Industrial Security Notes 1
Industrial Security Notes 1
- Generally, the meaning of security is a kind of state where people, institution, authority or groups feel fully secured of feeling,
free from any threat or vulnerability from somewhere or someone in his/her life, liberty, property or activity. It could be in physical,
psychological, social or economical form.
-It is a state or quality of being secured, freedom from fear or danger, assurance, certainty.
-It is the degree of protection against danger, loss, and criminals.
- Protection against any type of crime to safeguard life and assets by various methods and device.
1. Command Responsibility
-Cannot be delegated but the security tasks can be assigned.
2. Compartmentation
-Need to know basis
3. Balance between security and efficiency
-Security prevails over efficiency
4. General principles of security remain constant
-Specific measures to suit operations
5. Security is the concern of all personnel
-Regardless of rank, position, designation
TYPES OF SECURITY MEASURES FOR AN EFFECTIVE DEFENSE AGAINST CRIMES:
1.ACTIVE MEASURES – these involve the installation of physical s, security lighting, use of vaults, locks and others.
2.PASSIVE MEASURES – those that will deter man from committing such act of fear of being caught, charge in court or get
dismissed, such as: security education, programs, investigations, seminars, personnel security check.
TYPES OF SECURITY
1. PHYSICAL SECURITY
Definition
– a system of barriers placed between the potential intruder and the objects/matter to be protected. It is the broadest
branch of security, which is concerned with physical measures adopted to prevent unauthorized access to equipment, facilities,
materials and documents and to safeguard them against espionage, sabotage, damage and theft.
OBJECTIVES:
a. To protect the organization’s asset;
b. To make access so difficult that an intruder will not dare attempt penetration.
CONCEPTS:
a. Enemy agents will always seek access;
b. Surreptitious entry is the greatest hazard to security;
c. There are no impenetrable barriers;
d. Each installation is different.
FACTORS THAT BRING INSECURE CONDITION:
1. Threat
– An indication of impending danger or harm;
- positive inimical acts
2. Hazard
– A chance of being injured or harmed;
-passive inimical acts
3. Vulnerability
– inability to withstand the effects of a hostile environment
-measure of how open an establishment to intrusion, attack or injury
4. Risk
– is the potential that a chosen action or activity (including the choice of inaction) will lead to a loss (an undesirable
outcome).
-probability of an event to happen that will lead to loss.
SECURITY HAZARD
An act or condition which results in a situation conducive to a breach of the protection system and the subsequent loss or
compromise, or damage to personnel, property or facilities.
KINDS OF HAZARDS
1. Man –Made Hazards – an acts or conditions affecting the safe of operation of the facility caused by human action,
accidental or intentional. It includes sabotage, espionage, pilferage and theft.
2. Natural Hazard – cause by natural phenomena which cause damage, disturbance and problems of normal functioning
activities, including security. It includes flood, lighting, storms and volcanic eruptions.
1. FIRST LINE OF DEFENSE – Perimeter barrier/fences - a medium or structure which defines the physical limits of an
installation or area to restrict or impede access thereto.
2. SECOND LINE OF DEFENSE – Doors, floors, windows, walls, roofs and grills.
3. THIRD LINE OF DEFENSE – Storage system like steel cabinets, safes, vaults and interior files.
TYPES OF FENCES
1. SOLID FENCE – Constructed in such away that visual access through the fence is denied. Its advantage is that it denies the
opportunity for the intruder to become familiar with the personnel, activities and the scheduled movements of the security
personnel. On the other hand, it prevents the guards from observing the area around the installation and it creates shadow that
may be used by the intruder for cover and concealment.
WALL – Masonry wall should have the same as the chain linked and surrounded by the barbed wire as top guard.
2. FULL VIEW FENCE – It is constructed in such a way that visuals access is permitted through the fence. Its advantage is that it
allows the security personnel to keep the surrounding of the installation under observation. On the other hand, it allows the intruder
to become familiar with the movements the security personnel.
2. BARBED WIRE FENCE - is a type of fencing wire constructed with sharp edges or points arranged at intervals along the
strand(s). It is used to construct inexpensive fences.
3. Concertina Wire or Dannert Wire – is a type of barbed wire or razor wire that is formed in large coils which can be expanded
like a concertina.
-Opened concertina wire is 50 feet long and 3 feet diameter.
