lea3 (2).docx
Document Details
Uploaded by NimbleBagpipes
Cavite State University
Tags
Full Transcript
**CHAPTER 1** **HISTORICAL BACKGROUND AND BASIC CONCEPTS** **OF INDUSTRIAL SECURITY MANAGEMENT** The need for security of lives and properties is as old as the history of man. Man's existence is characterized by constant exposure to dangers: those hazards caused by nature; and those danger posed...
**CHAPTER 1** **HISTORICAL BACKGROUND AND BASIC CONCEPTS** **OF INDUSTRIAL SECURITY MANAGEMENT** The need for security of lives and properties is as old as the history of man. Man's existence is characterized by constant exposure to dangers: those hazards caused by nature; and those danger posed by man's fellowman. The means and methods of human beings to secure themselves are also as old as the history of policing. In the Philippines, "Hacienderos" or owners of large tract of lands often hire farm workers who often double as protectors of the property against cattle rustlers and robbers. With the entry of the American mining industries, the American companies started hiring armed security personnel. And in 1950's hired security personnel were already widespread after the restoration of the country after World War 2. There were no strict regulations yet during that period. Security workers then were still under the city or town mayors who in turn issue working permits to those wanting to be employed as security guards. Security and Detective agencies also began to prosper and with no strict regulations, many security guards were convicted of violent crimes. The establishment of the Philippine Association of Detective and Protective Agency Operators (PADPAO) in 1958 with the aim of making itself a freely self-governing, self-regulating and self-policing paved way for the endorsement to Congress a bill to regulate the organization and operation of private detectives, watchmen, security guards and agencies. Thus, on June 13, 1969, R.A 5487 or the "Private Security Law" was born. This event started the professionalization of security works in the country. The RA 5487 underwent numerous revisions so that the industrial security business will suit to the economic advancement of the country. Today, many college graduates particularly Criminology graduates are employed in the security business ranging from security guards and watchmen to security supervisors and managers. The number of persons working in the industrial security even surpassed the number of personnel of the Philippine National Police. The security guards now are regarded as closed partner of the PNP and the Armed Forces of the Philippines (AFP) in combating criminality in the country. Today, the role of the industrial security business is indispensable as far as the economic progress of our country is concerned. The economic success of one country depends on the stability of its society. It can be noted that most are economically secured countries are free from any external threats. Their socio-economic advancement relied so much on the maintenance of their peace and order. In this country alone, our economy continues to suffer due to vulnerability to internal and external threats. One old adage state that, "Security in every organization is everybody's business." This means that the avoidance of loss and damage to properties as well as the prevention of injury or loss of life because of hazards is not possible without the active support of all individuals within an organization. Among the Filipinos personnel of organizations and business enterprises are virtually leaving their security and protection only to members of their security force. It is unfortune also that many business establishments regard security personnel as mere compliance and sometimes as lowly as props in the company. Many failed to recognize the significance of a blue clad individual often times call "sikyu". Most company workers including the management people are not aware that the responsibilities of an assigned "sikyu" ranges from the single centavo spent for the establishment of the business enterprises up to the entire investments of the concerned company. This is because the security personnel should guard the company from the smallest possible lost to the possible total destruction of the business that could be caused by impending hazards. On the other hand, lack of security consciousness on the part of the company personnel should be taken as an act of negligence. Hence, any breach of security that may arise because of a company personnel's lack of consciousness, he should be equally liable with the concerned security personnel. Therefore, to achieve the objectives of effective security management, the company concerned and the security personnel assigned should work hand in hand. To this both the security personnel and the company's workforce should be educated with the basics of security management. **Famous Personalities in Industrial Security Management** 1. - 2. - 3. - 4. - 5. - - **American Society for Industrial Security (ASIS) 1955** - **Definition of Terms** 1. - 2. - 3. - 4. - 5. - 6. - - 7. - 8. - 9. - 10. - 11. - **Historical Background of Industrial Security in the Philippines** - In the Philippines, we trace the steps from the signing of the late president Ferdinand E. Marcos on June 13, 1969 of the RA 5487 known as the "Private Security Agency Law". - In this law assigned the most important role of the security guard force in assisting the police in its mission to safeguard lives and properties. With the intention of continuously professionalizing the security industry, several Presidential Decrees were issued such as PD 11 issued on October 1972, amending certain sections of RA 5487 particularly section 4 as to who may organize a security and watchman agency; PD 100 on January 17, 1973 further amended sections of RA 5487 which permits the Philippine Constabulary to deputize any private detectives, watchman or security guard to assist in cases of emergency disaster or calamity. **LEGAL BASIS OF INDUSTRIAL SECURITY IN THE PHILIPPINES** 1. **Natural Authority** - 2. **Constitutional Authority** a. - b. - c. - d. 3. **Statutory Authority** a. - b. c. - d. e. - - **Necessity of Security** - - **The role of the PNP and other Government Law Enforcement Agencies** - - **COMMON TYPES OF SECURITY** **1. Industrial Security** - 2. **Hotel Security** - 3. **Bank Security** - 4. **VIP Security** - 5. **School Security** - 6. **Supermarket and Mall Security** - 7. **Operational Security** - 8. **Communication Security** - **THREE MAJOR DIVISIONS OF SECURITY** 1. **Physical Security** - 2. **Document Security or Information Security** - 3. **Personnel Security** - **BASIC PRINCIPLES OF SECURITY** 1. - 2. - 3. - 4. - 5. - **TYPES OF SECURITY MEASURES FOR AN EFFECTIVE** **DEFENSE AGAINST CRIMES:** 1. **ACTIVE MEASURES** - 2. **PASSIVE MEASURES** - - Security education programs, investigation, fire prevention seminars, personal security checks. **Factors that Bring About Unsecured Conditions** 1. - 2. - 3. - 4. - **Factors to be considered in providing the kind and degree of security** 1. - 2. - **Factors to be considered in providing security for the establishment** 1. 2. 3. **Espionage** - **Espion** - - **Spy** - - **Methods used by the Agents of Espionage** 1. 2. 3. 4. 5. 6. 7. **Sabotage** - **Sabot** - **Saboteur** - **3 types of Saboteur** 1. 2. 3. **Types of Sabotage** 1. 2. **Mechanical Sabotage** - **Types of Mechanical Sabotage** 1. - 2. - 3. - 4. - 5. - **Explosives** - **Reasons Why Explosives becomes popular to the Saboteurs;** 1. 2. 3. **TYPES OF EXPLOSIVES** **According to their sensitivity** 1. - 2. - **Types of High Intensity Explosives** a. - b. c. d. e. - **Types of Stench Bomb** a. - b. - c. - d. - **Pilferage** - - - **Types of pilferage** 1. - - 2. - - **Pilferer** - **Methods used:** 1. 2. 3. 