Introduction To Industrial Security Concepts
Introduction To Industrial Security Concepts
JMC
GENERAL OBJECTIVES: At the end of the course, the students should be able to:
1. explain the legal basis of industrial security in the Philippines;
2. elucidate the different types as well as the three major divisions of security;
3. memorize the professional code of ethics and code of conduct for security
personnel and security agencies, as well as the general orders for security
guards;
4. discuss the qualifications, attributes, functions and the different types of security
agencies authorize by law;
5. identify the authorized ranks, positions and staffing patterns of security agencies;
and
6. identify the different methods and techniques employed in the management of
security agencies.
Specific Objectives:
At the end of the unit, the students should be able to:
1.Define industrial security management
2.explain the legal basis of security;
3.identify the different types of security:
4.enumerate the three major divisions of security; and explain the three major divisions
of security.
Course Outline
UNIT I.INTRODUCTION TO INDUSTRIAL SECURITY
1. Basic Concepts
2. Legal bases of Industrial Security in the Philippines
3. Types of Security
JMC
Throughout the ages, two conditions have been both necessary and sufficient for
people to adopt safety measures: felt need and use of resources.
Security pertains to or the State or condition of being safe or free from harm, danger,
loss, or damage.
Industrial Security Management involves the Skillful handling of the security and
safety measures of business enterprises and industrial establishments.
Legal Bases
A. Natural Authority
1. Self-preservation
B. Constitutional Authority
C. Statutory Authority
1. R.A. 6975(DILG ACT OF 1990)
2. R.A. 8551 (PHILIPPINE NATIONAL POLICE REFROM AND
REORGANIZATIONAL ACT OF 1998)
3. Act 3815 ( AN ACT CREATING THE REVISED PENAL CODE OF THE
PHILIPPINES)
4. R.A. 5487
5. R.A. 9372
Session 2
The Types of Security (0.Gatchalian)
The security involves huge typologies that include the following but not limited to:
Industrial Security; Hotel Security; Bank Security; VIP Security; School Security; Mall or
INDUSTRIAL SECURITY MANAGEMENT
JMC
2. COMMUNICATIONS SECURITY
3. HOTEL SECURITY
4. BANK SECURITY
5. DOCUMENT SECURITY
JMC
7. CRISES SECURITY
Another new specialized field is “crises security” which is allied if not a part of VIP
security. Crises security is now involved in kidnapping of VIPs like dignitaries, rich
scions, industrial magnates, political leaders. Motives can be economic, political,
emotional, nationalistic, religious, or their combinations.
9. INDUSTRIAL SECURITY
Operational security is part of physical security that deals primarily with the
protection of processes, formulas, patents, and other industrial and manufacturing
activities from espionage, infiltration, loss, compromise, or photocopying.
JMC
Types of hazard
1. Human hazards
2. Natural hazards
JMC
a.1 Lock
a.2 Padlock
a.3 Peterman
a.4 Keys
b. Types of Locks
c. Types of Keys
d. Key Control
7. Protective Cabinets
a. Safe
b. Vault
c. File Room
8. Guard Force System (Salient provisions of R.A. 5487)
a. Qualifications of Security Guard
b. Ranks, positions and staffing patterns of Security
c. General Orders for Security Guard
d. Professional Code of Conduct and Ethics for Security
e. Types of Security Guard Forces
f. Limitations, Restrictions and Prohibitions
9. Personnel Identification and Movement Control
a. Types of Personnel Identification
b. Use of Pass System
c. Badge and Pass Control
d. Visitor’s Movement Control
e. Package Movement Control
f. Vehicular Movement Control and Identification
g. Building Access Control
10. Film showing (National Treasure/The Pacifier/The Bodyguard)
PHYSICAL SECURITY
INDUSTRIAL SECURITY MANAGEMENT
JMC
PHYSICAL SECURITY
Defined: The Physical measures adopted to prevent unauthorized access to equipment,
material and document. It involves the use of physical measures to define, protect and
monitor property rights against potential security threats.
