Lea 3
Lea 3
Lea 3
1. Private Security Agency- any person, association, partnership, firm or private corporation,
who contracts, recruits, trains, furnishes or post any security guard, to do its functions or
solicit individuals, business firms, or private, public or government-owned or controlled
corporations to engage his\its service or those of his\its security guards, for hire commission
or compensation.
2. Company Security Force- a security force maintained and operated any private company\
corporation for its own security requirements only.
3. Government Security Unit- a security unit maintained and operated by any government
entity other than military and \a police, which is established and maintained for the purpose
of securing the office or compound and or extension such government entity.
Color of Uniforms
1. Fixed Post
2. Patrol
3. Reserve
4. Administration work
5. Others /Investigation and escorts
6. General Functions
1. Filipino Citizen;
2. Physically fit;
3. Holder of MSCrim, MPA, MNSA, Industrial Management or LL.B.
4. Must have at least ten (10) years experience in the operation and management of
security business.
1. Filipino Citizen;
2. Holder of Baccalaureate Degree;
3. Physically and mentally fit; and
4. Has graduated from Security Officers Training Course or its equivalent
1. Filipino Citizen;
2. Physically and mentally fit;
3. Holder of a baccalaureate degree preferably LLB, BS Criminology.
4. Graduate of a criminal Investigation Course offered by the PNP or the NBI or any
Police training school, or detective training in any authorized/recognized training
center; and
5. Advance ROTC/CMT graduate or its equivalent
1. Filipino Citizen;
2. High school graduate;
3. Physically and mentally fit;
4. Not less than 18 years of age nor more than 50 years old.(for new applicant and SGs
in supervisory position); and
5. Has undergone a pre-licensing training course or its equivalent
1. Alertness
2. Judgment
3. Confidence
4. Physical fitness
5. Tactfulness
6. Self control
7. Interest, loyalty, responsible and trustworthy, is also important attributes of a
reliable guard.
Firearm’s license – all firearms of the security agency should be covered with firearms license
issued by the PNP through its Firearms Explosive Division under the Civil Security Group,
renewable every two years. No duplication of two or more firearms with the same make and
serial number shall be covered by one license.
Security Officer:
Chief Security officer- He shall be the highest ranking security officer, security director,
manager or chief of a security unit/organization in given PSA/CSA or
government entity.
Senior Security officer- He shall perform the duties and responsibilities of an executive
officer to coordinate the activities of the unit and take over the duties of the
chief Security officer in the latter's absences or when incapacitated.
Security Guard Officer – He shall occupy the position equivalent to a unit staff officer , Private
detective, Inspector or chief investigator, Detachment Commander of not less than 30 security
guards.
Guard Supervisor –he/she shall perform the duties of supervising not more than 15 posted
guards, or other commensurate task within the unit.
Inspection
Firearms and Weapons Authorized for Used of the Security Guard while on Duty
Handguns/Low-powered (cal. 22 and cal. 38) not exceeding one FA for every two guards
employed.
Possession of Firearm:
Ratio: 1 firearm for every two (1:2) security guard in its employ.
No PSA/CSF/GSU shall be allowed to possess firearms in excess of 500 units.
What are the restrictions in the carrying of firearms by security guards. Watchman or
private detective?
1. Firearms to be carried only during tour of duty while in proper uniform;
2. Within the compound of the establishment;
3. When escorting big amount of cash or valuables.
PSA shall not exceed fifty (50) rounds of ammunition per unit of duly licensed firearms.
Individual issue to each security guard shall be limited to one half of such basic load or twenty
five (25) rounds for every security guard.
1. No person shall organize or even have an interest in more than one agency
2. Elective or appointive government employees who may be called upon on account of the
functions of their respective offices in the implementation and enforcement of the provisions
of RA 5487, and any person related to such government employee by affinity or
consanguinity in the third civil degree, shall not hold an interest directly or indirectly, in any
security or watchman agency.
3. No agency shall offer, render or accept services in gambling dens or other illegal business
establishments or enterprises.
4. The extent of the security guard service being furnished by the security agency shall not go
beyond the compound and/or property of the person or establishment contracting the security
service except when the security guards is escorting big amount of money or valuables.
5. All agencies shall maintain a main office in their registered addresses. Branch offices may
be established and maintained in other provinces or cities where the security agency has
deployed security guard.
6. All applicants for license to operate shall be required to attend a private security agency or
company guard force operators and management seminar or workshop.
