Lea 3 Industrial Security Concept
Lea 3 Industrial Security Concept
COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Identified the legal basis of industrial security management; and
2. Discussed the legal bases of industrial security management as to natural authority, constitutional and statutory
authority.
1. Natural authority
2. Constitutional authority
3. Statutory authority
E. Presidential Decree No. 1919 (Amending RA No. 5487, PD No. 11 and 100)
F. Republic Act No. 6975 (DILG LAW) – this is the law authorizing the PNP the control and supervision of security
agency in the Philippines.
watchman or security guard; and any person, association, partnership, or corporation, who recruits, trains, muster, furnishes,
solicits individuals or business firms, private or government-owned or controlled corporations to engage his service or those of
its watchmen, shall be known as Watchman of Security Guard Agency. (As amended by Pres. Decree No. 11, October 3,
1972.)
Section 4. Who May Organize a Security or Watchman Agency. Any Filipino citizen or a corporation, partnership, or
association, with a minimum capital of five thousand pesos, one hundred per cent of which is owned and controlled by Filipino
citizens may organize a security or watchman agency: Provided, That no person shall organize or have an interest in, more
than one such agency except those which are already existing at the promulgation of this Decree: Provided, further, That the
operator or manager of said agency must be at least 25 years of age, a college graduate and/or a commissioned officer in the
inactive service of the Armed Forces of the Philippines; of good moral character; having no previous record of any conviction
of any crime or offense involving moral turpitude and not suffering from any of the following disqualifications:
(1) Having been dishonorably discharged or separated from the Armed Forces of the Philippines;
(2) Being a mental incompetent;
(3) Being addicted to the use of narcotic drug or drugs; and
(4) Being a habitual drunkard.1awphil.net
For purposes of this Act, elective or appointive government employees who may be called upon on account of the functions of
their respective offices in the implementation and enforcement of the provisions of this Act and any person related to such
government employees by affinity or consanguinity in the third civil degree shall not hold any interest, directly or indirectly in
any security guard or watchman agency. (As amended by Pres. Decree No. 11.)
Section 5. Qualifications Required. No person shall be employed as security guard or watchman or private detective unless
he is: (a) a Filipino citizen; (b) a high school graduate; (c) physically and mentally fit; (d) not less than 21 nor more than 50
years of age; (e) at least 5 feet and 4 inches in height; and (f) suffering none of the disqualifications provided for in the
preceding section: Provided, That foreigners who are already employed as watchmen or security guards prior to the approval
of this Act shall not be subject to the above-mentioned requirements: Provided, further, That veterans shall be given priority in
employment as security guard, watchman or private detective: And provided, finally, That person convicted of any crime
involving moral turpitude shall not be employed as security guard, watchman or private detective.
Section 6. License Necessary. No person shall engage in the business of, or act either as a private detective, or detective
agency; and either engage in the occupation, calling or employment of watchman or in the business of watchman's agency
without first having obtained the necessary permit from the Chief, Philippine Constabulary which permit as approved is
prerequisite in obtaining a license or license certificate: Provided, That all existing private detective or watchman or security
guard agencies shall have a period of one (1) year from the approval of this Act to secure the said license: Provided, further,
That existing agencies, and any new agency which may hereafter apply for a license, certify under oath that their private
detectives, watchmen or security guards, have received the appropriate training from either the Philippine Constabulary, the
National Bureau of Investigation, any local police department, or any other public institution duly recognized by the
government to conduct police training.
Section 7. Application for License. The application shall be made in writing and shall be filed with the Chief, Philippine
Constabulary. It shall contain the full name of the applicant, his age, civil status, his residence, and location of business. If the
applicant is a corporation, association or partnership, a copy of the certificate of registration with the Securities and Exchange
Commission together with its by-laws and articles of incorporation, with the Bureau of Commerce.
Section 8. Fees to be Paid and Bonds. When all requisites for the issuance of the license have been complied with, the Chief
of the Philippine Constabulary or his duly authorized representative shall issue a permit for the issuance of such license and
register the same in his office, upon payment by the applicant of the fee in accordance with the following schedule:
(a) the sum of one hundred pesos per annum as national license;
(b) the sum of fifty pesos per annum as municipal license fee in any city where it may operate, the said fee to be
payable to the city treasurer concerned;
(c) the sum of twenty-five pesos per annum as municipal license fee for any municipality where it may operate, the
said fee to be payable to the municipal treasurer concerned;
(d) the private Detective and Watchman Agency shall in addition to the above pay a fixed Internal Revenue Tax of
one hundred pesos per annum in lieu of percentage taxes;
(e) the individual private detective and/or watchman shall pay for Mayor's Permit, Health and/or Sanitary fee an
amount not exceeding three pesos per annum and the agency shall pay the sum not exceeding ten pesos for the
Mayor's Permit and Health and/or Sanitary fees; and
(f) the Chief of the Philippine Constabulary or his duly authorized representative shall issue an appointment over his
signature and affix the seal of his office, to each license and for each such appointment, the sum of one peso shall be
paid.1awphil.net
The application shall further be accompanied by a bond issued by any competent or reputable surety or fidelity or insurance
company duly accredited by the office of the Insurance Commissioner in the sum of not less than five thousand pesos nor
more than ten thousand pesos in the discretion of the Chief, Philippine Constabulary, which bond shall answer for any valid
and legal claim against the agency by its clients or employees: Provided, That licenses issued in the province of an authorized
representative of the Chief of Constabulary is subject to review by the Chief of Constabulary.
