with
reasonable diligence have discovered and produced at the summary hearing, and which
if presented would probably change the resolution;
2. That errors of law or irregularities have been committed during the hearing prejudicial to
the substantial rights of the appellant;
3. That the penalty imposed is not commensurate to the offense committed.
b. Perfection of Appeal – An appeal shall be perfected by the appellant by filing and serving
upon the Chief, SAGSD-CSG or Chief, FESAGS a Notice of Appeal within ten (10) days from
receipt of the Resolution subject of appeal. Within three (3) days upon receipt of the notice of
appeal, the entire records of the case, duly numbered and initialed, and the exhibits properly
marked, to include the summary record of proceedings shall be sent to the appellate
authority.
c. Period to Decide Appeal – The appellate authority shall decide the appeal within thirty (30)
days after the receipt of the entire records of the case from the Case/Investigating Officer.
Failure of the appellate authority to decide the appeal within that period shall be deemed as
denial of such appeal, and the resolution appealed from shall immediately become final and
executory.

SECTION 11. Separability Clause. In the event that any of the provisions of this Rule is declared
legally unenforceable, the validity of the other provisions shall not be affected by such declaration.

RULE XVII
ADMINISTRATIVE SANCTIONS

PART 1
General
SECTION 1. Policy. Corollary to Section 2 Presidential Decree 1919 dated 28 April 1984, the Chief,
PNP or his authorized representative may impose, after confirming any violation of republic Act 5487,
its amendments and implementing rules and regulations, the penalty of suspension, or cancellation of
the license/accreditation of any private/government security or training personnel; provided that in
cases of violations committed by any private security/detective agency, company guard force or
private security training institution, the administrative penalty which may be imposed shall only be
administrative fine or cancellation of license without prejudice to any criminal action against the
violator.

SECTION 2. Purpose. The purpose of these rules and regulations is to rationalize the schedule of
administrative penalties as provided in Section 8 of RA 5487,as amended.

PART 2
Sanctions Against Licensed Security Personnel

SECTION 3. Classification of offenses. - The following terms shall be construed to mean as indicated
which shall likewise refer to the individual person as private security or security training personnel:
a. Light Offenses shall include, but not limited to:
(1) those related to uniforms except those falling under paragraph c(1) hereunder;
(2) use of profane languages;
(3) acts of discourteousness;
(4) failure to notify/call the nearest PNP Station in case of disorders, riots or strikes and other
emergency cases;
(5) late or failure to maintain and/or submit records/reports;
(6) violation of Section 1, Rule X of these rules and regulations otherwise not specifically
falling under this and paragraphs b and c of this rule; and
(7) all acts prejudicial to good conduct, behavior, morals and similar acts, pursuant to existing
laws, rules and regulations.
b. Less grave offenses shall include, but not limited to:

11 Industrial Security Management Instructional Material


6 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

(1) not having in possession his/her license to exercise profession, duty detail order and/or
firearms license (when carrying firearms), while performing private security service;
(2) use of uniform not appropriate for one’s ranks or position;
(3) leaving his post without being properly relieved, thus exposing the lives and properties he
is supposed to protect from danger;
(4) indiscriminate firing of firearm not in connection with the performance of duty;
(5) other similar offenses pursuant to existing laws, rules and regulations.
c. Grave offenses shall include, but likewise not limited to:
(1) Using uniform other than that prescribed under these rules;
(2) using personally owned or unlicensed firearm during tour of duty;
(3) allowing the use/lending issued firearms to unauthorized persons;
(4) assisting, abetting or protecting criminals during or off duty;
(5) providing confidential information to unauthorized persons;
(6) refusal to provide information to authorized persons;
(7) illegal search;
(8) taking alcoholic beverages or being drunk while on guard duty;
(9) abuse or acting beyond the scope of authority;
(10) misrepresentation in the submission of documents for renewal of license;
(11) other similar offense pursuant to existing laws, rules and regulations.
d. Fake License - a document issued by and/or secured from sources other than the SAGSD.

SECTION 4. Penalties. - Without prejudice to the filling of the appropriate criminal action, the following
penalties shall be imposed after investigation of any private security personnel, thereafter found guilty
of committing any of the offenses previously enumerated in Section 3 of this rule:
a. For light offenses. - One (1) to thirty (30) days suspension or a fine ranging from one
hundred pesos minimum to five hundred pesos maximum (P100.00- P500.00) or both;
b. For less grave offenses. - One (1) month and one (1) day to six (6) months suspension or a
fine ranging from five hundred pesos minimum to one thousand pesos maximum (P500.00-
P1, 000.00) or both; and
c. For grave offenses. - Six (6) months and one (1) day to one (1) year suspension or a fine
ranging from ten thousand (P10, 000.00) pesos minimum to fifty thousand pesos maximum
(P50, 000.00) or both, and/or cancellation of license/permit.

SECTION 5. Status during suspension. - Unless dismissed by his employer agency on legal grounds,
a security guard who is suspended pursuant hereto shall not be entitled to receive his salary
corresponding to the period of suspension. The agency in this case shall provide a substitute guard to
man the post of the suspended guard in order not to prejudice the interest of its client. Provided, that
the service of the substitute guard shall be good only during the period of such suspension.

