0% found this document useful (0 votes)
36 views

Jump

This document summarizes the legal basis and authorities for industrial security in the Philippines. It discusses the constitutional authority that establishes the government's duty to protect people and private property. It also outlines the statutory authority provided by the Revised Penal Code and laws governing private security agencies. Presidential decrees amended some provisions of the private security agency laws, expanding definitions, qualifications, and oversight mechanisms. The document provides details on the authorities and responsibilities of private security guards, agencies, and their regulation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views

Jump

This document summarizes the legal basis and authorities for industrial security in the Philippines. It discusses the constitutional authority that establishes the government's duty to protect people and private property. It also outlines the statutory authority provided by the Revised Penal Code and laws governing private security agencies. Presidential decrees amended some provisions of the private security agency laws, expanding definitions, qualifications, and oversight mechanisms. The document provides details on the authorities and responsibilities of private security guards, agencies, and their regulation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

APPENDIX B

LEARNING MODULE 1

Topic 1: LEGAL BASIS OF INDUSTRIAL SECURITY IN THE PHILIPPINES

Natural Authority- Highest law is the law of self preservation. ( organized into tribes)

Constitutional Authority- ( Art. 2 Sec. 4 of the 1987 Phil Cons.) the prime duty of the government is to
serve and protect people. ( personal military or civil service duty). (Art. 3 Sec. 1 of the 1987 Phil Cons.)
Due process of the law. ( Art. 3 Sec. 9 of the 1987 Phil. Cons.) Private property shall not be taken for
public use without just compensation. ( Art. 3 Sec. 2 of the 1987 of the Phil Cons.) Right to privacy.

Statutory Authority- Revised Penal Code ( Act No. 3815 as amended) Code of Crime against persons,
personal liberty and security and property have bearing on the security and protection of one's life, liberty
and property.

Private Security Agency Law ( RA 5487)- this law governs the operation, administration of security
agency, and activities, qualifications, duties and licensing of security guards, watchmen and private
detectives. (Professionalize the Security Services)

Presidential Decree No. 11 ( amending RA 5487)

Amended the Sec. 3 (d) which define watchman or security guard, watchman or security guard agency
Amended Sec. 4- who may organize a security or watchman agency.
Amended Sec. 8 of the penal provision.

Presidential Decree No. 11

Sec. 3 (D)- Watchman or Security Guard, Watchman or Security Guard Agency. Any Persons who offers
of renders personal service to watch or secure either residential or business establishment, or both, or
any building, compound, or area including but not limited to logging concessions, agricultural, mining or
pasture lands for hire or compensation, or as an employee thereof shall be known as watchmen or
security guard; and any person, association, partnership, or corporation, who recruits, trains, musters,
furnishes, solicits individuals or business firms, private or government-owned or controlled corporations to
engage his service or those of its watchmen, shall be known as Watchman or Security Guard Agency."

Sec. 4- Who May Organize a Security or Watchman Agency. Any Filipino citizen or a corporation,
partnership, or association, with a minimum capital of five thousand pesos, one-hundred per cent of which
is owned and controlled by Filipino citizens may organize a security or watchman agency:
Provided, That no person shall organize or have an interest in, more than one such agency except those
which are already existing at the promulgation of this Decree: Provided, further, That the operator or
manager of said agency must be at least 25 years of age, a college graduate and/or a commissioned
officer in the inactive service of the Armed Forces of the Philippines; of good moral character, having no
previous record of any conviction of any crime or offense involving moral turpitude and not suffering from
any of the following disqualifications:

1. Having been dishonorably discharged or separated from the Armed Forces of the Philippines;
2. Being a mental incompetent;
3. Being addicted to the use of narcotic drug or drugs; and,
4. Being a habitual drunkard.
Sec. 8- "Any provision of this or other law to the contrary notwithstanding, the Chief of Constabulary may,
at any time suspend or cancel the licenses of private watchman or security guard, or any licenses of
private watchman or security guard agency found violating any of the provisions of this Act or the rules
and regulations promulgated by the Chief of Constabulary pursuant thereto;"

Any person who commit any act in violation of Republic Act No. 5487 and of this Decree, and the
implementing rules and regulations already promulgated which are not in conflict herewith, and those to
be promulgated by the Chief of Constabulary pursuant hereto, shall, on conviction thereof, suffer
imprisonment of from ten to fifteen years and a fine of not less than ten thousand pesos nor more than
fifteen thousand pesos as a military court/tribunal or commission may direct.

Presidential Decree 100 (amended RA 5487 and PD 11)


Sec.3(d)- define watchman or security guard or watchman or security guard agency.
Sec.4-adding the last paragraph
Sec.5-and 8- inserting final provisions
Sec.9- employees need not to be licensed
Sec.11- adding second paragraph
Sec.16- paragraph 1, limitations and prohibitions

Sec. 3 (d)- Watchman or Security Guard; Watchman or Security Guard Agency. Any person who offers or
renders personal service to watch or secure either residential or business establishment, or both, or any
building, compound, area, including, but not limited to, logging concessions, agricultural, mining or
pasture lands, for hire or compensation, or as an employee thereof, including any employee of the
national or local governments or any agency or instrumentality thereof and of government-owned or
controlled firms or corporations, who is employed to watch or secure government buildings, compounds,
premises and other properties, other than members of the Armed Forces of the Philippines, guards of the
Bureau of Prisons, provincial and city jail guards, and members of city and municipal police forces, shall
be known as watchman or security guard; and any person, association, partnership, firm or private
corporation, who/which recruits, trains, furnishes, or employs any watchman or security guard, or solicits
individual, business firms, private, public or government-owned or controlled corporations to engage
his/its service or those of his/its watchmen or security guards, shall be known as Watchman or Security
Guard Agency.

Sec. 4- The qualifications for an individual, firm, corporation, partnership, or association not doing
business or organized purposely or principally as a watchman or security guard agency who/which is
utilizing any of his/its employees to watch, secure or guard his/its business establishment, premises,
compound or properties and required to secure a license in accordance herewith shall be as prescribed
by law, rules or regulations governing his/its business organization and operation.

Sec. 5- Provided, furthermore, That instead of the qualifications herein prescribed, employees of the
national or local governments or any agency or instrumentality thereof, or of government-owned or
controlled corporations required to secure a license under this Act shall be subject to the qualifications for
the positions to which they are appointed
Sec 8- "Provided, finally, That the national or focal governments, or the agencies or instrumentalities
thereof, as well as government-owned or controlled corporations which shall utilize any of their employees
as watchman or security guard are exempted from securing the license herein prescribed."

Sec 8- "Provided, further, That employees of the national or local governments or the agencies or
instrumentalities thereof, as well as of government-owned or controlled corporations, who are employed
or utilized as watchman or security guard as herein defined, shall not pay the fees or file the bonds herein
prescribed.

Sec. 9- Employees need not be licensed. Any person operating, managing, directing or conducting a
licensed private watchman or security guard agency, as well as any person having any participation in the
management or operation thereof except those employed solely for clerical or manual work shall secure
the license prescribed by section 6 of this Art, as amended.

Sec. 11- In case of emergency or in times of disasters or calamities, the Chief of Constabulary may
deputize any private detective, watchman or security guard as herein defined to assist the Philippine
Constabulary in the performance of Constabulary duties for the duration of such emergency, disaster or
calamity.

Sec. 16- On membership: No license shall be granted to any agency unless it has under its employ at
least fifty watchmen or security guards: Provided, That any agency which is now operating with less than
fifty watchmen and/or security guards may continue to operate until June 30, 1973: Provided, further, That
all agencies shall have under their employ not less than one hundred watchmen and/or security guards by
January 1, 1974: Provided, finally, That the maximum number of watchmen or security guards that an
agency may employ, to include its branches, shall be as follows:

1. In the Greater Manila Area (Philippine Constabulary Metropolitan Command Area of operation)
.... not more than one thousand (1000);
2. In the first class cities and municipalities ...… not more than five hundred (500) and
3. In other cities and municipalities......not more than three hundred (300).

