Lea 2

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 168

INTRODUCTION TO

INDUSTRIAL SECURITY
CONCEPTS
LYEN CAREL T. GARCIA, RCRIM
TOP 1
CLE JUNE 2022
ROFESSIONAL REGULATION COMMISSION
PROFESSIONAL REGULATORY BOARD OF CRIMINOLOGY
TABLES OF SPECIFICATION
LAW ENFORCEMENT ADMINISTRATION 15%

Number of
Items
and Distribution
INTRODUCTION TO INDUSTRIAL SECURITY CONCEPTS 100

15

State and apply the theories, concepts, and philosophy of security and safety; 2

Organize and assess the related laws in security and detective agency operations, management and 5
administration;

Translate and construct the basic industrial security concepts of security survey, security plan, security test 4
and evaluation, personnel check, technical surveillance, and security management.
SECURITY
Is defined as the state or quality of being secured, freedom
from fear or danger, assurance, or certainty. To secure is to make safe
or be protected.

Security can also be defined as:


1.state or feeling of safety; the sate or feeling of being safe and
protected.
2.freedom from worry about possible loss: the assurance that
something of value will not be taken away;
3.something giving assurance: something that provides a sense of
protection against loss, attack or harm
4.safety: protection against attack from without or subversion from
within
5.precautions to maintain safety; precautions taken to keep
somebody or something safe from crime, attack or danger;
and
6.guards: people or an organization entrusted with the job of
protecting somebody or something, especially a building or
institution, against crime.

Security came from the Greek word “securos” which means


safe, safety or secured.
NECESSITY OF SECURITY
• Security measures are inevitable or necessary for the attainment
of the goals and objectives of a certain individual, group or
organization.
• It follows that when an individual or organization is exposed to
hazards, their productivity is adversely affected
FUNDAMENTALS OF INDUSTRIAL
SECURITY MANAGEMENT
CONCEPTS:
1. INDUSTRY – constant application to work or business
2. INDUSTRIAL – pertaining to or engaged in industry
3. SECURITY- state or quality of being secured
4. MANAGEMENT – skillful use of means to accomplish a purpose.
5.INDUSTRIAL SECURITY – security measures applied to business
industries, or the business of providing security.
6.INDUSTRIAL SECURITY MANAGEMENT – ISM could be defined as
the “skillful handling of the security and safety measures of business
enterprises and industrial establishments”
SECURITY AND SAFETY MEASURES
Active Measures – Designed to detect or impede hazards
• physical barriers
• security lighting
• use of vaults,
• locks and others

Passive Measures are - Those that will deter man from committing such act
for fear of being caught charged in court or get dismissed.
• Security education programs, investigation, fire
prevention seminars, personal security checks.
MAJOR DIVISIONS OF INDUSTRIAL
SECURITY
• Physical Security - this concern with the physical measures adopted to
prevent unauthorized access to equipment, facilities, material and document
and to safeguard them against espionage, sabotage, damage, loss and theft.
BROADEST TYPE OF SECURITY
• Personnel Security- this is as important as physical security. Personnel security
starts even before the hiring of an employee and remains to be
maintained for as long as the person is employed. Its purpose is to insure
that a firm hires those best suited to assist the firm in achieving its goals
and objectives and once hired assist in providing necessary security to the work
force while carrying out their functions.
• Document and Information Security- this involves the protection of
documents and classified papers from loss, access by unauthorized
persons, damage, theft and compromise through disclosure. Classified
documents need special handling. Lack of indoctrination and orientation among the
personal handling them can result in the leakage, loss, theft and unauthorized
disclosure of the documents.
OTHER TYPES OF SECURITY
COMMUNICATION SECURITY
□ It is the protection resulting from various application of various measures
that prevent or delay the enemy or unauthorized persons in gaining
information through the communication system. This includes:
A. Transmission Security – protect transmission from interceptions
B.Cryptographic Security – result from the provisions of technically
sound crypto-systems and their proper use.
C.Physical Security – providing of safeguards to equipment and materials
from access by unauthorized person
HOTEL SECURITY
BANK SECURITY
DOCUMENT SECURITY – protection of documents and classified
papers
PERSONAL SECURITY – protection of personnel especially ranking
officials (VIP security)
CRISES SECURITY – Part of VIP security involved in hostage or
kidnapping of VIPs
INDUSTRIAL SECURITY
OPERATIONAL SECURITY – deals primarily with the protection of
processes, formula or patents and other industrial and manufacturing
activities from espionage, infiltration, loss, compromise or
photocopyinh
SCHOOL SECURITY
SUPERMARKET SECURITY
ETC.
Origins and Development of Security
World Setting:
• Henry Fielding – a magistrate who proposed a permanent, professional
and adequately paid security force.
• Allan Pinkerton – a copper from Scotland and Chicago Police
Department’s first detective, established what was to become one
of the oldest and largest private security operations in the United
States, The Pinkerton Agency. He is also credited with hiring the first
woman detective.
• Wells and Fargo Company – a freight transportation company,
employed their own detectives and security personnel, known as shotgun
riders. This is owned by Henry Wells and William Fargo.
• Brinks, Inc. – pioneered the armored car and courier service. This is
owned by Washington Perry Brink.
• Edwin Holmes – he offered the first burglar alarm service in the US
in 1858.
• William J. Burns – a former Secret Service investigator and head of
the Bureau of Investigation (forerunner of FBI), started the Burns
Detective Agency in 1909 which became the sole investigating agency
for the American Bankers’ Association.
• Baker Industries – initiated a fire control and detection equipment
business.
• American Society for Industrial Security International – it is
the first security professional organization. It was formed in 1955
and this also signifies the modern age of security.
Brief History of Security in the Philippines
- The private security business began on March 11, 1933, when the
first
formally licensed private security agency “Special Watchman Agency”
started operations;

-Later it renamed “Jimenez Security Agency”, founded by brothers Juan and


Pedro Jimenez;

-On May 30 1958, the Philippine Association of Detectives


and Protective Agency Operations (PADPAO) was formally organized;

-RA 5487 was passed on June 13, 1969 through the continuous lobbying of
the incorporators and officers of PADPAO, which set the standards and
minimum requirements for the operations of security agencies.

- P.D. 11 was passed on October 3, 1972, widening the coverage of RA


5487 to include security guards employed in logging concessions,
agricultural, mining and pasture lands;
- P.D. 100 was issued on January 17, 1973, broadening the coverage of the security
industry to include employees of the national or local government or any
agency who are employed to watch or secure government building and
properties.

- On August 1969, the Philippine Constabulary activated the Security


and
Investigation Supervisory office or SIASO to supervise and control the
organization and operation of private security and detective agencies nationwide;

-Later it was renamed Philippine Constabulary Supervisory Office for Security


and Investigation Agencies or PCSUSIA.

-With the passage of RA 6975, this unit was absorbed by the Philippine National
Police;

-Later it was made into a division of the PNP Civil Security Group and
was renamed Security Agencies and Guard Supervision Division (SAGSD);

-It was renamed to PNP Supervisory Office for Security Investigation Agency
(SOSIA).
LEGAL BASIS OF INDUSTRIAL
SECURITY IN THE PHILIPPINES
1. NATURAL AUTHORITY
The highest law is the law of self-preservation. By instinct man,
man
naturally reacts in order to protect himself, his family, his honor, freedom,
liberty and property from danger, threat, or hazard.

