0% found this document useful (0 votes)
11 views11 pages

Handouts Lea Part 2

Uploaded by

Zaeed Hbo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views11 pages

Handouts Lea Part 2

Uploaded by

Zaeed Hbo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

NURSING*RADTECH*DENTISTRY*CRIMINOLOGY*MIDWIFERY*MEDTECH

LET*PSYCHOMET*RESPIRATORY THERAPY*CIVIL SERVICE*NAPOLCOM


NCLEX*DHA*HAAD* PROMETRIC* UK-CBT

LEA 2: INDUSTRIAL SECURITY be grilled. or less than 14 feet from


MANAGEMENT the trees
! walls
Prepared By: Prof. Rodrigo Rosalia III ! roofs
! Third Line of Defense
A. TYPES OF SECURITY ! steel cabinets
! Physical Security – The broadest type of ! lacks
security that is concerned with the physical ! safes
measures designed to safeguard personnel and ! Vaults
prevent unauthorized access to equipment, ! Interior file rooms
facilities, materials, documents, and to protect
them from espionage, sabotage, damage or II. DIFFERENT ASPECT OF SECURITY
theft. A. PHYSICAL SECURITY
! Communication Security – The protection ! Physical measures are used to define,
resulting from the application of various protect, and monitor property rights and
measures which prevent or delay the enemy or objects
unauthorized person in gaining information ! It is the sum total of all physical safeguards
through communication. This includes employed or installed to secure the assets.
transmission, cryptographic and physical
security. OBJECTIVES:
! Personnel Security – it involves the ! To protect the organization’s asset.
background checks of individual commensurate ! To make access so difficult that an intruder
with the security requirements. will not dare attempt penetration.
! Document Security- Protection of documents, ! To further strengthen the premises from
classified matters and vital records from loss, criminal attack by denying ready access to
access to unauthorized persons, damage, theft interior premises in the event the exterior
and compromise through proper storage and barriers are surmounted by a determined
procedures. intruder.
! Industrial Security – A form of physical security
involving industrial plants and business PRINCIPLES OF PHYSICAL SECURITY
enterprises. This involves the safeguarding of ! The type of access necessary will depend
personnel, processes, properties and operation. upon a number of variable factors and may
! Bank Security – Is the protection resulting from be achieved in a number of ways.
the application of various measures which ! There is no impenetrable barrier.
safeguards cash and assets which are in ! Defense is depth - barrier after barrier
storage, in transit, and or during transaction. ! Delay should be provided against
! Hotel Security – Is the protection resulting from surreptitious and non-surreptitious entry.
the application of various measures which ! Each installation is different
safeguards hotel guests and their personal .
effects, hotel properties and functions in hotel 1. PROTECTIVE BARRIERS
restaurant, bars and clubs. ! Barrier – Any structure or physical device
! Personal Security – Involves the protection of capable of restriction, deterring or delaying
top-ranking officials of the government, visiting illegal access to an installation.
persons of illustrious standing and foreign ! Perimeter Barrier - A medium or structure
dignitaries. Also called VIP security. which defines the physical limits of an
! Operational Security – This involves the installation or area to restrict or impeded
protection of processes, formulas, and patents, access thereto. Any physical barrier used to
industrial and manufacturing activities from supplement the protection of an inside or
espionage, infiltration, loss, compromise or outside perimeter.
photocopying.
! Air Cargo Security – to minimize or to prevent,
loses of cargo during in transit, storage, or OBJECTIVES OF PERIMETER BARRIER
transfer. ! Outline the perimeter of the area to be
! School Security – Security involving not only secured;
facilities but also the students or pupils. ! Great Physical and Psychological deterrent
! Supermarket Security – Security involving the to unauthorized entry;
facility, merchandise and goods also to prevent ! Delay intrusion, thus facilitating
shoplifting to proliferate in the establishment. apprehension of intruders;
! Assist in more efficient and economical
B. THREE LINES OF PHYSICAL DEFENSE employment of guards and;
! First Line of Defense ! Facilitate and improve the control of
! Perimeter fences/barriers pedestrian and traffic.
! Guards at the gate.
! Second Line of Defense TYPES OF PHYSICAL BARRIERS
! Doors ! Natural Barrier - geographical features, such
! floors as rivers, lakes
! Windows – Less than 18 feet must ! Structural Barrier - man-made constructions,
such as fences and walls
Page 1 of
10
NURSING*RADTECH*DENTISTRY*CRIMINOLOGY*MIDWIFERY*MEDTECH
LET*PSYCHOMET*RESPIRATORY THERAPY*CIVIL SERVICE*NAPOLCOM
NCLEX*DHA*HAAD* PROMETRIC* UK-CBT

