100% found this document useful (1 vote)
1K views40 pages

Lea 3 Industrial Security Concept

This document provides an introduction to industrial security concepts and outlines the legal basis for industrial security management in the Philippines. It discusses three types of legal authority - natural authority, constitutional authority, and statutory authority. Several specific statutes related to industrial security are mentioned, including the Revised Penal Code, the Private Security Agency Law (R.A. No. 5487), and amendments to the Private Security Agency Law through Presidential Decrees. The document also outlines qualifications and licensing requirements for security guards and private security agencies under Philippine law.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views40 pages

Lea 3 Industrial Security Concept

This document provides an introduction to industrial security concepts and outlines the legal basis for industrial security management in the Philippines. It discusses three types of legal authority - natural authority, constitutional authority, and statutory authority. Several specific statutes related to industrial security are mentioned, including the Revised Penal Code, the Private Security Agency Law (R.A. No. 5487), and amendments to the Private Security Agency Law through Presidential Decrees. The document also outlines qualifications and licensing requirements for security guards and private security agencies under Philippine law.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Identified the legal basis of industrial security management; and
2. Discussed the legal bases of industrial security management as to natural authority, constitutional and statutory
authority.

1. Natural authority
2. Constitutional authority
3. Statutory authority

A. The Revised Penal Code. (Act No. 3815, as amended)


The applicable provisions of the Code on Crime against Person, Personal Liberty and security and property have
bearing on the security and protection of one’s life, liberty and property.

B. Private Security Agency Law (R.A. No. 5487 as amended)


This law governs the operation, administration of security agency, and activities, qualification, duties and licensing of
security guards, watchman and private detectives. In short, it is the intention of this law to professionalize the security
services in order to upgrade the level of security protection.

C. Presidential Decree No. 11 (Amending R.A. No. 5487)


Presidential Decree 11 amended the Sec. 3 (d) which defines Watchman or Security Guard, Watchman or Security
Guard Agency, Sec. 4 who may organize a security or watchman agency and the Sec. 18 of the penal provision of
Republic Act No. 5487.

D. Presidential Decree No. 100 (Amending R.A. No. 5487& PD 11)

E. Presidential Decree No. 1919 (Amending RA No. 5487, PD No. 11 and 100)

F. Republic Act No. 6975 (DILG LAW) – this is the law authorizing the PNP the control and supervision of security
agency in the Philippines.

REPUBLIC ACT No. 5487


AN ACT TO REGULATE THE ORGANIZATION AND OPERATION OF PRIVATE DETECTIVE, WATCHMEN OR SECURITY
GUARDS AGENCIES.
(Rep. Act No. 5487, as amended by Presidential Decree No. 11.)
Section 1. Short Title of Act. This Act shall be known as "The Private Security Agency Law."
Section 2. Scope of this Act. The organization, operation, business and activities of private detectives, watchmen or security
guards agencies shall be governed by the provisions of this Act.
Section 3. Definition of Terms. (a) Person. As used in this Act, person shall include not only natural persons but also juridical
persons such as corporation, partnership, company or association duly registered with the Securities and Exchange
Commission and/or the Bureau of Commerce. (b) Private Detective Agency. A private detective agency is any person, who, for
hire or reward or on commission, conducts or carries on or holds himself or itself out as conducting or carrying on a detective
agency, or detective service. (c) Private Detective. A private detective is any person who is not a member of a regular police
agency of the Armed Forces of the Philippines who does detective work for hire, reward, or commission. (d) Watchman or
Security Guard, Watchman or Security Guard Agency. Any person who offers or renders personal service to watch or secure
either residential or business establishment, or both, or any building, compound, or area including but not limited to logging
concessions, agricultural, mining or pasture lands for hire or compensation, or as an employee thereof shall be known as

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

watchman or security guard; and any person, association, partnership, or corporation, who recruits, trains, muster, furnishes,
solicits individuals or business firms, private or government-owned or controlled corporations to engage his service or those of
its watchmen, shall be known as Watchman of Security Guard Agency. (As amended by Pres. Decree No. 11, October 3,
1972.)
Section 4. Who May Organize a Security or Watchman Agency. Any Filipino citizen or a corporation, partnership, or
association, with a minimum capital of five thousand pesos, one hundred per cent of which is owned and controlled by Filipino
citizens may organize a security or watchman agency: Provided, That no person shall organize or have an interest in, more
than one such agency except those which are already existing at the promulgation of this Decree: Provided, further, That the
operator or manager of said agency must be at least 25 years of age, a college graduate and/or a commissioned officer in the
inactive service of the Armed Forces of the Philippines; of good moral character; having no previous record of any conviction
of any crime or offense involving moral turpitude and not suffering from any of the following disqualifications:
(1) Having been dishonorably discharged or separated from the Armed Forces of the Philippines;
(2) Being a mental incompetent;
(3) Being addicted to the use of narcotic drug or drugs; and
(4) Being a habitual drunkard.1awphil.net
For purposes of this Act, elective or appointive government employees who may be called upon on account of the functions of
their respective offices in the implementation and enforcement of the provisions of this Act and any person related to such
government employees by affinity or consanguinity in the third civil degree shall not hold any interest, directly or indirectly in
any security guard or watchman agency. (As amended by Pres. Decree No. 11.)
Section 5. Qualifications Required. No person shall be employed as security guard or watchman or private detective unless
he is: (a) a Filipino citizen; (b) a high school graduate; (c) physically and mentally fit; (d) not less than 21 nor more than 50
years of age; (e) at least 5 feet and 4 inches in height; and (f) suffering none of the disqualifications provided for in the
preceding section: Provided, That foreigners who are already employed as watchmen or security guards prior to the approval
of this Act shall not be subject to the above-mentioned requirements: Provided, further, That veterans shall be given priority in
employment as security guard, watchman or private detective: And provided, finally, That person convicted of any crime
involving moral turpitude shall not be employed as security guard, watchman or private detective.
Section 6. License Necessary. No person shall engage in the business of, or act either as a private detective, or detective
agency; and either engage in the occupation, calling or employment of watchman or in the business of watchman's agency
without first having obtained the necessary permit from the Chief, Philippine Constabulary which permit as approved is
prerequisite in obtaining a license or license certificate: Provided, That all existing private detective or watchman or security
guard agencies shall have a period of one (1) year from the approval of this Act to secure the said license: Provided, further,
That existing agencies, and any new agency which may hereafter apply for a license, certify under oath that their private
detectives, watchmen or security guards, have received the appropriate training from either the Philippine Constabulary, the
National Bureau of Investigation, any local police department, or any other public institution duly recognized by the
government to conduct police training.
Section 7. Application for License. The application shall be made in writing and shall be filed with the Chief, Philippine
Constabulary. It shall contain the full name of the applicant, his age, civil status, his residence, and location of business. If the
applicant is a corporation, association or partnership, a copy of the certificate of registration with the Securities and Exchange
Commission together with its by-laws and articles of incorporation, with the Bureau of Commerce.
Section 8. Fees to be Paid and Bonds. When all requisites for the issuance of the license have been complied with, the Chief
of the Philippine Constabulary or his duly authorized representative shall issue a permit for the issuance of such license and
register the same in his office, upon payment by the applicant of the fee in accordance with the following schedule:
(a) the sum of one hundred pesos per annum as national license;
(b) the sum of fifty pesos per annum as municipal license fee in any city where it may operate, the said fee to be
payable to the city treasurer concerned;
(c) the sum of twenty-five pesos per annum as municipal license fee for any municipality where it may operate, the
said fee to be payable to the municipal treasurer concerned;
(d) the private Detective and Watchman Agency shall in addition to the above pay a fixed Internal Revenue Tax of
one hundred pesos per annum in lieu of percentage taxes;

