0% found this document useful (0 votes)
223 views

LEA-3-REVIEWER

The document provides an overview of industrial security concepts, emphasizing the importance of various security measures such as physical barriers, personnel security, and document protection. It outlines the necessity of security for organizations to achieve their goals and discusses the historical development of security practices in the Philippines. Additionally, it details the principles of physical security, types of barriers, and the role of security lighting in enhancing safety.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
223 views

LEA-3-REVIEWER

The document provides an overview of industrial security concepts, emphasizing the importance of various security measures such as physical barriers, personnel security, and document protection. It outlines the necessity of security for organizations to achieve their goals and discusses the historical development of security practices in the Philippines. Additionally, it details the principles of physical security, types of barriers, and the role of security lighting in enhancing safety.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

LEA 3 - INTRODUCTION TO INDUSTRIAL hazards

SECURITY CONCEPTS •physical barriers


•security lighting
SECURITY •use of vaults,
Is defined as the state or quality of being secured, •locks and others
freedom from fear or danger, assurance, or
certainty. To secure is to make safe or be protected. Passive Measures are - Those that will deter man
from committing such act for fear of being caught
Security can also be defined as: charged in court or get dismissed.
1.state or feeling of safety; the sate or feeling of • Security education programs,
being safe and protected. investigation, fire prevention seminars,
2.freedom from worry about possible loss: the personal security checks.
assurance that something of value will not be taken
away; MAJOR DIVISIONS OF INDUSTRIAL SECURITY
3.something giving assurance: something that •Physical Security - this concern with the physical
provides a sense of protection against loss, attack measures adopted to prevent unauthorized access
or harm to equipment, facilities, material and document and
to safeguard them against espionage, sabotage,
4.safety: protection against attack from without or damage, loss and theft. BROADEST TYPE OF
subversion from within SECURITY
5.precautions to maintain safety; precautions taken •Personnel Security- this is as important as
to keep somebody or something safe from crime, physical security. Personnel security starts even
attack or danger; and before the hiring of an employee and remains to be
6.guards: people or an organization entrusted with maintained for as long as the person is employed.
the job of protecting somebody or something, Its purpose is to insure that a firm hires those best
especially a building or institution, against crime. suited to assist the firm in achieving its goals and
objectives and once hired assist in providing
Security came from the Greek word “securos” necessary security to the work force while carrying
which means out their functions.
safe, safety or secured. •Document and Information Security- this involves
the protection of documents and classified papers
NECESSITY OF SECURITY from loss, access by unauthorized persons,
•Security measures are inevitable or necessary for damage, theft and compromise through disclosure.
the attainment of the goals and objectives of a Classified documents need special handling. Lack
certain individual, group or organization. of indoctrination and orientation among the
•It follows that when an individual or organization is personal handling them can result in the leakage,
exposed to hazards, their productivity is adversely loss, theft and unauthorized disclosure of the
affected documents.

FUNDAMENTALS OF INDUSTRIAL SECURITY OTHER TYPES OF SECURITY


MANAGEMENT COMMUNICATION SECURITY
CONCEPTS: □ It is the protection resulting from various
1.INDUSTRY – constant application to work or application of various measures that prevent or
business delay the enemy or unauthorized persons in
2.INDUSTRIAL – pertaining to or engaged in gaining information through the communication
industry system. This includes:
3.SECURITY- state or quality of being secured A.Transmission Security – protect transmission
4.MANAGEMENT – skillful use of means to from interceptions
accomplish a purpose. B.Cryptographic Security – result from the
5.INDUSTRIAL SECURITY – security measures provisions of technically sound crypto-systems and
applied to business industries, or the business of their proper use.
providing security. C.Physical Security – providing of safeguards to
6.INDUSTRIAL SECURITY MANAGEMENT – ISM equipment and materials from access by
could be defined unauthorized person
as the “skillful handling of the security and
safety measures of business enterprises and HOTEL SECURITY BANK SECURITY
industrial establishments” DOCUMENT SECURITY – protection of
documents and classified papers
SECURITY AND SAFETY MEASURES PERSONAL SECURITY – protection of personnel
Active Measures – Designed to detect or impede especially ranking officials (VIP security)
CRISES SECURITY – Part of VIP security involved -RA 5487 was passed on June 13, 1969 through
in hostage or kidnapping of VIPs the continuous lobbying of the incorporators and
INDUSTRIAL SECURITY officers of PADPAO, which set the standards and
OPERATIONAL SECURITY – deals primarily with minimum requirements for the operations of
the protection of processes, formula or patents and security agencies.
other industrial and manufacturing activities from
espionage, infiltration, loss, compromise or -P.D. 11 was passed on October 3, 1972, widening
photocopying the coverage of RA 5487 to include security guards
employed in logging concessions, agricultural,
SCHOOL SECURITY SUPERMARKET SECURITY mining and pasture lands;
ETC.
-P.D. 100 was issued on January 17, 1973,
Origins and Development of Security broadening the coverage of the security industry to
World Setting: include employees of the national or local
•Henry Fielding – a magistrate who proposed a government or any agency who are employed to
permanent, professional and adequately paid watch or secure government building and
security force. properties.
•Allan Pinkerton – a copper from Scotland and
Chicago Police Department’s first detective, -On August 1969, the Philippine Constabulary
established what was to become one of the oldest activated the Security and Investigation
and largest private security operations in the United Supervisory office or SIASO to supervise and
States, The Pinkerton Agency. He is also credited control the organization and operation of private
with hiring the first woman detective. security and detective agencies nationwide;
•Wells and Fargo Company – a freight
transportation company, employed their own -Later it was renamed Philippine Constabulary
detectives and security personnel, known as Supervisory Office for Security and Investigation
shotgun riders. This is owned by Henry Wells and Agencies or PCSUSIA.
William Fargo.
•Brinks, Inc. – pioneered the armored car and -With the passage of RA 6975, this unit was
courier service. This is owned by Washington Perry absorbed by the Philippine National Police;
Brink.
•Edwin Holmes – he offered the first burglar alarm
service in the US in 1858. -Later it was made into a division of the PNP Civil
•William J. Burns – a former Secret Service Security Group and was renamed Security
investigator and head of the Bureau of Agencies and Guard Supervision Division
Investigation (forerunner of FBI), started the Burns (SAGSD);
Detective Agency in 1909 which became the sole
investigating agency for the American Bankers’
Association. -It was renamed to PNP Supervisory Office for
•Baker Industries – initiated a fire control and Security Investigation Agency (SOSIA).
detection equipment business.
American Society for Industrial Security LEGAL BASIS OF INDUSTRIAL SECURITY IN
International – it is the first security professional THE PHILIPPINES
organization. It was formed in 1955 and this also 1.NATURAL AUTHORITY
signifies the modern age of security. The highest law is the law of self-preservation. By
instinct man, man naturally reacts in order to
Brief History of Security in the Philippines protect himself, his family, his honor, freedom,
-The private security business began on March 11, liberty and property from danger, threat, or hazard.
1933, when the first formally licensed private
security agency “Special Watchman Agency” 2.CONSTITUTIONAL AUTHORITY
started operations; The prime duty of the Government is to serve and
protect the people. (Art. II, Sec. 4 of the 1987 Phil.
-Later it renamed “Jimenez Security Agency”, Constitution)
founded by brothers Juan and Pedro Jimenez;
3.STATUTORY AUTHORITY
-On May 30 1958, the Philippine Association of The Revised Penal Code (Act No 3815) Private
Detectives and Protective Agency Operations Security Agency Law (RA 5487)
(PADPAO) was formally organized;
PHYSICAL SECURITY
TOPICS:
PHYSICAL SECURITY PERIMETER BARRIERS 2.HUMAN BARRIERS – guards who stand
SECURITY LIGHTINGS OR PROTECTIVE between intruder and the matter to be protected.
LIGHTINGS PROTECTIVE ALARMS 3.ANIMAL BARRIERS – shepherd dogs (Geese –
FIRE ALARM SYSTEMS PROTECTIVE LOCKS cheapest)
KEY CONTROL PROTECTIVE CABINETS 4.NATURAL BARRIERS – mountains, cliffs, rivers,
seas etc.
PHYSICAL SECURITY 5.ENERGY BARRIERS – electrical
•a system of barriers placed between the potential and electronic devices (protected
intruder and the objects/matter to be protected. lighting, alarms, etc)
•It is the broadest branch of security, which is
concerned with physical measures adopted to PERIMETER BARRIERS
prevent unauthorized access to equipment, It is a medium or structure which defines the
facilities, materials and documents and to physical limits of an installations or area to restrict
safeguard them against espionage, sabotage, or impede access
damage and theft.
LINE OF PHYSICAL DEFENSE/ Depth of Defense
PRINCIPLES OF PHYSICAL SECURITY 1.FIRST LINE – includes all perimeter barriers,
In every establishment, physical measures are located in the outermost area of an installation like
needed to deny unauthorized access or intrusion fence.
because of the following: 2.SECOND LINE – includes the building exterior
1.ENEMY AGENTS MUST/WILL ALWAYS SEEK (doors, floors, windows, walls and grills.)
ACCESS 3.THIRD LINE – includes those internal control
2.THERE IS NO IMPENETRABLE BARRIER – measures (storage system like safe, vaults and file
they are willing to devote enough time, money, room)
personnel, materials and imagination in passing
barriers. PERIMETER BARRIER OPENINGS
3.DEFENSE IN DEPTH MEANS BARRIER AFTER 1.Gates and doors should also be guarded or
BARRIER – there locked as much as possible
should be integration of all barriers adopted in the 2.Windows and similar openings should be
installation. guarded or grills should be installed (openings less
4.SURREPTITIOUS VERSUS NON- than 18 ft. above the ground or less than 14 ft
SURREPTITIOUS ENTRY diagonally opposite uncontrolled windows, or
SURREPTITIOUS (not observable) – the greatest openings of 96 sq inches or larger SHOULD BE
hazard, because it is usually difficult to determine GRILLED OR HAVE STEER BAR PROTECTIONS)
NON-SURREPTITIOUS (observable)
5.EACH INSTALLATION IS DIFFERENT – each 3.Sidewalk elevators are elevated parts of the land
installation will have different problems to near the perimeter barrier that provides access to
overcome. The security procedures will not be areas within the perimeter barriers and should be
adequate for all installation. locked and guarded