! Human Barrier - security guards and maintain on both sides of the perimeter barrier. It
employees of the establishment affords better observation and patrol movement.
! Animal Barrier – Animals are used in partially It should be cleared of anything that may provide
providing a guarding system like dogs and concealment or assistance to a person seeking
geese. an authorized entry.
! Energy Barrier – It is the employment of ! 20 feet or more between the perimeter
mechanical, electrical, electronic energy barrier and
imposes a deterrent to entry by the potential exterior structure. (Outside)
intruder. ! 50 feet or more between the perimeter
barrier and structure within the protected
TYPES OF PERIMETER BARRIER areas.(Inside)
! Solid Fence – This is a kind of fence that
is constructed in such a way that visual ADDITIONAL PROTECTIVE BARRIERS
access through the fence is denied from ! Top Guard – an additional overhead of
the intruders. barbed wire placed on vertical perimeter
! Full View Fence – This is a kind of fence fences fencing upwards and outward with a
that provides visual access through the 45* angle with three to four strands of
fence. barbed wires spread 6” apart.
! Guard Control Stations – normally
TYPES OF FULL VIEW FENCE provided at main perimeter entrances to
A. Chain Link Fences (Permanent Structure) secure areas located out of doors, and
Specifications manned by guards on a full time basis.
! Must be constructed in 7 feet material ! Tower/Guard Tower – house-like
excluding the top guard structures above the perimeter barriers. It
! Must be of 9 gauge or heavier gives a psychological effect to violators.
! Mesh opening must not be larger than 2 ! Protection in Depth – in large open areas
inches or ground where fencing or walling is
! Securely fastened to rigid material or impracticable and expensive, warning signs
reinforced concrete should be conspicuously placed.
! Reach within 2 inches of hard ground or ! Signs and Notice – “control signs” should
paving be created necessary in the management of
! On soft ground, it must reach below surface unauthorized access, and prevent
deep enough to compensate for shifting soil accidental entry. Signs should be plainly
or sand. visible and legible from any approach and
in under language. Signs on entry shall also
B. Barbed Wire Fences (Semi-Permanent) be posted at all principal entries.
Specifications 2. PROTECTIVE LIGHTING
! Standard barbed wire is twisted double ! It must produce sufficient light to create
strand, 12 gauge wires, with 4 point barb psychological deterrent to intrusion as well
spaced on equal distant part. as to make detection virtually certain in the
! Barbed wire fencing should not be less than event an entry is made
7 feet high, excluding the top guard. ! Protective lighting will designed either to
! Barbed wire fencing must be firmly affixed emphasize the illumination of the perimeter
to post not more than 6 feet apart. barrier and the outside approaches.
! The distance between strands will not ! The system must be reliable and designed
exceed 6 inches and at least one wire will with overlapping illumination to avoid
be interlock vertical and midway between creating unprotected area in the event of
posts. individual light failure.

C. Concertina Wire Fences (Least Permanent) TYPES OF PROTECTIVE LIGHTING


Specifications ! Stationary Luminary – This is a common type
! Standard concertina barbed is a consisting of series of fixed luminous flood a
commercial manufactured wire coil of high given area continuously with overlap.
strength steel barbed wire clipped together Commonly used in Entry gates of employees
at intervals to form cylinder. and vehicles.
! Opened concertina wire is 50 feet long and ! Glare-Projection Type- The intensity is
3 feet in diameter. focused on the intruder while the observer
guard remained in the comparative
TYPES OF PERIMETER BARRIER OPENING darkness. The lighting is toward of the
! Gates and Doors- It should be locked and approach of an entrance to an installation.
regularly checked by guards when not in active ! Controlled Lighting Type- The lighting is
use and controlled by guards; locks should be focused on the pile of items, rather than
change from time to time the back ground. The wealth of the lighted
! Sidewalk Elevator- These provide access to strip can be controlled and adjusted to suit
areas within the perimeter barrier and should be the security needs.
locked or guarded. ! Standby Lighting – This system is similar to
! Clear Zone – it refers to unobstructed area continuous lighting but it is turn on manually or
Page 2 of
10
NURSING*RADTECH*DENTISTRY*CRIMINOLOGY*MIDWIFERY*MEDTECH
LET*PSYCHOMET*RESPIRATORY THERAPY*CIVIL SERVICE*NAPOLCOM
NCLEX*DHA*HAAD* PROMETRIC* UK-CBT

by special device or other automatic means. ! These different alarms of various types and cost
! Moveable Lighting – This consist of stationary can be installed indoors and outdoors.
or portable, manually operated searchlights. ! Basically alarms system is designed to alert
The searchlights may be lighted continuously security personnel for possible intruder.
during the hours of darkness nor only as ! It is used to assist security to complement if not
needed, it is just a supplementary to other supplement physical barriers is an array of
protective or security Lighting. alarms.
! Emergency Lighting- This standby lighting
may be utilized in the event of electric failure, TYPES OF ALARMS SYSTEM
either due to local equipment or commercial A. Metallic Foil or Wire
failure. ! It will detect any action that moves or break the
foil or wire.
TYPES OF LIGHT LAMPS ! It is commonly used in window or glass surfaces
! Incandescent Lamps- These are common of building or compound, all possible point of
light bulbs that are found in every home. They entry can be wired by using electrically charge
have the advantage of providing instant strips of tinfoil or wire.
illumination when the switch is thrown and most B. Photoelectric or Electric Eye Device
commonly used protective lighting system. ! A light beam is transmitted at a frequency of
! Gaseous-Discharge Lamp- The use of this in several thousand vibrations per second.
protective lighting is limited since they require a ! It is connected by a wire to control station and
period of two to five minutes to light when they when an intruder crosses the beam he breaks
are cold and even longer period to light, when the contact with the photoelectric coil which
hot, after a power interruption, it is very thus activates the alarm.
economical to use but for industrial security it is C. Audio Detection Device
not acceptable due to long time of lighting. ! It is a supersensitive microphone speaker
! Mercury Vapor Lamps- These lamps give sensor that is installed in walls, ceilings, and
ablue green color light due to the presence of floors of the protected area.
mercury vapor. Its initial cost is higher than ! Any sound caused by attempted forced entry is
incandescent lamps of the same wattage but detected by file censor.
is more efficient and giver more light. This is D. Vibration detection device
widely used in interior and exterior lighting. ! The vibration-sensitive sensor is attached to
! Sodium Vapor Lamp- These lamps emits walls, ceilings or floors of the protected areas.
Yellow Light. It is an efficient bulb and due to ! Any vibration caused by attempted force entry
its color, these light lamps are used in areas is detected by the sensor.
where insect predominate. Amber color does E. Magnetic Door Contact
not attract insects at night. ! It is a protective device usually placed in the
! Quarts Lamp- These lamps emits very bright door, and window that can send notification
white light and instant on almost as rapidly as when the opening and closure occurs
the incandescent lamp. They are frequently F. Passive Infrared Detector (PIR) or Motion
used at very high wattage and they are Sensor
excellent for use along the perimeter barrier. 1. PIRs are able to distinguish if an infrared
emitting object is present by first learning the
TYPES OF LIGHTING EQUIPMENT ambient temperature of the monitored space
! Floodlights - projects light in a concentrated and then detecting a change in the temperature
beam. Best used in boundaries, building or caused by the presence of an object.
fences. Otherwise known as reflectorized or
spotlight. TYPES OF BANK ALARMS
! Searchlights - highly focused incandescent A. Foot Rail Activator
lamps used in pinpointing potential intruders ! They are place on the floor in such a
! Fresnel Lights - Wide beam unit, primarily to position that tellers may activate the alarm
extend the illumination in long horizontal strips by placing the front of their foot engage the
to protect the approaches to the perimeter. It activation bar.
projects a narrow, horizontal beam which is B. Bill Traps
approximately 180 degrees in the horizontal ! It is also known as Currency Activation
and 15 to 30 degrees in the vertical plane. devices which are usually place in the
! Street Lights - produced diffused light rather tellers top cash drawer and connected to
than direction beam. They are widely used in the alarm system using a wire connector
parking areas ! When currency is removed from the
devices, the alarm is activated.
AREAS TO BE LIGHTED C. Knee or Thigh Buttons
1. Vehicular Gates ! It is installed inside the deck or teller
2. Pedestrian Gates station so they can be activated by knee or
3. Thoroughfares thigh pressure.
4. Parking Areas ! They are commonly found in location
5. Sensitive Areas where personnel usually perform their
duties from a seated position.
3. PROTECTIVE ALARM D. Foot Button
Page 3 of
10
NURSING*RADTECH*DENTISTRY*CRIMINOLOGY*MIDWIFERY*MEDTECH
LET*PSYCHOMET*RESPIRATORY THERAPY*CIVIL SERVICE*NAPOLCOM
NCLEX*DHA*HAAD* PROMETRIC* UK-CBT