PROTECTION IN DEPTH
-In large open areas or ground, where fencing or walling is impracticable and expensive, warning signs should be conspicuously
placed.
- The depth itself is protection.
6. Signs and Notices – erected where necessary in the management of unauthorized ingress and preclude accidental entry.
SECURITY LIGHTING
Provides sufficient illumination to areas during hours of darkness.
2. Standby Lighting – similar to continuous lighting but can be turned on manually or by special device or other automatic means,
when there is a suspicion of entry.
3. Emergency Lighting – stand by lighting which can be utilized in the event of electrical failure.
PROTECTIVE ALARMS
Is an aural or visual signal given by the annunciator to the security when intruder actuate certain devices in a protected
area. An annunciator is a visual or audible signaling device, which initiates conditions of associated circuits.
Basically, alarm system are designed to alert security personnel of a attempted or consummated intrusion into an area,
building or compound. Each type of alarm is activated in the event that an intruder tampers with the circuitry, a beam or radiated
waves. Alarm are also for fire, smoke, or other emergencies and presence of hazards.
3. Signal
- The actual alarm may be audible or silent, a bell, buzzer, phone ringing, or flashing of light.
FIRE PROTECTION
FIRE ALARM - - Any visual or audible signal produced by a device or system to warn the occupants of the building or fire fighting
elements of the presence or danger of fire to enable them to undertake immediate action to save life and property and to suppress
the fire.
DEVICES
1. Smoke Detector - a device placed at the ceilings of the floor that detects smoke, typically as an indicator of fire.
2. Fire Bell -a hollow device made of metal that makes a ringing sound.
AUTOMATIC SPRINKLER – a type of built in sprinklers which works by the increase of room temperature and which automatically
operates the system to put out the fire. Attached and distributed in the ceiling of the rooms. These sprinklers will go into action
once a fire starts, and those that will open are those that are directly above the fire and water is delivered where it is needed.
STAND PIPES
G.I. steel or plastic pipes located inside the building from the lowest to the top floor with water under pressure for use in case of
fire. Located near the standpipe is a fire hose usually enclosed in a glass box.
FIRE HYDRANT
It is a mechanical device strategically located in an installation or in a street where a fire hose will be connected so that the water
will be available to extinguished a fire.
FIRE EXTINGUISHER
Is a fire fighting equipment which can is a fire fighting equipment which can be portable or in cart that is used to put out fire
depending on the contents to extinguish certain types of fire.
PROTECTIVE LOCKS
LOCK – defined as mechanical, electrical, hydraulic or electronic device designed to prevent entry to a building or room.
Type of Locks
1. Key – Operated Lock
- It uses some sort of arrangement of internal physical barriers which prevent the lock from operating unless they are properly
aligned. The key is the device used to align these internal barriers so that the lock may be operated. fe
PADLOCK – a portable and detachable lock having a pivoted or sliding hasp which possess through a staple ring, or the like and
is made fast or secured.
2. COMBINATION LOCK – a lock that requires manipulation of parts according to a predetermined combination code of numbers.
3. CARD OPERATED LOCK/CODED LOCK – type of lock that can be opened by inserting a coded card in a slot in the lock, or
by pushing the correct button on the surface of the lock.
4. ELECTRONIC LOCK – type of lock that can be closed and opened remotely by electronic means.
BIOMETRICS
- A machine that can be used for identification of humans by their characteristics or traits.
- It is used as a form of identification and access control.
- It is equipped with recording device that can identify the person operating the lock and the time it was operated.
KEY CONTROL
– defined as the management of keys in a plant or business organization to prevent unauthorized individual access to the keys.
PETERMAN
-A term used in England for lock picker, safecrackers, and penetrators of restricted areas or rooms.
FALSE KEY
- Genuine key stolen from the owner
HUMAN BARRIER
Security guard – Is any natural person who offers or renders personal service to watch or guard residential or business premises
or both, government and/or their premises for hire and compensation.
Security Supervisor – Is charged with directing the work and observing the behavioral performance of the guard under his unit.
PERSONNEL SECURITY
- refers to the procedure followed, inquiries conducted, and criteria applied to determine the work suitability of a particular
applicant or the retention of a particular employee.
PURPOSE
1. To ensure that hired employees are best suited to assist the organization in achieving its mission and vision;
2. To assist in providing the necessary security to the employees while they carry out their functions.
PERSONNEL SECURITY INVESTIGATION (PSI) It is an inquiry into the character, reputation, discretion, integrity, morals,
and loyalty of an individual in order to determine a person’s suitability for appointment or access to classified matter.
