Download as pdf or txt
Download as pdf or txt
You are on page 1of 305

introduction to

INDUSTRIAL
SECURITY
CONCEPTS
P REP A RE D BY : P ROF . KA ROL IN A ERIKA A . BUTED,
RCRIM C CS
Definition Of Security
Generally, the meaning of security is a kind of state where people,
institution, authority or groups feel fully secured of feeling, free
from any threat or vulnerability from somewhere or someone in
his/her life, liberty, property or activity. It could be in physical,
psychological, social or economical form.
It is a state or quality of being secured, freedom from fear or
danger, assurance, certainty.
It is the degree of protection against danger, loss, and
criminals.
Protection against any type of crime to safeguard life and assets
by various methods and device.
Basic Principles Of Security
1.Life over Property - Security personnel must always choose life over any
expensive property.
2.There is no impenetrable barrier, which follows that
there is no absolute security.

First world countries spend billion of dollars in security intelligence and yet
they still experiencing attacks from insurgents, rebels and terrorist.
Despite of the strict security measures, establishments should not be
complacent since hazards and risks are everywhere and institution is
always a possibility.
Basic Principles Of Security
3. Each Installation is different.
Establishments has:
Different circumstances
Different set of values and priorities
Nature of business
Different environment and resources
Different security requirement.

Security programs must be based on the actual security


realities/situations.
Basic Principles Of Security
4. Security must be a designed - in - depth.
Defense - In - Depth
Provision for a security layers
Security layers must have a Prevention, Detection, and Response
system.

5.Security from within and without as the risk may come either
from both areas.
Dishonest employees
Employees must be involved in the security and safety prevention
programs of the company.
Basic Principles Of Security
6. Security is everybody's concern.
Regardless of rank, position, designation
Security protocols and systems must be imbued from rank and
file employees to high ranking officials of the company and not
just for the security personnel.

7. Compartmentation - Need to know basis.


TypesOf Security Measures
1.ACTIVE MEASURES - these involve the installation of
physical barriers, security lighting, use of vaults, locks and
others.

2.PASSIVE MEASURES -those that will deter man from


committing such act of fear of being caught, charge in
court or get dismissed, such as: security education,
programs, investigations, seminars, personnel security
check. (Psychological Approach).
Brief History Of Security in the Philippines
The private security business began on Marc 1, 1933 when the first
formally licensed private security agency, “SPECIAL WATCHMEN
AGENCY”, started operations

On May 30, 1958, the Philippine Association of Detective and


Protective Agency Operators was formally organized
Brief History Of Security in the Philippines
RA 5487 was passed on June 13, 1969 through the continuous lobbying
of the incorporators and officers of PADPAO, which set the standards
and minimum requirements for the operations of security agencies.

P.D. 11 was passed on October 3.1972, widening the coverage of RA


5487 to include security guards employed in logging concessions,
agricultural, mining and pasture lands;

P.D. 100 was issued on January 17,1973, broadening the coverage of


the security industry to include employees of the national or local
government or any agency who are employed to watch or secure
government building and properties.
Brief History Of Security in the Philippines
On August 1969, the Philippine Constabulary activated the Security
and Investigation Supervisory office or SAISO to supervise and
control the organization and operation of private security and
detective agencies nationwide;
Later it was renamed Philippine Constabulary Supervisory Office for
Security and Investigation Agencies or PCSOSIA.
With the passage of RA 6975, this unit was absorbed by the Philippine
National Police;
Later it was made into a division of the PNP Civil Security Group and was
renamed Security Agencies and Guard Supervision Division (SAGSD);
It was renamed to PNP Supervisory Office for Security Investigation
Agency (SOSIA).
Three Major Areas Of Security
1. PHYSICAL SECURITY

a system of barriers placed between the potential intruder


and the objects/matter to be protected. It is the broadest
branch of security, which is concerned with physical
measures adopted to prevent unauthorized access to
equipment, facilities, materials and documents and to
safeguard them against espionage, sabotage, damage and
theft.
Three Major Areas Of Security
OBJECTIVES:
a. To protect the organization’s asset;
b.To make access so difficult that an intruder will not dare attempt
penetration.

CONCEPTS:
a. Enemy agents will always seek access;
b. Surreptitious entry is the greatest hazard to security;
c. There are no impenetrable barriers;
d. Each installation is different.
Factors That Bring Insecure Condition
1. Threat — An indication of impending danger or harm;

2. Hazard — A chance of being injured or harmed;

3.Vulnerability — inability to withstand the effects of a hostile


environment-measure of how open an establishment to intrusion, attack or
injury.

4.Risk — is the potential that a chosen action or activity (including the


choice of inaction) will lead to a loss (an undesirable outcome). probability
of an event to happen that will lead to loss.
Security Hazard
An act or condition which results in a situation
conducive to a breach of the protection system
and the subsequent loss or compromise, or damage
to personnel, property or facilities.
Extent of Degree of Risk Dependent on:
1. RELATIVE CRITICALITY OF OPERATIONS - Is the importance
of the firm which reference to the national economy and
security.

2. RELATIVE VULNERABILITY - The susceptibility of the plant


or establishment to damage, loss, or disruption of operation
due to various hazard.
RISK MANAGEMENT ALTERNATIVES
1. RISK AVOIDANCE – removing the risk totally from the
business

2. RISK REDUCTION – minimizing the probability of the potential


loss

3. RISK SPREADING – spreading the risk through


decentralization to limit the impact (criticality) of the potential loss
RISK MANAGEMENT ALTERNATIVES
4. RISK TRANSFER – moving the financial impact of the
potential loss over to an insurance company.

5. RISK SELF-ASSUMPTION – planned assumption and


acceptance of the potential risk by making a deliberate
managerial decision of doing nothing about the threat or setting
aside resources for use in case of loss.
BARRIER - can be defined as any structure or physical device capable
of restricting, deterring, delaying, illegal access to an installation.

Generally, a barrier is use for the following purposes:


1. Outline the perimeter of the area to be secured;
2.Create a physical and psychological deterrent to unauthorized
entry;
3. Delay intrusion, thus facilitating apprehension of intruders;
4. Assist in more efficient and economical employment of guards;
5.Facilitates and impose the control of pedestrian and vehicular
traffic.
General Types Of Physical Barrier
1. NATURAL BARRIER — include mountains, rivers, seas,
desserts or terrain difficult to traverse. To be fully
effective, these barriers must be under surveillance of
guards.

2. STRUCTURAL OR MAN-MADE BARRIER — structural


constructions made by man like fences, walls, floors,
roofs, grill or other physical means to deter or impede
penetration.
Three Lines Of Defense
1. FIRST LINE OF DEFENSE — Perimeter barrier/fences
- a medium or structure which defines the physical limits of an
installation or area to restrict or impede access thereto.

2. SECOND LINE OF DEFENSE


— Doors, floors, windows, walls, roofs and grills.

3. THIRD LINE OF DEFENSE


— Storage system like steel cabinets, safes, vaults and
interior files.
Types Of Fences
1. SOLID FENCE — Constructed in such away that
visual access through the fence is denied. Its
disadvantage is that it denies the opportunity for
the intruder to become familiar with the personnel,
activities and the scheduled movements of the
security personnel. On the other hand, it prevents
the guards from observing the area around the
installation and it creates shadow that may be used
by the intruder for cover and concealment.

WALL — Masonry wall should have the same as the


chain linked and surrounded by the barbed wire as
top guard.
Types Of Fences
2. FULL VIEW FENCE — It is constructed in such a way that visual
access is permitted through the fence. Its advantage is that it
allows the security personnel to keep the surrounding of the
installation under observation. On the other hand, it allows the
intruder to become familiar with the movements the security
personnel.
Types Of Full View Fence
1. CHAIN LINK FENCE
Should be constructed minimum height of 7 feet
excluding top guard;
9 gauges or heavier; Mesh openings of not larger
2 inches per side;
Twisted;
Securely fastened to rigid material or reinforced
concrete;
Reach within 2 inches of hard ground or paving;
On soft ground, it must reach below surface
deep enough to compensate for shifting soil or
sand.
Types Of Full View Fence
2. BARBED WIRE FENCE - is a
type of fencing wire
constructed with sharp edges
or points arranged at
intervals along the strand(s).
It is used to construct
inexpensive fences.
Types Of Full View Fence
3. Concertina Wire or
Dannert Wire
— is a type of barbed wire or
razor wire that is formed in
large coils which can be
expanded like a concertina.

- Opened concertina wire is 50


feet long and 3 feet diameter.
Additional Protective Measure
1. Top Guard - an addition overhang or barbed wire place on
vertical perimeter fences facing upward and outward with a 45
degree angle with three to four strands of barbed wires space six
inches apart. This will increase the protective height and prevent
easy access.
Additional Protective Measure
2. Entry Stations - provided
at main perimeter
entrances to secure areas
located out of the doors, and
manned by guards on a full
time basis.
Additional Protective Measure
3. Towers - a house like
structures above the
perimeter barrier. Height of
tower increases the range of
observation during day and
night with artificial
illumination.
Additional Protective Measure
CLEAR ZONE
is an unobstructed area maintain on
both sides of the perimeter barrier.

20 feet or more between the


perimeter barrier and exterior
structure.

50 feet or more between the


perimeter barrier and structure
within the protected areas.
Additional Protective Measure
PROTECTION IN DEPTH

-In large open areas or ground, where fencing or


walling is impracticable and expensive, warning
signs should be conspicuously placed.

- The dept itself is protection.


Additional Protective Measure
4. Signs and Notices -
erected where necessary
in the management of
unauthorized ingress and
preclude accidental entry.
Security Lighting
SECURITY LIGHTING - Provides sufficient illumination to areas during hours
of darkness.

PURPOSES OF SECURITY LIGHTING


1.It improves visibility so that intruders can be seen, identified and
apprehend;
2. It gives psychological fear, which serves as a deterrent to thieves,
pilferers, trespassers, and sabotage;
3.It makes easier. The routine of work of guards in identifying employees,
vehicles during night time;
4. If placed in certain areas, may even reduce the number of stationary
guards, and instead, may require only roving patrols at night.
Types of Security Lighting
1.Stationary Luminary — most common type consisting of fixed
series of luminaries. It is commonly used on entry gates of
employees and vehicles.

*Glare Protection Type - The intensity is focused to the


intruder while the observer or the guard remain in comparative
darkness.

*Controlled lighting - The lighting is focused on certain objects


than the background.
Types of Security Lighting
1.Stationary Luminary — most common type
consisting of fixed series of luminaries. It is
commonly used on entry gates of employees
and vehicles.

*Glare Protection Type - The intensity is


focused to the intruder while the observer or
the guard remain in comparative darkness.