1. Natural Barriers
It includes mountains, cliffs, canyons, rivers, seas, marshes, deserts or terrain difficult to
traverse.
2. Man-Made Barriers
INDUSTRIAL SECURITY MANAGEMENT
JMC
Are structural constructions like fences, walls, floors, roofs, grills, bars, road blocks, or
other physical means to deter or impede penetration.
Types of Security
Natural Barrier- It includes bodies of waters, mountains, mashes, ravines,
deserts or other terrain that are difficult to traverse.
Structural Barrier- These are features constructed by man regardless of their
original intent that tends to delay the Intruder.
Energy Barrier- Persons being used in providing a guarding system or by the
nature of their employment and location, fulfil security functions.
Human Barrier- Animals are used in partially providing a guarding system. Dogs
are usually trained and utilized to serve as guard dogs.
Animal Barrier- It is the employment of mechanical, electrical, electronic energy
imposes a deterrent to entry by the potential intruder or to protective lighting,
alarm system and any electronic devices used as barriers.
Lines of Physical Defense
1st line of defense: perimeter fences
2nd line of defense: doors, floors, windows, walls, roofs and grills
3rd line of defense: storage system
Hereunder are the specific types of perimeter barriers to form part of the three basic
lines of physical security control.
1. Wire Fences
Is a type of perimeter barrier made of chain link design with mesh openings
design not larger than two inches square, and made of gauge wire or heavier, twisted
and barbed selvage at top and bottom. The minimum height of chain link portion of the
fence should be eight (8) feet.
2. Building Walls
Walls, floors, roofs or their combination serve also as barriers and they should be
of such construction to provide uniform protection just like the wire fencing. Masonry
walls as perimeter barrier should have the same height as the chain-link and
surmounted by the barbed wire top guard. If the height of masonry is less than the
INDUSTRIAL SECURITY MANAGEMENT
JMC
3. Bodies of Water
A river, lake, marsh, cataract, sea, pond, or any bodies of water forming a part of
the wall, building or fencing should never be considered adequate natural perimeter
barrier. Additional security measures like wire-fence, concrete walling, roving guards,
and floodlighting at night may be necessary for the portions of the perimeter.
The following are some types of perimeter barrier openings which needed to be
given considerations in physical security control:
1. Gates and Doors
When not in active use and controlled by guards, gates and doors in the perimeter
should be locked and frequently inspected by guards. Locks should be changed from
time to time.
2. Sidewalk Elevators
These provide access to areas within the perimeter barrier, and should be locked or
guarded.
3. Utilities Openings
Sewers, air intakes, exhaust tunnels and other utility openings which penetrate the
barrier, and which have cross sectional area of ninety-six (96) square inches or more
should be protected by bars, grills, water-filled traps or other structural means providing
equivalent protection to that portion of the perimeter barrier.
4. Clear Zones
An unobstructed area or a “clear zone” should be maintained on both sides of the
perimeter barrier. A clear zone of twenty feet or more is desirable between the barrier
and exterior structure and natural covers which may provide concealment or assistance
to a person seeking unauthorized entry. Whenever possible a clear zone of at least fifty
(50) inches should be maintained between the barrier and the structure within the
perimeter.
The perimeter barrier may be provided with the following additional protective
measures:
1. Top Guard
INDUSTRIAL SECURITY MANAGEMENT
JMC
This is normally provided at main perimeter entrance to secure areas located out
of doors and manned by guards on a full-time basis. Sentry stations should be near
a perimeter for surveillance at the entrance.
3. Towers
Guard towers are house-like structures above the perimeter barriers. As the
height of tower increases, visibility, likewise improves. During inclement weather,
especially at night, even with spotlights, the visibility will be limited. However, a tower
gives a psychological unnerving effect to the violators.
