Jump
Jump
LEARNING MODULE 1
Natural Authority- Highest law is the law of self preservation. ( organized into tribes)
Constitutional Authority- ( Art. 2 Sec. 4 of the 1987 Phil Cons.) the prime duty of the government is to
serve and protect people. ( personal military or civil service duty). (Art. 3 Sec. 1 of the 1987 Phil Cons.)
Due process of the law. ( Art. 3 Sec. 9 of the 1987 Phil. Cons.) Private property shall not be taken for
public use without just compensation. ( Art. 3 Sec. 2 of the 1987 of the Phil Cons.) Right to privacy.
Statutory Authority- Revised Penal Code ( Act No. 3815 as amended) Code of Crime against persons,
personal liberty and security and property have bearing on the security and protection of one's life, liberty
and property.
Private Security Agency Law ( RA 5487)- this law governs the operation, administration of security
agency, and activities, qualifications, duties and licensing of security guards, watchmen and private
detectives. (Professionalize the Security Services)
Amended the Sec. 3 (d) which define watchman or security guard, watchman or security guard agency
Amended Sec. 4- who may organize a security or watchman agency.
Amended Sec. 8 of the penal provision.
Sec. 3 (D)- Watchman or Security Guard, Watchman or Security Guard Agency. Any Persons who offers
of renders personal service to watch or secure either residential or business establishment, or both, or
any building, compound, or area including but not limited to logging concessions, agricultural, mining or
pasture lands for hire or compensation, or as an employee thereof shall be known as watchmen or
security guard; and any person, association, partnership, or corporation, who recruits, trains, musters,
furnishes, solicits individuals or business firms, private or government-owned or controlled corporations to
engage his service or those of its watchmen, shall be known as Watchman or Security Guard Agency."
Sec. 4- Who May Organize a Security or Watchman Agency. Any Filipino citizen or a corporation,
partnership, or association, with a minimum capital of five thousand pesos, one-hundred per cent of which
is owned and controlled by Filipino citizens may organize a security or watchman agency:
Provided, That no person shall organize or have an interest in, more than one such agency except those
which are already existing at the promulgation of this Decree: Provided, further, That the operator or
manager of said agency must be at least 25 years of age, a college graduate and/or a commissioned
officer in the inactive service of the Armed Forces of the Philippines; of good moral character, having no
previous record of any conviction of any crime or offense involving moral turpitude and not suffering from
any of the following disqualifications:
1. Having been dishonorably discharged or separated from the Armed Forces of the Philippines;
2. Being a mental incompetent;
3. Being addicted to the use of narcotic drug or drugs; and,
4. Being a habitual drunkard.
Sec. 8- "Any provision of this or other law to the contrary notwithstanding, the Chief of Constabulary may,
at any time suspend or cancel the licenses of private watchman or security guard, or any licenses of
private watchman or security guard agency found violating any of the provisions of this Act or the rules
and regulations promulgated by the Chief of Constabulary pursuant thereto;"
Any person who commit any act in violation of Republic Act No. 5487 and of this Decree, and the
implementing rules and regulations already promulgated which are not in conflict herewith, and those to
be promulgated by the Chief of Constabulary pursuant hereto, shall, on conviction thereof, suffer
imprisonment of from ten to fifteen years and a fine of not less than ten thousand pesos nor more than
fifteen thousand pesos as a military court/tribunal or commission may direct.
Sec. 3 (d)- Watchman or Security Guard; Watchman or Security Guard Agency. Any person who offers or
renders personal service to watch or secure either residential or business establishment, or both, or any
building, compound, area, including, but not limited to, logging concessions, agricultural, mining or
pasture lands, for hire or compensation, or as an employee thereof, including any employee of the
national or local governments or any agency or instrumentality thereof and of government-owned or
controlled firms or corporations, who is employed to watch or secure government buildings, compounds,
premises and other properties, other than members of the Armed Forces of the Philippines, guards of the
Bureau of Prisons, provincial and city jail guards, and members of city and municipal police forces, shall
be known as watchman or security guard; and any person, association, partnership, firm or private
corporation, who/which recruits, trains, furnishes, or employs any watchman or security guard, or solicits
individual, business firms, private, public or government-owned or controlled corporations to engage
his/its service or those of his/its watchmen or security guards, shall be known as Watchman or Security
Guard Agency.
Sec. 4- The qualifications for an individual, firm, corporation, partnership, or association not doing
business or organized purposely or principally as a watchman or security guard agency who/which is
utilizing any of his/its employees to watch, secure or guard his/its business establishment, premises,
compound or properties and required to secure a license in accordance herewith shall be as prescribed
by law, rules or regulations governing his/its business organization and operation.
Sec. 5- Provided, furthermore, That instead of the qualifications herein prescribed, employees of the
national or local governments or any agency or instrumentality thereof, or of government-owned or
controlled corporations required to secure a license under this Act shall be subject to the qualifications for
the positions to which they are appointed
Sec 8- "Provided, finally, That the national or focal governments, or the agencies or instrumentalities
thereof, as well as government-owned or controlled corporations which shall utilize any of their employees
as watchman or security guard are exempted from securing the license herein prescribed."
Sec 8- "Provided, further, That employees of the national or local governments or the agencies or
instrumentalities thereof, as well as of government-owned or controlled corporations, who are employed
or utilized as watchman or security guard as herein defined, shall not pay the fees or file the bonds herein
prescribed.