*Controlled lighting - The lighting is focused


on certain objects than the background.
Types of Security Lighting
2. Standby Lighting —
similar to continuous
lighting but can be turned
on manually or by special
device or other automatic
means, when there is a
suspicion of entry.
Types of Security Lighting
3. Emergency Lighting —
stand by lighting which can
be utilized in the event of
electrical failure.
Protective Alarms
Is an aural or visual signal given by the annunciator to
the security when intruder actuate certain devices in a
protected area. An annunciator is a visual or audible
signaling device, which initiates conditions of
associated circuits.

Basically, alarm system are designed to alert security


personnel of a attempted or consummated intrusion
into an area, building or compound. Each type of alarm
is activated in the event that an intruder tampers with
the circuitry, a beam or radiated waves. Alarm are also
for fire, smoke, or otheremergencies and presence of
hazards.
Types of Protective Alarm
1. Central Station System — A type of alarm where the central
station is located outside of the installation. It is a system in
which the alarm signal is relayed to remote panel located at the
facilities of private owned protection Service Company
manned by its personnel.

Several separate compounds tie their alarm system to a central


station so that in case of need, the central station calls for
assistance to the police, fire department, hospital or with other
government assisting units.
Types of Protective Alarm
2. ProprietarySystem — Similar to the central station type
excepts that the proprietary console is located inside the
subscribers Installation who owns or bases the system.

3. Auxiliary System — An installation owned system which is a


direct extension of the local enforcement agency and/or fire
department by special arrangements.
Types of Protective Alarm
4. Local Alarm System — a local alarm in which a siren or bell is
sounded with no predictable response. This system is used in
residence or small establishment which cannot afford a
respond system.

- Consists of rigging up a visual or audible alarm near the object to


be protected.
Types of Protective Alarm
5. Dial Alarm System — This system is set to dial a
predetermined number. When the alarm is activated, the number
selected might be the police station or others. When the phone is
answered, a recording voice will state that an intrusion is in
progress.
Fire Protection
FIRE ALARM - Any visual or audible signal produced
by a device or system to warn the occupants of the
building or fire fighting elements of the presence or
danger of fire to enable them to undertake
immediate action to save life and property and to
suppress the fire.
Fire Protection (Devices)
1. Smoke Detector - a device placed
at the ceilings of the floor that
detects smoke, typically as an
indicator of fire.

2. Fire Bell - a hollow device made of


metal that makes a ringing sound.
Automatic Sprinkler
a type of built in sprinklers which works by
the increase of room temperature and
which automatically operates the system
to put out the fire. Attached and distributed
in the ceiling of the rooms. These sprinklers
will go into action once a fire starts, and
those that will open are those that are
directly above the fire and water is delivered
where it is needed.
Fire Hydrant
- It is a mechanical device
strategically located in an
installation or in a street
where a fire hose will be
connected so that the water
will be available to
extinguished a fire.
Fire Extinguisher
- Is a fire fighting equipment which
can is a fire fighting equipment
which can be portable or in cart
that is used to put out fire
depending on the contents to
extinguish certain types of fire.
© euslnessWatch Class A Class B Class C Class D Electrical Class F
QJ Organic Flammable Flammable Flammable Electrical Cooking Businesses
a.
>
Type I-
..
QJ
Materials Liquids Gases Metals Equipment Oils that m a y need
u. (e.g Paper & (e.g Petrol & (e.g Butane & (e.g Lithium & (e.g Computers (e.g Olive Oil & this type of
Coal) Paint) Methane) Magnesium) & Servers) Fat) Extinguisher
Extinguisher Type
- Schools
- Hospitals
- Offices
- Shops
- Apartments
- Hospitals
Foam - Offices
- Shops
- Garages
- Welding
- Boiler Rooms
- LPG Plants
- Server Rooms
- Offices

- Kitchens
- Canteens
Wet Chemical
How to Operate Fire Extinguisher
-if you need to use a fire extinguisher, remember the
word TPASS:

•TWIST
•PULL the pin - Fire extinguishers often have a pin,
latch, or puncture lever that you need to release first.
•AIM low - Aim the nozzle or hose of the extinguisher
at the base of the fire.
•SQUEEZE the handle - This releases the
extinguishing agent.
•SWEEP from side to side - Move in close, and
sweep across the base of the fire. Watch for re-flash
of the fire.
Alarm Devices:
1. Magnetic Door Contact -is a protective device
usually placed in the door, and window that can
send notification when the opening and closure
occurs

2. Vibration Contact – devices mounted on barriers


and are used primarily to detect an attack on the
structure itself. When movement or vibration
occurs, the unstable portion of the circuit moves
and breaks the current flow, which produces an
alarm.
Alarm Devices:
Passive Infrared Detector (PIR) or Motion Sensor
–PIRs are able to distinguish if an infrared emitting
object is present by first learning the ambient
temperature of the monitored space and then
detecting a change in the temperature caused by the
presence of an object

Panic button -Often located under the counter, the


button can be pressed in times of distress (Such as
robbery, disruptive or threatening behavior, or a
situation which may warrant assistance), triggering a
silent alarm.
Alarm Devices:
CCTV - A video monitoring system is more
commonly known as Closed Circuit Television
Systems. A CCTV system is a system consisting
a television camera, video monitor, and a
transmission medium
Protective Locks
LOCK - defined as mechanical, electrical,
hydraulic or electronic device designed to
prevent entry to a building or room.
Type Of Locks
1. Key operated lock
- uses some sort of
arrangement of internal
physical barriers which prevent
the lock from operating unless
they are properly aligned. The
key is the device used to align
internal barriers so that lock may
be operated.
Type Of Locks
A. Warded Locks
the underlying principle is
incorporation of wards or
obstructions inside the lock to
prohibit a key from operating the
bolt unless the key has
corresponding notches cut in it
that it will pass the wards.
It offers very little security, used
only to have privacy but not to
provide degree of security,.
Type Of Locks
B. Disc Tumbler Locks
also known as wafer tumbler type,
has fat metal tumblers with open
center fitted into lock case.

Commonly designed for


automobile industry

Delay afforded is between 7-


10mins
Type Of Locks
C. Lever Lock

this lock is used in safe


deposit boxes
Type Of Locks
D. Pin Tumbler Lock

the pin tumbler mechanism


depends for its security, on a
number of round pin or
tumblers operating on a
cylinder.
Type Of Locks
2. Padlock
- Is a portable and
detachable lock having a
pivoted or sliding hasp which
possess through a staple
ring, or the like and is made
fast or secured.
Type Of Locks
3. Combination lock
- Requires the manipulation
of parts according to a
predetermined combination
code of numbers.
Type Of Locks
4. Card Operated Lock
- Can be opened by inserting
a coded card in a slot in the
lock, or by pushing the
correct button on the
surface of the lock.
Type Of Locks
5. Electronic lock
- Can be closed and opened remotely by
electronic means.
Biometrics
A machine that can be used for
identification of humans by their
characteristics or traits.

It is used as a form of identification


and access control.

It is equipped with recording device


that can identify the person
operating the lock and the time it
was operated.
Key Control
It is the management of keys in a plant or business organization to prevent
unauthorize individual access to the keys.

MAISON KEY SYSTEM – keying system that permits a lock to be opened with
a number of unique, individual keys. Often found in apartment building common
areas.
Key Control
The following methods can be used to maintain effective key control
Key cabinet- a well constructed cabinet will have to be procured. The cabinet
will have to be of sufficient size to hold the original key to every lock in the
system. It should be secured at all times.
Key record- some administrative means must be set up to record code
numbers and indicates to whom keys to specific locks have been issued.
Inventories- periodic inventories will have to be made of all duplicate and
original keys in the hands of the employees whom they have been issued.
Audits- in addition to periodic inventory, an unannounced audit should be made
of all key control records and procedures by a member of management.
Daily report- a daily report should be made to the person responsible for key
control from the personnel department indicating all people who have left or will
be leaving the company. In the event that a key has been issued, steps should
be initiated to insure that the key is recovered.
Key Control
MASTER KEYING is when a lock operates on a master key plus an individual
or change key.
PASS KEY is a key used to operate an inexpensive lock by moving it in keyhole
until it catches locking belt and unlock mechanism.
Key Control
Defined as the management of keys in a plant or business organizations to
prevent unauthorized individual access to the keys.
Change Key
- for single lock
Sub Master key
-that can open all locks within a particular area or grouping
Master key
- Capable of opening a series of locks
Grand Master Key
- Can open everything in a system involving two or more master key groups.
Terminologies
PETERMAN - A term used in England for lock picker,
safecrackers, and penetrators of restricted areas
or rooms.

FALSE KEY - Genuine key stolen from the owner


ORGANIZATION AND ADMINISTRATION
OF SECURITY GUARD FORCE
Republic Act 5487, as amended The Private Security Agency
Law, approved on June 13, 1969.
2003 Revised Implementing Rules and Regulations (IRR) of RA
5487, as amended
PNP SOSIA - Philippine National Police Supervisory Office for
Security Investigation Agency — office under the Civil Security
Group which is charged with the supervision, direction
and control of all security agencies in the Republic.
WHO MAY ORGANIZE AND MAINTAIN
PRIVATE SECURITY AGENCY AND PRIVATE
DETECTIVE AGENCY

Any Filipino citizen or corporation,


association, partnership, one
hundred percent of which is
owned and controlled by Filipino
citizens.
BASIC REQUIREMENT OF AN OPERATOR
OR MANAGER OF SECURITY AGENCY
1. Filipino citizen;
2. Not be less than twenty five (25) years of age;
3.College graduate and/or a commissioned
officer in the inactive service or retired from the
AFP or PNP;
4. Has taken a course/seminar on industrial
Security Management and/or must have
adequate training or experience in security
business,
5. Good moral character;
6.Having no previous record of conviction of
crime or offense involving moral turpitude.
QUALIFICATIONS OF SECURITY GUARD
OR WATCHMAN
1. Filipino citizen;
2. High School graduate;
3 Physically and mentally fit;
4.At least eighteen (18) years of age but not
more than fifty (50) years old;
5. Has undergone Pre-Licensing course or its
equivalent.
Veterans and retired military/police personnel
honorably discharge including graduates of ROTC
advance (or its equivalent in the PNP) are
exempted from the required Basic-Licensing
Training.
QUALIFICATIONS FOR SECURITY
OFFICER
1. Filipino citizen;
2. Holder of a Baccalaureate Degree;
3. Physically and mentally fit;
4.Has graduated from a Security Officer
Training Course or its equivalent
QUALIFICATIONS OF SECURITY
CONSULTANT
1. Filipino citizen;
2. Physically and mentally fit;
3. Holder of Masters degree either in
Criminology, Public Administration,
MNSA, Industrial Security
Administration, or Law
4. Must have at least ten (10) years
experience in the operation and
management of security business.
QUALIFICATIONS OF A PRIVATE
DETECTIVE
PRIVATE DETECTIVE - Any person who does
detective work for hire, reward or commission, other
than members of the AFP, BJMP, PNP or any other law
enforcement agencies.
1. Filipino citizen;
2. Physically and mentally fit;
3. Holder of baccalaureate degree, preferably
Bachelor of Laws or Bachelor of Science in
Criminology;
4. Graduate of a Criminal Investigation Course
offered by the PNP or NBI or any police training
school, or a detective training in any
authorized/recognized training center;
5. Advance ROTC/CMT graduate or its equivalent
DISQUALIFICATIONS
1.Having previous record of any conviction of
any crime;
2.Having previous record of any conviction of
any offense involving moral turpitude;
3. Having been dishonorably discharged or
separated from employment or service;
4. Being a mental incompetent;
5.Being addicted to the use of narcotic drug or
drugs, and
6. Being a habitual drunkard
7. Dummy of a foreigner
MORAL TURPITUDE
It is an act of baseness, vileness or depravity in the
private and social duties which a man owes to his
fellowmen or to society in general, contrary to the
accepted and customary rule of right and duty
between a man and man.

