0% found this document useful (0 votes)
31 views

Industrial Security Management Lecture Kcast

Uploaded by

Kenneth Albaran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Industrial Security Management Lecture Kcast

Uploaded by

Kenneth Albaran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 180

S EC U R I T Y

M A N AG E M E N T –
LEA 103 CBP, SO
JO, R C R IM, C SP,
TO R : JI MMY II MADULARA SONA
INSTRUC
KCAST VMGO
PHILOSOPHY OF EDUCATION KCAST

EMPHASIZES A PHILOSOPHY THAT WILL ADDRESS SOCIAL QUESTIONS AND A QUEST TO CREATE A BETTER SOCIETY AND WORLDWIDE DEMOCRACY. AS A RECONSTRUCTIONIST, IT WILL FOCUS ON
ACADEMIC PROGRAMS AND PRACTICES THAT HIGHLIGHT SOCIAL REFORM AS THE AIM OF EDUCATION

KCAST VMG

VISION

THE KAPALONG COLLEGE OF AGRICULTURE, SCIENCES, AND TECHNOLOGY SHALL BE THE PREMIER COMMUNITY COLLEGE PURSUING LEADERSHIP IN PEACE, INCLUSIVITY, AND DIVERSE CULTURE OF
THE PEOPLE CONTRIBUTING TO NATIONAL PRIDE.
-LEADERSHIP IN INCLUSIVE EDUCATION-

MISSION

KCAST COMMITS TO PRODUCE SERVICE-ORIENTED LEADERS AND GLOBALLY COMPETITIVE INNOVATORS MOLDED FROM A TRADITION OF EXCELLENCE THROUGH OFFERING ACCESSIBLE, QUALITY AND
TRANSFORMATIVE EDUCATION, PROACTIVE RESEARCH AND EXTENSION SERVICES, AND EFFECTIVE GOVERNANCE IN PARTNERSHIP WITH DYNAMIC AND DIVERSE STAKEHOLDERS.

GOALS

GOAL 1: INNOVATION, EQUITABLE ACCESS, FUTURE-READY AND RESILIENCY OF EDUCATION TOWARDS PEOPLE EMPOWERMENT, PROFESSIONAL DEVELOPMENT AND GLOBAL COMPETITIVENESS
GOAL 2: OPTIMIZATION OF ADMINISTRATION AND QUALITY ASSURANCE PROCESSES
GOAL 3: IMPROVEMENT OF INFRASTRUCTURE AND ICT SERVICES
GOAL 4: INSTITUTIONALIZING PROACTIVE PARTNERSHIPS, NETWORKS AND LINKAGES
GOAL 5: FOSTERING INCLUSIVITY IN IDENTITY AND CULTURE
GAD
ORIENTATION
GENDER AND
DEVELOPMENT
OFFICE

August|
VIDEO PRESENTATION DISCUSSING GAD
CONCEPTS.
WHAT HAVE YOU
OBSERVED FROM THE
VIDEO?
REPUBLIC ACT 9710:
MAGNA CARTA OF WOMEN
THE MAGNA CARTA OF WOMEN (MCW) IS A COMPREHENSIVE WOMEN’S HUMAN
RIGHTS LAW THAT SEEKS TO ELIMINATE DISCRIMINATION THROUGH THE RECOGNITION,
PROTECTION, FULFILLMENT, AND PROMOTION OF THE RIGHTS OF FILIPINO WOMEN,
ESPECIALLY THOSE BELONGING IN THE MARGINALIZED SECTORS OF THE SOCIETY.

DECLARATION OF POLICY.
RECOGNIZING THAT THE ECONOMIC, POLITICAL, AND SOCIOCULTURAL REALITIES
AFFECT WOMEN’S CURRENT CONDITION, THE STATE AFFIRMS THE ROLE OF WOMEN IN
NATION BUILDING AND ENSURES THE SUBSTANTIVE EQUALITY OF WOMEN AND
MEN. IT SHALL PROMOTE EMPOWERMENT OF WOMEN AND PURSUE EQUAL
OPPORTUNITIES FOR WOMEN AND MEN AND ENSURE EQUAL ACCESS TO
RESOURCES AND TO DEVELOPMENT RESULTS AND OUTCOME.
CHED MEMORANDUM ORDER.
NO. 01. SERIES OF 2015.
ESTABLISTING THE POLICIES AND GUIDELINES ON GENDER AND DEVELOPMENT IN THE
COMMISSION ON HIGHER EDUCATION AND HIGHER EDUCATION INSTITUTIONS (HEI’S)
GENERAL POLICY AND COVERAGE

GENDER MAINSTREAMING IS ONE OF THE MAJOR STRATEGIES IN EDUCATING AND


INFORMING VARIOUS SECTORS OF SOCIETY ON THE NEED TO RECOGNIZE AND RESPECT
RIGHTS OF WOMEN AND MEN. EDUCATING MORE WOMEN TRANSLATES TO ADDITIONAL
SOCIOECONOMIC GAINS THAT BENEFIT ENTIRE SOCIETIES, INCLUDING INCREASED
ECONOMIC PRODUCTIVITY, HIGHER FAMILY INCOMES, MORE INFORMED MEMBERS OF
SOCIETY, AND RESPECT FOR THE RIGHTS OF WOMEN. GENDER MAINSTREAMING IN
HIGHER EDUCATION IS THEREFORE ESSENTIAL NOT ONLY TO INDIVIDUAL BUT
ALSO NATIONAL DEVELOPMENT, HIGHER EDUCATION BEING THE CENTRAL SITE
FOR FACILITATING THE SKILLS, KNOWLEDGE AND EXPERTISE IMPORTANT TO
ECONOMIC AND SOCIAL DEVELOPMENT. THESE GUIDELINES SEEK TO INTRODUCE
AND INSTITUTIONALIZE GENDER EQUALITY, GENDER RESPONSIVENESS AND
SENSITIVITY IN THE VARIOUS ASPECTS OF PHILIPPINE HIGHER EDUCATION.
KCAST, WITH ITS DESIRE TO GIVE AWARENESS AND
RECOGNITION TO THE ROLE AND CONTRIBUTIONS OF
WOMEN IN NATION-BUILDING AS CATALYSTS OF SOCIETAL
DEVELOPMENT, ENSURES THAT WOMEN’S, AS WELL AS
MEN’S CONCERNS AND EXPERIENCES, ARE AN INTEGRAL
DIMENSION OF THE DESIGN, IMPLEMENTATION,
MONITORING, AND EVALUATION OF POLICIES AND
PROGRAMS IN CURRICULUM, RESEARCH AND EXTENSION
SO THAT WOMEN AND MEN BENEFIT EQUALLY AND
INEQUALITY IS NOT PERPETUATED. (MCW AND PCW MC 2011-01)
WHAT IS GENDER &
DEVELOPMENT?
❖REFERS TO THE DEVELOPMENT PERSPECTIVE AND PROCESS THAT ARE
PARTICIPATORY AND EMPOWERING, EQUITABLE, SUSTAINABLE, FREE FROM
VIOLENCE, RESPECTFUL OF HUMAN RIGHTS, SUPPORTIVE OF SELF-
DETERMINATION AND ACTUALIZATION OF HUMAN POTENTIAL.
❖IT SEEKS TO ACHIEVE GENDER EQUALITY AS A FUNDAMENTAL VALUE THAT
SHOULD BE REFLECTED IN DEVELOPMENT CHOICES;
❖SEEKS TO TRANSFORM SOCIETY’S SOCIAL, ECONOMIC, AND POLITICAL
STRUCTURES AND QUESTIONS THE VALIDITY OF THE GENDER ROLES
ASCRIBED TO WOMEN AND MEN;
❖CONTENDS THAT WOMEN ARE ACTIVE AGENTS OF DEVELOPMENT AND NOT
JUST PASSIVE RECIPIENTS OF DEVELOPMENT ASSISTANCE;
❖AND STRESSES THE NEED OF WOMEN TO ORGANIZE THEMSELVES AND
PARTICIPATE IN POLITICAL PROCESSES TO STRENGTHEN THEIR LEGAL
RIGHTS. (MCW)
GENDER
EQUALITY
✔ Refers to the principle asserting the
equality of women and men and
their right to enjoy equal conditions
realizing their full potential to
contribute to and benefit from the
results of development, and with
the State recognizing that all
human beings are free and equal in
dignity and rights. (MCW and PCW
MC 2011-01)
KCAST DEVELOPS AND
PROMOTES GENDER-
SENSITIVE CURRICULUM
INSTRUCTION,
RESEARCH, AND
EXTENSION.
KCAST ENSURES THAT GENDER
STEREOTYPES AND IMAGES IN
EXISTING EDUCATIONAL
MATERIALS AND CURRICULA ARE
ADEQUATELY AND APPROPRIATELY
REVISED, AND THAT GENDER-
SENSITIVE LANGUAGE BE USED AT
ALL TIMES.
GENDER-FAIR LANGUAGE
A LANGUAGE THAT AVOIDS BIAS TOWARD A PARTICULAR SEX OR GENDER AND
THEREFORE IS LESS LIKELY TO CONVEY STEREOTYPES.
KCAST DEVELOPS PROGRAMS AND
POLICIES TO PREVENT VIOLENCE AGAINST WOMEN
(VAW), INCLUDING INSTRUCTIONAL
MECHANISMS FOR COMPLAINTS IN CASES
OF RAPE, SEXUAL HARASSMENT, AND
OTHER FORMS OF VIOLENCE AND
DISCRIMINATION AGAINST WOMEN, AND
PROVIDE ASSISTANCE TO STUDENTS,
FACULTY, OR PERSONNEL WHO HAVE BEEN
VICTIMS OF VAW.
THE REPUBLIC ACT NO. 11313
THE SAFE SPACES ACT (BAWAL BASTOS LAW)
AN ACT DEFINING GENDER-BASED SEXUAL HARASSMENT IN STREETS,
PUBLIC SPACE, ONLINE, WORKPLACES, AND EDUCATIONAL OR
TRAINING INSTITUTIONS, PROVIDING PROTECTIVE MEASURES AND
PRESCRIBING PENALTIES
GENDER-BASED STREETS AND PUBLIC
SPACES SEXUAL HARASSMENT
❑THE CRIMES OF GENDER-BASED STREETS AND PUBLIC SPACES SEXUAL HARASSMENT ARE COMMITTED THROUGH ANY
UNWANTED AND UNINVITED SEXUAL ACTIONS OR REMARKS AGAINST ANY PERSON REGARDLESS OF THE MOTIVE FOR
COMMITTING SUCH ACTION OR REMARKS.
❑GENDER-BASED STREETS AND PUBLIC SPACES SEXUAL HARASSMENT INCLUDES CATCALLING, WOLF-WHISTLING,
UNWANTED INVITATIONS MISOGYNISTIC, TRANSPHOBIC, HOMOPHOBIC AND SEXIST SLUR, PERSISTENT UNINVITED
COMMENTS OR GESTURES ON A PERSON’S APPEARANCE, RELENTLESS REQUESTS FOR PERSONAL DETAILS,
STATEMENT OF SEXUAL COMMENTS AND SUGGESTIONS, PUBLIC MASTURBATION OR FLASHING OF PRIVATE PARTS,
GROPING OR ANY ADVANCES, WHETHER VERBAL OR PHYSICAL, THAT IS UNWANTED AND HAS THREATENED ONE’S
SENSE OF PERSONAL SPACE AND PHYSICAL SAFETY, AND COMMITTED IN PUBLIC SPACES SUCH AS ALLEYS, ROADS,
SIDEWALKS, AND PARKS.
❑ACTS CONSTITUTIVE OF GENDER-BASED STREETS AND PUBLIC SPACES SEXUAL HARASSMENT ARE THOSE PERFORMED
IN BUILDINGS, SCHOOLS, CHURCHES, MALLS, PUBLIC WASHROOMS, BARS, INTERNET SHOPS, PUBLIC MARKETS,
TRANSPORTATION TERMINALS OR PUBLIC UTILITY VEHICLES.
GENDER-BASED SEXUAL HARASSMENT
IN PUBLIC UTILITY VEHICLES.
⮚ GENDER-BASED SEXUAL HARASSMENT IN PUBLIC UTILITY VEHICLES (PUVS)
WHERE THE PERPETRATOR IS THE DRIVER OF THE VEHICLE SHALL ALSO
CONSTITUTE A BREACH OF CONTRACT OF CARRIAGE, FOR THE PURPOSE OF
CREATING A PRESUMPTION OF NEGLIGENCE ON THE PART OF THE OWNER OR
OPERATOR OF THE VEHICLE IN THE SELECTION AND SUPERVISION OF
EMPLOYEES AND RENDERING THE OWNER OR OPERATOR SOLIDARILY LIABLE
FOR THE OFFENSES OF THE EMPLOYEE.

⮚ LAND TRANSPORTATION OFFICE (LTO) MAY CANCEL THE LICENSE OF


PERPETRATORS FOUND TO HAVE COMMITTED ACTS CONSTITUTING SEXUAL
HARASSMENT IN PUBLIC UTILITY VEHICLES, AND THE LAND TRANSPORTATION
FRANCHISING AND REGULATORY BOARD (LTFRB) MAY SUSPEND OR REVOKE
THE FRANCHISE OF TRANSPORTATION OPERATORS WHO COMMIT GENDER-
BASED STREETS AND PUBLIC SPACES SEXUAL HARASSMENT ACTS.
GENDER-BASED SEXUAL HARASSMENT
IN STREETS AND PUBLIC SPACES
COMMITTED BY MINORS
IN CASE THE OFFENSE IS COMMITTED BY A
MINOR, THE DEPARTMENT OF SOCIAL
WELFARE AND DEVELOPMENT (DSW)
SHALL TAKE NECESSARY DISCIPLINARY
MEASURES AS PROVIDED FOR UNDER
REPUBLIC ACT NO. ACT NO. 9344.,
OTHERWISE KNOWN AS THE “JUVENILE
JUSTICE AND WELFARE ACT OF 2006.
GENDER-BASED ONLINE
SEXUAL HARASSMENT
GENDER-BASED ONLINE SEXUAL HARASSMENT INCLUDES
o ACTS THAT USE INFORMATION AND COMMUNICATIONS TECHNOLOGY IN TERRORIZING AND
INTIMIDATING VICTIMS THROUGH PHYSICAL, PSYCHOLOGICAL, AND EMOTIONAL THREATS,
o UNWANTED SEXUAL MISOGYNISTIC, TRANSPHOBIC HOMOPHOBIC, AND SEXIST REMARKS
AND COMMENTS ONLINE WHETHER PUBLICLY OR THROUGH DIRECT AND PRIVATE
MESSAGES,
o INVASION OF VICTIM'S PRIVACY THROUGH CYBERSTALKING AND INCESSANT MESSAGING,
o UPLOADING AND SHARING WITHOUT THE CONSENT OF THE VICTIM, ANY FORM OF MEDIA
THAT CONTAINS PHOTOS, VOICE OR VIDEO WITH SEXUAL CONTENT,
o ANY UNAUTHORIZED RECORDING AND SHARING OF ANY OF THE VICTIM'S PHOTOS,
VIDEOS, OR ANY INFORMATION ONLINE,
o IMPERSONATING IDENTITIES OF VICTIMS ONLINE OR POSTINGS LIES ABOUT VICTIMS TO
HARM THEIR REPUTATION, OR FILING, FALSE ABUSE REPORTS TO ONLINE PLATFORMS TO
SILENCE THE VICTIM.
GENDER-BASED SEXUAL HARASSMENT IN
EDUCATIONAL AND TRAINING &
INSTITUTIONS
❑ALL SCHOOLS, WHETHER PUBLIC OR PRIVATE, SHALL DESIGNATE AN
OFFICER-IN-CHARGE TO RECEIVE COMPLAINTS REGARDING
VIOLATIONS OF THIS ACT, AND SHALL ENSURE THAT THE VICTIMS ARE
PROVIDED WITH A GENDER-SENSITIVE ENVIRONMENT THAT IS BOTH
RESPECTFUL TO THE VICTIMS' NEEDS AND CONDUCIVE TO TRUTH-
TELLING.
❑THE SCHOOL SHOULD PROMPTLY INVESTIGATE TO DETERMINE THE
VERACITY OF SUCH INFORMATION OR KNOWLEDGE AND THE
CIRCUMSTANCES UNDER WHICH THE ACT OF GENDER-BASED SEXUAL
HARASSMENT OR SEXUAL VIOLENCE WAS COMMITTED, AND TAKE
HARASSMENT APPROPRIATE STEPS TO RESOLVE THE SITUATION.
SENATE BILL NO. 689
AN ACT PROHIBITING DISCRIMINATION ON THE BASIS OF SEXUAL
ORIENTATION AND GENDER IDENTITY OR EXPRESSION (SOGIE) AND
PROVIDING PENALTIES
THIS ACT SEEKS TO PROTECT INDIVIDUALS AND COMMUNITIES THAT EXPERIENCE HUMAN RIGHTS VIOLATIONS ON THE
BASIS OF SOGIE, INCLUDING, BUT NOT LIMITED TO, INDIVIDUALS AND COMMUNITIES OF DIVERSE SEXUAL ORIENTATION OR
GENDER IDENTITY OR EXPRESSION WHO ARE CHILDREN, YOUNG, POOR, DIFFERENTLY ABLED, OF DIFFERENT ETHNIC
BACKGROUND OR CULTURAL BACKGROUND, AND OF VARIOUS RELIGIOUS BELIEF.
THIS SHALL PROTECT INDIVIDUALS AND COMMUNITIES FROM THE FOLLOWING:
A. PROMOTE AND ENCOURAGE STIGMA ON THE BASIS OF SOGIE IN THE MEDIA, IN EDUCATIONAL TEXTBOOKS, AND OTHER
MEDIUM. INCITING VIOLENCE AND SEXUAL ABUSE AGAINST ANY PERSON OR GROUP ON THE BASIS OF SOGIE IS LIKEWISE
PROHIBITED;
B. UNLAWFUL TREATMENT IN THE CRITERIA FOR HIRING, PROMOTION, TRANSFER, DESIGNATION, WORK ASSIGNMENT,
REASSIGNMENT, DISMISSAL OF WORKERS, AND OTHER HUMAN RESOURCE MOVEMENT AND ACTION, PERFORMANCE
REVIEW AND IN THE DETERMINATION OF EMPLOYEE COMPENSATION, CAREER DEVELOPMENT OPPORTUNITIES, TRAINING,
AND OTHER LEARNING AND DEVELOPMENT INTERVENTIONS, INCENTIVES, PRIVILEGES, BENEFITS OR ALLOWANCES, AND
OTHER TERMS AND CONDITIONS OF EMPLOYMENT: IN BOTH THE PRIVATE SECTOR AND PUBLIC SERVICE, INCLUDING
MILITARY, POLICE, AND OTHER SIMILAR SERVICES; LIKEWISE APPLY TO THE CONTRACTING AND ENGAGING OF THE
SERVICES OF ASSOCIATIONS OR ORGANIZATIONS WITH LESBIANS, GAYS, BISEXUALS, TRANSGENDERS, INTERSEX, OR
QUEERS (LGBTIQS) MEMBERS OR OF ASSOCIATIONS OR ORGANIZATIONS ADVOCATING LGBTIQS RIGHTS;
THE COMMITTEE ON KCAST
DECORUM AND Committee College President
INVESTIGATION on
(CODI) OF Faculty President
EDUCATIONAL Decorum
INSTITUTIONS SHALL and Non-Teaching
ADDRESS GENDER- Investigati Personnel
BASED SEXUAL Representative
on (CODI) Faculty
HARASSMENT AND
ONLINE SEXUAL Compositio Representative
HARASSMENT IN n Gender &
ACCORDANCE WITH Development Focal
THE RULES AND Person
PROCEDURES SSC President
CONTAINED IN THEIR
CODI MANUAL.
KCAST - GAD FOCAL POINT
SYSTEM

Pursuant to
the CHED
Memorandum
Order No. 01,
Series of 2015,
Part IV.
UPCOMING ACTIVITIES OF GAD OFFICE 2022 -2023

SEXUAL ORIENTATION, GENDER IDENTITY, GENDER EXPRESSION, AND SEX


CHARACTERISTICS (SOGIESC): SOGIE BILL (FOR FACULTY, STAFF AND STUDENTS)
MENTAL HEALTH AND PANDEMIC: UNDERSTANDING PSYCHOLOGICAL FIRST AID AND
INTERVENTION. (FOR FACULTY AND STAFF ONLY)
ORIENTATION ON REPUBLIC ACT 11648 OR THE SPECIAL PROTECTION OF CHILDREN
AGAINST ABUSE, EXPLOITATION, AND DISCRIMINATION ACT. (FOR FACULTY, STAFF &
STUDENTS)
ORIENTATION ON REPUBLIC ACT 11313: SAFE SPACES ACT (FOR FACULTY, STAFF &
STUDENTS)
GENDER-SENSITIVITY TRAINING TO KCASTGAD COMMITTEE AND PROGRAM
REPRESENTATIVES
INTRODUCTION TO
INDUSTRIAL SECURITY
WHAT IS SECURITY?
SECURITY, IN ITS SEMANTIC AND PHILOSOPHICAL SENSE, IMPLIES A STABLE, RELATIVELY
PREDICTABLE ENVIRONMENT IN WHICH AN INDIVIDUAL OR GROUP MAY PURPOSE ITS ENDS
WITHOUT DISRUPTION OR HARM, AND WITHOUT FEAR OF SUCH DISTURBANCE OR INJURY. THE
CONCEPT OF SECURITY IN AN ORGANIZATIONAL SENSE, AS A MEANS BY WHICH THIS SAFETY
AND STABILITY CAN BE ACHIEVED, HAS EVOLVED GRADUALLY THROUGHOUT THE HISTORY OF
WESTERN CIVILIZATION, SHAPED BY WIDE VARIETY OF INSTITUTIONAL AND CULTURAL
PATTERNS. The need for security of lives and properties is as old as the history of man.
Man’s existence is characterized by constant exposure to dangers: those hazards
caused by nature; and those dangers posed by man’s fellowman. The means and
methods of human beings to secure themselves are also as old as the history of
policing.
In relation to this subject, security can also be define as:
1. State or feeling of safety: the state or feeling of being safe and protected;
2. Freedom from worry about possible loss: the assurance that something of value will
not be taken away;
3. Something giving assurance: something that provides a sense of protection against
loss, attack or harm;
4. Safety: protection against attack from without or subversion from within;
5. Precautions to maintain safety: precautions taken to keep somebody or something
safe from crime, attack, or danger; and
6. Guards: people or an organization entrusted with the job of protecting somebody or
something, especially a building or institution, against crime.
DEFINITION:
• Industry – the term denotes “earnest or constant application to work or business,” or “a special branch of
productive work, or the capital or workers employed in it.

• Industrial - this is defined as “pertaining to or engage in industry. The word industrial may also mean: of
industry or relating to, used in, or created by industry; and /or of industry’s workforce or relating to or
involving workers in industry.

• Security – as discussed earlier, this term means “the state or quality of being secured, freedom from fear
or danger, assurance, or certainty.”

• Management – This term means the ‘skillful use of means to accomplish a purpose. Management can also
be defined as “The planning, deciding, or exercising of control and supervision on some functions of the
organizations.

• Industrial Security – The term may mean: security measures applied to business industries ; or the
business of providing security and protection to private individuals, business enterprises, or government
and non-government industries.

• Industrial Security Management – With the preceding discussions, Industrial Security Management could
be defined as “the skillful handling of the security and safety measures of business enterprises and
industrial establishments.
SECURITY AND SAFETY
MEASURE
The security of any business establishment today is a complex process.
Security work involves active and passive measure so those effective defense
can be established against crimes.
Active measures are the physical barriers, security lightings, safes and vaults,
locks and other devices and gadgets designated to detect and impede hazards.
TYPES OF SECURITY
Physical Security - It is the broadest branch of security which is
concerned principally with the physical measures adopted to prevent
unauthorized access to equipment, facilities, materials, and documents,
and to safeguard then against theft, damage, sabotage, or espionage. It
also encompasses protection of personnel from any criminal act.
COMMUNICATION SECURITY - It is the protection
resulting from the application of various measures which
prevent or delay the enemy or unauthorized person in gaining
information through the communication system. This includes
transmission, and cryptographic security.
• A. Transmission Security – A component of communication security that
results from all measures designated to protect transmission from the
interception, traffic analysis, and imitative deception.

• B. Cryptographic Security – Result from the provisions of technically sound


crypto-systems and their proper use.

• C. Physical Security – Providing of safeguards to equipment and materials


from access by unauthorized person.
HOTEL SECURITY
• This is another specialized physical security. Hotel detectives,
uniformed guards, and security supervisors see to it that the guests
and their personal effects are safeguarded, hotel properties are
protected from pilferage, loss, damage, and the functions in the hotel
restaurants, bars and clubs are not disturbed and troubled by rowdy
outsiders, or by the guests themselves.
BANK SECURITY
•It is another specialized line in physical security. Due to the
peculiar nature of bank operations, the main objective of the bank
security force is the protection of the life of employees and assets
of the bank. The physical size, location, volume of cash, number of
personnel employed and its clientele are the main considerations in
determining the strength and type of the security unit.
DOCUMENT SECURITY
• ‘Document security” is physical security involving the protection of
documents and classified information from loss, access by
unauthorized persons, damage, theft, and compromise through
disclosure. Safeguarding vital records is one of the most difficult
tasks that can be assigned to security personnel.
PERSONAL SECURITY
• This involves the protection of personnel especially ranking
officials from any harm, kidnap, and other acts. Very
important people (VIP) security is a type of personal security.
The protection of top ranking officials of the government,
visiting persons of illustrious standing, and foreign dignitaries
is no easy job. This calls for a real “pro” in security field. VIP
security is part of personal security.
CRISES SECURITY

• Another new specialized field is “crises security” which is allied if


not a part of VIP security. Crises security is now involved in
kidnapping of vips like dignitaries, rich scions, industrial magnates,
political leaders.
INDUSTRIAL SECURITY
This is a type of security applied to business groups engaged in industries like
manufacturing assembling research in industries like manufacturing
assembling research and development, processing, warehousing and even
agriculture. It is a form of physical security involving industrial plants and
business enterprises where the personnel, processes, properties and
operations are safeguards. Use of protective barriers, and security lightening,
personnel movement control, and lock key management, guard forces,
communications and electronic hardware are essential aside from fire
prevention and control programs, emergency plans, industrial safety and
security education programs.
OPERATIONAL SECURITY

• This is a type of security that deals primarily with the


protection of processes, formula, patents and other
industrial and manufacturing activities from espionage,
infiltration, loss, compromise or photocopying.
OTHER SPECIAL TYPES OF SECURITY

• Due to peculiarities of different business activities, specialized


types of security appeared. These types are adaptations,
variations, innovations, and/or modifications of physical security,
i.E., Air cargo security, school security, supermarket security,
and personnel security
AIR CARGO SECURITY

• This is applied to maximize, if not prevent, losses of cargo during


in transit, storage or transfer.
SCHOOL SECURITY

• Thisis applied in response to the increase of violent crimes


committed against students and school personnel, and school
properties.
SUPERMARKET SECURITY

• Thisis applied in response to the mushrooming of


bazzars, marts, super malls, and the like.
PERSONNEL SECURITY

• This is involved in the background checks of individuals


commensurate with the security requirements of their work. This
also includes measures designated to protect employees of an
organization or business establish
THREE MAJOR DIVISION OF
SECURITY
• IN PROVIDING SECURITY AND PROTECTION TO INDUSTRIAL ESTABLISHMENTS, SECURITY AND PROTECTIVE
MEASURES ARE FOCUSED ON THE FOLLOWING MAJOR DIVISIONS:

• 1. PHYSICAL SECURITY - IT IS THE BROADEST BRANCH OF SECURITY WHICH IS CONCERNED PRINCIPALLY WITH THE
PHYSICAL MEASURES ADOPTED TO PREVENT UNAUTHORIZED ACCESS TO EQUIPMENT, FACILITIES, MATERIALS, AND
DOCUMENTS, AND TO SAFEGUARD THEN AGAINST THEFT, DAMAGE, SABOTAGE, OR ESPIONAGE. IT ALSO
ENCOMPASSES PROTECTION OF PERSONNEL FROM ANY CRIMINAL ACT.

• 2. PERSONNEL SECURITY – AS DESCRIBED EARLIER, THIS DIVISION OF SECURITY IS APPLIED TO CHECK THE
BACKGROUND OF PERSONS AS WELL AS THE PROTECTION OF COMPANY PERSONNEL AGAINST POTENTIAL HARMFUL
ACTS OR CONDITION.

• 3. DOCUMENT AND INFORMATION SECURITY – THIS INCLUDES EVERY MEASURES DESIGNED TO SAFEGUARD
COMPANY DOCUMENTS FROM UNINTENTIONAL OR INTENTIONAL HARMFUL ACTS OR AGAINST UNAUTHORIZED
DISCLOSURE OF THE INFORMATION CONTAINED THEREIN.
END OF PRELIM
LECTURE
PHYSICAL SECURITY
DEFINITION OF PRIVATE SECURITY
SECURITY HAS BEEN DEFINED AS THE USE OF MEASURES DESIGNED TO SAFEGUARD PERSONNEL,
TO PREVENT UNAUTHORIZED ACCESS TO EQUIPMENT, FACILITIES, MATERIALS, AND DOCUMENTS, AND TO
SAFEGUARD THEM AGAINST ESPIONAGE, SABOTAGE, THEFT, AND FRAUD.

DEFINITION OF COMPREHENSIVE SECURITY


COMPREHENSIVE SECURITY, BRIEFLY, IS AN APPROACH THAT BRINGS TO BEAR—IN AN ORGANIZED
MANNER—ALL OF THE SECURITY COMPONENTS AND RESOURCES CONCERNED WITH LOSS PREVENTION,
PROTECTION OF EMPLOYEES, PHYSICAL ASSETS, BUSINESS PERSONAL INTEGRITY, REPUTATIONS,
PROPRIETARY INFORMATION, AND OTHER INTANGIBLE ASSETS.
PRINCIPLE OF SECURITY
IN EVERY ESTABLISHMENT, PHYSICAL MEASURES ARE NEEDED TO DENY
UNAUTHORIZED ACCESS OR INTRUSION BECAUSE OF THE FOLLOWING:
1. ENEMY AGENTS MUST ACCESS
2. THERE IS NO IMPENETRABLE BARRIER
3. DEFENSE IN DEPTH MEANS BARRIER AFTER BARRIER
4. SURREPTITIOUS VERSUS NON-SURREPTITIOUS ENTRY
5. EACH INSTALLATION IS DIFFERENT
ENEMY AGENTS MUST ACCESS

• ACQUISITION OF INFORMATION IS THE ULTIMATE


RESULTS, AND THE MEANS AND FORM IN WHICH THE
INFORMATION IS OBTAIN.
THERE IS NO IMPENETRABLE BARRIER

• FOR THE UNFRIENDLY GOVERNMENT OR


ORGANIZATION, THEY ARE WILLING TO DEVOTE
ENOUGH TIME, MONEY, PERSONNEL, MATERIAL, AND
IMAGINATION IN PASSING BARRIERS.
DEFENSE IN DEPTH MEANS BARRIER
AFTER BARRIER

• BARRIER COULD PREVENT UNAUTHORIZED ACCESS


AND SERVE ITS PURPOSE VERY WELL, THERE SHOULD
BE AN INTEGRATION OF ALL BARRIERS ADOPTED IN THE
INSTALLATION.
SURREPTITIOUS VERSUS NON-
SURREPTITIOUS ENTRY

• THE POSSIBILITY OF SURREPTITIOUS ENTRY IS THE


GREATEST HAZARD FROM THE STANDPOINT OF
COUNTERINTELLIGENCE SECURITY BECAUSE IT IS
USUALLY DIFFICULT TO DETERMINE THAT THE
INFORMATION HAS BEEN COMPROMISED.
EACH INSTALLATION IS DIFFERENT

• SINCE EACH INSTALLATION IS DIFFERENT, EACH WILL


HAVE DIFFERENT PROBLEMS TO OVERCOME. THE
SECURITY PROCEDURES WILL NOT BE ADEQUATE FOR
ALL INSTALLATIONS.
BARRIERS

• REFERS TO ANY PHYSICAL STRUCTURE WHETHER


NATURAL OR MAN MADE CAPABLE OF RESTRICTING,
DETERRING, DELAYING OR PREVENTING ILLEGAL AND
UNAUTHORIZED ACCESS TO AN INSTALLATION.
TWO TYPES OF PHYSICAL
SECURITY BARRIERS
• NATURAL BARRIERS – THESE ARE OFFERED BY NATURE WHICH COULD
OBSTRUCT OR DELAY THE PASSAGE WAY OF POTENTIAL INTRUDERS. THESE ALSO
REFER TO NATURAL STRUCTURES THAT SERVE AS DETERRENTS OR
OBSTRUCTIONS TO INTRUDERS SUCH AS HIGH CLIFF, CANYON, DESERT, OR
BODIES OF WATER.

• MAN-MADE BARRIERS - ARE STRUCTURAL CONSTRUCTIONS OF MAN, SUCH AS


FENCES, WALLS, FLOORS, ROOFS, GRILLS, BARS, ROAD BLOCKS, OR OTHER
PHYSICAL MEANS TO DETER OR IMPEDE PENETRATION.
SPECIFIC TYPES OF PERIMETER BARRIERS
HEREUNDER ARE THE SPECIFIC TYPES OF PERIMETER
BARRIERS AS THE BASIC LINES OF PHYSICAL SECURITY:
1. WIRE FENCES
IS A TYPE OF PERIMETER BARRIER MADE OF CHAIN LINK
DESIGN WITH MESH OPENINGS DESIGN NOT LARGER THAN TWO
INCHES SQUARE, AND MADE OF #9 GAUGE WIRE OR HEAVIER,
TWISTED AND BARBED SELVAGE AT TOP AND BOTTOM AND THE
MINIMUM HEIGHT OF CHAIN LINK PORTION OF THE FENCE SHOULD
BE EIGHT (8) FEET. FENCES SHOULD REACH WITHIN TWO (2) INCHES
OF FIRM GROUND OR PAVING.
2. BUILDING WALLS

• WALLS, FLOORS, ROOFS OR THEIR COMBINATION SERVE ALSO AS


BARRIERS AND THEY SHOULD BE OF SUCH CONSTRUCTION TO
PROVIDE UNIFORM PROTECTION JUST LIKE THE WIRE FENCING.
MASONRY WALLS AS PERIMETER BARRIER SHOULD HAVE THE SAME
HEIGHT AS THE CHAIN-LINK AND SURMOUNTED BY THE BARBED WIRE
TOP GUARD. IF THE HEIGHT OF MASONRY IS LESS THAN THE
PRESCRIBED, ADDITIONAL CHAIN-LINK AS “TOPPING” IS PLACED TO
ATTAIN THE MINIMUM HEIGHT REQUIREMENT.

• 3. BODIES OF WATER

• A RIVER, LAKE, MARSH, CATARACT, SEA, POND, OR ANY BODIES OF


WATER FORMING A PART OF THE WALL, BUILDING OR FENCING
SHOULD NEVER BE CONSIDERED ADEQUATE NATURAL PERIMETER
BARRIER. ADDITIONAL SECURITY MEASURES LIKE WIRE-FENCE,
CONCRETE WALLING, ROVING GUARDS, AND FLOODLIGHTING AT
NIGHT MAY BE NECESSARY FOR THE PORTIONS OF THE PERIMETER.
4.PERIMETER BARRIER OPENINGS
THE FOLLOWING ARE SOME TYPES OF PERIMETER BARRIER
OPENINGS WHICH NEEDED TO BE GIVEN CONSIDERATIONS IN
PHYSICAL SECURITY CONTROL:
A.GATES AND DOORS
WHEN NOT IN ACTIVE USE AND CONTROLLED BY GUARDS, GATES AND
DOORS IN THE PERIMETER SHOULD BE LOCKED AND FREQUENTLY
INSPECTED BY GUARDS.
B.SIDEWALK ELEVATORS
THESE PROVIDE ACCESS TO AREAS WITHIN THE PERIMETER BARRIER,
AND SHOULD BE LOCKED OR GUARDED.
c. Utilities Openings

Sewers, air intakes, exhaust tunnels and other utility openings which
penetrate the barrier, and which have cross sectional area of ninety-six (96) square inches
or more should be protected by bars, grills, water-filled traps or other structural means.

d. Clear Zones

An unobstructed area or a “clear zone” should be maintained on both sides


of the perimeter barrier. A clear zone of twenty feet or more is desirable between the
barrier and exterior structure and natural covers which may provide concealment or
assistance to a person seeking unauthorized entry.
Additional Protective Measures

The perimeter barrier may be provided with the following


additional protective measures:

1. Top Guard

A top guard is an additional overhang barbed wire placed on


vertical perimeter fences facing upward and outward with a forty-five
degree angle with three to four strands of barbed wire spaced six
inches apart. This will increase the height and prevent easy access.
2. Guard Control Stations

This is normally provided at main perimeter entrance to


secure areas located out of doors and manned by guards on a full-
time basis. Sentry stations should be near a perimeter for surveillance
at the entrance.

3. Towers

Guard towers are house-like structures above the perimeter


barriers. As the height of tower increases, visibility, likewise
improves. During inclement weather, especially at night, even with
spotlights, the visibility will be limited. However, a tower gives a
psychological unnerving effect to the violators.
4. Barrier Maintenance

Fencing barriers and protective walls should always be regularly


inspected by security. Any sign of attempts to break in should be reported
for investigation. Destruction of fence should be repaired soon, and guard
vigilance increased.

5. Protection in Depth

In large open areas o ground, where fencing or walling is


impracticable and expensive, warning signs should conspicuously placed.
The depth itself is protection. Reduction of access roads, and sufficient
notices to warn intruders should be done. Use of animal guards and
intrusion devices can also be done.
NATURAL BARRIER
MAN MADE BARRIER
SPECIFIC TYPES OF PHYSICAL SECURITY
BARRIERS
1. NATURAL BARRIERS – INCLUDES MOUNTAIN, CLIFFS CANYONS, RAVENS, SEAS, MARSHES, DESERTS, OR
TERRAIN DIFFICULT TO TRAVERSE.

2. STRUCTURAL BARRIERS – CONSTRUCTED BY A MAN REGARDLESS OF THEIR ORIGINAL INTENT THAT


TEND TO DELAY THE INTRUDER. EXAMPLES: WALLS, CEILINGS, DOOR AND FENCES.
3. HUMAN BARRIERS - INCLUDES GUARD, CHARGES OF QUARTERS, OFFICE AND SHOP WORKERS, WHO
STAND BETWEEN THE INTRUDER AND THE MATTER TO BE PROTECTED.
4. ANIMAL BARRIERS – ARE USUALLY SHEPHERD DOGS TRAINED FOR AND USED AS GUARDS.
5. ENERGY BARRIERS - ARE USUALLY ELECTRICAL AND ELECTRONIC DEVICES THAT COULD ASSIST
SECURITY PERSONNEL IN DETECTING INTRUSIONS. EXAMPLES: PROTECTED LIGHTING, AND ANTI-
INTRUSION DEVICES.
HUMAN BARRIER
ANIMAL BARRIER
ENERGY BARRIER
LEVELS OF PHYSICAL
SECURITY
ALSO VARIES DEPENDING ON THE TYPE AND LOCATION OF FACILITY, AND OTHER FACTORS NEEDING SECURITY.
THE LEVELS OF PHYSICAL SECURITY COULD BE ANY OF THE FOLLOWING:
1. MINIMUM SECURITY – IS A SYSTEM DESIGNATED TO IMPEDE AND UNAUTHORIZED EXTERNAL ACTIVITY SUCH AS
SIMPLE INTRUSION TO ARMED ATTACK.
2. LOW LEVEL SECURITY – IS A SYSTEM DESIGNATED TO IMPEDE AND DETECT SOME UNAUTHORIZED EXTERNAL
ACTIVITY SUCH AS ON SMALL RETAIL STORE, STORAGE WAREHOUSE.
3. MEDIUM SECURITY – IS DESIGNED TO IMPEDE, DETECT AND ASSESS MOST EXTERNAL ACTIVITY AND SOME
UNAUTHORIZED INTERNAL ACTIVITY THAT RANGE FROM SIMPLE SHOPLIFTING TO CONSPIRACY TO COMMIT
SABOTAGE
A. USE OF ADVANCE INTRUSION ALARM SYSTEM
B. ESTABLISHMENT OF PERIMETER AND PERIMETER BARRIERS
C. USE OF AN UNARMED GUARD.
4. HIGH LEVEL SECURITY – DESIGNATED TO IMPEDE, DETECT AND ASSESS MOST
UNAUTHORIZED EXTERNAL AND INTERNAL ACTIVITIES OF CERTAIN PRISONS,
DEFENSE CONTRACTORS, PHARMACEUTICAL COMPANIES AND SOPHISTICATED
ELECTRONIC MANUFACTURES. EXAMPLE: CCTV, PERIMETER ALARM SYSTEM, HIGH
SECURITY LIGHTNING, HIGHLY TRAINED ARMED GUARDS; CONTROL DESIGN AND
COORDINATION WITH LOCAL LAW ENFORCEMENT AGENCIES.
5. MAXIMUM SECURITY – INCLUDES THE APPLICATION OF THE FOLLOWING:
A. SOPHISTICATED ALARM SYSTEM
B. ON-SITE RESPONSE FORCE
IN ADDITION TO SECURITY PERSONNEL, OTHER SECURITY MEASURES INVOLVING
PHYSICAL CONTROLS ARE AS FOLLOWS, I.E., STRUCTURAL BARRIERS, SECURITY
LIGHTINGS, PROTECTIVE ALARMS, AND LOCKING DEVICES. EACH OF THESE
ADDITIONAL PHYSICAL MEASURES TO CONTROL ACCESS HAD BEEN EVENLY
DISCUSSED FOR A CLEAR UNDERSTANDING OF THE VITAL ROLE IT IS CONTRIBUTING
IN THE ARENA OF SECURITY AND SAFETY MANAGEMENT.
• STRUCTURAL BARRIERS
A BARRIER IS A NATURAL OR MANUFACTURED OBSTACLE TO THE
MOVEMENT OF PERSONS, ANIMALS, VEHICLES OR MATERIALS. IT DEFINES
PHYSICAL LIMITS TO AND DELAYS OR PREVENTS PENETRATION OF AN AREA. A
BASIC SECURITY CONCEPT IS TO DESIGN A SERIES OF LAYERS, OR CONCENTRIC
CIRCLES, SO THAT HIGHLY PROTECTED ASSETS ARE WITHIN A CONFIGURATION OF
MULTIPLE BARRIERS.
• TYPES OF STRUCTURAL BARRIERS
• THE TYPES OF STRUCTURAL BARRIERS, MOST OFTEN USED CAN BE
GROUPED INTO THREE GENERAL CATEGORIES, AS FOLLOWS:

• 1. BUILDING SURFACES

• ALTHOUGH THE SURFACES OF BUILDING—WALLS, CEILINGS, FLOORS, AND


ROOFS—ARE NOT CONSTRUCTED AS PROTECTIVE BARRIERS, THEY DO DETER
PENETRATION. AN EXTERIOR SURFACE IS NORMALLY AT LEAST TWO LAYERS
THICK, BECAUSE IT IS DESIGNED TO PROTECT AGAINST RAIN AND WIND.
2. METAL OR DRAWN WIRES
METAL OF DRAWN WIRES IS A MESH OF METAL STRIPS
WHOSE PURPOSE IS TO PREVENT PASSAGE BY PERSONS,
ANIMALS, AND VEHICLES. IN HIGH SECURITY
APPLICATIONS, DRAWN WIRES COULD BE CIRCUMVENTED
RELATIVELY QUICKLY BY HUMANS WITHOUT TOOLS.
3. MASONRY WALLS
MASONRY WALLS ARE CONCRETE FENCE
STRUCTURES FROM INDIVIDUAL BUILDINGS OR
COMPOUNDS WHICH IS LAID IN AND BOUND TOGETHER BY
MORTAR. THE COMMON MATERIALS OF MASONRY
CONSTRUCTION ARE BRICK, STONE SUCH AS MARBLE,
GRANITE, TRAVERTINE, CONCRETE BLOCK, AND TILE.
DEFINITION AND
TERMINOLOGIES
• PERSON – THIS INCLUDES NOT ONLY NATURAL BUT ALSO JURIDICAL PERSONS SUCHS AS SINGLE PROPRIETORSHIPS,
PARTNERSHIPS, CORPORATIONS, COMPANIES OR ASSOCIATIONS, DULY ORGANIZED AND REGISTERED WITH THE
SECURITIES AND EXCHANGE COMMISSIONS AND OR THE DEPARTMENT OF TRADE AND INDUSTRY

• SECURITY GUARD – ALSO KNOWN AS PRIVATE SECURITY GUARD OR WATCHMAN SHALL INCLUDE ANY PERSON WHO
OFFERS OR RENDERS A PERSONAL SERVICES TO WATCH OR SECURE EITHER A RESIDENCE OR BUSINESS
ESTABLISHMENT OR BOTH OR BUILDINGS, COMPOUNDS OR AREAS.

• PRIVATE DETECTIVE – REFERS TO ANY PERSON WHO DOES DETECTIVE WORK FOR HIRE, REWARD OR COMMISSION,
OTHER THAN MEMBERS OF THE AFP, BJMP, PROVINCIAL GUARDS, PNP OR ANY LAW ENFORCEMENT AGENCY OF THE
GOVERNMENT.

• LICENSE TO EXERCISE PROFESSION OR LICENSE CERTIFICATE – THE DOCUMENT ISSUED BY THE CPNP OR HIS DULY
AUTHORIZED REPRESENTATIVE RECOGNIZING A PERSON TO BE QUALIFIED TO PERFORM HIS DUTIES AS SECURITY
GUARD OR DETECTIVE.
SECURITY GUARD
QUALIFICATION OF SECURITY
GUARD
• THE MINIMUM QUALIFICATION FOR SECURITY GUARDS, SECURITY OFFICERS AND SECURITY CONSULTANTS
ARE STATED BELOW:

• 1. BASIC REQUISITES FOR SECURITY GUARDS – NO PERSON SHALL BE LICENSED AS SECURITY GUARD
UNLESS HE POSSESSES THE FOLLOWING QUALIFICATIONS:
A. FILIPINO CITIZEN
B. HIGH SCHOOL GRADUATE
C. PHYSICALLY AND MENTALLY FIT
D. AT LEAST 18 YEARS OLD BUT NOT MORE THAN 50 YEARS
E. HAS UNDERGONE PRE LICENSING TRAINING COURSE; AND
F. MUST NOT POSSESS ANY OF THE DISQUALIFICATIONS.
2. DESIRABLE QUALITIES OF SECURITY
GUARDS
• A. ALERTNESS – A GOOD GUARD MUST BE ALERT IN SPOTTING VIOLATORS

• B. JUDGEMENT – SOUND AND GOOD JUDGEMENT IS MORE THAN THE USE OF COMMON SENSE.

• C. CONFIDENCE – IT IS THE STATE OF BEING SURE; A STATE OF THE MIND FREE FROM DOUBT OR MISGIVINGS.

• D. PHYSICAL FITNESS – SECURITY WORK IS STRENUOUS AND DEMANDING AND IT ESSENTIAL IF HE IS TO BE A


DEPENDABLE GUARD.

• TACTFULNESS – ABILITY OF THE GUARD TO DEAL WITH OTHERS SUCCESSFULLY WITHOUT OFFENDING. IN
SHORT, HE CAN BE FIRM BUT PLEASANT.

• SELF-CONTROL – ABILITY TO TAKE HOLD OF ONESELF REGARDLESS OF A PROVOKING SITUATION.

• INTEREST, LOYALTY, RESPONSIBLE AND TRUSTWORTHY – IS ALSO IMPORTANT ATTRIBUTES OF A RELIABLE


GUARD.
WHAT ARE THE GENERAL
DISQUALIFICATIONS?
• 1. Dishonorably discharge from the service
in the PNP/AFP
• 2. Physically and mentally unfit
• 3. Conviction of a crime
• 4. Addiction to drugs/ alcohol
• 5. Dummy of foreigner
• 6. Elective or appointed government
official
SECURITY GUARD UNIFORM
AGENCY
OPERATOR/MANAGER
• 1. Atleast 25 years of age
• 2. College graduates and/or commissioned officer in
the inactive service or retired from the AFP/PNP
• 3. Has taken a course/seminar on seminar on
industrial security management and / or must have
adequate training or experience in security business
RANKS, POSITIONS, STAFFING PATTERNS,
AND JOB DESCRIPTION

•The organization of private security agencies,


company guard forces, and government security
units art patterned the organizational structures
of the PNP and the AFP ranks and position
• 1. SECURITY MANAGEMENT STAFF
• A SECURITY DIRECTOR (SD) AGENCY MANAGER/CHIEF SECURITY OFFICER
• B. SECURITY EXECUTIVE DIRECTOR (SED) ASST. AGENCY MANAGER/ASST. CHIEF SECURITY OFFICER
• C. SECURITY STALL DIRECTOR (SSD) STAFF DIRECTOR OPERATION AND STAFF DIRECTOR FOR
ADMINISTRATION

• 2. LINE LEADERSHIP STAFF


• A. SECURITY SUPERVISOR 3- DETACHMENT COMMANDERS
• B. SECURITY SUPERVISOR 2-CHIEF INSPECTOR
• C. SECURITY SUPERVISOR 1-INSPECTOR

• 3. SECURITY GUARD
• A. SECURITY GUARD 1 WATCHMAN/GUARD
• B. SECURITY GUARD 2-SHIFT-IN-CHARGE
• C. SECURITY GUARD 3 POST IN CHARGE

• 4. SECURITY CONSULTANT IS OPTIONAL BUT MUST POSSESS QUALIFICATIONS LISTED IN SEC. 6,


RULE III OF RA 5487.
• 5. SECURITY MANAGEMENT STAFF
• AGENCY MANAGER/CHIEF SECURITY OFFICER. HE IS RESPONSIBLE FOR THE ENTIRE
OPERATION AND ADMINISTRATION/MANAGEMENT OF THE SECURITY AGENCY AND
DIRECTLY RESPONSIBLE TO OPERATOR/OWNER/BOARD OF DIRECTORS THE AGENCY.

• 6. ASSISTANT AGENCY MANAGER


• ASSISTS THE AGENCY MANAGER AND TAKES THE OPERATIONAL AND ADMINISTRATIVE
MANAGEMENT WHEN THE MANAGER IS ABSENT

• 7. SECURITY STAFF DIRECTOR FOR OPERATION


• THE STAFF ASSISTANT FOR THE EFFICIENT OPERATION OF THE AGENCY.
• 8. SECURITY STAFF DIRECTOR FOR ADMINISTRATION
• HE IS THE ASSISTANT FOR THE EFFECTIVE AND EFFICIENT ADMINISTRATION AND
MANAGEMENT OF THE AGENCY.
2. LINE LEADER STAFF
• A. THE DETACHMENT COMMANDER – THE FIELD OR AREA COMMANDER OF THE AGENCY.
• B. THE CHIEF INSPECTOR - SHALL BE RESPONSIBLE FOR INSPECTING THE ENTIRE AREA COVERED BY THE
DETACHMENT.

• C. THE SECURITY INSPECTOR – IS RESPONSIBLE FOR THE AREA ASSIGNED BY THE CHIEF INSPECTOR OF
THE DETACHMENT COMMANDER.

• D. SECURITY GUARD
• A. SECURITY GUARD 3 OR THE POST IN-CHARGE – RESPONSIBLE FOR THE ENTIRE DETAILED SECURITY
OFFICER/PERSONNEL WITHIN A CERTAIN
ESTABLISHMENT.
• B. SECURITY GUARD 2 OR THE SHIFT IN-CHARGE - RESPONSIBLE FOR THE SECURITY OFFICERS WHO ARE
SCHEDULED IN A CERTAIN SHIFT FOR A
PARTICULAR PERIOD.
• C. SECURITY GUARD 1 OR THE WATCHMAN/GUARD - THE ONE ACTUALLY POSTED AS WATCHMAN AND OR GUARD.
11 GENERAL ORDER OF SECURITY
GUARD
• 1.TO TAKE CHARGE MY POST AND ALL COMPANY PROPERTIES IN VIEW AND
PROTECT/PRESERVE THE SAME WITH UTMOST DILIGENCE;

• 2.
TO WALKED MY POST IN A MILITARY MANNER, KEEPING ALWAYS ON THE ALERT
AND OBSERVING EVERYTHING THAT TAKES PLACE WITH IN SIGHT OR HEARING;

• 3. TO REPORT ALL VIOLATION OF ORDERS I AM INSTRUCTED TO IN FORCE;


• 4. TO RELAY ALL CALLS FROM POST MORE DISTANCE FROM THE GUARD HOUSE
WHERE I AM STATIONED;

• 5. TO QUIT MY POST ONLY WHEN PROPERLY RELIEVED;


• 6. TO RECIEVED, OBEY AND PASS UN TO THE RELIEVING GUARD ALL ORDERS FROM
THE COMPANY OFFICERS OR OFFICIAL, SUPERVISOR, POST INCHAGRED, AND OR
SHIFT LEADERS;

• 7. TO TALK TO NO ONE EXCEPT IN LINE OF DUTY;


• 8. TO SOUND OR CALL THE ALARM IN CASE OF FIRE OR DISORDER;
• 9. TO CALL MY SUPERIOR OFFICER IN ANY CASE NOT COVERED BY INSTRUCTIONS;
• 10. TO SALUTE ALL COMPANY OFFICIAL, SUPERVISOR IN THE AGENCY, RANKING
PUBLIC OFFICIAL, ALL OFFICERS OF THE PNP AND ALL COMMISSION OFFICERS OF
THE AFP;

• 11.TO BE SPECIALLY WATCHFUL AT NIGHT AND DURING THE TIME OF


CHALLENGING TO CHALLENGE ALL PERSON ON OR NEAR MY POST AND TO ALLOW
NO ONE TO PASS OR LOITER WITHOUT PROPER AUTHORITY.
WHAT ARE THE CODE OF
CONDUCT?
CODE OF ETHICS
• 1.) AS A SECURITY GUARD OR DETECTIVE HIS FUNDAMENTAL DUTIES IS TO SERVE
THE INTEREST OR MISSION OF HIS AGENCY IN COMPLIANCE WITH THE CONTRACT
ENTERED INTO WITH CLIENTS OR CUSTOMERS OF THE AGENCY HE IS SUPPOSED
TO SERVE;

• 2.) HE SHALL BE HONEST IN THOUGHTS AND DEEDS BOTH IN HIS PERSONAL AND
OFFICIAL ACTUATIONS, OBEYING THE LAWS OF THE LAND AND THE REGULATIONS
PRESCRIBED BY HIS AGENCY AND THOSE ESTABLISHED BY THE COMPANY HE IS
SUPPOSED TO PROTECT;

• 3.) HE SHALL NOT REVEAL ANY CONFIDENTIAL INFORMATION CONFIDED TO HIM


AS SECURITY GUARD SUCH OTHER MATTERS IMPOSED UPON HIM BY LAW;
• 4.)HE SHALL ACT AT ALL TIMES WITH DECORUM AND SHALL NOT PERMIT
PERSONAL FEELINGS, PREJUDICES AND UNDUE FRIENDSHIP TO INFLUENCE HIS
ACTUATION WHILE IN THE PERFORMANCE OF HIS OFFICIAL FUNCTIONS;

• 5.)HE SHALL NOT COMPROMISE WITH CRIMINALS AND OTHER LAWLESS


ELEMENTS TO THE PREJUDICE OF THE CUSTOMERS OR CLIENTS AND SHALL
ASSIST THE GOVERNMENT IN ITS RELENTLESS DRIVE AGAINST LAWLESSNESS
AND OTHER FORMS OF CRIMINALITY;

• 6.) HE SHALL CARRY HIS ASSIGNED DUTIES AS REQUIRED BY LAW TO THE BEST
OF HIS ABILITY AND SHALL SAFEGUARD THE LIFE AND PROPERTY OF THE
ESTABLISHMENT HE IS ASSIGNED;

• 7.) HE SHALL WEAR HIS UNIFORM, BADGE, PATCHES AND INSIGNIA PROPERLY
AS A SYMBOL OF PUBLIC TRUST AND CONFIDENCE, AS AN HONEST,
TRUSTWORTHY SECURITY GUARD AND PRIVATE DETECTIVES.
• 8.) HE SHALL KEEP HIS ALLEGIANCE FIRST TO THE GOVERNMENT, THEN TO THE
AGENCY WHERE HE IS EMPLOYED AND TO THE ESTABLISHMENT HE IS ASSIGNED TO
SERVE WITH LOYALTY AND UTMOST DEDICATION;

• 9.) HE SHALL DILIGENTLY AND PROGRESSIVELY FAMILIARIZE HIMSELF WITH THE RULES
AND REGULATIONS LAID DOWN BY HIS AGENCY AND THOSE OF THE CUSTOMERS AND
CLIENTS;

• 10.) HE SHALL AT ALL TIMES BE COURTEOUS, RESPECTFUL AND SALUTE HIS SUPERIOR
OFFICERS GOVERNMENT OFFICIALS AND OFFICIAL OF THE ESTABLISHMENT WHERE HE
IS ASSIGNED OR THE COMPANY HE IS SUPPOSED TO SERVE;

• 11.) HE SHALL REPORT FOR DUTY ALWAYS IN PROPER UNIFORM AND NEAT IN
APPEARANCE; AND;

• 12.) HE SHALL LEARN AT HEART AND STRICTLY OBSERVE THE RULES AND
REGULATIONS GOVERNING THE USE OF FIREARMS.
"SECURITY GUARD CREED"
• ASA SECURITY GUARD, MY FUNDAMENTAL DUTY IS TO PROTECT LIVES AND
PROPERTIES AND MAINTAIN PEACE AND ORDER WITHIN MY PLACE OF DUTY;
PROTECT THE INTEREST OF MY EMPLOYER AND OUR CLIENTS AND THE SECURITY
AND STABILITY OF OUR GOVERNMENT AND COUNTRY WITH OUT COMPROMISE
AND PREJUDICE, HONEST IN MY ACTION, WORDS AND THOUGHTS; AND DO MY
BEST TO UPLOAD THE PRINCIPLE OF MAKADIOS, MAKABAYAN, MAKATAO AT
MAKAKALIKASAN.
PROTECTIVE LIGHTNING

• PROTECTIVE LIGHTING SHOULD ENABLE SECURITY PERSONNEL TO OBSERVE


ACTIVITIES AT AN INSTALLATION WITHOUT DISCLOSING THEIR PRESENCE.
ADEQUATE LIGHTING FOR ALL APPROACHES TO AN INSTALLATION
DISCOURAGES ATTEMPTED UNAUTHORIZED ENTRY AND REVEALS PERSONS IN
THE AREA.
• SECURITY LIGHTINGS
IN THE FIELD OF PHYSICAL SECURITY, LIGHTINGS ARE OFTEN
USED AS A PREVENTATIVE AND CORRECTIVE MEASURE AGAINST
INTRUSIONS OR OTHER CRIMINAL ACTIVITY ON A PHYSICAL PIECE OF
PROPERTY. SECURITY LIGHTING MAY BE PROVIDED TO AID IN THE
DETECTION OF INTRUDERS, TO DETER INTRUDERS, OR IN SOME
CASES SIMPLY TO INCREASE THE FEELING OF SAFETY.
TYPES OF SECURITY LIGHTINGS
FOUR COMMON TYPES OF SECURITY LIGHTINGS, WITH SUB-CATEGORIES, ARE
COMMONLY USED IN INDUSTRIAL SECURITY MANAGEMENT, AS FOLLOWS:
1. STATIONARY LUMINARY
MOST COMMON TYPE, CONSISTING OF SERIES OF FIXED LUMINOUS TO LIGHT A
GIVEN
A. GLARE PROTECTION TYPE
THE INTENSITY IS FOCUSED
TO THE INTRUDER WHILE THE OBSERVER OR
GUARD REMAINS IN THE COMPARATIVE
DARKNESS. THE LIGHTING IS TOWARD THE
APPROACH OF AN ENTRANCE TO AN
INSTALLATION.
B. CONTROLLED LIGHTING
THE WIDTH OF THE LIGHTED-
ATOP CAN BE CONTROLLED AND ADJUSTED TO
SUIT THE SECURITY NEEDS. THE LIGHTING IS
FOCUSED SAG ON A PILE OF ITEMS RATHER
THAN ON THE BACKGROUND.
2. STAND-BY LIGHTING

SIMILAR TO CONTINUOUS
LIGHTING, IN CAN BE TURNED ON
MANUALLY OR BY SPECIAL DEVICES OR
OTHER AUTOMATIC MEANS, WHEN
THERE IS SUSPICION OF ENTRY.
3. MOVABLE LIGHTING
CONSIST OF STATIONARY OR
PORTABLE, MANUALLY OPERATED
SEARCH LIGHTS WHICH MAY BE
LIGHTED CONTINUOUSLY DURING
HOURS OF DARKNESS OR ONLY AS
NEEDED, AND USUALLY
SUPPLEMENTARY TO EITHER OF THE
FIRST TWO TYPES
4. EMERGENCY LIGHTING
A STAND-BY LIGHTING WHICH
CAN BE UTILIZED IN THE EVENT OF
ELECTRICAL FAILURE, EITHER DUE
TO LOCAL EQUIPMENT OR
COMMERCIAL POWER FAILURE.
PROTECTIVE ALARMS
• ALARMS ARE FOUND IN ELECTRONIC FORM TODAY.
SENSORS ARE CONNECTED TO A CONTROL UNIT VIA
EITHER A LOW-VOLTAGE HARDWIRE OR NARROWBAND
SIGNAL, WHICH IN TURN CONNECTS TO A MEANS FOR
ANNOUNCING THE ALARM, HOPEFULLY TO ELICIT SOME
RESPONSE.
BASIC PARTS OF PROTECTIVE ALARMS
PROTECTIVE ALARMS ARE CONSISTING OF THREE BASIC PARTS:
1. SENSORS
SENSORS IN ALARM SYSTEMS RANGE FROM SIMPLE MAGNETIC SWITCHES TO
SOPHISTICATED ULTRASONIC DOPPLER AND SOUND SYSTEMS. THE SIMPLEST SENSORS
ARE ELECTRO-MECHANICAL DEVICE IN WHICH AN ELECTRIC CIRCUIT IS BROKEN OR
CLOSED, INCLUDING SWITCHES, WINDOW FOIL, AND SCREENS.
• 2. CIRCUIT

• THE CIRCUIT IS THE COMMUNICATION CHANNEL THAT CONVEYS


THE INFORMATION FROM ALL SENSORS IN THE SYSTEM TO THE SIGNAL
BY MEANS OF WIRE, RADIO WAVES, EXISTING ELECTRICAL CIRCUITS,
OR A COMBINATION OF THESE.

• 3. SIGNAL

• THE ACTUAL ALARM MAY BE AUDIBLE OR SILENT, A BELL, BUZZER,


PHONE RINGING, OR FLASHING LIGHT. OPINIONS VARY AS TO WHICH
SIGNAL IS MORE EFFECTIVE. AN AUDIBLE ALARM SYSTEM MAY
FRIGHTEN AN INTRUDER AWAY, OR IT MAY SIMPLY HASTEN HIS ACTIVITY.
• PROTECTIVE ALARMS RESPONSE
DEPENDING UPON THE ZONE TRIGGERED, NUMBER AND SEQUENCE
OF ZONES, TIME OF DAY, AND OTHER FACTORS, THE MONITORING
CENTER CAN AUTOMATICALLY INITIATE VARIOUS ACTIONS. THEY MIGHT
BE INSTRUCTED TO CALL THE AMBULANCE, FIRE DEPARTMENT OR POLICE
DEPARTMENT IMMEDIATELY, OR TO FIRST CALL THE PROTECTED
PREMISES OR PROPERTY MANAGER TO TRY TO DETERMINE IF THE ALARM
IS GENUINE. SOME ALARM SYSTEMS ARE TIED TO VIDEO SURVEILLANCE
SYSTEMS SO THAT CURRENT VIDEO OF THE INTRUSION AREA CAN BE
INSTANTLY DISPLAYED ON A REMOTE MONITOR, NOT TO MENTION
RECORDED.
TYPES OF PROTECTIVE ALARMS
PROTECTIVE ALARMS MAY BE LOCAL, PROPRIETARY, CENTRAL STATION, OR POLICE-CONNECTED.
1. LOCAL ALARMS
SOUNDS ON THE PREMISES AND REQUIRE THAT SOMEONE HEARS THE ALARM AND CALLS THE POLICE. SUCH ALARMS ARE
THE LEAST EXPENSIVE, BUT ARE ALSO THE LEAST EFFECTIVE BECAUSE NO ONE MAY HEAR THEM; THEY MAY BE HEARD BUT
IGNORED; AND THAT THEY ARE EASILY DISCONNECTED BY A KNOWLEDGEABLE INTRUDER.
2. PROPRIETARY ALARMS
USE A CONSTANTLY MANNED ALARM PANEL WHICH MAY RECEIVE VISIBLE AND/OR AUDIBLE SIGNALS TO INDICATE
EXACTLY WHERE THE SECURITY BREAK HAS OCCURRED. SUCH SYSTEM ARE OWNED AND OPERATED BY THE OWNER OF THE
PROPERTY.

3. CENTRAL STATION ALARM


ARE SIMILAR TO THE PROPRIETARY SYSTEM, EXCEPT THAT THE OBSERVATION OF THE CONTROL PANEL IS EXTERNAL TO
THE ALARM’S LOCATION AND IS USUALLY UNDER CONTRACT WITH AN ALARM AGENCY. WHEN THE CENTRAL STATION RECEIVES
AN ALARM IT USUALLY WILL DISPATCH ITS GUARDS TO THE LOCATION OF THE ALARM, NOTIFY THE OWNER, AND NOTIFY THE
POLICE.
4. POLICE-CONNECTED SYSTEM
SYSTEMS DIRECT THE ALARM VIA TELEPHONE WIRES TO THE NEAREST POLICE STATION.
3. CENTRAL STATION ALARM
ARE SIMILAR TO THE PROPRIETARY SYSTEM, EXCEPT THAT THE OBSERVATION OF
THE CONTROL PANEL IS EXTERNAL TO THE ALARM’S LOCATION AND IS USUALLY UNDER
CONTRACT WITH AN ALARM AGENCY. WHEN THE CENTRAL STATION RECEIVES AN
ALARM IT USUALLY WILL DISPATCH ITS GUARDS TO THE LOCATION OF THE ALARM,
NOTIFY THE OWNER, AND NOTIFY THE POLICE.
4. POLICE-CONNECTED SYSTEM
SYSTEMS DIRECT THE ALARM VIA TELEPHONE WIRES TO THE NEAREST POLICE
STATION.
OPERATIONS OF THE PROTECTIVE ALARMS
OPERATIONS OF INTRUSION DEVICES EMIT CERTAIN SIGNALS FROM THE SENSORS AND OPERATE ON THE HEREUNDER PRINCIPLES:

1. BREAKING AN ELECTRIC CIRCUIT

IN A BUILDING OR COMPOUND, ALL POSSIBLE POINTS OF ENTRY CAN BE WIRED BY USING ELECTRICALLY CHARGED STRIPS OF TINFOIL
OR WIRE.

2. INTERRUPTION OF A LIGHT BEAM

THIS SYSTEM USES A PHOTO-ELECTRIC CELL OR THE “ELECTRIC EYE” WHICH OPERATES ON THE PRINCIPLES OF LIGHT RAYS.

3. ELECTROMAGNETIC FENCE

IS AN ELECTRONIC FENCE CONSISTING OF 3 TO 5 STRANDS OF WIRE SPACED FROM 9 TO 24 INCHES ABOVE ONE ANOTHER WHICH
SERVES AS AN ANTENNA, A MONITOR PANEL, AND ELECTRIC CIRCUITRY.

4. DETECTION OF SOUND AND VIBRATION

THIS CAN BE UTILIZED EFFECTIVELY TO SAFEGUARD ENCLOSED AREAS VAULTS, SAFES, STORAGE BINS, FILE ROOMS, WAREHOUSES,
AND SIMILAR ENCLOSURES.

5. SPACE, MOTION AND VIBRATION

THESE SYSTEMS USUALLY DERIVE THEIR OPERATING PRINCIPLE FROM A PHYSICAL PHENOMENON KNOWN AS “DOPPLER EFFECT.”
3. ELECTROMAGNETIC FENCE
IS AN ELECTRONIC FENCE CONSISTING OF 3 TO 5 STRANDS OF WIRE SPACED FROM
9 TO 24 INCHES ABOVE ONE ANOTHER WHICH SERVES AS AN ANTENNA, A MONITOR
PANEL, AND ELECTRIC CIRCUITRY.
4. DETECTION OF SOUND AND VIBRATION
THIS CAN BE UTILIZED EFFECTIVELY TO SAFEGUARD ENCLOSED AREAS VAULTS,
SAFES, STORAGE BINS, FILE ROOMS, WAREHOUSES, AND SIMILAR ENCLOSURES.
5. SPACE, MOTION AND VIBRATION
THESE SYSTEMS USUALLY DERIVE THEIR OPERATING PRINCIPLE FROM A
PHYSICAL PHENOMENON KNOWN AS “DOPPLER EFFECT.”
PROTECTIVE LOCKS AND KEY CONTROL
LOCKING DEVICES
THE MOST WIDELY USED METHOD OF CONTROLLING PHYSICAL ACCESS IS THE LOCK. LOCKS
ARE USED ON DOORS AT HOME, ON VEHICLES, FOR OFFICES, HOTELS AND SAFES, AND IN DESKS,
CABINETS, FILES, BRIEFCASES, DISPLAY CASES AND JEWELRY BOXES.

DEFINITION OF LOCKS
LOCKS ARE A SIMPLE TYPE OF DETACHABLE LOCK, WITH A HINGED OR SLIDING SHACKLE
DESIGNED TO PASS THROUGH A RING OR STAPLE ON A DOOR, CHEST, ETC. PADLOCKS ARE USED BY
CONSUMERS, COMMERCIAL BUSINESSES, UTILITIES, RAILROADS & GOVERNMENTS FOR VARIOUS
APPLICATIONS FOR THE PURPOSE OF IMPEDING THEFT, VANDALISM, SABOTAGE ESPIONAGE, OR TO
PROTECT PEOPLE FROM HARM.
• TYPES OF LOCKS
AVAILABLE TYPES OF LOCKS TO PHYSICALLY CONTROL
ACCESS TO AN AREA ARE THE FOLLOWING:

• 1. KEY-OPERATED LOCKS
KEY-OPERATED LOCKS ARE MOST FREQUENTLY USED
AND ARE SIMPLE TO OPERATE. A KEY IS INSERTED INTO A
KEYWAY AND TURNED TO INSERT OR4 WITHDRAW A BOLT
FROM A STRIKE. THE KEYWAY CONTAINS OBSTACLES THAT
MUST BE BYPASSED TO WITHDRAW OR INSERT THE BOLT.
2. COMBINATION LOCKS

COMBINATION LOCKS ARE OFTEN USED ON PADLOCKS


AS WELL AS ON SAFE AND VAULT DOORS. TURNING THE DIAL
TO PRE-SPECIFIED NUMBERS ALIGN THE NOTCHES TO CREATE
A SLOT, ALLOWING AN ARM TO DROP INTO IT SO THAT THE
LOCKING BAR CAN BE WITHDRAWN FROM THE STRIKE.
3. CARD-OPERATED LOCKS

CARD OPERATED LOCKS ARE


INSERTED INTO A CARD READER INSTALLED
NEAR DOOR OR PASSAGEWAY THAT IS
RESTRICTED. WHEN AN AUTHORIZED CARD
IS INSERTED INTO THE SLOT, A
MINICOMPUTER ACTIVATES THE LOCKING
DEVICE, THEREBY OPENING THE DOOR,
TRAFFIC CONTROL ARM, GATE, OR
TURNSTILE.
4. ELECTRONIC LOCKS
ELECTRONIC LOCKS ARE FREQUENTLY
USED IN APARTMENT BUILDINGS AND IN
OFFICES WHERE STRICT PHYSICAL
SECURITY IS REQUIRED. FOR EXAMPLE,
IN AN APARTMENT BUILDING, THE
DOORWAY BETWEEN THE FOYER AND
HALLWAYS TO THE APARTMENT CAN BE
ELECTRONICALLY LOCKED.
5. OTHER LOCKS
IN ADDITION TO THE
PRECEDING TYPES OF LOCKS,
CLAM SHELL LOCKS, SUCH AS
THOSE USED IN WINDOWS,
BARS, BOLTS, CHAINS, AND
TIME LOCKS CAN ALSO BE USED
TO PROVIDE ADDITIONAL
SECURITY.
WARDED LOCK – IS A TYPE OF LOCK THAT
USES A SET OF OBSTRUCTION, OR WARDS,
TO PREVENT THE LOCK FROM OPENING
UNLESS THE CORRECT KEY IS INSERTED.
THE CORRECT KEY HAS NOTCHES OR
SLOTS CORRESPONDING TO THE
OBSTRUCTIONS IN THE LOCK, ALLOWING
IT TO ROTATE FREELY INSIDE THE LOCK.
DISC TUMBLER LOCK – IS A
TYPE OF LOCK THAT UTILIZES A
SET OF FLAT DISC TO PREVENT
THE LOCK FROM OPENING
UNLESS THE CORRECT KEY IS
INSERTED.
• PINTUMBLER LOCK – IS A LOCK
MECHANISM THAT USES PINS OF
VARYING LENGTHS TO PREVENT
THE LOCK FROM OPENING
WITHOUT THE CORRECT KEY. PIN
TUMBLER ARE MOST COMMONLY
EMPLOYED IN CYLINDER LOCK,
BUT MAY ALSO BE FOUND IN
TUBULAR OR RADIAL LOCKS.
WHAT ARE THE TYPES OF
KEY
1. CHANGE KEY – A SPECIFIC KEY WHICH
OPERATES THE LOCK AND HAS A
PARTICULAR COMBINATION OF CUTS,
WHICH MATCH THE ARRANGEMENT OF
THE TUMBLERS IN THE LOCK
•SUB – MASTER KEY –
A KEY THAT WILL
OPEN ALL THE LOCK
WITHIN A PARTICULAR
AREA OR GROUPING
IN A GIVEN FACILITY.
MASTER KEY – A
SPECIAL KEY CAPABLE
OF OPENING A SERIES
OF LOCKS.
• GRAND MASTER KEY –
A KEY THAT WILL OPEN
EVERYTHING IN A
SYSTEM INVOLVING
TWO OR MORE MASTER
KEY GROUPS.
WHAT IS KEY CONTROL?
THE MANAGEMENT OF KEYS IN PLANT OR
BUSINESS ORGANIZATION TO PREVENT
UNAUTHORIZED ACCESS TO THE KEYS.
WHAT IS SECURITY CABINET?
THE FINAL LINE OF DEFENSE AT ANY FACILITY IS IN
SECURITY STORAGE WHERE PAPERS, RECORDS PLANS OR
CASHABLE INSTRUMENT, PRECIOUS METALS OR OTHER
ESPECIALLY VALUABLE ASSETS ARE PROTECTED. THESE
SECURITY CONTAINERS WILL BE OF A SIZE QUANTITY,
WHICH NATURE OF THE BUSINESS DICTATES.
END OF MIDTERM
LECTURE
PERSONNEL SECURITY
• IT INCLUDES ALL THE SECURITY MEASURES
DESIGNED TO PREVENT UNSUITABLE
INDIVIDUALS OR PERSONS OF DOUBTFUL
LOYALTY TO THE GOVERNMENT, FROM
GAINING ACCESS TO CLASSIFIED MATTER
OR TO ANY SECURITY FACILITY, AND TO
PREVENT APPOINTMENT OR RETENTION AS
EMPLOYEES OF SUCH INDIVIDUALS.
PERSONNEL INVESTIGATION AND IT’S
TECHNIQUE

•IT IS INQUIRY INTO THE CHARACTER,


REPUTATION, DISCRETION AND LOYALTY OF
INDIVIDUAL IN ORDER TO DETERMINE A
PERSON’S SUITABILITY TO BE GIVEN A
SECURITY CLEARANCE.
WHAT ARE THE TYPES OF
PSI?
• NATIONAL AGENCY CHECK (NAC) – THIS IS AN
INVESTIGATION OF AN INDIVIDUAL MADE UPON THE
BASIS OF WRITTEN INFORMATION SUPPLIED BY HIM IN
RESPONSE TO OFFICIAL INQUIRY, AND BY REFERENCE
TO APPROPRIATE NATIONAL AGENCIES.
•LOCAL AGENCY CHECK (LAC) – THIS TYPE OF
INVESTIGATION CONSIST OF THE NAC PLUS
WRITTEN INQUIRIES SENT TO APPROPRIATE
LOCAL GOVERNMENT AGENCIES, FORMER
EMPLOYEES, REFERENCE AND SCHOOL LISTED BY
THE PERSON UNDER INVESTIGATION.
BACKGROUND
INVESTIGATION
• THIS IS MORE COMPREHENSIVE
INVESTIGATION THAN THE NAC &
LAC. A THOROUGH AND COMPLETE
INVESTIGATION OF ALL OR SOME OF
THE CIRCUMSTANCES OR ASPECTS
OF A PERSON’S LIFE IS CONDUCTED.
WHAT ARE THE TWO TYPES
OF BI
• COMPLETE BACKGROUND INVESTIGATION (CBI) – CONSIST OF
THE INVESTIGATION OF THE BACKGROUND OF A PERSON,
PARTICULARLY ALL THE CIRCUMSTANCES OF HIS PERSONAL LIFE.
• PARTIALBACKGROUND INVESTIGATION (PBI) – CONSIST OF THE
INVESTIGATION OF THE BACKGROUND OF AN INDIVIDUAL BUT
LIMITED ONLY TO SOME OF THE CIRCUMSTANCES OF HIS
PERSONAL LIFE WHICH ARE DEEMED PERTINENT TO THE
INVESTIGATION.
SECURITY EDUCATION
PROGRAM
•THE BASIC GOAL OF SECURITY
EDUCATION PROGRAM IS TO
ACQUAINT ALL THE EMPLOYEES
THE RATIONALE BEHIND THE
SECURITY MEASURES AND TO
INSURE THEIR COOPERATION AT
ALL TIMES.
OBJECTIVES OF SECURITY EDUCATION
PROGRAM.
• – GUIDANCE FOR ALL SUPERVISORY AND EXECUTIVE LEVELS OF THE
ORGANIZATION;

• – A MANDATORY INDOCTRINATION OF SECURITY FOR ALL NEW


PERSONNEL BEFORE THEIR ASSIGNMENT TO THEIR RESPECTIVE JOBS;

• – DEVELOPMENT OF HIGH DEGREE OF SECURITY CONSCIOUSNESS


AMONG THE SELECTED SUPERVISORS AND OTHER KEY PERSONNEL IN A
PROGRAM THAT SHOULD BE CONTINUING AND SUPPORTED BY TOP
MANAGEMENT,
•– A DOWN- THE- LINE SECURITY PROGRAM AIMED AT
INSTILLING CONSCIOUSNESS AND DEDICATION THROUGH
DEMONSTRATIONS, LECTURES, MOTIVATIONS, AND
SUGGESTIONS,
• – TO LET ALL THE EMPLOYEE FORCE BE INFORMED THAT
THEY ALL BELONG TO THE ORGANIZATION AND THAT NON
•- AWARENESS AND NON- CONCERN TO THE SECURITY
PROGRAM IS TANTAMOUNT TO DISLOYALTY.
•– THAT THE PROGRAM IS ALSO TO DEVELOP DISCIPLINE,
LOYALTY AND BELONGINGNESS.
PHASES OF SECURITY
EDUCATION
•INITIAL INTERVIEW

• TRAINING CONFERENCE
• REFRESHER CONFERENCE
• SECURITY REMINDERS
• SECURITY PROMOTION
• SPECIAL INTERVIEWS
• DEBRIEFING
•‘Document security” is physical security involving the
protection of documents and classified information
from loss, access by unauthorized persons, damage,
theft, and compromise through disclosure.
Safeguarding vital records is one of the most difficult
tasks that can be assigned to security personnel.
DOCUMENT AND INFORMATION
SECURITY
• THE INFORMATION CYCLE CONSISTS OF FIVE STAGE NAMELY :
• (A) CREATION
• (B) USE,
• (C) STORAGE AND RETRIEVAL
• (D) TRANSFER, AND
• (E) DISPOSITION.
TYPES OF CLASSIFIED
DOCUMENTS
• CLASS1- VITAL DOCUMENT
IN THIS CATEGORY ARE RECORDS THAT ARE
IRREPLACEABLE; RECORDS OF WHICH REPRODUCTION
DOES NOT HAVE THE SAME VALUE AS THE ORIGINAL;
• CLASS II- IMPORTANT DOCUMENT
THIS INCLUDES RECORDS THE PRODUCTION OF WHICH
WILL CLOSE CONSIDERABLE EXPENSE AND THE LABOR,
OR CONSIDERABLE DELAY
CLASS III – USEFUL DOCUMENTS
THIS INCLUDE RECORDS WHOSE LOSS MIGHT CAUSE
INCONVENIENCE BUT COULD BE REALITY REPLACE AND
WHICH WOULD NOT IN THE MEANTIME PRESENT AN
INSURMOUNTABLE OBSTACLE TO THE PROMPT
RESTORATION OF THE BUSINESS.
CLASS IV- NON- ESSENTIAL DOCUMENTS
THESE RECORDS ARE DAILY FILES, ROUTINE IN NATURE EVEN IF
LOST OR DESTROYED, WILL NOT EFFECT OPERATION OR
ADMINISTRATION. THIS CLASS REPRESENT THE BULK OF THE
RECORDS WHICH SHOULD NOT EVEN ATTEMPTED TO PROTECT IN
THE EVENT OF DISASTERS. THEY SHOULD HOWEVER, BE KEPT IN
ORDINARY FILES READY FOR REFERENCE IF NEEDED AND USUALLY
DISCARDED AFTER SOME PERIOD OF TIME.
DOCUMENT
AND
INFORMATION CYCLE
RECORDS AND DOCUMENTS
PROTECTION
1. CATEGORIES OF STORAGE CONTAINERS
- STORAGE CONTAINERS TOO ARE CATEGORIZED OR CLASSIFIED ACCORDING TO
WHAT SHOULD BE STORED.
A. CLASS 1: COMMERCIAL RECORD SAFES DESIGNED FOR FIRE PROTECTION
B. CLASS 2: COMMERCIAL MONEY SAFES DESIGNED FOR ROBBERY AND
BURGLARY PROTECTION
C. CLASS 3: SECURITY CABINETS DESIGNED TO MEET SPECIFICATIONS FOR
SAFEGUARDING CLASSIFIED MATERIALS.
• 2. TEST FOR SAFE’S FIRE RESISTANCE
- DOCUMENTS ARE AT RISK NOT ONLY AGAINST UNAUTHORIZED
DISCLOSURES BUT ALSO AGAINST DESTRUCTION THAT MAY BE CAUSED BY FIRE OR
EXPLOSION. HENCE, SAFES USUALLY UNDERGO THE FOLLOWING TESTS:
A. FIRE ENDURANCE TEST IS DONE AT A TEMPERATURE ABOVE 350 DEGREES
FAHRENHEIT
B. EXPLOSION HAZARDS TEST IS DONE TO DETERMINE IF THE SUDDEN RISE
IN TEMPERATURE WILL NOT CAUSE THE SAFE TO REPUTE. IF THE SAFE CAN
WITHSTAND 2000 DEGREES FAHRENHEIT FOR 30 MINUTES AND WILL NOT CRACK
OR OPEN, THEN IT HAS PASSED THE EXPLOSION TEST.
C. FIRE AND IMPACT TEST IS AIMED AT DETERMINING THE STRENGTH OF A
SAFE TO WITHSTAND THE COLLAPSE OF A BUILDING DURING A FIRE.
RISK ANALYSIS AND SECURITY HAZARDS

SECURITY IS ALL ABOUT REDUCING OR ELIMINATING THE


IMPACT OR EFFECT OF POTENTIAL RISKS OR HAZARDS.
SECURITY MANAGERS NORMALLY CONDUCT SECURITY
SURVEYS AND SECURITY INSPECTIONS TO DETERMINE
THE NEED SECURITY MEASURES.
RELATIVITY OF RISK AND
SECURITY
• 1. RELATIVE CRITICALITY OF OPERATION – THIS PERTAINS TO THE IMPORTANCE OF THE FIRM WITH
REFERENCE TO THE NATURAL ECONOMY AND SECURITY.
EXAMPLE: IS GASOLINE DEPOTS, COMMUNICATION TRANSMISSION LINES, AND POWER PLANTS

• 2. RELATIVE VULNERABILITY – THIS IS THE SUSCEPTIBILITY OF THE PLANT OR ESTABLISHMENT TO


DAMAGE, LOSS OR DISRUPTION OF OPERATION DUE TO VARIOUS HAZARDS.
EXAMPLE: LOCATION OF THE BUILDING, THE MACHINE, OR PRESENCE OF POSSIBLE POISONS

SECURITY MANAGERS AND PLANNERS NORMALLY CONSIDER THE ABOVE RELATIVITY IN DETERMINING THE
DEGREE OF SECURITY MEASURE NEEDED TO REDUCE OR ELIMINATE THE POTENTIAL RISKS OR HAZARDS.
RISK MANAGEMENT ALTERNATIVES AND
STRATEGIES
TO LESSEN OR ELIMINATE THE EFFECT OF RISK OR HAZARDS, THE FOLLOWING ARE THE
ALTERNATIVES AND STRATEGIES THAT ARE COMMONLY APPLIED BI INDUSTRIAL SECURITY
MANAGERS:
1. RISK AVOIDANCE – THIS IS THE ELIMINATING OR REMOVING THE RISK TOTALLY FROM THE
BUSINESS, GOVERNMENT, OR INDUSTRIAL ENVIRONMENT FOR WHICH THE RISK
MANAGER HAS RESPONSIBILITY.
EXAMPLE: PROPER DISPOSAL OF INFLAMMABLE SUBSTANCES.
2. RISK REDUCTION – THIS IS THE DECREASING THE RISK BY MINIMIZING THE PROBABILITY OF THE
POTENTIAL LOSS. THE REDUCTION OF CRIMINAL OPPORTUNITY IS OFTEN ACCOMPLISHED BY
SITUATIONAL CRIME PREVENTION STRATEGIES TO DISCOURAGE, DETER, OR DENY CRIMINAL
INCIDENTS.
EXAMPLE: CONSTRUCTION OF FENCES AND SIMILAR PHYSICAL BARRIERS
3. RISK SPREADING – THIS IS THE SPREADING THE RISK THROUGH
COMPARTMENTATION OR DECENTRALIZATION TO LIMIT THE IMPACT (CRITICALITY)
OF THE POTENTIAL LOSS. THIS COULD BE DONE BY USING NUMEROUS VAULTS OR
SAFES FOR THE SAFEKEEPING OF VALUABLES SUCH AS DOCUMENT AND PAPER
BILLS.
4. RISK TRANSFER – THIS IS THE MOVING THE FINANCIAL IMPACT OF THE POTENTIAL
LOSS-OVER TO AN INSURANCE COMPANY. THIS IS DONE BY AVAILING OF PROPERTY
AND LIFE INSURANCES.
EXAMPLE: HIRING SECURITY AGENCIES.
5. RISK SELF – ASSUMPTION - THIS IS A PLANNED ASSUMPTION AND ACCEPTANCE
OF THE POTENTIAL RISK BY MAKING A DELIBERATE MANAGERIAL DECISION OF
DOING NOTHING ABOUT THE THREAT, OR SETTING ASIDE RESOURCES FOR USE IN
CASE OF A SPECIFIC LOSS INCIDENT.
SECURITY HAZARDS
HAZARDS MEAN EXPOSURE TO THE CHANCE OF LOSS OR INJURY; OR
THE TERM IS SYNONYMOUS TO RISK AND OR PERIL. IN THE FIELD OF
INDUSTRIAL SECURITY, ANY HAZARDOUS SITUATIONS OR CONDITIONS
ARE CALLED SECURITY HAZARDS.
NORMALLY, LOSS OF LIFE AND DAMAGE TO PROPERTIES ARE CAUSED BY
HUMAN NEGLIGENCE IN THEIR FAILURE TO RECOGNIZE THE ADVERSE
EFFECT OF A PARTICULAR CONDITION OR EVENT. SECURITY INTERFECES
BY REMOVING OR DETERRING THE IDENTIFIED HAZARDS.
TYPE OF HAZARDS
NATURAL HAZARDS - THESE ARE HAZARDS WHICH ARISE
FROM NATURAL PHENOMENA.

HUMAN OR MAN-MADE HAZARDS - HUMAN OR MAN-MADE


HAZARDS ARE THE GREATEST CONCERN TO PERSONNEL
CHARGE WITH THE RESPONSIBILITY OF SAFEGUARDING
AND PROTECTING A PLANT OR INSTALLATION.
NATUARAL HAZARDS
1. FLOODS CAUSED BY TYPHOONS
2. EARTHQUAKES
3. FIRE (NOT CAUSED BY HUMAN ACTION) – SUCH AS THOSE CAUSE BY
LIGHTNINGS
4. STORMS (TYPHOONES, CYCLONES, TORNADO AND HURRICANE
5. LIGHTNING STORMS
6. EXTREME TEMPERATURE AND HUMIDITY
HUMAN MAN MADE HAZARDS
1. SABOTAGE
2. ESPIONAGE
3. PILFERAGE
4. THEFT AND ROBBERY
5. DISLOYALTY
6. DISAFFECTIONS
7. SUBVERSIVE ACTIVITIES
PERSONS INTERNAL
HAZARDS
EVERY EMPLOYEE OF THE COMPANY OR BUSINESS
ESTABLISHMENT INCLUDING BUT NOT LIMITED TO THE
ASSIGN SECURITY PERSONNEL ARE ALL POSSIBLE
CAUSES OF SECURITY HAZARDS. THIS BECAUSE OF THE
FOLLOWING THAT ARE INNATE TO EVERY HUMAN BEING.
• 1. FAITH – IN THE SPHERE OF SECURITY OPERATIONS, FAITH CAN BE A QUESTIONABLE
VIRTUE. THOSE PERSONS IN WHICH TRUST OF THEIR FELLOWMEN IS AN ABIDING
INSTINCT, AND WHO CONSIDER THEMSELVES A DEFINITE THREAT TO EFFECTIVE
SECURITY, FOR THE ENTIRE TRAINING AND ENEMY IS AIMED AT DECEIVING THIS TYPE OF
PERSON

• 2. CONCEIT – IT IS THE DESIRE TO SATISFY THE EGO OR IMPRESS SOMEONE, PROVIDES


THE ENEMY AGENT WITH HIS BEST SOURCE OF INFORMATION

• 3. ENTHUSIASM AND PRIDE – THESE ARE COMMON CAUSES OF INDISCRETION.


ANYONE WHO IS TRULY INTERESTED IN HIS JOB FINDS IT DIFFICULT NOT TO TALK AND
WRITE ABOUT IT.

• 4. IGNORANCE – MANY PEOPLE COMPROMISE VITAL INFORMATION SIMPLY BECAUSE


THEY DO NOT REALIZE ITS VALUE AND DO NOT KNOW THE METHODS BY WHICH
INTELLIGENCE AGENCIES OPERATE. THROUGH SECURITY EDUCATION AND
INDOCTRINATION ONE CAN COMBAT THIS.
TYPES OF PILFERER
CASUAL PILFERER - IS ONE WHO STEALS DUE TO HIS
INABILITY TO RESISTS THE UNEXPECTED OPPORTUNITY
AND HAS LITTLE BY DETECTION.
SYSTEMATIC PILFERER - IS ONE WHO STEALS WITH
PRECONCEIVED PLAN TAKES AWAY ANY OR ALL TYPES OF
ITEMS OR SUPPLIES FOR ECONOMIC GAIN.
SECURITY SURVEY
A SECURITY SURVEY IS A CRITICAL ON- SITE EXAMINATION AND
ANALYSIS OF AN INDUSTRIAL PLANT, BUSINESS, HOME, OR PUBLIC
OR PRIVATE INSTITUTION DONE TO ASCERTAIN THE FACILITY’S
CURRENT SECURITY STATUS, TO IDENTIFY DEFICIENCIES OR
EXCESSES IN CURRENT PRACTICES, TO DETERMINE WHAT
PROTECTION IS NEEDED, AND TO MAKE RECOMMENDATIONS FOR
IMPROVING THE OVERALL LEVEL OF SECURITY AT THAT LOCATION.
OBJECTIVES OF SECURITY SURVEY
• TO DETERMINE EXISTING STATE OF SECURITY
• TO LOCATE WEAKNESS IN DEFENSE
• TO DETERMINE DEGREE OF PROTECTION REQUIRED
• TO PRODUCE RECOMMENDATIONS ESTABLISHING A
TOTAL SECURITY PROGRAM.
SECURITY SURVEY SEQUENCE OF
ACTION
•EXAMINE AND ANALYZE THE SITE AND THE
ORGANIZATION
•ASCERTAIN THE ORGANIZATION/S CURRENT SECURITY
STATUS.
•DETERMINE THE LEVEL OF PROTECTION NEEDED
•MAKE RECOMMENDATIONS
SECURITY INSPECTION
• TYPES OF SECURITY INSPECTION
• A. CONTINUOUS INSPECTION
• B. FORMAL
• C. INFORMAL
• D. STRUCTURED
• E. UNSTRUCTURED
CONTINUOUS INSPECTION
TO KEEP PACE WITH CONSTANT CHANGES IN THE
ORGANIZATION, CHANGES IN OUR SECURITY IN TERM OF
ATTITUDES, LIFE-STYLES AND MORAL VALUES, AND THE
RAPIDLY ADVANCING TECHNOLOGICAL MODIFICATIONS
ALL AROUND US, THE INSPECTION PROCESS MUST BE AN
ON – GOING, NEVER ENDING ACTIVITY.
FORMAL
IS ONE TO WHICH SOME FANFARE IS ATTACHED: IT IS
USUALLY PRECEDED BY AN ANNOUNCEMENT, AND
THE UNIT UNDER INSPECTION “PREPARES” FOR
EVENTS, INCLUDING SOME EXTRA HOUSEKEEPING
ACTIVITIES THAT WOULD NOT OTHERWISE HAPPEN AT
THAT POINT IN TIME.
INFORMAL
ARE USUALLY THE RESULT OF A LONG AND
FIRMLY ENTRENCHED INSPECTION
PROGRAM, UNDERSTOOD BY ALL AND
ACCEPTED AS A PART OF THE
ORGANIZATIONAL LIFE.
STRUCTURED
AS OPPOSED TO AN UNSTRUCTURED INSPECTION,
IS ONE THAT MOVES SYSTEMATICALLY, PERHAPS
EVEN RIGIDLY, FROM ONE DESIGNATED INSPECTION
POINT TO THE NEXT. THE FOLLOWING COULD BE
PART OF SUCH A STRUCTURED INSPECTIONS.
UNSTRUCTURED
INSPECTIONS
IN CONTRAST, WOULD APPROACH THE WAREHOUSE UNIT IN
A MORE RANDOM MANNER, WITH LESS METHODICAL
ATTENTION TO SMALL SPECIFICS. THE EXPERIENCE EYE OF A
TOP SECURITY PROFESSIONAL WOULD NOTE A GLANCE,
WITHOUT FOLLOWING A CHECKLIST, THE WEEDS AND OTHER
VEGETATIONS AGAINST THE FENCE NEEDED CLEARING.
SECURITY INVESTIGATION
INVESTIGATION COME FROM THE GREEK WORD ‘INVESTIGRE’ WHICH MEANS IDENTIFYING OF CAUSE OR
WHAT IS THE ORIGINAL CAUSE.

SECURITY = REFERS TO THE STATE OF FEELING SECURED AND BEING SAFE.

• SECURITY INVESTIGATION = REFERS TO THE PROCESS OF INVESTIGATING AND ANALYZING POTENTIAL


SECURITY THREATS OR INCIDENTS, SUCH AS CYBER ATTACKS, THEFT, FRAUD, OR OTHER FORMS OF
CRIMINAL ACTIVITY. THE PRIMARY PURPOSE OF A SECURITY INVESTIGATION IS TO IDENTIFY THE SOURCE OF
A SECURITY BREACH AND TAKE STEPS TO PREVENT SIMILAR INCIDENTS FROM OCCURRING IN THE FUTURE.

• A SECURITY INVESTIGATION CAN INVOLVE A RANGE OF ACTIVITIES, INCLUDING GATHERING AND


ANALYZING EVIDENCE, CONDUCTING INTERVIEWS WITH WITNESSES, REVIEWING SECURITY CAMERA
FOOTAGE, AND EXAMINING COMPUTER LOGS AND OTHER ELECTRONIC RECORDS. THE INVESTIGATION MAY
BE CARRIED OUT BY INTERNAL SECURITY PERSONNEL OR BY EXTERNAL SPECIALISTS SUCH AS LAW
ENFORCEMENT AGENCIES OR PRIVATE INVESTIGATION FIRMS.
•END OF
LECTURE

You might also like