Sec. 9- Employees need not be licensed. Any person operating, managing, directing or conducting a
licensed private watchman or security guard agency, as well as any person having any participation in the
management or operation thereof except those employed solely for clerical or manual work shall secure
the license prescribed by section 6 of this Art, as amended.
Sec. 11- In case of emergency or in times of disasters or calamities, the Chief of Constabulary may
deputize any private detective, watchman or security guard as herein defined to assist the Philippine
Constabulary in the performance of Constabulary duties for the duration of such emergency, disaster or
calamity.
Sec. 16- On membership: No license shall be granted to any agency unless it has under its employ at
least fifty watchmen or security guards: Provided, That any agency which is now operating with less than
fifty watchmen and/or security guards may continue to operate until June 30, 1973: Provided, further, That
all agencies shall have under their employ not less than one hundred watchmen and/or security guards by
January 1, 1974: Provided, finally, That the maximum number of watchmen or security guards that an
agency may employ, to include its branches, shall be as follows:
1. In the Greater Manila Area (Philippine Constabulary Metropolitan Command Area of operation)
.... not more than one thousand (1000);
2. In the first class cities and municipalities ...… not more than five hundred (500) and
3. In other cities and municipalities......not more than three hundred (300).
Paragraph 1 of Sec. 16- provide the limitations and prohibitions of security agency.
Paragraph 1 of Sec. 16- provide the limitations and prohibitions of security agency.
Sec. 3 (d)- The watchman or security guard herein defined shall be referred to specifically as private
security guard, company guard and government guard when employed by private security agencies,
company guard forces of private firms and government entities.
Sec. 18- Any provision of this or other law to the contrary notwithstanding, the Chief of the Constabulary
of his authorized representative may impose, after confirming any violation of this law and its amendatory
Decrees and implementing rules and regulations, the penalty of suspension, or cancellation of the license
of a private watchman or security guard: Provided, That in cases of violations committed by any private
security agency or company guard force the administrative penalty which may be imposed shall only be
administrative fine or cancellation of license without prejudice to any criminal action against the violator.
Paragraph 3 of Sec. 8- National government agencies or instrumentalities thereof, as well as
government-owned or controlled corporations which shall utilize any of their employees as watchman or
security guard are exempted from securing the license herein prescribed: Provided, That employees of
national government agencies or instrumentalities thereof, as well as of government-owned or controlled
corporations, who are employed or utilized as watchman or security guards as herein defined, shall not
pay the fees nor file the bonds herein prescribed
Paragraph 1 of Sec. 16- On membership: No license shall be granted to any private security agency
unless it has a minimum of two hundred licensed private security guards under its employ nor to any
company guard force unless it has a minimum of thirty company guards; Provided, that the maximum
number of security guards that an agency/company guard force may employ, to include its branches shall
be one thousand: Provided, further that this requirement shall take effect not later than March 31, 1985.
√Posted security guard apprehended elsewhere for alarm and scandal or disorderly conduct. ( 30 davs
suspension)
√Security guard firing his firearm indiscriminately without connection in the performance of duty.
(30 days suspension)
√Assisting or protecting criminals during on or off duty status. (cancellation of license)
✔️Failure to submit for maximum of 60 days on the renewal of license on the prescribe date.
Sec. 5 -Private security license of any security guards who commits the same offense after having been
suspended for 3 consecutive times within the lifetime of his license shall be cancelled.
Sec. 6- failure of the security agency or company security force to pay their fines within 5 working days
upon receipt of notice to pay fine for 3 times shall be cancelled.
✔️For private security agency- a minimum of 200 and maximum of 1000 guards,
✔️At least 30 pieces of FA for initial 100 guards (after six months) Temporary license
✔️Initial requirement of 100 guards in the first year of operation until the next year they should meet the
200 minimum number of guards. (6 months extension)
✔️Main/ Branch offices should have an initial employment of 10 guards during the 1st year of operation
until the 30 minimum number of guards will be meet in the 3rd year of their operation
✔️License of PSA with less than 100 guards shall not be renewed after 1 year of operation
✔️Surety Bond
✔️At least 18 years of age but not more than 50 years old
✔️New applicants for PSA shall have a minimum capital of 1 million and a bank deposit of 500 thousand
✔️Application for License to Operate should be filed in the PP-SOSIA ( Supervisory Office for Security and
Investigation Agencies).
✔️Application for license to Operate will be endorsed by the Civil Security Force District Officer (CSFC)
✔️PNP Civil Security Group Agency and Guard Supervision Division or any other PNP Office that may be
designated later as the primary office for supervision of the implementation of these rules and regulations.
SECTION 12. Approval, Cancellation and Suspension of LT. Unless revoked or modified by the Chief,
PNP, the authority to approve, cancel or suspend the license to operate shall be exercised by the
following:
What is Security?
is a state or condition of being secured; there is freedom from fear, harm, danger, loss, destruction or
damages. Basically, it was the action of man against man that led to many unsecured and unsafe
conditions.
Physical Security - this concern with the physical measures adopted to prevent unauthorized access to
equipment, facilities, material and document and to safeguard them against espionage, sabotage,
damage, loss and theft.