TYPES OF PSI
1. National Agency Check
2. Local Agency Check
3. Partial Background Investigation
4. Complete Background Investigation
BACKGROUND INVESTIGATION (BI) – It is an inquiry which aims to verify applicant’s information written at the applicants form,
to ascertain his/her past employment experiences and to obtain other information pertinent to the decision to employ.
INVESTIGATIVE COVERAGE
1. Prior Employment;
2. Claimed education;
3. Claimed residence for the period covered in the employment and educational institutes;
4. If the candidate indicates a criminal record, then the details should be checked.
INVESTIGATIVE STANDARDS
1. Information sought should be relevant;
2. Information should be reliable;
3. If unfavorable, the information should be confirmed by at least two sources.
SECURITY EDUCATION
It is defined as the exposure and teaching of employees on security and its relevance to their work. Security education is
conducted to develop security awareness among employees of the company. It should cover all employees, regardless of rank or
position.
PERSONAL SECURITY
Protection of personnel especially ranking official from any harm, kidnap, and others act. VIP security is type of personnel
security;
POLICE SECURITY PROTECTION GROUP (PSPG) - is mandated by law to provide protective security to government officials,
foreign dignitaries, and private individuals authorized to be given protection and also provide physical security to vital installations,
and assist the Presidential Security Group (PSG) in securing the President and the members of the First Family.
PROTECTIVE CUSTODY – state or quality of being secured or freed from danger. It may also includes the various means or
device designed to guard a persons and property against a broad range of security hazard.
THREAT – is an indication of something impending and usually undesirable or unpleasant, with an intention to inflict evil, injury or
damage on another, usually as retribution or punishment for something done or left undone. It is an expression of an intention to
inflict loss or harm on another by illegal means, and especially by involving coercion or duress over the person or his welfare.
THREAT ASSESSMENT – the process of investigation/validating the truthfulness of the existence of threat to an individual.
EMERGENCY SITUATION – condition or state that danger has already occurred which resulted to loss of life/liberty and/or there
is imminent danger or threat to life and property where delay will endanger or may cause the loss of life/property.
INSIDERS
An insider is the term used to refer to staff or contractors who tries to use their legitimate access in the organization's
assets for unauthorized purposes.
Innocent insider
An employee, who causes damage to an organization through carelessness or ineptitude, is not an area of focus because
measures put in place to prevent deliberate insider activities should also guard against the accidental acts.
CONTROLLING EMPLOYEE ACCESS -Organizations often focus external threats without giving similar consideration to the
threat from possible insiders'. This section considers a range of measures which can prevent or minimize the risk of individuals
with legitimate access engaging in insider activities.
It is important that any employee access controls used by an organization are proportionate to the scale and nature of the threats
faced.
SECURITY PASS
Many organizations or corporations within the national infrastructure will encourage staff to wear security passes, which
also permit entry to their premises.
If passes are used to distinguish between different levels of employee clearance or access it may be worth considering
how easily these can be identified. One option is to color code each pass according to the access rights of the holder.
SECURITY SURVEYS
A physical security survey is an in-depth analysis to determine the extent of security measures, which will be needed for
protecting the personnel, property, and information.
A security survey is to identify the risk present at the facility and make recommendations for the reasonable reduction of
this exposure in a cost-effective manner as possible.
SECURITY SURVEY
- A fact finding probe to determine a plant’s adequacy in all aspects of security, with the corresponding recommendations.
- Refers to checklist, audits, or inventories of security conditions.
- Security Surveys are often called ‘RISK ANALYSIS SURVEYS’ or ‘RISK ASESSMENT SURVEYS
The survey should be undertaken by either suitably trained staff security personnel, or a fully qualified independent security
specialist.
No universal checklist can be applied to all sites for survey purposes, as no two facilities are alike.
After completing the survey an immediate review of the findings should be undertaken with the plant supervisor so that urgent
deficiencies can be addressed.
> A follow-up survey should always be conducted to ensure improvements
> Any survey report including lists of recommendations is incomplete without including a cost-benefit analysis, which is ;
“ a direct comparison of the cost of operation of the security unit and all the existing security measures with the amount of the
corporate assets saved or recovered as well as reduction of losses caused by injuries and lost production and recommendations
have been made”.