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

(e) the individual private detective and/or watchman shall pay for Mayor's Permit, Health and/or Sanitary fee an
amount not exceeding three pesos per annum and the agency shall pay the sum not exceeding ten pesos for the
Mayor's Permit and Health and/or Sanitary fees; and
(f) the Chief of the Philippine Constabulary or his duly authorized representative shall issue an appointment over his
signature and affix the seal of his office, to each license and for each such appointment, the sum of one peso shall be
paid.1awphil.net
The application shall further be accompanied by a bond issued by any competent or reputable surety or fidelity or insurance
company duly accredited by the office of the Insurance Commissioner in the sum of not less than five thousand pesos nor
more than ten thousand pesos in the discretion of the Chief, Philippine Constabulary, which bond shall answer for any valid
and legal claim against the agency by its clients or employees: Provided, That licenses issued in the province of an authorized
representative of the Chief of Constabulary is subject to review by the Chief of Constabulary.
Any provision of this or other law to the contrary notwithstanding, the Chief of Constabulary may, at any time suspend or
cancel the licenses of private watchman or security guard agency found violating any of the provisions of this Act or of the
rules and regulations promulgated by the Chief of Constabulary pursuant thereto. (This paragraph was inserted by Sec. 3,
Pres. Decree No. 11.)
Other provisions of Pres. Decree No. 11
Any person who commit any act in violation of Republic Act No. 5487 and of this Decree, and the implementing rules and
regulations already promulgated which are not in conflict herewith, and those to be promulgated by the Chief of Constabulary
pursuant hereto, shall, on conviction thereof, suffer imprisonment of from ten to fifteen years and a fine of not less than ten
thousand pesos nor more than fifteen thousand pesos as a military court/tribunal or commission may direct.
The Chief of Constabulary shall promulgate the necessary rules and regulations to carry out the provisions of this Decree.
Section 9. Employees Need Not be Licensed. Every person operating, managing, directing or conducting a licensed private
detective or watchmen agency shall also be considered licensed private detective, or watchman and no person shall be
employed or used in a private detective work unless he be a licensed private detective or watchman: Provided, That nothing in
this section shall be construed as requiring detective license for persons employed solely for clerical or manual work.
Section 10. Display of License. The license shall be displayed at all times in a conspicuous and suitable place in the agency
office or headquarters of the agency and shall be exhibited at the request of any person whose jurisdiction is in relation with
the business of the agency or the employees thereof, or of the Chief of the Philippine Constabulary or his duly authorized
representative or any peace officer.
Section 11. Supervision of the Philippine Constabulary. Upon approval of this Act, the Philippine Constabulary shall exercise
general supervision over the operation of all private detective and watchman or security guard agencies.
Section 12. Powers of City or Municipal Mayors in Cases of Emergency. In case of emergency or in times of disaster or
calamities where the services of such agencies arise, the City or Municipal Mayor, as director of Civil Defense, may muster or
incorporate the services of the agency nearest the area where such emergency, disaster or calamity arises and its duly
licensed personnel to help maintain peace and order; and/or the prevention or apprehension of law violators and in the
preservation of life and property. Deputized private detectives, watchmen or security guards shall take direct orders from the
Chief of Police for the duration of the fire, inundation, earthquakes, riots or other emergencies.
Section 13. Issuance of Firearms. A watchman or security agency shall be entitled to posses firearms after having
satisfactorily passed the requirements prescribed by the Chief, Philippine Constabulary pertinent to the possession of firearm
of any caliber not higher than 45 caliber in a number not exceeding one firearm for every two watchmen or security guards in
its employ: Provided, however, That a watchman or security agent shall be entitled to possess not more than one riot gun or
shotgun in order to provide adequate security when circumstances so demand: Provided, further, That all the firearms
mentioned herein shall be carried by the watchman or security guard only during his tour of duty in proper uniform within the
compound of the establishment except when he escorts big amounts of cash or valuables in and out of said compound.
Section 14. Uniform. The uniform of watchman or security guard as well as those organized, maintained or under the
employment of the government or any government-owned and/or controlled corporations, agencies or entities, shall be
different from the uniform worn and prescribed for members of the Armed Forces of the Philippines, City and Municipal Police
Force. The Chief, Philippine Constabulary, through his duly authorized representative shall prescribed the uniform or
ornaments, equipment and paraphernalia to be worn by the security guards and watchmen throughout the Philippines.
Section 15. Compensation of Watchmen or Security Guards. Watchmen or security guards shall receive a salary not lower
than that prescribed in the Minimum Wage Law.

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

Section 16. Limitations and Prohibitions. 1. On Membership: (a) No agency operating in the City of Manila and suburbs may
employ more than 1,000 watchmen or security guards; (b) no agency operating in other cities and first class municipalities
may employ more than 500 watchmen or security guards; (c) no agency operating in municipalities other than first class may
employ more than 200 watchmen or security guards.
2. On Organization: No person, corporation, partnership or association may organize more than one agency in any
one city or municipality.
3. On Service: No agency shall offer, render or accept its services to gambling dens or other illegal enterprises. The
extent of the security service being provided by any security agency shall not go beyond the whole compound or
property of the person or establishment requesting the security service except when they escort big amount of cash.
Section 17. Rules and Regulations by Chief, Philippine Constabulary. The Chief of the Philippine Constabulary, in consultation
with the Philippine Association of Detective and Protective Agency Operators, Incorporated and subject to the provisions of
existing laws, is hereby authorized to issue the rules and regulations necessary to carry out the purpose of this Act.
Section 18. Penal Provisions. Any violation of this Act or the rule or regulation issued hereunder shall be punished by
suspension, or fine not exceeding P200.00 or cancellation of his or its licenses to operate, conduct, direct or manage a private
detective, watchman or security guard agency and all its members in the discretion of the court together with the forfeiture of
its bond filed with the Philippine Constabulary.
If the violation is committed by those persons mentioned under paragraph two, section four of this Act the penalty shall be
imprisonment ranging from one to four years and fine ranging from one to four thousand pesos in the discretion of the court.
Section 19. Repealing Clause. All laws, rules, resolutions, municipal ordinances, regulations and administrative orders
contrary or inconsistent with the provisions hereof are hereby repealed.
Section 20. Effectivity. This Act shall take effect upon its approval.
Approved, June 21, 1969.

COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Recognized the security and security management when it comes to field, concepts and types of security;
2. Distinguished active measures from passive measures; and
3. Differentiated the types of security.

What is Security?

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

In a collective sense, is the same as protection and safety; the state of being safe and the condition of being
protected against physical, social, spiritual, financial, political, emotional, occupational, psychological or other types or
consequences of failure, damage, error, accidents, harm or any other event which could be considered not desirable.

Types of Security Measures for an Effective Defense against Crimes


• Active Measures – these involves the installation of physical barriers, security lighting, use of vaults, locks and
others.
• Passive Measures – those that will deter man from committing such act of fear or being caught, charge in court or
dismissed such as: security, education, programs, investigations, fire prevention seminars, personnel security checks
etc.

Industrial Security
- physical security as applied to business groups engaged in industries like manufacturing assembling, research and
development, processing, warehousing, and even agriculture. It is a form of physical security involving industrial
plants and business enterprises where the personnel, processes, properties and operations are safeguard. Use of
protecting barriers, and security lighting, personnel movement control, looks and key management, guard forces,
communication and electronic hardware are essential, aside from fire prevention and control programs, emergency
plans, industrial safety and security education programs.

Factors That Bring About Unsecured Conditions or Situations


1. Threat – is activity that could lead to a loss
2. Hazard – is a condition that could lead to a loss
3. Risk – is a potential loss damage to an asset
4. Vulnerability – is a weakness that can be gained to an access to an asset

PNP SOSIA
Philippine National Police Supervisory Office for Security and Investigation Agency

- Is an office under the chief of PNP through the Civil Security Group (CSG) which is charged with the supervision,
direction and control of all security agency in the country. The head of this division acts in the name of the Chief of
PNP on matters, duties and powers delegated by later.
- In matters of licensing and in compliance with the prescribed rules and regulation issued by the chief of PNP, the
security personnel of government corporation/agencies also fall under the supervision of the PNP SOSIA

TYPES OF SECURITY

1. Physical Security – broadest branch of security to prevent unauthorized access to equipment, facilities, materials
and documents, and to safeguard them against espionage, sabotage, damage and theft. It also encompasses
protection of personnel from any criminal act.
2. Communication Security – the protection resulting from the application of various measure, which prevent or delay
enemy or unauthorized persons in gaining information through communication system this includes:
A. Transmission Security – measures designed to protect transmission from interception, traffic analysis and
initiative deception.
B. Cryptographic Security – crypto system and their proper use.
C. Physical Security – providing safeguards to equipment and materials from access by unauthorized persons.
3. Bank Security – a specialized type of physical security protecting assets, personnel, and operation of a bank.
4. Document Security – protection of documents and classified matters from loss, access by unauthorized persons,
damage, theft, and compromise through disclosure.
5. Personal Security – protection of personnel especially high ranking officials from any harm, kidnapping, and other
criminal acts. Also known as VIP Security
6. Crises Security – part of VIP security involve in hostage and kidnap of VIP.
7. Industrial Security – is a physical security as applied to business groups engaged in industries like manufacturing,
assembling, research and development, processing warehousing, and even agriculture. It is a form of physical
security involving industrial plants and business enterprise where the personnel, processes, properties and
operations are safeguard.
8. Operational Security – a part of physical security that deals primarily with the protection of processes, formulas,
patents and other industrial and manufacturing activities from espionage, infiltration, loss, compromise, or
photocopying.

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

9. Air Cargo Security


10. School/Campus Security
11. Supermarket Security
12. Hotel Security
13. Personnel Security – involved in the background checks of individuals commensurate with the security
requirements of their work.

Comprehensive Security Program


• Policies and Procedures – statements of security goals
• Personnel – people to monitor, administer and implement the system

• Barriers – access control devices or structures
• Equipment – detection, alarm, communication and control systems.
• Records – past incident reports, access records and transactions logs

PRINCIPAL DIVISION OF SECURITY


• Personnel Security
• Physical Security
• Document/Information Security

Personnel Security
This is as important as physical security. Personnel security starts even before the hiring of an employee and remains
to be maintained for as long as the person is employed.
Its purpose is to insure that a firm hires those best suited to assist the firm in achieving its goals and objectives and
once hired assist in providing necessary security to the work force while carrying out their functions.

Physical Security
This concern with the physical measures adopted to prevent unauthorized access to equipment, facilities, material
and document and to safeguard them against espionage, sabotage, damage, loss and theft.

Documents and Information Security


This involves the protection of documents and classified papers from loss, access by unauthorized persons, damage,
theft and compromise through disclosure.
Classified documents need special handling. Lack of indoctrination and orientation among the personal handling
them can result in the leakage, loss, theft and unauthorized disclosure of the documents.

SECURITY MANAGEMENT

COMPONENTS OF SECURITY MANAGEMENT


1. Preventive measures – are important tools and elements used in prevention of an incident from happening.
2. Counter measures – are programs implemented to avoid repetition of the same event.

Crime prevention is using instinct, common sense, and action to eliminate or greatly reduce criminal’s opportunity. A large
share of responsibility in reducing criminal opportunity lies in the awareness, understanding and everybody’s commitment.

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Identified the guard and guard system force in the Philippines its structure, professional conduct and ethics and the
basic requirements in the selection of guards and its minimum qualifications; and
2. Appreciated the importance of guard force and guard system.

Guard Force and Guard System

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

• The security guard is the key element in the overall security system of a plant or installation. Its basic mission is to
protect all the property within the limits of the facility boundaries and protect employees and other persons on the
installation.
• The security guard who will become part of the guard force must be required to meet minimum criteria to assure that
they will effectively perform their assigned security related duties. It is the responsibility of the security director of the
installation to insure that its guard force is of a high caliber to make a judgment that could save multi-million pesos
facility from total destruction.

