0% found this document useful (0 votes)
17 views108 pages

Security Module

The document outlines the vision, mission, goals, and objectives of Isabela State University, emphasizing its commitment to developing competent professionals and engaging in sustainable development. It details the goals of the College of Arts & Sciences and the specific objectives of the BS Criminology program, aimed at producing graduates equipped to address crime and law enforcement challenges. Additionally, it defines industrial security management, its legal basis in the Philippines, and the necessity and types of security measures applicable in various sectors.

Uploaded by

Althea Dassil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views108 pages

Security Module

The document outlines the vision, mission, goals, and objectives of Isabela State University, emphasizing its commitment to developing competent professionals and engaging in sustainable development. It details the goals of the College of Arts & Sciences and the specific objectives of the BS Criminology program, aimed at producing graduates equipped to address crime and law enforcement challenges. Additionally, it defines industrial security management, its legal basis in the Philippines, and the necessity and types of security measures applicable in various sectors.

Uploaded by

Althea Dassil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

VISION, MISSION, GOALS AND OBJECTIVES

UNIVERSITY VISION

The Isabela State University as a leading, vibrant, comprehensive and Research University in the country
and the ASEAN region.

UNIVERSITY MISSION

The Isabela State University is committed to develop highly trained and globally competent professionals;
generate innovative and cutting-edge knowledge and technologies for people empowerment and
sustainable development; engage in viable resource generation programs; and maintain and enhance
stronger partnerships under good governance to advance the interests of national and international
communities.

GOALS OF THE COLLEGE OF ARTS & SCIENCES


1. Provide general education in the arts and sciences for the development of students mentally,
socially, spiritually, and emotionally transforming them into well-rounded individuals.
2. Develop students into productive citizens both economically and socially with the end in view
of improving the quality of their lives and that of their fellowmen.
3. Produce graduates, majority of whom are locally and globally competitive in their chosen fields
of their careers.
4. Cultivate and sharpen students’ potentials and hasten their relationship capabilities to answer
the needs of their community and society to which they belong.

OBJECTIVES OF THE PROGRAM

General Objective
The program provides the community with professionally competent and orally upright graduates
who can deliver efficient and effective services in crime prevention, crime detection and investigation, law
enforcement, and custody and rehabilitation of offenders, among others.
The program is also envisioned as significant educational institutions actively and continually
involved in producing graduates who have the knowledge and skills in addressing the problem of
criminality in the country and the competence to meet the challenge of globalization in the field of
criminology.

Specific Objectives
The BS Criminology program aims to:
1. Foster the values of leadership, integrity, accountability and responsibility while serving their
fellowmen, community and country.
2. Prepare the students for careers in crime prevention, law enforcement, scientific crime
detection and correctional administration;
3. Encouraged research and inquiry on the nature, causes, treatment or punishment of criminal
justice agencies respond to crime, criminals and victims.
CHAPTER I
INTRODUCTION TO INDUSTRIAL SECURITY MANAGEMENT

LESSON 1
INDUSTRIAL SECURITY MANAGEMENT DEFINITION AND ITS
LEGAL BASIS
INDUSTRIAL SECURITY MANAGEMENT DEFINED
It is the action and measures taken to create a state of safe environment for the protection of
personnel, properties or assets from various perceived threats and danger using manpower, electronic
devices and other forms of security control measures.
It is the process of developing a comprehensive data protection plan. It takes into account all
potential threats, the existing network environment, the future needs of the origination, and lays out a
multi-level blueprint to integrate the security technology needed to combat any threats.
It is the skillful handling of security and safety measures of business enterprises and industrial
establishment.

INDUSTRIAL SECURITY DEFINED


It is the business of providing security and protection to private individuals, business and
enterprises, or government and non-government industries. Security measures applied to business
industries.
It is a form of physical security involving industrial plants and business enterprises. It involved the
safeguarding of personnel, processes, properties and operations.

LEGAL BASES OF INDUSTRIAL SECURITY IN THE PHILIPPINES

1. Natural Authority – the highest law is the law of self-preservation. By instinct, man naturally reacts
in order to protect himself, his family, his honors, freedom, liberty and property from danger, threat
or hazard. He does it personally or thru the help of others.

2. Constitutional Authority

a. Art. II, Section 4 of the 1987 Philippine Constitution – The prime duty of the government
is to serve and protect the people. The Government may call upon the people to defend the
state and in the fulfillment thereof, all citizens may be required, under conditions provided by
law, or to render personal military service.

b. Art. III, Section 1 of the 1987 Philippine Constitution - No person shall be deprived of life,
liberty or property without due process of law, nor shall any person be denied the equal
protection of the laws.

c. Art. III, Section 9 of the 1987 Philippine Constitution - Private property shall not be taken
for public use without just compensation.

d. Art. III, Section 2 of the 1987 Philippine Constitution - The right of the people to be
secure in their persons, houses, papers, and effects against unreasonable searches and seizures
of whatever nature and for any purpose shall be inviolable, and no search warrant or warrant of
arrest shall issue except upon probable cause to be determined personally by the judge after
examination under oath or affirmation of the complainant and the witnesses he may produce,
and particularly describing the place to be searched and the persons or things to be seized.

3. Statutory Authority
a. Republic Act No. 6975- The law that created the public safety agencies.
b. Republic Act No. 3815 - Otherwise known as the Revised Penal Code of the Philippines. The
law which defines and penalizes crime against property, persons, public order, national security
etc.
c. Republic Act No. 9372 - Otherwise known as the Human Security Act of 2007.
d. Republic Act No. 5487 - Otherwise known as the Private Security Agency Law of the
Philippines. The law which provides for the organization and management of Private Security
Agency, Company Security Force and Government Security Unit.- Approval and Effectivity – June
21, 1969
e. PD No. 11 – Amending Certain Sections of Republic Act 5487 otherwise known as “The Private
Security Agency Law”.- October 3, 1972
f. PD No. 100 – Amending Further Certain Sections of RA 5487 as Amended by PD 11. January 17,
1973
g. PD No. 1919 – An Act to Regulate the Organization and Operation of Private Detective,
Watchmen or Security Guards Agencies. April 28 1984
h. Memorandum Circular 2011- Issued by Chief Supt. Diciano

LESSON 2
SECURITY IN GENERAL
SECURITY DEFINED
Security is a protection against any type of crime to safeguard life and assets by various methods
and device. It is a state or conditions of being secured; there is a freedom from fear, harm, danger, loss,
destruction or damages. Basically, it was the action of man against man that led to many unsecured and
unsafe conditions. Reasons could be economic, revenge, or just plain greed and avarice. Whatever the
motives, the civilized man needs adequate protection.

NECESSITY FOR SECURITY


Security measures are inevitable or necessary for the attainment of the goals and objectives of a
certain individual, group or organization. It allows that when an individual or organization is exposed to
hazards, their productivity is adversely affected.
The economic growth of the Philippines for instance is moving at a turtle-pace because of the
impending internal and external threats. Internal threats include but not limited to communist aggression,
the Muslim Separatist, the extreme rightists such as the threat of military takeover of the government; and
the ruthless mass action like strikes and protest by civil organizations. External threats include the
country’s incapability to defend itself in case of war. All of these threats if not deterred or reduced, will
bring political instability which surely hampers the economy of the country.
Conversely, among the business enterprises, their productivity is restrained if the hazards
surrounding their personnel, properties, and operation are not eliminated or controlled.

MAJORS AREAS OR DIVISIONS OF SECURITY


Since security is general is every hard to comprehend, it can be divided into three majors areas:
1. PHYSICAL SECURITY
It is the broadest type of security.
This concern with the physical measures adopted to prevent unauthorized access to equipment,
facilities, material and document and to safeguard them against espionage, sabotage, damage, loss
and theft. It measures are being used to define, protect, and monitor property rights and assets.
These measures consist of barriers and devices that would detect, impede, and prevent
unauthorized access to equipment, facilities, material and document and to safeguard them against
espionage, sabotage, damage and theft.
It may also defined as the safeguarding by physical means, such as guard, fire protection
measures, of plans, policies, programs, personnel, property, utilities, information, facilities and
installation against compromise, trespass, sabotage, pilferage, embezzlement, fraud or other
dishonest criminal act.

2. PERSONNEL SECURITY
This is important as physical security. Personnel security starts even before the hiring of an
employee and remains to be maintained for as long as the person is employed. Its purpose is to
insure that a firm hires those best suited to assist the firm in achieving its goals and objectives and
once hired assist in providing necessary security to the work force while carrying out their
functions.

3. DOCUMENT AND IMFORMATION SECURITY


This involves the protection of documents and classified papers from loss, access by
unauthorized persons, damage, theft and compromise through disclosure. Classified documents
need special handling. Lack of indoctrination and orientation among the personal handling them
can result in the leakage, loss, theft and unauthorized disclosure of the documents.

TYPES OF SECURITY
Since security in general is very hard to comprehend, it can be divided into three major areas:

1. Protective Security – It can be defined as those measures taken by an installation or unit to


protect itself against sabotage, espionage or subversion and at the same time provide freedom of
action in order to provide the installation of the unit with the necessary flexibility to accomplish its
mission. The aspects of protective security can be seen with the application of the following:

a. Industrial Security - A type of security applied to business groups engaged in industries like
manufacturing, assembling, research and development, processing, warehousing and even
agriculture. It may also mean the business of providing security.

b. Hotel Security - A type of security applied to hotels where its properties are protected from
pilferage, loss, damage, and the function in the hotel restaurants are not disturbed and troubled
by outsiders or the guest themselves. Application of various means in safeguarding hotel guests
and valuables and other hotel functions. This type of security employs house detectives,
uniforms guard and supervisor and insures that hotel guests and their personal effects are
safeguarded.

c. Bank Security - This type of security is concern with bank operations. Application of various
measures in safeguarding cash and assets of the bank from storage, during transit and
transaction. Its main objective is the protection of bank cash and assets, its personnel and
clientele. Security personnel are trained to safeguard bank and assets while in storage, in
transit and during transactions.

d. VIP Security - A type of security applied for the protection of top-ranking officials of the
government or private entity, visiting persons of illustrious standing and foreign dignitaries.

e. School Security - A type of security that is concern with the protection of students, faculty
members, and school properties. Security personnel are trained to protect the school property
from theft, vandals, handling campus riots and detecting the use of intoxicated drugs and
alcohol by the students.

f. Supermarket Security - A type of security which is concern with the protection of the stores,
warehouses, storage, its immediate premises and properties as well as the supermarket
personnel and customers. Security personnel are trained to detect “shoplifter”, robbery, and
bomb detection and customer relation.

2. Operational Security - This involves the protection of process, formula and patents, industrial
and manufacturing activities from espionage, infiltration, loss, compromise or photocopying.

3. Communication Security - The protection resulting from the application of various measures
which prevents or delay the enemy or unauthorized person in gaining information through
communication. This includes transmission, cryptographic and physical security.

4. Transmission Security – A component of communications security that results from all measures
designed to protect transmission from the interception, traffic analysis, and initiative deception.

Other special type of security


a. Air cargo security
b. School security
c. Supermarket security
d. Sea marshal

NOTA BENE: Security may also include all other security matters not covered in the enumeration like; –
FIESTA – BIRTHDAYS – PARTY – PARADE – CONCERT – RALLY – COURT HEARING – INAUGURATION OF
PRESIDENT.
THE ROLE OF THE PHILIPPINE NATIONAL POLICE AND OTHER GOVERMNET LAW ENFORCEMENT
AGENCIES
Industrial security is an indispensable part of the Philippine economy because it serves as a partner
of Law Enforcement Agencies in the country such as the PNP. With its doubles significance, under Republic
Act No. 5487, the PNP takes responsibilities in the supervision, control and training, and operation of
security agencies and in the issuance of license to operate and the license to practice the security
profession.
In addition to this, the PNP and other government law enforcement agencies serve as the
immediate law enforcement agency which assist security guards and security agencies in the performance
of their security function such as accepting and processing crime reports submitted by the private security
agency.

LESSON 3
TERMS TO PONDER
The following are the terms to ponder:
1 Access controls - Regulate people, vehicles, and items during movement into, out of, and within a
building or facility.
2 Assets protection Program- sum total of protection scheme encompassing the entire security
spectrum, designed to eliminate, reduce or control threats, hazards or dangers to company
3 Barrier- A barrier can be defined as any structure or physical device capable of restricting,
deterring, delaying, illegal access to an installation.
4 Biometrics - digital capture of physical characteristics and conversion into data for storage. The
data are used to validate identity.
5 Biometrics identification system - Computerized systems that capture physical characteristics
and convert them into data for identification purposes.
6 Clear Zone - the exterior and interior parallel area near the perimeter barrier of an industrial
compound to afford better observation and patrol movement.
7 Company Guard Force (CGF) – a security force maintained and operated by any private
company/corporation utilizing any of its employees to watch, secure or guard its business
establishment premises, compound or properties.
8 Control point - An area established for positive personnel identification and movement control.
9 Crotch-carry - A method of shoplifting in which the criminal carries stolen items between his or her
legs, usually under a loose coat or full skirt or dress.
10 Enunciator – It is a visual or audible –signaling device, which initiates conditioning of associated
circuits.
11 Government Guard Unit (GGU) – a security unit maintained and operated by any government
entity other than military or police, which is established and maintained for the purpose of securing
the office or compound and/or extension of such government entity.
12 Hazard- It refer to conditions that may cause damage to property, injury, or loss of life. It is also
defined as the exposure to the chance of loss or injury.
13 Identity theft - The criminal act of assuming another person’s identity.
14 Industry - Earnest or constant application to work or business. A special branch of productive work,
or the capital or workers employed in it (Webster, 1993). Large-scale production or organized
economic activity connected with the production, manufacture, or construction of a particular
product or range of products. (Microsoft Encarta, 2001-2005)
15 Industrial - This is defined as “pertaining to or engaged in industry”. (Webster, 1993)
16 Knock-off goods - Counterfeit goods or products
17 License to Exercise Profession – shall mean any document issued by the Chief, Philippine
National Police or his duly authorized representative recognizing a person to be qualified to perform
his duties as private security or training personnel.
18 License to Operate (LTO) – is a License Certificate document, issued by the Chief, Philippine
National Police or his duly authorized representative, authorizing a person to engage in employing
security guard or detective, or a juridical person to establish, engage, direct, manage or operate an
individual or a private detective agency or private security agency/company security force after
payment of the prescribed dues or fees as provided in these Rules and Regulations.
19 Management - the skillful use of means to accomplish a purpose.
20 Master keying system- system used in bid installation whereby keys can open a groups of locks
this is possible by use of interchangeable cylinder cores in the locks.
21 Operational Security - This involves the protection of process, formulas, patents and other
industrial and manufacturing activities from espionage, infliction or photocopying.
22 PADPAO - refers to the Philippines Association of Detective and Protective Agency Operators, Inc.,
which is an association of all licensed security agencies and company security forces.
23 Perimeter Barriers - The first line of physical defense of an industrial complex viewing it from the
outside.
24 Person - shall include not only natural persons but also juridical persons such as corporation,
partnership, company or association duly registered with the Securities and Exchange Commission
and/or the Bureau of Commerce.
25 Personnel Security Investigation - Phase of recruitment process that has been very helpful to
industrial firms for it held management in preventing the assignment of security risks employees to
sensitive position.
26 Physical barrier- any physical means to impede, delay, or prevent intrusion into a protected area
27 Picklocker - Peterman in England.
28 Pilferage - Acts committed by employees to constitute internal criminal attacks temptation to steal
by employees/dishonesty.
29 Piggybacking - When unauthorized persons closely follow authorized employees into restricted
areas. Also known as tailgating.
30 Private Security Agency (PSA)– shall mean any person association, partnership, firm or private
corporation, who contracts, recruits, trains, furnishes or posts any security guard, to perform its
functions or solicit individuals, businesses, firms, or private, public or government-owned or
controlled corporations to engage his/its service or those of his/its security guards, for hire,
commission or compensation thru subscription or as a consultant/trainer to any private or public
corporation whose business or transactions involve national security or interest like the operation
and/or management of domestic or ocean vessels, airplanes, helicopters, seaports, airports
heliports, landing strips etc., or as consultant on any security related matter, or to provide highly
specialized security, detective and investigation services like gangway security, catering security,
passenger profiling, baggage examination, providing security on board vessels or aircraft, or other
security needs that PNP SAGSD may approve.
31 Private Security Guard (PSG) – referred to specifically as private security guard, company guard
and government guard when employed by private security agencies, company guard forces of
private firms and government entities, respectively.” (PD 1919)
32 Private Detective Agency. A private detective agency is any person, who, for hire or reward or on
commission, conducts or carries on or holds himself or itself out as conducting or carrying on a
detective agency, or detective service.
33 Private Detective. A private detective is any person who is not a member of a regular police
agency of the Armed Forces of the Philippines who does detective work for hire, reward, or
commission.
34 Protective service - The basic role of a security office/department.
35 Remote station System- a system where the alarm signal is transmitted to remote location
manned and operated by independent party or police department.
36 SAGSD or Security Agency and Guard Supervision Division - the PNP Office that was
designated later as the primary office for supervision of the implementation of the rules and
regulations on security and detective agency now the PNP SOSIA (Supervisory office for
Security and investigation Agencies).
37 Security Agency - any person, association, partnership or corporation who recruits, trains, muster,
furnishes, solicit individuals or business firms, private or government owned or controlled
corporation to engage his services or those of its watchmen.
38 Security Key Control - Refers to the management of keys used in a plant office or business
organization to prevent unauthorized access and used.
39 Security Education - An industrial organization that insure the employees and workers aware of
the safety measures adopted therein or orientation of employee to security relevance to their work.
40 Security Guard- is any natural person who offers and render personal service to watch or guard
residential, or business of both, government buildings, establishment and or their premises for hire
and compensation
41 Security supervisor- charged with directing the work and observation the behavioral performance
of the guard under his unit
42 Security Guard Force- group of forces of men selected trained or organized into functional group
for the purpose of protecting operational processes from those disruption which impede efficiency or
halt operation at a particular plant, facility, institution or special activity
43 Security Planning- it involves knowing the objectives of the security and the means and the
method to reach these objectives or goal must then evolved
44 Security Survey- the process of conducting an exhaustive physical examination and thorough
inspection of all operation system and procedures of a facility
45 Security Inspection- the process of conducting physical examination to determine compliance with
establishment security policies as a result of security survey
46 Security Hazard- any act or condition which may result in the compromise of information, loss of
life, loss or destruction of property or disruption of the objectives of the installation.
47 Security Education program- program given to employees of an installation by means of lecture
pertaining to measures and safeguards to be taken
48 Security Cabinet- added protection of important vital papers, plans, data, special correspondence,
cash, etc such as vault, safe and file room
49 Security Alarm System-combination of compatible intrusion and detection device so arranged and
wired as to support one another
50 Security lighting- providing of sufficient illumination to areas during hours of darkness to ensure
visibility ant to act ads deterrent to intruders
51 Shrinkage - The reduction in inventory due to theft or diversion.
52 Source tagging - Anti-shoplifting tags that are attached to products by manufacturers before they
reach stores.
53 Top guard - It is an additional outwardly inclined fixed structured usually barbed wires placed as
vertical fence to increase physical protection from intruders of a certain area.
54 Watchman or Security Guard, Watchman or Security Guard Agency - Any person who offers
or renders personal service to watch or secure either residential or business establishment, or both,
or any building, compound, or area including but not limited to logging concessions, agricultural,
mining or pasture lands for hire or compensation, or as an employee thereof shall be known as
watchman or security guard; and any person, association, partnership, or corporation, who recruits,
trains, muster, furnishes, solicits individuals or business firms, private or government-owned or
controlled corporations to engage his service or those of its watchmen, shall be known as Watchman
of Security Guard Agency.

CHAPTER TWO
PHYSICAL SECURITY

LESSON 1
PHYSICAL SECURITY IN GENERAL

PHYSICAL SECURITY DEFINED


It is the sum total of all physical safeguards employed or installed to secure the assets. These are
used to define, protect and monitor property rights and objects. It helps to combat the crime-related
threats that both employees and outsiders pose to the organization (for example: robbery, burglary, arson,
assault, rape, theft and vandalism).
Physical security measures are being used to define, protect, and monitor property rights and
assets. These measures consist of barriers and devices that would detect, impede, and prevent
unauthorized access to equipment, facilities, material and document and to safeguard them against
espionage, sabotage, damage and theft.

PRINCIPLES OF PHYSICAL SECURITY


1. Type of access necessary will depend upon a number of variable factors and therefore may be
achieved in number of ways.
2. there is not impenetrable barrier
3. Defense- in depth is barriers after barriers
4. Delay is provided against surreptitious and non- surreptitious entry.
5. Each installation is different.

TWO GENERAL TYPES OF PHYSICAL SECURITY


1. Natural Barriers-These are offered by nature which could obstruct or delay the passageway of
potential intruder.
2. Man-Made Barriers- these are structural construction like fences, walls, floor, grills bars, road block,
or other physical means to deter or impede penetration.

LESSON 2
PROTECTIVE BARRIER AND PERIMETER BARRIER
Protective Barrier defined
It refers to any structure or physical device capable of restricting, deterring, delaying illegal access to
installation. It defines the physical limits of an area and creates a physical and psychological deterrent to
unauthorized entry.

Perimeter Barrier defined


It refers to a medium or structure which define the physical limits of an installation or area to restrict or
impede access thereto. Any physical barrier used to supplement the protection of an inside or outside
perimeter.
 It is the first line of defense of an installation.
 This maybe in the form of fences, walls or even bodies of water.
 Used to deny or impede access or exit of unauthorized person.

PROTECTIVE BARRIER
A Barrier can be defined as any structure or physical device capable of restricting, deterring, illegal
access to an installation. Generally, barrier is use for the following purposes:
1. Define the limits of boundaries of an area.
2. Create physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders.
4. Assist in more efficient and economical employment of guards
5. Facilitate and improve the control and vehicular traffic.

TYPES OF PROTECTIVE BARRIER

1. Natural Barriers - It includes bodies of waters, mountains, cliff, terrain, ocean, marshes, ravines,
deserts or other terrain that are difficult to traverse.

2. Structural Barriers - These are features constructed by man regardless of their original intent
that tends to delay the intruder. Examples are walls, doors, windows, locks, fences, safe, cabinets
or containers etc.

3. Human Barriers Persons being used in providing a guarding system or by the nature of their
employment and locations, fulfill security functions.

4. Animal Barriers - Are used in partially providing a guarding system. Dogs are usually trained and
utilized to serve as guard dogs.

5. Energy Barriers - It is the employment of mechanical, electrical, electric energy imposes a


deterrent to entry by the potential intruder or to provide warning to guard personnel.

PURPOSE OF PROTECTIVE BARRIERS


1. Define the physical limits of an area
2. Create a physical and psychological deterrent to unauthorized entry
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of intruders
4. Assist in more efficient and economical employment of guards
5. Facilitate and improve the control of vehicular traffic

ADITIONAL PROTECTIVE BARRIERS


1. Top Guard- additional overhang of barbed were placed on vertical perimeter fences upward and
outward with a 45 degree angle with 3 to 4 strands of barbed wires spaced 6 inches apart. This
increases the protective height and prevents easy access.
2. Guard Control Stations- this is normally provided at main perimeter entrances to secure areas
located out- of- doors, and manned by guards on full- time basis. Sentry station should be near a
perimeter for surveillance at the entrance.
3. Tower Guard- this is a house- like structure, above the perimeter barriers. The higher the tower, the
more visibility it provides. Its gives a psychological unswerving effect to violators. By and large
guard towers, whether permanent or temporary, must have a corresponding support force in the
event of need. Towers as well as guard control stations should have telephones, intercoms, and it
possible two- way radios connected to security headquarters or office call for reserves in the event
of need.
4. Barrier Maintenance- Fencing barriers and protective walls should always be regularly inspected by
security. Any sign or attempts to break in should be reported for investigation. Destruction of fence
or sections thereof should be repaired immediately and guard vigilance should be increased.
5. Protection in Depth- In large open areas or ground where fencing or wailing is impractical and
expensive, warning signs should be conspicuously placed. The depth itself is protection Reduction
of access roads, and sufficient notices to warn intruders should be done. Use of animals, as guards
and intrusion device, can also be good as barriers.
6. Signs and Notice- “Control signs” should be erected where necessary in the management of
unauthorized ingress to preclude accidental entry. Signs should be plainly visible and legible from
any approach and in an understood language or dialect.

THREE LINES OF PHYSICAL DEFENSE

1. First line of defense - This includes perimeter fences, bodies of water or building walls.
2. Second line of defense - This includes doors, floors, windows, walls, roofs and grills and other
entries to the buildings.
3. Third line of defense - This includes storage system like steel cabinets, safes, vaults and interior
files.

PERIMETER BARRIERS
The main purpose of perimeter barrier is to deny or impede access or exit of unauthorized person
basically; it is the first line of defense of an installation. This maybe in the form of fences, building walls or
even bodies of water. The function and location of the facility itself usually determine the perimeter of the
installation. If facility is located in a city whereby the building or enterprise occupies all the area where it is
located, the perimeter may be the walls of the building itself. Most of the Industrial companies, however,
are required to have a wide space for warehousing, manufacturing etc.

Inside Perimeter - A line protection adjacent to protected area and passing through points of possible
entry into the area such as doors, windows, skylights or other points of access.

Outside Perimeter - A line of protection surrounding but somewhat removed from a protected area, such
as a fence.

Objectives of Perimeter Barriers


1. Outline the perimeter of the area to be secured
2. Great physical and psychological deterrent for unauthorized entry
3. Delay intrusion, thus facilitating apprehension of intruders
4. Assist in more economical and efficient employment of guards
5. Facilitate and improve the control of pedestrian and vehicular traffic

TYPES OF PERIMETER BARRIERS


1. Fences- are independent structures designed to control physical and visual access between
outside areas. Types of fences includes:
a. Solid Fence- It is made of opaque material constructed in such a way that visual access
through the fence is denied. Its advantage is that it denies the opportunity for the intruder to
become familiar with the personnel, activities and the time scheduled of the movements of the
guards in the installation. On the other hand, it prevents the guards from observing the area
around the installation and it creates shadow that may be used by the intruder for cover and
concealment. It is made of bricks, stone and concrete, and usually extended down into the
ground to a point view below the front line.

Advantages:
1. Denies visual access of the installation to the intruder.
2. Denies the intruder the opportunity to become familiar with the personnel, activities, and
the schedule of the movement of the guards.

Disadvantages:
1. Prevent the guards from observing the area around the installation.
2. Creates shadow which may be used by the intruder for cover and concealment.

b. Full view fence - It is constructed in such a way that visual access is permitted through the
fence structures such as wire fences. It is designed purely to control physical access between
the two areas:

Advantages:
1. It allows the roving patrol and stationary guard to keep the surrounding area of the
installation under observation.
2. It does not create any shadow.

Disadvantages:
1. It allows visual access to the installation.
2. It allows the intruder to become familiar with the movements and time schedule of the
guard patrols thereby allowing him to pick the time that advantageous on his part.

Wire Fences – It is a type of fence made of chain-link, barbed wire, concertina design with
small opening not larger than 2 square inches and made of number 9 gauge wire or heavier,
twisted and barbed salvage at top and bottom.
1. Chain-Link - This is considered as permanent fencing.
2. Barbed wires – Semi-permanent fencing. Usually used as top guard.
3. Concertina - Temporary fencing

Chain-Link Barbed Wires Concertina Wire Fence

Specifications of Chain-Link Fence Specification of Barbed Wire Fences:


1. It must be constructed of 7 feet 1. Standard barbed wire is twisted-
material excluding the top guard double-strand 12 gauge wire with 4
2. It must be 9 gauge or heavier point barb spaced an equal distant
3. Mess openings are not to be larger part
than 2 inches per side. 2. Barbed wire fencing should not be
4. It should be twisted and barbed less than 7 feet high excluding the
salvage at top and bottom. top guard
5. It should be security fastened to 3. Barbed wire fencing must be firmly
rigid metal or reinforced concrete. affixed to posts excluding top guard
6. It must reach below surface deep and at least 6 inches apart.
enough to compensate for shifting 4. The distance between strands will
soil or sand. not exceed 6 inches and at least one
7. It must reach within 2 inches of hard wire will be interlace vertical and
ground or paving. midway between the posts

Specification of Concertina Wire Fence Specification of Barbed Tape


1. Standard concertina barbed is a 1. Barbed tape is compose of barbed
commercial manufactured wire coil wire, barbed tape dispenser and
of high strength- steel barbed wire concertina tape
clipped together at intervals to from 2. Barbed tape is fabricated from a
a cylinder steel strip with a minimum breaking
2. Opened concertina wire is 50 feet system of 500 pounds
long and 3 feet in high 3. The overall width ¾ inch
4. The tape has 7/16 inch barbs spaced
½ inch interval along each side.

2. Building walls – it include wall, floor, roof or their combinations serves also as barriers and they
should be of such constructions to provide uniform protection just like wire fencing.

3. Bodies of water – it include river, lake, cataract, sea, pond or any bodies of water forming part of
the wall, building or fencing. However, it should not be considered an adequate perimeter barrier.
Additional security measures like wire fence, concrete walling, security patrolling and flood lighting
at night may be necessary for the portions of the perimeter.

TYPES OF PERIMETER BARRIERS OPENINGS


1. Gates and Doors - When noting use and controlled by guards, gates and doors in the perimeter
should be locked and frequently inspected by guards. Locks should be changed from time and
should be covered protective locks and key control.
2. Windows and similar opening – It should also be guarded or grills should be installed so as not
to be used by intruders.
3. Sidewalk Elevators - Elevated parts of the land near the perimeter barrier that provides access to
areas within the perimeter barriers and should be locked and guarded.
4. Utilities Opening - Sewers, air intakes, exhast tunnels and other utility opening which penetrate
the barrier and which have cross sectional areas of 96 square inches or more should be protected
by bars, grills, water filled traps or other structural means providing equivalent protection to that
portion of the perimeter barriers.
5. Clear zone - This is an unobstructed area maintained on both sides of the perimeter barrier.
a. A clear zone of 20 feet or more should exist between the perimeter barrier and exterior
structure, parking areas and natural or manmade features.
b. A clear zone of 50 feet or more should exist between the perimeter barrier and the structure
within the protected areas, except when the building constitutes a part of the perimeter
barrier.

PERIMETER GUARDS
Perimeter Guards are also employed in augmenting the existing perimeter barriers of a certain
establishment. The two types of employing perimeter guards are:
1. Fixed Post – Security guard are assigned in a particular place of the compound to guard and watch
the surrounding area; and
2. Patrol (Roving) – In this system, the security guard is required to walk and go around regularly
around the company premises.

LESSON 3
PROTECTIVE ALARMS
PROTECTIVE ALARMS DEFINED
It is an aural or visual signal given by the enunciator to security guard when intruder actuates
device in a protected area.

Enunciator – It is a visual or audible –signaling device, which initiates conditioning of associated circuits.

BASIC CONCEPT OF PROTECTIVE ALARMS


Another safeguard used to assist security to complement if not to supplement physical security is
an array of alarms. These alarms various types and cost can be installed indoors or outdoors.
Alarms system is designed to alert security personnel to consummated or attempted intrusion into
an area, building or compound. It assists the security in detecting, impeding, or deterring potential security
threat in the installation. Its function is to alert the security personnel for any attempt of intrusion into a
protected area, building or compound.

Operational zoning
Building being protected has a segmented alarm system, whereby the alarm can be turned on and
off within particular zones depending on usage.

TYPES OF ALARM SYSTEM


1. Metallic foil or wire- In building or compound, all possible point of entry can be wired by using
electrically charge strips of tinfoil or wire. Any action that will move the foil or wire breaks the
circuit and activate an alarm, metallic foil or wire are used in window or glass surface.
2. Photoelectric or Electric Eye Device - A light beam is transmitted at a frequency of several
thousand vibrations per second. It is connected by a wire a control station and when an intruder
crosses the beam, he breaks the contract with the photoelectric coil which thus activates the alarm.
An invisible or visible beam is emitted and when this is disturbed or when an intruder break contact
with the beam, it will activate the alarm.
3. Audio Detection Device-supersensitive microphone speaker sensor installed in walls ceilings and
floors of the protected area of any sound caused by attempted forced entry is detected by the
sensor. It will detect any sound caused by attempted force entry. A supersonic microphone speaker
sensor is installed in walls, ceilings, and floors of the protected area.
4. Vibration Detection Device- vibration sensitive sensors are attached to walls, ceilings or floors of
the protected area. The sensor detects any vibration caused by attempted forced entry. Any
vibration caused by attempted force entry is detected by the sensor. Can be effective to safeguard
enclose areas in sound detection system.
5. Microwave Motion Detection Device- A pattern of radio waves is transmitted and partially
reflected back to an antenna. If they strike a moving object, they return at a different frequency
which results in initiating an alarm signal. Very effective for protection of interior areas.
6. Ultrasonic Motion Detection Device- It consists of transceiver, amplifier and control unit. Any
motion within protected area causes an activation of alarm signal.
7. Capacitance or electrostatic detection device- The body capacitance of any intruder, who
enters the field, unbalances the electronic energy of the field which in turn activates the alarm. It
can be installed on safe, walls or openings therein to establish an electronic field around object to
be protected.
8. Laser Beam Alarm - A laser emitter floods a wall or fencing with a beam so that when this beam is
disturbed by a physical object, an alarm is activated.

OTHER TYPES OF PROTECTIVE ALARMS (Bank alarms)


1. Foot rail activator- It is placed on the floor in such a position that tellers may activate the alarm
by placing the front of their foot to engage the activation bar. Foot rails do not acquire any obvious
use of the teller’s hand and their hand may be kept in full view of the robbers for reason of safety.
Because foot rail can be activated very obtrusively and safely, it is frequently found in the bank
while standing up.
2. Bill traps or currency activation devices- Are usually placed in teller’s top, cash drawer and
connected to the alarm system using a wire connector. When currency is removed from the

devices, the alarm is activated. The advantage of these devices is that the robbers frequently
remove the currency and activate the alarm. This is particularly helpful when the employees are
immediately forced to leave their station without having an opportunity to activate the alarm
safely.
3. Knee or thigh buttons- It is installed inside the desk or teller station so they can be activated by
knee or thigh pressure. They are commonly found in location where personnel usually perform their
duties from seated position.
4. Foot button- It permits alarm activation in relatively safety while both hands remain clear in view
of the robbers.
5. Double squeeze buttons- requires pressure on both side of the device and therefore the
probability of accidental alarm is reduced.

TYPES OF ALARM DETECTION SYSTEM


1. Central Station System- central station is located outside the installation. It can be located in an
agency and the installation is one of the subscribers. When alarm is sounded, central station
notifies police and other agency. The alarm signal could be transmitted to any of the following:
a. Direct Wire system – Used by high-risk locations (Bank, Jewelries and Furriers)
b. Circuit Party System – This has a circuit transmission system where as many as 15 alarm
transmitter may send alarm to a single receiving panel at the central station over the same
time. Each alarm has a distinct code.
c. Multiplex System – This reduces leased telephone charges while at the same time providing
higher degree of line security than circuit loop alarms.
d. Digital Communicator – It is a computer –based which sends its original signal through the
regular switch line telephone network. The alarm signal transmitted series of coded electronic
pulses that can only be received on a computer type terminal at the central station.
e. Telephone Dialer – Delivers pre-recorded verbal message to a central station, answering
service, to police department when an alarm is detected.
f. Radio Signal Transmission – This method takes the alarm signal from the protected premises
and sends it via radio or cellular phone to either a central station or police dispatch center.
g. Video Verification – A video is sent to central station. This provides higher level of protection
while helping to eliminate false alarms by allowing central station operators to see what is
happening inside the protected area.
2. Propriety system-This function in the same way as central system except that it is owned by,
operated and located in the facility. Response to all alarms is by facility’s own security or fire
personnel. Since this system is monitored locally, the response time to an alarm is considerably
reduced. Usually the control center where operators are on continuous duty. Any triggering
information on fire, intrusion, or violation of security rules is monitored by security and then
appropriate action is initiated.
3. Local alarm system- Consist of rigging up a visual or audible alarm near the object to be
protected, a bell or light indicates an attempted or successful intrusion. In this case of alarm,
response will be made by the local guards and other personnel within sight or hearing. Its success
relies on someone hearing or seeing the signal and calling the responsible authorities. It also serves
to notify burglars that they have been detected. In this case, the sensor activates circuit, which in
turn activates a horn or siren or even flashing light, located in the immediate vicinity of the alarmed
area.
4. Auxiliary system- In this system installation circuits are led into local police or fire department by
lease telephone lines usually by special arrangements. The dual responsibility for circuits and the
high incidence of false alarms have made this system unpopular with public fire and police
personnel.
5. Local Alarm By Chance System - This is a local alarm system in which a bell or siren is sounded
with no predictable response. It is used in residence or small retail establishments. The hope is that
a neighbour or passing will reach to the alarm and call for police assistance, but such a call is
purely a matter of chance.
6. Dial Alarm System- This system is set to dial a predestined number when the alarm is activated.
The number selected might be the police or the subscriber’s home number, or both. When the
phone is answered, a recording states that an intrusion is in progress at the location so alarmed.
This system is relatively inexpensive to install and operate, but since it is dependent on general
phone circuit, it could fail if line were busy or if the phone connection were cut.

PARTS OF AN ALARM SYSTEM

1. Sensor or Trigger Device - It emits the aural or visual signal or both.


2. Transmission Line - A circuit which transmits the message to the signaling apparatus.
3. Annunciator - Signaling system that activates the alarm.

UTILIZATION OF ALARM DEVICES


The selection of proper alarm system is not a simple matter, because the needs of each installation are
different, like a set of fingerprints. Some factors that determine the requirement of the installation will
include the following:
1. Nature of the area or installation
2. Criticality of the area or complex
3. Vulnerability of the area or complex
4. Accessibility
5. Location of installation and area to be protected
6. Constructions and types of buildings
7. Hours of normal operations
8. Availability of other types of protection
9. Initial and recurring cost of installation alarm system
10. Design and salvage value of desired equipment
11. Response time of the security force and local police
12. Saving in manpower and money for a period of time if alarm is used

DESIRABLE CHARACTERISTICS OF ALARM SYSTEM


1. A detection unit should initiate the alarm upon intrusion of a human being in the area or vicinity
upon intrusion of a human being in the area or vicinity to the protected area or object.
2. Panel board central enunciator opening, console monitoring activities should be manned at all
times.
3. An enunciator console indicating the audible and/ or aural signal and the specific location of
incident so that proper action can be made by security and other unit.
4. Fail- safe features which give alarm in the enunciator when something is wrong with the system.
5. System should be difficult to tamper or render ineffective by outsiders, competitors or saboteurs.

SUMMING UP PROTECTIVE ALARM DEVICES


1. Alarm devices are physical safeguards used to assist security but not a replacement in the
protection and lives in the installation.
2. It assist the guards to extend their hearing and vision even in areas where they are not physically
present.
3. The alarm system whether a local, a central, proprietary, or an auxiliary type are to inform the
guard either visually or aurally of an attempt or a break-in within the premises being protected.
4. Maintenance of alarm system must be regularly made, the signal line must be protected, and there
must be alternate source of power.
5. New and improve intrusion hardwires are being developed and placed in the market but again, the
human guard is irreplaceable in spite of computerization and the arrival of super sophisticated
devices in security alarm systems.

LESSON 4
PROTECTIVE LIGHTING
PROTECTIVE LIGHTING
It is the single most cost-effective deterrent to crime because it creates a psychological deterrent to
the intruders.
It provides a means of continuing illumination during hours of darkness.
The idea that lighting can provide improve protection for people and facilities is as old as
civilization. Protective lighting is the single most cost effective deterrent to crime because it creates a
psychological deterrent to the intruders.
PURPOSES OF PROTECTIVE LIGHTING
1. Provides sufficient illumination to the areas during hours of darkness
2. Lightning can help improve visibility so that intruder can be seen and identified and, if possible
apprehended.
3. Lighting also gives that psychological fear and that serve as a deterrent to thieves, pilferer,
trespassers and saboteurs.

