0% found this document useful (0 votes)
48 views29 pages

227 Module

This document provides an introduction to industrial security, including: 1. It defines security management and industrial security, focusing on protecting physical and digital assets through risk management methods and procedures. 2. A security manager is responsible for security in large organizations, protecting resources from risks through active measures like barriers and passive measures like education programs. 3. It briefly outlines the history of security, including ancient Egyptian pharaohs hiring guards, the Spartans and Julius Caesar using early encryption, and the development of private security agencies over time.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views29 pages

227 Module

This document provides an introduction to industrial security, including: 1. It defines security management and industrial security, focusing on protecting physical and digital assets through risk management methods and procedures. 2. A security manager is responsible for security in large organizations, protecting resources from risks through active measures like barriers and passive measures like education programs. 3. It briefly outlines the history of security, including ancient Egyptian pharaohs hiring guards, the Spartans and Julius Caesar using early encryption, and the development of private security agencies over time.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

CRIM LEA 3 INTRODUCTION TO INDUSTRIAL SECURITY

Security Management (sometimes also Corporate Security) is a management field that


Module Title : focuses on the safety of assets (resources) in the organization, i.e. both physical safety,
human security to include digital security.
Chapter I. Fundamentals of Security Management
Security management is closely related to risk management and it is aimed at creating
1. Introduction through various methods, procedures, guidelines and standards a permanent secure solution
This chapter introduce the basic concept of fundamentals of Security to such conditions, which will help prevent or reduce identified risks in particular.
Management were the student will learn Historical Background and legal basis of Industrial Security is a branch of security which aimed at keeping large structures such as
Industrial security in the Philippines to include the industrial Security Management factories, schools, hospitals, hotels and others that may consider as industrial in nature.
concept and security in general that applicable law in the study of Industrial security The
student will also define important terms and required to present some output basis for Security manager is responsible for managing security in large and medium organizations,
academic standing. The owner, statutory authority and top management.
we leave in a community that is unpredicted and requires advanced technology, The Active and Passive Measures
skilled people to manage risk, peaceful environment and well implemented processes
working together to protect assets, clientele, employee and the whole organizations. ACTIVE MEASURES are the physical barriers, security lighting use of vaults, locks
and others while PASSIVE MEASURES are those that will dates man from committing such
Security fears have been around for centuries and they won’t disappear, however the
acts for fear of being caught, charged in court, or get dismissed; security education programs,
way that we deal with them will keep evolving. Regardless of technology, be it paper based,
investigation, fire prevention seminars; personal security checks.
an enigma machine or the latest, most advanced next generation firewall; the basic definition
of security (being free from danger or threat) still applies now and certainly will in the future.
Cyber security refers to the protection of devices, networks, data and apps including utilities,
financial institutions and government agencies.
Truly, a Security is every bodies concerned and has been defined in many ways: as a function
and as an activity. The organization performing protection tasks or sometimes, even the
Brief Historical Background;
personnel of the said organization. The most appropriate definition, however, appears to be as
a state or condition; i.e. it implies a relatively predictable environment in which an individual
or group may pursue its ends without disruption of harm and without fear or such disturbance
- The Ancient Egyptian Pharaohs who hired private security guards for personal
of injury, corollary to this broad and all encompassing definition, and as an activity, security
protection. Or to Ancient Rome where emperors had security guards for personal,
provides those means, active or passive which serve to protect and preserve as environment
family and property security.
which allows for the conduct of such activities within the organization or society without
disruption or fear or such, of course, in both contexts, it can refer to the protection of its - Ancient Egypt is accredited with creating encryption (to disguise or protect sensitive
organization and/or its personnel. information).
What is Security? - The Spartans used the transposition cipher, which involved changing the positions of
Refers to the state or condition of being secured from potential harm, freedom from the letters within documents. Julius Caesar is noted as being the first person to use
fear, danger, lost, destruction or damages of ones life or property. encryption for military purposes, sending documents by shifting the letters in the
alphabet by three.
Etymology
- Thomas Jefferson in 1795 created the Jefferson disk or wheel cypher - something
The word 'secure' entered the English language in the 16th century. It is derived from which seen the Da Vinci Code in appearance to the cryptex cylinder used to hide the
Latin securus, meaning freedom from anxiety: se (without) + cura (care, anxiety) location of the holy grail.
- the first enigma messages were broken in January 1940 and continued to be broken
□ Responsibility for national security was vested in the Department of National
during the course of the war.
Defense. The principal functions of the department in 1991 were to defend the state
The Enigma device is a machine resembling a typewriter that used interchangeable against internal and external threats and, through the Philippine National Police, to
rotors and a plug board with 159 million million million possible settings, which the maintain law and order.
Germans believed was unbreakable but it was encrypted.
□ National Security Advisor (NSA) and Director-General serve as Chief of Staff and
- In 1850, Allan Pinkerton Cooper from Scotland and the Chicago Police adviser for Special Concerns in National Security to the President. The NSA has a
Department’s, first detective established one of the oldest and still the largest private Cabinet rank in the government. The current Director-General and National Security
security operations in the United States Adviser is Sec. Hermogenes Esperon.

- The Shotgun Riders, In 1852 Henry Wells and William Fargo partners in the □ Private security business in the Philippines began on March 1, 1933 when the City
America Express Co. chartered established their own detective and security personnel Council of Manila passed City Ordinance No. 2162 granting license and recognition
known as Shotgun Riders. to the “Special Watchman Agency” owned by the brothers Juan and Pedro Jimenez.
The agency will later be renamed “Jimenez Security Agency”.
- The sole investigating agency for the American Bankers association was the William
J. Burns Detective Agency in 1909 established the William J. Burns □ On 30 May 1958, the Philippine Association of Detective and Protective Agency
Operators (PADPAO) was formally organized.
- Dr. Norman Bottom and Professor John Kostanoski – have applied a system
approach to the problem of assets protection. Formulated as a new way of
□ On 1 June 1969, Republic Act No, 5487 was passed directing the Chief of the
considering security and loss prevention and called “WAECUP” (an acronym for
waste, accidents, and error, crime, and unethical practices). Philippine Constabulary (PC) to create a unit with the specific purpose of monitoring
and regulating private security businesses

Brief History of Industrial Security National Security in the Philippines; □ On 3 October 1972 Presidential Decree (PD) No. 11 of former President Ferdinand
Marcos was passed in order to encompass and defined all forms of contracted private
□ Commonwealth Act No. 1 is the original policy basis of the national security security services within the entire Philippine Archipelago
program of the Republic of the Philippines. That act mandated the establishment of a
Council of National Defense to advise with the President on all matters of national □ With the abolition of the PC/INP and the creation of the Philippine National Police,
defense policy, with membership consisting of the President, all living former
the PC/INP SUSIA was renamed the Security Agencies and Guards Supervision
Presidents, the Vice President, the head of each executive department, the Chief of
Staff, and six other members to be designated by the President. Division or SAGSD

□ The 1987 Constitution mandates civilian control of the military and establishes the Republic Act # 5487
president as commander in chief of the armed forces. The President also heads the - An Act to Regulate the Organization and Operation of Private Detective, Watchman and
National Security Council, ostensibly the policy-making and advisory body for Security Guard Agencies, Otherwise known as the “Private Security Agency Law (PSA)
matters connected with national defense. Law”
This law governs the operation, administration of security agency, and activities,
qualifications, duties and licensing od security guards, watchmen and private detectives. In
short, it is the intention of this law to professionalize the sucurity services in order to upgrade Module Title :
the level of security protection.
Chapter II: The Concept of Industrial Security Management (Week 4-5)
1. Introduction
This chapter introduce the basic concept of Industrial Security Management
were the student will learn the different aspects of security that applicable law in the study
of Industrial security .The student will also define important terms and required to present
some output basis for academic standing.
Republic Act # 6975 as amended
Security is every bodies concern. All employees including non – security personnel should be
This act created the Civil Security Group under the PNP to provide administrative services aware to their specific role in security in day to day basis.
and general supervision over the organization, operation and activities of all organized private
detectives, watchmen, security guard agencies and company guard forces. Basic Principles of Security:
1. Security is everybody’s concern.
The differences between the Public Police and Private Security office: 2. Security is good only as far as its weakest link.
3. No single security system or element can stand alone.
1. Private security officer is clientele oriented while Public Police Officer is 4. High relative security can be achieved in depth.
community oriented.
2. The public police have substantially greater power than security personnel in their Three (3) Areas of Security:
power to arrest, detention, search and interrogation. Because security officer are as a 1. Physical Security – this concern when the physical measures adopted to prevent
rule, limited to the premises of their employer. Public police operate through a much unauthorized access to equipment, facilities, materials, and document and to safeguard
wider jurisdiction. against espionage, sabotage, damage, loss and theft.
3. Private Security officer /agency has a limited authority of a security force by
licensing statutes directed at a security activities, operating contracts between 2. Personnel Security – this is important as physical security. Personnel security starts even
employers and security firms may also specify limits on the activities of the before the hiring of employee and remains to be maintained for as long as the person
contractual personnel. employed.
4. Private guards differ from Public Police both in their legal status and in that they
perform in areas where the public Police cannot legally or practically operate. The 3. Document and Information Security - this involves the protection of documents and
Public police have no authority to enforce private regulations, nor have they the classified papers from loss, access of unauthorized person, damage, theft and compromise
obligation to investigate the unsubstantiated possibility of crime (such as employee through disclosure.
theft) on private property.
PROTECTIVE SECURITY SYSTEM
2. Teaching and learning activities - Those measures taken by an installation or unit to protect itself against sabotage,
espionage, or subversion and at the same time provide freedom of action in order to provide
1. Explain the Security in General the installation of unit with the necessary flexibility to accomplish its mission.
2. Report via messenger video call/zoom the basic concept of Fundamentals of
Security.
3. Kindly discuss important event and personalities in Industrial security in the Aspects of Protective Security
Philippines.
Physical Security – describes measures that are designed to deny access to unauthorized
personnel (including attackers or even accidental intruders) from physically accessing a
building, facility, resource, or stored information; and guidance on how to design structures Three (3) Lines of Physical Defense
to resist potentially hostile acts.
1. First Line of Defense (Perimeter Barriers) – located at the outer edge of the
Physical security involves the use of multiple layers of interdependent systems which property, like fence, doors and windows, this includes protective barriers,
include the following; perimeter fences or guards at the gate
- CCTV surveillance
- Security guard 2. Second Line of Defense (Exterior Barriers) – like exterior walls, ceilings, and
- Protective barriers roofs as building itself to include such as doors, floors, windows, walls, roofs,
- Locks grills, locks and keys and other entries to a building
- access control protocols and many other techniques.
3. Storage System/3rd Line of defense or Last Line of Defense (Interior Barriers) –
these are the interior areas within the building like vaults, safety cabinet and
PHYSICAL SECURITY
protected rooms intended to keep top secret files and other things that will keep
This refers to the broadest branch of security which deals on the system of barriers confidentially.
and devices placed between the matters protected and measures to prevent unauthorized
PROTECTIVE BARRIER
access to facilities, plants, and equipment and safeguard them against man-made and natural
hazards. Barrier – any structure or physical device capable of restricting, deterring, delaying illegal
access to installation. They maybe referred to as Perimeter barrier.
Principles of Physical Security