Personnel Security- this is as important as physical security. Personnel security starts even before the
hiring of an employee and remains to be maintained for as long as the person is employed. Its purpose is
to insure that a firm hires those best suited to assist the firm in achieving its goals and objectives and
once hired assist in providing necessary security to the work force while carrying out their functions.
Document and Information Security- this involves the protection of documents and classified papers from
loss, access by unauthorized persons, damage, theft and compromise through disclosure.
Classified documents need special handling. Lack of indoctrination and orientation among the personal
handling them can result in the leakage, loss, theft and unauthorized disclosure of the documents.
measures taken by an installation or unit to protect itself against sabotage, espionage or subversion and
at the same time provide freedom of action in order to provide the installation of the unit with the
necessary flexibility to accomplish its mission.
✔️Industrial Security - a type of security applied to business groups engaged in industries like
manufacturing, assembling, research and development, processing, warehousing and even agriculture. It
may also mean the business of providing security.
✔️Hotel Security - a type of security applied to hotels where its properties are protected from pilferage,
loss, damage and the function in the hotel restaurants are not disturbed and troubled by outsiders or the
guest themselves. This type of security employs house detectives, uniforms guard and supervisor and
insures that hotel guests and their personal effects are safeguarded.
✔️Bank security - this type of security is concern with bank operations. Its main objective is the protection
of bank cash and assets, its personnel and clientele. Security personnel are trained to safeguard bank
and assets while in storage, in transit and during transactions.
✔️VIP Security - a type of security applied for the protection of top-ranking officials of the government or
private entity, visiting persons of illustrious standing and foreign dignitaries.
✔️School Security - a type of security that is concern with the protection of students, faculty members, and
school properties. Security personnel are trained to protect the school property from theft, vandals,
handling campus riots and detecting the use of intoxicated drugs and alcohol by the students.
✔️Supermarket or Mall Security - a type of security which is concern with the protection of the stores,
warehouses, storage, its immediate premises and properties as well as the supermarket personnel and
customers. Security personnel are trained to detect "shoplifter", robbery, and bomb detection
and customer relation.
✔️Other types - this include all other security matters not covered in the above enumeration.
- measures are being used to define, protect, and monitor property rights and assets. These measures
consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment,
facilities, material and document and to safeguard them against espionage, sabotage, damage and theft.
- as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies,
programs, personnel, property, utilities, information, facilities and installation against compromise,
trespass, sabotage, pilferage, embezzlement, fraud, or other dishonest criminal act.
What is a Barrier?
-any structure or physical device capable of restricting, deterring, delaying, illegal access to an
installation.
Types of Barriers
✔️Natural barriers - it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that
are difficult to traverse.
✔️Structural barriers - these are features constructed by man regardless of their original intent that tends
to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.
✔️Human barriers - persons being used in providing a guarding system or by the nature of their
emplovment and location, fulfill security functions. Examples are guards, office personnel, shop workers,
etc.
✔️Animal barriers - animals are used in partially providing a guarding system. Dogs are usually trained
and utilized to serve as guard dogs. German shepherds are best suited for security functions. Goose and
turkeys could also be included.
✔️Energy barriers - it is the employment of mechanical, electrical, electronic energy imposes a deterrent to
entry by the potential intruder or to provide warning to guard personnel. These are protective lighting,
alarm system and any electronic devices used as barriers.
A restricted area is any area in which personnel or vehicles are controlled for reasons of security.
Restricted area is established to provide security for installation or facilities and to promote efficiency of
security operations and economy in the use of security personnel.
Exclusion Area- an exclusion area is a restricted area which contains a security interest to TOP SECRET
importance, and which requires the highest degree of protection.
Limited Area Control- a limited area is a restricted area in which a lesser degree of control is required
than in an exclusion area but which the security interest would be compromised by uncontrolled
movement.
Interior Area Control - Interior area control is generally affected in two ways. The first method is the
system which is initiated and terminated at the outer limits of the area to determine the movements of a
visitor within the area. A second somewhat less means of accomplishing the same thing is time travel.
This system provides for checking the actual time used by the visitor against known time requirements for
what the visitor is to accomplish.
Visitor Identification and Movements Control - Processing and control of movements of visitor shall be
included in the PASS SYSTEM. The control of movements of visitor will depend on the installation. A
visitor register shall be maintained to include the name of the visitor, date of visit, purpose of visit, which
may be filed for the future reference.
Key Control- A system of controlling keys shall be advised and regulations covering the disposal, storage
or withdrawals, shall be issued and imposed.
Fire Prevention- fire is so potentially destructive without human assistance, with assistance it can be caused to
devastate those things you are attempting to secure and, professionally accomplished, often in a way that does not
leave recognizable evidence of sabotage.
It is the protection of the installation's inner and the immediate vicinity. The main purpose of perimeter barrier is to
deny or impede access or exit of unauthorized person. Basically, it is the first line of defense of an installation. This is
maybe in the form of fences, building walls or even bodies of water.
Types of Fences
Solid fence -constructed in such away that visual access through the fence is denied. Its advantage is that it denies
the opportunity for the intruder to become familiar with the personnel, activities and the time scheduled of the
movements of the guards in the installation. On the other hand, it prevents the guards from observing the area
around the installation and it creates shadow that may be used by the intruder for cover and concealment.
Full-view fence - it is constructed in such away that visual access is permitted through the fence.