SIGNIFICANCE TO SECURITY FORCE


1. Reduction of the need for security forces.
2. Personnel protection for forces by reducing the advantages of concealment and surprise for a
determine intruder.
3. Relieved security forces could be used to better advantage elsewhere.

TYPES OF PROTECTIVE LIGHTING


1. Continuous lightning - It is otherwise called as stationary luminary. The most familiar type of
outdoor security lighting. This is designed to provide two specific results: glare projection or
controlled lighting. It consists of a series of fixed luminaries at range to flood a given area
continuously during hours of darkness.
a. Glare projection type - The intensity is focused to the intruder while the observer or guard
remains in the comparative darkness. It is being used in prisons and correctional institutions to
illuminate walls and outside barriers.
b. Controlled lighting - It is generally employed where, due to surrounding property owners,
nearby highways or other limitations, it is necessary for the light to be more precisely focused.
2. Standby lighting- turn on manually or physically as needed. It is designed for reserve or standby
use or to supplement continuous systems. It can be most useful to selectively light a particular area
in an occasional basis.
3. Movable or Portable lighting- - searchlight; supplementary top other types of lighting. This
system is manually operated and is usually made up of movable search or floodlights that can be
located in selected or special locations which will require lighting only for short period of time.
4. Emergency lightning. This system is used in times of power failure or other emergencies when
other systems are inoperative.

GENERAL TYPES OF LIGHTING SOURCES


1. Incandescent lamp - It is the least expensive in terms of energy consumed and has the
advantage of providing instant illumination when the switch is on.
2. Mercury vapor lamp - It is considered more efficient than the incandescent and used widespread
in exterior lighting. It emits purplish-white color caused by an electric current passing through a
tube of conducting and luminous gas.
3. Metal Halide - It has similar physical appearance to mercury vapor but provides a light source of
higher luminous efficiency and better color rendition.
4. Fluorescent lamp - This provides good color rendition, high lamp efficiency as well as long life. It
cannot project light over long distance and thus are not desirable as flood type lights.
5. High Pressure Sodium Vapor Lamp - This has gained acceptance for exterior lighting of parking
areas, roadways, buildings and commercial interior installations. Requires 2 to 5 minutes to light
when cold and longer periods to relight when hot.
6. Low-pressure Sodium Vapor- Produces yellow color.
7. Quartz Lamp-Produce Very bright light.

TYPES OF LIGHTING EQUIPMENT


1. Floodlights- These light project light in concentrated beams. These can be used to accommodate
most outdoor security lighting needs, including the illumination of boundaries, fences and buildings
and for the emphasis of vital areas or particular buildings.
2. Searchlight- These are highly focused incandescent lamps used to pinpoint potential trouble
spots.
3. Fresnel light- These are wide beam units, primarily used to extend the illumination in long,
horizontal strips to protect the approaches to the perimeter barrier. Fresnel projects a narrow,
horizontal beam that is approximately 180 degrees in the horizontal and from 15 to 30 degrees in
the vertical plane.
4. Street light- this produces diffused rather than directional beam. They are widely used in parking
areas. These lighting equipment received the most widespread notoriety for its value in reducing
crime.

LIGHTING APPLICATION/LIGHTNING SYSTEM


1. Fenced perimeter Lightning – It is used to illuminate the fence itself and the area beyond it
(“the detection zone”). Its objective is to reveal an intruder’s approach and produce glare towards
him, thus reducing his ability to see in the site. However, it can be difficult to apply because it may
create nuisance or hazards.
2. Area lightning – It is used in a building face perimeter consist of building or within 20 ft. of the
property or area line to be protected and where the public may approach the building. Guards may
be stationed inside or outside of the building. Doorways or other insets in the building’s face should
receive special attention for lightning to eliminate shadows.
3. Flood lightning – it is used to cast a strong light on the walls of buildings so that intruders are
visible either in silhouette (outline) or by the shadows which they cast.
4. Gate House Lighting – it is installed on active entrances for pedestrians and vehicles to facilitate
complete inspection of passengers, car, trucks and freight cars as well as their contents and
passengers.
5. Topping-up Lightning – it is used to illuminate dark areas not adequately lit by area or flood
lighting. Areas and structures within the installation property lines consist of yards, storage spaces,
large open working areas, piers, docks, and other sensitive areas and structures.

LESSON 5
PROTECTIVE LOCKS AND KEYS
(The Cheapest Security Measures)
Lock is one of the most widely used physical security devices in the asset protection program of an
installation. It complements other physical safeguards of the installation against any possible surreptitious
entry. However, the owner of the installation or his security officer needs to understand the weaknesses
and strength of each type of lock including the door, window or walls to be used to achieve maximum
benefit from its application. This is because highly skilled burglars more often concentrate on the lock and
its surrounding mechanism in order to make a forcible entry. It is for these obvious reasons that locks are
considered as delaying devices which cannot really stop a determine intruder from destroying the lock just
to launch an attack. Hence, knowledge of the basic principles of locking systems will enable the installation
owner or the security officer to evaluate any lock and determine its quality and effectiveness in a
particular application.

LOCKS DEFINED
A mechanical, electrical, hydraulic or electronic device to prevent entry into a building, room,
container or hiding place and to prevent the removal of items without the consent of the owner.

PADLOCK DEFINED
A portable and detachable lock having a sliding hasp which passes through a staple ring or the like
and is then made fast or secured.

KEY DEFINED
Instrument for locking and unlocking.
A metal bar with notches or grooves that, when inserted into a lock and turned, operates the lock's
mechanism.

PETERMAN DEFINED - An English term used to describe a lock picker.

TYPES OF LOCKS
1. KEY-OPERATED MECHANICAL LOCK- it uses some sort of arrangement of internal physical
Barriers (wards tumblers) which prevent the lock from operating unless they are properly aligned.
They key is the device used to align these internal barriers so that the lock may be operated.
2. WARDED LOCK – It offers very little security. This type of lock must therefore be used only to have
privacy but not to provide a high degree of security.
3. DISC TUMBLER LOCK – It is designed for the use of automobile industry and are in general used in
car doors today. Because this lock is easy and cheap to be manufactured, its use has expanded to
other areas such as desks, files and padlocks. The delay afforded is approximately ten minutes.
4. LEVER TUMBLER LOCK - These are difficult to define in terms of security since they vary greatly
in their effectiveness. They are used in safe deposit boxes and are for all practical purposes, pick-
proof.
5. PIN TUMBLER LOCK- The pin tumbler mechanism depends for its security, and a number of round
pin or tumblers operating on a cylinder. Each tumbler is divided into two parts, the upper which is
flat on bolt, is called the driver; the bottom part called the pin is rounded or slightly pointed on the
lower end to fit the grooves or cuts in the key.
6. COMBINATION LOCK – It was difficult to defeat they cannot be picked because few experts can
manipulate the device to discover the combination. Most of these locks have three dials, which
must be aligned in the proper order before the lock will open.
7. CODE-OPERATED LOCK - These are combination-type locks and that no key is used. Pressing the
series of numbered button in the proper sequence opens them. Some of them are equipped to
alarm if wrong sequence is pressed. These are high security locking device.
8. ELECTROMAGNETIC LOCKS – Devices holding a door by magnetism. These are electrical units
consisting of the electromagnetic on metal holding sequence. When the power is secured on the
door, they will resist pressure of to 1000 pounds.
9. CARD OPERATED LOCK - These are electronically or more usually magnetic. Coded card notched,
embossed or containing an embedded pattern of copper locks are used to operate such locks.
These are frequently fitted with recording device, which registers time of use and the identity of the
user.

TYPES OF KEYS
1. Master Key - A special key of opening a series locks. A key which will open all the locks when two
or more sub master systems exist.
2. Grand Master Key - a key that will open everything in a system involving two or more master key
groups.
3. Change Key - a key to a single lock within a master keyed system. Specific key, which operates
the lock and has a particular combination of cuts, or biting, which matches the arrangement of the
tumblers in the lock.
4. Sub Master Key - a key will open all lock with a particular area or grouping in a given facility.

Key Control
Once an effective key control has been installed, positive control of all keys must be gained and
maintained. This can be accomplished only if it is established in conjunction with the installation of new
locking devices. The following methods can be used to maintain effective key control.
1. Key cabinet – a well-constructed cabinet will have to be procured. The cabinet Will have to be of
sufficient size to hold the original key to every lock in the system. It should be secured at all times.
2. Key record – some administrative means must be set up to record code numbers and indicates to
whom keys to specific locks have been issued.
3. Inventories – periodic inventories will have to be made of all duplicate and original keys in the
hands of the employees whom they have been issues.
4. Audits- in addition to periodic inventory, an unannounced audit should be made of all key control
records and procedures by a member of management.
5. Daily report- a daily report should be made to the person responsible for key control from the
personnel department indicating all persons who have left or will be leaving the company. In the
event that a key has been issued, steps should be initiated to insure that the key is recovered

LESSON 6
PROTECTIVE CABINET

SECURITY CABINET
The third and final line of defense at any facility is in the high security storage where papers,
records, plans or cashable instrument, precious metals or other especially valuable assets are protected.
These security containers will be of a size and quantity, which the nature of the business dictates.
In protecting property, it is essential to recognize that protective containers are designed to secure
against burglary or fire. Each type of equipment has a specialized function and it will depend on the owner
of the facility which type he is going to use.

THREE (3) TYPES OF SECURITY CABINET


1. Safe- A metallic container used for the safekeeping of documents or small Items in an office or
installation. Safe can be classified as either robbery or burglary resistance depending upon the use
and need.

Specifications:
a. Its weight must be at least 750 lbs. And should be anchored to a building structure
b. Its body should at least one inch thick steel.
c. It is a small metallic container used to safeguard small items like documents, money and
jewelries.

Categories:
a. Fire safe
b. Burglary and robbery resistive

2. Vault- This is a heavily constructed fire and burglar resistance container usually a part of the
building structure used to keep and protect cash, documents and negotiable instruments. Vaults
are bigger than safe but smaller than a file room.

Specifications:
a. The vault door should be made of steel at least 6 inches in thickness.
b. The vault walls, ceiling, floor reinforce concrete at least12 inches in thickness.
c. The vault must be resistive up to 6 hours.

3. File room – It is a cubicle in a building constructed a little lighter than a vault but of bigger size to
accommodate limited people to work on the records inside.

Specifications:
a. The file room should at most be 12 feet high.
b. It must have a watertight door and least fire proof for one hour.

Safecracking Methods
a. Drilling or Punching - Accomplished by knocking off combination dial and drilling hole to expose
locking device.
b. Burring - The process of using high temperature oxyacetylene torches or “burning bars” to cut an
opening in the wall or door of the safe.
c. Peeling - It is the process of attacking the seams of metal plates with pry bars and other tools to
peel back layers of metal and thus exposing either locking mechanism or interior.
d. Ripping - Similar to peeling except ripping can be accomplished against a solid, metal walled
container with a thin wall.
e. X-Ray - Utilized to reveal the position of the combination and mechanism necessary to open the
safe.
f. Explosives - Nitro-glycerine and plastic explosives are still used but not as much as in the past.
g. Power tools - It involves the use of power drills, hydraulic tools and rotary devices.
h. Manipulation - Very few safe crackers have skill to use this technique.

LESSON 6
FIRE ALARM SYSTEM
FIRE ALARM DEFINED
Fire alarms are those devices installed to help detect fires or detect anything that causes fire such
as smoke or unusual rising of temperature.

TYPES OF PRIVATE FIRE PROTECTION SYSTEM


1. Automatic Sprinkler System - An integrated network of hydraulically designed piping installed in
a building, structure or area with outlets arranged in a systematic pattern which automatically
discharges water when activated by heat or combustion products from a fire. Types of Sprinkler
System could be classified into either of the following:
a. Wet Pipe System – the piping has water with pressure and the water sprinkler will operate when
head is opened and water will continue to flow until shut-off.
b. Dry Pipe System – the pipes are filled with air under pressure which holds the water at a value
located in room. When sprinklers head goes, into operation, air is released, trapping the dry
pipe value and allowing water to flow through system.
2. Fire Pumps - Mechanical device of supplying water which can be manual or motor-driven. These
pumps are ideal when natural supplies of water are readily available like a river, lake or stream.
3. Standpipes - Galvanized iron steel or plastic pipes located inside a building from the lowest to the
top floor with water under pressure for use in case of fire.
4. Fire Hydrant - Mechanical device strategically located in an installation or street where fire hose is
connected so that water with pressure will be available to extinguish a fire.
5. Portable Hand Extinguishers - A firefighting equipment which can be portable or in a cart that is
used to put out fire depending on the contents to extinguish certain types of fire.
6. Alarm systems - Buildings may also be equipped with detection systems that will transmit an
alarm. Some detectors are designed to respond to smoke and others to heat.
7. Smoke Alarms - Sounds an alarm upon the detection of smoke caused by fire. Types:
1. Photoelectric Cell (sees the smoke) – In some of these detectors, smoke that enters
obscures a steady beam of light; in others, the smokes scatters a light ray from a diode
so that the cell can detect it. In either case, the change sets off an alarm. Both eyes can
be run batteries or building current.
2. Ionization Devise or Radio-active device (feels the smoke)-This contains a small
radioactive source for ionizing the air molecules between a pair of electrodes, permitting
a very small current to flow between the pair. If smokes particles from a fire enter this
space, they reduce the flow of current by adhering to the ionized molecules. The drop in
current sets off a buzzer or other alarm.

CHAPTER THREE
PERSONNEL SECURITY

LESSON 1
DEFINITION AND NATURE OF PERSONNEL SECURITY
PERSONNEL SECURITY DEFINED
Includes all the security measures designed to prevent unsuitable individuals or persons of doubtful
loyalty to the Philippine Government, from gaining access to classified matters or to any security facility,
and to prevent the appointment, employment, or retention as employees of such individuals.
Of the three major aspects of security, personnel security is considered as the most important. This
is for the simple reason that security is considered as the assets to be protected and as source of security
involves people; both a losses are attributed mainly to negligence or active participation of employees,
either through theft and sabotage. This emphasizes the need to set a system of hiring the people for the
company.
PURPOSE OF PERSONNEL SECURITY
1. to insure that a firm hires those employees best suited for the firm; and
2. Once hired, to assist in providing the necessary security to these employees while they are carrying
out their functions.

KEY FUNCTIONS OF PERSONNEL SECURITY


1. It serves as a screening device in hiring suitable employees.
2. It provides background investigation service of both potential and present employees, for possible
assignment to sensitive of wrong doing.
3. It handles investigation of employees.
4. It attempts to ensure the protection of employees from discriminatory hiring or terminating
procedures as well as unfounded allegations of illegal or unethical activities and conduct.

PRINCIPLES OF PHYSICAL SECURITY


1. Type of access necessary will depend upon a number of variable factors and therefore may be
achieved in number of ways.
2. There is not impenetrable barrier
3. Defense- in depth is barriers after barriers
4. Delay is provided against surreptitious and non- surreptitious entry.
5. Each installation is different.

TTYPES OF PERSONNEL IDENTIFICATION


1. Personal Recognition
2. Artificial Recognition- identification cards, passes, passwords, etc.

USE OF PASS SYSTEM


1. Single pass system- the badge or pass coded for authorization to e enter specific Areas is issued to
an employee who keeps it in his possession until his authorization is terminates.
2. Pass exchange system- an exchange takes place at the entrance of each controlled area. Upon
leaving the personnel surrenders his badge or passes and retrieve back his basic identification.
3. Multi pass system- this provides an extra measure of security by requiring that an exchange take
place at the entrance of each restricted area.

SCOPE OF PERSONNEL SECURITY


1. Personnel Security Investigation (PSI)
2. Security Education

LESSON 2
PERSONNEL SECURITY INVESTIGATION
PERSONNEL SECURITY INVESTIGATION
Personnel Security Investigation (PSI) is a process of inquiry into the character, reputation,
discretion, integrity, morals and loyalty of an individual to determine the suitability for appointment of
access to classified matter.

Types of Personnel Security Investigation


1. National Agency Check
2. Local Agency Check
3. Background Investigation

GENERAL TECHNIQUES OF PSI


1. Background Investigation (BI) – this technique is very expensive but necessary in personnel
security. It serves to verify information on the application form and to obtain other information
pertinent to the decision to employ.

FACTORS TO CONSIDER IN THE CONDUCT OF BI


- Loyalty, Integrity, Discretion, Morals, Character, Reputation
COMPONENTS OF COMPLETE BI
- Applicants Name, Organization Membership, date of Birth, Neighborhood Investigation, Present
Residence Address, Character Reference, Personal History, Employment History, Martial History,
Military History, Residence History, Foreign Travel History, Citizenship, Criminal Record, Physical
Data, Credit Records, Educational History, Applicant’s signature, Date of Application.

TYPES OF LOCAL AGENCY CHECK (LAC)


a. Barangay Clearance
b. City Municipal Clearance
c. Local Police Clearance
d. Court Clearance

TYPES OF NATIONAL AGENCY CHECK (NAC)


a. National Bureau of Investigation (NBI) Clearance
b. PNP Directorate for Intelligence (DI) Clearance
c. Intelligence Service, AFP (ISAFP) Clearance

2. Positive Vetting – Is the process of inspecting or examining with careful thoroughness. The
essence of vetting that it is a personal; interview conducted under stress. It is based on information
previously given by the applicant. Other information is sued during the interview, such as those
discovered in the BI, which confirms or denies this given by the applicant.
3. Profiling – Is the process whereby a subject’s reaction in a future critical situation is predicted by
observing his behavior, or by interviewing him, or analyzing his responses to a questionnaire, such
as an honesty test. The Reid Report is an example of honesty test.
4. Deception Detection Techniques – This a process of using devices in detecting deception during
the interview stage. This includes the use of a Polygraph, Psychological Stress Evaluator and Voice
Analyzer.
5. Financial and Lifestyle inquiry – This type of investigation seeks to gather information on
income and mode of living, sometimes referred to as the earning to debt ratio.
6. Undercover Investigation – This is the placement of an agent in a role in which the agent’s true
identity and role remains unknown, in order to obtain information for criminal prosecution or for
recovery or limitation of asset losses.
7. Exit Interview – This is a valuable tool because it gives departing employees an opportunity to list
grievances. It offers security managers an opportunity to learn of problems not previously known.
Incorporating a checklist of company- issued property and confronting a departing employee of this
has resulted in reducing losses of company property. Debriefing an employee is also incorporated
into the exit interview to remind employees of their continuing legal obligation to safeguard
confidential company information.

LESSON 3
SECURITY EDUCATION
SECURITY EDUCATION is conducted to develop security awareness among employees of the company. It
should cover all employees, regardless of rank or position.

OBJECTIVES OF SECURITY EDUCATION


1. Guidance for all supervisory and executive levels of the organization
2. A mandatory indoctrination on security for all new personnel before their assignment of their
respective jobs
3. Development of high degree of security consciousness among the selected supervisors and other
key personnel in a program that should be continuing and supported by top management.
4. A down-the –line security program aimed at instilling consciousness and dedication through
demonstration, lectures, motivations and suggestions
5. To let all employees force informed that they all belong to the organization and that non-awareness
to the security program is tantamount to disloyalty
6. That the program is also to develop discipline, loyalty and belongingness.

PHASES OF SECURITY EDUCATION PROGRAM


1. Initial interview- it is the first time contact of the prospective employee wherein the interviewer
determine the suitability of the applicant for employment through his give answers on the different
type of question is being conducted. It is in this stage where the interviewer may start providing the
necessary information as to the overview of company security policies and at the same time on the
employee accountability and corresponding penalties that could result from violation there from.
2. Orientation and training- it is in this stage where new employees receive detailed presentation of
personnel security policy. Usually harvest or employees manual is being distributed for reference. New
employees also requested to sign acknowledgement that they have been aware of the exiting company
policies and will abide the same.
3. Refresher conference – it is design to remind employees of the company about their responsibilities,
review the guidelines and policies, introduction of new policies and regulations and a moment of
getting employees feedback about the company policies that is being implemented.
4. Security Reminders – a phase which employs an indirect approach of educating the employees such
as posting security posters and distributing fliers.
5. Security Promotion – it is the act of emphasizing the importance and role of employee cooperation
and support.

LESSON 4
BADGE AND PASS CONTROL
1. The system should have a complete record of all badges and identification cards issued return,
mutilated or lost by serial number and cross-indexed alphabetically.
2. The supervisor from time to time for its accuracy and authenticity should check the lists.
3. Passes and badges reported lost should be validated and security at entrance be informed through
conspicuous posting.

LESSON 5
VISITORS MOVEMENT CONTROL
Security should establish proper methods of establishing the authority for admission of visitors as
well as the limitation thereat. This security measure would depend on the sensibility o9f the installation,
but could include the following:
1. Visitor’s logbook – All visitors to any facility should be required to identify them and should be
given a visitor’s ID by the security. Visitors logbook should be filled up with the named of visitors,
nature and duration of visit.
2. Photograph – taking of photographs should also be considered. Extreme caution must be
exercised in areas where classified information is displayed to preclude unauthorized taking of
pictures of the installation. If a visitor has camera and it is prohibited to take picture, said camera
should be left in the care of security either corresponding receipt.
3. Escort – If possible visitors should be escorted by the security to monitor their activity within the
establishment and guide them where to go.
4. Visitor entrances- separate access for visitors and employees of the establishment should be
provided.
5. Time-traveled- If there is a long delay or time lapse between the departure and arrival, the
visitors may be required to show cause for the delay.

LESSON 6
PACKAGE MOVEMENT CONTROL
Every facility must establish a system for the control of package entering or leaving the premises.
However, desirable it might seem it is simply unrealistic to suppose that a blanket rule forbidding
packages either in or out would be workable. Such a rule would be damaging to the employee morale and,
in many cases, would actually work against the efficient operation in the facility. Therefore, since the
transporting of packages through the portals is a fact of life, they must be dealt with in order to prevent
theft land misappropriation of company properties. Thus.
1. No packages shall be authorized to be brought inside the industrial installation, offices and
work area without proper authority. This basic precept help reduce if not eliminate pilferage,
industrial espionage or sabotage.
2. Outgoing packages carried by personnel should be closely inspected and those in vehicles
should also be checked as many pilfered items are hidden in the surface of the vehicles
leaving the compound.
3. Any personnel/ visitor entering the installation with a package should deposit the same to the
security and in return receives a numbered tag, which he/ she will use in claiming his/ her
package upon departing.

LESSON 7
VEHICLE MOVEMENT CONTROL AND IDENTIFICATION
Vehicular traffic within the boundaries of any facility must be carefully controlled for safety as well
as to control the transporting of pilfered goods from the premises. Thus;
1. Privately owned vehicle of personnel/ visitor should be registered and are subject to the
identification and admittance procedure.
2. Vehicle should be subjected for search at the entrance and exit of the installation.
3. All visitors with vehicle should provide the security as to the complete details of their duration of
stay, person to be visited, and other information.
4. All vehicles of visitors should be given a sign/ sticker to be placed on the windshield.
5. Traffic warning signs should be installed in all entrances in or led to guide the precautions while
they are inside the installation
6. Security personnel must constantly supervise parking areas and make frequent spots searchers of
vehicles found there.

LESSON 8
BUILDING ACCESS CONTROL
At any physical barrier, a security system must possess the ability to distinguish among authorized
persons, unauthorized visitors, and other unauthorized persons. This is to assist the security personnel
protects sensitive are and information within the installation.
Appropriate warning signs should be posted at the building perimeter. Special restricted entry
facilities to public access should be provided. This will be dependent on the degree of security needed for
the protection of property, activity and other processes within the building.
The access to the restricted area shall be limited to authorize personnel who have the direct
involvement with the installation, construction and operation and maintenance of the equipment and
systems and/ or use of the materials contained within the restricted area. A clear- cut policy on the access
control should be disseminated to all personnel of this installation.

LESSON 9
COMMUNICATION SYSTEM IN SECURITY
The regular communications facility of a plant is not adequate for protective security purposes.
Security needs a special communication system that will vary in size, type, nomenclature, and cost
commensurate with the importance, vulnerability, size, location, radio propagation, and other factors
affecting the security of the installation.

EQUIPMENT USED IN COMMUNICATIONS


The following are some means of communication that can be useful part of the protective systems:
1. Local telephone exchange
2. Commercial telephone service
3. Intercommunication
4. Two-way radios
5. Paging and recall systems
6. Bullhorns or megaphones
7. Amplifier or loud speaker system
8. Cellular or mobile phones

CHAPTER FOUR
DOCUMENTS AND INFORMATION SECURITY
In every installation, document and information are indispensable for their daily operations and
activities, be it in the form of a paper, film, and magnetic media or in the computer system. Once there is a
leakage in the contents of a company’s document and information, the business operation stability is at
stake. It may be a st

art of bankruptcy that would lead to its total disclosure.


The leakage of document and information cost government, business and industry alike, billions of
pesos. A rival company or an enemy agent might use an illegally obtain document and information for
their own advantage. For this reason, a comprehensive and information security program is very essential
to the installation in order to focus freely on the attainment of its goal and objectives.
Protection of document and information entails a massive task on the part of the executives and the
staff of the installation. There should be a clear understanding on all the types of documents and
information of the organization. Security measures in the classification, handling, care and proper
disposition of classified documents and information must be a primary concern in order to preserve the
confidentiality and integrity of document and information throughout all phases of its existence.

LESSON 1
DOCUMENT SECURITY
What is Document Security?

It is the protection of records from its entire document life cycle. It also connotes in this context the
safeguarding classified matters.
In the Philippines, security of documents and information is based on the premise that the
government has the right and duty to protect official papers from unwarranted and indiscriminate
disclosure.

TERMS TO PONDER
1. Document – any recorded information regardless of its physical from ore characteristics, including
but not limited to the following:
a. Written matters whether hand written, printed or typed
b. All painted, drawn, or engraved matters.
c. All printed photographs and exposed or printed films, still or moving
d. All products of the forgoing for whatever purpose
2. Classified matters – Information or material in any form of any nature, the safeguarding of which
is necessary in the interest of the national security.
3. Security Clearance – an administrative determination from a security standpoint that an
individual is eligible fro access to classified matter of specific category.
4. Compartmentation – the granting of access to classified document or information to properly
cleared persons when such classified documents or information are required in the performance of
their official duties, and restricting it to specified physical confines when feasible.
5. Need-to know – the term given to the requirement that the dissemination of classified matters be
limited strictly to those persons whose official police or other government duty requires knowledge
or possession thereof.
6. Compromise – lose of security that results to unauthorized person obtaining knowledge on
classified matter.
7. Damage to property – the prejudice embarrassment or injury to the republic of the Philippines
resulting from any act or omission.
8. Classify – the assigning of an information or material to one of the four security classification
9. Upgrading – the changing of the classification of classified matter to category higher that the
previously assigned to it.
10. Reclassify or regrading – the act of changing the assigned classification of a document or
materials.
11. Declassify – The removal of the security classification from classified or material
12. Security officer – a properly trained and cleared individual who assists the chief of office in
discharging the responsibilities of safeguarding classified documents and materials.
13. Custodian – a cleared individual charged with the responsibility of safeguarding and accounting
classified materials.

What are the Standard Rules for Document Security?

1. The authority and responsibility for the preparation and classification of classified matter rest
exclusively with the originating office.
2. Classified matter should be classified according to their content and not to the file in which they are
held or of another document to which they refer, except radiograms or telegrams referring to
previously classified radiograms or telegram.
3. Classification should be made as soon as possible by placing the appropriate marks of the matter
to be classified.
4. Each individual whose duties allow access to classified matter, or each individual who possesses
knowledge of classified matter while it is in his possession and shall insure that dissemination of
such classified matter is on the “need-to-know” basis and to property cleared persons only.

Document Security Systems

Documents Security is that aspect of security which involves the application of security
measures for the proper protection and safeguarding of classified information.
Classification Categories – Official matter which requires protection in the interest of national
security shall be limited to four categories of classification which in descending order of importance shall
carry one of the following designations:

CATEGORIES OF CLASSIFIED DOCUMENTS

(TOP SECRET – SECRET - CONFIDENTIAL – RESTRICTED)


In Document and Information Security, a matter includes everything, regardless of its physical
character, or in which information is recorded or embodied. Documents, equipment ,projects, books,
reports, articles, notes, letters, drawings, drawings, sketches, plan, photographs, recordings, machinery,
models, apparatus, devices, and all other products or substances fall within the general term “matter”.
Information which is transmitted orally is considered “matter” for purposes of security.

Security Clearance is the certification by a responsible authority that the person described is
cleared for access to classified matter the appropriate level. Need- to –know is the principle whereby
access to classified matter may only be only given to those persons to whom it is necessary for the
fulfillment of their duties. Persons are not entitled to have access to classified matter solely by virtue of
their status or office. It is a requirement that the dissemination of classified matters be limited strictly to
persons whose official duty requires knowledge or possession thereof.

Certificate of Destruction is the certification by a witnessing officer that the classified matters
described therein has been disposed of in his presence, approved destruction methods.

Classified refers to assign information by one of the four classification categories. Security
Clearance refers to administrative determination that an individual is eligible for access to classified
matter. Compromise means lose of security, which results from authorized persons obtaining knowledge
of classified matter. Compartmentation is the grant of access to classified matter only to properly
cleaved persons in the performance pf their official duties.

Declassify is the removal of security classification from classified matter. Reclassify/Regrading


is the act of changing the assigned classification of matter of higher classification to a classified document.

What are Top Secret Matter?

These are information and material (matter), the unauthorized of disclosure of which would cause
exceptionally grave damage to the nation, politically or economically or from a security aspect. This
category is reserve for the nation’s closest secrets and is to be used with great reserve.

Classification Authority

The original classification authority for assignment of TOP SECRET classification rests exclusively
with the head of the department. This power may however, be delegated to authorized offices in instances
when the necessity for such arises. Derivative classification authority for TOP SECRET classification
(authority for) may be granted those officers who are required to give comments ore responses to a
communication that necessitates TOP-SECRETS response.

Examples of Top Secrets Documents

1. Very important political documents regarding negotiation for major alliances.


2. Major governmental projects such as proposal to adjust the nation’s economy.
3. Military – Police defense class/plans
4. Capabilities for major successes of Intel services.
5. Compilations of data individually classified as secret or lower but which collectively should be in
higher grade.
6. Strategies plan documenting overall conduct of war.
7. Intel documents revealing major Intel production effort permitting an evaluation by recipients of the
success and capabilities of Intel agencies.
8. Major government project like drastic proposals.

What are Secret Matters

These information and material (matter), the unauthorized disclosure of which would endanger
national security, cause serious injury to the interest or prestige of the nation or of any governmental
activity or would be of great advantage to a foreign nation.

A Secret grading is justified if:


1. It materially influences a major aspect of military tactics;
2. it involves a novel principle applicable to existing important projects;
3. It is sufficiently revolutionary to result in a major performance of existing secret weapons;
4. It is liable to compromise some other projects so already graded.

Classification Authority – same as TOP SECRET matter.

Examples of Secret Documents

1. Those that jeopardize or endanger Intel relations of a nation.


2. Those that compromise defense plans, scientific or technological development.
3. Those that reveal important intelligence operations.
4. War plans or complete pans for future war operations not included in top secret.
5. Documents showing disposition of forces.
6. New designs of aircraft projections, tanks, radar and other devices.
7. Troop movement to operational areas.
8. Hotel plans and estimates
9. Order of battle info.

What are Confidential Matters?

These are information and material (matter) the unauthorized disclosure of which, while not
endangering the national security, would be prejudicial to the interest or prestige of the nation or any
governmental activity, or would cause administrative embarrassment or unwarranted injury to an
individual or would be advantage to a foreign nation.

Confidential grading is justified if:

1. It is more than a routine modification or logical improvement of existing materials and


is sufficiently advanced to result in substantial improvement in the performance of
existing CONFIDENTIAL weapons.
2. It is sufficiently important potentially to make it desirable to postpone knowledge of its
value reaching a foreign nation.
3. It is liable to compromise some other project already so graded.

Classification Authority- Any officer is authorized to assign confidential classification to any matter in
the performance of his duties

Examples of confidential Documents

1. Plans of government projects such as roads, bridges, building, etc.


2. Routine service reports like operations and exercise of foreign power.
3. Routine intelligence reports.
4. Certain Personnel records, Staff matters.

What are Restricted Matters?

These are information and material (matter), which requires special protection other than that
determined to be TOP SECRET, SECRET, or CONFIDENTIAL.
Authority to classify shall be the same as for CONFIDENTIAL matter. Reproduction is authorized.
Transmission shall be through the normal dissemination system.

Control of Classified Matters


Custody and accounting of classified matter - Heads of departments handling classified matter
shall issue orders designating their respective custodians of classified matter. Custodian shall:
1. Store all classified matter.
2. Maintain a registry of classified matter showing all classified matter received and to whom
transmitted.
3. Maintain current roaster of persons authorized access to classified matter for each classification
in the office.
4. Insure physic cal security for classified matter.
5. Conduct an inventory of all TOP SECRET matter as specified in paragraph 7 (Memo Cir Nr 78/
196).
6. Upon his relief, account for all TOP SECRET and SECRET matter by inventory and transmit the
same to his successor.

Unauthorized keeping of private records – All government personnel are prohibited from keeping
private records, diaries, or papers containing statement of facts or opinions, either official or personal,
concerning matters which are related to or which affects national interest or security: Also prohibited are
the collecting of souvenirs or obtaining for personal use whatsoever any matter classified in the interest of
national security.
Dissemination

Discussion Involving classified matter

1. Indiscreet discussion or conversation involving classified matter shall not be engaged in within the
presence of or with unauthorized persons.
2. When lecture, address or informal talk to a group includes classified matter, the speaker shall
announce the classification at the beginning and end of the period.
3. All personnel leaving the government service shall be warned against unlawful disclosures of
classified matter.

Disclosures to other departments of classified information originating from another


department

Classified matter originating from another department shall not be disseminating to other departments
without the consent of the originating department.

Release of Classified matter outside a department

General Policy- No person in the government shall convey orally, visually or by written communication
any classified matter outside his own department unless such disclosures has been proceed and cleared
by the department head or his authorized representative.

Release of classified matter to congress


Government personnel, when giving oral testimony before Congressional Committee involving
classified matter, shall advice the committee of the classification thereof. Government personnel called
upon to testify shall obtain necessary and prior instruction from his department head concerning
disclosure.
When congressional members visit government offices, department heads are authorized to release
classified matter which is deemed and adequate response to an inquiry provided that it is required in the
performance of official functions.

Disclosure to Foreign Government or Nationals


1. Its use shall be solely for the purpose for which h the classified matter is requested.
2. It shall be treated or handled in accordance with the classified categories of the originating office.
3. Handling shall be made by security-cleared personnel
4. Reproduction and dissemination shall not be made without the consent of the department head.

Disclosure of classified matter for publication


Classified matter shall be released for public consumption only upon the consent of the department
head or his authorized representative. However, in instances where there is a demand or need for
releasing classified information, extreme caution must be exercised to analyze in detail contents of the
classified matter before release. Normally all information are released through Public Information Officers.
Public Information Officers should be assisted in the analysis of classified information by the Security
Officer.

What are the purposes of protecting Classified Materials?


1. Deter and impede potential spy
2. Assist in security investigations by keeping accurate records of the moments of classified
materials
3. Enforce the use of “Need to Know” principle

Categories of Document for Security Purposes


1. Category A
 Information which contains reportable time sensitive, order of battle, and significant
information.
 It should be given priority because it is critical information.
 It must be forwarded without delay.
 It is critical to friendly operations.
 It requires immediate action.
2. Category B
 Anything that contains communications, cryptographic documents, or systems that
should be classified as secret and requires special handling.
 Higher authorities should declassify it.
3. Category C
 Other information, which contains something that, could be an intelligence value.
 Contains exploitable information regardless of its contents.
 Unscreened materials/documents should be categorized as Category C.
4. Category D
 No value, yet lower level will never classify documents as category D.
 No decision must be made at the lower echelon that document has no value. It is the
responsibility of the higher Headquarters.

What are the rules for classification of documents?


1. Documents shall be classified according to their content.
2. The overall classification of a file or of a group of physically connected therein. Pages, paragraphs,
sections or components thereof may bear different classifications. Documents separated from file
or group shall be handled in accordance with their individual classification.
3. Transmittal of documents or endorsements which do not contain classified information or which
contain information classified lower than that of the preceding element or enclosure shall include a
notation for automatic downgrading.
4. Correspondence, Indexes, receipts, reports of possession transfer or destruction, catalogs, or
accession list shall not be classify if any reference to classified matter does not disclosed classified
information.
5. Classified matter obtained from other department shall retain the same original classification.

THREE (3) SECURITY CONCEPTS


1. Personnel are the weakest link in the security chain.
2. Training is important to make security personnel conscious and realize the value of document.
3. Training is necessary for the practice of “Need to Known” principle.

RULES FOR CLASSIFICATION OF DOCUMENTS


1. Documents shall be classified according to their content.
2. The overall classification of a file or a group of physically connected therein. Pages, paragraphs,
sections or components thereof may bear different classifications. Documents separated from file
or group shall be handled in accordance with individual classification.
3. Transmittal of documents or endorsements which do not contain classified information or which
contain information classified lower for than that of the preceding element or enclosure shall
include a notation for automatic downgrading.
4. Correspondence, Indexes, receipts, report of possession transfer or destruction, catalogs, or
accession list shall not classify if any reference to classified matter does not disclosed classified
information.
5. Classified matter obtained from other department shall retain the same original classification.

LESSON 2
INFORMATION SECURITY
What is Information Security?
Information security means protecting information systems from unauthorized access, use,
disclosure, disruption, modification or destruction.
The terms information security, computer security and information assurance are frequently used
interchangeably. These fields are interrelated and share the common goals of protecting the
confidentiality, integrity and availability of information: however, there are some subtle differences
between them. These differences lie primarily in the approach to the subject, the methodologies used, and
areas of concentration. Information security is concerned with the confidentiality, integrity and availability
of data regardless of the form the data may take: electronic, print or other forms.
Governments, military, financial institutions, hospital and private businesses amass a great deal of
confidential information about their employees, customers, products, research, and financial status. Most
of this information is now collected, processed and stored on electronic computers and transmitted across
networks to other computers. Should confidential information about a business’s customers or finances or
new product line fall into the hands of a competitor, such a breach of security could lead to lost business,
law suits or even bankcruptcy of the business. Protecting confidential information is a business
requirement, and in many cases also an ethical and legal requirement. For the individual, information
security has a significant effect on Privacy, which is viewed very differently in different cultures.
The field of information security has grown and evolved significantly in recent years. As a career
choice there are many ways of gaining entry into the field. It offers many areas for specialization including
Information System Auditing, Business Continuity Planning and Digital Forensics Science, to name a few.

What are the basic principles of Information Security?

1. Confidentiality

Confidentiality is a requisite for maintaining the privacy of the people whose personal information the
organization holds.

Information that is considered to be confidential in nature must only be accessed, used, copied, or
disclosed by persons who have been authorized to access, use, copy, or disclose the information, and then
only when only when there is a genuine need to access, use, copy or disclose the information. A breach of
confidentiality occurs when information that is considered to be confidential in nature has been, or may
have been, accessed, used, copied, or disclosed to, or, by, someone who was not authorized to have
access to the information.

For example: permitting someone to look over your shoulder at your computer screen while you have
confidential data displayed on it would be a breach of confidentiality if they were not authorized to have
the information. Giving out confidential information over the telephone is a breach of confidentiality if the
caller id not authorized to have the information.

2. Integrity

In information security, integrity means that data cannot be created, changed, or deleted without
authorization. It also means that data stored in one part of a database system is in agreement with other
related data stored in another part of the database system (or another system).