1. The type of access necessary will defend upon the number of variable factors
therefore may achieved in a number of ways. Perimeter Barrier Opening
2. Delays provided against surreptitious and non-surreptitious entry. 1.)Gates and Doors – When not in use and controlled by guards, gates and doors in the
perimeter should be locked and frequently inspected by guards. Locks should be charge
3. There is no impenetrable barrier.
from time to time and should be covered under protective locks and key control.
4. Defense in depth- barriers after barriers.
2.) Side- walk- elevators – These provide access to areas within the perimeter barrier and
5. Each installation is different. should be locked and guarded.

Factors That bring about unsecured conditions 3.)Utilities Opening – sewers, air intakes, exhaust tunnels and other utility openings which
penetrate the barrier and which have cross sectional areas of 96 square or more should be
1. Threats – an activity that could lead to a loss protected by bars, grills, water field traps or other structural means providing equivalent
protection to that portion of the perimeter barriers.
2. Hazards – a condition that could lead to a loss
4.) Clear Zones – an abstracted area or a “clear zone” should be maintained on both sides
3. Vulnerability – a weakness that can be used to gain access to an asset
of the perimeter barrier. A clear zone of 20 feet or more desirable between the barriers and
4. Risk – a potential loss or damage to an asset exterior structures and natural covers that may provides concealment for assistance to a
person seeking unauthorized entry.
Specification on clear zones: 5. Energy Barriers – electronic devices and hardware like alarm system and other
devices which electronically.
a. Clear zones of 20 feet or more should exist between the perimeter barriers and exterior
structures, parking areas and natural and man- made features.
b. A clear zone of 50 feet or more should exist between the perimeter barrier and Three Basic function of barriers:
structure within the protected areas except when a building was constitutes parts of the
perimeter barrier. 1. Delay

2. Psychological Deterrent

3. Supplement and/or compliment the on-site security personnel needs


Security Specification for windows or opening:
Perimeter Barrier – a medium or structure which defines the physical limits of an
Windows or opening less than 18 feet above ground, roof, ledges, etc. or less than 14 installation or area to restrict or impede access thereto. Any physical barrier used to
feet directly or diagonally, opposite uncontrolled windows in order walls, fire, escapes or supplement the protection of an inside or outside perimeter.
other opening of 96 square inches or larger should be grilled or have steel bar protections.
Classification
Purpose of Barrier
Solid Fence – constructed in such away the visual access through the fence is denied.
The purpose of protective barriers in safeguarding the areas, building and proper
utilization of lightning at night have contributed to modern man’s attempt to discourage - Its advantage is that it denies the opportunity for intruder.
intruder, pilfer and other entrants devious intent.
Advantage of Solid Fence:
Two (2) General types of Physical Barrier
a. Denies visual access.
1. Natural Barrier – such as rivers, cliffs, and ravines etc. which the delay or make more
difficult the entry of the intruder. b. Denies opportunity.

2. Man-made Barrier – are structural construction like fences , walls, floors, roofs, etc. Disadvantages of Solid Fence:
means to impede to deter penetration
a. It prevents the installation guards from observing the area.
Five (5) Categories of Protective Barriers
b. A solid fence creates shadows which maybe used the intruder.
1. Structural Barriers – barriers which are constructed or structured like walls, doors,
Full-View - constructed to permit visual access but primarily designed for control or physical
fences, locks and other barriers which are not moving and structured.
access into a facility.
2. Human Barriers – barriers which are being played by the human or person itself
which are authorized like guards, office, and shop employee aligned to protect certain Advantages of Full-View Fence:
establishment.
3. Animal Barriers – barriers which uses animals as served as barriers like dogs, geese, a. Roving patrol and stationary guards are able to keep the are under observation.
and other animals that create sounds as a sign of force entry.
b. It does not create shadows which provide cover and concealment for the intruder.
4. Natural Barriers – geographical barriers like rivers, cliffs, ravine and deserts.
Disadvantages of Full-View Fence: 2. Barbed wire - is a type of fencing wire constructed with sharp edges or points
arranged at intervals along the strand(s).
a. Allow visual access to the installation.
- Standard barbed wire is twisted, double strand, 12 gauge, with 4 point barb spaces on
b. It allows the intruder to become familiar with movements and schedule of guard patrols.
equal distance apart.
Types of Perimeter Barriers: - Barbed wire fencing should not be less than 7 feet high excluding top guard.
- Barbed wire fencing must be firmly affixed to post high excluding top guard.
1. Wire fences - is built on a wood frame or on metal posts. Is an independent structure - The distance between strands will not exceed 6 inches and midway between parts.
designed to control physical and/or visual access between outside areas.

Classification:
3. Concertina Wire - Standard concertina barbed wire is commercially manufactured
1. Chain-link - is a type of wovenfence usually made from galvanized or coated steel wire coil of high strength steel barbed clipped together at intervals to form a cylinder.
wire. The wires run vertically and are bent into a zig-zag pattern so that each "zig" - Opened of concertina 50 feet long and 3 feet in diameter.
hooks with the wire immediately on one side and each "zag" with the wire
immediately on the other. This forms the characteristic diamond pattern seen in this
type of fence.

- It must be constructed of 7 feet material excluding top guard.It must be of 9 gauges


or heavier.The mesh openings are not to be larger than 2 inches per side.

- It should be twisted and barbed salvage at top and bottom.

- It must be securely fastened to rigid metal or reinforced concrete.

- It must reach within 2 inches of hard ground or paving.

- On soft ground, it must reach below surface deep enough to compensate for shifting 2. Building Wall - is a vertical structure, usually solid, that defines and sometimes protects
sand. an area. Building walls have one main purpose: to support roofs and ceilings.

3. Bodies of Water - These are natural barriers such as streams, creeks, rivers, marsh, pond
or any other bodies of water.

Additional Protective Barriers:

1.Top Guard – is an additional overhang of barbed wire placed on vertical perimeter fence
facing upward with a 45 degree angle with three to four strands.

- Supporting arms will permanently affixed to the top of fence posts to increase the
overall height of fence at least 1 foot.
- Three strands of barbed wire, spaced 6 inches apart installed.
3. Wooden Fence Post – minimum horizontal dimension of four inches by four inches.
4. Steel Fence Post – the round type should at least two inches in diameter and the H-beam
must measurable no less than 2 inches at the smallest diameter.
5. Fence Posts – fence post should be set in concrete or in firm soil using commercial drive
anchors, to a depth of three feet; maximum distance between posts is ten feet.
6. Fence Top – there should be something on the top of the fence to deter persons
attempting to go over the fence good example would be the use of barbed wire overhang
had a 45 degree in direction.
7. Fence Area – the area surrounding the fence should be clear of trees and vegetation and
2. Towers/Guard Tower – are house like structure above the perimeter barrier. It gives a debris or other materials which would offer concealment to the intruder or would aid him
psychological effects to violators. in scaling.
8. Fence Gate – gates should be limited to the number necessary for efficient and safe
operation of installation.
9. Fence Opening – all opening in the fence in excess of 96 inches must be barred or
screened.
10. Multiple Fence – if, used multiple fence should be at least ten feet apart and the overhang
on the top of the inner fences should point inward rather than away from the installation
which does not exceed 150 feet.

Two (2) types of Protective Barriers


3. Guard Control Station System – provided at the main perimeter entrance to secure the area
1. Active Barriers – a type of barrier designed normally at the entrances of building
of guard AOR.
against the threat vehicle or car bomb.
4. Signs/Control signs – should be erected where it is necessary by preventing and
- This requires some action either people or equipment to be raised and
authorizing personnel.
lowered or move aside to permit vehicle ingress and egress.

2. Passive Barriers – a system barrier designed against threat vehicle or car bomb and
normally installed permanently at the perimeter of the facility.

- it has no moving parts.

5. Barrier Maintenance – this means of inspecting all barrier within AOR. Types of Perimeter Barrier Opening:

Minimum Requirements for Fence used as Security Barrier 1. Doors and gates – fire exit door, required by building codes are undesirable for
security but necessary safety.
1. Height – eight feet at minimum.
2. Slack at the bottom – not exceed two inches, if the fence is not taut then it should extend 2. Side-walk-elevators – these provides access to areas within the perimeter barrier and
even closer to the ground. should be locked and guarded.
3. Utility Openings – interim manhole covers 10 inches or more in diameter must be Intrusion detection systems are inherent element of corporate and industrial security
secured to prevent unauthorized opening. and play an important part in the total protection efforts of companies; its activities,
information, equipment and material assets.
4. Clear Zones – 20 feet more should exists between the perimeter barrier and exterior
structures, parking area and natural man made features. Basically, these are designed to alert security personnel to consummated or attempted
intrusion into an area, building or compound. It can be electrical, mechanical or electronics.