Its advantages are that it allows the roving patrols and stationary guard to keep the surrounding are of the installation
under observation. On the other hand, it allows the intruder to become familiar with the movements and time
schedule of the guard patrols thereby allowing him to pick the time that is advantageous on his part.
✔️Gates and Doors - when not in use and controlled by guards, gates and doors in the perimeter should be locked
and frequently inspected by guards. Locks should be changed from time to time and should be covered under
protective locks and key control.
✔️Side-walk-elevators - these provide access to areas within the perimeter barrier and should be
locked and guarded.
✔️Utilities Opening - sewers, air intakes, exhaust tunnels and other utility openings which penetrate the barrier and
which have cross sectional areas of 96 square inches or more should be protected by bars, grills, water filled traps or
other structural means providing equivalent protection to that portion of the perimeter barriers.
✔️Clear Zones - an obstructed area or a "clear zone" should be maintained on both sides of the perimeter barrier. A
clear zone of 20 feet or more is desirable between the barriers and exterior structures and natural covers that may
provide concealment for assistance to a person seeking unauthorized entry.
✔️Top Guard - additional overhang of barbed wire placed on vertical perimeter fences upward and outward with a 45
degree angle with 3 to 4 strands of barbed wires spaced 6 inches apart. This increases the protective height and
prevents easy access.
✔️Guard Control stations - this is normally provided at main perimeter entrances to secure areas located out-of-doors,
and manned by guards on full-time basis. Sentry station should be near a perimeter for surveillance at the entrance.
✔️Tower Guard - this is a house-like structure above the perimeter barriers. The higher the tower, the more visibility it
provides. It gives a psychological unswerving effect to violators. By and large guard towers, whether permanent or
temporary, must have a corresponding support force in the event of need. Towers as well as guard control stations
should have telephones, intercoms, and if possible two-way radios connected to security headquarters or office to call
for reserves in the event of need.
✔️Barrier Maintenance - fencing barriers and protective walls should always be regularly inspected by security. Any
sign or attempts to break in should be reported for investigation. Destruction of fence or sections thereof should be
repaired immediately and guard vigilance should be increased.
✔️Protection in Depth - in large open areas or ground where fencing or walling is impractical and expensive, warning
signs should be conspicuously placed. The depth itself is protection reduction of access roads, and sufficient notices
to warn intruders should be done. Use of animals, as guards and intrusion device, can also be good as barriers.
✔️Signs and notices - "Control signs" should be erected where necessary in the management of unauthorized ingress
to preclude accidental entry. Signs should be plainly visible and legible from any approach and in an understood
language or dialect.
Provides a means of continuing, during hours of darkness, a degree of protection approach that is maintained during
daylights hours.
✔️Incandescent lamp - it is the least expensive in terms of energy consumed and has the advantage of providing
instant illumination when the switch is on.
✔️Mercury vapor lamp - it is considered more efficient that the incandescent and used widespread in exterior lighting.
This emits a purplish-white color, caused by an electric current passing through a tube of conducting and luminous
gas. (blue-green)
✔️Sodium Vapor Lamps- It is efficient bulb and due to its color, it is placed usually in areas to connote concern like
bridges. (emits yellow light)
✔️Metal halide - it has similar physical appearance to mercury vapor but provides a light source of higher luminous
efficiency and better color rendition.
✔️Fluorescent - this provides good color rendition, high lamp efficiency as well as long life. However, it cannot project
light over long distance and thus are not desirable as flood type lights.
✔️Floodlights - These can be used to accommodate most outdoor security lighting needs, including the illumination of
boundaries, fences and buildings and for the emphasis of vital areas or particular buildings.
✔️Street lights - This lighting equipment received the most widespread notoriety for its value in reducing crime.
✔️Search lights - These are highly focused incandescent lamp and are designed to pinpoint
potential trouble spots.
✔️Fresnel lights - These are wide beam units, primary used to extend the illumination in long, horizontal strips to
protect the approaches to the perimeter barrier. Fresnel projects a narrow, horizontal beam that is approximately 180
degrees in the horizontal and from 15 to 30 degrees in the vertical plane.
Protective alarm is one of the important barriers in security. It assists the security in detecting, impeding or deterring
potential security threat in the installation. Basically, its function is to alert the security personnel for any attempt of
intrusion into a protected area, building or compound. Once an intruder tampers the circuitry, the beam or radiated
waves of the alarm system, it will activate an alarm signal.
✔️Central Station System - a type of alarm where the control station is located outside the plant or installation. When
the alarm is sounded or actuated by subscriber, the central station notifies the police and other public safety
agencies.
✔️Proprietary system - centralized monitor of the proprietary alarm system is located in the industrial firm itself with a
duty operator. In case of alarm, the duty operator calls whatever is the primary need; firefighters, police, an
ambulance or a bomb disposal unit.
✔️Local Alarm - This system consist of ringing up a visual or audible alarm near the object to be protected. When an
intruder tries to pry a window, the alarm thereat goes off.
✔️Auxiliary alarm - company-owned alarm systems with a unit in the nearest police station so that in case of need,
direct call is possible. The company maintains the equipment and lines both for the company and those in the police,
fire and other emergency agencies by special arrangement.
Radio, landlines, or cell phones can avail of the auxiliary system.
Kinds of Alarms
✔️Audio Detection Device - it will detect any sound caused by attempted force entry. A supersonic microphone
speaker sensor is installed in walls, ceilings and floors of the protected area.