PLANNING
-Process of developing methods or procedures or an arrangement of parts intended to facilitate the accomplishment of a definite
objective.
-The process of setting goals, developing strategies, and outlining tasks and schedules to accomplish the goals.
SECURITY PLANNING
▪ It is PRE-DETERMINING a course of action;
▪ It is deciding IN ADVANCE what to do, how to do it, and who is to do it.
TYPE OF SURVEYS
Initial Survey
The initial physical security survey is conducted prior to constructing, leasing, acquiring, modifying, or occupying a facility
or area. It describes any modification required to raise the level of security commensurate with the levels of criticality and
vulnerability. At a minimum, the initial survey requirements. must address the minimum-security
Follow-up Survey
When recommendations are made in the initial physical security survey, a follow-up survey is conducted to ensure the
completion of modifications. This survey should be conducted before acceptance of the property for occupancy.
Supplemental Survey
The supplemental survey is conducted when changes in the organization, mission, facility, or the threat level of the facility
alter or affect the security posture of the facility or area. This survey is conducted at the discretion of the management. The Security
Manager may require that facilities undergo a supplemental survey when there is a change of the overall threat level to all the
facilities.
Special Survey
The special survey is conducted to examine or resolve a specific issue, such as when there is a request for a Sensitive
Compartmented Information (SCI) accredited facility or there is a need to investigate or assess damage resulting from an incident.
SECURITY INSPECTION
Inspections which may be announced or unannounced are usually conducted to determine the extent of compliance with security
regulations or procedures, including those recommended during surveys.
An inspection is a check or test against a certain set of standards or regulations to ascertain whether the security program of the
facility meets those standards. or regulations.
TYPES OF INSPECTION
Evaluation
The evaluation or fact-finding inspection is generally positive in tone and promotes liaison and security awareness while
taking a broad, general look at a facility or program. Deficiencies, which may be resolved either on the spot or within a non-specified
time frame, may be noted and recommendations for further corrective actions may be made. The evaluative inspection can also
help management officials in planning or upgrading their security programs.
Compliance
The full compliance inspection generally is conducted for enforcement purposes. It focuses on compliance with established
standards or regulations.
Follow-up
Another form of compliance inspection is the follow up inspection, conducted to ensure that facility officials have complied
with recommendations from earlier inspections.
The after-hours room check is a form of compliance inspection. It monitors compliance with security regulations, especially
involving areas where confidential security information is processed or stored.
Self-inspection
The self-inspection is initiated by the security manager or facility manager to evaluate his/her own security program. Additionally,
self-inspections are required by each Top Secret Control Officer, Classified Document Custodian, and Special Security Officer to
evaluate all security procedures applicable to their operation.
Closeout
A closeout self-inspection is accomplished immediately prior to the action to administratively terminate an authorized Top Secret
Control Station, Classified Control Station, or Sensitive Compartmented Information Facility (SCIF). During closeout inspections
• Plan an inspection by determining the scope, type, and method. Schedule the inspection, and if appropriate, provide
written notice.
• Upon arrival at the site and prior to departure, the should meet with the senior manager to discuss the inspection. Collect
a sufficient sampling of data from interviews
• After sufficient data is collected, the inspector should analyze all findings, compare them with applicable security
regulations, list discrepancies and cite regulatory references, recommend corrective action, and write the inspection
report.
• The inspection report should be produced within 10 working days of completion of the inspection.
Republic Act 5487, as amended – The Private Security Agency Law, approved on June 13, 1969.
PNPSOSIA – Philippine National Police Supervisory Office for Security Investigation Agency – office under the Civil Security Group
which is charged with the supervision, direction and control of all security agencies in the Republic.
WHO MAY ORGANIZE AND MAINTAIN PRIVATE SECURITY AGENCY AND PRIVATE DETECTIVE AGENCY
Any Filipino citizen or corporation, association, partnership, one hundred percent of which is owned and controlled by Filipino
citizens.
1. Filipino citizen;
2. Not be less than twenty five (25) years of age;
3. College graduate and/or a commissioned officer in the inactive service or retired from the AFP or PNP;
4. Has taken a course/seminar on Industrial Security Management and/or must have adequate training or experience in
security business,
4. Good moral character;
5. Having no previous record of conviction of crime or offense involving moral turpitude.
1. Filipino citizen;
2. High School graduate;
3 Physically and mentally fit;
4. At least eighteen (18) years of age but not more than fifty (50) years old;
5. Has undergone Pre-Licensing course or its equivalent.
Veterans and retired military/police personnel honorably discharge including graduates of ROTC advance (or its equivalent
in the PNP) are exempted from the required Basic-Licensing Training.