Remember, however, that these systems can tell you only that an intrusion into a
PERIMETER GUARD - Employed in augmenting the existing perimeter security or protected area occurred. It cannot do anything about it. Whatever system you choose depends
perimeter barrier. on your capability to react positively to the alarm.
TWO TYPES; Purposes of intrusion detection alarm system are:
1. Fixed post – assigned in a particular place of the compound to guard and watch the area 1. To economize
surrounding.
2. To substitute in place of other security measures.
2. Roving Guard/Patrol – is required to walk and go around regularly around the company
premises. 3. To supplement providing additional controls.

A Guard System that cannot be checked on is not a secured guard system; this could be Basic Principles:
done;
1. Breaking electrical current.
1. Personal Inspection – Security supervisors conduct on the spot and random
inspection of posted guards. 2. Interrupting a light beam.

2. Artificial Inspection – this is doe through communication method. 3. Detecting sound.

Restricted Areas 4. Detecting vibration.

– Any area in which personnel or vehicles are controlled for reasons of security. 5. Detecting a change in the capacitance due to penetration of an electrostatic filed.

Types of Restricted areas;


1. Exclusion Area – It contains a security interest of Top Secret importance, hence it
ALARM – is synonymous to warning of imminent danger. Defined in to ways;
requires highest degree of protection.
2. Limited Area Control – A lesser degree is required, however if security interest A. A security device fitted to property, especially a house or a car.
would be compromised by uncontrolled movement.
B. Sound of security or warning device.
PROTECTIVE ALARMS / INTRUSION DETECTION SYSTEM; PROTECTIVE ALARM
The use of intrusion detection systems dates back to 390BC during the Roman
Empire when squawking geese alerted the Romans to surprise attack by the Gaul’s.
it is an aural and visual signal given by the enunciator when intruder actuates device
in a protected area. Disadvantages:

Three Basic Parts of Alarm System: 1. If improperly installed, may be defeated by crawling or climbing over it.
2. Requires some type of permanent installation.
1. Sensor or Trigger Device – it emits the aural or visual signal or both. 3. Fog, smoke or dust may cause interruption of the light beam.
2. Transmission line - Controls or Circuits which carries message to the signaling apparatus 4. Requires frequent inspection.
3. Annunciator - Signaling System, sometimes called the 5. Requires ground beneath the light beam free of tall grass and other elements.
ANNUNCIATOR/ENUNCIATOR – is a visual or audible signaling devise which initiates
conditions of associated circuits. 3. Audio detection device – supersensitive microphone speaker sensor are installed in walls,
ceilings and floors of the protected area of any sound cause by attempted force entry
TYPES OF ALARM SYSTEM; inspected by the sensor.
Advantages:
1. Metallic foil or wire – any action that will move the foil or wire break the circuit and
activate the alarm. Metallic foil or wire is used in a window and door. 1. Economical and easily installed.
2. Has high salvage value.
Advantages:
Disadvantages:
1. Consistent trouble free service.
2. Causes few nuisance alarms. 1. Can be used only in enclosed areas where a minimum of outside sound
Disadvantages: exists.
2. Unsatisfactory for use where high noise level are encountered.
1. Costly to install where there are many entry points.
2. Easily compromised when improperly applied. 4. Vibration detection device – the sensor detect any vibration caused by attempted forced
3. May be defeated by bridging the circuits. entry.
4. Unprotected soft walls or ceilings may be penetrated without disturbing the
alarm system. Advantages:
5. Has little salvage value.
6. Will not detect “stay behinds” 1. Economical and easily installed
2. Has high salvage value
2. Photoelectric or electric eye - is a device used to detect the distance, absence, or presence 3. Has flexible application.
of an object by using a light transmitter, often infrared, and a photoelectric receiver. They are Disadvantage:
used extensively in industrial manufacturing.
1. Does not perform satisfactory when high vibrations are encountered.
Advantages:
5.ULTRASONIC MOTION DETECTION DEVICE
1. Affords effective and reliable notice of intrusion.
2. Useful in open portals or driveways. Consists of trans receiver, amplifier and control unit. Any motion within the
3. Can detect “stay behinds” protected area causes an activation alarm signal. It is very effective for the protection of
4. Has high salvage value. interior areas.
5. May be used to actuate other security devices such as cameras.
6. May detect fires through smoke interruption of the beam. Advantages:
1. Provides effective security against intruders concealed within the premises. 3. Knee or Thigh Buttons – activated by knee usually by the teller. They are commonly
2. Has high salvage value. found in location where personnel usually perform their duties from a seated position.
3. Difficult for an intruder to compromise the system.
Disadvantages: 4. DOUBLE SQUEEZE BUTTONS This type of alarm requires pressure on both of its
1. May require reduced sensitivity to overcome possible disturbance factors such as side therefore reducing the probability of accidental alarm.
phones.
2. Can be set off by loud external sounds.
TYPES OF ALARM DETECTION SYSTEM;
6.CAPACITANCE OR ELECTROSTATIC DETECTION DEVICE
1. Central Station System – A type of protective alarm system where the alarm is located
The body capacitance of any intruder who enters the field unbalances the outside the installation.
electrostatic energy of the field which in turn activates the alarm system. It can be
installed on a safe, wall, or openings in a protected area to establish an electrostatic field Central-stations use special telephone lines, computers, software and trained staff to
around the object to be protected. monitor their customers' security systems and call the appropriate authorities in the event an
alarm signal is received.
Advantages:
2. Propriety System – same way as the central system operated by the operator/subscriber, the
1. Very flexible in that it is used to protect safes, file cabinets, windows, doors, etc.
2. Simple to install and operate. difference is the alarm is located within the facility.
3. Provides an invisible protective field.
4. High salvage value. 3. Auxiliary System – alarm are lead to the local police station or fire department by lease
5. Compact equipment size. telephone lines usually by special arrangement.
6. High grade protection
Disadvantages: 4. Local Alarm System – consist of rigging up a visual or audible alarm near the object to be
protected.
1. Can be applied only to ungrounded equipment.
2. Accidental alarms can occur if persons such as cleaning personnel carelessly 5. Local Alarm-by-Chance System – this is a local alarm system in which a bell or siren is
approach the protected area. sounded with no predictable response.

6. Dial Alarm System – this system is set to dial a predestined number when alarm is
7. Smoke Detector Devise - is a device that detects smoke, typically as an indicator of fire. activated. The number selected might be the police or others.
Commercial, industrial, and mass residential devices issue a signal to a fire alarm system,
while household detectors, known as smoke alarms, generally issue a local audible or visual Other Sensors
alarm from the detector itself.
Penetration Sensors – sensor on windows, doors etc. sensor consists of magnetic switches and
Other types of protective alarm (commonly used by Banks) grid wires.

1. Foot Rail Activation – engage the activation bar place on the floor in such a position that Duress Sensors – it is used to call assistance of other personnel.
tellers may activate the alarm by means of foot.
The most common causes of False Alarm are:
2. Bill Traps - A device for detecting the removal of the last bill in a stack of paper currency
for signaling or alarm purposes consisting of a magnet assembly. 1. Use negligence.
2. Poor installation or servicing. 3. Movable Lighting - consists of manually operated, movable searchlights that may be lit
during hours of darkness or as needed. The system normally is used to supplement
3. Faulty Equipment continuous or standby lighting.
PROTECTIVE LIGHTING 4. Emergency Lighting - is a backup power system of lighting that may duplicate any or all of
the above systems. Its use is limited to times of power failure or other emergencies that
Designed to emphasize the illumination of the perimeter barrier and the outside
render the normal system inoperative.
approaches to it, or to concentrate on the area and the building within the perimeter.
General Types of Lighting Sources;
Purposes of Protective Lighting:
1. Incandescent Lamp – have low initial cost and provide good color rendition.
1.To provide sufficient illumination to the areas during hours of darkness.
2. Fluorescent Lamp - useful light more efficiently than an incandescent lamp and it has a
2. Lighting can help improve visibility so that intruder can be seen and identified and if
Lower energy cost.
possible, apprehended.
3. Mercury Vapor Lamp - is a gas discharge lamp that uses an electric arc through vaporized
3. Lighting also gives that psychological fear and that serve as a deterrent to thieves, pilferer,
mercury to produce light. Emits purplish-white color, considered more efficient and is
trespassers and saboteurs.
widespread in exterior lighting
Importance of Protective Lighting:
4. Metal Halide – developed in 1960, is an electric light that produces light by an electric arc
1. Serve as deterrent to violators. through a gaseous mixture of vaporized mercury and metal halides . Similar to mercury vapor
2. Assisting Security Force lamps, but contain additional metal compounds in the arc tube, which improve the efficiency
3. Serves as an essential element of an integrated physical security program. and color rendition (whiteness) of the light.

Types of Security Lighting: Metal-halide lamps have high luminous efficacy of around 75 - 100 lumens per watt,
about twice the efficiency of mercury vapor lights and 3 to 5 times that of incandescent lights.
1. Stationary Luminary/Continuous lighting – the most familiar type of out door lighting.
Two types; 5. High Pressure Sodium Vapor – introduced in 1965. is a gas discharge lamp that uses
sodium in an excited state to produce light, such as parking areas, road way, building,
A. Glare-Projection type – The intensity is focused to a potential intruder. Intruder makes him
industrial and commercial installation.
or her very visible while Guards are protected by being kept in comparative darkness while
being able to observe intruders at a considerable distance. 6. Flood lights - is an artificial light providing even illumination across a wide area.