SECTION 6. Any private security personnel who commits the same offense as
enumerated in Section 3 above, after having been suspended for least three (3) times
within the lifetime of his license shall be cancelled

PART 3
Sanctions Against Private Security Agencies, Private Detective Agencies, Company Guard
Forces, and/or Training Institutions

SECTION 7. The authority of the Chief, PNP to impose administrative penalties or cancel, suspend or
not to renew the license of any private security/detective agency, company guard force, and/or private
security training institutions shall be exercised in the following cases without prejudice to the filing of
appropriate criminal action:
a. When a falsified license is officially submitted by a private security agency to its prospective
client in bidding or contracting for security services.
b. When a falsified document or report is submitted to the Philippine National Police as
requirement for new or renewal of license to operate a private security agency, company
security force or training institutions.

11 Industrial Security Management Instructional Material


7 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

c. When a private security agency or company security force has been found to be violating the
minimum wage rates fixed by law that should be granted to their private security/company
guards.
d. When the private security agency or company security force has been found to be engaging
in activities that are dangerous to public safety and welfare or inimical to national security.
e. When a private security agency or company security force refuses to comply with the final
and executory NLRC order/decision. This will be a ground for immediate revocation of license
to operate.
f. Violation of the following Rules and Regulations:
1. Section 2b and 4, Rule I
2. Sections 3a, 3b, 3c and 3h, Rule IV
3. Sections 1 and 2, Rule IV
g. When a private security agency has been found to have engaged in cutthroat security
services with its client or a price lower than the standard minimum rates for security services
adopted by Philippine Association of Detective and Protective Agency Operators, Inc., with
the concurrence of the Chief, Philippine National Police. A penalty of administrative fines shall
be imposed upon such erring Private Security Agency in the amount of twenty thousand (P20,
000.00) for the first offense; forty (P40, 000.00) for the second offense and cancellation of
license to operate for the third offense. In case of fines, the erring PSA shall not be allowed to
serve the questioned client. PSA Operators whose licenses has been cancelled under this
rule shall be barred from obtaining another LTO.
h. When a private security agency has been found to have violated Section 4, Rule VII, a
penalty of administrative fines shall be imposed upon such erring Private Security Agency in
the amount of twenty thousand (P20, 000.00) for the first offense; forty (P40, 000.00) for the
second offense and cancellation of license to operate for the third offense.
i. When a private security agency has been found to have violated Section 3C(g), Rule X, a
penalty of administrative fines shall be imposed upon such erring Private Security Agency in
the amount of twenty thousand (P20, 000.00) for the first offense; forty (P40, 000.00) for the
second offense and cancellation of license to operate for the third offense. In case of fines,
the erring PSA shall not be allowed to serve the questioned client. PSA Operators whose
licenses has been cancelled under this rule shall be barred from obtaining another LTO.
j. When a private security agency with regular license to operate fails to maintain a minimum of
two hundred (200) security guards at the time of renewal of its license, the agency concerned
shall be issued temporary license with an administrative fine in the amount of ten thousand
(P10, 000.00) pesos only.
k. Violation of the provisions of Rule XVIII by private security personnel is punishable by
suspension or cancellation of their individual private security licenses and/or licenses of their
respective company security force or private security agencies.

SECTION 8. The following administrative fines shall be imposed on any private security agency or
company security force found committing the following offenses:

OFFENSE FINES
a. Improper wearing of prescribed uniform 1. P100.00 per guard for 1st offense;
by Posted Security Personnel 2. 250.00 per guard for 2nd offense;
3. 500.00 per guard for 3rd offense.
b. Posted security guard not carrying his - do -
ID, Private Security License, Firearms
License and Duty Detail Orders.
c. Posted security personnel not covered - do -
by written contract for security services
d. Imposing and collecting unauthorized - do -
deductions from the salary of their
security guard.
e. Failure to submit application and P 250.00 plus P 50.00 for every day delay if
requirements for the renewal of license filed before expiration of LTO;
on prescribed date. An addition of P500.00 plus P100.00 for every
day delay not to exceed sixty (60) days, if filed
11 Industrial Security Management Instructional Material
8 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

after expiration of LTO

SECTION 9. Classification of offenses. Except in cases already specifically provided in this rule the
following term shall be construed to mean as indicated:
f. Light Offenses committed by private security agency or company security force shall include,
but not limited to:
1) late or failure to maintain and/or submit records/reports;
2) Posting security personnel not covered by written contract;
3) Other similar offense pursuant to existing laws, rule and regulations.
g. Less grave offense committed by private security agency or company security force shall
include but not limited to:
1) ordering its posted security guards to conduct illegal search;
2) posting unlicensed personnel for duty;
3) posted personnel not wearing the prescribed uniform;
4) other similar offense pursuant to existing laws, rules and regulations.
h. Grave offense committed by private security agency or company security force shall include,
but not limited to:
1) Allowing the set of unlicensed firearm personally owned by security guard or other person
or entity than that of the private security agency having jurisdiction of the place being
secured;
2) Issuing unlicensed firearm to guards;
3) Violation of Sec. 3 h, Rule IV of this implementing rules and regulations regarding
prohibition on “Kabit” system;
4) Abuse or acting beyond the scope of authority;
5) Use and/or employment of security guard for purposes of committing threats, intimidation,
coercion or any other crime/offenses, including show of force.
6) Violation of Sections 3A, 3B, and 3C of Rule X;
7) Other similar offense pursuant to existing laws, rules and regulations