BARRIERS 4.Utilities openings such as sewers, air intakes,


Can be defined as any structure or physical device which have cross-sectioned area of 96 sq. inches
capable of restricting, deterring, delaying, illegal or more should be protected by bars, grills etc.
access to an installation

GENERAL TYPES OF PHYSICAL BARRIER:


1.NATURAL BARRIER – include mountains, rivers,
seas, desserts or terrain difficult to traverse. To be 5.Clear Zone is an unobstructed area maintained
fully effective, these barriers must be under on both sides of perimeter barrier.
surveillance of guards.
2.STRUCTURAL OR MAN-MADE BARRIER – Specification of Clear zone:
structural A.a clear zone of 20 ft. or more should exist
constructions made by man like fences, walls, between the perimeter barriers and exterior
floors, roofs, grill or other physical means to deter structures
or impede penetration. B.A clear zone of 50 ft. or more should exist
between the perimeter barrier and structures within
SPECIFIC TYPES OF PHYSICAL SECURITY the protected areas, except when a building wall
BARRIERS (SHANE) constitutes part of the perimeter barrier.
1.STRUCTURAL BARRIERS – constructed by man
(walls, ceilings, doors) TYPES OF PERIMETER BARRIERS
1.FENCES •The distance between strands should not exceed
-SOLID FENCE 6 inches and at least one wire will be interlaced
-FULL VIEW WIRE FENCE vertical and midway between posts.
Chain Link Fence Barbed Wire Fence
Concertina/ DannertWire Fence
2.BUILDING WALLS – walls, floor, roofs
3.BODIES OF WATER – river, lake, sea, pond or
any bodies of water

FENCE
Are independent structures designed to control
physical and visual access between outside areas. 3.Concertina/Danert Wire Fence

TYPES OF FENCES a.Standard concertina barbed wire is commercially


1.SOLID FENCE – Constructed in such away that manufactured wire coil of high strength steel
visual access through the fence is denied. Its barbed wire clipped together at intervals to form
advantage is that it denies the opportunity for the cylinder.
intruder to become familiar with the personnel, b.Opened concertina wire is 50 ft. long and 3 ft. in
activities and the scheduled movements of the diameter.
security personnel. On the other hand, it prevents c.They are formed like accordions
the guards from observing the area around the
installation and it creates shadow that may be used ADDITIONAL PROTECTIVE MEASURE
by the intruder for cover and concealment. 1.Top guard
2.FULL VIEW – It is constructed in such a way that 2.Guard Control Stations
visuals access is permitted through the fence. Its 3.Tower or Guard Towers
advantage is that it allows the security personnel to 4.Signs and Notices or Control Signs
keep the surrounding of the installation under 5.Protection in Depth
observation. On the other hand, it allows the
intruder to become familiar with the movements the Top guard
security personnel. Is an additional overhang of barbed wire fence
WIRE FENCE – is a type of fence made of chain- placed on vertical perimeter fences facing upward
link, barbed wire concertina and outward with a 45 degree angle with 3 to 4
strands of barbed wires spaced 6 inches apart.
Types of Wire Fence
Chain Link Fence Guard Control Stations
Normally provided at main perimeter entrance to
•It must be constructed at least 7 feet tall excluding secure areas located out of doors and manned by
top guard. guards on full time basis .
•It must be of 9 gauge or heavier.
•The mesh openings are not be larger than 2 Towers or Guard Towers
inches per side. Are house-like structures above the perimeter
•It should be twisted and barbed salvage at top and barriers. It gives psychological effect to violators
bottom.
•It must be securely fastened to rigid metal or Signs and Notices or Control Signs
reinforced concrete. Control signs should be erected where necessary
•It must reach within 2 inches of hard ground or in the management of unauthorized ingress to
paving. preclude accidental entry.
•On soft ground, it must reach below surface
deep enough to contemplate for shifting soil and PROTECTION IN DEPTH
sand. In large open areas or ground, where fencing or
walling is impracticable and expensive, warning
Barbed Wire Fence signs should be conspicuously placed.
The depth itself is protection.
•Standard barbed wire should be twisted, double
strand, 12 gauge wire with 4 point barbs, spaced PERIMETER GUARDS
on equal distant apart. Are also employed in augmenting the existing
•Barbed wire fencing should not be less than 7 feet perimeter security or perimeter barriers of a certain
high excluding top guard. establishment
•Barbed wire fencing must be firmly affixed to post
not more than 6 feet apart.
means, when there is suspicion of entry.

