0% found this document useful (0 votes)
14 views15 pages

Iisc Review

The document outlines the principles and concepts of security, emphasizing the importance of protecting life over property, the need for layered security measures, and the involvement of all personnel in security protocols. It also provides a brief history of security in the Philippines and discusses various types of security measures, including physical barriers, lighting, alarms, and fire safety systems. Additionally, it highlights the significance of understanding risks, hazards, and vulnerabilities in creating effective security strategies.

Uploaded by

rommelramos154
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views15 pages

Iisc Review

The document outlines the principles and concepts of security, emphasizing the importance of protecting life over property, the need for layered security measures, and the involvement of all personnel in security protocols. It also provides a brief history of security in the Philippines and discusses various types of security measures, including physical barriers, lighting, alarms, and fire safety systems. Additionally, it highlights the significance of understanding risks, hazards, and vulnerabilities in creating effective security strategies.

Uploaded by

rommelramos154
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

CRIMINOLOGIST LICENSEURE EXAMINATION REVIEW PROGRAM

LAW ENFORCEMENT ADMINISTRATION


INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS

DEFINITION OF SECURITY
Information must be forwarded only those personnel who
- Generally, the meaning of security is a kind of state are in need. What Principle of security is referring to?
where people, institution, authority or groups feelfully a. Life over Property
secured of feeling, free from any threat or vulnerability b. There is no impenetrable barrier, which follows that
from somewhere or someone in his/her life,liberty, there is no absolute security.
property or activity. It could be in physical, psychological, c. Compartmentation
social or economical form. d. Security from within and without as the risk may come
either from both areas.
-It is a state or quality of being secured, freedom from fear
or danger, assurance, certainty. Information must be forwarded only those personnel who
are in need. What Principle of security is referring to?
-It is the degree of protection against danger, loss, and a. Life over Property
criminals. b. There is no impenetrable barrier, which follows that
there is no absolute security.
- Protection against any type of crime to safeguard life and c. Compartmentation
assets by various methods and device. d. Security from within and without as the risk may come
either from both areas.
BASIC PRINCIPLES OF SECURITY
1. Life over Proverty - Security personnel must always There must be a Provision for a security layers. Security
choose life over any expensive property. layers must have a Prevention, Detection, and Response
2. There is no impenetrable barrier, which follows that system.
there is no absolute security.
a. Security is everybody's concern.
- First world countries spend billion of dollars in security b. Compartmentation
intelligence and yet they still experiencing attacks from c. Defense - In - Depth Security
insurgents, rebels and terrorist. d. Each Installation is different.
- Despite of the strict security measures, establishments
should not be complacement since hazards and risks are There must be a Provision for a security layers. Security
everywhere and institution is always a possibility. layers must have a Prevention, Detection, and Response
system.
3. Each Installation is different. a. Security is everybody's concern.
Establishments has: b. Compartmentation
c. Defense - In - Depth Security
- Different circumstances d. Each Installation is different.
- Different set of Values and priorities
- Nature of Business TYPES OF SECURITY MEASURES FOR AN
- Different environment and resources EFFECTIVE DEFENSE AGAINST CRIMES:
- Different security requirement.
• Security programs must be based on the actual security 1. ACTIVE MEASURES - these involve the installation of
realities/situations. physical barriers, security lighting, use of vaults, locks and
others.
4. Security must be a designed - in - depth.
- Defense - In - Depth 2. PASSIVE MEASURES -those that will deter man from
- Provision for a security layers committing such act of fear of being caught, charge in
- Security layers must have a Prevention, Detection, and court or get dismissed, such as: security education,
Response system. programs, investigations, seminars, personnel security
check. (Psychological Approach).
5. Security from within and without as the risk may come
either from both areas.
- Dishonest employees Brief History of Security in the Philippines
- Employees must be involved in the security and safety
prevention programs of the company. - The private security business began on March 11,1933,
when the first formally licensed private security agency
6. Security is everybody's concern. “Special Watchman Agency” started operations;
- Regardless of rank, position, designation
- Security protocols and systems must be imbued from - Later it renamed “Jimenez Security Agency”, founded by
rank and file employees to high ranking officials of the brothers Juan and Pedro Jimenez;
company and not just for the security personnel. - On May 30 1958, the Philippine Association of
7. Compartmentation - Need to know basis. Detectives and Protective Agency
1
Operations(PADPAO) was formally organized;
1. Threat — An indication of impending danger or harm;
- RA 5487 was passed on June 13, 1969 through the 2. Hazard — A chance of being injured or harmed;
continuous lobbying of the incorporators and officers of 3. Vulnerability — inability to withstand the effects of a
PADPAO, which set the standards and minimum hostile environment-measure of how open an
requirements for the operations of security agencies. establishment to intrusion, attack or injury.

- P.D. 11 was passed on October 3.1972, widening the 4. Risk — is the potential that a chosen action or activity
coverage of RA 5487 to include security guards (including the choice of inaction) will lead to a loss (an
employed in logging concessions, agricultural, mining and undesirable outcome). probability of an event to happen
pasture lands; that will lead to loss.
- P.D. 100 was issued on January 17,1973, broadening
the coverage of the security industry to include employees SECURITY HAZARD
of the national or local government or any agency who are
employed to watch or secure government building and An act or condition which results in a situation conducive
properties. to a breach of the protection system and the subsequent
loss or compromise, or damage to personnel, property or
- On August 1969, the Philippine Constabulary activated facilities.
the Security and Investigation Supervisory office or
SAISO to supervise and control the organization and KINDS OF HAZARDS:
operation of private security and detective agencies
nationwide; 1. Man-made Hazards — an acts or conditions affecting
the safe of operation of the facility caused by human
- Later it was renamed Philippine Constabulary action, accidental or intentional. It includes sabotage,
Supervisory Office for Security and Investigation espionage, pilferage and theft.
Agencies or PCSOSIA.
2. Natural Hazard — cause by natural phenomena which
- With the passage of RA 6975, this unit was absorbed by cause damage, disturbance and problems of normal
the Philippine National Police; functioning activities, including security. It includes flood,
lighting, storms and volcanic eruptions.
- Later it was made into a division of the PNP Civil Security
Group and was renamed Security Agencies and Guard THE EXTENT OF DEGREE OF RISK TO SECURITY
Supervision Division (SAGSD); WILL BE DEFENDANT ON THE FOLLOWING:

- It was renamed to PNP Supervisory Office for Security 1. RELATIVE CRITICALITY OF OPERATIONS - Is the
Investigation Agency (SOSIA). importance of the firm which reference to the national
economy and security.
THREE MAJOR AREAS OF SECURITY
2. RELATIVE VULNERABILITY - The susceptibility of the
1. Physical Security plant or establishment to damage, loss, or disruption of
2. Personnel Security operation due to various hazard.
3. Document and Information Security
BARRIER - can be defined as any structure or physical
1. PHYSICAL SECURITY device capable of restricting, deterring, delaying, illegal
access to an installation.
- a system of barriers placed between the potential
intruder and the objects/matter to be protected. It is the Generally, a barrier is use for the following purposes:
broadest branch of security, which is concerned with
physical measures adopted to prevent unauthorized 1. Outline the perimeter of the area to be secured;
access to equipment, facilities, materials and documents 2. Create a physical and psychological deterrent to
and to safeguard them against espionage, sabotage, unauthorized entry;
damage and theft. 3. Delay intrusion, thus facilitating apprehension of
intruders;
OBJECTIVES: 4. Assist in more efficient and economical employment of
guards;
a. To protect the organization’s asset; 5. Facilitates and impose the control of pedestrian and
b. To make access so difficult that an intruder will not dare vehicular traffic.
attempt penetration.
3 LINE OF DEFENSE
CONCEPTS:
1. FIRST LINE OF DEFENSE — Perimeter barrier/fences
a. Enemy agents will always seek access; - a medium or structure which defines the physical limits
b. Surreptitious entry is the greatest hazard to security; of an installation or area to restrict or impede access
c. There are no impenetrable barriers; thereto.
d. Each installation is different.
2. SECOND LINE OF DEFENSE
FACTORS THAT BRING INSECURE CONDITION: — Doors, floors, windows, walls, roofs and grills.
2
1. Top Guard - an addition overhang or barbed wire place
3. THIRD LINE OF DEFENSE on vertical perimeter fences facing upward andoutward
— Storage system like steel cabinets, safes, vaults and with a 45 degree angle with three to four strands of barbed
interior files. wires space six inches apart. This will increase the
protective height and prevent easy access.
GENERAL TYPES OF PHYSICAL BARRIER:
2. Entry Stations - provided at main perimeter entrances
1. NATURAL BARRIER — include mountains, rivers, to secure areas located out of the doors, andmanned by
seas, desserts or terrain difficult to traverse. To befully guards on a full time basis.
effective, these barriers must be under surveillance of
guards. 3. Towers - a house like structures above the perimeter
barrier. Height of tower increases the range ofobservation
2. STRUCTURAL OR MAN-MADE BARRIER — during day and night with artificial illumination.
structural constructions made by man like fences,
walls,floors, roofs, grill or other physical means to deter or
impede penetration. CLEAR ZONE

TYPES OF FENCES: - 20 feet or more between the perimeter barrier and


exterior structure.
1. SOLID FENCE — Constructed in such away that visual
access through the fence is denied. Its disadvantage is - 50 feet or more between the perimeter barrier and
that it denies the opportunity for the intruder to become structure within the protected areas.
familiar with the personnel, activities and the scheduled
movements of the security personnel. On the other hand,
it prevents the guards from observing the area around the PROTECTION IN DEPTH
installation and it creates shadow that may be used by
theintruder for cover and concealment. - In large open areas or ground, where fencing or walling
is impracticable and expensive, warning signs should be
WALL — Masonry wall should have the same as the chain conspicuously placed.
linked and surrounded by the barbed wire as top guard.
- The dept itself is protection.
2. FULL VIEW FENCE — It is constructed in such a way
that visual access is permitted through the fence. Its 4. Signs and Notices - erected where necessary in the
advantage is that it allows the security personnel to keep management of unauthorized ingress and preclude
the surrounding of the installation under observation. On accidental entry.
the other hand, it allows the intruder to become familiar
with the movements the security personnel. ECURITY LIGHTING - Provides sufficient illumination to
areas during hours of darkness.
TYPES OF FULL VIEW FENCE: PURPOSES OF SECURITY LIGHTING

1. CHAIN LINK FENCE 1. It improves visibility so that intruders can be seen,


identified and apprehend;
- Should be constructed minimum height of 7 feet 2. It gives psychological fear, which serves as a deterrent
excluding top guard; to thieves, pilferers, trespassers, and sabotage;
- 9 gauges or heavier;Mesh openings of not larger 2 3. It makes easier. The routine of work of guards in
inches per side; identifying employees, vehicles during night time;
- Twisted; 4. If placed in certain areas, may even reduce the number
- Securely fastened to rigid material or reinforced of stationary guards, and instead, may require only roving
concrete; patrols at night.
- Reach within 2 inches of hard ground or paving;
- On soft ground, it must reach below surface deep TYPES OF SECURITY LIGHTING
enough to compensate for shifting soil or sand.
1. Stationary Luminary — most common type consisting
2. BARBED WIRE FENCE - is a type of fencing wire of fixed series of luminaries. It is commonly used on entry
constructed with sharp edges or points arranged at gates of employees and vehicles.
intervals along the strand(s). It is used to construct
inexpensive fences. * Glare Protection Type - The intensity is focused to the
intruder while the observer orthe guard remain in
3. Concertina Wire or Dannert Wire comparative darkness.
— is a type of barbed wire or razor wire that is formed in
large coilswhich can be expanded like a concertina. * Controlled lighting - The lighting is focused on certain
objects than the background.
- Opened concertina wire is 50 feet long and 3 feet
diameter. 2. Standby Lighting — similar to continuous lighting but
can be turned on manually or by special device or other
ADDITIONAL PROTECTIVE MEASURES: automatic means, when there is a suspicion of entry.

3
3. Emergency Lighting — stand by lighting which can be FIRE ALARM - Any visual or audible signal produced by
utilized in the event of electrical failure. a device or system to warn the occupants of the building
or fire fighting elements of the presence or danger of fire
to enable them to undertake immediate action to save life
PROTECTIVE ALARMS and property and to suppress the fire.

Is an aural or visual signal given by the annunciator to the DEVICES


security when intruder actuate certain devices in a
protected area. An annunciator is a visual or audible 1. Smoke Detector - a device placed at the ceilings of the
signaling device, which initiatesconditions of associated floor that detects smoke, typically as an indicator of fire.
circuits.
2. Fire Bell - a hollow device made of metal that makes a
Basically, alarm system are designed to alert security ringing sound.
personnel of a attempted or consummatedintrusion into
an area, building or compound. Each type of alarm is AUTOMATIC SPRINKLER
activated in the event that an intrudertampers with the
circuitry, a beam or radiated waves. Alarm are also for fire,
smoke, or otheremergencies and presence of hazards. a type of built in sprinklers which works by the increase of
room temperature and which automatically operates the
THREE BASIC PARTS OF ALARM system to put out the fire. Attached and distributed in the
ceiling of the rooms. These sprinklers will go into action
1. Sensors - device that can sense an abnormal condition once a fire starts, and those that will open are those that
within the system and provide a signal indicatingthe are directly above the fire and water is delivered where it
presence or nature of the abnormality is needed.