2. CONSTITUTIONAL AUTHORITY
The prime duty of the Government is to serve andprotect the
people. (Art. II, Sec. 4 of the 1987 Phil. Constitution)

3. STATUTORY AUTHORITY
The Revised Penal Code (Act No 3815)
Private Security Agency Law (RA 5487)
PHYSICAL SECURITY
TOPICS:
PHYSICAL SECURITY
PERIMETER BARRIERS
SECURITY LIGHTINGS OR PROTECTIVE LIGHTINGS
PROTECTIVE ALARMS
FIRE ALARM SYSTEMS
PROTECTIVE LOCKS
KEY CONTROL
PROTECTIVE CABINETS
PHYSICAL SECURITY
• a system of barriers placed between the potential intruder
and the objects/matter to be protected.
• It is the broadest branch of security, which is concerned
with physical measures adopted to prevent unauthorized
access to equipment, facilities, materials and documents and to
safeguard them against espionage, sabotage, damage and theft.
PRINCIPLES OF PHYSICAL SECURITY
In every establishment, physical measures are needed to deny
unauthorized access or intrusion because of the following:
1. ENEMY AGENTS MUST/WILL ALWAYS SEEK ACCESS
2.THERE IS NO IMPENETRABLE BARRIER – they are willing to
devote enough time, money, personnel, materials and imagination in passing
barriers.
3.DEFENSE IN DEPTH MEANS BARRIER AFTER BARRIER – there
should be integration of all barriers adopted in the installation.
4. SURREPTITIOUS VERSUS NON-SURREPTITIOUS ENTRY
SURREPTITIOUS (not observable) – the greatest hazard, because
it is usually difficult to determine
NON-SURREPTITIOUS (observable)
5. EACH INSTALLATION IS DIFFERENT – each installation will have
different problems to overcome. The security procedures will not be adequate
for all installation.
BARRIERS
Can be defined as any structure or physical device capable of
restricting, deterring, delaying, illegal access to an
installation
GENERAL TYPES OF PHYSICAL
BARRIER:
1.NATURAL BARRIER – include mountains, rivers, seas, desserts or
terrain difficult to traverse. To be fully effective, these barriers must be
under surveillance of guards.
2.STRUCTURAL OR MAN-MADE BARRIER –
structural
constructions made by man like fences, walls, floors, roofs, grill or
other physical means to deter or impede penetration.
SPECIFIC TYPES OF PHYSICAL
SECURITY BARRIERS (SHANE)
1.STRUCTURAL BARRIERS – constructed by man (walls,
ceilings, doors)
2.HUMAN BARRIERS – guards who stand between intruder and the
matter to be protected.
3. ANIMAL BARRIERS – shepherd dogs (Geese – cheapest)
4. NATURAL BARRIERS – mountains, cliffs, rivers, seas etc.
5.ENERGY BARRIERS – electrical and electronic devices
(protected lighting, alarms, etc)
PERIMETER BARRIERS
It is a mediumor structure which defines the
physical limits of an installations or area to restrict or impede access

LINE OF PHYSICAL DEFENSE/ Depth of Defense


1.FIRST LINE – includes all perimeter barriers, located in the
outermost area of an installation like fence.
2.SECOND LINE – includes the building exterior (doors,
floors, windows, walls and grills.)
3.THIRD LINE – includes those internal control measures
(storage system like safe, vaults and file room)
PERIMETER BARRIER OPENINGS
1.Gates and doors should also be guarded or locked as much as
possible
2.Windows and similar openings should be guarded or grills should be
installed (openings less than 18 ft. above the ground or less than
14 ft diagonally opposite uncontrolled windows, or openings of
96 sq inches or larger SHOULD BE GRILLED OR HAVE STEER
BAR PROTECTIONS)

3.Sidewalk elevators are elevated parts of the land near the perimeter
barrier that provides access to areas within the perimeter barriers and should
be locked and guarded

4.Utilities openings such as sewers, air intakes, which have cross-


sectioned area of 96 sq. inches or more should be protected by bars,
grills etc.
5. Clear Zone is an unobstructed area maintained on both sides of
perimeter barrier.

Specification of Clear zone:


A.a clear zone of 20 ft. or more should exist between the perimeter
barriers and exterior structures
B.A clear zone of 50 ft. or more should exist between the perimeter
barrier and structures within the protected areas, except when a
building wall constitutes part of the perimeter barrier.
TYPES OF PERIMETER BARRIERS
1. FENCES
-SOLID FENCE
-FULL VIEW
WIRE FENCE
Chain Link Fence
Barbed Wire Fence
Concertina/
DannertWire
Fence
2. BUILDING WALLS –
walls, floor, roofs
3.BODIES OF WATER – river, lake, sea, pond or any bodies of
water
FENCE
Are independent structures designed to control physical and
visual access between outside areas.
TYPES OF FENCES
1.SOLID FENCE – Constructed in such away that visual access
through the fence is denied. Its advantage is that it denies the
opportunity for the intruder to become familiar with the personnel, activities
and the scheduled movements of the security personnel. On the other hand, it
prevents the guards from observing the area around the installation and it
creates shadow that may be used by the intruder for cover and concealment.
2.FULL VIEW – It is constructed in such a way that visuals access is
permitted through the fence. Its advantage is that it allows the security
personnel to keep the surrounding of the installation under observation. On
the other hand, it allows the intruder to become familiar with the movements
the security personnel.
WIRE FENCE – is a type of fence made of chain-link, barbed wire
concertina
Types of Wire Fence
Chain Link Fence

• It must be constructed at least 7 feet tall excluding top guard.


• It must be of 9 gauge or heavier.
• The mesh openings are not be larger than 2 inches per side.
• It should be twisted and barbed salvage at top and bottom.
• It must be securely fastened to rigid metal or reinforced concrete.
• It must reach within 2 inches of hard ground or paving.
• On soft ground, it must reach below surface deep enough
to contemplate for shifting soil and sand.
Barbed Wire Fence

• Standard barbed wire should be twisted, double strand, 12


gauge wire with 4 point barbs, spaced on equal distant apart.
• Barbed wire fencing should not be less than 7 feet high
excluding top guard.
• Barbed wire fencing must be firmly affixed to post not more than
6 feet apart.
• The distance between strands should not exceed 6 inches and
at least one wire will be interlaced vertical and midway between posts.
3. Concertina/Danert Wire Fence

a. Standard concertina barbed wire is commercially manufactured


wire coil of high strength steel barbed wire clipped together at
intervals to form cylinder.
b. Opened concertina wire is 50 ft. long and 3 ft. in diameter.
c. They are formed like accordions
ADDITIONAL PROTECTIVE MEASURE
1. Top guard
2. Guard Control Stations
3. Tower or Guard Towers
4. Signs and Notices or Control Signs
5. Protection in Depth
Top guard
Is an additional overhang of barbed wire fence placed on vertical
perimeter fences facing upward and outward with a 45 degree
angle with 3 to 4 strands of barbed wires spaced 6 inches apart.
Guard Control Stations
Normally provided at main perimeter entrance to secure areas
located out of doors and manned by guards on full time basis .
Towers or Guard Towers
Are house-like structures above theperimeterbarriers. It gives
psychological effect to violators
Signs and Notices or Control Signs
Control signs should be erected where necessary in the
management of unauthorized ingress to preclude accidental
entry.
PROTECTION IN DEPTH
In large open areas or ground, where fencing or walling is
impracticable and expensive, warning signs should be conspicuously
placed.
The depth itself is protection.
PERIMETER GUARDS
Are also employed in augmenting the existing
perimeter security or perimeter barriers of a certain
establishment

The 2 types of employing perimeter guards are:


1. FIXED POST – assigned in a particular place
2.PATROL (ROVING) – required to walk and go around regularly
around the premises.
SECURITY LIGHTINGS OR PROTECTIVE
LIGHTINGS
It provides a means of continuing illumination during hours of
darkness, a degree of protection that is maintained during daylight
hours.