4. Barrier Maintenance
5. Protection in Depth
JMC
4.Effective lightings should, i.e., discourage attempts to enter the premise, and
detections were likely if entry is attempted.
JMC
JMC
Definition of Locks
Locks are a simple type of detachable lock, with a hinged or sliding shackle
designed to pass through a ring or staple on a door, chest, etc. While some modern
locks do not require a key to be closed, others do require it, most often as a security
measure against leaving the key inside the location being locked.
INDUSTRIAL SECURITY MANAGEMENT
JMC
1. Key-Operated Locks
Key-operated locks are most frequently used and are simple to operate. A
key is inserted into a keyway and turned to insert or withdraw a bolt from a strike.
The keyway contains obstacles that must be bypassed to withdraw or insert the
bolt. It can be housed in doorknob or in the door itself.
2. Combination Locks
3. Card-Operated Locks
Card operated locks are inserted into a card reader installed near door or
passageway that is restricted. When an authorized card is inserted into the slot, a
minicomputer activates the locking device, thereby opening the door, traffic
control arm, gate, or turnstile.
4. Electronic Locks
INDUSTRIAL SECURITY MANAGEMENT
JMC
5. Other Locks
In addition to the preceding types of locks, clam shell locks, such as those
used in windows, bars, bolts, chains, and time locks can also be used to provide
additional security. Whatever type of lock is used, it will be only secure as the
material into which it is mounted and the integrity of the unlocking mechanism, be
it a key, combination, code, or card.
Protective Cabinet
The final line of defense of any facility.High security storage area for valuable asset.
Safe
-Small metallic container used for the safekeeping of documents or small items in
an office or installation.
-The standard weight is 750 lbs.
Vault
-Heavily constructed fire and burglar resistant container usually a part of the
building structure.
-Vault door – 6 inches thick
-Walls, ceiling, floor – 12 inches thick
-Fire resistant up to 6 hours
File Room
-A cubicle in a building constructed a little lighter than a vault but bigger size to
accommodate limited people to work on the records inside.
-Standard height – 12 feet
-Fire resistant for 1 hour
Use of Pass System
1. Single Pass System
The badge or pass coded for authorization to enter specific areas is
issued to an employee who keeps it in his possession until his authorization is
terminates.
JMC
1. Visitor’s Logbook
All visitors to any facility should be required to identify themselves and
should be given a visitor’s ID by the security.
2. Photograph
Taking of photographs should also be considered. Extreme caution must
be exercised in areas where classified information is displayed to preclude
unauthorized taking of pictures of the installation.
3. Escort
If possible visitors should be escorted by the security to monitor their
activity within the establishment and guide them where to go.
4. Visitor Entrances
Separate access for visitors and employees of the establishment should
be provided.
5. Time-Traveled
If there is a long delay or time lapse between the departure and arrival, the
visitors maybe required to show cause for the delay.
CHAPTER IV
Personnel Security
Personnel Security
Refers to those practices, technologies and/or services used that personnel
security safeguards are applied.
Guidelines in Personnel Security:
As to Trustworthiness
1. Physical Qualifications
Operators should pass a physical examination administered by a licensed
physician.
INDUSTRIAL SECURITY MANAGEMENT
JMC
2. Mental Qualifications
Individuals whose job duties are directly associated with the effective
Implementation of the organization’s process controls should demonstrate mental
alertness and the capability to exercise good judgment, execute instructions, and
assimilate assigned tasks.
3. Psychological Qualifications
The entity should be required to evaluate the possible impact of any noted
psychological characteristics that may have a bearing on trustworthiness.
4. Behavioral Observation
The entity should be required to observe individual behavioral changes which, if
left unattended, could lead to acts detrimental to the public health and safety.
5. Voluntary Assessment
The entity should give an Individual an opportunity to report any information
concerning authorization and security to perform assigned job duties.
6. Continuing Assessment
The entity should arrange for continued observation of individuals and for
appropriate corrective measures by responsible supervisors for indications of emotional
instability of individuals in the course of performing assigned security job duties.