SECURITY GUARD
• A security guard is called a private security guard or watchman that include any person who offers or renders
personal service to watch or secure either a residence or business establishment or both for hire or compensation,
and with license to exercise profession. Often security officers are uniformed and act to protect property by
maintaining a high visibility presence to deter illegal and/or inappropriate actions, observing for signs of crime, fire or
disorder; then taking actions and/or reporting any incidents to their client; employer and emergency services as
appropriate.

WHAT IS SECURITY GUARD FORCE?


• It is a group of selected men, trained or grouped into functional unit for the purpose of protecting operational
processes from those disruption which would impeded efficiency or halt operation at a particular plant, facility,
installation or special activity

THE TYPES OF SECURITY GUARD FORCES IN THE PHILIPPINES

1. Private Security Agency – any person, association, partnership, firm or private corporation, who contracts, recruits,
trains, furnishes or post any security guard to do its functions or solicit individuals, business firms or private, public or
government owned or controlled corporations to engage his/its service or those of his/its security guards, for hire
commission or compensation.
2. Company Guard Force – A security force maintained and operated any private company/ corporation for its own
security requirements only.
3. Government Security Unit – a security unit maintained and operated by any government entity other than military
and/ or PNP which is established and maintained for the purpose of securing the office or compound and/or
extension such government entity

THE TYPICAL STRUCTURE OF A SECURITY ORGANIZATION IN THE PHILIPPINES

The security force of any installation must be organized in accordance with the principles of responsibility and
authority. Each personnel must be assigned to a position that correspond to his experience, skills, training and knowledge.
This is to carry out different functions efficiently and effectively and thus insures smooth flow of the organization. The security
position maybe classified into the following:
1. Office of the General Manager/ Security Director
2. Office of the Executive Secretary of the General Manager
3. Office of the Assistant General Manager/ Security Executive Director
4. Office of the Human Resources and Administrative Manager/Staff Director for Personnel and Administration
5. Office of the Operations Manager/Staff Director for Operations
6. Office of the finance
7. Office of the logistics Manager
8. Office of the Inspectorate and Special Projects (Special Staff)
9. Office of the Communication Officer
10. The Detachment Commander/Officer-in-Charge
- A Detachment Commander shall command and responsible for a certain detachment, with fifteen (15) or more
security personnel under him. He/she is directly responsible to the Security Manager of the installation
- He/She prepares and executes the security plan of his detachment in relation to the security requirements of
the establishment being guarded.
- He is responsible for the enforcement and implementation of Rules and Regulations/Policies.
- He receives instructions from the security Manager and implements the same as required
- He has full operational and administrative control of all his units to include his assistant and
shift-in-charge/supervisor

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

- He conducts inspection of his units and institutes corrective measures on the spot on those problems he may
detect or brought to his attention. If not possible, he brings the problem to the security Manager of the
establishment

11. Assistant Detachment Commander


- Detachment with more than twenty (20) security personnel assigned may be provided with an assistant detachment
commander who will be the principal assistant of the Detachment Commander
- In the absence of the Detachment Commander, he/she performs the duties of the Detachment Commander

12. Shift – In - Charge


- The shift-in-charge shall be responsible to the Detachment Commander as far as his shift is concerned
- He forms his men at least 30 minute before posting time seeing that all are in proper uniform and presentable.
- He disseminates instructions coming from his Detachment Commander/ OIC or those relayed to him by his
counter-part, the outgoing SIC
- He inspects the posts as often as he can to ensure that his men are on the alert and performing their duties
effectively.
- He performs other duties as may be directed by the Detachment Commander or by the ADC

13. Security Guard on Duty Post


- The Security Guard (SG) on duty/post must always carry his license to practice his profession, Xerox copy of the
firearm’s license assigned to him, and his duty detail order, authorizing him to carry his issued firearm within his area
of jurisdiction.
- If the security guard is manning a fixed post especially entrance or exit points, he must maintain a guard’s logbook
and enters in the same logbook all events/passages of VIP’s vehicles and inspections or visits of Security
Manager/Director of the client /Firm
- Guards must observe and apply religiously the provision of the Code of ethics, code of Conduct, and the General
orders of the security guard when on post.
- He may perform special task as may be directed by his shift supervisor, DC and or ADC like control of visitors,
inspections of bags of persons coming in and going out of the establishment, vehicles cargoes or prevents the
intrusion of unauthorized person in a particular area, etc.

Duty Detailed Order - is a written order/schedule issued by a supervisor officer usually the private security agency/branch
manager or operation officers to security guard and detective

THE SECURITY GUARD’S PROFESSIONAL CONDUCT AND ETHICS IN THE PHILIPPINES


• Security Guard’s Creed
• Ethical Standard
• Code of Conduct
• General Orders

THE BASIC REQUIREMENTS IN THE SELECTION OF GUARDS UNDER PHILIPPINE LAW


The R.A. 5487 and its implementing rules and regulations prescribed the minimum requirements for guards to be
able to secure a license to exercise profession as a security guard, private detective, security officer and security consultant.

GENERAL REQUISITES IN THE SECURITY PROFESSION


a. Filipino Citizen
b. Physically and mentally fit
c. Good moral character
d. Must not possess any disqualification

General Disqualification
• Dishonorably discharge from the service in the PNP/AFP or any other private government entities.
• Physically and mentally unfit
• Conviction of a crime
• Addicted to drugs or alcohol dummy of a foreigner
• Elective or appointive government official

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

Basic Qualifications of an Operator/Manager


In addition to the general qualifications, an operator should be:
1. At least 25 years of age
2. Commissioned officer, inactive or retired from AFP or PNP or a graduate of Industrial Security Management with
adequate training and experience in the security business.

Basic Qualifications of a Security Consultant


In addition to the general qualifications, a consultant should be:
1. Holder of Master degree of Criminology, MPA, MNSA Industrial Management LL.B.
2. Must have at least ten (10) years experiences in the operation and management of security business.

Basic Qualifications of a Security Officer


In addition to the general qualifications, a consultant should be:
1. At least graduated from Security Officers training Course
2. A retired personnel in the PNP/AFP
3. Must not possess any of the disqualification

Basic Qualifications of a Private Detective


In addition to the general qualifications, a consultant should be:
1. BS Criminology Graduate
2. LL.B. Holder
3. Graduate of a Criminal Investigation Course
4. Advance ROTC graduate

Basic Qualification of a Security Guard


In addition to the general qualifications, a consultant should be:
1. Be at least high school graduate
2. Be at least 18 years of age but not more than 50 years old
3. Undergone pre-licensing training course
4. Passed a neuropsychiatry examination
5. Be locally cleared with PNP or NBI

What are the desirable Qualities as a security Guard?


1. Alertness
2. Judgment
3. Confidence
4. Physical Fitness
5. Tactfulness
6. Self-control
7. Interest, loyalty, responsible, and trustworthy

The types of Licenses in the Security Profession under R.A. 5487


1. License to Operate – before the Private Security Agency (PSA) can operate; it has to secure a License to Operate (LTO)
categorized as either temporary or regular. A temporary license is issued by the PNP thru Civil Security Group Directorate
after the applicant/ licensee should have complied with all the requirements while it has less than two hundred guards. A
regular license to operate is issued to the PSA once it is qualified of having two hundred (200) or more license security guards
in its employ duly posted. Regular license is renewable every two years.

License to Exercise Profession (LEP) - is license Certificate document, issued by the chief PNP or his duly authorized
representative recognizing a person to be qualified to perform his duties as private security or training personnel.
- Security Guard License – before security guard can practice his profession; he shall possess valid security license.
The use of expired license is not allowed. In case of doubt, licenses may be verified at the PNP Security Agency and
Guard Supervision Division (SAGSD) whether valid or fake
PNP SAGSD
• As used herein shall refer to the current PNP Civil Security Group – Security Agency and Guard Supervision Division
or any other PNP office that may be designated later as the primary office for supervision of the implementation of
these rules and regulations.

PADPAO

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

• Refers to the Philippine Association of Detective and Protective Agency operators, Inc., which is an associations of
all licensed security agencies and company security forces. PADPAO is authorized to issue the implementing rules
and regulations pertaining to R.A. No. 5487

New Applicant for License to Operate - Minimum Capitalization of one million (1,000,000.00) with minimum bank deposit of
five hundred thousand (500,000.00) pesos in order to start the business.

Membership - No regular license shall be granted to any private security agency unless it has minimum of two hundred (200)
licensed security personnel under its employment. No regular license shall be granted to any Company Guard Force or
Private Detective Agency unless it has a minimum of thirty (30) licensed private security personnel under its employment. The
maximum member of private security personnel that a PSA/CGF/PDA may employ shall be one thousand (1000). The validity
of LTO is 2 years

Application of License to Operate (LTO) - The application shall contain the full name of the applicant, his age, civil status,
his/her residents and location of business. New applicant – applicant from NCR may file their application for license to
exercise profession with the personnel licensing section, SAGSD, Civil Security Group, Camp Crame, Quezon City. Applicants
from the province may file their application with the Firearms, Explosives, Security Agencies and Guard Section (FESAGS).
Regional Operation and Plan Division (ROPD) of the Regional Office concerned.

Renewal of License to Operate - All applications for renewal of license to operate shall filed at least sixty (60) days before
expiry date of LTO subject of the renewal application filed/accepted thereafter shall penalized for late filing. In addition to other
renewal requirements under provision of these rules and regulation, no application shall approved unless a certification is
issued by FED-CSG to the effect that all licensed firearms of the agency concerned are updated/ renewed for at least one (1)
year forthcoming during the validity of the renewed LTO.

Firearm’s License - All firearms of the security agency should be covered with firearms license issued by the PNP through its
Firearms Explosive Division (FED) under the Civil Security Group (CSG), renewable every two years. No duplication of two or
more firearms with the same make and serial number shall be covered by one license.

Payroll - Payroll shall be filed with the main office within fifteen (15) days after pay day.

