100% found this document useful (2 votes)
1K views137 pages

Industrial Security Management PPT Brian 1

This document discusses the history and development of industrial security. It begins by explaining how ancient tribes organized security forces to protect their crops, territory, and people from threats. As populations grew and societies industrialized, the need for security increased to deal with issues like crime, disorder, and property protection. Private security agencies emerged to help meet this need, like Pinkerton's Detective Agency in the US. The document then outlines key security developments in the Philippines, including the establishment of laws and agencies to regulate the private security industry, such as the Private Security Agency Law (RA 5487) of 1969. It emphasizes the important partnership between industrial security and law enforcement agencies in maintaining public safety.

Uploaded by

shela lapeña
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
1K views137 pages

Industrial Security Management PPT Brian 1

This document discusses the history and development of industrial security. It begins by explaining how ancient tribes organized security forces to protect their crops, territory, and people from threats. As populations grew and societies industrialized, the need for security increased to deal with issues like crime, disorder, and property protection. Private security agencies emerged to help meet this need, like Pinkerton's Detective Agency in the US. The document then outlines key security developments in the Philippines, including the establishment of laws and agencies to regulate the private security industry, such as the Private Security Agency Law (RA 5487) of 1969. It emphasizes the important partnership between industrial security and law enforcement agencies in maintaining public safety.

Uploaded by

shela lapeña
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 137

INDUSTRIAL

SECURITY
MANAGEMENT
Introduction
• The need for security of lives and properties is a old as a history of man.
Man’s existence is characterized by constant exposure to dangers, those
hazards caused by nature , and those dangers posed by fellowman. The
means and methods of human beings to secure themselves are also as old
as the history of policing.
• It is innate to human beings to seek security and protection from dangers
for them to survive and continue existing free from anything that may
cause damage to their properties or may result to injury or death.
• in the ancient world humans learned to unite themselves into clans ,
then into tribes and later into bigger communities, as they organized
themselves their primary reason is security of their life. Their livelihoods
and security of their existence. Initially humans were only worried of the
natural causes of dangers such as earthquakes , typhoons , lighting , and
attacks from animals later. Other tribes become their enemies as other
tribes and other groups of people compete for survival.
• Most of historical accounts identified the assigning of all
able-bodied males of a tribe in guarding their crops and
their territory against animals’ attack as the earliest form
of security designed by the ancient tribesmen. Later , these
able – bodied men took the cudgels in warding off other
tribesmen who attacks them . They used variety of means
to protect themselves such as : weapons out of wood,
stones and then later those made of metal ; traps or
devices designed to catch an animal and kill it or prevent
it escaping like a concealed pit or a mechanical device
that springs shut; and using barriers like wooden fences,
natural barriers such as cliff and rivers.
In the 18th century
• the agricultural revolution or the improve agricultural methods
paved way for the massive growth in crop production , however
the increased of population as microsoft encarta states, had the
greatest difficulty in meeting the increased demand of food. It
has been noted that lack of foo leads people to steal, hence ,
security is needed for those who have plenty of stocks.
Industrial revolution in 19th century
• which marks the need for greater security during this period agriculture was no
longer the primary means of livelihood but the enterprises dealing with productions,
the inventions of different machineries paved way to industrial development . This
economic progress started in great britain but countries like germany , united states o
america and japan were also having their own industrial revolution
contemporaneously with great britain.
• in Great britain people in the rural areas began flocking in the cities particularly
London. The industrial revolution freed people from farm work for city jobs. As the
population of england cities grew, crime increased and disorders became more
frequent. Consequently , public demand for government to control crime grew louder.
• Certainly , the influx of the rural people to the cities resulted to crime increase
particularly those against property europes industrial revolution attracted the peasant
class from the countryside into the towns and cities. The ensuing crime wave forced
law enforcement officials to take drastic measured as a result. Thief catchers were
recruited from the rittraff of the streets to aid law enforcement offiicials in locating
criminals . This could be the onset of hiring private individuals to do security works
by catching criminals.
• In the united states , the new settlers in the west were exposed to
the outlaws. Violent crimes were more frequent in the mining
camps and cattle towns. The rapid growth of cities produce
violence ,crime and vice activities that demonstrated a breakdown
of social order in small communities. Further because of the lack
of effective law enforcement In rural areas however. People
banded together on their own to investigation crimes and
apprehended perpetrators .
• Vigilantes in the mining camps would conduct trials and even
execute some of the most dangerous offenders . Cattle ranchers
would often hire range detectives to capture rustlers. As a result
some business firms emerged such as the famed PINKERTON’S
DETECTIVE AGENCY’
• offered to protect property and
pursue offenders for a fee;.
Allan Pinkerton (1850)
• A cooper from scotland and the
Chicago Police Departments first
detective established one of the
oldest, private security forces in
the United States,
In the Philippines
• HACENDEROUS or owners of large tract of lands
often hire farm workers who often double protectors of the
property against cattle rustlers and robbers .