2. CIRCUIT - It is the communication channel that STAND PIPES


conveys the information from all sensors in the system to
thesignal by means of wire, radio waves. G.I. steel or plastic pipes located inside the building from
the lowest to the top floor with water underpressure for
3. Signal - The actual alarm may be audible or silent, a use in case of fire. Located near the standpipe is a fire
bell, buzzer, phone ringing, or flashing of light. hose usually enclosed in a glass box.

TYPES OF PROTECTIVE ALARM FIRE HYDRANT

1. Central Station System — A type of alarm where the - It is a mechanical device strategically located in an
central station is located outside of the installation. It is a installation or in a street where a fire hose will be
system in which the alarm signal is relayed to remote connected so that the water will be available to
panel located at the facilities of private owned protection extinguished a fire.
Service Company manned by its personnel.
Several separate compounds tie their alarm system to a FIRE EXTINGUISHER
central station so that in case of need, the central station
calls for assistance to the police, fire department, hospital - Is a fire fighting equipment which can is a fire fighting
or with other government assisting units. equipment which can be portable or in cart that is used to
put out fire depending on the contents to extinguish
2. Proprietary System — Similar to the central station type certain types of fire.
excepts that the proprietary console is located inside the
subscribers Installation who owns or bases the system.

3. Auxillary System — An installation owned system which


is a direct extension of the local enforcement agency
and/or fire department by special arrangements.

4. Local Alarm System — a local alarm in which a siren or


bell is sounded with no predictable response. This system
is used in residence or small establishment which cannot
afford a respond system.
- Consists of rigging up a visual or audible alarm near the
object to be protected.

5. Dial Alarm System — This system is set to dial a


predetermined number. When the alarm is activated, the
number selected might be the police station or others.
When the phone is answered, a recording voice will state
that an intrusion is in progress.

FIRE PROTECTION:

4
- uses some sort of arrangement of internal physical
barriers which prevent the lock from operating unless they
are properly aligned. The key is the device used to align
internal barriers so that lock may be operated.

2. Padlock
- Is a portable and detachable lock having a pivoted or
sliding hasp which possess through a staple ring, or the
like and is made fast or secured.

3. Combination lock
- Requires the manipulation of parts according to a
predetermined combination code of numbers.

4. Card Operated Lock


- Can be opened by inserting a coded card in a slot in the
lock, or by pushing the correct button on the surface of the
lock.

5. Electronic lock
- Can be closed and opened remotely by electronic
means.

BIOMETRICS

- A machine that can be used for identification of humans


by their characteristics or traits.

- It is used as a form of identification and access control.

- It is equipped with recording device that can identify the


person operating the lock and the time it was operated.

Key Control
Defined as the management of keys in a plant or business
organizations to prevent unauthorized individual access
to the keys.
HOW TO OPERATE FIRE EXTINGUISHER Change Key
- for single lock
-if you need to use a fire extinguisher, remember the word Sub Master key
PASS: - that can open all locks within a particular area or
grouping
• PULL the pin - Fire extinguishers often have a pin, latch, Master key
or puncture lever that you need to release first. - Capable of opening a series of locks
Grand Master Key
• AIM low - Aim the nozzle or hose of the extinguisher at - Can open everything in a system involving two or more
the base of the fire. master key groups.

• SQUEEZE the handle - This releases the extinguishing


agent.

• SWEEP from side to side - Move in close, and sweep


across the base of the fire. Watch for re-flash of the fire.

PROTECTIVE LOCKS

LOCK - defined as mechanical, electrical, hydraulic or


electronic device designed to prevent entry to a building
or room.

Types of locks
1. Key operated lock

5
PETERMAN -A term used in England for lock picker,
safecrackers, and penetrators of restricted areas or 1. Filipino citizen;
rooms. 2. Holder of a Baccalaureate Degree;
3. Physically and mentally fit;
FALSE KEY - Genuine key stolen from the owner 4. Has graduated from a Security Officer Training Course
or its equivalent
HUMAN BARRIER
QUALIFICATIONS OF SECURITY CONSULTANT
Security guard - Is any natural person who offers or
renders personal service to watch or guard residential or 1. Filipino citizen;
business premises or both, government and/or their 2. Physically and mentally fit;
premises for hire and compensation. 3. Holder of Masters degree either in Criminology, Public
Administration, MNSA, Industrial Security Administration,
Security Supervisor or Law
- Is charged with directing the work and observing the 4. Must have at least ten (10) years experience in the
behavioral performance of the guard under his unit. operation and management of security business.

ORGANIZATION AND ADMINISTRATION OF PRIVATE DETECTIVE - Any person who does detective
SECURITY GUARD FORCE work for hire, reward or commission, other than members
Republic Act 5487, as amended The Private Security of the AFP,BJMP, PNP or any other law enforcement
Agency Law, approved on June 13, 1969. agencies.
2003 Revised Implementing Rules and Regulations
(IRR) of RA 5487, as amended QUALIFICATIONS OF A PRIVATE DETECTIVE
PNP SOSIA - Philippine National Police Supervisory
Office for Security Investigation Agency — office under 1. Filipino citizen;
the Civil Security Group which is charged with the 2. Physically and mentally fit;
supervision, direction and control of all security agencies 3. Holder of baccalaureate degree, preferably Bachelor of
in the Republic. Laws or Bachelor of Science in Criminology;
4. Graduate of a Criminal Investigation Course offered by
the PNP or NBI or any police training school, or a
WHO MAY ORGANIZE AND MAINTAIN PRIVATE detective training in any authorized/recognized training
SECURITY AGENCY AND PRIVATE DETECTIVE center;
AGENCY 5. Advance ROTC/CMT graduate or its equivalent