For example; a loss of integrity can occur when a database system is not properly shut down before
maintenance is performed or the database server suddenly loses electrical power. A loss of integrity also
occurs when an employee accidentally, or with malicious intent, deletes important data files. A loss of
integrity can occur if a computer virus is released onto the computer.

3. Availability

The concept of availability means that the information, the computing systems used to process the
information, and the security controls used to protect the information are all available and functioning
correctly when the information in needed. The opposite of availability is denial of service.

Three types of control in Information Security

When management chooses to mitigate a risk, they will do so by implementing one or more of
three different types of controls.
1. Administrative Control – Consist of approved written policies, procedures, standards and
guidelines. Administrative controls from the framework for running the business and managing
people. They inform people on how the business is to be run and how day to day operations are to
be conducted. Laws and regulations created by government bodies are also a type of
administrative control because they inform the business. Some industry sectors have policies,
procedures, standards and guidelines that must be followed - the Payment Card Industry (PCI) Data
Security Standard required by Visa and Master Card is such an example. Other examples of
administrative controls include the corporate security policy, password policy, hiring policies, and
disciplinary policies.
Administrative controls form the basis for the selection and implementation of logical and
physical controls. Logical and physical controls are manifestation of administrative controls.
Administrative controls are of paramount importance.

2. Logical controls (also called technical controls) – use software and data to monitor and
control access to information and computing systems. For example: passwords, network and host
based firewalls, network intrusion detection systems, access control lists, and data encryption are
logical controls.

An important logical control that is frequently overlooked is the principle of least privilege. The
principle of least privilege requires that an individual, program or system process is not granted any
more access privileges than are necessary to perform the task. A blatant example of the failure to
adhere to the principle of least privilege is logging into Windows as user Administrator to read email
and surf the web. Violations of this principle can also occur when an individual collects additional
access privileges over time. This happens when employees’ job duties change, or another
department. The access privileges required by their new duties are frequently added into their
already existing access privileges which may no longer be necessary or appropriate.

3. Physical controls – monitor and control the environment of the work place and
computing facilities. They also monitor and control access to and from such facilities. For example:
doors, locks, heating and air conditioning, smoke and fire alarms, fire suppression system, cameras,
barricades, fencing, security guards, cable locks, etc. separating the network and work place into
functional areas are also physical controls.

An important physical control that is frequently overlooked is the separation of duties.


Separations of duties ensures that an individual cannot complete a critical task by himself. For
example: an employee who submits a request for reimbursement should not also be able to
authorize payment or print the check. An application programmer should not also be authorize
payment or print the check. An applications programmer should not also be the server
administrator or the database administrator – these roles and responsibilities must be separated
from one another.

What is cryptography in the information security?

Cryptography is the practice and study of hiding information. Information security uses
cryptography to transform usable information into a form that renders it unusable by anyone other
than an authorized user; this process is called encryption. Information that has been encrypted
(rendered unusable) can be transformed back into its original usable form by an authorized user,
who possesses the cryptographic key, through the process of decryption.

Cryptography is used in information security to protect information from unauthorized or accidental


discloser while the information is in transit (either electronically or physically) and while information
is storage.
Cryptography provides information security with other useful application as Well including improved
authentication methods, message digests, digital signatures, non-repudiation, and encrypted

LESSON 3
PROTECTION OF SENSITIVE INFORMATION
INTRODUCTION
In the business community it is seldom heard about the protection of such information which we
believe should be given enough protection. In the security protection, a security professional should deal
with this squarely and fairly as in other security aspects like physical security and personnel. In our
discussion, we will try to understand why this should be and what kind of information should be given
ample protection and distinguish them from one another. Also, why and in what way we are losing them.

PROPRIETARY INFORMATION DEFINED


Proprietary information is information that in some special way relates to the status or activities of
the possessor and over which the possessor asserts ownership. In the business community, proprietary
information relates to the structure, products or business methods of the organization. It is usually
protected in some way against causal or disclosure.

PRIMARY DISTINCTIONS BETWEEN PROPRIETARY INFORMATION AND CONFIDENTIAL DATA


The most basic distinction in regard to proprietary information is between trade-secret data and all
other types of confidential data.
The difference is of great importance because the rights and remedies available to one which
proprietary information is improperly disclosed or exploited depends upon the legal status of that
information.
Generally, trade secrets are afforded greater legal protection than confidential information not
amounting to trade secrets. Of practical importance is the test applied to determine whether information is
a trade secret.
All proprietary information is confidential, but not all confidential information is proprietary. For
example, confidential personnel data in employee files is not considered as proprietary although the
companies treat it as confidential.

PROPRIETARY INFORMATION PROTECTION PROGRAM


Realizing that the most serious threat to trade secrets is the employees a measure of protection is
often realized through the use of employee agreements which the company. The following
countermeasures may be adopted:
1. Policy and procedure statement regarding all sensitive information.
2. Pre and post-employment screening and review.
3. Non- disclosure agreements form employees, vendors, contractors and visitors.
4. Awareness programs
5. Physical security measures
6. Informed monitoring

TYPES OF PROPRIETARY INFORMATION

TRADE SECRETS
This consist of any formula, pattern, device or compilation of information which is used in one’s
business and which gives him an opportunity to again an advantage very competitors who do not know or
use it. It may be a formula for a chemical compound a process of manufacturing, treating or preserving
materials, a pattern for machine or device, or ephemeral events. A trade secret is a process or device for
continuous used in the protected of the business.
Trade Secret means information including a formula, pattern, compilation, program, device, method,
technique or process that:
(1) Derives independent economic value, actual or potential, from not being generally known to, and
not being readily ascertainable by proper means, by other persons who can obtain economic value
from its disclosure or use, and
(2) Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.
(3) The definition of “trade secret” contains a reasonable departure from the Restatement of Torts
definition which required that a trade secret be “continuously used in one’s business”. The
broader definition in the proposed Act extends protection to a plaintiff who has not yet had an
opportunity or acquired the means to put a trade secret to use.
A more recent legal definition of a Trade Secret is found in Section 1(4) of the Uniform Trade
Secret Act. It reads:
1) “Trade Secret” means information including a formula, pattern, compilation, program device,
method, technique or process that
2) derives independent economic value, actual or potential from not being generally known to and not
being readily ascertainable by proper means, by other persons who can obtain economic value
from its disclosure or use, and
3) Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

THE ESSENTIAL ELEMENTS OF A TRADE SECRET:


1. It is not to be generally known to others and
2. Some advantages are gained by the user from its use or possession.

WHAT IS SECRET?
This question is taken up first because it is relevant even in cases where the data involved are not
trade secrets but merely simple facts. If information is not novel or secret, it is not entitled to any
protection; it is the property of everyone and it is in the public domain.

To be secret, information must generally meet the following tests:


1. It must be identifiable.
2. It must not be already available in public sources.
3. It must be disclosed by the owner only to persons who are under some duty to protect its secrecy.
4. Persons to whom it is disclosed must know it is a secret.
5. There must be some objective indication that the owner is attempting to prevent its unauthorized
disclosure

IDENTIFIABLE
The amount of information or data defined as secret or confidential should be as small as possible
while remaining consistent with the business’s real objectives and operating needs.

NOT ALREADY IN PUBLIC


If information claimed as secret is found in publicly accessible sources such technical journals, trade
meeting minutes, encyclopedias, and documents filed with public agencies, then it is very hard to achieve
protection.

DISCLOSED TO PERSONS WITH A DUTY TO PROTECT


One person cannot make another person the unwilling possessor of the first person’s secret.
There must be a relationship between the persons that requires receiving the disclosure to
safeguard it, or there must be an agreement, expressed or implied, imposing that obligation.
Otherwise, a disclosure of a secret cannot build the one to whom it is disclosed to protect it.
This class of persons under a duty to safeguard-fiduciaries - as the law terms them - must first be
shown the existence of a secret. Then the relationship must be shown as well as the fact that the fiduciary,
the trusted person, knew that the information involved was secret. Subsequent disclosure during the
relationship and knowledge or pressurized knowledge, is wrongful.

EMPLOYEES
Under common laws employees are presumed to be fiduciaries to the extent that they may disclose
the secrets of their employers without authorization.
As a class, the employees are the largest group of persons bound to secrecy because of their status
or relationship.
In general, employees are bound to protect their employer’s secret.

PERSONS OTHER THAN EMPLOYEES


Other than employees, persons to be bound to secrecy must agree to be so bound. Agreement may
be implied from the acts and conduct of the parties, and need not be written or expressed.
The wiser course in such cases is to reduce the agreement in writing. Even the acceptance of a
purchase order by return of an acknowledgement copy is already enough to hold the vendor to all the
terms and conditions of the order which are recited on it.

DISCLOSEES MUST KNOW THE INFORMATION IS CONFIDENTIAL


Any company may require employees not to disclose any information about the company not
already known outside, whether such information is a trade secret or not.

OBJECTIVE INDICATIONS OF ATTEMPTS TO PROTECT SECRECY


The owner of the secret information must be able to show that he or she undertakes to protect the
information claimed to be secret. There is no single “laundry list” of protective measures, but the following
have been recognized at one time or another, by one court or another:
1) Restricting non-employee access to places containing secret information.
2) Placing warning signs and instructions to alert employees to the sensitivity of certain things and
places.
3) Informing employees and visitors that information obtained or things seen in certain locations
within a facility are secret.
4) Storing sensitive documents separately in containers for which special security precautions are
taken.
5) Imposing area controls within a facility among different classes of employees with respect to certain
information or operations.

Obviously, the more precaution the owner of secret information takes to prevent unauthorized
disclosure, the better the information is protected and the easier it is to show that an unauthorized
person must have done something wrongful to obtain access.

PATENTS
This is a grant made by the government to an inventor, conveying or securing or securing to him
the exclusive right to make, use, or sell his invention for term of years.

It refers to any technical solution of a problem in any field of human activity, which is new, involves an
inventive step and is industrially applicable. It may be, or refer to, any product, process, or an
improvement of any of the foregoing. [Sec. 21, RA 8293] It is vested from the issuance of letters of patent.

PRIMARY DISTINCTIONS BETWEEN PATENTS AND TRADE SECRETS


The main differences between a Trade Secret and a Patent are:
a) The requirement for obtaining a patent are specific, to qualify for a patent, the invention has to
represent a positive contribution beyond the skill of the average person, whereas the trade secret
needs a much lower novelty.
b) A trade secret can remain a secret for as long as it continues to meet the “trade secret test”,
whereas an exclusive right patent expires after a period of 17 years.
c) Since anyone can purchase a patent, they are not industrial espionage targets, whereas trade
secrets are.

VULNERABILITIES OF SENSITIVE DATA


There are three broad threats to sensitive data or information:
1. It can be lost through inadvertent disclosure.
2. It can be deliberately stolen by an outsider– an industrial espionage agent in the classic sense.
3. It can be deliberately stolen by an insider entrusted with access to it.

INADVERTENT DISCLOSURE
Inadvertent Disclosure usually occurs in one of its following context:
1. Sales Presentations
2. Trade Association Meetings/Shows
3. Discussion with Suppliers
4. Off Premises Statements by Employees
5. Press & Public Relations

INTENTIONAL THEFT BY INSIDERS


In addition to theft by a current employee, there is also the problem that a former employee may
obtain a better position with a competitor and, once there, expose the former employer’s sensitive data.
This typically arises in the trade secrets situation and, as was pointed out earlier, is then important for the
original owner to establish a proprietary position and also to establish the former employee’s breach of
trust.
Litigating trade secret cases involving former employees now working for a competitor poses three
serious threats.
The original owner may have to expose the very trade secret data he or she wishes to protect in order
to prove ownership. Secrecy precautions invoked in court may not safeguard the owner against further
compromise.
Legal action may be much costlier than protective steps properly taken.
The owner may lose the litigation because the new employer in the course of the new employment
relationship is better achieved by requiring noncompetitive covenants from key employees. This technique
is more fully developed in the later discussion of countermeasures.

PROTECT SENSITIVE INFORMATION


Effective Programs of information security involve considerations touching on physical, personnel,
and communications countermeasures.

COMPETITIVE INTELLIGENCE COLLECTORS


The most important function of competitive intelligence is to alert senior management to
marketplace changes to prevent surprise.

A single element of information may mean little, but the compilation and analysis of many elements
of many sources can provide an astonishingly accurate portrait of a highly sensitive proprietary process.
For example:
 Newspaper classified advertising for new employees can provide the types of workers required and
facilitate deducing the probable production start date.
 Documents filed with local planning authorities can provide the physical dimensions of the facility
and interior layout.
 Technical journal articles by the engineering staff offer information on advanced manufacturing
process to be employed.
 A presentation by a member of the marketing staff, published in the proceedings of a marketing
seminar, may detail a statistical formula for pricing and product distribution and
 Casual conversations with construction workers can reveal the intended layout of a manufacturing
line for a new project.

In general, complete programs of data protection include the following elements:


1. Policy and procedural statements which cover the recognition, classification, and handling of
sensitive information.
2. Pre-employment screening techniques and incumbent employee review procedures to assure that
persons entrusted with sensitive data do not have any ascertainable motive or reason to exploit
such data and are basically stable.
3. Awareness programs in which all employees are made aware of the existence of sensitive data in
the company, their responsibilities in protecting it, and the required procedures.
4. Nondisclosure agreements from employees, in which they acknowledge their fiduciary
responsibility.
5. Nondisclosure agreements from employees to whom significant kinds and amounts of sensitive
data are released. These records may also include periodic reaffirmations of non-disclosure
responsibility.
6. Noncompetitive agreements from specified classes of personnel to prevent their taking
employment with defined competitors within a stated future period.
7. Physical measures such as area and access controls, admittance controls, identification devices and
routines, secure storage containers, regulated reproduction facilities, controlled trash disposal, and
restrictions on use of communications media to minimize the probability that unauthorized persons
will gain access to sensitive data on or off the premises.
8. Follow up efforts with new employers of former employees who were exposed to sensitive data
but who were not required to execute non-competitive agreements. Such programs include
notices to the new employer of the former employee’s exposure and responsibility to protect
9. Continuous and informed monitoring of routine activities in the field to detect appearances of one’s
sensitive data.

POLICY STATEMENT
The model policies utilize two familiar principles of military security, those of classification and
need-to-know.
1. PRE EMPLOYMENT SCREENING
2. MODEL AGREEMENTS
3. NONCOMPETITIVE COVENANTS
ELECTRONIC EAVESDROPPING

Knowingly and without lawful authority:


a) Entering into a private place with intent to listen surreptitiously to private conversations or to
observe the conduct of any other person or persons therein; or
b) Installing or using outside a private place any device for hearing, recording or amplifying, or
broadcasting sounds originating in such place, which sounds would not ordinarily be audible or
comprehensible outside, without the consent of the or persons entitled to privacy therein;
c) Installing or using any device or equipment for the interception of any telephone, telegraph, or
other wire communication without the consent of the person in possession or control of the facilities
for such wire communication.

EAVESDROPPING TACTICS AND EQUIPMENTS


The term eaves-dropping includes wiretapping and bugging.
WIRE TAPPING
It is the interception of communications over a wire without the consent of the participants and
requires physical entry into the communication circuit.
Some devices however use induction as a means of intercepting the signal and therefore do not
need physical entry into the circuit. In most states you only need the consent of one of the parties.

BUGGING
It is the interception of communications without the consent of the parties by means of electronic
devices without penetration of the circuit.

WIRED MICROPHONES
Carbon Microphone, commonly used in a standard (old fashioned) telephone handset.
Crystal Microphone, this generates a small electric current when the crystal is vibrated by sound
waves. They are used in two different ways.

1) Contact Microphones installed on a common wall with the target area.


2) Spike Microphones installed in a hole in the common wall (not so that they penetrate).

Dynamic Microphones, these operate by the movement of a small wire near a permanent magnet
which converts the vibration (caused by the sound) into electrical energy (self-powering). A good eaves-
dropping device and it operates like a loud speaker in reverse.
Pneumatic Cavity Device, has a specifically designed small cavity which picks up surface vibrations
(like the glass tumbler effect).

Condenser Microphone, used primarily in personnel address (PA) systems and audio recording –
it is extremely small.
Electret Microphone, used primarily in conferences, picks up sound from many directions around
the room.
Cardioid Microphone, picks up sound from directly in front of the microphone.
Parabolic Microphone, gathers audio energy and directs it to a conventional microphone in the
center of a dish type reflector.
Shotgun Microphone, a bulky arrangement of tubes gathers sound and sends it to a microphone
connected to the tubes.

WIRELESS MICROPHONES
A radio frequency (RF) device consisting of a microphone, transmitter, power supply, antenna and
in some applications a receiver as well (BUG).

CURRENT CARRIER DEVICES


Carry audio signals over virtually every type of wire path (e.g., wireless home intercom system).
Signal is usually blocked by power transformers.

LIGHT TRANSMISSION
Laser beam focused on a window pane, the vibrating glass modulates the reflected beam and the
sound signal is extracted from the reflected light signal.
ELECTRO-MAGNETIC RADIATIONS
Detectable electro-magnetic energy is generated by electronic information processing devices.
Detection of the energy and extracting the information, is possible over several hundred feet.
The ‘Faraday Cage’ method of screening is used for very sensitive processing. (Tempest
Shielding).

SPEAKERS
Ordinary speakers in TV’s, radios, PA systems, intercoms, etc., can be used in reverse to pick up
sounds from the room they are located.

TELEPHONE EAVESDROPPING
Interceptions from the line. Information is acquired from the line and includes voice, fax, teletype and
other data.

Two main principles used are:


1) Direct physical connection anywhere on the line between the target area and the telephone
exchange.
2) Inductive coupling which does not require a physical connection.

Use of target’s telephone equipment requires physical entry into the target area.
Three types of attack are:
1) Wiring alterations of the telephone require technical knowledge.
2) Drop-in transmitter, used on older types of telephones (bug).
3) Infinity transmitter, can be accessed from anywhere in the world using another telephone. Cannot
be used in electronic telephone switching systems.

DEFENSE AGAINST ELECTRONIC EAVESDROPPING


Scrambler, an encryption equipment used to disguise information.
“VOCODER” is the best available scrambler in the market.
Sound Barrier (not acoustic tiles)
Partitions, floors, ceilings, use non-porous material or staggered stud construction.
Windows and doors, double panes with curtains, solid doors with rubber or felt gaskets.
It is better if two doors are used in series and are properly sealed.
Cracks, holes, and ducts. Seal all openings, line ducts and install acoustic baffles. (A/C duct!!)

PHYSICAL SEARCH
Detailed, time consuming, and an expensive task conducted in special areas only. It is required for
a complete counter measures survey.
Includes:
1) All furniture and equipment moved and examined.
2) Baseboards examined for signs of modification.
3) Walls examined in detail for holes, mismatch paint, new plaster, etc.
4) All wiring traced and accounted for, any not in use to be removed.
5) Light switches, telephone jack sockets and main outlets pulled out and examined.
6) Ventilation duct covers removed and ducts examined.
7) Space above plenum ceiling, and below raised floors, stages, etc. examined.

TELEPHONE SEARCH
This task is carried out by a technician who is familiar with the telephone equipment used.
Areas covered:
1) Handsets inspected for drop-in transmitter or writing alterations.
2) All cables inspected for unusual attachments or bulges.
3) Junction boxes and writing cupboards examined and all connections verified.
4) Telephone distribution room wiring verified (probably the most sensitive and vulnerable area).

ELECTRONIC SEARCH
No electronic sweeping equipment (scanners etc.) or techniques can guarantee to find a well installed
device installed by an experienced technician.

The types of equipment employed in electronic searches are:


1) Time Domain Reflectometry, an electronic picture of the telephone line at a particular time
which is compared to the same line at a future time.
2) Telephone Analyzer, an electronic analysis of the telephone instrument and of the telephone line
for wiring modifications or an installed radio transmitter.
3) Field Strength Meter, measures the relative radio frequency energy present at a given point, not
as good as a countermeasures receiver.
4) Counter-measures Radio Receiver, searches a large part of the RF Spectrum to isolate and
identify a signal.
5) Spectrum Analyzer, displays a large part of the RF spectrum and the corresponding side bands. It
is used in conjunction with the Counter-measures Receiver to find and give a visual analysis of the
signal.
6) Non-linear Junction Detector, this detects such devices as microphones, recorders, transmitters
(when not transmitting) etc. It looks for the ‘nonlinear’ junctions between dissimilar metals.
7) Metal Detectors are not very reliable.
8) A Pen-Register is a device used to monitor telephone calls by providing a record of all telephone
numbers dialed from a particular phone and the date and time the calls were made.

AUDIO MASKING
The generation of noise at the perimeter of the secure area to cover or mask conversations.
Music is not used, as it is fairly easy to filter out from a recording, best to use ‘white’ or ‘pink’ noise.

POST SEARCH SECURITY


After a search is completed, the room must be kept very secure, or else survey cannot guarantee
the room to clean when next used. If a device, or wiring alteration is found, then a decision is needed on
what action is to be taken; removal or use to provide dis-information.

SAFES, VAULTS & OTHER STORAGE CONSIDERATIONS

Safes are designated either fire resistive or burglary resistive. There is no federal or state law
or code mandating the rating of safes, and two organizations currently rate safes in the
US: Safe Manufacturers National Association (SMNA),
and Underwriters Laboratories (UL).

Fire Resistant Safes - Fire Resistant Safes offer very little protection against the safe cracker and
once exposed to a fire the original degree of protection offered is lost, and it must be replaced.
For tables which list the various categories and ratings see the Physical Security Section.
Burglar Resistant Safes - They are available in the market for the purpose of storing.

Vaults - Defined as enlarged safes, usually made of high quality reinforced concrete, except the
door. The five sides should be twice as thick as the door but never less than 12”. The vault door is usually
made of high grade steel and normally 6” thick. Vaults are normally installed at or below ground level
because of their heavy weight. It is also usual to have a clear sterile walkway around the five above base
sides when installed below a buildings foundations. Ratings for vaults are established by the Insurance
Services Office (ISO).

DESIGNING A PROPRIETARY INFORMATION PROTECTION PROGRAM


In developing a proprietary information protection program, it is important to remember the
following:
1) There is no such thing as a permanent secret of nature.
2) Any scientific discovery is a link to the future, which if kept secret, can impede the next step, but
does not prevent others from creating their own links.
3) Restrictions on the dissemination of information may jeopardize true security by attempting to
protect non-essentials.
4) Research and development (R&D) cannot be envisioned without communication of the results of
that effort. This principle also applies to most other forms of competitive business information as
well.
5) The printed word, particularly in the form of complete reports or documents, has ceased to be the
principal means of communicating information. More and more vital data are being processed and
analyzed electronically. This has increased the difficulty of preventing its outright loss or
undetected compromise, because of the interdependence of many functions which can be remote
in time and place to each other.

PROPRIETARY INFORMATION AREAS OF VULNERABILITY

PEOPLE
1) Disgruntled employee or former employee
2) Moonlighter
3) Mobile employee
4) Marketing, sales representative, etc.
5) Purchasing agents, buyers, subcontract administrators
1. 6)Consultants
6) Vendor
7) Clerical
8) Applicants
9) Visitors & customers

ACTIVITIES OR EVENTS
10) Publications, public releases, etc.
11) Seminars, conventions or trade shows
12) Handling of trash or scrap
13) Survey or questionnaire
14) Merger, acquisitions, joint ventures, licensing
15) Reverse engineering
16) Term papers, Master’s thesis, etc.
17) Plant tours, “open house”

AMOUNT OF INFORMATION LOSS


ACCORDING TO SOURCES:
1) Inadvertent Disclosure 95%
2) Competitive Intelligence 3%
3) Industrial Espionage 2%
CHAPTER FIVE
SECURITY SURVEY AND INSPECTION
The information pertaining to one of the most important security services offered to a head of office
is the conduct of security surveys and security inspections.
Every unit chief desires a security system that will reduce to an absolute minimum the possibility of
espionage, sabotage and compromise of classified information on his office or unit. Since there are many
security countermeasures to be considered, head of offices should utilized specially trained personnel, if
the effort of espionage and sabotage agents and other criminal elements are to be negated. Security is an
extremely complex program an objective analysis of an office head’s security program by security survey
and inspection personnel can be of great assistance in determining the efficiency of any established
security program.

LESSON 1
SECURITY SURVEY
What is Security Survey?
It is an estimate of the security standards of a unit, and is conducted to enable the responsible officer
to recognize and evaluate security hazards and determine protective measures necessary to the
prevention of sabotage, espionage, subversive activities and other criminal acts inimical towards the
interest and/or mission of the unit and/or command.

What is the purpose of Security Survey?


The security survey will be used by the senior facility manager of industrial planners in determining
the type and extent of security controls for the facility or areas. Each type of physical security survey will
include the determination of the security level of the facility and a security evaluation (threat assessment),
which addresses the criticality of operations, the vulnerability of the facility of area, and the probability of
compromise of the personnel or property contained therein.

What is the standard rule, no survey is considered complete until all three of the factors below have
been given consideration and weight.
1. Criticality- is the effect that partial or total loss of the facility or area would have on the facility’s
mission: The adversity of the effect is directly related to the critically factor. Examples of adverse
effects include the interruption of the continuity of operations, or the compromise of national
security information. A higher classification level of information handled or stored in a facility or
area will increase the criticality.
2. Vulnerability – is the susceptibility of a facility or area to damage or destruction or the possible
theft or loss of property. Factors used to determine vulnerability include the size, configuration,
and location of the facility or area, the local crime rate, and the proximity of law enforcement, and
emergency response services.
3. Probability/Risk – deals with an assessment of the chances or risk that certain events could or
might occur, such as a penetration of the perimeter, compromise of a system, or the occurrence of
a variety of unauthorized activities.

What are the steps in conducting security survey?

1. Initial Survey- the initial physical security survey is conducted before constructing, leasing,
acquiring, modifying, or occupying a facility or area. It describes any modification required to raise
the level of security commensurate with the levels of criticality and vulnerability.
2. Follow-up Survey- when recommendation is made in the initial physical security survey, a follow-
up survey is conducted to ensure the completion of modifications. The survey should be conducted
before acceptance of the property or occupancy.
3. Supplementary Survey- is conducted when changes in the organization, mission, facility or the
threat level of the facility alter or affect the security posture of the facility or area. This survey is
conducted at the discretion of either the facility manager or senior security officer.
4. Special survey- the special survey is conducted to examine or resolve a specific issue, such as
when there is a request for a Sensitive Compartmented information (SCI) accredited facility or there
is a need to investigate or assess damage resulting from an incident.

ROLE OF SECURITY OFFICER IN OFFICES


With the exception of the office head, the security officer is more interested in the survey that any
other individual of the office. It is the security officer who is directly responsible to the head of office for
proper maintenance of security of the security program of the office.
A Survey Specialist must be cognizant of established security procedures relative of the office since
much of the survey including the resulting recommendations will be affected by these measures.
This knowledge will enable him to recognize the present or potential hazards in the area, answer
most of the security questions put forth by the head of office personnel, suggest minor recommendations
during the survey which can be implemented on the spot and to discuss completely his tentative
recommendations with office personnel.

AUTHORITY IN CONDUCTING SECURITY SURVEY


`The unit head may request a survey of his entire office or of specific function of a unit within the
office.
When higher authorities directs a security survey to be conducted for of its subordinate office, an
information copy of the correspondence may also be forwarded to the unit to be surveyed.
It must be remembered that a security survey is not conducted solely for the purpose of
establishing a security program of an office. The head of the office is directly responsible for establishing a
security system for his officer after which a survey may be conducted to determine if the program is
adequate in comparison with the importance of the office to the overall national objective.
Some of the situations under which a security survey may be requested or directed:
 Activation of organization or office.
 Reactivation of an organization or office.
 A substantial change the mission, number of personnel, structures or real estate of the
office.
 Indications of laxity in the security program which would indicate the need for a complete
revaluation of the security system.
 When no record exists of a prior survey having been conducted.

Report of Security Survey


A security Inspection is a service performed to determined compliance with established security
policies and procedures and is conducted on recurring schedule or a follow-up to a security survey.

LESSON 2
SECURITY INSPECTION
What is Security Inspection?
It is a check of how well existing security measures and regulation are being carried out within a
command. A security inspection may also include investigations of alleged or suspected security
violations. Physical security is concerned with forces, entrances and exits, guards, traffic, control, lighting,
fire control, and with such other physical measures, which, if properly established and maintained, will
deny access to, unauthorized persons.

What is the Purpose of Security Inspection?

Security Inspection, which may be announced or unannounced, are usually conducted to determine
the extent of compliance with security regulations or procedures, including those recommended during
surveys. The security officer shall inspect facilities and programs under the security officer’s cognizance
as often as necessary to ensure compliance with the provisions of the applicable standards. The
inspections should result in written inspection reports.
Security Survey Distinguish with Security Inspection

The terms “Security Survey” and ‘Security Inspection” to accentuate the particular differences
between the two types of services, are defined as follows:
Security Survey is defined as a counterintelligence service to assist heads of office in determining
the security measures required to protect key installations from possible sabotage, espionage, subversion,
and unauthorized disclosures of, or access to, classified information or material contained therein.
Security Inspection is a counterintelligence service performed to determine compliance with
established security policies and procedures.

In Security Inspection
The inspection, although akin to the security survey, is much more restricted in scope. As observed,
the security survey considers everything pertaining to an office’s security, but the security inspection is
limited to determination of the degree of compliance buy unit personnel with established policies and
procedures.
The preliminary land investigative procedures involved in the conduct of a security inspection are
essentially the same as those required for a security survey; this is the selection of inspection personnel,
the necessary file checks and other preparation, the duties of the In-charge, the use of checklists and the
coordination with the Security Officer. The actual inspection will closely parallel the same procedures
followed during the conduct of a security survey. Prior to the actual conduct of the inspection the agent
conducts preliminary checks of the office or offices to be inspected to determine what security regulations
are enforced at the unit.
There are three specific types of security inspections, to wit: Announce –
Unannounced – Penetration

- Announced Inspection – is one has been so published to the office that all concerned personnel
are usually aware of its imminence and may consequently, make such preparations as are
necessary.

- Unannounced Security Inspection - is an inspection whose imminence is known only to certain


selected personnel, normally the office head and intelligence personnel of the office to be
inspected. It is usually conducted during non-duty hour periods.

- Penetration Security Inspection - is an inspection conducted in such a manner that office


personnel are not aware that such action is taking place.

What are the stages in Conducting Security Inspections?

1. Evaluation- the evaluation or fact-finding inspection is generally positive in tone and promotes
liaison and security awareness while taking a broad, general outlook of a facility or program.
Deficiencies, which may be resolved either on the spot or within a non-specified time frame, may
be noted and recommendations for further corrective actions may be made. The evaluative
inspection can also help management officials in planning or upgrading their security programs.
2. Compliance- the full compliance inspection generally is conducted for enforcement purposes. It
focuses on compliance with established standards or regulations.
3. Follow-up- another form of compliance is the follow-up inspection, conducted to ensure that
facility officials have complied with recommendations from earlier inspections.
4. After-hours Room Check- the after-hours room check is a form of compliance inspection. It
monitors compliance with security regulations, especially involving areas where national security
information is processed or stored.
5. Self-Inspection- the self-inspection is initiated by the security officer or facility manager to
evaluate his/her own security program. Additionally, self-inspections are required by each Top
Secret Control Officer, Classified Documents Custodian, and Special Security Officer to evaluate all
security procedures applicable to their operation. The scope and purpose of the self-inspection for
an officer, building, or other facility is determined by the initiator.
6. Closeout- A closeout self-inspection is accomplished immediately prior to the action to
administratively terminate an authorized Top Secret Control Station, Classified Control Station, or
Sensitive Compartmented inspections, all areas and containers authorized for the storage of
classified material are checked to ensure all classified material has been removed.
What are the basic steps in conducting Security Inspection?

1. Plan an inspection by determining the scope, type, and method. Schedule the inspection, and if
appropriate, provide written notice. The notice should provide the date(s), purpose, proposed
interview schedule, and request for any information needed by the security officer. Review past
inspection reports and prepare a list of questions or a checklist to structure the inspection.
2. 2. Upon arrival at the site and before departure, the inspector should meet with the senior manager
to discuss the inspection. Collect a sufficient sampling of data from interviews with on-site
employees and contractors and from touring the facility. Obtain information to support findings in
the inspection report. Report favorable findings in the inspection report. Report favorable findings
as well as deficiencies. Check awareness and adherence to local security procedures. Document
any discrepancies corrected on the spot.
3. After sufficient data is collected, the inspector should analyze all findings, compare them with
applicable security regulations, list discrepancies and cite regulatory references, recommend
corrective action, and write the inspection report.
4. The inspection report should be produced within 10 working days of completion of the inspection
(standard). The report should be distributed to the office
facility, or regional manager in a timely manner and require a response to any
recommendations. Copies of final inspection reports shall be provide to the Security Management
Office.

What are the types of briefing in a Security Inspection?

1. Initial Orientation Briefings.

Simply providing printed security regulations is not an effective way to promote complete
understanding of security responsibilities. A verbal orientation briefing, preferably supplemented with
audio-visuals and handouts, is more effective. Where possible, it should be presented personally. Where
this is not practical, it may be presented in the form of videotape or other recording.
The initial orientation, whether written or verbal, should address general physical security
principles, including common security hazards, building security and crime prevention, key system or other
site-specific access controls, vehicle control, and property accountability or package inspection programs.

2. Special Briefings

National Security Briefings – there are information security briefings that apply to individuals
who handle classified information. The briefings focus on classifications, markings, transmission,
disclosure, safeguarding, and destruction of information.
Special Access Briefings – these are briefings related to the various special access programs such
as those administered by the higher management or national offices.

What are the essential considerations in security inspection?

Preliminary Planning

1. To assure as much as possible the successful completion of a security survey, a chronological plan of
action is developed. The first action taken by the security survey agent is to prepare for and
conduct those preliminary courses of action that precede the actual conduct of the survey.
2. Avery important consideration during the preliminary planning stage is the use of a checklist. This is
a list of general considerations or specific points that must be covered during the survey. Checklists
may be either the general type or the specific/derailed type.

Initial Briefing

After completion of the preliminary stage, the specialist is prepared to visit the office. It is to be
recalled as mentioned previously that contact is made with the security officer of the office for the
purpose of establishing a time and date for the initial briefing of the office head. It would be ideal to
have at this conference not only the office head but also his entire staff and other key personnel of the
office.

Escort Personnel

It is often desirable for both the specialist and the office that escort accompanies the specialist
during the survey. Preferably, this escort should be the security office of the office or his representative.
In any event, he should be a person conversant with the security practice and procedures employed as
the office.

Preliminary Exterior and Interior Check

As soon as possible after the initial briefing, the specialist conducts a tour of the area surrounding
the office. The purpose of such an inspection is to gain a general knowledge of those elements outside
the office, which do or could conceivably have either a direct or an indirect influence upon the security
of the office.
It is often in the areas adjacent to the office that you find many of the office personnel
congregating for relaxation or entertainment, often under circumstances conductive to loose talk. The
agent also checks geographical features: terrain, road and railroad networks, bridges and natural o man-
made hazards near the office.

History of the unit to be surveyed

When the survey specialist completes his check of the surrounding area of the installation and
preliminary survey of the interior of the installation, he is ready to commence the analysis of the office’s
security program.
The specialist first determines the history of the organization to be surveyed and or the office
which may direct affect the security situation as it exists during the current survey.

Analyzing Existing security

Having completed the preliminaries and determined the level of required security, the specialist
must no ascertain the existing level of security of the installation. This portion of the survey is a minute
examination of all factors pertaining to the physical security, security of personnel and the security of
information. It includes the collection of all factual data that affects the security of the office. This data
will include all preventive measures as well as hazards and deficiencies any of the security measures the
specialist examine are not based upon existing requirements. The specialist arrives at his own
conclusion and this conclusion is reflected in his recommendations.
Final Briefing

The final conference is an oral to the chief wherein the specialist determines whether or not his
tentative recommendations can be realistically implemented. The
Specialist discusses the recommendations with the command since information may exist which may
negate or change the recommendations. In many instance the chief may have unsuccessfully attempted
to implement corrective measures or the recommendations are not feasible for some reason unknown to
the agent. If the chief has unsuccessfully attempted to correct its certain security weakness, a report of
these attempts is included in the specialist’s final report.

CHAPTER SIX
EXECUTIVE/VIP PROTECTION

LESSON 1
EXECUTIVE/VIP SECURITY DEFINITION

Executive/VIP Security Defined


It refers to those measures taken by Agents, Security Officers, Law Enforcement officers or an
Agency / officers to protect heads of state, foreign national or local dignitaries, civilian or military against
any personal injury, assassination, sabotage, and individual utilized as government witnesses.

LESSON 2
THE NEED FOR VIP SECURITY
With increased incidence of kidnapping/hostage taking and other violent crimes such as assault,
armed robbery, murder and even political assassination, the security of local and foreign dignitaries,
designated individuals or very important persons (VIP) is of extreme importance.
Problems of person’s security vary with each individual case in terms of potential hazards and
threats, political and sociological consideration, geography, environment, mode of transportation, etc., the
preparation of a comprehensive. Standing operating procedures (SOP) becomes virtually impossible.
However there are basic factors that must be considered which can be applied to all situations regarding
personal security.

Basic Security Principles in VIP Security


Every phase of security must be carefully in advance; to include the importance of the individual to
be protected, political attitude of the population, obstacles involved means of transportation, and duration
of the security mission.
Physical protection should consist of a series of protection cordons. These protective cordons may be
composed of a composition of personnel or physical security barriers.

Central Direction and Unity of Effort


The officer in charge should be given full responsibility for all phases of the security mission.
Close coordination must be established with all local military and civilian authorities. Civilian
authorities will include police and other interested city, municipal or other local officials.
The agencies responsible for each of the security plan must be clearly defined. Arrangements
should be made for local police to control local inhabitant. All available intelligence channels should be
used to obtain information of potential danger areas, persons, or groups.
Coordination must be accomplished by an advance party after the official itinerary is received.
Protective measures must be through but inconspicuous and afford security without impending the
protectee/VIP’s performance of his functions.
The degree of protection is dependent upon the degree of contact with the general public desired
by the protectee.
A basic element of VIP/Executive protection is the identification and the elimination of possible
sources of danger of the VIP/Executive before the danger becomes actual.
Plans for a perimeter of protection must be surprise proof and flexible enough to allow a quick
response to any emergency.

PREVENTIVE INTELLIGENCE MEASURES

The main objective – To collect, processes and evaluates information about persons or groups of
persons who may be a danger to the protectee/VIP.
The methods:
1. Security clearance of all employees and all tradesmen who service the
Executive/VIP’s residence, quarter or office. Security processing of gifts sent to the Executive/VIP.
1. Technical inspection against covert listening devices.
2. Process communications, letters that in any way indicates anyone may have possible intention of
harming the Executive/ VIP.
3. Maintain an album of photographs and description of individuals who are regarded as clear risks to
the Executive/VIP, including those who are penal or hospital custody
4. Liason with other agencies for intelligence information that may come in contact with that would
indicate danger to the protectee/ VIP.

Defense-in-Depth Theory
There is no impenetrable barrier. If an unfriendly individual, organization or government can devote
time, money, personnel, material or imagination to passing a barrier, he can succeed.
To achieve the ultimate results from a physical security system, it is necessary to add barrier, delay
time, until sufficient delay time has been accumulated to allow control of any foreseeable penetration.

THEREFORE, rather than attempting to achieve exclusion through the use of a single barrier, security
must be built upon accumulated time or a system of “Defense-in-Depth.

Contingency Planning
Security planning should be flexible. Weather conditions, mechanical failures and failure of lighting system
are three-ever-present potential hazards. The unexpected arrival of large numbers visitors, audience is
another situation frequently encountered. Last-minute changes in the security plan or schedule of events
occur routinely. The security plan therefore must be sufficiently fluid to cover these and other
eventualities, all of which present hazards.