Presidential Decree No. 1919


Sec. 3 (d) expand the definition of watchman or security guard, watchman or security guard agency.

Sec. 18- providing the third paragraph

Paragraph 3 of Sec. 8- amended the fees to be paid and bonds.

Paragraph 1 of Sec. 16- provide the limitations and prohibitions of security agency.

Paragraph 1 of Sec. 16- provide the limitations and prohibitions of security agency.

Sec. 3 (d)- The watchman or security guard herein defined shall be referred to specifically as private
security guard, company guard and government guard when employed by private security agencies,
company guard forces of private firms and government entities.

Sec. 18- Any provision of this or other law to the contrary notwithstanding, the Chief of the Constabulary
of his authorized representative may impose, after confirming any violation of this law and its amendatory
Decrees and implementing rules and regulations, the penalty of suspension, or cancellation of the license
of a private watchman or security guard: Provided, That in cases of violations committed by any private
security agency or company guard force the administrative penalty which may be imposed shall only be
administrative fine or cancellation of license without prejudice to any criminal action against the violator.
Paragraph 3 of Sec. 8- National government agencies or instrumentalities thereof, as well as
government-owned or controlled corporations which shall utilize any of their employees as watchman or
security guard are exempted from securing the license herein prescribed: Provided, That employees of
national government agencies or instrumentalities thereof, as well as of government-owned or controlled
corporations, who are employed or utilized as watchman or security guards as herein defined, shall not
pay the fees nor file the bonds herein prescribed

Paragraph 1 of Sec. 16- On membership: No license shall be granted to any private security agency
unless it has a minimum of two hundred licensed private security guards under its employ nor to any
company guard force unless it has a minimum of thirty company guards; Provided, that the maximum
number of security guards that an agency/company guard force may employ, to include its branches shall
be one thousand: Provided, further that this requirement shall take effect not later than March 31, 1985.

Presidential Decree No. 1919 Implementing Rules and Regulation


Section. 1
o Kabit system
o Cut-throat system
o Falsified licensed submitted to prospective client
o Falsified document submitted to the Chief PNP.
o Security agency fails to employ minimum number of guards.
o Security agency violates minimum wages
o Security agency found employing guards without license or guards whose license was suspended
the Chief,PNP
o Security agency found in engaging activities that will endanger the public safety and welfare or
inimical to national security
o Security agency posting guards outside its jurisdiction as stated in its license.

Sec. 3- security guards violations and its penalties.

√ Displaying discourteous or rude manner in the performance of duty. (5 days suspension)


√Willful failure to notify the proper authority of signs of disorders, riots, demonstrations or any violations of
law. ( 15 days suspension)
√Leaving his post to expose the lives and properties he supposed to protect in danger. (30 days
suspension)
√Leaving his post without properly relieved. (30 days suspension)

Sec. 3- security guards violations and its penalties.

√Posted security guard apprehended elsewhere for alarm and scandal or disorderly conduct. ( 30 davs
suspension)
√Security guard firing his firearm indiscriminately without connection in the performance of duty.
(30 days suspension)
√Assisting or protecting criminals during on or off duty status. (cancellation of license)

Sec. 3- security guards violations and its penalties.

√Providing confidential information to unauthorized person. ( cancellation of license)


√Posted security guard found drunk or drinking intoxicating liquor. (cancellation of license)
Sec. 4 violation of security and company force that will be subject for cancellation of license.

√Committed the same offense for atleast 3 times.

✔️Failure to submit for maximum of 60 days on the renewal of license on the prescribe date.

✔️7 days upon notification to FO or CSFC

Sec. 5 -Private security license of any security guards who commits the same offense after having been
suspended for 3 consecutive times within the lifetime of his license shall be cancelled.

Sec. 6- failure of the security agency or company security force to pay their fines within 5 working days
upon receipt of notice to pay fine for 3 times shall be cancelled.

Sec. 7- required numbers of security guards

✔️For private security agency- a minimum of 200 and maximum of 1000 guards,

✔️For company guard force- a minimum of 30 and maximum of 1000 guards.

✔️At least 30 pieces of FA for initial 100 guards (after six months) Temporary license

✔️At least 70 pieces of FA for applying Regular license

✔️Organization and Management

✔️100% own by a Filipino Citizen

✔️Basic requirement of an operator or agency manager

✔️not less than 25 years old

✔️should not posses any disqualifications

✔️Organizational Structure of PSA

✔️Initial requirement of 100 guards in the first year of operation until the next year they should meet the
200 minimum number of guards. (6 months extension)

✔️Main/ Branch offices should have an initial employment of 10 guards during the 1st year of operation
until the 30 minimum number of guards will be meet in the 3rd year of their operation

✔️License of PSA with less than 100 guards shall not be renewed after 1 year of operation

✔️Surety Bond

✔️agency with 1- 199 guards ( 50000)

✔️agency with 200-499 guards(100000)

✔️agency with 500-799 guards ( 150000)

✔️agency with 800-1000 guards (200000)

✔️Basic requirements of a security guard:


✔️Filipino citizen

✔️High school graduate

✔️Physically and mentally fit

✔️At least 18 years of age but not more than 50 years old

✔️Has undergone pre-licensing course

✔️Must not posses any disqualification

✔️New applicants for PSA shall have a minimum capital of 1 million and a bank deposit of 500 thousand

✔️Application for License to Operate should be filed in the PP-SOSIA ( Supervisory Office for Security and
Investigation Agencies).

✔️Application for license to Operate will be endorsed by the Civil Security Force District Officer (CSFC)

✔️PNP Civil Security Group Agency and Guard Supervision Division or any other PNP Office that may be
designated later as the primary office for supervision of the implementation of these rules and regulations.

SECTION 12. Approval, Cancellation and Suspension of LT. Unless revoked or modified by the Chief,
PNP, the authority to approve, cancel or suspend the license to operate shall be exercised by the
following:

A. Approval of New Regular LTO CPNP


B. Cancellation of Regular LTO CPNP
C. Reinstatement of Regular LTO CPNP
D. Suspension of Regular LTO CPNP
E. Renewal of Regular LTO DCSG
F. Approval of Temporary LTO DCSG
G. Reversion of Regular to Temporary LTO DCSG
H. Cancellation of Temporary LTO DCSG
I. Suspension of Temporary LTO DCSG
PADPAO - refers to the Philippines Association of Detective and Protective Agency Operators, inc.. which
is an assocation of all licensed security agencies and company security forces.

What is Security?

is a state or condition of being secured; there is freedom from fear, harm, danger, loss, destruction or
damages. Basically, it was the action of man against man that led to many unsecured and unsafe
conditions.

Three Aspects of Security

Physical Security - this concern with the physical measures adopted to prevent unauthorized access to
equipment, facilities, material and document and to safeguard them against espionage, sabotage,
damage, loss and theft.

Personnel Security- this is as important as physical security. Personnel security starts even before the
hiring of an employee and remains to be maintained for as long as the person is employed. Its purpose is
to insure that a firm hires those best suited to assist the firm in achieving its goals and objectives and
once hired assist in providing necessary security to the work force while carrying out their functions.

Document and Information Security- this involves the protection of documents and classified papers from
loss, access by unauthorized persons, damage, theft and compromise through disclosure.
Classified documents need special handling. Lack of indoctrination and orientation among the personal
handling them can result in the leakage, loss, theft and unauthorized disclosure of the documents.

What is Protective Security?

measures taken by an installation or unit to protect itself against sabotage, espionage or subversion and
at the same time provide freedom of action in order to provide the installation of the unit with the
necessary flexibility to accomplish its mission.

✔️Industrial Security - a type of security applied to business groups engaged in industries like
manufacturing, assembling, research and development, processing, warehousing and even agriculture. It
may also mean the business of providing security.

✔️Hotel Security - a type of security applied to hotels where its properties are protected from pilferage,
loss, damage and the function in the hotel restaurants are not disturbed and troubled by outsiders or the
guest themselves. This type of security employs house detectives, uniforms guard and supervisor and
insures that hotel guests and their personal effects are safeguarded.