1. No licensed security agency shall operate, promote and enter into an agreement of merger or
“kabit system” with any person or group of persons for the purpose of organizing a branch
unit or subsidiary under separate control and ownership. Merger of security and detective
agencies shall not be recognized without prior approval from the Securities and Exchange
Commission with respect to their Articles of Incorporation and the Department of Trade and
Industry, with regards their business name.
2. Any of the following circumstance or a combination thereof shall be considered prima-facie
evidence of the existence of “Kabit System”.
3. Maintaining a separate branch, unit or subsidiary office aside from the main office of the
agency situated within the same locality.
4. Receiving direct payments from the agency’s clientele and issuing official receipt of their
own distinct from that issued by the agency concerned.
5. Remitting directly Social Security System premiums, Medicare contributions and other
premium for other policy insurance benefits by the aforementioned branch, unit or subsidiary
office.
6. Keeping or maintaining separate payrolls for the branch employees signed and/approved by
the branch manager only.
7. Absence of record of monthly income remittance to the main office when said branch is
authorized to make collections from the clients of the licensee.
8. All other similar acts tending to show separate and distinct relationship or personality or
ownership or management.
On Membership
1. No regular license shall be granted to any private security agency unless it has a minimum of
two hundred (200) licensed private security personnel under its employ.
2. No regular license shall be granted to any company guard force or private detective agency
unless it has a minimum of thirty (30) licensed private security personnel under its employ.
3. The maximum number of private security personnel that a PSA/CGF/PDA may employ shall
be one thousand (1000) including the branch and the subsidiary.
1. Personal recognition
2. Artificial recognition
Ex. Duress Code – a type of code system so that security personnel when forced by armed men
enter an installation can give alarm by the use of certain words in casual conversation with other
personnel in the installation.
ACCESS LIST- an authenticated list personnel given to security guard allowing entry to
compound or installation or part thereof.
PASS SYSTEM- a method used by security to screen visitors or person admitted into building
premises.
Uses of Pass System
1. Single pass system– the badge or pass coded for authorization to enter specific areas is issued
to an employee who keeps it in his possession until his authorization is terminated.
2. Pass exchange system – an exchange takes place at the entrance of each controlled area.
Upon leaving the personnel surrender his badge or pass and retrieve back his basic
identification.
3. Multiple pass system– this provides an extra measure of security by requiring that an
exchange take place at the entrance of each restricted area.
1. The system should have a complete record of all badges and identification cards issued,
returned, mutilated or lost by serial number and cross-indexed alphabetically.
2. The supervisor from time to time for its accuracy and authenticity should check the lists.
3. Passes and badges reported lost should be validated and security at entrance be informed
through conspicuous posting.
1. Visitor’s logbook – all visitors to any facility should be required to identify them and should
be given a visitor’s ID by the security. Visitor’s logbook should be filled up with the name
of visitors, nature and duration of visit.
2. Photograph – taking of photographs should also be considered. Extreme caution must be
exercised in areas where classified information is displayed to preclude unauthorized taking
of pictures of the installation. If a visitor has camera and it is prohibited to take picture, said
camera should be left in the care of security with corresponding receipt.
3. Escort – if possible visitors should be escorted by the security to monitor their activity within
the establishment and guide them where to go.
4. Visitor’s entrance – separate access for visitors and employees of the establishment should
be provided.
5. Time-traveled – if there is a long delay or time lapse between the departure and arrival, the
visitors maybe required to show cause for the delay.
1. No packages shall be authorized to be brought inside and outside the industrial installation,
offices and work area without proper authority. This basic precept help reduce if not
eliminate pilferage, industrial espionage or sabotage.
2. Outgoing packages carried by personnel should be closely inspected and those in vehicles
should also be checked as many pilfered items are hidden in the surface of the vehicles
leaving the compound.
3. Any personnel or visitor entering the installation with a package should deposit the same to
the security and in return receives a numbered tag, which he or she will use in claiming his or
her package upon departing.
1. Privately owned vehicle of personnel or visitor should be registered and are subject to the
identification and admittance procedure.
2. Vehicles should be subjected for search at the entrance and exit of the installation.
3. All visitors with vehicle should provide the security as to the complete details of their
duration of stay, person to be visited, and other information.