! Like the foot rails it permits alarm activation electronic device designed to prevent entry into
in relatively safety while both hands remain building, room, container or hiding place, and to
clear in view of the robbers. prevent the removal of items without the consent
of the owner.
E. Double Squeeze Button Padlock – A portable and detachable lock having
! It requires pressure on both side of the or sliding hasp which passes through a staple ring
device and therefore the probability of or the like and is then made fast or secured.
accidental alarm is reduced.
TYPES OF LOCKS
TYPES OF PROTECTIVE ALARM SYSTEM Warded Locks
1. Central Station System ! The underlying principle is incorporation of
! A type of protective alarm where the wards or obstructions inside the lock to prohibit
central station a key from operating the bolt unless the key
located outside the installation. has corresponding notches cut in it that it will
! It can be located in agency and the pass the wards.
installation is one of the subscribers. ! It offers very little security, this type of lock
! When alarm is sounded, central station must therefore be use only to have privacy, but
notifies police and other agency. not to provide degree of security.
! A system in which the alarm signal is Disc Tumbler Locks
relayed to remote panel located at the ! Also known as wafer tumbler type, has flat
facilities of private owned protection metal tumblers with open center fitted into lock
Service Company manned by its case
personnel. ! It is commonly designed for automobile industry
2. Proprietary System and is in general use in car doors today
! It is the same as the central station system because this lock is easy and cheap to
except that it is owned by, operated and manufactured
located in the facility ! The delay afforded is between 7 to 10 minutes.
! It is located inside the industrial firm itself Lever Lock
with a duty operator. ! This lock is used in safe deposit boxes and is
! Response to all alarms is by facility’s own for all purposes.
security or fire personnel, since this system ! The least of this lock are used in desks, lockers
is monitored locally, the response time to and cabinets and are generally less secure
an alarm is reduced. than pin tumbler lock.
3. Auxiliary System Pin tumbler Lock
! In this system installation circuits are led ! The pin tumbler mechanism depends for its
into local police or fire department by lease security, on a number of round pin or tumblers
telephone line operating on a cylinder.
4. Local Alarm by chance System Combination Locks
! This is a local alarm in which a siren or bell ! A lock that requires manipulation of dials
is sounded with no predicable Response. according to a predetermined combination
! These systems are used in residence or code of numbers or letters
small establishment which cannot afford a ! Most of these locks have three dials but some
respond system. locks have four dials for greater security.
! The hope is that a neighbor or passing Code-Operated Locks
patrol car will reach the alarm and call for ! They are open by pressing a series of
police assistance. numbered buttons in the proper sequence.
5. Dial Alarm System ! Some of them are equipped of alarm if wrong
! This system is set to dial a predetermined sequence is pressed. These are high security
number when the alarm is activated. The locking device
numbers selected might be the police Card-Operated Locks
station or others. ! Coded card notched, embossed or containing
! When the phone is answered, a recording an embedded pattern of copper flocks.
state that an intrusion is in progress at the ! These are frequently fitted with a recording
location alarmed. device which register time and identify the user.
4. PROTECTIVE LOCKS 5. KEY CONTROL
! Locks are one of the most widely used ! Key control – is the management of keys in
physical security devices in the protection of a plant or business organization to prevent
facilities and activities, personnel and unauthorized individual access to the keys.
information, and government, business and ! Maison Key System – keying system that
personal property. permits a lock to be opened with a number of
! Locking Device is simply mechanism that unique, individual keys. Maison key systems
extends the door and window into the wall that are often found in apartment building
hold them. If therefore, the wall or the door common areas, such as main entrance or a
itself is weak or easily destructible, the lock is laundry room where individual residents can
not effective. use their own apartment key to access these
Lock – A mechanical, electrical, hydraulic, or areas.
Page 4 of
10
NURSING*RADTECH*DENTISTRY*CRIMINOLOGY*MIDWIFERY*MEDTECH
LET*PSYCHOMET*RESPIRATORY THERAPY*CIVIL SERVICE*NAPOLCOM
NCLEX*DHA*HAAD* PROMETRIC* UK-CBT

