Introduction To Industrial Security Administration
Introduction To Industrial Security Administration
Hotel Security
ADMINISTRATION into law December 13, 1990. 2. Hospital Security
NECESSITY OF SECURITY4444444444434 3. School Security
INDUSTRY Security measures are inevitable or 4. Bank Security
An activity that pertains to business necessary for the attainment of goals 5. Commercial Security
operations. 6. Mall Security
and objectives.
the production of goods or related 7. Agriculture Security
When an individual or organization is
services within an economy 8. Mining Security
exposed to hazards, their productivity 9. Airport Security
SECURITY is adversely affected. 10. Communication Security
a state or condition of being safe
THREE MAJOR DIVISIONS OF INDUSTRIAL - Transmission & Cryptographic
or secured;
SECURITY Basic Principles of Security
there is freedom from fear, harm,
1. Physical Security 1. There is no absolute security.
danger, loss, destruction or measures taken to prevent 2. Security is only as good as its weakest
damages. physical access or entry to an link.
SECURITY VS. SAFETY installation or area by 3. High relative security can be achieved
state of being “safe”, the condition of unauthorized personnel. in depth.
being protected against physical, 2. Personnel Security 4. Risks may come from within and
social, spiritual, financial, political, measures applied to insure without.
emotional, etc. suitability for appointment or 5. No two installations are alike.
ADMINISTRATION access to classified matter as 6. There is no impenetrable barrier.
well as the protection of 7. Security is everybody’s concern.
The skillful use of means in order to
company personnel against 8. Deterrence is only good against the
attain a purpose.
potential harmful acts or least determined perpetrator.
INDUSTRIAL SECURITY ADMINISTRATION conditions. 9. All aspects of security must be applied
“the skillful handling of the security 3. Document and Information Security to secure and object.
and safety measures of business measures designed to Factors that bring about Insecure Conditions
enterprises and industrial safeguard company Threats - an activity that could lead to
establishments.” documents from unauthorized a loss.
Preparation and utilization of methods disclosure of the information Hazards - a condition that could lead to
and devices to prevent or minimize loss a loss.
to a company due to security breach. Aspects of Security Vulnerability - a weakness that can be
LAWS RELATED TO SECURITY MANAGEMENT Personnel Security used to gain access to an asset.
R.A. No. 5487 –known as Private Information Security Risk - a potential loss or damage to an
Operations Security asset.
Security Agency Law approved June
Physical Security Security Hazards – is an act or condition, which
13, 1969
Environment Security may result in a situation like a breach of the
R.A. 6975 – “DILG ACT OF 1990”. The Reputation Security protection system and the subsequent loss or
law authorizing the PNP the control TYPES OF INDUSTRIAL SECURITY compromise of defense information, company
and supervision of the security
secret or damage to personnel, property or a.physical - without common interest hazards.
facilities. b.psychological - with common interest in a Security Planning
Kinds of Security Hazards certain thing knowing the objectives of security
Human Hazard – is the act or i.casual - for short duration and the means and methods to
omission or condition affecting the ii.international - for long reach those objectives.
safe operation of the facility duration Contents of Security Planning
caused by human action. Subversive Activities 1. Situation – historical background of the
Natural Hazard – is the act or dealing with the weakness of a person organization and its security features
situation caused by natural belonging to an organization to 2. Mission – what the plan is all about and
phenomenon. undermine authority and weaken the what it intends to do; must include the
Samples of Human Hazards organization in order to manage or purpose, goals, objectives
Pilferage take over the organization 3. Execution – concept of the security
Theft Economic sabotage project
Riot activities of business establishments 4. Administrative and Logistics – listing of
Subversive Activities against the government security equipment
Arson Parts of Subversive Activities 5.Command and Signal – channel of
Espionage Rumor mongering communication needed
Sabotage Propaganda Security Survey
Types of Pilferage Legal action It is a critical, on-site examination and
1.Casual pilferage – inability to resist Use or threat of use of arms analysis of an industrial plant, business,
the unexpected opportunity or has Murder, kidnapping, and corruption of and name of public or private
little fear that there is detection employees institution to ascertain current security
(usually for souvenir) Sabotage status deficiencies or excesses.
2.Systematic pilferage – with an act of destroying, damaging, or any Security Inspection
preconceived plan and take away activity with evil motive that will lead A process of conducting physical
things for all types of goods, supplies to stoppage of the normal operation of examination to determine compliance
or merchandise (usually for economic the company, factory, plant and or with established security policies and
gain establishment procedures because of a security
Causes of Riot Sabot - French for “wooden slipper” survey
1.Panic Saboteur - agent of sabotage Purpose of Security Survey
2.Strike Basis of the Extent and Degree of Security 1.To determine existing state of
3.Mob - a promiscuous multitude of Risks security;
rude and disorderly people Relative Criticality - is the importance 2.To locate weaknesses in defense;
a.Aggressive mob of firm with reference to the national 3.To determine degree of protection
b.Escape mob economy and security required and;
c.Acquisitive mob Relative Vulnerability - is the 4.To produce recommendations
d.Expressive mob susceptibility of the plant or establishing a total security program.