4. All vehicles of visitors should be given a sign or sticker to be placed on the windshield.
5. Traffic warning signs should be installed in all entrances in order to guide the visitors in their
destination as well as to provide them with the necessary safety precautions while they are
inside the installation.
6. Security personnel must constantly supervise parking areas and make frequent spots searches
of vehicles found there.
1. Controlled Areas – Are those areas where access is restricted as to entrance or movement
by all authorized personnel and vehicles. It should additionally marked by a fence or other
barrier, and access to it should limited to as few guest as possible;
2. Limited Areas – Are those within the controlled area where a greater degree of security is
required.
3. Exclusion Areas – Are used only for handling and storage of high value cargo and classified
documents. The number of people authorized to enter this area should be strictly limited, and
the area should be under surveillance at all times.
Personnel Security
Personnel security is considered as the most important. This is for the simple reason that
security involves people, both an assets to be protected and as source of security threats. It is an
acknowledge fact that losses are attributed mainly to negligence or active participation of
employees, either through theft and sabotage.
Purpose and Importance of Personnel Security
1. To insure that a firm hires those employees best suited for the firm; and
2. Once hired, to assist in providing the necessary security to these employees while they are
carrying out their functions.
1. Local Agency Check (LAC) – Investigation of the records and files of agencies in the area
of the principal residence of the individual being investigated. This includes check with the
local PNP, MTC/RTC, Provincial/City Prosecutor’s Office and the CI.
2. National Agency Check (NAC)-consist of LAC supplement by investigation of the records
and the files of the following agencies: DI, DIDM, CIDG including alias nickname and
fingerprints.
3. Partial Background Investigation (PBI) – is an inquiry into specific phases of an
individuals life history including as a minimum, NA, contact with references and former
employers, contacts with individuals whose names are taken from the reference or former
employers interviewed but not given as reference of the subject, and such other investigation
as maybe deemed necessary by the investigating agency.
4. Complete Background Investigation (CBI) – is a complete inquiry or investigation into all
important aspects of an individual’s life history.
SECURITY CLEARANCE
It refers to a certification given by responsible authority that the person described is
cleared for access to classified matters at appropriate level. This includes assignments to
sensitive positions
1. Interim Clearance – is good for two (2) years from the date of issuance.
2. Final clearance – is good for (5) years from the date of issuance.
1. Final clearance already granted will remain valid for a period of five (5)
years from date of issue. Thereafter, a new security clearance will be issued
after a satisfactory NAC has been conducted.
1. Interim clearance already granted will remain valid for a period of two (2) years from the
date of issue . in case final clearance cannot be granted in accordance with the minimum
standards provided, anew interim clearance will be issued after a satisfactory completion of
the required investigation
1. Initial Interview – it is the first contact of the prospective employee wherein the interviewer
determines the suitability of the applicant for employment through his given answers on the
different type of questions being conducted.
2. Orientation and Training – it is in this stage where new employees receive detailed
presentation of personnel security policy. Usually handouts or employees manual are being
distributed for reference. New employees also requested.
3. Refresher conference – it is design to remind employees of the company about their
responsibilities, review the guidelines and policies, introduction of new policies and
regulations and a movement of getting employees feedback about the company policies that
is being implemented.
4. Security Reminders – This employed as an indirect approach of educating the employees,
such as posting security posters and distributing fliers.
5. Security promotion – it is the act of emphasizing the importance and role of security
achieving the company goals and objectives. It involves security employee cooperation and
support.
Definition of Terms:
Risk – it is the potential damage or loss of an asset.
The level of risk is a combination two factors: the value placed on that asset by its owner
and the consequence, impact adverse effect of the loss or damage to that asset and the likelihood
that a specific vulnerability will be exploited by a particular threat.
Hazards – “exposure to the chance of loss or injury. It is synonymous to risk or peril.
Conversely, Microsoft Encarta describes hazard as a “potential danger or something that is
potentially very dangerous”
Security Hazards – any act or condition which may result in the compromise of information,
loss of life, loss or destruction of property or disruption of the objective of the installation. It can
also be defined as an act or condition affecting the safe operation of the facility caused by human
action accidental or intentional.
Risk Management- is a process of selecting and implementing security countermeasures to
achieve an acceptable level of risk at an acceptable cost.
Risk Analysis- the analysis of risk include examinations of the vulnerability, probability and
criticality of potential threats and include natural and manmade risk.
Adversary- it refers to any individual, group, organization, or government that conducts
activities or has the intention and capability to conduct activities detrimental to the individual,
private or government entity.
