3. SECURITY GUARD
Aka. Private security guard or
watchman
Offers or renders personal services
Watch and secure
Residence or business establishment
or both
For hire or compensation
Has license to exercise profession
4. CHARACTERISTICS OF A
SECURITY GUARD
Alertness – watchfulness
Judgment – good discretion (wuoj)
Confidence – faith in oneself ; train
Physical Fitness – effective even
under strenuous condition
Tactfulness – dealing w/out offending
Self-Control – take hold of oneself
regardless of provoking situations
5. SG FUNCTIONS &
GUARDING PROCEDURE
Fixed post
Patrol
Administrative work
Investigation and escorts
(inspects/monitors bodily checks/searches individuals and/or
baggage and other forms of security inspection)
6. SECURITY GUARD FORCE
Group of selected men, trained or
grouped into functional unit in order to
protect operational processes from those
disruption which would impede efficiency
or halt operation.
7. TYPES OF SECURITY GUARD
FORCES
1. Private Security Agency (PSA)
contracts, recruits, trains, and post security
guard to business firms
2. Company Security Force (CSF)
maintained and operated by any private
company or corporation
3. Government Security Unit (GSU)
operated by any government entity other than
military and / a police
8. LICENSE TO EXERCISE
PROFESSION
Any document issued by the CPNP or
his duly authorized representative,
recognizing a person to be qualified
to perform his duties as private
security guard or training personnel
9. WHAT IS LTO?
LICENSE TO OPERATE
document issued by the CPNP or his
duly authorized representative
authorizing a person to engage in
security business
10.
11. PADPAO
Philippine Association of Detective
and Protective Agency Operators, Inc.
An association of all licensed security
agencies and company security forces
12. DUTY DETAIL ORDER (DDO)
a written order or schedule issued by
a superior officer usually the private
security agency or branch manager or
operations officer assigning the
performance of private security ;
detective services duties
13. PRIVATE DETECTIVE
person who does detective work for
hire, reward or commission, other
than members of the AFP, BJMP,
provincial guards, PNP or any law
enforcement agency of the
government
14. SECURITY SURVEY
CONTRACT
contract between the company where
the SGs will be employed
CONTRACT STIPULATES:
1. The money consideration to be paid by
the client to the PSA
2. No. of hours of services per guard per
day
3. Guard’s salary to be received from the
agency
15. Who may organize and maintain a PSA?
Any Filipino citizen or
corporation, association,
partnership,
100% owned and
controlled by Filipino
citizens.
No person shall organize
or have interest in more
than one agency
16. Basic Requirement of an Operator or
Manager of Security Agency
Filipino citizen
At least 25 years old
College graduate and/or a commissioned officer in the
inactive service or Retired from AFP or PNP or
Graduated/taken course in concepts and methods in
industrial Security and Security Management and/or
Must have an adequate training or experience in security
business
Good moral character - not having been convicted of any
crime involving moral turpitude;
Must not possess any of the disqualification
17. Disqualifications
dishonorably discharged from AFP/PNP or separated
for cause from any government entity or government
owned or controlled corporation;
Being mentally incompetent;
Being physically unfit;
Addicted to the use of narcotic and/or prohibited drugs
and/or substances;
Habitual drunkard and alcoholic;
Dummy of any foreigner; and
Elective or appointive government officials and
employees
18. REQUIREMENTS FOR NEW PSA
1M Minimum Capital and 500K Bank
Deposit
Application to CPNP thru SOSIA
full name of the applicant;
his age, civil status; and
residence and location of his business.
In case of corporation, association or
partnership copies of the following shall be
appended:
Certificate of Registration with the SEC; and
BY-Laws and Articles of incorporation.
19.
20. STATUS AND VALIDITY OF
LTO
1. REGULAR LTO – issued after
complying with licensing requirements
2. TEMPORARY LTO – initial and
conditional issuance to new PSAs and
PSAs holding regular LTO not able to
maintain the minimum number of
security personnel or conform to
standards
21. Graduated Scale of License to Operate
200 or more but not exceeding 1000 shall be
issued a regular LTO good for 2 years.
New PSA shall be issued a temporary LTO good
for 1 year.
PSAs with cancelled/revoked LTOs shall cease
to operate and within 7 days after having been
duly notified of such cease to operate order,
shall immediately deposit all its firearms with
the Firearms and Explosives Office (FEO) which
shall be receipted, copy furnished, CPNP
SOSIA. Otherwise, the PSA concerned, shall be
liable under RA 10591.