SECTION 10. Penalties. Without prejudice to the filing of appropriate criminal action, and except as
already provided by this rule the following penalties shall be imposed after investigation of any guard
or detective, private security guard agency or company security force and thereafter found guilty of
committing any of the offenses enumerated in Section 9 hereof:
a. For light offense committed by Private Security Agency/Company Security Force:
1) Fine of P5, 000.00 for first offense;
2) Fine of P10, 000.00 for 2nd offense;
3) Fine of P15, 000.00 or cancellation/revocation of License to Operate, or both for 3rd
offense
b. For less grave offense committed by Private Security Agency/Company Security Force:
1) Fine of P10, 000.00 for 1st offense;
2) Fine of P 20, 000.00 for 2nd offense;
3) Fine of P30, 000.00 or cancellation/revocation of license to operate, or both for 3rd
offense;
c. For grave offense committed by Private Security Agency/Company Security Force:
1) Fine of P50, 000.00 for 1st offense;
2) Cancellation/revocation of license to operate for 2nd offense.

SECTION 11. Any private security agency or company security force who commits the same offense
as enumerated in Section 8 hereof, after having been fined at least three (3) times shall be proceeded
against thru administrative cancellation or non-renewal of mits license.

RULE XVIII
DUTIES DURING STRIKES AND LOCKOUTS
SECTION 1. Policies.
All private security personnel in direct confrontation with strikers, marchers, or demonstrators shall not
carry firearms. They may, at best, carry only night sticks (batuta) which may or may not be provided
with tear gas canister and dispensers.

11 Industrial Security Management Instructional Material


9 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

a. Private security personnel of strike-bound establishments not in direct confrontation with the
strikers may carry in the usual prescribed manner their issued firearms.
b. Private security personnel shall avoid direct contact, either physically or otherwise, with the
strikers.
c. Private security personnel shall stay only within the perimeter of the installation which they
are protecting at all times.
d. Private security personnel, in protecting and securing the assets and persons of their clients,
shall use only sufficient and reasonable force necessary to overcome the risk or danger
posed by strikers or hostile crowds.
e. Private security personnel shall refrain from abetting or assisting acts of management leading
to physical clash of forces between labor and management. These hostile acts include
breaking of the strike; smuggling in of scabs and preventing strikers from conducting peaceful
pickets.
f. Private security personnel shall not enforce the provisions of the Revised Labor Code
pertaining to strikers/lockouts.
g. Private security personnel on duty must at all times be in complete uniform with their names
and agency’s name shown on their shirts above the breast pockets.

SECTION 2. For Private Security Agencies/Company Security Force Chief Security


Officers. –
a. Upon declaration of a strike, or upon the establishment of a picket line or mass action at the
vicinity of a firm/establishment, the Detachment
a. Commander or the Chief Security Officer of the company guard force, shall immediately
collect all firearms of the guards in direct or about to have a direct confrontation with the
crowd and deposit these firearms in their vault; or reissue these firearms to other private
security personnel not issued firearms but assigned to and performing guard duties away
from and not visible to strikers or the crowd as may be required by the circumstances.
b. The Detachment Commander or Security Director shall account for all the firearms in a
logbook.
c. In instances where there is no Detachment Commander or Security Director, as in a
compound where there are only a few guards, the agency operator or Security Officer in the
case of company security forces, shall immediately be informed by the guards of the
declaration of strike or about the approach of strikers or a crowd; whereupon the agency
operator/security officer shall immediately assess the situation and take appropriate action to
forestall violence, but at the same time insuring security of the premises.
d. The Detachment Commander or Security Director shall maintain constant contact with the
management and if he notices or observes the strikers or the crowd to be up to something
unlawful, or are clearly violating the provisions of the Revised Labor Code, the Revised Penal
Code and/or local ordinances, this information to the Commander of the Peace Keeping
Force for his appropriate action.
e. If it becomes unavoidable for private security personnel to talk to strikers or member of the
crowd, only the Detachment Commander or Security Director shall talk to the leader or
leaders of the strikers or crowd. What transpires in this dialogue shall be reported to the
management immediately. At no instances shall private security personnel negotiate with the
strikers or unfriendly crowd in relation to the labor-management dispute. This is a function of
management.
f. If the situation worsen or becomes untenable for the private security personnel to cope with,
the Detachment Commander or Security Director, the guard on post, shall immediately advise
the management to request for PNP security assistance.
g. The Detachment Commander and Security Director shall publish emergency telephone
numbers (Police, Fire, Hospital) at all guards posts and detachments.