B. Controlled lighting - is best when there are limits to the lighted area outside the perimeter, Protective Locks and Keys:
such as along highways. In controlled lighting, the width of the lighted strip is controlled and
adjusted to fit the particular need. Securing one's property has long been a concern of people throughout the world.
Beyond hiding the objects or constantly guarding them the most frequently used option is to
2. Standby Lighting - has a layout similar to continuous lighting; however, the lights are not secure them with a device.
continuously lit, but are either automatically or manually turned on when suspicious activity
is detected or suspected by security personnel or alarm systems.
Pilferage - one of the most annoying and common human hazards which security has to deal 4. Combination Locks - is a type of lock in which a sequence (permutation) of numbers or
with. is the theft of part of the contents of a package. It may also include theft of the symbols is used to open the lock.
contents but leaving the package,
5. Code-Operated Locks – a type of lock that no key is used. Pressing the series of
Types of Pilferer: numbered button in the proper sequence open the lock.

1. Casual Pilferer – is one who steal due to his inability to resist the unexpected opportunity 6. Electromagnetic Locks - is a locking device which operates by means of electric current.
and has little fear of detection. Electric locks are sometimes stand-alone with an electronic control assembly mounted
2. Systematic Pilferer – who steal with plan, purposed is for economic gain. directly to the lock.
Lock – a mechanical, electrical, hydraulic or electronic device designed to prevent entry into 7. Card-Operated Locks – these are frequently fitted with a recording device, which
a building, room, container or hiding place and to prevent the removal of items without the registers time of use and the identity of the user.
consent of the owner.
Key control;
They may be operated by turning some form of removable key, by keying or dialling
in a combination which directly or via electromechanical means operates the lock, with some device used to open a lock or door.
form of magnetic or other card reader, or by moving a part on a safety lock intended to
TYPES OF KEY;
prevent accidental operation rather than to prevent unauthorized access.
1. Change Key - is a key on the lowest level of a master keying system. Which operate the
Padlock – a portable and detachable lock having sliding hasp which passes through a staple
lock and has a particular combination of cuts.
ring or the like and is then made fast or secured.
2. Sub-master key - A key that activates the locks in more than one but not all doors to spaces
Peterman – a term used in England for lock picker, safecrackers and penetrators of restricted assigned to a specific area.
areas or rooms.
3. Master key - A key that activates all door locks in a building for spaces assigned to a
TYPES OF LOCK; specific area.
1. Warded Locks – (is one of the most ancient lock designs still in modern use.) is a type of 4. Grand master key - A key that activates all door locks in a building.
lock that uses a set of obstructions, or wards, to prevent the lock from opening unless the
correct key is inserted. The correct key has notches or slots corresponding to the obstructions The final line of defense at any facility is in the high security storage area where
in the lock, allowing it to rotate freely inside the lock. papers, records, plans or cashable instrument, precious metals or other especially valuables
assets arte protected, these security cabinets will be of a size and quantity which the nature of
2. Disc Tumbler Locks - is a lock composed of slotted rotating detainer discs. A specially the business dictates
cut key rotates these discs like the tumblers of a safe to align the slots, allowing the sidebar to
drop into the slots, thus opening the lock. Types of Security Cabinets;

3. Lever Locks - is a type of lock that uses a set of levers to prevent the bolt from moving in 1. Safe - is a secure lockable box used for securing valuable objects against theft or
the lock. In the simplest of these, lifting the tumbler above a certain height will allow the bolt damage. a metallic container used for safekeeping of documents or small items in an
to slide past. office or installation.
- its weight at least 750 lbs.
- should be anchored to a building. security .The student will also define important terms and required to present some output
- its body should at least one thick steel. basis for academic standing.

2. Vault(bank vault) - is a secure space where money, valuables, records, and


THE IRR OF REPUBLIC ACT 5487, THE SECURITY AGENCY LAW
documents can be stored. It is intended to protect their contents from theft,
unauthorized use, fire, natural disasters, and other threats, just like a safe. The protection of individual and his property is one of the oldest tasks in the history.
The pattern of development in private security is what commonly known as law enforcement,
heavily constructed fire and burglar resistance container usually a part of the building however, differs to a considerable degree in many aspects. Thus, the Implementing Rules and
structure used keep and protect cash and documents. Regulation of Republic Act 5487 is the main objective of this chapter
- door steel at least 6 inc. thick.
The primary and fundamental duties of the security guard are to protect lives and
- ceiling, walls, floors 12 inc. thick.
properties of the client he is supposed to serve in accordance with the agreement of his
- resistive up to 6 hours. agency and its client, but these duties are not limited to inspecting/monitoring, bodily
checks/searches individuals and/or baggage’s and other forms of security inspection,
physically manually, or aided with scientifically based electronic systems.
3. File room – it is a cubicle in a building constructed a little lighter than a vault but bigger
size to accommodate limited people to work on the records inside.
License is necessary on the following;
- room should at most be 12 feet high. a. Engage in the business of or private detective agency or training agency.
- it must have the water tight door and at least fire proof for 1 hour. b. Any person operating, managing, directing or conducting a licensed private
security/detective/training agency.
Use of Pass System c. Any person having any participation in the management or operation thereof except
those employed solely for clerical or manual work, shall also secure a license.
1. Single pass system- the badge or pass coded for authorization to enter
specific areas is issued to an employee who keeps it in his possession until his Who may issue the License?
authorization is terminates. - The Chief of the Philippine National Police will issue as prerequisite in obtaining
3. Pass exchange system- an exchange takes place at the entrance of each controlled a license certificate.
area. Upon leaving the personnel surrenders his badge or passes and retrieve back his
basic identification. No License certificate shall be granted to any applicant for license to operate or license to
3. Multiple pass system- this provides an extra measure of security by requiring exercise security profession with the following disqualifications:
that an exchange take place at the entrance of each restricted area.
a. having previous record of any conviction of any crime
b. having previous record of any conviction of any offense involving moral turpitude
c. having been dishonorably discharged or separated from employment or service
Module Title : d. being a mental incompetent
e. being a user/addicted to the use of prohibited drugs or narcotics
Chapter III. Security Guard Forces System(Week 7,8,9,10) f. being a habitual drunkard
g. dummy of a foreigner
1. Introduction
This chapter introduce the basic concept of Security Guard Forces were the
Qualifications a Private Security Guard.
student will learn Qualification, firearms and equipment to include the Ranks,
position,staffing Patterns and Job Description that applicable law in the study of Industrial
No person shall be licensed as security guard unless he possesses the following e. Advance ROTC/CMT graduate or its equivalent.
qualifications:
a. Filipino citizen; Exemptions from Basic Pre-Licensing Training. -
b. High school graduate; 1. Veterans and retired military/police personnel or Those honorably discharged
c. Physically and mentally fit; military/police personnel but shall not however be exempted from taking the refresher
d. Not less than eighteen (18) years of age nor more than fifty (50) years of age (for new training courses or its equivalent.
applicants and SGs in non-supervisory position); and 2. Graduates of ROTC advance/CHDF (or its equivalent in the PNP) Training graduates
e. Has undergone a pre-licensing training course or its equivalent. shall be exempted from the required Basic-licensing Training/Seminar.
Types of License.
Desirable Qualities of Security Guards: a. Temporary License – initial and conditional issuance while awaiting issuance of regular
1. Alertness license identification cards
2. Judgment b. Regular License – generated Private Security Personnel License Card, duration or validity
3. Confidence of which shall be for two (2) years.
4. Physical Fitness
5. Tactfulness
6. Self-Control Renewal of License
7. Interest, Loyalty, Responsible and Trustworthy a. Deadline for Filing and Late Filing.
- The deadline for filing of applications for renewal of License to Exercise
Basic requirements of private security personnel - Profession shall be sixty (60) days prior to the month of the expiry date.
a. Filipino citizen; Applications filed/accepted thereafter shall be penalized for late filing.
b. Not be less than eighteen (18) years of age. b. Failure to file for renewal.
c. Must have taken a private security course/seminar and/or must have adequate training or - The Licenses to Exercise Profession of those who fail to file renewal applications
experience in security business or rendering security/detective services; SHALL AUTOMATICALLY BE CANCELLED upon expiry.
d. Of good moral character and must not have been convicted of any crime or violation of c. Renewal of license to exercise profession shall also be filed with SAGSD, CSG,
these rules and regulations carrying a penalty of prohibition to be licensed; and Camp Crame, Quezon City or through the Firearms, Explosives, Security Agencies
e. Must be physically and mentally fit. and Guards Section (FESAGS), Regional Operation and Plans Division (ROPD) of
the Police Regional Office.

Qualifications for Security Officer The Requirements for renewal of licenseare as follows:
a. Filipino citizen; 1. Application for Social Security ID (E-6 Rev 11-2000 Form);
b. Holder of a Baccalaureate Degree; 2. Application for License of Private Security Guard (PNPSF-01 Revised 2000);
c. Physically and mentally fit; and 3. General Knowledge Examination Result (PASSED);
d. Has graduated from a Security Officer Training Course or its equivalent. 4. Proof of Training;
5. Neuro-Psychiatric Test Clearance;
Qualifications of a private detective.- 6. Drug Test Result/Clearance;
a. Filipino citizen; 7. PNP Intelligence Clearance (DI) or NBI Clearance
b. Physical and mentally fit;
c. Holder of a baccalaureate degree preferably Bachelor of laws or Bachelor of Science in All licensed security personnel must undergo in-service re-training at least once in every two
Criminology; (2) years preferably two months before his/her birth month. The certificate of in-service
d. Graduate of a Criminal Investigation Course offered by the Philippine National Police or training shall be a prerequisite among others, for the renewal of license to exercise
the National Bureau of Investigation or any police training school, or a detective training in profession.
any authorized/recognized training center;
guards of the Bureau of Jail management and Penology, Municipal or City jail guards, and
DEFINITION OF TERMS members of the Philippine National Police or of any other law enforcement agency of the
for purposes of and when used, the Following terms shall be construed; Government.