4.Crowd – temporary congregation of establishment to damage, loss or Risk Assessment
people disruption of operation due to various – Determined the degree of probability
that natural or man-made forces will or man made.
strike at any given facility and to capable of restricting, delaying or 1. FENCES - control physical and visual
determine the value, impact, and cost preventing unauthorized access access between outside areas.
of any asset should it be lost due to LINE OF PHYSICAL DEFENSE Solid -visual access is denied.
natural or man-made forces. FIRST LINE – perimeter barriers Full-View - visual access is
SECURITY AND SAFETY MEASURES SECOND LINE – building exteriors permitted
Active measures THIRD LINE – includes those
physical barriers, security internal control measures Types of Full-View Fences
lightings, safes and vaults, CONCEPT OF PERIMETER BARRIERS 1. Chain-link Fence
locks and other devices. medium of structure which defines the At least 7-feet tall (excluding the top
Passive measures physical limits. guard)
deter mans from committing restrict or impede access. 9-gauge or heavier wires
acts for fear of being caught. any physical barrier used to Opening of not larger than 2 inches
Ex: Security education supplement the protection of an inside Securely fastened to rigid material
programs, security or outside perimeter. Must reach within 2 inches on hard
investigation, fire PERIMETER BARRIER OPENINGS ground
prevention seminars, 1. Gates and doors should also be Must reach deep enough to
safety drills, etc. guarded or locked; compensate for shifting soil or sand on
Physical Security 2. Windows and similar openings should soft ground
a system of physical barriers placed also be guarded or grills should be 2. Barbed Wire Fence
between the hazard and the assets to installed; Height: at least 7-feet tall (excluding
be protected 3. Sidewalks elevators should be locked the top guard)
involves three lines of physical defense and guarded; 12-gauge, twisted, double strand, with
(perimeter barriers and guards at the 4. Utilities openings such as sewers, air 4-point barb spaced on equal distant
gate as the 1st line; doors, floors, walls, intakes, exhaust tunnels should be part.
roofs, and windows as the 2nd line; protected by bars, grills, etc.; Strands should not exceed 6 inches
and steel cabinets, locks, safes, vaults, 5. Clear Zone is an unobstructed area apart, one wire interlocked vertically
and interior file rooms as the 3rd line.) maintained on both sides of the and midway
COMPONENTS OF PHYSICAL SECURITY perimeter barrier. Must be firmly affixed to post not
1. Perimeter Barriers A clear zone of 20 ft. or more more than 6 feet apart
2. Protective Lightings is desirable between the 3. Concertina Wire Fence
3. Protective Alarms barrier and extension 3 feet high
4. Protective Locks and Key Control and structures and natural covers 50 feet long
5. Protective Cabinets which may provide commercially-manufactured high-
6. Guard Force and Guard Systems concealment or assistance to strength steel barbed wire clipped at
7. Personnel Identification & Movement a person seeking intervals to form a cylinder
Control unauthorized entry. TYPES OF PERIMETER BARRIERS
WHAT ARE BARRIERS? 2. BUILDING WALLS include walls, floor,
any physical structure whether natural TYPES OF PERIMETER BARRIERS roofs or their combinations
3. BODIES OF WATER like river, lake, physical security program. GENERAL TYPES OF LIGHTING SOURCES
cataract, sea, pond or any bodies of TYPES OF LIGHTING EQUIPMENT 1. Incandescent Lamp - common light
water Street lights - This lighting equipment bulbs producing light by the resistance
ADDITIONAL PROTECTIVE MEASURES received the most widespread of a filament to electric current
1. Top Guard notoriety for its value in reducing 2. Mercury Vapour Lamp - emit blue
additional overhang of barbed crime. green color due to the presence of
wire placed on vertical Floodlights - These can be used to mercury vapor.
perimeter fences facing accommodate most outdoor security 3. Metal Halide
upward and outward with a lighting needs, including the similar in physical appearance to
45-degree angle with three to illumination of boundaries, fences and mercury vapor,
four strands of barbed wires buildings and for the emphasis of vital but provides a light source of higher
spaced 6-inches apart. areas or particular buildings. luminous efficiency and better color
2. Guard Control Stations Search lights - These are highly focused rendition.
provided at main perimeter incandescent lamp and are designed to 4. Fluorescent Lamp
entrance to secure areas pinpoint potential trouble spots. good color rendition.
located out of doors, Fresnel Lights - projects a narrow, cannot project light over long distances
3. Towers or “Guard towers” horizontal beam. not desirable as flood type lights.
are house-like structures TYPES OF SECURITY LIGHTINGS 5. High-Sodium Vapour Lamp
above the perimeter barriers. 1. Stationary Luminary (Continuous) exterior lighting of parking areas,
4. Barrier Maintenance fixed luminous to flood a given area roadways, buildings, and industrial and
Fencing barriers and continuously with overlap. commercial installation.
protective walls should always o Glare–projection type It emits golden white to pink color.