1. Filipino citizen;
2. Holder of a Baccalaureate Degree;
3. Physically and mentally fit;
4. Has graduated from a Security Officer Training Course or its equivalent
1. Filipino citizen;
2. Physically and mentally fit;
3. Holder of Masters degree either in Criminology, Public Administration, MNSA, Industrial Security Administration, or Law
4. Must have at least ten (10) years experience in the operation and management of security business.
PRIVATE DETECTIVE
Any person who does detective work for hire, reward or commission, other than members of the AFP, BJMP, PNP or any other
law enforcement agencies.
1. Filipino citizen;
2. Physically and mentally fit;
3. Holder of baccalaureate degree, preferably Bachelor of Laws or Bachelor of Science in Criminology;
4. Graduate of a Criminal Investigation Course offered by the PNP or NBI or any police training school, or a detective training
in any authorized/recognized training center;
5. Advance ROTC/CMT graduate or its equivalent
DISQUALIFICATIONS
MORAL TURPITUDE
It is an act of baseness, vileness or depravity in the private and social duties which a man owes to his fellowmen or to
society in general, contrary to the accepted and customary rule of right and duty between a man and man.
Conduct that is considered contrary to community standards of justice, honesty and good morals.
Examples . Rape, Forgery, Robbery
2. Security Agency service – security guard belonging to privately licensed agency (contractual basis);
3. Government Guard Forces –security unit maintained and operated by any government entity other than military or police.
POSSESSION OF FIREARMS
1. One (1) firearm for every two (2) security guards;
2. Private security agency/private detective agency/company security force/government security force shall not be allowed
to possess firearms in excess of five hundred (500) units.
3. Shotguns not higher than 12 gauge
4. Weapons with bores not bigger than cal .22 to include pistols and revolvers with bores bigger than cal .38
Exemptions: in areas where there is an upsurge of lawlessness and criminality as determined by the Chief PNP, Regional Office
or their authorized representative, they may be allowed to acquire, possess and use high powered firearms.
1. Private Security Agency – minimum of two hundred (200) licensed private security personnel and a maximum of one
thousand (1,000).
2. Company Guard Force/Private Detective Agency – minimum of thirty (30) and a maximum of One thousand (1,000)
1. No firearm shall be borne nor be in the possession of any private security personnel except when in actual performance
of duty, in the prescribed uniform, in the place and time so specified in the Duty Detail Order (DDO).
2. Shall be carried only within the compound of the establishment where he is assigned to guard.
3. While escorting big amount of cash or valuable outside of its jurisdiction or area of operation, private security agency shall
issue an appropriate Duty Detail Order to the security personnel concerned
Duty Detail Order (DDO) – is a written order/schedule issued by a superior officer usually the private security agency/branch
manager or operations officer assigning the performance of private security/detective services duties.
DDO for the purpose of post duties not requiring transport of firearms outside of the physical compound or property of a
client or client establishment shall be issued for not more than a thirty (30) days duration
Chief PNP
-Approval of New Regular LTO
-Cancellation of Regular LTO
-Re-instatement of Regular LTO
-Suspension of Regular LTO
SURETY BOND
Agency with 1 -199 guards – P50,000.00
Agency with 200-499 guards – P100,000.00
Agency with 500-799 guards – P150,000.00
Agency with 800-1000 guards – P200,000.00
STOCKING OF AMMUNITION
1. Stocks of ammunition in the agency shall not exceed fifty (50) rounds of ammunition per unit of duly licensed firearms.
2. Individual issue to each security guards shall be limited to twenty five (25) rounds for every security guard.
3. Security guard
3.1 Security Guard 1 – Watchman/guard- the one actually posted as watchman and or guard
3.2 Security Guard 2 – Shift in- charge – responsible for the security officers who are scheduled in a certain shift for a
particular period
3.3 Security Guard 3 – Post in- charge –responsible for the entire detailed security office within a certain establishment.
Note: Security Agency operator/manager/owner can put its own staffing pattern provided it is consistent with the provisions
of IRR of RA 5487.