Any Filipino citizen or corporation, association, DISQUALIFICATIONS


partnership, one hundred percent of which is owned and
controlled by Filipino citizens. 1. Having previous record of any conviction of any crime;
2. Having previous record of any conviction of any offense
BASIC REQUIREMENT OF AN OPERATOR OR involving moral turpitude;
MANAGER OF SECURITY AGENCY 3. Having been dishonorably discharged or separated
from employment or service;
1. Filipino citizen; 4. Being a mental incompetent;
2. Not be less than twenty five (25) years of age; 5. Being addicted to the use of narcotic drug or drugs, and
3. College graduate and/or a commissioned officer in the 6. Being a habitual drunkard
inactive service or retired from the AFP or PNP; 7. Dummy of a foreigner
4. Has taken a course/seminar on industrial Security
Management and/or must have adequate training or MORAL TURPITUDE
experience in security business,
5. Good moral character; It is an act of baseness, vileness or depravity in the private
6. Having no previous record of conviction of crime or and social duties which a man owes to his fellowmen or
offense involving moral turpitude. to society in general, contrary to the accepted and
customary rule of right and duty between a man and man.
QUALIFICATIONS OF SECURITY GUARD OR
WATCHMAN Conduct that is considered contrary to community
standards of justice, honesty and good morals.
1. Filipino citizen; Examples: Rape, Forgery, Robbery
2. High School graduate;
3 Physically and mentally fit; TYPES OF SECURITY GUARD FORCE
4. At least eighteen (18) years of age but not more than
fifty (50) years old; 1. Company Guard Force - security force maintained and
5. Has undergone Pre-Licensing course or its equivalent. operated by any private company
Veterans and retired military/police personnel honorably corporation utilizing any of its employees to watch secure
discharge including graduates of ROTC advance (or its and guard its establishment.
equivalent in the PNP) are exempted fram the required
Basic-Licensing Training. 2. Security Agency service - security guard belonging to
privately licensed agency (contractual basis);
QUALIFICATIONS FOR SECURITY OFFICER
6
3. Government Guard Forces - security unit maintained 4. Basic Security Supervisory Course — 48 hours
and operated by any government entity other than military
or police. LICENSE AND FEES

POSSESSION OF FIREARMS New applicants to operate shall be required to obtain a


1. One (1) firearm for every two (2) security guards; minimum capitalization of P1 Million with minimum bank
2. Private security agency/private detective deposit of P500,000.00 in order to start its business
agency/company security force/government security operation. All Private Security Agencies must be
force shall not be allowed to possess firearms in excess registered at the Security and Exchange Commission
of five hundred (500) units. (SEC).
3. Shotguns not higher than 12 gauge
4. Weapons with bores not bigger than cal .22 to include - All Licenses to Operate have a validity of Two {2) years;
pistols and revolvers with bores bigger than cal .38
- All applications for renewal of License to operate (LTO)
Exemptions: in areas where there is an upsurge of shall be filed at least sixty (60) days before the expiry date
lawlessness and criminality as determined by the Chief of LTO;
PNP, Regional Office or their authorized representative,
they may be allowed to acquire, possess and use high - No application shall be approved unless a certification is
powered firearms. issued by FED CSG to the effect that all licenses of
firearms of the agency are updated/renewed for at least
NUMBERS OF SECURITY PERSONNEL TO BE one (1) year forthcoming during the validity of the renewed
MAINTAINED TO SECURE REGULAR LICENSE TO LTO.
OPERATE
SURETY BOND
1. Private Security Agency minimum of two hundred (200) Agency with 1-199 guards - P50,000.00
licensed private security personnel and a maximum of Agency with 200 - 499 - guards - P100,000.00
one thousand (1,000). Agency with 500 - 799 guards - P150,000.00
Agency with 800-1000 guards - P200,000.00
2. Company Guard Force/Private Detective Agency This bond shall answer for any valid and legal claims
minimum of thirty (30) and a maximum of One thousand against the agency filed by aggrieved party
(1,000)
- PSA with 200-1000 guards - regular license to operate
LIMITATION IN THE CARRYING OF FIREARMS good for 2 years.

1. No firearm shall be borne nor be in the possession of - New PSA — a temporary license to operate good for 1
any private security personnel except when in actual year.
performance of duty, in the prescribed uniform, in the
place and time so specified in the Duty Detail Order - PSA with temporary license to operate having posted
(DDO). 100 guards or more but less than 200 guards shall, upon
expiration of such license be issued extension period to
2. Shall be carried only within the compound of the operate good for 6 months. However, upon the expiration
establishment where he is assigned to guard. of such 6 months extension, no additional extension shall
be granted unless the PSA concern shall submit a
3. While escorting big amount of cash or valuable outside certification for the posting of at least additional 50 guards
of its jurisdiction or area of operation, private security thereby making a total of 150 guards or more. PSA with
agency shall issue an appropriate Duty Detail Order to the extended temporary license, shall upon expiration of such
security personnel concerned license, but still fail to comply with the 200 guards
requirement, be granted additional extension of another 6
Duty Detail Order (DDO) — is a written order/schedule months period to comply for the issuance of a regular
issued by a superior officer usually the private security license to operate. Failure to comply shall serve as a basis
agency/branch manager or operations officer assigning for the issuance of a cease operation order
the performance of private security/detective services
duties. - License PSA with less than 100 guards shall not be
DDO for the purpose of post duties not requiring transport renewed after 1 year of operation.
of firearms outside of the physical compound or property
of a client or client establishment shall be issued for not - PSA with cancelled/revoked license shall cease to
more than a thirty (30) days duration. Operate, and with 7 days after having been duly notified
of such cease operation order, shall immediately deposit
CLASSIFICATION OF TRAINING AND ITS DURATION all its firearms with PNP Firearms and Explosives Division
PNP-FED).
1. Basic Security Guard Course (Pre Licensing Course)
— 150 hours; Approval, Cancellation, Suspension of LTO
Chief PNP
2. Re Training Course -- 48 hours; - Approval of New Regular LTO
- Cancellation of Regular LTO
3. Security Officers Training Course — 300 hours - Re instatement of Regular LTO
- Suspension of Regular LTO
7
Director Civil Security Group >The Staff Director for Administration - is the staff
- Renewal of Regular LTO assistant of the agency manager for the effectve and
- Approval of Temporary LTO efficient administration and management of the agency.
- Reversion of Regular to Temporary LTO
- Cancellation of Temporary LTO 1.4 Security Staff Director for Training - Staff in charge for
- Suspension of Temporary LTO Training — responsible for the training of the Agency's
security personnel
STOCKING OF AMMUNITION
2. Line Leadership Staff
1. Stocks of ammunition in the agency shall not exceed
fifty (50) rounds of ammunition per unit of duly licensed 2.1 Security Supervisor 3 — Detachment Commander - Is
firearms. the field or area commander of the agency;

