Full Transcript

INDUSTRIAL SECURITY MANAGEMENT Introduction The need for security of lives and properties is a old as a history of man. Man’s existence is characterized by constant exposure to dangers, those hazards caused by nature , and those dangers posed by fellowman. The means and methods of human...

INDUSTRIAL SECURITY MANAGEMENT Introduction The need for security of lives and properties is a old as a history of man. Man’s existence is characterized by constant exposure to dangers, those hazards caused by nature , and those dangers posed by fellowman. The means and methods of human beings to secure themselves are also as old as the history of policing. It is innate to human beings to seek security and protection from dangers for them to survive and continue existing free from anything that may cause damage to their properties or may result to injury or death. in the ancient world humans learned to unite themselves into clans , then into tribes and later into bigger communities, as they organized themselves their primary reason is security of their life. Their livelihoods and security of their existence. Initially humans were only worried of the natural causes of dangers such as earthquakes , typhoons , lighting , and attacks from animals later. Other tribes become their enemies as other tribes and other groups of people compete for survival. Most of historical accounts identified the assigning of all able-bodied males of a tribe in guarding their crops and their territory against animals’ attack as the earliest form of security designed by the ancient tribesmen. Later , these able – bodied men took the cudgels in warding off other tribesmen who attacks them. They used variety of means to protect themselves such as : weapons out of wood, stones and then later those made of metal ; traps or devices designed to catch an animal and kill it or prevent it escaping like a concealed pit or a mechanical device that springs shut; and using barriers like wooden fences, natural barriers such as cliff and rivers. In the 18th century the agricultural revolution or the improve agricultural methods paved way for the massive growth in crop production , however the increased of population as microsoft encarta states, had the greatest difficulty in meeting the increased demand of food. It has been noted that lack of foo leads people to steal, hence , security is needed for those who have plenty of stocks. Industrial revolution in 19th century which marks the need for greater security during this period agriculture was no longer the primary means of livelihood but the enterprises dealing with productions, the inventions of different machineries paved way to industrial development. This economic progress started in great britain but countries like germany , united states o america and japan were also having their own industrial revolution contemporaneously with great britain. in Great britain people in the rural areas began flocking in the cities particularly London. The industrial revolution freed people from farm work for city jobs. As the population of england cities grew, crime increased and disorders became more frequent. Consequently , public demand for government to control crime grew louder. Certainly , the influx of the rural people to the cities resulted to crime increase particularly those against property europes industrial revolution attracted the peasant class from the countryside into the towns and cities. The ensuing crime wave forced law enforcement officials to take drastic measured as a result. Thief catchers were recruited from the rittraff of the streets to aid law enforcement offiicials in locating criminals. This could be the onset of hiring private individuals to do security works by catching criminals. In the united states , the new settlers in the west were exposed to the outlaws. Violent crimes were more frequent in the mining camps and cattle towns. The rapid growth of cities produce violence ,crime and vice activities that demonstrated a breakdown of social order in small communities. Further because of the lack of effective law enforcement In rural areas however. People banded together on their own to investigation crimes and apprehended perpetrators. Vigilantes in the mining camps would conduct trials and even execute some of the most dangerous offenders. Cattle ranchers would often hire range detectives to capture rustlers. As a result some business firms emerged such as the famed PINKERTON’S DETECTIVE AGENCY’ offered to protect property and pursue offenders for a fee;. Allan Pinkerton (1850) A cooper from scotland and the Chicago Police Departments first detective established one of the oldest, private security forces in the United States, In the Philippines HACENDEROUS or owners of large tract of lands often hire farm workers who often double protectors of the property against cattle rustlers and robbers. With the entry of american mining industries , the american companies started hiring armed security personnel. And in 1950’s hired security personnel were already widespread after the restoration of the country after world war II. There were no strict regulations yet during that period. Security workers then were still under the city or town mayors who in turn issue working permits to those wanting to be employed as a security guards. Security and detective agency also began to prosper and with no strict regulations , many security guards were convicted of violent crimes. The creation of PADPAO Or PHILIPPINE ASSOCIATION OF DETECTIVE AGENCY OOPERATORS in 1958 – with the aim of making itself a freely self governing. Self regulating and self-policing. June 13, 1969 ,( R.A 5487) or known as ‘’ Private Security Law’’ was born. today many college graduates particularly criminology graduates are employed in the security business ranging from security guards and watchmen to security supervisors and managers. The number of persons in the industrial security even surpassed the more than 125,000 The security guards now are regarded as a closed partner of the PNP and AFP combating ciminality in the country. June 13, 1969 (R.A 5487) - The Private Security Agency law , this law was singed by President Ferdinand E. Marcos. In this law was assigned the most important role of security guard force in assisting the police in its mission to safeguard lives and properties,.. the Philippine Constabulary played a great role in supervising all Security Agency company guards forces and government guards. August 4, 1969 - creating the Philippine Constabulary Security and Investigation Agency Supervisory Office (PCSIASO). After 2 months another General staff memo was issued renaming PCSIASO to PCSOSIA. (PC Supervisory Office for Security and Investigation Agencies) June 29, 1970 the office was renamed to PC Supervisory Unit for Security and Investigation Agencies (PCSUSIA). However, the supervision was transferred to the National Intelligence and Security Agency ( NICA). P.D 100 on january 17, 1973 further amended sections 3,4,5,8 and 9 which permits the Philippine Constabulary to deputize any private detectives, watchman or security guard to assist in case of emergency disaster or calamity. Pursuant to Memorandum 07-S96 dated 31 May 1996 the Security Agencies and Guards Supervision Division (SAGSD) was created as one division under the Civil Security Group (CSG) to exercise supervisory authority and implement the Rules and Regulations embodied in RA 5487. Up to date, there are more or less 2000, registered security agencies operating in the Philippines 560,000 liscensed security personnel and 124, private security training institutions. SECURITY Module 1 Lesson 1.1 Security – is defined as the state or quality of being secured, freedom from fear or danger, assurance or certainty, to secure is to make safe or be protected. 1. State or feeling of safety- the state or feeling o being safe and protected. 2. Freedom from worry about possible loss – the assurance that something of value will not be taken away. 3. Safety- protection against attack from without or subversion from within. 4. Precautions to maintain safety- precaution taken to keep somebody or something safe from crime, attack or danger. 5. Guards – people or an organization entrusted with the job of protecting somebody or something , especially a building or institution against crime. Necessity of security security measures are inevitable or necessary for the attainment of the goals and objective of a certain individual group or organization. It follows that when an individual or organization is exposed to hazards, their productivity is adversely affected. The economic growth of the philippines for instance moving at a turtle-pace because of the impending internal external threats. internal threats such as communist aggression, and the muslim separatists. The extreme rightists such as the threat of military takeover of the government and the restless mass actions like strikes and protest y civil organization. External threats such as country’s incapability to defend itself in case of war. The role of Philippine National Police and other government law enforcement agencies. Industrial security is an despinsable part of philipine economy because it serves as a partner of law enforcement agencies in the country such as the PNP. The PNP takes responsibilities in the , supervision , control, and training and operations of security agencies and the issuance of license to operate and the license to practice the security profession. The PNP , and other government law enforcement agencies serve as the immediate law enforcement agency which assist security guards and security agencies in the performance of their security function such as accepting and processing crime reports submitted by the security agency. R.A 5487 - AN ACT TO REGULATE THE ORGANIZATION AND OPERATION OF PRIVATE DETECTIVE, WATCHMEN OR SECURITY GUARDS AGENCIES. Considering the significance of providing security to industries, the Philippine legislative body enacted this act governing the organization and management of private security agency company guard forces and government security forces. Hazards Refer to condition that may cause damage to property, injury or loss of life. It is also defined as ‘ exposure to the chance of loss or injury. Hazards are caused either by nature or by man himself. The role of security is to prevent or stop in causing unintentional or intentional damage to property, injury or loss of life. B. Security and safety measures Security work involves active and passive measures so those effective defense can be established against crime. A. active measure – are the physical barriers, security lightings, safe and vaults, locks and other devices and gadgets designed to detect and impede hazards. B. Passive Measures- are those that will deter man from committing such acts for fear of being caught, or charged in court or get dismissed. Examples of passive measures such as Security education programs, security investigation, and personal security checks. In the field of industrial security, various type of security are applied depending on the installation and the security needs of the installation, the type of security are the following. 1. Physical Security – broadest branch of security which is concerned with the physical measure adopted to prevent, unauthorized access to equipment, facilities, materials and document and to safeguard them against, espionage, sabotage damage and theft. It also encompasses protection of personnel from any criminal 2. Communication Security- it is the protection from the application of various measures that prevent or delay the enemy or unauthorized persons in gaining information through the communication system. This includes; a. Transmission security- a component of communications security that results from all measures designed to protect transmission’.From the interception, traffic analysis , ad imitative deception. b. Cryptographic security- result from the provision of technically sound crypto- system and their proper use. c. Physical security- providing of safeguards to equipment and materials from access by unauthorized persons. 3. Hotel security- it refers to the protection of assets, guest , personal effects and other properties In hotels, inns and other similar establishments. 4. Bank Security – a type of physical security protecting the asests, personnel and operation of a bank with special emphasis on the precaution and measures safeguard the cash and asset while the storage, transit , and during transaction. 5. Document Security- it is physical security involve the protection of documents and classified papers from loss access by unauthorized person, damage theft compromise through disclosure. 6. Personal security- this involves the protection of personnel especially ranking officials from any harm or kidnap, and other acts. Very important people security is a type of personal security. 7. Crises security – this is a part of VIP security involve hostage and kidnapping of VIP’S. 8. Industrial security- this type of security applied business groups engaged in industries like manufacturing, assembling research and development, processing warehousing and even agriculture. It is a form of physical security involving industrial plants and business enterprises where the personnel, processes , properties , and operations are safeguards. Use of protective barriers and security lighting, personnel movement control lock, and key management. 9. Operational security – this type of security that deals primarily with the protection of processes, formulation patents and other industrial and manufacturing activities from espionage, infiltration , loss , compromise photocopying. 10. Other special types of security ; a. Air cargo security – this is applied to minimize not prevent, losses of cargo during in transit , storage or transfer. b. School security- this is applied in response to the increase of violent crimes committed against students and school personnel , and school properties. c. Supermarket security- this is applied in response to the mushrooming of bazaars, marts, super malls , and the like. d. Personnel Security- this is involved in the background checks of individuals commensurate with the security requirements of their work. This also includes measures design to protect employees of an organization or business establishment. d,. Major divisions of industrial security 1. Physical Security – it is defined as those measures taken to prevent physical access or entry to entry to an installation or area by unauthorized. 2. Personnel security – this division of security is applied to check the background of person as well as the protection of company personnel against potential harmful acts or conditions. 3. Document and information security – this include every measure designed to safeguard company documents from intentional or unintentional harmful acts or against unauthorized disclosure of the information contained therein. Module 2 PHYSICAL SECURITY Physical Security It is concerned with the physical measures adopted to prevent unauthorized access to equipment, facilities, materials, and documents and to safeguard them against espionage, sabotage damage and theft. It also encompasses protection of personnel from any criminal act. A. Principles of Physical Security In every establishment, physical measures are needed to deny unauthorized access or intrusion because of the following; A. Enemy agents must access- acquisition of information is the ultimate results, and the means and form in which the information is obtained. B. There is no impenetrable barrier – for the unfriendly government or organization, they are willing to devote enough time , money , personnel, material and imagination in passing barriers. So physical security attempts to build defense by using a certain barrier. C. Defense in depth means barrier after barrier – in order that barrier could prevent unauthorized access and serve its purpose very well, there should be an integration of all barriers adopted in the installation. D. Surreptitious vs Non- Surreptitious Entry- * Surreptitious Entry – means not observable, it is not usually detected. * Non- Surreptitious Entry – is observable, note; observable or not, intruders usually find the right place and right opportunity to gain access, E. Each Installation is different – since each installation have different problems to overcome. Barriers Refer to any physical structure whether natural or man made capable of restricting , deterring, delaying or preventing illegal and unauthorized access to an installation. C. Two Generals types of Physical Security Barriers. 1. Natural Barriers - these are offered by nature which could obstruct or delay the passage way of potential intruder. These also refer to natural structures that serve as deterrents or obstruction to intruders such as, high canyon , desert , or bodies of water. 2. Man – Made Barriers - these are structural construction like fences, walls , floors, roofs, grills, bars, roadblocks, other physical means to deter or impede penetration. D. Specific types of Physical Security Barriers. 1. Natural Barriers include mountains, cliffs, canyon, ravens, seas , marshes, deserts or terrain difficult traverse. 2. Structural Barriers are those features constructed by man regardless of their original intent that tend to delay intruder. Examples of these are; walls , ceilings, door; fences. 3. Human Barriers include guards, charge of quarter office and shop workers, who stand between the intruder and the matter to be protected. 4. Animal Barriers are usually shepherd dogs trained for and used as guards. 5. Energy Barriers are usually electrical and electronic devices that could assist security personnel in detection intrusions , examples ; protected lighting , and intrusion devises. E. Levels of Physical Security 1. Minimum Security – is a system designed to impede unauthorized external activity such as simple intrusion to armed attack. 2. Low level Security – is a system designed to impede and detect some unauthorized external activity such as on small retail, store, storage warehouse. 3. Medium Security – is designed to impede , detect and asses most external activity and some unauthorized internal activity that range from simple shoplifting to conspiracy to commit sabotage, this includes, a. use of advance intrusion alarm system b. establishing of perimeter and perimeter barriers, c. use of unarmed guard. 4. High level Security is design to impede, detect and assess most unauthorized external and internal activities of certain prison, defense contractors , pharmaceutical companies and sophisticated electronics manufactures, this include ; a, Close Circuit Television ( CCTV) b. Perimeter alarm system c. High security lighting d. highly trained armed guards e. Control designs, and f. Coordination with local law enforcement agencies. , 5. Maximum Security includes the application of the following; a. Sophisticated alarm system; and b. On-site response force. Module 2 Perimeter Barriers a. Concept of Perimeter Barrier Perimeter barrier is a medium of structure which defines the physical limits of an installations or area to restrict or empede access thereto. It is any physical barrier used to supplement the protection of an inside or outside perimeter. Perimeter barrier also includes the utlization of security personnel. b. Line of Physical defense security managers and security personnel also consider the various lines of defense that could help delay or stop intruders. These are. 1. First Line include all perimeter barriers. 2. Second Line includes the building exterior and 3. Third Line includes those internal control measure, 1. first line of defense 2. Second line of defense 3. Third line of defense c. Perimeter Barrier Openings - in determining the appropriate perimeter barriers, security managers should not overlook the necessity of monitoring perimeter openings that could be used by intruders. These openings are;. Gates and doors should also be guarded or locked much as possible. Windows and similar openings should also be guarded or grills should be installed so as not be used by intruders whenever possible, windows and openings less than 18ft. Above the ground, roofs and ledges or less than 14ft. Directly or diagonally opposite uncontrolled windows in other walls, fire escapes, or other openings of 96 sq. Inches or larger should be grilled or have steel bar protections. Sidewalks elevators are elevated parts of the land near the perimeter barrier that provides access to areas within the perimeter barriers and should be locked and guarded. Utilities openings such as sewers, air intakes, exhaust tunnels which penetrate the barriers and which have cross-sectioned area of 96sq. Inches or more should be protected by bars , grills, etc. Clear zone is an unobstructed area maintained on both sides of the perimeter barriers. A clear zone of 20ft. Or more is desirable, between the barrier and extension structure and natural covers which may provide concealment or assistance to a person seeking unauthorized entry. Where it is impossible to have clear zones because, of property lives or natural features, an increment in the hieght of the fencing, increased guard coverage more security lightings or the use of intrusion device in that portion of the perimeter barrier should be done. a. A clear zone of 20ft, or more should exist between the perimeter barriers and exterior structures , parking areas and natural or man – made features. b. A clear zone of 50ft. Or more should exist between the perimeter barrier and structures within the protected areas except when a building wall constitutes part of the perimeter barrier. Types of Perimeter Barriers 1. Fences – are independent structures design to control physical and visual access between outside areas. Types of fences include solid fence and full- view fence a. Solid fence – is made of opaque material in such a way that visual access through the fence structure is denied. It is constructed with heavy materials such as bricks, stone and concrete and usually extended down into the ground to point view below the frost line. Advantage of solid fence. 1. Denies visual access of the installation to the intruder. 2. Denies the intruder the opportunities to become familiar with the personnel, activities, and the schedule movement of the guards. Disadvantage of solid fence. 1. Prevents the guards from observing the area around the installation. 2. Creates shadow which may be used by the intruders for cover and concealment. B. Full- View Fence, Is constructed in such a manner that visual access is permitted such as wire fence, through the fence structure. It is designed purely to control physical access between two area. Advantage of full – view fence. 1. Guards are able to keep the area surrounding installation under observation 2. Does not create any shadow, Disadvantage of full- view Fence 1. allows visual access to the installation 2. allows the intruder to get familiar with the movement and the time schedule of the guard patrols. Wire fence - Is a type of fence made of chain- link barbed wire concertina design with small opening not larger than 2 square inches and made of number guage wires or heavier , twisted and barbed salvage top and bottom. Specifications for using chain-link fence. It must be constructed of 7-feet material excluding top guard. It must be 9 guage or heavier Mesh openings are not be larger than 2 inches per side. It should be twisted and barbed salvage at top botom. It should be security fastened to rigid metal or reinforced concrete. It must reach below surface enough on soft grounds to compensate for shifting soil or sand. It must reach within 2 inches of hard ground or paving. Specifications for Using Barbed wire 1. Standard barbed wire is twisted, double-stand 12 gauge wire with 4 point barbs spaced on equal distance apart. 2. Barbed wire fencing must be firmly afixed to posts high excluding top guard. 3. Barbed wire fencing should not less than 7ft. High excluding top guard. 4. The distance between strands will not exceed 6 inches and midway between parts. Note ; Using concertina wire fence- concertina fences are formed like accordions. Building Walls Include walls , floor , roofs or their combination serve also as barriers and they should be of such construction to provide uniform protection just like wire- fencing. Bodies of Water Like river, lake, cataract, sea, pond or any bodies of water forming part of the wall , building or fencing should not be considered an adequate perimeter barrier. Additional security measure like wire, fence concrete walling, security patrolling and flood lighting at night may be necessary for the portions of the perimeter. Additional Protective Measures 1. Top Guard is an additional overhang of barbed wire placed on vertical perimeter fences facing upward and outward with 45 degree angle with three to four strands of barbed wires spaced 6-inches apart. This will increase protective height and prevent easy access. 2. Guard control stations- are normally provided at main perimeter entrance to secure areas located out of doors, and manned by guards on a full-time basis. Sentry stations should be near a perimeter for surveillance at the entrance. 3. Tower or Guard towers – are house-like structure above the perimeter barriers, it gives a psychological effect to violators. 4. Signs and Notice or control signs’’- should be erected where necessary In the management of unauthorized ingress and preclude accidental entry. It includes entry, ID, prohibited and exclusive areas signs. f. Perimeter Guards are employed in augmenting the existing perimeter security or perimeter barriers of a certain establishment. The 2 types of employing perimeter guard are; 1. Fixed Post – security guards are assigned in a particular place of the compound to guard and watch the area surrounding and. 2. Patrol ( roving ) –in this system, the security guard is required to walk and go around regularly around the company premises. Note; in conducting patrols, the guards should be instructed to traverse an irregular route, providing different intervals between visual or actual contact with any given point on the fence. What is Restricted Area? Any area in which personnel or vehicles are controlled for reasons of security. Importance of Restricted Area Restricted area is established to provide security for any installation or facilities and to promote efficiency of security operations and economy in the use of security personnel. Restricted area was established to permit different degrees of security within the same installation or facilities. Types of Restricted Area Exclusion area – restricted area contains security interest to TOP SECRET matters, and which requires the highest degree of protection Limited area control – restricted area in which a lesser degree of security is required than in an exclusion area but security interest would be comprised by uncontrolled movement Security Lightings or Protective Lightings Lesson 2.3 a. Basic Concepts of Security or protective lighting. Protective lighting provides a means of continuing illumination during hours of darkness, a degree of protection that is maintained during daylight hours , this safeguard also has considerable value as deterrent to thieves and vandals and may make the job of the saboteur more difficult. It is an essential element of an integrated physical security program. The system must be reliable and designed with overlapping illumination to avoid creating unprotected area in the event of individual light failure. Protective Lighting Needs at installation and facilities depend upon each situation and the areas to be protected. Each situation requires careful study to provide the best visibility practicable for such security duties as identification of badges and people at gates. Inspection of vehicles, prevention of illegal entry, detection of intruders outside and inside buildings and other structures, and inspection of unusual or suspicious circumstances. c. Characteristics of Protective lighting Using protective lighting is expensive and is an additional cost to the company or establishment therefore, consider the following in planning for protective lighting system. 1. Protective lighting usually requires less intensity than working light, except for identification and inspection at authorized portals and in emergencies. 2. Lightings needed may vary because each area of an installation or facility presents its particular problem. Based on physical layout, terrain , atmospheric and climatic Protective lightings significance to security forces. When properly employed, protective lightings offers the following. Reduction of the need for security forces. Personal protection for forces by reducing the advantages of concealment and surprise for a determined intruder. Relieved security forces could be used to better advantage elsewhere. Types of security lightings Stationary Luminary (continous) – most common type of consisting of service of fixed luminous to flood a given area continously with overlap, it may either be, a. Glare-projection type – the intensity is focused to the intruder while the observer or guard remains in the comparative darkness. The lighting is toward the approach of an entrance to an installation lights with reflectors increase glare. b. controlled lighting- the width of the lighted a top can be controlled and adjusted to suit the security needs. The lighting is focused on a pile of items rather than on the background. 2. Stand- by lighting – similar to continuous lighting but in turned on manually or by special device or other automatic means, when there is suspicion entry. 3. Movable Lighting – consists of stationary or portable manually operated search light which may be lighted continuously during hours of darkness or only as needed, 4. Emergency Lighting- a stand by lighting which can be utilized in the event of electrical failure either due to local equipment or commercial power failure. General type of lighting sources 1. Incandescent lights – have low initial cost and provide good color rendition. 2. Mercury Vapor lamps – emit purplish white color caused by an electric current passing through a tube of conducting and luminous gas. Considered more efficient and is widespread in exterior lighting. 3. Metal halide – is similar in physical appearance to mercury vapor but provides a light source of higher luminous efficiency and better color rendition 4. Fluorescent lamp – provides good color rendition, however it cannot project light over long distance thus it is not desirable as flood type lights. 5. High- pressure sodium vapor is introduced in 1965 for exterior lighting of parking areas, roadways, building and industrial and commercial installation. It emits golden white to pink color. 6. Low – pressure sodium vapor produces yellow color. 7. Quartz lamps – produce very bright light Types of lighting equipment 1. flood lights are used for outdoor security lighting include the illumination of boundaries fences , and buildings 2. street light produce diffused light rather than directional beam they are widely used in parking areas. 3. searchlights are incandescent lights that provide a type crime – related lighting system. Protective alarms ALARM- security device fitted to property especially a house or car o make a warning sound if a break- in or theft is attempted, Or sound of security or warning device, Functions of Protective Alarm Its function is to alert the security personnel for any attempt intrusion into a protected area, building or compound. Types of intrusion alarm system 1. Breaking an electrical circuit through a metallic foil or wire. - building or compound all possible point of entry can be wired by using electrically charge strips of tinfoil wire. Any actions that will move the foil or wire break the circuit and activate an alarm. 2. interruption of light beam of photo cell through a photoelectric or electric eye device – an invisible light beam is transmitted at a frequency of several thousand per second to a special receiver. 3. Vibration detection device- the vibration sensitive sensor is attached to walls, ceilings or floors of the protected areas, the sensor detects any vibration caused by attempted forced entry. 4. Space and motion detectors- these system derive their operating principle usually from physical phenomenon known as doppler effect. Constant sound waves in cubicle disturbed by an object will cause change of frequency and wave motion thereby causing an alarm to trigger. 5. Foot rail activator- placing the front of their foot to engage the activation bar placed on the floor in such a position that tellers may activate alarm. 6. Bill traps- or currency activation devices are usually placed in the tellers cash drawers and connected to the alarm system using a wire connector. When the currency is removed from the devices the alarm is activated. 7. Knee or thigh button- these are installed inside the desk or teller so they can be activated by knee or thigh pressure. They are commonly found in the location where personnel usually perform their duties from a seated position. 8.Foot Button- like the foot rail permit alarm activation safety while hands remain clear on view of the robber. 9. Double squeeze buttons – Pressure is required on both side of the device and therefore the probability of accidental alarm is reduced Types of Alarm detection system Central station system – a type of protective alarm system where the central station is located outside the installation it can be located in an agency and the installation is one of the subscribers. Proprietary system - this function in the same way as the central system except that is owned and leased by the subscriber and operated and located in the facility. This system is monitored locally. Local alarm system – consists of rigging up a visual or audible alarm near te object to be protected, a bell or light inidicates an attempted or successful intrusion. Auxiliary system – in this system installation circuits are led into local police or fire department by leased telephone lines usually by special arrangements. Local alarm- by- chance system – this is a local alarm system in which a bell siren is sounded with no predictable response, these system are used in residence or small retail establishment which cannot afford a respond system. Dial alarm system – this system is set to dial a predestined number when the aarm is activated. Fire alarm systems Are those devices installed to help detect fires or detect anything that causes fire such as smoke or unusual rising of temperature. Private fire protection system Automatic sprinkling system – an integrated network of hydraulically designed piping installed in a building, automatically discharge water when activated by heat or combustion products from a fire. Automatic sprinkler- which work by the increase of room temperature and which automatically operates the system to, put out fire, Types of Sprinkle system Wet Pipe system – the piping has water with pressure, and the water sprinkler will operate when head is opened and water will continue to flow until shut-off. Dry Pipe System – the pipes are filled with air under pressure which holds the water at a value located in a room, when sprinklers head goes into operation, air is released, trapping the dry pipe value and allowing water to flow through the system. 2. Fire Pumps – are mechanical device of supplying water which can be manual or motor- driven, these pumps are ideal when natural supplies of water are readily available, 3. Standpipes – are galvanized iron steel or plastic pipes located inside a building from the lowest to top floor with water under pressure for use in case of fire, 4. Fire Hydrant – is a mechanical device strategically located in an installation or street where fire hose is connected so that water pressure will be available to extinguish a fire, 5. Portable hand extinguishers – this is a fire fighting equipment which can be portable or in a cart that is used to put out fire. Protective locks and key control and protective cabinets. Lock – a mechanical, electrical, hydraulic or electronic device to prevent entry into building, room , container hiding place and to prevent the removal of items without the consent of the owner. Key – it is instrument for locking and unlocking, a metal bar with notches or grooves that, when inserted into lock and turned operates the locks mechanism, Peterman – an English term used to described a lock picker Types of locks Warded locks – this type of lock uses obstruction or wards to prevent the lock to open unless the correct key is inserted. Disc tumbler Locks- this kind of lock is composed of slotted rotating detainer. Lever tumbler locks – is a type of lock that uses a type of levers to prevent the lock to open. Pin tumbler lock – the pin tumbler mechanism depends for its security and a number of round pin or tumblers operating on a cylinder. Each tumbler pin is divided into two parts. The upper which flat on bolt and lower end fit the grooves or cuts in the pointed. Padlock – a portable and detachable lock having a sliding hasp which passes through a staple ring or the like and is then made fast or secured. Combination lock Is a sequence of numbers used to open the lock Code Operated Locks It opens by pressing the series of numbers in proper sequence. Electromagnetic locks Is a locking device that consists of electromagnetic and an armature plate. Card Operated Locks It is fitted with recording device which register time of use and the identity of the user. Types of Key Grand master key – it open all kinds of lock in building Master key – operates only one section floor or department of a building. Sub – master Key – a key that will open the lock of particular area. Key control Key cabinet – a cabinet will that will have to be of sufficient size to hold the original key to lock in the system. Key record – some administrative means must be set up to record code number of the locks and to whom the keys of specific lock was issued. Inventories- periodic account must be made of all duplicate and original keys on the hand of the employees whom they have been issued. Audits – an unannounced audit should be made of all the key control records and procedures by a member of the management. Daily reports – made by the person responsible for the key control from the personnel department. Other protective containers Safe – it is a metallic container used for the safekeeping of documents or small items in an office or installation. Vault This is heavily constructed fire and burglar resistance container usually a part of the building structure used to keep and protect cash, documents and negotiable instruments. File room It is a cubicle in a building in a building constructed a little lighter than a vault but bigger size to accommodate limited people to work on the records inside. Chapter 2 – Security Guard Forces Security Guard force it is a group of selected men, trained or grouped into functional unit for the purpose of protecting operational processes from those disruption which would impede efficiency or halt operation at a particular plant, facility, installation or special activity. The three security guard force Private Security Agency - refers to any person association, partnership, firm or private corporation, who contracts, recruits , trains , furnishes or post any security guard, Company Security force Is a security force maintained and operated by any private company or corporation for its own security requirements only. Government Security Unit Is a security unit maintained and operated by any government entity other than military and a police, which is established and maintained for the purpose of securing the office or compound and or extension of such government PADPAO – Philippine Association of Detective and Protective Agency Operators INC. This is the national association of all licensed security agencies and company security forces. License To Operate ( LTO ) It is the document issued by the CPNP or his duly authorized representative authorizing a person to engage in the occupation, calling or employment as a security guard or detectives, or a juridical person to establish engage,, direct manage or operate an individual or a private detective agency or private security agency or company security force after payment of the prescribed dues or fees. Application of liscense New applicants for PSA liscense shall obtain; A. A minimum capitalization of P1,000.000.00 and B. A minumum bank deposit of P500,000.00 Where to file ? To the office of the CPNP thru the CPNP –SOSIA (SAGSD) using form SAGSD form 01-94 and SAGSD form 02-94 respectively. Application form for license to operate- the application shall contain; 1. full name of applicant 2. his, age , civil status, and 3. residence and location of his business In case of corporation, association or partnership copies of the following shall be appended. A. certificate of registration with the SEC, and B.- by-laws and articles of incorporation Endorsement of application It shall be endorsed by the CSF district offices found in their respective regions for and in the name of the regional director. The following graduated scale shall be approved by the CPNP or his duly, authorized representative. PSAs with the temporary LTO having 200 or more but not exceeding 1000 shall be issued a regular LTO good for 2 years. New PSA shall be issued a temporary LTO good for year. PSAs with temporary LTO having posted 100 guards or more but not less than 200 shall upon expiration of such LTO shall be issued an extension period of 6 months. LTO of PSAs with less than 100 guards after one year shall not be renewed. PSA’s with cancelled or revoked LTOs shall cease to operate and within 7 days after having been duly notified of such cease to operate order, shall immediately deposit all its firearm with the FEO , or the nearest CSFD office for eventual turnover to the CSFC HQ Attn, C, FEO FED, CAMP CRAME, Thereafter the CSFC District concerned shall conduct an inventory of surrendered FAs shall be receipted copy furnished , CPNP SOSIA (SAGSD) otherwise the PSA concerned shall be liable under the PD 1866(R.A 8294). Who may organize and maintain a PSA and Private Detective Agency ? Any filipino citizen or corporation , association , partnership 100% Owned and controlled by filipino citizens Basic requirement of an operator or manager of agency Filipino citizen At least 25 years old College graduate and or A commissioned officer in the inactive service or Retired from AFP or PNP Graduated/ taken course in concepts and methods in industrial security and security management and or. Must have and adequate training or experience in security business. Good moral character- not having been convicted of any crime involving moral turpitude and Not suffering any of the following disqualification Dishonorably discharged from AFP/PNP or separated for cause from any government owned or controlled corporation Being mentally incompetent Being physically unfit Addicted to the use of narcotic and or prohibited drugs and or substances. Habitual drunkard and alcoholic Dummy of any foreigner and Elective or appointive government officials and employees who may be called upon on account of the functions of their respective office in the implementation and enforcement of the provision of R.A 5487 and any person related to such government employees by affinity or consanguinity in the third civil degree shall not hold any interest. Directly or indirectly in a security guard or watchman agency on account of the function of their respective offices in the implementation and enforcement of R,A 5487 PSA shall conform with the organizational structure, personnel, equipment training and clothing as provided for in R.A 5487 as amended and shall comply with the ff. 100 guards shall be contracted during the 1 st year operation and Minimum of 200 guards for the succeeding year. CSFs shall be organized and conform substantially to the organizational structure prescribed for private security agencies. GSU shall be organized to conform with the organizational structure of the said government firm but not contrary to the organizational structure as prescribe for GSUs. All agencies shall maintain a main office in their registered addresses. Branch offices- at least initial 10 guards during 1st year of operation. Until the 30 minimum guards in the 3rd year of operation That branch offices shall be registered with the CSFC district and regional PADPAO if any. Security service contract The money consideration to be paid by the client to the PSA. Number of hours of services per guard per day and the Guards salary to be received from the agency Tenure of security personnel – it shall be co- terminus with the service contract between PSA and the client. Grounds for termination of the guards services. Expiration of contract Revocation of license to exercise profession Conviction of crime involving moral turpitude. Loss trust and confidence Physical and mental disability and Any other violation of the pertinent rules and regulations of R.A 5487. Payrolls Name of security guards arranged alphabetically and numbered consecutively which shall be signed personally by the payees only after the receipt of the amount indicated therein. Separate payrolls for distant detachment/post shall be prepared. Payrolls shall be filed with the main office within 15 days after pay day. It shall be in accordance with the standard format as provided for by law. Security Personnel qualifications, fire arms and equipment Basic requisites for security guards – no person shall be licensed as security guard unless he possesses, the following A. filipino citizen B. high school graduate C. physically and mentally fit At least 18 years old but not more than 50 years old. Must not possess any of the disqualificatiion Desirable qualities of Security Guards Alertness Judgment Confidence Physical fitness Tactfulness Self-control Interest, loyalty , responsible and trusthworthy Exemptions from Pre-licensing – the following need to undergo pre-licensing training for security guards A. veterans and retired or honorably discharged military/police personnel possessing all the qualifications mentioned in the preceding section. B. ROTC advance / basic graduates and or equivalent in the AFP, PNP , CAFGU/CHDF. QUALIFICATION OF PRIVATE DETECTIVE A. holder of baccalaureate degree or bachelor of laws or B. B.S criminology graduate; or Graduate of criminal investigation coures offered by the then PC/INP, or the PNP or the NBI or any police training school or detective training with authorized recognized training center for security guard Advance reserve officers training coures or citizen military training( ROTC/CMT) graduate. Qualification for security officer Filipino citizen Holder of baccalaureate degree Physically and mentally fit Has graduated from a security officer training course, Retired personnel of the PNP/AFP Must not posses any of the disqualification enumerated in sec2 rule II. Qualification of security consultant No person shall be liscensed as security consultant unless in addition those prescribed in sec 5. of this rule, possesses any of the ff. Holder of a masters degree in either criminology, public administration, MNSA , industrial administration, or law. Must have at least 10 year experience in the operation and management of security business. UNIFORM, EQUIPMENT AND PARAPHERNALIA SEC VIII ; The basic equipment 1. Prescribed basic Uniform 2. Nightstick/ baton 3. Whistle 4. Timepiece ( synchronized) 5. Writing Pen 6. Notebook and duty checklist 7. flashlight 8. First aid kit 9. service firearm required Definition Industry – the term denotes ‘ earnest or constant application to work or business’’ or a special branch of productive work or the capital or workers employed in it. Industrial – this is defined as pertaining to or engaged industry, the word industrial may also mean , of industry or relating to. Used in or created by industry and or industry workforce or relating to or involving workers industry. Security- this term means state or quality of being secured, freedom from fear , danger assurance or certainty. Management – it is defined as the planning, deciding or exercising of control and supervision on some functions of the organization. Industrial security- the term may mean; security measures applied to business industries, or the business of providing security and protection to private individual business enterprises, or government and non- government industries Industrial security management – ‘ the skillful handling of the security and safe measures of business enterprises and industrial establishment.

Use Quizgecko on...
Browser
Browser