PURPOSES OF SECURITY LIGHTING


1.It improves visibility so that intruders can be seen, identified and
apprehend;
2.It gives psychological fear, which serves as a deterrent to thieves,
pilferers, trespassers, and sabotage;
3.Itmakes easier. The routine of work of guards in
identifying employees, vehicles during night time;
4. If placed in certain areas, may even reduce the number
of
stationary guards, and instead, may require only roving patrols at
night.
PROTECTIVE LIGHTINGS SIGNIFICANCE
TO SECURITY FORCES
1. Reduction of the need for security forces
2.Personal protection for forces by reducing the advantage or
concealment and surprise for a determined intruder.
3.Relieved security forces could be used to better advantage
elsewhere.
Types of Protective Lighting

1. Stationary or Continuous Lighting


2. Standby Lighting
3. Movable or Portable Lighting
4. Emergency Lighting
1. Stationary or Continuous Lighting
It consist of a series of fixed luminaries at range to flood a
given area continuously during hours of darkness.
It is the most familiar type of security lighting.
A. Glare Projection
□ Intensity is focusedto the intruderwhile theobserver
remains in comparative darkness.

B. Controlled lighting
□ Lighting is focusedonthe pile of items rather than
the background.
2. Standby Lighting
□ Similar to continuous lighting but is turn on manually or by
special device or other automatic means, when there is suspicion
of entry.

3. Movable/ Portable Lighting


□ This consist of stationary or portable, manually operated
searchlights which may be lighted continuously during the hours
of darkness or only as needed.

4. Emergency Lighting
□ Used in times of power failure or other emergencies when other
systems are inoperative.
Types of Lighting Equipment
Floodlights
□ Used for outdoor security lightning including the illumination of boundaries,
fences, and buildings.
Searchlights
□Used to pinpoint potential trouble spots.
Fresnel lights
□ Used to extend the illumination in long, horizontal strips to protect the
approaches to the perimeter barrier.
□ Approx 180 degrees(Horizontal) and 15 to 30 degrees (Vertical)
Street lights
□ Is a raised source of light on the edge of a road or path.
□ Produce diffused light rather than directional beam.
□ They are widely used in parking areas
TYPES OF LIGHT LAMPS
1.INCANDESCENT LAMP – most common light bulb, instant ,
illumination to using wire filament, have low initial cost
2.FLUORECENT LAMP – Tube lamps, it cannot project
light over long distances, desirable as flood type lights
3.GASEOUS DISCHARGE LAMP – require period of 2 to 5
minutes to light
Mercury Vapor – Blue Green or Purplish-white color, considered
more efficient and is widespread in exterior lighting
Sodium Vapor – Yellow/amber color, used in areas where
insect predominate

4.QUARTS LAMP (LED LIGHTS) – produce very bright color,


almost rapid as incandescent lamp, emits very bright white light
PROTECTIVE ALARMS
ALARM – is synonymous to warning of imminent danger.
Is an aural or visual signal given by the annunciator to the
security when intruder actuate certain devices in a protected area.

Basically, alarm system are designed to alert security


personnel of a attempted or consummated intrusion into an
area, building or compound. Each type of alarm is activated in the
event that an intruder tampers with the circuitry, a beam or radiated
waves. Alarm are also for fire, smoke, or other emergencies and
presence of hazards.
THREE PARTS OF AN ALARM
SYSTEM
Generally all alarming devices have these three basic parts:
1. SENSOR OR TRIGGER DEVICE
Device that can sense an abnormal condition within the system and
provide a signal indicating the presence or nature of the abnormality

2. CIRCUITS/TRANSMISSION LINE
Carries messages to the signaling apparatus
It is the communication channel that conveys the information from all
sensors in the system to the signal by means of wire, radio waves.

3. ENUNCIATOR/ANNUNCIATOR/SIGNALING SYSTEM
The actual alarm may be audible or silent, a bell, buzzer,
phone ringing, or flashing of light.
TYPES OF ALARM DETECTION
SYSTEM
Central Alarm System
A type of protective alarm system where the central station is
located outside the installation. When the alarm is sounded,
central station notifies the police and other agency.

Proprietary System
This functions they same way as the central station system except it
is owned, operated by the facility.
Response to all alarms is by the facilities own
security or fire personnel.
Local Alarm System
Consist of ringing up a visual or audible alarm near the object to
be protected.
In case of alarm, response be made by local guards and other
personnel within sight or hearing.

Auxiliary System
In this system, installation circuits are led into local police or
fire department by leased telephone lines.
High incidence of false alarms have made this system
unpopular with public fire and police personnel
Local Alarm by Chance System
This is a local alarm system in which a bell or siren is sounded with
no predictable response.
The hope is that a neighbor or passing patrol car will reach the
alarm and call for police assistance, but such a call is purely a
matter of chance.

Dial Alarm System


This system is set to dial a predetermined numbers when the alarm
is activated.
When the phone is answered, a recording states that an
intrusion is in progress.
It could fail if line were busy or if the phone connection were
cut.
Types of Bank Protective Alarms
Foot Rail Activator- Are placed on the floor in such a position that
tellers may activate the alarm by placing the front of their foot to
engage the activation bar.
Bill traps or currency activation devices placed in the teller’s top
cash drawer and connected to the alarm system using a connector.
When currency is removed from the devices, alarm system is
activated.
Knee or Thigh Buttons
These are installed inside the desk or teller station so they can be
activated by knee or thigh pressure. Usually found in location where
personnel perform their duties in seated position.
Foot Button - It permits alarm activation safety while both hands
remain in clear view of the robbers.
Double Squeeze Button - Requires pressure on both sides of the
device, therefore the probability of false alarms is reduced.
FIRE ALARMS SYSTEMS
FIRE ALARMS
Any visual or audible signal produced by a device or system to
warn the occupants of the building or fire fighting elements of the
presence or danger of fire to enable them to undertake immediate
action to save life and property and to suppress the fire.

DEVICES

1.Smoke Detector - a device placed at the ceilings of the floor that


detects smoke, typically as an indicator of fire.
2.Fire Bell -a hollow device made of metal that makes a ringing
sound.
PRIVATE FIRE PROTECTION SYSTEM
AUTOMATIC SPRINKLER – a type of built in sprinklers which
works by the increase of room temperature and which automatically
operates the system to put out the fire. Attached and distributed in
the ceiling of the rooms. These sprinklers will go into action once a
fire starts, and those that will open are those that are directly above
the fire and water is delivered where it is needed.
TYPES OF SPRINKLER SYSTEM
WET PIPE SYSTEM – the piping has water with pressure
DRY PIPE SYSTEM – the pipes are filled with air under pressure
which holds the water at a value located in a room
STAND PIPES
G.I. steel or plastic pipes located inside the building from the
lowest to the top floor with water under pressure for use in case of
fire. Located near the standpipe is a fire hose usually enclosed in
a glass box.

FIRE HYDRANT
It is a mechanical device strategically located in an installation or in a
street where a fire hose will be connected so that the water will be available
to extinguished a fire.

FIRE EXTINGUISHER
Is a fire fighting equipment which can is a fire fighting equipment which can
be portable or in cart that is used to put out fire depending on the
contents to extinguish certain types of fire.
PROTECTIVE LOCKS
Generally speaking, LOCKS are the CHEAPEST security
investment that can be made.
Locking device is simply a mechanism that extends the door or
window into a wall that hold them.
It must be recognized that any lock will eventually yield to attack.
They must be thought of only as delaying devices.
DEFINITION OF TERMS
LOCK
definedas mechanical, electrical, hydraulic or electronic device designed to
prevent entry to a building or room.
KEY
instrument for lockingandunlocking; a metal bar with notches or grooves that
when inserted into a lock and turned, operates the lock’s mechanism
PADLOCK
A portable anddetachable lock having a pivotedor sliding hasp which possess
through a staple ring, or the like and is made fast or secured.
PETERMAN
A term used in England for lock picker, safecrackers, and penetrators of restricted areas
or rooms
FALSE KEY
Genuine key stolen from the owner
❑ Types of Locks

1. Warded Locks

□ It offers very little security.