As to Capability
1. Education and Experience
Individuals should be required to possess a high school diploma or pass an
equivalent performance examination designed to measure basic job-related
mathematical, language, and reasoning skills, as well as the ability and knowledge
required by assigned job duties.
2. Training
Each individual who requires training to perform assigned job tasks or job duties
as identified by organization’s operating or contingency plans should, prior to
assignment, be trained to perform those tasks and duties in accordance with the
organization’s documented training and qualification plan.
3. Security Awareness
Each individual should receive ongoing employee awareness sessions and
training.
JMC
5. Emergency Plan
Organization’s emergency plans should require training of key participants to
ensure they have the skills and knowledge to effectively carry out those plans.
JMC
c. Security Education
c.1 Objectives of Security Education
c.2 Phases of Security Education Program
2. Document and Information Security
a. Basic Concepts
a.1 Document
a.2 Information
a.3 Document and Information Security
a.4 Classified Matter
a.5 Classified Information
a.6 Classify
a.7 Declassify
a.8 Reclassify or Regarding
a.9 Upgrading
a.10 Compartmentation
a.11 Need to Know
a.12 Compromise
b. Document and Information Cycle
b.1 Creation
b.2 Classification
b.3 Storage
b.4 Retrieval
b.5 Retention or Purging
b.6 Transfer
b.7 Disposition
c. Types of Classified Matter
c.1 Top Secret
c.2 Secret
c.3 Confidential
c.4 Restricted
d. Protection of Sensitive Materials
d.1 Trade Secrets
d.2 Patents
At the end of this unit, the students should be able to:
1.explain the different types of personnel security;
2. understand the basic concepts of personnel security;
JMC
Personnel Security
Refers to those practices, technologies and/or services used that personnel
security safeguards are applied.
Guidelines in Personnel Security:
As to Trustworthiness
1. Physical Qualifications
Operators should pass a physical examination administered by a licensed
physician.
2. Mental Qualifications
Individuals whose job duties are directly associated with the effective
Implementation of the organization’s process controls should demonstrate mental
alertness and the capability to exercise good judgment, execute instructions, and
assimilate assigned tasks.
3. Psychological Qualifications
The entity should be required to evaluate the possible impact of any noted
psychological characteristics that may have a bearing on trustworthiness.
4. Behavioral Observation
The entity should be required to observe individual behavioral changes which, if
left unattended, could lead to acts detrimental to the public health and safety.
5. Voluntary Assessment
The entity should give an Individual an opportunity to report any information
concerning authorization and security to perform assigned job duties.
6. Continuing Assessment
The entity should arrange for continued observation of individuals and for
appropriate corrective measures by responsible supervisors for indications of emotional
instability of individuals in the course of performing assigned security job duties.
As to Capability
1. Education and Experience
Individuals should be required to possess a high school diploma or pass an
equivalent performance examination designed to measure basic job-related
mathematical, language, and reasoning skills, as well as the ability and knowledge
required by assigned job duties.
INDUSTRIAL SECURITY MANAGEMENT
JMC
2. Training
Each individual who requires training to perform assigned job tasks or job duties
as identified by organization’s operating or contingency plans should, prior to
assignment, be trained to perform those tasks and duties in accordance with the
organization’s documented training and qualification plan.
3. Security Awareness
Each individual should receive ongoing employee awareness sessions and
training.
5. Emergency Plan
Organization’s emergency plans should require training of key participants to
ensure they have the skills and knowledge to effectively carry out those plans.
JMC
CHAPTER V
Documents Security
It is the protection of records from its entire document life cycle. It also connotes
in this context the safeguarding classified matters.
Document Security Systems
Document Security is that aspect of security which involves the application of
security measures for the proper protection and safeguarding of classified information.
Certificated of Destruction
Is the certification by a witnessing officer that the classified matters described
therein has been disposed of in his presence, approved destruction methods.