ADVANTAGES OF COMPANY GUARD FORCE
1. High caliber and receives higher salary;
2. Provides better service;
3. Can be trained to handle some of the more complex security duties;
4. More familiar with facilities they protect;
5. Tend to be more loyal with the company.
DISADVANTAGES:
1. May be required to join the union;
2. Cost more;
3 Problem of ensuring availability of back-up personnel.
DISADVANTAGES:
1. Lack of training, low caliber employee;
2. No loyalty to the company;
3. Large turnover
4. Not familiar with facilities
1. Territorial Power – A security guard shall watch and secure the property of the person, firm or establishment with whom he or
his agency has a contract for security services. Such services shall not extend beyond the property or compound of said person,
firm or establishment except when required by the latter in accordance with the terms of their contract, or in hot pursuit of criminal
offenders.
2. Arrest by Security Guard – A security guard or private detective is not a police officer and is not, therefore, clothed with police
authority. However, he may arrest a person under the circumstances mentioned in Section 5, Rule 113, Revised Rules of Criminal
Procedure.
3. Search without Warrant – Any security guard may, incident to the arrest, search the person so arrested in the presence of at
least two (2) witnesses. He may search employees of the firm or establishment with which he or his agency has a contract, when
such search is required by the very nature of the business of the person, firm or establishment.
1. All private security personnel in direct confrontation with strikers, marchers or demonstrators shall not carry firearms. They
may carry only night sticks (baton) which may or may not be provided with tear gas canister and dispenser. Security
personnel not in direct confrontation with the strikers may carry in the usual prescribed manner their issued firearm.
2. Private Security personnel shall avoid direct contact either physically or otherwise with the strikers;
3. They shall stay only within the perimeter of the installation which they are protecting at all times;
4. In protecting and securing the assets and persons of their clients, shall only use sufficient and reasonable force necessary
to overcome the risk or danger posed by strikers or hostile crowds.
5. They shall refrain from abetting or assisting acts of management leading to physical clash of forces between labor and
management.
6. They must at all times be in complete uniform with their names and agency’s name shown on their shirts above the breast
pockets.
FUNCTIONS OF A PRIVATE DETECTIVE
1. Background Investigation;
2. Locating missing person;
3. Conduct surveillance work;
4. Such other detective work as may become the subject matter of contract between the agency and its clients. Except not contrary
to law, public order, public policy morale and good custom.
In case of emergency or in times of disaster or calamities, the Chief, PNP may deputize any security guard to assist the
PNP in the performance of police duties for the duration of such emergency, disaster or calamity. Licensed guards, who are actually
assigned to clients with DDO, shall be deputized by the Chief, PNP, and clothed with authority to enforce laws, rules and regulations
within his area of responsibility.
1. Private security personnel are always subordinate to members of the PNP on matters pertaining to law enforcement and crime
prevention. They cannot enforce any provision of the law except in executing citizen’s arrest and/or conducting initial investigation
of a commission of a crime. In such case, any arrested person shall be turned over immediately to the nearest PNP unit/station.
2. Criminal investigation is the responsibility of the PNP. All results of initial investigation conducted by the private security
personnel and all evidence gathered by them shall be turned over to the PNP unit/station concerned as a matter of course without
delay.
Theft – committed by any person, who with intent to gain but without violence, against, or intimidation of persons nor force
upon things shall take personal property of another without the latter consent.
1. The need or desire . An individual may need or desire to commit the act because of financial problem, inadequate income,
extravagant living, gambling.
2. The psychological need (Kleptomania) -is an irresistible urge to steal items of trivial value. People with this disorder are
compelled to steal things, generally, but not limited to, objects of little or no significant value.
3. The criminal tendency. The individual with such tendency may be more tempted to steal if security control are inadequate.
Casual Pilferer – One who steals due to his inability to resist the unexpected opportunity and has a little fear of detection.
Systematic Pilferer – One who steals with preconceived plans and takes away any or all types of items or supplies for economic
gain.
COMMUNICATION SECURITY – is the protection resulting from the application of various measures which prevent or delay the
enemy or unauthorized persons in gaining information through the communication system. This includes:
a. Transmission Security – component of communications security which results from all measures designed to protect
transmission from interception.
b. Cryptographic Security – results from the provisions of technically sound crypto-system and their proper use.
c. Physical Security – providing safeguards to equipment and material from access by unauthorized persons.