□ This type of lock must
therefore be used only to
have privacy, but not to
provide a degree of security.
□ It is the simplest form of
lock.
□ Skeleton Key
2. Disc Tumbler Locks

□ It is designed for the


use of the
automobile industry
and are general use in
car doors today.
□ The delay afforded is
approximately 5 to 10
minutes.
3. Lever Locks

□ This lock are


used in safe
deposit boxes
and for all
practical
purposes,
pick-proof.
4. Code-operated
Locks

□ These are the


combination
type of
locks in that no key
are used.
□ They are opened by
pressing a series of
numbered buttons in
the proper
sequence. Some of
them are equipped
to alarm if the wrong
sequence was
pressed
5. Electromagnetic
Locks

□ These are
devices
holding a door
closed by
magnetism.
These
are electrical
units
consisting of the
electromagnetic
on
metal holding
plate.
When the power
is
6. Card-operated
Locks

□ Coded- cards,
either notched,
embossed, or
containing an
embedded
pattern
of copper locks,
are
used to operate
such locks.
□ These are
frequently fitted
with
a recording
device
KEY CONTROL
Is the management of keys in a plant or business organization to
prevent unauthorized individuals access to the keys.
The following can be utilized to maintain effectively key control.
A. key cabinet
B. key records
C. Inventories
D. Audits
E. Daily reports
Types of Keys

1. Change Key – A key to a single lock.


2. Sub-master Key – A key that will open all locks
within a particular area or grouping.
3. Master Key – A special key capable of opening a series
of lock.
4. Grand Master Key – A key that will open everything
in a system.
MASTER KEYING SYSTEM
It is system used in big installations whereby keys can open a
group or group of locks.

Note:
MASON KEYING – is the use of a key to open the main entrance
and the office.
PROTECTIVE CABINETS
This is done by placing documents in a secured and usually fire
proof containers.
Types of Security Cabinets
1. Safe
□ A metallic container used
for safekeeping of documents or
small items in an office or
installation.
□ Its weight must be at least 750 lbs.
□ Walls should be at least 1 inch
thick.
□ Doors should be made of steel and
at least 1 ½ thick.
Safe Cracking Methods
1. Drilling or punching – accomplished by knocking off
combination dial and drilling hole to expose locking device.
2. Burning – process of using oxyacetylene torches or
burning bars.
3. Peeling – process of attacking the seams of metal plates
with pry bars to peel back layers of metal and thus exposing
either lock mechanism or interior.
4. X-ray – it is utilized to reveal position of the combination
and mechanism necessary to open safe.
5. Use of Explosives – a nitro-glycerine and
plastic explosives.
6. Use of Power tools – examples are use of rotary devices,
hydraulic tools and power drills.
7. Manipulation – a very few safe crackers have skill
to use this technique.
2. Vault
□ It is a
heavily-construct
ed fire and
burglar resistant
container, usually
a part of the
building structure,
used to keep and
protect cash,
documents, and
negotiable
instrument.
□ Door should be made of steel at least 6 inches in thickness.
□ Walls, ceiling and floor should made out of reinforced
concrete at least 12 inches in thickness. Vault floor should be
higher by 4 inches which the surrounding floors.
□ Electrical conduits into the vaults should exceed 1
½ in diameter.
□ Vaults should not be more than 5,000 cubic feet.
□ Fire- resistive up to 6 hours.
3. File Room

□ It is a cubicle in a
building constructed
little lighter than a vault
but of bigger size to
accommodate limited
people to work on the
records inside.
□ File room should at
most be 12 feet high.
□ Must have a watertight
doors and at least one
(1) hour fire proof.
PERSONNEL SECURITY
PERSONNEL SECURITY
SECURITY EDUCATION
PERSONNEL SECURITY
includes all the security measures designed to prevent unsuitable
individuals or persons of doubtful loyalty to the government, from
gaining access to classified matter or to any security facility, and to
prevent appointment, or retention as employees of such individuals

It is the “weakest link” in the security chain. This weakness can best
be minimized or eliminated by making the personnel security conscious
through good training program.
OBJECTIVES OF PERSONNEL
SECURITY
1.To provide the standards and procedures necessary to insure the
appointment, employment or retention of suitable and loyal individual
2.To develop the necessary and proper security discipline among the
applicants and employee as well as to protect and preserve the security
interest of the organization.
3.Inculcate the desirable security attitudes and habits among the
applicants and employees.
CONTROL OF PERSONNEL IN THE
PHYSICAL FACILITY
A control point must be established for positive personnel
identification and check system. This is to insure that only those person
who have the right and authority will be given the necessary access to
the area.
The most practical and generally accepted system of personnel
identification is the use of IDENTIFICATION CARDS, BADGES OR
PASSES.
2 TYPES OF PERSONNEL IDENTIFICATION
A. PERSONAL RECOGNITION – if the person’s
familiarity characteristics
B. ARTIFICIAL RECOGNITION – identification cards, passes,
passwords, etc.
USE OF PASS SYSTEM
A.SINGLE PASS SYSTEM – the badge or pass coded for authorization
to enter specific areas is issued to an employee who keeps it in his
possession until his authorization terminates.

B.PASS EXCHANGE SYSTEM – an exchange takes place at the


entrance of each controlled area. Upon leaving the personnel surrenders
his badge or passes and retrieve back his basic identification.

C.MULTIPLE PASS SYSTEM – this provides an extra measure of


security by requiring that an exchange take place at the entrance of each
restricted area.
RESTRICTED AREA
Is any area in which personnel or vehicles are controlled for reasons
of security.
Is established to provide security for installation or facilities and
to promote efficiency of security operations and economy in the use of
security personnel.
TYPES OF RESTRICTED AREAS
EXCLUSION AREA – is a restricted area which contains a
security interest to Top Secret importance.
The area should be under surveillance at all times.

LIMITED AREA CONTROL – is restricted area in which a lesser


degree of control is required than in an exclusion area

CONTROLLED AREA – an area near or adjacent to limited or


exclusive areas where entry is restricted;
Access List – authenticated list of personnel given to the security
allowing entry to a compound or installation or part thereof;

Duress Code – type of code system so that security personnel or any


employee when forced by armed men intending to enter an installation
can give alarm by the use of certain words in casual conversation with
personnel in the installation.
PERSONNEL SECURITY INVESTIGATION
It is an inquiry into the character, reputation, discretion, and loyalty of an
individual in order to determine a person’s suitability to be given security
clearance.

TYPES OF PSI
A. NATIONAL AGENCY CHECK (NAC) – this is an investigation of
individual made upon the basis of written information supplied by him in
response to official inquiry, and by reference to appropriate NATIONAL
AGENCIES. The following national agencies checked under this type of
investigation are the following:
1. NATIONAL INTELLIGENCE COORDINATING AGENCY (NICA)
2. NATIONAL BUREAU IF INVESTIGATION (NBI)
3.INTELLIGENCE SERVICE OF THE ARMED FORCES OF
THE PHILIPPINES (ISAFP)
4. CRIMINAL INVESTIGATION DETECTION GROUP (CIDG)
B. LOCAL AGENCY CHECK (LAC)
This type of investigation consist of the first type plus written inquiries
sent to appropriate local government agencies, former employees,
references, schools.
Reference are the following:
1. Mayor, police, fiscal, judge of the locality
BACKGROUND INVESTIGATION
It is an inquiry which aims to verify applicant’s information written at the
applicants form, to ascertain his/her past employment experiences and to
obtain other information pertinent to the decision to employ.
This is more comprehensive investigation than the NAC and LAC.