The 2 types of employing perimeter guards are: 3.Movable/ Portable Lighting


1.FIXED POST – assigned in a particular place □ This consist of stationary or portable,
2.PATROL (ROVING) – required to walk and go manually operated searchlights which may be
around regularly around the premises. lighted continuously during the hours of darkness
or only as needed.
SECURITY LIGHTINGS OR PROTECTIVE
LIGHTINGS 4.Emergency Lighting
It provides a means of continuing illumination □ Used in times of power failure or other
during hours of darkness, a degree of protection emergencies when other systems are inoperative.
that is maintained during daylight hours.
Types of Lighting Equipment
PURPOSES OF SECURITY LIGHTING Floodlights
1.It improves visibility so that intruders can be seen, □Used for outdoor security lightning including the
identified and apprehend; illumination of boundaries, fences, and buildings.
2.It gives psychological fear, which serves as a Searchlights
deterrent to thieves, pilferers, trespassers, and □Used to pinpoint potential trouble spots. Fresnel
sabotage; lights
3.It makes easier. The routine of work of guards in □Used to extend the illumination in long, horizontal
identifying employees, vehicles during night time; strips to protect the approaches to the perimeter
4.If placed in certain areas, may even reduce the barrier.
number of stationary guards, and instead, may □Approx 180 degrees(Horizontal) and 15 to 30
require only roving patrols at night. degrees (Vertical)
Street lights
PROTECTIVE LIGHTINGS SIGNIFICANCE TO □Is a raised source of light on the edge of a road or
SECURITY FORCES path.
1.Reduction of the need for security forces □Produce diffused light rather than directional
2.Personal protection for forces by reducing the beam.
advantage or concealment and surprise for a □They are widely used in parking areas
determined intruder.
3.Relieved security forces could be used to better TYPES OF LIGHT LAMPS
advantage elsewhere. 1.INCANDESCENT LAMP – most common light
bulb, instant , illumination to using wire filament,
have low initial cost
2.FLUORECENT LAMP – Tube lamps, it cannot
project light over long distances, desirable as flood
Types of Protective Lighting type lights
3.GASEOUS DISCHARGE LAMP – require period
1.Stationary or Continuous Lighting of 2 to 5 minutes to light
2.Standby Lighting Mercury Vapor – Blue Green or
3.Movable or Portable Lighting Purplish-white color, considered more
4.Emergency Lighting efficient and is widespread in exterior lighting
Sodium Vapor – Yellow/amber color, used in areas
1.Stationary or Continuous Lighting where insect predominate
It consist of a series of fixed luminaries at range to
flood a given area continuously during hours of 4.QUARTS LAMP (LED LIGHTS) – produce very
darkness. bright color, almost rapid as incandescent lamp,
It is the most familiar type of security lighting. emits very bright white light
A.Glare Projection
□ Intensity is focused to the intruder while the PROTECTIVE ALARMS
observer remains in comparative darkness. ALARM – is synonymous to warning of imminent
danger.
B.Controlled lighting Is an aural or visual signal given by the annunciator
□ Lighting is focused on the pile of items to the security when intruder actuate certain
rather than the background. devices in a protected area.

2.Standby Lighting Basically, alarm system are designed to alert


□ Similar to continuous lighting but is turn on security personnel of a attempted or consummated
manually or by special device or other automatic intrusion into an area, building or compound. Each
type of alarm is activated in the event that an This system is set to dial a predetermined numbers
intruder tampers with the circuitry, a beam or when the alarm is activated.
radiated waves. Alarm are also for fire, smoke, or When the phone is answered, a recording states
other emergencies and presence of hazards. that an intrusion is in progress.
It could fail if line were busy or if the phone
THREE PARTS OF AN ALARM SYSTEM connection were cut.
Generally all alarming devices have these three
basic parts: Types of Bank Protective Alarms
1. SENSOR OR TRIGGER DEVICE Foot Rail Activator- Are placed on the floor in such
Device that can sense an abnormal condition within a position that tellers may activate the alarm by
the system and provide a signal indicating the placing the front of their foot to engage the
presence or nature of the abnormality activation bar.
Bill traps or currency activation devices placed in
2. CIRCUITS/TRANSMISSION LINE the teller’s top cash drawer and connected to the
Carries messages to the signaling apparatus alarm system using a connector. When currency is
It is the communication channel that conveys the removed from the devices, alarm system is
information from all sensors in the system to the activated.
signal by means of wire, radio waves. Knee or Thigh Buttons
These are installed inside the desk or teller station
3. ENUNCIATOR/ANNUNCIATOR/SIGNALING so they can be activated by knee or thigh pressure.
SYSTEM Usually found in location where personnel perform
The actual alarm may be audible or silent, a bell, their duties in seated position.
buzzer, phone ringing, or flashing of light. Foot Button - It permits alarm activation safety
while both hands remain in clear view of the
TYPES OF ALARM DETECTION SYSTEM robbers.
Double Squeeze Button - Requires pressure on
Central Alarm System both sides of the device, therefore the probability of
A type of protective alarm system where the central false alarms is reduced.
station is located outside the installation. When the
alarm is sounded, central station notifies the police FIRE ALARMS SYSTEMS
and other agency. FIRE ALARMS
Any visual or audible signal produced by a device
Proprietary System or system to warn the occupants of the building or
This functions they same way as the central station fire fighting elements of the presence or danger of
system except it is owned, operated by the facility. fire to enable them to undertake immediate action
Response to all alarms is by the facilities own to save life and property and to suppress the fire.
security or fire personnel.
DEVICES
Local Alarm System
Consist of ringing up a visual or audible alarm near 1.Smoke Detector - a device placed at the ceilings
the object to be protected. of the floor that detects smoke, typically as an
In case of alarm, response be made by local indicator of fire.
guards and other personnel within sight or hearing. 2.Fire Bell -a hollow device made of metal that
makes a ringing sound.
Auxiliary System
In this system, installation circuits are led into local PRIVATE FIRE PROTECTION SYSTEM
police or fire department by leased telephone lines. AUTOMATIC SPRINKLER – a type of built in
High incidence of false alarms have made this sprinklers which works by the increase of room
system unpopular with public fire and police temperature and which automatically operates the
personnel system to put out the fire. Attached and distributed
in the ceiling of the rooms. These sprinklers will go
Local Alarm by Chance System into action once a fire starts, and those that will
This is a local alarm system in which a bell or siren open are those that are directly above the fire and
is sounded with no predictable response. water is delivered where it is needed.
The hope is that a neighbor or passing patrol car TYPES OF SPRINKLER SYSTEM
will reach the alarm and call for police assistance, WET PIPE SYSTEM – the piping has water with
but such a call is purely a matter of chance. pressure
DRY PIPE SYSTEM – the pipes are filled with air
under pressure which holds the water at a value
Dial Alarm System located in a room
□Skeleton Key
STAND PIPES
G.I. steel or plastic pipes located inside the building 2.Disc Tumbler Locks
from the lowest to the top floor with water under □ It is designed for the use of the automobile
pressure for use in case of fire. Located near the industry and are general use in car doors today.
standpipe is a fire hose usually enclosed in a glass □The delay afforded is approximately 5 to 10
box. minutes.

FIRE HYDRANT
It is a mechanical device strategically located in an 3.Lever Locks
installation or in a street where a fire hose will be □ This lock are used in safe deposit boxes
connected so that the water will be available to and for all practical purposes,
extinguished a fire. pick-proof.

FIRE EXTINGUISHER
Is a fire fighting equipment which can is a fire 4.Code-operated Locks
fighting equipment which can be portable or in cart □ These are the combination type of locks in
that is used to put out fire depending on the that no key are used.
contents to extinguish certain types of fire. □They are opened by pressing a series of
numbered buttons in the proper sequence. Some
PROTECTIVE LOCKS of them are equipped to alarm if the wrong
Generally speaking, LOCKS are sequence was pressed
the CHEAPEST security investment
that can be made. 5.Electromagnetic Locks
Locking device is simply a mechanism that extends □ These are devices holding a door closed by
the door or window into a wall that hold them. magnetism. These are electrical units consisting of
It must be recognized that any lock will eventually the electromagnetic on metal holding plate. When
yield to attack. They must be thought of only as the power is on and the door secured, they will
delaying devices. resist a pressure of up to 1,000 pounds.