• Possession of Firearm - Ratio – one (1) firearm for very two (2) – (1:2) security guards in its employed. No
PSA/CSF/GSU shall be allowed to possess firearms in excess of five hundred (500) units. For lower caliber and
revolvers such as; .22 caliber or .38 caliber pistols or revolver
• The total number of high – powered firearms that can agency or security force/unit is authorized to possess shall not
exceed ten percent (10%) of the total number of security guards or watchmen in its employed.
• Shotguns not higher than 12 gauge

Stocking of Ammunition - PSA shall not exceed fifty (50) rounds of ammunition per unit of duly licensed firearms. Individual
issue to each security guard shall be limited to one half such basic load or twenty five (25) rounds for every security guard.

Firearm/weapon authorized for used by the Security Guard while on Duty


1. Handgun
2. Shotgun
3. Riot gun of prescribed caliber

Basic three weapons of Security Guard


1. Firearm
2. Handcuff
3. Nightstick

Basic Equipment of a Security Guard


1. Pen and Paper (logbook)
2. Whistle
3. Communication Gadgets (walkie talkie)
4. Flashlight

Guards Uniform, Equipment and Paraphernalia


1. Set of Uniforms for Security Personnel
⮚ Headgear – pershing cap for men and 2 ply cap for women
⮚ Service Bush Jacket – intended for Directorial and Staff Officers

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

⮚ Service shirt
⮚ Service trouser
⮚ Service belt
⮚ Footwear

2. Color of Uniforms
⮚ Private Security Agency – Navy blue (upper and lower)
⮚ Company Security Forces – light blue/light gray for upper and navy blue for lower
⮚ Government Security forces – white for upper and navy blue for lower

Equipment and Paraphernalia


• Leather pistol belt with regulation buckle
• Holster, black leather for pistol
• Night stick with horizontal handle
• Whistle with lanyard
• Handled radio
• Pocket notebook and ball pen

3. Ornaments and Patches


⮚ National badge
⮚ Cap device
⮚ Regulation buckle
⮚ Collar device
⮚ Name cloth
⮚ Agency/ unit name cloth

Justification for Guards’ firearm to be confiscated


1. When firearm to be used or being used in the commission of crime
2. If carried while guard is not on tour of duty
3. There is written court order
4. Firearm is carried outside the property, compound or establishment service by the agency without proper authority.
5. When the security guard does not possess any license to exercise his/her profession

COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Discussed the different concepts in physical security;
2. Differentiated the different types of barriers; and
3. Performed appreciation to the principles involved in physical security.

PHYSICAL SECURITY

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

• A system of barriers placed between the potential intruder and the matter to be protected. It is the foundation of
security. It is the first thing in security Management
• Physical security measures are used to defined, protect, and monitor property rights and assets. These measures
consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment, facilities,
material and document and to safeguard them against espionage, sabotage, damage and theft. In security
management, physical security is known as the broadest because it compasses many aspect of physical protection.
The passive and active physical security barriers will differentiate the significant and importance of physical security
industry.

Conceptually, the field of physical security has three important elements:


1. The obstacle, to frustrate trivial attackers and delay serious ones;
2. Alarms, security lighting, security guard patrols or closed-circuit television cameras, to make it likely that attacks will
be noticed; and
3. Security response, to repel catch or frustrate attackers when an attack is detected.

THE FOUR LAYERS OF PHYSICAL SECURITY


In a well designed physical security system, the three element of physical security must complement each other within the
four layers of physical security which are:
1. Environmental Design – the initial layer of security for a campus, building, office or physical space uses
environmental design to deter threats. Some of the most common examples are also the most basic barbed wire,
warning signs and fencing, concrete bollards, metal barriers, vehicle height – restrictors, site lighting and trenches.
2. Mechanical and Electronic Access Control – includes gates doors and locks. Key control of the locks becomes a
problem with large user populations and any user turnover. Keys quickly become unmanageable forcing the adoption
of electronic access control. Electronic access control easily manages large user populations, controlling for user
lifecycles times, dates, and individual access points.
3. Intrusion Detection - monitors for attacks. It is less a preventative measure and more of a response measure.
Although some would argue that it is a deterrent. Intrusion detection has a high incidence of false alarm.
4. Video Monitoring – are more useful for incident verification and historical analysis. For instance, if alarms are being
generated and there is a camera in place, the camera could be viewed to verify the alarms. In instances when an
attack has already occurred and a camera is in place at the point of attack, the recorded video can be viewed.

Physical Security Concepts

This concepts are used in physical security planning and establishing protective system that would provide guidelines
on the initial steps to be taken in protecting the facility. The concepts are called the 9D’s. These are presented according to the
recommended chronological order for purposes of systematic institution of each concepts.

1. Define – this is the initial step to be taken in order to determine what are to be protected which includes the type of the
facility, nature of business, type of customers, materials, policies and its perceived threats and risks. In this area, personnel
are expected to know “the intestine of the building”.
2. Direct – after determining the scope of responsibility, procedures on ingress and egress of people, visitors, employee and
materials should be established and conform to the standard of the company or organization. This includes response and
evacuation during emergencies.
3. Deter – rigorous and consistent enforcement of comprehensive security program will present a comfortable, safe and
secure environment for customers and the public in general and will discourage would be perpetrators or person of interest to
gain access. Visual evidence is the key.
4. Deny – this serves as one of the objectives of physical barrier which is to deny or prevent surreptitious or non-surreptitious
entry to the asset at risk. Scrutinization is the key.
5. Detect – this concern to the ability of the system and personnel to detect unauthorized access to the facility.
6. Disseminate – coordination and cooperation in security profession should co-exist. Communication is imperative especially
when penetration has been detected in the area of concentration to inform authorized person in the organization.
7. Delay – when penetration is noted and disseminated, the next thing to do is to delay and/or verify the subject of the activity.
Security personnel should be firm but courteous. Inspection and Scrutinization are vital.
8. Detain – when opportunity warrants, arrest should be immediately made to understand the circumstances surrounding the
incident. Its purpose is to: (1) recover assets; and (2) deter other perpetrators/intruders
9. Defend – the final option is to protect the facility when the preceding concepts seem to be ineffective. In this aspect, the
ability of the personnel to deal with the present situation is critical

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

BARRIER

A barrier can be defined as any structure or physical device capable of restricting, deterring, delaying, illegal access
to an installation.

Generally, a barrier is use in the following purposes:


1. Define the physical limits of an area
2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of guards
5. Facilitate and improve the control and vehicular traffic.

Generally, a barrier is use in the following purposes:


1. Define the physical limits of an area
2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of guards
5. Facilitate and improve the control and vehicular traffic.

TWO GENERAL TYPE OF PHYSICAL BARRIERS


1. Natural Barrier – includes bodies of waters, mountains, marches, ravines, deserts or other terrain that are difficult to
traverse.
2. Man-Made Barriers – structural constructions like fences, walls, floors, roof, grills, bars, road blocks or other physical
means to deter or impede penetration.

OTHER TYPES OF BARRIERS


1. Structural barriers – these are features constructed by man regardless of their original intent that tends to delay the
intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers.
2. Animal Barriers – animals are used in partially providing a guarding system. Dogs are usually trained and utilized to
serve as guard dogs. German shepherds are the best suited for security functions. Goose and turkeys could also be
included.
3. Energy Barriers – it is the employment of mechanical, electrical, electronic energy imposes a deterrent to entry by
the potential intruder or to provide warning to guard personnel. These are protective lighting alarm system and any
electronic devices used as barriers.
4. Human Barriers – persons being used in providing a guarding system or by the nature of their employment and
location, fulfill security functions.

THE THREE LINES OF PHYSICAL DEFENSE

1. First line of Defense – includes perimeter fence or barrier


2. Second Line of Defense – include doors, floors, windows, walls, roofs, and grills and other entries to the buildings.
3. Third line of defense – include storage system like steel cabinets, safes, vaults and interior files.

THE PRINCIPLE INVOLVED IN PHYSICAL SECURITY


1. The type of access necessary will depend upon a number of variable factors and therefore may be achieved in a
number of ways.
2. There is no impenetrable barriers
3. Defense – in depth is barriers after barriers
4. Delay is provided against surreptitious and non-surreptitious entry.
5. Each installation is different

The purpose of Perimeter Security


The main purpose of perimeter barrier is to deny or impede access or exit of unauthorized person. Basically, it is the
first line of defense of an installation. This is maybe in the form of fences, building walls or even bodies of water. The function
and location of the facility itself usually determine the perimeter of the installation. If the facility is located in a city whereby the
building or enterprise occupies all the area where it is located, the perimeter may be walls of the building itself.

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

Most of the industrial companies, however, are required to have a wide space for warehousing manufacturing etc.

The types of Perimeter barriers


Perimeter Barriers include:
1. Fences
2. Walls
3. Bodies of Water

FENCES

A Fence is a freestanding structure designed to restrict or prevent movement across a boundary. It is generally
distinguished from a wall by the lightness of its construction: a wall is usually restricted to such barriers made from solid brick
or concrete, blocking vision as well as passage.

TYPES OF FENCES
• Solid Fence – constructed in such away that visual access through the fence is denied. Its advantage is that it
denies the opportunity for the intruder to become familiar with the personnel, activities and the time scheduled of the
movements of the guards in the installation. On the other hand, it prevents the guards from observing the area
around the installation and it creates shadow that maybe used by the intruder for cover and concealment.
• Full view fence - It is constructed in such away that visual access is permitted through the fence. Its advantages are
that it allows the roving patrols and stationary guard to keep the surrounding are of the installation under observation.
On the other, it allows the intruder to become familiar with the movements and time schedule of the guard patrols
thereby allowing him to pick the time that is advantageous on his part.

Types of full-view fence


1. Chain link fence
• It must be constructed of 7 feet material excluding top guard.
• It must be of 9-guage or heavier
• The mesh openings are not to be larger than 2 inches per side
• It should be twisted and barbed selvage at top to bottom
• It must be securely fastened to rigid metal or reinforced concrete
• It must reach within 2 inches of hard ground or paving
• On the soft guard, it must reach below surface deep enough to compensate for shifting soil or sand

2. Barbed wire fence


• Standard barbed wire is twisted, double-strand, 12 gauge wire with four point barbs spaces in an equal distance
apart.
• Barbed wire fencing should not be less than 7 feet high excluding the top guard.
• Barbed wire fencing must be firmly affixed to posts not more than 6 feet apart.
• The distance between strands must not exceed 6 inches at least one wire will be interlaced vertically and
midway between posts.

3. Concertina wire fence


• Standard concertina barbed wire is commercially manufactured wire coil or of high strength steel barded wire
clipped together at intervals to form a cylinder.
• Opened concertina wire is 50 feet long and 3 feet in diameter.

BUILDING WALL
Wall, floor, roof of their combination serve also as barriers and they should be of such construction to provide uniform
protection just like the wire fencing.
Masonry walls as perimeter barrier should have the same heights as the chain link and surmounted by the barbed
wire top guards; if the height of the masonry is less than the prescribed, additional chain link as “topping”.
Wall can be made of stone slabs like adobe or hollow bound by concrete with post at regular intervals to prevent the
wall from toppling due to wind, or scouring facilities, security must sit down with design engineers so that area where sensitive
activity will be done should be given special emphasis in protective walls.

BODIES OF WATER

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

Bodies of water like river, lake, marsh, sea pond or any other bodies of water forming a part of the wall, building or
fencing should never be considered adequate natural perimeter barrier. Additional security measures like wire fence, concrete
walling, security patrolling and floodlighting at night may be necessary for the portions of the perimeter.

Perimeter Barrier Opening


1. Gates and Doors – when not in use and controlled by guards, gates and doors in the perimeter should be locked
and frequently inspected by guards. Locks should be changed from time to time and should be covered under
protective locks and key control.
2. Side-Walk-Elevators – these provide access to areas within the perimeter barrier and should be locked and
guarded.
3. Utilities Opening – sewers, air intakes, exhaust tunnels and other utility openings which penetrate the barrier and
which have cross sectional areas of 96 square inches or more should be protected by bars, grills, water filled traps or
other structural means providing equivalent protection to that portion of the perimeters.
4. Clear Zones – an obstructed area or a “clear zone” should be maintained on both sides of the perimeter barrier. A
clear zone of 20 feet or more is desirable between the barriers and exterior structures and natural covers that may
provide concealment for assistance to a person seeking unauthorized entry.

Additional Protective Measures


1. Top Guard – additional overhang of barbed wire placed on vertical perimeter fences upward and outward with a 45
degree angle with 3 to 4 strands of barbed wire spaced 6 inches apart. This increases the protective height and
prevents easy access.
2. Guard Control Stations – this is normally provided at main perimeter entrances to secure areas located
out-of-doors, and manned by guards on full-time basis. Sentry station should be near a perimeter for surveillance at
the entrance.
3. Tower Guard – This is a house-like structure above the perimeter barriers. The higher the tower, the more visibility it
provides. It gives a psychological unswerving effect to violators, by and large guard towers, whether permanent or
temporary, must have a corresponding support force in the event of need. Towers as well as guard control stations
should have telephones, intercoms, and if possible two-way radios connected to security headquarters or office to
call for reserves in the event of need.
4. Barrier Maintenance – fencing barriers and the protective walls should always be regularly inspected by security.
Any sign or attempts to break in should be reported for investigation. Destruction of fence or sections thereof should
be repaired immediately and guard vigilance should be increased.
5. Protection in Depth – In large open areas or ground where fencing or walling is impractical and expensive, warning
signs should be conspicuously access roads, and sufficient notices to warn intruders should be done. Use of animals
as guards and intrusion device, can also be good as barriers.
6. Signs and Notices – “Control signs” should be elected where necessary in the management of unauthorized ingress
to preclude accidental entry signs should be plainly visible and legible from any approach and in an understood
language or dialect.

PROTECTIVE LIGHTING
The idea that lighting can provide improve protection for people and facilities is as old as civilization. Protective
lighting is the single most cost –effective deterrent to crime because it creates a psychological deterrent to the intruders.

Purpose of Protective Lighting


1. It provides sufficient illumination to the areas during hours of darkness
2. Lighting can help improve visibility so that intruder can be seen and identified and, if possible apprehended
3. It serves as deterrent to would – be thieves.

Types of Protective Lighting

1. Continuous lighting – the most familiar type of outdoor security lighting, this is designed to provide two specific
results: glare projection or controlled lighting. It consist of a series of fixed luminaries at range to flood a given area
continuously during the hours of darkness.
⮚ Glare projection type – it is being used in prisons and correctional institutions to illuminate walls and outside barriers.
⮚ Controlled lighting – it is generally employed where, due to surrounding property owners, nearby highways or other
limitations it is necessary for the light to be more precisely focused.

2. Standby Lighting – it is designed for reserve or standby use or to supplement continuous system. A standby system
can be most useful to selectively light a particular area in an occasional basis.

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

3. Movable or Portable Lighting – This system is manually operated and is usually made up of movable search or
floodlights that can be located in selected or special locations which will require lighting only for short period of time.
4. Emergency lighting – this system is used in times of power failure or other emergencies when other system are
inoperative.

General Types of Lighting sources


1. Incandescent lamp – it is the least expensive in terms of energy consumed and has the advantage of providing
instant illumination when the switch is on.
2. Mercury vapor lamp – it is considered more efficient that the incandescent and used widespread in exterior lighting.
This emits a purplish –white color, caused by an electric current passing through a tube of conducting and luminous
gas.
3. Metal halide – it has similar physical appearance to mercury vapor but provides a light source of higher luminous
efficiency and better color rendition.
4. Fluorescent – this provides good color rendition, high lamp efficiency as well as long life. However, it cannot project
light over long distance and thus are not desirable as flood type lights.
5. High-Pressure sodium vapor – this has gained acceptance for exterior lighting of parking areas, roadways,
buildings and commercial interior installations. Constructed on the same principle as mercury vapor lamps, they emit
a golden white to light pink color and this provide high lumen efficiency and relatively good color rendition.

Types of Lighting Equipment


1. Floodlights – these can be used to accommodate most outdoor security lighting needs, including the illumination of
boundaries, fences and buildings and for the emphasis of vital areas or particular buildings.
2. Street Lights – these are the lighting equipment received most widespread notoriety for its value in reducing crime.
3. Search light – these are highly focused incandescent lamp and are designed to pinpoint potential trouble spots.
4. Fresnel lights – these are wide beam units, primary used to extend the illumination in long, horizontal strips to
protect the approaches to the perimeter barrier. Fresnel projects a narrow, horizontal beam that is approximately 180
degrees in the horizontal and from 15 to 30 degrees in the vertical lane.

Areas to be lighted
1. Perimeter Fences
2. Building face perimeter
3. Pedestrian and vehicle entrance
4. Parking area
5. Storage, large opened working areas, piers, docks, and other sensitive areas

PROTECTIVE ALARMS AND COMMUNICATION SYSTEM


Protective alarm is one of the important barriers in security. It assists the security in detecting, impeding or deterring
potential security threat in the installation. Basically, its function is to alert the security personnel for any attempt of intrusion
into a protected area, building or compound. Once an intruder tampers the circuitry, the beam or radiated waves of the alarm
system, it will activate an alarm signal.
On the other hand, the use of communication equipment in the installation helps security in upgrading its operational
efficiency and effectiveness.

Three Basic Parts of Alarm System


1. Sensor or Trigger Device – it emits the aural visual signals or both
2. Transmission line – a circuit which transmit the message to the signaling apparatus
3. Annunciator – it is the signaling system that activates the alarm

Types of Protective Alarm System


1. Central Station System – a type of alarm where the control station is located outside the plant or installation. When
the alarm is sounded or actuated by subscriber, the central station notifies the police and other public safety
agencies.
2. Proprietary System – centralized monitor of the proprietary alarm system is located in the industrial firm itself with a
duty operator. In case of alarm, the duty operator calls whatever is the primary need: firefighters, police, an
ambulance or a bomb disposal unit.
3. Local Alarm – this system consist of ringing up a visual or audible alarm near the object to be protected. When an
intruder tries to pry a window, the alarm thereat goes off.

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

4. Auxiliary alarm – company –owned alarm systems unit in the nearest police station so that in case of need, direct
call is possible. The company maintains the equipment and lines both for the company and those in the police, fire
and other emergency agencies by special arrangement. Radio landlines, or cell phones can avail the auxiliary
system.

Kinds of Alarms
1. Audio Detection Device – it will detect any sound caused by attempted force entry. A supersonic microphone
speaker sensor is installed in walls, ceilings and floors of the protected area.
2. Vibration Detection Device – it will detect any vibration caused by attempted force entry. A vibration sensitive
sensor is attached to walls, ceilings or floors of the protected area.
3. Metallic Foil or Wire – it will detect any action that moves the foil or wire. An electrically charge strips of tinfoil or
wire is used in the doors, windows or glass surfaces of the protected area.
4. Laser Beam Alarm – a laser emitter floods as wall or fencing with a beam so that when this beam is disturbed or
when an intruder breaks contact with the beam, it will activate the alarm.
5. Photoelectric or Electric Eye Device – an invisible/visible beam is emitted and when this is disturbed or when an
intruder breaks contact with the beam, it will activate the alarm.

PROTECTIVE LOCKS AND KEY CONTROL MANAGEMENT

Lock is one of the most widely used physical security devices in the asset protection program of an installation. It
complements other physical safeguards of the installation against any possible surreptitious entry. However, the owner of the
installation or his security officer needs to understand the weaknesses and strength of each type of lock including the door,
window or walls to be used to achieve maximum benefit from it application. This is because highly skilled burglars more often
concentrate on the lock and its surrounding mechanism in order to make a forcible entry. It is for this obvious reasons that
locks are considered as delaying devices which cannot really top a determine intruder from destroying the lock just to launch
an attack. Hence, knowledge of the basic principles of locking systems will enable the installation owner or the security officer
to evaluate any lock and determine its quality and effectiveness in a particular application.