✔️Bank security - this type of security is concern with bank operations. Its main objective is the protection
of bank cash and assets, its personnel and clientele. Security personnel are trained to safeguard bank
and assets while in storage, in transit and during transactions.
✔️VIP Security - a type of security applied for the protection of top-ranking officials of the government or
private entity, visiting persons of illustrious standing and foreign dignitaries.

✔️School Security - a type of security that is concern with the protection of students, faculty members, and
school properties. Security personnel are trained to protect the school property from theft, vandals,
handling campus riots and detecting the use of intoxicated drugs and alcohol by the students.

✔️Supermarket or Mall Security - a type of security which is concern with the protection of the stores,
warehouses, storage, its immediate premises and properties as well as the supermarket personnel and
customers. Security personnel are trained to detect "shoplifter", robbery, and bomb detection
and customer relation.
✔️Other types - this include all other security matters not covered in the above enumeration.

What is Physical Security?

- measures are being used to define, protect, and monitor property rights and assets. These measures
consist of barriers and devices that would detect, impede, and prevent unauthorized access to equipment,
facilities, material and document and to safeguard them against espionage, sabotage, damage and theft.

- as the safeguarding by physical means, such as guard, fire protection measures, of plans, policies,
programs, personnel, property, utilities, information, facilities and installation against compromise,
trespass, sabotage, pilferage, embezzlement, fraud, or other dishonest criminal act.

What is a Barrier?
-any structure or physical device capable of restricting, deterring, delaying, illegal access to an
installation.

Types of Barriers

✔️Natural barriers - it includes bodies of waters, mountains, marshes, ravines, deserts or other terrain that
are difficult to traverse.

✔️Structural barriers - these are features constructed by man regardless of their original intent that tends
to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets or containers etc.

✔️Human barriers - persons being used in providing a guarding system or by the nature of their
emplovment and location, fulfill security functions. Examples are guards, office personnel, shop workers,
etc.

✔️Animal barriers - animals are used in partially providing a guarding system. Dogs are usually trained
and utilized to serve as guard dogs. German shepherds are best suited for security functions. Goose and
turkeys could also be included.

✔️Energy barriers - it is the employment of mechanical, electrical, electronic energy imposes a deterrent to
entry by the potential intruder or to provide warning to guard personnel. These are protective lighting,
alarm system and any electronic devices used as barriers.

Three Line of Physical Defense

✔️First line of Defense- perimeter fences/ barriers


✔️Second line of defense- doors, floors, windows, walls, roofs and grills and other entries to the buildings
✔️Third line of defense- storage system like steel cabinets, safes, vaults and interior files.
What is a Restricted Area?

A restricted area is any area in which personnel or vehicles are controlled for reasons of security.
Restricted area is established to provide security for installation or facilities and to promote efficiency of
security operations and economy in the use of security personnel.

Types of Restricted Areas

Exclusion Area- an exclusion area is a restricted area which contains a security interest to TOP SECRET
importance, and which requires the highest degree of protection.
Limited Area Control- a limited area is a restricted area in which a lesser degree of control is required
than in an exclusion area but which the security interest would be compromised by uncontrolled
movement.

Interior Area Control - Interior area control is generally affected in two ways. The first method is the
system which is initiated and terminated at the outer limits of the area to determine the movements of a
visitor within the area. A second somewhat less means of accomplishing the same thing is time travel.
This system provides for checking the actual time used by the visitor against known time requirements for
what the visitor is to accomplish.
Visitor Identification and Movements Control - Processing and control of movements of visitor shall be
included in the PASS SYSTEM. The control of movements of visitor will depend on the installation. A
visitor register shall be maintained to include the name of the visitor, date of visit, purpose of visit, which
may be filed for the future reference.

Key Control- A system of controlling keys shall be advised and regulations covering the disposal, storage
or withdrawals, shall be issued and imposed.

Fire Prevention- fire is so potentially destructive without human assistance, with assistance it can be caused to
devastate those things you are attempting to secure and, professionally accomplished, often in a way that does not
leave recognizable evidence of sabotage.

What is Perimeter Security?

It is the protection of the installation's inner and the immediate vicinity. The main purpose of perimeter barrier is to
deny or impede access or exit of unauthorized person. Basically, it is the first line of defense of an installation. This is
maybe in the form of fences, building walls or even bodies of water.

Types of Fences

Solid fence -constructed in such away that visual access through the fence is denied. Its advantage is that it denies
the opportunity for the intruder to become familiar with the personnel, activities and the time scheduled of the
movements of the guards in the installation. On the other hand, it prevents the guards from observing the area
around the installation and it creates shadow that may be used by the intruder for cover and concealment.

Full-view fence - it is constructed in such away that visual access is permitted through the fence.
Its advantages are that it allows the roving patrols and stationary guard to keep the surrounding are of the installation
under observation. On the other hand, it allows the intruder to become familiar with the movements and time
schedule of the guard patrols thereby allowing him to pick the time that is advantageous on his part.

Types of Full-View Fence

1. Chain link fence


✔️It must be constructed of 7 feet material excluding top guard.
✔️It must be of 9 gauges or heavier.
✔️The mesh openings are not to be larger than 2 inches per side.
✔️It should be twisted and barbed selvage at top and bottom
✔️It must be securely fastened to rigid metal or reinforced concrete.
✔️It must reach within 2 inches of hard ground or paving.
✔️On soft ground, it must reach below surface deep enough to compensate for shifting soil or sand.
2. Barbed wire fence
✔️Standard barbed wire is twisted, double-strand, 12-gauge wire with 4 point barbs spaces in an equal
distance apart.
✔️Barbed wire fencing should not be less than 7 feet high excluding top guard.
✔️Barbed wire fencing must be firmly affixed to posts not more than 6 feet apart.
3. Concertina wire fence
✔️Standard concertina barbed wire is commercially manufactured wire coil of high strength steel barbed wire
✔️clipped together at intervals to form a cylinder.
✔️Opened concertina wire is 50 feet long and 3 feet in diameter.
Perimeter Barrier Opening

✔️Gates and Doors - when not in use and controlled by guards, gates and doors in the perimeter should be locked
and frequently inspected by guards. Locks should be changed from time to time and should be covered under
protective locks and key control.
✔️Side-walk-elevators - these provide access to areas within the perimeter barrier and should be
locked and guarded.
✔️Utilities Opening - sewers, air intakes, exhaust tunnels and other utility openings which penetrate the barrier and
which have cross sectional areas of 96 square inches or more should be protected by bars, grills, water filled traps or
other structural means providing equivalent protection to that portion of the perimeter barriers.
✔️Clear Zones - an obstructed area or a "clear zone" should be maintained on both sides of the perimeter barrier. A
clear zone of 20 feet or more is desirable between the barriers and exterior structures and natural covers that may
provide concealment for assistance to a person seeking unauthorized entry.

Additional Protective Measures

✔️Top Guard - additional overhang of barbed wire placed on vertical perimeter fences upward and outward with a 45
degree angle with 3 to 4 strands of barbed wires spaced 6 inches apart. This increases the protective height and
prevents easy access.
✔️Guard Control stations - this is normally provided at main perimeter entrances to secure areas located out-of-doors,
and manned by guards on full-time basis. Sentry station should be near a perimeter for surveillance at the entrance.
✔️Tower Guard - this is a house-like structure above the perimeter barriers. The higher the tower, the more visibility it
provides. It gives a psychological unswerving effect to violators. By and large guard towers, whether permanent or
temporary, must have a corresponding support force in the event of need. Towers as well as guard control stations
should have telephones, intercoms, and if possible two-way radios connected to security headquarters or office to call
for reserves in the event of need.
✔️Barrier Maintenance - fencing barriers and protective walls should always be regularly inspected by security. Any
sign or attempts to break in should be reported for investigation. Destruction of fence or sections thereof should be
repaired immediately and guard vigilance should be increased.
✔️Protection in Depth - in large open areas or ground where fencing or walling is impractical and expensive, warning
signs should be conspicuously placed. The depth itself is protection reduction of access roads, and sufficient notices
to warn intruders should be done. Use of animals, as guards and intrusion device, can also be good as barriers.
✔️Signs and notices - "Control signs" should be erected where necessary in the management of unauthorized ingress
to preclude accidental entry. Signs should be plainly visible and legible from any approach and in an understood
language or dialect.