SECTION 3. Inter-relationship between Private Security Personnel and members of the


PNP –
a. Private Security personnel are always subordinate to members of the PNP on matters
pertaining to law enforcement and crime prevention. They cannot enforce any provision of the
law except in executing citizen’s arrest and/or conducting initial investigation of a commission

12 Industrial Security Management Instructional Material


0 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

of a crime. In such case, any arrested person shall be turned over immediately to the nearest
PNP unit/station.
b. Criminal investigation is the responsibility of the PNP. All results of initial investigation
conducted by private security personnel and all evidence gathered by them shall be turned
over to the PNP unit/station concerned as a matter of course without delay.
c. Responsibilities of Private Security Personnel:
1. Private security personnel are responsible purely for enforcing company policies, rules
and regulations of management and clients with the ultimate objective of providing
security to the assets and persons of clients.
2. Private security personnel are authorized and empowered by law to act as such and in
the manner prescribed by the Chief, PNP on within their specifically assigned areas to be
secured, as provided for in the contract between the client and the private security
agency, and, in the case of company security services, as specifically stated in their
private security firm licenses.

SECTION 4. Punitive Clause. Individual acts of private security personnel in violation of the provisions
of appropriate laws shall be subject to criminal prosecution, administrative penalties and such other
sanctions provided by law.

RULE XIX
FORMS, SEALS AND LOGOS
SECTION 1. Types of forms and usages. (Valid until revised.)
1. SF01-94 Application for License of Individual Security Guard.
2. SF02-94 Application for License of Private Security Agency and Private Detective
Agency.
3. SF03-94 Individual License Form/ID.
4. SF04-94 Format License to Operate of Security Agency.
5. SF05-94 Information Sheet/ Bio data of Agency Operators.
6. SF06-94 Training Report Forms (Before conducting the Training of Security Guard).
7. SF07-94 After Closing Report Form (submission of names & number of security
participated).
8. SF08-94 Format of Psychiatrist’s endorsement Letter - for PSA who passed NP
9. Examination.
10. SF09-94 List of new PSL Applicants who passed NP examination.
11. SF10-94 Result of Psychiatrist’s Examination addressed to Chief, PNP SAGSD.
12. SF11-94 I n spection Report Form.
13. SF12-94 Format for Duty Detail Order of PSA/CSF.
14. SF13-94 Delinquency Report

SECTION 2. Use of letterhead, - All Private Security Agencies/Company Security Forces shall use
letterheads in all forms of communications and official transactions.

SECTION 3. Logos and Company Seals/Emblems. Private Security Agencies, Company Guard
Forces and Private Security Training Institutions, shall have their respective company/office logos,
seals or emblems distinct from each other, provided that same shall have been registered and
approved by the PNP SAGSD.

SECTION 4. Changes and Modifications. Changes, modifications and/or additions relative to Sections
1, 2 and 3 above shall be made through a Logos, Seals and Forms Board to be created by SAGSD,
for recommendation to the Director, CSG for acceptance/adoption.

RULE XX
AWARDS AND DECORATIONS OF SECURITY PERSONNEL

SECTION 1. Types/awards - All security guards are entitled to the following awards for their
outstanding feat/ accomplishment /achievement during the performance of their duties and/or while
serving in the exercise of profession.
d. Medalya ng Kagitingan (Blueguards Medal of Valor).

12 Industrial Security Management Instructional Material


1 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

e. Medalya ng Katapatan sa Paglilingkod (Blueguard Distinguished Service Medal).


f. Medalya ng Katapangan (Blueguards Bravery Medal).
g. Medalya ng Pambihirang Paglilingkod (Blueguards Special Service Medal
h. Medalya ng Kadakilaan (Blueguards Heroism Medal).
i. Medalya ng Katangitanging Asal (Blueguards Special Action Medal).
j. Medalya ng Kasanayan (Blueguards Efficiency Medal).
k. Medalya ng Papuri (Blueguards Commendation Medal).
l. Medalya ng Sugatang Magiting (Blueguards Wounded Medal).
m. Medalya sa Pagtulong sa Nasalanta (Blueguards Disaster Relief and Rehabilitation Medal).
n. Letter of Commendation.

SECTION 2. Description of action required of the above-mentioned awards:


a. Medalya ng Kagitingan (Blueguards Medal of Valor) can be awarded to any Blueguards
whose performance and action falls under para. 1 and/or 2 below:
(1) Action of the Blueguard involving conspicuous gallantry and intrepidity ignoring the risk of
life and limb above and beyond the call of duty. In order to justify this award, a Blueguard
must perform conspicuously in deed and in action personal bravery and self-sacrifice
above and beyond the call of duty as to distinguish himself clearly from his comrades in
performing hazardous service.
(2) Blueguards who participated in rescue in any fire incident, disaster, calamity or
earthquake whose actions involve actual rescue operation, characterized by gallantry and
intrepidity at the risk of life and limb above and beyond the call of duty. In order to justify
this award, a Blueguard must have saved or attempted to save lives and properties
characterized by personal bravery, courage, heroism or self-sacrifice above and beyond
the call of duty as to distinguished himself above his comrades in the performance of
more than ordinary hazardous service.
b. Medalya ng Katapatan sa Paglilingkod (Blueguards Distinguished Service Medal) can be
awarded to any member of the Blueguards whose action and performance either fall under
para. a or b below:
(1) It can be awarded to any Blueguard who has rendered eminently meritorious and
invaluable service in the position of major responsibility. The performance of duty must
be exceptional. A superior performance of duty normal and relative to assignment,
position and experience of an individual is not an adequate basis for the award.
(2) The accomplishment of the duty, which has to be exceptional or significant should have
been completed prior to submission of the recommendation.
c. Medalya ng Katapangan (Blueguards Bravery Medal). It can be awarded to any Blueguard
member with the following requirements;
(1) For gallantry of the Blueguards action not warranting the Medalya Ng Kagitingan nor
Medalya ng Katapatan sa Paglilingkod.
(2) For Blue guard members who participated on rescue operations in a fire incident, car
accident, earthquake, flood, typhoon and other disasters/calamities and whose acts of
heroism has put his life in extreme danger in his desire to save the lives of others.
d. Medalya ng Pambihirang Paglilingkod (Blueguards Special Service Medal).

The President of the Philippine Association of Detective and Protective Agency Operators,
Inc. (PADPAO) in Consonance with the Resolutions of the Board of Director, can award the
medal to any member of the civilian government such as parliamentarians, statement,
diplomats, journalists, scientists and any member of the Philippine National Police holding
them and respectable position and whose contribution and accomplishments greatly
enhanced the development and professionalism of the Civil Security Industry.

The four (4) degrees of the Medalya ng Pambihirang Paglilingkod with the corresponding
requirements are the following:
(1) Degree of Raja - It can be awarded to any member of the legislative and the judiciary to
include jurists, parliamentarians, statesmen, diplomats, journalists, scientists and the
Director General of the Philippine National Police who has rendered eminently
meritorious and invaluable service in undertaking a major responsibility leading to the
development and professionalization of the Civil Security Industry. A superior

12 Industrial Security Management Instructional Material


2 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

performance of normal duties based on one’s position will not be made a justification to
the award.
(2) Degree of Datu - It can be awarded to any of the Regional Directors and/or any of the
Directors of the National Supporting Unit or Command of the Philippine National Police
who has rendered eminently meritorious and invaluable service leading to the
development of the Civil Security Industry and contributed professional assistance while
in a position of major responsibility which has a lesser degree of category and not
warranting the award of the degree of Raja.
(3) Degree of Lakan - It can be awarded to any officer of the Philippine National Police and
the Armed Forces of the Philippines who has distinguished himself thru exceptional
meritorious conduct in the performance of outstanding service in the development of the
Civil Security Industry.
(4) Degree of Maginoo - It can be awarded to any member of the PNP, Armed Forces of the
Philippines and other government law enforcement agencies who has distinguished
himself thru exceptional meritorious conduct and outstanding service that contributed in
the making, developing and professionalizing the Civil Security Industry but in a lesser
degree of category not warranting the award of the degree of Lakan. For meritorious
service of the greater value, the Blueguards Efficiency Medal is usually awarded.
e. Medalya ng Kadakilaan (Blueguards Heroism Medal). It can be awarded to any Blueguard
member whose action and performance fall under para. 1 and 2 below:
(1) An act of heroism that involves actual conflict with criminal elements either in actual duty
or beyond the relief of posted duty.
(2) An act of heroism shown or performed in rescue operations, saving the lives and
properties of any person or persons who are victims of criminal elements and natural
calamities or fortuitous events such as fire, earthquake, flood, typhoon and other
disasters.
f. Medalya ng Katangiang Asal (Blueguards Special Action Medal). It can be awarded to any
Blueguard member in any of the categories with corresponding requirements as follows:
(1) Raja - for heroic act performed by Blueguard member in actual conflict with criminal
elements during a crime incident or to save the lives and limbs of any person or persons
in case of a fire incident which would conspicuously distinguish himself thru gallantry and
intrepidity notwithstanding the risk of life which is above and beyond the call of duty.
Such deed of bravery and self-sacrifice must be clearly visible so as to distinguish
himself from other Blueguard members.
(2) Datu - for conspicuous acts of courage and gallantry confronting armed enemy in a crime
situation or life saving and fire fighting in a fire situation not warranting the Medalya ng
Katangitanging Asal degree of Raja. He must perform a notable act of heroism involving
risk of life as to set him apart from other members.
(3) Lakan - For gallantry in action in a crime of fire situation not warranting the Medalya ng
Katangitanging Asal degree of Raja or Datu. It can be awarded to recognize a
meritorious service accomplished with distinction by any person or persons either in a
duty responsibility or in direct support to PNP Station.
(4) Maginoo - For gallantry in action not warranting the Medalya ng Katangitanging Asal
degree of Raja, Datu or Lakan.
g. Medalya ng Kasanayan (Blueguards Efficiency Medal). It can be awarded to any member of
the blueguards for meritorious and invaluable service rendered. The performance of duty
must be in such a way as to merit recognition by an exceptional service. The superior
performance of the normal duties as called for by the position is not alone justification of the
award.
h. Medalya ng Papuri (Blueguards Commenda-tion Medal). It can be awarded to any member of
the Blueguards who has demonstrated exemplary efficiency, devotion and loyalty to his duty
assignments.
i. Medalya ng Sugatang Magiting (Blueguards Wounded Medal). It can be awarded to any
member of the Blueguards in the actual performance of duties. It requires that said member
must have been wounded in action in his fight against criminal elements or from a direct
assault of the enemy, or wounds caused by fire in a fire fighting activity. Provided, however,
that such wounds would necessitate treatments by a medical officer. For this purpose, a

