SlideShare a Scribd company logo
1 of 98
FINALS
DISCUSSION
GUARD FORCE AND GUARD SYSTEMS
SECURITY GUARD
 Aka. Private security guard or
watchman
 Offers or renders personal services
 Watch and secure
 Residence or business establishment
or both
 For hire or compensation
 Has license to exercise profession
CHARACTERISTICS OF A
SECURITY GUARD
 Alertness – watchfulness
 Judgment – good discretion (wuoj)
 Confidence – faith in oneself ; train
 Physical Fitness – effective even
under strenuous condition
 Tactfulness – dealing w/out offending
 Self-Control – take hold of oneself
regardless of provoking situations
SG FUNCTIONS &
GUARDING PROCEDURE
 Fixed post
 Patrol
 Administrative work
 Investigation and escorts
(inspects/monitors bodily checks/searches individuals and/or
baggage and other forms of security inspection)
SECURITY GUARD FORCE
 Group of selected men, trained or
grouped into functional unit in order to
protect operational processes from those
disruption which would impede efficiency
or halt operation.
TYPES OF SECURITY GUARD
FORCES
1. Private Security Agency (PSA)
 contracts, recruits, trains, and post security
guard to business firms
2. Company Security Force (CSF)
 maintained and operated by any private
company or corporation
3. Government Security Unit (GSU)
 operated by any government entity other than
military and / a police
LICENSE TO EXERCISE
PROFESSION
 Any document issued by the CPNP or
his duly authorized representative,
recognizing a person to be qualified
to perform his duties as private
security guard or training personnel
WHAT IS LTO?
 LICENSE TO OPERATE
 document issued by the CPNP or his
duly authorized representative
authorizing a person to engage in
security business
PADPAO
 Philippine Association of Detective
and Protective Agency Operators, Inc.
 An association of all licensed security
agencies and company security forces
DUTY DETAIL ORDER (DDO)
 a written order or schedule issued by
a superior officer usually the private
security agency or branch manager or
operations officer assigning the
performance of private security ;
detective services duties
PRIVATE DETECTIVE
 person who does detective work for
hire, reward or commission, other
than members of the AFP, BJMP,
provincial guards, PNP or any law
enforcement agency of the
government
SECURITY SURVEY
CONTRACT
 contract between the company where
the SGs will be employed
CONTRACT STIPULATES:
1. The money consideration to be paid by
the client to the PSA
2. No. of hours of services per guard per
day
3. Guard’s salary to be received from the
agency
Who may organize and maintain a PSA?
 Any Filipino citizen or
corporation, association,
partnership,
 100% owned and
controlled by Filipino
citizens.
 No person shall organize
or have interest in more
than one agency
Basic Requirement of an Operator or
Manager of Security Agency
 Filipino citizen
 At least 25 years old
 College graduate and/or a commissioned officer in the
inactive service or Retired from AFP or PNP or
Graduated/taken course in concepts and methods in
industrial Security and Security Management and/or
 Must have an adequate training or experience in security
business
 Good moral character - not having been convicted of any
crime involving moral turpitude;
 Must not possess any of the disqualification
Disqualifications
 dishonorably discharged from AFP/PNP or separated
for cause from any government entity or government
owned or controlled corporation;
 Being mentally incompetent;
 Being physically unfit;
 Addicted to the use of narcotic and/or prohibited drugs
and/or substances;
 Habitual drunkard and alcoholic;
 Dummy of any foreigner; and
 Elective or appointive government officials and
employees
REQUIREMENTS FOR NEW PSA
 1M Minimum Capital and 500K Bank
Deposit
 Application to CPNP thru SOSIA
 full name of the applicant;
 his age, civil status; and
 residence and location of his business.
In case of corporation, association or
partnership copies of the following shall be
appended:
 Certificate of Registration with the SEC; and
 BY-Laws and Articles of incorporation.
STATUS AND VALIDITY OF
LTO
1. REGULAR LTO – issued after
complying with licensing requirements
2. TEMPORARY LTO – initial and
conditional issuance to new PSAs and
PSAs holding regular LTO not able to
maintain the minimum number of
security personnel or conform to
standards
Graduated Scale of License to Operate
 200 or more but not exceeding 1000 shall be
issued a regular LTO good for 2 years.
 New PSA shall be issued a temporary LTO good
for 1 year.
 PSAs with cancelled/revoked LTOs shall cease
to operate and within 7 days after having been
duly notified of such cease to operate order,
shall immediately deposit all its firearms with
the Firearms and Explosives Office (FEO) which
shall be receipted, copy furnished, CPNP
SOSIA. Otherwise, the PSA concerned, shall be
liable under RA 10591.
BASIC REQUISITES FOR
SECURITY GUARDS
 Filipino citizen;
 High school graduate;
 Physically and mentally fit;
 At least 18 years old but not more
than 50 years old;
 Has undergone pre-licensing
training course; and
 Must not possess any of the
disqualifications.
SURETY BOND
 answers to any valid or legal claims
against agency filed by any aggrieved
party
BASIS:
PSAs w/ 1-199 SGs – Php 50,000
PSAs w/ 200-499 SGs – Php 100,000
PSAs w/ 500-799 SGs – Php 150,000
PSAs w/ 800-1000 SGs – Php 200,000
Private Detective
 Holder of baccalaureate degree or
Bachelor of Laws; or
 B.S. Criminology graduate; or
 Graduate of Criminal Investigation
Course offered by the then PC/INP or
the PNP or the NBI or any police
training school or detective training with
authorized/recognized training center
for security guard; or
 Advance Reserve Officers Training
Course or Citizen Military Training
(ROTC/CMT) graduate.
Security Officer
 Person responsible to the supervision of
the performance of personnel
 Filipino citizen;
 Holder of Baccalaureate Degree;
 Physically and mentally fit;
 Has graduated from a Security Officer
Training Course;
 Retired personnel of the PNP/AFP; and
 Must not possess any of the disqualification
enumerated in Sec. 2, Rule II.
Security Consultant
 Person responsible in the risk management
of a security agency and its personnel
 Holder of a Masters degree in either
Criminology, Public Administration, MNSA,
Industrial Administration or Law; or
 Must have at least 10 years experience in
the operation and management of security
business.
TENURE OF SECURITY
PERSONNEL
 Shall be co-terminus with the service
contract between the PSA and the
client
GROUNDS FOR
TERMINATION OF SGs
 Expiration of contract
 Revocation of license to exercise
profession
 Conviction of a crime involving moral
turpitude
 Loss of trust and confidence
 Physical and mental disability
USE OF FIREARMS AND EQUIPMENT
 After complying all the
requirements, PSAs are
entitled to possess firearms of
any of the ff:
 shotguns, not higher than 12
gauge;
 low-power rifle or revolvers, cal.
.22;
 cal. .38 pistols or revolvers not
exceeding one (1) FA for every
two (2) security guard in its
employ.
 PSA with 100 guards - at least 30 pieces of
licensed firearms. However, after operating
6 mos., the PSA can procure firearms in
proportion to the number of posted guards.
 For regular License to Operate (LTO)
application - at least 70 pieces of firearms.
 Use of firearms for Private Detective
Agency shall be OPTIONAL.
Restrictions
 Private Security Agencies are not allowed to
possess high caliber guns/firearms such as:
carbine; M16; Cal 45; center fire magnum cal
.41 and .44; and high caliber firearms, except:
when such private PSA/CSF is operating in
areas where there is an upsurge of
lawlessness and criminality.
 Exception is granted by CPNP or Regional
Director of Regional Police Office.
E.g. areas where upsurge of lawlessness and criminality
LIMITATIONS IN THE
CARRYING OF FAs
1. Carried only during his tour of duty when
in proper uniform within the compound of
the establishment, where he is assigned;
2. Except, when he is escorting big amount of
cash or valuables, and upon prior
coordination with the nearest PNP
units/stations.
Stocking of ammunitions
 limited and reasonable
quantity that suits the need
of the Agency
 not exceed fifty (50) rounds
of ammunitions per unit of
duly licensed Fas.
 Individual issue to security
guard shall be limited to
twenty-five (25) rounds per
SG.
UNIFORM, EQUIPMENT AND
PARAPHERNALIA
 males - Headgear; service
shirt; service trousers;
service belt; and footwear.
 Fast navy blue for PSA;
 Light gray for company
security force; and
 White for government
security unit.
RANKS AND POSITIONS
 Security Management Staff
 Security Director (SD) - Agency Manager/Chief Security
Officer.
 Security Executive Director (SED) - Asst. Agency
Manager/asst. Chief Security Officer.
 Security Staff Director (SSD) - Staff Director for Operation
and Staff
 Director for Administration.
 Line Leadership Staff
 Security Supervisor 3 - Detachment Commanders
 Security Supervisor 2 - Chief Inspector
 Security Supervisor 1 – Inspector
 Security Guard
 Security Guard 1 - watchman/guard
 Security Guard 2 - Shift-in-charge
 Security Guard 3 - Post-in-charge
PERSONNEL IDENTIFICATION AND
MOVEMENT CONTROL
 In every installation, the use of protective
barriers, security lighting, communication and
electronic hardware provides physical
safeguards but these are insufficient to
maximize the effort of the guard force.
 A control point must be established for positive
personnel identification and check system.
 This is to insure that only those persons who
have the right and authority will be given the
necessary access to the area.
Two (2) Types of Personnel Identification
1. Personal recognition
2. Artificial recognition
System of Employment of Personnel
Control Identification
1. Pass system - a method used by
security to screen visitors or person
admitted into building premises.
2. Single pass or Badge system - the least
expensive and the least secure.
3. Group pass and Badge system - one ID
for one group.
4. 4. Multiple pass system - separate pass is
required for access to various areas in need
ex.color coding
5. Spot magnetized identification passes - a code
may be placed in the device and when
passes through a machine,the code on the
device is read,if it containswrong code or no
code at all, it will alarm.
6. Access list - it contains the names of
authorized persons or personnel and is checked
against identification cards such as drivers
licenses, draft registration etc.
PERSONNEL SECURITY
 designed to prevent unsuitable
individuals from gaining access to
classified matter or to any security
facility, and to prevent appointment,
or retention
Scope of Personnel Security
1. Personnel Security Investigation
(PSI)
2. Security Education
WHAT IS PERSONNEL SECURITY
INVESTIGATION?
 an inquiry into the character,
moral, reputation, integrity,
discretion and loyalty of
individual in order to
determine a person’s
suitability to be given
security clearance.
General Techniques of PSI
1. Background Investigation (BI)
- very expensive technique but necessary
- verify information on the application form
- information pertinent to the decision to employ
2. Positive Vetting
- personal interview conducted under stress
- based on information previously given by the applicant
- Question on information discovered in the BI
- confirms or denies information
General Techniques of PSI
3. Profiling
- process whereby a subject’s reaction in a future critical
situation is predicted
- observing his behavior
- analyzing responses
4. Deception Detection Techniques
- use of a Polygraph, Psychological Stress Evaluator and
Voice Analyzer
5. Financial and Lifestyle Inquiry
- investigate on information pertaining to income and mode
of living
- referred to as the earning-to-debt ratio (n)
General Techniques of PSI
6. Undercover Investigation- this is the
placement of an agent in a role in which the
agent’s true identity and role remains
unknown, in order to obtain information for
criminal prosecution or for recovery or
limitation of asset losses.
7. Exit Interview- this is a valuable tool because
it gives departing employees an opportunity to
list grievances.
SECURITY EDUCATION
 develop security
awareness among
employees of the
company.
 should cover all
regardless of rank
or position.
Phases of Security Education Program
1. Initial interview- first contact wherein the
interviewer determine the suitability of the
applicant
2. Orientation and Training- detailed
presentation of personnel security policy
3. Refresher Conference- remind
responsibilities, review guidelines and
policies, introduction of new policies
4. Security Reminders- indirect approach of
educating the employees
5. Security Promotion – emphasizing the
importance and role of security
 Special interviews - It is conducted
with the aide of senior company
officials to facilitate compliance by
means of example.
 Debriefing - Serves to place the
person on special notice of his
continuing responsibility to protect
classified information which he has
knowledge of.
DOCUMENT AND INFORMATION SECURITY
 plays a significant role
in the daily operations
and activities of an
installation.
 Once the contents of a
company’s document
and information are
divulged the operational
stability is at stake.
DOCUMENT/ INFORMATION CYCLE
1. Creation
2. Classification
3. Storage
4. Retrieval
5. Retention/Purging
6. Transfer
7. Disposition
PERTINENT DEFINITON OF TERMS
 Classified Information- this includes all
information concerning document,
cryptographic devices developed projects and
materials following on the categories of Top
Secret, Confidential or Restricted.
 Classified Matter- any information or material
in any form or of any nature, the safeguarding
of which is necessary in the interest of security
and which is classified for such purpose by the
responsible classifying authority.
PERTINENT DEFINITON OF TERMS
 Classify- this refers to the assigning of
information or material, one of the four
security categories after determination has
been made that the information requires the
security protection as provided.
 Declassify- the act of removing the security
classification from classified information or
matter.
 Reclassifying or Regarding- refers to the act
of changing the assigned classification from
classified information or matter.
PERTINENT DEFINITON OF TERMS
 Upgrading- refers to the act of assigning the
information or matter to the higher
classification than that previously assigned to
it.
 Compartmentation- refers to the grant of
access to the classified matter only to properly
cleared person when such classified
information is required in the performance of
their official duties.
PERTINENT DEFINITON OF TERMS
 Need to know- is the dissemination of classified
information or matter to be limited strictly to those
person whose duties requires knowledge or possession
thereof.
 Unauthorized- refers to person not authorized to have
access on classified matters.
 Compromise- this takes place through the loss of
security, which results from unauthorized persons
obtaining knowledge of classified matters.
 Damage to National Security- refers to the prejudice,
embarrassment or injury to the country resulting from
act or omission.
Purpose of Protecting Classified Materials
1. Deter and impede potential spy
2. Assist in security investigations by
keeping accurate records of the
moments of classified materials.
3. Enforce the use of “Need to Know”
principle
Security Concepts
1. Personnel are the weakest link in the
security chain.
2. Training is important to make
security personnel conscious and
realize the value of document.
3. Training is necessary for the practice
of “Need to Know” principle.
Four (4) Types of Classified Matters
1. TOP SECRET
2. SECRET
3. CONFIDENTIAL
4. RESTRICTED
TOP SECRET
 (green color code)
 any information and materials, the
unauthorized disclosure of it would
cause exceptionally grave damage
to the nation, politically,
economically and military
operation.
SECRET
 (red color) –
 any information and material, the
unauthorized disclosure of it would
endanger national security, causes
serious injury to the interest and
prestige of the nation of any
government activity, or of great
advantage to a foreign country.
CONFIDENTIAL
 blue color code
 any information or material, the
unauthorized disclosure of it would be
prejudicial to the interest and prestige of
the national or governmental activity or
would cause administrative
embarrassment or unwanted injury to
and be of advantage to a foreign
country.
RESTRICTED
 white or no color
 is any information and material
which requires special protection
other than those determines
confidential, secret and top secret.
WHAT IS SECURITY CLEARANCE?
 certification by a responsible authority that
the person described is cleared for access
to classified matter the appropriate level
 the administrative determination that an
individual is eligible for access to classified
matter.
.
What is Need-to-know?
 the principle whereby access to
classified matter may only be only
given to those persons to whom it
is necessary for the fulfillment of
their duties
WHAT IS SENSITIVE INFORMATION?
 information that in some special way relates to
the status or activities of the possessor and
over which the possessor asserts ownership.
 In the business community, proprietary
information relates to the structure, products
or business methods of the organization.
 It is usually protected in some way against
causal or general disclosure.
Types of Proprietary Information
1. Trade Secrets- this consist of any formula, pattern,
device or compilation of information which is used in
one’s business and which gives him an opportunity to
gain an advantage over competitors who do not know or
use it.
2. Patents- this is a grant made by the government to an
inventor, conveying or securing to him the exclusive
right to make, use, or sell his invention for term of
years.
RISKS ANALYSIS AND
SECURITY HAZARDS
What is Risk Analysis?
 the analysis of risk which includes
examinations of the vulnerability,
probability and criticality of potential
threats and include natural and man made
risk.
 Risk - potential damage or loss of an asset
 Vulnerability - weaknesses
 Probability - chance or likelihood that a loss will
take place.
 Criticality - impact of a loss as measured in
financial terms.
What is Security Hazard?
 act or condition which may result in
the compromise of information, loss
of life, loss or destruction of property
or disruption of the objective of the
installation.
 act or condition affecting the safe
operation of the facility caused by
human action accidental or
intentional.
What is Risk Management?
 a process of selecting and
implementing security
countermeasures to achieve an
acceptable level of risk at an
acceptable cost.
 Countermeasures - An action taken or a
physical security used to reduce or
eliminate one or more vulnerabilities.
RELATIVITY OF RISK AND SECURITY
 The extent and degree of risks to security is
dependent on the following:
 Relative criticality of operation – importance of
the firm with reference to the natural economy and
security. Ex: gasoline depots, communication
transmission lines, and power plants.
 Relative vulnerability – susceptibility of the plant
or establishment to damage, loss or disruption of
operation due to various hazards. A good example is
the location of the building; the machines; or
presence of possible poisons.
RISK MANAGEMENT ALTERNATIVES AND
STRATEGIES
1. Risk Avoidance – removing the risk totally from the
business. Ex: proper disposal of inflammable substances.
2. Risk Reduction – minimizing the probability of the
potential loss. Ex: construction of fences and similar
physical barriers.
3. Risk Spreading – spreading the risk through
decentralization to limit the impact (criticality) of the
potential loss. Ex: use of vaults or safes
4. Risk Transfer – moving the financial impact of the
potential loss-over to an insurance company. This is done
by availing of property and life insurances. Hiring security
agencies is also a good example of this.
5. Risk Self-assumption – planned assumption and
acceptance of the potential risk by making a deliberate
managerial decision of doing nothing about the threat, or
setting aside resources for use in case of loss
SECURITY SURVEY AND INSPECTION
 SECURITY SYSTEM – This is the set of policies,
procedures and rules and regulations designed to
reduce to an absolute minimum the possibility of
espionage, sabotage and compromise of classified
information of an office or a whole establishment.
SECURITY SURVEY
 The basic instrument for determining security
vulnerability.
 Critical on-site examination and analysis of an
industrial plant, business, a home or public or
private institution done to ascertain the
facility's current security status.
SECURITY SURVEY REPORT FORMAT
Heading
(The Agency/ Office that conducts
The survey, its address and
Telephone number, if any)
Date of Report
Addressee
(Addressed to the President
Or General Manager of the
Establishment)
SECURITY SURVEY REPORT FORMAT
Subject: Security Survey Report
Dear Sir:
Submitted hereunder is the security survey
report on the survey made by our team under
(state the name of the Team leader) for your
perusal and approval.
I. PRELIMINARIES:
A. Authority: (State here whether requested
by the establishment or solely initiated by the
Team)
SECURITY SURVEY REPORT FORMAT
B. Date and duration of survey made: (State
the date and inclusive hours or days as the case
maybe)
C. Weather condition: (Prevailing weather
condition when survey was made. State also the
usual months when flood and dry season occurs in
the particular area.
D. Surveying Personnel (Names of the
survey team indicating the survey team leader)
II. ESTABLISHMENT SURVEYED:
A. Name of the establishment surveyed.
(Use map, sketches for its location. Describe the
SECURITY SURVEY REPORT FORMAT
facilities and the prevailing situation with
regards to the neighborhood whether completely
commercial or industrial area or residential
particularly squatters area which could affect the
security adversely. If possible, include also the
primary access to the location and its date of
initial operation).
B. Objective of the company. State the
primary activity of the company. State the nature
of its operation or products.
C. Affiliation with other organizations,
international or local. State whether main or
branch of the group of companies.
D. Total Number of work force (Include all
SECURITY SURVEY REPORT FORMAT
III. SECURITY SYSTEM
A. Physical Security- evaluate the
effectiveness or efficiency of the following:
1. Perimeter Barrier(s)
a. Situation(s)- (List down the security
deficiencies noted)
2. Guard Force and Guard System
a. Situation(s)
b. Recommendation(s)
3. Protective Lighting
a. Situation(s)
b. Recommendation(s)
SECURITY SURVEY REPORT FORMAT
4. Protective Alarms and Communications
a. Situation(s)
b. Recommendation(s)
5. Protective Locks and Keys
a. Situation(s)
b. Recommendation(s)
6. Personnel Identification and Movement
Control
a. Situation(s)
b. Recommendation(s)
7. Emergency Planning
a. Situation(s)
b. Recommendation(s)
SECURITY SURVEY REPORT FORMAT
B. Personnel Security
1. Data Concerning Key Personnel: (Are
201 Files of all personnel under the
employ of the company properly
maintained?)
a. Situation(s)
b. Recommendation(s)
2. Clearance Program: (Indicate the
hiring process system as to whether
the applicants are subjected to
personnel security investigation and
required to submit clearances prior to
hiring).
a. Situation(s) b. Recommendation(s)
SECURITY SURVEY REPORT FORMAT
3. Morale of Employees: (Are employees
given lectures or seminars on security
aspect?)
a. Situation(s)
b. Recommendation(s)
4. Absentee Rate and Labor Turnover:
a. Situation(s)
b. Recommendation(s)
C. Documents and Information Security
1. Rules and Regulations: (Are there any
policy, guidelines, rules and
regulations adopted by the company
SECURITY SURVEY REPORT FORMAT
for handling classified matters?)
a. Situation(s)
b. Recommendation(s)
NOTE: Discuss each item like:
1) Classified System
2) Receipting System
3) Storage of Classified Matters
4) Transmission System
5) Reproduction System
6) Destructive System
7) Preparation and Marketing System
SECURITY SURVEY REPORT FORMAT
IV. OTHER SITUATIONS AND
RECOMMENDATIONS:
V. ENCLOSURE/EXHIBITS
(State the number and title of the
enclosures/exhibits)
It is believed that this Security Survey
Report will suffice your requirements for
adequate security of your establishment.
Very truly yours,
(Chief, Survey Team)
SECURITY INSPECTION
 A check of how well existing security
measures and regulations are being
carried out within a detachment or
establishment.
 A security inspection may also
include an investigation of alleged or
suspected security violations.
TYPES OF SECURITY INSPECTIONS
1. Continuous Inspection-an on-going and
never ending activity.
2. Formal or Informal
 Formal Inspection - preceded by an
announcement
 Informal Inspection - understood by all and
accepted as part of the organizational life.
3. Structured or Unstructured Inspection
 Structured Inspection is one that moves
systematically from one area to the next and so
on.
 Unstructured inspection is conducted in a
random manner.
SECURITY INSPECTION REPORT FORMAT
Date ___________
TO :
FROM :
SUBJECT :
1. INTRODUCTION:
a. Authority
b. Date(s) and hours conducted
c. Date of last inspection
d. Inspecting personnel
e. Representatives from installation
accompanying inspection team
SECURITY INSPECTION REPORT FORMAT
2. RESULTS OF INSPECTION:
a. Listing of facilities inspected.
b. Remarks on effectiveness and extent of
compliance with established security
measures.
c. statement of action taken on
recommendation made during previous
survey or inspection.
3. RECOMMENDATION/S:
a. Positive and concise recommendations to
eliminate hazards and correct deficiencies
observed during the inspection.
SECURITY INSPECTION REPORT FORMAT
b. Statements concerning any interim
recommendations made and hazards
and/or deficiencies eliminated during the
inspection.
________________
(Chief, Inspection Team)
SECURITY INVESTIGATION
 A planned and organized determination of facts
concerning specific loss or damage of assets
due to threats, hazards or unsecured
conditions.
INVESTIGATION REPORT FORMAT
CONFIDENTIAL
(Letterhead)
Date__________
FOR : (The Chief or Commander who
assigned the case)
SUBJECT :
I. AUTHORITY:
This section should contain a brief
statement of when, where and by whom the
investigation was made and should cite the
authority for making it.
INVESTIGATION REPORT FORMAT
II. MATTERS INVESTIGATED:
This section of the report represents the
mission of the investigator. In essence, it
answers the question: What is the
investigation all about?
III. FACTS OF THE CASE:
This presents the real truth respecting the
matters investigated. The description
“completeness”, clarity are particular
applicable to this section. It should be
coherent presentation of all pertinent facts
that shall be free from argument or bias and
fully supported by evidence.
INVESTIGATION REPORT FORMAT
IV. DISCUSSION:
This section set forth when appropriate,
the presumption and inferences from all the
circumstances in the case to give the
directing authority the clearest possible
picture. It should contain such related factual
matter of argument may be necessary, in
addition to the facts presented, to establish
the conclusions and recommendation based
thereon.
V. CONCLUSION:
This represents a concise summary of the
results of the investigation directly
consequent from and supported by facts.
INVESTIGATION REPORT FORMAT
These logically follow from the facts of case
as found and set forth in the report. They are
usually stated in the order naturally suggested
by the statement of the allegations or facts.
IV. RECOMMENDATIONS:
This should contain the practical
suggestions as to appropriate action to be taken
to make suitable position of all phases of the
case. They should follow, as far as practicable,
the same sequence as was used in the
presentation of conclusion.
_____________
Investigator
SAMPLE QUESTION
 Whether to put up its own security guard organic to
the firm or hire contractual agency guards have their
individual merits and disadvantages. To determine
which type of guarding system an industrial firm will
require management must consult
A. A security consultant not connected to or owning
a security agency
B. A military intelligence officer
C. A police officer
D. A security agency owner
SAMPLE QUESTION
Registration of a security agency as a
corporation must be processed at what
particular government agency.
A. PNP SOSIA
B. NAPOLCOM
C. DND
D. SEC
WHAT ARE THE DIFFERENT TYPES OF
LICENSES IN THE SECURITY PROFESSION?
1.LICENSE TO OPERATE
2.FIREARMS REGISTRATION
INDIVIDUAL
JURIDICAL
3. LESP
SAMPLE QUESTION
 If access is limited only to unauthorized
personnel, this particular place is
referred to as
A. Compromise area
B. Restricted area
C. Danger area
D. Exclusive area
SAMPLE QUESTION
 In an industrial firm there is a need for
document security. As security officer, you can
advice management on this aspect although
this is not totally your assigned work.
Document security is not a protection of vital
records from
A. Authorized handlers
B. Theft or loss
C. Compromise or destruction
D. Unauthorized access

More Related Content

Similar to Industrial-Security-FINALS.pptaaaaaaaaaa

Georgia LPC Legal and Ethical Issues in Clinical Supervision
Georgia LPC Legal and Ethical Issues in Clinical SupervisionGeorgia LPC Legal and Ethical Issues in Clinical Supervision
Georgia LPC Legal and Ethical Issues in Clinical SupervisionGlenn Duncan
 
PRESENTATION PROFILE 6.pptx
PRESENTATION PROFILE 6.pptxPRESENTATION PROFILE 6.pptx
PRESENTATION PROFILE 6.pptxArunima Banerjee
 
PRESENTATION PROFILE 3.pptx
PRESENTATION PROFILE 3.pptxPRESENTATION PROFILE 3.pptx
PRESENTATION PROFILE 3.pptxArunima Banerjee
 
Provizion - Capable warrior company profile
Provizion - Capable warrior company profileProvizion - Capable warrior company profile
Provizion - Capable warrior company profileprovizion1
 
LEA1-MIDTERM-2022-2023 (1).pptx
LEA1-MIDTERM-2022-2023 (1).pptxLEA1-MIDTERM-2022-2023 (1).pptx
LEA1-MIDTERM-2022-2023 (1).pptxAlexisTabi
 
Form p1004 policy on baton
Form p1004 policy on batonForm p1004 policy on baton
Form p1004 policy on batonKevin Oulette
 
Security Presentation
Security PresentationSecurity Presentation
Security PresentationGerhard Peens
 
2014 Certification Applicant Handbook
2014 Certification Applicant Handbook2014 Certification Applicant Handbook
2014 Certification Applicant HandbookPeggy OConnor
 
Workplace Conduct Investigation Policy Example
Workplace Conduct Investigation Policy ExampleWorkplace Conduct Investigation Policy Example
Workplace Conduct Investigation Policy Example@HR2CEO
 
WHSAct_Presentation06
WHSAct_Presentation06WHSAct_Presentation06
WHSAct_Presentation06Wayne Freeman
 

Similar to Industrial-Security-FINALS.pptaaaaaaaaaa (20)

CARMONA (final)
CARMONA (final)CARMONA (final)
CARMONA (final)
 
Georgia LPC Legal and Ethical Issues in Clinical Supervision
Georgia LPC Legal and Ethical Issues in Clinical SupervisionGeorgia LPC Legal and Ethical Issues in Clinical Supervision
Georgia LPC Legal and Ethical Issues in Clinical Supervision
 
PRESENTATION PROFILE 6.pptx
PRESENTATION PROFILE 6.pptxPRESENTATION PROFILE 6.pptx
PRESENTATION PROFILE 6.pptx
 
PRESENTATION PROFILE 3.pptx
PRESENTATION PROFILE 3.pptxPRESENTATION PROFILE 3.pptx
PRESENTATION PROFILE 3.pptx
 
Spider
SpiderSpider
Spider
 
Sec 2017 job-d
Sec 2017  job-dSec 2017  job-d
Sec 2017 job-d
 
Whistleblowing Policy
Whistleblowing PolicyWhistleblowing Policy
Whistleblowing Policy
 
Provizion - Capable warrior company profile
Provizion - Capable warrior company profileProvizion - Capable warrior company profile
Provizion - Capable warrior company profile
 
200.10 departmental safety policy
200.10 departmental safety policy200.10 departmental safety policy
200.10 departmental safety policy
 
Unit 2
Unit 2Unit 2
Unit 2
 
oshirrprimer
oshirrprimeroshirrprimer
oshirrprimer
 
Security guard jobs
Security guard jobsSecurity guard jobs
Security guard jobs
 
LEA1-MIDTERM-2022-2023 (1).pptx
LEA1-MIDTERM-2022-2023 (1).pptxLEA1-MIDTERM-2022-2023 (1).pptx
LEA1-MIDTERM-2022-2023 (1).pptx
 
Form p1004 policy on baton
Form p1004 policy on batonForm p1004 policy on baton
Form p1004 policy on baton
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Bulldyers Presentation
Bulldyers PresentationBulldyers Presentation
Bulldyers Presentation
 
2014 Certification Applicant Handbook
2014 Certification Applicant Handbook2014 Certification Applicant Handbook
2014 Certification Applicant Handbook
 
Workplace Conduct Investigation Policy Example
Workplace Conduct Investigation Policy ExampleWorkplace Conduct Investigation Policy Example
Workplace Conduct Investigation Policy Example
 
FIREARMS LAW.ppt
FIREARMS LAW.pptFIREARMS LAW.ppt
FIREARMS LAW.ppt
 
WHSAct_Presentation06
WHSAct_Presentation06WHSAct_Presentation06
WHSAct_Presentation06
 

Recently uploaded

Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...SUHANI PANDEY
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Nilendra Kumar
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理bd2c5966a56d
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理ss
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理A AA
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for projectVarshRR
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理A AA
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargainingbartzlawgroup1
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 

Recently uploaded (20)

Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 

Industrial-Security-FINALS.pptaaaaaaaaaa

  • 2. GUARD FORCE AND GUARD SYSTEMS
  • 3. SECURITY GUARD  Aka. Private security guard or watchman  Offers or renders personal services  Watch and secure  Residence or business establishment or both  For hire or compensation  Has license to exercise profession
  • 4. CHARACTERISTICS OF A SECURITY GUARD  Alertness – watchfulness  Judgment – good discretion (wuoj)  Confidence – faith in oneself ; train  Physical Fitness – effective even under strenuous condition  Tactfulness – dealing w/out offending  Self-Control – take hold of oneself regardless of provoking situations
  • 5. SG FUNCTIONS & GUARDING PROCEDURE  Fixed post  Patrol  Administrative work  Investigation and escorts (inspects/monitors bodily checks/searches individuals and/or baggage and other forms of security inspection)
  • 6. SECURITY GUARD FORCE  Group of selected men, trained or grouped into functional unit in order to protect operational processes from those disruption which would impede efficiency or halt operation.
  • 7. TYPES OF SECURITY GUARD FORCES 1. Private Security Agency (PSA)  contracts, recruits, trains, and post security guard to business firms 2. Company Security Force (CSF)  maintained and operated by any private company or corporation 3. Government Security Unit (GSU)  operated by any government entity other than military and / a police
  • 8. LICENSE TO EXERCISE PROFESSION  Any document issued by the CPNP or his duly authorized representative, recognizing a person to be qualified to perform his duties as private security guard or training personnel
  • 9. WHAT IS LTO?  LICENSE TO OPERATE  document issued by the CPNP or his duly authorized representative authorizing a person to engage in security business
  • 10.
  • 11. PADPAO  Philippine Association of Detective and Protective Agency Operators, Inc.  An association of all licensed security agencies and company security forces
  • 12. DUTY DETAIL ORDER (DDO)  a written order or schedule issued by a superior officer usually the private security agency or branch manager or operations officer assigning the performance of private security ; detective services duties
  • 13. PRIVATE DETECTIVE  person who does detective work for hire, reward or commission, other than members of the AFP, BJMP, provincial guards, PNP or any law enforcement agency of the government
  • 14. SECURITY SURVEY CONTRACT  contract between the company where the SGs will be employed CONTRACT STIPULATES: 1. The money consideration to be paid by the client to the PSA 2. No. of hours of services per guard per day 3. Guard’s salary to be received from the agency
  • 15. Who may organize and maintain a PSA?  Any Filipino citizen or corporation, association, partnership,  100% owned and controlled by Filipino citizens.  No person shall organize or have interest in more than one agency
  • 16. Basic Requirement of an Operator or Manager of Security Agency  Filipino citizen  At least 25 years old  College graduate and/or a commissioned officer in the inactive service or Retired from AFP or PNP or Graduated/taken course in concepts and methods in industrial Security and Security Management and/or  Must have an adequate training or experience in security business  Good moral character - not having been convicted of any crime involving moral turpitude;  Must not possess any of the disqualification
  • 17. Disqualifications  dishonorably discharged from AFP/PNP or separated for cause from any government entity or government owned or controlled corporation;  Being mentally incompetent;  Being physically unfit;  Addicted to the use of narcotic and/or prohibited drugs and/or substances;  Habitual drunkard and alcoholic;  Dummy of any foreigner; and  Elective or appointive government officials and employees
  • 18. REQUIREMENTS FOR NEW PSA  1M Minimum Capital and 500K Bank Deposit  Application to CPNP thru SOSIA  full name of the applicant;  his age, civil status; and  residence and location of his business. In case of corporation, association or partnership copies of the following shall be appended:  Certificate of Registration with the SEC; and  BY-Laws and Articles of incorporation.
  • 19.
  • 20. STATUS AND VALIDITY OF LTO 1. REGULAR LTO – issued after complying with licensing requirements 2. TEMPORARY LTO – initial and conditional issuance to new PSAs and PSAs holding regular LTO not able to maintain the minimum number of security personnel or conform to standards
  • 21. Graduated Scale of License to Operate  200 or more but not exceeding 1000 shall be issued a regular LTO good for 2 years.  New PSA shall be issued a temporary LTO good for 1 year.  PSAs with cancelled/revoked LTOs shall cease to operate and within 7 days after having been duly notified of such cease to operate order, shall immediately deposit all its firearms with the Firearms and Explosives Office (FEO) which shall be receipted, copy furnished, CPNP SOSIA. Otherwise, the PSA concerned, shall be liable under RA 10591.
  • 22. BASIC REQUISITES FOR SECURITY GUARDS  Filipino citizen;  High school graduate;  Physically and mentally fit;  At least 18 years old but not more than 50 years old;  Has undergone pre-licensing training course; and  Must not possess any of the disqualifications.
  • 23. SURETY BOND  answers to any valid or legal claims against agency filed by any aggrieved party BASIS: PSAs w/ 1-199 SGs – Php 50,000 PSAs w/ 200-499 SGs – Php 100,000 PSAs w/ 500-799 SGs – Php 150,000 PSAs w/ 800-1000 SGs – Php 200,000
  • 24. Private Detective  Holder of baccalaureate degree or Bachelor of Laws; or  B.S. Criminology graduate; or  Graduate of Criminal Investigation Course offered by the then PC/INP or the PNP or the NBI or any police training school or detective training with authorized/recognized training center for security guard; or  Advance Reserve Officers Training Course or Citizen Military Training (ROTC/CMT) graduate.
  • 25. Security Officer  Person responsible to the supervision of the performance of personnel  Filipino citizen;  Holder of Baccalaureate Degree;  Physically and mentally fit;  Has graduated from a Security Officer Training Course;  Retired personnel of the PNP/AFP; and  Must not possess any of the disqualification enumerated in Sec. 2, Rule II.
  • 26. Security Consultant  Person responsible in the risk management of a security agency and its personnel  Holder of a Masters degree in either Criminology, Public Administration, MNSA, Industrial Administration or Law; or  Must have at least 10 years experience in the operation and management of security business.
  • 27. TENURE OF SECURITY PERSONNEL  Shall be co-terminus with the service contract between the PSA and the client
  • 28. GROUNDS FOR TERMINATION OF SGs  Expiration of contract  Revocation of license to exercise profession  Conviction of a crime involving moral turpitude  Loss of trust and confidence  Physical and mental disability
  • 29. USE OF FIREARMS AND EQUIPMENT  After complying all the requirements, PSAs are entitled to possess firearms of any of the ff:  shotguns, not higher than 12 gauge;  low-power rifle or revolvers, cal. .22;  cal. .38 pistols or revolvers not exceeding one (1) FA for every two (2) security guard in its employ.
  • 30.  PSA with 100 guards - at least 30 pieces of licensed firearms. However, after operating 6 mos., the PSA can procure firearms in proportion to the number of posted guards.  For regular License to Operate (LTO) application - at least 70 pieces of firearms.  Use of firearms for Private Detective Agency shall be OPTIONAL.
  • 31. Restrictions  Private Security Agencies are not allowed to possess high caliber guns/firearms such as: carbine; M16; Cal 45; center fire magnum cal .41 and .44; and high caliber firearms, except: when such private PSA/CSF is operating in areas where there is an upsurge of lawlessness and criminality.  Exception is granted by CPNP or Regional Director of Regional Police Office. E.g. areas where upsurge of lawlessness and criminality
  • 32. LIMITATIONS IN THE CARRYING OF FAs 1. Carried only during his tour of duty when in proper uniform within the compound of the establishment, where he is assigned; 2. Except, when he is escorting big amount of cash or valuables, and upon prior coordination with the nearest PNP units/stations.
  • 33. Stocking of ammunitions  limited and reasonable quantity that suits the need of the Agency  not exceed fifty (50) rounds of ammunitions per unit of duly licensed Fas.  Individual issue to security guard shall be limited to twenty-five (25) rounds per SG.
  • 34. UNIFORM, EQUIPMENT AND PARAPHERNALIA  males - Headgear; service shirt; service trousers; service belt; and footwear.  Fast navy blue for PSA;  Light gray for company security force; and  White for government security unit.
  • 35. RANKS AND POSITIONS  Security Management Staff  Security Director (SD) - Agency Manager/Chief Security Officer.  Security Executive Director (SED) - Asst. Agency Manager/asst. Chief Security Officer.  Security Staff Director (SSD) - Staff Director for Operation and Staff  Director for Administration.  Line Leadership Staff  Security Supervisor 3 - Detachment Commanders  Security Supervisor 2 - Chief Inspector  Security Supervisor 1 – Inspector  Security Guard  Security Guard 1 - watchman/guard  Security Guard 2 - Shift-in-charge  Security Guard 3 - Post-in-charge
  • 36. PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL  In every installation, the use of protective barriers, security lighting, communication and electronic hardware provides physical safeguards but these are insufficient to maximize the effort of the guard force.  A control point must be established for positive personnel identification and check system.  This is to insure that only those persons who have the right and authority will be given the necessary access to the area.
  • 37. Two (2) Types of Personnel Identification 1. Personal recognition 2. Artificial recognition
  • 38. System of Employment of Personnel Control Identification 1. Pass system - a method used by security to screen visitors or person admitted into building premises. 2. Single pass or Badge system - the least expensive and the least secure. 3. Group pass and Badge system - one ID for one group.
  • 39. 4. 4. Multiple pass system - separate pass is required for access to various areas in need ex.color coding 5. Spot magnetized identification passes - a code may be placed in the device and when passes through a machine,the code on the device is read,if it containswrong code or no code at all, it will alarm. 6. Access list - it contains the names of authorized persons or personnel and is checked against identification cards such as drivers licenses, draft registration etc.
  • 40. PERSONNEL SECURITY  designed to prevent unsuitable individuals from gaining access to classified matter or to any security facility, and to prevent appointment, or retention
  • 41. Scope of Personnel Security 1. Personnel Security Investigation (PSI) 2. Security Education
  • 42. WHAT IS PERSONNEL SECURITY INVESTIGATION?  an inquiry into the character, moral, reputation, integrity, discretion and loyalty of individual in order to determine a person’s suitability to be given security clearance.
  • 43. General Techniques of PSI 1. Background Investigation (BI) - very expensive technique but necessary - verify information on the application form - information pertinent to the decision to employ 2. Positive Vetting - personal interview conducted under stress - based on information previously given by the applicant - Question on information discovered in the BI - confirms or denies information
  • 44. General Techniques of PSI 3. Profiling - process whereby a subject’s reaction in a future critical situation is predicted - observing his behavior - analyzing responses 4. Deception Detection Techniques - use of a Polygraph, Psychological Stress Evaluator and Voice Analyzer 5. Financial and Lifestyle Inquiry - investigate on information pertaining to income and mode of living - referred to as the earning-to-debt ratio (n)
  • 45. General Techniques of PSI 6. Undercover Investigation- this is the placement of an agent in a role in which the agent’s true identity and role remains unknown, in order to obtain information for criminal prosecution or for recovery or limitation of asset losses. 7. Exit Interview- this is a valuable tool because it gives departing employees an opportunity to list grievances.
  • 46. SECURITY EDUCATION  develop security awareness among employees of the company.  should cover all regardless of rank or position.
  • 47. Phases of Security Education Program 1. Initial interview- first contact wherein the interviewer determine the suitability of the applicant 2. Orientation and Training- detailed presentation of personnel security policy 3. Refresher Conference- remind responsibilities, review guidelines and policies, introduction of new policies 4. Security Reminders- indirect approach of educating the employees 5. Security Promotion – emphasizing the importance and role of security
  • 48.  Special interviews - It is conducted with the aide of senior company officials to facilitate compliance by means of example.  Debriefing - Serves to place the person on special notice of his continuing responsibility to protect classified information which he has knowledge of.
  • 49. DOCUMENT AND INFORMATION SECURITY  plays a significant role in the daily operations and activities of an installation.  Once the contents of a company’s document and information are divulged the operational stability is at stake.
  • 50. DOCUMENT/ INFORMATION CYCLE 1. Creation 2. Classification 3. Storage 4. Retrieval 5. Retention/Purging 6. Transfer 7. Disposition
  • 51. PERTINENT DEFINITON OF TERMS  Classified Information- this includes all information concerning document, cryptographic devices developed projects and materials following on the categories of Top Secret, Confidential or Restricted.  Classified Matter- any information or material in any form or of any nature, the safeguarding of which is necessary in the interest of security and which is classified for such purpose by the responsible classifying authority.
  • 52. PERTINENT DEFINITON OF TERMS  Classify- this refers to the assigning of information or material, one of the four security categories after determination has been made that the information requires the security protection as provided.  Declassify- the act of removing the security classification from classified information or matter.  Reclassifying or Regarding- refers to the act of changing the assigned classification from classified information or matter.
  • 53. PERTINENT DEFINITON OF TERMS  Upgrading- refers to the act of assigning the information or matter to the higher classification than that previously assigned to it.  Compartmentation- refers to the grant of access to the classified matter only to properly cleared person when such classified information is required in the performance of their official duties.
  • 54. PERTINENT DEFINITON OF TERMS  Need to know- is the dissemination of classified information or matter to be limited strictly to those person whose duties requires knowledge or possession thereof.  Unauthorized- refers to person not authorized to have access on classified matters.  Compromise- this takes place through the loss of security, which results from unauthorized persons obtaining knowledge of classified matters.  Damage to National Security- refers to the prejudice, embarrassment or injury to the country resulting from act or omission.
  • 55. Purpose of Protecting Classified Materials 1. Deter and impede potential spy 2. Assist in security investigations by keeping accurate records of the moments of classified materials. 3. Enforce the use of “Need to Know” principle
  • 56. Security Concepts 1. Personnel are the weakest link in the security chain. 2. Training is important to make security personnel conscious and realize the value of document. 3. Training is necessary for the practice of “Need to Know” principle.
  • 57. Four (4) Types of Classified Matters 1. TOP SECRET 2. SECRET 3. CONFIDENTIAL 4. RESTRICTED
  • 58. TOP SECRET  (green color code)  any information and materials, the unauthorized disclosure of it would cause exceptionally grave damage to the nation, politically, economically and military operation.
  • 59. SECRET  (red color) –  any information and material, the unauthorized disclosure of it would endanger national security, causes serious injury to the interest and prestige of the nation of any government activity, or of great advantage to a foreign country.
  • 60. CONFIDENTIAL  blue color code  any information or material, the unauthorized disclosure of it would be prejudicial to the interest and prestige of the national or governmental activity or would cause administrative embarrassment or unwanted injury to and be of advantage to a foreign country.
  • 61. RESTRICTED  white or no color  is any information and material which requires special protection other than those determines confidential, secret and top secret.
  • 62. WHAT IS SECURITY CLEARANCE?  certification by a responsible authority that the person described is cleared for access to classified matter the appropriate level  the administrative determination that an individual is eligible for access to classified matter. .
  • 63. What is Need-to-know?  the principle whereby access to classified matter may only be only given to those persons to whom it is necessary for the fulfillment of their duties
  • 64. WHAT IS SENSITIVE INFORMATION?  information that in some special way relates to the status or activities of the possessor and over which the possessor asserts ownership.  In the business community, proprietary information relates to the structure, products or business methods of the organization.  It is usually protected in some way against causal or general disclosure.
  • 65. Types of Proprietary Information 1. Trade Secrets- this consist of any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it. 2. Patents- this is a grant made by the government to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of years.
  • 67. What is Risk Analysis?  the analysis of risk which includes examinations of the vulnerability, probability and criticality of potential threats and include natural and man made risk.  Risk - potential damage or loss of an asset  Vulnerability - weaknesses  Probability - chance or likelihood that a loss will take place.  Criticality - impact of a loss as measured in financial terms.
  • 68. What is Security Hazard?  act or condition which may result in the compromise of information, loss of life, loss or destruction of property or disruption of the objective of the installation.  act or condition affecting the safe operation of the facility caused by human action accidental or intentional.
  • 69. What is Risk Management?  a process of selecting and implementing security countermeasures to achieve an acceptable level of risk at an acceptable cost.  Countermeasures - An action taken or a physical security used to reduce or eliminate one or more vulnerabilities.
  • 70. RELATIVITY OF RISK AND SECURITY  The extent and degree of risks to security is dependent on the following:  Relative criticality of operation – importance of the firm with reference to the natural economy and security. Ex: gasoline depots, communication transmission lines, and power plants.  Relative vulnerability – susceptibility of the plant or establishment to damage, loss or disruption of operation due to various hazards. A good example is the location of the building; the machines; or presence of possible poisons.
  • 71. RISK MANAGEMENT ALTERNATIVES AND STRATEGIES 1. Risk Avoidance – removing the risk totally from the business. Ex: proper disposal of inflammable substances. 2. Risk Reduction – minimizing the probability of the potential loss. Ex: construction of fences and similar physical barriers. 3. Risk Spreading – spreading the risk through decentralization to limit the impact (criticality) of the potential loss. Ex: use of vaults or safes 4. Risk Transfer – moving the financial impact of the potential loss-over to an insurance company. This is done by availing of property and life insurances. Hiring security agencies is also a good example of this. 5. Risk Self-assumption – planned assumption and acceptance of the potential risk by making a deliberate managerial decision of doing nothing about the threat, or setting aside resources for use in case of loss
  • 72. SECURITY SURVEY AND INSPECTION  SECURITY SYSTEM – This is the set of policies, procedures and rules and regulations designed to reduce to an absolute minimum the possibility of espionage, sabotage and compromise of classified information of an office or a whole establishment.
  • 73. SECURITY SURVEY  The basic instrument for determining security vulnerability.  Critical on-site examination and analysis of an industrial plant, business, a home or public or private institution done to ascertain the facility's current security status.
  • 74. SECURITY SURVEY REPORT FORMAT Heading (The Agency/ Office that conducts The survey, its address and Telephone number, if any) Date of Report Addressee (Addressed to the President Or General Manager of the Establishment)
  • 75. SECURITY SURVEY REPORT FORMAT Subject: Security Survey Report Dear Sir: Submitted hereunder is the security survey report on the survey made by our team under (state the name of the Team leader) for your perusal and approval. I. PRELIMINARIES: A. Authority: (State here whether requested by the establishment or solely initiated by the Team)
  • 76. SECURITY SURVEY REPORT FORMAT B. Date and duration of survey made: (State the date and inclusive hours or days as the case maybe) C. Weather condition: (Prevailing weather condition when survey was made. State also the usual months when flood and dry season occurs in the particular area. D. Surveying Personnel (Names of the survey team indicating the survey team leader) II. ESTABLISHMENT SURVEYED: A. Name of the establishment surveyed. (Use map, sketches for its location. Describe the
  • 77. SECURITY SURVEY REPORT FORMAT facilities and the prevailing situation with regards to the neighborhood whether completely commercial or industrial area or residential particularly squatters area which could affect the security adversely. If possible, include also the primary access to the location and its date of initial operation). B. Objective of the company. State the primary activity of the company. State the nature of its operation or products. C. Affiliation with other organizations, international or local. State whether main or branch of the group of companies. D. Total Number of work force (Include all
  • 78. SECURITY SURVEY REPORT FORMAT III. SECURITY SYSTEM A. Physical Security- evaluate the effectiveness or efficiency of the following: 1. Perimeter Barrier(s) a. Situation(s)- (List down the security deficiencies noted) 2. Guard Force and Guard System a. Situation(s) b. Recommendation(s) 3. Protective Lighting a. Situation(s) b. Recommendation(s)
  • 79. SECURITY SURVEY REPORT FORMAT 4. Protective Alarms and Communications a. Situation(s) b. Recommendation(s) 5. Protective Locks and Keys a. Situation(s) b. Recommendation(s) 6. Personnel Identification and Movement Control a. Situation(s) b. Recommendation(s) 7. Emergency Planning a. Situation(s) b. Recommendation(s)
  • 80. SECURITY SURVEY REPORT FORMAT B. Personnel Security 1. Data Concerning Key Personnel: (Are 201 Files of all personnel under the employ of the company properly maintained?) a. Situation(s) b. Recommendation(s) 2. Clearance Program: (Indicate the hiring process system as to whether the applicants are subjected to personnel security investigation and required to submit clearances prior to hiring). a. Situation(s) b. Recommendation(s)
  • 81. SECURITY SURVEY REPORT FORMAT 3. Morale of Employees: (Are employees given lectures or seminars on security aspect?) a. Situation(s) b. Recommendation(s) 4. Absentee Rate and Labor Turnover: a. Situation(s) b. Recommendation(s) C. Documents and Information Security 1. Rules and Regulations: (Are there any policy, guidelines, rules and regulations adopted by the company
  • 82. SECURITY SURVEY REPORT FORMAT for handling classified matters?) a. Situation(s) b. Recommendation(s) NOTE: Discuss each item like: 1) Classified System 2) Receipting System 3) Storage of Classified Matters 4) Transmission System 5) Reproduction System 6) Destructive System 7) Preparation and Marketing System
  • 83. SECURITY SURVEY REPORT FORMAT IV. OTHER SITUATIONS AND RECOMMENDATIONS: V. ENCLOSURE/EXHIBITS (State the number and title of the enclosures/exhibits) It is believed that this Security Survey Report will suffice your requirements for adequate security of your establishment. Very truly yours, (Chief, Survey Team)
  • 84. SECURITY INSPECTION  A check of how well existing security measures and regulations are being carried out within a detachment or establishment.  A security inspection may also include an investigation of alleged or suspected security violations.
  • 85. TYPES OF SECURITY INSPECTIONS 1. Continuous Inspection-an on-going and never ending activity. 2. Formal or Informal  Formal Inspection - preceded by an announcement  Informal Inspection - understood by all and accepted as part of the organizational life. 3. Structured or Unstructured Inspection  Structured Inspection is one that moves systematically from one area to the next and so on.  Unstructured inspection is conducted in a random manner.
  • 86. SECURITY INSPECTION REPORT FORMAT Date ___________ TO : FROM : SUBJECT : 1. INTRODUCTION: a. Authority b. Date(s) and hours conducted c. Date of last inspection d. Inspecting personnel e. Representatives from installation accompanying inspection team
  • 87. SECURITY INSPECTION REPORT FORMAT 2. RESULTS OF INSPECTION: a. Listing of facilities inspected. b. Remarks on effectiveness and extent of compliance with established security measures. c. statement of action taken on recommendation made during previous survey or inspection. 3. RECOMMENDATION/S: a. Positive and concise recommendations to eliminate hazards and correct deficiencies observed during the inspection.
  • 88. SECURITY INSPECTION REPORT FORMAT b. Statements concerning any interim recommendations made and hazards and/or deficiencies eliminated during the inspection. ________________ (Chief, Inspection Team)
  • 89. SECURITY INVESTIGATION  A planned and organized determination of facts concerning specific loss or damage of assets due to threats, hazards or unsecured conditions.
  • 90. INVESTIGATION REPORT FORMAT CONFIDENTIAL (Letterhead) Date__________ FOR : (The Chief or Commander who assigned the case) SUBJECT : I. AUTHORITY: This section should contain a brief statement of when, where and by whom the investigation was made and should cite the authority for making it.
  • 91. INVESTIGATION REPORT FORMAT II. MATTERS INVESTIGATED: This section of the report represents the mission of the investigator. In essence, it answers the question: What is the investigation all about? III. FACTS OF THE CASE: This presents the real truth respecting the matters investigated. The description “completeness”, clarity are particular applicable to this section. It should be coherent presentation of all pertinent facts that shall be free from argument or bias and fully supported by evidence.
  • 92. INVESTIGATION REPORT FORMAT IV. DISCUSSION: This section set forth when appropriate, the presumption and inferences from all the circumstances in the case to give the directing authority the clearest possible picture. It should contain such related factual matter of argument may be necessary, in addition to the facts presented, to establish the conclusions and recommendation based thereon. V. CONCLUSION: This represents a concise summary of the results of the investigation directly consequent from and supported by facts.
  • 93. INVESTIGATION REPORT FORMAT These logically follow from the facts of case as found and set forth in the report. They are usually stated in the order naturally suggested by the statement of the allegations or facts. IV. RECOMMENDATIONS: This should contain the practical suggestions as to appropriate action to be taken to make suitable position of all phases of the case. They should follow, as far as practicable, the same sequence as was used in the presentation of conclusion. _____________ Investigator
  • 94. SAMPLE QUESTION  Whether to put up its own security guard organic to the firm or hire contractual agency guards have their individual merits and disadvantages. To determine which type of guarding system an industrial firm will require management must consult A. A security consultant not connected to or owning a security agency B. A military intelligence officer C. A police officer D. A security agency owner
  • 95. SAMPLE QUESTION Registration of a security agency as a corporation must be processed at what particular government agency. A. PNP SOSIA B. NAPOLCOM C. DND D. SEC
  • 96. WHAT ARE THE DIFFERENT TYPES OF LICENSES IN THE SECURITY PROFESSION? 1.LICENSE TO OPERATE 2.FIREARMS REGISTRATION INDIVIDUAL JURIDICAL 3. LESP
  • 97. SAMPLE QUESTION  If access is limited only to unauthorized personnel, this particular place is referred to as A. Compromise area B. Restricted area C. Danger area D. Exclusive area
  • 98. SAMPLE QUESTION  In an industrial firm there is a need for document security. As security officer, you can advice management on this aspect although this is not totally your assigned work. Document security is not a protection of vital records from A. Authorized handlers B. Theft or loss C. Compromise or destruction D. Unauthorized access