22. BASIC REQUISITES FOR
SECURITY GUARDS
Filipino citizen;
High school graduate;
Physically and mentally fit;
At least 18 years old but not more
than 50 years old;
Has undergone pre-licensing
training course; and
Must not possess any of the
disqualifications.
23. SURETY BOND
answers to any valid or legal claims
against agency filed by any aggrieved
party
BASIS:
PSAs w/ 1-199 SGs – Php 50,000
PSAs w/ 200-499 SGs – Php 100,000
PSAs w/ 500-799 SGs – Php 150,000
PSAs w/ 800-1000 SGs – Php 200,000
24. Private Detective
Holder of baccalaureate degree or
Bachelor of Laws; or
B.S. Criminology graduate; or
Graduate of Criminal Investigation
Course offered by the then PC/INP or
the PNP or the NBI or any police
training school or detective training with
authorized/recognized training center
for security guard; or
Advance Reserve Officers Training
Course or Citizen Military Training
(ROTC/CMT) graduate.
25. Security Officer
Person responsible to the supervision of
the performance of personnel
Filipino citizen;
Holder of Baccalaureate Degree;
Physically and mentally fit;
Has graduated from a Security Officer
Training Course;
Retired personnel of the PNP/AFP; and
Must not possess any of the disqualification
enumerated in Sec. 2, Rule II.
26. Security Consultant
Person responsible in the risk management
of a security agency and its personnel
Holder of a Masters degree in either
Criminology, Public Administration, MNSA,
Industrial Administration or Law; or
Must have at least 10 years experience in
the operation and management of security
business.
28. GROUNDS FOR
TERMINATION OF SGs
Expiration of contract
Revocation of license to exercise
profession
Conviction of a crime involving moral
turpitude
Loss of trust and confidence
Physical and mental disability
29. USE OF FIREARMS AND EQUIPMENT
After complying all the
requirements, PSAs are
entitled to possess firearms of
any of the ff:
shotguns, not higher than 12
gauge;
low-power rifle or revolvers, cal.
.22;
cal. .38 pistols or revolvers not
exceeding one (1) FA for every
two (2) security guard in its
employ.
30. PSA with 100 guards - at least 30 pieces of
licensed firearms. However, after operating
6 mos., the PSA can procure firearms in
proportion to the number of posted guards.
For regular License to Operate (LTO)
application - at least 70 pieces of firearms.
Use of firearms for Private Detective
Agency shall be OPTIONAL.
31. Restrictions
Private Security Agencies are not allowed to
possess high caliber guns/firearms such as:
carbine; M16; Cal 45; center fire magnum cal
.41 and .44; and high caliber firearms, except:
when such private PSA/CSF is operating in
areas where there is an upsurge of
lawlessness and criminality.
Exception is granted by CPNP or Regional
Director of Regional Police Office.
E.g. areas where upsurge of lawlessness and criminality
32. LIMITATIONS IN THE
CARRYING OF FAs
1. Carried only during his tour of duty when
in proper uniform within the compound of
the establishment, where he is assigned;
2. Except, when he is escorting big amount of
cash or valuables, and upon prior
coordination with the nearest PNP
units/stations.
33. Stocking of ammunitions
limited and reasonable
quantity that suits the need
of the Agency
not exceed fifty (50) rounds
of ammunitions per unit of
duly licensed Fas.
Individual issue to security
guard shall be limited to
twenty-five (25) rounds per
SG.
34. UNIFORM, EQUIPMENT AND
PARAPHERNALIA
males - Headgear; service
shirt; service trousers;
service belt; and footwear.
Fast navy blue for PSA;
Light gray for company
security force; and
White for government
security unit.
35. RANKS AND POSITIONS
Security Management Staff
Security Director (SD) - Agency Manager/Chief Security
Officer.
Security Executive Director (SED) - Asst. Agency
Manager/asst. Chief Security Officer.
Security Staff Director (SSD) - Staff Director for Operation
and Staff
Director for Administration.
Line Leadership Staff
Security Supervisor 3 - Detachment Commanders
Security Supervisor 2 - Chief Inspector
Security Supervisor 1 – Inspector
Security Guard
Security Guard 1 - watchman/guard
Security Guard 2 - Shift-in-charge
Security Guard 3 - Post-in-charge
36. PERSONNEL IDENTIFICATION AND
MOVEMENT CONTROL
In every installation, the use of protective
barriers, security lighting, communication and
electronic hardware provides physical
safeguards but these are insufficient to
maximize the effort of the guard force.