12 Industrial Security Management Instructional Material


3 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

“wound” is hereby defined as an injury to any part of the body sustained due to a hostile act of
an enemy on in quelling a fire.
j. Medalya sa Pagtulong sa Nasalanta (Blueguards Disaster Relief and Rehabilitation Medal). It
can be awarded to any member of the Blueguards with the requirement that there should be
an active participation of such member in an undertaking that involves rescue/ relief and
rehabilitation operations in relation to disasters of fortuitous events such as typhoons, flood,
earthquakes, conflagration and other calamities.
k. Letter of Commendation - any good activity done by any security guard officer.

SECTION 3. Authority to Grant Award - The following are authorized to approve/issue awards:
a. Medalya ng Kagitingan - Secretary of the Interior and Local Government.
b. Medalya ng Katapatan sa Paglingkod - Chief, Philippine National Police.
c. Medalya ng Katapangan - Chief, Philippine National Police.
d. Medalya ng Pambihirang Paglilingkod - Regional Director, PNP Police Regional
Office/Director, Civil Security Force Office.
e. Medalya ng Kadakilaan - Regional Director, PNP Police Regional Office/ Director, Civil
Security Group.
f. Medalya ng Katangi-tanging Asal - Regional Director, PNP Police Regional Office/Director,
Civil Security Group.
g. Medalya ng Kasanayan - Regional Director, PNP Police Regional Office/ Director, Civil
Security Group.
h. Medalya ng Papuri - Provincial Director, PNP Provincial Office/Chief, SAGSD/ CSG Regional
Office Directors.
i. Medalya Sa Pagtulong sa Nasalanta - Provincial Director, PNP Provincial Office/Chief,
SAGSD/ CSG Regional Office Directors.
j. Letter of Commendation - PSAs/ CGFs Operators/ Managers concerned.

SECTION 4. Description of Medals - The aforementioned medal are described in Figure.

SECTION 5. Wearing of Medals - All security guard who are recipients of awards shall wear them as
part of their uniform and miniature thereof, and shall be worn of the above left pocket of the uniform.

SECTION 6. Special Award - A Private Security Agency/Company Security Services/ Government


Security Unit selected as Outstanding Agency the SAGSD, CSG or by the NHQ, PNP shall be
authorized to wear the Chief, PNP agency citation badge. Such badge shall be worn also as part of
the uniform in a miniature type of the security personnel.

SECTION 7. The categories for recognition of the Most Outstanding Blueguards, Private Security
Agency and Company Guard Forces of the Year are the following.
a. Male Blueguard of the Year.
b. Female Blueguard of the Year.
c. Private Security Agency of the Year.
d. Company Guard Force of the Year.

SECTION 8. The categories for recognition of the Most Outstanding Blueguards Training School are
the following:
a. Pre-Licensing Trainee Graduates
b. Blueguards Trainee Graduates
c. Outstanding Blueguards Training School.

SECTION 9. Determination of Awards - Awards shall be determined by a committee created for the
purpose to be designated by D, CSG in coordination with PADPAO. Prospective awardees shall be
duly recommended by the PSA/CGF concerned.

RULE XXI
PHYSICAL AND MENTAL EXAMINATIONS
SECTION 1. General Policy.

12 Industrial Security Management Instructional Material


4 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

a. Physical and Mental Examination are requirements for application for license to exercise
security/security training profession or license to operate a security/training agency, company
guard force, or private detective agency.
b. All applicants for license should be certified as physically and mentally fit and qualified to be
licensed.

SECTION 2. Physical Examination.


a. Physical Examination shall be conducted by any licensed doctor practicing within the
Philippines. All applicants examined to be fit shall be issued by said medical practitioner a
certificate indicating that the applicant is physically fit to be licensed.
b. The Medical Practitioner must use only the prescribed format for Physical Examination, both
in original and renewal of license.
c. This accomplished format will be submitted together with all of the other requirements of
licensing.