LESSON 3
STANDARD OPERATION ORDER
A Standard Operation Order (SOP) Format for preparation of a protective plan should include
the following requirements.
 Mission
 Concept of Operation
 Coordination and Liaison
 Itinerary area of interest
 Personnel and equipment requirements
 Cooperation
 Communication
 Logistical support
 Public relation
 Emergency information
 Command and control

The order should be in writing and produced in sufficient copies and duly classified. Only key staff
officers/ personnel with whom coordination is necessary should be given a complete copy, however, all
proactive personnel are given an orientation on the contents of the order and should be familiar with the
whole operation. Each participant commits to memory the requirements his specific mission. And for this
reason, these instruction must be simple to understand and easy to execute.
The itinerary and other information pertaining to the travel of the protectee/VIP, which is often
attached as an annex, May under certain conditions, are also classified.
Sufficient time must be allowed for dissemination of travel information to permit suitable security
measures to be taken.
The key to successful accomplishment of a security mission is detailed continuous planning a careful
selection, training and use of personnel.

Mission Orientation
An orientation/ briefing must be conducted by the offer in charge or the protection plan, during
which he explains fully the contents of the plan. Some topics to be emphasized are:

Conduct of Security Personnel


Police/ Security personnel assigned to their duties are selected to the basis of the appearance,
alertness, and intelligence, as well as their ability to act quickly and correctly in unforeseen circumstances.
Restriction on the approach the protectee or his effects, the person is checked carefully for
identification and the authority for his presence is established.

Use of weapons
There is always the danger of accidental discharge and hurt innocent persons when weapons are
carried. All protective personnel must be qualified to fire the weapons with they are armed.
Crowd Control
Protective personnel should understand the principles of crowd control. They should not show
prejudice or sympathy, or become involved in any grievances expressed by the crowd.

LESSON 4
SECURITY PREPARATION IN LOCAL/FOREIGN TRAVEL
Advance Preparations
Arranging for timetable/ itinerary and coordinating with those concerned with visit, local or foreign
law enforcement security men.
Conduct security survey and inspection of routes, quarters, conference luncheon and inaugural site.
Arrange for security measures for motorcade routes, quarters, conference site, etc.
Confer with local or foreign security men. About potential danger to the Executive, such as persons,
organizations or obtain copies of photographs and place these persons under surveillance.

Motorcades
Select and consider the best motorcade route, preferably the most direct route to destination.
Select a route which affords a chance to have alternate routes if something happened on the
motorcade route.
Review or dry run the route and take notes on the requirements for controlling the crowd and traffic
and deployment of foot patrolmen and motorcycle police at various positions along the route.
Arrange for police or buildings custodian to inspect buildings along the motorcade routes.

Security in Inaugural/ Conference/ Luncheon sites


1. Control access to the building/ sites
2. Closing off and policing areas around it,
3. Securing rooftops and adjoining buildings.
4. Ensure the presence of numerous police officers inside and around the building/site.

Security in VIP Officer/Quarters/Residence.


1. “Defense-in-Depths” Barriers – Concentric patterns (Any attack will have to penetrate layer after of
defenders, the heavies’ layer of defense, being closest, being closest to the Executive/VIP.)
2. outer ring- sidewalks, stationed in front of quarters/ residence/office, covering all entrances, front,
center, side and rear
3. Middle ring- inside quarters, office/ residence, covering all stair ways and elevators.
4. Inner ring- immediately outside executive/VIP’S door, or close to Executive/VIP if outside.

Personnel Duty
1. To hold ones position no matter what happens outside of his own ring
2. Be ready to place his own body between the Executive/VIP and any danger to him.
3. Be prepared to intercept a bullet, knife, or other weapon with his own flesh.
4. The final defense against an attack on the person of the Executive/VIP (as human shield).

VIP Security Measures in all Areas


1. Establish screening points to allow only authorized persons access to the protected area/ person
and to keep out those who have no valid reasons to enter same.
2. Duty stations or posts should be marked on a floor/ ground plan or sketch/ map.
3. If an unusually large crowd are expected along a parade route security men may call on the armed
forces to station troops along the line of March.
4. If the Protectee/VIP travels by train, a pilot engine must run the trucks IN advance of the VIP train.
5. Every manhole and sewer along the route should be sealed
6. Every single building and all its occupants along the route should be checked.
7. Bellboys, waiters, cooks should be cleared.
8. Food to be cooked must be examined and samples be sent to laboratory for analysis.
9. Inspect for time bombs, radio- active materials and hazards.
10. Inspect closets and under the tables
11. Never allow the VIP to stop his car a crowd if can be avoided.
12. Drivers for the VIP can be competent, reliable, and well trained in protective driving and must be
alert for dangers and to take instant action.
13. While walking, it is necessary to increase the number of guards because the VIP becomes an easy
target.
14. In case the VIP is going to speak at hasty made stage, its strength and capacity should be inspected
to limit the persons going up to stage.
15. During afternoon sessions, lightning facilities must be checked or installed. It is estimated that the
program may reach up to nighttime.
16. An alternate generator fore emergency use made available if source of electric power is from a
central source. Designate qualified electrician to watch main source or switch.
17. If traveling by air, close the door of VIP plane when parked and place constant guards every time.
18. If traveling by water craft, select boats of type and size capable of facing danger at the ocean.
Thorough inspection is made on the ship and check the adequacy of life saver and emergency
facilities.
19. All non-uniformed men must wear signs or countersigns for identification.
20. Checklist of all security hazards noted in the course of security survey or inspection should be given
to the OIC for reference/planning.
21. Security plans and specific duties of men assigned or details must be stated.
22. All written instructions must be classified SECRET.

LESSON 5
OTHER GUIDELINES FOR VIP SECURITY
1. Security Formation assists in allowing the Protectee/VIP to have the best possible protection and
defensible position even for the limited amount of manpower while protectee is mobile/ in transit, or
static.
2. Threat evaluation is to ascertain at varying times and function which will give the best formation
sequence or set. Other considerations are threat levels and type and advance planning for staff levels.
3. The Need for Close in /Escort security officers, such as first and requirements {which differs from
location to location} and special weapon ns (a real headache-the less you need to rely on them, the
better), and other logistical needs must be considered. One must have the ability to use a lot of
common sense and attention to detail, to give the possible protection, without overbearing or on top of
the protectee/principal. Fully aware with this information, the close-in/ Security Escort team will be well
equipped, with an understanding of their respective position, alternatives and functions. These could
be varied hourly, in response to current threat level, and areas of coverage or occasion in any of the
following:
 Crowds, restaurants, home, office – Public transport, bus, taxi
 Friends of protectee/principal, business
 Movie theatre
 Functions: private, public, business
 Huge crowds: a tight-packed area of swirling bodies
 Elevators: opening a door to the unknown, Turn side on, so that you can see the front at one
side and the area behind before you. Are you rising with the escalator; you will become level
with the floor behind before you, giving you something to watch.
 Stairs: give way, standing, doors on way
 Doors: can’t see through them, an unknown reality.
 Streets lights: workmen, doorways, shops you are working past

THREAT ANALYSIS AND REACTION


1. Concentration do not get loss or be left behind, it takes only a second or two to get killed;
2. Anticipation – anticipate your fellow officer/Escort’s moves you can keep the protective formation
together nice and well-coordinated. Because of obstacles, obstruction, and areas of threats, the
movement of Close in security Escorts will be spasmodic and spontaneous.
3. Relaxation / Observation - Observation should be done in relaxed manner. Be very attentive but
looking relaxed. One that is nervous, sweating; Fidgety with quick spasmodic movements over his
shoulder is very unnerving for everybody, including the protectee/principal. You will stand out for
the entire public to see. This will lessen with experience and time.
4. Common Sense – Most important part. Common sense comes from using your brain, foresight,
experience, and good training.
5. Participation within the Team – The team must train together and understand completely what their
job is and their responsibilities. There will be big gaps in the defenses if we do not have
participation within the team.

Multi-Position/Formation
 Knowing your position
 Responsibility of that position
 Ability of that position
 Ability to respond to all position

CHAPTER SEVEN
SECURITY HAZARD AND RISK MANAGEMENT
This chapter presents an insight on the general concepts of hazards analysis is a process used to
characterize the elements of risk. The result of a hazard analysis is the means of controlling or eliminating
them.

Security hazards and risk management are two interrelated fields in the context of industrial
security. Many organizations and businesses, by nature, are exposed to hazards. Thus, in order to prevent
industrial hazards, risk management is necessary.
LESSON 1
SECURITY HAZARD
What is Hazard?
A hazard is a situation, which poses a level of threat to life, health, property or environment. Most
hazards are dormant or potential, with only a theoretical risk of harm, however, once a hazard becomes
‘active’ it can create an emergency situation. Any act or condition which may result in the compromise
of information, loss of life, loss or destruction of property or disruption of the objective of the
installation.

A hazard is usually used to describe a potentially harmful situation, although not usually the e vent
itself once the incident has started it is classified as an emergency or incident. There are a number of
modes for a hazard, which include.

 Dormant – the situation has the potential to be hazardous, but no people, property or environment
is currently affected by this. For instance, a hillside may be unstable, with the potential for a
landslide, but there is nothing below or on the hillside that could be affected.
 Potential – this is situation where the hazard is in the position to affect persons, property or
environment. This type of hazard is likely to require further risk assessment.
 Active - the hazard is certain to cause harm, as no intervention is possible before the incident
occurs.
 Mitigated – A potential hazard has been identified, but actions have been taken in order to ensure
it does not become an incident. This may not be an absolute guarantee of no risk, but it is likely to
have been undertaken to significantly reduce the danger.

TYPES OF HAZARD
1. Natural Hazard - these are hazards which arise from natural phenomena. The following are

Types of hazards or disasters:


 Floods caused by typhoons
 Earthquakes
 Fire (not caused by human action)
 Storms (typhoons, cyclones, tornado and hurricane)
 Lighting storms
 Extreme temperature and humidity

2. Human-Man made Hazards – These are hazards which are result of a state of mind, Attitude,
weaknesses or character traits of one or more persons. They can be acts of commission or
omission, both overt and covert, which can disrupt operation of a plant or installation. The following
are types of human or man-made hazards.
 Carelessness-accidents and dissatisfaction
 Disloyalty-subversion and sabotage
 Espionage, pilferage and theft
 Vandalism, etc.

What is an Industrial Hazard?

In this context, industrial hazards are workplace hazards and are often grouped into physical
hazards, physical agents, chemical agents, biological agents, and psychological issues.

Physical hazards include:


 Slips and trips
 Fall from height
 Workplace transport
 Dangerous machinery
 Electricity
 Heavy metals

Physical agents include:


 Noise
 Vibration
 Ionizing radiation

Chemical agents, include


 Solvents
 Biological agents

Psycholosocial issues include:


 Work related stress, whose causal factors include excessive working time and overwork
 Violence from outside the organization
 Bullying (sometimes called mobbing) which may include emotional, verbal, and Sexual
harassment

Other issues include:


 Reproductive hazards
 Work environment factors, such as temperature, humidity, lighting,
welfare
 Avoidance of musculoskeletal disorders by the employment of good ergonomic design

SABOTAGE AS A SECURITY HAZARD


Sabotage is a deliberate action aimed at weakening an enemy, oppressor or employer through
subversion, obstruction, disruption, and /or destruction.
When disgruntled works damage or destroy equipment or interfere with the smooth running of a
workplace, it is called workplace sabotage. This can be as part of an organized group activity, or the action
of one or a few workers in response to personal grievances.

Description of a Saboteur
1. He is the most dangerous foe whom security will have to deal with while planning and
implementing security measures and techniques.
2. He is an ordinary looking as the next guy but in his mind, he has the training in deception,
knowledgeable in incendiaries, explosives, chemistry, bacteriology, mechanics and psychology.
3. He can work alone, in-groups, or simultaneously in several places.

POSSIBLE TARGETS OF SABOTEUR


1. Armed Forces Installation
2. Natural resources mines, forest, farms and farm products
3. Industries- buildings, power sources, machinery, fuel etc.
4. Warehouses dépôts, communications, public utilities, etc.

COUNTERMEASURES AGAINST SABOTAGE


1. Use of an efficient, alert and trained guard force.
2. Use of physical security aids like barriers, personnel and vehicular control, intrusion devices,
communication systems, and electric aids.
3. Proper screening of personnel.
4. Identification and movement control system
5. Searches on incoming vehicles
6. Safeguarding of classified information
7. Designation of restricted areas
8. Investigation of breaches of security
9. Security education and indoctrination
10. Good housekeeping methods
11. Effective and compatible emergency planning
12. Regular audit
13. Continuing background checks

ESPIONAGE AS A SECURITY HAZARD


Generally, espionage is the practice of gathering information about an organization or a society that
is considered secret or confidential without the permission of the holder of the information.
Description of an espionage agent
1. He is very dangerous adversary and his skills in deception and his cunning should never be under
estimated.
2. He is usually a person of extensive training and will be highly effective in gaining the confidence of
people and of extracting information of value to be relayed to his employer or handler.
3. Even how well-trained and espionage agent he might be, he is human like the saboteur and he can
be defeated in his own game if proper methods and techniques are undertaken.

SOME METHODS EMPLOYED BY ESPIONAGE AGENT


1. Stealing or information from employees.
2. Stealing information from records or other sources.
3. Using various methods of reproducing documents products equipment or working models.
4. Using “front” as commercial concerns, travel agencies, associations, business groups and other
organizations to obtain confidential information or data.
5. Using various form or threats to obtain information.
6. Using blackmail techniques by exposing intimate and personal details concerning an individual or
organization.
7. Penetration and operational tactics.

COUNTERMEASURE AGAINST INDUSTRIAL ESPIONAGE


1. Careful and complete pre-employment measures designed to control threats of industrial
espionage.
2. Continuing personnel check on employees and particularly personnel on sensitive positions even
already employed.
3. Prevention of unauthorized entry to the plant or industrial installation.
4. Restricting of movement of personnel in the premises of the plant.
5. Controlled disposal of waste papers including carbons in classified work.
6. Only properly cleared personnel should handle classified document.

SUBVERSIVE ACTIVITY AS A SECURITY HAZARD


Subversion refers to an attempt to overthrow structures of authority, including the state.
Subversive activity is the lending of aid, comfort and moral support to individuals, groups, or organizations
that advocate the overthrow of incumbent governments by forces and violence. All willful acts that are
intended to be detrimental to the best interests of the government and that do not fall into the categories
of treason, sedition, sabotage, or espionage are placed in the category of subversive activity.

Threats of Subversive Activity


1. It can be local or national in nature and their mission is to undermine the authority weaken the
organization, and eventually take over. This can be in business or any activity.
2. This can be in the form of rumor, mongering, propaganda undermining, morale, and injecting
defeatist attitudes, and other emotional approaches
3. It is an activity not easy to detect.

COUNTERMEASURES TO SUBVERSIVE ACTIVITY


1. The spreading of rumors, written materials, slogans or any other devices to confuse the work
population and discredit the government should be immediately reported.
2. Labor and other company unions can be infiltrated so that strikes and “slow downs” can be called
to disrupts the normal operation of a plant or installation.
3. Security force should be alerted for person trying to recruit others in organizing movements for
peace, anti-colonials, anti trade and anti-imperialism.
4. Employees or outside personnel seeking memberships in “paper organizations” should report this
activity to security.
5. Other methods of subversion like united fronts, mob action, terrorism and sabotage will be done to
gain the subversive ends.

PILFERAGE AS A BUSINESS HAZARD


1. Pilferage is one of the most annoying and common human hazards which security has to deal with.
This activity if uncontrolled can become financial drain if not a menace to smooth and orderly
operation.
2. Failure to detect shortage and inaccurate inventories will cause inventory losses, which may be
labeled as pilferage.
TYPES OF PILFERERS
1. Casual Pilferer – one who steals due to his inability to resist the unexpected opportunity and has
little fear of detection is no plan or premeditation and he usually a “loner” on the job. The
temptation to pick up the article is basically due to poor security measure. The implication of casual
pilfering is the big cumulative cost if it remains unchecked.
2. Systematic Pilferer – one who steals with preconceived plans and takes away any or all types of
items or supplies for economic gain. Pilferers of this kind can be employees or outsiders of the
establishment.

FACTORS CONSIDERED IN PILFERAGE


1. Location of items to be pilfered – the systematic pilferer surveys shopping and store areas, or
through contacts from the firms.
2. Access to the items - techniques can be from fake documents, bribing of guards, outsmarting
security, creating disturbance and other methods to divert attention while pilferage goes on.
3. Removal of item - this can be done as wearing the stolen shoes or shorts, concealment in body or
vehicles, use of false documents, etc. Driver may conceal pilfered items in his vehicle.
4. Disposal of items - there is a need for “fences” “brokers” or “clearing houses” for these “hot “items.

COUNTERMEASURES FOR CASUAL PILFERAGE


1. “Spot”: check on outgoing vehicles and persons.
2. An aggressive security education and indoctrination program with emphasis that “crime does not
play”.
3. Superiors should set example of integrity and desirable moral climate for employees in the
establishment.
4. All employees must be enjoined to report or any loss to security.
5. Inventory and control methods should be done especially to pilferable items.
6. Control of tools equipment and sets.

COUNTERMEASURES FOR SYSTEMATIC PILFERAGE


1. Guards and electronics surveillance on all exist.
2. Package and material control system.
3. Parking area outside perimeter fence of establishment.
4. Careful screening and background checks on applicants to weed out potential thieves.
5. Investigation of all losses quickly and efficiently to determine “modus operandi” or obtain clues.
6. Alert all patrols to check areas and buildings for possible concealment of stolen properties.
7. Install mechanical, electrical, electronic detention and alarm devices where needed and applicable.
8. Establish an effective lock and key control system.
9. Use of appropriate perimeter fencing and lighting for parking facilities and areas for vehicles and
persons.
10. Store bulk quantities of pilferable items enclosed security areas and distribute them to using
section limited quantities.
11. Establish accurate inventory and accounting methods for procurement, use and disposal.
12. Establish close liaison with governmental law enforcement and intelligence agencies.

COMMON MEASURES AGAINST PILFERAGE


1. Package inspection
2. Assets inventories
3. Body search
4. Uses of alarms
5. Personnel ID &management control
6. Security education
7. Lock and key management
8. regular reporting
9. Property audits
10. Garbage & trash check before disposal
11. Inspections

LESSON 2
RISK MANAGEMENT
What is a Risk?

Risk is the likelihood that something bad will happen that causes harm to an informational asset
(or the loss of the asset). Vulnerability is a weakness that could be used to endanger or cause harm to an
informational asset. A threat is anything (man-made or act of nature) that has the potential to cause harm.
The likelihood that a threat will use a vulnerability to cause harm creates a risk. When a threat
does use a vulnerability to inflict harm, it has an impact.
In the context of security, the impact is a loss lost income, loss of life, loss of real property, loss
of availability, integrity, and confidentiality, and possibly other losses. It is therefore necessary that a risk
assessment is carried out by a team of people who have knowledge of specific areas of the business.
Membership of the team may vary over time as different parts of the business are assessed. The
assessment may use a subjective qualitative analysis based on informed opinion, or where reliable cost
figures and historical information is available, the analysis may use quantities analysis.

The level of risk is a combination of two factors:


The value placed on that asset by its owner and the consequence, impact adverse effect of the loss
or damage to that asset and; the likelihood that a specific vulnerability will be exploited by a particular
threat.

What is Risk Management?


Risk management is the process of identifying vulnerabilities and threats from resources used by
an organization in achieving business objectives, and deciding what countermeasures, if any, to take in
reducing risk to an acceptable level.
There are two things in his definition that may need some clarification. First the process. It must
be repeated indefinitely. The business environment is constantly changing and new threats and
vulnerabilities emerge every day. Second, the choice of countermeasures (controls) used to manage risks
must strike a balance between productivity, cost, effectiveness of the countermeasure and the value of the
informational asset being protected.

What is risk analysis?

Analysis of risk includes examinations of the vulnerability, probability and criticality of potential
threats and include natural and man-made risk.
The entity should assess the risk of a terrorist attack. The assessment should include a
determination of the likelihood of an act or attack, the type of terrorist action, and consequences,
depending on the size and location of the system. The assessment should include potential risks to the
following:
 Workers
 Environment and surrounding community
 Impact to the local, regional and national economics
 Adjacent and/or interdependent facilities and infrastructure.

A key element of the security management framework is in the integration of all available information
into the decision making process. Information that can impact an operator’s understand ding of the
important risks to a control system comes from a variety of sources. The operator is in the best position to
gather and analyze this information, the operator can assist in determining where the risk of an incident is
the greatest and support prudent decisions to reduce the risk.
Another consideration should be closely safeguarding such information and restricting it to only a few
individuals with a “need to know”. Vulnerability analyzes and risk assessments provide a method of
prioritizing the criticality of assets ( or the impact of the loss of the asset), threats, and counter measure
strategies. In many cases, a checklist survey is used in conducting a risk and vulnerability assessment.
The checklist includes an overview of a fairly standard approach to concepts of risk assessment, and
includes questions and considerations for use during each step of the process. The assessment helps
identify those facilities
That may be critical to overall operations, as well as their vulnerabilities.

What is an Adversary?
An individual, group, organization, or government that conducts activities or has the intention and
capability to conduct activities detrimental to the individual, private or government entity.
What is Asset?
Any information, facility, material, information, or activity which has a positive value to its owner
whether it is an individual, private o0r government entity.

What is Vulnerability?
Any weakness that can be exploited by an adversary to gain access to an asset.

What are Countermeasures?


An action taken or a physical entity used to reduce or eliminate one or more vulnerabilities. The cost
of possible countermeasures may be monetary, but may also include non-monetary cost such as reduced
operational efficiency, adverse publicity unfavorable working conditions, and political consequences.

What is Probability?
It is the chance or likelihood that a loss will take place. Indicated by a mathematical statement
concerning the possibility of an event occurring.

What is Criticality?
It is the impact of a loss as measured in financial terms. How important it is in terms of the survival or
existence of the organization.

What are alternatives and strategies in Risk Management?


1. Risk Avoidance - eliminating or removing the risk totally from the business, government, or
industrial environment for which the risk manager has responsibility.
2. Risk reduction – decreasing the risk by minimizing the probability of the potential loss. The
reduction of criminal opportunity is often accomplished by situational crime [prevention strategies
to discourage, deter, or deny criminal incidents.
3. Risk spreading – spreading the risk through compartmentation or decentralization to limit the
impact (critically) of the potential loss.
4. Risk Transfer _ moving the financial impact of the potential loss-over to an insurance company.
5. Risk Self assumption- planned assumption and acceptance of the potential risk by making a
deliberate managerial decision of doing nothing about the threat, or setting aside resources for
use in case of specific loss incident.

CHAPTER EIGHT
GUARD FORCE AND GUARD SYSTEM

LESSON 1
GUARD FORCE AND GUARD SYSTEM IN GENERAL
The security guard force is the key element in the overall security system of a plant or
installation. Its basic mission is to protect all the property within the limits of the facility boundaries and
protect employees and other persons on the installation.
The security guard who will become a part of a guard force must be required to meet minimum
criteria to assure that they will effectively perform their assigned security related duties. It is the
responsibility of the security director of the installation to insure that is guard force is of a high caliber to
make a judgment that could save multi-million pesos facility from total destruction.
The security guard force must be ready to meet the new challenges with new concepts, bold
innovation, and unrelenting insistence on high standards.

SECURITY GUARDS DEFINED


Sometimes called private security guard or watchman shall include any person who offers or
renders personal service to watch or secure either a residence or business establishment or both for hire
or compensation, and with a license to exercise profession.
SECURITY GUARD FORCE DEFINED
It is a group of force selected men, trained or grouped into functional unit for the purpose of
protecting operational processes from those disruption which would impede efficiency or halt operation at
a particular plant, facility, installation or special activity.

TYPES OF SECURITY GUARD FORCES


Republic Act no. 5487 provided for the organization and management of security guard forces
designed for specific organizations and purposes. The three (3) security guard forces are the following:
1. Private Security Agency (PSA)- any person, association, partnership, firm or private corporation
who contacts, recruits, trains, furnishes or post any security guard, to do its functions or solicit
individuals, business firms, or private, public or government – owned or controlled corporations to
engage his its service or those of his its security guards, for hire commission or compensation.
2. Company Security Force (CSF) - A security force maintained and operated by any private
company/ corporation for its own security requirements only.
3. Government Security Unit (GSU) - A security unit maintained and operated by any government
entity other than military and/a police, which is established and maintained for the purpose of
securing the office or compound and/or extension of such government entity.

TYPES OF SECURITY GUARDS


1. Company guard- a security guard recruited and employed by the company
2. Agency guard- a guard hired by the company belongs to a privately license security agency
3. Government guard forces- a security guard recruited and employed by the government.

PHILIPPINES ASSOCIATION OF DETECTIVE AND PROTECTIVE AGENCY OPERATORS, INC. (PADPAO) – It is an


association of all licensed security agencies and company security forces. This was established as early as 1958
purposely for the regulation of all security agencies.

TYPICAL STRUCTURE OF A SECURITY ORGANIZATION


The security force of any installation must be organized in accordance with the principles of
responsibility and authority. Training and knowledge. This is to carry out different functions efficiently and
effectively and thus insures smooth flow of the organization. The security positions may be classified into
the following:

1. Office of the general manager/ security director


a. The office of the General Manager / Security Director is vested the authority and responsibility
of running the security force the authority of the President of the Company/ Corporation.
b. The General Manager/ Security Director is directly responsible to the President of the Company/
Corporation in the operations and administration of the security force/
c. He the principal adviser to the President on matters involving security operations,
administration of security force.
d. He is the overall head or both various staff departments and field units where he may delegate
corresponding authority commensurate to their assigned responsibility.
e. His implements policies promulgate by the policy making body and excited by the President.
f. He direct, controls and supervises all offices and field units in the force in their respective
assigned tasks.
g. He performs other functions as directed by the President of the Company/ Corporation.

2. Office of the Executive secretary of the General Manager


a. He is the principal administrative assistant to the General Manager/ Security Director.
b. He prepares communications initiated by the General Manager / Security Director.
c. He maintains records of scheduled conferences, appointments and other engagements and
advisers the GM/ SD of such activities.
d. He records and checks outgoing communications signed by the GM/ SD as to its completeness’
(attachments to be considered) as well as to ensure the timely dispatch to the addressee
through the administrative section.
e. To perform other duties as directed by the General Manager / Security Director.

3. Office of the assistant General Manager / Security Executive Director


a. The Security Executive Director is the assistant Manager of the Manager of the Security Force
and takes the Operational and Administrative Management of the Security force in the absence
of the GM/ SD.
b. He is directly responsible to the GM/ SD.
c. He performs other duties as directed by GM/ SD.

4. Office of the Human Resources and Administrative Manager / Staff Director for Personnel
and Administration
a. Replacement
b. Discipline, Law in Order

5. The principle staff assistant to the General Manager / Security Director for planning and
supervising matters or activities pertaining to personnel management and miscellaneous
administrative functions such as:
a. Personnel Strengths
b. Morale and Personnel Service
c. Personnel Procedures
d. Interior Management
e. Personnel Adviser

6. Office of the Operations Manager / Staff Director for Operations


a. This office of the principal staff on Operations, training intelligence and investigation.

7. Office of Finance
a. This office is principally concerned with budgeting, finance, reports control and program review
and analysis.
b. Exercises supervision over the management engineering activities of the company and the
accounting office.
c. Renders advice, assistance and guidance to GM/ SD on financial management. Specific duties
and function of the Finance Office are:
1. Accounting
2. Credit and Collection
3. Bookkeeping
4. Billing
5. Payroll
6. Disbursing

8. Office of the Logical Manager


This office is in charge with the following:
b. Coordinates plan and supervise the implementation of directive and guidance determines
divisional responsibility and evaluates in logistical planning in related planning programs.
c. Develops, administers, and coordinates research and development on logical matters.
d. Collect computes and evaluates statistical data on logical matters.
e. Recommends logistic budget policy including budget planning.
f. Prepares statements and / or requirements to ensure that logistical plants support for corporate
plans.
g. Performs necessary program and fiscal administration.
h. Supervise all matters pertaining to supply.
i. Determine the organization, allocation of service personnel
j. Plans for maintenance and repair of supplies and equipment.

9. Office of Inspectorate and Special Project (Special Staff)


a. This office assists the General Manager in inquiring into, and reports upon matters pertain to the
performance of the different staff, units, towards the attainment of corporate objectives. It also
inquires on the states of discipline, efficiency and economy of the company.
b. The Inspectorate Staff conducts inspections, investigations and submits functions; The General
Manager is provided relevant importation pertaining to meritorious conduct and performance of
a unit or individuals.
c. His office is also tasked to conduct overt and covert inspections and investigations and other
related services.
10. Office of the Communications Officer
a. The communication officered who is licensed radio operator is the principal adviser of the
General Manager on communication on matters pertains to radio communications.

11. The Detachment Commander Officer-in-charge - A Detachment Commander shall command and
responsible for a certain detachment, with fifteen (15) or more security personnel under him. He is
directly responsible to the security manager of the installation.
a. He prepares and executes the security plan of his Detachment in relation to the security
requirements of the establishment being guarded.
b. He responsible for the enforcement in implementation of Rules and Regulations/ Policies.
c. He receives instruction for the Security Manager and implements the same as required.
d. H e has full operational and administrative control of all his units to include his assistant and shift-
in-charge/ supervisor.
e. He conducts inspection of his units and institutes corrective measures on the spot on those
problems he may detect or brought to his attention. If not possible, he brings the problem to the
Security Manager of the establishment.

[Link] Detachment Commander


- Detachment with more than twenty 20 security personnel assigned may be provided with and
Assistant Detachment Commander who will the principal assistant of the Detachment Commander.
In the absence of Detachment Commander, he performs the duties of the Detachment Commander.

[Link]-in-Charge
- The Shift-in Charge shall be responsible to the Detachment Commander as far as his shift is
concern.
- He form his men at least 30 minute before posting time seeing that all are in proper uniform and
presentable.
- He disseminates instructions coming his Detachment Commander / OIC or those related to him by
his counter – part, the outgoing SIC.
- He inspects the post as often as he can to ensure that his men are on the alert and performing their
duties effectively.
- He performs others duties as may be directed by the Detachment Commander or by the ADC

13. Security Guard on Duty /Post


- The Security Guard (SG) on Duty/ Post must always carry his license to practice his profession,
Xerox, copy of the firearm’s license assigned to him, and his duty detail order, authorizing him to
carry his issued firearm within his area of jurisdiction.
- If the Security Guard is manning a fixed post especially entrance or exit points he must maintain a
guard’s logbook and enters in the same logbook all event/ passage of VIP’s vehicles and inspections
or visits of Security Manager /Director of the Client /Firm.
- -Guards must observe and apply religiously the provision of the Code of Ethics, Code of Conduct,
and the General Orders of the Security Guards when on post.
- He may perform special task as may be directed by his shift supervisor, DC and or ADC like control
of visitors, inspections of bags of persons coming in and going out of the establishment, vehicles
cargoes, or prevents the instruction of authorized person in a particular area, etc

LESSON 2
SELECTION OF GUARDS: QUALIFICATIONS AND
DESIRABLE ATTRIBUTES OF SECURITY GUARDS AND
CONSULTANT
R.A. 5487 and its implementing rules and regulations prescribed the minimum requirements for
guards to be able to secure a license to exercise profession as a security guard, private detective, security
officer and security consultant.

GENERAL REQUISITES IN THE SECURITY PROFESSION


a. Filipino Citizen
b. Physical and Mentally fit
c. Good moral character
d. Must not posses any disqualification

GENERAL DISQUALIFICATION
a. Dishonorably discharge from the service in the PNP/AFP or any private government entities.
b. Physical and mentally unfit
c. Conviction of Crime
d. Addicted to drugs or alcohol dummy of a foreigner
e. Elective or appointive government officials

BASIC QUALIFICATIONS OF SN AGENCY OPERATORS/ MANAGER


In addition to the general qualification, an operator should be:
1. At least 25 years of age.
2. Commissioned officer, inactive or retired from AFP or PNP or a graduate of industrial Security
Management with adequate training and experience in the security business.

BASIC QUALIFICATION OF A SECURITY CONSULTANT


In addition to the general qualification, a consultant should be:
1. Holder of Master degree of Criminology, MPA, MNSA, Industrial Management or LL.B.
2. Must have at least ten (10) years experience in the operation and management of security
business.

BASIC QUALIFICATION OF A SECURITY OFFICER


In addition to general qualification, a security officer should be:
1. At least graduated from Security Officers Training Course
2. A retired personnel in the AFP/PNP.
3. Must not posses any of the disqualification.

BASIC QUALIFICATION OF A PRIVATE DETECTIVE


In addition to the general qualification, a detective should posses any of the following:
1. BS Criminology Graduate
2. LL.B. Holder
3. Graduate of a Criminal Investigation Course
4. Advance ROTC Graduate

BASIC QUALIFICATION OF SECURITY GUARD


In addition to the general qualification, a security guard should:
1. Be atleats Highschool Graduate
2. Be atleast 18 years of age but not more than 50 years old.
3. Unkdergone pre-licensing examination
4. Be locally cleared with PNP or NBI

DESIRABLE QUALITIES OF SECURITY GUARDS


1. Alertness- A good guard must be alert in spotting violators. This can be attained by being watchful,
dedicated and diligence.
2. Judgment- sound and good judgment is more than the use of common sense. It is the arriving at
wise and timely decisions.
3. Confidence- it is the state of being sure; a state of the mind free from doubt or misgivings. This
attribute includes faith in oneself and his abilities, which is attained by job knowledge. Thorough
and proper training plus good supervision instills confidence.
4. Physical Fitness- security work is strenuous and demanding physical conditioning is essential if he is
to be a dependable guard.
5. Tactfulness- ability of the guard to deal with other successfully without offending, In short, he can
be firm but pleasant.
6. Self-control ability to take hold of oneself regardless of provoking situation. With self-control, the
guard will do his work without being angry and the situation will be on hand.
7. Interest, loyalty, responsible and trustworthy, is also important attributes of an reliable guard.
ATTRIBUTES OF SECURITY GUARDS/PRIVATE DETECTIVE
1. Honesty
2. Presence Of Mind
3. Moral Courage
4. Reliability And Dependability
5. Endurance
6. Calmness
7. Trustworthiness
8. Ability
9. Attitude
10. Courtesy
11. Discipline
12. Interest
13. Loyalty
14. Devotion
15. Dedication

DESIRABLE QUALITIES OF SECURITY SUPERVISOR


1. Physical and nervous energy
2. Sense of purpose and direction
3. Enthusiasm
4. Friendliness and affection
5. Integrity
6. Decisiveness
7. Technical mastery
8. Intelligence
9. Teaching skills
10. Faith

LICENSES IN THE SECURITY PROFESSION


a. License to Operate- before a Private Security Agency (PSA) ca operate, it has to secure a License to
Operate (LTO) categorized s either Temporary or Regular. A temporary license is issued by the PNP
thru Civil Security Group Directorate after the applicant / licensee should have complied with all the
requirements while it has less than two hundreds guards. A regular licensee to operate is issued to
the PSA once it is qualified of having two hundred (200) or more license security guard in its employ
duty posted. Regular license is renewable
b. Security Guard License- before a security guard can practice this profession, he shall possess valid
security license. The use of expired license is not allowed. In case of doubt, licenses may be verified
at the PNP SAGSD whether valid or fake.
c. Firearms License- all firearms of the security agency should be covered with firearms license issued
by the PNP through it Firearms Explosive Division under the Civil Security Group. Renewable every
two years. No duplication of two or more firearms with the same make and serial number shall be
covered by one license.

FIREARMS AND WEAPONS AUTHORIZED FOR USED OF THE SECURITY GUARD WHILE ON DUTY
1. Handguns / Low-powered (cal.22 and cal.38) not exceeding one PA for every two guards employed.
2. Shotguns(not bigger than 12 gauge)
3. High-powered- when the agency is operating in areas where there upsu9rge of lawlessness and
criminality as determined by the chief PNP.

GUARDS UNIFORMS, EQUIPMMENT AND PARAPHERNALIA

Set of Uniforms for Security Personnel Color of Uniforms


Headgear- perishing cap for men and 2  Private Security Agency- Navy Blue
ply cap for women (upper and lower)
Service Bush Jacket – intended for  Company Security Forces- Light blue /
directorial and Staff officers light gray for upper and navy blue for
Service Shirt lower
Service trouser  Government Security Forces- white for
Service Belt upper and navy blue for lower
Footwear

Ornaments and Patches Equipment and Paraphernalia


National Badge  Leather pistol belt with regulation
 Cap Device buckle
 Regulation Buckle  Holster, black leather for pistol
 Collar Device  Night stick with horizontal handle
 Name cloth  Handheld radio
 Agency/Unit name cloth  Pocket notebook and ball pen
 Arrival of super sophisticated devices
in security alarm systems.

CHAPTER NINE
THE PRIVATE SECURITY AGENCY LAW AND ITS
IMPLEMENTING RULES AND REGULATION

LESSON 1
REPUBLIC ACT No. 5487
AN ACT TO REGULATE THE ORGANIZATION AND OPERATION
OF PRIVATE DETECTIVE, WATCHMEN OR SECURITY GUARDS
AGENCIES.
(Rep. Act No. 5487, as amended by Presidential Decree No.
11.)
Section 1. Short Title of Act. This Act shall be known as "The Private Security Agency Law."

Section 2. Scope of this Act. The organization, operation, business and activities of private detectives,
watchmen or security guards agencies shall be governed by the provisions of this Act.

Section 3. Definition of Terms.


(a) Person. As used in this Act, person shall include not only natural persons but also juridical persons
such as corporation, partnership, company or association duly registered with the Securities and
Exchange Commission and/or the Bureau of Commerce.
(b) Private Detective Agency. A private detective agency is any person, who, for hire or reward or on
commission, conducts or carries on or holds himself or itself out as conducting or carrying on a
detective agency, or detective service.
(c) Private Detective. A private detective is any person who is not a member of a regular police agency
of the Armed Forces of the Philippines who does detective work for hire, reward, or commission. (
d) Watchman or Security Guard, Watchman or Security Guard Agency. Any person who offers or
renders personal service to watch or secure either residential or business establishment, or both, or
any building, compound, or area including but not limited to logging concessions, agricultural,
mining or pasture lands for hire or compensation, or as an employee thereof shall be known as
watchman or security guard; and any person, association, partnership, or corporation, who recruits,
trains, muster, furnishes, solicits individuals or business firms, private or government-owned or
controlled corporations to engage his service or those of its watchmen, shall be known as
Watchman of Security Guard Agency. (As amended by Pres. Decree No. 11, October 3, 1972.)

Section 4. Who May Organize a Security or Watchman Agency? Any Filipino citizen or a corporation,
partnership, or association, with a minimum capital of five thousand pesos, one hundred per cent of which
is owned and controlled by Filipino citizens may organize a security or watchman agency: Provided, That
no person shall organize or have an interest in, more than one such agency except those which are
already existing at the promulgation of this Decree: Provided, further, That the operator or manager of
said agency must be at least 25 years of age, a college graduate and/or a commissioned officer in the
inactive service of the Armed Forces of the Philippines; of good moral character; having no previous record
of any conviction of any crime or offense involving moral turpitude and not suffering from any of the
following disqualifications:
(1) Having been dishonorably discharged or separated from the Armed Forces of the Philippines;
(2) Being a mental incompetent;
(3) Being addicted to the use of narcotic drug or drugs; and
(4) Being a habitual [Link]
For purposes of this Act, elective or appointive government employees who may be called upon on
account of the functions of their respective offices in the implementation and enforcement of the
provisions of this Act and any person related to such government employees by affinity or consanguinity in
the third civil degree shall not hold any interest, directly or indirectly in any security guard or watchman
agency. (As amended by Pres. Decree No. 11.)

Section 5. Qualifications Required.