Lock
A lock is defined as mechanical, electrical, hydraulic or electronic device designed to prevent entry into a building,
room, container or hiding place.

Types of Lock
1. Key operated mechanical lock
Four general groups and key control
a. Disc tumbler lock
b. Pin tumbler lock
c. Lever tumbler lock
d. The warded lock
2. Padlock
3. Combination lock
4. Code-operated lock
5. Electrical lock
6. Card-operated lock

Types of Key
1. Change key
2. Sub-master key
3. Master key
4. Grand Master key

Key Control Management


Once an effective key control has been installed, positive control of all keys must be gained and maintained.
This can be accomplished only if it is established in conjunction with the installation of new locking devices. The
following methods can be used to maintain effective key control;
1. Key cabinet
2. Key record
3. Inventories
4. Audits
5. Daily report

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

Principles of Key Control Management


The essence of key control in a security system can never be overemphasized, Key control management will assist
protective system in use. The following pointers will be helpful in any system.
1. A key depositor for securing keys during non-working should be centrally located, locked and kept under supervision
of security personnel.
2. Key issued on daily basis, or this issued for a specific on time purpose, should be accounted for daily.
3. Key should be counted and signed for by security supervisor at the beginning of each working day.
4. When the key is lost, the circumstances should be investigated and set forth in writing. In some instance, if the lost
key provides access to sensitive area, lock should be change.
5. All keys should be physically inspected periodically to ensure that they have not been lost though unreported as
such.
6. Careful record should be kept of such instance. The list should be reviewed periodically to determine whether all
those authorized should continue to hold such key.
7. Master key should be in minimum. If possible, sub-master key should be used, and they should be issued only to
limited list of personnel especially selected by management.
8. Key should not be marked or should not identify doors of locks they open. Code should be made to this effect.
9. Master key should nor=t be mark identifying them as a master key.
10. Key and locks should be change at least once in 12 months.

Laws Related on Key Control Management Statutory Prohibited of Key

ART. 304 (Revised Penal Code). Possession of Picklocks or similar tools


Any person who shall without lawful cause have in possession of picklocks or similar tools especially to the
commission of the crime or robbery, shall be punished by arresto mayor in its maximum period to prison correccional in its
minimum period to prison coreccional in its minimum period
The same penalty shall be imposed upon any person who shall make such tool. If the offender is a locksmith, shall
suffer the penalty of prison correccional in its medium and maximum period.

ART. 305 (Revised Penal Code). False Key:


The term “False key” shall be deemed to include:
a. The tool mentioned in the next proceeding articles.
b. Genuine keys stolen from the owner.
c. Any key other than those intended by the owner for use in the lock forcibly opened by the offender.

SECURITY CABINET
The final line of defense at any facility is in the high security storage where papers, records, plans or cashable
instrument, jewelries or other especially valuable assets are protected. These security containers will depend of a size and
quantity, which the nature of the business dictates.
In protecting property, it is essential to recognize that protective containers are designed to secure against burglary of
fire. Each type of equipment has a specialized function and it will depend on the owner of the facility which type that is to be
use.

Three Types of Cabinet

1. Safe – a metallic container used for the safe keeping of documents or small items in an office or installation. Safe can
be classified as either robbery or burglary resistance depending upon the use and need.
● At least 750 lbs. anchored
● Any safe that weigh less than 750 lbs. should be anchored to a building structure.
● Its body should at least one inch thick steel or equal.
● Safe as a general rule, require the door to be made of steel and at least 1 ½ thick.

Test for Safe Fire Resistance:


a. Fire Endurance – A safe should not have at any one time a temperature above 350 degrees Fahrenheit.
b. Hazard Test – Test to determine if sudden rise in temperature will not cause the safe to rupture. If the safe can
withstand 2000 degrees Fahrenheit for 30 minutes and will not crack or open, then it has passed the explosion test.
c. Fire and Impact Test – aimed at determining the strength of a safe to withstand the collapse of a building the fire.
2. Vault – a heavily constructed fire and burglar resistance container is usually a part of the building structure used to
keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but smaller than a file
room.

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

● The vault door should be made of steel at least 6 inches in thickness.


● Vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
● Electrical conduits into the vaults should not exceed 1 ½ in diameter.
● Vault floor should be higher by four inches with the surrounding floors and if in level with the floor buttons,
storage container should be raised at least 4 inches above the floor.
● Vault should not be made part of the wall due to moisture and condensation caused by temperature.
● Standard vaults, to reduce destroying of too much record, should not be more than 5,000 cubic feet.
● The vault must be resistive up to 6 hours.

3. File room – a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited
people to work on the records inside.
● The file room should at most be 12 feet high.
● The interior cubage should not more than 10,000 cubic feet.
● The ventilation should be through the door.
● It must have a watertight door and at least fire proof for one hour.
● The supporting structure, the walls, floor and roof should be made fire-proof.

PERSONAL IDENTIFICATION AND TRAFFIC CONTROL MOVEMENT

In every installation, the use of protective barriers, secure lighting, communication and electronic hardware provides
physical safeguards but these are insufficient to maximize the effort of the guard force. A control point must be established for
positive personnel identification and check system. This is to insure that only those persons who have the right and authority
will be given the necessary access to the area.
The most practical and generally accepted system of personnel identification is the use of identification cards badges
or passes. Generally speaking, this system designates when, where, how identification cards should be displayed, and to
whom. This helps security personnel eliminate the risk of allowing the access of unauthorized personnel within the
establishments. To be effective, the following should be considered:
1. Badge must be tamper-resistant, which mean that they should be printed or embossed on a distinctive stock with a
series of design difficult to reproduce;
2. They should contain a clear and recent photograph of the bearer, preferably in the color;
3. The photograph should be at least one inch square and should be updated every two or three years or when there is
any significant change in facial appearance; and
4. Should additionally contain vital statistic such as date of birth, height, weight, color of hair and eyes, sex and
thumbprints.

Types of Personal Identification


1. Personal recognition
2. Artificial recognition

Use of Pass System


1. Single pass system
2. Pass exchange system
3. Multiple pass system

Badge and Pass Control


1. The system should have a complete record of all badges and identification cards issued, return, mutilated or lost by
serial number and cross-indexed alphabetically.
2. The supervisor from time to time for its accuracy and authenticity should check the lists.
3. Passes and badges reported lost should be validated and security personnel at the entrance gate be informed
through conspicuous posting

Types of Controlled Area


1. Controlled area
2. Limited area
3. Exclusion area

Traffic Control System:

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

Controlling traffic in and out within a facility is essential to the physical security program. Perimeter barriers, locked
doors and screened windows prevent or deter the entry of authorized visitors, but since some traffic essential to every
operation, no matter how highly, classified it maybe, provision must be made for the control of this movement.
Specific solution will depend upon the nature of the business, obviously retail establishment, which encourage high
volume traffic and which regularly handle a great deal of merchandise both in and out, have a problem of a different dimension
from the industrial operation working on a highly classified government project. Both, however, must work from the same
general principles towards providing the greatest possible security within the efficient and effective operation of the job at
hand.
1. Identification of employees and visitor and directing or limiting their movements;
2. Control of all incoming and outgoing packages; and
3. Control of trucks and private vehicles.

Visitor’s Movement Control


Security should establish proper methods of establishing the authority for admission of visitors as well as the
limitation thereat. This security measure would depend on the sensibility of the installation, but could include the following:
1. Visitor’s logbook
2. Photograph
3. Escort
4. Visitor entrances
5. Time traveled

Package Movement Control


Every facility must establish a system for the control of package entering or leaving the premises. Since transporting
of packages through the portals is a fact of life, they must be dealt with in order to prevent theft and misappropriation of
company properties. Thus;
1. No packages shall be authorized to be brought inside the industrial installation, offices and work area without proper
authority. This basic precept help reduce if not eliminate pilferage, industrial espionage or sabotage.
2. Outgoing packages carried by personnel should be closely inspected and those in vehicles should also be checked
as many pilfered items are hidden in the surface of the vehicles leaving the compound.
3. Any personnel/visitor entering the installation with a package should deposit the same to the security and in return
receives a numbered tag, which he/she will use in claiming his/her package upon departing.

Vehicle Movement Control and Identification

Vehicular traffic within the boundaries of any facility must be carefully controlled for safety as well as to control the
transporting of pilfered goods from the premises. Thus;
1. Privately owned vehicle of personnel/visitor should be registered and are subject to the identification and admittance
procedure.

Vehicles should be subjected for research at the entrance and exit of the installation.
1. All visitors with vehicle should provide the security as to the complete details of their duration of stay, person to be
visited, and other information.
2. All vehicles of visitors should be given a sign/sticker to be placed on the windshield.
3. Traffic warning signs should be installed in all entrances in order to guide the visitors in their destination as well to
provide them with the necessary safety precautions while they are inside the installation.
4. Security personnel must constantly supervise parking areas and make frequent spots searches of vehicles found
there.

Building Access Control


At any physical barrier, a security system must possess the ability to distinguish among authorized persons,
unauthorized visitors, and other unauthorized persons. This is to assist the security personnel protects sensitive information
within the installation.
Appropriate warning signs should be posted at the building perimeter. Special restricted entry facilities to public
access should be provided. This will be dependent on the degree of security needed for the protection of property, activity and
other processes within the building.
The access to the restricted area shall be limited to authorize personnel who have the direct involvement with the
installation, construction and operation and maintenance of the equipment and systems and/or use of the materials contained
within the restricted area. A clear-cut policy on the access control should be disseminated to all personnel of the installation.

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Recognized the purpose of personnel security;

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

2. Constructed an in-depth analysis on the difference between local agency check and national agency check; and
3. Internalized the concepts in personnel security; and

Personnel Security is the protection of the company assets against loss of life and damage to property. Its main
concern is the security and safety of each people and the organization. In personnel security, the people in the organization
are considered the greatest threat to the security organization because they create the security holes.

Of the three major aspects of security, personnel security is considered as the most important. This is for the simple
reason that security involves people, both as an asset to be protected and as source of security threats. It is an acknowledge
fact that losses are attributed mainly to negligence or active participation of employees, either through theft and sabotage.
This emphasizes the need to set up a system of hiring the people for the company. Personal Security is considered the
weakest link in security management.

Purpose of Personnel Security


1. To insure that a firm hires those employees best suited for the firm; and
2. Once hired, to assist in providing the necessary security to these employees while they are carrying out there
functions.

Scope of Personnel Security


1. Personnel Security Investigation (PSI)
2. Security Education

Key Functions of Personnel Security


1. It serves as a screening device in hiring suitable employees.
2. It provides background investigation series of both potential and present employees for possible assignment to
sensitive position.
3. It handles investigation of employees’ suspected wrong doing.
4. It develops security awareness among employees.
5. It attempts to ensure the protection of employees from discriminatory hiring or terminating procedures as well as
unfounded allegations of illegal or unethical activities and conduct.

Personnel Security Investigation (PSI)


Personnel Security Investigation (PSI) is a process of inquiry into the character, reputation, discretion, integrity,
morals and loyalty of an individual to determine the suitability for appointment or access to classified matter.

In PSI, the security manager should determine the following:


1. Is the information given true or false?
2. Is the applicant perhaps concealing information?
3. Does the applicant have other reasons for applying, aside from employment for example, maybe to conduct
intelligence gathering against the company.

PSI should be properly documented in order to facilitate the conduct of administrative or criminal procedure in the
event of discovery of derogatory information.

Personnel security investigation has three general techniques:


1. Background investigation
2. Positive vetting, and
3. Profiling

General Techniques of PSI

Background Investigation (BI) – this technique is very expensive but necessary in personnel security. It serves to verify
information on the application form and to obtain other information pertinent to the decision to employ.

Factors to consider in the conduct of BI


a. Loyalty b. Integrity c. Discretion
d. Morals e. Character f. Reputation
Components of Complete BI

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

a. Applicants Name k. Neighborhood investigation


b. Date of Birth l. Character reference
c. Present residence address m. Employment History
d. Personal History n. Military History
e. Marital History o. Foreign travel history
f. Residence History p. Criminal record
g. Citizenship q. Credit records
h. Physical Data r. Applicant’s signature
i. Educational History s. Date of application
j. Organization membership

Types of Local Agency Check (LAC)


a. Barangay Clearance c. Local Police Clearance
b. City or Municipal Clearance d. Court Clearance

Types of National Agency Check (NAC)


a. National bureau of Investigation (NBI) Clearance
b. PNP Directorate for Intelligence (DI) Clearance
c. Intelligence Service, AFP (ISAFP) Clearance

1. Positive Vetting – is the process of inspecting or examining with careful thoroughness. The essence of vetting is a
personal interview conducted under stress. It is based on information previously given by the applicant. Other
information issued during the interview, such as those discovered in the BI, which confirms or denies which given by
the applicant.

2. Prowling – is the process whereby a subject’s reaction in a future critical situation is predicted by observing his
behavior, or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test. The Reid
Report is an example of honesty test.

3. Deception Detection Techniques – this process of using devices in detecting deception during the interview stage.
This includes the use of a Polygraph, Psychological Stress Evaluator and Voice Analyzer.

4. Financial and Lifestyle inquiry – this type of investigation seeks to gather information on income and mode of
living, sometimes referred to as the earning-to-debt ratio.

5. Undercover Investigation – this is the placement of an agent in a role in which the agent’s true identity and role
remains unknown, in order to obtain information for criminal prosecution or for recovery or limitation of asset losses.

6. Exit Interview – this is a valuable tool because it gives departing employees an opportunity to list grievances. It
offers security managers an opportunity to learn of problems not previously known. Incorporating a checklist of
company-issued property and confronting a departing employee is also incorporated into the exit interview to remind
employees of their continuing legal obligation to safeguard confidential company information.

Security Education Program

Security education is conducted to develop security awareness among employees in the company. It should cover all
employees, regardless of rank or position.

COURSE OUTCOMES:
At the end of the lesson, the students must have:

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

1. Known the standard rules for document security including the document security system, the purposes of protecting
classified matters and distinguished patents from trade secret;
2. Explained the CIA Triad; and
3. Appreciated the distinction between patents and trade secrets.

The protection of the company property information from the inadvertent disclosure and destruction of documents is
the paramount focus of information security management. It is closing the window of exposure. Information security in the
industry is defined as the sum total of all policies, regulation, practices, enforce to safeguards the contents and integrity of any
classified information or document from compromise or loss.

Access to information security is based on the required broad principles known as C-I-A TRIAD.
1. Confidentiality – the assurance that information is accessible only to those authorized to have access.
2. Integrity – the assurance that information and processing methods are accurate and complete.
3. Availability – the assurance that authorized users have access to information and associated assets when needed.

Two (2) Kinds of Document


1. Personal – letters, diary, and notebooks. These should be treated usually the same with official document.
2. Official – orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain of
command.

Documentation/information cycle
Each document or information has a life cycle in the sense that its usefulness has a beginning and an end. It passes
various stages from the time it is created until it is finally disposed. This cycle consist of the following:
Enumerate the documentation or information cycle in chronological order.
1. Creation
2. Classification
3. Storage
4. Retrieval
5. Retention/Purging
6. Transfer
7. Disposition

FOUR (4) TYPES OF CLASSIFIED MATTER

1. TOP SECRET (green color code) – is any information and materials the unauthorized disclosure of it would cause
exceptionally grave damage to the nation, politically, economically and military operation.
2. SECRET (red color code) – is any information and material, the unauthorized disclosure of it would endanger
national security cause serious injury to the interest or prestige of the nation or any governmental activity or
advantage to a foreign nation.
3. CONFIDENTIAL (blue color code) – is any information or material, the unauthorized disclosure of it would be
prejudicial to the interest and prestige of the national or governmental activity or would cause administrative
embarrassment or unwanted injury to and be of advantage to a foreign country.
4. RESTRICTED (white or no color code) – is any information and material which requires special protection other than
those determines confidential, secret and top secret.

In the security management application, top secret is not used, classified matter will starts on secret classification. This is
because the applications is limited or focused only to the industry.

BASIC CONSIDERATION IN DOCUMENT AND INFORMATION SECURITY


1. Security of information is based on the premise that the government has the right and the duty to protect official
papers from unwanted and indiscriminate disclosure;
2. The authority and responsibility for the preparation and classification of classified matters rest exclusively with the
origination office;
3. Classified matter shall be classified according to their contents and not to the classification of files in which they are
held or another document to which they are referred;
4. Classification shall made as soon as possible by placing appropriate marks on the matter to be classified; and

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

5. Each individual whose duties allow access to classified matter while it is in his position shall insure that dissemination
of such classified matter is on the “need to know” basis.

PURPOSE OF PROTECTING CLASSIFIED MATTERS


1. Deter and impede potential spy.
2. Assist in security investigations by keeping accurate records of the moments of classified materials.
3. Enforce the use of “Need to Know principle”.

CATEGORIES OF DOCUMENT
1. Category A
● Information which contains reportable time sensitive, order of battle and significant information.
● It should be given priority because it is critical information.
● It must be forwarded without delay.
● It is critical to friendly operations.
● It requires immediate action.

2. Category B
● Anything that contains communications, cryptographic documents, or systems that should be classified a
secret and requires special handling.
● Higher authorities should declassify it.

3. Category C
● Other information, which contains something that, could be an intelligence value.
● Contains exploitable information regardless of its contents.
● Unscreened materials/documents should be categorized as Category C.

4. Category D
● No value, yet lower level will never classify documents as category D.
● No decision must be made at the lower echelon that document has no value. It is the responsibility of the
higher headquarters.

TYPES OF DOCUMENT

Class I – Vital Documents:


In this category these are records that are irreplaceable, records of which reproduction does not have the same value as the
original; records needed to recover cash, to replace building, equipment, raw materials, finished products, and work in process
and records needed to avoid delay in restoration of production, sales and services.

Class II – Important Documents:


These include records the reproduction of which will close considerable expense and labor, or considerable delay.

Class III – Useful Documents:


These include records whose loss might cause inconvenience but could be readily replaced and which would not in the
meantime present an insurmountable obstacle to the prompt restoration of the business.

Class IV – Non-essential Documents:


These records are daily files, routine in nature even if lost or destroyed, will not affect operation or administration. This class
represent the bulk of records which should not be even attempted to be protected in the event of disasters. They should,
however, be kept in ordinary files ready for reference, if needed, and usually discarded after some period of time.

RULES OF CLASSIFICATION OF DOCUMENTS

1. Documents shall be classified according to their content.


2. The overall classification of a file or of a group of physically connected therein. Pages, paragraphs, sections or
components thereof may bear different classifications. Documents separated from file or group shall be handled in
accordance with their individual classification.

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

3. Transmittal of documents or endorsements which do not contain classified information or which contain information
classified lower than that of the preceding element or enclosure shall include a notation for automatic downgrading.
4. Correspondence, Indexes, receipts, reports of possession transfer or destruction, catalogs, or accession list shall not
be classify if any reference to classified matter does not disclosed classified information.
5. Classified matter obtained from other department shall retain the same original classification.

PROTECTION OF SENSITIVE INFORMATION

Proprietary information is information that in some special way relates to the status or activities of the possessor
and over which the possessor asserts ownership. In the business community, proprietary information relates to the structure,
products or business methods of the organization. It is usually protected in some way against causal or general disclosure.
All proprietary information is confidential, but not all confidential information is proprietary. For example, confidential
personnel data in employee files is not considered as proprietary although the company treats it as confidential.

TYPES OF PROPRIETARY INFORMATION


1. Trade Secret – this consist of any formula, pattern, device or compilation of information which is used in one’s
business and which gives him an opportunity to gain an advantage over competitors who do not know or use it. It
may be a formula for a chemical compound a process of manufacturing, treating, or preserving materials, a pattern
for machine or device, or a list of customers. It differs from other secret information as to single or ephemeral events.
A trade secret is a process or device for continuous use in the protection of the business.
2. Patent – this is a grant made by the government to an inventor, conveying or securing to him the exclusive right to
make, use, or sell his invention for term of years.

PRIMARY DISTINCTIONS BETWEEN PATENTS AND TRADE SECRETS

1. Requirements for obtaining a patent are specific; to qualify for a patent the invention must be more than novel and
useful. It must represent a positive contribution beyond the skill of the average person.
2. A much lower of novelty is required of a trade secret.
3. A trade secret remains secret as long as it continues to meet trade secret tests while the exclusive right to patent
protection expires after 17 years.

COURSE OUTCOMES:
At the end of the lesson, the students must have:

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

1. Differentiated the types of hazards; and


2. Internalized the different alternatives and strategies in risk management by practicing it during emergency times.

SECURITY PROBLEMS
Any act or condition which may result in the compromise of information, loss of life, and loss or destruction of
property or disruption of the activity of the installation.
The extent and degree of risk to security is dependent on:
a. Relative criticality of operation – is the importance of the firm with reference to the natural economy and security
b. Relatively vulnerability – is the susceptibility of the plant or establishment to damage loss or disruption of operation
due to various hazards

Types of Hazard
1. Natural Hazard – these are hazards which arise from natural phenomena. The following are types of natural hazard
or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Storms (typhoons, cyclones, tornado and hurricane
d. Lighting storms
e. Extreme temperature and humidity
2. Human-man made hazard – these are hazards which are the result of a state of mind, attitude, weaknesses or
character traits of one or more persons. They can be acts of commission or omission, both overt and covert, which
can disrupt operation of a plant or installation. The following are types of human or manmade hazards:
a. Carelessness – accidents and dissatisfaction
b. Disloyalty – subversion and sabotage
c. Espionage, pilferage and theft
d. Vandalism; etc.

Sabotage as a Security Hazard


Description as a Saboteur
1. He is the most dangerous for whom security will have to deal with while planning and implementing security
measures and techniques.
2. He is an ordinary looking as the next guy but in his mind, he has the training in deception, knowledgeable in
incendiaries, explosives, chemistry, bacteriology, mechanics and psychology.
3. He can work alone, in-groups, or simultaneously in several places.

Possible Targets of Saboteur


1. Armed Forces Installation
2. Natural resources – mines, forests, farms, and farm products
3. Industries – buildings, power sources, machinery, fuel, etc.
4. Warehouses depots, communications, public utilities, etc.

Countermeasures against Sabotage


1. Use of an efficient, alert and trained guard force.
2. Use of physical security aids like barriers, personnel and vehicular control, intrusion devices, communication
systems, and electric aids.
3. Proper screening of personnel.
4. Identification and movement control system.
5. Searches on incoming vehicles.
6. Safeguarding of classified information.
7. Designation of restricted areas.
8. Investigation of breaches of security.
9. Security education and indoctrination.
10. Good housekeeping methods.
11. Effective and compatible emergency planning.
12. Regular audit.
13. Continuing background checks.

Espionage as a security hazard


Description of an Espionage Agent
1. He is very dangerous adversary and his skills in deception and his cunning should never be under estimated.

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

2. He is usually a person of extensive training and will be highly effective in gaining the confidence of people and of
extracting information of value to be relayed to his employer or handler.
3. Even how well-trained an espionage agent he might be, he is human like saboteur and he can be defeated in his own
game if proper methods and techniques are undertaken.

Some methods Employed by Espionage Agent


1. Stealing or information from employees.
2. Stealing information from records or other sources.
3. Using various methods of reproducing documents products equipment or working models.
4. Using “front” as commercial concerns, travel agencies, associations, business groups and other organizations to
obtain confidential information or data.
5. Using various form or threats to obtain information.
6. Using blackmail techniques by exposing intimate and personal details concerning an individual or organization.
7. Picking or securing information in social and other gatherings.
8. Penetration and operational tactics.

Countermeasures against Industrial Espionage


1. Careful and complete pre-employment measures designed to control threats of industrial espionage.
2. Continuing personnel check on employees and particularly personnel on sensitive positions even already employed.
3. Prevention of unauthorized entry to the plant or industrial installation.
4. Restricting of movement of personnel in the premises of the plant.
5. Controlled disposal of waste papers including carbons in classified work.
6. Only properly cleared personnel should handle classified document.

Subversive activity as a security hazard


Threats of Subversive Activity
1. It can be local or national in nature and their mission is to undermine the authority weaken the organization and
eventually take over. This can be in business or any activity.
2. This can be in the form of rumor mongering, propaganda, undermining morale, and injecting defeatist attitudes, and
other emotional approaches.
3. It is an activity not easy to detect.

Countermeasures to Subversive Activity


1. The spreading of rumors, written materials, slogans or any other devices to confuse the work population and discredit
the government should be immediately reported.
2. Labor and other company unions can be infiltrated so that strikes and “slow downs” can be called to disrupt the
normal operation of a plant or installation.
3. Security force should be alerted for person trying to recruit others in organizing movements for peace, anti-colonials,
anti-trade and anti-imperialism.
4. Employees or outside personnel seeking memberships in “paper organizations” should report this activity to security.
5. Other methods of subversion like untied fronts, mob action, terrorism and sabotage will do to gain the subversive
ends.

Pilferage as a Business Hazard


1. Pilferage is one of the most annoying and common human hazards which security has to deal with. This activity if
uncontrolled can become financial drain if not a menace to smooth and orderly operation.
2. Failure to detect shortage and inaccurate inventories will cause inventory losses, which may be labeled as pilferage.

Pilferage
This one is the most annoying and common human hazards which security has to deal with. This activity if
uncontrolled can become a financial drain if not a menace to smooth and orderly operation. Due to this, security force has to
concentrate large number men to check this nefarious and disconnecting activity. Petty pilferage is frequent, hard to detect,
difficult to prove and with conviction but definitely dangerous to ignore.

Types of Pilferer
1. Casual Pilferer - is one who steals primarily for personal use because theft appears easy and there is little fear of
detection.
2. Systematic Pilferer - steals according to preconceived plans for the purpose of selling the stolen items or bartering
them for other valuable commodities.

Anatomy of Pilferage

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

1. Where need or desire exists and opportunity is present, theft is almost sure to result.
2. Pilferage occurs everywhere. Opportunities for pilferage increase when supplies or goods are transported or
transferred from one place to another.

Factors considered by a Pilferer to be Successful on his Act


1. Location of items to be pilfered – the systematic pilferer surveys shopping and store areas, or through contracts from
the firms.
2. Access to the items – techniques can be from fake documents, bribing of guards, outsmarting security, creating
disturbance and other methods to divert attention while pilferage goes on.
3. Removal of item – this can be done as wearing the stolen shoes or shorts, concealment in body or vehicles, use of
false documents, etc. Driver may conceal pilfered items in his vehicle.
4. Disposal of items – there is a need for “fences” “brokers”, or “clearing houses” for these “hot” items.

COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Known the standard requirement in a security survey; and

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

2. Distinguished the difference between security survey and security inspection.

SECURITY SURVEY

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Discussed the basic concepts in close protection and V.I.P. security; and
2. Distinguished the roles of close protection officers, executive and VIP security.

VIP protection means providing high-profile clients and their families with personal protection services to insure their
peace of mind, safety and security. People can be considered VIPs due to their elevated political or business status, for being
celebrities or for otherwise being well-known or high-profile. VIPs, because of who they are or who they are perceived to be,
are at risk of personal assault, kidnapping and being the victims of terrorist attacks.

EXECUTIVE PROTECTION (V.I.P. SECURITY)

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

THE ROLES OF CLOSE PROTECTION OFFICERS OR BODYGUARDS

Close protection officers (CPOs), or bodyguards, keep clients safe from unwanted attention or physical harm. They
are responsible for assessing security measures and providing discreet surveillance. Their work includes:

1. Protecting their clients from threats of physical violence.


2. Checking out premises, such as hotels, restaurants and theatres, before the client arrives.
3. Installing surveillance equipment.
4. Surveying the layout of venues, noting potential hazards and exposure to risks.
5. Accompanying the client on business and social trips.
6. Driving the client to and from venues.

THE BASIC SECURITY PRINCIPLES IN VIP SECURITY

Several guiding principles are involved in the security of very important persons, including:

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

1. Protection, which implies defending VIPs by using protective gear, such as bulletproof vests, bulletproof vehicles
during travels, and other methods.

2. Deterrence, which suggests the instilling of fear in a person about the consequences of their potential actions.
Essentially, a VIP executive protection agent needs to demonstrate that he or she can protect the VIP at all costs. For
example, the agent dissuades the potential attacker from implementing an assault. As you can imagine, this doesn’t
work great with suicide bombers. The reason for this is that they have no fear of the consequences. But still, it’s an
important principle.

3. Access control, which implies controlling the access of the general public to VIPs. Very important persons typically
attend public gatherings, political and business meetings. Therefore, access control is known as the most utilized
principle in VIP protection. It involves the following methods:
● Checking the food given to VIPs,
● Removing sharp objects close to VIPs,
● Restricting weapon presence in the vicinity of VIPs,
● Scanning members of the public with metal detectors and physical techniques, and,
● Anti-sabotage system, involving minesweepers, explosive detectors, hand-held metal detectors. The point of
this is to ensure safety against a bomb-attack.

THE SECURITY PREPARATIONS IN LOCAL/FOREIGN TRAVEL

Prepared by: William M. Ramirez


Instructor I
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPT

THE VIP SECURITY MEASURES IN ALL AREAS

Prepared by: William M. Ramirez


Instructor I

You might also like