Asset – any information, facility, material, information, or activity which has a positive value to
its owner whether it is an individual, private or government entity.
Vulnerability – any weakness that can be exploited by an adversary to gain access to an asset.
Countermeasures – an action taken or a physical entity used to reduce or eliminate one or more
vulnerabilities. The cost of possible countermeasures may be monetary, but may also include
non-monetary cost such as reduced operational efficiency, adverse publicity unfavorable
working conditions, and political consequences.
Probability – it is the chance or likelihood that a loss will take place.
Criticality – the impact of a loss as measured in financial terms.
Relative Criticality of operation – this pertains to the importance of the firm with reference to
the natural economy and security. Example is gasoline depots, communication transmission
lines, and power plants.
Relative Vulnerability – this is the susceptibility of the plant or establishment to damage, loss
or disruption of operation due to various hazards. A good example is the location of the
building, the machines, or presence of possible poisons.
Risk Management Alternatives and Strategies
Risk Avoidance – eliminating or removing the risk totally from the business, government, or
industrial environment for which the risk manager has responsibility.
Risk Reduction – decreasing the risk by minimizing the probability of the potential loss. The
reduction or criminal opportunity is often accomplished by situational crime (prevention
strategies to discourage, deter, or deny criminal incidents.
Risk Spreading – spreading the risk through compartmentation or decentralization to limit the
impact (criticality) of the potential loss.
Risk Transfer –moving the financial impact of the potential loss-over to an insurance company.
Risk Self-assumption- planned assumption and acceptance of the potential risk by making a
deliberate managerial decision of doing nothing about the threat, or setting aside resources for
use in case of a specific loss incident.
SECURITY HAZARD
Any act or condition which may result in the compromise of information, loss of life, loss or
destruction of property or disruption of the objective of the installation
The extent and degree of risk to security will dependent
1. Relative criticality of operation – is the importance of the firm with reference to the natural
economy and security.
2. Relatively vulnerability- is the susceptibility of the plant or establishment to damage loss or
disruption of operation due to various hazards.
Types of Hazards
1. Natural Hazards – these are hazards which arise from natural phenomena. The following
are types of natural hazards or disasters:
2. Human-man made Hazards – These are hazards which are the result of a state of mind,
attitude, weaknesses or character traits of one or more persons. They can be acts of
commission or omission, both overt and covert, which can disrupt operation of a plant or
installation. The following are types of human or man made hazards:
Disloyalty –subversion and sabotage espionage, pilferage and theft vandalism, etc.
Pilferage
This is one of the most annoying and common human hazards which security has to deal
with. This activity it uncontrolled can become a financial drain if not a menace to smooth and
orderly operation. Due to this, security force has to concentrate large number men to check this
nefarious and disconnecting activity. Petty pilferage is frequent, hard to detect, difficult to prove
and win conviction but definitely dangerous to ignore
Types of Pilferers
1. Casual Pilferer – one who steals due to his inability to resist the unexpected opportunity and
has little fear of detection is no plan or premeditation and he is usually a “loner” on the job.
The temptation to pick up the article is basically due to poor security measure. The
implication of causal pilfering is the big cumulative cost if it remains unchecked.
2. Systematic Pilferer – one who steals with preconceived plans and takes away any or all
types of items or supplies for economic gain. Pilferers of this kind can be employees or
outsiders of the establishment.
Security Survey
Security Survey is defined as a critical on-site examination and analysis of an industrial plant,
business, a home or public or private institution done to ascertain the facility’s current security
status, to identify deficiencies or excess in current practices, to determine what protection is
needed and to make recommendations for improving the overall level of security at that
installation.
Objectives of Security Survey
Security Inspection
Security inspection is conducted for two reasons: to check on the degree of compliance with the
recommended countermeasures and to determine the effectiveness and adequacy of the
countermeasures which are in effect.
Types of Security Inspection
1. Continuous Inspection
2. Formal Inspection
It is usually preceded by an announcement, and the unit under inspection “prepares” for
events, including some housekeeping activities that would not otherwise happen at that point
in time.
3. Informal Inspection
4. Structured Inspection
It is one that moves systematically from one area to the next and so on.
There is a format or a logical sequence to the process.
5. Unstructured Inspection
Security Investigation
It is a planned and organized determination of facts concerning specific loss or damage of
assets due to threats, hazards or unsecured conditions