Person – shall include not only natural but also juridical persons such as single
proprietorships, partnerships, corporations, companies or associations, duly organized and Private Detective (PD) – shall mean any person who does detective work for hire, reward or
registered with the Securities and Exchange Commission and/or the Department of Trade and commission, other than members of the Armed Forces of the Philippines, guards of the
Industry. Bureau of Jail Management and Penology, municipal or city jail guards, and members of the
Philippine National Police or of any other law enforcement agency of the government.
Private Security Industry – shall cover those in the legitimate business of providing private
security and detective services.
Private Security Personnel – shall be natural persons which include private security guards,
Private Security Services – shall include the act of providing or rendering services to watch private detectives, security consultants, security officers and others that may be classified
an establishment whether public or private, building, compound/area or property, to conduct later, rendering/performing security and/or detective services as employed by private security
access control/denial in any form whether physically, manually or scientifically by electronic agencies and/or private firms.
monitoring systems, for the purpose of securing such area/property and at the same time
ensuring safety and protection of persons within such areas, to maintain peace and order
within such areas, to conduct private security training, and/or to conduct investigation. It shall Government Security Personnel – shall be natural persons which include government
also include the act of contracting, recruiting, training, furnishing or posting any security Security guards, detectives, security consultants, security officers and others that may be
guard, to do its functions or solicit individuals, businesses, firms, or private, public or classified later, except those of the Armed Forces of the Philippines, Philippine National
government-owned or controlled corporations to engage his/its service or those of his/its Police, Bureau of Jail Management and Penology, Municipal or City Jail guards
security guards, for hire, commission or compensation thru subscription or as a rendering/performing security and/or detective services as employed by government entities.
consultant/trainer to any private or public corporation.

Private Detective Services – shall include among others the act of providing personal security Private Security Agency (PSA) – shall mean any person association, partnership, firm or
protection, inquiry and information gathering, preemployment verification and individual private corporation, who contracts, recruits, trains, furnishes or posts any security guard, to
background profiling, providing assistance in civil liability and personal injury cases, perform its functions or solicit individuals, businesses, firms, or private, public or
insurance claims and fraud, child custody and protection cases, for the purpose of assisting in government-owned or controlled corporations to engage his/its service or those of his/its
gathering information leading to determination and/or prevention of criminal acts and/or security guards, for hire, commission or compensation thru subscription or as a
resolution of legal, financial and personal problems. consultant/trainer to any private or public corporation whose business or transactions involve
national security or interest like the operation and/or management of domestic or ocean
vessels, airplanes, helicopters, seaports, airports heliports, landing strips etc., or as consultant
Private Security Guard (SG) – sometimes called private security guard or watchman shall on any security related matter, or to provide highly specialized security, detective and
include any person who offers or renders personal service to watch or secure either a investigation services like gangway security, catering security, passenger profiling, baggage
residence, business establishment, or buildings, compounds, areas, or property, examination, providing security on board vessels or aircraft, or other security needs that PNP
inspects/monitors bodily checks/searches individuals and/or baggage and other forms of SAGSD may approve.
security inspection, physically/ manually or scientifically electronic, including but not limited
to, logging concessions and agricultural, mining or pasture lands, transportation, for hire or
compensation , or as an employee thereof, including any employee of the national or local Private Detective Agency (PDA) – shall mean any person association, partnership, firm or
governments or agencies or instrumentality’s thereof and or government owned or controlled private corporation, who contracts, recruits, trains, furnishes or posts any private detective, to
firm or corporations who is employed to watch or secure government buildings, compounds, perform its functions or solicit individuals, businesses, firms, or private, public or
premises and other properties, other than members of the Armed Forces of the Philippines, government-owned or controlled corporations to engage his/its service or those of his/its
detectives, for hire, commission or compensation thru subscription or as a consultant/trainer
to any private or public corporation or as consultant on any detective related matter, or to - Any Filipino citizen or corporation, association, partnership, one hundred percent
provide highly specialized detective and investigation services, or other detective needs that (100%) of which is owned and controlled by Filipino citizens, may organize and
SAGSD-CSG may approve. maintain a Private Security Agency or private Detective Agency.

Basic requirement of an operator or manager of agency –


License to Exercise Profession – shall mean any document issued by the Chief, Philippine A.The operator or manager of an agency including, managers of branch offices, must be:
National Police or his duly authorized representative recognizing a person to be qualified to 1. Filipino citizen;
perform his duties as private security or training personnel. 2. Not be less than twenty five (25) years of age;
3. College graduate and/or a commissioned officer in the inactive service or retired
from the Armed Forces of the Philippines or the Philippine National police;
License to Operate (LTO) – is a License Certificate document, issued by the Chief, Philippine 4. Has taken a course/seminar on industrial Security Management and/or must have
National Police or his duly authorized representative, authorizing a person to engage in adequate training or experience in security business; and,
employing security guard or detective, or a juridical person to establish, engage, direct, 5. Good moral character
manage or operate an individual or a private detective agency or private security
agency/company security force after payment of the prescribed dues or fees as provided in B. New applicants for license to operate shall be required to obtain a minimum capitalization
these Rules and Regulations. of one million pesos (P1, 000,000.00) with a minimum bank deposit of five hundred thousand
(P500, 000.00) pesos in order to start its business operation.

Company Guard Force (CGF) – a security force maintained and operated by any private Limitations, Disqualifications and Prohibitions.
company/corporation utilizing any of its employees to watch, secure or guard its business a. No person shall organize or have an interest in more than one agency.
establishment premises, compound or properties.
b. Elective or appointive government employees who may be called upon on account of
the functions of their respective offices any person related to such government
Government Guard Unit (GGU) – a security unit maintained and operated by any government employee by affinity or consanguinity in the third civil degree, shall not hold an
entity other than military or police, which is established and maintained for the purpose of interest, directly or indirectly, in any security or watchman agency.
securing the office or compound and/or extension of such government entity.
c. No agency shall offer, render or accept services in gambling dens or other illegal
business establishments or enterprises.
SAGSD as used herein shall refer to the current PNP Civil Security Group Security Agency
and Guard Supervision Division or any other PNP Office that may be designated later as the
primary office for supervision of the implementation of these rules and regulations. d. The extent of the security guard service being furnished by the security agency shall
not go beyond the compound and/or property of the person or establishment
contracting the security service except when the security guards is escorting big
PADPAO refers to the Philippines Association of Detective and Protective Agency Operators, amount of money or valuables.
Inc., which is an association of all licensed security agencies and company security forces.
Prohibition on “KABIT SYSTEM” operators.
Duty Detail Order is a written order/schedule issued by a superior officer usually the private
security agency/branch manager or operations officer assigning the performance of private No licensed security agency shall operate, promote and enter into an agreement of
security/detective services duties. “merger“ (kabit system) except when Merger of security and detective agencies approve by
the Securities and Exchange Commission.
Who may organize and maintain a Private Security Agency and Private Detective Agency.
Any of the following circumstances or a combination thereof shall be considered a. Regular LTO – issued, after complying with licensing requirements, to private security
prima-facie evidence of the existence of “Kabit System”. agencies having obtained and maintained in its employ at least two hundred (200) security
personnel, and to company guard forces and private detective agencies having obtained and
a) Maintaining a separate branch, unit or subsidiary office aside from the maintained in its employ at least thirty (30) security personnel and private detectives
main office of the agency situated within the same locality; respectively. Such license may be renewed following conformity with renewal requirements
b) Receiving direct payments from the agency’s clientele and issuing prescribed in a Standard Operating Procedure (SOP).
officials receipt of their own distinct from that issued by the agency concerned;
c) Remitting directly Social Security System premiums, Medicare b. Temporary LTO – initial and conditional issuance to new private security agencies and to
contributions and other premium for other policy insurance benefits by the PSAs holding regular LTO not able to maintain the minimum number of security personnel
aforementioned branch, unit or subsidiary office; or conform to standards, for them to be able to attain the 200 minimum number of security
d) Existence of an agreement between the licensee and a branch manager personnel or comply with licensing standards, prior to issuance/re-issuance of regular LTO.
thereof, whereby the latter obligates himself to pay a certain percentage of his income Such issuance shall not be renewable nor be extendible.
to the former on the condition that the control and supervision of the guards posted
by said branch shall course on the manager thereof and that the licensee shall be Unless sooner cancelled or revoked and provisions hereof modified, all licenses to operate
exempt from liabilities/ obligations attendant to the operation of said branch. shall have a validity of two (2) years. Temporary LTOs upon expiration are automatically
e) Keeping/maintaining separate payrolls for the branch employees signed cancelled.
and/or approved by the branch manager only;
f) Absence of record of monthly income remittances to the main office when Security Personnel-Employee Benefits. The employer Private Security/Training/Detective
said branch is authorized to make collections from the clients of the licensee; and Agency, Company Guard Force, Government Guard Unit shall be responsible and held
g) All other similar acts tending to show separate and distinct relationship/ accountable for the compensation of the following benefits due their respective security
personality/ ownership/ management. personnel as required by law:
a. salary and wage prescribed in the minimum wage law;
Guard/Personnel Requirements; b. health, medical and insurance benefits;
a. No regular license shall be granted to any private security agency unless it has a minimum c. separation and retirement pay and benefits;
of two hundred (200) licensed private security personnel under its employ. d. Pag-ibig benefits
b. No regular license shall be granted to any company guard force or private detective agency e. others as may be prescribed later
unless it has a minimum of thirty (30) licensed private security personnel under its employ.
c. The maximum number of private security personnel that a PSA/CGF/PDA may employ Possession of Firearms by Private Security Agency /Private Detective
shall be one thousand (1000). Agency/ Company Security Force/ Government Security Unit.
- Private Security Agency/Private Detective Agency/ Company Security
TYPES OF SECURITY GUARDS Force/Government Security Unit shall be entitled to possess firearms
- The number of firearms shall not exceed one (1) firearm for every two (2)
1. Company guard forces – A security guard recruited and employed by the security guard in its employ.
company. - No private security agency/private detective agency/company security
2. Security Agency service – A guard hired by company belonging privately license force/government security unit shall be allowed to possess firearms in excess of
security. 500 units.
3. Government Guard forces – A security guard recruited and employed by the
government. Restriction to possess high-powered firearms.
- A private detective agency/private security agency/ company security services/
Status and Validity of License to Operate. The status of license certificate in Section 7 above government security unit is not allowed to possess high caliber firearms
shall be issued in conformity with the following: considered as military-type weapons such as;
1. M16
2. M14 4. Purpose
3. cal .30 carbine 5. Inclusive dates of detail
4. M1 Garand, and 6. Firearms description and license number
5. other rifles and special weapons with bores bigger than cal .22, to include 7. Authorized uniform to be used
pistols and revolvers with bores bigger than cal .38 such as cal .40, cal .41, 8. Other specific instructions/remarks
cal .44, cal .45, cal .50, except cal .22 centerfire magnum and cal .357 and 9. Signature and designation of issuing officer
other pistols with bores smaller than cal .38 but with firing characteristics of
full automatic burst and three-round burst. Justification for confiscation of firearms.
a. When the firearm is about to be used in the commission of a crime;
However, when such entities are operating in areas where there is an upsurge of lawlessness b. When the firearm is actually being used in the commission of crime;
and criminality as determined by the Chief, PNP, Police Regional Office Regional Director or c. When the firearm has just been used in the commission of a crime;
their authorized representative, they may be allowed to acquire, possess and use high- d. When the firearm being carried by the security guard is unlicensed or a firearm not
powered firearms under conditions. authorized by law and regulation for his use;
e. When the confiscation of the firearm is directed by the order of the court;
Duty Detail Order (DDO) f. When the firearm is used or carried outside the property, compound or establishment
- Private security agency/private detective agency / company security services/ serviced by the agency without proper authority; or
government guard unit detailing their security personnel or while escorting big g. When a security guard does not possess any license to exercise his profession.
amount of cash or valuable outside its jurisdiction or area of operation, under the
following conditions: In all the above cases, the confiscating officer shall inform immediately the agency
concerned.
a. DDOs for the purpose of transporting agency licensed firearms from agency
vault/office to post and back for posting, for routine rotation, replacement of firearms Disposition of confiscated firearms
or for conduction service duties, shall be issued for not more than a duration of Any law enforcement officer authorized by law effecting the confiscation of firearm
twenty-four (24) hours; under any of the circumstances mentioned in the preceding section shall inform the Chief,
Philippine National Police thru the CSG within twenty-four (24) hours after such
b. DDOs for the purpose of post duties not requiring transport of firearms outside of the confiscation. The firearm shall be turned over immediately to the nearest Philippine National
physical compound or property of a client or client establishment/firm shall be issued Police unit/station which shall be responsible for the conveyance of same to the FED, CSG,
for not more than a thirty (30) day duration; except when charges have been filed against the suspect, in which case, the firearm shall be
turned over to the concerned court.