No person shall be employed as security guard or watchman or private detective unless he is:
1. Filipino citizen
2. High school graduate
3. Physically and mentally fit
4. Not less than 21 nor more than 50 years old
5. At least 5'4" in height
6. Not suffering from any disqualification under RA 5487
 Veterans shall be given priority in employment as security guard or private detective.
 Person convicted of any crime involving moral turpitude shall not be employed as security guard or
private detective.
 Private detective, detective agency, security guard, security agency must first obtain license from
the PNP.
 Employees employed solely for clerical or manual work need not be licensed.
 The license shall be displayed at all times in a conspicuous and suitable place in the agency office.
 The PNP shall exercise general supervision over the operation of all private detective and security
guard agencies.
 The City/Municipal Mayors has the power as director of the City/Municipal civil defense to deputize
private detective and security guards to help maintain peace and order or prevent or arrest law
violators in case of emergency or in times of disaster or calamity. They shall take orders from the
Chief of Police for the duration of the fire, inundation, earthquakes, riots or other emergency.
 A security guard or security agency is entitled to possess firearms.
 Firearm must not be higher than .45 calibers.
 Agency is entitled to possess firearm not exceeding one firearm for every security guard in its
employ.
 Security guard is entitled to possess not more than one riot gun or shotgun.
 Firearms shall be carried by the security guard only during his tour of duty in proper uniform within
the compound of the establishment except when he escorts big amount of cash or valuables in or
out of said compound.
 The Chief PNP shall prescribe the uniform, ornaments, equipment and paraphernalia to be worn by
the security guards.
 Uniforms must be different from the PNP/AFP.
 Salaries of security guard - not lower than the minimum wage prescribe by law.

NOTA BENE:
(a) Foreigners who are already employed as watchmen or security guards prior to the approval of this Act
shall not be subject to the above-mentioned requirements.
(b) Veterans shall be given priority in employment as security guard, watchman or private detective.
(c) Person convicted of any crime involving moral turpitude shall not be employed as security guard,
watchman or private detective. (Section 5)

Qualification of an Operator or Manager of a Security Agency:


1. At least 25 years of age
2. College graduate and/or commissioned officer in the inactive service of the AFP
3. Good moral character
4. No previous record of any conviction of any crime/offense involving moral turpitude
5. Not suffering from any of the following disqualifications:
6. dishonorably discharged or separate from the AFP
7. mentally incompetent
8. addicted to the use of narcotic drugs
9. habitual drunkard

An elective or appointive government employees who may be called upon on account of the function of
their respective offices in the implementation and enforcement of the provision of RA 5487 and person
related to such government employees by affinity or consanguinity in the third civil degree shall not hold
any interest, directly or indirectly in any security guard agency.

Section 6. License Necessary. No person shall engage in the business of, or act either as a private
detective, or detective agency; and either engage in the occupation, calling or employment of watchman
or in the business of watchman's agency without first having obtained the necessary permit from the
Chief, Philippine Constabulary which permit as approved is prerequisite in obtaining a license or license
certificate: Provided, That all existing private detective or watchman or security guard agencies shall have
a period of one (1) year from the approval of this Act to secure the said license: Provided, further, That
existing agencies, and any new agency which may hereafter apply for a license, certify under oath that
their private detectives, watchmen or security guards, have received the appropriate training from either
the Philippine Constabulary, the National Bureau of Investigation, any local police department, or any other
public institution duly recognized by the government to conduct police training.

Section 7. Application for License. The application shall be made in writing and shall be filed with the
Chief, Philippine Constabulary. It shall contain the full name of the applicant, his age, civil status, his
residence, and location of business. If the applicant is a corporation, association or partnership, a copy of
the certificate of registration with the Securities and Exchange Commission together with its by-laws and
articles of incorporation, with the Bureau of Commerce.

Section 8. Fees to be Paid and Bonds. When all requisites for the issuance of the license have been
complied with, the Chief of the Philippine Constabulary or his duly authorized representative shall issue a
permit for the issuance of such license and register the same in his office, upon payment by the applicant
of the fee in accordance with the following schedule:
(d) the sum of one hundred pesos per annum as national license;
(e) the sum of fifty pesos per annum as municipal license fee in any city where it may operate, the said
fee to be payable to the city treasurer concerned;
(f) the sum of twenty-five pesos per annum as municipal license fee for any municipality where it may
operate, the said fee to be payable to the municipal treasurer concerned;
(g) the private Detective and Watchman Agency shall in addition to the above pay a fixed Internal
Revenue Tax of one hundred pesos per annum in lieu of percentage taxes;
(h) the individual private detective and/or watchman shall pay for Mayor's Permit, Health and/or
Sanitary fee an amount not exceeding three pesos per annum and the agency shall pay the sum not
exceeding ten pesos for the Mayor's Permit and Health and/or Sanitary fees; and
(i) the Chief of the Philippine Constabulary or his duly authorized representative shall issue an
appointment over his signature and affix the seal of his office, to each license and for each such
appointment, the sum of one peso shall be paid.
The application shall further be accompanied by a bond issued by any competent or reputable surety
or fidelity or insurance company duly accredited by the office of the Insurance Commissioner in the sum of
not less than five thousand pesos nor more than ten thousand pesos in the discretion of the Chief,
Philippine Constabulary, which bond shall answer for any valid and legal claim against the agency by its
clients or employees: Provided, That licenses issued in the province of an authorized representative of the
Chief of Constabulary is subject to review by the Chief of Constabulary.
Any provision of this or other law to the contrary notwithstanding, the Chief of Constabulary may, at
any time suspend or cancel the licenses of private watchman or security guard agency found violating any
of the provisions of this Act or of the rules and regulations promulgated by the Chief of Constabulary
pursuant thereto. (This paragraph was inserted by Sec. 3, Pres. Decree No. 11.)

Other provisions of Pres. Decree No. 11


Any person who commit any act in violation of Republic Act No. 5487 and of this Decree, and the
implementing rules and regulations already promulgated which are not in conflict herewith, and those to
be promulgated by the Chief of Constabulary pursuant hereto, shall, on conviction thereof, suffer
imprisonment of from ten to fifteen years and a fine of not less than ten thousand pesos nor more than
fifteen thousand pesos as a military court/tribunal or commission may direct.
The Chief of Constabulary shall promulgate the necessary rules and regulations to carry out the provisions
of this Decree.

Section 9. Employees Need Not be Licensed. Every person operating, managing, directing or conducting a
licensed private detective or watchmen agency shall also be considered licensed private detective, or
watchman and no person shall be employed or used in a private detective work unless he be a licensed
private detective or watchman: Provided, That nothing in this section shall be construed as requiring
detective license for persons employed solely for clerical or manual work.

Section 10. Display of License. The license shall be displayed at all times in a conspicuous and suitable
place in the agency office or headquarters of the agency and shall be exhibited at the request of any
person whose jurisdiction is in relation with the business of the agency or the employees thereof, or of the
Chief of the Philippine Constabulary or his duly authorized representative or any peace officer.

Section 11. Supervision of the Philippine Constabulary. Upon approval of this Act, the Philippine
Constabulary shall exercise general supervision over the operation of all private detective and watchman
or security guard agencies.

Section 12. Powers of City or Municipal Mayors in Cases of Emergency. In case of emergency or in times
of disaster or calamities where the services of such agencies arise, the City or Municipal Mayor, as director
of Civil Defense, may muster or incorporate the services of the agency nearest the area where such
emergency, disaster or calamity arises and its duly licensed personnel to help maintain peace and order;
and/or the prevention or apprehension of law violators and in the preservation of life and property.
Deputized private detectives, watchmen or security guards shall take direct orders from the Chief of Police
for the duration of the fire, inundation, earthquakes, riots or other emergencies.

Section 13. Issuance of Firearms. A watchman or security agency shall be entitled to posses firearms
after having satisfactorily passed the requirements prescribed by the Chief, Philippine Constabulary
pertinent to the possession of firearm of any caliber not higher than 45 caliber in a number not exceeding
one firearm for every two watchmen or security guards in its employ: Provided, however, That a watchman
or security agent shall be entitled to possess not more than one riot gun or shotgun in order to provide
adequate security when circumstances so demand: Provided, further, That all the firearms mentioned
herein shall be carried by the watchman or security guard only during his tour of duty in proper uniform
within the compound of the establishment except when he escorts big amounts of cash or valuables in and
out of said compound.

Section 14. Uniform. The uniform of watchman or security guard as well as those organized, maintained
or under the employment of the government or any government-owned and/or controlled corporations,
agencies or entities, shall be different from the uniform worn and prescribed for members of the Armed
Forces of the Philippines, City and Municipal Police Force. The Chief, Philippine Constabulary, through his
duly authorized representative shall prescribed the uniform or ornaments, equipment and paraphernalia to
be worn by the security guards and watchmen throughout the Philippines.
Section 15. Compensation of Watchmen or Security Guards. Watchmen or security guards shall receive a
salary not lower than that prescribed in the Minimum Wage Law.

Section 16. Limitations and Prohibitions.


2. On Membership:
(a) No agency operating in the City of Manila and suburbs may employ more than 1,000 watchmen or
security guards;
(b) No agency operating in other cities and first class municipalities may employ more than 500
watchmen or security guards;
(c) No agency operating in municipalities other than first class may employ more than 200 watchmen
or security guards.
3. On Organization:
(a) No person, corporation, partnership or association may organize more than one agency in any one
city or municipality.
4. On Service:
(a) No agency shall offer, render or accept its services to gambling dens or other illegal enterprises.
(b) The extent of the security service being provided by any security agency shall not go beyond the
whole compound or property of the person or establishment requesting the security service except
when they escort big amount of cash.

Section 17. Rules and Regulations by Chief, Philippine Constabulary. The Chief of the Philippine
Constabulary, in consultation with the Philippine Association of Detective and Protective Agency Operators,
Incorporated and subject to the provisions of existing laws, is hereby authorized to issue the rules and
regulations necessary to carry out the purpose of this Act.
Who can Issue rules and regulations to carry out the purpose of RA 5487? The chief PNP, in
consultation with the Philippines Association of Detective and Protective Agency Operators.

Section 18. Penal Provisions. Any violation of this Act or the rule or regulation issued hereunder shall be
punished by suspension, or fine not exceeding P200.00 or cancellation of his or its licenses to operate,
conduct, direct or manage a private detective, watchman or security guard agency and all its members in
the discretion of the court together with the forfeiture of its bond filed with the Philippine Constabulary.
If the violation is committed by those persons mentioned under paragraph two, section four of this Act the
penalty shall be imprisonment ranging from one to four years and fine ranging from one to four thousand
pesos in the discretion of the court.

What are the penal provisions for violation of RA5487 or its implementing rules?
1. Suspension, fine or cancellation of license to operate with the forfeiture f bond filed with the Chief
PNP.
2. Imprisonment ranging from 1 to 4 years and fine, in the discretion of the courts vehicles.

For visitors, the following systems are used:


a. Escort
b. Driver pool - the most secure but the most expensive. In this system, car is driven by qualified
driver employed by the installation from the entrance to its destination and after the conclusion
of the business of the visitor car is driven back to the installations entrance.
c. Time travel - used in less sensitive installations
d. Grid system - a very complicated [Link] installation is divided into grid ad squares like a
map. Each square is given a no. or letter designation. The visitor is then given a map and shown
the route to take to his destination and should not deviate from the prescribed route, otherwise
he could be stopped and questioned by the guards.
e. Search of vehicles - sign should be put at the entrance to the installation that any vehicle
entering is subject to search anytime.

Section 19. Repealing Clause. All laws, rules, resolutions, municipal ordinances, regulations and
administrative orders contrary or inconsistent with the provisions hereof are hereby repealed.

Section 20. Effectivity. This Act shall take effect upon its approval.

LESSON 2
THE 2003 REVISED RULES AND
REGULATIONS IMPLEMENTING REPUBLIC ACT 5487
RULE I
DECLARATION OF POLICY

SECTION 1. Scope. The organization, operation, business and activities of private watchman/security or detective
agencies, security training institutions/systems as well as private security and training personnel shall be governed by
these Rules and
Regulations implementing Republic Act 5487, as amended.

SECTION 2. License Necessary.


a. No person shall engage in the business of or act as a private detective agency or engage in the occupation,
calling or employment of security personnel or in the business of private security/training agency without first
having obtained the permit from the Chief of the Philippine National Police which permit as approved is
prerequisite in obtaining a license certificate.
b. License is likewise necessary for any person operating, managing, directing or conducting a licensed private
security/detective/training agency. Any person having any participation in the management or operation thereof
except those employed solely for clerical or manual work, shall also secure a license.

SECTION 3. Training Required. All applicants for license certificate shall have received the appropriate training from any
public or private training institution/system duly recognized by the government to conduct private security or police
training.

SECTION 4. Prohibitions. No License certificate shall be granted to any applicant for license to operate or license to
exercise security profession with the following disqualifications:
a. having previous record of any conviction of any crime
b. having previous record of any conviction of any offense involving moral turpitude
c. having been dishonorably discharged or separated from employment or service
d. being a mental incompetent
e. being a user/addicted to the use of prohibited drugs or narcotics
f. being a habitual drunkard
g. dummy of a foreigner

RULE II
PENAL PROVISION

SECTION 1. Without prejudice to the imposition of criminal sanctions, any violation of Republic Act 5487, as amended or
its rule or regulation, by license grantees likewise pursuant thereof, shall be punished by suspension, or fine, or
cancellation of his or its license to operate, conduct, direct or manage a private detective, watchman or security guard
agency and all its members, or penalized pursuant to provisions herein under, and/or with the forfeiture of its bond filed
with the Philippine National Police, at the discretion of the Chief. PNP.

SECTION 2.
f. Any person not covered by Section 1, Rule II above who commits any act in violation of Republic Act 5487 as
amended and its implementing rules and regulations shall, on conviction thereof, suffer imprisonment of from
ten to fifteen years, and a fine of not less than ten thousand pesos nor more than fifteen thousand pesos as
the Court may direct.
g. If the violation is committed by those persons mentioned in Section 3b, Rule IV herein under, the penalty shall
be imprisonment ranging from one to four years and a fine ranging from one to four thousand pesos at the
discretion of the Court.

SECTION 3. Expired License. For purposes of enforcing sanctions, any private security, watchman or company guard
force agency or private security or training personnel upon expiration of their respective license to operate or license to
exercise security profession are considered as not possessing license and shall be held criminally and administratively
liable.

RULE III
DEFINITION OF TERMS
SECTION 1. Definition – For purposes of and when used in these rules and regulations, the following terms shall be
construed in the sense indicated herein unless the context of a particular section clearly indicates that a different sense is
intended:

a. Person – shall include not only natural but also juridical persons such as single proprietorships,
partnerships, corporations, companies or associations, duly organized and registered with the Securities
and Exchange Commission and/or the Department of Trade and Industry.
b. Private Security Services – shall include the act of providing or rendering services to watch an
establishment whether public or private, building, compound/area or property, to conduct access
control/denial in any form whether physically, manually or scientifically by electronic monitoring systems,
for the purpose of securing such area/property and at the same time ensuring safety and protection of
persons within such areas, to maintain peace and order within such areas, to conduct private security
training, and/or to conduct investigation. It shall also include the act of contracting, recruiting, training,
furnishing or posting any security guard, to do its functions or solicit individuals, businesses, firms, or
private, public or government-owned or controlled corporations to engage his/its service or those of his/its
security guards, for hire, commission or compensation thru subscription or as a consultant/trainer to any
private or public corporation.
c. Private Detective Services – shall include among others the act of providing personal security protection,
inquiry and information gathering, preemployment verification and individual background profiling,
providing assistance in civil liability and personal injury cases, insurance claims and fraud, child custody
and protection cases, for the purpose of assisting in gathering information leading to determination and/or
prevention of criminal acts and/or resolution of legal, financial and personal problems.
d. Private Security Industry – shall cover those in the legitimate business of providing private security and
detective services.
e. Private Security Guard (SG) – sometimes called private security guard or watchman shall include any
person who offers or renders personal service to watch or secure either a residence, business
establishment, or buildings, compounds, areas, or property, inspects/monitors bodily checks/searches
individuals and/or baggage and other forms of security inspection, physically/ manually or scientifically
electronic, including but not limited to, logging concessions and agricultural, mining or pasture lands,
transportation, for hire or compensation , or as an employee thereof, including any employee of the
national or local governments or agencies or instrumentality’s thereof and or government owned or
controlled firm or corporations who is employed to watch or secure government buildings, compounds,
premises and other properties, other than members of the Armed Forces of the Philippines, guards of the
Bureau of Jail management and Penology, Municipal or City jail guards, and members of the Philippine
National Police or of any other law enforcement agency of the Government.
f. Private Detective (PD) – shall mean any person who does detective work for hire, reward or commission,
other than members of the Armed Forces of the Philippines, guards of the Bureau of Jail Management and
Penology, municipal or city jail guards, and members of the Philippine National Police or of any other law
enforcement agency of the government.
g. Private Security Personnel – shall be natural persons which include private security guards, private
detectives, security consultants, security officers and others that may be classified later,
rendering/performing security and/or detective services as employed by private security agencies and/or
private firms.
h. Government Security Personnel – shall be natural persons which include government security guards,
detectives, security consultants, security officers and others that may be classified later, except those of
the Armed Forces of the Philippines, Philippine National Police, Bureau of Jail Management and Penology,
Municipal or City Jail guards rendering/performing security and/or detective services as employed by
government entities.
i. Private Security Agency (PSA) – shall mean any person association, partnership, firm or private
corporation, who contracts, recruits, trains, furnishes or posts any security guard, to perform its functions
or solicit individuals, businesses, firms, or private, public or government-owned or controlled corporations
to engage his/its service or those of his/its security guards, for hire, commission or compensation thru
subscription or as a consultant/trainer to any private or public corporation whose business or transactions
involve national security or interest like the operation and/or management of domestic or ocean vessels,
airplanes, helicopters, seaports, airports heliports, landing strips etc., or as consultant on any security
related matter, or to provide highly specialized security, detective and investigation services like gangway
security, catering security, passenger profiling, baggage examination, providing security on board vessels
or aircraft, or other security needs that PNP SAGSD may approve.
j. Private Detective Agency (PDA) – shall mean any person association, partnership, firm or private
corporation, who contracts, recruits, trains, furnishes or posts any private detective, to perform its functions
or solicit individuals, businesses, firms, or private, public or government-owned or controlled corporations
to engage his/its service or those of his/its detectives, for hire, commission or compensation thru
subscription or as a consultant/trainer to any private or public corporation or as consultant on any detective
related matter, or to provide highly specialized detective and investigation services, or other detective
needs that SAGSD-CSG may approve.
k. License to Exercise Profession – shall mean any document issued by the Chief, Philippine National Police
or his duly authorized representative recognizing a person to be qualified to perform his duties as private
security or training personnel.
l. License to Operate (LTO) – is a License Certificate document, issued by the Chief, Philippine National
Police or his duly authorized representative, authorizing a person to engage in employing security guard or
detective, or a juridical person to establish, engage, direct, manage or operate an individual or a private
detective agency or private security agency/company security force after payment of the prescribed dues
or fees as provided in these Rules and Regulations.
m. Company Guard Force (CGF) – a security force maintained and operated by any private
company/corporation utilizing any of its employees to watch, secure or guard its business establishment
premises, compound or properties.
n. Government Guard Unit (GGU) – a security unit maintained and operated by any government entity other
than military or police, which is established and maintained for the purpose of securing the office or
compound and/or extension of such government entity.
o. PNP as used herein shall mean the Philippine National Police, which was organized pursuant to the
provision of RA 6975 otherwise known as the National Police Act of 1991.
p. SAGSD as used herein shall refer to the current PNP Civil Security Group Security Agency and Guard
Supervision Division or any other PNP Office that may be designated later as the primary office for
supervision of the implementation of these rules and regulations.
q. PADPAO refers to the Philippines Association of Detective and Protective Agency Operators, Inc., which is
an association of all licensed security agencies and company security forces.
r. Duty Detail Order is a written order/schedule issued by a superior officer usually the private security
agency/branch manager or operations officer assigning the performance of private security/detective
services duties.

RULE IV
LICENSE TO OPERATE

PART 1
SECTION 1. Who may organize and maintain a Private Security Agency and Private Detective Agency. - Any Filipino
citizen or corporation, association, partnership, one hundred percent (100%) of which is owned and controlled by Filipino
citizens, may organize and maintain a Private Security Agency or Private Detective Agency.

SECTION 2. Basic requirement of an operator or manager of agency –


a. The operator or manager of an agency including, managers of branch offices, must be:
1. Filipino citizen;
2. Not be less than twenty five (25) years of age;
3. College graduate and/or a commissioned officer in the inactive service or retired from the Armed Forces
of the Philippines or the Philippine National police;
4. Has taken a course/seminar on industrial Security Management and/or must have adequate training or
experience in security business; and,
5. Good moral character

b. New applicants for license to operate shall be required to obtain a minimum capitalization of one million pesos
(P1, 000,000.00) with a minimum bank deposit of five hundred thousand (P500, 000.00) pesos in order to
start its business operation.

SECTION 3. Limitations, Disqualifications and Prohibitions.


a. No person shall organize or have an interest in more than one agency.
b. Elective or appointive government employees who may be called upon on account of the functions of their
respective offices in the implementation and enforcement of the provisions of Republic Act 5487 as amended
and its implementing rules and regulations, and any person related to such government employee by affinity or
consanguinity in the third civil degree, shall not hold an interest, directly or indirectly, in any security or
watchman agency.
c. No agency shall offer, render or accept services in gambling dens or other illegal business establishments or
enterprises.
d. The extent of the security guard service being furnished by the security agency shall not go beyond the
compound and/or property of the person or establishment contracting the security service except when the
security guards is escorting big amount of money or valuables.
e. Main/branch offices. - All agencies shall maintain a main office in their registered addresses. Branch offices
may be established and maintained in other provinces/ cities where the security agency has deployed security
guards.
f. Authority to operate outside principal offices. The following measures are promulgated to promote the healthy
growth of the private security industry in general, as well as to minimize proliferation of marginal agencies in
particular.
1. No new or moribund but previously licensed private security agency shall be granted license to operate
unless its business viability is supported by evidence of assured clientele, adequate capitalization and the
like.
2. Private Security Agency operating at regions outside its main office shall be required to register with the
nearest Police Provincial Office and shall submit an authenticated machine copy of the following
documents:
a) License to Operate
b) License of the FA’s to be issued
c) List of the officers and security guards
d) Appointment Order of Branch/Detachment Manager (if any)
g. All applicants for license to operate shall, in addition to the requirements imposed pursuant to RA 5487 as
amended and these rules and regulations, be required to attend a private security agency/company guard
force operators’ and management seminar/workshop.

h. Prohibition on “KABIT SYSTEM” operators.

1. No licensed security agency shall operate, promote and enter into an agreement of “merger“ (kabit system)
with any person or a group of persons for the purpose of organizing a branch unit or subsidiary under
separate control and ownership. Merger of security and detective agencies shall not be recognized without
prior approval from the Securities and Exchange Commission with respect to their Articles of Incorporation
and the Department of Trade and Industry, with regards their business name.
2. Any of the following circumstances or a combination thereof shall be considered prima-facie evidence of
the existence of “Kabit System”.
a) Maintaining a separate branch, unit or subsidiary office aside from the main office of the agency
situated within the same locality;
b) Receiving direct payments from the agency’s clientele and issuing officials receipt of their own distinct
from that issued by the agency concerned;
c) Remitting directly Social Security System premiums, Medicare contributions and other premium for
other policy insurance benefits by the aforementioned branch, unit or subsidiary office;
d) Existence of an agreement between the licensee and a branch manager thereof, whereby the latter
obligates himself to pay a certain percentage of his income to the former on the condition that the
control and supervision of the guards posted by said branch shall course on the manager thereof and
that the licensee shall be exempt from liabilities/ obligations attendant to the operation of said branch.
e) Keeping/maintaining separate payrolls for the branch employees signed and/or approved by the
branch manager only;
f) Absence of record of monthly income remittances to the main office when said branch is authorized to
make collections from the clients of the licensee; and
g) All other similar acts tending to show separate and distinct relationship/ personality/ ownership/
management.

SECTION 4. Organizational structure of private security agencies/company security services/ government security units.
a. Private security agencies shall conform with the organizational structure, personnel, equipment, training and
clothing as provided for hereinafter.
b. Company security forces shall be organized to conform substantially with the organizational structure prescribed
for private security agencies.
c. Government Guard Unit shall be organized to conform with the organizational structure of the said government firm
but not contrary to the organizational structure as prescribed for government security units.

SECTION 5. On Membership.
a. No regular license shall be granted to any private security agency unless it has a minimum of two hundred (200)
licensed private security personnel under its employ.
b. No regular license shall be granted to any company guard force or private detective agency unless it has a
minimum of thirty (30) licensed private security personnel under its employ.
c. The maximum number of private security personnel that a PSA/CGF/PDA may employ shall be one thousand
(1000).
PART 2

SECTION 6. Application for License to Operate (LTO).


a. The application shall be made in writing by the owner (for single proprietorships) or authorized person duly
designated by the corporation or partnership (through a board resolution or joint affidavit, respectively) and shall
be filed with the Chief of the Philippine National Police (CPNP) through the PNP Security Agency and Guard
Supervision Division, Civil security Group (SAGSD-CSG). Using license application form PNPSF1, the application
shall contain the full name of the applicant, his age, civil status, his residence and location of business.
b. Applications of corporations, associations, partnerships shall furthermore include a copy of the certificate of
registration together with its by-laws and articles of incorporation.
c. All applications shall be accompanied by a bond issued by any competent or reputable surety or fidelity or
insurance company duly accredited by the Office of the Insurance Commissioner, which bond shall answer for
any valid and legal claim against the agency by its clients or employees.

SECTION 7. License to Operate (LTO). License to Operate (LTO) shall be issued corresponding to the purpose of the
organized Private Security Agency:
a. Private Security/Detective Agency LTO. License certificate issued to persons, corporations, associations,
partnerships whose primary purpose is to provide/offer commercial private security and/or detective services for
hire, commission or compensation.
b. Company Guard Force LTO. License certificate issued to persons, corporations, associations, partnerships not
doing business nor organized purposely or principally as a private security guard or detective agency who/which
is utilizing for its security purpose any of his/its employees to render private security or detective services.
c. Government Guard Unit Certificate of Registration (CR). License certificate issued to national or local
government or any agency or instrumentality thereof, or of government-owned or controlled corporation not doing
business nor organized purposely or principally as a private security guard or detective agency who/which is
utilizing for its purpose any of his/its employees to render private security or detective services.

SECTION 8. Status and Validity of License to Operate. The status of license certificate in Section 7 above shall be issued
in conformity with the following:
a. Regular LTO – issued, after complying with licensing requirements, to private security agencies having obtained
and maintained in its employ at least two hundred
a. (200) security personnel, and to company guard forces and private detective agencies having obtained and
maintained in its employ at least thirty (30) security personnel and private detectives respectively. Such license
may be renewed following conformity with renewal requirements prescribed in a Standard Operating Procedure
(SOP).
b. Temporary LTO – initial and conditional issuance to new private security agencies and to PSAs holding regular
LTO not able to maintain the minimum number of security personnel or conform to standards, for them to be able
to attain the 200 minimum number of security personnel or comply with licensing standards, prior to issuance/re-
issuance of regular LTO. Such issuance shall not be renewable nor be extendible.
c. Unless sooner cancelled or revoked and provisions hereof modified, all licenses to operate shall have a validity of
two (2) years. Temporary LTOs upon expiration are automatically cancelled.
d. The expiry date of Regular Licenses to Operate shall be on the last day of the month of the second year
corresponding to the last number before the year series number of the assigned number/LTO number of the
License. (i.e. hereto in bold numbers PSA-00001-02 and PSA-00050-03 representing expiry on January 31, 2004
and October 31, 2005 respectively). For this purpose the appropriate transition period shall be provided after the
effectivity of these Rules and Regulations.

SECTION 9. LTO Processing.


a. All applications for Licenses to Operate filed shall be processed by SAGSDCSG for approval and subsequent
issuance of the appropriate LTO, and/or for disapproval.
b. When all requisites for the issuance of License to Operate have been complied with, corresponding license
certificate shall be issued upon payment by the applicant of applicable fees and bond, prescribed/to be prescribed
following existing administrative laws:
National License Fee
Security Personnel Registration Fee
Annual Internal Revenue tax
Local Government Business tax
Bond issued by any competent or reputable surety or fidelity or insurance company duly accredited by the
Insurance Commission in the sum of ten thousand pesos in the discretion of the CPNP which bond shall
answer for any valid and legal claim against the agency by its clients or employees
c. Applications with lacking requirements shall not be accepted for processing.
d. All accepted applications for license to operate shall be processed for completeness of documentary requirements
and conformity to standards.

SECTION 10. Supporting Documentary Requirements


a. Supporting Documents accompanying applications for New License To Operate:
1. Sketch of Office Location
2. Application Form (SAGSD 02-94)
3. Registration Form DTI/SEC
4. Bio-Data/Information Sheet for Director/Partners
5. Indorsement from RD/ARDO (for provincial application only)
6. College Diploma or Retirement Order (AFP/PNP)
7. List of Prospect Clients
8. Project Feasibility Study
9. Letter Request for Authority to Purchase FA's From Authorized Gun Dealers/Store
10. Official Receipt National License Fee (P 2, 500 per year)
11. Registration Fee (P 50 per guard)
12. Surety Bond for the period of license
13. Bank Certificate (Minimum P 500, 000)
14. Certificate from RD/Provincial Director that there is a demand for security services or a need to CSF
15. PADPAO Membership Fee or PADPAO Membership Certificate
16. Affidavit that the agency applying has a furnished office and PNP approved FA's vault.
17. Affidavit that PSA will have at least 200 guards posted within 2 years after date of approval of Temp LTO
18. PNP Intelligence Clearance
19. NBI Clearance
20. Neuro-Psychiatric Clearance
21. Drug Test

b. Supporting Documents accompanying applications for Regular License To Operate:


1. Indorsement from RD, PNP PROs with Inspection Checklist
2. Sketch of Office Location
3. Application form (SAGSD 02-04)
4. Notarized Disposition of Guards, Clients & Fire Arms
5. List of Licensed FA's Noted/Certified By FED
6. Alphabetical Listing of Guards By Birth month
7. Official Receipt for National License Fee
8. Official Receipt for PNP Registration Fee
9. VAT Payments
10. Agency's /Company's FAs License Fee
11. Surety Bond for the period of license
12. PNP Intelligence Clearance
13. Neuro-Psychiatric Clearance
14. Drug Test
15. National SSS Clearance with R-5 & R-3
16. BIR Clearance
17. DOLE Clearance
18. Certificate of fm FED of No Unclaimed FA's Licenses
19. Certification of PADPAO Membership (PADPAO)
20. Certification of Seminar re-RA 5487 (PADPAO)
21. Mayor's Permit (Where main office is located)
22. License to Operate (Previous)
c. LTO processing, standards and documentary requirements shall be prescribed in a Standard Operating
Procedure (SOP) issued by the Director, CSG.

SECTION 11. Renewal of License to Operate.


a. Filing of Applications for Renewal and Late Filing. All applications for renewal of License to Operate shall be filed
at least sixty (60) days before expiry date of LTO subject of the renewal application. Applications filed/accepted
thereafter shall be penalized for late filing.
b. Failure to Conform to the Standards for Renewal. Renewal applicants/holders of regular license not able to
maintain the 200 minimum number of security personnel under its employ or license renewal requirements at the
time of filing of application, shall be reverted to temporary status and issued temporary LTO. Within its duration
the agency-applicant may comply with the required minimum number of employed security personnel or license
renewal requirements prior to reissuance/ renewal of its regular LTO.
c. Failure to file for renewal. The Licenses to Operate of applications for renewal of regular Licenses to Operate who
fail to file applications sixty (60) days after the expiry date of LTO subject of the renewal application, SHALL
AUTOMATICALLY BE
a. CANCELLED.
d. In addition to other renewal requirements under provisions of these rules and regulations, no application shall be
approved unless a certification is issued by FEDCSG to the effect that all licenses of firearms of the agency
concerned are updated/renewed for at least one (1) year forthcoming during the validity of the renewed LTO.

SECTION 12. Approval, Cancellation and Suspension of LTO. Unless revoked or modified by the Chief, PNP, the
authority to approve, cancel or suspend the license to operate shall be exercised by the following:
a. Approval of New Regular LTO CPNP
b. Cancellation of Regular LTO CPNP
c. Re-instatement of Regular LTO CPNP
d. Suspension of Regular LTO CPNP
e. Renewal of Regular LTO DCSG
f. Approval of Temporary LTO DCSG
g. Reversion of Regular to Temporary LTO DCSG
h. Cancellation of Temporary LTO DCSG
i. Suspension of Temporary LTO DCSG

SECTION 13. Cancelled LTO. All cancellations shall be issued the corresponding Cease to Operate (CTO) orders.
Thereafter the concerned agency shall stop its operation and deposit its firearms with the Firearms and Explosives
Division (FED-CSG) or nearest Police Regional Office for safekeeping until legal disposition thereof by the agency in
accordance with existing firearms laws, rules or regulations.

SECTION 14. Voluntary Cease to Operate. Anticipated cessation of operations voluntarily and officially submitted by the
agency shall be issued the corresponding CTO bearing the effectivity date of such anticipated cessation. Thereafter the
concerned agency shall stop its operation and deposit its firearms (if any remains) with the Firearms and Explosives
Division (FED-CSG) or nearest Police Regional Office for safekeeping until legal disposition thereof by the agency in
accordance with existing firearms laws, rules or regulations.

PART 3

SECTION 15. Display of License. The LTO shall be displayed at all times in a conspicuous and suitable place in the
agency office or headquarters and shall be exhibited at the request of any person whose jurisdiction is in relation with the
business of the agency or the employees thereof.

SECTION 16. Security service contract. Private security agencies shall render security services to their clients only after a
service contract shall have been executed between them. Such contract shall include among other things: the money
consideration to be paid by the client to the agency; the number of hours of security services per guard per day which the
guard himself shall render to the client and the salary each individual security guard shall receive from the agency.

SECTION 17. Tenure of Security Personnel. - The tenure of security personnel shall be co-terminus with the service
contract between the PSA and the client. Services of any security personnel shall be terminated on the following grounds:
a. Expiration of contract;
b. Revocation of license to exercise profession;
c. Conviction of a crime or offense involving moral turpitude;
d. Loss of trust and confidence;
e. Physical and mental disability; and
f. Violation of the pertinent rules and regulations promulgated by the PNP.

SECTION 18. Payrolls. - Private security agencies shall prepare payrolls with the name of security guards arranged
alphabetically and numbered consecutively. These payrolls shall be personally signed by the payees only after receipt of
the amounts shown therein. Separate payrolls for distant detachments/posts shall be prepared and similarly signed by the
payees or his duly authorized representative as the case maybe. Payrolls shall be filed with the main office within fifteen
(15) days after payday. The use of payroll form shall be in accordance with the standard format as prescribed by law.

SECTION 19. Security Personnel-Employee Benefits. The employer Private Security/Training/Detective Agency,
Company Guard Force, Government Guard Unit shall be responsible and held accountable for the compensation of the
following benefits due their respective security personnel as required by law:
a. salary and wage prescribed in the minimum wage law;
b. health, medical and insurance benefits;
c. separation and retirement pay and benefits;
d. Pag-ibig benefits
e. others as may be prescribed later

SECTION 20. Mandatory Insurance Coverage - It shall be the responsibility of private security agency/company guard
forces operators/ owners to ensure that all posted security personnel under their employ shall be covered with adequate
insurance. In case of death of any security personnel, monetary benefits may be granted to his dependents/ beneficiaries
by the PSA/CGFs concerned.

RULE V
LICENSE TO EXERCISE PRIVATE SECURITY PROFESSION

SECTION 1. Who may apply for a License to Exercise Private Security Profession. Any Filipino citizen may apply for
License to Exercise Private Security Profession to engage in the occupation, calling or employment either as a Private
Security Guard, Private Security Officer, Private Detective and/or Private Security Consultant, after complying with both
academic/scholastic and skills/training requirements subject to other requirements prescribed hereinunder provisions.

SECTION 2. Basic requirements of private security personnel -


a. Filipino citizen;
b. Not be less than eighteen (18) years of age.
c. Must have taken a private security course/seminar and/or must have adequate training or experience in security
business or rendering security/detective services;
d. Of good moral character and must not have been convicted of any crime or violation of these rules and
regulations carrying a penalty of prohibition to be licensed; and
e. Must be physically and mentally fit.

SECTION 3. Qualifications a Private Security Guard. No person shall be licensed as security guard unless he possesses
the following qualifications:
a. Filipino citizen;
b. High school graduate;
c. Physically and mentally fit;
d. Not less than eighteen (18) years of age nor more than fifty (50) years of age (for new applicants and SGs in non-
supervisory position); and
e. Has undergone a pre-licensing training course or its equivalent.

SECTION 4. Qualifications for Security Officer. - No person shall be licensed as


Security Officer unless he has the following qualifications:
a. Filipino citizen;
b. Holder of a Baccalaureate Degree;
c. Physically and mentally fit; and
d. Has graduated from a Security Officer Training Course or its equivalent.

SECTION 5. Qualifications of Security Consultants. - No person shall be licensed as a


Security Consultant unless he possesses the following qualifications:
a. Filipino citizen;
b. Physically and mentally fit;
c. Holder of a Masters degree in either Criminology, Public Administration, MNSA, Industrial Security Administration,
or Law;
d. Must have at least ten (10) years experience in the operation and management of security business.

SECTION 6. Qualifications of a private detective.- No person shall be licensed as a private detective unless possesses
the following qualifications:
a. Filipino citizen;
b. Physical and mentally fit;
c. Holder of a baccalaureate degree preferably Bachelor of laws or Bachelor of
a. Science in Criminology;
d. Graduate of a Criminal Investigation Course offered by the Philippine National Police or the National Bureau of
Investigation or any police training school, or a detective training in any authorized/recognized training center;
e. Advance ROTC/CMT graduate or its equivalent.
SECTION 7. Exemptions from Basic Pre-Licensing Training. -
a. Veterans and retired military/police personnel or those honorably discharged military/police personnel
possessing all the qualifications mentioned in the preceding Section shall be exempted from pre-licensing
training/seminar and academic/scholastic attainment which is a requirement for the initial issuance of License to
exercise private security profession but shall not however be exempted from taking the refresher training courses
or its equivalent.
b. Likewise, graduates of ROTC advance/CHDF (or its equivalent in the PNP) Training graduates shall be
exempted from the required Basic-licensing Training/Seminar.

SECTION 8. Processing SOP. License to exercise profession processing, standards and documentary requirements shall
be prescribed in a Standard Operating Procedure (SOP) issued by the Director, CSG.

SECTION 9. Types of License.


a. Temporary License – initial and conditional issuance while awaiting issuance of regular license identification cards
or in the interim for purposes not covered by Rule V.
b. Regular License – generated Private Security Personnel License Card, duration or validity of which shall be for
two (2) years.

SECTION 10. Government Security Personnel – no person shall be licensed asGovernment Security Personnel unless he
possesses the qualifications as prescribed in Section 3, 4, 5 of this rule, provided he submits an appointment order
coming from the
Civil Service Commission.

SECTION 11. Processing.


a. All applications for Licenses to Exercise Profession filed shall be processed by SAGSD-CSG for approval and
subsequent issuance of the appropriate License to
a. Exercise Profession, and/or for disapproval.
b. When all requisites for the issuance of License to Exercise Profession have been complied with, corresponding
license certificate shall be issued upon payment by the applicant of applicable fees.