1. Wiretapping - is the monitoring of telephone conversations by a third party, often by covert means.
2. Bugging – means to secretly listen to or record a conversation using a hidden electronic device.
3. Eavesdropping (unauthorized listening)- is the unauthorized real-time interception of a private communication, such as a phone
call, instant message, videoconference or fax transmission.
UNLAWFUL ACTS
Sec. 1
It shall be unlawful for any person, not being authorized by all the parties to any private communication or spoken word,
to tap any wire or cable, or by using any other device or arrangement, to secretly overhear, intercept, or record such communication
or spoken word by using a device commonly known as a dictaphone or dictagraph or dictaphone or walkie-talkie or tape recorder
It shall also be unlawful for any person, be he a participant or not in the act or acts penalized in the next preceding sentence, to
knowingly possess any tape record, wire record, disc record, or any other such record, or copies thereof, of any communication
or spoken word secured either before or after the effective date of this Act in the manner prohibited by this law; or to replay the
same for any other person or persons; or to communicate the contents thereof, either verbally or in writing, or to furnish
transcriptions thereof, whether complete or partial, to any other person:
Provided, That the use of such record or any copies thereof as evidence in any civil, criminal investigation or trial of offenses
mentioned in section 3 hereof, shall not be covered by this prohibition.
Sec. 3
Nothing contained in this Act, however, shall render it unlawful or punishable for any peace officer, who is authorized by a written
order of the Court, to execute any of the acts declared to be unlawful in the two preceding sections in cases involving the crimes
of treason, espionage, provoking war and disloyalty in case of war, piracy, mutiny in the high seas, rebellion, conspiracy and
proposal to commit rebellion, inciting to rebellion, sedition, conspiracy to commit sedition, inciting to sedition, kidnapping as defined
by the Revised Penal Code, and violations of Commonwealth Act No. 616, punishing espionage and other offenses against
national security:
AUTHORIZATION
The authorization shall be effective for the period specified in the order which shall not exceed sixty (60) days from the date of
issuance of the order, unless extended or renewed by the court upon being satisfied that such extension or renewal is in the public
interest.
The court referred to in this section shall be understood to mean the Court of First Instance within whose territorial jurisdiction the
acts for which authority is applied for are to be executed.
BANK SECURITY – a specialized type of physical security protecting the assets, personnel and operation of a bank, with special
emphasis on the precaution and measures to safeguard the cash and assets while in s storage, in transit, and during transaction.
>Bangko Sentral ng Pilipinas (BSP) Circular No. 620 Issued on September 3, 2008 – a Circular issued by BSP
concerning regulations on Bank protection which aims to promote maximum protection of life and property against crimes (robbery,
theft, etc), and other destructive causes.
Guard System – BSP requires that all banking offices be manned by adequate number of security personnel to be determined by
the bank, taking into consideration its size, location, costs and overall bank protection requirement.
Security Devices – Banks are required to have a robbery alarm or other appropriate device for promptly notifying law enforcement
office either directly or through an intermediary of an attempted, ongoing or perpetrated robbery.
In armored Car operations – all armored vehicles are required to be built with bullet resistant materials capable of withstanding
the firepower of high powered firearm (M16, M14). Also equipped with a vault or safe or a partition wall with a combination lock
designed to prevent retrieval of the cargo while in transit.
DOCUMENT AND INFORMATION SECURITY – Security involving the protection of documents and information from loss, access
by unauthorized persons
> prescribes the policies and establishes the standard basic procedures governing the classification and security of official
matter.
GENERAL PRINCIPLES
1. The authority and responsibility for the preparation and classification of classified matter rest exclusively with the originating
office;
2. Classified matter should be classified according to content and not the classification of the file in which they are held or of
another document to which they refer;
3. Classification should be made as soon as possible by placing the appropriate marks on the matter to be classified;
4. Each individual whose duty allows access to classified matter is responsible for the protection of the classified matter while it is
in his/her possession and shall insure that dissemination of such classified matter is on the “need to know” basis and to “property
cleared personnel only”.
DEFINITION OF DOCUMENT
- Any material that contains marks, symbols, or signs, either visible, partially visible or completely invisible that may be presently
or ultimately convey a meaning or message to someone.