Any provision of this or other law to the contrary notwithstanding, the Chief of Constabulary may, at any time suspend or
cancel the licenses of private watchman or security guard agency found violating any of the provisions of this Act or of the
rules and regulations promulgated by the Chief of Constabulary pursuant thereto. (This paragraph was inserted by Sec. 3,
Pres. Decree No. 11.)
Other provisions of Pres. Decree No. 11
Any person who commit any act in violation of Republic Act No. 5487 and of this Decree, and the implementing rules and
regulations already promulgated which are not in conflict herewith, and those to be promulgated by the Chief of Constabulary
pursuant hereto, shall, on conviction thereof, suffer imprisonment of from ten to fifteen years and a fine of not less than ten
thousand pesos nor more than fifteen thousand pesos as a military court/tribunal or commission may direct.
The Chief of Constabulary shall promulgate the necessary rules and regulations to carry out the provisions of this Decree.
Section 9. Employees Need Not be Licensed. Every person operating, managing, directing or conducting a licensed private
detective or watchmen agency shall also be considered licensed private detective, or watchman and no person shall be
employed or used in a private detective work unless he be a licensed private detective or watchman: Provided, That nothing in
this section shall be construed as requiring detective license for persons employed solely for clerical or manual work.
Section 10. Display of License. The license shall be displayed at all times in a conspicuous and suitable place in the agency
office or headquarters of the agency and shall be exhibited at the request of any person whose jurisdiction is in relation with
the business of the agency or the employees thereof, or of the Chief of the Philippine Constabulary or his duly authorized
representative or any peace officer.
Section 11. Supervision of the Philippine Constabulary. Upon approval of this Act, the Philippine Constabulary shall exercise
general supervision over the operation of all private detective and watchman or security guard agencies.
Section 12. Powers of City or Municipal Mayors in Cases of Emergency. In case of emergency or in times of disaster or
calamities where the services of such agencies arise, the City or Municipal Mayor, as director of Civil Defense, may muster or
incorporate the services of the agency nearest the area where such emergency, disaster or calamity arises and its duly
licensed personnel to help maintain peace and order; and/or the prevention or apprehension of law violators and in the
preservation of life and property. Deputized private detectives, watchmen or security guards shall take direct orders from the
Chief of Police for the duration of the fire, inundation, earthquakes, riots or other emergencies.
Section 13. Issuance of Firearms. A watchman or security agency shall be entitled to posses firearms after having
satisfactorily passed the requirements prescribed by the Chief, Philippine Constabulary pertinent to the possession of firearm
of any caliber not higher than 45 caliber in a number not exceeding one firearm for every two watchmen or security guards in
its employ: Provided, however, That a watchman or security agent shall be entitled to possess not more than one riot gun or
shotgun in order to provide adequate security when circumstances so demand: Provided, further, That all the firearms
mentioned herein shall be carried by the watchman or security guard only during his tour of duty in proper uniform within the
compound of the establishment except when he escorts big amounts of cash or valuables in and out of said compound.
Section 14. Uniform. The uniform of watchman or security guard as well as those organized, maintained or under the
employment of the government or any government-owned and/or controlled corporations, agencies or entities, shall be
different from the uniform worn and prescribed for members of the Armed Forces of the Philippines, City and Municipal Police
Force. The Chief, Philippine Constabulary, through his duly authorized representative shall prescribed the uniform or
ornaments, equipment and paraphernalia to be worn by the security guards and watchmen throughout the Philippines.
Section 15. Compensation of Watchmen or Security Guards. Watchmen or security guards shall receive a salary not lower
than that prescribed in the Minimum Wage Law.
Section 16. Limitations and Prohibitions. 1. On Membership: (a) No agency operating in the City of Manila and suburbs may
employ more than 1,000 watchmen or security guards; (b) no agency operating in other cities and first class municipalities
may employ more than 500 watchmen or security guards; (c) no agency operating in municipalities other than first class may
employ more than 200 watchmen or security guards.
2. On Organization: No person, corporation, partnership or association may organize more than one agency in any
one city or municipality.
3. On Service: No agency shall offer, render or accept its services to gambling dens or other illegal enterprises. The
extent of the security service being provided by any security agency shall not go beyond the whole compound or
property of the person or establishment requesting the security service except when they escort big amount of cash.
Section 17. Rules and Regulations by Chief, Philippine Constabulary. The Chief of the Philippine Constabulary, in consultation
with the Philippine Association of Detective and Protective Agency Operators, Incorporated and subject to the provisions of
existing laws, is hereby authorized to issue the rules and regulations necessary to carry out the purpose of this Act.
Section 18. Penal Provisions. Any violation of this Act or the rule or regulation issued hereunder shall be punished by
suspension, or fine not exceeding P200.00 or cancellation of his or its licenses to operate, conduct, direct or manage a private
detective, watchman or security guard agency and all its members in the discretion of the court together with the forfeiture of
its bond filed with the Philippine Constabulary.
If the violation is committed by those persons mentioned under paragraph two, section four of this Act the penalty shall be
imprisonment ranging from one to four years and fine ranging from one to four thousand pesos in the discretion of the court.
Section 19. Repealing Clause. All laws, rules, resolutions, municipal ordinances, regulations and administrative orders
contrary or inconsistent with the provisions hereof are hereby repealed.
Section 20. Effectivity. This Act shall take effect upon its approval.