Transport of firearm shall require the appropriate transport permit issued by the Firearms Revocation of license. License to possess firearm may be revoked under any of the following
and Explosives Division or Police Regional, Provincial or City Office nearest the place of instances:
origin; a. Failure to submit any issued firearm for verification as required.
b. Carrying of firearms by security personnel without appropriate Duty Detail Order (DDO).
The issuance of DDOs for private detective personal protection service duties shall be c. When the firearm serial number has been duplicated on another firearm or using one
prescribed in an SOP to be issued by NHPNP in consideration of Rule XII of these rules and firearms license for more than one firearm other than those stipulated in the license.
regulations; and d. Carrying of firearms outside of the place stated in the permit or in places prohibited under
the law; or
All DDOs shall indicate the following: e. Conviction of the operator or manager of the agency of any crime.
1. Name, address and telephone number of agency f. When the firearm was reported lost.
2. Issue serial number and date of DDO
3. Complete name and designation of grantee Stocking of ammunition.
- Stocks of ammunition shall not exceed a basic load of fifty (50) rounds of BASIC EQUIPMENT
ammunition per unit of duly licensed firearms. The following shall comprise of the Basic Equipment of a security guard which shall
- Individual issue to each security guard shall be limited to one half of such basic be made mandatory and ready for his/her use while performing post, conduction, armored
load or twenty five (25) rounds for every security guard. service duties and the like:
1. Prescribed Basic Uniform
UNIFORM, EQUIPMENT AND PARAPHERNALIA 2. Nightstick/baton
3. Whistle
The uniform of private security guard/either from the private security agency/company 4. Timepiece (synchronized)
security force/ government security unit shall consist of the following; 5. Writing pen
1. Headgear 6. Notebook and duty checklist (electronic or not)
2. service shirt 7. Flashlight
3. service trousers 8. First Aid Kit
4. service belt and 9. Service Firearms (as required)
5. footwear as herein prescribed. b. The security agency shall have the responsibility of ensuring the availability and issuance
of the basic equipment to its posted guards.
Color of the uniform c. Security Guards shall be responsible for inspecting operability of basic equipment issued to
- Fast navy blue thick fabric for the trouser for daily security officers wear and for him, and be responsible for keeping himself acquainted with the proper use of these.
service shirts of field or perimeter guards
- Light blue and/or white service shirts for internal guards for a private security Other Equipment.
agency; Apart from the mandatory basic equipment, other equipment may be issued to the
- light gray for company security force and security guard as determined necessary following client contract requirement, provided that
- white for government security unit. the security guard shall have acquired the prior training/knowledge on the proper use of the
same but not limited to the following:
Service Bush jacket shall be worn only by the Directorial and Staff Officers of agency 1. Handcuffs
2. Metal detectors
Gala Uniform. - It shall be worn for ceremonial purposes only and at the expense of the 3. Communications Radio
establishment conducting the ceremonies. 4. Stun devices
5. Armor vests
Necktie. - It shall conform to the color of the blouse five (5) centimeters wide. 6. canine (k-9) units

Service Trouser. - Fast Navy blue color, straight cut, slanted pockets and two back pockets Categories of Private Security Training
without over flaps. The following are the general categories of Private Security Training:

Service Belt. – Of leather material which shall be used as pistol belt measuring four and a a. Pre-Licensing Training Programs. As a matter of licensing prerequisite, Pre-
half (4-1/2 centimeters in with. Licensing Training Programs include all training and/or academic programs and
courses whose objective is to indoctrinate the individual with the basic skills and
Footwear. – educational backgrounds, It includes but is not limited to the Basic Security Guard
(a) Service shoes. - Black leather shoes with rubber heels and soles, plain top low-cut Course, the Security Officers Training Course, Private Security Agency Operators
and black shoelace to be worn with plain black socks. Training/Seminar, Private Security Training Trainors’ Course.
(b) Rubber rain boots. - Optional as the nature of the post requires. b. Refresher Training Programs. This shall refer to periodic and non-periodic training
programs and courses designed with the objective of reinvigorating and/or
developing basic skills and knowledge gained previously or gained while in the
exercise of his/her profession as a matter of experience, to enhance current in-service
and future individual and/or collective exercise of profession. 4) Police Offices/Units assigned/designated to conduct Private Security Training, which
c. Specialized Training Programs. This shall refer to training program and courses other shall not be required TESDA registration but shall require prior official authority of
than those described in the preceding categories designed at developing previously- SAGSD, may conduct training in all categories but subject to requirements of Rule
gained skills and knowledge, designed at augmenting or expanding current skills and XI of these rules and regulations or as may be prescribed by SAGSD.
knowledge, and/or designed at developing current skills and knowledge to suit
identified future applications. It includes but is not limited to such courses as the 5) Police Supervisory Office (presently the SAGSD) as having the primary
Intelligence/Investigator Training Course, Basic Crises Management Course, responsibility of the conduct, supervision, and control of all private security training
Personal/VIP Security Training Course, Armoured Car Crew Training Course, Bomb and training services.
Disposal Training Course, Bank Security Training Course, and Basic Aviation
Security Specialist Course. b) Training Instructor. Any person who renders personal and/or professional trainor,
instructor, and/or teacher services relative to private security training by virtue of his
profession, expertise, knowledge, and/or experience in a particular field of knowledge.
Categories of Private Security Training Institutions. Training Instructor includes but is not limited to currently or retired licensed or accredited
a) Private Security Training Systems. Government or duly registered private training private security training instructors, professional educators, and/or field/practicing experts.
establishments, associations, firms, partnerships, corporations and the like, which provide the
physical facilities and installations, and the appropriate management, administrative, and
instruction/training staff necessary and for the purpose of conducting Private Security INSPECTIONS
Training: a. Post to Post Inspection – Inspection conducted on detailed/posted security guards to
determine proper compliance of regulations related to uniforms, general physical appearance,
1) Private Security Training Centers – Private Security Training Systems whose primary documentation and other requirements in the actual service of duty. This may also be an
purpose is to provide private security training and training services, may be qualified inspection conducted as an aid to investigation.
to offer and conduct Private Security Training Programs in all categories provided b. Administrative Inspection (Office, Files and Records Inspection) – Inspection conducted to
that, it has secured Regular accreditation from the SAGSD upon compliance and determine compliance with records, files and other administrative requirements for operating
conformity with the latter’s application and approval requirements, and prior TESDA a security agency and/or exercising security profession.
registration/accreditation.