TYPES
A. COMPLETE BI – all circumstances of personal life
B.PARTIAL BI – limited only to some of the circumstances of persons life
FACTORS TO BE CONSIDERED IN THE
CONDUCT OF BI
1.Loyalty – faithful allegiance to the Philippine government and its
duly constitutional authorities;
2.Integrity – uprightness in character, soundness of moral principle,
freedom from moral delinquencies.
3.Discretion – the ability or tendency to act or to decide with
prudence, the habit of wise judgment;
4.Morals – distinctive identifying qualities which serve as an index to
the essential or intrinsic nature of a person;
5.Character – the sum of traits that have been impresses by nature,
education and habit upon the individual;
6.Reputation – opinion or estimation in which one is generally held.
It is what a person is reported to be whereas character is what a person
is.
SECURITY EDUCATION
It is defined as the exposure and teaching of employees on security
and its relevance to their work. Security education is conducted to
develop security awareness among employees of the company. It should
cover all employees, regardless of rank or position.
SECURITY EDUCATION PROGRAM
A program given to employees of an installation by lecture and other
means pertaining to measure and safeguard to be taken to protect the
interest of the installation for, damage, sabotage, pilferage and other
criminal acts.
SEVEN PHASES OF SECURITY
EDUCATION PROGRAM
1. Initial Interview – the individual’s first contact should be formal
and professional.
It must leave an impression on theindividual of the
seriousness of security.
It should stress the importance of security of the company and
individual.
To explain the penalties that could result from violations.
2. Training Conference

It should be held during the initial processing or


training period of an individual.
It should be reiteratedthat security is part of thejobnotan
additional burden imposed upon the job.
The conference will last from 2 to 4 hours.
3. Refresher Conference
Purpose:
It reminds individuals of
their responsibilities.
It can be used as forum to resolve problems that have
arisen since the last conference.
To explain new regulations, changes in regulations and new
requirement that may have been levied by the company.
Ask for recommendations and comments about existing
policies.
4. Security Reminders – this in an indirect approach or passable
approach. The most common approach is the use of posters.

5. Security Promotion – the act of emphasizing the


importance and role of security in achieving company’s
objectives.
6. Special Interview – this is intended to augment refresher
conference.

7. Debriefing – a procedure wherein the employee, who has been


given access to sensitive information, to reminded of his
continuing accountability and responsibility to safeguard
information entrusted to him in connection with his job.
DOCUMENT AND INFORMATION
SECURITY
Is the sum total of all policies, regulations, doctrines, practices,
enforces to safeguard the contents and integrity of any classified
information of document from compromise or loss.
GENERAL PRINCIPLES
1. The authority and responsibility for the preparation and
classification of classified matter rest exclusively with
originating office; the
2.Classified matter should be classified according to content and not the
classification of the file in which they are held or of another document
to which they refer;
3.Classification should be made as soon as possible by placing the
appropriate marks on the matter to be classified;
4.Each individual whose duty allows access to classified matter is
responsible for the protection of the classified matter while it is in
his/her possession and shall insure that dissemination of such classified
matter is on the “need to know” basis and to “property cleared
personnel only”
TYPES OF BUSINESS RECORDS
Class I – Vital Document – This is an irreplaceable records ,
reproduction of which does not have the same value as the
original;
Class II – Important Document- This is a record, reproduction of
which cause considerable expense and labor, or considerable delay.
Class III – Useful Document – This is a record, the loss of which
may cause inconvenience but could be readily replaced and may not
present insurmountable obstacle to the prompt restoration of the
business;
Class IV- Non essential Document – This record may include
daily files, routine in nature, lost of which will not affect the
organization.
SECURITY CLEARANCE
Is the certification by a responsible authority that the person
described is cleared for access to classified matter the appropriate
level.
Refers to the administrative determination that an individual is
eligible for access to classified matter.

CERTIFICATE OF DESTRUCTION
This is the certification by a witnessing officer that the classified
matters describe therein has been disposed of in his presence in an
approved destruction methods.
OTHER TERMINOLOGIES
1. CLASSIFIED – refers to assign information by one of the 4
classifications categories.

CLASSIFICATION OF DOCUMENTS-Memorandum Circular No.


196, dated 07/19/1968 (Security of Classified Matter in government
offices.)

TOP SECRET – any information and material, the unauthorized


disclosure of which would cause exceptionally grave damage to the
nation, politically, economically or militarily;
SECRET- any information and material, the unauthorized disclosure of
which would endanger national security, cause serious injury to the
interest or prestige of the nation or any governmental activity.
CONFIDENTIAL – any information and materials, the
unauthorized disclosure of which would be prejudicial to the
interest or prestige of the nation or governmental activity or would
cause administrative embarrassment or unwarranted injury.

RESTRICTED – any information and material which requires special


protection other than those determined to be Confidential, Secret, and
Top Secret matters.
2.COMPROMISE – means lose of security, which results from an authorized
persons obtaining knowledge of classified matter.
3.COMPARTMENTATION – is the grant of access to classified matter only
to PROPERLY CLEARED PERSONS
4.DECLASSIFY – is the removal of security classification from classified
matter
5.RECLASSIFY/RE-GRADING – is the act of changing the assigned
classification of matter
6.UPGRADING – is the act of assigning to a matter of higher classification to
a classified
7.DISSEMINATION – dissemination of classified matter shall be restricted to
properly cleared persons whose official duties required the knowledge
thereof.
8.PURGING – is the process of destroying a document which is no longer
significant in the organization
RECORDS AND DOCUMENT PROTECTION
CATEGORIES OF STORAGE CONTAINERS
CLASS 1 – commercial record safes designed for fire protection
CLASS 2 – commercial money safes designed for robbery and
burglary protection
CLASS 3 – security cabinets designed to meet specification
for safeguarding classified materials.

TEST FOR SAFE’S FIRE RESISTANCE


FIRE ENDURANCE TEST – is done at a temperature above 350
degrees Fahrenheit
EXPLOSION HAZARD TEST – Is done to determine if the sudden rise
in temperature will not cause the safe to repute. If the safe can
withstand 2000 degrees Fahrenheit for 30 mins. and will not crack or open,
then it has passed the explosion test.
FIRE AND IMPACT TEST – is aimed at determining the strength of a
safe to withstand the collapse of building during a fire
PROTECTION OF SENSITIVE MATERIALS
AND INFORMATION
OPERATIONAL SECURITY
Part of physical security that deals primarily with the protection of
processes, formulas, patents, and other industrial and manufacturing activities
from espionage, infiltration, loss, compromise or photocopying;

INFORMATION CYCLE
1. The Creation – Information is discovered and develop;
2. Used – Some action is take with the information;
3. Storage and Retrieval – Stored for future use;
4. Transfer – transferring of information from active to inactive use;
5.Disposition – decision may be made to retain the information
indefinitely.
KINDS OF SENSITIVE INFORMATION
PROPRIETARY INFORMATION
Information which some special way is related to the status,
operations or activities of the possessor over which the possessor
asserts ownership.
TRADE SECRETS
It may consist of any formula, pattern, device or compilation of
information which is used in one’s business and which gives one
opportunity to gain an advantage over competitors who do not know or
use it.
PATENT
A grant given by the government to an inventor, conveying and
securing to him the exclusive rights to make, use and sell his invention
for term of twenty (20) years.
THREAT TO PROTECTION OF SENSITIVE
INFORMATION
Competitive Intelligence – systematic program for gathering and
analyzing information about competitor’s activities and general
business trends to further company’s goals.

Types of Competitive Intelligence


1.White – information available from company publication, public
records or commercial reporting sources;
2.Gray – not readily available but which is usually can be obtained
without acquiring any civil/criminal liability in the process.
3. Black – obtained through clearly unethical or illegal means.
THREATS IN COMMUNICATION
SECURITY
1.Wiretapping - is the monitoring of telephone conversations by a
third party, often by covert means.
2.Bugging – means to secretly listen to or record a conversation using
a hidden electronic device.
3.Eavesdropping (unauthorized listening)- is the unauthorized real-
time interception of a private communication, such as a phone call,
instant message, videoconference or fax transmission.
RISK MANAGEMENT ALTERNATIVES
AND STRATEGIES
TERMINOLOGIES:
HAZARDS – exposure to the chance of loss or injury

SECURITY HAZARDS – any act or condition which may result in the


compromise of information, loss of live, loos or destruction of property or
disruption of the objective of the installation.