2. Individual issue to each security guards shall be limited 2.2 Security Supervisor 2 — Chief Inspector —
to twenty five (25) rounds for every security guard. responsible for inspecting the entire area coveredby the
detachment;
CONFISCATION OF FIREARMS OF SECURITY GUARD
2.3 Security Supervisor 1 - Inspector responsible for the
1. When the firearm is about to be used in the commission area assigned by the Chief Inspectoror the Detachment
of a crime; Commander.
2. When the firearm is actually being used in the
commission of a crime; 3. Security guard
3. When the firearm has Just been used in the
commission of a crime; 3.1 Security Guard 1 - Watchman/guard the one actually
4. When the firearm being carried by the security guard is posted as watchman and or guard
unlicensed or a firearm Is not authorizedby law and
regulation for his use; 3.2 Security Guard 2 - Shift in charge responsible for the
5. When the confiscation of the firearm is directed by the security officers who are scheduled in a certain shift for a
order of the court; particular period
6. When the firearm is used or carried outside the
property, compound or establishment serviced by the 3.3 Security Guard 3 - Post in charge -responsible for the
agency without proper authority; or entire detailed security office within acertain
7. When a security guard does not possess any license to establishment.
exercise his profession.in all the above cases, the
confiscating officer shall inform immediately the agency Note: Security Agency operator/manager/owner can put
concerned. its own staffing pattern provided it is consistent with the
provisions of IRR of RA 5487.
REVOCATION OF LICENSE TO POSSESS FIREARM
1. Failure to submit any issued firearm for verification as ADVANTAGES OF COMPANY GUARD FORCE
required;
2. Carrying firearms by security personnel without 1. High caliber and receives higher salary;
appropriate Duty Detail Order; 2. Provides better service; 3. Can be trained to handle
3. When the firearm serial number has been duplicated some of the more complex security duties;
on another firearm or using one firearms license for more 4, More familiar with facilities they protect;
than one firearm other than those stipulated in the license; 5. Tend to be more loyal with the company.
4, Carrying of firearms outside of the place stated in the DISADVANTAGES:
permit or in places prohibited under the law;
5. When the firearm was reported lost. 1. May be required to join the union;
2. Cost more;
SECURITY PERSONNEL RANKS, POSITIONS, 3. Problem of ensuring availability of back-up personnel.
STAFFING PATTERN AND JOB DESCRIPTION
ADVANTAGES OF AGENCY GUARD SERVICES
1. Security Management Staff
1. Less expensive;
1.1 Security Director (SD) — Agency Manager/Chief 2. Use is convenient;
Security Officer — responsible for the entire operation 3. Less administrative and personnel problems;
and administration/management of the security agency. 4. Agency assumes full responsibility for the scheduling
and supervising of all guard personnel
1.2 Security Executive Director (SED) — Assistant 5. Can easily obtain extra guard if needed;
Agency Manager/Asst. Chief Security Officer — Assist the 6. Agency easily usually accepts liability of civil suits.
Security Director
DISADVANTAGES:
1.3 Security Staff Director (SSD) - Staff Director for
Operation and Staff Director for Administration 1. Lack of training, low caliber employee;
>The Staff Director for operation -assistant of the 2. No loyalty to the company;
security manager for the efficient operation ofthe agency. 3. Large turnover
4. Not familiar with facilities
8
presence of at least two (2) witnesses. He may search
ESSENTIAL QUALITIES OF SECURITY GUARD employees of the firm or establishment with which he or
his agency has a contract, when such search is required
1. Alertness - being watchful in spotting violator, a person, by the very nature of the business of the person, firm or
a vehicle or an incident; establishment.

2. Judgment — sound and good judgment to arrive at wise DUTIES DURING STRIKES AND LOCKOUTS
and timely decisions;
1. All private security personnel in direct confrontation with
3. Confidence — faith in oneself and his abilities; strikers, marchers or demonstrators shall not carry
firearms. They may carry only night sticks (baton) which
4. Physical Fitness - always in a condition to render may or may not be provided with tear gas canister and
effective service even under the moststrenuous dispenser. Security personnel not in direct confrontation
conditions; with the strikers may carry in the usual prescribed manner
their issued firearm.
5. Tactfulness — ability to deal with others successfully
without offending; 2. Private Security personnel shall avoid direct contact
either physically or otherwise with the strikers;
6. Self Control -- ability to take hold of oneself regardless 3. They shall stay only within the perimeter of the
of a provoking situation. installation which they are protecting at all times;