✔️Vibration Detection Device - it will detect any vibration caused by attempted force entry. A vibration sensitive sensor
is attached to walls, ceilings or floors of the protected area.
✔️Metallic foil or wire - it will detect any action that moves the foil or wire. An electrically charge strips of tinfoil or wire
is used in the doors, windows or glass surfaces of the protected area.
✔️Laser Beam Alarm - a laser emitter floods a wall or fencing with a beam so that when this beam is disturbed by a
physical object, an alarm is activated.
✔️Photoelectric or Electric Eye Device - an invisible/visible beam is emitted and when this is disturbed or when an
intruder breaks contact with the beam, it will activate the alarm.
✔️Capacitance or Electrostatic - the body capacitance of any intruder who enters the field
unbalances the electrostatic energy of the field which in turn activates the alarm.
✔️Microwave or motion detection device- a pattern of radio waves is transmitted and partially reflected back to an
antenna. (frequency)
Bank Alarms
✔️Foot Trail Activator
✔️Bill Traps
✔️Knee or Thigh Buttons
✔️Foot Button
✔️Double Squezze
What is a Lock?
a mechanical, electrical, hydraulic or electronic device designed to prevent entry into a building, room, container or
hiding place.
Types of Locks
✔️Key-operated mechanical lock - it uses some sort of arrangement of internal physical barriers (wards tumblers)
which prevent the lock from operating unless they are properly aligned. The key is the device used to align these
internal barriers so that the lock may be operated.
Types of Locks
Padlock - a portable and detachable lock having a sliding hasp which passes through a staple ring and is then made
fasten or secured.
Combination lock - instead of using the key to align the tumblers, the combination mechanism uses numbers, letters
or other symbols as reference point which enables an operator to align them
manually.
Code-operated lock - a type of lock that can be opened by pressing a series of numbered button in the proper
sequence.
Electrical lock - a type of lock that can be opened and closed remotely by electrical means.
Card-operated lock - a type of lock operated by a coded card.
Types of keys
Change key - a specific key, which operates the lock and has a particular combination of cuts which match
the arrangement of the tumblers in the lock.
Sub-master key - a key that will open all the lock within a particular area or grouping in a given
facility.
Master key - a special key capable of opening a series of lock.
Grand Master key - a key that will open everything in a system involving two or more master key groups.
Key Control
Key cabinet- a well-constructed cabinet will have to be procured. The cabinet will have to be of sufficient
size to hold the original key to every lock in the system. It should be secured at all times.
Key record- some administrative means must be set up to record code numbers and indicates to whom kevs
to specific locks have been issued.
Inventories- periodic inventories will have to be made of all duplicate and original keys in the hands of the
employees whom they have been issued.
Audits- in addition to periodic inventory, an unannounced audit should be made of all key control records
and procedures by a member of management.
Daily report- a daily report should be made to the person responsible for key control from the personnel
department indicating all persons who have left or will be leaving the company. In the event that a key has
been issued, steps should be initiated to insure that the key is recovered.
Safe - a metallic container used for the safekeeping of documents or small items in an office or installation.
Safe can be classified as either robbery or burglary resistance depending upon the use and need.
Its weight must be at least 750 lbs. And should be anchored to a building structure.
Its body should at least one inch thick steel.
Vault - heavily constructed fire and burglar resistance container usually a part of the building structure used
to keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but smaller
than a file room.
The vault door should be made of steel at least 6 inches in thickness.
The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.
File room - a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate
limited people to work on the records inside.
The file room should at most be 12 feet high.
It must have a watertight door and at least fire proof for one hour.
✔️Personal recognition
✔️Artificial recognition- identification cards, passes, passwords, etc.
Single pass system - the badge or pass coded for authorization to enter specific areas is issued to an
employee who keeps it in his possession until his authorization is terminates.
Pass exchange system - an exchange takes place at the entrance of each controlled area. Upon leaving the
personnel surrenders his badge or passes and retrieve back his basic identification.
Multiple pass system - this provides an extra measure of security by requiring that an exchange take place
at the entrance of each restricted area.
No packages shall be authorized to be brought inside the industrial installation, offices and work area
without proper authority. This basic precept help reduce if not eliminate pilferage, industrial espionage or
sabotage.
Outgoing packages carried by personnel should be closely inspected and those in vehicles should also be
checked as many pilfered items are hidden in the surface of the vehicles leaving the compound.
Any personnel/visitor entering the installation with a package should deposit the same to the security and in
return receives a numbered tag, which he/she will use in claiming his/her package upon departing.
Privately owned vehicle of personnel/visitor should be registered and are subject to the identification and
admittance procedure.
Vehicles should be subjected for search at the entrance and exit of the installation.
All visitors with vehicle should provide the security as to the complete details of their duration of stay, person
to be visited, and other information.
All vehicles of visitors should be given a sign/sticker to be placed on the windshield.
Traffic warning signs should be installed in all entrances in order to guide the visitors in their destination as
well to provide them with the necessary safety precautions while they are inside the installation.
Security personnel must constantly supervise parking areas and make frequent spots searches of vehicles
found there.
At any physical barrier, a security system must posses the ability to distinguish among authorized persons,
unauthorized visitors, and other unauthorized persons. This is to assist the security personnel protects sensitive are
and information within the installation. Appropriate warning signs should be posted at the building perimeter. Special
restricted entry facilities to public access should be provided. This will be dependent on the degree af security needed
for the protection of property, activity and other processes within the building. A clear-cut policy on the access control
should be disseminated to all personnel of the installation.