Approved, June 21, 1969.
COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Recognized the security and security management when it comes to field, concepts and types of security;
2. Distinguished active measures from passive measures; and
3. Differentiated the types of security.
What is Security?
In a collective sense, is the same as protection and safety; the state of being safe and the condition of being
protected against physical, social, spiritual, financial, political, emotional, occupational, psychological or other types or
consequences of failure, damage, error, accidents, harm or any other event which could be considered not desirable.
Industrial Security
- physical security as applied to business groups engaged in industries like manufacturing assembling, research and
development, processing, warehousing, and even agriculture. It is a form of physical security involving industrial
plants and business enterprises where the personnel, processes, properties and operations are safeguard. Use of
protecting barriers, and security lighting, personnel movement control, looks and key management, guard forces,
communication and electronic hardware are essential, aside from fire prevention and control programs, emergency
plans, industrial safety and security education programs.
PNP SOSIA
Philippine National Police Supervisory Office for Security and Investigation Agency
- Is an office under the chief of PNP through the Civil Security Group (CSG) which is charged with the supervision,
direction and control of all security agency in the country. The head of this division acts in the name of the Chief of
PNP on matters, duties and powers delegated by later.
- In matters of licensing and in compliance with the prescribed rules and regulation issued by the chief of PNP, the
security personnel of government corporation/agencies also fall under the supervision of the PNP SOSIA
TYPES OF SECURITY
1. Physical Security – broadest branch of security to prevent unauthorized access to equipment, facilities, materials
and documents, and to safeguard them against espionage, sabotage, damage and theft. It also encompasses
protection of personnel from any criminal act.
2. Communication Security – the protection resulting from the application of various measure, which prevent or delay
enemy or unauthorized persons in gaining information through communication system this includes:
A. Transmission Security – measures designed to protect transmission from interception, traffic analysis and
initiative deception.
B. Cryptographic Security – crypto system and their proper use.
C. Physical Security – providing safeguards to equipment and materials from access by unauthorized persons.
3. Bank Security – a specialized type of physical security protecting assets, personnel, and operation of a bank.
4. Document Security – protection of documents and classified matters from loss, access by unauthorized persons,
damage, theft, and compromise through disclosure.
5. Personal Security – protection of personnel especially high ranking officials from any harm, kidnapping, and other
criminal acts. Also known as VIP Security
6. Crises Security – part of VIP security involve in hostage and kidnap of VIP.
7. Industrial Security – is a physical security as applied to business groups engaged in industries like manufacturing,
assembling, research and development, processing warehousing, and even agriculture. It is a form of physical
security involving industrial plants and business enterprise where the personnel, processes, properties and
operations are safeguard.
8. Operational Security – a part of physical security that deals primarily with the protection of processes, formulas,
patents and other industrial and manufacturing activities from espionage, infiltration, loss, compromise, or
photocopying.
Personnel Security
This is as important as physical security. Personnel security starts even before the hiring of an employee and remains
to be maintained for as long as the person is employed.
Its purpose is to insure that a firm hires those best suited to assist the firm in achieving its goals and objectives and
once hired assist in providing necessary security to the work force while carrying out their functions.
Physical Security
This concern with the physical measures adopted to prevent unauthorized access to equipment, facilities, material
and document and to safeguard them against espionage, sabotage, damage, loss and theft.
SECURITY MANAGEMENT
Crime prevention is using instinct, common sense, and action to eliminate or greatly reduce criminal’s opportunity. A large
share of responsibility in reducing criminal opportunity lies in the awareness, understanding and everybody’s commitment.
COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Identified the guard and guard system force in the Philippines its structure, professional conduct and ethics and the
basic requirements in the selection of guards and its minimum qualifications; and
2. Appreciated the importance of guard force and guard system.
• The security guard is the key element in the overall security system of a plant or installation. Its basic mission is to
protect all the property within the limits of the facility boundaries and protect employees and other persons on the
installation.
• The security guard who will become part of the guard force must be required to meet minimum criteria to assure that
they will effectively perform their assigned security related duties. It is the responsibility of the security director of the
installation to insure that its guard force is of a high caliber to make a judgment that could save multi-million pesos
facility from total destruction.
SECURITY GUARD
• A security guard is called a private security guard or watchman that include any person who offers or renders
personal service to watch or secure either a residence or business establishment or both for hire or compensation,
and with license to exercise profession. Often security officers are uniformed and act to protect property by
maintaining a high visibility presence to deter illegal and/or inappropriate actions, observing for signs of crime, fire or
disorder; then taking actions and/or reporting any incidents to their client; employer and emergency services as
appropriate.
1. Private Security Agency – any person, association, partnership, firm or private corporation, who contracts, recruits,
trains, furnishes or post any security guard to do its functions or solicit individuals, business firms or private, public or
government owned or controlled corporations to engage his/its service or those of his/its security guards, for hire
commission or compensation.
2. Company Guard Force – A security force maintained and operated any private company/ corporation for its own
security requirements only.
3. Government Security Unit – a security unit maintained and operated by any government entity other than military
and/ or PNP which is established and maintained for the purpose of securing the office or compound and/or
extension such government entity
The security force of any installation must be organized in accordance with the principles of responsibility and
authority. Each personnel must be assigned to a position that correspond to his experience, skills, training and knowledge.
This is to carry out different functions efficiently and effectively and thus insures smooth flow of the organization. The security
position maybe classified into the following:
1. Office of the General Manager/ Security Director
2. Office of the Executive Secretary of the General Manager
3. Office of the Assistant General Manager/ Security Executive Director
4. Office of the Human Resources and Administrative Manager/Staff Director for Personnel and Administration
5. Office of the Operations Manager/Staff Director for Operations
6. Office of the finance
7. Office of the logistics Manager
8. Office of the Inspectorate and Special Projects (Special Staff)
9. Office of the Communication Officer
10. The Detachment Commander/Officer-in-Charge
- A Detachment Commander shall command and responsible for a certain detachment, with fifteen (15) or more
security personnel under him. He/she is directly responsible to the Security Manager of the installation
- He/She prepares and executes the security plan of his detachment in relation to the security requirements of
the establishment being guarded.
- He is responsible for the enforcement and implementation of Rules and Regulations/Policies.
- He receives instructions from the security Manager and implements the same as required
- He has full operational and administrative control of all his units to include his assistant and
shift-in-charge/supervisor
- He conducts inspection of his units and institutes corrective measures on the spot on those problems he may
detect or brought to his attention. If not possible, he brings the problem to the security Manager of the
establishment
Duty Detailed Order - is a written order/schedule issued by a supervisor officer usually the private security agency/branch
manager or operation officers to security guard and detective
General Disqualification
• Dishonorably discharge from the service in the PNP/AFP or any other private government entities.
• Physically and mentally unfit
• Conviction of a crime
• Addicted to drugs or alcohol dummy of a foreigner
• Elective or appointive government official
License to Exercise Profession (LEP) - is license Certificate document, issued by the chief PNP or his duly authorized
representative recognizing a person to be qualified to perform his duties as private security or training personnel.
- Security Guard License – before security guard can practice his profession; he shall possess valid security license.
The use of expired license is not allowed. In case of doubt, licenses may be verified at the PNP Security Agency and
Guard Supervision Division (SAGSD) whether valid or fake
PNP SAGSD
• As used herein shall refer to the current PNP Civil Security Group – Security Agency and Guard Supervision Division
or any other PNP office that may be designated later as the primary office for supervision of the implementation of
these rules and regulations.
PADPAO
• Refers to the Philippine Association of Detective and Protective Agency operators, Inc., which is an associations of
all licensed security agencies and company security forces. PADPAO is authorized to issue the implementing rules
and regulations pertaining to R.A. No. 5487
New Applicant for License to Operate - Minimum Capitalization of one million (1,000,000.00) with minimum bank deposit of
five hundred thousand (500,000.00) pesos in order to start the business.
Membership - No regular license shall be granted to any private security agency unless it has minimum of two hundred (200)
licensed security personnel under its employment. No regular license shall be granted to any Company Guard Force or
Private Detective Agency unless it has a minimum of thirty (30) licensed private security personnel under its employment. The
maximum member of private security personnel that a PSA/CGF/PDA may employ shall be one thousand (1000). The validity
of LTO is 2 years
Application of License to Operate (LTO) - The application shall contain the full name of the applicant, his age, civil status,
his/her residents and location of business. New applicant – applicant from NCR may file their application for license to
exercise profession with the personnel licensing section, SAGSD, Civil Security Group, Camp Crame, Quezon City. Applicants
from the province may file their application with the Firearms, Explosives, Security Agencies and Guard Section (FESAGS).
Regional Operation and Plan Division (ROPD) of the Regional Office concerned.
Renewal of License to Operate - All applications for renewal of license to operate shall filed at least sixty (60) days before
expiry date of LTO subject of the renewal application filed/accepted thereafter shall penalized for late filing. In addition to other
renewal requirements under provision of these rules and regulation, no application shall approved unless a certification is
issued by FED-CSG to the effect that all licensed firearms of the agency concerned are updated/ renewed for at least one (1)
year forthcoming during the validity of the renewed LTO.
Firearm’s License - All firearms of the security agency should be covered with firearms license issued by the PNP through its
Firearms Explosive Division (FED) under the Civil Security Group (CSG), renewable every two years. No duplication of two or
more firearms with the same make and serial number shall be covered by one license.
Payroll - Payroll shall be filed with the main office within fifteen (15) days after pay day.
• Possession of Firearm - Ratio – one (1) firearm for very two (2) – (1:2) security guards in its employed. No
PSA/CSF/GSU shall be allowed to possess firearms in excess of five hundred (500) units. For lower caliber and
revolvers such as; .22 caliber or .38 caliber pistols or revolver
• The total number of high – powered firearms that can agency or security force/unit is authorized to possess shall not
exceed ten percent (10%) of the total number of security guards or watchmen in its employed.
• Shotguns not higher than 12 gauge
Stocking of Ammunition - PSA shall not exceed fifty (50) rounds of ammunition per unit of duly licensed firearms. Individual
issue to each security guard shall be limited to one half such basic load or twenty five (25) rounds for every security guard.
⮚ Service shirt
⮚ Service trouser
⮚ Service belt
⮚ Footwear
2. Color of Uniforms
⮚ Private Security Agency – Navy blue (upper and lower)
⮚ Company Security Forces – light blue/light gray for upper and navy blue for lower
⮚ Government Security forces – white for upper and navy blue for lower
COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Discussed the different concepts in physical security;
2. Differentiated the different types of barriers; and
3. Performed appreciation to the principles involved in physical security.
PHYSICAL SECURITY
• A system of barriers placed between the potential intruder and the matter to be protected. It is the foundation of
security. It is the first thing in security Management
• Physical security measures are used to defined, protect, and monitor property rights and assets. These measures
consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment, facilities,
material and document and to safeguard them against espionage, sabotage, damage and theft. In security
management, physical security is known as the broadest because it compasses many aspect of physical protection.
The passive and active physical security barriers will differentiate the significant and importance of physical security
industry.
This concepts are used in physical security planning and establishing protective system that would provide guidelines
on the initial steps to be taken in protecting the facility. The concepts are called the 9D’s. These are presented according to the
recommended chronological order for purposes of systematic institution of each concepts.
1. Define – this is the initial step to be taken in order to determine what are to be protected which includes the type of the
facility, nature of business, type of customers, materials, policies and its perceived threats and risks. In this area, personnel
are expected to know “the intestine of the building”.
2. Direct – after determining the scope of responsibility, procedures on ingress and egress of people, visitors, employee and
materials should be established and conform to the standard of the company or organization. This includes response and
evacuation during emergencies.
3. Deter – rigorous and consistent enforcement of comprehensive security program will present a comfortable, safe and
secure environment for customers and the public in general and will discourage would be perpetrators or person of interest to
gain access. Visual evidence is the key.
4. Deny – this serves as one of the objectives of physical barrier which is to deny or prevent surreptitious or non-surreptitious
entry to the asset at risk. Scrutinization is the key.
5. Detect – this concern to the ability of the system and personnel to detect unauthorized access to the facility.
6. Disseminate – coordination and cooperation in security profession should co-exist. Communication is imperative especially
when penetration has been detected in the area of concentration to inform authorized person in the organization.
7. Delay – when penetration is noted and disseminated, the next thing to do is to delay and/or verify the subject of the activity.
Security personnel should be firm but courteous. Inspection and Scrutinization are vital.
8. Detain – when opportunity warrants, arrest should be immediately made to understand the circumstances surrounding the
incident. Its purpose is to: (1) recover assets; and (2) deter other perpetrators/intruders
9. Defend – the final option is to protect the facility when the preceding concepts seem to be ineffective. In this aspect, the
ability of the personnel to deal with the present situation is critical
BARRIER
A barrier can be defined as any structure or physical device capable of restricting, deterring, delaying, illegal access
to an installation.
Most of the industrial companies, however, are required to have a wide space for warehousing manufacturing etc.
FENCES
A Fence is a freestanding structure designed to restrict or prevent movement across a boundary. It is generally
distinguished from a wall by the lightness of its construction: a wall is usually restricted to such barriers made from solid brick
or concrete, blocking vision as well as passage.
TYPES OF FENCES
• Solid Fence – constructed in such away that visual access through the fence is denied. Its advantage is that it
denies the opportunity for the intruder to become familiar with the personnel, activities and the time scheduled of the
movements of the guards in the installation. On the other hand, it prevents the guards from observing the area
around the installation and it creates shadow that maybe used by the intruder for cover and concealment.
• Full view fence - It is constructed in such away that visual access is permitted through the fence. Its advantages are
that it allows the roving patrols and stationary guard to keep the surrounding are of the installation under observation.
On the other, it allows the intruder to become familiar with the movements and time schedule of the guard patrols
thereby allowing him to pick the time that is advantageous on his part.
BUILDING WALL
Wall, floor, roof of their combination serve also as barriers and they should be of such construction to provide uniform
protection just like the wire fencing.
Masonry walls as perimeter barrier should have the same heights as the chain link and surmounted by the barbed
wire top guards; if the height of the masonry is less than the prescribed, additional chain link as “topping”.
Wall can be made of stone slabs like adobe or hollow bound by concrete with post at regular intervals to prevent the
wall from toppling due to wind, or scouring facilities, security must sit down with design engineers so that area where sensitive
activity will be done should be given special emphasis in protective walls.
BODIES OF WATER
Bodies of water like river, lake, marsh, sea pond or any other bodies of water forming a part of the wall, building or
fencing should never be considered adequate natural perimeter barrier. Additional security measures like wire fence, concrete
walling, security patrolling and floodlighting at night may be necessary for the portions of the perimeter.
PROTECTIVE LIGHTING
The idea that lighting can provide improve protection for people and facilities is as old as civilization. Protective
lighting is the single most cost –effective deterrent to crime because it creates a psychological deterrent to the intruders.
1. Continuous lighting – the most familiar type of outdoor security lighting, this is designed to provide two specific
results: glare projection or controlled lighting. It consist of a series of fixed luminaries at range to flood a given area
continuously during the hours of darkness.
⮚ Glare projection type – it is being used in prisons and correctional institutions to illuminate walls and outside barriers.
⮚ Controlled lighting – it is generally employed where, due to surrounding property owners, nearby highways or other
limitations it is necessary for the light to be more precisely focused.
2. Standby Lighting – it is designed for reserve or standby use or to supplement continuous system. A standby system
can be most useful to selectively light a particular area in an occasional basis.
3. Movable or Portable Lighting – This system is manually operated and is usually made up of movable search or
floodlights that can be located in selected or special locations which will require lighting only for short period of time.
4. Emergency lighting – this system is used in times of power failure or other emergencies when other system are
inoperative.
Areas to be lighted
1. Perimeter Fences
2. Building face perimeter
3. Pedestrian and vehicle entrance
4. Parking area
5. Storage, large opened working areas, piers, docks, and other sensitive areas
4. Auxiliary alarm – company –owned alarm systems unit in the nearest police station so that in case of need, direct
call is possible. The company maintains the equipment and lines both for the company and those in the police, fire
and other emergency agencies by special arrangement. Radio landlines, or cell phones can avail the auxiliary
system.
Kinds of Alarms
1. Audio Detection Device – it will detect any sound caused by attempted force entry. A supersonic microphone
speaker sensor is installed in walls, ceilings and floors of the protected area.
2. Vibration Detection Device – it will detect any vibration caused by attempted force entry. A vibration sensitive
sensor is attached to walls, ceilings or floors of the protected area.
3. Metallic Foil or Wire – it will detect any action that moves the foil or wire. An electrically charge strips of tinfoil or
wire is used in the doors, windows or glass surfaces of the protected area.
4. Laser Beam Alarm – a laser emitter floods as wall or fencing with a beam so that when this beam is disturbed or
when an intruder breaks contact with the beam, it will activate the alarm.
5. Photoelectric or Electric Eye Device – an invisible/visible beam is emitted and when this is disturbed or when an
intruder breaks contact with the beam, it will activate the alarm.
Lock is one of the most widely used physical security devices in the asset protection program of an installation. It
complements other physical safeguards of the installation against any possible surreptitious entry. However, the owner of the
installation or his security officer needs to understand the weaknesses and strength of each type of lock including the door,
window or walls to be used to achieve maximum benefit from it application. This is because highly skilled burglars more often
concentrate on the lock and its surrounding mechanism in order to make a forcible entry. It is for this obvious reasons that
locks are considered as delaying devices which cannot really top a determine intruder from destroying the lock just to launch
an attack. Hence, knowledge of the basic principles of locking systems will enable the installation owner or the security officer
to evaluate any lock and determine its quality and effectiveness in a particular application.
Lock
A lock is defined as mechanical, electrical, hydraulic or electronic device designed to prevent entry into a building,
room, container or hiding place.
Types of Lock
1. Key operated mechanical lock
Four general groups and key control
a. Disc tumbler lock
b. Pin tumbler lock
c. Lever tumbler lock
d. The warded lock
2. Padlock
3. Combination lock
4. Code-operated lock
5. Electrical lock
6. Card-operated lock
Types of Key
1. Change key
2. Sub-master key
3. Master key
4. Grand Master key
SECURITY CABINET
The final line of defense at any facility is in the high security storage where papers, records, plans or cashable
instrument, jewelries or other especially valuable assets are protected. These security containers will depend of a size and
quantity, which the nature of the business dictates.
In protecting property, it is essential to recognize that protective containers are designed to secure against burglary of
fire. Each type of equipment has a specialized function and it will depend on the owner of the facility which type that is to be
use.
1. Safe – a metallic container used for the safe keeping of documents or small items in an office or installation. Safe can
be classified as either robbery or burglary resistance depending upon the use and need.
● At least 750 lbs. anchored
● Any safe that weigh less than 750 lbs. should be anchored to a building structure.
● Its body should at least one inch thick steel or equal.
● Safe as a general rule, require the door to be made of steel and at least 1 ½ thick.
3. File room – a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited
people to work on the records inside.
● The file room should at most be 12 feet high.
● The interior cubage should not more than 10,000 cubic feet.
● The ventilation should be through the door.
● It must have a watertight door and at least fire proof for one hour.
● The supporting structure, the walls, floor and roof should be made fire-proof.
In every installation, the use of protective barriers, secure lighting, communication and electronic hardware provides
physical safeguards but these are insufficient to maximize the effort of the guard force. A control point must be established for
positive personnel identification and check system. This is to insure that only those persons who have the right and authority
will be given the necessary access to the area.
The most practical and generally accepted system of personnel identification is the use of identification cards badges
or passes. Generally speaking, this system designates when, where, how identification cards should be displayed, and to
whom. This helps security personnel eliminate the risk of allowing the access of unauthorized personnel within the
establishments. To be effective, the following should be considered:
1. Badge must be tamper-resistant, which mean that they should be printed or embossed on a distinctive stock with a
series of design difficult to reproduce;
2. They should contain a clear and recent photograph of the bearer, preferably in the color;
3. The photograph should be at least one inch square and should be updated every two or three years or when there is
any significant change in facial appearance; and
4. Should additionally contain vital statistic such as date of birth, height, weight, color of hair and eyes, sex and
thumbprints.
Controlling traffic in and out within a facility is essential to the physical security program. Perimeter barriers, locked
doors and screened windows prevent or deter the entry of authorized visitors, but since some traffic essential to every
operation, no matter how highly, classified it maybe, provision must be made for the control of this movement.
Specific solution will depend upon the nature of the business, obviously retail establishment, which encourage high
volume traffic and which regularly handle a great deal of merchandise both in and out, have a problem of a different dimension
from the industrial operation working on a highly classified government project. Both, however, must work from the same
general principles towards providing the greatest possible security within the efficient and effective operation of the job at
hand.
1. Identification of employees and visitor and directing or limiting their movements;
2. Control of all incoming and outgoing packages; and
3. Control of trucks and private vehicles.
Vehicular traffic within the boundaries of any facility must be carefully controlled for safety as well as to control the
transporting of pilfered goods from the premises. Thus;
1. Privately owned vehicle of personnel/visitor should be registered and are subject to the identification and admittance
procedure.
Vehicles should be subjected for research at the entrance and exit of the installation.
1. All visitors with vehicle should provide the security as to the complete details of their duration of stay, person to be
visited, and other information.
2. All vehicles of visitors should be given a sign/sticker to be placed on the windshield.
3. Traffic warning signs should be installed in all entrances in order to guide the visitors in their destination as well to
provide them with the necessary safety precautions while they are inside the installation.
4. Security personnel must constantly supervise parking areas and make frequent spots searches of vehicles found
there.
COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Recognized the purpose of personnel security;
2. Constructed an in-depth analysis on the difference between local agency check and national agency check; and
3. Internalized the concepts in personnel security; and
Personnel Security is the protection of the company assets against loss of life and damage to property. Its main
concern is the security and safety of each people and the organization. In personnel security, the people in the organization
are considered the greatest threat to the security organization because they create the security holes.
Of the three major aspects of security, personnel security is considered as the most important. This is for the simple
reason that security involves people, both as an asset to be protected and as source of security threats. It is an acknowledge
fact that losses are attributed mainly to negligence or active participation of employees, either through theft and sabotage.
This emphasizes the need to set up a system of hiring the people for the company. Personal Security is considered the
weakest link in security management.
PSI should be properly documented in order to facilitate the conduct of administrative or criminal procedure in the
event of discovery of derogatory information.
Background Investigation (BI) – this technique is very expensive but necessary in personnel security. It serves to verify
information on the application form and to obtain other information pertinent to the decision to employ.
1. Positive Vetting – is the process of inspecting or examining with careful thoroughness. The essence of vetting is a
personal interview conducted under stress. It is based on information previously given by the applicant. Other
information issued during the interview, such as those discovered in the BI, which confirms or denies which given by
the applicant.
2. Prowling – is the process whereby a subject’s reaction in a future critical situation is predicted by observing his
behavior, or by interviewing him, or analyzing his responses to a questionnaire, such as an honesty test. The Reid
Report is an example of honesty test.
3. Deception Detection Techniques – this process of using devices in detecting deception during the interview stage.
This includes the use of a Polygraph, Psychological Stress Evaluator and Voice Analyzer.
4. Financial and Lifestyle inquiry – this type of investigation seeks to gather information on income and mode of
living, sometimes referred to as the earning-to-debt ratio.
5. Undercover Investigation – this is the placement of an agent in a role in which the agent’s true identity and role
remains unknown, in order to obtain information for criminal prosecution or for recovery or limitation of asset losses.
6. Exit Interview – this is a valuable tool because it gives departing employees an opportunity to list grievances. It
offers security managers an opportunity to learn of problems not previously known. Incorporating a checklist of
company-issued property and confronting a departing employee is also incorporated into the exit interview to remind
employees of their continuing legal obligation to safeguard confidential company information.
Security education is conducted to develop security awareness among employees in the company. It should cover all
employees, regardless of rank or position.
COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Known the standard rules for document security including the document security system, the purposes of protecting
classified matters and distinguished patents from trade secret;
2. Explained the CIA Triad; and
3. Appreciated the distinction between patents and trade secrets.
The protection of the company property information from the inadvertent disclosure and destruction of documents is
the paramount focus of information security management. It is closing the window of exposure. Information security in the
industry is defined as the sum total of all policies, regulation, practices, enforce to safeguards the contents and integrity of any
classified information or document from compromise or loss.
Access to information security is based on the required broad principles known as C-I-A TRIAD.
1. Confidentiality – the assurance that information is accessible only to those authorized to have access.
2. Integrity – the assurance that information and processing methods are accurate and complete.
3. Availability – the assurance that authorized users have access to information and associated assets when needed.
Documentation/information cycle
Each document or information has a life cycle in the sense that its usefulness has a beginning and an end. It passes
various stages from the time it is created until it is finally disposed. This cycle consist of the following:
Enumerate the documentation or information cycle in chronological order.
1. Creation
2. Classification
3. Storage
4. Retrieval
5. Retention/Purging
6. Transfer
7. Disposition
1. TOP SECRET (green color code) – is any information and materials the unauthorized disclosure of it would cause
exceptionally grave damage to the nation, politically, economically and military operation.
2. SECRET (red color code) – is any information and material, the unauthorized disclosure of it would endanger
national security cause serious injury to the interest or prestige of the nation or any governmental activity or
advantage to a foreign nation.
3. CONFIDENTIAL (blue color code) – is any information or material, the unauthorized disclosure of it would be
prejudicial to the interest and prestige of the national or governmental activity or would cause administrative
embarrassment or unwanted injury to and be of advantage to a foreign country.
4. RESTRICTED (white or no color code) – is any information and material which requires special protection other than
those determines confidential, secret and top secret.
In the security management application, top secret is not used, classified matter will starts on secret classification. This is
because the applications is limited or focused only to the industry.
5. Each individual whose duties allow access to classified matter while it is in his position shall insure that dissemination
of such classified matter is on the “need to know” basis.
CATEGORIES OF DOCUMENT
1. Category A
● Information which contains reportable time sensitive, order of battle and significant information.
● It should be given priority because it is critical information.
● It must be forwarded without delay.
● It is critical to friendly operations.
● It requires immediate action.
2. Category B
● Anything that contains communications, cryptographic documents, or systems that should be classified a
secret and requires special handling.
● Higher authorities should declassify it.
3. Category C
● Other information, which contains something that, could be an intelligence value.
● Contains exploitable information regardless of its contents.
● Unscreened materials/documents should be categorized as Category C.
4. Category D
● No value, yet lower level will never classify documents as category D.
● No decision must be made at the lower echelon that document has no value. It is the responsibility of the
higher headquarters.
TYPES OF DOCUMENT
3. Transmittal of documents or endorsements which do not contain classified information or which contain information
classified lower than that of the preceding element or enclosure shall include a notation for automatic downgrading.
4. Correspondence, Indexes, receipts, reports of possession transfer or destruction, catalogs, or accession list shall not
be classify if any reference to classified matter does not disclosed classified information.
5. Classified matter obtained from other department shall retain the same original classification.
Proprietary information is information that in some special way relates to the status or activities of the possessor
and over which the possessor asserts ownership. In the business community, proprietary information relates to the structure,
products or business methods of the organization. It is usually protected in some way against causal or general disclosure.
All proprietary information is confidential, but not all confidential information is proprietary. For example, confidential
personnel data in employee files is not considered as proprietary although the company treats it as confidential.
1. Requirements for obtaining a patent are specific; to qualify for a patent the invention must be more than novel and
useful. It must represent a positive contribution beyond the skill of the average person.
2. A much lower of novelty is required of a trade secret.
3. A trade secret remains secret as long as it continues to meet trade secret tests while the exclusive right to patent
protection expires after 17 years.
COURSE OUTCOMES:
At the end of the lesson, the students must have:
SECURITY PROBLEMS
Any act or condition which may result in the compromise of information, loss of life, and loss or destruction of
property or disruption of the activity of the installation.
The extent and degree of risk to security is dependent on:
a. Relative criticality of operation – is the importance of the firm with reference to the natural economy and security
b. Relatively vulnerability – is the susceptibility of the plant or establishment to damage loss or disruption of operation
due to various hazards
Types of Hazard
1. Natural Hazard – these are hazards which arise from natural phenomena. The following are types of natural hazard
or disasters:
a. Floods caused by typhoons
b. Earthquakes
c. Storms (typhoons, cyclones, tornado and hurricane
d. Lighting storms
e. Extreme temperature and humidity
2. Human-man made hazard – these are hazards which are the result of a state of mind, attitude, weaknesses or
character traits of one or more persons. They can be acts of commission or omission, both overt and covert, which
can disrupt operation of a plant or installation. The following are types of human or manmade hazards:
a. Carelessness – accidents and dissatisfaction
b. Disloyalty – subversion and sabotage
c. Espionage, pilferage and theft
d. Vandalism; etc.
2. He is usually a person of extensive training and will be highly effective in gaining the confidence of people and of
extracting information of value to be relayed to his employer or handler.
3. Even how well-trained an espionage agent he might be, he is human like saboteur and he can be defeated in his own
game if proper methods and techniques are undertaken.
Pilferage
This one is the most annoying and common human hazards which security has to deal with. This activity if
uncontrolled can become a financial drain if not a menace to smooth and orderly operation. Due to this, security force has to
concentrate large number men to check this nefarious and disconnecting activity. Petty pilferage is frequent, hard to detect,
difficult to prove and with conviction but definitely dangerous to ignore.
Types of Pilferer
1. Casual Pilferer - is one who steals primarily for personal use because theft appears easy and there is little fear of
detection.
2. Systematic Pilferer - steals according to preconceived plans for the purpose of selling the stolen items or bartering
them for other valuable commodities.
Anatomy of Pilferage
1. Where need or desire exists and opportunity is present, theft is almost sure to result.
2. Pilferage occurs everywhere. Opportunities for pilferage increase when supplies or goods are transported or
transferred from one place to another.
COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Known the standard requirement in a security survey; and
SECURITY SURVEY
COURSE OUTCOMES:
At the end of the lesson, the students must have:
1. Discussed the basic concepts in close protection and V.I.P. security; and
2. Distinguished the roles of close protection officers, executive and VIP security.
VIP protection means providing high-profile clients and their families with personal protection services to insure their
peace of mind, safety and security. People can be considered VIPs due to their elevated political or business status, for being
celebrities or for otherwise being well-known or high-profile. VIPs, because of who they are or who they are perceived to be,
are at risk of personal assault, kidnapping and being the victims of terrorist attacks.
Close protection officers (CPOs), or bodyguards, keep clients safe from unwanted attention or physical harm. They
are responsible for assessing security measures and providing discreet surveillance. Their work includes:
Several guiding principles are involved in the security of very important persons, including:
1. Protection, which implies defending VIPs by using protective gear, such as bulletproof vests, bulletproof vehicles
during travels, and other methods.
2. Deterrence, which suggests the instilling of fear in a person about the consequences of their potential actions.
Essentially, a VIP executive protection agent needs to demonstrate that he or she can protect the VIP at all costs. For
example, the agent dissuades the potential attacker from implementing an assault. As you can imagine, this doesn’t
work great with suicide bombers. The reason for this is that they have no fear of the consequences. But still, it’s an
important principle.
3. Access control, which implies controlling the access of the general public to VIPs. Very important persons typically
attend public gatherings, political and business meetings. Therefore, access control is known as the most utilized
principle in VIP protection. It involves the following methods:
● Checking the food given to VIPs,
● Removing sharp objects close to VIPs,
● Restricting weapon presence in the vicinity of VIPs,
● Scanning members of the public with metal detectors and physical techniques, and,
● Anti-sabotage system, involving minesweepers, explosive detectors, hand-held metal detectors. The point of
this is to ensure safety against a bomb-attack.