• With the entry of american mining industries , the american


companies started hiring armed security personnel. And in
1950’s hired security personnel were already widespread after
the restoration of the country after world war II . There were no
strict regulations yet during that period. Security workers then
were still under the city or town mayors who in turn issue
working permits to those wanting to be employed as a security
guards .
• Security and detective agency also began to prosper and with no
strict regulations , many security guards were convicted of
violent crimes.
The creation of PADPAO
• Or PHILIPPINE ASSOCIATION OF DETECTIVE AGENCY
OOPERATORS in 1958 – with the aim of making itself a
freely self governing. Self regulating and self-policing.
• June 13, 1969 ,( R.A 5487) or known as ‘’ Private Security
Law’’ was born.
• today many college graduates particularly criminology
graduates are employed in the security business ranging from
security guards and watchmen to security supervisors and
managers. The number of persons in the industrial security
even surpassed the more than 125,000
• The security guards now are regarded as a closed partner of the
PNP and AFP combating ciminality in the country .
June 13, 1969 (R.A 5487)

- The Private Security Agency law , this law was singed


by President Ferdinand E. Marcos. In this law was
assigned the most important role of security guard force
in assisting the police in its mission to safeguard lives and
properties, . . the Philippine Constabulary played a great
role in supervising all Security Agency company guards
forces and government guards.
August 4, 1969

- creating the Philippine Constabulary Security and


Investigation Agency Supervisory Office (PCSIASO) .
After 2 months another General staff memo was issued
renaming PCSIASO to PCSOSIA. (PC Supervisory
Office for Security and Investigation Agencies)
June 29, 1970
• the office was renamed to PC Supervisory Unit for
Security and Investigation Agencies (PCSUSIA).
However, the supervision was transferred to the National
Intelligence and Security Agency ( NICA). P.D 100 on
january 17, 1973 further amended sections 3,4,5,8 and 9
which permits the Philippine Constabulary to deputize any
private detectives, watchman or security guard to assist in
case of emergency disaster or calamity.
• Pursuant to Memorandum 07-S96 dated 31 May
1996 the Security Agencies and Guards Supervision Division
(SAGSD) was created as one division under the Civil Security
Group (CSG) to exercise supervisory authority and implement
the Rules and Regulations embodied in RA 5487. 

• Up to date, there are more or less 2000, registered security


agencies operating in the Philippines 560,000 liscensed security
personnel and 124, private security training institutions.
SECURITY

• Module 1
• Lesson 1.1
Security – is defined as the state or quality of being
secured, freedom from fear or danger, assurance
or certainty, to secure is to make safe or be
protected.

1. State or feeling of safety- the state or feeling o being safe and protected.
2. Freedom from worry about possible loss – the assurance that something of
value will not be taken away.
3. Safety- protection against attack from without or subversion from within.
4. Precautions to maintain safety- precaution taken to keep somebody or
something safe from crime, attack or danger.
5. Guards – people or an organization entrusted with the job of protecting
somebody or something , especially a building or institution against crime.
Necessity of security
• security measures are inevitable or necessary for the attainment
of the goals and objective of a certain individual group or
organization. It follows that when an individual or organization
is exposed to hazards, their productivity is adversely affected.
The economic growth of the philippines for instance moving at
a turtle-pace because of the impending internal external threats.
• internal threats such as communist aggression, and the muslim
separatists. The extreme rightists such as the threat of military
takeover of the government and the restless mass actions like
strikes and protest y civil organization .
• External threats such as country’s incapability to defend itself in
case of war.
The role of Philippine National Police and
other government law enforcement agencies.

• Industrial security is an despinsable part of philipine economy


because it serves as a partner of law enforcement agencies in the
country such as the PNP. The PNP takes responsibilities in the ,
supervision , control, and training and operations of security agencies
and the issuance of license to operate and the license to practice the
security profession.
• The PNP , and other government law enforcement agencies serve as
the immediate law enforcement agency which assist security guards
and security agencies in the performance of their security function
such as accepting and processing crime reports submitted by the
security agency.
R.A 5487 - AN ACT TO REGULATE THE
ORGANIZATION AND OPERATION OF
PRIVATE DETECTIVE, WATCHMEN
OR SECURITY GUARDS AGENCIES.
• Considering the significance of providing security to industries,
the Philippine legislative body enacted this act governing the
organization and management of private security agency
company guard forces and government security forces.
Hazards
• Refer to condition that may
cause damage to property, injury
or loss of life. It is also defined
as ‘ exposure to the chance of
loss or injury. Hazards are
caused either by nature or by
man himself.
• The role of security is to prevent
or stop in causing unintentional
or intentional damage to
property, injury or loss of life.
B. Security and safety measures
• Security work involves active and passive measures so
those effective defense can be established against crime.