What is Protective Lighting?

Provides a means of continuing, during hours of darkness, a degree of protection approach that is maintained during
daylights hours.

Types of Protective Lighting


1. Continuous lighting - the most familiar type of outdoor security lighting, this is designed to provide two
specific results: glare projection or controlled lighting. It consists of a series of fixed luminaries at range to
flood a given area continuously during the hours of darkness.
✔️Glare projection type- it is being used in prisons and correctional institutions to illuminate walls and outside
barriers.
✔️Controlled lighting- it is generally employed where, due to surrounding property owners, nearby highways
or other limitations, it is necessary for the light to be more precisely focused.
2. Standby lighting - it is designed for reserve or standby use or to supplement continuous systems.
A standby system can be most useful to selectively light a particular area in an occasional basis.
3. Movable or Portable lighting - this system is manually operated and is usually made up of movable search or
floodlights that can be located in selected or special locations which will require lighting only for short period
of time.
4. Emergency lighting - this system is used in times of power failure or other emergencies when other systems
are inoperative.

General Types of Lighting Sources

✔️Incandescent lamp - it is the least expensive in terms of energy consumed and has the advantage of providing
instant illumination when the switch is on.

Types of Gaseous Discharge Lamp

✔️Mercury vapor lamp - it is considered more efficient that the incandescent and used widespread in exterior lighting.
This emits a purplish-white color, caused by an electric current passing through a tube of conducting and luminous
gas. (blue-green)

General Types of Lighting Sources

✔️Sodium Vapor Lamps- It is efficient bulb and due to its color, it is placed usually in areas to connote concern like
bridges. (emits yellow light)

General Types of Lighting Sources

✔️Metal halide - it has similar physical appearance to mercury vapor but provides a light source of higher luminous
efficiency and better color rendition.
✔️Fluorescent - this provides good color rendition, high lamp efficiency as well as long life. However, it cannot project
light over long distance and thus are not desirable as flood type lights.

Types of Lighting Equipment

✔️Floodlights - These can be used to accommodate most outdoor security lighting needs, including the illumination of
boundaries, fences and buildings and for the emphasis of vital areas or particular buildings.
✔️Street lights - This lighting equipment received the most widespread notoriety for its value in reducing crime.
✔️Search lights - These are highly focused incandescent lamp and are designed to pinpoint
potential trouble spots.
✔️Fresnel lights - These are wide beam units, primary used to extend the illumination in long, horizontal strips to
protect the approaches to the perimeter barrier. Fresnel projects a narrow, horizontal beam that is approximately 180
degrees in the horizontal and from 15 to 30 degrees in the vertical plane.

What are Protective Alarms?

Protective alarm is one of the important barriers in security. It assists the security in detecting, impeding or deterring
potential security threat in the installation. Basically, its function is to alert the security personnel for any attempt of
intrusion into a protected area, building or compound. Once an intruder tampers the circuitry, the beam or radiated
waves of the alarm system, it will activate an alarm signal.

Three Basic Parts of Alarm System

✔️Sensor or trigger device - it emits the aural or visual signals or both.


✔️Transmission line - a circuit which transmit the message to the signaling apparatus.
✔️Enunciator/annunciator - it is the signaling system that activates the alarm.

Types of Protective Alarm System

✔️Central Station System - a type of alarm where the control station is located outside the plant or installation. When
the alarm is sounded or actuated by subscriber, the central station notifies the police and other public safety
agencies.
✔️Proprietary system - centralized monitor of the proprietary alarm system is located in the industrial firm itself with a
duty operator. In case of alarm, the duty operator calls whatever is the primary need; firefighters, police, an
ambulance or a bomb disposal unit.
✔️Local Alarm - This system consist of ringing up a visual or audible alarm near the object to be protected. When an
intruder tries to pry a window, the alarm thereat goes off.
✔️Auxiliary alarm - company-owned alarm systems with a unit in the nearest police station so that in case of need,
direct call is possible. The company maintains the equipment and lines both for the company and those in the police,
fire and other emergency agencies by special arrangement.
Radio, landlines, or cell phones can avail of the auxiliary system.

Kinds of Alarms

✔️Audio Detection Device - it will detect any sound caused by attempted force entry. A supersonic microphone
speaker sensor is installed in walls, ceilings and floors of the protected area.
✔️Vibration Detection Device - it will detect any vibration caused by attempted force entry. A vibration sensitive sensor
is attached to walls, ceilings or floors of the protected area.
✔️Metallic foil or wire - it will detect any action that moves the foil or wire. An electrically charge strips of tinfoil or wire
is used in the doors, windows or glass surfaces of the protected area.
✔️Laser Beam Alarm - a laser emitter floods a wall or fencing with a beam so that when this beam is disturbed by a
physical object, an alarm is activated.
✔️Photoelectric or Electric Eye Device - an invisible/visible beam is emitted and when this is disturbed or when an
intruder breaks contact with the beam, it will activate the alarm.
✔️Capacitance or Electrostatic - the body capacitance of any intruder who enters the field
unbalances the electrostatic energy of the field which in turn activates the alarm.
✔️Microwave or motion detection device- a pattern of radio waves is transmitted and partially reflected back to an
antenna. (frequency)

Bank Alarms
✔️Foot Trail Activator
✔️Bill Traps
✔️Knee or Thigh Buttons
✔️Foot Button
✔️Double Squezze

What is a Lock?
a mechanical, electrical, hydraulic or electronic device designed to prevent entry into a building, room, container or
hiding place.

Types of Locks

✔️Key-operated mechanical lock - it uses some sort of arrangement of internal physical barriers (wards tumblers)
which prevent the lock from operating unless they are properly aligned. The key is the device used to align these
internal barriers so that the lock may be operated.

Three (3) Types of Key-operated Lock

✔️Disc or wafer tumbler mechanism


✔️Pin tumbler mechanism
✔️Lever tumbler mechanism

Types of Locks

Padlock - a portable and detachable lock having a sliding hasp which passes through a staple ring and is then made
fasten or secured.

Combination lock - instead of using the key to align the tumblers, the combination mechanism uses numbers, letters
or other symbols as reference point which enables an operator to align them
manually.

Code-operated lock - a type of lock that can be opened by pressing a series of numbered button in the proper
sequence.

Electrical lock - a type of lock that can be opened and closed remotely by electrical means.
Card-operated lock - a type of lock operated by a coded card.
Types of keys
 Change key - a specific key, which operates the lock and has a particular combination of cuts which match
the arrangement of the tumblers in the lock.
 Sub-master key - a key that will open all the lock within a particular area or grouping in a given
facility.
 Master key - a special key capable of opening a series of lock.
 Grand Master key - a key that will open everything in a system involving two or more master key groups.

Key Control

 Key cabinet- a well-constructed cabinet will have to be procured. The cabinet will have to be of sufficient
size to hold the original key to every lock in the system. It should be secured at all times.
 Key record- some administrative means must be set up to record code numbers and indicates to whom kevs
to specific locks have been issued.
 Inventories- periodic inventories will have to be made of all duplicate and original keys in the hands of the
employees whom they have been issued.
 Audits- in addition to periodic inventory, an unannounced audit should be made of all key control records
and procedures by a member of management.
 Daily report- a daily report should be made to the person responsible for key control from the personnel
department indicating all persons who have left or will be leaving the company. In the event that a key has
been issued, steps should be initiated to insure that the key is recovered.

What is a Security Cabinet?


The final line of defense at any facility is in the high security storage where papers, records, plans or cashable
instrument, precious metals or other especially valuable assets are protected. These security containers will be of a
size and quantity, which the nature of the business dictates.