LOCK 6.Card-operated Locks


□Coded- cards, either notched, embossed, or
DEFINITION OF TERMS containing an embedded pattern of copper locks,
are used to operate such locks.
defined as mechanical, electrical, hydraulic or These are frequently fitted with a recording device
electronic device designed to prevent entry to a which register time of use and identity of the user.
building or room.
KEY KEY CONTROL
instrument for locking and unlocking; a metal bar Is the management of keys in a plant or business
with notches or grooves that when inserted into a organization to prevent unauthorized individuals
lock and turned, operates the lock’s mechanism access to the keys.
PADLOCK The following can be utilized to maintain effectively
A portable and detachable lock having a pivoted or key control.
sliding hasp which possess through a staple ring, A.key cabinet
or the like and is made fast or secured. B.key records
PETERMAN C.Inventories
A term used in England for lock picker, D.Audits
safecrackers, and penetrators of restricted areas or E.Daily reports
rooms
FALSE KEY Types of Keys
Genuine key stolen from the owner
1.Change Key – A key to a single lock.
❑Types of Locks 2.Sub-master Key – Akey that will open all locks
within a particular area or grouping.
1.Warded Locks 3.Master Key – A special key capable of opening a
□It offers very little security. series of lock.
□This type of lock must therefore be used only to 4.Grand Master Key – A key that will open
have privacy, but not to provide a degree of everything in a system.
security.
□It is the simplest form of lock. MASTER KEYING SYSTEM
It is system used in big installations whereby keys than a vault but of bigger size to accommodate
can open a group or group of locks. limited people to work on the records inside.
□File room should at most be 12 feet high.
Note: □Must have a watertight doors and at least one (1)
MASON KEYING – is the use of a key to open the hour fire proof.
main entrance and the office.
PERSONNEL SECURITY
PROTECTIVE CABINETS PERSONNEL SECURITY SECURITY
This is done by placing documents in a secured EDUCATION
and usually fire proof containers.
PERSONNEL SECURITY
Types of Security Cabinets includes all the security measures designed to
1.Safe prevent unsuitable individuals or persons of
□ A metallic container used for safekeeping of doubtful loyalty to the government, from gaining
documents or small items in an office or installation. access to classified matter or to any security facility,
□Its weight must be at least 750 lbs. and to prevent appointment, or retention as
□Walls should be at least 1 inch thick. employees of such individuals
□Doors should be made of steel and
at least 1 ½ thick. It is the “weakest link” in the security chain. This
weakness can best be minimized or eliminated by
Safe Cracking Methods making the personnel security conscious through
1.Drilling or punching – accomplished by knocking good training program.
off combination dial and drilling hole to expose
locking device. OBJECTIVES OF PERSONNEL SECURITY
2.Burning – process of using oxyacetylene torches 1.To provide the standards and procedures
or burning bars. necessary to insure the appointment, employment
3.Peeling – process of attacking the seams of or retention of suitable and loyal individual
metal plates with pry bars to peel back layers of 2.To develop the necessary and proper security
metal and thus exposing either lock mechanism or discipline among the applicants and employee as
interior. well as to protect and preserve the security interest
4.X-ray – it is utilized to reveal position of the of the organization.
combination 3.Inculcate the desirable security attitudes and
and mechanism necessary to open safe. habits among the applicants and employees.

5.Use of Explosives – a nitro- CONTROL OF PERSONNEL IN THE PHYSICAL


glycerine and plastic explosives. FACILITY
6.Use of Power tools – examples are use of rotary A control point must be established for positive
devices, hydraulic tools and power drills. personnel identification and check system. This is
7.Manipulation – a very few safe crackers have skill to insure that only those person who have the right
to use this technique. and authority will be given the necessary access to
the area.
2.Vault The most practical and generally accepted system
□It is a heavily-construct ed fire and burglar of personnel identification is the use of
resistant container, usually a part of the building IDENTIFICATION CARDS, BADGES OR PASSES.
structure, used to keep and protect cash,
documents, and negotiable instrument. 2 TYPES OF PERSONNEL IDENTIFICATION
A.PERSONAL RECOGNITION –
□Door should be made of steel at least 6 inches in familiarity if the person’s
thickness. characteristics
□ Walls, ceiling and floor should made out of B.ARTIFICIAL RECOGNITION – identification
reinforced concrete at least 12 inches in thickness. cards, passes, passwords, etc.
Vault floor should be higher by 4 inches which the
surrounding floors. USE OF PASS SYSTEM
□ Electrical conduits into the vaults should A.SINGLE PASS SYSTEM – the badge or pass
exceed 1 ½ in diameter. coded for authorization to enter specific areas is
□Vaults should not be more than 5,000 cubic feet. issued to an employee who keeps it in his
□Fire- resistive up to 6 hours. possession until his authorization terminates.

3.File Room B.PASS EXCHANGE SYSTEM – an exchange


□It is a cubicle in a building constructed little lighter takes place at the entrance of each controlled area.
Upon leaving the personnel surrenders his badge 4.CRIMINAL INVESTIGATION DETECTION
or passes and retrieve back his basic identification. GROUP (CIDG)

C.MULTIPLE PASS SYSTEM – this provides an B. LOCAL AGENCY CHECK (LAC)


extra measure of security by requiring that an This type of investigation consist of the first type
exchange take place at the entrance of each plus written inquiries sent to appropriate local
restricted area. government agencies, former employees,
references, schools.
RESTRICTED AREA Reference are the following:
Is any area in which personnel or vehicles are 1. Mayor, police, fiscal, judge of the locality
controlled for reasons of security.
Is established to provide security for installation or BACKGROUND INVESTIGATION
facilities and to promote efficiency of security It is an inquiry which aims to verify applicant’s
operations and economy in the use of security information written at the applicants form, to
personnel. ascertain his/her past employment experiences
and to obtain other information pertinent to the
TYPES OF RESTRICTED AREAS decision to employ.
EXCLUSION AREA – is a restricted area which This is more comprehensive investigation than the
contains a security interest to Top Secret NAC and LAC.
importance.
The area should be under surveillance at all times. TYPES
A.COMPLETE BI – all circumstances of personal
LIMITED AREA CONTROL – is restricted area in life
which a lesser degree of control is required than in B.PARTIAL BI – limited only to some of the
an exclusion area circumstances of persons life