PERSONNEL SECURITY
includes all the security measures designed to prevent unsuitable individuals or persons of doubtful loyalty to the
government, from gaining access to classified matter or to any security facility, and to prevent appointment, or
retention as employees of such individuals.
This is more comprehensive investigation than the NAC or the NAC and LAC. A through and complete investigation
of all or some of the circumstances or aspects of a person's life is conducted.
Complete Background Investigation - Consist of the investigation of the background of a person, particularly
all the circumstances of his personal life.
Partial Background Investigation - Consist of the investigation of the background of an individual but limited
only to some of the circumstances of his personal life which are deemed pertinent to the investigation.
Normally, the request for the investigation will indicate the specific personal circumstances to be covered.
This type of BI is also used to further develop questionable information contained in another investigation
report.
Loyalty - faithful allegiance to the country, government and its duly constituted authority.
Integrity. uprightness in character, soundness of moral principles, freedom from moral delinquencies, ore more simply
stated-honesty.
Discretion- the ability of tendency to act or decide with prudence; the habit of wise judgment or simply
stated- good judgment
Moral- distinctive identifying qualities which serve as an index to the essential or intrinsic nature of a person;
his outward manifestation, personal traits or moral habits.
Character- the sum of the traits that serves as an index of the essential intrinsic nature of a person. It is the
aggregate of distinctive mental and moral qualities that have been impressed by nature, education and habit
upon the individual.
Reputation- opinion or estimation in which one is generally held. It is what one reported to be, whereas
character is what a person is.
Revenge- a real or fancied wrong can create a hatred which will stop at nothing to obtain revenge of the
offender. Hatred wraps the sense of moral values until the hater will go to any lengths, even betrayal of his
country, to avenge himself on the person or class of people hated.
Material Gain- some people are so avid for material gain that they will stop at nothing to achieve this end.
Personal Prestige- this motivation applies to those whose main desire is for power-power over others-to
prove to the world what leaders they are. However, their desire for power makes them especially vulnerable
to subversion.
Friendship -through close attachment to another person, many people, otherwise of high integrity, will do
things inimical to their country's interest.
Ideological Beliefs- If a person holds inimical to their country, they are of course vulnerable to approach by
subversive groups of agents.
The security guard force is the key element in the overall security system of a plant or installation.
Its basic mission is to protect all the property within the limits of the facility boundaries and protect employees and
other persons on the installation.
What is Security Guard?
Sometimes called private security guard or watchman shall include any person who offers or renders personal
service to watch or secure either a residence or business establishment or both for hire or compensation, and with a
license to exercise profession.
It is a group of force selected men, trained or grouped into functional unit for the purpose of protecting operational
processes from those disruption which would impeded efficiency or halt operation at a particular plant, facility,
installation or special activity
Private Security Agency - any person, association, partnership, firm or private corporation, who contracts,
recruits, trains, furnishes or post any security guard, to do its functions or solicit individuals, business firms,
or private, public or government-owned or controlled corporations to engage his/its service or those of his/its
security guards, for hire commission or compensation.
Company Security Force - A security force maintained and operated any private company/ corporation for its
own security requirements only.
Government Security Unit - a security unit maintained and operated by any government entity other than
military and/a police, which is established and maintained for the purpose of securing the office or
compound and/or extension such government entity.
Office of the Human Resources and Administrative Manager/Staff Director for Personnel and Administration
The principal staff assistant to the General Manager/Security Director for planning and supervising matters
or activities pertaining to personnel management and miscellaneous administrative functions such as:
Personnel Strengths
Replacement
Discipline, Law and Order
Morale and Personnel Services
Personnel Procedures
Interior Management
Personnel Adviser
The Detachment Commander shall command and responsible for a certain detachment, with fifteen
(15) or more security personnel under him. He is directly responsible to the Security Manager of the installation.
He prepares and executes the security plan of his Detachment in relation to the security requirements of the
establishment being guarded.
He is responsible for the enforcement and implementation of Rules and Regulations/Policies.
He receives instructions from the Security Manager and implements the same as required
He has full operational and administrative control of all his units to include his assistant and
shift-in-charge/supervisor.
He conducts inspection of his units and institutes corrective measures on the spot on those problems he
may detect or brought to his attention. If not possible, he brings the problem to the Security Manager of the
establishment.
Shift-in-Charge
The Shift-in-Charge shall be responsible to the Detachment Commander as far as his shift is concerned.
He forms his men at least 30 minute before posting time seeing that all are in proper uniform and
presentable.
He disseminates instructions coming form his Detachment Commander/OIC or those relayed to him by his
counter-part, the outgoing SIC.
He inspects the posts as often as he can to ensure that his men are on the alert and performing their duties
effectively.
He performs other duties as may be directed by the Detachment Commander or by the ADC.
Firearms and Weapons Authorized for Used of the Security Guard While on Duty
Handguns/Low-powered (cal. 22 and cal.38) not exceeding one FA for every two guards employed.
Shotguns (not bigger than 12 gauge)
High-powered- when the agency is operating in areas where there is upsurge of lawlessness and criminality
as determined by the Chief PNP.