be regularly inspected by focused to the PROTECTIVE ALARMS
security. intruder while the another safeguard that complement if
5. Protection in Depth guard remains in the not to supplement physical security
In large open areas or ground dark. alerts security personnel to
where fencing or walling is o Controlled lighting consummated or attempted intrusion
impractical and expensive, focused on a pile of THREE PARTS OF AN ALARM SYSTEM
warning signs should be items rather than on 1. Sensor or trigger device
conspicuously placed. the background. It detects the aural or visual
6. Signs and Notices or “Control signs” 2. Stand-by Lighting signals or both.
controls unauthorized ingress, similar to continuous lighting but 2. Transmission line
and preclude accidental entry. turned on manually or by other a circuit which transmit the
PROTECTIVE LIGHTINGS automatic means. message to the signaling
provides a means of illumination 3. Movable Lighting apparatus.
a degree of protection maintained stationary or manually operated search 3. Annunciator
during daylight hours. lights it is the signaling system that
deterrent to thieves and vandals 4. Emergency Lighting activates the alarm.
an essential element of an integrated used in the event of electrical failure TYPES OF ALARM DETECTION SYSTEM
1. Central Station System – monitor of using a wire connector, activated when a mechanical, electrical, hydraulic or
the central station is located outside currency is removed from the device electronic device to prevent entry into
the installation. 3.Knee or Thigh Buttons – placed in location a building, room, container or hiding
2. Proprietary System – functions in the where personnel perform duties from a seated place
same way as the central system except position and activated by knee or thigh Key
that it is owned and leased by the pressure a metal bar with notches or grooves
subscriber. 4.Foot Button – like foot rail activator, it that, when inserted into a lock and
3. Local Alarm System – ringing up a permits alarm activation in relatively safety turned, operates the lock’s
visual or audible alarm near the object while both hands remain clear in view of the mechanism; or
to be protected. robbers. door or lock opener: a device such as a
4. Auxiliary System – installation circuits 5.Double Squeeze Button – requires pressure plastic card with an encoded magnetic
are led into local police or fire on both side of the device to lessen false alarms strip that operates a door or lock
department. Parts of Fire Protection System Peterman
Kinds of Alarms 1.Automatic Sprinkler – built-in sprinklers A term used in England for lock picker,
1. Audio Detection Device- detect sound triggered by the increase of room temperature safecrackers, and penetrators of
caused by attempted force entry and automatically operates to put out the fire. restricted areas or room
2. Vibration Detection Device- detect any a.Wet Pipe System – pipes have water Padlock
vibration with pressure which will operate when the –A portable and detachable lock having
3. Metallic foil or wire- it will detect any head is opened, giving a flow of water until or sliding hasp which passes through a
action that moves the foil or wire shut-off. staple ring where it is made fastened
4. Laser Beam Alarm- a laser emitter b.Dry Pipe System – pipes are filled or secured.
floods a wall or fencing with a beam. If with air under pressure which holds the water TYPES OF LOCKS
the beam is disturbed, an alarm is at a valve. 1. Key-operated Lock
activated. 2.Fire Pump – mechanical device supplying 2. Padlock
5. Photoelectric or Electric Eye Device- water using manual or motor-driven 3. Combination lock
an invisible/visible beam is emitted operations. 4. Code Operated Lock
WHAT IS PERIMETER INTRUDER DETECTION 3.Stand Pipe – located together with a fire hose 5. Card-coded Lock
SYSTEM (PIDS)? inside the building from the lowest up to the 6. Electrical Lock
These are electronic devices that highest floor, with water under pressure for use 7. Electromagnetic Lock
detects entry or attempted entry in case of fire. Key-operated mechanical lock
across the external perimeter of a key 4.Fire Hydrant – mechanical device strategically it uses some sort of arrangement of
point or vital point and signaling an located in an installation or street where a fire internal physical barriers (wards
alarm. hose is connected, with water under pressure tumblers) which prevent the lock from
Types of Bank Alarms for use in case of fire. operating unless they are properly
1.Foot Rail Activator – placed on the floor and 5.Fire Extinguisher – portable, cart-driven, or aligned.
activated by placing the front of their foot on wall/ceiling mounted firefighting equipment The key is the device used to align
the activation bar. used to put out fire depending on the contents these internal barriers so that the lock
2.Bill Traps – placed in the teller’s top cash to extinguish certain types of fire. may be operated.
drawer and connected to the alarm system Lock Three (3) Types of Key-operated Lock
1. Warded Lock – incorporated with 1000 pounds. period to prision correccional in its minimum
wards or obstructions inside the lock to TYPES OF KEYS period.
prohibit a key from operating the bolt 1. Change Key - a specific key, which 2.Art. 305 - False Keys - The term “false keys”
unless the key has corresponding operates the lock and has a particular shall be deemed to include:
notches cut in it that it will pass the combination of cuts, or biting, which a.The tools mentioned in the next preceding
wards. match the tumblers in the lock. articles.