2) Other Juridical Entities - Private Security Training Systems whose primary purpose is
not to provide private security training and training services, may be qualified, on Module Title :
interim basis, to offer and conduct Private Security Training for a specific
course/class and duration under Refresher and Specialized programs only, provided Chapter IV: personnel, Document, and Information Security (Week 11)
that, it has secured prior Interim Accreditation from the SAGSD upon compliance
and conformity the latter’s application and approval requirements. Such Interim 1. Introduction
Accreditation is also issued to those with Regular Accreditation but which cannot This chapter introduce the Personnel,Document, and Information Security
comply with the renewal requirements. were the student will learn the Importance of Protection of sensitive materials that
applicable law in the study of Industrial security. The student will also define important
3) Watchman/Security and/or Detective Agencies defined under RA 5487 as amended, terms and required to present some output basis for academic standing.
which shall not be required prior accreditation to operate, by virtue of their License to
Operate as Private Security Agency, Company Security Force or Government Personnel Security
Security Force, may be authorized to conduct only in-house refresher or specialized
training for its own security personnel, upon compliance and conformity with
application and approval requirements of SAGSD.
Includes all the security measures designed to prevent individuals of doubtful loyalty, TYPES OF PSI
character, integrity from gaining access to classified matters and sensitive facilities. It is
composed of conducting personnel security investigation and security education programs. 1. National Agency Check – this is an investigation of an Individual made upon the basis of
written information supplied by him in response to official inquiry and reference to national
Personnel Security Investigation - is an inquiry into the reputation, character, agencies as such;
integrity, discretion moral and loyalty of an individual in order to determine a person’s
suitability for appointment or access to classified matters. A. NBI - is an agency of the Philippine government under the Department of Justice,
responsible for handling and solving major high profile cases that are in the interest of the
Purpose of Personnel Security: nation.

1. To insure that a firm hires those employees best suited for the firm. B. NICA - is the primary intelligence gathering and analysis arm of the Philippine
government, in charge of carrying out overt, covert, and clandestine intelligence.
2. Once hired, to assist the providing the necessary security to these employees while
they are carrying out them functions. C. PNP Directorate for Intelligence Clearance.

Basic elements in Personnel Security: 2. Local Agency Check(LAC) – investigation from the local government agencies, work,
school attended, residence. It also includes all local clearances.
1. It involves all measures instituted to safeguard company’s employees and those
coming to the place of business reasons or as guest. Types of Local Agency Check (LAC):

2. Access control in relation to physical security system can further perform in 1. Barangay Clearance
controlling function and out specific premises.
2. City and Municipal Clearance
3. Personnel control involves the use of various identification card system, passes,
permits and clearances used by a particular installation. 3. Local Police Clearance

4. Executive protection and background investigations are probably the most classified 4. Court Clearance
and prominent aspect in personnel security.
General Techniques of PSI:
5. Due diligence is the rule of thumb when it comes to protecting people and corporate
1.BACKGROUND INVESTIGATION – is called as the comprehensive investigation other
asset.
than the NAC and LAC, to verify information on the application and to obtain pertinent
Security Chain – personnel security is the weakest link in the security chain. This weakness information.
can be the best minimized or eliminated by making init personnel security through good
Factors to consider in conducting a BI
training program.
1.Loyalty - refers to a faithfulness of a person to company/organization.
Types of National Agency Check (NAC):
2. Character – refers to the attitude of a person on things that is favorable or unfavorable to
1. National Bureau of Investigation Clearance
him.
2. PNP Directorate for Intelligence Clearance.
3. Integrity - is a concept of consistency of actions, values, or principles.
4. Reputation - overall quality or character as seen or judged by people in general. Wherein the badge or pass is coded for authorization to enter a specific area
is issued to an employee who keeps it in his possession until his authorization
5. Discretion is change or until he is terminated.
6. Morals - used by authority figures as a generic value judgment of the willpower, obedience 2. PASS EXCHANGE SYSTEM
and self-discipline. The holder of a pass exchanges a one-color coded pass at the entrance to a
controlled area for another which carries a different color specifying the
Components of Complete BI:
limitations of the holder’s authorization. Upon leaving the holder surrenders
- Applicant’s Name the controlled area pass/badge in exchange for his basic authorization
identification.
- Date of birth
NOTE: In this system the second badge never leaves the controlled area,
- Present residence thus reducing the possibility of switching, forging or alteration.

- Personal history 3. MULTIPLE PASS SYSTEM


This system provides an extra measure of security by requiring that an
- Marital history exchange pass/badge take place at the entrance to each restricted area within
a controlled area.
- Credit Cards

2. Positive Vetting – is the process of inspecting or examining through interview.


BADGE AND PASS CONTROL
3. Prowling – the process whereby a subject asked critical questions that are predicted to test ❑ The system should have a complete record of all badges and identification cards
or observe his behavior. issued, returned, mutilated or lost by serial number and cross-indexed alphabetically
❑ The list of passes and badges should be checked by a supervisor from time to time for
4. Deception Detection Techniques – the process of using devices in detecting deception. its accuracy and authenticity.
❑ Passes and badges reported lost should be invalidated and security guards at
5. Financial and Lifestyle Inquiry – this type of investigation is gather information on income
and mode of living of the applicant. entrances be informed through conspicuous posting.

6. Undercover Investigation – this type of technique is to identify the true identity in order to
obtain criminal prosecution.
PERSONNEL IDENTIFICATION
PASS OR BADGE SYSTEM The most practical and generally accepted system in personnel identification is the
use of badges and identification cards. Generally speaking, this system designates when and
All personnel entering and leaving any area of a facility should be identified and where and how passes should be displayed, and to whom; what is to be done in case of loss of
checked for their authorization to be there. Each personnel should be identified by a badge or the pass; procedures for taking a pass from terminated employees; and a system in
pass, using one of several systems: cancellation and re-issue of all passes; either as a security review or when a significant
number of badges have been reported stolen or lost. To be effective;
1. SINGLE PASS SYSTEM
❑ Badges must be tamper-resistant, which means that they should be printed or The term document in security matters, covers any form of recorded information either
embossed on a distinctive stock which work with a series of design difficult to printed, written, drawn, painted, sound recording, films, maps, etc. The object is to secure and
reproduce. control the sensitive information contained therein so as not to prejudice the firm, company
❑ They should contain a clear and recent photograph of the bearer, preferably in or agency.
color.
❑ The photograph appearing in the badge/pass should be at least one inch square and a. Policy – Security of document and information is the responsibility of all
concerned.
should be updated every two or three years or when there is any significant change
b. Regulation – Anybody found guilty violating document and information security
in facial appearance of the bearer.
shall be dealt with accordingly.
❑ It should additionally contain vital statistics, such as date of birth, height, weight, c. Doctrine – Access to information is based on the Need to Know* and not by
color of hair and eyes, sex and thumbprints. position.
d. Practice – Authority to have access to classified information is not permanent
but can be withdrawn by the originating authority.
TYPES OF CONTROLLED AREAS * Need to Know – Is the principle whereby access to classified matter may only be
1. CONTROLLED AREAS given to those persons to whom it is necessary for the fulfillment of their duty.
These are areas whose access is restricted as to entrance and movement to all
Persons are not entitled to have access to classified matter solely by virtue of their
but authorized personnel and vehicles. It should be additionally marked by a
status or office. *
fence or other barrier, and access to it should be limited to as few guest as
possible. Identity document (also called a piece of identification or ID) is any document which may
be used to prove a person's identity.
2. LIMITED AREAS
These are areas within the controlled area where a greater degree of security Some countries issue formal identity documents, as national identification cards which may
is required. be compulsory or non-compulsory, while others may require identity verification
using regional identification or informal documents. When the identity document
3. EXCLUSION AREAS incorporates a person's photograph, it may be called photo ID.
These areas are only used for handling and storage of high value cargo and
classified documents. The number of people authorized to enter this area In the absence of a formal identity document, the following may be presented for
should be strictly limited, and this area should be under surveillance at all identification;
time. - A driver's license
- Passport
- National Identification card if available

The identity document is used to connect a person to information about the person, often in
a database. The photo and the possession of it is used to connect the person with the
document. The connection between the identity document and information database is based
on personal information present on the document, such as the bearer's full name, age, birth
Document Security date, address, an identification number, card number, gender, citizenship and more. A
unique national identification number is the most secure way, but some countries lack such
is the branch of security involved in the protection of documents and classified numbers or don't mention them on identity documents.
papers from loss, access by unauthorized person, theft, damage and compromise through
disclosure.
Two (2) kinds of Documents:
Classification of documents:
1. Personal – letters, diary, and notebooks. Class I - Vital/company confidential/secret documents

2. Official Document – orders, manuals, letters and overlays. Class II - Important/Private confidential documents.

Document/Information Cycle: Class III - Useful documents

1. Creation Class IV - Non-essential documents

2. Classification Types of Classified Matters:

3. Storage 1. Top Secret (green) – information the unauthorized disclosure it would cause
exceptional grave damage, politically, economically and military operation.
4. Retrieval
2. Secret (red) – information would endanger national security and serious injury an
5. Retention/Purging advantage of foreign nation.
6. Transfer 3. Confidential(blue) – it would be prejudicial to the interest and prestige of national
7. Disposition government agency and embarrassment of unwanted injury.

Categories of Document: 4. Restricted (white or no color) – which requires protection other than those determines
secret, top secret, and confidential.
1.Category A
Rules in Classifying Information:
- contains reportable time, it is critical information, forwarded delay, critical to
friendly operation and requires immediate action. 1. Classified according to their content.

2. Category B 2. Classification should classify in group physically connected.

- contains communications, cryptographic documents and be classified secret and 3. Transmittal documents and endorsements should be shall include automatic
special handling. downgrading.