SECTION 12. New Applicant – applicants from NCR may file their application for license to exercise profession with the
Personnel Licensing Section, SAGSD, Civil Security Group, Camp Crame, Quezon City. Applicants from the provinces
may file their applications with the Firearms, Explosives, Security Agencies and Guards Section
(FESAGS), Regional Operation and Plans Division (ROPD) of the Police Regional Office concerned. The requirements
are as follows:
a. Application Form for Social Security ID (E-6 Rev 11-2000);
b. Application for License of Private Security Guard;
c. General Knowledge Examination Result (PASSED);
d. Training Certificate (Pre-Licensing Training Certificate);
e. Training Closing Report;
f. Neuro-Psychiatric Test Clearance;
g. Drug Test Result/Clearance;
h. Physical Fitness Certificate;
i. PNP Intelligence Clearance (DI);
j. NBI Clearance;
k. Court Clearance;
l. Police Clearance;
m. High School Diploma or Transcript of Record and College Diploma; and
n. Birth Certificate

SECTION 13. Renewal of License


a. Deadline for Filing and Late Filing. The deadline for filing of applications for renewal of License to Exercise
Profession shall be sixty (60) days prior to the month of the expiry date. Applications filed/accepted thereafter
shall be penalized for late filing.
b. Failure to file for renewal. The Licenses to Exercise Profession of those who fail to file renewal applications
SHALL AUTOMATICALLY BE CANCELLED upon expiry.
c. Renewal of license to exercise profession shall also be filed with SAGSD, CSG, Camp Crame, Quezon City or
through the Firearms, Explosives, Security Agencies and Guards Section (FESAGS), Regional Operation and
Plans Division (ROPD) of the Police Regional Office concerned after the completion of the required retraining and
requirements for renewal of license. The requirements are as follows:
1. Application for Social Security ID (E-6 Rev 11-2000 Form);
2. Application for License of Private Security Guard (PNPSF-01 Revised 2000);
3. General Knowledge Examination Result (PASSED);
4. Proof of Training;
5. Neuro-Psychiatric Test Clearance;
6. Drug Test Result/Clearance;
7. PNP Intelligence Clearance (DI) or NBI Clearance
d. All licensed security personnel must undergo in-service re-training at least once in every two (2) years preferably
two months before his/her birth month. The certificate of in-service training shall be a prerequisite among others,
for the renewal of license to exercise profession.

SECTION 14. Disposition of Applications for License. All license to exercise private security profession shall be processed
for the appropriate Approval, Disapproval, Cancellation or Suspension by the Chief, SAGSD.

SECTION 15. Possession of License.


a. All licensed private security personnel while in the exercise of their profession shall have in his body and
possession his/her valid license to exercise private security profession together with the corresponding proof of
payment of license fee.
b. The License issued shall be the proof of authority of the grantee to engage or exercise private security profession.
c. In no case shall the authority of the License be used in violation of laws.

RULE VI
PAYMENT OF FEES

SECTION 1. License Fees. – Consistent with laws existing during this formulation, the Chief of Philippine National Police
or his authorized representative, after receipt of the application for license and after finding the applicant qualified under
these rules and regulations, shall approve the application upon payment of the annual fees in accordance with the
following schedules:
a. For agency. –
1. The sum of two thousand five hundred pesos (P2, 500.00) as annual national license fee;
2. The sum of fifty pesos (P50.00) as payment for annual registration fee for each security guard employed.
b. For individual. - The amount of one hundred fifty pesos (P150.00) per year for Security Consultant, Security
Officer and Private Detectives and the amount of one hundred (P100) pesos per year for Security Guard as
annual license fee.

SECTION 2. Exemptions. Employees of the national or local governments or the agencies or instrumentalities thereof, as
well as of government-owned or controlled corporations, who are employed or utilized as licensed security personnel as
herein defined, shall not pay the fees nor file the prescribed bonds.

SECTION 3. Payment System. All payments of fees relative to the licensing of private security/training/detective agencies,
company guard forces, and private security/training personnel shall be made by the respective applicant or his duly
authorized representative following an approved revenue and collection system in the PNP.

SECTION 4. Changes. Any adjustments, modifications and/or additions to the fees provided in section 1 above may be
initiated through the SAGSD or CSG, and approved for adoption following current laws on revenue and collection of fees.

RULE VII
USE OF FIREARMS

SECTION 1. Possession of Firearms by Private Security Agency /Private Detective Agency/ Company Security Force/
Government Security Unit. – Private Security Agency /Private Detective Agency/ Company Security Force/ Government
Security Unit shall be entitled to possess firearms after satisfactorily complying with the requirements prescribed by the
Chief, Philippine National Police pertinent to the possession of firearms, provided that the number of firearms shall not
exceed one (1) firearm for every two (2) security guard in its employ. No private security agency/private detective
agency/company security force/government security unit shall be allowed to possess firearms in excess of 500 units.

SECTION 2. Restriction to possess high-powered firearms. – A private detective agency/private security agency/
company security services/ government security unit is not allowed to possess high caliber firearms considered as
military-type weapons such as M16, M14, cal .30 carbine, M1 Garand, and other rifles and special weapons with bores
bigger than cal .22, to include pistols and revolvers with bores bigger than cal .38 such as cal .40, cal .41, cal .44, cal .45,
cal .50, except cal .22 centerfire magnum and cal .357 and other pistols with bores smaller than cal .38 but with firing
characteristics of full automatic burst and three-round burst. However, when such entities are operating in areas where
there is an upsurge of lawlessness and criminality as determined by the Chief, PNP, Police Regional Office Regional
Director or their authorized representative, they may be allowed to acquire, possess and use high-powered firearms under
the following conditions:
a. The acquisition of the high-powered firearms shall be at the expense of the private security agency/private
detective agency/company security force/government security unit concerned;
b. The firearms should first be registered with the Firearms and Explosives Division before issuance and shall not be
used or transferred in places other than those specially authorized by the Director, CSG;
c. The total number of high-powered firearms that an agency or security force/unit is authorized to possess shall not
exceed ten percent (10%) of the total number of security guards of watchmen in its employ; and
d. The duly licensed security guards or watchmen who will use the firearm shall first be given adequate training in
the care and use thereof and will be under the supervision of qualified officers and men of the Philippine National
Police.

SECTION 3. Limitations in the carrying of firearms.


a. Unless specified and/or exempted pursuant to provisions of these rules and regulations and/or firearms laws, no
firearm shall be borne nor be in the possession of any private security personnel except when in the actual
performance of duty, in the prescribed uniform, in the place and time so specified in the DDO.
b. The firearm issued to security personnel of private security agency/private detective agency/company security
services/government security unit shall be carried by the security personnel only within the compound of the
establishment where he is assigned to guard, except when the security personnel is escorting big amount of
money or valuables on conduction duties outside its jurisdiction or area of operation, upon prior coordination
with the nearest PNP units/stations, or when in hot pursuit of criminal offenders.

SECTION 4. Duty Detail Order (DDO) - Private security agency/private detective agency / company security services/
government guard unit detailing their security personnel on duty under the circumstances mentioned in the preceding
section or while escorting big amount of cash or valuable outside its jurisdiction or area of operation, shall issue an
appropriate duty detail order to the security personnel concerned using SAGSD Form No. 12-94 under the following
conditions:

a. DDOs for the purpose of transporting agency licensed firearms from agency vault/office to post and back for
posting, for routine rotation, replacement of firearms or for conduction service duties, shall be issued for not
more than a duration of twenty-four (24) hours;
b. DDOs for the purpose of post duties not requiring transport of firearms outside of the physical compound or
property of a client or client establishment/firm shall be issued for not more than a thirty (30) day duration;
c. Transport of firearm other than those covered in paragraph a and b, Section 4, Rule VII above, shall require the
appropriate transport permit issued by the Firearms and Explosives Division or Police Regional, Provincial or
City Office nearest the place of origin;
d. The issuance of DDOs for private detective personal protection service duties shall be prescribed in an SOP to
be issued by NHPNP in consideration of Rule XII of these rules and regulations; and
e. All DDOs shall indicate the following:
1. Name, address and telephone number of agency
2. Issue serial number and date of DDO
3. Complete name and designation of grantee
4. Purpose
5. Inclusive dates of detail
6. Firearms description and license number
7. Authorized uniform to be used
8. Other specific instructions/remarks
9. Signature and designation of issuing officer

SECTION 5. Justification for confiscation of firearms. No firearm issued to any security guard or private detective while in
the performance of his duties, shall be confiscated by any law enforcement agency, except by uniformed member of the
PNP when duly authorized by the proper authority and/or under any of the following circumstances, wherein an
appropriate receipt for the firearm shall be issued:
a. When the firearm is about to be used in the commission of a crime;
b. When the firearm is actually being used in the commission of crime;
c. When the firearm has just been used in the commission of a crime;
d. When the firearm being carried by the security guard is unlicensed or a firearm not authorized by law and
regulation for his use;
e. When the confiscation of the firearm is directed by the order of the court;
f. When the firearm is used or carried outside the property, compound or establishment serviced by the
agency without proper authority; or
g. When a security guard does not possess any license to exercise his profession.
In all the above cases, the confiscating officer shall inform immediately the agency concerned.

SECTION 6. Disposition of confiscated firearms. Any law enforcement officer authorized by law effecting the confiscation
of firearm under any of the circumstances mentioned in the preceding section shall inform the Chief, Philippine National
Police thru the CSG within twenty-four (24) hours after such confiscation. The firearm shall be turned over immediately to
the nearest Philippine National Police unit/station which shall be responsible for the conveyance of same to the FED,
CSG, except when charges have been filed against the suspect, in which case, the firearm shall be turned over to the
concerned court.

SECTION 7. Filing of application for firearms license. Application for licensing of firearms by any private security agency,
private detective agency, or company security force, shall be filed with the Firearms and Explosives Division through the
SAGSD and Police Regional Offices for other Regions outside NCR in accordance with the usual procedure prescribed by
the firearms laws and implementing executive orders and regulations. In addition, the following shall be submitted:
a. License to Operate a private security agency, private detective agency or company security force duly approved
by the Chief, Philippine National Police;
b. Certification that such agency has provided a safety vault as prescribed by the Chief of the Firearms and
Explosives Division;
c. Required surety bond per firearm pursuant to Sec. 887 of the Revised Administrative Code;
d. Sworn Statement of the manager or operator of the agency that its security personnel shall be required by the
management to undertake the following in case of impending or actual strike:
1. To report to the Chief, Philippine National Police or to the nearest police agency such impending strike;
2. To exercise necessary diligence in the collection and safekeeping of firearms of the agency to include
firearm safely vaults provided thereof to prevent the use of the firearm thereon in the furtherance of the
strike;
3. To insure that all firearms and ammunition in the possession of all striking security personnel of the agency are
immediately collected and secured in the safety vaults under control of the agency; and
4. To assume responsibility in the proper handling of firearms in order to prevent misuse of same or that no non-members
shall be allowed to hold said firearms issued or licensed in favor of the agency.

SECTION 8. Revocation of license. License to possess firearm may be revoked under any of the following instances:
a. Failure to submit any issued firearm for verification as required.
b. Carrying of firearms by security personnel without appropriate Duty Detail Order (DDO).
c. When the firearm serial number has been duplicated on another firearm or using one firearms license for more
than one firearm other than those stipulated in the license.
d. Carrying of firearms outside of the place stated in the permit or in places prohibited under the law; or
e. Conviction of the operator or manager of the agency of any crime.
f. When the firearm was reported lost.

SECTION 9. Illegal possession of firearms. No person employed as security guard or private detective shall use
unlicensed firearms in the performance of his duties, nor be allowed to use firearms with duplicated serial numbers.
Unless otherwise approved by the CPNP, only firearms licensed in the name of the PSA/PDA/CGF/GGU concerned shall
be used.

SECTION 10. Stocking of ammunition. Stocks of ammunition in the agency shall be authorized on a limited and
reasonable quantity that will suit the requirement and need of such agency and shall be subjected to inspection from time
to time by representatives of the Chief, Philippine National Police, and unless otherwise provided for under existing laws,
shall not exceed a basic load of fifty (50) rounds of ammunition per unit of duly licensed firearms. Individual issue to each
security guard shall be limited to one half of such basic load or twenty five (25) rounds for every security guard.

SECTION 11. Instructional Firearms. Accredited Private Security Training Schools/Centers after conformity with licensing
requirements, may be licensed firearms for instructional, training or classroom purposes, in a number and type as
prescribed under existing firearms laws, rules or regulations.

RULE VIII
UNIFORM, EQUIPMENT AND PARAPHERNALIA

PART 1
Uniform And Paraphernalia
SECTION 1. Uniform (male). The uniform of private security guard/either from the private security agency/company
security force/ government security unit shall consist of headgear, service shirt, service trousers service belt and footwear
as herein prescribed.
The uniform shall be made of fast navy blue thick fabric for the trouser for daily security officers wear and for
service shirts of field or perimeter guards while a choice of light blue and/or white service shirts for internal guards for a
private security agency; light gray for company security force and white for government security unit.

a. Headgear
Pershing cap - Fast navy blue cap with gold strap, black visor, octagonal nylon net top and prescribed
SAGSD metal cap device. It shall be the headgear for daily wear by security guards. It may be used by the
security guard for ceremonial purposes with the black strap. (See illustration, Fig.1).
b. Service Bush jacket - Service jacket shall be worn only by the Directorial and Staff Officers of agency, color of
trousers and shirt shall conform with the color prescribed in Section 1 in the above rule.
(1) Private Security Agency. - Trousers and shirt short sleeves with shoulder straps, two each breast and
front pockets with cover flaps and fixed cloth belt fastened by brass metal buckle. (See illustration, Fig.
2).
(2) Company Security Force. - It shall be sewn in the same manner as in Para. b, Section 1, this rule.
(3) Government Security Unit. - It shall be sewn in the same manner as prescribed in para. b (1) section 1 of
this rule.
c. Service Shirt for Security Officer
(1) Service uniform. –
(a) Private Security Guard - Fast navy blue, short sleeves, shoulder straps, two breast pockets with
cover flaps and navy blue front buttons, tucked in (Fig. 3)
(b) Company Security Force. - It shall be sewn in the same manner as prescribed for private security
agency except that the color is light gray and the fabric for shirt.
(c) Government Security Unit. - It shall be sewn in the same manner as prescribed for private security
agency except that the color is white and the shirt shall be fabric “white”.
(2) Field Uniform. - (Optional for cold weather areas only);
(a) Private Security Agency. - Fast navy blue, long sleeves with buttoned cuffs, shoulder straps, two
breast pockets with cover flaps, navy blue front buttons and shirt-jacket style with overlap waist strap.
Detachable hoods shall be adopted for cold weather area use. (Fig. 4)
(b) Company Security Force. - It shall be sewn in the same manner as prescribed for private security
agency except that the color is light gray and the fabric materials for the shirt.
(c) Government Security Unit. - It shall be sewn in the same manner as prescribed for private security
agency except that the color is white and the shirting materials shall be fabric. (Note: A single strand
yellow lanyard may be used to secure sidearm to the shoulder).
(3) Gala Uniform. - It shall be worn for ceremonial purposes only and at the expense of the establishment
conducting the ceremonies.
(a) Pershing cap. - This shall be same specifications and distinctions as provided for under Sec. 1a of
this Rule.
(b) Blouse. - The material shall be of fabric with colors as prescribed for private/company/government
security officers. It shall be tailored as an open coat, long sleeves with a center flap at the back of the
unsewed part of which shall be the same level with the waistline. It shall have shoulder straps as the
service Bush Jacket,. Security guard officers shall wear shoulder boards with the authorized rank
design. (Fig.5).
(c) Buttons. - There shall be four (4) big brass buttons to close dress and four (4) small buttons for the
pockets. The buttons shall be plain brass.
(d) Shirt. - The shirt shall be white long sleeves.
(e) Necktie. - It shall conform to the color of the blouse five (5) centimeters wide.
(f) Trousers. - It shall be of the same design, style and materials as the service trousers.
(4) Service Trouser. - Fast Navy blue color, straight cut, slanted pockets and two back pockets without over
flaps.
(5) Service Belt. – Of leather material which shall be used as pistol belt measuring four and a half (4-1/2
centimeters in with.
(6) Footwear. –
(a) Service shoes. - Black leather shoes with rubber heels and soles, plain top low-cut and black
shoelace to be worn with plain black socks. (Fig 6).
(b) Rubber rain boots. - Optional as the nature of the post requires. (Fig.7)

SECTION 2. Uniform (Female). - The uniform of the lady security guard shall be made of a thick fabric. It shall consist of a
modified overseas cap two (2) ply similar to the women police service, service skirts (palda) and blouse, service belt and
black leather shoes as herein described and/or illustrated.
B. Headgear. - Fast navy blue (2 ply) cap without piping but with regulation cap device. (Figure 8)
a. Service shirt –
(1) Private Security Agency. - Fast navy blue, light blue or white, thick fabric, short sleeves, shoulder straps,
two breast pockets with cover flaps and navy blue front buttons, tucked in. (See illustration, Fig.9).
(2) Company Security Force. - It shall be sewn in the same manner as prescribed for private security agency
except that the shirting materials shall be fabric “Light Gray” in color.
(3) Government Security Unit. - It shall be sewn in the same manner as the private/company agency except
that the shirting materials shall be white fabric.
b. Service trousers. - Fast navy blue thick fabric trousers, straight cut with slanted side pocket and two back
pockets without cover flaps. It may be worn during night duty/inclement weather. (Fig.10)
c. Service skirt. - (Optional) Navy blue A-line skirt with two front slide pockets. It may be worn when posted
indoors.
d. Service belt. - Of leather material which shall be used as pistol belt measuring four and one half (4-1/2
centimeters in width. (Fig. 11)
e. Footwear. -
(1) Service shoes - Plain black shoes, low-cut rubber soles and heel (maximum of five cms.) and black shoes
laces.(Fig. 12)
(2) Rubber rain boots black - Optional as the nature of post so requires.

SECTION 3. Ornaments and patches. -


a. National badge. - as approved by C, PNP (As illustrated in Fig. 13)
b. Cap device. - The brass cap device as approved by the Chief of Philippine National Police shall be attached on
the Pershing cap of officers (Figure 14)
c. Regulation Buckle - as approved by C, PNP without agency name (as illus. in Fig.15)
d. Collar device - (as illustrated in Figure 16)
e. Name cloth - shall consist of embroidered navy blue black-lettered surname and initials of first and middle names
on yellow background with blue borderline, his names on yellow background with blue borderline, his name shall
be preceded by the word: Security Guard” or “SG”. The letter shall be one and one half (1-1/2) centimeters in
height and the name cloth shall be sewn on the right top pocket (as illustrated in Fig. 17).
f. Agency/unit name cloth. - A similarly embroidered agency/unit cloth shall be sewn on the top of the left breast
pocket, navy blue block-lettered on yellow background. (As illustrated in Fig. 18).
g. Equipment and paraphernalia. –
(1) Security Director/Inspector
(a) Leather pistol belt with regulation buckle; and
(b) Holster, black leather.
(2) Security Guard (male or female):
(a) Black leather belt for pistol and nightstick with regulation buckle (as illus. in Fig. 19);
(b) Holster, black leather for pistol, night stick and handheld radio;
(c) Nightstick (Baton) with horizontal handle (Fig. 20).
(d) Whistle with lanyard (Fig. 21);
(e) Pocket notebook with writing pen.

SECTION 4. Design and Use of White Uniform. – A special set of security personnel uniform shall be prescribed for
security personnel posted at hotels, resorts, cultural and entertainment areas and other sites noted as tourist-heavy areas.
A special set of security personnel uniform shall be prescribed for security personnel posted at department stores noted
as tourist-heavy areas, banks and other foreign clientele.
a. Uniform (male)- The special set of uniform for security agencies officer/guard and lady guard shall consist of
pershing cap, ball cap, service bush, jacket, service shirt, service trousers, service belt, necktie, lanyard and
footwear.
(1) Pershing cap – same as defined in Section 1 a (2), Rule VI. It shall be fast navy blue with gold strap, black
visor, octagonal nylon net top and prescribed metal cap device. It shall be worn by security agency officers
and guards while wearing a complete special type of uniform. (See illustration in Fig.1).
(2) Service Bush Jacket - It shall be white ramie polyester fabric and shall be sewn short sleeves with shoulder
straps, two each breast and front pockets with cover flaps and fixed cloth belt fastened with metal buckle. It
shall be worn by security agency officer while on duty at indoor places with complete prescribed
paraphernalia and agency/client patches. (Fig.2)
(3) Service Shirt - It shall be white cotton/cotton polyester fabric and shall be sewn short sleeves as the case
maybe, shoulder straps, two breast pockets with cover flaps and white front buttons. It shall be worn by
security guards while on duty as designated indoor places with complete prescribed paraphernalia and
agency/client patches. Tuck-in. (Fig. 3)
(4) Service Trousers - Fast navy blue color, straight cut, slanted pockets and two back pockets with cover flaps.
It shall be worn by security agency officer and security guards. (Fig. 2)
(5) Service Belt - It shall be black in color, leather, to be used as pistol belt measuring four and one-half
centimeters in width. (Fig. 5) It shall be worn by both security officers and security guards while in complete
special type of uniform.
(6) Necktie - Plain fast navy blue and five centimeters wide. It shall be worn by security guards while in complete
special type of uniform. (Fig. 23)
(7) Lanyard - Navy blue in color, same style as used by AFP or PNP Personnel. It shall be worn by security
agency officers and security guards while in complete special type of uniform. (Fig. 21)
(8) Footwear - Black leather shoes with rubber heels and soles, plain top low-cut and black shoelace to be worn
with plain black socks. (Fig.6)
(9) Ball cap - It shall be fast navy blue round nylon net top with visor and prescribed embroidered cloth cap
device. It shall be optional in lieu of the pershing cap. (See Fig. 24)
b. Uniform (Female) - The uniform for a lady security guard shall consist of an oversea cap two (2) ply service bush
jacket, service belt, lanyard and black leather shoes.
(1) Bush cap - Fast navy blue (2 ply) without piping but with regulation cap device. (Fig. 25)
(2) Service Bush Jacket - It shall be white in color and shall be sewn in same style as that of security agency
officer. It shall be worn by security lady officer with complete prescribed paraphernalia, name cloths and
agency/ client patches. (Fig. 10.)
(3) Service Shirt - White ramie polyester fabric and shall be sewn short sleeves or long sleeves as the case
maybe, shoulder straps, two breast pockets with cover flaps and navy blue front buttons. It shall be worn by
private security lady guard with complete prescribed paraphernalia, name cloth agency/client patches, service
belt, lanyard. Tuck in. This type of uniform shall be worn only at indoor places (Fig.9).
(4) Service Belt - (See illustration in Fig.19)
(5) Lanyard - (See Fig. 21)
(6) Service Skirt - A line skirt with two front slide pockets,. It shall be worn when posted indoors (Fig.11).
(7) Footwear - Plain black leather shoes, low-cut rubber sole and heel (maximum of five cm) and black
shoelaces. (Fig. 12)
c. Paraphernalia - As prescribed under Sec.3 Rule VI, IRR, RA 5487, as amended. (See illustrations in Fig.13,
14,15,16,17).

SECTION 5. The special set of uniform in Section 4 above shall be prescribed/ authorized to be issued only on a case to
case basis at the areas as herein authorized upon prior request of the clients concerned; provided that the request is
predetermined on the need of the workplace for the use of the special set of uniform and NOT on the individual desire of
the agency or client.

SECTION 6. Provision for uniform. – All employers/owners/ operators of private security agency/company security force
shall provide at least one (1) set of the prescribed uniform free of charge to their respective security guard for every year
of service with them. Likewise, all licensed security guard shall provide themselves with one (1) set of the prescribed
uniform once a year unless their employers provide it for free.

SECTION 7. Manufacture/tailoring. - The heads/operators of the Private Security Agencies. Company Security Force and
Government Security Unit shall be responsible for the manufacture and/or tailoring of the prescribed uniform for their
respective security guard.

PART 2
BASIC EQUIPMENT
SECTION 8. Basic Equipment.
a. The following shall comprise of the Basic Equipment of a security guard which shall be made mandatory and ready
for his/her use while performing post, conduction, armored service duties and the like:
1. Prescribed Basic Uniform
2. Nightstick/baton
3. Whistle
4. Timepiece (synchronized)
5. Writing pen
6. Notebook and duty checklist (electronic or not)
7. Flashlight
8. First Aid Kit
9. Service Firearms (as required)
b. The security agency shall have the responsibility of ensuring the availability and issuance of the basic equipment to
its posted guards.
c. Security Guards shall be responsible for inspecting operability of basic equipment issued to him, and be
responsible for keeping himself acquainted with the proper use of these.
SECTION 9. Other Equipment.
a. Apart from the mandatory basic equipment, other equipment may be issued to the security guard as determined
necessary following client contract requirement, provided that the security guard shall have acquired the prior
training/knowledge on the proper use of the same but not limited to the following:
1. Handcuffs
2. Metal detectors
3. Communications Radio
4. Stun devices
5. Armor vests
6. canine (k-9) units
b. Electronic and/or communication devices requiring registration under the jurisdiction of other government
agencies shall be complied with prior to issuance for use of the security guard.
c. Live units such as canine (dogs), shall require prior training confirmation and registration with the PNP before
utilization by any security agency purposely to ensure truthful deployment versus client requirement or purpose of
operation.

PART 3
UNIFORM AND EQUIPMENT BOARD

SECTION 10. Modifications, Additions and Exemptions. Any changes or additions to the above described uniforms,
paraphernalia and equipment, and/or exemptions to the prescribed uniforms, equipment and/or paraphernalia may be
made through or through the initiation of SAGSD-CSG for the approval of a Private Security Personnel Uniform and
Equipment Board organized by the Chief, SAGSD.

SECTION 11. Composition and Representation. The Board shall at least be composed of representatives from the PNP,
PADPAO and/or concerned sector of the private security industry, Licensed Security Personnel Practitioners and if
needed representative client/clients of distinguished reputation.

SECTION 12. Effectivity and Transition. Changes or modifications of basic uniform, paraphernalia or equipment shall be
made effective only with ample transition to temper the cost of adoption. Provided that, approved exemptions for
alternatives to operative provisions may be made effective on the date of approval.

RULE IX
RANKS, POSITIONS, STAFFING PATTERN AND JOB DESCRIPTION

SECTION 1. Ranks and Position - The security agency operator/owner must observe the required major ranks and
positions in the organization of the agency.
a. Security Management Staff
1. Security Director (SD) – Agency Manager/Chief Security Officer.
2. Security Executive Director (SED) – Assistant Agency Manager /Assistant Chief Security Officer;
3. Security Staff Director (SSD) – Staff Director for Operation and Staff Director for Administration.
4. Security Staff Director for Training – Staff in-Charge for Training
b. Line Leadership Staff
1. Security Supervisor 3 – Detachment Commanders
2. Security Supervisor 2 – Chief Inspector
3. Security Supervisor 1 – Inspector
c. Security Guard
1. Security Guard 1 – Watchman/guard
2. Security Guard 2 – Shift in-charge
3. Security Guard 3 – Post in-charge
d. Security Consultant – (optional)

SECTION 2. Staffing Pattern. – Security agency owner/manager shall follow the required staffing pattern as follows:
a. The agency manager is automatically the Security Director who shall be responsible for the entire operation and
administration/management of the security agency. He shall be the authorized signatory to all Duty Detail Orders,
and all other documents and communications pertinent to the operation and management of a security agency.
He may delegate certain functions to a subordinate, provided the subordinate is qualified to discharge the given
function in accordance with law.
b. The Security Agency shall appoint a staff officer as Security Training Officer, who shall be responsible for the
training of the Agency’s security personnel in accordance with the requirements of RA 5487 and the IRR. The
Training Officer shall be licensed as a Security Officer and likewise accredited as such by the Training and
Education Branch, SAGSD.
c. The Staff Director for Operation is the staff assistant of the security manager for the efficient operation of the
agency. This position includes the responsibility to canvass clientele and the implementation of contract and
agreement. He is also responsible for the conduct of investigation and the conduct of training.
d. The Staff Director for Administration is the staff assistant of the agency manager for the effective and efficient
administration and management of the agency. He is responsible for the professionalization of the personal,
procurement/recruitment, confirming of awards, mobility and issuance of FA’s.
e. The Detachment Commander is the field or area commander of the agency. The Detachment shall consist of
several posts.
f. The Chief Inspector shall be responsible for inspecting the entire area covered by the detachment.
g. Security Inspector is responsible for the area assigned by the Chief Inspector of the Detachment Commander.
h. Post-in-Charge is responsible for the entire detailed security office within a certain establishment.
i. Shift in-Charge is responsible for the security officers who are scheduled in a certain shift for a particular period.
j. Security Guard is the one actually posted as watchman and or guard.

SECTION 3. License Requirement. No person shall be designated nor be allowed to fill-up the positions enumerated and
described in the preceding sections unless he is licensed security personnel as follows:
a. must at least be a licensed Private Security Officer to occupy Security Management Staff position as Security
Director, Security Executive Director, or Security Staff Director;
b. must at least be a licensed Private Security Training Officer to occupy Security Management Staff position as
Security Staff Director for Training; and
a. must at least be a licensed Private Security Guard with Supervisory Training to occupy any positions in the Line
Leadership Staff.

RULE X
PROFESSIONAL CONDUCT AND ETHICS

SECTION 1. Security Guard Creed, Code of Ethics, and Code of Conduct. - All members of the private security agency
and private detective agency/company security force/government security unit duly licensed in accordance with RA 5487,
as amended, and it’s implementing rules and regulations shall strictly observe the following:

A. SECURITY GUARDS CREED


As a security guard my fundamental duty is to protect lives and property and maintain order within my place of
duty; protect the interest of my employer and our clients and the security and stability of our government and country
without compromise and prejudice, honest in my action, words and thought; and do my best to uphold the principle:
MAKADIOS, MAKABAYAN, MAKATAO at MAKAKALIKASAN.

B. ETHICAL STANDARD
a. As a security guard/detective his fundamental duty is to serve the interest or mission of his agency in
compliance with the contract entered into with clients or customers of the agency he is supposed to serve;
b. He shall be honest in thoughts and deeds both in his personal and official actuations, obeying the laws of the
land and the regulations prescribed by his agency and those established by the company he is supposed to
protect;
c. He shall not reveal any confidential information confided to him as a security guard and such other matters
imposed upon him by law;
d. He shall act at all times with decorum and shall not permit personal feelings, prejudices and undue friendship
to influence his actuation while in the performance of his official functions;
e. He shall not compromise with criminals and other lawless elements to the prejudice of the customers or
clients and shall assist the government in its relentless drive against lawlessness and other forms of
criminality;
f. He shall carry out his assigned duties as required by law to the best of his ability and shall safeguard the life
and property of the establishment he is assigned to;
g. He shall wear his uniform, badge, patches and insignia properly as a symbol of public trust and confidence,
as an honest and trustworthy security guard and private detectives;
h. He shall keep his allegiance first to the government, then to the agency where he is employed and to the
establishment he is assigned to serve with loyalty and utmost dedication;
i. He shall diligently and progressively familiarize himself with the rules and regulations laid down by his agency
and those of the customers or clients;
j. He shall at all times be courteous, respectful and salute his superior officers, government officials and officials
of the establishment where he is assigned or the company he is supposed to serve;
k. He shall report for duty always in proper uniform and neat in his appearance; and
l. He shall learn at heart and strictly observe the laws and regulations governing the use of firearms.

C. CODE OF CONDUCT
a. He shall carry with him at all times during his tour of duty his license, identification card and duty detail order
with an authority to carry firearm;
b. He shall not use his license and other privileges if any, to the prejudice of the public, the client or customer
and his agency;
c. He shall not engage in any unnecessary conversation with anybody except in the discharge of his duties or sit
down unless required by the nature of his work and shall at all times keep himself alert during his tour of duty;
d. He shall refrain from reading newspapers, magazines, books, etc, while actually performing his duties;
e. He shall not drink any intoxicating liquor immediately before and during his tour of duty;
f. He shall know the location of the alarm box near his post and sound the alarm in case of fire or disorder.
g. He shall know how to operate any fire extinguisher at his post;
h. He shall know the location of the telephone and/or telephone number of the police precincts as well as the
telephone numbers of the fire stations in the locality;
i. He shall immediately notify the police in case of any sign of disorder, strike, riot or any serious violation of the
law;
j. He or his group of guards, shall not participate or integrate any disorder, strike, riot, or any serious violations
of the law;
k. He shall assist the police in the preservation and maintenance of peace and order and in the protection of life
and property having in mind that the nature of his responsibilities is similar to that of the latter.
l. He shall familiarize himself by heart with the Private Security Agency Law (RA 5487, as amended) and these
implementing rules and regulations;
m. When issued a Fas, he should not lend his FA s to anybody.
n. He shall always be in proper uniform and shall always carry with him his basic requirements, and equipment’s
such as writing notebook, ballpen, night stick (baton) and/or radio.
o. He shall endeavor at all times, to merit and be worthy of the trust and confidence of the agency he represents
and the client he serves.

SECTION 2. Rules of Engagement. For the matter of performance of duties by security personnel, rules of engagement
shall be formulated through an SOP to be issued by the
Director, CSG.

SECTION 3. Creed of Security Agency Proprietor, Code of Ethics and Code of Conduct for Private Security Force and
Government Security Agencies/Company Security Force and Government Security Unit. - All private security agencies,
company security service and government guard unit licensed to operate under RA 5487, as amended, and its
implementing rules and regulations, shall adhere to the following Code of Ethics and Code of Conduct:

A. SECURITY AGENCY OPERATOR’S CREED


As a security agency proprietor, my fundamental duty is to serve the interest of my clientele and my security
guard; protect the interest of the government; adhere professionally in the conduct of my business without prejudices and
compromises to human rights, and uphold constantly the law and abide by the rules and regulations set by the
government in the conduct of my business.

B. ETHICAL STANDARD
As a licensed private security agency /company security force, it shall be its prime concern to share with other
licensed agencies and company security forces, the burden of responsibility in upholding the integrity and trust of the
private security profession at all times. In discharging this responsibility its officials shall:
c. Endeavor to fulfill their professional duties in accordance with the highest moral principles, always conforming
to the precepts of truth, fairness and justice;
d. Contribute to the national welfare by securing and preserving industrial facilities of the country, through
competent guarding services;
e. Promote the well-being of security guard thru adequate wages and other emoluments;
f. With faith and diligence, perform their contractual obligations for the protection of life, limb and property;
g. Constantly endeavor to raise quality standards of private security services; and
h. Continuously work with and assist the law enforcement agencies in the preservation of peace and order in the
country.
C. CODE OF CONDUCT
a. They shall at all times adhere to professional ethics and refrain from practices that negate the best interest of
the private security service industry.
b. They shall always consider that unity in the profession is vital and paramount for the attainment of common
objectives;
c. They shall not use deceitful means and/or misrepresentations in all their business transactions. To this end,
they shall avoid granting of rebates, or commissions in securing guarding contracts;
d. They shall not indulge in cut-throat competition by undercutting the existing contract rates between the PSA
and the client and/or the minimum contract rate prescribed under the PADPAO Memorandum Agreement in
conformity with existing minimum wage laws.
e. They shall pay their guards in accordance with rates fixed by law. They shall not impose any unauthorized
deductions on the guards to seek employment elsewhere as they choose, subject to existing laws, nor accept
a guard without clearance from the losing agency;
f. When a prospective client with existing company security force calls/ bids for additional security guard, all
bidding security agencies shall observe the principle of “equal pay for equal work” considering the rate of pay
of the company security service and their own guards;
g. Anchored on the principle of securing property, of providing safety of persons and maintaining peace and
order within such property, when accepting contracts with clients having existing conflict of claims,
management, ownership or administration of properties and/or establishments, where there exist or
forthcoming another contracted/contracting agency, they should conduct themselves and their deployed
guards in a manner primarily not to be used against each other at the same time without compromising their
respective contracts;
h. They shall endeavor to raise the standard of service in the security profession thru incentive and in-service
training;
i. They shall establish an adequate library of books, magazines and other publications on security subject,
materials, references, etc. in each PSA.
j. They shall always be truthful and accurate in reports required by SAGSD and/or other competent authorities
and be prompt in the submission of the same;
k. They shall not, under any circumstances, employ for guard duty any person without a professional license as
a security guard duly issued by the Chief, PNP;
l. They shall at all times exercise vigilance and be prepared to prevent the use of their guards or the agency in
activities inimical to the state or national security. When activities of this nature come to their attention, they
shall as a matter of duty render an appropriate report to the PNP authorities.

SECTION 4. Sanction. – Any private security agency operator or guard who violates the creeds, ethical standards and
codes as set forth in the preceding sections, shall be subject to the penalties provided in these implementing rules and
regulations.

RULE XI
PRIVATE SECURITY TRAINING

PART 1
General Provisions
SECTION 1. Policy. The following provisions encompass all persons, natural or juridical, who conduct and/or provide
private security training and/or training services.

SECTION 2. Private Security Training. It shall refer to training and academic programs and courses duly approved or
prescribed by the Philippine National Police and adopted by the Technical Education and Skills Development Authority. It
includes the prelicensing requirements of individual security guards and other security personnel approved by RA 5487,
the periodic and non-periodic in-service skill refreshers for such security personnel, and other specialized, individual or
group, private security personnel skills development.

SECTION 3. Private Security Training Services. These shall refer to the conduct of Private Security Training, provision of
the physical facilities and installation necessary in the conduct thereof, and the provision of the appropriate management,
administrative, and instructor/training staffs therefore, the actual performance and/or exercise of which requires the
appropriate permit and/or authority as herein provided.

SECTION 4. Private Security Training Institutions. These shall refer to all persons, natural and/or juridical, who/that
provide and/or conduct private security training, and/or services.

SECTION 5. Categories of Private Security Training. The following are the general categories of Private Security Training:
a. Pre-Licensing Training Programs. As a matter of licensing prerequisite, Pre- Licensing Training Programs
include all training and/or academic programs and courses whose objective is to indoctrinate the individual with
the basic skills and educational backgrounds necessary in the effective exercise and performance of his/her
elected/ would-be security/detective profession. It includes but is not limited to the Basic Security Guard Course,
the Security Officers Training Course, Private Security Agency Operators Training/Seminar, Private Security
Training Trainors’ Course.
b. Refresher Training Programs. This shall refer to periodic and non-periodic training programs and courses
designed with the objective of reinvigorating and/or developing basic skills and knowledge gained previously or
gained while in the exercise of his/her profession as a matter of experience, to enhance current in-service and
future individual and/or collective exercise of profession. This includes mandated periodic inservice training to be
initiated by employer-security agencies which is further a prerequisite for the renewal of individual professional
security licenses. It includes but is not limited to the periodic Re- Training Course, Basic Security Supervisory
Course, and Security Supervisor Development Course.
c. Specialized Training Programs. This shall refer to training program and courses other than those described in
the preceding categories designed at developing previously-gained skills and knowledge, designed at
augmenting or expanding current skills and knowledge, and/or designed at developing current skills and
knowledge to suit identified future applications. It includes but is not limited to such courses as the
Intelligence/Investigator Training Course, Basic Crises Management Course, Personal/VIP Security Training
Course, Armoured Car Crew Training Course, Bomb Disposal Training Course, Bank Security Training Course,
and Basic Aviation Security Specialist Course.