RISK – It is the potential damage or loss of an asset.

RISK MANAGEMENT – it is a process of selecting and implementing


security countermeasures to achieve an acceptable level of risk at an
acceptable cost.
RISK ANALYIS – it is the analysis of risk, which includes examinations of the
vulnerability, probability and criticality of potential threats and include natural and
man made risk

ADVERSARY – an individual, group, organization or government that conducts


activities or has the intention and capability to conduct activities DETRIMENTAL to
the individual, private or government entity.

ASSET – any information, facility, materials, information or activity which has a


positive value to its owner.

COUNTERMEASURES – an action taken or a physical security used to reduce or


eliminate on or more vulnerabilities.

PROBABILITY – it is the chance or likelihood that a loss will take place

CRITICALITY – It is the impact of a loss as measured in financial terms.


RELATIVITY OF RISK AND SECURITY
The extent and degree of risk to security is dependent on the
following:
1.RELATIVE CRITICALITY OF OPERATION – pertains to
importance of the firm with reference to the natural economy and
security.
EXAMPLES: gasoline depots, communication transmission lines
and power plants

2.RELATIVE VULNERABILITY – This is the susceptibility of the


plant or establishment to damage, loss or disruption of the operation
due to various hazards.
EXAMPLE: location of the building, the machine or presence of
possible poisons.
RISK MANAGEMENT AND
ALTERNATOVES AND STRATEGIES

To lessen or eliminate theeffect if risk or hazards, the following


are the alternatives and strategies commonly applied:
1. RISK AVOIDANCE – eliminating or removing the risk
Example: proper disposal of inflammable substances
2.RISK REDUCTION – decreasing the risk by minimizing the
probability of the potential loss.
Example: construction of fences and similar physical barriers
3.RISK SPREADING – spreading of the risk through
compartmentation or decentralization to limit the impact
of the potential loss.
Example: Using numerous vaults or safes for safekeeping of
documents and paper bills
4.RISK TRANSFER – moving of financial impact of the potential
loss over to an insurance company.
Example: Availing property and life insurances
Hiring security agencies
5.RISK SELF-ASSUMPTION – this is a planned assumption and
acceptance of the potential risk by making deliberate managerial
decision of doing nothing about the threat
SECURITY HAZARDS
Normally, loss of life and damage to properties are caused by human
negligence in their failure to recognize the adverse effect of a particular
condition or event.
Security interferes by REMOVING OR DETERRING the identified
hazards.
TYPES OF HAZARDS
1. NATURAL HAZARDS – arise from natural phenomena
2.HUMAN-MAN MADE HAZARDS – result of a state of mind,
attitude, weaknesses or character traits of one or more persons.
It includes but not limited to the following:

A. SABOTAGE – deliberate destruction or the deliberate


damaging or destroying of property
Saboteur
One who destroy company properties or perform other explicit
activities which would result to disturbance, to cause financial drain,
postponement of operation, threaten, or to attach negative impression.
The most dangerous foe that security will have to deal with
B. ESPIONAGE – it is describe as the activity if SPYING or the
use of spying or spies to GATHER INFORMATION.
Espionage agent or spy
One who has allegiance to another company, oftentimes rival,
whose primordial mission is to obtain information useful in company’s
operation.

C. PILFERAGE – stealing small things or items of little


value, especially habitually.
It is one of the most common and annoying hazards which
security has to deal with.
Types of Pilferer
Casual Pilferer
One who steals due to his inabilityto resist the
unexpected opportunity and has little fear of detection.

Systematic Pilferer
One who steals with preconceivedplans and takes
away any or all types of items or supplies for economic gain.
SECURITY SURVEY,
SECURITY INSPECTION
AND SECURITY
INVESTIGATION
SECURITY SURVEY
This is also known as security audit which is actually a fact-finding
probe to determine a plant’s adequacy and deficiency in all aspects of
security, with the corresponding recommendations.
Refers to checklist, audits, or inventories of security conditions.

Security Surveys are often called ‘RISK ANALYSIS


SURVEYS’ or ‘RISK ASESSMENT SURVEYS
WHO PERFORMS SECURITY AUDTI
AND SURVEY?
This should be conducted by qualified security experts who can
be from the organization or outsiders contracted to do the job.
Generally, recommendations from security survey will fall into three
categories:
1. HUMAN GUARD
2. EQUIPMENT
3. PROCEDURES
ROLE OF SECURITY OFFICERS
It is the security offices who is directly responsible to the head of
office for proper maintenance of security of the security program of the
office.
SECURITY SURVEY PROCEDURES
1. PRELIMINARY PLANNING
-conduct preliminary courses of action that PRECEDE the
actual conduct of the survey
-Use of checklist (list of considerations that must be covered during the
survey)

2. INITIAL BRIEFING (ENTRANCE CONFERENCE)


-specialist is prepared to visit the office
-contract is made between security officer of the office
-It would be ideal to have at his conference not only the office head but
his entire staff and other key personnel of the office.
3. ESCORT PERSONNEL
-an escort should accompany the specialist during the survey
-preferably, this escort should be thesecurity officer of the
office or his representative.

4.PRELIMINARY EXTERIOR AND INTERIOR CHECK


-the specialist conducts tour of the area surrounding the office
-after preliminary survey, the specialist is ready to commence the
analysis of the office’s security program
5. ANALYSIS EXISTING SECURITY
-Specialist will now ascertain theexisting level of security
of the installation.
-Includes collection of all factual data that affects the security of
the office.
-the specialist makes his own conclusions which are reflected in
his recommendations

6. FINAL BRIEFING (EXIT CONFERENCE)


-is an oral to the chief wherein the specialist determines whether or
not his tentative recommendations can be realistically implemented.
-the specialist discusses the recommendations with the command.
SECURITY INSPECTION
Is a service performed to determine compliance with the established
security polices and procedures and is conducted on a recurring
schedule or a follow-up to a security survey.
This is a check of how well the existing security measures and
regulations are being carried out within a detachment or
establishment
May also include an investigation of alleged or suspected security
violations.
TYPES OF SECURITY INSPECTION

1. Continuous Inspection
2. Formal Inspection
3. Informal Inspection
4. Structured Inspection
5. Unstructured Inspection
1. Continuous Inspection
To keep pace with the constant changes in the organization, changes
in our security terms of attitudes, life-style and moral values, and the
rapid advancement of technological modifications are all around us, the
inspection must be an on-going and never ending activity.
2. Formal Inspection
□ Preceded by an announcement and the unit under
inspection prepares for events.

3. Informal Inspection
□ Executed in a spirit of understanding and cooperation.
4. Structured Inspection
□ There is a format or logical sequence.

5. Unstructured Inspection
□ Conducted in random manner. There is no format and logical
sequence.
DRY-RUN
Practical test or exercise of plans or any activity to test
its validity, an operational readiness exercise;
SECURITY INVESTIGATION
This is a planned and organized determination of facts concerning
specific loss or damage of assets due to threats, hazards or unsecured
conditions.
SECURITY GUARD FORCE
It is a group of force selected men, trained or group into functional unit for
the purpose of protecting operational processes from those disruption which
would impede efficiency or halt operation at a particular plant, facility,
installation or special activity.