2. Disc or wafer tumbler mechanism - 2. Sub-Master Key - could open all the b.Genuine keys stolen from the owner.
has flat metal tumblers with open lock within a particular grouping in a c.Any keys other than those intended by the
center fitted into lock case, commonly facility. owner for use in the lock forcibly opened by the
designed for automobile industry 3. Master Key - capable of opening a offender.
because of easy and cheap series of locks. PROTECTIVE CONTAINERS (CABINETS)
manufacturing. 4. Grand Master Key - open everything in The final line of defense where papers,
3. Pin tumbler mechanism -- depends on a system involving two or more master records, plans or cashable instrument,
several round pin or tumblers key groups. precious metals or other especially
operating on a cylinder. Change Key (One level) valuable assets are protected.
4. Lever tumbler mechanism - used in A key to a single lock within a master These security containers will be of a
safe deposit boxes, desks, lockers and keyed system. size and quantity, which the nature of
cabinets and are generally less secure Master Key (Two level) the business dictates.
than pin tumbler lock. All levels operated by change key and These could be: SAFE, VAULT OR A FILE
Padlock master key Master key operates all ROOM
a portable and detachable lock having locks generally of one building. SAFE
a sliding hasp which passes through a Grand Master Key (Three level) a metallic container used for the
staple ring and is then made fasten or All locks operated by change key, safekeeping of documents or small
secured. master key and grand master key. items
Combination Locks Great Grand Master Key (Four level) robbery or burglary resistance
it uses numbers, letters or other All locks operated by change key, must be at least 750 lbs.
symbols as reference point which enable an master key, grand master key and great grand anchored to a building structure
operator to align them manually. master key. body should at least one inch thick
Code Operated Locks Great Great Grand Master Key (Five level) steel.
can be opened by pressing the series of All locks operated by change key, VAULT
numbered button in the proper master key, grand master key, great grand a heavily constructed fire and burglar
sequence. master key and great great grand master key. resistance container
Electrical lock Statutory Prohibitions of Key Control part of the building structure
a type of lock that can be opened and 1.Art. 304 - Possession of picklocks or similar bigger than safe
closed remotely by electrical means. tools - Any person who shall, without lawful door should be made of steel at least 6
Electromagnetic Locks cause, have in his possession picklocks or inches
devices holding a door by magnetism. similar tools specially adapted to the walls, ceiling, floor reinforce concrete
when the power is secured on the commission of the crime of robbery, shall be at least 12 inches
door, it will resist pressure of up to punished by arresto mayor in its maximum must be resistive to fire up to 6 hours.
FILE ROOM that an exchange take place at the visitors maybe required to show cause for the
cubicle in a building constructed a little entrance of each restricted area delay.
lighter than vault 2.Restricted Area – It refers to an area in which Personnel Security
12 feet high personnel or vehicles are controlled for reasons The sum of all procedures followed,
watertight door of security. inquiries conducted, and criteria
fire proof for one hour. Controlled Areas – access is restricted applied to determine the work suitable
Tests for Fire Resistance to entrance where uncontrolled to an applicant.
1.Fire Endurance Test - A safe should movement will not result in A system of policies and procedures
not have at any time a temperature of compromise of classified information. which seek to mitigate the risk of
350 degrees F. Limited Area – access is restricted to workers (insiders) exploiting their
2.Explain Hazard Test – test to entrance where uncontrolled legitimate access to an organization's
determine if the sudden rise in movement will result in compromise of assets for unauthorized purposes.
temperature will not cause the safe to classified information. Personnel Security Investigation
rupture. If the safe can withstand 2000 Exclusion Area – contains a security an inquiry into the character,
degrees F for 30 minutes without interest to top secret information and reputation, discretion, integrity, morals
cracking or opening, then it has passed which requires the highest degree of and loyalty of an individual to
the test. protection. determine a person’s suitability for
3.Fire and Impact Test – Its objective is Visitors Movement Control appointment and access to classified
to determine the strength of a safe to Visitor’s logbook – All visitors to any facility matter.
resist the collapse of a building during should be required to identify them selves and Methods of PSI
fire. should be given a visitor’s ID by the security. Local Agency Check – investigation of
Aspects of Personnel Identification and Visitor’s logbook should be filled up with the the records and files of agency in
Movement Control named of visitors, nature and duration of visit. principal residence of the subject.
1.Pass System – A pass or badge is issued by Photograph - taking of photographs should also National Agency Check – consists of
security for personnel to be admitted in the be considered. Extreme caution must be LAC supplemented by investigation of
installation. exercised in areas where classified information the records and files of national
• Single pass system - the badge or pass is displayed to preclude unauthorized taking of agencies.
coded for authorization to enter pictures of the installation. If a visitor has Partial Background Investigation –
specific areas is issued to an employee camera and it is prohibited to take picture, said investigation of the background of the
who keeps it in his possession until his camera should be left in the care of security individual but limited only to some of
authorization is terminates. with corresponding receipt. the circumstances.
• Pass exchange system - an exchange Escort - If possible visitors should be escorted Complete Background Investigation –
takes place at the entrance of each by the security to monitor their activity within it is a type of BI which is more
controlled area. Upon leaving the the establishment and guide them where to go. comprehensive and consists of detailed
personnel surrenders his badge or Visitor entrances - separate access for visitors information regarding the subject.
passes and retrieve back his basic and employees of the establishment should be PERSONNEL IDENTIFICATION AND MOVEMENT
identification provided. CONTROL
• Multiple pass system - this provides an Time- traveled - If there is a long delay or time In every installation, the use of
extra measure of security by requiring lapse between the departure and arrival, the protective barriers, security lighting,
communication and electronic deception during the interview stage. 5. Security Promotion – emphasizing the
hardware provides physical safeguards This includes the use of a Polygraph, importance and role of security
but these are insufficient to maximize Psychological Stress Evaluator and DOCUMENT AND INFORMATION SECURITY
the effort of the guard force. Voice Analyzer. plays a significant role in the daily
A control point must be established for 5. Financial and Lifestyle Inquiry- this operations and activities of an
positive personnel identification and type of investigation seeks to gather installation.
check system. information on income and mode of Once the contents of a company’s
This is to insure that only those living, sometimes referred to as the document and information are
persons who have the right and earning-to-debt ratio. divulged the operational stability is at
authority will be given the necessary 6. Undercover Investigation- this is the stake.
access to the area. placement of an agent in a role in Document and Information Security
General Techniques of PSI which the agent’s true identity and role involves the protection of documents
1. Background Investigation (BI)- this remains unknown, in order to obtain as classified papers from loss, access by
technique is very expensive but information for criminal prosecution or unauthorized persons, damage, theft
necessary in personnel security. It for recovery or limitation of asset and compromise through disclosure.
serves to verify information on the losses. Information Cycle
application form and to obtain other 7. Exit Interview- this is a valuable tool 1.Creation – Information is discovered
information pertinent to the decision because it gives departing employees and developed.
to employ. an opportunity to list grievances. 2.Use – Some action is taken with the
2. Positive Vetting- is the process of Security Education Program information.
inspecting or examining with careful A program given to employees of an 3.Storage/Retrieval – for future use
thoroughness. The essence of vetting installation by lecture and other means 4.Transfer – Transferring of
that it is a personal interview pertaining to measures and safeguards information from active to inactive use.
conducted under stress. It is based on to be taken to protect the interest of 5. Disposition – Decision may be made
information previously given by the the installation from loss, damage, to retain the information indefinitely at
applicant. Other information issued sabotage, pilferage, and other criminal either an active or an inactive storage
during the interview, such as those acts. center or to dispose it.
discovered in the BI, which confirms or Phases of Security Education Program Types of Documents
denies this given by the applicant. 1. Initial interview- first contact wherein 1.Class I - Vital Documents – In this
3. Profiling- is the process whereby a the interviewer determine the category are records that are
subject’s reaction in a future critical suitability of the applicant irreplaceable; records of which
situation is predicted by observing his 2. Orientation and Training- detailed reproduction does not have the same
behavior, or by interviewing him, or presentation of personnel security value as the original.
analyzing his responses to a policy 2.Class II - Important Documents –
questionnaire, such as an honesty test. 3. Refresher Conference- remind This include records of which
The Reid Report is an example of responsibilities, review guidelines and reproduction will cost considerable
honesty test. policies, introduction of new policies expense and labor, or considerable
4. Deception Detection Techniques- this 4. Security Reminders- indirect approach delay.
a process of using devices in detecting of educating the employees 3.Class III – Useful Document – This
include records which loss might cause determined to be Confidential, Secret previously assigned to it.
inconvenience but could be readily and Top Secret matters. Need to know- is the dissemination of
replaced and which would not in the Why are classified matter given protection? classified information or matter to be
meantime present an insurmountable 1.Deter or impede potential espionage limited strictly to those person whose
obstacle acts or any form of spying/stealing duties requires knowledge or
4.Class IV – Non-Essential Documents information. possession thereof.
– These records are daily files, routine 2.Assist in security investigations by Unauthorized- refers to person not
in nature that even if lost or destroyed, keeping accurate records. authorized to have access on classified
will not affect operation or 3.Enforce the use of need to know matters.
administration. concept. Compromise- this takes place through
Classify PERTINENT DEFINITON OF TERMS the loss of security, which results from
act of assigning to information or Classified Information- this includes all unauthorized persons obtaining
material one of the four classification information concerning document, knowledge of classified matters.
categories after determination has cryptographic devices developed Damage to National Security- refers to
been made that the information projects and materials following on the the prejudice, embarrassment or injury
requires the security protection as categories of Top Secret, Confidential to the country resulting from act or
provided for in the regulation. or Restricted. omission.
Security of Classified Matters Classified Matter- any information or Purpose of Protecting Classified Materials
1.Top Secret – any information and material in any form or of any nature, 1. Deter and impede potential spy
material, the unauthorized damage of the safeguarding of which is necessary 2. Assist in security investigations by
which would cause exceptionally grave in the interest of security and which is keeping accurate records of the
damage to the nation – politically, classified for such purpose by the moments of classified materials.
economically, or militarily. responsible classifying authority. 3. Enforce the use of “Need to Know”
2.Secret – any information and Classify- this refers to the assigning of principle
material, the unauthorized disclosure information or material, one of the Three (3) Security Concepts
of which would endanger national four security categories after 1. Personnel are the weakest link in the
security, cause serious injury to the determination has been made that the security chain.
interest or prestige of the nation or any information requires the security 2. Training is important to make security
governmental activity. protection as provided. personnel conscious and realize the
3.Confidential – any information and Declassify- the act of removing the value of document.
material, the unauthorized disclosure security classification from classified 3. Training is necessary for the practice of
of which would be prejudicial to the information or matter. “Need to Know” principle.
interest or prestige of the nation or Reclassifying or Regarding- refers to Rules for Classification of Documents
government activity or would cause the act of changing the assigned 1. Documents shall be classified
administrative embarrassment or classification from classified according to their content.
unwarranted injury. information or matter. 2. The overall classification of a file or of a
4.Restricted – any information and Upgrading- refers to the act of group of physically connected therein.
material which requires special assigning the information or matter to Pages, paragraphs, sections or
protection other than those the higher classification than that components thereof may bear
different classifications. Documents a certification by a responsible other persons.
separated from file or group shall be authority that the person described is 3.Wiretapping – interception of a
handled in accordance with their cleared to access and classify matters communication circuit.
individual classification. at appropriate levels 4.Bugging – interception of communication
WHAT IS SECURITY CLEARANCE? Types of Security Clearance using electronic device.
certification by a responsible authority 1.Interim Clearance – effective for 2 Security Guard
that the person described is cleared for years sometimes called private security
access to classified matter the 2.Final Clearance – effective for 5 years guard or watchman shall include any
appropriate level Compartmentation person who offers or renders personal
the administrative determination that the grant of access to classified matter service to watch or secure either a
an individual is eligible for access to only to properly-cleared persons when residence or business establishment or
classified matter. such classified information is required both for hire or compensation,
PROTECTION OF SENSITIVE INFORMATION in the performance of their official and with a license to exercise security
Proprietary information is information duties and restricting it to specific profession.
that in some special way relates to the physical confine when feasible. GUARD FORCE
status or activities of the possessor and Threats to the Protection of Sensitive Group of selected men, trained or
over which the possessor asserts Information grouped into functional unit in order to
ownership. In the business community, 1.Competitive Intelligence – also known as protect operational processes from
proprietary information relates to the industrial espionage, it is a systematic program those disruption which would impede
structure, products or business for gathering and analyzing information about efficiency or halt operation.
methods of the organization. It is the competitor’s activities and general business TYPES OF GUARD FORCES
usually protected in some way against trends to further company goals. 1. Private Security Agency (PSA)
causal or general disclosure. a.White – available from contracts, recruits, trains, and post
What is Risk Management? company publication, public records, security guard to a business firms
a process of selecting and or commercial reporting sources. Advantages of PSA
implementing security b.Gray – not readily available ü - Less expensive;
countermeasures to achieve an but can usually be obtained without ü - Use is convenient;
acceptable level of risk at an acquiring any civil or criminal liability in ü - Less administrative and personnel problems;
acceptable cost. the process. ü - Agency assumes full responsibility for the
Countermeasures - An action c.Black – obtained through scheduling and supervising of all guard
taken or a physical security clearly unethical or illegal means, personnel
used to reduce or eliminate which may result in civil or criminal ü - Can easily obtain extra guard if needed;
one or more vulnerabilities. sanctions when discovered. ü - Agency easily usually accepts liability of civil
term given to the requirement that 2.Eavesdropping suits.
the dissemination of classified matters also known as unauthorized listening, it 2. Company Security Force (CSF)
be limited strictly to those persons involves un lawful and knowingly maintained and operated by any
whose official duties require entering into a private place with the private company or corporation
knowledge thereof. intent to listen surreptitiously to Advantage of CSF
Security Clearance private conversation or to observe any ü High caliber and receives higher salary;
ü Provides better service; a) Leather pistol belt with regulation THE PHILIPPINE ASSOCIATION OF
ü Can be trained to handle some of the more buckle DETECTIVE AND PROTECTIVE AGENCY
complex security duties; b) Holster, black leather for pistol OPERATORS, INC (PADPAO)
ü More familiar with facilities they protect; c) Night stick (baton) with horizontal - the national association of all licensed
ü Tend to be more loyal with the company. handle security agencies and company security forces.
Disadvantage of CSF d) Whistle with lanyard - Established as early as 1958 purposely for the
May be required to join the union; e) Hand held radio self-regulation of all security agencies.
Cost more; f) Pocket notebook and ball pen WHAT IS LTO?
Problem of ensuring availability of back-up Authorized Persons to organize and maintain a LICENSE TO OPERATE
personnel. Private Security or Detective Agency document issued by the CPNP
3. Government Security Unit (GSU) a) Filipino citizen or corporation, or his duly authorized
operated by any government entity association, partnership. representative authorizing a
other than military and / a police b) 100% of which is owned and person to engage in security
UNIFORM, EQUIPMENT AND PARAPHERNALIA controlled by Filipino citizen. business
males - Headgear; service shirt; service Basic Requirement of an Agency Operator or REQUIREMENTS FOR NEW PSA
trousers; service belt; and footwear. Manager 1M Minimum Capital and 500K Bank
a) Filipino citizen; Deposit
Light blue and/or white service shirts b) Not less than 25yrs of age; Application to CPNP thru SAGSD or
for internal guards for PSA; c) College graduate and/or a SOSIA
Light gray for company security force; commissioned officer in the inactive full name of the applicant;
and service or retired from AFP or PNP, or his age, civil status; and
White for government security unit. graduate/taken a course in concepts residence and location of his
Set of Uniforms for Security Personnel: and methods in Industrial Security and business.
a) Headgear – Pershing cap for men, 2-ply cap Security Management and/or must In case of corporation, association or
for women have adequate training or experience partnership copies of the following shall be
b) Service bush jacket – intended for directorial in security business; appended:
and staff officers d) Good moral character not having Certificate of Registration with
c) Service shirt been convicted of any crime involving the SEC; and
d) Service trouser moral turpitude, and not suffering BY-Laws and Articles of
e) Service belt from any disqualifications. incorporation.
f) Footwear Disqualifications: Graduated Scale of License for PSA/PDA
Ornaments and Patches Having been dishonorably discharged a.PSAs with 200-1000 guards – regular
a) National badge or separated from the Armed Forces of license to operate good for two (2)
b) Cap Device the Philippines; years;
c) Regulation Buckle Being a mental imcompetent; b.New PSAs – temporary license to
d) Collar device Being addicted to the use of narcotic operate good for one (1) year;
e) Name cloth drug or drugs; and c.PSAs with temporary license to
f) Agency/unit name cloth Being a habitual drunkard. operate having posted one hundred
Equipment and Paraphernalia WHAT IS PADPAO? (100) guards or more but less than two
hundred (200) guards shall, upon may be terminated due to: Addicted to the use of narcotic
expiration of such license be issued an a) Expiration of contract; and/or prohibited drugs
extension period to operate good for b) Revocation of license to exercise and/or substances;
six (6) months. However, upon the profession; Habitual drunkard and
expiration such six (6) months c) Conviction of crime involving moral alcoholic;
extension period, no additional turpitude; Dummy of any foreigner; and
extension of license shall be granted d) Loss of trust and confidence; Elective or appointive
unless the PSAs concern shall submit a e) Physical and mental disability; and government officials and
certification for the posting of at least f) Any other violation of the pertinent employees
an additional fifty (50) guards thereby rules and regulations hereof. Basic requisites for security guards
making a total of one hundred fifty Who may organize and maintain a PSA? Filipino citizen;
(150) or more guards. Any Filipino citizen or corporation, High school graduate;
d.PSAs with extended temporary association, partnership, Physically and
license to operate, shall upon 100% owned and controlled by Filipino mentally fit;
expiration of such license but still fail citizens. At least 18 years old
to comply the two hundred (200) Basic Requirement of an Operator or Manager but not more than 50
guards requirement, be granted of agency years old;
additional extension of another six (6) Filipino citizen Has undergone pre-
months period in order to complete At least 25 years old licensing training
the two hundred (200) guards College graduate and/or course; and
requirement for the issuance of a A commissioned officer in the inactive Must not possess any
regular license to operate. Otherwise, service or of the
failure to comply with the two hundred Retired from AFP or PNP or disqualifications.
guard’s requirement shall serve as a Graduated/taken course in concepts Who are exempted from Pre-Licensing
basis for the issuance of a cease and methods in industrial Security and Security 1. Veterans and retired or honorably
operation order. Management and/or discharged military/police personnel
e.License of PSAs with less than one Must have and adequate training or possessing all the qualifications
hundred (100) guards shall not be experience in security business mentioned in the preceding section.
renewed after one (1) year of Good moral character - not having 2. ROTC advance/basic graduates, and/or
operation. been convicted of any crime involving its equivalent in the AFP, PNP,
f.PSAs with cancelled/revoked licenses moral turpitude; and CAFGU/CHDF.
shall cease to operate, and with seven Disqualifications Private Detective
(7) days after having been duly notified dishonorably discharged from Holder of baccalaureate degree or
of such cease operation order, shall AFP/PNP or separated for Bachelor of Laws; or
immediately deposit all its firearms cause from any government B.S. Criminology graduate; or
with the FEO. entity or government owned Graduate of Criminal Investigation
Tenure of Security Personnel or controlled corporation; Course offered by the then PC/INP or
·Co-terminus with the service contract Being mentally incompetent; the PNP or the NBI or any police
between the PSA and the Client, but Being physically unfit; training school or detective training
with authorized/recognized training Surety Bond - shall answer for any guard, EXCEPT when escorting big
center for security guard; or valid and legal claims against such amount of money or valuables outside
Advance Reserve Officers Training agency filed by aggrieved party. his area of operation.
Course or Citizen Military Training 1-199 guards P50,000.00 • For escort operations of big amounts
(ROTC/CMT) graduate. 200-499 guards P100,000.00 of money, issue a duty detailed order.