SECTION 6. Categories of Private Security Training Institutions.


a) Private Security Training Systems. Government or duly registered private training establishments, associations,
firms, partnerships, corporations and the like, which provide the physical facilities and installations, and the
appropriate management, administrative, and instruction/training staff necessary and for the purpose of conducting
Private Security Training:
1) Private Security Training Centers – Private Security Training Systems whose primary purpose is to provide
private security training and training services, may be qualified to offer and conduct Private Security Training
Programs in all categories provided that, it has secured Regular Accreditation from the SAGSD upon
compliance and conformity with the latter’s application and approval requirements, and prior TESDA
registration/accreditation.
2) Other Juridical Entities - Private Security Training Systems whose primary purpose is not to provide private
security training and training services, may be qualified, on interim basis, to offer and conduct Private Security
Training for a specific course/class and duration under Refresher and Specialized programs only, provided
that, it has secured prior Interim Accreditation from the SAGSD upon compliance and conformity the latter’s
application and approval requirements. Such Interim Accreditation is also issued to those with Regular
Accreditation but which cannot comply with the renewal requirements.
3) Watchman/Security and/or Detective Agencies defined under RA 5487 as amended, which shall not be
required prior accreditation to operate, by virtue of their License to Operate as Private Security Agency,
Company Security Force or Government Security Force, may be authorized to conduct only in-house refresher
or specialized training for its own security personnel, upon compliance and conformity with application and
approval requirements of SAGSD.
4) Police Offices/Units assigned/designated to conduct Private Security Training, which shall not be required
TESDA registration but shall require prior official authority of SAGSD, may conduct training in all categories but
subject to requirements of Rule XI of these rules and regulations or as may be prescribed by SAGSD.
5) Police Supervisory Office (presently the SAGSD) as having the primary responsibility of the conduct,
supervision, and control of all private security training and training services.
b) Training Instructor. Any person who renders personal and/or professional trainor, instructor, and/or teacher
services relative to private security training by virtue of his profession, expertise, knowledge, and/or experience in
a particular field of knowledge. Training Instructor includes but is not limited to currently or retired licensed or
accredited private security training instructors, professional educators, and/or field/practicing experts.

SECTION 7. Validity and Duration of Accreditation.


a. Accreditation/recognition certificates issued except those under interim status, shall b valid for not more than two
(2) years unless sooner terminated, cancelled, or revoked.
b. Letter Authority (LA) shall be a one-time-use authority issued to security training systems, to conduct, open, offer
one (1) course/class, shall be valid for not more than six (6) months.
c. Interim accreditation shall be valid for nor more than six (6) months, unless sooner terminated, cancelled or
revoked, and may be renewed only thrice.
SECTION 8. Organization for Private Security Training. The following are the minimum staff/personnel requirements for
the conduct of a particular Private Security Training Program or Course conducted by Regular and Interim Accredited
Training Centers:

Administration Staff:
a. Center or School Superintendent/Director/Administrator.
b. Course/Training Director.

Training Staff:
a. Training Officer, Regular/Special Accreditation
b. Training Instructors, Regular/Special Accreditation
c. Guest Instructors. Persons other than accredited private security training instructors, who render personal or
professional instructor, trainor, or teacher services in a particular field of knowledge, subject, or training in a private
security training program/course as a resource because of his profession, expertise, education, and/or experience.

SECTION 9. Limitations and Prohibitions.


a. No private security training course or class shall be conducted without the appropriate Letter Authority (LA) to
conduct training issued by SAGSD;
b. The maximum number of students, trainees or participants for every class shall not exceed sixty (60);
c. All training courses/classes shall be conducted only in the place/venue approved;
d. Person(s)/applicant(s) likewise suffering from disqualifications enumerated in Section 4 of Rule I of these rule and
regulation above, shall not be allowed to participate in any private security training course/class;
e. Corollary to Section 9 (d) above, training institutions shall not accept for enrollment disqualified applicants for
training, and consequently shall be responsible for confirming the qualifications of all training applicants;
f. Responsibility for Training and Progressive Development of Personnel - It is the primary responsibility of all
operators of private security agencies and company security forces to maintain and upgrade the standards of
efficiency, discipline, performance and competence of their personnel. To attain this end, each duly licensed
private security agency and company security force shall establish a staff position for training and appoint a
training officer whose primary functions are to determine the training needs of the agency/guards in relation to the
needs of the client/market/industry, and to supervise and conduct appropriate training requirements. All private
security personnel shall be re-trained at least once every two years.
g. PSAs without a Training Officer - In the event that a private security agency and company security force shall fail to
hire a Training Officer, the Security Director assumes responsibility/ accountability for the training needs of the
Agency. In order that the training shall be conducted in accordance with the provisions of the IRR, subject security
agency shall undertake a Memorandum of Agreement with an accredited training school to undertake the functions
of the training officer as provided herein, shall be executed. Provided that the aforesaid agreement may be
canceled or suspended the moment the private security agency/company security force shall be able to hire a
competent training officer.
h. Accredited active members of the PNP/AFP or other government agencies shall exercise Private Security Training
profession only to the extent as officially allowed by their respective offices, after office hours or as authorized by
law.

PART 2
Conduct of Private Security Training

SECTION 10. Preparations before the Conduct of Training


a. A request for Letter Authority to Conduct Training shall be submitted to Chief, SAGSD with the following
attachments:
1. A photocopy of TESDA Recognition Certificate
2. Appointment of accredited Training Director
3. Photocopies of SAGSD accreditation of the teaching staff
4. Training Schedule
5. SSS Employment History Certificate of trainees/participants
6. Clearances (NP, Drug Test, PNP DI, Court & NBI)
7. Subsequently on the second request for LA, the SBR (Training Fee) of the previously conducted
course/class shall be attached.
b. All Region based applicants requests shall be endorsed by respective PNP Police Regional Office.

SECTION 11. Conduct of Training


a. The School Director/Guest shall formally open each class.
b. One (1) day after its opening, a report containing the following data (name of student, age, sex, height, status
educational attainment, agency, address and remarks) shall be submitted to Chief, SAGSD
c. Participants shall be graded thru written, oral and practical examinations.
d. Participants who accumulate absences exceeding twenty (20%) percent of the total number of training shall be
dropped.
e. School/Center policies shall be enforced at all times.
f. The School, Center or, PSA shall also ensure the maintenance of orderliness, presentability, discipline and
security of its training facilities and all persons therein.
g. A General Knowledge Examination (GKE) shall be administered by SAGSD (Private Security Training
Management Branch) one (1) day before the closing of each class provided a photocopy of the proof of payment
(SBR) for the ongoing class is submitted.
h. Any student who fails the GKE may be given three (3) chances to retake, after which if he fails, he shall repeat the
course.

SECTION 12. General Knowledge Examination


a. A General Knowledge Examination (GKE) shall be administered by the PNP and shall be given each graduate
after completion of each training course as a matter of evaluating the graduate’s assimilation of the course in
relation to his qualification for license to exercise private security profession. The GKE shall also be used among
others, to evaluate the quality of training of or transmission of the course by the accredited training systems.
b. For region-based Training Centers/Schools, FESAGS, ROPD will administer the GKE and submit. After GKE
Result to SAGSD five (5) days after the closing of each class for reference and disposition.

SECTION 13. After Training


a. Each course must be formally closed by the Training Director or by an invited Guest.
b. A Closing report in a prescribed format, shall be submitted five (5) days after graduation of each class to Chief,
SAGSD.
c. Upon completion of the course, the School shall furnish all students the following documents:
1. Declaration of Graduates
2. Order of Merit
3. Certificate of Completion (Diploma)
4. GKE Certificate
5. Opening Report/Closing Report (indicating therein name of student, age, height, weight, status, sex,
educational attainment, grade and remarks)
6. School Accreditation Number
7. Name of School, telephone number/address
8. Course title, Class Number, Letter Authority Number and Control Number and Inclusive dates of training.

SECTION 14. Processing of Students. Accredited Training Schools, Centers or PSAs shall have the responsibility of and
be accountable for the initial processing for the qualification and fitness of all applicants/registrants for enrollment to the
corresponding class/course being applied for with their respective schools, centers or PSAs.

SECTION 15. Duration of Courses. Duration of courses shall conform with the corresponding Program of Instructions
(POI) for each type of course/training/seminar, prescribed by the PNP and adopted by the TESDA.

SECTION 16. Basic Guarding Subjects. The following shall at least be the basic knowledge and/or subject requirements
on guarding or providing security that private security personnel trainees should be imparted with:
a. Principles, definitions, aspects and risks of guarding and security
b. General Orders and Functions of a Guard
c. Patrolling, observation and description, recording and reporting, investigation
d. Visitor, material and vehicle movement/access control/denial
e. Inspection and key control procedures
f. Public relations, regulation/law enforcement and arrests
g. Communications and other equipment
h. Reaction to emergencies (bomb threat, disaster, fire, injury or sickness etc)

SECTION 17. Fees and Charges


a. Consistent with laws existing during this formulation, the Chief of Philippine National Police or his authorized
representative shall impose the following fees and charges relative to private security training:
1) Pre-Licensing Training Programs
a. Basic Scty Guard Training Course P 200.00/participant
b. Security Officer Training Course P 300.00/participant
c. Private Scty Trng Trainor’s Course P 300.00/participant
d. Private Detective Training P 300.00/participant
e. Refresher Training Programs SG In-Service Training P 100.00/participant
f. Other refresher/re-training courses P 50.00/participant
2) Specialized Training Courses (all) P 100.00/participant

b. The same schedule of fees will also be charged from individual walk-in applicants who will avail of the private
security training programs.
c. Serialized certificates of completion/participation shall be given to each participant which issuance shall be
managed by SAGSD.
d. The following shall be collected as permit fees from among the Private Security Training Institutions which are
conducting Private Security Training, for every Letter of Authority / Training Directive for:
a. Pre-licensing Training P 100.00
b. Refresher Training P 100.00
c. Any Specialized Training P 100.00
e. The following shall be collected as accreditation fees from among the approved applicants for:
a. Accreditation of Training Systems P 2,500.00/yr
b. Accreditation of Training Personnel:
c. Training Consultant P 150.00/yr
d. Training Officer P 150.00/yr
e. Training Instructor P 150.00/yr
f. The fees collected shall accrue to the PNP in accordance with the provisions of Rule VI hereof Rules and
Regulations.

PART 3
Accreditation and Processing

SECTION 18. Private Security Training Related Processing. All processing, standards and documentary requirements
relative to the conduct of private security training shall be prescribed in a Standard Operating Procedure (SOP) to be
issued by SAGSD.

SECTION 19. Accreditation of Training Schools or Centers


a. Pre-inspection
1. A joint Inspection Team composed of two (2) Technical Experts each from PNP SAGSD and TESDA shall be
designated as inspectors to check the following:
a. Physical appearance of the school/center
b. Training aids & materials/references/books
c. Training staffs (SAGSD accreditation)
d. Program of Instructions
e. Training Facilities (drills & ceremonies, Unarmed defense)
f. MOA with Firing Range Owner
2. A Letter Order duly signed by the Chief, SAGSD will be the authority in the conduct of inspection indicating
therein as specified in the Inspection Checklist (Name of Training School, venue, date of inspection, name of
Inspectors, courses offered, list of mandatory requirements, additional findings, recommendations/remarks
and acknowledgement receipt by the school staff/representative).
b. Conduct of Inspection
1. The Joint Inspection Team will introduce themselves to the School Director and/or Training Staff.
2. If defects are noted, it shall be properly indicated on the Inspection Checklist and shall be acknowledged by
the school representative present during the inspection, after which a re-inspection shall be recommended by
the inspectors.
3. If the defects were complied during the re-inspection, it shall be properly documented (pictorials to be
attached).
c. Post Inspection
1. The results of inspection shall be the basis for the granting of Recognition Certificate issued by TESDA.
2. The Certificate of TESDA Recognition shall be submitted with the application for Accreditation to Chief,
SAGSD with the following attachments:
(a) Corporate & Administrative Documents
(b) Board Resolution to offer the Program
(c) SEC Registration & Articles of Incorporation
(d) Proof of building ownership or Lease Contract at least 5 yrs
(e) Fire Safety Certificate
(f) Curricular Requirements
(g) Curriculum (including job titles & competencies developed)
(h) Course and subjects description
(i) List of Supplies, tools and equipment for the Program
(j) List of instructional materials (books, videotapes, internet access, unarmed defense equipment, others)
(k) Training Schedules
(l) Faculty and Personnel (with resume/biodata)
(m) List of Officials & their Qualifications
(n) List of Faculty for the Program & their Qualifications
(o) Academic Rules and Student-Instructor Conduct
(p) Schedule of Tuition & other Fees
(q) Grading System
(r) Entrance Requirements
(s) Rules on Attendance
(t) Other Support Services
(u) Health Services
(v) Career Guidance/Placement Services
(w) Community Outreach Program
d. Issuance of Accreditation.
1. The Chief, SAGSD shall have the authority to approve, disapprove, cancel or suspend accreditations of
private security training schools/centers.
2. Approved applications for accreditations shall be issued the corresponding Certificates of Accreditation
following a design and format prescribed in a circular by Chief, SAGSD.

SECTION 20. Accreditation of Training Personnel


a. Qualifications of the Teaching Staff:
1. Training Director
(a) Holder of Masteral Degree, Board /Bar Passers
(b) Must have at least five (5) years experience in the operation and management of a security business
(c) Must have no criminal record
(d) Must be physically and mentally fit
2. Training Officer
(a) Baccalaureate Degree holder (4 years)
(b) Must have taken/passed the Private Security Trainor’s Course
(c) Must have served at least five (5) years in the security industry
(d) Must have no criminal record
(e) Must be physically and mentally fit
3. Training Instructor
(a) A graduate of a Baccalaureate Degree Course (preferably BSEEd)
(b) Must have taken the Private Security Trainor’s Course sponsored by CSG/SAGSD/PARSTS
(c) Must have served the security industry for at least three (3) years
(d) Must be physically and mentally fit
(e) Must have no criminal record
b. Requirements for Accreditation of the Teaching Staff. The following shall be the supporting documents
accompanying the application for accreditation:
1. Training Director
(a) Basic letter request addressed to Chief, SAGSD (Attn: C, PSTM Branch)
(b) Transcript of Records
(c) College Diploma and/or Post Grad Studies)
(d) Certification from Private Security Training School/Agency that he has five (5) years experience in the
security industry
(e) Documentary Clearances (NP & Drug Test, Barangay, Mayor, Court, PNP DI & NBI)
(f) Latest updated Resume with 2X2 ID picture (colored)
2. Training Officer
(a) Basic letter request addressed to Chief, SAGSD (Attn: C, PSTM Branch)
(b) Transcript of Records
(c) College Diploma
(d) Must have actual experience in Security Management or government service for at least five (5) years
continuous service
(e) Certificate of Security Trainor’s Course
(f) Documentary Clearances (NP, Drug Test, Barangay, Mayor, PNP DI, Court & NBI)
(g) Latest updated Resume with 2X2 ID picture (colored)
(h) Certification from Private Security Training School/Center/ and/or Agency that he has five (5) years
experience in the security industry
3. Training Instructor
(a) Basic letter request addressed to Chief, SAGSD (Attn: C, PSTM Branch) indicating the subject of
expertise
(b) Transcript of Records
(c) College Diploma
(d) Certificate of Private Security Trainor’s Course
(e) Documentary Clearances (NP, Drug Test, Barangay, Mayor, PNP DI, Court & NBI)
(f) Certification from Private Security Training School/Center and/or Agency that he has served five (5) years
in the security industry.
c. All applicants from the Region must be properly endorsed by the C, ROPD.
d. Issuance of Accreditation.
a. The Chief, SAGSD shall have the authority to approve, disapprove, cancel or suspend accreditations of
private security training personnel.
b. Approved applications for accreditations shall be issued the corresponding Certificates of Accreditation
following a design and format prescribed in a circular by Chief, SAGSD.

PART 4
Private Security Training Board

SECTION 21. Private Security Training Board. The Chief, SAGSD upon determination of need, may organize a Private
Security Training Board with at least one (1) representation from the PADPAO, Philippine Association of Recognized
Security Training Schools (PARSTS) and TESDA for the following purposes relative to private security training:
a. Conduct of random training visitation
b. Prescribe accreditation processing procedures, standards and requirements
c. Prescribe course POIs and subjects
d. Prescribe training procedures, guides and regulations
e. Prescribe exemptions and waivers
f. Prescribe course equivalents
g. Others as may be directed by Chief, SAGSD

RULE XII
UTILIZATION OF PRIVATE SECURITY AGENCIES
AND PERSONNEL

PART 1
SECTION 1. Powers of city municipal mayors in case of emergency - In case of emergency or in times of disaster or
calamity when the services of any security agency/entity and its personnel are needed, the city or municipal mayor may
muster or incorporate the members of the agency or agencies nearest the area of such disaster or calamity to help in the
maintenance of peace and order, prevention of crime, or apprehension of violators of laws or ordinance, and in the
protection of lives and properties. The deputized security guard shall receive direct orders from the Chief of Police of the
city or municipality for the duration of the emergency, disaster or calamity.

SECTION 2. Supervision of the PNP. The PNP shall exercise general supervision over the operators of all security
agencies and guards. In case of emergency or in times of disaster or calamities, the Chief, PNP may deputize any
security guard to assist the PNP in the performance of police duties for the duration of such emergency, disaster or
calamity. Licensed guards, who are actually assigned to clients with Duty Detail Orders (DDO), shall be deputized by the
Chief, PNP, and clothed with authority to enforce laws, rules and regulations within his area of responsibility.

PART 2

SECTION 3. Security Guard Post Service. Private security guards shall perform personal service to watch or secure
private or public establishments or property, maintain peace and order and protect lives of persons through any form of
access control/denial, sentry operation, patrolling, establishing reaction teams and the like provided that:
a. No Private Security Guard performing post service shall act or serve as bodyguard or personal security escort of
any person;
b. The private security guard shall always be in the uniform prescribed for guards on post, specially when bearing
firearms;
c. The services rendered are confined to the premises and/or property being secured;
d. Private Security Guards performing as security aides, or back-up/support of guards performing Post Service, or
performing electronic monitor/security system operation shall not bear firearms and may not be required to use
the prescribed uniforms of guards on post.
SECTION 4. Security Guard Conduction Service. Private security guards shall perform personal service to watch or
secure movable private or public property in transit like but not limited to seafaring/ocean vessels, aircrafts, land-locked
vehicles, or valuables/cash in transit using any means of transportation except armored vehicles, provided that:
a. No Private Security Guard performing conduction service shall act or serve as bodyguard or personal security
escort of any person;
b. The private security guard must always be in uniform prescribed for guards on post service, specially when
bearing firearms.

SECTION 5. Armored Vehicle/Guard Service. Private security guards shall perform security escort service for the
protection of large amount of cash or valuables through the operation of armored vehicles, usually for deposit pick-up or
delivery, provided that:
a. No Private Security Guard performing armored service shall act or serve as bodyguard or personal security
escort of any person;
b. The private security guard must always be in uniform prescribed for guards on armored service, specially when
bearing firearms;
c. Over and above the registration required of vehicles and operation of such under existing transportation laws, all
armored vehicles in the fleet of PSA/CGF armored service providers shall be inventoried/reported with the PNP;
d. All security personnel performing armored vehicle operation shall have a specified training and qualification
requirement over and above the basic requirements for security guards;
e. Unless inconsistent with other laws or circulars, the minimum built requirement for armored vehicles shall be of
bullet-resistant materials capable of withstanding the effects of high-powered firearms, provided with a vault, safe
or partition wall with combination lock designed in such a way that access to valuables/cash deposit into it is
denied while in transit;
f. The minimum crew shall be composed of a vehicle operator preferably licensed security guard and two (2)
security personnel;
g. Private Security Armored Services providers to the banking and other financial system shall conform with the
requirements of the Banko Sentral ng Pilipinas (BSP);
h. The standards, requirements, organization, operation and training for private security armored services shall be
provided in an SOP issued by the Director, CSG.

SECTION 6. Investigation and Detective Services. Inherent to the provision of security services, all PSAs, CGFs, GGUs,
and PDAs may offer private investigative and detective services for the purpose of assisting in gathering information
leading to determination and/or prevention of criminal acts and/or resolution of legal, financial and personal
cases/problems, provided that:
a. Only licensed private detectives shall perform or render investigative and detective duties;
b. No PSA, CGF or, GGU shall provide or offer personal security protection service;
c. Only PDAs and licensed private detectives as qualified and trained, and explicitly/specifically authorized by the
PNP may render personal security protection services;
d. The standards, requirements, organization, operation and training for personal security protection services shall
be provided in an SOP/circular issued by the CPNP through the recommendation of the Director, CSG in
coordination with the PNP Directorate for Operations, Directorate for Intelligence and Police Security and
Protection Office.

SECTION 7. Electronic Security Systems and Services. Security Agencies in providing security services may utilize
scientifically designed electronic security systems like but not limited to the anti-burglary, robbery, or intrusion alarms,
closed circuit television recording and monitoring under the following conditions:
a. Only trained licensed private security guards may operate electronic security systems;
b. PSAs offering the system shall be accountable for the legitimate registration and licensing of these devices and
their operators with the appropriate government agency;

SECTION 8. Other services. Requirements, standards, organization, operation and training for services which are
covered by this Rule, Rule III (definition of terms) and elsewhere in these rules and regulations shall be prescribed in an
SOP issued by the Director, CSG.

RULE XIII
POWERS AND DUTIES

SECTION 1. Territorial power - A security guard shall watch and secure the property of the person, firm, or establishment
with whom he or his agency has a contract for security services. Such service shall not, however, extend beyond the
property or compound of said person, firm or establishment except when required by the latter in accordance with the
terms of their contract to escort, or in hot pursuit of criminal offenders.
SECTION 2. Arrest by security guard. - A security guard, or private detective is not a police officer and is not, therefore,
clothed with police authority. However, he may effect arrest under any of the following circumstances:
a. When, in his presence, the person to be arrested has committed, is actually committing, or is attempting to
commit an offence;
b. When an offense has just been committed and he has probable cause to believe based on personal knowledge of
facts and circumstances that the person to be arrested has committed it; and
c. When the person to be arrested is a prisoner who has escaped from a penal establishment or place where he is
serving final judgment or temporarily confined while his case is pending or has escaped while being transferred
from one confinement to another (Section 6, Rule 113, Rule of Court).

SECTION 3. Method of Arrest. - When making an arrest, the watchman, security guard or private detective shall inform
the person to be arrested of the intention to arrest him and cause of the arrest, unless the person to be arrested is then
engaged in the commission of an offense or after an escape, or flees, or forcibly resists before the person making the
arrest has opportunity so to inform him, or when the giving of such information will imperil the arrest. (Section 10,lbid).

SECTION 4. Duty of security guard making arrest. -Any security guard making arrest, shall immediately turn over the
person arrested to the nearest peace officer, police outpost or headquarters for custody and/or appropriate action, or he
may without necessary delay and within the time prescribed in Article 125 of the Revised Penal Code, as amended, take
the person arrested, to the proper Court of Law or judge for such action as they may deem proper to take. (Section 17,
bid).

SECTION 5. Search without warrant. - Any security guard may, incident to the arrest, search the person so arrested in the
presence of at least two (2) witnesses. He may also search employees of the person firm or establishment with which he
is or his agency has a contract of private detective, watchman or security services, when such search is required by the
very nature of the business of the person, firm or establishment.

SECTION 6. General Orders. - All security guards shall memorize and strictly keep by heart the following general orders:
a. To take charge of the post and all company properties in view and protect/ preserve the same with utmost
diligence;
b. To walk in an alert manner during my tour of duty and observing everything that takes place within sight or
hearing;
c. To report all violations of regulations and orders I am instructed to enforce;
d. To relay all calls from posts more distant from the security house where I am stationed;
e. To quit my post only when properly relieved;
f. To receive, obey and pass on to the relieving guard all orders from company officers or officials, supervisors, post
in charge or shift leaders;
g. To talk to one except in line of duty;
h. To sound or call the alarm in case of fire or disorder;
i. To call the superior officer in any case not covered by instructions;
j. To salute all company officials, superiors in the agency, ranking public officials and officers of Philippine National
Police; and
k. To be especially watchful at night and during the time of challenging, to challenge all persons on or near my post
and to allow no one to pass or loiter without proper authority.

SECTION 7. Duty to Assist Law Enforcers - Any security guard shall be duty bound to assist any peace officer in the
pursuit of his bounding duty, when requested, provided it is within the territorial jurisdiction of his (security officer) area of
duty.

RULE XIV
REPORTS AND RECORDS
SECTION 1. Reports. The following reports shall be submitted:
a. Guard/Firearm strength reports shall be rendered periodically in formats and procedures prescribed by the Chief,
Security Agencies and Guards Supervision Division (SAGSD)/ Chief, Firearms and Explosives Division (FED),
respectively, through the Regional Offices who shall conduct periodic inspections within their areas of
responsibility to verify the strength reports furnished their respective offices.
b. Crime incident reports.
c. Other reports required shall be prescribed in appropriate orders, circulars or memoranda.

SECTION 2. Records and Files of Agencies. - The following records and files shall be maintained by all private security
agency, company security force and government security unit of offices and shall be made available for inspection by the
Chief, Philippine
National Police or his authorized representatives:
a. Prescribed monthly reports;
b. Current service contracts in individual folders chronologically arranged (for private security agency only);
c. Alphabetically arranged individual folders of guards containing their personal bio-data using the latest SAGSD
Form 01-94, photocopies of licenses and other personal documents (i.e. High School diploma, Pre-licensing
certificate, etc.);
d. Individual records of offenses, SAGSD Form 13-94; Authenticated photo copy of record of offenses shall support
recommendations for revocation of licenses of undesirable incorrigible security guards;
e. Property book, containing lists of firearms and other properties supported by proper documentation;
f. Payroll/vouchers of payments;
g. Performance Report/records of conduct of security personnel; and,
h. Other records pertinent to the operation of the agency as maybe required.

RULE XV
INSPECTIONS

SECTION 1. Policy.
a. Periodic and non-periodic inspections shall be conducted on all Security Agencies (Private Security/Detective
Agency, Company Guard Force, Government Security Force), Security Training Schools (Private Security
Training Institutions) and Security and/or Training Personnel.
b. Inspections shall be conducted based on the following:
1) Pre-Licensing Inspection – Periodic inspections conducted to determine compliance with the provisions of
R.A. 5487 prior to the issuance of License to Operate (LTO) a Security Agency and/or Accreditation to
operate a Security Training School.
2) Post-Licensing Inspection – Periodic and/or non-periodic inspections conducted during the operation of
Security Agencies and/or Security Training Schools to ascertain whether the provisions of R.A. 5487 and its
IRR are complied with, to ensure correction of defects/violations noted, and to recommend to the operators
appropriate measures to improve their operations.

SECTION 2. Authority.
a. The Chief, SAGSD or his representative shall conduct the appropriate inspection hereto prescribed.
b. Regional Directors of Police Regional Offices (PNP PROs), thru the Firearms, Explosives, Security Agencies and
Guards Section (FESAGS), within jurisdiction, shall conduct the inspections
c. The Chief, PNP and/or the Director, PNP Civil Security Group (CSG) thru SAGSD, or their authorized
representatives, may authorize the conduct of inspections.

SECTION 3. Types of Inspections.


a. Post to Post Inspection – Inspection conducted on detailed/posted security guards to determine proper
compliance of regulations related to uniforms, general physical appearance, documentation and other
requirements in the actual service of duty. This may also be an inspection conducted as an aid to investigation.

b. Administrative Inspection (Office, Files and Records Inspection) – Inspection conducted to determine compliance
with records, files and other administrative requirements for operating a security agency and/or exercising security
profession.

SECTION 4. Procedures.
a. Organization for the Inspection
1) The inspection shall be composed of at least three (3) personnel organized as a team and led by a Police
Commissioned Officer.
2) The designation, functions and responsibilities of the inspecting team shall be organized as follows;
One (1) PCO – Team Leader
One (1) Senior PNCO – Asst Team Leader/inspector-recorder
One (1) PNCO – Driver/inspector-evidence custodian
3) Members of the inspection team shall be in complete uniform with proper identification and preferably using a
marked/uniformed vehicle for easy identification, except however during covert operation/inspection.
4) The inspection team shall be covered with the appropriate Letter Order with specified purpose, destination
and period of inspection, among others, duly signed by the following or their authorized representative:
a) Chief, PNP
b) Director, CSG
c) Regional Director, Police Regional Office
d) Chief, SAGSD
b. Conduct of Inspection
1) Administrative Inspection
a) The inspection team shall introduce themselves to the operator or to his representative available during
the inspection, state the purpose of the inspection and present the appropriate Letter Order (LO).
b) The inspection will be conducted by using the inspection checklist (PNP SAGSD form # 9 and/or PNP
SAGSD Training Inspection Checklist) as guide and may demand other pertinent documents related to
the purpose of the inspection.
c) Administrative defects/violations observed or noted, shall be reflected on comments/findings portion of the
inspection checklist. Separate inspection report maybe rendered if deemed necessary.
d) Appropriate recommendations shall be likewise indicated at the portion provided in the checklist.
e) The inspection team shall conduct exit briefing to ascertain acknowledgement of defects by the operator
and to recommend to the operator to institute appropriate corrective measures.
f) If the inspection is a pre-licensing administrative inspection initiated by SAGSD, a
transmittal/endorsement shall be forwarded C, SAGSD together with the application folder and the
inspection checklist. If initiated at the Police Regional Offices, the inspection report shall form part of the
application to be transmitted to SAGSD.
g) In the event that defects/violations noted are penalized by fines under the IRR to RA 5487, as amended,
procedures in Section 6 Rule XV (Disposition of Violations) of this rule.
h) In the event that the result of inspection may serve as grounds for disapproval of application or
cancellation of LTO/accreditation, a formal investigation shall be conducted. If initiated at the region, the
FESAGS shall conduct the investigation prior to endorsement to C, SAGSD.
2) Post to Post Inspection
a) Upon arrival at the post subject of inspection, the inspection team shall introduce themselves to the duty
guards or detachment commander, state the purpose of the inspection, and present the appropriate letter
order.
b) The conduct of inspection shall be with the purview of existing rules and regulations.
c) Violations noted be reflected on the Violation Ticket Report (SAGSD form 13-94) prepared in four (4)
copies and distributed as follows original and one copy for PNPSAGSD, one (1) copy for security
personnel being inspected and one (1) copy for the agency.
d) If the violation warrants confiscation of issued firearms, justification for confiscation of firearms is under
Rule VII, IRR of RA 5487. The serial number, make and caliber of firearms shall be indicated at left side
portion of Violation Report.
e) Issuance of violation ticket report shall be per guard violation basis.
f) The inspection team shall conduct exit briefing to the security personnel concerned to ascertain
acknowledgement and correction of defects noted and to recommend appropriate measures to improve
their services.
g) Confiscation of License to Exercise Security Profession may be effected particularly those considered as
falsified/faked.
h) Procedures in Section 6, Rule XV (Disposition of Violations) below shall apply when violations and
defects are penalized pursuant to the IRR to RA 5487, as amended.

c. Disposition of Confiscated Licenses, Documents and/or Firearms


1) Confiscations (particularly firearms) shall be effected only after properly informing the concerned (licensee,
holder, owner, and/or client) and after their acknowledgement.
2) All confiscations shall be appropriately documented (ie. inventoried and receipted) and stored by the official
office/unit custodian.
3) Likewise, disposition of all items, whether released or confiscated in favor of the government, shall be
appropriately documented.
4) Confiscated items shall be released upon presentation of proof of or upon confirmation of legality of such
document (in case of documents or licenses), or of proof of validity of firearm license, SG license or DDO (in
case of firearms), or upon payment/settling of fines/penalties, as the case may be.

d. Coordination
1) SAGSD-initiated inspections conducted in the regions including NCR:
a) As a general rule or whenever feasible prior to the conduct of inspection, the inspection team shall make
a call and/or coordinate with the Police Regional Office (Attn: ROPD) the inspection to be conducted by
presenting the issued Letter Order, and if necessary to make arrangements for appropriate counterpart
assistance.
b) A corresponding exit/after inspection call should be made to the Police Regional Office. Results of the
inspection may be reported when follow-up and/or consequent operation is needed or requested to be
performed by the PNP PRO.

2. Police Regional Office-initiated inspections, conducted outside of its area of operations (AOR)/jurisdiction:
a) Provisions of Section 4d, Rule XV above, shall similarly apply to inspections conducted pursuant to
Section 1b Rule XV, where inspections are necessitated outside the AOR/jurisdiction of the initiating PNP
PRO.

SECTION 5. Reports.
a. After Inspection Reports shall be prepared and submitted upon completion of the inspection or within one (1) day
after the period covering the inspection.
b. In event that the violation/s committed entail the imposition of corresponding fines and penalties, the report shall
be submitted to Chief, ROPD thru C, FESAGS (in case of PRO-initiated inspections) or to Chief, SAGSD for
approval, disapproval and/or enforcement.
c. Accomplished inspection checklists of Administrative Inspections and recommendations thereof, should form part
of the application for LTO or Accreditation.

SECTION 6. Disposition of Violations.


a. Administrative Inspection-related violations.
1) In compliance to procedural due process, Private Security Agencies with pending violations shall be
officially notified either thru registered mail or personal notice.
2) The notice of appearance within seven (7) days as indicated in the acknowledged Violation Ticket Report
issued by the inspecting team shall serve as first formal notice to the agency.
a) Acknowledging respondent.
(1) If respondent acknowledges violations/defects and penalties/ fines resulting from the inspection,
appropriate payment orders shall be issued and thereafter proofs of payments be required to be
presented to serve as proofs settlement of penalty/fine.
(2) Copy of proofs of settlement shall form part of the respondent’s application for LTO/Accreditation.
(3) Summary Report/Consolidated Report of settlement with reference to the prior After Inspection
Report shall be submitted to C, SAGSD for notation and/or information. In case settlement resulted
from PRO-initiated inspection, report shall be submitted to the ROPD copy furnished RD, PRO
(when required) and C, SAGSD.
b) No-response respondent.
(1) In the event that the PSA concerned shall not comply to the first notice of appearance the
Inspection Section shall send a second notice of appearance and direct the owner or his
representatives of said agency to appear within seven (7) days upon receipt of the notice.
(2) If the PSA concerned failed to comply on the second notice of appearance, the Inspection Report
including all the evidences (e, i, violation report confiscated firearms, affidavit executed by the
inspecting team members and other pertinent documents) shall be submitted for formal
investigation.
(3) At the onset of the investigation, a third and final notice shall be sent to PSA concerned, with
directive to appear within seven (7) days upon receipt.
(4) Thereafter, Rule XVI and Memorandum SOP on the Conduct of Investigation shall ensue and be
applied.
c) Contesting Respondent.
(1) In the event that a respondent questions the violation, penalty or fines imposed, and/or any of the
circumstances giving rise to such, and/or refuses to submit under the sanction being imposed, the
report shall be submitted for investigation.
(2) Thereafter, Rule XVI (Investigation of Cases) and Memorandum SOP on the Conduct of
Investigation shall be applied.
b. Post-to-post Inspection-related violations.
1) Be it a Security Agency, Security Training School, Security or Training Personnel, the procedures set forth
in paragraph 7a above shall apply.

SECTION 7. Miscellaneous. The foregoing procedure/process is without prejudice to the filing of appropriate criminal case
when violation committed is penalized under Republic Act 5487 the Revised Penal Code and other existing laws.

RULE XVI
INVESTIGATION OF CASES

PART 1
General
SECTION 1. Purpose. To ensure guidance and uniformity in the conduct of administrative investigation involving security
agencies, guards and training institutions, these rules shall set forth the policies and specific procedures to be observed in
the conduct of investigation of cases involving Private Security Agencies, Company Guard Forces, Private Detective
Agencies, Private Security Training Institutions, Private Security Personnel and Private Security Training Personnel.
SECTION 2. Scope. These rules shall apply to all administrative complaints, violations of the laws, rules and regulations
and such other investigative matters cognizable by the PNP particularly SAGSD and the Regional FESAGS as well as the
right to administrative due process of both complainant and respondent in every administrative proceedings under Section
17 of Republic Act No. 5487, as amended.

SECTION 3. Complaint.
a. It shall be written in clear, simple and concise language and in a systematic manner as to apprise the
respondent of the nature of the charge against him and to enable him to prepare his defense.
b. How Initiated – It can be initiated by any of the following:
1. The Chief, PNP, Director, CSG, Regional Director or through their respective representative through an
Official Report or Memorandum showing the acts or omissions allegedly committed;
2. The Chief, SAGSD, CSG or Chief, Regional FESAGS or any of their authorized representative through an
Official Report showing the acts or omissions arising from the results of inspection conducted by any of the
Branches or Sections of SAGSD, CSG or Regional FESAGS; or
3. Upon sworn and verified complaint of any person, accompanied by sworn statements of witnesses and
other pieces of evidence in support of the complaint.
c. Contents of a complaint – The complaint shall contain:
d. Grounds for Filing the Administrative Complaint – Any act or omission in violation of the Revised Rules and
Regulations Implementing Republic Act No. 5487, as amended may constitute a ground for filing the complaint.
1. the full name and address of the complainant;
2. the full name and address of the respondent as well as the position and office of employment;
3. specification of charges; and
4. a narration of relevant and material facts which show the acts or omissions constituting the offense
allegedly committed by the respondent.
e. Venue – Any complaint may be filed with the Complaint and Investigation Section, SAGSD, CSG for acts or
omissions committed in the National Capital Region.

In all other cases, complaint shall be filed with the Regional FESAGS where the complainant’s workplace or the
respondent’s principal office is located.

PART 2
Conduct of Investigation
SECTION 4. Procedure.
a. Initial Evaluation – Within one (1) day upon receipt of the complaint, the Case/Investigating Officer shall initially
evaluate the complaint and shall recommend to the Chief, Complaint and Investigation Section any of the
following actions:
1. Dismiss outright the complaint for lack of merit or a prima facie case is found not to exist or the complaint is
insufficient in form and substance;
2. Refer officially to other government agency if the complaint falls under the jurisdiction of DOLE, SSS or other
forum;
3. Proceed with the investigation if a prima facie case is found to exist.
b. Notice – After the complaint has been determined to be the subject of appropriate summary hearing, the
Case/Investigating Officer shall notify the respondent of the complaint by sending to him summons not later than
three (3) days upon the filing of the complaint. Respondent shall be required to appear before the
Case/Investigating Officer not later than five (5) days upon receipt of the notice or summons, during which he
shall be furnished copies of the complaint, sworn statements of the witnesses and other pieces of evidence.
c. Answer/Reply – Within five (5) days from receipt of copies of the complaint, sworn statement of witnesses and
other pieces of evidence, the respondent shall forthwith submit his answer or reply consisting of his counter-
affidavit, sworn statement of witnesses and other controverting evidence.

SECTION 5. Administrative Adjudication, How Conducted


a. If, on the basis of the sworn statements and the pieces of evidence presented by both parties, the
Case/Investigating Officer finds no sufficient cause to warrant further proceedings, the complaint may outright be
dismissed. Otherwise, he shall send, within three (3) days, summonses to all parties and their witnesses for a
preliminary conference on a specific date and time not to exceed five (5) days therefrom with the end in view of
arriving at an amicable settlement, or of simplifying the issues, marking of evidence and stipulation of facts.
b. If the Case/Investigating Officer believes that there are matters to be clarified, he may profound clarificatory
questions, or may set a summary hearing on a specific date and time not to exceed five (5) days therefrom.
c. If respondent fails to file his answer/reply with the reglamentary period, he shall be deemed to have waived his
right to present controverting evidence, and the case shall immediately proceed ex-parte.
d. Being summary in nature, direct examination of witnesses shall be dispensed with and the sworn statements of
witnesses shall take the place of their oral testimony subject to cross-examination. Either party shall limit cross-
examination to the sworn statements on hand. Cross examination must be confined only to material and relevant
matters contained in the sworn statements. Prolonged arguments and other dilatory proceedings shall not be
entertained. Cross examination shall be limited to not more than fifteen (15) minutes for each witness.
e. On agreement of parties, direct or cross examination may be dispensed with and instead, the parties may just
submit their verified position papers or memoranda within then (10) days upon such agreement, afterwhich the
case is deemed submitted for resolution.

SECTION 6. Nature of Proceedings – The administrative proceedings shall be nonlitiguous in nature, subject to the
requirements of due process of law. The technical rules of criminal or civil procedure, and the rules obtaining in the courts
of law shall not apply. The Case/Investigating Officer may avail himself of all reasonable means to ascertain the facts of
the case, including ocular inspections and testimony of expert witnesses.