CONTROLLED AREA – an area near or adjacent FACTORS TO BE CONSIDERED IN THE


to limited or exclusive areas where entry is CONDUCT OF BI
restricted; 1.Loyalty – faithful allegiance to the Philippine
government and its duly constitutional authorities;
2.Integrity – uprightness in character, soundness of
Access List – authenticated list of personnel given moral principle, freedom from moral delinquencies.
to the security allowing entry to a compound or 3.Discretion – the ability or tendency to act or to
installation or part thereof; decide with prudence, the habit of wise judgment;
4.Morals – distinctive identifying qualities which
Duress Code – type of code system so that serve as an index to the essential or intrinsic nature
security personnel or any employee when forced of a person;
by armed men intending to enter an installation can 5.Character – the sum of traits that have been
give alarm by the use of certain words in casual impresses by nature, education and habit upon the
conversation with personnel in the installation. individual;
6.Reputation – opinion or estimation in which one
PERSONNEL SECURITY INVESTIGATION is generally held. It is what a person is reported to
It is an inquiry into the character, reputation, be whereas character is what a person is.
discretion, and loyalty of an individual in order to
determine a person’s suitability to be given security SECURITY EDUCATION
clearance. It is defined as the exposure and teaching of
employees on security and its relevance to their
TYPES OF PSI work. Security education is conducted to develop
A. NATIONAL AGENCY CHECK (NAC) – this is an security awareness among employees of the
investigation of individual made upon the basis of company. It should cover all employees, regardless
written information supplied by him in response to of rank or position.
official inquiry, and by reference to appropriate
NATIONAL AGENCIES. The following national SECURITY EDUCATION PROGRAM
agencies checked under this type of investigation A program given to employees of an installation by
are the following: lecture and other means pertaining to measure and
1.NATIONAL INTELLIGENCE COORDINATING safeguard to be taken to protect the interest of the
AGENCY (NICA) installation for, damage, sabotage, pilferage and
2.NATIONAL BUREAU IF INVESTIGATION (NBI) other criminal acts.
3.INTELLIGENCE SERVICE OF THE ARMED
FORCES OF THE PHILIPPINES (ISAFP) SEVEN PHASES OF SECURITY EDUCATION
PROGRAM 3.Classification should be made as soon as
1.Initial Interview – the individual’s first contact possible by placing the appropriate marks on the
should be formal and professional. matter to be classified;
It must leave an impression on 4.Each individual whose duty allows access to
the individual of the classified matter is responsible for the protection of
seriousness of security. the classified matter while it is in his/her
It should stress the importance of security of the possession and shall insure that dissemination of
company and individual. such classified matter is on the “need to know”
To explain the penalties that could result from basis and to “property cleared personnel only”
violations.
TYPES OF BUSINESS RECORDS
2.Training Conference Class I – Vital Document – This is an irreplaceable
records , reproduction of which does not have the
It should be held during the initial processing or same value as the original;
training period of an individual. Class II – Important Document- This is a record,
It should be reiterated that security is part of the job reproduction of which cause considerable expense
not an additional burden imposed upon the job. and labor, or considerable delay.
The conference will last from 2 to 4 hours. Class III – Useful Document – This is a record, the
loss of which may cause inconvenience but could
3.Refresher Conference Purpose: be readily replaced and may not present
It reminds individuals of their responsibilities. insurmountable obstacle to the prompt restoration
It can be used as forum to resolve problems that of the business;
have arisen since the last conference. Class IV- Non essential Document – This record
To explain new regulations, changes in regulations may include daily files, routine in nature, lost of
and new requirement that may have been levied by which will not affect the organization.
the company.
Ask for recommendations and comments about SECURITY CLEARANCE
existing policies. Is the certification by a responsible authority that
the person described is cleared for access to
4.Security Reminders – this in an indirect approach classified matter the appropriate level.
or passable approach. The most common Refers to the administrative determination that an
approach is the use of posters. individual is eligible for access to classified matter.

5.Security Promotion – the act of emphasizing the


importance and role of security in achieving CERTIFICATE OF DESTRUCTION
company’s objectives. This is the certification by a witnessing officer that
the classified matters describe therein has been
6.Special Interview – this is intended to augment disposed of in his presence in an approved
refresher conference. destruction methods.

7.Debriefing – a procedure wherein the employee, OTHER TERMINOLOGIES


who has been given access to sensitive information, 1. ​ CLASSIFIED – refers to assign information by
to reminded of his continuing accountability and one of the 4 classifications categories.
responsibility to safeguard information entrusted to
him in connection with his job. CLASSIFICATION OF DOCUMENTS-
Memorandum Circular No. 196, dated 07/19/1968
DOCUMENT AND INFORMATION SECURITY (Security of Classified Matter in government
Is the sum total of all policies, regulations, offices.)
doctrines, practices, enforces to safeguard the
contents and integrity of any classified information TOP SECRET – any information and material, the
of document from compromise or loss. unauthorized disclosure of which would cause
exceptionally grave damage to the nation,
GENERAL PRINCIPLES politically, economically or militarily;
1.The authority and responsibility for the SECRET- any information and
preparation and classification of classified matter material, the unauthorized
rest exclusively with the originating office; disclosure of which would endanger national
2.Classified matter should be classified according security, cause serious injury to the interest or
to content and not the classification of the file in prestige of the nation or any governmental activity.
which they are held or of another document to
which they refer;
espionage, infiltration, loss, compromise or
CONFIDENTIAL – any information photocopying;
and materials, the unauthorized
disclosure of which would be prejudicial to the INFORMATION CYCLE
interest or prestige of the nation or governmental 1.The Creation – Information is discovered and
activity or would cause administrative develop;
embarrassment or unwarranted injury. 2.Used – Some action is take with the information;
3.Storage and Retrieval – Stored for future use;
RESTRICTED – any information and material 4.Transfer – transferring of information from active
which requires special protection other than those to inactive use;
determined to be Confidential, Secret, and Top 5.Disposition – decision may be made to retain the
Secret matters. information indefinitely.

2.COMPROMISE – means lose of security, which KINDS OF SENSITIVE INFORMATION


results from an authorized persons obtaining PROPRIETARY INFORMATION
knowledge of classified matter. Information which some special way is related to
3.COMPARTMENTATION – is the grant of access the status, operations or activities of the possessor
to classified matter only to PROPERLY CLEARED over which the possessor asserts ownership.
PERSONS TRADE SECRETS
4.DECLASSIFY – is the removal of security It may consist of any formula, pattern, device or
classification from classified matter compilation of information which is used in one’s
5.RECLASSIFY/RE-GRADING – is the act of business and which gives one opportunity to gain
changing the assigned classification of matter an advantage over competitors who do not know or
6.UPGRADING – is the act of assigning to a matter use it.
of higher classification to a classified PATENT
7.DISSEMINATION – dissemination of classified A grant given by the government to an inventor,
matter shall be restricted to properly cleared conveying and securing to him the exclusive rights
persons whose official duties required the to make, use and sell his invention for term of
knowledge thereof. twenty (20) years.
8.PURGING – is the process of destroying a
document which is no longer significant in the THREAT TO PROTECTION OF SENSITIVE
organization INFORMATION
Competitive Intelligence – systematic program for
RECORDS AND DOCUMENT PROTECTION gathering and analyzing information about
CATEGORIES OF STORAGE CONTAINERS competitor’s activities and general business trends
CLASS 1 – commercial record safes designed for to further company’s goals.
fire protection
CLASS 2 – commercial money safes designed
for robbery and burglary protection Types of Competitive Intelligence
CLASS 3 – security cabinets designed to meet 1.White – information available from company
specification for safeguarding classified materials. publication, public records or commercial reporting
sources;
TEST FOR SAFE’S FIRE RESISTANCE 2.Gray – not readily available but which is usually
FIRE ENDURANCE TEST – is done at a can be obtained without acquiring any civil/criminal
temperature above 350 degrees Fahrenheit liability in the process.
EXPLOSION HAZARD TEST – Is done to 3.Black – obtained through clearly unethical or
determine if the sudden rise in temperature will not illegal means.
cause the safe to repute. If the safe can withstand
2000 degrees Fahrenheit for 30 mins. and will not THREATS IN COMMUNICATION SECURITY
crack or open, then it has passed the explosion test. 1.Wiretapping - is the monitoring of telephone
FIRE AND IMPACT TEST – is aimed at conversations by a third party, often by covert
determining the strength of a safe to withstand the means.
collapse of building during a fire 2.Bugging – means to secretly listen to or record a
conversation using a hidden electronic device.
PROTECTION OF SENSITIVE MATERIALS AND 3.Eavesdropping (unauthorized listening)- is the
INFORMATION unauthorized real-time interception of a private
OPERATIONAL SECURITY communication, such as a phone call, instant
Part of physical security that deals primarily with message, videoconference or fax transmission.
the protection of processes, formulas, patents, and
other industrial and manufacturing activities from RISK MANAGEMENT ALTERNATIVES AND
STRATEGIES RISK MANAGEMENT AND ALTERNATOVES
TERMINOLOGIES: AND STRATEGIES
HAZARDS – exposure to the chance of loss or
injury To lessen or eliminate the effect if risk or
hazards, the following are the alternatives and
SECURITY HAZARDS – any act or condition which strategies commonly applied:
may result in the compromise of information, loss 1.RISK AVOIDANCE – eliminating or removing the
of live, loos or destruction of property or disruption risk Example: proper disposal of inflammable
of the objective of the installation. substances
2.RISK REDUCTION – decreasing the risk by
RISK – It is the potential damage or loss of an minimizing the probability of the potential loss.
asset. Example: construction of fences and similar
physical barriers
RISK MANAGEMENT – it is a process of selecting
and implementing security countermeasures to 3.RISK SPREADING – spreading of
achieve an acceptable level of risk at an the risk through compartmentation or
acceptable cost. decentralization to limit the impact of the potential
loss.
RISK ANALYIS – it is the analysis of risk, which Example: Using numerous vaults or safes for
includes examinations of the vulnerability, safekeeping of documents and paper bills
probability and criticality of potential threats and 4.RISK TRANSFER – moving of financial impact of
include natural and man made risk the potential loss over to an insurance company.
Example: Availing property and life insurances
ADVERSARY – an individual, group, organization Hiring security agencies
or government that conducts activities or has the 5.RISK SELF-ASSUMPTION – this is a planned
intention and capability to conduct activities assumption and acceptance of the potential risk by
DETRIMENTAL to the individual, private or making deliberate managerial decision of doing
government entity. nothing about the threat