SECTION 3. Neuro-psychiatric Examination.


a. NP Examination shall be conducted by the PNP Accredited NP Testing Center.
b. All private security agencies and company guard forces MUST retain the services of a duly
PNP Accredited NP Testing Center. Individual applicants must also take Neuro-Psychiatric
Examination from any PNP Accredited NP
a. Testing Center.
b. Neuro-Psychiatric Examination shall be conducted to all private security personnel at least
sixty (60) days prior to the expiry month of the license.
c. The PNP Accredited NP Testing Center shall conduct a different set of examination to new
applicants and renewal of security license in determining their fitness for retention to the
position as position as security officer, guard or operator. (The purpose of NP Clearance
Requirement is to attest to the mental and psychological well-being of the applicants. A
battery of psychological tests will help determine this purpose).
d. NP Examination Result as indicating that the applicant is psychologically fit to be licensed,
shall be one of the requirements for license application, be it new or renewal.

SECTION 4. Drug Test. Consistent with laws and/or circulars existing at the time of the formulation of
these rules and regulations, no license to operate a private security/training/detective agency or
company guard force, or license to exercise private security profession shall be granted not unless a
Drug Test Clearance have been secured from an accredited drug testing center/clinic, certifying that
the applicant for license is not addicted nor a user of prohibited drugs/narcotics.

SECTION 5. Accreditation and Test Procedures . Procedures on accreditation of testing centers and
procedures on the conduct of tests shall be as prescribed in an SOP issued by the appropriate PNP
office/unit or committee.

RULE XXII
GENERAL PROVISIONS
SECTION 1. Implementing Order/Circulars. - The Chief, SAGSD-CSG shall from time to time issue
such implementing orders or circulars as may be necessary to carry out the provisions/purposes of
these Rules and Regulations implementing Republic Act No. 5487, as amended.

SECTION 2. Supervision and Implementation. The SAGSD under the supervision of the Director,
CSG, is hereby directed to carry out the smooth implementation of these
Rules and Regulations.

SECTION 3. Rescission Clause. – All existing PNP Rules and Regulations, Circulars and Memoranda
inconsistent with these Rules are hereby repealed, modified or amended accordingly.

SECTION 4. Effectivity. These Rules and Regulations shall take effect fifteen days following its
publication in the Official Gazette or in a newspaper of general circulation.

12 Industrial Security Management Instructional Material


5 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

APPENDIX A

SOME IMPORTANT PROVISIONS ON THE 2003 REVISED RULES AND


REGULATIONS IMPLEMENTING REPUBLIC ACT 5487

RA5487 – An act governing the organization and management of Private Security


Agencies, Company Guard Forces and Government Security Forces
- The private security agency law signed on June 13, 1969.

Rule I, Sec. 2 License necessary – no person shall engage in the business of or act as
a private detective agency or engage in the occupation, calling or employment of
security personnel or in the business of private security/training agency without first
securing the permit from the Chief, PNP which permit as approved is prerequisite in
obtaining a license certificate.
- Any person having any participation in the management and operation shall
also secure a license, except those employed solely for clerical or manual
works.

Rule IV, Sec.2 Basic requirements of an operator or manager of an agency


- Filipino citizen
- Not be less than 25 years old
- College graduate and/or inactive or retired commissioned officer from AFP or
PNP
- Finished a course on Industrial security management and/or have adequate
trainings or experience in security business.
- Good moral character
 New applicants for license to operate shall be required to obtain:
a. 1 million as a minimum capital
b. 500 thousand as a minimum bank deposit

Sec. 5 Membership
a. Private Security Agency – minimum of 200 licensed personnel
b. Company Guard Force/ Private Detective Agency – minimum of 30 licensed
personnel
c. Maximum number of personnel to all kind of agencies is 1000 personnel.

12 Industrial Security Management Instructional Material


6 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

Rule V, Sec.3 Qualifications for a Private Security Guard


- Filipino citizen
- Not less than 18 years old nor more than 50 years old
- High school graduate
- Physically and mentally fit
- Undergone pre-licensing training course

Sec. 4 Qualifications for Security Officer


- holder of Baccalaureate degree
- graduate of Security Officer Training Course

Sec. 5 Qualifications for Security Consultants


- holder of Master’s degree in either Criminology, Public Admin, MNSA, Industrial
Security Admin, or Law
- Must have at least 10 years’ experience in the operation and management of
security business.

Sec 6 Qualification for private detective


- Baccalaureate degree preferably Bachelor of laws or Criminology
- Graduate of Criminal investigation course offered by PNP or NBI or any
authorized detective training center.

Sec. 7 Exemptions from Basic Pre-licensing Training


- veterans and retired military or police personnel
- those honorably discharged military/police personnel
- graduates of ROTC advance/CHDF

Sec. 9 Types of Licenses


- Temporary License
- Regular License – all kinds of regular licenses are valid for 2 years only

Rule VII, Sec. 5 Justification for confiscation of firearms


a. when the firearm is about to be used in the commission of a crime
b. when the firearm is actually being used in the commission of crime
c. when the firearm has just been used in the commission of a crime
d. When the firearm being carried by the security guard is unlicensed or a firearm
no authorized by law and regulations for his use.
e. When the confiscation of the firearm is directed by the order of the court.
f. When the firearm is used or carried outside the property, compound or
establishment serviced by the agency without proper authority, or
g. When the security guard does not possess any license to exercise his profession.

Sec. 2 Restriction to possess high-powered firearms


- Not allowed to possess military type weapons such as rifles and special
weapons with bore bigger than cal. 22 to include pistols and revolvers with
bores bigger than cal. 38.
- Possession and use of high-powered firearms must only be authorized when
the Chief, PNP or RDPRO approved in some special conditions.
- Authorized use of high-powered firearms must only be 10% of the total
strength of the security guards

Rule X, Section 1 Professional Conduct and Ethics

Security Guard’s Creed


As a Security Guard, my fundamental duty is to protect lives and properties and
maintained order within the vicinity or place of duty, protect the interest of the employer
and or clients and the security and stability of our government and country without

12 Industrial Security Management Instructional Material


7 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

compromise and prejudice, honest in my action, words and thought, and do my best to
uphold the principle: MAKADIOS, MAKABAYAN AT MAKATAO.

Ethical Standard
As security guard / detective, his fundamentals Duty is to serve the interest or
mission of his agency in compliance with contract entered into with the clients or
customers of the agency he is to serve thus.
1. He shall be honest in thoughts and deeds both in his official actuation, obeying
the laws of the land the regulations prescribed by his agency and those establish
by the company he is supposed to serve.
2. He shall not reveal any confidential matter committed to him as a security guard
and such others matters impose upon him by law.
3. He shall act all times with decorum and shall not permit personal feelings
prejudices and undue friendship to influence his actuation in the performance of
his official functions.
4. He shall not compromise with criminal and other lawless elements to the
prejudice of the customers or client and shall assist government relentless drive
against lawlessness and other forms of criminality
5. He shall carry out his assigned duties as required by law to the best of his ability
and shall safeguard life and property of the establishment he is assigned to.
6. He shall wear his uniform, badge, patches and insignia properly as a symbol of
public trust and confidence as an honest and trustworthy security guard,
watchman and private detective.
7. He shall keep his allegiance first to the government he is assigned to serve with
loyalty and utmost dedication.
8. He shall diligently and progressively familiarize himself with the rules and
regulation lay down by his agency and those of the customers or clients.
9. He shall as all times be courteous, respectful and salute his superior officers,
government officials and officials of the establishment where he is assigned and
the company he is supposed to serve.
10.He shall report for duty always in proper uniform and neat in his appearance and
11.He shall learn at heart and strictly observe the laws and regulations governing the
use of firearm.

Code of Conduct
1. He shall carry with him at all times during his tour of duty his License
identification card and duty detail order with an authority to carry firearms.
2. He shall not use his license and privileges to the prejudice of the public, the client
or customer and his agency.
3. He shall not engage in any unnecessary conversation with anybody except in the
discharge of his work and shall at all times keep himself alert during his tour of
duty.
4. He shall not read newspaper, magazines, books, etc., while actually performing
his duties.
5. He shall not drink any intoxicating liquor immediately before and during his tour
of duty
6. He shall know the location of the alarm box near his post and sound the alarm in
case of fire or disorder.
7. He shall know how to operate any fire extinguisher at his post.
8. He shall know the location of the telephone and / or telephone numbers of the
police precincts as well as the telephone numbers to the fire stations of the
locality.
9. He shall immediately notify the police in the case in any sign of disorder, strike,
riot or any serios violations of the law.
10. He or his group nor guards shall not participate or integrate any disorder, strike
riots or any serious violations of the law.

12 Industrial Security Management Instructional Material


8 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015
ISABELA STATE UNIVERSITY CAUAYAN

11. He shall assist the police in the preservation and maintenance of the peace and
order and in the protection of life, property / having in mind that the nature of his
responsibilities is similar to that of the latter.
12. .He shall familiarize himself with the Private Security Agency Law (RA5487) as
amended, and the PNP SAGSD implanting rules and regulations.
13. When issued a pass he should not lend his pass to anybody.
14. .He shall always in proper uniform and shall always carry with him basic
requirements, and equipment such as writing notebook, ball pen, nightstick
(baton) and /or radio. He shall endeavor at all times to ment and be worthy of the
trust and confidence of the agency he represents and client he serves.

Rule XIII, Section 6 Powers and Duties

General Orders
1. To take charge of his post and all companies property in view and protect /
preserve the same with utmost diligence.
2. To walk during tour of duty in military manner, keeping always in the alert and
observing everything that takes place within sight or hearing.
3. To report all violations of orders I am instructed to enforce.
4. To repeat all calls from post more distant from the guardhouse where I am
station.
5. To quit my post only when properly relieved.
6. To receive, obey and pass out to the relieving guard all order from company
officers or officials, supervisors post in charge or shift leaders.
7. To talk to one except in the line of duty.
8. To sound or call the alarm in case of fire or disorder
9. To call the superior officer in any case not covered by instruction.
10. Top salute all company officials, superiors in the agency, ranking public officials
and commission officer of the AFP and officers of the PNP.
11. To be especially watchful at night and during the time of challenging to challenge
all persons on or near my post and to allow no one to pass or loiter without proper
authority.

12 Industrial Security Management Instructional Material


9 ISU-CCJE-IM-065
Revised: 1
Effectivity: March 18 2015

You might also like