3. Category C 4. Classified matters obtain from other department should retain.

- it has an intelligence value, contains exploitable information regardless of its


contents. 1. Module Title :
4. Category D Chapter V. Risk Analysis and Security Hazards(Week 13,14,15)
- no value, yet lower level will never classify documents and no decision made. 2. Introduction
This chapter introduce the Risk analysis and Security hazards that applicable 2. Perimeter Security – uniformed men secures the immediate areas surrounding the
law in the study of Industrial security .The student will also define important terms and engagement.
required to present some output basis for academic standing.
3. Advance Security - sanitize and at the place before the arrival of the VIP.
3. Learning Outcome/Objective
At the end of the chapter, the student shall be able to; 4. Close-In security – accompanies the VIP wherever it goes and maximum 4 persons.

a. Discuss the different types of security hazards pilferage and other security hazards 5. Reserve Security – on standby or possible back-up or reinforcement.

4. Learning content / Topic/ Lesson proper 6. Routine Security – neutralize the possible route of the VIP party.

Security Hazard – any act or condition which may result in the compromise of information, Importance of VIP or Dignitary Security
loss life, and loss of destruction of property or disruption of the activity of the installation. 1. To ensure protection of the very important person of dignitary
2. To clear the routine routes
Types of Hazards: 3. To avoid assassination plot and or ambuscade to visiting VIP
4. To establish coordinate efforts with foreign and local agencies
1. Natural Hazards – hazards which arise from natural phenomena.
Four (4) Common Elements in all Assassination:
2. Human-man made hazard – result on the state of mind, attitude, weakness, or character
traits of one and more persons. 1. Victim

Sabotage – he is the most dangerous which deal of planning and implementing security, 2. Assassin
experiential and he can work alone in several places.
3. Modus operandi (Mode of Operation)
Espionage – and very dangerous and underestimate with extensive training and highly
4. Opportunity
effective information and he can defeat his own game if proper techniques are undertaken.
Crisis – is a decisive points of a condition, improper handling in which immediately places
Subversive activity – their activity is to know the weaknesses of organization in form of
under threat or danger of one’s life, limbs, freedom and property.
propaganda, morale and etc.
Crisis Management – is the totality of action of handling or responding to a given crisis
VIP Security – aims to protect people from physical violence, whether external states from
situation.
violence, sub state actors and domestic abuse from predatory adults.
Crisis Management Plan – is a complete and comprehensive plan of actions designed to
VIP – Very Important Person.
protect life, limbs, freedom and property, before and during any given situation.
Escort – one and more person accompanying to give protection or to pay honor.
Two Kinds of Crisis according to Origin:
Bodyguard – a person or group of person responsible to protect one of more specific person.
1. Natural Crisis – events caused by force of by nature.
Organization of VIP Security:
2. Man-made Crisis – events caused through instrumentality of men.
1.Area Security – covers and prophylactic (neutralize) the surrounding areas of engagement.
Work Stoppage – is a condition of an enterprise whereby normal work operation is stopped as Planning is a corporate and extensive responsibility. This is a decision making in
a result of strike or lockout. order to answer the precepts of knowing where we are, where we are going, and determining
the best way to get there.
Two major causes of Work Stoppage:
Security Survey
1. Strike – is a temporary stoppage of work because of labor industrial dispute.
A critical on-site examination and analysis of an industrial plant, business, home or
2. Lockout – is the temporary refusal of any employer to furnish work. public private institution done to ascertain the facility’s current security status, to identify
deficiencies or excesses in current practices, to determine what protection is needed, and to
Risk
make recommendations for improving the over-all level of security at that location.
is associated with almost every activity especially in the business world. Risk is a
Objective of Security Survey :
potential loss or damage to an asset. It is a financial loss to an enterprise, business or
organization. 1. To determine existing conditions of physical security of corporate property.
Risk Analysis is a management tool, the standards for which are determined by 2. To measure the compliance of employees to security.
whatever management decides it wants to accept in terms of actual loss.
Planning of Security Survey:

1. Verify the need.

Module Title : 2. Obtain organizational support.

Chapter V. Security Survey, Security Inspection and Security 3. State the survey’s executives
Investigation(Week 16,17)
4. Determine how data will be gathered
1. Introduction
This chapter introduce the importance of security survey, security inspection 5. Develop alternatives
and Security Investigation that applicable law in the study of Industrial security .The
student will also define important terms and required to present some output basis for 6. Prepare schedule of activities.
academic standing.
Security Inspection
Security Survey and Inspection
Inspection is one of the most important parts of security management process which
- the basic instrument for determining security vulnerability id the security survey. insure that risks are recognized and covered in security programs, and that programs are
necessary and cost-effective. The assessment of what is happening from a security point of
- critical on site examination and analysis of properties to determine what protection view is made through an inspection program.
needed and improved and also what recommendation should develop.
Types of Security Inspection:
Security Planning
1.Continuous Inspection – constant changes in the organization, in terms of attitudes life
style, moral and values and advancement of technological modifications.
2. Formal or Informal – hired a new security administrator or initiated a security department 4. Security reminders- it is commonly manifested in office memorandum, announcement,
or program. posters place at strategic areas within the company.

3. Structure or Unstructured Inspection Security promotion- it is a positive effort to sell security or make the employees more
Structured inspection – is the one moves systematically from one area to other while involved in the implementation of security measures.
Unstructured inspection which means to a conduct in random manner.
5. Special interviews- it is conducted with the aide of senior company officials to facilitate
Dr. Norman Bottom and Professor John Kostanoski – have applied a system approach to compliance by means of example.
the problem of assets protection. Formulated as a new way of considering security and loss
prevention and called “WAECUP” (an acronym for waste, accidents, and error, crime, and 6. Debriefing- serves to place the person ion special notice of his continuing responsibility to
protect classified information which he has knowledge of.
unethical practices).

The Purposes of Plants/Establishment Security and Protection:


Security Audit – it is essentially an assessment and efficiency of the implementation and
1. To protect the establishment in order to facilitate the operation of facilities, enforcement of the organization’s security policy.
equipment and machineries.
2. To protect the factories its utilities and facilities against activities that would Newel Andrews
slowdown, interfere with or halt its production. W – wearing of the uniform properly with sense of pride which includes passion and
3. To protect the establishment against activities which would stop machineries, commitment.
equipment, facilities and personnel performing their intended function. O – observing and reporting incidents through person, object, place or event (POPE).

R – responding to emergencies
Security Education K – know your post, specific duties and responsibilities as a part of the established standard.

The basic goal of security education is to acquaint all the employees the rationale behind the Best Practices in the Conduct of Security Assessment:
1. Interview the police
security measures and to ensure their cooperation at all times.
2. Drive the neighborhood.
Phase of security Education; 3. Inspect the property.
4. Look for graffiti.
1. Initial interview - it is the first contact with security and should be formally conducted. Its 5. Visit the merchants or tenants.
6. Assistance from non-security personnel.
purpose is to impart security concern, its importance to the company and the penalties that
7. Review prior security reports.
would result to violation of company rules, regulation and security measures. 8. Evaluate the security needs.
9. Update the emergency procedures.
2. Training conference- it is normally held in the training period. Conducted for at least a
10. Discuss audit findings with top management.
period of hours, its concern is to reiterate to employees that security is an additional burden
imposed on them as part of the company. Security Investigation – is a planned and organized determination of facts concerning specific
loss or damage of assets due to threats, hazards or unsecured conditions.
3. Refresher reminders- it reminds individuals of their job responsibility. It is also serves a
forum to resolve security problem and explain new rules and regulations. Objectives of Security Investigation:
1. To determine the circumstances of an event that caused loss, harm, or damage of
person or properties.
2. To determine who are responsible in the incident. Emergency – is a sudden, generally unexpected occurrence or set of circumstances
3. To determine who are liable for loss, harm, or damage as a result of the incident. demanding immediate action.
4. To recover or find restitution for the loss or damage.
Disaster – is the unscheduled event that causes emergency
5. To find ways and means to prevent the incident from recurring. Crisis – is the turning point of a disaster or emergency, if not contained or controlled.

Guidelines for a Successful Security Investigation: Disaster Management – is the systematic management of disaster from the initial stage to its
termination using various tools to minimizes lost of lives, damage to property and enhance
1. Review the incident report – this is the process of determining the veracity and authenticity rehabilitation.
of the source and stated information.
Types of Emergency:
2. Prepare Investigative Plan – there must be a prudent chronological steps in the execution of 1. Earthquake
the investigation. 2. Typhoon
3. Prepare of Investigative File – use a standard size of folder with case number and label 3. Tsunamis
upon the conclusion of the case it should be kept and secured according to the policy of the 4. Volcanic eruption fire
company in keeping records cases. 5. Fire’
6. Explosion
Systematic Approach to Investigation: 7. Building Collapse
1. Define the Investigative Problem 8. Leakage of gas or toxic fumes
2. Collection of Relevant Data 9. Bomb threat
3. Methods and Sources to be used 10. Strikes
4. Analysis and Verification of Information Gathered 11. Work Accidents
5. Verification Methods 12. Enemy Attack
6. Drawing the Conclusion
Emergency Response Team – must be established to become active during increased threats
Difficulties in Investigation: levels or when emergency situation occurs.
1. Absence of eyewitness/witnesses.
2. Motive unknown b. Understand the process of security Investigation.
3. Lack of physical clues (evidence) b. Report via messenger video call/zoom

Qualities of Effective Investigation:


1. Objective – all facts are discussed as perceived without any distortion and the manner of
presentation is free from unwarranted opinion.
2. Thorough – full detail, exhaust all available means, factual to arrive in a sound and
convincing conclusion.
3. Relevant – significant and demonstrated its relation to one another.
4.Accurate – free from error.
5.Current – terminology is generally accepted.

Emergency and Disaster Management

You might also like