ASSET – any information, facility, materials, SECURITY HAZARDS


information or activity which has a positive value to Normally, loss of life and damage to properties are
its owner. caused by human negligence in their failure to
recognize the adverse effect of a particular
COUNTERMEASURES – an action taken or a condition or event.
physical security used to reduce or eliminate on or Security interferes by REMOVING OR
more vulnerabilities. DETERRING the identified hazards.

PROBABILITY – it is the chance or likelihood that a TYPES OF HAZARDS


loss will take place 1.NATURAL HAZARDS – arise from natural
phenomena
CRITICALITY – It is the impact of a loss as 2.HUMAN-MAN MADE HAZARDS – result of a
measured in financial terms. state of mind, attitude, weaknesses or character
traits of one or more persons.
RELATIVITY OF RISK AND SECURITY It includes but not limited to the following:
The extent and degree of risk to security is
dependent on the following: A.SABOTAGE– deliberate destruction
1.RELATIVE CRITICALITY OF OPERATION – or the deliberate damaging or
pertains to destroying of property
importance of the firm with reference to the natural Saboteur
economy and security. One who destroy company properties or perform
EXAMPLES: gasoline depots, communication other explicit activities which would result to
transmission lines and power plants disturbance, to cause financial drain,
postponement of operation, threaten, or to attach
2.RELATIVE VULNERABILITY – This is the negative impression.
susceptibility of the plant or establishment to The most dangerous foe that security will have to
damage, loss or disruption of the operation due to deal with
various hazards.
EXAMPLE: location of the building, the machine or B. ESPIONAGE – it is describe as the activity if
presence of possible poisons. SPYING or the use of spying or spies to GATHER
INFORMATION.
Espionage agent or spy -specialist is prepared to visit the office
One who has allegiance to another company, -contract is made between security officer of the
oftentimes rival, whose primordial mission is to office
obtain information useful in company’s operation. -It would be ideal to have at his conference not only
the office head but his entire staff and other key
C. PILFERAGE – stealing small things or items of personnel of the office.
little value, especially habitually.
It is one of the most common and annoying 3.ESCORT PERSONNEL
hazards which security has to deal with. -an escort should accompany the specialist during
the survey
Types of Pilferer -preferably, this escort should be the security
Casual Pilferer officer of the office or his representative.
One who steals due to his
inability to resist the 4.PRELIMINARY EXTERIOR AND INTERIOR
unexpected opportunity and has little fear of CHECK
detection. -the specialist conducts tour of the area
surrounding the office
Systematic Pilferer -after preliminary survey, the specialist is ready to
One who steals with preconceived plans and takes commence the analysis of the office’s security
away any or all types of items or supplies for program
economic gain.
5.ANALYSIS EXISTING SECURITY
SECURITY SURVEY, SECURITY INSPECTION -Specialist will now ascertain the existing level of
AND SECURITY INVESTIGATION security of the installation.
-Includes collection of all factual data that affects
SECURITY SURVEY the security of the office.
This is also known as security audit which is -the specialist makes his own conclusions which
actually a fact-finding probe to determine a plant’s are reflected in his recommendations
adequacy and deficiency in all aspects of security,
with the corresponding recommendations. 6.FINAL BRIEFING (EXIT CONFERENCE)
Refers to checklist, audits, or inventories of security -is an oral to the chief wherein the specialist
conditions. determines whether or not his tentative
recommendations can be realistically implemented.
Security Surveys are often called ‘RISK ANALYSIS -the specialist discusses the recommendations with
SURVEYS’ or ‘RISK ASESSMENT SURVEYS the command.

WHO PERFORMS SECURITY AUDTI AND SECURITY INSPECTION


SURVEY? Is a service performed to determine compliance
This should be conducted by qualified security with the established security polices and
experts who can be from the organization or procedures and is conducted on a recurring
outsiders contracted to do the job. schedule or a follow-up to a security survey.
Generally, recommendations from security survey This is a check of how well the existing security
will fall into three categories: measures and regulations are being carried out
1.HUMAN GUARD within a detachment or establishment
2.EQUIPMENT May also include an investigation of alleged or
3.PROCEDURES suspected security violations.

ROLE OF SECURITY OFFICERS TYPES OF SECURITY INSPECTION


It is the security offices who is directly responsible
to the head of office for proper maintenance of 1.Continuous Inspection
security of the security program of the office. 2.Formal Inspection
3.Informal Inspection
SECURITY SURVEY PROCEDURES 4.Structured Inspection
1.PRELIMINARY PLANNING 5.Unstructured Inspection
-conduct preliminary courses of action that
PRECEDE the actual conduct of the survey 1.Continuous Inspection
-Use of checklist (list of considerations that must be To keep pace with the constant changes in the
covered during the survey) organization, changes in our security terms of
attitudes, life-style and moral values, and the rapid
2.INITIAL BRIEFING (ENTRANCE CONFERENCE) advancement of technological modifications are all
around us, the inspection must be an on-going and which is established and maintained for the
never ending activity. purpose of securing the office or compound and/or
extension of such government entity
2.Formal Inspection
□Preceded by an announcement
and the unit under inspection SALIENT FEATURES OF IMPLEMENTING
prepares for events. RULES OF REPUBLIC ACT NO. 5487

3.Informal Inspection [ REPUBLIC ACT NO. 11917, July 30, 2022 ]


□Executed in a spirit of understanding and AN ACT STRENGTHENING THE REGULATION
cooperation. OF THE PRIVATE SECURITY SERVICES
INDUSTRY, REPEALING FOR THE PURPOSE,
4.Structured Inspection REPUBLIC ACT NO. 5487, ENTITLED “AC ACT
□There is a format or logical sequence. TO REGULATE THE ORGANIZATION AND
OPERATION OF PRIVATE DETECTIVE
5.Unstructured Inspection WATCHMEN OR SECURITY GUARD AGENCIES”,
□Conducted in random manner. There is no format AS AMENDED
and logical sequence.