• A. active measure – are the physical barriers, security


lightings, safe and vaults, locks and other devices and
gadgets designed to detect and impede hazards.
• B. Passive Measures- are those that will deter man from
committing such acts for fear of being caught, or charged in
court or get dismissed. Examples of passive measures such as
Security education programs, security investigation, and
personal security checks.
In the field of industrial security, various type of security are
applied depending on the installation and the security
needs of the installation, the type of security are the
following.
1. Physical Security – broadest
branch of security which is
concerned with the physical measure
adopted to prevent, unauthorized
access to equipment, facilities,
materials and document and to
safeguard them against, espionage,
sabotage damage and theft. It also
encompasses protection of personnel
from any criminal act.
• 2. Communication Security- it is the protection
from the application of various measures that
prevent or delay the enemy or unauthorized
persons in gaining information through the
communication system. This includes;

• a. Transmission security- a component of


communications security that results from all
measures designed to protect transmission’.From
the interception, traffic analysis , ad imitative
deception.
• b. Cryptographic security- result from the
provision of technically sound crypto-system and
their proper use.
• c. Physical security- providing of safeguards to
equipment and materials from access by
unauthorized persons.
• 3. Hotel security- it refers to the
protection of assets, guest , personal
effects and other properties In hotels, inns
and other similar establishments.
• 4. Bank Security – a type of physical
security protecting the asests, personnel
and operation of a bank with special
emphasis on the precaution and measures
safeguard the cash and asset while the
storage, transit , and during transaction .
• 5. Document Security- it is physical
security involve the protection of
documents and classified papers from loss
access by unauthorized person, damage
theft compromise through disclosure.
6. Personal security- this involves the protection of personnel
especially ranking officials from any harm or kidnap, and other
acts. Very important people security is a type of personal security.

7. Crises security – this is a part of VIP security involve hostage


and kidnapping of VIP’S.

8. Industrial security- this type of security applied business groups


engaged in industries like manufacturing, assembling research and
development, processing warehousing and even agriculture. It is a
form of physical security involving industrial plants and business
enterprises where the personnel, processes , properties , and
operations are safeguards. Use of protective barriers and security
lighting, personnel movement control lock, and key management.
9. Operational security – this type of security that deals primarily
with the protection of processes, formulation patents and other
industrial and manufacturing activities from espionage, infiltration ,
loss , compromise photocopying.
10. Other special types of security ;
a. Air cargo security – this is applied to minimize not prevent,
losses of cargo during in transit , storage or transfer.
b. School security- this is applied in response to the increase of
violent crimes committed against students and school personnel , and
school properties.
c. Supermarket security- this is applied in response to the
mushrooming of bazaars, marts, super malls , and the like.
d. Personnel Security- this is involved in the background checks
of individuals commensurate with the security requirements of their
work. This also includes measures design to protect employees of an
organization or business establishment.
d,. Major divisions of industrial security

1. Physical Security – it is defined as those measures taken to


prevent physical access or entry to entry to an installation or
area by unauthorized.
2. Personnel security – this division of security is applied to
check the background of person as well as the protection of
company personnel against potential harmful acts or
conditions.
3. Document and information security – this include every
measure designed to safeguard company documents from
intentional or unintentional harmful acts or against
unauthorized disclosure of the information contained therein.
Module 2
PHYSICAL SECURITY
Physical Security
• It is concerned with the physical measures adopted to prevent
unauthorized access to equipment, facilities, materials, and
documents and to safeguard them against espionage, sabotage
damage and theft. It also encompasses protection of personnel
from any criminal act.
A. Principles of Physical Security
• In every establishment, physical measures are needed to deny unauthorized access or
intrusion because of the following;

• A. Enemy agents must access- acquisition of information is the ultimate results, and the
means and form in which the information is obtained.
• B. There is no impenetrable barrier – for the unfriendly government or organization, they
are willing to devote enough time , money , personnel, material and imagination in
passing barriers. So physical security attempts to build defense by using a certain barrier.
• C. Defense in depth means barrier after barrier – in order that barrier could prevent
unauthorized access and serve its purpose very well, there should be an integration of all
barriers adopted in the installation.
• D. Surreptitious vs Non- Surreptitious Entry-
• * Surreptitious Entry – means not observable, it is not usually detected.
• * Non- Surreptitious Entry – is observable,
note; observable or not, intruders usually find the right place and right opportunity to gain
access,
• E. Each Installation is different – since each installation have
different problems to overcome.
Barriers
• Refer to any physical structure
whether natural or man made
capable of restricting , deterring,
delaying or preventing illegal
and unauthorized access to an
installation.
C. Two Generals types of Physical Security Barriers.

• 1. Natural Barriers
- these are offered by nature
which could obstruct or delay the
passage way of potential intruder.
These also refer to natural
structures that serve as deterrents
or obstruction to intruders such as,
high canyon , desert , or bodies of
water .
2. Man – Made Barriers - these
are structural construction like
fences, walls , floors, roofs,
grills, bars, roadblocks, other
physical means to deter or
impede penetration .
D. Specific types of Physical Security Barriers.

1. Natural Barriers include mountains, cliffs, canyon, ravens, seas ,


marshes, deserts or terrain difficult traverse.
2. Structural Barriers are those features constructed by man regardless of
their original intent that tend to delay intruder. Examples of these are;
walls , ceilings, door; fences.
3. Human Barriers include guards, charge of quarter office and shop
workers, who stand between the intruder and the matter to be protected.
4. Animal Barriers are usually shepherd dogs trained for and used as
guards.
5. Energy Barriers are usually electrical and electronic devices that could
assist security personnel in detection intrusions , examples ; protected
lighting , and intrusion devises.
E. Levels of Physical Security
• 1. Minimum Security – is a system designed to impede unauthorized external activity such as
simple intrusion to armed attack.
• 2. Low level Security – is a system designed to impede and detect some unauthorized external
activity such as on small retail, store, storage warehouse .
• 3. Medium Security – is designed to impede , detect and asses most external activity and some
unauthorized internal activity that range from simple shoplifting to conspiracy to commit
sabotage, this includes,
• a. use of advance intrusion alarm system
• b. establishing of perimeter and perimeter barriers,
• c. use of unarmed guard.
• 4. High level Security is design to impede, detect and assess most unauthorized external and
internal activities of certain prison, defense contractors , pharmaceutical companies and
sophisticated electronics manufactures, this include ;
a, Close Circuit Television ( CCTV)
b. Perimeter alarm system
c. High security lighting
d. highly trained armed guards
e. Control designs, and
f. Coordination with local law enforcement agencies .
,
5. Maximum Security includes the application of the following;
a. Sophisticated alarm system; and
b. On-site response force.
Module 2
Perimeter Barriers
a. Concept of Perimeter Barrier
• Perimeter barrier is a medium of structure which defines the
physical limits of an installations or area to restrict or empede
access thereto. It is any physical barrier used to supplement the
protection of an inside or outside perimeter. Perimeter barrier
also includes the utlization of security personnel.
b. Line of Physical defense
• security managers and security personnel also consider the
various lines of defense that could help delay or stop intruders.
These are.

1. First Line include all perimeter barriers.


2. Second Line includes the building exterior and
3. Third Line includes those internal control measure,
• 1. first line of defense

• 2. Second line of defense

3. Third line of defense


c. Perimeter Barrier Openings
- in determining the appropriate perimeter barriers, security
managers should not overlook the necessity of monitoring
perimeter openings that could be used by intruders. These
openings are; .

Gates and doors should also be guarded or locked much as


possible.
Windows and similar openings should also be guarded or
grills should be installed so as not be used by intruders whenever
possible, windows and openings less than 18ft. Above the ground,
roofs and ledges or less than 14ft. Directly or diagonally opposite
uncontrolled windows in other walls, fire escapes, or other
openings of 96 sq. Inches or larger should be grilled or have steel
bar protections.
• Sidewalks elevators are elevated parts of the land near the perimeter
barrier that provides access to areas within the perimeter barriers and
should be locked and guarded.
• Utilities openings such as sewers, air intakes, exhaust tunnels which
penetrate the barriers and which have cross-sectioned area of 96sq. Inches
or more should be protected by bars , grills, etc.
• Clear zone is an unobstructed area maintained on both sides of the
perimeter barriers . A clear zone of 20ft. Or more is desirable, between the
barrier and extension structure and natural covers which may provide
concealment or assistance to a person seeking unauthorized entry. Where
it is impossible to have clear zones because, of property lives or natural
features, an increment in the hieght of the fencing, increased guard
coverage more security lightings or the use of intrusion device in that
portion of the perimeter barrier should be done.
• a. A clear zone of 20ft, or more should exist between the perimeter
barriers and exterior structures , parking areas and natural or man – made
features .
• b. A clear zone of 50ft. Or more should exist between the perimeter
barrier and structures within the protected areas except when a building
wall constitutes part of the perimeter barrier.
Types of Perimeter Barriers
1. Fences – are independent
structures design to control
physical and visual access
between outside areas. Types of
fences include solid fence and
full- view fence

a. Solid fence – is made of


opaque material in such a way that
visual access through the fence
structure is denied. It is constructed
with heavy materials such as bricks,
stone and concrete and usually
extended down into the ground to
point view below the frost line.
• Advantage of solid fence.
1. Denies visual access of the installation to the intruder .
2. Denies the intruder the opportunities to become
familiar with the personnel, activities, and the schedule
movement of the guards.

• Disadvantage of solid fence.


• 1. Prevents the guards from observing the area around
the installation.
• 2. Creates shadow which may be used by the intruders for
cover and concealment.
B. Full- View Fence,
• Is constructed in such a manner
that visual access is permitted
such as wire fence, through the
fence structure. It is designed
purely to control physical access
between two area.
• Advantage of full – view fence .

• 1. Guards are able to keep the area surrounding installation


under observation
• 2. Does not create any shadow,

• Disadvantage of full- view Fence


• 1. allows visual access to the installation
• 2. allows the intruder to get familiar with the movement and the
time schedule of the guard patrols.
Wire fence
- Is a type of fence made of chain-
link barbed wire concertina design
with small opening not larger than 2
square inches and made of number
guage wires or heavier , twisted and
barbed salvage top and bottom.
Specifications for using chain-link fence.
• It must be constructed of 7-feet material
excluding top guard.
• It must be 9 guage or heavier
• Mesh openings are not be larger than 2
inches per side.
• It should be twisted and barbed salvage
at top botom .
• It should be security fastened to rigid
metal or reinforced concrete.
• It must reach below surface enough on
soft grounds to compensate for shifting
soil or sand.
• It must reach within 2 inches of hard
ground or paving .
Specifications for Using Barbed wire
1. Standard barbed wire is twisted,
double-stand 12 gauge wire with 4
point barbs spaced on equal distance
apart.
2. Barbed wire fencing must be firmly
afixed to posts high excluding top
guard .
3. Barbed wire fencing should not less
than 7ft. High excluding top guard.
4. The distance between strands will not
exceed 6 inches and midway between
parts.

Note ; Using concertina wire fence-


concertina fences are formed like
accordions.
Building Walls
• Include walls , floor , roofs or
their combination serve also as
barriers and they should be of
such construction to provide
uniform protection just like wire-
fencing.
Bodies of Water
• Like river, lake, cataract, sea,
pond or any bodies of water
forming part of the wall ,
building or fencing should not
be considered an adequate
perimeter barrier. Additional
security measure like wire,
fence concrete walling,
security patrolling and flood
lighting at night may be
necessary for the portions of
the perimeter.
Additional Protective Measures
• 1. Top Guard is an additional overhang of
barbed wire placed on vertical perimeter
fences facing upward and outward with
45 degree angle with three to four strands
of barbed wires spaced 6-inches apart.
This will increase protective height and
prevent easy access.
• 2. Guard control stations- are normally
provided at main perimeter entrance to
secure areas located out of doors, and
manned by guards on a full-time basis.
Sentry stations should be near a
perimeter for surveillance at the entrance.
• 3. Tower or Guard towers – are
house-like structure above the
perimeter barriers, it gives a
psychological effect to violators.
• 4. Signs and Notice or control
signs’’- should be erected where
necessary In the management of
unauthorized ingress and preclude
accidental entry. It includes entry,
ID, prohibited and exclusive areas
signs.
f. Perimeter Guards
• are employed in augmenting the existing perimeter security or
perimeter barriers of a certain establishment. The 2 types of
employing perimeter guard are;

• 1. Fixed Post – security guards are assigned in a particular place


of the compound to guard and watch the area surrounding and .
• 2. Patrol ( roving ) –in this system, the security guard is required
to walk and go around regularly around the company premises.

• Note; in conducting patrols, the guards should be instructed to


traverse an irregular route, providing different intervals between
visual or actual contact with any given point on the fence.
What is Restricted Area?
• Any area in which personnel or
vehicles are controlled for reasons of
security.
Importance of Restricted Area
• Restricted area is established to provide security for any
installation or facilities and to promote efficiency of
security operations and economy in the use of security
personnel.
• Restricted area was established to permit different
degrees of security within the same installation or
facilities.
Types of Restricted Area

• Exclusion area – restricted area contains security interest


to TOP SECRET matters, and which requires the highest
degree of protection
• Limited area control – restricted area in which a lesser
degree of security is required than in an exclusion area
but security interest would be comprised by uncontrolled
movement
Security Lightings or Protective
Lightings
• Lesson 2.3
a. Basic Concepts of Security or protective lighting.

• Protective lighting provides a means of


continuing illumination during hours of
darkness, a degree of protection that is
maintained during daylight hours , this
safeguard also has considerable value as
deterrent to thieves and vandals and may
make the job of the saboteur more difficult.
It is an essential element of an integrated
physical security program. The system must
be reliable and designed with overlapping
illumination to avoid creating unprotected
area in the event of individual light failure.
Protective Lighting
• Needs at installation and facilities depend upon each
situation and the areas to be protected. Each situation
requires careful study to provide the best visibility
practicable for such security duties as identification of
badges and people at gates. Inspection of vehicles,
prevention of illegal entry, detection of intruders outside
and inside buildings and other structures, and inspection
of unusual or suspicious circumstances.
c. Characteristics of Protective lighting
• Using protective lighting is expensive and is an additional cost
to the company or establishment therefore, consider the
following in planning for protective lighting system.

• 1. Protective lighting usually requires less intensity than


working light, except for identification and inspection at
authorized portals and in emergencies .
• 2. Lightings needed may vary because each area of an
installation or facility presents its particular problem.
Based on physical layout, terrain , atmospheric and
climatic
Protective lightings significance to security forces.

• When properly employed, protective lightings offers the


following.

• Reduction of the need for security forces.


• Personal protection for forces by reducing the advantages
of concealment and surprise for a determined intruder .
• Relieved security forces could be used to better
advantage elsewhere.
Types of security lightings
• Stationary Luminary (continous) – most
common type of consisting of service of fixed
luminous to flood a given area continously
with overlap, it may either be,
a. Glare-projection type – the intensity is
focused to the intruder while the observer or
guard remains in the comparative darkness.
The lighting is toward the approach of an
entrance to an installation lights with reflectors
increase glare.
b. controlled lighting- the width of the lighted
a top can be controlled and adjusted to suit the
security needs. The lighting is focused on a
pile of items rather than on the background .
• 2. Stand- by lighting – similar to
continuous lighting but in turned on
manually or by special device or other
automatic means, when there is
suspicion entry.
• 3. Movable Lighting – consists of
stationary or portable manually
operated search light which may be
lighted continuously during hours of
darkness or only as needed,
• 4. Emergency Lighting- a stand by
lighting which can be utilized in the
event of electrical failure either due to
local equipment or commercial power
failure.
General type of lighting sources
1. Incandescent lights – have low initial cost and
provide good color rendition.
2. Mercury Vapor lamps – emit purplish white color
caused by an electric current passing through a tube
of conducting and luminous gas. Considered more
efficient and is widespread in exterior lighting.
3. Metal halide – is similar in physical appearance to
mercury vapor but provides a light source of higher
luminous efficiency and better color rendition
4. Fluorescent lamp – provides good color rendition,
however it cannot project light over long distance
thus it is not desirable as flood type lights.
5. High- pressure sodium vapor is introduced in 1965
for exterior lighting of parking areas, roadways,
building and industrial and commercial installation.
It emits golden white to pink color.
6. Low – pressure sodium vapor produces yellow color.
7. Quartz lamps – produce very bright light
Types of lighting equipment
• 1. flood lights are used for outdoor
security lighting include the
illumination of boundaries fences ,
and buildings
• 2. street light produce diffused light
rather than directional beam they are
widely used in parking areas.
• 3. searchlights are incandescent lights
that provide a type crime – related
lighting system.
Protective alarms

• ALARM- security device fitted to property especially a house


or car o make a warning sound if a break- in or theft is
attempted,
• Or sound of security or warning device,
Functions of Protective Alarm

• Its function is to alert the security personnel for any attempt


intrusion into a protected area, building or compound.
Types of intrusion alarm
system
• 1. Breaking an electrical circuit through a metallic foil or
wire. - building or compound all possible point of entry can
be wired by using electrically charge strips of tinfoil wire.
Any actions that will move the foil or wire break the circuit
and activate an alarm .
• 2. interruption of light beam of photo cell through a
photoelectric or electric eye device – an invisible light beam
is transmitted at a frequency of several thousand per second
to a special receiver.
• 3. Vibration detection device- the vibration sensitive sensor
is attached to walls, ceilings or floors of the protected areas,
the sensor detects any vibration caused by attempted forced
entry .
• 4. Space and motion detectors- these system derive their
operating principle usually from physical phenomenon
known as doppler effect. Constant sound waves in cubicle
disturbed by an object will cause change of frequency and
wave motion thereby causing an alarm to trigger.
• 5. Foot rail activator- placing the front of their
foot to engage the activation bar placed on
the floor in such a position that tellers may
activate alarm.
• 6. Bill traps- or currency activation devices
are usually placed in the tellers cash
drawers and connected to the alarm system
using a wire connector. When the currency
is removed from the devices the alarm is
activated.
• 7. Knee or thigh button- these are installed
inside the desk or teller so they can be
activated by knee or thigh pressure. They
are commonly found in the location where
personnel usually perform their duties from a
seated position.
• 8.Foot Button- like the foot rail
permit alarm activation safety while
hands remain clear on view of the
robber.
• 9. Double squeeze buttons –
Pressure is required on both side of
the device and therefore the
probability of accidental alarm is
reduced
Types of Alarm detection
system
• Central station system – a type of protective
alarm system where the central station is
located outside the installation it can be
located in an agency and the installation is
one of the subscribers.
• Proprietary system - this function in the
same way as the central system except
that is owned and leased by the subscriber
and operated and located in the facility.
This system is monitored locally.
• Local alarm system – consists of rigging up
a visual or audible alarm near te object to
be protected, a bell or light inidicates an
attempted or successful intrusion.
• Auxiliary system – in this system installation
circuits are led into local police or fire
department by leased telephone lines usually
by special arrangements.
• Local alarm- by- chance system – this is a local
alarm system in which a bell siren is sounded
with no predictable response, these system
are used in residence or small retail
establishment which cannot afford a respond
system.
• Dial alarm system – this system is set to dial a
predestined number when the aarm is
activated.
Fire alarm systems

• Are those devices installed to help detect


fires or detect anything that causes fire such
as smoke or unusual rising of temperature.
Private fire protection system
• Automatic sprinkling system – an
integrated network of
hydraulically designed piping
installed in a building,
automatically discharge water
when activated by heat or
combustion products from a
fire.
• Automatic sprinkler- which work
by the increase of room
temperature and which
automatically operates the
system to, put out fire,
Types of Sprinkle system
• Wet Pipe system – the piping has water with pressure, and
the water sprinkler will operate when head is opened and
water will continue to flow until shut-off.
• Dry Pipe System – the pipes are filled with air under
pressure which holds the water at a value located in a
room, when sprinklers head goes into operation, air is
released, trapping the dry pipe value and allowing water
to flow through the system.
2. Fire Pumps – are mechanical device of supplying
water which can be manual or motor- driven, these
pumps are ideal when natural supplies of water are
readily available,

3. Standpipes – are galvanized iron steel or plastic


pipes located inside a building from the lowest to top
floor with water under pressure for use in case of fire,

4. Fire Hydrant – is a mechanical device strategically


located in an installation or street where fire hose is
connected so that water pressure will be available to
extinguish a fire,

5. Portable hand extinguishers – this is a fire fighting


equipment which can be portable or in a cart that is
used to put out fire.
Protective locks and key control and
protective cabinets .
• Lock – a mechanical, electrical, hydraulic
or electronic device to prevent entry into
building, room , container hiding place and
to prevent the removal of items without the
consent of the owner .
• Key – it is instrument for locking and
unlocking, a metal bar with notches or
grooves that, when inserted into lock and
turned operates the locks mechanism,
• Peterman – an English term used to described a
lock picker
Types of locks
• Warded locks – this type of lock uses
obstruction or wards to prevent the lock
to open unless the correct key is
inserted.

• Disc tumbler Locks- this kind of lock is


composed of slotted rotating detainer.

• Lever tumbler locks – is a type of lock


that uses a type of levers to prevent the
lock to open.
• Pin tumbler lock – the pin tumbler
mechanism depends for its
security and a number of round
pin or tumblers operating on a
cylinder. Each tumbler pin is
divided into two parts. The upper
which flat on bolt and lower end
fit the grooves or cuts in the
pointed.
• Padlock – a portable and detachable
lock having a sliding hasp which
passes through a staple ring or the
like and is then made fast or secured.
Combination lock

• Is a sequence of
numbers used to
open the lock
Code Operated Locks
• It opens by pressing the series of numbers in
proper sequence.
Electromagnetic locks
• Is a locking device that
consists of
electromagnetic and an
armature plate .
Card Operated Locks

• It is fitted with recording


device which register
time of use and the
identity of the user.
Types of Key

• Grand master key – it open all


kinds of lock in building
• Master key – operates only one section floor or
department of a building.

• Sub – master Key – a key that will open the lock of


particular area.
Key control
• Key cabinet – a cabinet will that will
have to be of sufficient size to hold
the original key to lock in the
system.

• Key record – some administrative


means must be set up to record
code number of the locks and to
whom the keys of specific lock was
issued.
• Inventories- periodic account must be
made of all duplicate and original keys on
the hand of the employees whom they
have been issued.
• Audits – an unannounced audit
should be made of all the key
control records and procedures
by a member of the management.

• Daily reports – made by the


person responsible for the key
control from the personnel
department.
Other protective containers
• Safe –
it is a metallic container used
for the safekeeping of
documents or small items in
an office or installation.
Vault
• This is heavily constructed
fire and burglar resistance
container usually a part of
the building structure used
to keep and protect cash,
documents and negotiable
instruments.
File room
• It is a cubicle in a
building in a building
constructed a little
lighter than a vault
but bigger size to
accommodate limited
people to work on
the records inside.
Chapter 2 – Security Guard Forces
Security Guard force
• it is a group of selected men,
trained or grouped into functional
unit for the purpose of protecting
operational processes from those
disruption which would impede
efficiency or halt operation at a
particular plant, facility, installation
or special activity.
The three security guard force
• Private Security Agency -
refers to any person association,
partnership, firm or private
corporation, who contracts,
recruits , trains , furnishes or post
any security guard,
Company Security force

• Is a security force maintained and


operated by any private company or
corporation for its own security
requirements only.
Government Security Unit
• Is a security unit maintained and
operated by any government entity
other than military and a police,
which is established and maintained
for the purpose of securing the office
or compound and or extension of such
government
PADPAO – Philippine Association
of Detective and Protective Agency
Operators INC.

• This is the national association of all


licensed security agencies and
company security forces.
License To Operate ( LTO )
• It is the document issued by the CPNP or his duly authorized
representative authorizing a person to engage in the occupation,
calling or employment as a security guard or detectives, or a
juridical person to establish engage,, direct manage or operate
an individual or a private detective agency or private security
agency or company security force after payment of the
prescribed dues or fees.
Application of liscense

• New applicants for PSA liscense shall obtain;


• A. A minimum capitalization of P1,000.000.00 and
• B. A minumum bank deposit of P500,000.00
Where to file ?
• To the office of the CPNP thru the CPNP –SOSIA
(SAGSD) using form SAGSD form 01-94 and SAGSD
form 02-94 respectively.
Application form for license to operate-
the application shall contain;

• 1. full name of applicant


• 2. his, age , civil status, and
• 3. residence and location of his business
In case of corporation, association or
partnership copies of the following shall
be appended.

• A. certificate of registration with the SEC, and


• B.- by-laws and articles of incorporation
Endorsement of application

• It shall be endorsed by the CSF district offices found in


their respective regions for and in the name of the
regional director.
The following graduated scale shall be approved by the CPNP or his duly,
authorized representative.

• PSAs with the temporary LTO having 200 or more but not
exceeding 1000 shall be issued a regular LTO good for 2 years.
• New PSA shall be issued a temporary LTO good for year.
• PSAs with temporary LTO having posted 100 guards or more but
not less than 200 shall upon expiration of such LTO shall be issued
an extension period of 6 months.
• LTO of PSAs with less than 100 guards after one year shall not be
renewed.
• PSA’s with cancelled or revoked LTOs shall cease to operate and
within 7 days after having been duly notified of such cease to
operate order, shall immediately deposit all its firearm with the
FEO , or the nearest CSFD office for eventual turnover to the CSFC
HQ Attn, C, FEO FED, CAMP CRAME,
• Thereafter the CSFC District concerned shall conduct an
inventory of surrendered FAs shall be receipted copy
furnished , CPNP SOSIA (SAGSD) otherwise the PSA
concerned shall be liable under the PD 1866(R.A 8294).
Who may organize and maintain a
PSA and Private Detective Agency ?

• Any filipino citizen or corporation , association ,


partnership 100% Owned and controlled by filipino
citizens
Basic requirement of an operator or manager of
agency

• Filipino citizen
• At least 25 years old
• College graduate and or
• A commissioned officer in the inactive service or
• Retired from AFP or PNP
• Graduated/ taken course in concepts and methods in industrial
security and security management and or.
• Must have and adequate training or experience in security
business.
• Good moral character- not having been convicted of any crime
involving moral turpitude and
• Not suffering any of the following disqualification
• Dishonorably discharged from AFP/PNP or separated for cause from
any government owned or controlled corporation
• Being mentally incompetent
• Being physically unfit
• Addicted to the use of narcotic and or prohibited drugs and or
substances.
• Habitual drunkard and alcoholic
• Dummy of any foreigner and
• Elective or appointive government officials and employees who may
be called upon on account of the functions of their respective office in
the implementation and enforcement of the provision of R.A 5487 and
any person related to such government employees by affinity or
consanguinity in the third civil degree shall not hold any interest.
Directly or indirectly in a security guard or watchman agency on
account of the function of their respective offices in the
implementation and enforcement of R,A 5487
PSA shall conform with the organizational
structure, personnel, equipment training and
clothing as provided for in R.A 5487 as amended
and shall comply with the ff.

• 100 guards shall be contracted during the 1 st year operation


and
• Minimum of 200 guards for the succeeding year .
• CSFs shall be organized and conform substantially to the
organizational structure prescribed for private security
agencies.
• GSU shall be organized to conform with the organizational
structure of the said government firm but not contrary to the
organizational structure as prescribe for GSUs.
• All agencies shall maintain a main office in their registered
addresses.
• Branch offices- at least initial 10 guards during 1st year of
operation .
• Until the 30 minimum guards in the 3rd year of operation
• That branch offices shall be registered with the CSFC
district and regional PADPAO if any.
Security service contract
• The money consideration to be paid by the client to the
PSA.
• Number of hours of services per guard per day and the
• Guards salary to be received from the agency
Tenure of security personnel – it shall be co- terminus
with the service contract between PSA and the client.
Grounds for termination of the guards services.

• Expiration of contract
• Revocation of license to exercise profession
• Conviction of crime involving moral turpitude.
• Loss trust and confidence
• Physical and mental disability and
• Any other violation of the pertinent rules and regulations
of R.A 5487.
Payrolls
• Name of security guards arranged alphabetically and
numbered consecutively which shall be signed personally
by the payees only after the receipt of the amount
indicated therein.
• Separate payrolls for distant detachment/post shall be
prepared.
• Payrolls shall be filed with the main office within 15 days
after pay day.
• It shall be in accordance with the standard format as
provided for by law.
Security Personnel qualifications, fire arms and
equipment

• Basic requisites for security guards – no person shall be


licensed as security guard unless he possesses, the
following
• A. filipino citizen
• B. high school graduate
• C. physically and mentally fit
• At least 18 years old but not more than 50 years old.
• Must not possess any of the disqualificatiion
Desirable qualities of Security Guards
• Alertness
• Judgment
• Confidence
• Physical fitness
• Tactfulness
• Self-control
• Interest, loyalty , responsible and trusthworthy
Exemptions from Pre-licensing – the following
need to undergo pre-licensing training for
security guards

• A. veterans and retired or honorably discharged


military/police personnel possessing all the qualifications
mentioned in the preceding section .
• B. ROTC advance / basic graduates and or equivalent in
the AFP, PNP , CAFGU/CHDF.
QUALIFICATION OF PRIVATE DETECTIVE

• A. holder of baccalaureate degree or bachelor of laws or


• B. B.S criminology graduate; or
• Graduate of criminal investigation coures offered by the
then PC/INP, or the PNP or the NBI or any police training
school or detective training with authorized recognized
training center for security guard
• Advance reserve officers training coures or citizen military
training( ROTC/CMT) graduate.
Qualification for security officer
• Filipino citizen
• Holder of baccalaureate degree
• Physically and mentally fit
• Has graduated from a security officer training course,
• Retired personnel of the PNP/AFP
• Must not posses any of the disqualification enumerated in
sec2 rule II.
Qualification of security consultant
• No person shall be liscensed as security consultant
unless in addition those prescribed in sec 5. of this rule,
possesses any of the ff.

• Holder of a masters degree in either criminology, public


administration, MNSA , industrial administration, or law.
• Must have at least 10 year experience in the operation
and management of security business.
UNIFORM, EQUIPMENT AND
PARAPHERNALIA
SEC VIII ; The basic equipment
1. Prescribed basic Uniform

2. Nightstick/ baton
3. Whistle

4. Timepiece ( synchronized)

5. Writing Pen

6. Notebook and duty checklist


• 7. flashlight

• 8. First aid kit

• 9. service firearm required


Definition
• Industry – the term denotes ‘ earnest or constant application to work or
business’’ or a special branch of productive work or the capital or workers
employed in it.
• Industrial – this is defined as pertaining to or engaged industry, the word
industrial may also mean , of industry or relating to. Used in or created by
industry and or industry workforce or relating to or involving workers industry.
• Security- this term means state or quality of being secured, freedom from fear ,
danger assurance or certainty .
• Management – it is defined as the planning, deciding or exercising of control
and supervision on some functions of the organization.
• Industrial security- the term may mean; security measures applied to business
industries, or the business of providing security and protection to private
individual business enterprises, or government and non-government industries
• Industrial security management – ‘ the skillful handling of the security and safe
measures of business enterprises and industrial establishment.

You might also like