DOCUMENT AND INFORMATION SECURTY
The leakage of document and information cost government, business and industry alike, billion of pesos. A rival
company or an enemy agent might use an illegally obtain document and information for their own advantage. For this
reason, a comprehensive and information security program is very essential to the installation in order to focus freely
on the attainment of its goals and objectives.
Classification of Documents
Top Secret
Secret
Confidential
Restricted
These are information and material (matter), the unauthorized disclosure of which would cause exceptionally grave
damage to the nation, politically, economically or from a security aspect. This category is reserve for the nation's
closest secrets and is to be used with great reserve.
Classification Authority- Head of the Department
These Information and material (matter), the unauthorized disclosure of which would endanger national security,
cause serious injury to the interest or prestige of the nation or of any governmental activity or would be of great
advantage to a foreign nation.
Classification Authority- Head of the Department
These are information and material (matter) the unauthorized disclosure of which, while not endangering the national
security, would be prejudicial to the interest or prestige of the nation or any governmental activity, or would cause
administrative embarrassment or unwarranted injury to an individual or would be of advantage to a foreign nation.
Classification Authority- any officer assign
Authority to classify shall be the same as for CONFIDENTIAL matter. Reproduction is authorized.
Transmission shall be through the normal dissemination system.
Custody and accounting of classified matter - Heads of departments handling classified matter shall issue orders
designating their respective custodians of classified matter. Custodian shall:
Store all classified matter.
Maintain a registry of classified matter showing all classified matter received and to whom transmitted.
Maintain current roster of persons authorized access to classified matter for each classification in the office.
Unauthorized keeping of private records - All government personnel are prohibited from keeping private records,
diaries, or papers containing statement of facts or opinions, either official or personal, concerning matters which are
related to or which affects national interest or security. Also prohibited are the collecting of souvenirs or obtaining for
personal use whatsoever any matter classified in the interest of national security.
Dissemination - Dissemination of classified matter shall be restricted to properly cleared persons whose official
duties required knowledge or possession thereof. Responsibility for the determination of "need-to-know" rests upon
both each individual, who has possession, knowledge or command control of the information involve, and the
recipient.
Trade Secrets- this consist of any formula, pattern, device or compilation of information which is used in
one's business and which gives him an opportunity to gain an advantage over competitors who do not know
or us e it. It may be a formula for a chemical compound a process of manufacturing, treating or preserving
materials, a pattern for machine or device, or a list of customers. It differs from other secret information as to
single or ephemeral events. A trade secret is a process or device for continuous use in the protection of the
business.
Patents- this is a grant made by the government to an inventor, conveying or securing to him the exclusive
right to make, use, or sell his invention for term of years.
Primary Distinctions Between Patents and Trade Secrets
Requirements for obtaining a patent are specific. To qualify for a patent the invention must be more than
novel and useful. It must represent a positive contribution beyond the skill of the average person.
A much lower of novelty is required of a trade secret.
A trade secret remains secret as long as it continues to meet trade secret tests while the exclusive right to
patent protection expires after 17 years.
the certification by a responsible authority that the person described is cleared for access to classified matter the
appropriate level. Need-to-know is the principle whereby access to classified matter may only be only given to those
persons to whom it is necessary for the fulfillment of their duties. Persons are not entitled to have access to classified
matter solely by virtue of their status or office. It is a requirement that the dissemination of classified matters be
limited strictly to persons whose official duty requires knowledge or possession thereof.
the certification by a witnessing officer that the classified matters describe therein has been disposed of in his
presence, approved destruction methods.
Classified refers to assign information by one of the four classification categories. Security Clearance refers to the
administrative determination that an individual is eligible for access to classified matter. Compromise means lose of
security, which results from an authorized persons obtaining knowledge of classified matter. Compartmentation is the
grant of access to classified matter only to properly cleared persons in the performance of their official duties.
Declassify is the removal of security classification from classified matter. Reclassify / Re grading is the act of
changing the assigned classification of matter. Up- grading is the act of assigning to a matter of higher classification
to a classified document.
Communication Security Officer - A properly trained and cleared Communication Security Officer shall be
appointed in every Department of the Government handling cryptographic communication.
TRANSMISSION SECURITY
component of communication security which results from all measures designed to protect transmission from
interception, traffic analysis and imitative deception.
Communication personnel
shall select the means most appropriate to accomplish the delivery of message in accordance with the specified
precedence and security requirements.
Radio Operators
shall adhere to the use of correct procedures, circuit discipline and authentication system as a security measures
against traffic analysis, imitative deception and radio direction finding
CRYPTOGRAPHIC SECURIFY
that component of communication security which results from the provisions of technically sound erypto-syslem and
their proper use.
Cipher - a system that manipulate one, two, or three characters at a time like:
What Is a Risk?
it is the potential damage or loss of an asset. The level of risk is a combination of two factors: The value placed on
that asset by its owner and the consequence, impact adverse effect of the loss or damage to that asset and; the
likelihood that a specific vulnerability will be exploited by a particular
threat.
What is an Adversary?
An individual, group, organization, or government that conducts activities or has the intention and capability to
conduct activities detrimental to the individual, private or government entity.
What is Asset?
Any information, facility, material, Information, or activity which has a positive value to its owner whether it is an
individual, private or government entity.
What are Countermeasures?
An action taken or a physical entity used to reduce or eliminate one or more vulnerabilities. The cost of possible
countermeasures may be monetary, but may also include non-monetary cost such as reduced operational efficiency,
adverse publicity unfavorable working conditions, and political consequences.
What is Probability?
It is the chance or likelihood that a loss will take place. Indicated by a mathematical statement concerning the
possibility of an event occurring
What is Criticality?
It is the impact of a loss as measured in financial terms. How important it is in terms of the survival or existence of the
organization.
Security Survey
Is a critical on site examination and analysis of an industrial plant, business, home, or public or private institution
done to ascertain the facility's current security status, to identify deficiencies or excesses in current practices, to
determine what protection is needed, and to make recommendations for improving the overall level of security at that
location.
Security Inspection
Is an important part of security management process which insure that risk are recognized and covered in security
programs and that programs are necessary and cost-effective.
SECURITY HAZARDS
Any act or condition which may result in the compromise of information, loss of life, loss or destruction of property or
disruption of the objective of the installation.
Types of Hazards
1. Natural Hazard- these are hazards which arise from natural phenomena. The following are types of natural
hazards or disasters:
✔️Floods caused by typhoons
✔️Earthquakes
✔️Fire (not caused by human action)
✔️Storms (typhoons, cyclones, tornado and hurricane)
✔️Lighting storms
✔️Extreme temperature and humidity
2. Human-Man made Hazards- These are hazards which are the result of a state of mind, attitude, weaknesses or
character traits of one or more persons. They can be acts of commission or omission, both overt and covert, which
can disrupt operation of a plant or installation. The following are types of human or man made hazards:
What is Sabotage?
deliberate destruction: the deliberate damaging or destroying of property or equipment, e.g. by resistance fighters,
enemy agents, or disgruntled workers.
Sabotage - is an act of destroying, damaging or any evil motives that will lead to stoppage of the normal operation of
the company, factory, plant and or establishment
Sabot- French word - that means Wooden Slipper.
Saboteur - is the agent of sabotage.
3 types of Saboteur
1. Enemy agent
2. Traitorous person
3. Irresponsible person
Types of Sabotage
1. Mechanical Sabotage
2. Psychological Sabotage
Mechanical Sabotage - is an act wherein they used the object or substance within the area of an establishment.
What is Espionage?
Stealing of secret, confidential, or sensitive commercial information belonging to a company so that a competitor
company can benefit from it.
Industrial Spy
Undercover operation
Patsy
Intruder
Visitors
Customers
Trash and Scrap
Riot- refers to the unlawful assembly that resulted to violent disturbance of peace.
Causes of riot:
1. Panic
2. Strike
3. Mob- a promiscuous multitude of people, rude and disorderly.
Types of mob:
Aggressive mob
Escape mob
Acquisitive mob
Expressive mob
4. Crowd - Temporary congregation of people.
Types of crowd
1. Physical crowd - temporary congregation of people without interest
2. Psychological crowd- temporary congregation of people with common interest in a certain thing.
Types:
1. Casual psychological - common interest only for short duration
2. International Psychological- common interest in a long duration
3.
What is Pilferage?
One of the most annoying and common human hazards.
Types of Pilferer
Casual pilferer-one who steals due to his inability to resist the unexpected opportunity and has lite fear of
detection.
Methods used:
1. Classic method
2. Uses fake documents
3. Removal of items
4. Disposal of the same
KLEPTOMANIAC - The person who is fond of getting the property of other people.
- there is satisfaction on the part of the person committing a crime.
Theft- is committed by any person who with intent to gain but without violence against or intimidation of persons nor
force upon things shall take personal property of another without the latter's consent.
Qualified Theft - taking the property of another with violation of trust and
confidence;
Example: maid, houseboy, salesgirl, or employees or any person that the victim has trusted.
Access List - an authenticated list of personnel given to security allowing entry to a compound or installation or a part
thereof.
Clear Zone - the exterior and interior parallel area near the perimeter barrier of an industrial compound to afford
better observation and patrol movement.
Controlled Area - an area near or adjacent to limited or exclusive areas where entry is restricted.
Ducks - in England, an owner to protect his compound used and they are not only effective but cheap to maintain.
Duress Code - a type of code system so that security personnel when forced by armed men intending to enter an
installation can give alarm by the use of certain words in casual conversation with other personnel in the installation.
Key Control - the management of keys in a plant, office or business organization to prevent unauthorized access.
Main Office - all agencies shall maintain a main office in their registered addresses.
PCSUSIA/SAGSD - the government agency that issues licenses for private and goverment secunty guard.
Perimeter Barrier - the first line of physical defense of a building, compound, or comples viewing from the outside.
Peterman - a term used in England for lock pickers, safe crackers and penetrators of restricted/prohibited areas.
Private Detective - any person who does detective work for hire, reward or commission other than members of the
PNP, NBI, AFP, BJMP and other law enforcement agency of the government.
Relative Criticality of Operation - the importance of an establishment with reference to the national economy and
security.
Relative Vulnerability - the susceptability of a plant or establishment to damage, loss, or destruction of operation due
to various hazards.
Safe - a metallic container used for the safekeeping of documents or other small items in an office or installation.
Security Guard - one who is a holder of a security guard license duly issued by the PNP
Security Service Contract - agreement/contract between the agency and client stipulating among other things the
money to be paid by the client and salary of individual security guard,
Security Survey - also known as security audit, risk assessment, and yulnerability assessment