CLASSIFY – refers to the act of assigning to information or material one of the four security classification categories after
determination has been made that the information requires the security protection as provided for in the regulation;
SECURITY CLEARANCE – Is an administrative determination that an individual is eligible from a security standpoint for access
to classified matter of a specific category;
COMPARTMENTATION – Refers to the grant of access to classified matter only to properly cleared persons when such classified
information is required in the performance of their official duties, and restricting it to specific physical confine when feasible.
NEED TO KNOW – term given to the requirement that the dissemination of classified matters be limited strictly to those persons
whose official duties require knowledge thereof.
CLASSIFICATION OF DOCUMENTS
-Memorandum Circular No. 196, dated 07/19/1968 (Security of Classified Matter in government offices.)
1. TOP SECRET – any information and material, the unauthorized disclosure of which would cause exceptionally grave
damage to the nation, politically, economically or militarily;
2. SECRET- any information and material, the unauthorized disclosure of which would endanger national security, cause
serious injury to the interest or prestige of the nation or any governmental activity.
3. CONFIDENTIAL – any information and materials, the unauthorized disclosure of which would be prejudicial to the interest
or prestige of the nation or governmental activity or would cause administrative embarrassment or unwarranted injury.
4. RESTRICTED – any information and material which requires special protection other than those determined to be
Confidential, Secret, and Top Secret matters.
METHOD OF TRANSMISSION
1. By direct contact of officer or personnel concerned;
2. By official courier;
3. Electrical means in cryptographic form
4. Registered Mail
DESTRUCTION
1. Burning
2. Shredding
STORAGE
shall be in a safe, steel filing cabinet with built in dial type combination lock of such weight, size and construction as to
minimize the possibility of physical theft or damage to fire.
OPERATIONAL SECURITY – part of physical security that deals primarily with the protection of processes, formulas, patents,
and other industrial and manufacturing activities from espionage, infiltration, loss, compromise or photocopying;
INFORMATION CYCLE
1. The Creation – Information is discovered and develop;
2. Used – Some action is take with the information;
3. Storage and Retrieval – Stored for future use;
4. Transfer – transferring of information from active to inactive use;
5. Disposition – decision may be made to retain the information indefinitely.
INTELLECTUAL PROPERTY CODE OF THE PHILIPPINES [Republic Act No. 8293] Approved on June 6, 1997
Competitive Intelligence – systematic program for gathering and analyzing information about competitor’s activities and general
business trends to further company’s goals.
TYPES OF DOCUMENTS
Class I – Vital Document – This is an irreplaceable records , reproduction of which does not have the same value as the original;
Class II – Important Document- This is a record, reproduction of which cause considerable expense and labor, or considerable
delay.
Class III – Useful Document – This is a record, the loss of which may cause inconvenience but could be readily replaced and
may not present insurmountable obstacle to the prompt restoration of the business;
Class IV- Non essential Document – This record may include daily files, routine in nature, lost of which will not affect the
organization.
STORAGE
1. SAFE – a metallic container used for safekeeping of documents or small items in office or installation.
2. VAULT – a heavily constructed fire and burglar resistant container usually part of the building structure use to keep and protect
cash, documents and negotiable instruments.
3. FILE ROOM – a cubicle in a building constructed a little lighter than a vault but of bigger size to accommodate limited people to
work on the records inside,
DEFINITION OF TERMS:
1. Access List – authenticated list of personnel given to the security allowing entry to a compound or installation or part thereof;
2. Controlled Area – an area near or adjacent to limited or exclusive areas where entry is restricted;
3. Dry-run – practical test or exercise of plans or any activity to test its validity, an operational readiness exercise;
4. Duress Code – type of code system so that security personnel or any employee when forced by armed men intending to enter
an installation can five alarm by the use of certain words in casual conversation with personnel in the installation.
5. Exclusion Area – a restricted area containing materials or operation of security interest;
6. Restricted area – any area access to which is subject to special restriction control;
7. Security Hazard – Is any act or condition, which may result in the compromise of information, loss of life, loss or destruction of
property or disruption of objectives of the installation.
TYPES OF SECURITY
1. Industrial Security – A form of physical security that is concerned with the physical measures designed to safeguard
personnel and prevent unauthorized access to equipment, facilities, materials, documents, and to protect them from
espionage, sabotage, damage or theft.
2. Bank Security – Is the protection resulting from the application of various measures which safeguards cash and assets
which are in storage, in transit and or during transaction.
3. Operational Security – Involves the protection of processes, formulas and patents, industrial and manufacturing activities
from espionage, infiltration, loss, compromise or photocopying.