INDUSTRIAL SECURITY
MANAGEMENT
DR. JOSE A. DELA PENA
Industrial Security Management
• Introduction to Industrial Security
• Physical Security
• Personnel Security
• Documentation and Information Security
• Risk Analysis and Security Hazard
• Security Survey, Inspection and Investigation
• RA 5487
Introduction to Industrial
Security
• Security, in its semantic and philosophical sense,
implies a stable, relatively predictable
environment in which an individual or group may
purpose its ends without disruption or harm, and
without fear of such disturbance or injury. The
concept of security in an organizational sense,
as a means by which this safety and stability can
be achieved, has evolved gradually throughout
the history of Western civilization, shaped by
wide variety of institutional and cultural
patterns.
• In examining the origins and development of
security, it is both obvious and instructive to
observe that security holds a mirror up, not to
nature, but to society and its institutions. Thus,
the practice of utilizing workers and equipment
to protect people and property is age- old. In
addition to being concerned about their own
safely, people have wanted, to protect their
belongings and the lives of others important to
them. The types of security measures that
people have taken over the ages appear to
reflect both the resources that were available
and the nature of the dangers that were present
during each period.
LEGAL BASES OF INDUSTRIAL
SECURITY IN THE PHILIPPINES
• Natural Authority.
• Constitutional Authority
• Statutory Authority
TYPES OF SECURITY
• Physical Security
• Part of security concerned with the
physical measures designed to safeguard
personnel to prevent unauthorized access
to equipment, facilities, materials,
documents, and to protect them from
espionage, sabotage, damage or theft
• Industrial Security
• A form of physical security involving
industrial plants and business enterprises.
This involves the safeguarding of
personnel, processes, properties and
operation.
• V.I.P Security
• Involves the protection of top-ranking
officials of the government, visiting
persons of illustrious standing and foreign
dignitaries
• Document Security
• Protection of documents, classified papers
and vital records from loss, access to
unauthorized persons, damage, theft and
compromise through proper storage and
procedures.
•
Three Line of Physical
Defense
• First line of Defense
• Example:
• Like perimeter fences/ barriers or guard at the gate
• Second line of Defense
• Example :
• Like the doors, floors, windows, walls, roofs, and grills
and other entries to a building.
• Third line of Defense
• Example:
• The storage system like steel cabinets, lacks, safes,
vaults and interior file rooms.
PHYSICAL SECURITY
• Physical measures are used to define, protect,
and monitor properly rights and objects; they
consist of barriers and devices that are able to
detect, impede, and deter potential security
threats. Physical security measures also help to
combat the crime-related threats that both
employees and outsiders pose to the
organization (for example, robbery, burglary,
arson, assault, rape, theft of services, and
automobile theft and vandalism).
Principles of Physical
Security
• The type of access necessary will defend upon
a number of variable factors & therefore may
be achieve in a number of ways.
• There is no impenetrable barrier.
• Defense is depth- barriers after barrier.
• Delay provided against surreptitious and non-
surreptitious entry.
• Each installation is different.
• Define Barrier
Any structure or physical device capable of
restricting, deterring delaying illegal
access to an installation.
Types of Perimeter Barriers
• .SOLID FENCE- deny visual access
• Wire Fences- permits visual access
Wire fencing can be barbed wire, chain
link or concertina. Chain link are for
permanent structure, barbed wire is for
semi-permanent, and concertina for the
least permanent, and also can be used as
a temporary road block or impediment
during strikes and crowd control.
Specification regulating the
use of Chain- link fences:
• Must be constructed of 7 foot material
excluding the top guard.
• Must be of 9 gauge or heavier.
• Mesh opening are not be larger than 2
inches per aide.
Specification regarding the
use of Barbed Wire fences
• 1. Standard barbed wire is twisted double
strand, 12 gauge wire, with 4
point barb spaced an equal distant part.
• 2. Barbed wire fencing should not be less
than 7 feet high, excluding the top
guard.
• 3. Barbed wire fencing must be firmly
affixed to post not more than 6 feet
Specification regarding the
use of Concertina Wire
fences:
• 1. Standard concertina barbed is a
commercial manufactured wire coil of
high- strength- steel barbed wire clipped
together at intervals to form a cylinder.
• 2. Opened concertina wire is 5 feet long
and 3 feet in high.
Types of Physical Barriers
• 1. Natural
• 2. Structural
• 3. Human
• 4. Animal
• 5. Energy
PROTECTIVE LIGHTING
• Depending the nature of the facility, protective
lighting will designed either to emphasize the
illumination of the perimeter barrier and the
outside approaches to it, or to concentrate on
the area and the building within the perimeter.
In either case it must produce sufficient light to
create a psychological deterrent to intrusion as
well as to make detection virtually certain in the
event an entry is made. It must avoid glare that
would reduce the visibility or security personnel,
while creating glare to detect intruder.
Types of Protection Lighting
• Stationary Luminary
• This is common type consisting of
series of fixed luminaries to flood given
area continuously overlap.
Types of Stationary Lighting
• Glare- projection Type
The intensity is focused to the intruder while
the observer or guard remained in the
comparative darkness.
• Controlled Lighting
The lighting is focused on the pile of items,
rather than the background.
• Standby Lighting
This system is similar to continuous lighting
but us turn on manually or by special device or
other automatic means.
• Movable Lighting
This consists of stationary or portable,
manually operated search- lights.
• Emergency Lighting
This type may duplicative of existing system.
This a standby which can be utilized in the event
of electric failure, either due to local equipment
or commercial power failure.
Types of Light Lamp
• Incandescent Lamp
These are common lights bulbs of the
found in the home. They have the
advantage of providing instant illumination
when the switch is thrown and are thus
the most commonly used protective
lighting system.
• Gaseous- discharge Lamp
The use of gaseous, discharge lamps in
protective lighting is somewhat limited,
since they require a period of from two to
five minutes to light when they are cold
and even longer period to light, when hot,
after a power interruption, it is very
economical to use but for industrial
security it is not acceptable due to long
time in the lighting in case it is turn off
accident or low voltage or brown-out.
Types of Gaseous- discharge
Lamps
• Mercury – Vapor Lamps
• These lamps give a blue- green color light due to
the presence of mercury vapor
• Sodium- Vapor Lamps
• These lamps emits yellow light. It is an efficient bulb
and due to its color, these light lamps are used also in
areas where insect predominate.