RA 5487 provided for the organization and management of security guard


forces designed for specific organizations and purposes. The three (3) security
guard forces are the following:
1. PRIVATE SECURITY AGENCY
(PSA) 2.COMPANY GUARD FORCE
(CGF)
3. GOVERNEMNT GUARD UNIT
(GGU)
PRIVATE SECURITY AGENCY (PSA)
Shall mean any person association, partnership, firm or private
corporation, who contracts, recruits, trains, furnishes or posts any
security guard, to perform its functions
COMPANY GUARD FORCE (CGF)
A security force maintained and operated by any private
company/corporation utilizing any of its employees to watch, secure or
guard its business establishment premises, compound or properties.
GOVERNMENT GUARD UNIT (GGU)

A security unit maintained and operated by any government entity


other than military or police, which is established and maintained for
the purpose of securing the office or compound and/or extension of
such government entity
SALIENT FEATURES OF
IMPLEMENTING RULES OF
REPUBLIC ACT NO. 5487
[ REPUBLIC ACT NO. 11917, July 30,
2022 ]
AN ACT STRENGTHENING THE REGULATION OF THE
PRIVATE SECURITY SERVICES INDUSTRY, REPEALING
FOR THE PURPOSE, REPUBLIC ACT NO. 5487, ENTITLED
“AC ACT TO REGULATE THE ORGANIZATION AND
OPERATION OF PRIVATE DETECTIVE WATCHMEN OR
SECURITY GUARD AGENCIES”, AS AMENDED

SEC 1. Short Title – This Act shall be known as “The Private


Security Services Industry Act”
DEFINITION OF TERMS
Private Security Guard (SG) – sometimes called private security guard or watchman
shall include any person who offers or renders personal service to watch or secure

Private Detective (PD) – shall mean any person who does detective work for hire,
reward or commission, other than members of the Armed Forces of the Philippines,
guards of the Bureau of Jail Management and Penology, municipal or city jail
guards, and members of the Philippine National Police or of any other law
enforcement agency of the government.

Private Security Personnel – shall be natural persons which include private security
guards, private detectives, security consultants, security officers and others that may
be classified later, rendering/performing security and/or detective services as
employed by private security agencies and/or private firms.
License to Exercise Profession – shall mean any document issued by the
Chief, Philippine National Police or his duly authorized representative
recognizing a person to be qualified to perform his duties as private security
or training personnel. (License To Exercise Security Profession – RA 11917)

License to Operate (LTO) – is a License Certificate document, issued by the


Chief, Philippine National Police or his duly authorized representative,
authorizing a person to engage in employing security guard or detective, or a
juridical person to establish, engage, direct, manage or operate an individual
or a private detective agency or private security agency/company security
force after payment of the prescribed dues or fees as provided in these Rules
and Regulations

Duty Detail Order is a written order/schedule issued by a superior officer


usually the private security agency/branch manager or operations officer
assigning the performance of private security/detective services duties.
SAGSD as used herein shall refer to the current PNP Civil Security
Group Security Agency and Guard Supervision Division or any other
PNP Office that may be designated later as the primary office for
supervision of the implementation of these rules and regulations.

PADPAO refers to the Philippines Association of Detective and


Protective Agency Operators, Inc., which is an association of all
licensed security agencies and company security forces.
WHO MAY ORGANIZE AND MAINTAIN A PRIVATE SECURITY
AGENCY AND PRIVATE DETECTIVE AGENCY
Any Filipino citizen or corporation, association, partnership, one
hundred percent (100%) of which is owned and controlled by Filipino
citizens, may organize and maintain a Private Security Agency or
Private Detective Agency.
BASIC REQUIREMENT OF AN OPERATOR
OR MANAGER OF AGENCY
a. The operator or manager of an agency including, managers of branch
offices, must be:
1. Filipino citizen;
2. Not be less than twenty five (25) years of age;
3.College graduate and/or a commissioned officer in the inactive service
or retired from the Armed Forces of the Philippines or the Philippine
National police;
4.Has taken a course/seminar on industrial Security Management
and/or must have adequate training or experience in security business;
and
5. Good moral character
b. New applicants for license to operate shall be required to obtain a
minimum capitalization of one million pesos (P1, 000,000.00) with a
minimum bank deposit of five hundred thousand (P500, 000.00) pesos
in order to start its business operation.
RA 11917
ON MEMBERSHIP
a.No regular license shall be granted to any private security agency
unless it has a minimum of two hundred (200) licensed private security
personnel under its employ.

b.No regular license shall be granted to any company guard force or


private detective agency unless it has a minimum of thirty
(30) licensed private security personnel under its employ.

c. The maximum number of private security personnel that a


PSA/CGF/PDA may employ shall be one thousand (1000).
[ REPUBLIC ACT NO. 11917, July 30,
2022 ]
CHAPTER II
REGISTRATION AND LICENSING OF PRIVATE SECURITY
AGENCY
Section 4. Private Security Agency (PSA). — Any Filipino citizen
or juridical entity wholly owned and controlled by Filipino citizens may
organize a private security agency and provide security services:
Provided, That they shall not employ more than two thousand
(2,000) private security professionals as defined in this Act.
Kinds of License to Operate (LTO)
1. Regular LTO – renewable every after 2 years; 200-
1000 guards for PSA and 30 guards for CGF.

2. Temporary LTO – valid for 1 year; less than the number


of guards for Regular LTO
RA 11917
CHAPTER II
REGISTRATION AND LICENSING OF PRIVATE SECURITY
AGENCY
III. Section 7. Period of Validity of LTO. — The LTO issued to
PSA and PSTA shall be valid for a maximum period of five
(5) years, subject to renewal: Provided, That the Chief PNP
may set a shorter validity period for LTO with applicable fair and
reasonable fees adjusted accordingly.
GRADUATED SCALE OF LICENSE TO
OPERATE
PSAs with temporary LTO having 200 or more but not
exceeding 1,000 guards shall be issued a regular LTO good for 2
years.

PSAs with temporary LTO having posted 100 guards but less
than 200 shall upon expiration of such LTO shall be issued an
extension period of 6 months. However, upon expiration of the
extension period, no extension shall be granted unless the PSA shall
submit a certification for additional 50 guards posted for a 150 guards
total.
a. PSAs with temporary LTOs, upon expiration still fail to comply
with the 200 guards requirement, shall be granted another 6 mos.
period. However, failure to comply shall serve a basis for the
issuance of cease to operate order.

b. LTO of PSAs with less than 100 guards after one year shall
not be renewed.

PSA’s with cancelled/revoked LTO’s shall cease to operate and


within 7 days after having been duly notified of such cease to operate
order, shall immediately deposit all its firearms with the FEO
TENURE OF SECURITY PERSONNEL
The tenure of security personnel shall be co-terminus with the service
contract between the PSA and the client. Services of any security
personnel shall be terminated on the following grounds:
a. Expiration of contract;
b. Revocation of license to exercise profession;
c. Conviction of a crime or offense involving moral turpitude;
d. Loss of trust and confidence;
e. Physical and mental disability; and
f.Violation of the pertinent rules and regulations promulgated by the
PNP.
LICENSE TO EXERCISE PRIVATE
SECURITY PROFESSION
Basic requirements of private security personnel
a. Filipino citizen;
b. Not be less than eighteen (18) years of age;
c.Must have taken a private security course/seminar and/or must have
adequate training or experience in security business or rendering
security/detective services;
d.Of good moral character and must not have been convicted of any
crime or violation of these rules and regulations carrying a penalty of
prohibition to be licensed; and
e. Must be physically and mentally fit
Qualifications a Private Security Guard
No person shall be licensed as security guard unless he possesses the
following qualifications:
a. Filipino citizen;
b. High school graduate;
c.Physically and mentally fit; d. Not less than eighteen (18) years of age
nor more than fifty (50) years of age (for new applicants and SGs in
non-supervisory position); and
e. Has undergone a pre-licensing training course or its equivalent.
RA 11917
RA 11917
Exemptions from Basic Pre-Licensing
Training
a.Veterans and retired military/police personnel or those honorably
discharged military/police personnel possessing all the qualifications
mentioned in the preceding Section shall be exempted from pre-
licensing training/seminar and academic/scholastic attainment which is
a requirement for the initial issuance of License to exercise private
security profession but shall not however be exempted from taking
the refresher training courses or its equivalent.