GENERAL FUNCTIONS OF A SECURITY GUARD 4. In protecting and securing the assets and persons of
their clients, shall only use sufficient and reasonable force
1. Enforce company rules and regulations; necessary to overcome the risk or danger posed by
2. Operate and enforce the personnel identification strikers or hostile crowds.
system;
3. Patrol and observe designated areas, perimeter, 5. They shall refrain from abetting or assisting acts of
structures, installation; management leading to physical clash of forces between
4. Take into custody a person attempting or giving labor and management.
unauthorized access in restricted, limited and controlled
areas 6. They must at all times be in complete uniform with their
5. Check rooms, buildings, storage rooms of security names and agency’s name shown on their shirts above
interest and after working hours, check proper locking of the breast pockets.
doors and gates.
FUNCTIONS OF A PRIVATE DETECTIVE
6. Perform escort duties when required;
7. Respond to alarm signals or other indications 1. Background Investigation;
suspicious activites and emergencies; 2. Locating missing person;
8. Safeguard equipment and material against sabotage, 3. Conduct surveillance work;
unauthorized access, loss, theft or damage; 4. Such other detective work as may become the subject
9. At quickly in situations affecting the security of matter of contract between the agency and its clients
installation and personnel, to fire accidents, internal
disorder, attempts to commit criminal acts; POWERS OF CITY, MUNICIPAL MAYORS IN CASE OF
10. Control and regulate vehicle and personnel traffic EMERGENCY
within the compound as well as parking of vehicle;
11. Other duties that are necessary in the security guard * In case of emergency or in times of disaster or calamity
function; when the services of any security agency/entity and his
personnel are needed. The city or municipal mayor, may
POWER AND DUTIES OF SECURITY GUARD muster or incorporate the members of the agency or
agencies nearest the area of such disaster or calamity to
1. Territorial Power — A security guard shall watch and help in the maintenance of peace and order, prevention of
secure the property of the person, firm or establishment crime, or apprehension of violators of laws and ordinance,
with whom he or his agency has a contract for security and in the protection of lives and properties.
services. Such services shall not extend beyond the
property or compound of said person, firm or * They shall receive direct orders from the Chief of Police
establishment except when required by the latter in of the city or municipality for theduration of the
accordance with the terms of their contract, or in hot emergency, disaster or calamity.
pursuit of criminal offenders.
SUPERVISION OF THE PNP
2. Arrest by Security Guard — A security guard or private
detective is not a police officer and is not, therefore, In case of emergency or in times of disaster or calamities,
clothed with police authority. However, he may arrest a the Chief, PNP may deputize any security guard to assist
person under the circumstances mentioned in Section 5, the PNP in the performance of police duties for the
Rule 113, Revised Rules of Criminal Procedure. duration of such emergency, disaster or calamity.
Licensed guards, who are actually assigned to clients with
3. Search without Warrant — Any security guard may, DDO, shall be deputized by the Chief PNP, and clothed
incident to the arrest, search the person so arrested in the
9
with authority to enforce laws, rules and regulations within a. Transmission Security - component of communications
his area of responsibility. security which results from all measures designed to
protect transmission from interception.
INTER-RELATIONSHIP BETWEEN PRIVATE
SECURITY PERSONNEL AND MEMBERS OF THE PNP b. Cryptographic Security — results from the provisions of
technically sound crypto-system and their proper use.
1. Private security personnel are always subordinate to c. Physical Security — providing safeguards to equipment
members of the PNP on matters pertaining to law and material from access by unauthorized persons.
enforcement and crime prevention. They cannot enforce
any provision of the law except in executing citizen’s THREATS IN COMMUNICATION SECURITY
arrest and/or conducting initial investigation of a
commission of a crime. In such case, any arrested person 1. Wiretapping - is the monitoring of telephone
shall be turned over immediately to the nearest PNP conversations by a third party, often by covert means.
unit/station.
2. Bugging — means to secretly listen to or record a
2. Criminal investigation is the responsibility of the PNP. conversation using a hidden electronic device.
All results of initial investigation conducted by the private
security personnel and all evidence gathered by them 3. Eavesdropping (unauthorized listening) - is the
shall be turned over to the PNP unit/station concerned as unauthorized real time interception of a private
a matter of course without delay. communication, such as a phone call, instant message,
video conference or fax transmission.
GROUNDS FOR CANCELLATION OF SECURITY
GUARD LICENSE RA No. 4200, Approved June 19, 1965 - An Act to prohibit
1. Assisting or protecting criminals during on or off duty and penalize wiretapping and other related violations of
status; privacy of communication,and other purposes.
2. Providing confidential information to unauthorized
person; UNLAWFUL ACTS
3. Posted security guard found drunk or drinking
intoxicating liquor; and Sec.1
4. Other similar acts
It shall be unlawful for any person, not being authorized
THEFT AND PILFERAGE by all the parties to any private communication or spoken
word, to tap any wire or cable, or by using any other
Theft — committed by any person, who with intent to gain device or arrangement, to secretly overhear, intercept, or
but without violence, against, or intimidation of persons record such communication or spoken word by using a
nor force upon things shall take personal property of device commonly known as a dictaphone or dictagraph or
another without the latter consent. dictaphone or walkie talkie or tape recorder.

PSYCHOLOGICAL EXPLANATIONS ON THEFT


1. The need or desire - An individual may need or desire It shall also be unlawful for any person, be he a participant
to commit the act because of financial problem, or not in the act or acts penalized in the nextpreceding
inadequate income, extravagant living, gambling. sentence, to knowingly possess any tape record, wire
record, disc record, or any other such record, or copies
2. The psychological need (Kleptomania) - is an thereof, of any communication or spoken word secured
irresistible urge to steal items of trivial value. People with either before or after the effective date of this Act in the
this disorder are compelled to steal things, generally, but manner prohibited by this law; or to replay the same for
not limited to, objects of little or no significant value. any other personor persons; or to communicate the
contents thereof, either verbally or in writing, or to
3. The criminal tendency - The individual with such furnishtranscriptions thereof, whether complete or partial,
tendency may be more tempted to steal if security control to any other person:
are inadequate.
Provided, That the use of such record or any copies
THE CASUAL AND SYSTEMATIC PILFERER thereof as evidence in any civil, criminal investigation or
Casual Pilferer — One who steals due to his inability to trial of offenses mentioned in section 3 hereof, shall not
resist the unexpected opportunity and has a little fear of be covered by this prohibition.
detection.
Systematic Pilferer — One who steals with preconceived Sec. 3
plans and takes away any or all types of items or supplies
for economic gain. Nothing contained in this Act, however, shall render it
unlawful or punishable for any peace officer, who is
COMMUNICATION SECURITY authorized by a written order of the Court, to execute any
of the acts declared to be unlawful in the two preceding
Is the protection resulting from the application of various sections in cases involving the crimes of treason,
measures which prevent or delay the enemy or espionage, provoking war and disloyalty incase of war,
unauthorized persons in gaining information through the piracy, mutiny in the high seas, rebellion, conspiracy and
communication system. This includes: proposal to commit rebellion,inciting to rebellion, sedition,
conspiracy to commit sedition, inciting to sedition,
10
kidnapping as defined by the Revised Penal Code, and 3. Classification should be made as soon as possible by
violations of Commonwealth Act No. 616, punishing placing the appropriate marks on the matter to be
espionage and other offenses against national security: classified;

4. Each individual whose duty allows access to classified


AUTHORIZATION matter is responsible for the protection of the classified
matter while it is in his/her possession and shall insure
The authorization shall be effective for the period that dissemination of such classified matter is on the
specified in the order which shall not exceed sixty “need to know” basis and to “property cleared personnel
(60)days from the date of issuance of the order, unless only”.
extended or renewed by the court upon being satisfied
that such extension or renewal is in the public interest. DEFINITION OF DOCUMENT

The court referred to in this section shall be understood to Any material that contains marks, symbols, or signs,
mean the Court of First Instance within whose territorial either visible, partially visible or completely invisible that
jurisdiction the acts for which authority is applied for are may be presently or ultimately convey a meaning or
to be executed. message to someone.

BANK SECURITY - a specialized type of physical CLASSIFY - refers to the act of assigning to information
security protecting the assets, personnel and operation of or material one of the four security classification
a bank, with special emphasis on the precaution and categories after determination has been made that the
measures to safeguard the cash and assets while in s information requires the security protection as provided
storage, in transit, and during transaction. for in the regulation;

Bangko Sentral ng Pilipinas (BSP) Circular No. 620 SECURITY CLEARANCE — Is an administrative
Issued on September 3, 2008 — a Circular issued by BSP determination that an individual is eligible from a security
concerning regulations on Bank protection which aims to standpoint for access to classified matter of a specific
promote maximum protection of life and property against category;
crimes (robbery, theft, etc), and other destructive causes.
COMPARTMENTATION - Refers to the grant of access
Guard System — BSP requires that all banking offices be to classified matter only to properly cleared persons when
manned by adequate number of securitypersonnel to be such classified information is required in the performance
determined by the bank, taking into consideration its size, of their official duties, and restricting it to specific physical
location, costs and overallbank protection requirement. confine when feasible.

Security Devices — Banks are required to have a robbery NEED TO KNOW - term given to the requirement that the
alarm or other appropriate device for promptlynotifying dissemination of classified matters be limited strictly to
law enforcement office either directly or through an those persons whose official duties require knowledge
intermediary of an attempted, ongoing orperpetrated thereof.
robbery.
SECURITY OF CLASSIFIED MATTER
In armored Car operations — all armored vehicles are
required to be built with bullet resistant materials capable CLASSIFICATION OF DOCUMENTS Memorandum
of withstanding the firepower of high powered firearm Circular No. 196, dated 07/19/1968 {Security of Classified
(M16, M14). Also equipped with a vault or safe or a Matter in government offices.)
partition wall with a combination lock designed to prevent
retrieval of the cargo while in transit. 1. TOP SECRET — any information and material, the
unauthorized disclosure of which would cause
DOCUMENT AND INFORMATION SECURITY - Security exceptionally grave damage to the nation, politically,
involving the protection of documents and information economically or militarily;
from loss, access by unauthorized persons
> prescribes the policies and establishes the standard 2. SECRET - any information and material, the
basic procedures governing the classification and security unauthorized disclosure of which would endangernational
of official matter. security, cause serious injury to the interest or prestige of
the nation or any governmental activity.
GENERAL PRINCIPLES
3. CONFIDENTIAL — any information and materials, the
1. The authority and responsibility for the preparation and unauthorized disclosure of which would be prejudicial to
classification of classified matter rest exclusively with the the interest or prestige of the nation or governmental
originating office; activity or would cause administrative embarrassment or
unwarranted injury.
2. Classified matter should be classified according to
content and not the classification of the file in which they 4. RESTRICTED — any information and material which
are held or of another document to which they refer; requires special protection other than those determined to
be Confidential, Secret, and Top Secret matters.

METHOD OF TRANSMISSION
11
1. By direct contact of officer or personnel concerned; Types of Competitive Intelligence
2. By official courier;
3. Electrical means in cryptographic form 1. White — information available from company
4. Registered Mail publication, public records or commercial reporting
DESTRUCTION sources;

1. Burning 2. Gray - not readily available but which is usually can be


2. Shredding obtained without acquiring any civil/criminal liability in the
process.
STORAGE - shall be in a safe, steel filing cabinet with built
in dial type combination lock of such weight, size and 3. Black — obtained through clearly unethical or illegal
construction as to minimize the possibility of physical theft means.
or damage to fire.
TYPES OF DOCUMENTS
OPERATIONAL SECURITY - part of physical security
that deals primarily with the protection of processes, Class I - Vital Document — This is an irreplaceable
formulas, patents, and other industrial and manufacturing records , reproduction of which does not have thesame
activities from espionage, infiltration, loss, compromise or value as the original;
photocopying;
Class II - Important Document - This is a record,
INFORMATION CYCLE reproduction of which cause considerable expense and
labor, or considerable delay.
1. The Creation — Information is discovered and develop;
Class III - Useful Document — This is a record, the loss
2. Used — Some action is take with the information; of which may cause inconvenience but could be readily
replaced and may not present insurmountable obstacle to
3. Storage and Retrieval — Stored for future use; the prompt restoration of the business;

4. Transfer — transferring of information from active to Class IV - Non essential Document — This record may
inactive use; include daily files, routine in nature, lost of which will not
affect the organization.
5. Disposition — decision may be made to retain the
information indefinitely. STORAGE

KINDS OF SENSITIVE INFORMATION 1. SAFE — Refers to a metallic container used for


safekeeping of documents or small items in the office or
PROPRIETARY INFORMATION — information which installation. In security matters it is considered as one of
some special way is related to the status, operations or the third line of defense that a security manager may use
activities of the possessor over which the possessor that weighs about 750 pounds and a door of about 1 and
asserts ownership. 1/2 inch thick with its floor, ceiling and walls of about 1
inch thick:
TRADE SECRETS - It may consist of any formula,
pattern, device or compilation of information which is used 2 . Vault
in one’s business and which gives one opportunity to gain A heavily constructed fire and burglar resistant container
an advantage over competitors who do not know oruse it. usually part of the building structure use to keep and
protect cash, documents and negotiable instruments.
PATENT — A grant given by the government to an
inventor, conveying and securing to him the exclusive 3 . File room
rights to make, use and sell his invention for term of It is a cubicle in a building constructed little lighter than a
twenty (20) years. vault but of bigger size to accomodate limited people to
work on the records inside.
LAW ON INTELLECTUAL PROPERTY INTELLECTUAL
PROPERTY CODE OF THE PHILIPPINES [Republic Act
No. 8293] Approved on June 6, 1997 AN ACT PERSONNEL SECURITY
PRESCRIBING THE INTELLECTUAL PROPERTY
CODE AND ESTABLISHING THE INTELLECTUAL - refers to the procedure followed, inquiries conducted,
PROPERTY OFFICE, PROVIDING FOR ITS POWERS and criteria applied to determine the work suitability of a
AND FUNCTIONS, AND FOR OTHER PURPOSES particular applicant or the retention of a particular
employee.
THREAT TO PROTECTION OF SENSITIVE PURPOSE
INFORMATION
1. To ensure that hired employees are best suited to
Competitive Intelligence — systematic program for assist the organization in achieving its mission and vision;
gathering and analyzing information about competitor's
activities and general business trends to further 2. To assist in providing the necessary security to the
company’s goals. employees while they carry out their functions.
12
- A fact finding probe to determine a plant’s adequacy in
PERSONNEL SECURITY INVESTIGATION (PSI) all aspects of security, with the corresponding
recommendations.
It is an inquiry into the character, reputation, discretion,
integrity, morals, and loyalty of an individual In order to - Refers to checklist, audits, or inventories of security
determine a person’s suitability for appointment or access conditions.
to classified matter.
- Security Surveys are often called ‘RISK ANALYSIS
TYPES OF PSI SURVEYS’ or ‘RISK ASESSMENT SURVEYS

1. National Agency Check PURPOSES OF SECURITY SURVEY:


2. Local Agency Check
3. Partial Background Investigation 1. To determine the existing state of security;
4. Complete Background Investigation
2. Identifying weaknesses in defense;
Kinds of Background Investigation
3. To determine the degree of protection required;
1. Complete background Investigation (CBI) — a type of
BI which is more comprehensive, particuiarly all the 4. To produce recommendations for a total security
circumstance of his personal life. system.
The survey should be undertaken by either suitably
2. Partial Background Investigation (PBI) — Investigation trained staff security personnel, or a fully qualified
of the background of the individual but limited only to independent security specialist.
some circumstances of his personal life.
No universal checklist can be applied to all sites for survey
FACTORS TO BE CONSIDERED IN THE CONDUCT OF purposes, as no two facilities are alike.
BI
BEFORE COMMENCING A SECURITY SURVEY
1. Loyalty — faithful allegiance to the Philippine
government and its duly constitutional authorities; 1. Written authority should be obtained from proper
authority.
2. Integrity — uprightness in character, soundness of
moral principle, freedom from moral delinquencies. 2. Previous surveys should be reviewed;
3. Discretion — the ability or tendency to act or to decide
with prudence, the habit of wise judgment; 3. An orientation tour should be made;

4. Morals — distinctive identifying qualities which serve as 4. Photographs should be taken of things which will be
an index to the essential or intrinsic nature of a person; difficult to describe in a report. (Only with authority)

5. Character — the sum of traits that have been impresses After completing the survey an immediate review of the
by nature, education and habit upon the individual; findings should be undertaken with the plantsupervisor so
that urgent deficiencies can be addressed.
6. Reputation — opinion or estimation in which one is
generally held. It is what a person is reported to be • A follow-up survey should always be conducted to
whereas character is what a person is. ensure improvements

INVESTIGATIVE COVERAGE • Any survey report including lists of recommendations is


incomplete without including a cost-benefit analysis,
1. Prior Employment; which is;

2. Claimed education; “ a direct comparison of the cost of operation of the


security unit and all the existing security measures with
3. Claimed residence for the period covered in the the amount of the corporate assets saved or recovered as
employment and educational institutes; well as reduction of losses caused by injuries and lost
production and recommendations have been made”
4. If the candidate indicates a criminal record, then the
details should be checked. PLANNING

INVESTIGATIVE STANDARDS - Process of developing methods or procedures or an


arrangement of parts intended to facilitate
1. Information sought should be relevant; theaccomplishment of a definite objective.
2. Information should be reliable;
3. If unfavorable, the information should be confirmed by -The process of setting goals, developing strategies, and
at least two sources. outlining tasks and schedules to accomplish thegoals.

SECURITY SURVEY SECURITY PLANNING


13
• It is PRE-DETERMINING a course of action; - Protection of personnel especially ranking official from
any harm, kidnap, and others act. VIP security is type of
• It is deciding IN ADVANCE what to do, how to do it, and personnel security;
who is to do it.
POLICE SECURITY PROTECTION GROUP (PSPG)
GOALS OF SECURITY PLANNING - is mandated by law to provide protective security to
government officials, foreign dignitaries, and private
1. To minimize effects of any incident upon plant and individuals authorized to be given protection and also
personnel; provide physical security to vital installations, and assist
the Presidential Security Group (PSG) insecuring the
2. To keep property and equipment loss at a minimum; President and the members of the First Family.

3. To ensure cooperation of all plant departments charged PROTECTIVE CUSTODY


with specific activities of an emergency; - state or quality of being secured or freed from danger. It
4. To ensure appropriate cooperative action by and with may also includes the various means or device designed
outside civic and government agencies. to guard a persons and property against a broad range of
security hazard.
KEY STEPS IN PLANNING
THREAT - is an indication of something impending and
1. Get in touch/coordinate with your Local Civil usually undesirable or unpleasant, with an intention to
Authorities. (Tie your programs with theirs and inflict evil, injury or damage on another, usually as
standardize equipment with them thus creating retribution or punishment for something done or left
compatibility.); undone. It is an expression of an intention to inflict loss or
harm on another by illegal means, and especially by
2. Visit neighboring Plants/offices (coordinate your involving coercion or duress over the person or his
activities with theirs.) welfare.
3. Survey your plant for possible hazards and take
immediate action to lessen or eliminate them; THREAT ASSESSMENT - the process of
investigation/validating the truthfulness of the existence of
4. Appoint a disaster Director or Disaster coordinator; threat to an individual.

5. Early in the planning stage, present the Program to your EMERGENCY SITUATION — condition or state that
Employees and enlist their active support; danger has already occurred which resulted to loss of
life/liberty and/or there is imminent danger or threat to life
6. Call an organization meeting of Heads of services, and property where delay will endanger ormay cause the
employee representatives and key personnel. (out line loss of life/property.
purpose of the program and explain how the plant should
organize for protection; DEFINITION OF TERMS:

7. Define the Program. 1. Access List — authenticated list of personnel given to


the security allowing entry to a compound or installation
TESTING THE PLAN or part thereof;

Benefits in testing the plan: 2. Controlled Area — an area near or adjacent to limited
* Deficiencies will be uncovered; or exclusive areas where entry is restricted;
* People involved in the implementation of the plan will
receive valuable training. 3. Dry-run — practical test or exercise of plans or any
activity to test its validity, an operational readiness
TWO TYPES OF TESTING THE PLAN exercise;

* partial (by elements); 4. Duress Code — type of code system so that security
* complete (entire organization) personnel or any employee when forced by armed men
intending to enter an installation can five alarm by the use
KEEPING THE PLAN UP TO DATE of certain words in casual conversation with personnel in
the installation.
* Changes in Personnel and Facilities
5. Exclusion Area — a restricted area containing materials
SECURITY EDUCATION or operation of security interest;

It is defined as the exposure and teaching of employees 6. Restricted area — any area access to which is subject
on security and its relevance to their work. Security to special restriction control;
education is conducted to develop security awareness
among employees of the company. It should cover all 7. Security Hazard — Is any act or condition, which may
employees, regardless of rank or position. result in the compromise of information, loss of life, loss
or destruction of property or disruption of objectives of the
Personnel Security installation.
14
TYPES OF SECURITY

1. Industrial Security — A form of physical security that is


concerned with the physical measures designed to
safeguard personnel and prevent unauthorized access to
equipment, facilities, materials, documents, and to protect
them from espionage, sabotage, damage or theft.

2. Bank Security — Is the protection resulting from the


application of various measures which safeguards cash
and assets which are in storage, in transit and or during
transaction.

3. Operational Security — Involves the protection of


processes, formulas and patents, industrial and
manufacturing activities from espionage, infiltration, loss,
compromise or photocopying.

15

You might also like