SECTION 7. Resolution.
a. Within ten (10) days after the conclusion of the summary hearing or transmission of position papers or
memoranda, the Case/Investigating Officer shall submit the Resolution together with the complete records of the
case to Chief, SAGSD, CSG for his approval, in cases filed in the National capital Region, and to Chief, Regional
FESAGS for his approval, in cases filed in the other regions. Once approved, the said Resolution shall constitute
the decision in the case. Copies thereof shall be served to all parties within five (5) days upon approval of the
resolution.
b. Contents of Resolution – Resolutions shall be clear and concise, and shall include the following:
1. facts of the case
2. issues involved
3. applicable laws, rules and regulations
4. findings and conclusions
5. disposition thereof
c. Service of Resolution – The Resolution shall be served either personally or by registered mail at complainant and
respondent’s place of business or at his last known address within three (3) days from approval thereof. In all
cases, proof of such service shall be attached to the records of the case for purposes of determining jurisdiction in
case of appeal.

SECTION 8. Penalties – In meting out penalties, like penalties shall be imposed for like offenses. One penalty shall be
imposed for every charge or count in each case. “Each case” shall mean one administrative case which may involve one
or more charges or counts.

SECTION 9. Motion for Reconsideration – Either party may file a motion for reconsideration within ten (10) days from
receipt of a copy of the approved Resolution. Only one (1) motion for reconsideration is allowed which shall be resolved
within five (5) days from the filing thereof.

SECTION 10. Appeal.


a. Grounds for Appeal – Should the motion for reconsideration be denied, either party may file an appeal with the Director,
CSG, in cases resolved by Chief, SAGSD,
a. CSG, or with the Regional Director, in cases resolved by the Regional FESAGS, on any of the following grounds:
1. That new and material evidence has been discovered which the appellant could not, with reasonable
diligence have discovered and produced at the summary hearing, and which if presented would probably
change the resolution;
2. That errors of law or irregularities have been committed during the hearing prejudicial to the substantial rights
of the appellant;
3. That the penalty imposed is not commensurate to the offense committed.
b. Perfection of Appeal – An appeal shall be perfected by the appellant by filing and serving upon the Chief, SAGSD-
CSG or Chief, FESAGS a Notice of Appeal within ten (10) days from receipt of the Resolution subject of appeal.
Within three (3) days upon receipt of the notice of appeal, the entire records of the case, duly numbered and
initialed, and the exhibits properly marked, to include the summary record of proceedings shall be sent to the
appellate authority.
c. Period to Decide Appeal – The appellate authority shall decide the appeal within thirty (30) days after the receipt
of the entire records of the case from the Case/Investigating Officer. Failure of the appellate authority to decide
the appeal within that period shall be deemed as denial of such appeal, and the resolution appealed from shall
immediately become final and executory.

SECTION 11. Separability Clause. In the event that any of the provisions of this Rule is declared legally unenforceable,
the validity of the other provisions shall not be affected by such declaration.
RULE XVII
ADMINISTRATIVE SANCTIONS

PART 1
General
SECTION 1. Policy. Corollary to Section 2 Presidential Decree 1919 dated 28 April 1984, the Chief, PNP or his authorized
representative may impose, after confirming any violation of republic Act 5487, its amendments and implementing rules
and regulations, the penalty of suspension, or cancellation of the license/accreditation of any private/government security
or training personnel; provided that in cases of violations committed by any private security/detective agency, company
guard force or private security training institution, the administrative penalty which may be imposed shall only be
administrative fine or cancellation of license without prejudice to any criminal action against the violator.

SECTION 2. Purpose. The purpose of these rules and regulations is to rationalize the schedule of administrative penalties
as provided in Section 8 of RA 5487,as amended.

PART 2
Sanctions Against Licensed Security Personnel

SECTION 3. Classification of offenses. - The following terms shall be construed to mean as indicated which shall likewise
refer to the individual person as private security or security training personnel:
a. Light Offenses shall include, but not limited to:
(1) those related to uniforms except those falling under paragraph c(1) hereunder;
(2) use of profane languages;
(3) acts of discourteousness;
(4) failure to notify/call the nearest PNP Station in case of disorders, riots or strikes and other emergency cases;
(5) late or failure to maintain and/or submit records/reports;
(6) violation of Section 1, Rule X of these rules and regulations otherwise not specifically falling under this and
paragraphs b and c of this rule; and
(7) all acts prejudicial to good conduct, behavior, morals and similar acts, pursuant to existing laws, rules and
regulations.
b. Less grave offenses shall include, but not limited to:
(1) not having in possession his/her license to exercise profession, duty detail order and/or firearms license
(when carrying firearms), while performing private security service;
(2) use of uniform not appropriate for one’s ranks or position;
(3) leaving his post without being properly relieved, thus exposing the lives and properties he is supposed to
protect from danger;
(4) indiscriminate firing of firearm not in connection with the performance of duty;
(5) other similar offenses pursuant to existing laws, rules and regulations.
c. Grave offenses shall include, but likewise not limited to:
(1) Using uniform other than that prescribed under these rules;
(2) using personally owned or unlicensed firearm during tour of duty;
(3) allowing the use/lending issued firearms to unauthorized persons;
(4) assisting, abetting or protecting criminals during or off duty;
(5) providing confidential information to unauthorized persons;
(6) refusal to provide information to authorized persons;
(7) illegal search;
(8) taking alcoholic beverages or being drunk while on guard duty;
(9) abuse or acting beyond the scope of authority;
(10) misrepresentation in the submission of documents for renewal of license;
(11) other similar offense pursuant to existing laws, rules and regulations.
d. Fake License - a document issued by and/or secured from sources other than the SAGSD.

SECTION 4. Penalties. - Without prejudice to the filling of the appropriate criminal action, the following penalties shall be
imposed after investigation of any private security personnel, thereafter found guilty of committing any of the offenses
previously enumerated in Section 3 of this rule:
a. For light offenses. - One (1) to thirty (30) days suspension or a fine ranging from one hundred pesos minimum
to five hundred pesos maximum (P100.00- P500.00) or both;
b. For less grave offenses. - One (1) month and one (1) day to six (6) months suspension or a fine ranging from
five hundred pesos minimum to one thousand pesos maximum (P500.00-P1, 000.00) or both; and
c. For grave offenses. - Six (6) months and one (1) day to one (1) year suspension or a fine ranging from ten
thousand (P10, 000.00) pesos minimum to fifty thousand pesos maximum (P50, 000.00) or both, and/or
cancellation of license/permit.

SECTION 5. Status during suspension. - Unless dismissed by his employer agency on legal grounds, a security guard
who is suspended pursuant hereto shall not be entitled to receive his salary corresponding to the period of suspension.
The agency in this case shall provide a substitute guard to man the post of the suspended guard in order not to prejudice
the interest of its client. Provided, that the service of the substitute guard shall be good only during the period of such
suspension.

SECTION 6. Any private security personnel who commits the same offense as
enumerated in Section 3 above, after having been suspended for least three (3) times
within the lifetime of his license shall be cancelled

PART 3
Sanctions Against Private Security Agencies, Private Detective Agencies, Company Guard Forces, and/or
Training Institutions

SECTION 7. The authority of the Chief, PNP to impose administrative penalties or cancel, suspend or not to renew the
license of any private security/detective agency, company guard force, and/or private security training institutions shall be
exercised in the following cases without prejudice to the filing of appropriate criminal action:
a. When a falsified license is officially submitted by a private security agency to its prospective client in bidding or
contracting for security services.
b. When a falsified document or report is submitted to the Philippine National Police as requirement for new or
renewal of license to operate a private security agency, company security force or training institutions.
c. When a private security agency or company security force has been found to be violating the minimum wage
rates fixed by law that should be granted to their private security/company guards.
d. When the private security agency or company security force has been found to be engaging in activities that are
dangerous to public safety and welfare or inimical to national security.
e. When a private security agency or company security force refuses to comply with the final and executory NLRC
order/decision. This will be a ground for immediate revocation of license to operate.
f. Violation of the following Rules and Regulations:
1. Section 2b and 4, Rule I
2. Sections 3a, 3b, 3c and 3h, Rule IV
3. Sections 1 and 2, Rule IV
g. When a private security agency has been found to have engaged in cutthroat security services with its client or a
price lower than the standard minimum rates for security services adopted by Philippine Association of Detective
and Protective Agency Operators, Inc., with the concurrence of the Chief, Philippine National Police. A penalty of
administrative fines shall be imposed upon such erring Private Security Agency in the amount of twenty thousand
(P20, 000.00) for the first offense; forty (P40, 000.00) for the second offense and cancellation of license to operate
for the third offense. In case of fines, the erring PSA shall not be allowed to serve the questioned client. PSA
Operators whose licenses has been cancelled under this rule shall be barred from obtaining another LTO.
h. When a private security agency has been found to have violated Section 4, Rule VII, a penalty of administrative
fines shall be imposed upon such erring Private Security Agency in the amount of twenty thousand (P20, 000.00)
for the first offense; forty (P40, 000.00) for the second offense and cancellation of license to operate for the third
offense.
i. When a private security agency has been found to have violated Section 3C(g), Rule X, a penalty of
administrative fines shall be imposed upon such erring Private Security Agency in the amount of twenty thousand
(P20, 000.00) for the first offense; forty (P40, 000.00) for the second offense and cancellation of license to operate
for the third offense. In case of fines, the erring PSA shall not be allowed to serve the questioned client. PSA
Operators whose licenses has been cancelled under this rule shall be barred from obtaining another LTO.
j. When a private security agency with regular license to operate fails to maintain a minimum of two hundred (200)
security guards at the time of renewal of its license, the agency concerned shall be issued temporary license with
an administrative fine in the amount of ten thousand (P10, 000.00) pesos only.
k. Violation of the provisions of Rule XVIII by private security personnel is punishable by suspension or cancellation
of their individual private security licenses and/or licenses of their respective company security force or private
security agencies.

SECTION 8. The following administrative fines shall be imposed on any private security agency or company security force
found committing the following offenses:

OFFENSE FINES
a. Improper wearing of prescribed uniform by 1. P100.00 per guard for 1st offense;
Posted Security Personnel 2. 250.00 per guard for 2nd offense;
3. 500.00 per guard for 3rd offense.
b. Posted security guard not carrying his ID, - do -
Private Security License, Firearms License
and Duty Detail Orders.
c. Posted security personnel not covered by - do -
written contract for security services
d. Imposing and collecting unauthorized - do -
deductions from the salary of their security
guard.
e. Failure to submit application and P 250.00 plus P 50.00 for every day delay if filed
requirements for the renewal of license on before expiration of LTO;
prescribed date. An addition of P500.00 plus P100.00 for every day
delay not to exceed sixty (60) days, if filed after
expiration of LTO

SECTION 9. Classification of offenses. Except in cases already specifically provided in this rule the following term shall be
construed to mean as indicated:
f. Light Offenses committed by private security agency or company security force shall include, but not limited to:
1) late or failure to maintain and/or submit records/reports;
2) Posting security personnel not covered by written contract;
3) Other similar offense pursuant to existing laws, rule and regulations.
g. Less grave offense committed by private security agency or company security force shall include but not limited to:
1) ordering its posted security guards to conduct illegal search;
2) posting unlicensed personnel for duty;
3) posted personnel not wearing the prescribed uniform;
4) other similar offense pursuant to existing laws, rules and regulations.
h. Grave offense committed by private security agency or company security force shall include, but not limited to:
1) Allowing the set of unlicensed firearm personally owned by security guard or other person or entity than that of
the private security agency having jurisdiction of the place being secured;
2) Issuing unlicensed firearm to guards;
3) Violation of Sec. 3 h, Rule IV of this implementing rules and regulations regarding prohibition on “Kabit”
system;
4) Abuse or acting beyond the scope of authority;
5) Use and/or employment of security guard for purposes of committing threats, intimidation, coercion or any
other crime/offenses, including show of force.
6) Violation of Sections 3A, 3B, and 3C of Rule X;
7) Other similar offense pursuant to existing laws, rules and regulations

SECTION 10. Penalties. Without prejudice to the filing of appropriate criminal action, and except as already provided by
this rule the following penalties shall be imposed after investigation of any guard or detective, private security guard
agency or company security force and thereafter found guilty of committing any of the offenses enumerated in Section 9
hereof:
a. For light offense committed by Private Security Agency/Company Security Force:
1) Fine of P5, 000.00 for first offense;
2) Fine of P10, 000.00 for 2nd offense;
3) Fine of P15, 000.00 or cancellation/revocation of License to Operate, or both for 3rd offense
b. For less grave offense committed by Private Security Agency/Company Security Force:
1) Fine of P10, 000.00 for 1st offense;
2) Fine of P 20, 000.00 for 2nd offense;
3) Fine of P30, 000.00 or cancellation/revocation of license to operate, or both for 3rd offense;
c. For grave offense committed by Private Security Agency/Company Security Force:
1) Fine of P50, 000.00 for 1st offense;
2) Cancellation/revocation of license to operate for 2nd offense.

SECTION 11. Any private security agency or company security force who commits the same offense as enumerated in
Section 8 hereof, after having been fined at least three (3) times shall be proceeded against thru administrative
cancellation or non-renewal of mits license.

RULE XVIII
DUTIES DURING STRIKES AND LOCKOUTS
SECTION 1. Policies.
All private security personnel in direct confrontation with strikers, marchers, or demonstrators shall not carry firearms.
They may, at best, carry only night sticks (batuta) which may or may not be provided with tear gas canister and
dispensers.
a. Private security personnel of strike-bound establishments not in direct confrontation with the strikers may carry in
the usual prescribed manner their issued firearms.
b. Private security personnel shall avoid direct contact, either physically or otherwise, with the strikers.
c. Private security personnel shall stay only within the perimeter of the installation which they are protecting at all
times.
d. Private security personnel, in protecting and securing the assets and persons of their clients, shall use only
sufficient and reasonable force necessary to overcome the risk or danger posed by strikers or hostile crowds.
e. Private security personnel shall refrain from abetting or assisting acts of management leading to physical clash of
forces between labor and management. These hostile acts include breaking of the strike; smuggling in of scabs
and preventing strikers from conducting peaceful pickets.
f. Private security personnel shall not enforce the provisions of the Revised Labor Code pertaining to
strikers/lockouts.
g. Private security personnel on duty must at all times be in complete uniform with their names and agency’s name
shown on their shirts above the breast pockets.

SECTION 2. For Private Security Agencies/Company Security Force Chief Security


Officers. –
a. Upon declaration of a strike, or upon the establishment of a picket line or mass action at the vicinity of a
firm/establishment, the Detachment
a. Commander or the Chief Security Officer of the company guard force, shall immediately collect all firearms of the
guards in direct or about to have a direct confrontation with the crowd and deposit these firearms in their vault; or
reissue these firearms to other private security personnel not issued firearms but assigned to and performing
guard duties away from and not visible to strikers or the crowd as may be required by the circumstances.
b. The Detachment Commander or Security Director shall account for all the firearms in a logbook.
c. In instances where there is no Detachment Commander or Security Director, as in a compound where there are
only a few guards, the agency operator or Security Officer in the case of company security forces, shall
immediately be informed by the guards of the declaration of strike or about the approach of strikers or a crowd;
whereupon the agency operator/security officer shall immediately assess the situation and take appropriate action
to forestall violence, but at the same time insuring security of the premises.
d. The Detachment Commander or Security Director shall maintain constant contact with the management and if he
notices or observes the strikers or the crowd to be up to something unlawful, or are clearly violating the provisions
of the Revised Labor Code, the Revised Penal Code and/or local ordinances, this information to the Commander
of the Peace Keeping Force for his appropriate action.
e. If it becomes unavoidable for private security personnel to talk to strikers or member of the crowd, only the
Detachment Commander or Security Director shall talk to the leader or leaders of the strikers or crowd. What
transpires in this dialogue shall be reported to the management immediately. At no instances shall private security
personnel negotiate with the strikers or unfriendly crowd in relation to the labor-management dispute. This is a
function of management.
f. If the situation worsen or becomes untenable for the private security personnel to cope with, the Detachment
Commander or Security Director, the guard on post, shall immediately advise the management to request for PNP
security assistance.
g. The Detachment Commander and Security Director shall publish emergency telephone numbers (Police, Fire,
Hospital) at all guards posts and detachments.

SECTION 3. Inter-relationship between Private Security Personnel and members of the


PNP –
a. Private Security personnel are always subordinate to members of the PNP on matters pertaining to law
enforcement and crime prevention. They cannot enforce any provision of the law except in executing citizen’s
arrest and/or conducting initial investigation of a commission of a crime. In such case, any arrested person shall
be turned over immediately to the nearest PNP unit/station.
b. Criminal investigation is the responsibility of the PNP. All results of initial investigation conducted by private
security personnel and all evidence gathered by them shall be turned over to the PNP unit/station concerned as a
matter of course without delay.
c. Responsibilities of Private Security Personnel:
1. Private security personnel are responsible purely for enforcing company policies, rules and regulations of
management and clients with the ultimate objective of providing security to the assets and persons of clients.
2. Private security personnel are authorized and empowered by law to act as such and in the manner prescribed
by the Chief, PNP on within their specifically assigned areas to be secured, as provided for in the contract
between the client and the private security agency, and, in the case of company security services, as
specifically stated in their private security firm licenses.

SECTION 4. Punitive Clause. Individual acts of private security personnel in violation of the provisions of appropriate laws
shall be subject to criminal prosecution, administrative penalties and such other sanctions provided by law.

RULE XIX
FORMS, SEALS AND LOGOS
SECTION 1. Types of forms and usages. (Valid until revised.)
1. SF01-94 Application for License of Individual Security Guard.
2. SF02-94 Application for License of Private Security Agency and Private Detective Agency.
3. SF03-94 Individual License Form/ID.
4. SF04-94 Format License to Operate of Security Agency.
5. SF05-94 Information Sheet/ Bio data of Agency Operators.
6. SF06-94 Training Report Forms (Before conducting the Training of Security Guard).
7. SF07-94 After Closing Report Form (submission of names & number of security participated).
8. SF08-94 Format of Psychiatrist’s endorsement Letter - for PSA who passed NP
9. Examination.
10. SF09-94 List of new PSL Applicants who passed NP examination.
11. SF10-94 Result of Psychiatrist’s Examination addressed to Chief, PNP SAGSD.
12. SF11-94 I n spection Report Form.
13. SF12-94 Format for Duty Detail Order of PSA/CSF.
14. SF13-94 Delinquency Report

SECTION 2. Use of letterhead, - All Private Security Agencies/Company Security Forces shall use letterheads in all forms
of communications and official transactions.

SECTION 3. Logos and Company Seals/Emblems. Private Security Agencies, Company Guard Forces and Private
Security Training Institutions, shall have their respective company/office logos, seals or emblems distinct from each other,
provided that same shall have been registered and approved by the PNP SAGSD.

SECTION 4. Changes and Modifications. Changes, modifications and/or additions relative to Sections 1, 2 and 3 above
shall be made through a Logos, Seals and Forms Board to be created by SAGSD, for recommendation to the Director,
CSG for acceptance/adoption.

RULE XX
AWARDS AND DECORATIONS OF SECURITY PERSONNEL

SECTION 1. Types/awards - All security guards are entitled to the following awards for their outstanding feat/
accomplishment /achievement during the performance of their duties and/or while serving in the exercise of profession.
d. Medalya ng Kagitingan (Blueguards Medal of Valor).
e. Medalya ng Katapatan sa Paglilingkod (Blueguard Distinguished Service Medal).
f. Medalya ng Katapangan (Blueguards Bravery Medal).
g. Medalya ng Pambihirang Paglilingkod (Blueguards Special Service Medal
h. Medalya ng Kadakilaan (Blueguards Heroism Medal).
i. Medalya ng Katangitanging Asal (Blueguards Special Action Medal).
j. Medalya ng Kasanayan (Blueguards Efficiency Medal).
k. Medalya ng Papuri (Blueguards Commendation Medal).
l. Medalya ng Sugatang Magiting (Blueguards Wounded Medal).
m. Medalya sa Pagtulong sa Nasalanta (Blueguards Disaster Relief and Rehabilitation Medal).
n. Letter of Commendation.

SECTION 2. Description of action required of the above-mentioned awards:


a. Medalya ng Kagitingan (Blueguards Medal of Valor) can be awarded to any Blueguards whose performance and
action falls under para. 1 and/or 2 below:
(1) Action of the Blueguard involving conspicuous gallantry and intrepidity ignoring the risk of life and limb above
and beyond the call of duty. In order to justify this award, a Blueguard must perform conspicuously in deed
and in action personal bravery and self-sacrifice above and beyond the call of duty as to distinguish himself
clearly from his comrades in performing hazardous service.
(2) Blueguards who participated in rescue in any fire incident, disaster, calamity or earthquake whose actions
involve actual rescue operation, characterized by gallantry and intrepidity at the risk of life and limb above
and beyond the call of duty. In order to justify this award, a Blueguard must have saved or attempted to save
lives and properties characterized by personal bravery, courage, heroism or self-sacrifice above and beyond
the call of duty as to distinguished himself above his comrades in the performance of more than ordinary
hazardous service.
b. Medalya ng Katapatan sa Paglilingkod (Blueguards Distinguished Service Medal) can be awarded to any member
of the Blueguards whose action and performance either fall under para. a or b below:
(1) It can be awarded to any Blueguard who has rendered eminently meritorious and invaluable service in the
position of major responsibility. The performance of duty must be exceptional. A superior performance of
duty normal and relative to assignment, position and experience of an individual is not an adequate basis for
the award.
(2) The accomplishment of the duty, which has to be exceptional or significant should have been completed
prior to submission of the recommendation.
c. Medalya ng Katapangan (Blueguards Bravery Medal). It can be awarded to any Blueguard member with the
following requirements;
(1) For gallantry of the Blueguards action not warranting the Medalya Ng Kagitingan nor Medalya ng Katapatan
sa Paglilingkod.
(2) For Blue guard members who participated on rescue operations in a fire incident, car accident, earthquake,
flood, typhoon and other disasters/calamities and whose acts of heroism has put his life in extreme danger in
his desire to save the lives of others.
d. Medalya ng Pambihirang Paglilingkod (Blueguards Special Service Medal).

The President of the Philippine Association of Detective and Protective Agency Operators, Inc. (PADPAO) in
Consonance with the Resolutions of the Board of Director, can award the medal to any member of the civilian
government such as parliamentarians, statement, diplomats, journalists, scientists and any member of the
Philippine National Police holding them and respectable position and whose contribution and accomplishments
greatly enhanced the development and professionalism of the Civil Security Industry.

The four (4) degrees of the Medalya ng Pambihirang Paglilingkod with the corresponding requirements are the
following:
(1) Degree of Raja - It can be awarded to any member of the legislative and the judiciary to include jurists,
parliamentarians, statesmen, diplomats, journalists, scientists and the Director General of the Philippine
National Police who has rendered eminently meritorious and invaluable service in undertaking a major
responsibility leading to the development and professionalization of the Civil Security Industry. A superior
performance of normal duties based on one’s position will not be made a justification to the award.
(2) Degree of Datu - It can be awarded to any of the Regional Directors and/or any of the Directors of the
National Supporting Unit or Command of the Philippine National Police who has rendered eminently
meritorious and invaluable service leading to the development of the Civil Security Industry and contributed
professional assistance while in a position of major responsibility which has a lesser degree of category and
not warranting the award of the degree of Raja.
(3) Degree of Lakan - It can be awarded to any officer of the Philippine National Police and the Armed Forces of
the Philippines who has distinguished himself thru exceptional meritorious conduct in the performance of
outstanding service in the development of the Civil Security Industry.
(4) Degree of Maginoo - It can be awarded to any member of the PNP, Armed Forces of the Philippines and
other government law enforcement agencies who has distinguished himself thru exceptional meritorious
conduct and outstanding service that contributed in the making, developing and professionalizing the Civil
Security Industry but in a lesser degree of category not warranting the award of the degree of Lakan. For
meritorious service of the greater value, the Blueguards Efficiency Medal is usually awarded.
e. Medalya ng Kadakilaan (Blueguards Heroism Medal). It can be awarded to any Blueguard member whose action
and performance fall under para. 1 and 2 below:
(1) An act of heroism that involves actual conflict with criminal elements either in actual duty or beyond the relief
of posted duty.
(2) An act of heroism shown or performed in rescue operations, saving the lives and properties of any person or
persons who are victims of criminal elements and natural calamities or fortuitous events such as fire,
earthquake, flood, typhoon and other disasters.
f. Medalya ng Katangiang Asal (Blueguards Special Action Medal). It can be awarded to any Blueguard member in
any of the categories with corresponding requirements as follows:
(1) Raja - for heroic act performed by Blueguard member in actual conflict with criminal elements during a crime
incident or to save the lives and limbs of any person or persons in case of a fire incident which would
conspicuously distinguish himself thru gallantry and intrepidity notwithstanding the risk of life which is above
and beyond the call of duty. Such deed of bravery and self-sacrifice must be clearly visible so as to
distinguish himself from other Blueguard members.
(2) Datu - for conspicuous acts of courage and gallantry confronting armed enemy in a crime situation or life
saving and fire fighting in a fire situation not warranting the Medalya ng Katangitanging Asal degree of Raja.
He must perform a notable act of heroism involving risk of life as to set him apart from other members.
(3) Lakan - For gallantry in action in a crime of fire situation not warranting the Medalya ng Katangitanging Asal
degree of Raja or Datu. It can be awarded to recognize a meritorious service accomplished with distinction by
any person or persons either in a duty responsibility or in direct support to PNP Station.
(4) Maginoo - For gallantry in action not warranting the Medalya ng Katangitanging Asal degree of Raja, Datu or
Lakan.
g. Medalya ng Kasanayan (Blueguards Efficiency Medal). It can be awarded to any member of the blueguards for
meritorious and invaluable service rendered. The performance of duty must be in such a way as to merit
recognition by an exceptional service. The superior performance of the normal duties as called for by the position
is not alone justification of the award.
h. Medalya ng Papuri (Blueguards Commenda-tion Medal). It can be awarded to any member of the Blueguards who
has demonstrated exemplary efficiency, devotion and loyalty to his duty assignments.
i. Medalya ng Sugatang Magiting (Blueguards Wounded Medal). It can be awarded to any member of the
Blueguards in the actual performance of duties. It requires that said member must have been wounded in action
in his fight against criminal elements or from a direct assault of the enemy, or wounds caused by fire in a fire
fighting activity. Provided, however, that such wounds would necessitate treatments by a medical officer. For this
purpose, a “wound” is hereby defined as an injury to any part of the body sustained due to a hostile act of an
enemy on in quelling a fire.
j. Medalya sa Pagtulong sa Nasalanta (Blueguards Disaster Relief and Rehabilitation Medal). It can be awarded to
any member of the Blueguards with the requirement that there should be an active participation of such member
in an undertaking that involves rescue/ relief and rehabilitation operations in relation to disasters of fortuitous
events such as typhoons, flood, earthquakes, conflagration and other calamities.
k. Letter of Commendation - any good activity done by any security guard officer.

SECTION 3. Authority to Grant Award - The following are authorized to approve/issue awards:
a. Medalya ng Kagitingan - Secretary of the Interior and Local Government.
b. Medalya ng Katapatan sa Paglingkod - Chief, Philippine National Police.
c. Medalya ng Katapangan - Chief, Philippine National Police.
d. Medalya ng Pambihirang Paglilingkod - Regional Director, PNP Police Regional Office/Director, Civil Security
Force Office.
e. Medalya ng Kadakilaan - Regional Director, PNP Police Regional Office/ Director, Civil Security Group.
f. Medalya ng Katangi-tanging Asal - Regional Director, PNP Police Regional Office/Director, Civil Security Group.
g. Medalya ng Kasanayan - Regional Director, PNP Police Regional Office/ Director, Civil Security Group.
h. Medalya ng Papuri - Provincial Director, PNP Provincial Office/Chief, SAGSD/ CSG Regional Office Directors.
i. Medalya Sa Pagtulong sa Nasalanta - Provincial Director, PNP Provincial Office/Chief, SAGSD/ CSG Regional
Office Directors.
j. Letter of Commendation - PSAs/ CGFs Operators/ Managers concerned.

SECTION 4. Description of Medals - The aforementioned medal are described in Figure.

SECTION 5. Wearing of Medals - All security guard who are recipients of awards shall wear them as part of their uniform
and miniature thereof, and shall be worn of the above left pocket of the uniform.

SECTION 6. Special Award - A Private Security Agency/Company Security Services/ Government Security Unit selected
as Outstanding Agency the SAGSD, CSG or by the NHQ, PNP shall be authorized to wear the Chief, PNP agency citation
badge. Such badge shall be worn also as part of the uniform in a miniature type of the security personnel.

SECTION 7. The categories for recognition of the Most Outstanding Blueguards, Private Security Agency and Company
Guard Forces of the Year are the following.
a. Male Blueguard of the Year.
b. Female Blueguard of the Year.
c. Private Security Agency of the Year.
d. Company Guard Force of the Year.

SECTION 8. The categories for recognition of the Most Outstanding Blueguards Training School are the following:
a. Pre-Licensing Trainee Graduates
b. Blueguards Trainee Graduates
c. Outstanding Blueguards Training School.
SECTION 9. Determination of Awards - Awards shall be determined by a committee created for the purpose to be
designated by D, CSG in coordination with PADPAO. Prospective awardees shall be duly recommended by the PSA/CGF
concerned.

RULE XXI
PHYSICAL AND MENTAL EXAMINATIONS
SECTION 1. General Policy.
a. Physical and Mental Examination are requirements for application for license to exercise security/security training
profession or license to operate a security/training agency, company guard force, or private detective agency.
b. All applicants for license should be certified as physically and mentally fit and qualified to be licensed.

SECTION 2. Physical Examination.


a. Physical Examination shall be conducted by any licensed doctor practicing within the Philippines. All applicants
examined to be fit shall be issued by said medical practitioner a certificate indicating that the applicant is
physically fit to be licensed.
b. The Medical Practitioner must use only the prescribed format for Physical Examination, both in original and
renewal of license.
c. This accomplished format will be submitted together with all of the other requirements of licensing.

SECTION 3. Neuro-psychiatric Examination.


a. NP Examination shall be conducted by the PNP Accredited NP Testing Center.
b. All private security agencies and company guard forces MUST retain the services of a duly PNP Accredited NP
Testing Center. Individual applicants must also take Neuro-Psychiatric Examination from any PNP Accredited NP
a. Testing Center.
b. Neuro-Psychiatric Examination shall be conducted to all private security personnel at least sixty (60) days prior to
the expiry month of the license.
c. The PNP Accredited NP Testing Center shall conduct a different set of examination to new applicants and
renewal of security license in determining their fitness for retention to the position as position as security officer,
guard or operator. (The purpose of NP Clearance Requirement is to attest to the mental and psychological well-
being of the applicants. A battery of psychological tests will help determine this purpose).
d. NP Examination Result as indicating that the applicant is psychologically fit to be licensed, shall be one of the
requirements for license application, be it new or renewal.

SECTION 4. Drug Test. Consistent with laws and/or circulars existing at the time of the formulation of these rules and
regulations, no license to operate a private security/training/detective agency or company guard force, or license to
exercise private security profession shall be granted not unless a Drug Test Clearance have been secured from an
accredited drug testing center/clinic, certifying that the applicant for license is not addicted nor a user of prohibited
drugs/narcotics.

SECTION 5. Accreditation and Test Procedures . Procedures on accreditation of testing centers and procedures on the
conduct of tests shall be as prescribed in an SOP issued by the appropriate PNP office/unit or committee.

RULE XXII
GENERAL PROVISIONS
SECTION 1. Implementing Order/Circulars. - The Chief, SAGSD-CSG shall from time to time issue such implementing
orders or circulars as may be necessary to carry out the provisions/purposes of these Rules and Regulations
implementing Republic Act No. 5487, as amended.

SECTION 2. Supervision and Implementation. The SAGSD under the supervision of the Director, CSG, is hereby directed
to carry out the smooth implementation of these
Rules and Regulations.

SECTION 3. Rescission Clause. – All existing PNP Rules and Regulations, Circulars and Memoranda inconsistent with
these Rules are hereby repealed, modified or amended accordingly.

SECTION 4. Effectivity. These Rules and Regulations shall take effect fifteen days following its publication in the Official
Gazette or in a newspaper of general circulation.

APPENDIX A
SOME IMPORTANT PROVISIONS ON THE 2003 REVISED RULES AND
REGULATIONS IMPLEMENTING REPUBLIC ACT 5487

RA5487 – An act governing the organization and management of Private Security Agencies, Company
Guard Forces and Government Security Forces
- The private security agency law signed on June 13, 1969.

Rule I, Sec. 2 License necessary – no person shall engage in the business of or act as a private
detective agency or engage in the occupation, calling or employment of security personnel or in the
business of private security/training agency without first securing the permit from the Chief, PNP which
permit as approved is prerequisite in obtaining a license certificate.
- Any person having any participation in the management and operation shall also secure a
license, except those employed solely for clerical or manual works.

Rule IV, Sec.2 Basic requirements of an operator or manager of an agency


- Filipino citizen
- Not be less than 25 years old
- College graduate and/or inactive or retired commissioned officer from AFP or PNP
- Finished a course on Industrial security management and/or have adequate trainings or
experience in security business.
- Good moral character
 New applicants for license to operate shall be required to obtain:
a. 1 million as a minimum capital
b. 500 thousand as a minimum bank deposit

Sec. 5 Membership
a. Private Security Agency – minimum of 200 licensed personnel
b. Company Guard Force/ Private Detective Agency – minimum of 30 licensed personnel
c. Maximum number of personnel to all kind of agencies is 1000 personnel.

Rule V, Sec.3 Qualifications for a Private Security Guard


- Filipino citizen
- Not less than 18 years old nor more than 50 years old
- High school graduate
- Physically and mentally fit
- Undergone pre-licensing training course

Sec. 4 Qualifications for Security Officer


- holder of Baccalaureate degree
- graduate of Security Officer Training Course

Sec. 5 Qualifications for Security Consultants


- holder of Master’s degree in either Criminology, Public Admin, MNSA, Industrial Security Admin,
or Law
- Must have at least 10 years’ experience in the operation and management of security business.

Sec 6 Qualification for private detective


- Baccalaureate degree preferably Bachelor of laws or Criminology
- Graduate of Criminal investigation course offered by PNP or NBI or any authorized detective
training center.

Sec. 7 Exemptions from Basic Pre-licensing Training


- veterans and retired military or police personnel
- those honorably discharged military/police personnel
- graduates of ROTC advance/CHDF

Sec. 9 Types of Licenses


- Temporary License
- Regular License – all kinds of regular licenses are valid for 2 years only

Rule VII, Sec. 5 Justification for confiscation of firearms


a. when the firearm is about to be used in the commission of a crime
b. when the firearm is actually being used in the commission of crime
c. when the firearm has just been used in the commission of a crime
d. When the firearm being carried by the security guard is unlicensed or a firearm no authorized by
law and regulations for his use.
e. When the confiscation of the firearm is directed by the order of the court.
f. When the firearm is used or carried outside the property, compound or establishment serviced by
the agency without proper authority, or
g. When the security guard does not possess any license to exercise his profession.

Sec. 2 Restriction to possess high-powered firearms


- Not allowed to possess military type weapons such as rifles and special weapons with bore
bigger than cal. 22 to include pistols and revolvers with bores bigger than cal. 38.
- Possession and use of high-powered firearms must only be authorized when the Chief, PNP or
RDPRO approved in some special conditions.
- Authorized use of high-powered firearms must only be 10% of the total strength of the security
guards

Rule X, Section 1 Professional Conduct and Ethics

Security Guard’s Creed


As a Security Guard, my fundamental duty is to protect lives and properties and maintained order
within the vicinity or place of duty, protect the interest of the employer and or clients and the security and
stability of our government and country without compromise and prejudice, honest in my action, words
and thought, and do my best to uphold the principle: MAKADIOS, MAKABAYAN AT MAKATAO.

Ethical Standard
As security guard / detective, his fundamentals Duty is to serve the interest or mission of his
agency in compliance with contract entered into with the clients or customers of the agency he is to serve
thus.
1. He shall be honest in thoughts and deeds both in his official actuation, obeying the laws of the land
the regulations prescribed by his agency and those establish by the company he is supposed to
serve.
2. He shall not reveal any confidential matter committed to him as a security guard and such others
matters impose upon him by law.
3. He shall act all times with decorum and shall not permit personal feelings prejudices and undue
friendship to influence his actuation in the performance of his official functions.
4. He shall not compromise with criminal and other lawless elements to the prejudice of the customers
or client and shall assist government relentless drive against lawlessness and other forms of
criminality
5. He shall carry out his assigned duties as required by law to the best of his ability and shall
safeguard life and property of the establishment he is assigned to.
6. He shall wear his uniform, badge, patches and insignia properly as a symbol of public trust and
confidence as an honest and trustworthy security guard, watchman and private detective.
7. He shall keep his allegiance first to the government he is assigned to serve with loyalty and utmost
dedication.
8. He shall diligently and progressively familiarize himself with the rules and regulation lay down by
his agency and those of the customers or clients.
9. He shall as all times be courteous, respectful and salute his superior officers, government officials
and officials of the establishment where he is assigned and the company he is supposed to serve.
[Link] shall report for duty always in proper uniform and neat in his appearance and
[Link] shall learn at heart and strictly observe the laws and regulations governing the use of firearm.

Code of Conduct
1. He shall carry with him at all times during his tour of duty his License identification card and duty
detail order with an authority to carry firearms.
2. He shall not use his license and privileges to the prejudice of the public, the client or customer and
his agency.
3. He shall not engage in any unnecessary conversation with anybody except in the discharge of his
work and shall at all times keep himself alert during his tour of duty.
4. He shall not read newspaper, magazines, books, etc., while actually performing his duties.
5. He shall not drink any intoxicating liquor immediately before and during his tour of duty
6. He shall know the location of the alarm box near his post and sound the alarm in case of fire or
disorder.
7. He shall know how to operate any fire extinguisher at his post.
8. He shall know the location of the telephone and / or telephone numbers of the police precincts as
well as the telephone numbers to the fire stations of the locality.
9. He shall immediately notify the police in the case in any sign of disorder, strike, riot or any serios
violations of the law.
10. He or his group nor guards shall not participate or integrate any disorder, strike riots or any serious
violations of the law.
11. He shall assist the police in the preservation and maintenance of the peace and order and in the
protection of life, property / having in mind that the nature of his responsibilities is similar to that of
the latter.
12. .He shall familiarize himself with the Private Security Agency Law (RA5487) as amended, and the
PNP SAGSD implanting rules and regulations.
13. When issued a pass he should not lend his pass to anybody.
14. .He shall always in proper uniform and shall always carry with him basic requirements, and
equipment such as writing notebook, ball pen, nightstick (baton) and /or radio. He shall endeavor at
all times to ment and be worthy of the trust and confidence of the agency he represents and client
he serves.

Rule XIII, Section 6 Powers and Duties

General Orders
1. To take charge of his post and all companies property in view and protect / preserve the same with
utmost diligence.
2. To walk during tour of duty in military manner, keeping always in the alert and observing
everything that takes place within sight or hearing.
3. To report all violations of orders I am instructed to enforce.
4. To repeat all calls from post more distant from the guardhouse where I am station.
5. To quit my post only when properly relieved.
6. To receive, obey and pass out to the relieving guard all order from company officers or officials,
supervisors post in charge or shift leaders.
7. To talk to one except in the line of duty.
8. To sound or call the alarm in case of fire or disorder
9. To call the superior officer in any case not covered by instruction.
10. Top salute all company officials, superiors in the agency, ranking public officials and commission
officer of the AFP and officers of the PNP.
11. To be especially watchful at night and during the time of challenging to challenge all persons on or
near my post and to allow no one to pass or loiter without proper authority.

You might also like