Classified
Refers to assign information by one of the four classification categories.
Security Clearance
Refers to the administrative determination that an individual is eligible for access
to classified matter.
Secret Matters
These information and material (matter), the unauthorized disclosure of which
would endanger national security, cause serious to the interest or prestige of the nation
or any governmental activity, or would cause administrative embarrassment or
unwarranted injury to an individual or would be advantage to a foreign nation.
INDUSTRIAL SECURITY MANAGEMENT
JMC
Information Security
Means protecting information and information systems from unauthorized
access, use, disclosure, disruption, modification, or destruction.
3. Physical controls
Monitor and control the environment of the work place and computing facilities.
JMC
Personnel Security
Personnel Security
Refers to those practices, technologies and/or services used that personnel
security safeguards are applied.
Guidelines in Personnel Security:
As to Trustworthiness
1. Physical Qualifications
Operators should pass a physical examination administered by a licensed
physician.
2. Mental Qualifications
Individuals whose job duties are directly associated with the effective
Implementation of the organization’s process controls should demonstrate mental
alertness and the capability to exercise good judgment, execute instructions, and
assimilate assigned tasks.
3. Psychological Qualifications
The entity should be required to evaluate the possible impact of any noted
psychological characteristics that may have a bearing on trustworthiness.
4. Behavioral Observation
The entity should be required to observe individual behavioral changes which, if
left unattended, could lead to acts detrimental to the public health and safety.
5. Voluntary Assessment
The entity should give an Individual an opportunity to report any information
concerning authorization and security to perform assigned job duties.
6. Continuing Assessment
The entity should arrange for continued observation of individuals and for
appropriate corrective measures by responsible supervisors for indications of emotional
instability of individuals in the course of performing assigned security job duties.
INDUSTRIAL SECURITY MANAGEMENT
JMC
As to Capability
1. Education and Experience
Individuals should be required to possess a high school diploma or pass an
equivalent performance examination designed to measure basic job-related
mathematical, language, and reasoning skills, as well as the ability and knowledge
required by assigned job duties.
2. Training
Each individual who requires training to perform assigned job tasks or job duties
as identified by organization’s operating or contingency plans should, prior to
assignment, be trained to perform those tasks and duties in accordance with the
organization’s documented training and qualification plan.
3. Security Awareness
Each individual should receive ongoing employee awareness sessions and
training.
5. Emergency Plan
Organization’s emergency plans should require training of key participants to
ensure they have the skills and knowledge to effectively carry out those plans.
JMC
The entity should also control access to system areas using physical controls
such as:
• Sign in Logs
• Photo ID badges
• Key cards and/or number pads
• A close-circuit television system.
Organizations should also consider cyber security measure such as:
• Firewalls with effective configurations
• Virus protection with current updates
• Intrusion detection systems
• Encryption modules.
CHAPTER V
Documents Security
It is the protection of records from its entire document life cycle. It also connotes
in this context the safeguarding classified matters.
Document Security Systems
Document Security is that aspect of security which involves the application of
security measures for the proper protection and safeguarding of classified information.
Certificated of Destruction
Is the certification by a witnessing officer that the classified matters described
therein has been disposed of in his presence, approved destruction methods.
Classified
Refers to assign information by one of the four classification categories.
Security Clearance
INDUSTRIAL SECURITY MANAGEMENT
JMC
Secret Matters
These information and material (matter), the unauthorized disclosure of which
would endanger national security, cause serious to the interest or prestige of the nation
or any governmental activity, or would cause administrative embarrassment or
unwarranted injury to an individual or would be advantage to a foreign nation.
Information Security
Means protecting information and information systems from unauthorized
access, use, disclosure, disruption, modification, or destruction.
3. Physical controls
Monitor and control the environment of the work place and computing facilities.
JMC
3.discuss the types of security inspection; and explain the tools of investigation, as well
as the threefold aims of investigation.