Security Officer 500-799 guards P150,000.00 • Basic load of firearms: fifty (50)
Filipino citizen; 800-1000 guardsP200,000.00 rounds
Holder of Baccalaureate Degree; • Basic load per guard: twenty-five (25)
Physically and mentally fit; Grounds for Confiscation of firearms rounds
Has graduated from a Security Officer When the firearm is about to be used Limitations
Training Course; in the commission of a crime. 1. During his tour of duty when in proper
Retired personnel of the PNP/AFP; and When the firearm is actually being uniform within the compound of the
Must not possess any of the used in the commission of a crime. establishment, where he is assigned;
disqualification enumerated in Sec. 2, When the firearm just been used in the and
Rule II. commission of a crime. 2. Except, when he is escorting big
Security Consultant When the firearm being carried by the amount of cash or valuables, and upon
Holder of a Masters degree in either security guard is unlicensed. prior coordination with the nearest
Criminology, Public Administration, When directed by the court. PNP units/stations.
MNSA, Industrial Administration or USE OF FIREARMS AND EQUIPMENT Duty Detail Order or DDO –
Law; or One (1) firearm for every two (2) Security security personnel on duties
Must have at least 10 years experience Guard. (1:2) under the circumstances
in the operation and management of Maximum of 500 units. mentioned in the preceding
security business. For Temporary licensed with one section must have DDO
Other Exemptions - Any officer or hundred (100) guards, an initial of at (SAGSD Form No. 12-94).
enlisted man of the AFP or a uniform least 30 licensed firearms. Disposition of confiscated FA
member of the PNP honorably For regular licensed with two hundred The law enforcement officer who
discharged/separated or retired from guards (200), at least 70 pieces of confiscated the FA shall inform the
the service are exempted from the licensed firearms. CPNP thru CSG within 24 hours after
requirements. High powered firearms are not allowed such confiscation.
License and Fees (only shotgun not higher than 12 gauge The firearm shall be turned over
a. Application Fee - minimum and low power rifles and revolvers immediately to the nearest PNP
capitalization of ONE MILLION (P1, 000, such as Cal .22, Cal .38) Unit/Station who shall immediately
000.00) pesos with a minimum bank High-powered firearms are only turn over the same to the CSG District
deposit of FIVE HUNDRED THOUSAND allowed in areas with upsurge of Office.
(P500, 000.00) pesos lawlessness and criminality, provided, When the confiscation is by order of
b. License to Operate - license to that it does not exceed 10% total the court, the same shall be turned
operate duly approved by the Chief, number of security guards. over to the court concerned.
PNP or authorized representative and Firearm shall be carried only within Revocation of license to possess FAs
registration at the SEC. area of operation where he is tasked to 1. Failure to submit any issued FA for
verification as required by Sec. 897 of Detachment Commanders required, the city or municipal mayor
RAC; Security Supervisor 2 - Chief may utilize security agencies to help in
2. Carrying of FAs by security personnel Inspector maintenance of peace and order,
w/out appropriate DDO; Security Supervisor 1 – prevention of crime, or apprehension
3. When its serial number (SN) is Inspector of criminal offenders and the
duplicated or using the SN for more Security Guard protection of lives and properties
than one firearm (FA); Security Guard 1 - within the area of such calamity.
4. Carrying of FAs outside the place watchman/guard b) The deputized security guard may
stated in the permit as required by E.O. Security Guard 2 - Shift-in- receive direct orders from the chief of
or carrying FA in places prohibited charge police for the duration of the
under the law; Security Guard 3 - Post-in- emergency, disorder or calamity.
5. Conviction of the operator or manager charge c) Emergency Deputation
of the agency of any crime involving Training System and Its Duration Period d) In times of emergency, disorder or
moral turpitude; or Objectives of Training calamity, the C/PNP may deputize
6. When the firearm was reported lost. To enhance a highly professionalized security guard to assist the PNP
Stocking of ammunitions security industry in the country. members in the performance of their
limited and reasonable quantity that To upgrade the discipline, competence duties for the duration of the calamity.
suits the need of the Agency and efficiency of security guards.
not exceed fifty (50) rounds of To educate them on the importance of
ammunitions per unit of duly licensed national and community security needs
Fas. and prevention losses.
Individual issue to security guard shall Classification and Duration Period of Training
be limited to twenty-five (25) rounds Basic Security Guard Course: 150 Hours
per SG. Re-Training Course: 48 Hours
RANKS AND POSITIONS Security Officers Training Course: 300
Security Management Staff Hours
Security Director (SD) - Agency Basic Supervisory Course: 48 Hours
Manager/Chief Security Grounds for Cancellation of Security Guard
Officer. License
Security Executive Director C Assisting or protecting criminals
(SED) - Asst. Agency during on or off duty status;
Manager/asst. Chief Security C Providing confidential information to
Officer. unauthorized person;
Security Staff Director (SSD) - C Posted security guard found drunk or
Staff Director for Operation drinking intoxicating liquor; and
and Staff C Other similar acts
Director for Administration. Utilization of Agencies During Emergencies
Line Leadership Staff a) In time of disaster, disorder or
Security Supervisor 3 - calamity when security services are