• Quarts Lamp
• These lamps emit a very bright white light and snap
on almost as rapidly as the incandescent lamp.
Types of Lighting Equipment
• Floodlights
• These lights project light in a concentrated beam.
They are appropriate to use in instances which call for
illumination of boundaries, building or fences.
• Searchlights
• These are highly focused incandescent lamps used
to pinpoint potential trouble spots.
• Fresnel Lights
These are wide beam units, primary used to
extend the illumination in long, Horizontal strips
to protect the approaches to the perimeter
barrier. Fresnel project a narrow, horizontal
beam which is approximately 180 degrees in the
horizontal and from 15 to 30 degrees in the
vertical plane.
• Street Lights
These produce diffused light rather than
direction beam. They are widely used in parking
areas.
PROTECTIVE ALARMS
• Another safeguard used to assist security to
complement if not supplement physical barriers
is an array of alarms. These alarms of various
types and cost can be installed indoors or
outdoors. Basically, alarms system is designed to
alert security or compound.
What is protective alarm?
• Device and contrivance installed inside
and outside a facility to compliment and
provide additional security measures and
operates to advertise entry into sensitive
and protected area.
Types of protective alarm
detection system
• 1. Central station system – The control station is located
outside the plant or installation. When the alarm is
activated, the central station notifies the police or other
public safety agency.
• 2. Proprietary system – centralized monitor of the alarm
system located in the installation with a duty operator.
In case of alarm, the duty operator calls whatever is the
primary need. This is owned and operated by the
installation.
• 3. Local alarm – this system consist of ringing up a
visual or audible alarm near the object to be protected.
Only guards within hearing can respond to such alarm .
• 4. Auxiliary alarm – in this system installation of circuits
is led into the nearest police station.
Kinds of alarm system
• 1. Audio detection device – it detects any sound
caused by attempted force entry. A supersonic
microphone speaker in walls, ceiling and floors
of the protected area.
• 2. Vibration detection device – detect any
vibration caused by forcible entry. Effective to
safeguard enclosed areas.
• 3. Metallic foil/ wire – an electrically charged
strips of tinfoil or wire is used in doors, windows
or glass surface.
• 4. Photoelectric/ electric eye device – activated
when the intruder crosses the beam that breaks
contact and activates the alarm.
Bank alarm system
• . Foot rail – place on the floor in such a position
that tellers may activate the alarm by placing
the front of their feet to engage the activation
bar.
• 2. Bill traps – currency is usually place in the
teller’s cash drawer and connected to the alarm
system. When the currency is removed, the
device is activated.
• 3. Double squeeze button – requires pressure on
both side of the device and reduces the
probability of accidental activation.
Protective Lock
• Lock is one of the most widely used physical security
devices in the asset protection program of an installation.
It complements other physical safeguards of the
installation against any possible surreptitious entry.
However, the owner of the installation or his security
officer needs to understand the weaknesses and strength
of each type of lock including the door, window or walls to
be used to achieve maximum benefit from its application.
This is because burglars more often concentrate on the
lock and its application mechanism in order to make a
forcible entry. It is for this obvious reasons that locks are
considered as delaying devices which cannot really stop a
determine intruder from destroying the lock
• What is lock?
Known as mechanical, electrical,
hydraulic or electric device designed to
prevent entry and removal of essential
items into a building, room, and container
of hiding place.
• What is padlock?
Portable and detachable lock having a
sliding hasp which passes through a staple
ring and is then made secured.
What are the types of lock?
• Warded lock – is a type of lock that uses a
set of obstruction, or wards, to prevent
the lock from opening unless the correct
key is inserted. The correct key has
notches or slots corresponding to the
obstructions in the lock, allowing it to
rotate freely inside the lock.
• Disc tumbler lock – is a type of lock that utilizes
a set of flat disc to prevent the lock from
opening unless the correct key is inserted.
• Pin tumbler lock – is a lock mechanism that uses
pins of varying lengths to prevent the lock from
opening without the correct key. Pin tumbler are
most commonly employed in cylinder lock, but
may also be found in tubular or radial locks.
• Combination lock – instead of using key to align
the tumblers, the combination mechanism uses
numbers, letters or symbols as reference point
which enable an operator to align them
manually
• Code operated lock – type of lock than
can be operated by pressing a series of
numbered button in the proper sequence.
• Electromagnetic lock – can be opened and
closed remotely by electrical means.
• Card operated lock – operated by a coded
card.
What are the types of Keys?
• Change key – a specific key which operates the
lock and has a particular combination of cuts,
which match the arrangement of the tumblers in
the lock
• Sub – master key – a key that will open all the
lock within a particular area or grouping in a
given facility.
• Master key – a special key capable of opening a
series of locks.
• Grand master key – a key that will open
everything in a system involving two or more
master key groups.
What is key control?
• The management of keys in plant or
business organization to prevent
unauthorized access to the keys.
What is security cabinet?
• The final line of defense at any facility is
in security storage where papers, records
plans or cashable instrument, precious
metals or other especially valuable assets
are protected. These security containers
will be of a size quantity, which nature of
the business dictates.
Three types of security cabinet
• Safe – a metallic container used for the
safekeeping of documents or small items
in an office or installation. Safe can be
classified as either burglary of fire proof
depending upon the used and need
Specification for Safe
• 1. It’s weight must be at least 750 lbs.
• 2. It less than 750 lbs it should be
anchored to building structure
• 3. Its body should be atleast 1 inch thick
steel
• Vault – Heavily constructed fire and
burglar resistance container usually part of
the building structure used to keep and
protect cash, documents and negotiable
instruments. It is bigger than safe but
smaller than file room.
Specification for Vault
• 1. The vault door should be made of steel
atleast 6 inches in thickness
• 2. The walls, ceilings, and floors must be
reinforced by concrete atleast 12 inches in
thickness
• 3. It must be fire resistive up to 6 hours
• File room – a cubicle in a building
constructed a little lighter than vault but
bigger in size to accommodate limited
people to work on the records inside.
Guard Force system
• Private Security Agency (PSA)
• shall mean any person association, partnership, firm or
private corporation, who contracts, recruits, trains,
furnishes or posts any security guard, to perform its
functions or solicit individuals, businesses, firms, or
private, public or government- owned or controlled
corporations to engage his/its service or those of his/its
security guards, for hire, commission or compensation
thru subscription or as a consultant/trainer to any
private or public corporation whose business or
transactions involve national security or interest
• Government Security Personnel — shall be
natural persons which include government
security guards, detectives, security consultants,
security officers and others that may be class
Tied later, except those of the Armed Forces of
the Philippines, Philippine National Police,
Bureau of Jail Management and Penology,
Municipal or City Jail guards
rendering/performing security and/or detective
services as employed by government entities.
• Company Guard Force (CGF) — a security force
maintained and Operated by any private
company/corporation utilizing any of its
employees to watch, secure or guard its
business establishment premises, compound or
properties.
Control of personnel in the
physical facility
• The most practical and generally accepted
system of personnel identification is the use of
identification cards, badges or passes. Generally
speaking, this system designates when and
where and how identification cards should be
displayed, and to whom. This helps security
personnel eliminate the risk of allowing the
access of unauthorized personnel within the
establishment.
Two types of personnel
identification
• 1. Personal recognition
• 2. Artificial recognition
Use of Pass system
• 1. Single pass system – the badge or pass coded
for authorization to enter specific areas is issued
to an employee who keeps it in his possession
until his authorization terminates.
• 2. Pass exchange system – an exchange takes
place at the entrance of each controlled area.
Upon leaving the personnel surrenders his
badge or passes and retrieve back his basic
identification.
• 3. Multiple pass system – This provides an extra
measure of security by requiring that an
exchange take place at the entrance of each
restricted area.
Visitors Movement control
• 1. Visitor’s logbook – all visitors to any facility should be
required identification card and filled up the logbook.
• 2. Photography – taking photography should also be
considered especially in controlled areas.
• 3. Escort – if possible visitors should be escorted by the
security to monitor their activity and guide them.
• 4. Visitors entrance – separate access for visitors and
employees should be provided
• 5. Time traveled – if there is long delay or time lapse
between the departure and arrival, the visitor may be
require to show cause for the delay.
Personnel Security
• It includes all the security measures
designed to prevent unsuitable individuals
or persons of doubtful loyalty to the
government, from gaining access to
classified matter or to any security facility,
and to prevent appointment or retention
as employees of such individuals.
Security Chain
• Personnel security it is the weakest link in
the security chain. This weakness can be
best minimized or eliminated by making
personnel security conscious through
training program.
What is Personnel Security
Investigation?
• It is inquiry into the character, reputation,
discretion and loyalty of individual in order
to determine a person’s suitability to be
given a security clearance.
What are the types of PSI?
• . National Agency Check (NAC) – this is an
investigation of an individual made upon the
basis of written information supplied by him in
response to official inquiry, and by reference to
appropriate national agencies.
• 2. Local Agency Check (LAC) – this type of
investigation consist of the NAC plus written
inquiries sent to appropriate local government
agencies, former employees, reference and
school listed by the person under investigation.
Background Investigation
• This is more comprehensive investigation
than the NAC & LAC. A thorough and
complete investigation of all or some of
the circumstances or aspects of a person’s
life is conducted.
What are the two Types of BI
• Complete background Investigation (CBI)
– Consist of the investigation of the
background of a person, particularly all
the circumstances of his personal life
• Partial Background Investigation (PBI) –
Consist of the investigation of the
background of an individual but limited
only to some of the circumstances of his
personal life which are deemed pertinent
to the investigation.
Security Education Program
• The basic goal of security education
program is to acquaint all the employees
the rationale behind the security measures
and to insure their cooperation at all
times.
Objectives of Security
Education Program.
– Guidance for all supervisory and executive
levels of the organization;
– A mandatory indoctrination of security for all
new personnel before their assignment to
their respective jobs;
– Development of high degree of security
consciousness among the selected supervisors
and other key personnel in a program that
should be continuing and supported by top
management,
– A down- the- line security program aimed at
instilling consciousness and dedication
through demonstrations, lectures,
motivations, and suggestions,
– To let all the employee force be informed that
they all belong to the organization and that
non- awareness and non- concern to the
security program is tantamount to disloyalty.
– That the program is also to develop discipline,
loyalty and belongingness.
•
Phases of Security
Education
• Initial Interview
• Training Conference
• Refresher Conference
• Security Reminders
• Security Promotion
• Special Interviews
• Debriefing
DOCUMENT AND
INFORMATION SECURITY
• The information cycle consists of five
stage namely : (a) creation (b) use, (c)
storage and retrieval (d) transfer, and (e)
disposition.
Types of Documents
• Class1- Vital Document
• In this category are records that are
irreplaceable; records of which
reproduction does not have the same
value as the original;
• Class II- Important Document
• This includes records the production of
which will close considerable expense and
the labor, or considerable delay.
• Class III – Useful Documents
• This include records whose loss might
cause inconvenience but could be reality
replace and which would not in the
meantime present an insurmountable
obstacle to the prompt restoration of the
business.
• Class IV- Non- essential Documents
• These records are daily files, routine in
nature even if lost or destroyed, will not
effect operation or administration. This
class represent the bulk of the records
which should not even attempted to
protect in the event of disasters. They
should however, be kept in ordinary files
ready for reference if needed and usually
discarded after some period of time.
SECURITY HAZARDS
• Type of Hazards
• Natural Hazards
These are hazards which arise from
natural phenomena.
• Human or Man-made Hazards
Human or man-made hazards are the
greatest concern to personnel charge with
the responsibility of safeguarding and
protecting a plant or installation.
Types of Pilferer
• Casual Pilferer
Is one who steals due to his inability to
resists the unexpected opportunity and
has little by detection.
• Systematic Pilferer
Is one who steals with preconceived
plan takes away any or all types of items
or supplies for economic gain.
SECURITY SURVEY
• A security survey is a critical on- site
examination and analysis of an industrial
plant, business, home, or public or private
institution done to ascertain the facility’s
current security status, to identify
deficiencies or excesses in current
practices, to determine what protection is
needed, and to make recommendations
for improving the overall level of security
at that location.
Objectives of Security
Survey
• To determine existing state of security
• To locate weakness in defense
• To determine degree of protection
required
• To produce recommendations establishing
a total security program.
Security Survey Sequence
of Action
• Examine and analyze the site and the
organization
• Ascertain the organization/s current
security status.
• Determine the level of protection needed
• Make recommendations
SECURITY INSPECTION
• Types of Security Inspection
• A. Continuous Inspection
• B. formal
• C. informal
• D. structured
• E. unstructured
• Continuous Inspection
To keep pace with constant changes in
the organization, changes in our security
in term of attitudes, life-styles and moral
values, and the rapidly advancing
technological modifications all around us,
the inspection process must be an on –
going, never ending activity.
• B. formal
Is one to which some fanfare is
attached: it is usually preceded by an
announcement, and the unit under
inspection “prepares” for events, including
some extra housekeeping activities that
would not otherwise happen at that point
in time.
• . informal
Are usually the result of a long and
firmly entrenched inspection program,
understood by all and accepted as a part
of the organizational life.
• Structured
As opposed to an unstructured
inspection, is one that moves
systematically, perhaps even rigidly, from
one designated inspection point to the
next. The following could be part of such
a structured inspections.
• Unstructured Inspections
In contrast, would approach the
warehouse unit in a more random manner,
with less methodical attention to small
specifics. The experience eye of a top security
professional would note a glance, without
following a checklist, the weeds and other
vegetations against the fence needed
clearing.
Republic Act 5487
• An Act governing the organization and
management of private security agencies,
company guard forces and government
security forces, it prescribed the minimum
requirements for security personnel to be
secure a license to exercise profession.
What are the general requisites
in the security profession?
• 1. Filipino citizen
• 2. Not less than 18 years of age
• 3. Physically and mentally fit
• 4. Good moral character
• 5. Must not possess any disqualification
What are the general
disqualifications?
• 1. Dishonorably discharge from the service
in the PNP/AFP
• 2. Physically and mentally unfit
• 3. Conviction of a crime
• 4. Addiction to drugs/ alcohol
• 5. Dummy of foreigner
• 6. Elective or appointed government
official
What are the basic qualification
of an agency operator/manager
• 1. Atleast 25 years of age
• 2. College graduates and/or commissioned
officer in the inactive service or retired
from the AFP/PNP
• 3. Has taken a course/seminar on seminar
on industrial security management and /
or must have adequate training or
experience in security business
• Now applicants for license to operate shall
be required to obtain a minimum
capitalization of one million pesos (P1
000,000.00) with a minimum bank deposit
of five hundred thousand (P500,000.00)
pesos in order to start its business
operation.
What are the basic qualification of
a security consultant?
• 1. Holder of masters degree of
criminology, MPA, MNSA, industrial
security administration or law
• 2. Must have atleast 10 years experience
in the operation and management of
security business
• No regular license shall be granted unless
the PSA has a minimum of 200 licensed
private security personnel.
• No regular license shall be granted
unless the CGF/PDA has a minimum of 30
licensed private security personnel.
• The maximum number of private
personnel that PSA/CGF/PDA may employ
shall be 1000
Rule IV License to operate
Sec 5. Membership
Status and Validity of License to
Operate.
• Regular LTO - issued, after complying with
licensing requirements, to private security
agencies having obtained and maintained in its
employ at least two hundred (200) security
personnel, and to company guard forces and
private detective agencies having obtained and
maintained in its employ at least thirty (30)
security personnel and private detectives
respectively. Such license may be renewed
following conformity with renewal requirements
prescribed in a Standard Operating Procedure
(SOP).
• Temporary LTO — initial and conditional
issuance to new private security agencies
and to PSAs holding regular LTO not able
to maintain the minimum number of
security personnel or conform to
standards, for them to be able to attain
the 200 minimum number of security
personnel or comply with licensing
standards, prior to issuance/re-issuance of
regular LTO. Such issuance shall not be
renewable nor be extendible.
• Unless sooner cancelled or revoked and
provisions hereof modified, all licenses to
operate shall have a validity of two (2)
years Temporary LTOs upon expiration are
automatically cancelled.
Rule VII
Sec 1. Possession of firearms by
PSA,PDA,CSF,GSU
• Shall be entitled to possess firearms after
satisfactory complying with the
requirements prescribed by the C,PNP
provided that the number of firearm shall
not exceed 1 firearm for every 2 security
guard. NO security agency shall be
allowed to possess firearms in excess of
500 units.
Sec II. Restriction to possess
high – powered firearms by
PSA, PDA, CSF, GSU
• Generally they are not allowed to possess high
caliber firearms considered as military type
weapons such as M16, M14, cal .22 to include
pistols and bores smaller than cal .38 but with
firing characteristics of full automatic burst.
However, when such entities are operating in
areas where there is upsurge of lawlessness and
criminality as determined by the C, PNP and
police regional offices, they may be allowed to
acquire, possess, and use high – powered fire
• The acquisition shall be at the expense of
the entity, the firearms should be
registered, the total number of firearms
shall not exceed 10% of the total number
of security guards employed and the
security guards who will use the firearm
shall be given adequate training in the use
of it
Stocking of ammunition
• Stocks of ammunition in the agency shall
be authorized on a limited and reasonable
quantity that will suit the requirement and
need of such agency and shall be
subjected to inspection from time to time
by representatives of the Chief, Philippine
National Police unless otherwise provided
for under existing laws
• , shall not exceed a basic load of fifty (50)
rounds of ammunition per unit of duly
licensed firearms. Individual issue to each
security guard shall be limited to one half
of such basic load or twenty five (25)
rounds for every security guard.
RULE VI
UTILIZATION OF PRIVATE
SECURITY AGENCIES
AND PERSONNEL
• Powers of city municipal mayors in case of
emergency – In case of emergency or in
times of disaster or calamity when the
services of any security agency/entity and
its personnel are needed, the city or
municipal mayor
• may muster or incorporate the members
of the agency or agencies nearest the
area of such disaster or calamity to help in
the maintenance of peace and order,
prevention of crime, or apprehension of
violators of laws or ordinance, and in the
protection of lives and properties.
Duty to Assist Law Enforcers
• - Any security guard shall be duty bound
to assist any peace officer in the pursuit of
his bounding duty, when requested,
provided it is within the territorial
jurisdiction of his (security officer) area of
duty.
• “If any of you lacks wisdom, he should
ask God, who gives generously to all
without finding fault, and it will be
given to him” James 1:5
Thank you and
God Bless
END OF PRESENTATION

450052029-INDUSTRIAL-SECURITY-MANAGEMENT-ppt.ppt

  • 1.
  • 2.
    Industrial Security Management •Introduction to Industrial Security • Physical Security • Personnel Security • Documentation and Information Security • Risk Analysis and Security Hazard • Security Survey, Inspection and Investigation • RA 5487
  • 3.
    Introduction to Industrial Security •Security, in its semantic and philosophical sense, implies a stable, relatively predictable environment in which an individual or group may purpose its ends without disruption or harm, and without fear of such disturbance or injury. The concept of security in an organizational sense, as a means by which this safety and stability can be achieved, has evolved gradually throughout the history of Western civilization, shaped by wide variety of institutional and cultural patterns.
  • 4.
    • In examiningthe origins and development of security, it is both obvious and instructive to observe that security holds a mirror up, not to nature, but to society and its institutions. Thus, the practice of utilizing workers and equipment to protect people and property is age- old. In addition to being concerned about their own safely, people have wanted, to protect their belongings and the lives of others important to them. The types of security measures that people have taken over the ages appear to reflect both the resources that were available and the nature of the dangers that were present during each period.
  • 5.
    LEGAL BASES OFINDUSTRIAL SECURITY IN THE PHILIPPINES • Natural Authority. • Constitutional Authority • Statutory Authority
  • 6.
    TYPES OF SECURITY •Physical Security • Part of security concerned with the physical measures designed to safeguard personnel to prevent unauthorized access to equipment, facilities, materials, documents, and to protect them from espionage, sabotage, damage or theft
  • 7.
    • Industrial Security •A form of physical security involving industrial plants and business enterprises. This involves the safeguarding of personnel, processes, properties and operation.
  • 8.
    • V.I.P Security •Involves the protection of top-ranking officials of the government, visiting persons of illustrious standing and foreign dignitaries
  • 9.
    • Document Security •Protection of documents, classified papers and vital records from loss, access to unauthorized persons, damage, theft and compromise through proper storage and procedures. •
  • 10.
    Three Line ofPhysical Defense • First line of Defense • Example: • Like perimeter fences/ barriers or guard at the gate • Second line of Defense • Example : • Like the doors, floors, windows, walls, roofs, and grills and other entries to a building. • Third line of Defense • Example: • The storage system like steel cabinets, lacks, safes, vaults and interior file rooms.
  • 11.
    PHYSICAL SECURITY • Physicalmeasures are used to define, protect, and monitor properly rights and objects; they consist of barriers and devices that are able to detect, impede, and deter potential security threats. Physical security measures also help to combat the crime-related threats that both employees and outsiders pose to the organization (for example, robbery, burglary, arson, assault, rape, theft of services, and automobile theft and vandalism).
  • 12.
    Principles of Physical Security •The type of access necessary will defend upon a number of variable factors & therefore may be achieve in a number of ways. • There is no impenetrable barrier. • Defense is depth- barriers after barrier. • Delay provided against surreptitious and non- surreptitious entry. • Each installation is different.
  • 13.
    • Define Barrier Anystructure or physical device capable of restricting, deterring delaying illegal access to an installation.
  • 14.
    Types of PerimeterBarriers • .SOLID FENCE- deny visual access • Wire Fences- permits visual access Wire fencing can be barbed wire, chain link or concertina. Chain link are for permanent structure, barbed wire is for semi-permanent, and concertina for the least permanent, and also can be used as a temporary road block or impediment during strikes and crowd control.
  • 15.
    Specification regulating the useof Chain- link fences: • Must be constructed of 7 foot material excluding the top guard. • Must be of 9 gauge or heavier. • Mesh opening are not be larger than 2 inches per aide.
  • 16.
    Specification regarding the useof Barbed Wire fences • 1. Standard barbed wire is twisted double strand, 12 gauge wire, with 4 point barb spaced an equal distant part. • 2. Barbed wire fencing should not be less than 7 feet high, excluding the top guard. • 3. Barbed wire fencing must be firmly affixed to post not more than 6 feet
  • 17.
    Specification regarding the useof Concertina Wire fences: • 1. Standard concertina barbed is a commercial manufactured wire coil of high- strength- steel barbed wire clipped together at intervals to form a cylinder. • 2. Opened concertina wire is 5 feet long and 3 feet in high.
  • 18.
    Types of PhysicalBarriers • 1. Natural • 2. Structural • 3. Human • 4. Animal • 5. Energy
  • 19.
    PROTECTIVE LIGHTING • Dependingthe nature of the facility, protective lighting will designed either to emphasize the illumination of the perimeter barrier and the outside approaches to it, or to concentrate on the area and the building within the perimeter. In either case it must produce sufficient light to create a psychological deterrent to intrusion as well as to make detection virtually certain in the event an entry is made. It must avoid glare that would reduce the visibility or security personnel, while creating glare to detect intruder.
  • 20.
    Types of ProtectionLighting • Stationary Luminary • This is common type consisting of series of fixed luminaries to flood given area continuously overlap.
  • 21.
    Types of StationaryLighting • Glare- projection Type The intensity is focused to the intruder while the observer or guard remained in the comparative darkness. • Controlled Lighting The lighting is focused on the pile of items, rather than the background.
  • 22.
    • Standby Lighting Thissystem is similar to continuous lighting but us turn on manually or by special device or other automatic means. • Movable Lighting This consists of stationary or portable, manually operated search- lights. • Emergency Lighting This type may duplicative of existing system. This a standby which can be utilized in the event of electric failure, either due to local equipment or commercial power failure.
  • 23.
    Types of LightLamp • Incandescent Lamp These are common lights bulbs of the found in the home. They have the advantage of providing instant illumination when the switch is thrown and are thus the most commonly used protective lighting system.
  • 24.
    • Gaseous- dischargeLamp The use of gaseous, discharge lamps in protective lighting is somewhat limited, since they require a period of from two to five minutes to light when they are cold and even longer period to light, when hot, after a power interruption, it is very economical to use but for industrial security it is not acceptable due to long time in the lighting in case it is turn off accident or low voltage or brown-out.
  • 25.
    Types of Gaseous-discharge Lamps • Mercury – Vapor Lamps • These lamps give a blue- green color light due to the presence of mercury vapor • Sodium- Vapor Lamps • These lamps emits yellow light. It is an efficient bulb and due to its color, these light lamps are used also in areas where insect predominate. • Quarts Lamp • These lamps emit a very bright white light and snap on almost as rapidly as the incandescent lamp.
  • 26.
    Types of LightingEquipment • Floodlights • These lights project light in a concentrated beam. They are appropriate to use in instances which call for illumination of boundaries, building or fences. • Searchlights • These are highly focused incandescent lamps used to pinpoint potential trouble spots.
  • 27.
    • Fresnel Lights Theseare wide beam units, primary used to extend the illumination in long, Horizontal strips to protect the approaches to the perimeter barrier. Fresnel project a narrow, horizontal beam which is approximately 180 degrees in the horizontal and from 15 to 30 degrees in the vertical plane. • Street Lights These produce diffused light rather than direction beam. They are widely used in parking areas.
  • 28.
    PROTECTIVE ALARMS • Anothersafeguard used to assist security to complement if not supplement physical barriers is an array of alarms. These alarms of various types and cost can be installed indoors or outdoors. Basically, alarms system is designed to alert security or compound.
  • 29.
    What is protectivealarm? • Device and contrivance installed inside and outside a facility to compliment and provide additional security measures and operates to advertise entry into sensitive and protected area.
  • 30.
    Types of protectivealarm detection system • 1. Central station system – The control station is located outside the plant or installation. When the alarm is activated, the central station notifies the police or other public safety agency. • 2. Proprietary system – centralized monitor of the alarm system located in the installation with a duty operator. In case of alarm, the duty operator calls whatever is the primary need. This is owned and operated by the installation. • 3. Local alarm – this system consist of ringing up a visual or audible alarm near the object to be protected. Only guards within hearing can respond to such alarm . • 4. Auxiliary alarm – in this system installation of circuits is led into the nearest police station.
  • 31.
    Kinds of alarmsystem • 1. Audio detection device – it detects any sound caused by attempted force entry. A supersonic microphone speaker in walls, ceiling and floors of the protected area. • 2. Vibration detection device – detect any vibration caused by forcible entry. Effective to safeguard enclosed areas. • 3. Metallic foil/ wire – an electrically charged strips of tinfoil or wire is used in doors, windows or glass surface. • 4. Photoelectric/ electric eye device – activated when the intruder crosses the beam that breaks contact and activates the alarm.
  • 32.
    Bank alarm system •. Foot rail – place on the floor in such a position that tellers may activate the alarm by placing the front of their feet to engage the activation bar. • 2. Bill traps – currency is usually place in the teller’s cash drawer and connected to the alarm system. When the currency is removed, the device is activated. • 3. Double squeeze button – requires pressure on both side of the device and reduces the probability of accidental activation.
  • 33.
    Protective Lock • Lockis one of the most widely used physical security devices in the asset protection program of an installation. It complements other physical safeguards of the installation against any possible surreptitious entry. However, the owner of the installation or his security officer needs to understand the weaknesses and strength of each type of lock including the door, window or walls to be used to achieve maximum benefit from its application. This is because burglars more often concentrate on the lock and its application mechanism in order to make a forcible entry. It is for this obvious reasons that locks are considered as delaying devices which cannot really stop a determine intruder from destroying the lock
  • 34.
    • What islock? Known as mechanical, electrical, hydraulic or electric device designed to prevent entry and removal of essential items into a building, room, and container of hiding place. • What is padlock? Portable and detachable lock having a sliding hasp which passes through a staple ring and is then made secured.
  • 35.
    What are thetypes of lock? • Warded lock – is a type of lock that uses a set of obstruction, or wards, to prevent the lock from opening unless the correct key is inserted. The correct key has notches or slots corresponding to the obstructions in the lock, allowing it to rotate freely inside the lock.
  • 36.
    • Disc tumblerlock – is a type of lock that utilizes a set of flat disc to prevent the lock from opening unless the correct key is inserted. • Pin tumbler lock – is a lock mechanism that uses pins of varying lengths to prevent the lock from opening without the correct key. Pin tumbler are most commonly employed in cylinder lock, but may also be found in tubular or radial locks. • Combination lock – instead of using key to align the tumblers, the combination mechanism uses numbers, letters or symbols as reference point which enable an operator to align them manually
  • 37.
    • Code operatedlock – type of lock than can be operated by pressing a series of numbered button in the proper sequence. • Electromagnetic lock – can be opened and closed remotely by electrical means. • Card operated lock – operated by a coded card.
  • 38.
    What are thetypes of Keys? • Change key – a specific key which operates the lock and has a particular combination of cuts, which match the arrangement of the tumblers in the lock • Sub – master key – a key that will open all the lock within a particular area or grouping in a given facility. • Master key – a special key capable of opening a series of locks. • Grand master key – a key that will open everything in a system involving two or more master key groups.
  • 39.
    What is keycontrol? • The management of keys in plant or business organization to prevent unauthorized access to the keys.
  • 40.
    What is securitycabinet? • The final line of defense at any facility is in security storage where papers, records plans or cashable instrument, precious metals or other especially valuable assets are protected. These security containers will be of a size quantity, which nature of the business dictates.
  • 41.
    Three types ofsecurity cabinet • Safe – a metallic container used for the safekeeping of documents or small items in an office or installation. Safe can be classified as either burglary of fire proof depending upon the used and need
  • 42.
    Specification for Safe •1. It’s weight must be at least 750 lbs. • 2. It less than 750 lbs it should be anchored to building structure • 3. Its body should be atleast 1 inch thick steel
  • 43.
    • Vault –Heavily constructed fire and burglar resistance container usually part of the building structure used to keep and protect cash, documents and negotiable instruments. It is bigger than safe but smaller than file room.
  • 44.
    Specification for Vault •1. The vault door should be made of steel atleast 6 inches in thickness • 2. The walls, ceilings, and floors must be reinforced by concrete atleast 12 inches in thickness • 3. It must be fire resistive up to 6 hours
  • 45.
    • File room– a cubicle in a building constructed a little lighter than vault but bigger in size to accommodate limited people to work on the records inside.
  • 46.
    Guard Force system •Private Security Agency (PSA) • shall mean any person association, partnership, firm or private corporation, who contracts, recruits, trains, furnishes or posts any security guard, to perform its functions or solicit individuals, businesses, firms, or private, public or government- owned or controlled corporations to engage his/its service or those of his/its security guards, for hire, commission or compensation thru subscription or as a consultant/trainer to any private or public corporation whose business or transactions involve national security or interest
  • 47.
    • Government SecurityPersonnel — shall be natural persons which include government security guards, detectives, security consultants, security officers and others that may be class Tied later, except those of the Armed Forces of the Philippines, Philippine National Police, Bureau of Jail Management and Penology, Municipal or City Jail guards rendering/performing security and/or detective services as employed by government entities.
  • 48.
    • Company GuardForce (CGF) — a security force maintained and Operated by any private company/corporation utilizing any of its employees to watch, secure or guard its business establishment premises, compound or properties.
  • 49.
    Control of personnelin the physical facility • The most practical and generally accepted system of personnel identification is the use of identification cards, badges or passes. Generally speaking, this system designates when and where and how identification cards should be displayed, and to whom. This helps security personnel eliminate the risk of allowing the access of unauthorized personnel within the establishment.
  • 50.
    Two types ofpersonnel identification • 1. Personal recognition • 2. Artificial recognition
  • 51.
    Use of Passsystem • 1. Single pass system – the badge or pass coded for authorization to enter specific areas is issued to an employee who keeps it in his possession until his authorization terminates. • 2. Pass exchange system – an exchange takes place at the entrance of each controlled area. Upon leaving the personnel surrenders his badge or passes and retrieve back his basic identification. • 3. Multiple pass system – This provides an extra measure of security by requiring that an exchange take place at the entrance of each restricted area.
  • 52.
    Visitors Movement control •1. Visitor’s logbook – all visitors to any facility should be required identification card and filled up the logbook. • 2. Photography – taking photography should also be considered especially in controlled areas. • 3. Escort – if possible visitors should be escorted by the security to monitor their activity and guide them. • 4. Visitors entrance – separate access for visitors and employees should be provided • 5. Time traveled – if there is long delay or time lapse between the departure and arrival, the visitor may be require to show cause for the delay.
  • 53.
    Personnel Security • Itincludes all the security measures designed to prevent unsuitable individuals or persons of doubtful loyalty to the government, from gaining access to classified matter or to any security facility, and to prevent appointment or retention as employees of such individuals.
  • 54.
    Security Chain • Personnelsecurity it is the weakest link in the security chain. This weakness can be best minimized or eliminated by making personnel security conscious through training program.
  • 55.
    What is PersonnelSecurity Investigation? • It is inquiry into the character, reputation, discretion and loyalty of individual in order to determine a person’s suitability to be given a security clearance.
  • 56.
    What are thetypes of PSI? • . National Agency Check (NAC) – this is an investigation of an individual made upon the basis of written information supplied by him in response to official inquiry, and by reference to appropriate national agencies. • 2. Local Agency Check (LAC) – this type of investigation consist of the NAC plus written inquiries sent to appropriate local government agencies, former employees, reference and school listed by the person under investigation.
  • 57.
    Background Investigation • Thisis more comprehensive investigation than the NAC & LAC. A thorough and complete investigation of all or some of the circumstances or aspects of a person’s life is conducted.
  • 58.
    What are thetwo Types of BI • Complete background Investigation (CBI) – Consist of the investigation of the background of a person, particularly all the circumstances of his personal life • Partial Background Investigation (PBI) – Consist of the investigation of the background of an individual but limited only to some of the circumstances of his personal life which are deemed pertinent to the investigation.
  • 59.
    Security Education Program •The basic goal of security education program is to acquaint all the employees the rationale behind the security measures and to insure their cooperation at all times.
  • 60.
    Objectives of Security EducationProgram. – Guidance for all supervisory and executive levels of the organization; – A mandatory indoctrination of security for all new personnel before their assignment to their respective jobs; – Development of high degree of security consciousness among the selected supervisors and other key personnel in a program that should be continuing and supported by top management,
  • 61.
    – A down-the- line security program aimed at instilling consciousness and dedication through demonstrations, lectures, motivations, and suggestions, – To let all the employee force be informed that they all belong to the organization and that non- awareness and non- concern to the security program is tantamount to disloyalty. – That the program is also to develop discipline, loyalty and belongingness. •
  • 62.
    Phases of Security Education •Initial Interview • Training Conference • Refresher Conference • Security Reminders • Security Promotion • Special Interviews • Debriefing
  • 63.
    DOCUMENT AND INFORMATION SECURITY •The information cycle consists of five stage namely : (a) creation (b) use, (c) storage and retrieval (d) transfer, and (e) disposition.
  • 64.
    Types of Documents •Class1- Vital Document • In this category are records that are irreplaceable; records of which reproduction does not have the same value as the original;
  • 65.
    • Class II-Important Document • This includes records the production of which will close considerable expense and the labor, or considerable delay. • Class III – Useful Documents • This include records whose loss might cause inconvenience but could be reality replace and which would not in the meantime present an insurmountable obstacle to the prompt restoration of the business.
  • 66.
    • Class IV-Non- essential Documents • These records are daily files, routine in nature even if lost or destroyed, will not effect operation or administration. This class represent the bulk of the records which should not even attempted to protect in the event of disasters. They should however, be kept in ordinary files ready for reference if needed and usually discarded after some period of time.
  • 67.
    SECURITY HAZARDS • Typeof Hazards • Natural Hazards These are hazards which arise from natural phenomena. • Human or Man-made Hazards Human or man-made hazards are the greatest concern to personnel charge with the responsibility of safeguarding and protecting a plant or installation.
  • 68.
    Types of Pilferer •Casual Pilferer Is one who steals due to his inability to resists the unexpected opportunity and has little by detection. • Systematic Pilferer Is one who steals with preconceived plan takes away any or all types of items or supplies for economic gain.
  • 69.
    SECURITY SURVEY • Asecurity survey is a critical on- site examination and analysis of an industrial plant, business, home, or public or private institution done to ascertain the facility’s current security status, to identify deficiencies or excesses in current practices, to determine what protection is needed, and to make recommendations for improving the overall level of security at that location.
  • 70.
    Objectives of Security Survey •To determine existing state of security • To locate weakness in defense • To determine degree of protection required • To produce recommendations establishing a total security program.
  • 71.
    Security Survey Sequence ofAction • Examine and analyze the site and the organization • Ascertain the organization/s current security status. • Determine the level of protection needed • Make recommendations
  • 72.
    SECURITY INSPECTION • Typesof Security Inspection • A. Continuous Inspection • B. formal • C. informal • D. structured • E. unstructured
  • 73.
    • Continuous Inspection Tokeep pace with constant changes in the organization, changes in our security in term of attitudes, life-styles and moral values, and the rapidly advancing technological modifications all around us, the inspection process must be an on – going, never ending activity.
  • 74.
    • B. formal Isone to which some fanfare is attached: it is usually preceded by an announcement, and the unit under inspection “prepares” for events, including some extra housekeeping activities that would not otherwise happen at that point in time.
  • 75.
    • . informal Areusually the result of a long and firmly entrenched inspection program, understood by all and accepted as a part of the organizational life. • Structured As opposed to an unstructured inspection, is one that moves systematically, perhaps even rigidly, from one designated inspection point to the next. The following could be part of such a structured inspections.
  • 76.
    • Unstructured Inspections Incontrast, would approach the warehouse unit in a more random manner, with less methodical attention to small specifics. The experience eye of a top security professional would note a glance, without following a checklist, the weeds and other vegetations against the fence needed clearing.
  • 77.
    Republic Act 5487 •An Act governing the organization and management of private security agencies, company guard forces and government security forces, it prescribed the minimum requirements for security personnel to be secure a license to exercise profession.
  • 78.
    What are thegeneral requisites in the security profession? • 1. Filipino citizen • 2. Not less than 18 years of age • 3. Physically and mentally fit • 4. Good moral character • 5. Must not possess any disqualification
  • 79.
    What are thegeneral disqualifications? • 1. Dishonorably discharge from the service in the PNP/AFP • 2. Physically and mentally unfit • 3. Conviction of a crime • 4. Addiction to drugs/ alcohol • 5. Dummy of foreigner • 6. Elective or appointed government official
  • 80.
    What are thebasic qualification of an agency operator/manager • 1. Atleast 25 years of age • 2. College graduates and/or commissioned officer in the inactive service or retired from the AFP/PNP • 3. Has taken a course/seminar on seminar on industrial security management and / or must have adequate training or experience in security business
  • 81.
    • Now applicantsfor license to operate shall be required to obtain a minimum capitalization of one million pesos (P1 000,000.00) with a minimum bank deposit of five hundred thousand (P500,000.00) pesos in order to start its business operation.
  • 82.
    What are thebasic qualification of a security consultant? • 1. Holder of masters degree of criminology, MPA, MNSA, industrial security administration or law • 2. Must have atleast 10 years experience in the operation and management of security business
  • 83.
    • No regularlicense shall be granted unless the PSA has a minimum of 200 licensed private security personnel. • No regular license shall be granted unless the CGF/PDA has a minimum of 30 licensed private security personnel. • The maximum number of private personnel that PSA/CGF/PDA may employ shall be 1000 Rule IV License to operate Sec 5. Membership
  • 84.
    Status and Validityof License to Operate. • Regular LTO - issued, after complying with licensing requirements, to private security agencies having obtained and maintained in its employ at least two hundred (200) security personnel, and to company guard forces and private detective agencies having obtained and maintained in its employ at least thirty (30) security personnel and private detectives respectively. Such license may be renewed following conformity with renewal requirements prescribed in a Standard Operating Procedure (SOP).
  • 85.
    • Temporary LTO— initial and conditional issuance to new private security agencies and to PSAs holding regular LTO not able to maintain the minimum number of security personnel or conform to standards, for them to be able to attain the 200 minimum number of security personnel or comply with licensing standards, prior to issuance/re-issuance of regular LTO. Such issuance shall not be renewable nor be extendible.
  • 86.
    • Unless soonercancelled or revoked and provisions hereof modified, all licenses to operate shall have a validity of two (2) years Temporary LTOs upon expiration are automatically cancelled.
  • 87.
    Rule VII Sec 1.Possession of firearms by PSA,PDA,CSF,GSU • Shall be entitled to possess firearms after satisfactory complying with the requirements prescribed by the C,PNP provided that the number of firearm shall not exceed 1 firearm for every 2 security guard. NO security agency shall be allowed to possess firearms in excess of 500 units.
  • 88.
    Sec II. Restrictionto possess high – powered firearms by PSA, PDA, CSF, GSU • Generally they are not allowed to possess high caliber firearms considered as military type weapons such as M16, M14, cal .22 to include pistols and bores smaller than cal .38 but with firing characteristics of full automatic burst. However, when such entities are operating in areas where there is upsurge of lawlessness and criminality as determined by the C, PNP and police regional offices, they may be allowed to acquire, possess, and use high – powered fire
  • 89.
    • The acquisitionshall be at the expense of the entity, the firearms should be registered, the total number of firearms shall not exceed 10% of the total number of security guards employed and the security guards who will use the firearm shall be given adequate training in the use of it
  • 90.
    Stocking of ammunition •Stocks of ammunition in the agency shall be authorized on a limited and reasonable quantity that will suit the requirement and need of such agency and shall be subjected to inspection from time to time by representatives of the Chief, Philippine National Police unless otherwise provided for under existing laws
  • 91.
    • , shallnot exceed a basic load of fifty (50) rounds of ammunition per unit of duly licensed firearms. Individual issue to each security guard shall be limited to one half of such basic load or twenty five (25) rounds for every security guard.
  • 92.
    RULE VI UTILIZATION OFPRIVATE SECURITY AGENCIES AND PERSONNEL • Powers of city municipal mayors in case of emergency – In case of emergency or in times of disaster or calamity when the services of any security agency/entity and its personnel are needed, the city or municipal mayor
  • 93.
    • may musteror incorporate the members of the agency or agencies nearest the area of such disaster or calamity to help in the maintenance of peace and order, prevention of crime, or apprehension of violators of laws or ordinance, and in the protection of lives and properties.
  • 94.
    Duty to AssistLaw Enforcers • - Any security guard shall be duty bound to assist any peace officer in the pursuit of his bounding duty, when requested, provided it is within the territorial jurisdiction of his (security officer) area of duty.
  • 95.
    • “If anyof you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him” James 1:5 Thank you and God Bless
  • 96.