resistance container usually a part of the


METHODS FOR EFFECTIVE KEY CONTROL building structure used to keep and protect
! Key cabinet – A well constructed cabinet will cash, documents and negotiable instruments.
have to be of sufficient size to hold the ! It is bigger than safe but smaller than File
original key to every lock in the system and it Room.
should be secured at all times.
! Key Record – Some administrative means Specifications of Vault
must be set up to record code numbers. 1. Doors should be 6 inches thick made of
Indicate to whom the keys to specific locks steel
have been issued. 2. Walls, ceilings and floor should be 12 inches
! Inventories – Periodic inventories will have thick
to be made of all duplicate and original keys 3. Floor should be elevated by 4 inches
in the hands of the employees whom they 4. Not more than 5,000 cubic feet in size
have been issued. 5. Vault door must be fire-resistive up to 4 to 6
! Audits – In addition to periodic inventory an hours
unannounced audit should be made of all key
control records and procedure by a member File Room
of management. ! A cubicle in a building constructed a little
! Daily report – It should be made to the lighter than a vault but bigger size
person responsible for key control. ! I can accommodate limited people to work on
the records inside.
TYPES OF KEY
Change key Specifications of File Room
! A key to single lock within a master keyed 1. Should be 12 feet high
system. 2. Interior cubage should not be more than
Sub-Master Key 10,000 cubic feet
! A key that will open all the locks within a 3. Water-tight door, fire-proof for 1 hour
particular area or grouping in a given facility.
Master Key SOME TEST FOR FIRE RESISTANCE
! A special key capable of opening a series of ! Fire Endurance Test – A safe should not
locks. have any one time a temperature 350 0F.
! This key is capable of opening less number of ! Explain Hazard Test – test to determine if the
locks than the grand master key. sudden rise in temperature will not cause the
Grand Master Key safe to rupture. If the safe can withstand 2000
0F for 30 minutes without cracking or opening
! A key that will open everything involving two or
more master key groups. then it has passed the test.
! This key is relatively rare, but might be used ! Fire and Impact Test- Its objective is to
by a multi- premises operation in which determine the strength of a safe to resist the
location was master keyed while the grand collapse of a building during fire.
master key would function on any system.
7. PERSONNEL
6. PROTECTIVE CABINETS IDENTIFICATION AND
! The final line of defense at any facility, every MOVEMENT CONTROL
facility will have its own particular need, but
PASS/BADGE SYSTEM
certain general observations apply.
! A pass or badge is issued by security for
! The choice of proper security cabinet for
personnel to be
specific application is influenced largely by the
admitted in the installation.
value and the vulnerabilityof the items to be ! The purpose of this is to insure that only those
stored in them.
persons who have the right and authority will
be given the necessary access to the area.
TYPES OF SECURITY CABINET ! The pass system is for general use and not for
Safe
the restricted areas like exclusive, limited or
! Metallic container used for the safekeeping of controlled areas.
documents or small items in an office or
installation.
TYPES OF PASS SYSTEM
! Safe can be classified as both robbery and
! Single Pass System- In which the badge or
burglary resistance depending upon the use
pass coded for authorization to enter specific
and need. areas issued to an employees who keeps it in
the possession until his authorization is
Specifications of Safe
change or until he terminates.
1. At least 750 lbs or below 750 lbs must be
! Pass Exchange System- Which he exchange
anchored to building structure.
one-color coded pass at the entrance to the
2. 1 inch thick steel.
controlled area is issued to an employee who
3. Door should be 1 1/2 thick steel.
keeps it in his possession until his
authorization or until he terminates.
Vault
! Multiple Pass System- Multiple copies of
! Heavily-constructed fire and burglar
Page 5 of
10
NURSING*RADTECH*DENTISTRY*CRIMINOLOGY*MIDWIFERY*MEDTECH
LET*PSYCHOMET*RESPIRATORY THERAPY*CIVIL SERVICE*NAPOLCOM
NCLEX*DHA*HAAD* PROMETRIC* UK-CBT

passes are issued to an individual with the is a type of BI which is more


same photograph. The individual exchange his comprehensive, particularly all the
badge for another color or markings at the circumstances of his personal life.
entrance. Once inside, if he needs to enter a ! Partial Background Investigation-
restricted area, he exchanges it for another investigation of the background of the
color acceptable in that area. individual but limited only to some of the
circumstances of his personal life.
RESTRICTED AREA Security Clearance – It is a certification by a
! It refers to an area in which personnel or responsible authority that the person described is
vehicles are controlled for reasons of security. cleared to access and classify matters at
! It is established to provide security for appropriate levels.
installation or facilities and to promote 1. Interim Clearance – Effectivity Two Years
efficiency of security operations and economy 2. Final Clearance – Effectivity Five Years
in the use of security personnel.
SECURITY EDUCATION PROGRAM
TYPES OF RESTRICTED AREA ! A program given to employees of an
! Controlled areas- access is restricted to installation by lecture and other means
entrance or movement by only authorized pertaining to measures and safeguards to be
personnel and vehicles. taken to protect the interest of the installation
! Limited Area - It is a restricted area in which from loss, damage, sabotage, pilferage, and
lesser degree of control is required than in an other criminal acts.
exclusion area but which the security interest ! The basic goal is to acquaint all the
would be compromised by uncontrolled employees the justification behind the
movement. security measures and to insure cooperation
! Exclusion Area – It refers to a restricted area at all times.
which contains a security interest to TOP
SECRET importance and which requires the PHASES OF SECURITY EDUCATION
highest degree of protection. The area should 1. Initial Interview
be under surveillance at all times. 2. Training Conference
3. Refresher Conference
B. PERSONNEL SECURITY 4. Security Reminders
! Personnel Security is the sum total procedures 5. Security Promotion
followed, inquiries conducted and criteria 6. Special Interview
applied to determine the work suitable to a 7. Debriefing
particular applicant or the retention or transfer
of a particular employee. C. DOCUMENT AND INFORMATION SECURITY
! Its purpose is to insure that a firm hires those ! The loss of document and information cost
employees best suited to assist the firm in billions of pesos.
achieving its goals and ones hired assist in ! The importance of document and information
providing the necessary security to the security is not realized until after a loss has
employees while they are carrying out their been discovered in many instances one that
duties. has already cause irreparable damage.
! For this reasons comprehensive document
Personnel Security Investigation – is an and information security program is vital to
inquiry into the character, reputation, operating.
discretion, integrity, morals and loyalty of an
individual in order to determine a person’s INFORMATION CYCLE
suitability for appointment access to classified ! Creation - Information is discovered and
matter. develops.
! Use - Some action is taken with the information.
TYPES OF PSI ! Storage/Retrieval –for future use
1. National Agency Check- It consists of LAC ! Transfer- Transferring of information from
supplemented by investigation of the records active to inactive use.
and files of the following agencies: PNP, ! Disposition- Decision may be made to retain
ISAFP, NBI, CSC, Bureau of Immigration and the information indefinitely at either an active
Deportation and other agency. or an inactive storage center or to dispose it.
2. Local Agency Check- Refers to the
investigation of the records and files of agency TYPES OF DOCUMENTS
in the area of principal residence of the ! Class I – Vital Documents- In this category
individual being investigated like Mayor, these are records that are irreplaceable; records
Police, Fiscal, Judge. of which reproduction does not have the same
3. Background Investigation – a check made value as the original.
on an individual usually seeking employment ! Class II – Important Documents- This includes
through subjects records in the police files, records, the reproduction of which will close
educational institutions, place of residence, considerable expense and labor, or
and former employers. considerable delay.
! Complete Background Investigation- it ! Class III – Useful Document- This include
Page 6 of
10
NURSING*RADTECH*DENTISTRY*CRIMINOLOGY*MIDWIFERY*MEDTECH
LET*PSYCHOMET*RESPIRATORY THERAPY*CIVIL SERVICE*NAPOLCOM
NCLEX*DHA*HAAD* PROMETRIC* UK-CBT

records whose loss might cause inconvenience inability to resist


but could b readily replaced and which would not the unexpected opportunity and has little fear of
in the meantime present an insurmountable detection.
obstacle 2. Systematic Pilferer – steals with preconceived
! Class IV – Non-essential Documents- These plans and takes away any or all types of items or
records are daily files, routine in nature even if supplies for economic gains.
lost or destroyed, will not affect operation or
administration. This class represents the bulk of SECURITY SURVEY
the records which should not be attempted to ! It is a critical, on-site examination and
protect. analysis of an industrial plant, business, and
name of public or private institution to
III. RISK ANALYSIS AND SECURITY HAZARD ascertain current security status deficiencies
Security Hazards – act or condition, which results or excesses
in a situation like a breach of the protection system ! To determine what protection is needed and
and the subsequent loss or compromise of defense to make recommendations from improving
information, company secret or damage to the over-all level of security at that location.
personnel, property or facilities.
KINDS OF SECURITY HAZARDS PURPOSE OF SECURITY SURVEY
! Human Hazard – is the act or condition ! To determine existing state of security;
affecting the safe operation of the facility caused ! To locate weaknesses in defense;
by human action, accidental or intentional, this ! To determine degree of protection required
type of hazard is the result of a state of mind, and;
attitude, weakness, or character traits on the ! To produce recommendations establishing
part of one or more persons, like sabotage, a total security program.
espionage, pilferage, theft, etc.
! Natural Hazard – is the act or situation caused SECURITY INSPECTION
by natural phenomenon, like floods, typhoons, ! It is the process of conducting physical
earthquakes, etc. but there are many measures examination to determine compliance with
and techniques which may be employed to establishment security policies and procedures
reduce their effects in establishment, plants or as a result of security survey.
installation.
SECURITY PLANNING
EXTENT AND DEGREE OF RISKS TO SECURITY ! It is pre-determining a course of action;
WILL BE DEPENDENT ! It is deciding in advance what to do, how to do
! Relative Criticality of Operation – is the it, and who is to do it.
importance of firm with reference to the national
economy and security GOALS OF SECURITY PLANNING
! Relative Vulnerability – is the susceptibility of ! To minimize effects of any incident upon plant
the plant or establishment to damage, loss or and personnel;
disruption of operation due to various hazards. ! To keep property and equipment loss at a
minimum;
THEFT/ PILFERAGE ! To ensure cooperation of all plant departments
! It is one of the most annoying and common charged with specific activities of an
human hazards. emergency;
! Security force has to concentrate a large ! To ensure appropriate cooperative action by
number of men to check this immoral and and with outside civic and government
disturbing activity. agencies.
! Petty pilferage is frequent hard to detect, difficult
to prove and win conviction but definitely risky to KEY STEPS IN PLANNING
ignore. ! Get in touch/coordinate with your Local Civil
Authorities. (Tie your programs with theirs and
PSYCHOLOGICAL EXPLANATIONS ON THEFT standardize equipment with them thus creating
! The need or desire - An individual may need or compatibility.);
desire to commit the act because of financial ! Visit neighboring Plants/offices (coordinate
problem, inadequate income, extravagant living, your activities with theirs.);
gambling. ! Survey your plant for possible hazards and
! The psychological needs (Kleptomania) - take immediate action to lessen or eliminate
irresistible urge to steal items of trivial value. them;
People with this disorder are compelled to steal ! Appoint a disaster Director or Disaster
things, generally, but not limited to, objects of coordinator;
little or no significant value. ! Early in the planning stage, present the
! The criminal tendency - The individual with Program to your Employees and enlist their
such tendency may be more tempted to steal if active support;
security control are inadequate. ! Call an organization meeting of Heads of
services, employee representatives and key
TYPES OF PILFERER personnel. (out line purpose of the program
1. Casual Pilferer – one who steals due to his and explain how the plant should organize for
Page 7 of
10
NURSING*RADTECH*DENTISTRY*CRIMINOLOGY*MIDWIFERY*MEDTECH
LET*PSYCHOMET*RESPIRATORY THERAPY*CIVIL SERVICE*NAPOLCOM
NCLEX*DHA*HAAD* PROMETRIC* UK-CBT

protection; Advantages of PSA


! Define the Program. ! Less expensive;
! Use is convenient;
IV.BRIEF HISTORY OF SECURITY IN THE ! Less administrative and personnel problems;
PHILIPPINES ! Agency assumes full responsibility for the
! The private security business began on March scheduling and supervising of all guard
1 1933 when the first formally licensed private personnel
security agency, "Special Watchman Agency", ! Can easily obtain extra guard if needed;
Started operations ! Agency easily usually accepts liability of civil
! Later, it was renamed "Jimenez security suits.
Agency", founded by brothers Juan and Pedro Disadvantages of PSA
Jimenez ! Lack of training, low caliber employee;
! On 30 May 1958, the Philippine Association of ! No loyalty to the company;
Detectives and Protective Agency Operations ! Large turnover
(PADPAO) was formally organized ! Not familiar with facilities
! RA 5487 was passed on 13 June 1969
through the continuous lobbying of the GOVERNMENT SECURITY- A security guard
incorporators and officers of PADPAO, which recruited and employed by the government
set the standards and minimum requirements
for the operations of security agencies UNIFORMS, EQUIPMENTS AND
! PD 11 was passed on 3 October 1972, PARAPHERNALIA
widening the co9verage of RA 5487 to include 1. Set of Uniforms for Security personnel:
security guards employed in logging ! Headgear – persing cap for men, 2 ply cap for
concessions, agricultural, mining and pasture woman
lands. ! Service bush jacket – intended for directorial
! PD 100 was issued on 17 January 1973, and staff officers
broadening the coverage of the security ! Service shirt
industry to include employees of the national ! Service trouser
or local government or any agency who are ! Service belt
employed to watch or secure government ! Footwear
building and properties. 2. Color of Uniforms
! On August 1969, the Philippines Constabulary ! PSA – navy blue – upper and lower
activated the Security and Investigation ! CSF – light blue/light gray upper – navy blue
Supervisory office or SIASO to supervise and lower
control the organization and operation of ! GSU – white upper-navy blue lower
private security and detective agencies 3. Ornaments and Patches
nationwide ! National badge
! Later, it was renamed Philippine Constabulary ! Cap Device
Supervisory Office for Security and ! Regulation Buckle
Investigation Agencies or PCSUSIA ! Collar device
! With the passage of RA 6975, this unit was ! Name cloth
absorbed by the Philippine National Police ! Agency/unit name cloth
! Later, it was made into a division of the PNP 4. Equipments and paraphernalia
Civil Security Unit and was renamed Security ! Leather pistol belt with regulation buckle
Agencies and Guards Supervision Division, or ! Holster, black leather for pistol
SAGSD ! Night stick (baton) with horizontal handle
! Whistle with lanyard
V. SALIENT FEATURES OF R.A. 5487 AS ! Hand held radio
AMENDED TYPES OF SECURITY GUARD ! Pocket notebook and ball pen

COMPANY SECURITY- A security guard recruited 11 GENERAL ORDERS


and employed by the company. ! To take charge of the post and all company
Advantage of CSF properties in view and protect/preserve the
! High caliber and receives higher salary; same with utmose diligence;
! Provides better service; ! To walk during tour of duty in a military
! Can be trained to handle some of the more manner, keeping always on the alertand
complex security duties; observing everything that takes place within
! More familiar with facilities they protect; sight or hearing;
! Tend to be more loyal with the company. ! To report all violations of order he is instructed
Disadvantage of CSF to enforce;
! May be required to join the union; ! To repeat all calls from posts more distant
! Cost more; from the guardhouse he is stationed;
! Problem of ensuring availability of back-up ! To quit his post only when properly relieved;
personnel. ! To receive, obey, pass on to the relieving
guard all orders from company officers or
PRIVATE SECURITY- A security guard hired by officials, supervisor, post-in- charge or shift
client belonging to private security agency. leaders;
Page 8 of
10
NURSING*RADTECH*DENTISTRY*CRIMINOLOGY*MIDWIFERY*MEDTECH
LET*PSYCHOMET*RESPIRATORY THERAPY*CIVIL SERVICE*NAPOLCOM
NCLEX*DHA*HAAD* PROMETRIC* UK-CBT

! To talk to no one except in the line of duty; ! All applicants for LTO shall be required to attend
! To sound or call the alarm in case of fire or a PSA and CSF operators and management
disorder; seminar workshop.
! To call the superior officer in any case not ! Prohibition on “Kabit Sytem” Operator.
covered by the instructions; ! No licensed security agency shall operate,
! To salute all company officials, superiors in promote and enter into an agreement of “merger”
the agency, ranking public officials and (kabit system) with any group of persons for the
commissioned officers of the AFP and PNP; purpose of organizing a branch unit or subsidiary
! To be especially watchful at night and during under separate control and ownership.
the time of challenging, to challenge all
persons on or near my post and to allow no D. BASIC QUALIFICATIONS OF SECURITY
one to pass or loiter without proper authority. GUARDS
! Filipino citizen;
A. AUTHORIZED PERSONS TO ORGANIZE ! High school graduate;
AND MAINTAIN A PRIVATE SECURITY ! Physically and mentally fit;
AGENCY AND PRIVATE DETECTIVE AGENCY ! At least 18 years of age but not more than
! Filipino citizen or corporation, association, 50 years old;
partnership; ! Has undergone pre-licensing course.
! 100% of which is owned and controlled by
Filipino citizen. E. MEMBERSHIP
No regular license shall be granted to any
B. BASIC REQUIREMENT OF AN OPERATOR PSA or CSF unless it has under its employ the
OR MANAGER OF AGENCY following number of duly licensed security guards
! Filipino citizen; ! For PSAs – a minimum of two hundred
! Not less than 25yrs of age; (200) and maximum of one thousand
! College graduate and/or a commissioned (1,000).
officer in the inactive service or retired from ! For CSFs – a minimum of thirty (30) and a
AFP or PNP, or graduate/taken a course in maximum of one thousand (1,000).
concepts and methods in Industrial Security
and Security Management and/or must have F. GRADUATED SCALE OF LICENSE FOR
adequate training or experience in security PSA/PDA
business; ! PSAs with 200-1000 guards – a regular license
! Good moral character not having been to operate good for two (2) years;
convicted of any crime involving moral ! New PSAs – a temporary license to operate
turpitude, and not suffering from any of the good for one (1) year;
following disqualifications: ! PSAs with temporary license to operate
! Having been dishonorably discharged or having posted one hundred (100) guards or
separated from the Armed Forces of the more but less than two hundred (200)
Philippines; guards shall, upon expiration of such
! Being a mental incompetent; license be issued an extension period to
! Being addicted to the use of narcotic drug or operate good for six (6) months.
drugs; and However, upon the expiration such six (6)
! Being a habitual drunkard. months extension period, no additional
extension of license shall be granted unless
C. LIMITATIONS, DISQUALIFICATIONS the PSAs concern shall submit a
AND PROHIBITIONS certification for the posting of at least an
! No person shall organize or have an interest in additional fifty (50) guards thereby
more than one agency. making a total of one hundred fifty (150) or
! Elective or appointive government employees, more guards.
who may be called upon on account of the ! PSAs with extended temporary license to
functions of their office in the enforcement and operate, shall upon expiration of such
implementation of this law, and any related license but still fail to comply the two
to such employee by affinity or consanguinity in hundred (200) guards requirement, be
the next 3rd civil degree, shall not hold an interest, granted additional extension of another six
directly or indirectly, in any security agency. (6) months period in order to complete the
! No agency shall offer, render, or accept services two hundred
in gambling dens or other illegal business (200) guards requirement for the issuance
establishments or enterprises. of a regular license to operate. Otherwise,
! The extent of the security guard service being failure to comply with the two hundred
furnished by the security agency shall not go guard’s requirement shall serve as a basis
beyond the compound and/or property of the for the issuance of a cease operation order.
person or establishment contracting the security ! License of PSAs with less than one
service except when the security guard is hundred (100) guards shall not be
escorting a huge amount of money or valuables. renewed after one (1) year of operation.
! Main/Branch offices- All agencies shall maintain ! PSAs with cancelled/revoked licenses shall
in other provinces or cities where the security cease to operate, and with seven (7) days
agency has deployed security guards. after having been duly notified of such
Page 9 of
10
NURSING*RADTECH*DENTISTRY*CRIMINOLOGY*MIDWIFERY*MEDTECH
LET*PSYCHOMET*RESPIRATORY THERAPY*CIVIL SERVICE*NAPOLCOM
NCLEX*DHA*HAAD* PROMETRIC* UK-CBT

cease operation order, shall immediately Industrial Security Administration or Law;