4. **Limiting factors of pilferage** a. b. c. **KLEPTOMANIAC** - - **Theft** - **Simple theft** - **Qualified Theft** - - **Shoplifter** - **CHAPTER 2** **PHYSICAL SECURITY** - Physical security measures help to combat the crime-related threats that both employees and outsiders pose to the organization. - If measures are properly planned, most potential intruders, whether employees or outsiders, should see that the risks of detection and punishment for attempting to penetrate a protected area are significantly greater than whatever they may gain. - security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). - Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property. **Physical security systems for protected facilities are generally intended to:** 1. 2. 3. - It is up to security designers, architects and analysts to balance security controls against risks, taking into account the costs of specifying, developing, testing, implementing, using, managing, monitoring and maintaining the controls, along with broader issues such as aesthetics, human rights, health and safety, and societal norms or conventions. Physical access security measures that are appropriate for a high security prison or a military site may be inappropriate in an office, a home or a vehicle, although the principles are similar. **PRINCIPLES OF PHYSICAL SECURITY** 1. 2. 3. 4. 5. **ELEMENTS AND DESIGNS OF PHYSICAL SECURITY** 1. Protective Barriers 2. Natural Surveillance 3. Protective Lighting/Security Lighting 4. Video surveillance 5. Access control **PROTECTIVE BARRIERS** **BARRIER** - **PURPOSES OF BARRIERS** 1. 2. 3. 4. 5. **TYPES OF PHYSICAL BARRIERS** 1. - 2. - 3. - 4. - 5. - **THREE LINE OF PHYSICAL DEFENSE** 1. - 2. - 3. - **PERIMETER BARRIER** - **INSIDE PERIMETER** - **OUTSIDE PERIMETER** - **PURPOSES OF PERIMETER BARRIER** 1. 2. 3. 4. 5. 6. **LAYERS OF SECURITY** 1. - 2. - 3. - 4. - **TYPES OF PERIMETER BARRIER** 1. 2. 3. **FENCES** - **TYPES OF FENCES** a. - - 1. 2. - 1. 2. b. - **KINDS OF FULL-VIEW FENCE** a. - b. - c. - - 1. 2. - 1. 2. **MINIMUM ACCEPTABLE REQUIREMENTS FOR FENCE USED AS SECURITY BARRIERS** 1. - 2. - 3. - 4. - 5. - 6. - 7. - 8. - 9. - 10. - **WALLS** - - - **SPECIFICATIONS FOR INSTALLATION OF WINDOWS** 1. Window should be protected with grill, wire, heavy screening or chain-link fencing. In cases where caution dictates, they may be needed as emergency exits beyond strut requirement of fire law, consideration should be given to hinging and padlocking with protective coverings. 2. It can also be permanent to screen window to protect against their use as a means by which employees can temporarily dispose goods for later recovery. The smallest goods being manufactured or available on the premises, the smaller the mesh in the screen must be to protect against all kind of pilferage. 3. Any window less than 18 feet from the ground or less than 14 feet from trees, poles or adjoining buildings should receive same protective treatment such as iron grills or screens. **SPECIFICATION FOR INSTALLATION OF DOORS** 1. Door hinges should be installed with the screws concealed and with the hinge pins either welded or flanged to prevent removal. 2. Door must be or heavy construction, hung in a form sufficiency strong to avoid prying. 3. Hinges must be either located within the door-way or screws or bolts must be set in such a way that they cannot be removed. 4. If doors contain glass panels they should be protected by grills or screens. 5. It is essential that the jamb be of a strong construction as the door or the lock. 6. The locking bolt must be at least an inch into the jamb for security and to help prevent spreading. 7. Cylinder should be flush or inset to prevent their being wrenched out or popped. **BODIES OF WATER** - - **Types of Perimeter Barrier Openings** 1. - 2. - 3. - 4. - **Additional Protective Measures** 1. - 2. - 3. - 4. - 5. - 6. - **PROTECTIVE LIGHTING** Protective lighting provides a means of continuing, during hours of darkness, a degree of protection approaching that maintained during daylight hours. This safeguard also has considerable value as a deterrent to thieves and vandals and may make the job of the saboteur more difficult. It is an essential element of an integrated physical security program. Depending on the nature of the facility, protective lighting is designed to emphasize the illumination of the perimeter. In the case, it must produce sufficient light to create a psychological deterrent to intrusion as well as to make detection virtually certain in the event an entry is made. It must avoid glared that would reduce the visibility of security personnel, while creating glared to detect intruder. This is particularly important where the facility is within streets, highways or navigable waterways. The system must be reliable and designed with overlapping illumination to avoid creating unprotected are in the event of individual light failure. It must be easy to maintain and it must secure itself against attack. Poles should be within the barrier power lines and the switch box must be protected. It is the single most cost-effective deterrent to crime because it creates a psychological deterrent to intruders. Security lighting is another effective form of deterrence. Intruders are less likely to enter well-lit areas for fear of being seen. Doors, gates, and other entrances, in particular, should be well lit to allow close observation of people entering and exiting. When lighting the grounds of a facility, widely distributed low-intensity lighting is generally superior to small patches of high-intensity lighting, because the latter can have a tendency to create blind spots for security personnel and CCTV cameras. It is important to place lighting in a manner that makes it difficult to tamper with (e.g. suspending lights from tall poles), and to ensure that there is a backup power supply so that security lights will not go out if the electricity is cut off. **PURPOSES OF PROTECTIVE LIGHTING** a. b. c. **GENERAL CONSIDERATION IN PROTECTIVE LIGHTING** 1. 2. 3. 4. 5. 6. 7. **PRINCIPLES OF PROTECTIVE LIGHTING** 1. 2. 3. 4. **TYPES OF PROTECTIVE LIGHTING** 1. **Stationary Luminary Lighting** - a. - - - b. - - - - - 2. **Standby lighting** - 3. **Movable lighting** - 4. **Emergency Lighting** - **GENERAL TYPES OF LIGHTING SOURCES** 1. - 2. - 3. - 4. - 5. - **Other Types of Lighting Sources** 1. - 2. - **Types of Lighting Equipment** 1. - - - - 2. - 3. - 4. - **Areas to be Lighted** 1. - 2. - 3. - 4. 5. - **Lighting Maintenance** - **PROTECTIVE ALARMS** Another safeguard used to assist security to competent if not to supplement physical security is an array of alarms. These alarms of various types and cost can be installed indoors or outdoors. Basically, alarm systems are designed to alert security personnel to consummated or attempted intrusion into an area, building or compound. Each type of alarm is activated in the event that an intruder tampers the circuity, a beam or radiated waves. In short, intrusion alarms can be electrical, mechanical or electronic. Alarm systems can be installed to alert security personnel when unauthorized access is attempted. Alarm systems work in tandem with physical barriers, mechanical systems, and security guards, serving to trigger a response when these other forms of security have been breached. They consist of sensors including perimeter sensors, motion sensors, contact sensors, and glass break detectors. However, alarms are only useful if there is a prompt response when they are triggered. In the reconnaissance phase prior to an actual attack, some intruders will test the response time of security personnel to a deliberately tripped alarm system. By measuring the length of time it takes for a security team to arrive (if they arrive at all), the attacker can determine if an attack could succeed before authorities arrive to neutralize the threat. Loud audible alarms can also act as a psychological deterrent, by notifying intruders that their presence has been detected. In some jurisdictions, law enforcement will not respond to alarms from intrusion detection systems unless the activation has been verified by an eyewitness or video. Policies like this one have been created to combat the 94--99 percent rate of false alarm activation in the United States. **DEFINITIONS OF TERMS** 1. - 2. - 3. - 4. - 5. - 6. - 7. - 8. - 9. - 10. - 11. - 12. - 13. - 14. - 15. - 16. - 17. - 18. - 19. - 20. - **TYPES OF ALARM SYSTEM** 1. - 2. - 3. - 4. - 5. - 6. - 7. - 8. - 9. - 10. - **TYPES OF PROTECTIVE ALARM DETECTION SYSTEM** 1. - 2. - 3. - 4. - 5. - 6. - **THREE PARTS OF AN ALARM SYSTEM** 1. 2. 3. **ALARM** - **KINDS OF ALARMS (AUTOMATICALLY ALARMED SYSTEMS)** 1. - 2. - 3. - 4. - 5. - **Concept of Alarm** - **TELECOMMUNICATIONS** - 1. - 2. - **PUBLIC TELECOMMUNICATIONS ENTITY** - 1. - 2. - 3. - 4. - 5. - 6. - **THREE ESSENTIAL COMPONENT OF COMMUNICATION SECURITY** 1. - 2. - 3. - **PROTECTIVE LOCKS AND KEYS** The best defense against lock picking and making of key by impression is the installation of special pick-resistant, impression-resistance lock cylinders. Generally speaking, locks are the cheapest security investment that can be made. Locking device is simply a mechanism that extends the door or window into a wall that hold them. Therefore, the wall or the door itself is weak or easily destructible, the lock cannot be effective. It must be recognized that any lock will eventually yield to attack. They must be thought of only as delaying services. But this delay is of primary importance. The longer the intruder is stalled in an exposed position while he works to gain entry, the greater the chances of discovery. Even the highest locking devices are only one part of door and entrance security locks, cylinders, door and frame construction, and key control are inseparable element; all must equally be effective. If one element is weak, the system will breakdown. **LOCK** - **PETERMAN** - **TYPES OF LOCKS** 1. - 2. - 3. - 4. - 5. - 6. - **OTHER TYPES OF LOCKS** 1. - 2. - 3. - 4. - 5. - **TYPES OF KEYS** 1. - 2. - 3. - 4. - **KEY CONTROL** - 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. a. b. c. d. e. f. g. h. 13. **Methods Used to Maintain Effective Key Control** 1. - 2. - 3. - 4. - 5. - **STATUTORY PROHIBITION OF KEY:** **ART. 304. Possession of Picklocks or similar tools** - **ART. 305 FALSE KEY** - a. b. c. **LOCK PICKING** - **SOME TYPES OF PICK LOCKS** 1. - 2. - 3. - 4. - 5. - 6. - 7. - 8. - 9. - 10. - 11. - **MASTER KEYING SYSTEM** - **MAISON KEYING SYSTEM** - **PROTECTIVE CABINET** - The final line of defense at any facility is in the high security storage area where records, papers, plans or cashable instruments, previous metals or other especially valuable assets are protected, these security cabinets will be of a sized and quantity which the nature of the business dictates. **Three Types of Security Cabinet** 1. - 2. - 3. - **VIDEO SURVEILLANCE** - Surveillance cameras can be a deterrent when placed in highly visible locations and are useful for incident assessment and historical analysis. - For example, if alarms are being generated and there is a camera in place, security personnel assess the situation via the camera feed. In instances when an attack has already occurred and a camera is in place at the point of attack, the recorded video can be reviewed. Although the term closed-circuit television (CCTV) is common, it is quickly becoming outdated as more video systems lose the closed circuit for signal transmission and are instead transmitting on IP camera networks. - Video monitoring does not necessarily guarantee a human response. A human must be monitoring the situation in real time in order to respond in a timely manner; otherwise, video monitoring is simply a means to gather evidence for later analysis. However, technological advances like video analytics are reducing the amount of work required for video monitoring as security personal can be automatically notified of potential security events. **ACCESS CONTROL** - Access control methods are used to monitor and control traffic through specific access points and areas of the secure facility. - This is done using a variety of systems including CCTV surveillance, identification cards, security guards, biometric readers, and electronic/mechanical control systems such as locks, doors, turnstiles and gates. - - - - - - - **CHAPTER 3** **SECURITY GUARD FORCE SYSTEM** **SECURITY GUARD FORCE** - **ESSENTIAL QUALITIES OF SECURITY GUARDS** 1\. Alertness 2\. Judgment 3\. Confidence 4\. Physical Fitness 5\. Self-control **TYPES OF SECURITY GUARD FORCE** 1. - **Advantages** a. b. c. d. e. f. g. **Disadvantages** a. b. c. d. e. 2. - **Advantages** a. b. c. d. e. f. **Disadvantages** a. b. c. 3. - - **SECURITY GUARD** - - - **Security Guard Functions/Guarding Procedures** 1. 2. 3. 4. 5. 6. 7. **CHAPTER 4** **SALIENT FEATURES OF PRIVATE SECURITY AGENCY LAW (RA 5487)** **AND OTHER LEGAL BASIS** - The act that regulates the organization and operation of private detective, watchman and security guard agencies in the Philippines. Approved on October 3, 1972. - **SCOPE OF THIS ACT** - - **PADPAO (Philippine Association of Detective and Protective Agency Operators)** - - **PNP SAGSD (Philippine National Police Agency Guard Supervising Division)** - - **PNP SOSIA (Philippine National Police Supervisory Office for Security and Investigation Agencies** - - - - - - - 1. - 2. - 3. - 4. - 5. - **PNP SOSIA ORGANIZATIONAL STRUCTURE** **DEFINITION OF TERMS** 1. - 2. - 3. - 4. - 5. - 6. - 7. - 8. - 9. - 10. - 11. - 12. - 13. - 14. - 15. - 16. - 17. - - **WHO MAY ORGANIZE A SECURITY OR WATCHMAN AGENCY? (SECTION 4)** 1. 2. - - - **QUALIFICATION OF AN OPERATOR OR MANAGER OF A SECURITY AGENCY** 1. 2. 3. 4. - **DISQUALIFICATIONS** - An elective or appointive government employees who may be called upon on account of the function of their respective offices in the implementation and enforcement of the provision of RA 5487 and person related to such government employees by affinity or consanguinity in the third civil degree shall not hold any interest, directly or indirectly in any security guard agency. (As amended by Pres. Decree No. 11.) **LIMITATIONS AND PROHIBITIONS ON A SECURITY AGENCY** 1. 2. 3. 4. 5. 6. **WHO CAN ISSUE RULES AND REGULATIONS TO CARRY OUT THE PURPOSE OF RA 5487?** - the chief PNP, in consultation with the Philippines Association of Detective and Protective Agency Operators. **WHAT ARE THE PENAL PROVISIONS FOR VIOLATION OF RA5487 OR ITS IMPLEMENTING RULES?** 1. 2. **BASIC QUALIFICATION OF A SECURITY GUARD** 1. 2. 3. 4. 5. 6. - - - - - - - - - - - - - - - - Provided, That foreigners who are already employed as watchmen or security guards prior to the approval of this Act shall not be subject to the above-mentioned requirements: Provided, further, That veterans shall be given priority in employment as security guard, watchman or private detective: And provided, finally, That person convicted of any crime involving moral turpitude shall not be employed as security guard, watchman or private detective. - **EXEMPTIONS FOR PRE-LICENSING TRAINING** 1. 2. - **RIGHTS OF SECURITY GUARDS AND OTHER PRIVATE SECURITY PERSONNEL (DEPT. ORDER 150-16)** a. b. c. d. e. f. - **MAIN AND BRANCH OFFICES** - - **SECURITY SERVICE CONTRACT** - - **TENURE OF SECURITY GUARD** - 1. 2. 3. 4. 5. 6. - **PAYROLL** - **EMPLOYMENT STATUS** - **EMPLOYER-EMPLOYEE RELATIONSHIP** - - **PROBATIONARY EMPLOYMENT** - - **REGULAR EMPLOYMENT** - - **QUALIFICATIONS FOR SECURITY OFFICER** 1\. Filipino Citizen 2\. holder of Baccalaureate degree 3\. Physically and mentally fit 4\. Retired personnel of the PNP or AFP 5\. Has graduated from security officer training course 6\. Must not possess any of the disqualification listed in sec 2, rule 11. - **QUALIFICATIONS OF SECURITY CONSULTANTS** 1. 2. - **MINIMUM CAPITALIZATION AND BANK DEPOSIT REQUIRED FOR NEW APPLICANTS FOR PRIVATE SECURITY AGENCY LICENSE TO OPERATE:** - - - **WHERE TO FILE?** - - **WHO WILL ENDORSE APPLICATIONS?** - - **GRADUATE SCALE OF LICENSE FOR PRIVATE SECURITY/DETECTIVE AGENCY** 1. 2. - **POSSESSION OF LICENSE** - **PAYMENT OF FEES AND LICENSE** - a. b. - a. b. - **SURETY BOND** Secured at any Reputable Insurance Company a. b. c. d. - **No Regular License shall be granted to any Private or Company Security force unless it has under its employ the following number of duly licensed security guards;** a. b. **USE OF UNIFORM, EQUIPMENT AND PARAPHERNALIA** - - a. b. c. d. e. - a. b. c. d. - a. b. c. d. e. - **USE OF UNIFORM OF PRIVATE SECURITY PERSONNEL (SOSIA PRIVATE SECURITY PERSONNEL UNIFORM AND EQUIPMENT BOARD RESOLUTION NO. 2017-001)** - - 1. - - a. - b. - - - - - - - - - - - - c. - d. - e. - - - a. - b. - c. - d. - e. - - a. - b. - c. - d. - e. - - a. b. - - - - - - - - a. b. c. d. 2. - a. b. c. - a. - - - a. b. c. b. - c. - d. - 3. - - - - - - - - - a. - b. - c. - d. - - a. - b. - c. - d. - - a. - b. - c. - d. - - - - - - - - - - - 4. - a. - b. - c. - d. - e. - ![](media/image2.png) **USE OF FIREARMS AND EQUIPMENT** - **ALLOWED FIREARMS TO BE CARRIED BY SG'S** a. b. c. d. - **NOTE** - - **CONDITIONS** 1. - - 2. 3. - **EXCEPTIONS** - - **LIMITATIONS IN CARRYING OF FIREARMS** - The Firearms issued shall be carried by SG's only during tour of duty while in proper uniform and with in the compound of the establishment where he is assigned except when he is escorting big amount of cash or valuables, and upon prior coordination with the nearest police station. - **DUTY DETAIL ORDER** - - a. b. c. d. e. f. g. h. i. - **MISSION ORDER** - Research work - Justification for confiscations of firearms. - **STOCKING OF AMMUNITION** - - **RANKS AND POSITION** 1. **SECURITY MANAGEMENT STAFF** a. - b. - c. - 2. **LINE LEADERSHIP STAFF** a. - b. - c. - 3. **SECURITY GUARD** a. - b. - c. - **4. Security Consultant** - - **ARREST BY A SECURITY GUARD** - 1. 2. 3. - **CLASSIFICATION OF TRAINING** 1. - Pre-licensing Course (150 hours) 2. - 3. - 4. - 5. - **SUBJECT AREAS OF STUDY FOR TRAININGS** 1. 2. 3. 4. 5. 6. **UTILIZATION OF AGENCIES DURING EMERGENCY** 1. - 2. **PROHIBITIONS** 1. 2. 3. **INSPECTION** 1. - 2. - **AWARDS AND DECORATIONS FOR SECURITY PERSONNEL** 1. Medalya ng Kagitingan (Blueguards medal of Valor) - 2. Medalya ng Katapatan sa Paglilingkod (Blueguards distinguished service medal) - 3. Medalya ng Katapangan (Bluegaurds Bravery Medal) - 4. Medalya ng Pambihirang Paglilingkod (Bluegaurds Special Service Medal) - 5. Medalya ng Kadakilaan ( Bluegaurds Heroism Medal) - 6. Medalya ng Katangi-tanging Asal (Blueguards Special action medal) - 7. Medalya ng Kasanayan (Blueguards Efficiency Medal) 8. Medalya ng Papuri (blueguards Commendation Medal) - 9. Medalya ng Pagtulong sa Nasalanta (Blueguards Disaster Relief and Rehabilitation Medal) - 10. Medalya ng Sugatang Magiting (Blueguards Wounded Medal) 11. Letter of Commendation -- any good activity done - **WORK STOPPAGE** - **STRIKE** - **LOCK OUT** - **Research Works:** - Research RA 5487 Policies in times of lock outs - Eleven GeneralSecurity guards creed **CHAPTER 5** **PERSONNEL SECURITY INVESTIGATION** **PERSONNEL SECURITY** - - **OBJECTIVES OF PERSONNEL SECURITY** 1. 2. 3. **KEY FUNCTIONS OF PERSONNEL SECURITY** 1. 2. 3. 4. 5. **PERSONNEL SECURITY INVESTIGATION** - A process of inquiry into the character, reputation, discretion, integrity, morals and loyalty of an individual to determine the suitability for appointment or access to classified matter. **GENERAL TECHNIQUES OF PERSONNEL SECURITY INVESTIGATIONS** 1. **Background Investigation (BI)** - - a. b. c. d. e. f. - a. b. c. d. e. f. g. h. i. j. k. l. m. n. o. p. q. r. s. - a. b. c. d. - a. b. c. 2. **Positive Vetting** - 3. **Profiling** - 4. **Deception Detection Techniques** - 5. **Financial and Lifestyle Inquiry** - 6. **Undercover Intelligence** - 7. **Exit Interview** - - **PERSONNEL IDENTIFICATION AND MOVEMENT CONTROL** - **TYPES OF PERSONNEL IDENTIFICATION** 1. - 2. - **SYSTEM OF EMPLOYMENT OF PERSONNEL CONTROL IDENTIFICATION** 1. - 2. - 3. - 4. - 5. - 6. - **VISITOR'S CONTROL** 1. - 2. - 3. - 4. - 5. - **PACKAGE MANAGEMENT CONTROL** 1. 2. 3. **UTILITY AND MAINTENANCE PERSONNEL** - **Photography** - **VEHICULAR MOVEMENT CONTROL AND IDENTIFICATION** 1. 2. 3. 4. 5. 6. **SECURITY EDUCATION** - **OBJECTIVES** 1. 2. 3. 4. 5. 6. **PHASE OF SECURITY EDUCATION PROGRAM** 1. - 2. - 3. - 4. - 5. - **CHAPTER 6** **DOCUMENT AND INFORMATION SECURITY** 1. **Document Security** - 2. **Classified Information** - 3. **Classified Matter** - 4. **Classify** - 5. **Declassify** - 6. **Reclassifying or Regarding** - 7. **Upgrading** - 8. **Compartmentation** - 9. **Need to Know** - 10. **Unauthorized** - 11. **Compromise** - 12. **Damage to National Security** - **PURPOSE OF PROTECTING CLASSIFIED MATERIALS** 1. 2. 3. **KINDS OF DOCUMENTS** 1. - 2. - 3. **DOCUMENT OR INFORMATION CYCLE** 1. 2. 3. 4. 5. 6. 7. **CATEGORIES OF DOCUMENT** 1. - - - - - 2. - - 3. - - - 4. - - **THREE SECURITY CONCEPTS** 1. 2. 3. **FOUR TYPES OF CLASSIFIED MATTERS** 1. - 2. - 3. - 4. - **PROPRIETARY INFORMATION** - **2 TYPES OF PROPRIETARY INFORMATION** 1. - 2. - **CHAPTER 7** **RISK ANALYSIS and SECURITY HAZARD** 1. **Risk** - 2. **Hazards** - 3. **Security hazards** - 4. **Risk Management** - 5. **Risk Analysis** - 6. **Adversary** - 7. **Asset** - 8. **Vulnerability** - 9. **Countermeasures** - 10. **Probability** - 11. **Criticality** - 12. **Relative criticality of operation** - - 13. **Relative Vulnerability** - - The extent and degree of risks to security is dependent on relative criticality of operation and relative vulnerability. **RISK MANAGEMENT ALTERNATIVES AND STRATEGIES** 1. **Risk Avoidance** - 2. **Risk Reduction** - 3. **Risk Spreading** - 4. **Risk Transfer** - 5. **Risk Self-Assumption** - **SECURITY HAZARDS** - **TYPE OF HAZARDS** 1. - a. b. c. d. e. 2. - a\. Carelessness -- accidents and dissatisfaction b\. Disloyalty -- subversion and sabotage c\. Espionage, pilferage and theft d\. Vandalism **CHAPTER 8** **SECURITY SURVEY, INSPECTION AND SECURITY PLANNING** - The basic instrument for determining security vulnerability is the security survey. Most description of security surveys refers principally to checklist, audits or inventories of security conditions. **Security System** - **Survey** - **Security Survey** - **Entrance Conference** - **Exit Conference** - **Security Inspection** - **TYPES OF SECURITY INSPECTION** 1. **Continuous Inspection** - 2. **Formal Inspection** - 3. **Informal Inspection** - 4. **Structured Inspection** - 5. **Unstructured Inspection** - **Security Investigation** - **TOOLS OF INVESTIGATION** 1. - 2. - 3. - 4. **SECURITY PLANNING** **Security Planning** - is a corporate and executive responsibility. It involves knowing the objectives of security and the means and methods to reach those objectives or goals must then be evolved. In short, security planning is a decision-making process. **Contents of Security planning** 1. - 2. - a. b. c. 3. - 4. - 5. - **REFERENCES** **Electronic Books/Sources** A. Industrial Security Management retrieved from B. Fence retrieved from C. Physical Security retrieved from D. Private Security Agency Law retrieved from [file:///C:/Users/user/Desktop/1(20-21)/LEAD%203%20Introduction%20to%20Industrial%20Security%20Management/Learning%20Materials/Notes/RA%205487%20summary.pdf](C:/Users/user/Desktop/1(20-21)/LEAD%203%20Introduction%20to%20Industrial%20Security%20Management/Learning%20Materials/Notes/RA%205487%20summary.pdf) E. RA 5487 retrieved from F. PD 1919 retrieved from G. PD 11 retrieved from H. Departmental Order No. 150 Series of 2016 retrieved from I. PD 442 retrieved from J. PNP SOSIA Patch retrieved from **Books** A. Ajero. (2014). Industrial & Corporate Security Management. Quezon City: Wiseman's Books Trading, Inc. B. The revised guidelines governing the employment and working conditions of security guards and other private security personnel in the private security industry (2016), Department order no. 150. **Other Resources** A. SOSIA Private Security Personnel Uniform and Equipment Board Resolution no. 2017-001