b.Likewise, graduates of ROTC advance/CHDF (or its equivalent in the


PNP) Training graduates shall be exempted from the required Basic-
licensing Training/Seminar.
QUALIFICATIONS FOR SECURITY
OFFICER
No person shall be licensed as Security Officer unless he has the
following qualifications:
a. Filipino citizen;
b. Holder of a Baccalaureate Degree;
c. Physically and mentally fit; and
d.Has graduated from a Security Officer Training Course or its
equivalent.
QUALIFICATIONS OF SECURITY
CONSULTANTS
No person shall be licensed as a Security Consultant unless he
possesses the following qualifications:
a. Filipino citizen;
b. Physically and mentally fit;
c.Holder of a Masters degree in either Criminology, Public
Administration, MNSA, Industrial Security Administration, or Law;
d.Must have at least ten (10) years experience in the operation and
management of security business.
QUALIFICATIONS OF A PRIVATE
DETECTIVE
No person shall be licensed as a private detective unless possesses the
following qualifications:
a. Filipino citizen; b. Physical and mentally fit;
c.Holder of a baccalaureate degree preferably Bachelor of laws or
Bachelor of Science in Criminology;
d.Graduate of a Criminal Investigation Course offered by the Philippine
National Police or the National Bureau of Investigation or any police
training school, or a detective training in any authorized/recognized
training center;
e. Advance ROTC/CMT graduate or its equivalent.
Government Security Personnel
No person shall be licensed as Government Security Personnel
unless he possesses the qualifications as prescribed in Section 3, 4, 5
of this rule, provided he submits an appointment order coming from the
Civil Service Commission
USE OF FIREARMS
Possession of Firearms by Private Security Agency /Private
Detective Agency/ Company Security Force/ Government Security
Unit. – Private Security Agency/Private Detective Agency/ Company
Security Force/ Government Security Unit shall be entitled to possess
firearms after satisfactorily complying with the requirements prescribed
by the Chief, Philippine National Police pertinent to the possession of
firearms, provided that the number of firearms shall not exceed one (1)
firearm for every two (2) security guard in its employ. No
private security agency/private detective agency/company
security force/government security unit shall be allowed to
possess firearms in excess of 500 units
Restriction to possess high-powered
firearms
A private detective agency/private security agency/ company security
services/ government security unit is not allowed to possess high caliber
firearms considered as military-type weapons such as M16, M14, cal .30
carbine, M1 Garand, and other rifles and special weapons with bores bigger
than cal .22, to include pistols and revolvers with bores bigger than cal .38
such as cal .40, cal .41, cal .44, cal .45, cal
.50, except cal .22 centerfire magnum and cal .357 and other pistols with
bores smaller than cal .38 but with firing characteristics of full automatic
burst and three-round burst. However, when such entities are operating in
areas where there is an upsurge of lawlessness and criminality as determined
by the Chief, PNP, Police Regional Office Regional Director or their
authorized representative, they may be allowed to acquire, possess and use
high-powered firearms under the following conditions
a. The acquisition of the high-powered firearms shall be at the
expense of the private security agency/private detective
agency/company security force/government security unit
concerned;
b. The firearms should first be registered with the Firearms and
Explosives Division before issuance and shall not be used or transferred
in places other than those specially authorized by the Director, CSG; c.
The total number of high-powered firearms that an agency or security
force/unit is authorized to possess shall not exceed ten percent (10%)
of the total number of security guards of watchmen in its employ; and
d. The duly licensed security guards or watchmen who will use the
firearm shall first be given adequate training in the care and use thereof
and will be under the supervision of qualified officers and men of the
Philippine National Police.
STOCKING OF AMMUNITIONS SHALL BE ON
LIMITED AND REASONABLE QUANTITY THAT
SUITS THE NEED OF THE AGENCY

a. It shall not exceed 50 rounds of ammunitions


issued per unit of licensed firearm.
b. Individual issue to security guard shall be limited
to 25 rounds of ammunition per security guard
MINIMUM NUMBER OF FIREARMS

1. PSA with 100 guards – at least 30 pieces of


licensed firearms.

2. For application Regular License to Operate – at


least 70 pieces of firearms.
LIMITATIONS IN THE CARRYING OF
FIREARMS
a. Unless specified and/or exempted pursuant to provisions of these
rules and regulations and/or firearms laws, no firearm shall be borne
nor be in the possession of any private security personnel except when
in the actual performance of duty, in the prescribed uniform, in the
place and time so specified in the DDO.
b. The firearm issued to security personnel of private security
agency/private detective agency/company security
services/government security unit shall be carried by the security
personnel only within the compound of the establishment where he is
assigned to guard, except when the security personnel is escorting big
amount of money or valuables on conduction duties outside its
jurisdiction or area of operation, upon prior coordination with the
nearest PNP units/stations, or when in hot pursuit of criminal
offenders.
JUSTIFICATION FOR CONFISCATION OF
FIREARMS
a. When the firearm is about to be used in the commission of a crime;
b. When the firearm is actually being used in the commission of crime;
c. When the firearm has just been used in the commission of a crime;
d.When the firearm being carried by the security guard is unlicensed or a
firearm not authorized by law and regulation for his use;
e.When the confiscation of the firearm is directed by the order of the court;
f.When the firearm is used or carried outside the property, compound or
establishment serviced by the agency without proper authority; or
g.When a security guard does not possess any license to exercise his
profession.
REVOCATION OF LICENSE
License to possess firearm may be revoked under any of the following
instances:
a. Failure to submit any issued firearm for verification as required.
b.Carrying of firearms by security personnel without appropriate Duty Detail
Order (DDO).
c.When the firearm serial number has been duplicated on another firearm or
using one firearms license for more than one firearm other than those
stipulated in the license.
d.Carrying of firearms outside of the place stated in the permit or in places
prohibited under the law; or
e. Conviction of the operator or manager of the agency of any crime.
f. When the firearm was reported lost.
SECURITY PERSONNEL RANKS, POSITIONS,
STAFFING PATTERN AND JOB DESCRIPTION
1. Security Management Staff
1. Security Director (SD) –Agency Manager/Chief Security
Officer –
responsible for the entire operation and administration/management of the
security agency.
2.Security Executive Director (SED) – Assistant Agency Manager/Asst.
Chief Security Officer – Assist the Security Director
3.Security Staff Director (SSD) – Staff Director for Operation and Staff
Director for Administration
>The Staff Director for operation -assistant of the security manager for the
efficient operation of the agency.
>The Staff Director for Administration - is the staff assistant of the agency
manager for the effective and efficient administration and management of the
agency.
4. Security Staff Director for Training- Staff in charge for Training –
responsible for the training of the Agency’s security personnel
2. Line Leadership Staff
1.Security Supervisor 3 – Detachment Commander – is the field
or area commander of the agency;
2.Security Supervisor 2 – Chief Inspector – responsible for
inspecting the entire area covered by the detachment;
3.Security Supervisor 1 – Inspector – responsible for the area
assigned by the Chief Inspector or the Detachment Commander.
3. Security guard
1.Security Guard 1 – Watchman/guard- the one actually posted as
watchman and or guard
2.Security Guard 2 – Shift in- charge – responsible for the
security officers who are scheduled in a certain shift for a particular
period
3.Security Guard 3 – Post in- charge –responsible for the entire
detailed security office within a certain establishment.
CLASSIFICATION OF TRAINING AND
ITS DURATION
1.Basic Security Guard Course (Pre-Licensing Course) –
150 hours;
2. Re-Training Course- 48 hours;
3. Security Officers Training Course – 300 hours
4. Basic Security Supervisory Course – 48 hours
SURETY BOND
Agency with 1 -199 guards – P50,000.00
Agency with 200-499 guards – P100,000.00
Agency with 500-799 guards – P150,000.00
Agency with 800-1000 guards – P200,000.00

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy