Industrial Security Management History and Basics
17 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of protecting classified materials?

To ensure national security and prevent unauthorized access to sensitive information.

What are the types of hazards mentioned?

Carelessness, disloyalty, espionage, vandalism.

Which of the following are considered types of security inspection? (Select all that apply)

  • Unstructured Inspection (correct)
  • Structured Inspection (correct)
  • Detailed Inspection
  • Formal Inspection (correct)
  • Continuous Inspection (correct)
  • What is Risk Management?

    <p>A process of identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize or control the likelihood of unfortunate events.</p> Signup and view all the answers

    Risk management includes only risk avoidance strategies.

    <p>False</p> Signup and view all the answers

    The three security concepts include _____, _____, and _____.

    <p>Confidentiality, Integrity, Availability</p> Signup and view all the answers

    What law was enacted on June 13, 1969, to regulate private security agencies in the Philippines?

    <p>R.A 5487</p> Signup and view all the answers

    Which of the following roles do security guards assist in according to R.A 5487?

    <p>Assisting police</p> Signup and view all the answers

    The responsibilities of security personnel are limited to protecting the organization from external threats.

    <p>False</p> Signup and view all the answers

    The establishment of the Philippine Association of Detective and Protective Agency Operators (PADPAO) in ____ paved the way for the regulation of private security.

    <p>1958</p> Signup and view all the answers

    What is one of the main reasons for the need for industrial security?

    <p>The necessity to maintain peace and order</p> Signup and view all the answers

    List one essential quality of security guards.

    <p>Alertness</p> Signup and view all the answers

    Which of the following are common types of security?

    <p>All of the above</p> Signup and view all the answers

    All companies view security personnel as vital members of their team.

    <p>False</p> Signup and view all the answers

    What is the significance of effective security management?

    <p>To prevent loss and ensure the safety of lives and properties.</p> Signup and view all the answers

    Security education programs are essential as _____ measures against crimes.

    <p>active</p> Signup and view all the answers

    What does the acronym PADPAO stand for?

    <p>Philippine Association of Detective and Protective Agency Operators</p> Signup and view all the answers

    Study Notes

    Historical Background and Basic Concepts of Industrial Security Management

    • The need for security dates back to the history of man, with dangers posed by nature and fellow human beings.
    • The concept of security management evolved over time, with the Philippine "Hacienderos" (landowners) hiring farm workers who doubled as protectors of property against cattle rustlers and robbers.
    • With the entry of American mining industries, armed security personnel were hired to protect properties.
    • In the 1950s, hired security personnel became widespread, but there were no strict regulations, leading to the establishment of the Philippine Association of Detective and Protective Agency Operators (PADPAO) in 1958.
    • This led to the endorsement of a bill to regulate private detectives, watchmen, security guards, and agencies, resulting in the passage of RA 5487 or the "Private Security Law" in 1969, which started the professionalization of security works in the Philippines.

    Famous Personalities in Industrial Security Management

    • (No specific personalities mentioned)

    Definition of Terms

    • (No specific definitions provided)

    Historical Background of Industrial Security in the Philippines

    • RA 5487, or the "Private Security Law", was signed on June 13, 1969, assigning an important role to the security guard force in assisting the police in safeguarding lives and properties.
    • Presidential Decrees were issued to continuously professionalize the security industry, such as PD 11 in 1972 and PD 100 in 1973.
    • Natural Authority: (no specific information provided)
    • Constitutional Authority:
      • Right to life, liberty, and property
      • Protection against illegal searches and seizures
      • Right to peaceably assemble
    • Statutory Authority:
      • RA 5487 or the "Private Security Law"
      • PD 11 and PD 100

    Necessity of Security

    • Security is essential for the economic progress of a country, as a stable society is critical for economic growth.

    Common Types of Security

    • Industrial Security
    • Hotel Security
    • Bank Security
    • VIP Security
    • School Security
    • Supermarket and Mall Security
    • Operational Security
    • Communication Security

    Three Major Divisions of Security

    • Physical Security
    • Document Security or Information Security
    • Personnel Security

    Basic Principles of Security

    • (No specific principles mentioned)

    Types of Security Measures for an Effective Defense Against Crimes

    • Active Measures
    • Passive Measures

    Factors that Bring About Unsecured Conditions

    • (No specific factors mentioned)

    Factors to be Considered in Providing the Kind and Degree of Security

    • (No specific factors mentioned)

    Principles of Physical Security

    • Deterrent value
    • Delaying effect
    • Detection
    • Response

    Elements and Designs of Physical Security

    • Protective Barriers

    • Natural Surveillance

    • Protective Lighting/Security Lighting

    • Video Surveillance

    • Access Control### Video Surveillance

    • Surveillance cameras serve as a deterrent when placed in highly visible locations and are useful for incident assessment and historical analysis.

    • Cameras can help security personnel assess situations in real-time, but do not guarantee a human response.

    • Technological advances like video analytics are reducing the amount of work required for video monitoring.

    Access Control

    • Access control methods monitor and control traffic through specific access points and areas of a secure facility.
    • Access control systems include CCTV surveillance, identification cards, security guards, biometric readers, and electronic/mechanical control systems such as locks, doors, and turnstiles.

    Security Guard Force System

    Essential Qualities of Security Guards

    • Alertness
    • Judgment
    • Confidence
    • Physical fitness
    • Self-control

    Types of Security Guard Force

    • No information provided

    Security Guard Functions/Guarding Procedures

    • No information provided

    Private Security Agency Law (RA 5487)

    • Regulates the organization and operation of private detective, watchman, and security guard agencies in the Philippines.
    • Approved on October 3, 1972.

    Scope of the Act

    • No information provided

    PNP SAGSD (Philippine National Police Agency Guard Supervising Division)

    • No information provided

    PNP SOSIA (Philippine National Police Supervisory Office for Security and Investigation Agencies)

    • No information provided

    Definition of Terms

    • No information provided

    Who May Organize a Security or Watchman Agency?

    • No information provided

    Qualifications of an Operator or Manager of a Security Agency

    • No information provided

    Disqualifications

    • Elective or appointive government employees who may be called upon on account of the function of their respective offices in the implementation and enforcement of the provision of RA 5487 and person related to such government employees by affinity or consanguinity in the third civil degree shall not hold any interest, directly or indirectly in any security guard agency.

    Limitations and Prohibitions on a Security Agency

    • No information provided

    Payment of Fees and License

    • No information provided

    Use of Uniform, Equipment, and Paraphernalia

    • No information provided

    Use of Firearms and Equipment

    • No information provided

    Ranks and Position

    • Security Management Staff
    • Line Leadership Staff
    • Security Guard
    • Security Consultant

    Training

    • Pre-licensing Course (150 hours)
    • In-service Training
    • Refresher Course
    • Specialized Training
    • On-the-Job Training

    Awards and Decorations for Security Personnel

    • Medalya ng Kagitingan (Blueguards Medal of Valor)
    • Medalya ng Katapatan sa Paglilingkod (Blueguards Distinguished Service Medal)
    • Medalya ng Katapangan (Blueguards Bravery Medal)
    • Medalya ng Pambihirang Paglilingkod (Blueguards Special Service Medal)
    • Medalya ng Kadakilaan (Blueguards Heroism Medal)
    • Medalya ng Katangi-tanging Asal (Blueguards Special Action Medal)
    • Medalya ng Kasanayan (Blueguards Efficiency Medal)
    • Medalya ng Pagtulong sa Nasalanta (Blueguards Disaster Relief and Rehabilitation Medal)
    • Medalya ng Sugatang Magiting (Blueguards Wounded Medal)

    Work Stoppage

    • No information provided

    Strike

    • No information provided

    Lockout

    • No information provided

    Research Works

    • Research RA 5487 Policies in times of lockouts
    • Eleven General Security Guards Creed

    Personnel Security Investigation

    Objectives of Personnel Security

    • To ensure the suitability of an individual for appointment or access to classified matter
    • To identify areas of vulnerability in the individual's background
    • To establish a personnel security program that ensures the integrity of the organization

    Key Functions of Personnel Security

    • Background investigation
    • Positive vetting
    • Profiling
    • Deception detection techniques
    • Financial and lifestyle inquiry
    • Undercover intelligence
    • Exit interview

    Techniques of Personnel Security Investigations

    • Background investigation
    • Positive vetting
    • Profiling
    • Deception detection techniques
    • Financial and lifestyle inquiry
    • Undercover intelligence
    • Exit interview

    Document and Information Security

    Purpose of Protecting Classified Materials

    • To prevent unauthorized disclosure
    • To protect national security
    • To ensure the integrity of the organization

    Kinds of Documents

    • Classified documents
    • Unclassified documents
    • Proprietary information

    Document or Information Cycle

    • Creation
    • Storage
    • Retrieval
    • Dissemination
    • Destruction

    Categories of Document

    • Top Secret
    • Secret
    • Confidential
    • Restricted
    • Unclassified

    Risk Analysis and Security Hazard

    Types of Risk

    • Risk
    • Hazards
    • Security hazards

    Risk Management Alternatives and Strategies

    • Risk avoidance
    • Risk reduction
    • Risk spreading
    • Risk transfer
    • Risk self-assumption

    Security Hazards

    • Vandalism
    • Espionage
    • Theft
    • Pilferage
    • Sabotage
    • Carelessness

    Security Survey, Inspection, and Security Planning

    Security Survey

    • A systematic examination and evaluation of security measures
    • Identifies vulnerabilities and establishes a baseline for security improvement

    Security Inspection

    • A systematic examination and evaluation of security measures
    • Identifies vulnerabilities and establishes a baseline for security improvement

    Security Planning

    • A decision-making process
    • Involves identifying security objectives and the means and methods to achieve them

    Tools of Investigation

    • Interviews
    • Observations
    • Physical search
    • Surveillance

    Contents of Security Planning

    • Security objectives
    • Security risks
    • Security measures
    • Security procedures
    • Security protocols

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    lea3 (2).docx

    Description

    Learn about the origins of security management from ancient times to modern industries, and understand the evolution of security concepts and practices.

    More Like This

    Use Quizgecko on...
    Browser
    Browser