Conduct that is considered contrary to community


standards of justice, honesty and good morals.

Examples: Rape, Forgery, Robbery


TYPES OF SECURITY GUARD
FORCE
1.Company Guard Force - security force maintained
and operated by any private company corporation
utilizing any of its employees to watch secure and
guard its establishment.

2.Security Agency service - security guard


belonging to privately licensed agency (contractual
basis);

3.Government Guard Forces - security unit


maintained and operated by any government
entity other than military or police.
POSSESSION OF FIREARMS
1. One (1) firearm for every two (2) security guards;
2.Private security agency/private detective
agency/company security force/government security
force shall not be allowed to possess firearms in
excess of five hundred (500) units.
3. Shotguns not higher than 12 gauge
4.Weapons with bores not bigger than cal .22 to
include pistols and revolvers with bores bigger than
cal .38

Exemptions: in areas where there is an upsurge of


lawlessness and criminality as determined by the
Chief PNP, Regional Office or their authorized
representative, they may be allowed to acquire,
possess and use high powered firearms.
NUMBERS OF SECURITY PERSONNEL TO BE
MAINTAINED TO SECURE REGULAR
LICENSE TO OPERATE
1. Private Security Agency minimum of two
hundred (200) licensed private security
personnel and a maximum of one thousand
(1,000).

2. Company Guard Force/Private Detective


Agency minimum of thirty (30) and a maximum
of One thousand (1,000)
LIMITATION I N THE CARRYING OF
FIREARMS
1.No firearm shall be borne nor be in the possession
of any private security personnel except when in
actual performance of duty, in the prescribed
uniform, in the place and time so specified in the
Duty Detail Order (DDO).

2.Shall be carried only within the compound of the


establishment where he is assigned to guard.

3.While escorting big amount of cash or valuable


outside of its jurisdiction or area of operation, private
security agency shall issue an appropriate Duty
Detail Order to the security personnel concerned
Duty Detail Order (DDO) — is a written
order/schedule issued by a superior officer usually
the private security agency/branch manager or
operations officer assigning the performance of
private security/detective services duties.

DDO for the purpose of post duties not requiring


transport of firearms outside of the physical
compound or property of a client or client
establishment shall be issued for not more than a
thirty (30) days duration.
CLASSIFICATION OF TRAINING
AND ITS DURATION
1.Basic Security Guard Course (Pre Licensing
Course) — 150 hours;

2. Re Training Course -- 48 hours;

3.Security Officers Training Course — 300


hours

4.Basic Security Supervisory Course — 48


hours
LICENSE AND FEES
-All Licenses to Operate have a validity of Two
{2) years;

-All applications for renewal of License to


operate (LTO) shall be filed at least sixty (60)
days before the expiry date of LTO;

-No application shall be approved unless a


certification is issued by FED CSG to the effect
that all licenses of firearms of the agency are
updated/renewed for at least one (1) year
forthcoming during the validity of the renewed
LTO.
SURETY BOND
PSA with 200-1000 guards - regular license to
operate good for 2 years.

New PSA — a temporary license to operate good


for 1 year.

PSA with temporary license to operate having


posted 100 guards or more but less than 200
guards shall, upon expiration of such license be
issued extension period to operate good for 6
months.
SURETY BOND
However, upon the expiration of such 6 months
extension, no additional extension shall be
granted unless the PSA concern shall submit a
certification for the posting of at least
additional 50 guards thereby making a total of
150 guards or more. PSA with extended
temporary license, shall upon expiration of such
license, but still fail to comply with the 200
guards requirement, be granted additional
extension of another 6 months period to comply
for the issuance of a regular license to operate.
Failure to comply shall serve as a basis for the
issuance of a cease operation order
Approval, Cancellation,
Suspension of LTO
Chief PNP
- Approval of New Regular LTO
- Cancellation of Regular LTO
- Re instatement of Regular LTO
- Suspension of Regular LTO

Director Civil Security Group


- Renewal of Regular LTO
-Approval of Temporary LTO
-Reversion of Regular to Temporary LTO
- Cancellation of Temporary LTO
-Suspension of Temporary LTO
STOCKING OF AMMUNITION

1. Stocks of ammunition in the agency


shall not exceed fifty (50) rounds of
ammunition per unit of duly licensed
firearms.

2. Individual issue to each security guards


shall be limited to twenty five (25)
rounds for every security guard.
CONFISCATION OF FIREARMS OF
SECURITY GUARD
1.When the firearm is about to be used in
the commission of a crime;
2.When the firearm is actually being used
in the commission of a crime;
3.When the firearm has Just been used in
the commission of a crime;
4.When the firearm being carried by the
security guard is unlicensed or a firearm Is
not authorized by law and regulation for
his use;
CONFISCATION OF FIREARMS OF
SECURITY GUARD
5. When the confiscation of the firearm is
directed by the order of the court;
6. When the firearm is used or carried
outside the property, compound or
establishment serviced by the agency
without proper authority; or
7. When a security guard does not
possess any license to exercise his
profession.in all the above cases, the
confiscating officer shall inform
immediately the agency concerned.
REVOCATION OF LICENSE TO
POSSESS FIREARM
1.Failure to submit any issued firearm for
verification as required;
2. Carrying firearms by security personnel
without appropriate Duty Detail Order;
3. When the firearm serial number has been
duplicated on another firearm or using one
firearms license for more than one firearm other
than those stipulated in the license;
4, Carrying of firearms outside of the place
stated in the permit or in places prohibited under
the law;
5. When the firearm was reported lost.
SECURITY PERSONNEL RANKS,
POSITIONS, STAFFING PATTERN
AND JOB DESCRIPTION
1. Security Management Staff

1.1 Security Director (SD) — Agency


Manager/Chief Security Officer — responsible
for the entire operation and
administration/management of the security
agency.
1.2 Security Executive Director (SED) —
Assistant Agency Manager/Asst. Chief Security
Officer — Assist the Security Director
SECURITY PERSONNEL RANKS, POSITIONS,
STAFFING PATTERN AND JOB
DESCRIPTION
3.Security Staff Director (SSD) - Staff Director
for Operation and Staff Director for Administration
The Staff Director for operation -assistant of
the security manager for the efficient operation
ofthe agency.
The Staff Director for Administration - is the
staff assistant of the agency manager for the
effective and efficient administration and
management of the agency.
4.Security Staff Director for Training - Staff in
charge for Training — responsible for the training of
the Agency's security personnel
SECURITY PERSONNEL RANKS, POSITIONS,
STAFFING PATTERN AND JOB
DESCRIPTION
2. Line Leadership Staff

1.Security Supervisor 3 — Detachment


Commander - Is the field or area commander
of the agency;
2. Security Supervisor 2 — Chief Inspector
— responsible for inspecting the entire area
covered by the detachment;
2.3 Security Supervisor 1 - Inspector
responsible for the area assigned by the Chief
Inspectoror the Detachment Commander.
SECURITY PERSONNEL RANKS, POSITIONS,
STAFFING PATTERN AND JOB
DESCRIPTION
3. Security guard

1.Security Guard 1 - Watchman/guard the


one actually posted as watchman and or guard
2.Security Guard 2 - Shift in charge
responsible for the security officers who are
scheduled in a certain shift for a particular
period
3.Security Guard 3 - Post in charge -
responsible for the entire detailed security
office within acertain establishment
SECURITY PERSONNEL RANKS, POSITIONS,
STAFFING PATTERN AND JOB
DESCRIPTION
Note: Security Agency
operator/manager/ownercan put its
own staffing pattern provided it is
consistent with the provisions of IRR
of RA 5487.
SECURITY PERSONNEL RANKS, POSITIONS,
STAFFING PATTERN AND JOB
DESCRIPTION
Note: Security Agency
operator/manager/ownercan put its
own staffing pattern provided it is
consistent with the provisions of IRR
of RA 5487.
COMPANY GUARD
FORCE
A DV A N TA GE S DIS A DV A N TA GE S
1.High caliber and receives 1. May be required to join the union;
higher salary; 2. Cost more;
2. Provides better service; 3. Problem of ensuring availability
3.Can be trained to handle some of back-up personnel.
of the more complex security
duties;
4.More familiar with facilities
they protect;
5.Tend to be more loyal with the
company.
AGENCY GUARD
SERVICES
A DV A N TA GE S DIS A DV A N TA GE S
1. Less expensive;
1.Lack of training, low caliber
2. Use is convenient;
3. Less administrative and personnel employee;
problems; 2. No loyalty to the company;
4. Agency assumes full responsibility 3. Large turnover
for the scheduling and supervising of
4. Not familiar with facilities
all guard personnel
5. Can easily obtain extra guard if
needed;
6. Agency easily usually accepts
liability of civil suits.
ESSENTIAL QUALITIES
OF SECURITY GUARD
1. Alertness - being watchful in spotting violator, a person, a vehicle or an incident;

2. Judgment — sound and good judgment to arrive at wise and timely decisions;

3. Confidence — faith in oneself and his abilities;

4.Physical Fitness - always in a condition to render effective service even under


the most strenuous conditions;

5. Tactfulness — ability to deal with others successfully without offending;

6. Self Control -- ability to take hold of oneself regardless of a provoking situation.


GENERAL FUNCTIONS
OF A SECURITY GUARD
1. Enforce company rules and regulations;
2. Operate and enforce the personnel identification system;
3.Patrol and observe designated areas, perimeter, structures,
installation;
4.Take into custody a person attempting or giving unauthorized
access in restricted, limited and controlled areas
5.Check rooms, buildings, storage rooms of security interest and
after working hours, check proper locking of doors and gates.
6. Perform escort duties when required;
GENERAL FUNCTIONS
OF A SECURITY GUARD
7.Respond to alarm signals or other indications suspicious
activities and emergencies;
8.Safeguard equipment and material against sabotage,
unauthorized access, loss, theft or damage;
9.At quickly in situations affecting the security of installation and
personnel, to fire accidents, internal disorder, attempts to commit
criminal acts;
10.Control and regulate vehicle and personnel traffic within the
compound as well as parking of vehicle;
11. Other duties that are necessary in the security guard function;
POWER AND DUTIES
OF SECURITY GUARD
1.Territorial Power — A security guard shall watch and secure the
property of the person, firm or establishment with whom he or his
agency has a contract for security services. Such services shall not
extend beyond the property or compound of said person, firm or
establishment except when required by the latter in accordance with
the terms of their contract, or in hot pursuit of criminal offenders.

2.Arrest by Security Guard — A security guard or private detective is


not a police officer and is not, therefore, clothed with police authority.
However, he may arrest a person under the circumstances mentioned in
Section 5, Rule 113, Revised Rules of Criminal Procedure.
POWER AND DUTIES
OF SECURITY GUARD
3. Search without Warrant — Any security guard may, incident to the
arrest, search the person so arrested in the presence of at least two
(2) witnesses. He may search employees of the firm or establishment
with which he or his agency has a contract, when such search is
required by the very nature of the business of the person, firm or
establishment.
DUTIES DURING
STRIKES AND LOCKOUTS
1.All private security personnel in direct confrontation with strikers,
marchers or demonstrators shall not carry firearms. They may carry only
night sticks (baton) which may or may not be provided with tear gas
canister and dispenser. Security personnel not in direct confrontation
with the strikers may carry in the usual prescribed manner their issued
firearm.
2.Private Security personnel shall avoid direct contact either physically
or otherwise with the strikers;
3.They shall stay only within the perimeter of the installation which
they are protecting at all times;
DUTIES DURING
STRIKES AND LOCKOUTS
4.In protecting and securing the assets and persons of their
clients, shall only use sufficient and reasonable force necessary
to overcome the risk or danger posed by strikers or hostile
crowds.
5.They shall refrain from abetting or assisting acts of
management leading to physical clash of forces between labor and
management.
6.They must at all times be in complete uniform with their names
and agency’s name shown on their shirts above the breast
pockets.
FUNCTIONS OF A
PRIVATE DETECTIVE
1. Background Investigation;
2. Locating missing person;
3. Conduct surveillance work;
4.Such other detective work as may become the subject
matter of contract between the agency and its clients
POWERS OF CITY, MUNICIPAL MAYORS
IN CASE OF EMERGENCY
*In case of emergency or in times of disaster or calamity when the services
of any security agency/entity and his personnel are needed. The city or
municipal mayor, may muster or incorporate the members of the agency or
agencies nearest the area of such disaster or calamity to help in the
maintenance of peace and order, prevention of crime, or apprehension of
violators of laws and ordinance, and in the protection of lives and
properties.

*They shall receive direct orders from the Chief of Police of the city or
municipality for theduration of the emergency, disaster or calamity.
SUPERVISION OF
THE PNP
In case of emergency or in times of disaster or calamities, the
Chief, PNP may deputize any security guard to assist the PNP
in the performance of police duties for the duration of such
emergency, disaster or calamity. Licensed guards, who are
actually assigned to clients with DDO, shall be deputized by the
Chief PNP, and clothed with authority to enforce laws, rules
and regulations within his area of responsibility.
INTER-RELATIONSHIP BETWEEN
PRIVATE SECURITY PERSONNEL
AND MEMBERS OF THE PNP
1.Private security personnel are always subordinate to members of
the PNP on matters pertaining to law enforcement and crime
prevention. They cannot enforce any provision of the law except in
executing citizen’s arrest and/or conducting initial investigation of a
commission of a crime. In such case, any arrested person shall be
turned over immediately to the nearest PNP unit/station.

2.Criminal investigation is the responsibility of the PNP. All results of


initial investigation conducted by the private security personnel and
all evidence gathered by them shall be turned over to the PNP
unit/station concerned as a matter of course without delay.
GROUNDS FOR CANCELLATION OF
SECURITY GUARD LICENSE

1.Assisting or protecting criminals during on or off duty


status;
2.Providing confidential information to unauthorized
person;
3. Posted security guard found drunk or drinking
intoxicating liquor; and
4. Other similar acts
THEFT
Theft — committed by any person, who with intent to gain but without
violence, against, or intimidation of persons nor force upon things shall take
personal property of another without the latter consent.

PSYCHOLOGICAL EXPLANATIONS ON THEFT


1.The need or desire - An individual may need or desire to commit the act
because of financial problem, inadequate income, extravagant living, gambling.
2.The psychological need (Kleptomania) - is an irresistible urge to steal
items of trivial value. People with this disorder are compelled to steal things,
generally, but not limited to, objects of little or no significant value.
3.The criminal tendency - The individual with such tendency may be more
tempted to steal if security control are inadequate.
PILFERAGE
Pilferage — the act of stealing things of small value:

THE CASUAL AND SYSTEMATIC PILFERER


Casual Pilferer — One who steals due to his inability to resist the
unexpected opportunity and has a little fear of detection.
Systematic Pilferer — One who steals with preconceived plans
and takes away any or all types of items or supplies for economic
gain.
COMMUNICATION
SECURITY
Is the protection resulting from the application of various measures
which prevent or delay the enemy or unauthorized persons in gaining
information through the communication system. This includes:

a.Transmission Security - component of communications security which


results from all measures designed to protect transmission from
interception.
b.Cryptographic Security — results from the provisions of technically
sound crypto-system and their proper use
c.Physical Security — providing safeguards to equipment and material
from access by unauthorized persons.
THREATS IN
COMMUNICATION SECURITY
1.Wiretapping - is the monitoring of telephone conversations by a third
party, often by covert means.
2.Bugging — means to secretly listen to or record a conversation using a
hidden electronic device.
3.Eavesdropping (unauthorized listening) - is the unauthorized real time
interception of a private communication, such as a phone call, instant
message, video conference or fax transmission.

RA No. 4200, Approved June 19, 1965 - An Act to prohibit and penalize
wiretapping and other related violations of privacy of communication, and
other purposes.
UNLAWFUL ACTS
SECTION 1
It shall be unlawful for any person, not being authorized by all the
parties to any private communication or spoken word, to tap any
wire or cable, or by using any other device or arrangement, to
secretly overhear, intercept, or record such communication or
spoken word by using a device commonly known as a dictaphone
or dictagraph or dictaphone or walkie talkie or tape recorder.
UNLAWFUL ACTS
SECTION 1
It shall also be unlawful for any person, be he a participant or not in the act
or acts penalized in the next preceding sentence, to knowingly possess any
tape record, wire record, disc record, or any other such record, or copies
thereof, of any communication or spoken word secured either before or
after the effective date of this Act in the manner prohibited by this law; or
to replay the same for any other person or persons; or to communicate the
contents thereof, either verbally or in writing, or to furnish transcriptions
thereof, whether complete or partial, to any other person:

Provided, That the use of such record or any copies thereof as evidence in
any civil, criminal investigation or trial of offenses mentioned in section 3
hereof, shall not be covered by this prohibition.
UNLAWFUL ACTS
SECTION 3
The authorization shall be effective for the period specified in the order
which shall not exceed sixty (60) days from the date of issuance of the
order, unless extended or renewed by the court upon being satisfied that
such extension or renewal is in the public interest.

The court referred to in this section shall be understood to mean the Court
of First Instance within whose territorial jurisdiction the acts for which
authority is applied for are to be executed.
BANK SECURITY - a specialized type of physical security protecting the
assets, personnel and operation of a bank, with special emphasis on the
precaution and measures to safeguard the cash and assets while in s
storage, in transit, and during transaction.

Bangko Sentral ng Pilipinas (BSP) Circular No. 620 Issued on September 3,


2008 — a Circular issued by BSP concerning regulations on Bank protection
which aims to promote maximum protection of life and property against
crimes (robbery, theft, etc), and other destructive causes.
Guard System — BSP requires that all banking offices be manned by
adequate number of security personnel to be determined by the bank,
taking into consideration its size, location, costs and overall bank
protection requirement.
Security Devices — Banks are required to have a robbery alarm or other
appropriate device for promptly notifying law enforcement office either
directly or through an intermediary of an attempted, ongoing orperpetrated
robbery.
In armored Car operations — all armored vehicles are required to be built
with bullet resistant materials capable of withstanding the firepower of high
powered firearm (M16, M14). Also equipped with a vault or safe or a
partition wall with a combination lock designed to prevent retrieval of the
cargo while in transit.

DOCUMENT AND INFORMATION SECURITY - Security involving the


protection of documents and information from loss, access by unauthorized
persons
> prescribes the policies and establishes the standard basic procedures
governing the classification and security of official matter.
TERMINOLOGIES
DOCUMENT - Any material that contains marks, symbols, or signs, either
visible, partially visible or completely invisible that may be presently or
ultimately convey a meaning or message to someone.

CLASSIFY - refers to the act of assigning to information or material one of


the four security classification categories after determination has been
made that the information requires the security protection as provided for
in the regulation;

SECURITY CLEARANCE — Is an administrative determination that an


individual is eligible from a security standpoint for access to classified
matter of a specific category;
TERMINOLOGIES
COMPARTMENTATION - Refers to the grant of access to classified matter
only to properly cleared persons when such classified information is
required in the performance of their official duties, and restricting it to
specific physical confine when feasible.

NEED TO KNOW - term given to the requirement that the dissemination of


classified matters be limited strictly to those persons whose official duties
require knowledge thereof.
SECURITY OF CLASSIFIED MATTER
CLASSIFICATIONOF DOCUMENTS Memorandum Circular No. 196, dated
07/19/1968 {Security of Classified Matter in government offices.)

1.TOP SECRET — any information and material, the unauthorized disclosure


of which would cause exceptionally grave damage to the nation,
politically, economically or militarily;

2.SECRET - any information and material, the unauthorized disclosure of


which would endanger national security, cause serious injury to the
interest or prestige of the nation or any governmental activity.
SECURITY OF CLASSIFIED MATTER
3.CONFIDENTIAL — any information and materials, the unauthorized
disclosure of which would be prejudicial to the interest or prestige of the
nation or governmental activity or would cause administrative
embarrassment or unwarranted injury.

4.RESTRICTED — any information and material which requires special


protection other than those determined to be Confidential, Secret, and
Top Secret matters.
METHOD OF TRANSMISSION
1. By direct contact of officer or personnel
concerned;
2. By official courier;
3. Electrical means in cryptographic form
4. Registered Mail

DESTRUCTION
1. Burning
2. Shredding
TERMINOLOGIES
STORAGE - shall be in a safe, steel filing cabinet with built in dial type
combination lock of such weight, size and construction as to minimize the
possibility of physical theft or damage to fire.

OPERATIONAL SECURITY - part of physical security that deals primarily


with the protection of processes, formulas, patents, and other
industrial and manufacturing activities from espionage, infiltration, loss,
compromise or photocopying;
KINDS OF SENSITIVE INFORMATION
PROPRIETARY INFORMATION — information which some special way is
related to the status, operations or activities of the possessor over
which the possessor asserts ownership.

TRADE SECRETS - It may consist of any formula, pattern, device or


compilation of information which is used in one’s business and which gives
one opportunity to gain an advantage over competitors who do not
know or use it.

PATENT — A grant given by the government to an inventor, conveying


and securing to him the exclusive rights to make, use and sell his invention
for term of twenty (20) years.
KINDS OF SENSITIVE INFORMATION
PROPRIETARY INFORMATION — information which some special way is
related to the status, operations or activities of the possessor over
which the possessor asserts ownership.

TRADE SECRETS - It may consist of any formula, pattern, device or


compilation of information which is used in one’s business and which gives
one opportunity to gain an advantage over competitors who do not
know or use it.

PATENT — A grant given by the government to an inventor, conveying


and securing to him the exclusive rights to make, use and sell his invention
for term of twenty (20) years.
LAW ON INTELLECTUAL PROPERTY INTELLECTUAL PROPERTY CODE
OF THE PHILIPPINES [Republic Act No. 8293] Approved on June 6,
1997 AN ACT PRESCRIBING THE INTELLECTUAL PROPERTY CODE
AND ESTABLISHING THE INTELLECTUAL PROPERTY OFFICE,
PROVIDING FOR ITS POWERS AND FUNCTIONS, AND FOR OTHER
PURPOSES
THREATS TO PROTECTION OF
SENSITIVE INFORMATION
Competitive Intelligence — systematic program for
gathering and analyzing information about
competitor's activities and general business
trends to further company’s goals.
TYPES OF COMPETITIVE INTELLIGENCE
1.White — information available from company publication, public
records or commercial reporting sources;

2.Gray - not readily available but which is usually can be obtained


without acquiring any civil/criminal liability in the process.

3. Black — obtained through clearly unethical or illegal means.


TYPES OF DOCUMENTS
Class I - Vital Document — This is an irreplaceable records , reproduction of
which does not have the same value as the original;

Class II - Important Document - This is a record, reproduction of which cause


considerable expense and labor, or considerable delay.

Class III - Useful Document — This is a record, the loss of which may cause
inconvenience but could be readily replaced and may not present
insurmountable obstacle to the prompt restoration of the business;

Class IV - Non-essential Document — This record may include daily files,


routine in nature, lost of which will not affect the organization.
STORAGE
1. SAFE — Refers to a metallic container
used for safekeeping of documents or
small items in the office or installation. In
security matters it is considered as one of
the third line of defense that a security
manager may use that weighs about 750
pounds and a door of about 1 and 1/2 inch
thick with its floor, ceiling and walls of
about 1 inch thick:
STORAGE
2 . Vault
A heavily constructed fire and
burglar resistant container usually
part of the building structure use to
keep and protect cash, documents
and negotiable instruments.
STORAGE
2 . Vault
• The vault door should be made of steel at
least 6 inches in thickness.
• The vault walls, ceiling, floor reinforce
concrete at least 12 inches in thickness.
• The vault must be resistive up to 4- 6 hours.
• Floor should be elevated by 4 inches
• Not more than 5,000 cubic feet in size
STORAGE
3 . File room
It is a cubicle in a building constructed little lighter than a vault
but of bigger size to accommodate limited people to work on the
records inside.
STORAGE
3 . File room
• The file room should at most be 12 feet high.
• It must have a watertight door and at least fire proof for one hour.
• interior cubage should not be more than 10,000 cubic feet
TESTS FOR FIRE RESISTANCE
3 . File room

• FIRE ENDURANCE TEST – a measure of the elapsed time during which a


material or assembly continues to exhibit fire resistance under specified
conditions of test and performance.
• EXPLAIN HAZARD TEST – test to determine if the sudden rise in
temperature will not cause the safe to rupture. If the safe can withstand
2000F for 30 mins without cracking or opening then it has passed the test
• FIRE AND IMPACT TEST – its objective is to determine the strength of a
safe to resist the collapse of a building during fire.
Identification and control
3 . File room

Identification and control objective include precluding unauthorized entry


and facilitating authorized personnel to enter specific areas as well as
preventing the introduction of material components of harmful material,
misappropriation, pilferage of installation properties and recorded classified
information.

Access List- an authorized list of personnel given to security allowing entry to a


compound or installation or part thereof.
Identification and control
Two Types of personnel Identification
1.Personal recognition
2.Artificial recognition- identification cards, passes, passwords,
etc.

Pass System- a pass or badge is issued by security for personnel


to be admitted in the installation. This system precludes those
visitors with escorts and personal use and not for the restricted
areas like exclusive, limited and controlled areas.
The following are pass system recommended:
• Single Pass or Badge System- the badge or pass coded for
authorization to enter specific areas is issued to an employee who
keeps it in his possession until his authorization is terminated.
• Pass or Badge Exchange System- an exchange takes place at the
entrance of each controlled area. Upon leaving the personnel
surrenders his badge or passes and retrieve back his basic
identification.
• Multiple pass system- this provides an extra measure of security by
requiring that an exchange take place at the entrance of each
restricted area
Visitors Movement control
Security should establish proper methods of establishing the
authority for admission of visitors as well as the limitation thereat. This
security measure would depend on the sensibility of the installation, but
could include the following:

Visitors Logbook- all visitors to any facility should be required to


identify them selves and should be given a visitors ID by the security.
Visitors logbook should be filled up with the named of visitors, nature
and duration of visit.
Visitors Movement control

Photograph- taking of photographs should also be considered.


Extreme caution must be exercised in areas where classified
information is displayed to preclude unauthorized taking of pictures of
the installation. If a visitor has camera and it is prohibited to take
picture, said camera should be left in the care of security with
corresponding receipt.
Visitors Movement control

Escort- if possible, visitors should be escorted by the security to


monitor their activity within the establishment and guide them where to
go.
Visitor entrances- separate access for visitors and employees of the
establishment should be provided.
Time-traveled- if there is a long delay or time lapse between the
departure and arrival, the visitors maybe required to show cause fir the
delay.
Restricted Area

A restricted area is any area in which personnel or vehicles are


controlled for reasons of security. Restricted area is established to
provide security for installation or facilities and to promote efficiency of
security operations and economy in the use of security personnel.
Restricted Area

Types of Restricted Areas


Exclusion Areas- is a restricted area which contains a security interest
to Top Secret importance, and which requires the highest degree of
protection.
Limited Areas- is a restricted area in which a lesser degree of control is
required than in an exclusion area but which the security interest would
be compromise by uncontrolled movement.
Area Control includes the following:

Interior Area Control- this system provides for checking the actual time
used by the visitor against known time requirements for what the visitor
is to accomplish.
Visitor Identification And Movement Control- processing and control
of movements of visitor shall be included in the PASS SYSTEM. The
control of movements of visitor will depend on the installation. A visitor
register shall be maintained to include the name of the visitor, date of
visit, purpose of visit, which may be file for the future reference.
Key Control- a system of controlling keys shall be advised and
regulations covering the disposal, storage or withdrawals, shall be
issued and imposed.
PERSONNEL SECURITY
- refers to the procedure followed, inquiries conducted, and
criteria applied to determine the work suitability of a particular
applicant or the retention of a particular employee.

PURPOSE
1.To ensure that hired employees are best suited to assist the
organization in achieving its mission and vision;
2.To assist in providing the necessary security to the employees
while they carry out their functions.
PERSONNEL SECURITY INVESTIGATION (PSI)
It is an inquiry into the character, reputation, discretion, integrity,
morals, and loyalty of an individual In order to determine a
person’s suitability for appointment or access to classified
matter.

TYPES OF PSI
1. National Agency Check
2. Local Agency Check
3. Partial Background Investigation
4. Complete Background Investigation
PERSONNEL SECURITY INVESTIGATION (PSI)
National Agency Check (NAC) - this is an investigation of an individual
made upon the basis of written information supplied by him in response
to official inquiry, and by reference to appropriate national agencies. It is
simply a check of the files and record of national agencies.

The national agencies checked under this type of investigation are


the following:

National Intelligence Coordinating agency (NICA)


National Bureau of Investigation (NBI)
ISAAFP or J2 Division, GHQ AFP
CIDG PNP Camp Crame., etc.
PERSONNEL SECURITY INVESTIGATION (PSI)
Local Agency Check (LAC)- this type of investigation consist of the
first type plus written inquiries sent to appropriate local government
agencies, formal employees, references and schools listed by the
person under investigation.

The local agencies normally check besides the past employment,


schools and references are the following:

Place of the locality where the individual is a resident.


Mayor, Police, Fiscal, Judge of the locality where the individual is a
resident.
KINDS OF BACKGROUND INVESTIGATION
1.Complete background Investigation (CBI) — a type of BI
which is more comprehensive, particularly all the circumstance
of his personal life.

2.Partial Background Investigation (PBI) — Investigation of the


background of the individual but limited only to some
circumstances of his personal life.
FACTORS TO BE CONSIDERED I N CONDUCT
1.Loyalty — faithful allegiance to the Philippine government and
its duly constitutional authorities;

2.Integrity — uprightness in character, soundness of moral


principle, freedom from moral delinquencies.

3.Discretion — the ability or tendency to act or to decide with


prudence, the habit of wise judgment;
FACTORS TO BE CONSIDERED I N CONDUCT
4.Morals — distinctive identifying qualities which serve as an
index to the essential or intrinsic nature of a person;

5.Character — the sum of traits that have been impresses by


nature, education and habit upon the individual;

6.Reputation — opinion or estimation in which one is generally


held. It is what a person is reported to be whereas character is
what a person is.
INVESTIGATIVE COVERAGE
1. Prior Employment;

2. Claimed education;

3.Claimed residence for the period covered in the employment


and educational institutes;

4.If the candidate indicates a criminal record, then the details


should be checked.
INVESTIGATIVE STANDARDS
1. Information sought should be relevant;

2. Information should be reliable;

3.If unfavorable, the information should be confirmed by at least


two sources.
SECURITY SURVEY
- A fact finding probe to determine a plant’s adequacy in all
aspects of security, with the corresponding recommendations.

- Refers to checklist, audits, or inventories of security conditions.

-Security Surveys are often called ‘RISK ANALYSIS SURVEYS’ or


‘RISK ASESSMENT SURVEYS
PURPOSE OF SECURITY SURVEY
1. To determine the existing state of security;
2. Identifying weaknesses in defense;
3. To determine the degree of protection required;
4. To produce recommendations for a total security system.

The survey should be undertaken by either suitably trained staff


security personnel, or a fully qualified independent security
specialist.
No universal checklist can be applied to all sites for survey
purposes, as no two facilities are alike.
BEFORE COMMENCING A SECURITY SURVEY
1. Written authority should be obtained from proper authority.
2. Previous surveys should be reviewed;
3. An orientation tour should be made;
4.Photographs should be taken of things which will be difficult to
describe in a report. (Only with authority)

After completing the survey an immediate review of the findings


should be undertaken with the plantsupervisor so that urgent
deficiencies can be addressed.
BEFORE COMMENCING A SECURITY SURVEY
•A follow-up survey should always be conducted to
ensure improvements

•Any survey report including lists of recommendations is


incomplete without including a cost-benefit analysis, which is;
“a direct comparison of the cost of operation of the security unit
and all the existing security measures with the amount of the
corporate assets saved or recovered as well as reduction of losses
caused by injuries and lost production and recommendations have
been made”
PLANNING
Process of developing methods or procedures or an
arrangement of parts intended to facilitate the
accomplishment of a definite objective.
The process of setting goals, developing strategies, and
outlining tasks and schedules to accomplish the goals.

SECURITY PLANNING
It is PRE-DETERMINING a course of action;
It is deciding IN ADVANCE what to do, how to do it, and who is
to do it.
GOALS OF SECURITY PLANNING
1. To minimize effects of any incident upon plant and personnel;

2. To keep property and equipment loss at a minimum;

3.To ensure cooperation of all plant departments charged with


specific activities of an emergency;

4.To ensure appropriate cooperative action by and with outside


civic and government agencies.
KEY STEPS I N PLANNING
1.Get in touch/coordinate with your Local Civil Authorities. (Tie your
programs with theirs and standardize equipment with them thus
creating compatibility.);

2.Visit neighboring Plants/offices (coordinate your activities with


theirs.)

3.Survey your plant for possible hazards and take immediate action
to lessen or eliminate them;
KEY STEPS I N PLANNING
4. Appoint a disaster Director or Disaster coordinator;

5.Early in the planning stage, present the Program to your


Employees and enlist their active support;

6.Call an organization meeting of Heads of services, employee


representatives and key personnel. (out line purpose of the program
and explain how the plant should organize for protection;

7. Define the Program.


TESTING THE PLAN
Benefits in testing the plan:
Deficiencies will be uncovered;
People involved in the implementation of the plan will receive
valuable training.

TWO TYPES OF TESTING THE PLAN


partial (by elements);
complete (entire organization)

KEEPING THE PLAN UP TO DATE


Changes in Personnel and Facilities
TERMINOLOGIES
SECURITY EDUCATION - It is defined as the exposure and teaching
of employees on security and its relevance to their work. Security
education is conducted to develop security awareness among
employees of the company. It should cover all employees,
regardless of rank or position.

Personnel Security - Protection of personnel especially ranking


official from any harm, kidnap, and others act. VIP security is type of
personnel security;
TERMINOLOGIES
POLICE SECURITY PROTECTION GROUP (PSPG) - is mandated by
law to provide protective security to government officials,
foreign dignitaries, and private individuals authorized to be
given protection and also provide physical security to vital
installations, and assist the Presidential Security Group (PSG) in
securing the President and the members of the First Family.

PROTECTIVE CUSTODY - state or quality of being secured or freed


from danger. It may also includes the various means or device
designed to guard a persons and property against a broad range of
security hazard.
TERMINOLOGIES
THREAT - is an indication of something impending and usually
undesirable or unpleasant, with an intention to inflict evil, injury or
damage on another, usually as retribution or punishment for
something done or left undone. It is an expression of an intention to
inflict loss or harm on another by illegal means, and especially by
involving coercion or duress over the person or his welfare.

THREAT ASSESSMENT - the process of investigation/validating the


truthfulness of the existence of threat to an individual.
TERMINOLOGIES
EMERGENCY SITUATION — condition or state that danger has
already occurred which resulted to loss of life/liberty and/or there is
imminent danger or threat to life and property where delay will
endanger or may cause the loss of life/property.
DEFINITION OF TERMS
1.Access List — authenticated list of personnel given to the
security allowing entry to a compound or installation or part thereof;

2.Controlled Area — an area near or adjacent to limited or


exclusive areas where entry is restricted;

3.Dry-run — practical test or exercise of plans or any activity to


test its validity, an operational readiness exercise;
DEFINITION OF TERMS
4.Duress Code — type of code system so that security personnel or any employee
when forced by armed men intending to enter an installation can give alarm by the
use of certain words in casual conversation with personnel in the installation.

5.Exclusion Area — a restricted area containing materials or operation of security


interest;

6.Restricted area — any area access to which is subject to special restriction


control;

7.Security Hazard — Is any act or condition, which may result in the compromise
of information, loss of life, loss or destruction of property or disruption of
objectives of the installation.
DEFINITION OF TERMS

Fail Safe – a term applied to device or system that in the event of


failure of a competent, the incapacity would be signaled.

is a design feature or practice that in the event of a specific type


of failure, inherently responds in a way that will cause minimal or no
harm to other equipment, to the environment or to people.
TYPES OF SECURITY
1.Industrial Security — A form of physical security that is concerned with
the physical measures designed to safeguard personnel and prevent
unauthorized access to equipment, facilities, materials, documents, and to
protect them from espionage, sabotage, damage or theft.

2.Bank Security — Is the protection resulting from the application of


various measures which safeguards cash and assets which are in storage, in
transit and or during transaction.

3.Operational Security — Involves the protection of processes, formulas


and patents, industrial and manufacturing activities from espionage,
infiltration, loss, compromise or photocopying.
Information must be forwarded only
those personnel who are in need. What
Principle of security is referring to?
a. Life over Property
b. There is no impenetrable barrier,
which follows that there is no absolute
security.
c. Compartmentation
d. Security from within and without as
the risk may come either from both
areas.
Information must be forwarded only
those personnel who are in need. What
Principle of security is referring to?
a. Life over Property
b. There is no impenetrable barrier,
which follows that there is no absolute
security.
c. Compartmentation
d. Security from within and without as
the risk may come either from both
areas.
There must be a Provision for a security
layers. Security layers must have a
Prevention, Detection, and Response
system.
a. Security is everybody's concern.
b. Compartmentation
c. Defense - In - Depth Security
d. Each Installation is different.
There must be a Provision for a security
layers. Security layers must have a
Prevention, Detection, and Response
system.
a. Security is everybody's concern.
b. Compartmentation
c. Defense - In - Depth Security
d. Each Installation is different.
What is this TYPES OF SECURITY MEASURES
FOR AN EFFECTIVE DEFENSE AGAINST
CRIMES which refers those that will deter
man from committing such act of fear of
being caught, charge in court or get
dismissed, such as: security education,
programs, investigations, seminars,
personnel security check

a. Active Measures
b. Passive measures
c. Security
d. Safety
What is this TYPES OF SECURITY MEASURES
FOR AN EFFECTIVE DEFENSE AGAINST
CRIMES which refers those that will deter
man from committing such act of fear of
being caught, charge in court or get
dismissed, such as: security education,
programs, investigations, seminars,
personnel security check

a. Active Measures
b. Passive measures
c. Security
d. Safety
What is the first formally licensed
security agency in the country?

a. Jimenez Security Agency


b. Juan and Pedro Jimenez
c. Special Watchman Agency
d. Blue dragon Security Agency
What is the first formally licensed
security agency in the country?

a. Jimenez Security Agency – old


name
b. Juan and Pedro Jimenez – founder
c. Special Watchman Agency
d. Blue dragon Security Agency
It is an aggregation of private security
agencies (PSA) nationwide with about
1,800 PSAs with an estimated personnel
strength of 230,000 security personnel.
PADPAO is a self- governing, self-
regulatory, and self-policing
organization.

a. PADPAO
b. SOSIA
c. SAGSD
d. PNP Civil Security Group
It is an aggregation of private security
agencies (PSA) nationwide with about
1,800 PSAs with an estimated personnel
strength of 230,000 security personnel.
PADPAO is a self- governing, self-
regulatory, and self-policing
organization.

a. PADPAO
b. SOSIA
c. SAGSD – renamed by SOSIA
d. PNP Civil Security Group – until
where SOSIA is under
It refers to the susceptibility of the
plant or establishment to damage, loss,
or disruption of operation due to various
hazard.

a. RELATIVE CRITICALITY
b. RELATIVE VULNERABILITY
c. Man-made Hazards
d. Natural Hazard
It refers to the susceptibility of the
plant or establishment to damage, loss,
or disruption of operation due to various
hazard.

a. RELATIVE CRITICALITY
b. RELATIVE VULNERABILITY
c. Man-made Hazards
d. Natural Hazard
Can be defined as any structure or
physical device capable of restricting,
deterring, delaying, illegal access to an
installation.

a. Barrier
b. NATURAL BARRIER
c. STRUCTURAL OR MAN-MADE
BARRIER
d. Nota
Can be defined as any structure or
physical device capable of restricting,
deterring, delaying, illegal access to an
installation.

a. Barrier
b. NATURAL BARRIER
c. STRUCTURAL OR MAN-MADE
BARRIER
d. Nota
In the 3 lines of defense it refers to the
Storage system like steel cabinets,
safes, vaults and interior files.

a. FIRST LINE OF DEFENSE


b. SECOND LINE OF DEFENSE
c. THIRD LINE OF DEFENSE
d. Nota
In the 3 lines of defense it refers to the
Storage system like steel cabinets,
safes, vaults and interior files.

a. FIRST LINE OF DEFENSE


b. SECOND LINE OF DEFENSE
c. THIRD LINE OF DEFENSE
d. Nota
It is a type of fence where It is
constructed in such a way that visual
access is permitted through the fence.

a. Solid Fence
b. Full View Fence
c. Barrier
d. Third line defense
It is a type of fence where It is
constructed in such a way that visual
access is permitted through the fence.

a. Solid Fence
b. Full View Fence
c. Barrier
d. Third line defense
A CHAIN LINK FENCE Should be
constructed minimum height of _____
excluding top guard;

a. 20 ft or more
b. 50 ft or more
c. 7 feet
d. 8 feet
A CHAIN LINK FENCE Should be
constructed minimum height of _____
excluding top guard;

a. 20 ft or more
b. 50 ft or more
c. 7 feet
d. 8 feet
An addition overhang or barbed wire
place on vertical perimeter fences
facing upward and outward with a 45
degree angle with three to four strands
of barbed wires space six inches apart.
This will increase the protective height
and prevent easy access.

a. BARBED WIRE FENCE


b. Concertina Wire
c. Top Guard
d. Entry Stations
An addition overhang or barbed wire
place on vertical perimeter fences
facing upward and outward with a 45
degree angle with three to four strands
of barbed wires space six inches apart.
This will increase the protective height
and prevent easy access.

a. BARBED WIRE FENCE


b. Concertina Wire
c. Top Guard
d. Entry Stations
A house like structures above the
perimeter barrier. Height of tower
increases the range of observation
during day and night with artificial
illumination.

a. Towers
c. Clear zone
d. Protection in depth
d. Signs and Notices
A house like structures above the
perimeter barrier. Height of tower
increases the range of observation
during day and night with artificial
illumination.

a. Towers
c. Clear zone
d. Protection in depth
d. Signs and Notices
It is a type of Security Lighting similar
to continuous lighting but can be turned
on manually or by special device or
other automatic means, when there is a
suspicion of entry.

a. Standby Lighting
b. Stationary Luminary
c. Glare Projection type
d. Controlled lighting
It is a type of Security Lighting similar
to continuous lighting but can be turned
on manually or by special device or
other automatic means, when there is a
suspicion of entry.

a. Standby Lighting
b. Stationary Luminary
c. Glare Projection type
d. Controlled lighting
Are designed to alert security personnel
of an attempted or consummated
intrusion into an area, building or
compound.

a. Alarm System
b. Barrier
c. Top Guard
d. Security Guard
Are designed to alert security personnel
of an attempted or consummated
intrusion into an area, building or
compound.

a. Alarm System
b. Barrier
c. Top Guard
d. Security Guard
Among the parts of alarm it refers to a
device that can sense an abnormal
condition within the system and provide
a signal

a. Signal
b. Circuit
c. Sensor
d. Annunciator
Among the parts of alarm it refers to a
device that can sense an abnormal
condition within the system and provide
a signal

a. Signal
b. Circuit
c. Sensor
d. Annunciator
It is a type of protective alarm system
where an installation owned system
which is a direct extension of the local
enforcement agency and/or fire
department by special arrangements.

a. Central Station System


b. Proprietary System
c. Auxillary System
d. Local Alarm System by Chance
system
e. Dial Alarm System
It is a type of protective alarm system
where an installation owned system
which is a direct extension of the local
enforcement agency and/or fire
department by special arrangements.

a. Central Station System


b. Proprietary System
c. Auxillary System
d. Local Alarm System by Chance
system
e. Dial Alarm System
A device placed at the ceilings of the
floor that detects smoke, typically as an
indicator of fire.

a. FIRE ALARM
b. Smoke Detector
c. Fire Bell
d. Glare Projection
A device placed at the ceilings of the
floor that detects smoke, typically as an
indicator of fire.

a. FIRE ALARM
b. Smoke Detector
c. Fire Bell
d. Glare Projection
G.I. steel or plastic pipes located inside
the building from the lowest to the top
floor with water underpressure for use
in case of fire. Located near the
standpipe is a fire hose usually enclosed
in a glass box.

a. AUTOMATIC SPRINKLER
b. STAND PIPES
c. FIRE HYDRANT
d. FIRE EXTINGUISHER
G.I. steel or plastic pipes located inside
the building from the lowest to the top
floor with water underpressure for use
in case of fire. Located near the
standpipe is a fire hose usually enclosed
in a glass box.

a. AUTOMATIC SPRINKLER
b. STAND PIPES
c. FIRE HYDRANT
d. FIRE EXTINGUISHER
What class of fire is hay belongs to?

a. Class A
b. Class B
c. Class C
d. Class D
e. Class K
What class of fire is hay belongs to?

a. Class A
b. Class B
c. Class C
d. Class D
e. Class K
If you need to use a fire extinguisher,
remember the acronym ___ ?

a. PASE
b. PASS
c. ASS
d. SAFE
If you need to use a fire extinguisher,
remember the acronym ___ ?

a. PASE
b. PASS
c. ASS
d. SAFE
Defined as mechanical, electrical,
hydraulic or electronic device designed
to prevent entry to a building or room.

a. Alarm
b. lighting
c. Lock
d. Barrier
Defined as mechanical, electrical,
hydraulic or electronic device designed
to prevent entry to a building or room.

a. Alarm
b. lighting
c. Lock
d. Barrier
Requires the manipulation of parts
according to a predetermined
combination code of numbers.

a. Key operated lock


b. Padlock
c. Combination lock
d. Card Operated Lock
e. Electronic lock
Requires the manipulation of parts
according to a predetermined
combination code of numbers.

a. Key operated lock


b. Padlock
c. Combination lock
d. Card Operated Lock
e. Electronic lock
In Key Control it has the capability to
open all locks within a particular area or
grouping

a. Change Key
b. Sub Master key
c. Central Station System
d. Proprietary System
In Key Control it has the capability to
open all locks within a particular area or
grouping

a. Change Key
b. Sub Master key
c. Central Station System
d. Proprietary System
A term used in England for lock picker,
safecrackers, and penetrators of
restricted areas or rooms.

a. Jaun Dela Cruz


b. Peterman
c. False key
d. Pijano
A term used in England for lock picker,
safecrackers, and penetrators of
restricted areas or rooms.

a. Jaun Dela Cruz


b. Peterman
c. False key
d. Pijano
Is any natural person who offers or
renders personal service to watch or
guard residential or business premises
or both, government and/or their
premises for hire and compensation.

a. Security Supervisor
b. Security Guard
c. Private Detective
d. Special Watchman Agency
Is any natural person who offers or
renders personal service to watch or
guard residential or business premises
or both, government and/or their
premises for hire and compensation.

a. Security Supervisor
b. Security Guard
c. Private Detective
d. Special Watchman Agency
It is otherwise known as the Private
Security Agency Law of 1969.

a. RA 6975
b. RA 8551
c. RA 11131
d. RA 5487
It is otherwise known as the Private
Security Agency Law of 1969.

a. RA 6975
b. RA 8551
c. RA 11131
d. RA 5487
It is an office under the Civil Security
Group which is charged with the
supervision, direction and control of all
security agencies in the Republic.

a. PNP Firearms and Explosive


Division
b. NBI
c. PNP SOSIA
d. NAPOLCOM
It is an office under the Civil Security
Group which is charged with the
supervision, direction and control of all
security agencies in the Republic.

a. PNP Firearms and Explosive


Division
b. NBI
c. PNP SOSIA
d. NAPOLCOM
WHO MAY ORGANIZE AND MAINTAIN
PRIVATE SECURITY AGENCY AND
PRIVATE DETECTIVE AGENCY?

a. Alien
b. Filipino
c. Chinese
d. Americans
WHO MAY ORGANIZE AND MAINTAIN
PRIVATE SECURITY AGENCY AND
PRIVATE DETECTIVE AGENCY?

a. Alien
b. Filipino
c. Chinese
d. Americans
THE FOLLOWING ARE AMONG THE
QUALIFICATIONS OF SECURITY GUARD
OR WATCHMAN except?

a. High School graduate


b. Physically and mentally fit;
c. Not be less than twenty five (25)
years of age;
d. At least eighteen (18) years of age
but not more than fifty (50) years old;
THE FOLLOWING ARE AMONG THE
QUALIFICATIONS OF SECURITY GUARD
OR WATCHMAN except?

a. High School graduate


b. Physically and mentally fit;
c. Not be less than twenty five (25)
years of age;
d. At least eighteen (18) years of age
but not more than fifty (50) years old;
AMONG THE FOLLOWING ARE
QUALIFICATIONS FOR SECURITY
OFFICER, except?

a. Holder of a Baccalaureate Degree;


b. Physically and mentally fit;
c. Holder of Masters degree either in
Criminology, Public Administration,
MNSA, Industrial Security
Administration, or Law
d. Has graduated from a Security
Officer Training Course or its
equivalent
AMONG THE FOLLOWING ARE
QUALIFICATIONS FOR SECURITY
OFFICER, except?

a. Holder of a Baccalaureate Degree;


b. Physically and mentally fit;
c. Holder of Masters degree either
in Criminology, Public
Administration, MNSA, Industrial
Security Administration, or Law
d. Has graduated from a Security
Officer Training Course or its
equivalent
ONE AMONG THE QUALIFICATIONS OF
SECURITY CONSULTANT is Must have at
least ___ years experience in the
operation and management of security
business.

a. 5
b. 10
c. 15
d. 20
ONE AMONG THE QUALIFICATIONS OF
SECURITY CONSULTANT is Must have at
least ___ years experience in the
operation and management of security
business.

a. 5
b. 10
c. 15
d. 20
Types of Guard Force a security force
maintained and operated by any private
company corporation utilizing any of its
employees to watch secure and guard
its establishment.

a. Government Guard Forces.


b. Security Agency service
c. Company Guard Forces
d. Aota
Types of Guard Force a security force
maintained and operated by any private
company corporation utilizing any of its
employees to watch secure and guard
its establishment.

a. Government Guard Forces.


b. Security Agency service
c. Company Guard Forces
d. Aota
In PSA what is the ratio of firearms to
security guard?

a. 1:50
b. 1: 25
b. 1:2
d. Not to exceed 10% of the total
number of SG.
In PSA what is the ratio of firearms to
security guard?

a. 1:50
b. 1: 25
b. 1:2
d. Not to exceed 10% of the total
number of SG.
Total number of firearms of the PSA
shall not exceed ___ ?

a. 200
b. 300
c. 400
d. 500
Total number of firearms of the PSA
shall not exceed ___ ?

a. 200
b. 300
c. 400
d. 500
The following are the firearms that may
be used by a security guard except?

a. Cal. 22
b. Cal. 45
c. Cal. 38
d. 12 gauge shotgun
The following are the firearms that may
be used by a security guard except?

a. Cal. 22
b. Cal. 45
c. Cal. 38
d. 12 gauge shotgun
The minimum number of guards for a
private security agency:

a. 200
b. 1000
c. 30
d. It Depends
The minimum number of guards for a
private security agency:

a. 200
b. 1000
c. 30
d. It Depends
A written order/schedule issued by a
superior officer usually the private
security agency/branch manager or
operations officer assigning the
performance of private
security/detective services duties.

a. BDO
b. CDO
c. DDO
d. SOGO
A written order/schedule issued by a
superior officer usually the private
security agency/branch manager or
operations officer assigning the
performance of private
security/detective services duties.

a. BDO
b. CDO
c. DDO
d. SOGO
Required duration of training for Pre
Licensing Training Course?

a. 150 hrs
b. 48 hrs
c. 300 hrs
d. 48 hrs
Required duration of training for Pre
Licensing Training Course?

a. 150 hrs
b. 48 hrs
c. 300 hrs
d. 48 hrs
New applicants for a PSA license to
operate shall be required to obtain a
minimum capitalization of?

a. 1 million
b. 500, 000 pesos
c. 2 million
d. SEC
New applicants for a PSA license to
operate shall be required to obtain a
minimum capitalization of?

a. 1 million
b. 500, 000 pesos
c. 2 million
d. SEC
PSA's with 800-100 guards shall have a
surety bond of?

a. 50, 000 pesos


b. 100, 000 pesos
c. 150, 000 pesos
d. 200, 000 pesos
PSA's with 800-100 guards shall have a
surety bond of?

a. 50, 000 pesos


b. 100, 000 pesos
c. 150, 000 pesos
d. 200, 000 pesos
Ms. Buted put up a New Private Agency
(PSA) duly registered in the Securities
and Exchange Commission, however,
before she can be given a Temporary
License to Operate for its first year of
operation he must employ at least ___
guards.

a. 100
b. 200
c. 300
d. 400
Ms. Buted put up a New Private Agency
(PSA) duly registered in the Securities
and Exchange Commission, however,
before she can be given a Temporary
License to Operate for its first year of
operation he must employ at least ___
guards.

a. 100
b. 200 - regular
c. 300
d. 400
The Temporary License to Operate
(LTO) issued to the NEW PSA of Mr.
Santos shall be valid for a period of:

a. 1 year
b. 2 years
c. 3 years
d. 4 years
The Temporary License to Operate
(LTO) issued to the NEW PSA of Mr.
Santos shall be valid for a period of:

a. 1 year
b. 2 years
c. 3 years
d. 4 years
In connection with the foregoing
questions before the lapse of the
validity of temporary LTO the minimum
200 guards must be met for the
issuance of regular LTO. If in case Mr.
Borsba was not able to employ a
minimum of 200 guards, the temporary
LTO may be extended for a period of:
a. Another 1 year
b. 3 months
c. 6 months
d. 9 months
In connection with the foregoing
questions before the lapse of the
validity of temporary LTO the minimum
200 guards must be met for the
issuance of regular LTO. If in case Mr.
Borsba was not able to employ a
minimum of 200 guards, the temporary
LTO may be extended for a period of:
a. Another 1 year
b. 3 months
c. 6 months
d. 9 months
Who among the following has the power
to approve and cancel the Temporary
License to Operate issued to Private
Security Agency:

a. Chief PNP
b. Director, Civil Security Group
c. NAPOLCOM
d. DILG
Who among the following has the power
to approve and cancel the Temporary
License to Operate issued to Private
Security Agency:

a. Chief PNP
b. Director, Civil Security Group
c. NAPOLCOM
d. DILG
The following are ADVANTAGES OF
COMPANY GUARD FORCE except?

a. High caliber and receives higher


salary;
b. Provides better service;
c. More familiar with facilities they
protect
d. Can easily obtain extra guard if
needed
The following are ADVANTAGES OF
COMPANY GUARD FORCE except?

a. High caliber and receives higher


salary;
b. Provides better service;
c. More familiar with facilities they
protect
d. Can easily obtain extra guard if
needed
One of the ESSENTIAL QUALITIES OF
SECURITY GUARD is ability to take hold
of oneself regardless of a provoking
situation. This quality is referring to?

a. Tactfulness
b. Physical Fitness
c. Alertness
d. Self Control
One of the ESSENTIAL QUALITIES OF
SECURITY GUARD is ability to take hold
of oneself regardless of a provoking
situation. This quality is referring to?

a. Tactfulness
b. Physical Fitness
c. Alertness
d. Self Control
In case of emergency or in times of disaster
or calamity when the services of any security
agency/entity and his personnel are needed.
The ____ may muster or incorporate the
members of the agency or agencies nearest
the area of such disaster or calamity to help
in the maintenance of peace and order,
prevention of crime, or apprehension of
violators of laws and ordinance, and in the
protection of lives and properties.

a. Congressman
b. city or municipal mayor
c. Chief of police
d. Baranggay Captain
In case of emergency or in times of disaster
or calamity when the services of any security
agency/entity and his personnel are needed.
The ____ may muster or incorporate the
members of the agency or agencies nearest
the area of such disaster or calamity to help
in the maintenance of peace and order,
prevention of crime, or apprehension of
violators of laws and ordinance, and in the
protection of lives and properties.

a. Congressman
b. city or municipal mayor
c. Chief of police
d. Baranggay Captain
The boss forgot to lock the security
cabinet full of cash and Pedro his
employee saw it and was tempted to
steal it. Based on the scenario what
type of pilferage is referring to?

a. Casual pilferage
b. Systematic pilferage
c. Qualified theft
d. Robbery
The boss forgot to lock the security
cabinet full of cash and Pedro his
employee saw it and was tempted to
steal it. Based on the scenario what
type of pilferage is referring to?

a. Casual pilferage
b. Systematic pilferage
c. Qualified theft
d. Robbery
Is the monitoring of telephone
conversations by a third party, often by
covert means.

a. Eavesdropping
b. Bugging
c. Wiretapping
d. Aota
Is the monitoring of telephone
conversations by a third party, often by
covert means.

a. Eavesdropping
b. Bugging
c. Wiretapping
d. Aota
A specialized type of physical security
protecting the assets, personnel and
operation of a bank, with special
emphasis on the precaution and
measures to safeguard the cash and
assets while in s storage, in transit, and
during transaction

a. Communication Security
b. Bank Security
c. Document and Information Security
d. Physical Security
A specialized type of physical security
protecting the assets, personnel and
operation of a bank, with special
emphasis on the precaution and
measures to safeguard the cash and
assets while in s storage, in transit, and
during transaction

a. Communication Security
b. Bank Security
c. Document and Information Security
d. Physical Security
Term given to the requirement that the
dissemination of classified matters be
limited strictly to those persons whose
official duties require knowledge
thereof.

A. CLASSIFY
b. SECURITY CLEARANCE
c. COMPARTMENTATION
d. NEED TO KNOW
Term given to the requirement that the
dissemination of classified matters be
limited strictly to those persons whose
official duties require knowledge
thereof.

A. CLASSIFY
b. SECURITY CLEARANCE
c. COMPARTMENTATION
d. NEED TO KNOW
Types of SECURITY OF CLASSIFIED
MATTER that is referring to any
information and material, the
unauthorized disclosure of which would
endanger national security, cause
serious injury to the interest or prestige
of the nation or any governmental
activity.
a. Top Secret
b. Secret
c. CONFIDENTIAL
d. RESTRICTED
Types of SECURITY OF CLASSIFIED
MATTER that is referring to any
information and material, the
unauthorized disclosure of which would
endanger national security, cause
serious injury to the interest or prestige
of the nation or any governmental
activity.
a. Top Secret
b. Secret
c. CONFIDENTIAL
d. RESTRICTED
Part of physical security that deals
primarily with the protection of
processes, formulas, patents, and other
industrial and manufacturing activities
from espionage, infiltration, loss,
compromise or photocopying;

a. Document and Information Security


b. Operational Security
c. Communication Security
d. Bank Security
Part of physical security that deals
primarily with the protection of
processes, formulas, patents, and other
industrial and manufacturing activities
from espionage, infiltration, loss,
compromise or photocopying;

a. Document and Information Security


b. Operational Security
c. Communication Security
d. Bank Security
A grant given by the government to an
inventor, conveying and securing to him
the exclusive rights to make, use and
sell his invention for term of twenty
(20) years.

a. Trade secret
b. Proprietary information
c. Patent
d. Nota
A grant given by the government to an
inventor, conveying and securing to him
the exclusive rights to make, use and
sell his invention for term of twenty
(20) years.

a. Trade secret
b. Proprietary information
c. Patent
d. Nota
Systematic program for gathering and
analyzing information about
competitor's activities and general
business trends to further company’s
goals.

a. Trade secret
b. Proprietary information
c. Patent
d. Competitive Intelligence
Systematic program for gathering and
analyzing information about
competitor's activities and general
business trends to further company’s
goals.

a. Trade secret
b. Proprietary information
c. Patent
d. Competitive Intelligence
Types of Competitive Intelligence where
it is obtained through clearly unethical
or illegal means.

a. White
b. Gray
c. Black
d. Pink
Types of Competitive Intelligence where
it is obtained through clearly unethical
or illegal means.

a. White
b. Gray
c. Black
d. Pink
TYPES OF DOCUMENTS. This is a record,
the loss of which may cause
inconvenience but could be readily
replaced and may not present
insurmountable obstacle to the prompt
restoration of the business;

a. Vital Document
b. Important Document
c. Useful Document
d. Non essential Document
TYPES OF DOCUMENTS. This is a record,
the loss of which may cause
inconvenience but could be readily
replaced and may not present
insurmountable obstacle to the prompt
restoration of the business;

a. Vital Document
b. Important Document
c. Useful Document
d. Non essential Document
A heavily constructed fire and burglar
resistant container usually part of the
building structure use to keep and
protect cash, documents and negotiable
instruments.

a. File room
b. Safe
c. Vault
d. Tool box
A heavily constructed fire and burglar
resistant container usually part of the
building structure use to keep and
protect cash, documents and negotiable
instruments.

a. File room
b. Safe
c. Vault
d. Tool box
It is an inquiry into the character,
reputation, discretion, integrity, morals,
and loyalty of an individual In order to
determine a person’s suitability for
appointment or access to classified
matter.

a. Security Survey
b. Security Inspection
c. Personnel Security Investigation
d. Security Planning
It is an inquiry into the character,
reputation, discretion, integrity, morals,
and loyalty of an individual In order to
determine a person’s suitability for
appointment or access to classified
matter.

a. Security Survey
b. Security Inspection
c. Personnel Security Investigation
d. Security Planning
A fact finding probe to determine a
plant’s adequacy in all aspects of
security, with the corresponding
recommendations.

a. Security Survey
b. Security Inspection
c. Personnel Security Investigation
d. Security Education
A fact finding probe to determine a
plant’s adequacy in all aspects of
security, with the corresponding
recommendations.

a. Security Survey
b. Security Inspection
c. Personnel Security Investigation
d. Security Education
It is PRE-DETERMINING a course of
action or It is deciding IN ADVANCE
what to do, how to do it, and who is to
do it.

a. Security Survey
b. Security Inspection
c. Security Planning
d. Security Education
It is PRE-DETERMINING a course of
action or It is deciding IN ADVANCE
what to do, how to do it, and who is to
do it.

a. Security Survey
b. Security Inspection
c. Security Planning
d. Security Education
It is defined as the exposure and
teaching of employees on security and
its relevance to their work. It is
conducted to develop security
awareness among employees of the
company. It should cover all employees,
regardless of rank or position.

a. Security Survey
b. Security Inspection
c. Security Planning
d. Security Education
It is defined as the exposure and
teaching of employees on security and
its relevance to their work. It is
conducted to develop security
awareness among employees of the
company. It should cover all employees,
regardless of rank or position.

a. Security Survey
b. Security Inspection
c. Security Planning
d. Security Education
Protection of personnel especially
ranking official from any harm, kidnap,
and others act. VIP security is type of
personnel security;

a. Security Survey
b. Security Inspection
c. Security Planning
d. Personnel Security
Protection of personnel especially
ranking official from any harm, kidnap,
and others act. VIP security is type of
personnel security;

a. Security Survey
b. Security Inspection
c. Security Planning
d. Personnel Security
Is mandated by law to provide
protective security to government
officials, foreign dignitaries, and private
individuals authorized to be given
protection and also provide physical
security to vital installations, and assist
the Presidential Security Group (PSG) in
securing the President and the members
of the First Family.
a. PSPG
b. HPG
c. PCR
d. CIDG
Is mandated by law to provide
protective security to government
officials, foreign dignitaries, and private
individuals authorized to be given
protection and also provide physical
security to vital installations, and assist
the Presidential Security Group (PSG) in
securing the President and the members
of the First Family.
a. PSPG
b. HPG
c. PCR
d. CIDG
Practical test or exercise of plans or any
activity to test its validity, an
operational readiness exercise;

a. Access list
b. Dry run
c. Duress Code
d. Security Hazard
Practical test or exercise of plans or any
activity to test its validity, an
operational readiness exercise;

a. Access list
b. Dry run
c. Duress Code
d. Security Hazard

You might also like