DRY-RUN SEC 1. Short Title – This Act shall be known as


Practical test or exercise of plans or any activity to “The Private Security Services Industry Act”
test its validity, an operational readiness exercise;
DEFINITION OF TERMS
SECURITY INVESTIGATION Private Security Guard (SG) – sometimes called
This is a planned and organized determination of private security guard or watchman shall include
facts concerning specific loss or damage of assets any person who offers or renders personal service
due to threats, hazards or unsecured conditions. to watch or secure

SECURITY GUARD FORCE Private Detective (PD) – shall mean any person
It is a group of force selected men, trained or group who does detective work for hire, reward or
into functional unit for the purpose of protecting commission, other than members of the Armed
operational processes from those disruption which Forces of the Philippines, guards of the Bureau of
would impede efficiency or halt operation at a Jail Management and Penology, municipal or city
particular plant, facility, installation or special jail guards, and members of the Philippine National
activity. Police or of any other law enforcement agency of
the government.
RA 5487 provided for the organization and
management of security guard forces designed for Private Security Personnel – shall be natural
specific organizations and purposes. The three (3) persons which include private security guards,
security guard forces are the following: private detectives, security consultants, security
1.PRIVATE SECURITY AGENCY (PSA) officers and others that may be classified later,
2.COMPANY GUARD FORCE (CGF) rendering/performing security and/or detective
3.GOVERNEMNT GUARD UNIT (GGU) services as employed by private security agencies
and/or private firms.
PRIVATE SECURITY AGENCY (PSA)
Shall mean any person association, partnership, License to Exercise Profession – shall mean any
firm or private corporation, who contracts, recruits, document issued by the Chief, Philippine National
trains, furnishes or posts any security guard, to Police or his duly authorized representative
perform its functions recognizing a person to be qualified to perform his
duties as private security or training personnel.
COMPANY GUARD FORCE (CGF) (License To Exercise Security Profession – RA
A security force maintained and operated by any 11917)
private company/corporation utilizing any of its
employees to watch, secure or guard its business License to Operate (LTO) – is a License Certificate
establishment premises, compound or properties. document, issued by the Chief, Philippine National
Police or his duly authorized representative,
GOVERNMENT GUARD UNIT (GGU) authorizing a person to engage in employing
security guard or detective, or a juridical person to
A security unit maintained and operated by any establish, engage, direct, manage or operate an
government entity other than military or police, individual or a private detective agency or private
security agency/company security force after under its employ.
payment of the prescribed dues or fees as provided
in these Rules and Regulations b.No regular license shall be granted to any
company guard force or private detective agency
Duty Detail Order is a written order/schedule unless it has a minimum of thirty
issued by a superior officer usually the private (30) licensed private security personnel under its
security agency/branch manager or operations employ.
officer assigning the performance of private
security/detective services duties. c.The maximum number of private security
personnel that a PSA/CGF/PDA may employ shall
SAGSD as used herein shall refer to the current be one thousand (1000).
PNP Civil Security Group Security Agency and
Guard Supervision Division or any other PNP [ REPUBLIC ACT NO. 11917, July 30, 2022 ]
Office that may be designated later as the primary CHAPTER II
office for supervision of the implementation of REGISTRATION AND LICENSING OF PRIVATE
these rules and regulations. SECURITY AGENCY
Section 4. Private Security Agency (PSA). — Any
PADPAO refers to the Philippines Association of Filipino citizen or juridical entity wholly owned and
Detective and Protective Agency Operators, Inc., controlled by Filipino citizens may organize a
which is an association of all licensed security private security agency and provide security
agencies and company security forces. services: Provided, That they shall not employ
more than two thousand (2,000) private security
WHO MAY ORGANIZE AND MAINTAIN A professionals as defined in this Act.
PRIVATE SECURITY AGENCY AND PRIVATE
DETECTIVE AGENCY Kinds of License to Operate (LTO)
1.Regular LTO – renewable every after 2 years;
Any Filipino citizen or corporation, association, 200-1000 guards for PSA and 30 guards for CGF.
partnership, one hundred percent (100%) of which
is owned and controlled by Filipino citizens, may 2.Temporary LTO – valid for 1 year; less than the
organize and maintain a Private Security Agency or number of guards for Regular LTO
Private Detective Agency.
RA 11917
BASIC REQUIREMENT OF AN OPERATOR OR CHAPTER II
MANAGER OF AGENCY REGISTRATION AND LICENSING OF PRIVATE
a.The operator or manager of an agency including, SECURITY AGENCY
managers of branch offices, must be: III.Section 7. Period of Validity of LTO. — The LTO
1.Filipino citizen; issued to PSA and PSTA shall be valid for a
2.Not be less than twenty five (25) years of age; maximum period of five
3.College graduate and/or a commissioned officer (5) years, subject to renewal: Provided, That the
in the inactive service or retired from the Armed Chief PNP may set a shorter validity period for LTO
Forces of the Philippines or the Philippine National with applicable fair and reasonable fees adjusted
police; accordingly.
4.Has taken a course/seminar on industrial
Security Management and/or must have adequate GRADUATED SCALE OF LICENSE TO OPERATE
training or experience in security business; and PSAs with temporary LTO having 200 or more but
5.Good moral character not exceeding 1,000 guards shall be issued a
regular LTO good for 2 years.
b.New applicants for license to operate shall be
required to obtain a minimum capitalization of one PSAs with temporary LTO having posted 100
million pesos (P1, 000,000.00) with a minimum guards but less than 200 shall upon expiration of
bank deposit of five hundred thousand (P500, such LTO shall be issued an extension period of 6
000.00) pesos in order to start its business months. However, upon expiration of the extension
operation. period, no extension shall be granted unless the
PSA shall submit a certification for additional 50
RA 11917 guards posted for a 150 guards total.

ON MEMBERSHIP a.PSAs with temporary LTOs, upon expiration still


a.No regular license shall be granted to any private fail to comply with the 200 guards requirement,
security agency unless it has a minimum of two shall be granted another 6 mos. period. However,
hundred (200) licensed private security personnel failure to comply shall serve a basis for the
issuance of cease to operate order. exercise private security profession but shall not
however be exempted from taking the refresher
b.LTO of PSAs with less than 100 guards after one training courses or its equivalent.
year shall not be renewed.

PSA’s with cancelled/revoked LTO’s shall cease to b.Likewise, graduates of ROTC advance/CHDF (or
operate and within 7 days after having been duly its equivalent in the PNP) Training graduates shall
notified of such cease to operate order, shall be exempted from the required Basic-licensing
immediately deposit all its firearms with the FEO Training/Seminar.