A control point must be established for positive
personnel identification and check system.
This is to insure that only those persons who
have the right and authority will be given the
necessary access to the area.
37. Two (2) Types of Personnel Identification
1. Personal recognition
2. Artificial recognition
38. System of Employment of Personnel
Control Identification
1. Pass system - a method used by
security to screen visitors or person
admitted into building premises.
2. Single pass or Badge system - the least
expensive and the least secure.
3. Group pass and Badge system - one ID
for one group.
39. 4. 4. Multiple pass system - separate pass is
required for access to various areas in need
ex.color coding
5. Spot magnetized identification passes - a code
may be placed in the device and when
passes through a machine,the code on the
device is read,if it containswrong code or no
code at all, it will alarm.
6. Access list - it contains the names of
authorized persons or personnel and is checked
against identification cards such as drivers
licenses, draft registration etc.
40. PERSONNEL SECURITY
designed to prevent unsuitable
individuals from gaining access to
classified matter or to any security
facility, and to prevent appointment,
or retention
42. WHAT IS PERSONNEL SECURITY
INVESTIGATION?
an inquiry into the character,
moral, reputation, integrity,
discretion and loyalty of
individual in order to
determine a person’s
suitability to be given
security clearance.
43. General Techniques of PSI
1. Background Investigation (BI)
- very expensive technique but necessary
- verify information on the application form
- information pertinent to the decision to employ
2. Positive Vetting
- personal interview conducted under stress
- based on information previously given by the applicant
- Question on information discovered in the BI
- confirms or denies information
44. General Techniques of PSI
3. Profiling
- process whereby a subject’s reaction in a future critical
situation is predicted
- observing his behavior
- analyzing responses
4. Deception Detection Techniques
- use of a Polygraph, Psychological Stress Evaluator and
Voice Analyzer
5. Financial and Lifestyle Inquiry
- investigate on information pertaining to income and mode
of living
- referred to as the earning-to-debt ratio (n)
45. General Techniques of PSI
6. Undercover Investigation- this is the
placement of an agent in a role in which the
agent’s true identity and role remains
unknown, in order to obtain information for
criminal prosecution or for recovery or
limitation of asset losses.
7. Exit Interview- this is a valuable tool because
it gives departing employees an opportunity to
list grievances.
46. SECURITY EDUCATION
develop security
awareness among
employees of the
company.
should cover all
regardless of rank
or position.
47. Phases of Security Education Program
1. Initial interview- first contact wherein the
interviewer determine the suitability of the
applicant
2. Orientation and Training- detailed
presentation of personnel security policy
3. Refresher Conference- remind
responsibilities, review guidelines and
policies, introduction of new policies
4. Security Reminders- indirect approach of
educating the employees
5. Security Promotion – emphasizing the
importance and role of security
48. Special interviews - It is conducted
with the aide of senior company
officials to facilitate compliance by
means of example.
Debriefing - Serves to place the
person on special notice of his
continuing responsibility to protect
classified information which he has
knowledge of.
49. DOCUMENT AND INFORMATION SECURITY
plays a significant role
in the daily operations
and activities of an
installation.
Once the contents of a
company’s document
and information are
divulged the operational
stability is at stake.
50. DOCUMENT/ INFORMATION CYCLE
1. Creation
2. Classification
3. Storage
4. Retrieval
5. Retention/Purging
6. Transfer
7. Disposition
51. PERTINENT DEFINITON OF TERMS
Classified Information- this includes all
information concerning document,
cryptographic devices developed projects and
materials following on the categories of Top
Secret, Confidential or Restricted.
Classified Matter- any information or material
in any form or of any nature, the safeguarding
of which is necessary in the interest of security
and which is classified for such purpose by the
responsible classifying authority.
52. PERTINENT DEFINITON OF TERMS
Classify- this refers to the assigning of
information or material, one of the four
security categories after determination has
been made that the information requires the
security protection as provided.
Declassify- the act of removing the security
classification from classified information or
matter.
Reclassifying or Regarding- refers to the act
of changing the assigned classification from
classified information or matter.
53. PERTINENT DEFINITON OF TERMS
Upgrading- refers to the act of assigning the
information or matter to the higher
classification than that previously assigned to
it.
Compartmentation- refers to the grant of
access to the classified matter only to properly
cleared person when such classified
information is required in the performance of
their official duties.
54. PERTINENT DEFINITON OF TERMS
Need to know- is the dissemination of classified
information or matter to be limited strictly to those
person whose duties requires knowledge or possession
thereof.
Unauthorized- refers to person not authorized to have
access on classified matters.
Compromise- this takes place through the loss of
security, which results from unauthorized persons
obtaining knowledge of classified matters.
Damage to National Security- refers to the prejudice,
embarrassment or injury to the country resulting from
act or omission.
55. Purpose of Protecting Classified Materials
1. Deter and impede potential spy
2. Assist in security investigations by
keeping accurate records of the
moments of classified materials.
3. Enforce the use of “Need to Know”
principle
56. Security Concepts
1. Personnel are the weakest link in the
security chain.
2. Training is important to make
security personnel conscious and
realize the value of document.
3. Training is necessary for the practice
of “Need to Know” principle.
57. Four (4) Types of Classified Matters
1. TOP SECRET
2. SECRET
3. CONFIDENTIAL
4. RESTRICTED
58. TOP SECRET
(green color code)
any information and materials, the
unauthorized disclosure of it would
cause exceptionally grave damage
to the nation, politically,
economically and military
operation.
59. SECRET
(red color) –
any information and material, the
unauthorized disclosure of it would
endanger national security, causes
serious injury to the interest and
prestige of the nation of any
government activity, or of great
advantage to a foreign country.
60. CONFIDENTIAL
blue color code
any information or material, the
unauthorized disclosure of it would be
prejudicial to the interest and prestige of
the national or governmental activity or
would cause administrative
embarrassment or unwanted injury to
and be of advantage to a foreign
country.
61. RESTRICTED
white or no color
is any information and material
which requires special protection
other than those determines
confidential, secret and top secret.
62. WHAT IS SECURITY CLEARANCE?
certification by a responsible authority that
the person described is cleared for access
to classified matter the appropriate level
the administrative determination that an
individual is eligible for access to classified
matter.
.
63. What is Need-to-know?
the principle whereby access to
classified matter may only be only
given to those persons to whom it
is necessary for the fulfillment of
their duties
64. WHAT IS SENSITIVE INFORMATION?
information that in some special way relates to
the status or activities of the possessor and
over which the possessor asserts ownership.
In the business community, proprietary
information relates to the structure, products
or business methods of the organization.
It is usually protected in some way against
causal or general disclosure.
65. Types of Proprietary Information
1. Trade Secrets- this consist of any formula, pattern,
device or compilation of information which is used in
one’s business and which gives him an opportunity to
gain an advantage over competitors who do not know or
use it.
2. Patents- this is a grant made by the government to an
inventor, conveying or securing to him the exclusive
right to make, use, or sell his invention for term of
years.
67. What is Risk Analysis?
the analysis of risk which includes
examinations of the vulnerability,
probability and criticality of potential
threats and include natural and man made
risk.
Risk - potential damage or loss of an asset
Vulnerability - weaknesses
Probability - chance or likelihood that a loss will
take place.
Criticality - impact of a loss as measured in
financial terms.
68. What is Security Hazard?
act or condition which may result in
the compromise of information, loss
of life, loss or destruction of property
or disruption of the objective of the
installation.
act or condition affecting the safe
operation of the facility caused by
human action accidental or
intentional.
69. What is Risk Management?
a process of selecting and
implementing security
countermeasures to achieve an
acceptable level of risk at an
acceptable cost.
Countermeasures - An action taken or a
physical security used to reduce or
eliminate one or more vulnerabilities.
70. RELATIVITY OF RISK AND SECURITY
The extent and degree of risks to security is
dependent on the following:
Relative criticality of operation – importance of
the firm with reference to the natural economy and
security. Ex: gasoline depots, communication
transmission lines, and power plants.
Relative vulnerability – susceptibility of the plant
or establishment to damage, loss or disruption of
operation due to various hazards. A good example is
the location of the building; the machines; or
presence of possible poisons.
71. RISK MANAGEMENT ALTERNATIVES AND
STRATEGIES
1. Risk Avoidance – removing the risk totally from the
business. Ex: proper disposal of inflammable substances.
2. Risk Reduction – minimizing the probability of the
potential loss. Ex: construction of fences and similar
physical barriers.
3. Risk Spreading – spreading the risk through
decentralization to limit the impact (criticality) of the
potential loss. Ex: use of vaults or safes
4. Risk Transfer – moving the financial impact of the
potential loss-over to an insurance company. This is done
by availing of property and life insurances. Hiring security
agencies is also a good example of this.
5. Risk Self-assumption – planned assumption and
acceptance of the potential risk by making a deliberate
managerial decision of doing nothing about the threat, or
setting aside resources for use in case of loss
72. SECURITY SURVEY AND INSPECTION
SECURITY SYSTEM – This is the set of policies,
procedures and rules and regulations designed to
reduce to an absolute minimum the possibility of
espionage, sabotage and compromise of classified
information of an office or a whole establishment.
73. SECURITY SURVEY
The basic instrument for determining security
vulnerability.
Critical on-site examination and analysis of an
industrial plant, business, a home or public or
private institution done to ascertain the
facility's current security status.
74. SECURITY SURVEY REPORT FORMAT
Heading
(The Agency/ Office that conducts
The survey, its address and
Telephone number, if any)
Date of Report
Addressee
(Addressed to the President
Or General Manager of the
Establishment)
75. SECURITY SURVEY REPORT FORMAT
Subject: Security Survey Report
Dear Sir:
Submitted hereunder is the security survey
report on the survey made by our team under
(state the name of the Team leader) for your
perusal and approval.
I. PRELIMINARIES:
A. Authority: (State here whether requested
by the establishment or solely initiated by the
Team)
76. SECURITY SURVEY REPORT FORMAT
B. Date and duration of survey made: (State
the date and inclusive hours or days as the case
maybe)
C. Weather condition: (Prevailing weather
condition when survey was made. State also the
usual months when flood and dry season occurs in
the particular area.
D. Surveying Personnel (Names of the
survey team indicating the survey team leader)
II. ESTABLISHMENT SURVEYED:
A. Name of the establishment surveyed.
(Use map, sketches for its location. Describe the
77. SECURITY SURVEY REPORT FORMAT
facilities and the prevailing situation with
regards to the neighborhood whether completely
commercial or industrial area or residential
particularly squatters area which could affect the
security adversely. If possible, include also the
primary access to the location and its date of
initial operation).
B. Objective of the company. State the
primary activity of the company. State the nature
of its operation or products.
C. Affiliation with other organizations,
international or local. State whether main or
branch of the group of companies.
D. Total Number of work force (Include all
78. SECURITY SURVEY REPORT FORMAT
III. SECURITY SYSTEM
A. Physical Security- evaluate the
effectiveness or efficiency of the following:
1. Perimeter Barrier(s)
a. Situation(s)- (List down the security
deficiencies noted)
2. Guard Force and Guard System
a. Situation(s)
b. Recommendation(s)
3. Protective Lighting
a. Situation(s)
b. Recommendation(s)
79. SECURITY SURVEY REPORT FORMAT
4. Protective Alarms and Communications
a. Situation(s)
b. Recommendation(s)
5. Protective Locks and Keys
a. Situation(s)
b. Recommendation(s)
6. Personnel Identification and Movement
Control
a. Situation(s)
b. Recommendation(s)
7. Emergency Planning
a. Situation(s)
b. Recommendation(s)
80. SECURITY SURVEY REPORT FORMAT
B. Personnel Security
1. Data Concerning Key Personnel: (Are
201 Files of all personnel under the
employ of the company properly
maintained?)
a. Situation(s)
b. Recommendation(s)
2. Clearance Program: (Indicate the
hiring process system as to whether
the applicants are subjected to
personnel security investigation and
required to submit clearances prior to
hiring).
a. Situation(s) b. Recommendation(s)
81. SECURITY SURVEY REPORT FORMAT
3. Morale of Employees: (Are employees
given lectures or seminars on security
aspect?)
a. Situation(s)
b. Recommendation(s)
4. Absentee Rate and Labor Turnover:
a. Situation(s)
b. Recommendation(s)
C. Documents and Information Security
1. Rules and Regulations: (Are there any
policy, guidelines, rules and
regulations adopted by the company
82. SECURITY SURVEY REPORT FORMAT
for handling classified matters?)
a. Situation(s)
b. Recommendation(s)
NOTE: Discuss each item like:
1) Classified System
2) Receipting System
3) Storage of Classified Matters
4) Transmission System
5) Reproduction System
6) Destructive System
7) Preparation and Marketing System
83. SECURITY SURVEY REPORT FORMAT
IV. OTHER SITUATIONS AND
RECOMMENDATIONS:
V. ENCLOSURE/EXHIBITS
(State the number and title of the
enclosures/exhibits)
It is believed that this Security Survey
Report will suffice your requirements for
adequate security of your establishment.
Very truly yours,
(Chief, Survey Team)
84. SECURITY INSPECTION
A check of how well existing security
measures and regulations are being
carried out within a detachment or
establishment.
A security inspection may also
include an investigation of alleged or
suspected security violations.
85. TYPES OF SECURITY INSPECTIONS
1. Continuous Inspection-an on-going and
never ending activity.
2. Formal or Informal
Formal Inspection - preceded by an
announcement
Informal Inspection - understood by all and
accepted as part of the organizational life.
3. Structured or Unstructured Inspection
Structured Inspection is one that moves
systematically from one area to the next and so
on.
Unstructured inspection is conducted in a
random manner.
86. SECURITY INSPECTION REPORT FORMAT
Date ___________
TO :
FROM :
SUBJECT :
1. INTRODUCTION:
a. Authority
b. Date(s) and hours conducted
c. Date of last inspection
d. Inspecting personnel
e. Representatives from installation
accompanying inspection team
87. SECURITY INSPECTION REPORT FORMAT
2. RESULTS OF INSPECTION:
a. Listing of facilities inspected.
b. Remarks on effectiveness and extent of
compliance with established security
measures.
c. statement of action taken on
recommendation made during previous
survey or inspection.
3. RECOMMENDATION/S:
a. Positive and concise recommendations to
eliminate hazards and correct deficiencies
observed during the inspection.
88. SECURITY INSPECTION REPORT FORMAT
b. Statements concerning any interim
recommendations made and hazards
and/or deficiencies eliminated during the
inspection.
________________
(Chief, Inspection Team)
89. SECURITY INVESTIGATION
A planned and organized determination of facts
concerning specific loss or damage of assets
due to threats, hazards or unsecured
conditions.
90. INVESTIGATION REPORT FORMAT
CONFIDENTIAL
(Letterhead)
Date__________
FOR : (The Chief or Commander who
assigned the case)
SUBJECT :
I. AUTHORITY:
This section should contain a brief
statement of when, where and by whom the
investigation was made and should cite the
authority for making it.
91. INVESTIGATION REPORT FORMAT
II. MATTERS INVESTIGATED:
This section of the report represents the
mission of the investigator. In essence, it
answers the question: What is the
investigation all about?
III. FACTS OF THE CASE:
This presents the real truth respecting the
matters investigated. The description
“completeness”, clarity are particular
applicable to this section. It should be
coherent presentation of all pertinent facts
that shall be free from argument or bias and
fully supported by evidence.
92. INVESTIGATION REPORT FORMAT
IV. DISCUSSION:
This section set forth when appropriate,
the presumption and inferences from all the
circumstances in the case to give the
directing authority the clearest possible
picture. It should contain such related factual
matter of argument may be necessary, in
addition to the facts presented, to establish
the conclusions and recommendation based
thereon.
V. CONCLUSION:
This represents a concise summary of the
results of the investigation directly
consequent from and supported by facts.
93. INVESTIGATION REPORT FORMAT
These logically follow from the facts of case
as found and set forth in the report. They are
usually stated in the order naturally suggested
by the statement of the allegations or facts.
IV. RECOMMENDATIONS:
This should contain the practical
suggestions as to appropriate action to be taken
to make suitable position of all phases of the
case. They should follow, as far as practicable,
the same sequence as was used in the
presentation of conclusion.
_____________
Investigator
94. SAMPLE QUESTION
Whether to put up its own security guard organic to
the firm or hire contractual agency guards have their
individual merits and disadvantages. To determine
which type of guarding system an industrial firm will
require management must consult
A. A security consultant not connected to or owning
a security agency
B. A military intelligence officer
C. A police officer
D. A security agency owner
95. SAMPLE QUESTION
Registration of a security agency as a
corporation must be processed at what
particular government agency.
A. PNP SOSIA
B. NAPOLCOM
C. DND
D. SEC
96. WHAT ARE THE DIFFERENT TYPES OF
LICENSES IN THE SECURITY PROFESSION?
1.LICENSE TO OPERATE
2.FIREARMS REGISTRATION
INDIVIDUAL
JURIDICAL
3. LESP
97. SAMPLE QUESTION
If access is limited only to unauthorized
personnel, this particular place is
referred to as
A. Compromise area
B. Restricted area
C. Danger area
D. Exclusive area
98. SAMPLE QUESTION
In an industrial firm there is a need for
document security. As security officer, you can
advice management on this aspect although
this is not totally your assigned work.
Document security is not a protection of vital
records from
A. Authorized handlers
B. Theft or loss
C. Compromise or destruction
D. Unauthorized access