Three (3) Types of Security Cabinet

 Safe - a metallic container used for the safekeeping of documents or small items in an office or installation.
Safe can be classified as either robbery or burglary resistance depending upon the use and need.
Its weight must be at least 750 lbs. And should be anchored to a building structure.
Its body should at least one inch thick steel.
 Vault - heavily constructed fire and burglar resistance container usually a part of the building structure used
to keep and protect cash, documents and negotiable instruments. Vaults are bigger than safe but smaller
than a file room.
The vault door should be made of steel at least 6 inches in thickness.
The vault walls, ceiling, floor reinforce concrete at least 12 inches in thickness.

The vault must be resistive up to 6 hours.

 File room - a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate
limited people to work on the records inside.
The file room should at most be 12 feet high.
It must have a watertight door and at least fire proof for one hour.

Types of Personnel Identification

✔️Personal recognition
✔️Artificial recognition- identification cards, passes, passwords, etc.

Use of Pass System

 Single pass system - the badge or pass coded for authorization to enter specific areas is issued to an
employee who keeps it in his possession until his authorization is terminates.
 Pass exchange system - an exchange takes place at the entrance of each controlled area. Upon leaving the
personnel surrenders his badge or passes and retrieve back his basic identification.
 Multiple pass system - this provides an extra measure of security by requiring that an exchange take place
at the entrance of each restricted area.

Visitors Movement Control


 Visitor's logbook - All visitors to any facility should be required to identify them selves and should be given a
visitor's ID by the security. Visitor's logbook should be filled up with the named of visitors, nature and
duration of visit.
 Photograph - taking of photographs should also be considered. Extreme caution must be exercised in areas
where classified information is displayed to preclude unauthorized taking of pictures of the installation. If a
visitor has camera and it is prohibited to take picture, said camera should be left in the care of security with
corresponding receipt.
 Escort - If possible visitors should be escorted by the security to monitor their activity within the
establishment and guide them where to go.
 Visitor entrances - separate access for visitors and employees of the establishment should be provided.
 Time- traveled - If there is a long delay or time lapse between the departure and arrival, the visitors maybe
required to show cause for the delay.

Package Movement Control

 No packages shall be authorized to be brought inside the industrial installation, offices and work area
without proper authority. This basic precept help reduce if not eliminate pilferage, industrial espionage or
sabotage.
 Outgoing packages carried by personnel should be closely inspected and those in vehicles should also be
checked as many pilfered items are hidden in the surface of the vehicles leaving the compound.
 Any personnel/visitor entering the installation with a package should deposit the same to the security and in
return receives a numbered tag, which he/she will use in claiming his/her package upon departing.

Control of Vehicle in the Installation

 Privately owned vehicle of personnel/visitor should be registered and are subject to the identification and
admittance procedure.
 Vehicles should be subjected for search at the entrance and exit of the installation.
 All visitors with vehicle should provide the security as to the complete details of their duration of stay, person
to be visited, and other information.
 All vehicles of visitors should be given a sign/sticker to be placed on the windshield.
 Traffic warning signs should be installed in all entrances in order to guide the visitors in their destination as
well to provide them with the necessary safety precautions while they are inside the installation.
 Security personnel must constantly supervise parking areas and make frequent spots searches of vehicles
found there.

Building Access Control

At any physical barrier, a security system must posses the ability to distinguish among authorized persons,
unauthorized visitors, and other unauthorized persons. This is to assist the security personnel protects sensitive are
and information within the installation. Appropriate warning signs should be posted at the building perimeter. Special
restricted entry facilities to public access should be provided. This will be dependent on the degree af security needed
for the protection of property, activity and other processes within the building. A clear-cut policy on the access control
should be disseminated to all personnel of the installation.

PERSONNEL SECURITY
includes all the security measures designed to prevent unsuitable individuals or persons of doubtful loyalty to the
government, from gaining access to classified matter or to any security facility, and to prevent appointment, or
retention as employees of such individuals.

What is Personnel Security Investigation?


It is an inquiry into the character, reputation, discretion and loyalty of individual in order to determine a person's
suitability to be given security clearance.

Types of Personnel Security Investigation (PSI)


 National Agency Check (NAC). - This is an investigation of an individual made upon the basis of written
information supplied by him in response to official inquiry, and by reference to appropriate national agencies.
It is simply a check of the files and record of national agencies. The national agencies checked under this
type of investigation are the following:
 National Intelligence Coordinating Agency (NICA)
 National Bureau of Investigation (NBI)
 ISAAFP or J2 Division, GHQ AFP
 CIDG PNP Camp Crame., etc.
 Local Agency Check (LAC) - This type of investigation consist of the first type plus written inquiries sent to
appropriate local government agencies, former employees, references and schools listed by the person
under investigation. The local agencies normally check besides the past employment, schools and
references are the following:
Place of the locality where the individual is a resident.
Mayor, Police, Fiscal, Judge of the locality where the individual is a resident.

Background Investigation (BI)

This is more comprehensive investigation than the NAC or the NAC and LAC. A through and complete investigation
of all or some of the circumstances or aspects of a person's life is conducted.

Types of Background Investigation

 Complete Background Investigation - Consist of the investigation of the background of a person, particularly
all the circumstances of his personal life.
 Partial Background Investigation - Consist of the investigation of the background of an individual but limited
only to some of the circumstances of his personal life which are deemed pertinent to the investigation.
Normally, the request for the investigation will indicate the specific personal circumstances to be covered.
This type of BI is also used to further develop questionable information contained in another investigation
report.

Factors considered in Background Investigation

 Loyalty - faithful allegiance to the country, government and its duly constituted authority.
Integrity. uprightness in character, soundness of moral principles, freedom from moral delinquencies, ore more simply
stated-honesty.
 Discretion- the ability of tendency to act or decide with prudence; the habit of wise judgment or simply
stated- good judgment
 Moral- distinctive identifying qualities which serve as an index to the essential or intrinsic nature of a person;
his outward manifestation, personal traits or moral habits.
 Character- the sum of the traits that serves as an index of the essential intrinsic nature of a person. It is the
aggregate of distinctive mental and moral qualities that have been impressed by nature, education and habit
upon the individual.
 Reputation- opinion or estimation in which one is generally held. It is what one reported to be, whereas
character is what a person is.

Motives that cause people to be disloyal

 Revenge- a real or fancied wrong can create a hatred which will stop at nothing to obtain revenge of the
offender. Hatred wraps the sense of moral values until the hater will go to any lengths, even betrayal of his
country, to avenge himself on the person or class of people hated.
 Material Gain- some people are so avid for material gain that they will stop at nothing to achieve this end.
 Personal Prestige- this motivation applies to those whose main desire is for power-power over others-to
prove to the world what leaders they are. However, their desire for power makes them especially vulnerable
to subversion.
 Friendship -through close attachment to another person, many people, otherwise of high integrity, will do
things inimical to their country's interest.
 Ideological Beliefs- If a person holds inimical to their country, they are of course vulnerable to approach by
subversive groups of agents.

THE GUARD FORCE AND GUARD SYSTEM

The security guard force is the key element in the overall security system of a plant or installation.
Its basic mission is to protect all the property within the limits of the facility boundaries and protect employees and
other persons on the installation.
What is Security Guard?

Sometimes called private security guard or watchman shall include any person who offers or renders personal
service to watch or secure either a residence or business establishment or both for hire or compensation, and with a
license to exercise profession.

What is Security Guard Force?

It is a group of force selected men, trained or grouped into functional unit for the purpose of protecting operational
processes from those disruption which would impeded efficiency or halt operation at a particular plant, facility,
installation or special activity

Types of Security Guard Forces

 Private Security Agency - any person, association, partnership, firm or private corporation, who contracts,
recruits, trains, furnishes or post any security guard, to do its functions or solicit individuals, business firms,
or private, public or government-owned or controlled corporations to engage his/its service or those of his/its
security guards, for hire commission or compensation.
 Company Security Force - A security force maintained and operated any private company/ corporation for its
own security requirements only.
 Government Security Unit - a security unit maintained and operated by any government entity other than
military and/a police, which is established and maintained for the purpose of securing the office or
compound and/or extension such government entity.

Typical Structure of a Security Organization

Office of the General Manager/Security Director


 The office of the General Manager/Security Director is vested the authority and responsibility of running the
security force by authority of the President of the Company/Corporation.
 The General Manager/Security Director is directly responsible to the President of the Company/Corporation
in the operations and administration of the security force
 He is the principal adviser to the president on matters involving security operations, administration of the
security force.

Office of the General Manager/Security Director


 He is the overall head of both various staff departments and field units where he may delegate
corresponding authority commensurate to their assigned responsibility.
 He implements policies promulgated by the policy making body and executed by the President.
 He directs controls and supervises all offices and field units of the force in their respective assigned tasks.
 He performs other functions as directed by the President of the Company/Corporation.

Office of the Executive secretary of the General Manager


 He is the principal administrative assistant to the General Manager/Security Director.
 He prepares communications initiated by the General Manager/Security Director.
 He maintains records of scheduled conferences, appointments and other engagements and advises the
GM/SD of such activities.

Office of the Executive secretary of the General Manager
 He records and checks outgoing communications signed by the M/SD as to its completeness (attachments
to be considered) as well as to ensure the timely dispatch to the addressee through the administrative
section.
 To perform other duties as directed by the General Manager/Security Director.

Office of the Assistant General Manager/Security Executive Director


 The Security Executive Director is the Assistant Manger of the Security Force and takes the Operational and
Administrative Management of the security force in the absence of the GMISD
 He is directly responsible to the GM/SD
 He performs other duties as directed by GM/SD

Office of the Human Resources and Administrative Manager/Staff Director for Personnel and Administration
 The principal staff assistant to the General Manager/Security Director for planning and supervising matters
or activities pertaining to personnel management and miscellaneous administrative functions such as:
 Personnel Strengths
 Replacement
 Discipline, Law and Order
 Morale and Personnel Services
 Personnel Procedures
 Interior Management
 Personnel Adviser

Office of the Operations Manager/Staff Director for Operations


 This office is the principal staff on Operations, training, intelligence and investigation.

Office of the Finance


 This office is principally concerned with budgeting, finance, reports control and program review and analysis.
Exercises supervision over the management engineering activities of the company and the accounting
office. Renders advice, assistance and guidance to GM/SD on financial management. Specific duties and
functions of the Finance Office are:
 Accounting
 Credit and collection
 Bookkeeping
 Billing
 Payroll and disbursing

Office of the Logistic Manager


 This office is in charge with the following:
 Coordinates plan and supervise the implementation of directive and guldance determines divisional
responsibility and evaluates in logistical planning and related planning programs.
 Develops, administers, and coordinates research and development on logistical matters.
 Collects and computes statistical data on logistical matters.
 Recommends logistics budget policy including budget planning
 Prepares estimates and/or requirements to ensure that logistical plans support for corporate plans.
 Performs necessary program and fiscal administration.
 Supervise all matters pertaining to supply.
 Determine the organization, allocation of service personnel Plans for maintenance and repair of supplies
and equipment.

Office of the Inspectorate and Special Projects (Special Staff)


 This office assists the General Manger in inquiring into, and reports upon matters pertaining to the
performance of the different staff, units, towards the attainment of corporate objectives. It also inquires on
the state of discipline, efficiency and economy of the company.
 The Inspectorate Staff conducts inspections, investigations and submits reports to the General Manager. In
the performance of its duties and functions, the General Manger is provided relevant information pertaining
to meritorious conduct and performance of a unit or individual.
 This office is also tasked to conduct overt and covert inspections and investigations and other related
services.

Office of the Communications Officer


 The Communications Officer who is a licensed radio operator is the principal adviser of the General
Manager on communication on matters pertaining to radio communication.

The Detachment Commander/Officer-in-Charge

 The Detachment Commander shall command and responsible for a certain detachment, with fifteen
(15) or more security personnel under him. He is directly responsible to the Security Manager of the installation.
 He prepares and executes the security plan of his Detachment in relation to the security requirements of the
establishment being guarded.
 He is responsible for the enforcement and implementation of Rules and Regulations/Policies.
 He receives instructions from the Security Manager and implements the same as required
 He has full operational and administrative control of all his units to include his assistant and
shift-in-charge/supervisor.
 He conducts inspection of his units and institutes corrective measures on the spot on those problems he
may detect or brought to his attention. If not possible, he brings the problem to the Security Manager of the
establishment.

Assistant Detachment Commander


 Detachment with more than twenty (20) security personnel assigned may be provided with an Assistant
Detachment Commander who will be the principal assistant of the Detachment
Commander.
 In the absence of the Detachment Commander, he performs the duties of the Detachment Commander.

Shift-in-Charge
 The Shift-in-Charge shall be responsible to the Detachment Commander as far as his shift is concerned.
 He forms his men at least 30 minute before posting time seeing that all are in proper uniform and
presentable.
 He disseminates instructions coming form his Detachment Commander/OIC or those relayed to him by his
counter-part, the outgoing SIC.
 He inspects the posts as often as he can to ensure that his men are on the alert and performing their duties
effectively.
 He performs other duties as may be directed by the Detachment Commander or by the ADC.

Security Guard on Duty/Post


 The Security Guard (SG) on Duty/Post must always carry his license to practice his profession, Xerox copy
of the firearm's license assigned to him, and his duty detail order, authorizing him to carry his issued firearm
within his area of jurisdiction.
 If the Security Guard is manning a fixed post especially entrance or exit points, he must maintain a guard's
logbook and enters in the same logbook all events/passages of VIP's vehicles and inspections or visits of
Security Manager/Director of the Client/Firm.
 Guards must observe and apply religiously the provisions of the Code of Ethics, Code of Conduct, and the
General Orders of the Security Guard when on post.
 He may perform spectal task as may be directed by his shift supervisor, DC and of ADC like control of
visitors, inspections of bags of persons coming in and going out of the establishment, vehicle cargoes, or
prevents the intrusion of unauthorized person in a particular area, etc.

Basic Qualification of a Security Consultant

 In addition to the general qualifications, a consultant should be:


 Holder of Master Degree in Criminology, MPA, MNSA, Industrial Management or LL.B.
 Must have at least ten (10) years experience in the operation and management of security business.

Basic Qualifications of a Security Officer:


 In addition to the general qualifications, a security officer, should be:
 At least graduated from Security Officers Training Course
 A retired personnel in the PP/AFP
 Must not posses any of the disqualification

Basic Qualifications of a Private Detective


 In addition to the general qualification, a detective should posses any of the following:
 BS Criminology Graduate
 LL.B. holder
 Graduate of a Criminal Investigation Course

 Advance ROTC graduate

Firearms and Weapons Authorized for Used of the Security Guard While on Duty
 Handguns/Low-powered (cal. 22 and cal.38) not exceeding one FA for every two guards employed.
 Shotguns (not bigger than 12 gauge)
 High-powered- when the agency is operating in areas where there is upsurge of lawlessness and criminality
as determined by the Chief PNP.
DOCUMENT AND INFORMATION SECURTY
The leakage of document and information cost government, business and industry alike, billion of pesos. A rival
company or an enemy agent might use an illegally obtain document and information for their own advantage. For this
reason, a comprehensive and information security program is very essential to the installation in order to focus freely
on the attainment of its goals and objectives.

Basis of Document, Information, and Communication Security


 Security of documents and information is based on the premise that the government has the right and duty
to protect official papers from unwarranted and indiscriminate disclosure. In answer to this problem,
Malacanang, Manila dated August 14, 1964 entitled "Promulgating rules governing security of classified
matters in Government Officers" was promulgated in order to safeguard our secrets as secrets.
 There are various laws likewise effecting security of officials papers of the government, namely, appropriate
articles of the Revised Penal Code as amended and commonwealth Act 616 as amended. Any violations of
the provisions of Memorandum Circular No. 78 shall be dealt administrative proceedings without prejudice to
offense under provisions soft the cited penal statutes. The unauthorized publication of any classified
information shall be deemed a violation of Memorandum Circular No. 78 by the parties responsible thereof.

Document Security Systems


Documents Security is that aspect of security which involves the application of security measures for the proper
protection and safeguarding of classified information.

Classification of Documents
 Top Secret
 Secret
 Confidential
 Restricted

What is Top Secret Matters?

These are information and material (matter), the unauthorized disclosure of which would cause exceptionally grave
damage to the nation, politically, economically or from a security aspect. This category is reserve for the nation's
closest secrets and is to be used with great reserve.
Classification Authority- Head of the Department

What are Secret Matters?

These Information and material (matter), the unauthorized disclosure of which would endanger national security,
cause serious injury to the interest or prestige of the nation or of any governmental activity or would be of great
advantage to a foreign nation.
Classification Authority- Head of the Department

What are Confidential Matters?

These are information and material (matter) the unauthorized disclosure of which, while not endangering the national
security, would be prejudicial to the interest or prestige of the nation or any governmental activity, or would cause
administrative embarrassment or unwarranted injury to an individual or would be of advantage to a foreign nation.
Classification Authority- any officer assign

What are Restricted Matters?


These are information and material (matter), which requires special protection other than that determined to be TOP
SECRET, SECRET, or CONFIDENTIAL.

Authority to classify shall be the same as for CONFIDENTIAL matter. Reproduction is authorized.
Transmission shall be through the normal dissemination system.

Control of Classified Matters

Custody and accounting of classified matter - Heads of departments handling classified matter shall issue orders
designating their respective custodians of classified matter. Custodian shall:
Store all classified matter.
Maintain a registry of classified matter showing all classified matter received and to whom transmitted.
Maintain current roster of persons authorized access to classified matter for each classification in the office.

Insure physical security for classified matter.


Conduct an inventory of all TOP SECRET matter as specified in paragraph 7 (Memo Cir Nr 78/196).
Upon his relief, account for all TOP SECRET and SECRET matter by inventory and transmit the same to his
successor.

Unauthorized keeping of private records - All government personnel are prohibited from keeping private records,
diaries, or papers containing statement of facts or opinions, either official or personal, concerning matters which are
related to or which affects national interest or security. Also prohibited are the collecting of souvenirs or obtaining for
personal use whatsoever any matter classified in the interest of national security.

Dissemination - Dissemination of classified matter shall be restricted to properly cleared persons whose official
duties required knowledge or possession thereof. Responsibility for the determination of "need-to-know" rests upon
both each individual, who has possession, knowledge or command control of the information involve, and the
recipient.

Disclosures to other departments of classified information originating from another department


Classified matter originating from another department shall not be disseminated to other departments without the
consent of the originating department.

Release of classified matter outside a department


General Policy. - No person in the government shall convey orally, visually or by written communication any classified
matter outside his own department unless such disclosures has been processed and cleared by the department head
or his authorized representative.

Types of Proprietary Information

 Trade Secrets- this consist of any formula, pattern, device or compilation of information which is used in
one's business and which gives him an opportunity to gain an advantage over competitors who do not know
or us e it. It may be a formula for a chemical compound a process of manufacturing, treating or preserving
materials, a pattern for machine or device, or a list of customers. It differs from other secret information as to
single or ephemeral events. A trade secret is a process or device for continuous use in the protection of the
business.
 Patents- this is a grant made by the government to an inventor, conveying or securing to him the exclusive
right to make, use, or sell his invention for term of years.
Primary Distinctions Between Patents and Trade Secrets
 Requirements for obtaining a patent are specific. To qualify for a patent the invention must be more than
novel and useful. It must represent a positive contribution beyond the skill of the average person.
 A much lower of novelty is required of a trade secret.
 A trade secret remains secret as long as it continues to meet trade secret tests while the exclusive right to
patent protection expires after 17 years.

What is Security Clearance?

the certification by a responsible authority that the person described is cleared for access to classified matter the
appropriate level. Need-to-know is the principle whereby access to classified matter may only be only given to those
persons to whom it is necessary for the fulfillment of their duties. Persons are not entitled to have access to classified
matter solely by virtue of their status or office. It is a requirement that the dissemination of classified matters be
limited strictly to persons whose official duty requires knowledge or possession thereof.

What is Certificate of Destruction?

the certification by a witnessing officer that the classified matters describe therein has been disposed of in his
presence, approved destruction methods.

Classified refers to assign information by one of the four classification categories. Security Clearance refers to the
administrative determination that an individual is eligible for access to classified matter. Compromise means lose of
security, which results from an authorized persons obtaining knowledge of classified matter. Compartmentation is the
grant of access to classified matter only to properly cleared persons in the performance of their official duties.
Declassify is the removal of security classification from classified matter. Reclassify / Re grading is the act of
changing the assigned classification of matter. Up- grading is the act of assigning to a matter of higher classification
to a classified document.

What is Communication Security?


the protection resulting from the application of various measures which prevent or delay the enemy or unauthorized
persons in gaining information through our communications. It includes Transmission, Cryptographic and Physical
security.

Communication Security Officer - A properly trained and cleared Communication Security Officer shall be
appointed in every Department of the Government handling cryptographic communication.

TRANSMISSION SECURITY
component of communication security which results from all measures designed to protect transmission from
interception, traffic analysis and imitative deception.

Communication personnel
shall select the means most appropriate to accomplish the delivery of message in accordance with the specified
precedence and security requirements.

Radio Operators
shall adhere to the use of correct procedures, circuit discipline and authentication system as a security measures
against traffic analysis, imitative deception and radio direction finding

CRYPTOGRAPHIC SECURIFY
that component of communication security which results from the provisions of technically sound erypto-syslem and
their proper use.

CODES AND CIPHERS


Code - a system which uses words as the smallest element like the one below.

Cipher - a system that manipulate one, two, or three characters at a time like:

What Is a Risk?
it is the potential damage or loss of an asset. The level of risk is a combination of two factors: The value placed on
that asset by its owner and the consequence, impact adverse effect of the loss or damage to that asset and; the
likelihood that a specific vulnerability will be exploited by a particular
threat.

What is Risk Management?


It is a process of selecting and implementing security countermeasures to achieve an acceptable level of risk at an
acceptable cost.

What is Risk Analysis?


It is the analysis of risk include examinations of the vulnerability, probability and criticality of potential threats and
include natural and man made risk

What is an Adversary?
An individual, group, organization, or government that conducts activities or has the intention and capability to
conduct activities detrimental to the individual, private or government entity.

What is Asset?
Any information, facility, material, Information, or activity which has a positive value to its owner whether it is an
individual, private or government entity.
What are Countermeasures?
An action taken or a physical entity used to reduce or eliminate one or more vulnerabilities. The cost of possible
countermeasures may be monetary, but may also include non-monetary cost such as reduced operational efficiency,
adverse publicity unfavorable working conditions, and political consequences.

What is Probability?
It is the chance or likelihood that a loss will take place. Indicated by a mathematical statement concerning the
possibility of an event occurring

What is Criticality?
It is the impact of a loss as measured in financial terms. How important it is in terms of the survival or existence of the
organization.

Security Survey
Is a critical on site examination and analysis of an industrial plant, business, home, or public or private institution
done to ascertain the facility's current security status, to identify deficiencies or excesses in current practices, to
determine what protection is needed, and to make recommendations for improving the overall level of security at that
location.

Security Inspection
Is an important part of security management process which insure that risk are recognized and covered in security
programs and that programs are necessary and cost-effective.

Types of Security inspection


 Continuous Inspection- large departments
 Formal Inspection- with announcements "prepared"
 Informal Inspection- announced " not prepared"
 Structured Inspection- systematic and rigid
 Unstructured Inspection- random manner
Security Education Program
 Design to acquaint all the employees the rationale behind the security measures and to insure their
cooperation at all times.

Seven Phases of Security Education


 Initial Interview- formal and professional in nature
 Training Conference- last up to 2-4 hours,
" ounce of prevention" and specific in nature. 20-30
per intake
 Refresher Conference- semi- annually and at least annually.
 Security Reminders- direct or passable approach
 Security Promotion- active in nature
 Special Interview- both security officer and supervisor problem
 Debriefing- exit phase

Content of a Security Plan


 Situation- historical background
 Mission- goal, objective, purpose
 Execution- outlined and explained
 Administrative and Logistics- equipments
 Command and Signal- channel of communication

SECURITY HAZARDS
Any act or condition which may result in the compromise of information, loss of life, loss or destruction of property or
disruption of the objective of the installation.

Types of Hazards

1. Natural Hazard- these are hazards which arise from natural phenomena. The following are types of natural
hazards or disasters:
✔️Floods caused by typhoons
✔️Earthquakes
✔️Fire (not caused by human action)
✔️Storms (typhoons, cyclones, tornado and hurricane)
✔️Lighting storms
✔️Extreme temperature and humidity
2. Human-Man made Hazards- These are hazards which are the result of a state of mind, attitude, weaknesses or
character traits of one or more persons. They can be acts of commission or omission, both overt and covert, which
can disrupt operation of a plant or installation. The following are types of human or man made hazards:

✔️Carelessness- accidents and dissatisfaction


✔️Disloyalty-subversion and sabotage
✔️Espionage, pilferage and theft
Vandalism, etc

What is Sabotage?
deliberate destruction: the deliberate damaging or destroying of property or equipment, e.g. by resistance fighters,
enemy agents, or disgruntled workers.

Sabotage - is an act of destroying, damaging or any evil motives that will lead to stoppage of the normal operation of
the company, factory, plant and or establishment
Sabot- French word - that means Wooden Slipper.
Saboteur - is the agent of sabotage.

3 types of Saboteur
1. Enemy agent
2. Traitorous person
3. Irresponsible person

Types of Sabotage
1. Mechanical Sabotage
2. Psychological Sabotage

Mechanical Sabotage - is an act wherein they used the object or substance within the area of an establishment.

Types of Mechanical Sabotage


1. Contamination - is a type where they used foreign materials to apply in the establishment.
2. Breakage - destroying the vital parts of a machine.
3. Substitution - Substitution or changing of formula to another, which will cause damage or destructions.
4. Omission - this is committed by means of a doing by an individual, which can cause destruction inside of the
company or establishment.
5. Abrasive - a special type of contamination, by using a type of material that will grind metals.

Explosives - substances that are easily exploded by means of heat, friction,


jarring or sparks. They are highly dangerous because of its damaging effect.
Reasons Why Explosives becomes popular to the Saboteurs;

1. Because of devastating or damaging effect.


2. Because of the availability of delaying devices/detonator.
3. Evidence will disappear and very hard to find

Types of Explosives: According to their sensitivity.


1.Low Intensity Explosives - It is very sensitive to heat. It can be exploded by means of fire, friction or spark.
2. High Intensity Explosives - is detonated by means of shock, jarring or shake. These are from liquid.

What is Espionage?
Stealing of secret, confidential, or sensitive commercial information belonging to a company so that a competitor
company can benefit from it.

Espion - French word- which means spy


- This is used to estimate or determine the best possible means of sabotage.
Spy - is the agent of Espionage. They are very dangerous because of their skill in deception and undercover works.

Methods used by the Agents of Espionage.


1. Stealing or buying information from the employees.
2. By using various form of threats or extorting information's.
3. By means of blackmail.
4. Obtaining or gaining information from social gathering.
5. By the use of fake organization as a front.
6. Stealing records or documents.
7. By means of subversive activities.

Industrial Spy
 Undercover operation
 Patsy
 Intruder
 Visitors
 Customers
 Trash and Scrap

Riot- refers to the unlawful assembly that resulted to violent disturbance of peace.

Causes of riot:
1. Panic
2. Strike
3. Mob- a promiscuous multitude of people, rude and disorderly.
Types of mob:
 Aggressive mob
 Escape mob
 Acquisitive mob
 Expressive mob
4. Crowd - Temporary congregation of people.

Types of crowd
1. Physical crowd - temporary congregation of people without interest
2. Psychological crowd- temporary congregation of people with common interest in a certain thing.
Types:
1. Casual psychological - common interest only for short duration
2. International Psychological- common interest in a long duration
3.
What is Pilferage?
One of the most annoying and common human hazards.

Types of Pilferer

 Casual pilferer-one who steals due to his inability to resist the unexpected opportunity and has lite fear of
detection.

Examples of these are kleptomaniac, children, and imbecile, etc.


 Systematic Pilferer - steals with preconceived plans and takes away or all types of items or supplies for
economic gains. Examples of these are the Professional shoplifters.

Methods used:
1. Classic method
2. Uses fake documents
3. Removal of items
4. Disposal of the same

Limiting factors of pilferage:


a. Value of the item- very expensive
b. Ease of concealment - easy to cover
c. Transportation

KLEPTOMANIAC - The person who is fond of getting the property of other people.
- there is satisfaction on the part of the person committing a crime.

Theft- is committed by any person who with intent to gain but without violence against or intimidation of persons nor
force upon things shall take personal property of another without the latter's consent.

Simple theft- without violation of trust and confidence

Qualified Theft - taking the property of another with violation of trust and
confidence;

Example: maid, houseboy, salesgirl, or employees or any person that the victim has trusted.

Shoplifter- is those people or somebody who gets the things or property


displayed in the store without payment.

Industrial Security Management Definition Of Terms

Access List - an authenticated list of personnel given to security allowing entry to a compound or installation or a part
thereof.

Alarm - a device that signals.

Clear Zone - the exterior and interior parallel area near the perimeter barrier of an industrial compound to afford
better observation and patrol movement.

Controlled Area - an area near or adjacent to limited or exclusive areas where entry is restricted.

Dry Run - practical test or exercise of a plan.

Ducks - in England, an owner to protect his compound used and they are not only effective but cheap to maintain.

Duress Code - a type of code system so that security personnel when forced by armed men intending to enter an
installation can give alarm by the use of certain words in casual conversation with other personnel in the installation.

Exclusion Area - a restricted area containing materials of security interest.

Human Made Hazards in an Industrial Firm


1. Pilferage
2. Sabotage
3. Arson

Key Control - the management of keys in a plant, office or business organization to prevent unauthorized access.

Main Office - all agencies shall maintain a main office in their registered addresses.

PADPAO - Philippine Association of Detective and Protective Agency Operator

PCSUSIA/SAGSD - the government agency that issues licenses for private and goverment secunty guard.

Perimeter Barrier - the first line of physical defense of a building, compound, or comples viewing from the outside.

Peterman - a term used in England for lock pickers, safe crackers and penetrators of restricted/prohibited areas.

Private Detective - any person who does detective work for hire, reward or commission other than members of the
PNP, NBI, AFP, BJMP and other law enforcement agency of the government.

Private Detective - Qualifications - in addition to those prescribed for a security guard.


1. Holder of a Baccalaureate degree or Bachelor of Laws
2. Holder of a degree of Bachelor of Science in Criminology
3. Gaduate of a criminal investigation course offered by the PNP.BI or any police training school or detective
training with authorized/recognized training center.
4. Advance ROTC/CT graduate

Private Security Agency Law - RA 5487

Relative Criticality of Operation - the importance of an establishment with reference to the national economy and
security.

Relative Vulnerability - the susceptability of a plant or establishment to damage, loss, or destruction of operation due
to various hazards.

Restricted Area - if access is limited only to the authorized.

Safe - a metallic container used for the safekeeping of documents or other small items in an office or installation.

SAGSD - Security Agency in Guard Supervisory Division

Security Guard - one who is a holder of a security guard license duly issued by the PNP

Security Guard - Qualifications


1. Filipino Citizen
2. High School Graduate
3. Physically and Mentally Fit
4. At least 18 yrs. Old but not more than 50 yrs. Old
5. Has undergone pre-licensing training course
6. Must not possess any of the disqualification for operator or manager.

Security Service Contract - agreement/contract between the agency and client stipulating among other things the
money to be paid by the client and salary of individual security guard,

Security Survey - also known as security audit, risk assessment, and yulnerability assessment

SCIENTIFIC AIDS TO CRIMINAL INVESTIGATION


The scientific tools a criminal investigator can use are:
a. Fingerprinting (Dactyloscopy) b.Photography
c. Forensic Chemistry
d.Medico-legal
e. Forensic Ballistics
f. Questioned documents examination
g.Polygraphy

You might also like