TENURE OF SECURITY PERSONNEL QUALIFICATIONS FOR SECURITY OFFICER


The tenure of security personnel shall be co- No person shall be licensed as Security Officer
terminus with the service contract between the unless he has the following qualifications:
PSA and the client. Services of any security a.Filipino citizen;
personnel shall be terminated on the following b.Holder of a Baccalaureate Degree;
grounds: c.Physically and mentally fit; and
a.Expiration of contract; d.Has graduated from a Security Officer Training
b.Revocation of license to exercise profession; Course or its equivalent.
c.Conviction of a crime or offense involving moral
turpitude; QUALIFICATIONS OF SECURITY
d.Loss of trust and confidence; CONSULTANTS
e.Physical and mental disability; and No person shall be licensed as a Security
f.Violation of the pertinent rules and regulations Consultant unless he possesses the following
promulgated by the PNP. qualifications:
a.Filipino citizen;
LICENSE TO EXERCISE PRIVATE SECURITY b.Physically and mentally fit;
PROFESSION c.Holder of a Masters degree in either Criminology,
Basic requirements of private security personnel Public Administration, MNSA, Industrial Security
a.Filipino citizen; Administration, or Law;
b.Not be less than eighteen (18) years of age; d.Must have at least ten (10) years experience in
c.Must have taken a private security the operation and management of security
course/seminar and/or must have adequate business.
training or experience in security business or
rendering security/detective services; QUALIFICATIONS OF A PRIVATE DETECTIVE
d.Of good moral character and must not have been No person shall be licensed as a private detective
convicted of any crime or violation of these rules unless possesses the following qualifications:
and regulations carrying a penalty of prohibition to a.Filipino citizen; b. Physical and mentally fit;
be licensed; and c.Holder of a baccalaureate degree preferably
e.Must be physically and mentally fit Bachelor of laws or Bachelor of Science in
Criminology;
Qualifications a Private Security Guard d.Graduate of a Criminal Investigation Course
No person shall be licensed as security guard offered by the Philippine National Police or the
unless he possesses the following qualifications: National Bureau of Investigation or any police
a.Filipino citizen; training school, or a detective training in any
b.High school graduate; authorized/recognized training center;
c.Physically and mentally fit; d. Not less than e.Advance ROTC/CMT graduate or its equivalent.
eighteen (18) years of age nor more than fifty (50)
years of age (for new applicants and SGs in non- Government Security Personnel
supervisory position); and No person shall be licensed as Government
e. Has undergone a pre-licensing training course or Security Personnel unless he possesses the
its equivalent. qualifications as prescribed in Section 3, 4, 5 of this
rule, provided he submits an appointment order
Exemptions from Basic Pre-Licensing Training coming from the Civil Service Commission
a.Veterans and retired military/police personnel or
those honorably discharged military/police USE OF FIREARMS
personnel possessing all the qualifications Possession of Firearms by Private Security Agency
mentioned in the preceding Section shall be /Private Detective Agency/ Company Security
exempted from pre-licensing training/seminar and Force/ Government Security Unit. – Private
academic/scholastic attainment which is a Security Agency/Private Detective Agency/
requirement for the initial issuance of License to Company Security Force/ Government Security
Unit shall be entitled to possess firearms after MINIMUM NUMBER OF FIREARMS
satisfactorily complying with the requirements
prescribed by the Chief, Philippine National Police 1.PSA with 100 guards – at least 30 pieces of
pertinent to the possession of firearms, provided licensed firearms.
that the number of firearms shall not exceed one (1)
firearm for every two (2) security guard in its 2.For application Regular License to Operate – at
employ. No private security agency/private least 70 pieces of firearms.
detective agency/company security
force/government security unit shall be allowed to LIMITATIONS IN THE CARRYING OF FIREARMS
possess firearms in excess of 500 units a.Unless specified and/or exempted pursuant to
provisions of these rules and regulations and/or
Restriction to possess high-powered firearms firearms laws, no firearm shall be borne nor be in
A private detective agency/private security agency/ the possession of any private security personnel
company security services/ government security except when in the actual performance of duty, in
unit is not allowed to possess high caliber firearms the prescribed uniform, in the place and time so
considered as military-type weapons such as M16, specified in the DDO.
M14, cal .30 carbine, M1 Garand, and other rifles b.The firearm issued to security personnel of
and special weapons with bores bigger than cal .22, private security agency/private detective
to include pistols and revolvers with bores bigger agency/company security
than cal .38 such as cal .40, cal .41, cal .44, cal .45, services/government security unit shall be carried
cal by the security personnel only within the compound
.50, except cal .22 centerfire magnum and cal .357 of the establishment where he is assigned to guard,
and other pistols with bores smaller than cal .38 but except when the security personnel is escorting big
with firing characteristics of full automatic burst and amount of money or valuables on conduction
three-round burst. However, when such entities are duties outside its jurisdiction or area of operation,
operating in areas where there is an upsurge of upon prior coordination with the nearest PNP
lawlessness and criminality as determined by the units/stations, or when in hot pursuit of criminal
Chief, PNP, Police Regional Office Regional offenders.
Director or their authorized representative, they
may be allowed to acquire, possess and use high- JUSTIFICATION FOR CONFISCATION OF
powered firearms under the following conditions FIREARMS
a.When the firearm is about to be used in the
a.The acquisition of the high-powered firearms commission of a crime;
shall be at the expense of the private security b.When the firearm is actually being used in the
agency/private detective agency/company security commission of crime;
force/government security unit concerned; c.When the firearm has just been used in the
b.The firearms should first be registered with the commission of a crime;
Firearms and Explosives Division before issuance d.When the firearm being carried by the security
and shall not be used or transferred in places other guard is unlicensed or a firearm not authorized by
than those specially authorized by the Director, law and regulation for his use;
CSG; c. The total number of high-powered firearms e.When the confiscation of the firearm is directed
that an agency or security force/unit is authorized by the order of the court;
to possess shall not exceed ten percent (10%) of f.When the firearm is used or carried outside the
the total number of security guards of watchmen in property, compound or establishment serviced by
its employ; and the agency without proper authority; or
d. The duly licensed security guards or watchmen g.When a security guard does not possess any
who will use the firearm shall first be given license to exercise his profession.
adequate training in the care and use thereof and
will be under the supervision of qualified officers REVOCATION OF LICENSE
and men of the Philippine National Police. License to possess firearm may be revoked under
any of the following instances:
STOCKING OF AMMUNITIONS SHALL BE ON a.Failure to submit any issued firearm for
LIMITED AND REASONABLE QUANTITY THAT verification as required.
SUITS THE NEED OF THE AGENCY b.Carrying of firearms by security personnel without
appropriate Duty Detail Order (DDO).
a.It shall not exceed 50 rounds of ammunitions c.When the firearm serial number has been
issued per unit of licensed firearm. duplicated on another firearm or using one firearms
b.Individual issue to security guard shall be limited license for more than one firearm other than those
to 25 rounds of ammunition per security guard stipulated in the license.
d.Carrying of firearms outside of the place stated in
the permit or in places prohibited under the law; or 500-799 guards – P150,000.00 Agency with 800-
e.Conviction of the operator or manager of the 1000 guards – P200,000.00
agency of any crime.
f.When the firearm was reported lost.

SECURITY PERSONNEL RANKS, POSITIONS,


STAFFING PATTERN AND JOB DESCRIPTION
1.Security Management Staff
1.1Security Director (SD) –Agency Manager/Chief
Security Officer – responsible for the entire
operation and administration/management of the
security agency.
1.2Security Executive Director (SED) – Assistant
Agency Manager/Asst. Chief Security Officer –
Assist the Security Director
1.3Security Staff Director (SSD) – Staff Director for
Operation and Staff Director for Administration
>The Staff Director for operation -assistant of the
security manager for the efficient operation of the
agency.
>The Staff Director for Administration - is the staff
assistant of the agency manager for the effective
and efficient administration and management of the
agency.
1.4Security Staff Director for Training- Staff in
charge for Training – responsible for the training of
the Agency’s security personnel

2.Line Leadership Staff


2.1Security Supervisor 3 – Detachment
Commander – is the field or area commander of
the agency;
2.2Security Supervisor 2 – Chief Inspector –
responsible for inspecting the entire area covered
by the detachment;
2.3Security Supervisor 1 – Inspector – responsible
for the area assigned by the Chief Inspector or the
Detachment Commander.

3.Security guard
3.1Security Guard 1 – Watchman/guard- the one
actually posted as watchman and or guard
3.2Security Guard 2 – Shift in- charge –
responsible for the security officers who are
scheduled in a certain shift for a particular period
3.3Security Guard 3 – Post in- charge –responsible
for the entire detailed security office within a certain
establishment.

CLASSIFICATION OF TRAINING AND ITS


DURATION
1.Basic Security Guard Course (Pre-Licensing
Course) – 150 hours;
2.Re-Training Course- 48 hours;
3.Security Officers Training Course – 300 hours
4.Basic Security Supervisory Course – 48 hours

SURETY BOND
Agency with 1 -199 guards – P50,000.00 Agency
with 200-499 guards – P100,000.00 Agency with

You might also like