Security Hazard and Risk Management
Hazard
Is a situation, which poses a level of threat to life, health, property or
environment. It is usually used to described a potentially harmful situation, although not
usually the event itself – once the incident has started it is classified as an emergency
or incident has started it is classified as an emergency or incident.
Types of Hazard:
1. Natural Hazard
These are hazards which arise from natural phenomena.
2. Man-Made Hazard
These are hazards which are the result of a state of mind, attitude,
weaknesses or character traits of one or more persons.
Industrial Hazard
In this context, Industrial hazards are workplace hazards and are often grouped
into physical hazards, physical agents, chemical agents, biological hazards, physical
agents, chemical agents, biological agents, and psychological issues.
Sabotage
INDUSTRIAL SECURITY MANAGEMENT
JMC
Espionage
Generally, espionage is the practice of gathering information about an
organization or a society that is considered secret or confidential without the
permission of the holder of the information.
Subversion
Refers to an attempt to overthrow structures of authority, including the state.
Pilferage
Is one of the most annoying and common human hazards which security has to
deal with. This activity if uncontrolled can become financial drain if not a menace to
smooth and orderly operation.
Risk Management
Is the process of identifying vulnerabilities and threats from resources used by an
organization in achieving business objectives, and deciding what countermeasures, if
any, to take in reducing risk to an acceptable level.
Risk
Is the likelihood that something bad will happen that causes harm to an
informational asset.
Adversary
An individual, group, organization, or government that conducts activities or has
the intention and capability to conduct activities detrimental to the individuals.
Asset
Any information, facility, material Information, or activity which has a positive
value to its owner whether it is an individual, private or government entity.
Vulnerability
Any weakness that can be exploited by an adversary to gain access to an asset.
Countermeasures
An action taken or physical entity used to reduce or eliminate one or more
vulnerabilities.
Criticality
It is the impact of a loss as measured in financial terms. How important it is in
terms of the survival or existence of the organization.
INDUSTRIAL SECURITY MANAGEMENT
JMC
2. Risk Reduction
Decreasing the risk by minimizing the probability of the potential loss.
3. Risk Spreading
Spreading the risk through decentralization to limit the impact (criticality) of the
company.
4. Risk Transfer
Moving the financial impact of the potential loss-over to an insurance company.
5. Risk Self-assumption
Planned assumption and acceptance of the potential risk by making a deliberate
managerial decision of doing nothing about the threat, or setting aside resources for use
in case of a specific loss incident.
CHAPTER VII
Security Survey and Inspection
Security Survey
It is an estimate of the security standards of unit, and is conducted to enable the
responsible officer to recognize and evaluate security hazards and determine protective
measures necessary to the prevention of sabotage, espionage, subversive, activities
and other criminal acts towards the interest and/or mission of the unit and/or command.
2. Follow-up Survey
When recommendations are made in the initial physical security survey, a follow-
up survey is conducted to ensure the completion of modifications.
3. Supplemental Survey
Is conducted when changes in the organization, mission, facility, or the threat
level of the facility alter or affect the security posture of the facility area.
INDUSTRIAL SECURITY MANAGEMENT
JMC
4. Special Survey
It is conducted to examine or resolve a specific issue, such as when there is a
request for a Sensitive Compartmented Information (SCI) accredited facility or there is a
need to investigate or assess damage resulting from an incident.
2. Compliance
The full compliance inspection generally is conducted for enforcement purposes.
3. Follow-up
Another form of compliance inspection is the follow-up inspection, conducted to
ensure that facility officials have complied with recommendations from earlier
inspections.
5. Self-inspection
It is initiated by the security officer or facility manager to evaluate his/her own
security program.
6. Closeout
A closeout self-inspection is accomplished immediately prior to the action to
administratively terminate an authorized Top Secret Station, Classified Control Station,
or Sensitive Compartmented Information Facility if any.
JMC
Special Access Briefing – these are briefing related to the various special access
programs such as those administered by the higher management or national offices.