deposit all its firearms with the FEO. ! Must have at least ten (10) years
experience in the operation and
G. TENURE OF SECURITY PERSONNEL management of security business.
The tenure of security personnel shall be
co-terminus with the service contract between the L. LICENSE AND
PSA and the Client. However, services of any FEES Application
security personnel shall be terminated on the of Fees
following grounds: ! New applicants to operate shall be required
! Expiration of contract; to obtain a minimum capitalization of ONE
! Revocation of license to exercise profession; MILLION (P1, 000, 000.00) pesos with a
! Conviction of crime involving moral minimum bank deposit of FIVE
turpitude; HUNDRED THOUSAND (P500, 000.00)
! Loss of trust and confidence; pesos in
! Physical and mental disability; and order to start its business operations.
! Any other violation of the pertinent rules License to Operate
and regulations hereof. ! No person shall engage in the occupation,
calling or employment or engage in the
H. EXEMPTIONS FROM PRE-LICENSING business of PSA or PDA unless has a
TRAINING license to operate duly approved by the
! Holder of a Degree of Bachelor of Laws Chief, PNP or authorized representative.
! Holder of Degree of Bachelor of Science in ! All security agencies must be registered at
Criminology the Security and Exchange Commission
! Graduate of Criminal Investigation Course (SEC).
offered by NBI or any PNP training school. Surety Bond
! Veterans and retired military/police ! Agency with 1-199 guards – P 50,000.00
personnel or honorably discharged ! Agency with 200-499 guards –
military/police personnel possessing all the P100,000.00
qualifications mentioned in the preceding ! Agency with 500-799 guards –
section P150,000.00
! Agency with 800-1000 guards –
I. QUALIFICATIONS OF PRIVATE DETECTIVE P200,000.00
! In addition to those prescribed in Section 1 This bond shall answer for any valid and legal
of these Rule, possesses any of the claims against such agency filed by aggrieved
following: party.
! Holder of baccalaureate degree or
Bachelor of Laws; or M. USE OF FIREARMS
! Holder of a degree of Bachelor of Science ! Number of firearms shall not exceed one (1) for
in Criminology; or every two (2) Security Guard. (1:2)
! Graduate of a criminal investigation course ! NO PSA and CSFs unit shall be allowed to
offered by the then PC/INP or the PNP or possess firearm in excess of 500 units.
the NBI or any police training school or ! For Temporary licensed, one hundred (100)
detective training with guards, an initial of at least 30 licensed firearms.
authorized/recognized training/center for ! For regular licensed two hundred guards (200),
security guard. at least 70 pieces of licensed firearms.
! Advance ROTC/CMT graduate. ! High powered firearms are not allowed only
! Any officer or enlisted man of the AFP or shotgun not higher than 12 gauge and low
uniform member of the PNP honorably power rifles and revolvers such as cal .22, cal
discharged/separated or retired from the .38
service are exempted from the ! Total number of high powered Firearms that is
requirements of a private detective. authorized to possess in areas there is an
upsurge of lawlessness and criminality as
J. QUALIFICATION OF SECURITY OFFICER determined by authority, shall not exceed 10% of
! Filipino citizen; the total number of security guards.
! Holder of Baccalaureate degree; ! Firearms unit shall be carried only within its area
! Physically and mentally fit; of operation where he is task to guard except
! Has graduated from a Security Officer when escorting big amount of money or
Training Course; valuables outside his area of operation.
! Retired personnel of the PNP or AFP; ! PSA or CSF detailing their security personnel on
! Must not possess any of the duty while escorting big amount of money or
disqualifications enumerated in Section 2 valuable outside its jurisdiction shall issue an
of Rule II. appropriate
K. QUALIFICATION OF SECURITY DUTY DETAIL ORDER
CONSULTANT ! Confiscation of firearms shall be effected upon
! Holder of a Masters Degree in either the following circumstances:
Criminology, Public Administration, MNSA, ! When the firearm is about to used in the
Page 10 of
10
NURSING*RADTECH*DENTISTRY*CRIMINOLOGY*MIDWIFERY*MEDTECH
LET*PSYCHOMET*RESPIRATORY THERAPY*CIVIL SERVICE*NAPOLCOM
NCLEX*DHA*HAAD* PROMETRIC* UK-CBT

commission of a crime. TRAINING


! When the firearm is actually being used in the ! To enhance a highly professionalized security
commission of a crime. industry in the country.
! When the firearm just been used in the ! To upgraded the discipline, competence and
commission of a crime. efficiency of security guards.
! When the firearm being carried by the security ! To educate them on the importance of national
guard is unlicensed. and community security needs and prevention
! When directed by the court. losses.
! When the firearms is used or carried outside his
area of operation without proper authority. CLASSIFICATION AND DURATION PERIOD OF
! When a security guard does not possess any TRAINING
license to exercise his profession. ! Basic Security Guard Course (Pre-Licensing
! Illegal possession of Firearms- only firearms Training Course)- 150 Hours
licensed by the PSA CSF concerned shall be ! Re-Training Course- 48 Hours
used. ! Security Officers Training Course- 300 Hours
! Stocking of Ammunition- Basic load of firearms ! Basic Supervisory Course- 48 Hours
is fifty (50) rounds security guard shall be ! Security Supervisor Development Course
limited to one half of such basic load or twenty- ! Other Specialized Training Course
five (25) rounds for every security guard.
P. GROUNDS FOR CANCELLATION OF
N. SECURITY RANKS, POSITIONS, STAFFING SECURITY GUARD
PATTERN AND JOB DESCRIPTION LICENSE
1. Security Management Staff ! Assisting or protecting criminals during on or off
! Security Director (SD)-Agency Manager/Chief duty status;
Security officer- responsible for ! Providing confidential information to
the entire operation and unauthorized person;
administration/management of the security ! Posted security guard found drunk or drinking
agency and directly responsible to the agency intoxicating liquor; and
operator/owner/Board of Directors. ! Other similar acts
! Security Executive Director (SED) - Q. UTILIZATION OF AGENCIES DURING
Assistant agency manager/Assistant chief EMERGENCIES
security officer- automatically the security ! Powers of Mayors over the agencies in case of
executive director, assists the agency security emergency
director and takes operational and ! In time of disaster, disorder or calamity when
administrative management when the manager security services are required, the city or
is absent. municipal mayor may utilize security agencies to
! Security Staff Director (SSD) - Staff director help in maintenance of peace and order,
for operation and administration- The staff prevention of crime, or apprehension of criminal
director for operation is the staff assistant of the offenders and the protection of lives and
security manager for the efficient operations of properties within the area of such calamity.
the agency. He is also responsible for the ! The deputized security guard may receive direct
conduct of investigation and training. orders from the chief of police for the duration of
the emergency, disorder or calamity.
2. Line Leadership Staff ! Emergency Deputation
! Security Supervisor 3- Detachment ! In times of emergency, disorder or calamity,
Commander- the field or area commander of the C/PNP may deputize security guard to
the agency. assist the PNP members in the performance
! Security Supervisor 2-Chief Inspector- of their duties for the duration of the calamity.
responsible for inspecting the entire area
coverage by the detachment.
! Security Supervisor 1- Inspector- responsible
for the area assigned by the chief inspector or
the detachment commander.

3. Security Guard
! Security Guard 1- Watchman/Guard- person
posted as watchman or guard.
! Security Guard 2- Shift-in-Charge-
responsible for the security officer who are
scheduled in a certain shift for a particular
period.
! Security Guard 3—Post-in-Charge-
responsible for the entire detailed security
office with a certain establishment.

O. TRAINING SYSTEM AND ITS


DURATION PERIOD OBJECTIVES OF
Page 11 of
10

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy