FUNDAMENTALS OF INDUSTRIAL SECURITY.pdf

FlorArquillano3 3,571 views 202 slides Apr 25, 2024
Slide 1
Slide 1 of 202
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113
Slide 114
114
Slide 115
115
Slide 116
116
Slide 117
117
Slide 118
118
Slide 119
119
Slide 120
120
Slide 121
121
Slide 122
122
Slide 123
123
Slide 124
124
Slide 125
125
Slide 126
126
Slide 127
127
Slide 128
128
Slide 129
129
Slide 130
130
Slide 131
131
Slide 132
132
Slide 133
133
Slide 134
134
Slide 135
135
Slide 136
136
Slide 137
137
Slide 138
138
Slide 139
139
Slide 140
140
Slide 141
141
Slide 142
142
Slide 143
143
Slide 144
144
Slide 145
145
Slide 146
146
Slide 147
147
Slide 148
148
Slide 149
149
Slide 150
150
Slide 151
151
Slide 152
152
Slide 153
153
Slide 154
154
Slide 155
155
Slide 156
156
Slide 157
157
Slide 158
158
Slide 159
159
Slide 160
160
Slide 161
161
Slide 162
162
Slide 163
163
Slide 164
164
Slide 165
165
Slide 166
166
Slide 167
167
Slide 168
168
Slide 169
169
Slide 170
170
Slide 171
171
Slide 172
172
Slide 173
173
Slide 174
174
Slide 175
175
Slide 176
176
Slide 177
177
Slide 178
178
Slide 179
179
Slide 180
180
Slide 181
181
Slide 182
182
Slide 183
183
Slide 184
184
Slide 185
185
Slide 186
186
Slide 187
187
Slide 188
188
Slide 189
189
Slide 190
190
Slide 191
191
Slide 192
192
Slide 193
193
Slide 194
194
Slide 195
195
Slide 196
196
Slide 197
197
Slide 198
198
Slide 199
199
Slide 200
200
Slide 201
201
Slide 202
202

About This Presentation

fundamentals of security management


Slide Content

INDUSTRY
Thetermdenotes
“earnestorconstant
applicationtowork
orbusiness’’,ora
specialbranchof
work,orthecapital
or workers
employedinit.

Industrial
Thisisdefinedasthepertainingtoor
engaged inindustry.Theword
industrialmayalsomean:ofindustry
orrelatingto,usedin,createdby
industry;and/or ofindustry’s
workforceorrelatingtoorinvolving
workersinindustry.

SECURITY
a state or condition of being secured;
there is freedom from fear, harm,
danger, loss, destruction or damages.

FACTORS THAT BRING ABOUT
UNSECURED CONDITIONS
THREATS
-an activity that could lead to a loss
HAZARDS
-a condition that could lead to a loss
VULNERABILITY
-a weakness that can be used to gain
access to an asset
RISK
-a potential loss or damage

NECESSITY OF SECURITY
Securitymeasuresareinevitableor
necessaryfortheattainmentof
goalsandobjectiveswhenan
individualororganizationis
exposed tohazards,their
productivityisadverselyaffected.

SECURITY VS. SAFETY
state of being “safe”, the condition
of being protected against physical,
social, spiritual, financial, political,
emotional, etc.

MANAGEMENT
The skillful use of
means in order to
attain a purpose.

IndustrialSecurity
Securitymeasures appliedto
businessindustries;orthebusiness
ofprovidingsecurityandprotection
toprivateindividualsbusiness
enterprises,orgovernment and
nongovernmentindustries.

WHAT IS INDUSTRIAL SECURITY
MANAGEMENT?
❑“the skillful
handling of the
security and safety
measures of
business
enterprises and
industrial
establishments.”

PHILOSOPHY OF SECURITY
MANAGEMENT
Management tool that is protective in
nature;
A shared responsibilities;
Effective and efficient use of resources.
Security practitioners protect assets and
prevent or minimize business
interruptions; and
A need for management and technical
skills.

HISTORY OF THE SECURITY
PROFESSION
Ancienttime,villageshave
establishedownedsecurityforce
(able-bodiedmen)
1950s SG under the Mayor
June13,1969“PSALaw”was
approvedmakingPCasthesole
authoritytosupervisePSA,CGFand
theirSGthruCong.TeoduloNatividad

What is PSA LAW?
R.A. 5487
“AN ACT TO REGULATE THE
ORGANIZATION AND OPERATION OF
PRIVATE DETECTIVE, WATCHMAN OR
SECURITY AGENCIES”

Creation of Supervisory Unit
Aug.4,1969,PCSIASO-Security
andInvestigationAgencySupervisory
Officewasorganizedwith8officers
and8enlistedpersonnelunderC3
Division.
OnOct.21,1969,HPCGeneralStaff
issuedaMemo No.8renaming
PCSIASOtoPCSOSIAlaterPCSUSIA
pursuanttoG.O.No.404datedon
June29,1970.

ARE THERE AMENDMENTS OF
R.A. 5487?
Oct.30,1972P.D.11amendingcertain
sectionsparticularlySec.4-whomay
organizePSA.
Jan.17,1973P.D.100–Sec.3,4,5,8and9were
amended fortheimprovementofPCto
deputizeSGincasesofemergency or
disaster.Sec11-PSAtobegrantedlicenseto
operate
April28,1984P.D.1919–Sec.3,8,16and18
providedefinitionofSG,powerofC/PC,
exception of GSU for LTO
andminimum/maximum numberofSG.

Supervisory Unit
HPCG.O.213andGHQSNo.9dated
onJan.10,1988organizedPCCivil
SecurityForceCommand, later
changedtoPC/INPCSF.
Jan.1,1991,PNPwasorganized
renamingPCSOSIAtoPNPSOSIA
June1,1995,SUSIAtoSAGSD
becomingoneofthetwomajor
divisionsofCSG.

LAWS RELATED TO
SECURITY MANAGEMENT
R.A. No. 5487–approved June 13, 1969,
known as Private Security Agency Law
R.A. 6975 –The law authorizing the PNP the
control and supervision of the security
agencies in the Philippines. Approved into law
December 13, 1990.
WDC

NECESSITY OF SECURITY
❑Security measures are inevitable or
necessary for the attainment of
goals and objectives.
❑When an individual or organization is
exposed to hazards, their
productivity is adversely affected.

1.Human hazards
2.Natural hazards
WDC
PROBLEMS IN SECURITY
MANAGEMENT

Human hazards
Theactorconditionaffectingthesafe
operationofthefacilitycausedby
human action, accidental or
intentional.Itincludessabotage,
espionage, pilferageandtheft,
disloyalty,disaffectionandsubversive
activities.

Natural Hazards
Those caused by natural
phenomenalikeflood,typhoon,
earthquake,etc.thatcaused
damage,disturbanceandproblems
ofthenormalfunctioningactivities
includingsecurity.

WHAT ARE HAZARDS?
❑conditions that may cause damage to
property, injury, or loss of life.
❑“exposure to the chance of loss or
injury.

SECURITY AND SAFETY
MEASURES
❑Active measures
➢physical barriers, security lightings,
safes and vaults, locks and other
devices.
❑Passive measures
➢deter mans from committing acts for
fear of being caught.
➢Ex: Security education programs, security
investigation, fire prevention seminars,
safety drills, etc.

TYPES OF SECURITY
PhysicalSecurity–Itisthebroadest
branchofsecuritywhichisconcerned
withthephysicalmeasuresadoptedto
prevent unauthorized access to
equipment,facilities,materials,and
documents,andtosafeguardthem
againstespionage,sabotagedamage
andtheft.

PHYSICAL SECURITY
CONCEPTS
9Ds
Define
Deny
Delay
Direct
Detect
Detain
Deter
Disseminate
Defend

Communication Security
Itistheprotection
resultingfrom the
applicationofvarious
measuresthatprevent
ordelaytheenemyor
unauthorizedpersons
ingaininginformation
through the
communication
system.Thisincludes:

1.Transmission Security –A
component ofcommunication
securitythatresultsfromall
measures designedtoprotect
transmission from the
interception,trafficanalysis,and
imitativedeception.
Communication Security

Communication Security
2.Cryptographic Security–Result
fromtheprovisionsoftechnically
soundcrypto-systemsandtheir
properuse.

Communication Security
3.PhysicalSecurity–Providingof
safeguardstoequipment and
materials from access by
unauthorizedpersons.

Hotel Security
Itreferstotheprotectionofassets,
guests,personaleffectsandother
propertiesinhotels,inns,andother
similarestablishments.

Bank Security
Aspecializedtypeofthephysical
securityprotectingtheassets,
personnel,andoperationofa
bankingwithspecialemphasison
theprecautionandmeasuresto
safeguardthecashandassets
whilethestorage,intransit,and
duringtransaction.

Document Security
Itisthephysicalsecurityinvolving
theprotectionofdocumentsand
classifiedpapersfromlossaccess
byunauthorizedpersons,damage,
theftandcompromise though
disclosure.

Personal Security
Thisinvolvestheprotectionof
personnel especially ranking
officialsfromanyharm,kidnap,
andotheracts.VeryImportant
People(VIP)securityisatypeof
personalsecurity.

Crisis Security
ThisisapartoftheVIPsecurity
involvedinhostagekidnapping
VIPs.

Industrial Security
Thisisappliedtobusinessgroups
engagedinindustrieslikemanufacturing
,assemblingresearchdevelopment,
processing,warehousingandeven
agriculture.Usesprotectivebarriers,
securitylightings,personnelmovement
control,lockandkeymanagement,
guardforces,communications and
electronichardwareareessentialaside
fromfirepreventionandcontrol
programs,emergencyplans,industrial
safety, and security education
programs.

Operational Security
Thisisatypeofsecuritythatdeals
primarilywiththeprotectionof
processes,formula,patentsand
otherindustrialandmanufacturing
activities from espionage,
infiltration,loss,compromise,and
photocopying.

Other Special Types of Security
AirCargoSecurity–Thisis
appliedtominimize,notprevent,
lossesofcargoduringintransit,
storageortransfer.
SchoolSecurity–Thisisapplied
inresponsetotheincreaseof
violentcrimescommittedagainst
studentsandschoolpersonnel,and
schoolproperties.

Supermarket Security–Thisis
applied inresponse tothe
mushrooming ofbazaars,marts,
supermalls,andthelike.
Personnel Security –Thisis
involvedinthebackgroundchecksof
theindividualscommensurate with
thesecurityrequirementsoftheir
work.Thisalsoincludes,measures
designedtoprotectemployeesofan
organization or business
establishment.

Legal Basis of Industrial
Security in the Philippines
NaturalAuthority–Thehighestlaw
isthelawofself-preservation.By
instinctofman,mannaturallyreacts
inordertoprotecthimself,hisfamily,
hishonor,freedom,libertyand
propertyfromdanger,threator
hazard.Hedoesitpersonallyor
throughthehelpofothers.

Constitutional Authority
Theprimedutyofthegovernmentis
toserveandprotectthepeople.The
governmentmaycalluponthepeople
todefendthestateand,inthe
fulfilmentthereof,allcitizensmaybe
requiredunderconditionsprovidedby
law,ortorenderpersonalmilitary
service(ArticleII,Section4ofthe
1987PhilippineConstitution).

Statutory Authority
TheRevisedPenalCode
(Act.No.3815)
PrivateSecurityAgencyLaw
(RA5487)

THREE MAJOR DIVISIONS OF
INDUSTRIAL SECURITY
1.Physical Security
➢measures taken to prevent physical access or
entry to an installation or area by unauthorized
personnel.
2.Personnel Security
➢measures applied to ensure suitability for
appointment or access to classified matter as
well as the protection of company personnel
against potential harmful acts or conditions.
3.Document and Information Security
➢measures designed to safeguard company
documents from unauthorized disclosure of the
information

“The Physical Security”

COMPONENTS OF PHYSICAL
SECURITY
1.Perimeter Barriers
2.Protective Lightings
3.Protective Alarms
4.Protective Locks and Key Control and
5.Protective Cabinets
6.Guard Force and Guard Systems
7.Personnel Identification & Movement
Control

Principles of Physical Security
Enemy Agents Must Access –
Acquisitionofinformationistheultimate
results,andthemeansandformin
whichtheinformationisobtained.
ThereisNoImpenetrable Barrier–
Fortheunfriendlygovernment or
organization,theyarewillingtodevote
enough time,money, personnel,
material,andimaginationinpassing
barriers.Sophysicalsecurityattempts
tobuilddefensebyusingacertain
barrier.

Defenseindepthmeansbarrier
afterbarrier-Inorderthatbarrier
couldpreventunauthorizedaccess
andserveitspurposeverywell,
thereshouldbeanintegrationofall
barriersadoptedintheinstallation.

Surreptitious vs. Non-
Surreptitious –Surreptitious
entrymeansnotobservablewhile
non-surreptitious entry is
observable.Observableornot,
intrudersusuallyfindtheright
placeandrightopportunitytogain
access.Physicalsecuritythen
needed todetectordeny
unauthorizedentries.

EachInstallationisDifferent–
Sinceeachinstallationisdifferent,
eachwillhavedifferentproblems
overcome.Thesecurityprocedures
willnot adequate forall
installations.

PRINCIPLES OF PHYSICAL
SECURITY
Defense in depth
means barrier
after barrier
Surreptitious
versus Non-
Surreptitious Entry
Each Installation is
Different
There is No
Impenetrable
Barrier
Enemy Agents
Must Access

WHAT ARE BARRIERS?
❑any physical
structure
whether natural
or man made.
❑capable of
restricting,
delaying or
preventing
unauthorized
access

2 General Types of Physical
Security
NaturalBarriers- Theseare
offered bynaturewhichcould
obstructordelaythepassagewayof
potentialintruders.Thesealsorefer
tonaturalstructuresthatserveas
deterrents orobstructions to
intruderssuchashighcliff,canyon,
desert,orbodiesofwater.

2 General Types of Physical
Security
Man-madeBarriers–Theseare
structuralconstructions like
fences,walls,floors,roofs,grills,
bars,roadblocks,otherphysical
means todeterorimpede
penetration.

LINE OF PHYSICAL DEFENSE
helps
delay or
stop
intruders
•First Line -perimeter barriers;
•Second Line -building exteriors
.
•Third Line -includes those
internal control measures

CONCEPT OF PERIMETER
BARRIERS
❑medium of structure which defines the
physical limits.
❑restrict or impede access.
❑any physical barrier used to supplement the
protection of an inside or outside perimeter.

PERIMETER BARRIER
OPENINGS
1.Gates and doors should also be guarded or locked;
2.Windows and similar openings should also be
guarded or grills should be installed;
3.Sidewalks elevators should be locked and guarded;
4.Utilities openings such as sewers, air intakes,
exhaust tunnels should be protected by bars, grills,
etc.;
5.Clear Zone is an unobstructed area maintained on
both sides of the perimeter barrier.
❑ A clear zone of 20 ft. or more is desirable between the
barrier and extension structures and natural covers
which may provide concealment or assistance to a
person seeking unauthorized entry.

TYPES OF PERIMETER
BARRIERS
1.FENCES -control physical and visual
access between outside areas.
➢Solid -visual access is denied.
➢Full-View -visual access is permitted

TYPES OF PERIMETER BARRIERS
2.BUILDING WALLS includewalls,
floor,roofsortheircombinations
servealsoasbarriersandthey
shouldbeofsuchconstructionsto
provideuniformprotectionjustlike
wire-fencing.
3.BODIES OFWATER likeriver,
lake,cataract,sea,pondorany
bodiesofwaterformingpartofthe
wall,buildingorfencingshouldnot
be considered an adequate
perimeterbarrier.

CHAIN LINK FENCE
Mustbeconstructedof7-feetmaterial
excludingtopguard.
Mustbeof9-gaugeorheavier.
Meshopeningsarenottobelargerthan2”per
side.
Shouldbeatwistedandbarbedsalvageattop
andbottom.
Mustbesecurelyfastenedtorigidmetalor
reinforcedconcrete.
Mustreachwithin2”ofhardgroundorpaving.
Onsoftground,mustreachbelowsurfacedeep
enoughtocompensateforshiftingsoilorsand.

BARBED WIRE FENCE
Standardbarbedwireistwisted,double
strand,12ga.wirewith4pointbarbs
spacedanequaldistantapart.
Barbedwirefencingshouldnotbeless
than7feethigh,excludingtopguard.
Barbedwirefencingmustbefirmlyaffixed
topostsnotmorethan6feetapart.
Thedistancebetweenstrandsmustnot
exceed6”andatleastonewirewillbe
interlacedverticallyandmidwaybetween
posts.

ADDITIONAL PROTECTIVE
MEASURES
1.Top Guard
➢ additional overhang of barbed wire placed on vertical
perimeter fences facing upward and outward with a 45-
degree angle with three to four strands of barbed wires
spaced 6-inches apart.
2.Guard Control Stations
➢provided at main perimeter entrance to secure areas
located out of doors,
3.Towers or “Guard towers”
➢ are house-like structures above the perimeter barriers.

ADDITIONAL PROTECTIVE
MEASURES…
4.Barrier Maintenance
➢Fencing barriers and protective walls should always be
regularly inspected by security.
5.Protection in Depth
➢In large open areas or ground where fencing or walling is
impractical and expensive, warning signs should be
conspicuously placed.
6.Signs and Notices or “Control signs”
➢controls unauthorized ingress, and preclude accidental
entry.

PerimeterGuards
Fixed Post –Security Guard are
assigned in a particular place of the
compound to guard and watch the
area and surrounding; and
Patrol(Roving)–Inthissystem,
thesecurityguardisrequiredto
walkandgoaroundregularly
aroundthecompanypremises.

PROTECTIVE LIGHTINGS
❑providesameansofillumination
❑adegreeofprotectionmaintainedduring
daylighthours.
❑deterrenttothievesandvandals
❑anessentialelementofanintegrated
physicalsecurityprogram.

TYPES OF SECURITY
LIGHTINGS
1.Stationary Luminary (Continuous)
2.Stand-by Lighting
3.Movable Lighting
4.Emergency Lighting

TYPES OF SECURITY
LIGHTINGS
1.Stationary Luminary (Continuous)
➢fixed luminous to flood a given area
continuously with overlap.
a.Glare–projection type
➢focused to the intruder while the guard remains in
the dark.
b.Controlled lighting
➢focused on a pile of items rather than on the
background.

TYPES OF SECURITY
LIGHTINGS…
2.Stand-by Lighting
➢similar to continuous lighting but
turned on manually or by other
automatic means.

TYPES OF SECURITY
LIGHTINGS…
3.Movable Lighting
➢stationary or manually operated search
lights
4.Emergency Lighting
➢used in the event of electrical failure

GENERAL TYPES OF
LIGHTING SOURCES
1.Incandescent Lamp
2.Mercury Vapour Lamp
3.Metal Halide
4.Fluorescent Lamp
5.High-Sodium Vapour Lamp

INCANDESCENT LIGHTS
have low initial cost

Mercury Vapor lamps
emit a purplish-
white color gas.
More efficient
in exterior
lighting.

Metal Halide
similar in physical
appearance to
mercury vapor,
but provides a light
source of higher
luminous efficiency
and better color
rendition.

Fluorescent Lamp
good color
rendition.
cannot project
light over long
distances
not desirable as
flood type lights.

High-pressure Sodium Vapor
exterior lighting of parking areas,
roadways, buildings, and industrial and
commercial installation.
It emits golden white to pink color.

Low-Pressure Sodium Vapor
This type of light produces yellow
color.

Quartz Lamps
Thistypeoflampproducesvery
brightlight.

Types of Lighting Equipment
Floodlightsareusedforoutdoor
securitylightingincludingthe
illuminationofboundaries,fences,
andbuildings.

Types of Lighting Equipment
Street lights
producediffused
lightratherthan
directionalbeam.
Theyarewidely
usedinparking
areas.

Types of Lighting Equipment
Searchlightsareincandescentlights
thatprovideatypeofcrime-related
lightingsystem.

Lighting Application/Lighting
Systems
FencedPerimeterLightingisused
toilluminatethefenceitselfandthe
areabeyondit“thedetectionzone”.
Itsobjectiveistorevealanintruder’s
approachandproduceglaretowards
him,thusreducinghisabilitytosee
inthesite.However,itcanbedifficult
toapplybecauseitmaycreate
nuisanceorhazards.

Lighting Application/Lighting
Systems
AreaLightingisusedinabuildingface
perimetersconsistoffacesofbuilding
onorwithin20ft.ofthepropertyor
arealinetobeprotectedandwherethe
publicmayapproachthebuilding.
Guardsmaybestationedinsideor
outsidethebuilding.Doorwaysorother
insetsinthebuilding‘sfaceshould
receivespecialattentionforlightingto
eliminateshadows.

Lighting Application/Lighting
Systems
FloodLightingisusedtocasta
stronglightonthewallsof
buildingsothatintrudersare
visibleeitherinsilhouette
(outline)orbytheshadows
whichtheycast.

Lighting Application/Lighting
Systems
GateHouseLightingisinstalled
onactiveentrancedpedestrians
and vehiclestofacilitate
complete inspection of
passengers,cars,trucksand
freightcarsaswellastheir
contentsandpassengers.

Lighting Application/Lighting
Systems
Topping-upLightsisusedto
illuminatedarkareanotadequately
litbyareaorfloodlighting.Areas
and structures within the
installationpropertylinesconsistof
yards,storage,spaces,largeopen
workingareas,piers,docks,and
othersensitiveareas.

PROTECTIVE ALARMS
❑Another safeguard that
complement if not to
supplement physical
security
❑Alerts security
personnel to
consummated or
attempted intrusion

THREE PARTS OF AN ALARM
SYSTEM
1.Sensor or trigger device
➢It detects the aural or visual signals or
both.
2.Transmission line
➢a circuit which transmit the message to
the signaling apparatus.
3.Enunciator
➢it is the signaling system that activates
the alarm.

TYPES OF ALARM DETECTION SYSTEM
1.Central Station System –monitor of the
central station is located outside the
installation.
2.Proprietary System –functions in the same
way as the central system except that it is
owned and leased by the subscriber.
3.Local Alarm System –ringing up a visual or
audible alarm near the object to be protected.
4.Auxiliary System–installation circuits are
led into local police or fire department.

Alarm Sensor Alarm SensorAlarm Sensor
Alarm Annunciation
CAS
(Central Alarm Station)
Alarm Assessment
Data Gathering Panel
104

Kinds of Alarms
1.Audio Detection Device -detect sound
caused by attempted force entry.

Kinds of Alarms
2.Vibration Detection Device-
detectanyvibration.

Kinds of Alarms
3.Metallicfoilorwire-itwilldetectany
actionthatmovesthefoilorwire.

Kinds of Alarms
4.LaserBeam Alarm-alaser
emitterfloodsawallorfencing
withabeam.Ifthebeamis
disturbed,analarmisactivated.

Kinds of Alarms
5. Photoelectric or Electric Eye Device-
an invisible/visible beam is emitted.

WHAT IS PERIMETER INTRUDER
DETECTION SYSTEM (PIDS)?
These are electronic devices that
detects entry or attempted entry
across the external perimeter of a key
point or vital point and signaling an
alarm.

PROTECTIVE LOCKS AND
KEY CONTROL

What is Lock?
❑a mechanical, electrical, hydraulic or
electronic device to prevent entry
into a building, room, container or
hiding place
❑What is a Key?
◼a metal bar with notches or grooves that,
when inserted into a lock and turned,
operates the lock’s mechanism; or
◼door or lock opener: a device such as a
plastic card with an encoded magnetic
strip that operates a door or lock

TYPES OF LOCKS
1.Key-operated Lock
2.Padlock
3.Combination lock
4.Code Operated Lock
5.Card-coded Lock
6.Electrical Lock
7.Electromagnetic Lock

Key-operated mechanical lock
it uses some sort of arrangement of internal
physical barriers (wards tumblers) which
prevent the lock from operating unless they
are properly aligned.
The key is the device used to align these
internal barriers so that the lock may be
operated.

Types of
Key-operated Lock
1.Warded Lock
2.Disc or wafer tumbler mechanism
3.Pin tumbler mechanism
4.Lever tumbler mechanism

Warded lock

Disc tumbler (wafer) lock

Lever Tumbler Lock

Pin Tumbler Lock

Padlock
a portable and
detachable lock
having a sliding hasp
which passes through
a staple ring and is
then made fasten or
secured.

Combination Locks
it uses numbers,
letters or other
symbols as
reference point
which enable an
operator to align
them manually.

Code Operated Locks
❑can be opened by
pressing the series
of numbered
button in the
proper sequence.

Electrical lock
a type of lock
that can be
opened and
closed remotely
by electrical
means.

Electromagnetic Locks
❑devices holding a
door by
magnetism.
❑when the power is
secured on the
door, it will resist
pressure of up to
1000 pounds.

TYPES OF KEYS
1.Change Key -a specific key, which
operates the lock and has a particular
combination of cuts, or biting, which match
the tumblers in the lock.
2.Sub-Master Key -could open all the lock
within a particular grouping in a facility.
3.Master Key -capable of opening a series of
locks.
4.Grand Master Key -open everything in a
system involving two or more master key
groups.

Change Key (One level)
A key to a single lock within a master keyed
system.
Master Key (Two level)
All levels operated by change key and master
key Master key operates all locks generally of
one building.
Grand Master Key (Three level)
All locks operated by change key, master key
and grand master key.

Great Grand Master Key (Four level)
All locks operated by change key, master key,
grand master key and great grand master
key.
Great Great Grand Master Key (Five level)
All locks operated by change key, master key,
grand master key, great grand master key
and great great grand master key.

PROTECTIVE CONTAINERS
(CABINETS)
❑The final line of defense
where papers, records, plans
or cashable instrument,
precious metals or other
especially valuable assets are
protected.
❑These security containers will
be of a size and quantity,
which the nature of the
business dictates.
❑These could be: SAFE, VAULT
OR A FILE ROOM

SAFE
➢a metallic container used
for the safekeeping of
documents or small items
➢robbery or burglary
resistance
➢must be at least 750 lbs.
➢anchored to a building
structure
➢body should at least one
inch thick steel.

VAULT
➢a heavily constructed fire and burglar
resistance container
➢part of the building structure
➢bigger than safe
➢door should be made of steel at least
6 inches
➢walls, ceiling, floor reinforce concrete
at least 12 inches
➢must be resistive to fire up to 6
hours.

FILE ROOM
➢cubicle in a building
constructed a little
lighter than vault
➢12 feet high
➢watertight door
➢fire proof for one hour.

GUARD FORCE AND GUARD
SYSTEMS

Security Guard
sometimes called private security
guard or watchman shall include any
person who offers or renders personal
service to watch or secure either a
residence or business establishment
or both for hire or compensation,
and with a license to exercise security
profession.

GUARD FORCE
❑Group of selected men, trained or
grouped into functional unit in order to
protect operational processes from those
disruption which would impede efficiency
or halt operation.

TYPES OF GUARD FORCES
1.Private Security Agency (PSA)
➢contracts, recruits, trains, and post security
guard to a business firms
2.Company Security Force (CSF)
➢maintained and operated by any private
company or corporation
3.Government Security Unit (GSU)
➢operated by any government entity other than
military and / a police

WHAT IS PADPAO?
❑THE PHILIPPINE ASSOCIATION OF
DETECTIVE AND PROTECTIVE
AGENCY OPERATORS, INC (PADPAO)
-the national association of all licensed security
agencies and company security forces.
-Established as early as 1958 purposely for the self-
regulation of all security agencies.

WHAT IS LTO?
❑LICENSE TO OPERATE
❑document issued by the CPNP or his
duly authorized representative
authorizing a person to engage in
security business

REQUIREMENTS FOR NEW PSA
❑New ApplicantsforPSAlicenseshall
obtain:
✓Capital (minimum) –P1,000,000
✓Bank Deposit –P500,000
❑Where to file?
✓TotheOfficeoftheC/PNPthrutheC/PNP-SOSIA
(SAGSD)usingtheSAGSD Form01-94and
SAGSDForm02-94.

REQUIREMENTS FOR NEW PSA
❑Application Form for license to operate
shall contain the following:
◼full name of the applicant;
◼his age, civil status; and
◼residence and location of his business.

REQUIREMENTS FOR NEW PSA
❑Incaseofcorporation,association
orpartnershipcopiesofthe
followingshallbeappended:
◼CertificateofRegistrationwiththe
SEC;and
◼BY-Laws and Articlesof
incorporation.

REQUIREMENTS FOR NEW PSA
➢Graduated Scale of License to
Operate
▪PSAswithtemporaryLTOhaving200
ormorebutnotexceeding1000shall
beissuedaregularLTOgoodfor2
years.
▪NewPSAshallbeissuedatemporary
LTOgoodfor1year.

REQUIREMENTS FOR NEW PSA
➢Graduated Scale of License to Operate
▪PSAswithtemporaryLTOhavingposted
100guardsormorebutlessthan200
shalluponexpirationofsuchLTOshallbe
issuedanextensionperiodof6mos.
However,uponexpirationoftheextension
period,noextensionshallbegrantedunless
thePSAshallsubmitacertificationfor
additional50guardspostedfora150
guardstotal.

REQUIREMENTS FOR NEW PSA
➢Graduated Scale of License to Operate
▪PSAswithtemporaryLTOhavingposted
100guardsormorebutlessthan200
shalluponexpirationofsuchLTOshallbe
issuedanextensionperiodof6mos.
However,uponexpirationoftheextension
period,noextensionshallbegrantedunless
thePSAshallsubmitacertificationfor
additional50guardspostedfora150
guardstotal.

REQUIREMENTS FOR NEW PSA
➢GraduatedScaleofLicenseto
Operate
▪LTOofPSAwithlessthan100guards
after1yearshallnotberenewed.

REQUIREMENTS FOR NEW PSA
➢GraduatedScaleofLicenseto
Operate
▪PSAswithtemporaryLTOs,upon
expirationstillfailtocomplywith200
guardsrequirementshallbegranted
another6mos.period.However,failure
tocomplyshallserveabasisforthe
issuanceofceasetooperateorder.

Graduated Scale of License to
Operate
➢PSAswithcancelled/revokedLTOsshallcease
tooperateandwithin7daysafterhaving
beendulynotifiedofsuchceasetooperate
order,shallimmediatelydepositallitsfirearms
withtheFEDwhichshallbereceipted,copy
furnished,CPNPSOSIA(SAGSD).Otherwise,
thePSAconcerned,shallbeliableunderPD
1866(RA8249).

Who may organize and
maintain a PSA?
❑Any Filipino citizen
or corporation,
association,
partnership,
❑100% owned and
controlled by
Filipino citizens.

Basic Requirement of an Operator
or Manager of agency
✓Filipino citizen
✓At least 25 years old
✓College graduate and/or
✓A commissioned officer in the inactive service or
✓Retired from AFP or PNP or
Graduated/taken course in concepts and methods in
industrial Security and Security Management and/or
✓Must have and adequate training or experience in
security business
✓Good moral character -not having been convicted of any
crime involving moral turpitude; and

Disqualifications
◼dishonorably discharged from AFP/PNP or separated
for cause from any government entity or government
owned or controlled corporation;
◼Being mentally incompetent;
◼Being physically unfit;
◼Addicted to the use of narcotic and/or prohibited drugs
and/or substances;
◼Habitual drunkard and alcoholic;
◼Dummy of any foreigner; and
◼Elective or appointive government officials and
employees

Basic requisites for security
guards
✓Filipino citizen;
✓High school graduate;
✓Physically and mentally fit;
✓At least 18 years old but not more
than 50 years old;
✓Has undergone pre-licensing
training course; and
✓Must not possess any of the
disqualifications.

Who are exempted from Pre -
Licensing
1.Veterans and retired or honorably
discharged military/police personnel
possessing all the qualifications
mentioned in the preceding section.
2.ROTC advance/basic graduates,
and/or its equivalent in the AFP, PNP,
CAFGU/CHDF.

Private Detective
✓Holder of baccalaureate degree or
Bachelor of Laws; or
✓B.S. Criminology graduate; or
✓Graduate of Criminal Investigation
Course offered by the then PC/INP or
the PNP or the NBI or any police
training school or detective training with
authorized/recognized training center
for security guard; or
✓Advance Reserve Officers Training
Course or Citizen Military Training
(ROTC/CMT) graduate.

Security Officer
❑Filipino citizen;
❑Holder of Baccalaureate Degree;
❑Physically and mentally fit;
❑Has graduated from a Security Officer
Training Course;
❑Retired personnel of the PNP/AFP; and
❑Must not possess any of the disqualification
enumerated in Sec. 2, Rule II.

Security Consultant
❑Holder of a Masters degree in either
Criminology, Public Administration, MNSA,
Industrial Administration or Law; or
❑Must have at least 10 years experience in
the operation and management of security
business.
❑Other Exemptions -Any officer or enlisted
man of the AFP or a uniform member of
the PNP honorably discharged/separated or
retired from the service are exempted from
the requirements.

USE OF FIREARMS AND EQUIPMENT
After complying all the
requirements, PSAs are
entitled to possess firearms of
any of the ff:
◼shotguns, not higher than 12
gauge;
◼low-power rifle or revolvers, cal.
.22;
◼cal. .38 pistols or revolvers not
exceeding one (1) FA for every
two (2) security guard in its
employ.

❑PSA with 100 guards -at least 30 pieces of
licensed firearms. However, after operating
6 mos., the PSA can procure firearms in
proportion to the number of posted guards.
❑For regular License to Operate (LTO)
application -at least 70 pieces of firearms.
❑Use of firearms for Private Detective
Agency shall be OPTIONAL.

Restrictions
The total number of the prescribed high-powered
firearms shall not exceed ten (10) percent of the
total numbers of guards employed.
Private Security Agencies are not allowed to possess
high caliber guns/firearms such as: carbine; M16; Cal
45; center fire magnum cal .41 and .44; and high
caliber firearms, except: when such private PSA/CSF
is operating in areas where there is an upsurge of
lawlessness and criminality.
Exception is granted by CPNP or Regional Director of
Regional Police Office under the following conditions:

Limitations
1.During his tour of duty when in proper
uniform within the compound of the
establishment, where he is assigned; and
2.Except, when he is escorting big amount of
cash or valuables, and upon prior
coordination with the nearest PNP
units/stations.
✓Duty Detail Order or DDO –security personnel
on duties under the circumstances mentioned in
the preceding section must have DDO (SAGSD
Form No. 12-94).

Confiscation of firearms
1.about to be used in the commission of a crime;
2.actually being used in the commission of crime;
3.has just been used in the commission of a crime;
4.is being carried by the SG is unlicensed or not
authorized by law and regulation for his use;
5.confiscated by order of the court;
6.used or carried outside the AOR of the SG without
proper authority; or
7.the SG is unlicensed

Disposition of confiscated FA
❑The law enforcement officer who
confiscated the FA shall inform the CPNP
thru CSG within 24 hours after such
confiscation.
❑The firearm shall be turned over
immediately to the nearest PNP
Unit/Station who shall immediately turn
over the same to the CSG District Office.
❑When the confiscation is by order of the
court, the same shall be turned over to the
court concerned.

Revocation of license to
possess FAs
1.Failure to submit any issued FA for verification as
required by Sec. 897 of RAC;
2.Carrying of FAs by security personnel w/out
appropriate DDO;
3.When its serial number (SN) is duplicated or using
the SN for more than one firearm (FA);
4.Carrying of FAs outside the place stated in the permit
as required by E.O. or carrying FA in places
prohibited under the law;
5.Conviction of the operator or manager of the agency
of any crime involving moral turpitude; or
6.When the firearm was reported lost.

Stocking of ammunitions
limited and reasonable
quantity that suits the need
of the Agency
not exceed fifty (50) rounds
of ammunitions per unit of
duly licensed Fas.
Individual issue to security
guard shall be limited to
twenty-five (25) rounds per
SG.

UNIFORM, EQUIPMENT AND
PARAPHERNALIA
males -Headgear; service
shirt; service trousers;
service belt; and footwear.
➢Light blue and/or white
service shirts for internal
guards for PSA;
➢Light gray for company
security force; and
➢White for government
security unit.

RANKS AND POSITIONS
Security Management Staff
➢Security Director (SD) -Agency Manager/Chief Security
Officer.
➢Security Executive Director (SED) -Asst. Agency
Manager/asst. Chief Security Officer.
➢Security Staff Director (SSD) -Staff Director for Operation
and Staff
➢Director for Administration.
Line Leadership Staff
➢Security Supervisor 3 -Detachment Commanders
➢Security Supervisor 2 -Chief Inspector
➢Security Supervisor 1 –Inspector
Security Guard
➢Security Guard 1 -watchman/guard
➢Security Guard 2 -Shift-in-charge
➢Security Guard 3 -Post-in-charge

PERSONNEL IDENTIFICATION AND
MOVEMENT CONTROL
In every installation, the use of protective
barriers, security lighting, communication and
electronic hardware provides physical
safeguards but these are insufficient to
maximize the effort of the guard force.
A control point must be established for positive
personnel identification and check system.
This is to insure that only those persons who
have the right and authority will be given the
necessary access to the area.

Two (2) Types of Personnel Identification
1.Personal recognition –familiarity of the person’s
characteristics.
2.Artificial recognition-identification cards, passes,
passwords, etc.
◼Use of Pass System
➢Single pass system -the badge or pass coded for
authorization to enter specific areas is issued to an
employee who keeps it in his possession until his
authorization is terminates.
➢Pass exchange system -an exchange takes place at
the entrance of each controlled area. Upon leaving the
personnel surrenders his badge or passes and retrieve
back his basic identification.
➢Multiple pass system -this provides an extra
measure of security by requiring that an exchange take
place at the entrance of each restricted area.

PERSONNEL SECURITY
designed to prevent unsuitable
individuals from gaining access to
classified matter or to any security
facility, and to prevent appointment,
or retention

Scope of Personnel Security
1.Personnel Security Investigation
(PSI)
2.Security Education

WHAT IS PERSONNEL
SECURITY INVESTIGATION?
an inquiry into the
character, moral,
reputation, integrity,
discretion and loyalty of
individual in order to
determine a person’s
suitability to be given
security clearance.

Types of Personnel Security
Investigation (PSI)
1.National Agency Check (NAC). –made upon the basis
of written information supplied by him in response to
official inquiry, and by reference to appropriate
national agencies. Ex:NICA, NBI, ISAFP or CIDG etc.
2.Local Agency Check (LAC) –written inquiries sent to
appropriate local government agencies, former
employees, references and schools listed by the
person under investigation. The local agencies
normally check besides the past employment,
schools and references

General Techniques of PSI
1.Background Investigation (BI )-this technique is
very expensive but necessary in personnel security. It
serves to verify information on the application form and
to obtain other information pertinent to the decision to
employ.
2.Positive Vetting-is the process of inspecting or
examining with careful thoroughness. The essence of
vetting that it is a personal interview conducted under
stress. It is based on information previously given by the
applicant. Other information issued during the interview,
such as those discovered in the BI, which confirms or
denies this given by the applicant.

3.Profiling-is the process whereby a subject’s reaction in
a future critical situation is predicted by observing his
behavior, or by interviewing him, or analyzing his
responses to a questionnaire, such as an honesty test.
The Reid Report is an example of honesty test.
4.Deception Detection Techniques -this a process of
using devices in detecting deception during the interview
stage. This includes the use of a Polygraph, Psychological
Stress Evaluator and Voice Analyzer.
5.Financial and Lifestyle Inquiry-this type of
investigation seeks to gather information on income and
mode of living, sometimes referred to as the earning-to-
debt ratio.

6.Undercover Investigation -this is the
placement of an agent in a role in which the
agent’s true identity and role remains
unknown, in order to obtain information for
criminal prosecution or for recovery or
limitation of asset losses.
7.Exit Interview-this is a valuable tool because
it gives departing employees an opportunity to
list grievances.

SECURITY EDUCATION
❑develop security
awareness among
employees of the
company.
❑should cover all
regardless of rank
or position.

Phases of Security
Education Program
1.Initial interview-first contact wherein the
interviewer determine the suitability of the
applicant
2.Orientation and Training-detailed
presentation of personnel security policy
3.Refresher Conference -remind
responsibilities, review guidelines and
policies, introduction of new policies
4.Security Reminders-indirect approach of
educating the employees
5.Security Promotion –emphasizing the
importance and role of security

DOCUMENT AND INFORMATION
SECURITY
❑plays a significant role
in the daily operations
and activities of an
installation.
❑Once the contents of a
company’s document
and information are
divulged the operational
stability is at stake.

DOCUMENT/ INFORMATION CYCLE
1.Creation
2.Classification
3.Storage
4.Retrieval
5.Retention/Purging
6.Transfer
7.Disposition

PERTINENT DEFINITON OF
TERMS
Classified Information-this includes all
information concerning document,
cryptographic devices developed projects and
materials following on the categories of Top
Secret, Confidential or Restricted.
Classified Matter-any information or material
in any form or of any nature, the safeguarding
of which is necessary in the interest of security
and which is classified for such purpose by the
responsible classifying authority.

Classify-this refers to the assigning of
information or material, one of the four
security categories after determination has
been made that the information requires the
security protection as provided.
Declassify-the act of removing the security
classification from classified information or
matter.
Reclassifying or Regarding -refers to the act
of changing the assigned classification from
classified information or matter.

Upgrading-refers to the act of assigning the
information or matter to the higher
classification than that previously assigned to
it.
Compartmentation -refers to the grant of
access to the classified matter only to properly
cleared person when such classified
information is required in the performance of
their official duties.

Need to know-is the dissemination of classified
information or matter to be limited strictly to those
person whose duties requires knowledge or possession
thereof.
Unauthorized-refers to person not authorized to have
access on classified matters.
Compromise -this takes place through the loss of
security, which results from unauthorized persons
obtaining knowledge of classified matters.
Damage to National Security -refers to the prejudice,
embarrassment or injury to the country resulting from
act or omission.

Purpose of Protecting
Classified Materials
1.Deter and impede potential spy
2.Assist in security investigations by
keeping accurate records of the
moments of classified materials.
3.Enforce the use of “Need to Know”
principle

Three (3) Security Concepts
1.Personnel are the weakest link in the
security chain.
2.Training is important to make
security personnel conscious and
realize the value of document.
3.Training is necessary for the practice
of “Need to Know” principle.

Four (4) Types of Classified
Matters
1.TOP SECRET (green color code) –is any
information and materials, the unauthorized
disclosure of it would cause exceptionally grave
damage to the nation, politically, economically
and military operation.
2.SECRET (red color) –is any information and
material, the unauthorized disclosure of it
would endanger national security, causes
serious injury to the interest and prestige of
the nation of any government activity, or of
great advantage to a foreign country.

3.CONFIDENTIAL (blue color code) –is any
information or material, the unauthorized
disclosure of it would be prejudicial to the
interest and prestige of the national or
governmental activity or would cause
administrative embarrassment or unwanted
injury to and be of advantage to a foreign
country.
4.RESTRICTED (white or no color) -is any
information and material which requires special
protection other than those determines
confidential, secret and top secret.

TYPES OF BUSINESS RECORDS
1.Class I (Vital Records)–liable records of which
reproduction does not have the same value as the original,
records needed to recover cash to replace buildings,
equipment, raw materials, finished products and records
needed to avoid delay in restoration of production, sales and
services.
2.Class II (Useful Records) -loss might cause inconvenience
but could be readily replaced and which would not in the
meantime present an insurmountable obstacle to the prompt
restoration of the business.
3.Class III (Important Records) –reproduction of which will
involve considerable expense and labor, or considerable delay.
Operating and statistical records belong to this class as well as
those to maintain check on efficiencies, operating costs, etc.
4.Class IV (Non-Essential Records)–These are the daily
files, routine in nature so that even if lost or destroyed, will
not affect operation or administration.

Rules for Classification of Documents
1.Documents shall be classified according to their
content.
2.The overall classification of a file or of a group
of physically connected therein. Pages,
paragraphs, sections or components thereof
may bear different classifications. Documents
separated from file or group shall be handled in
accordance with their individual classification.

3.Transmittal of documents or endorsements
which do not contain classified information or
which contain information classified lower than
that of the preceding element or enclosure
shall include a notation for automatic
downgrading.
4.Correspondence, Indexes, receipts, reports of
possession transfer or destruction, catalogs, or
accession list shall not be classify if any
reference to classified matter does not
disclosed classified information.
5.Classified matter obtained from other
department shall retain the same original
classification.

WHAT IS SECURITY
CLEARANCE?
❑certification by a responsible authority that
the person described is cleared for access
to classified matter the appropriate level
❑the administrative determination that an
individual is eligible for access to classified
matter.
❑Need-to-knowis the principle whereby
access to classified matter may only be
only given to those persons to whom it is
necessary for the fulfillment of their duties.

PROTECTION OF SENSITIVE
INFORMATION
Proprietary information is information that in
some special way relates to the status or
activities of the possessor and over which the
possessor asserts ownership. In the business
community, proprietary information relates to
the structure, products or business methods of
the organization. It is usually protected in
some way against causal or general disclosure.

Types of Proprietary
Information
1. Trade Secrets-this consist of any formula, pattern,
device or compilation of information which is used in
one’s business and which gives him an opportunity to
gain an advantage over competitors who do not know or
use it. It may be a formula for a chemical compound, a
process of manufacturing, treating or preserving
materials, a pattern for machine or device, or a list of
customers. It differs from other secret information as to
single or ephemeral events. A trade secret is a process
or device for continuous use in the protection of the
business.
2.Patents-this is a grant made by the government to an
inventor, conveying or securing to him the exclusive
right to make, use, or sell his invention for term of
years.

RISKS ANALYSIS AND
SECURITY HAZARDS

What is Risk Analysis?
the analysis of risk which includes
examinations of the vulnerability,
probability and criticality of potential
threats and include natural and man made
risk.
◼Risk -potential damage or loss of an asset
◼Vulnerability -weaknesses
◼Probability -chance or likelihood that a loss will
take place.
◼Criticality -impact of a loss as measured in
financial terms.

What is Security Hazard?
act or condition which may result in
the compromise of information, loss
of life, loss or destruction of property
or disruption of the objective of the
installation.
act or condition affecting the safe
operation of the facility caused by
human action accidental or
intentional.

What is Risk Management?
❑a process of selecting and
implementing security
countermeasures to achieve an
acceptable level of risk at an
acceptable cost.
◼Countermeasures -An action taken or a
physical security used to reduce or
eliminate one or more vulnerabilities.

RELATIVITY OF RISK AND SECURITY
The extent and degree of risks to security is
dependent on the following:
➢Relative criticality of operation–importance of
the firm with reference to the natural economy and
security. Ex: gasoline depots, communication
transmission lines, and power plants.
➢Relative vulnerability–susceptibility of the plant
or establishment to damage, loss or disruption of
operation due to various hazards. A good example is
the location of the building; the machines; or
presence of possible poisons.

RISK MANAGEMENT ALTERNATIVES AND
STRATEGIES
1.Risk Avoidance–removing the risk totally from the
business. Ex: proper disposal of inflammable substances.
2.Risk Reduction–minimizing the probability of the
potential loss. Ex: construction of fences and similar
physical barriers.
3.Risk Spreading–spreading the risk through
decentralization to limit the impact (criticality) of the
potential loss. Ex: use of vaults or safes
4.Risk Transfer–moving the financial impact of the
potential loss-over to an insurance company. This is done
by availing of property and life insurances. Hiring security
agencies is also a good example of this.
5.Risk Self-assumption–planned assumption and
acceptance of the potential risk by making a deliberate
managerial decision of doing nothing about the threat, or
setting aside resources for use in case of loss

Pilferage as a Business
Hazard
Pilferage is one of the most annoying and
common human hazards which security has to
deal with. This activity if uncontrolled can
become financial drain if not a menace to
smooth and orderly operation.
Failure to detect shortage and inaccurate
inventories will cause inventory losses, which
may be labeled as pilferage.

Types of Pilferers
1.Casual Pilferer-one who steals due to his inability to
resist the unexpected opportunity and has little fear of
detection is no plan or premeditation and he is usually a
“loner” on the job. The temptation to pick up the article
is basically due to poor security measure. The
implication of causal pilfering is the big cumulative cost if
it remains unchecked.
2.Systematic Pilferer-one who steals with preconceived
plans and takes away any or all types of items or
supplies for economic gain. Pilferers of this kind can be
employees or outsiders of the establishment.

SECURITY SURVEY AND INSPECTION
SECURITY SYSTEM –This is the set of policies,
procedures and rules and regulations designed to
reduce to an absolute minimum the possibility of
espionage, sabotage and compromise of classified
information of an office or a whole establishment.
SECURITY SURVEY –This is also known as security
audit which is actually a fact-finding probe to
determine a plant’s adequacy and deficiency in all
aspects of security, with the corresponding
recommendations.

SECURITY INSPECTION
–This is a check of how well existing
security measures and regulations
are being carried out within a
detachment or establishment. A
security inspection may also include
an investigation of alleged or
suspected security violations.

TYPES OF SECURITY
INSPECTIONS
1.Continuous Inspection -anon-going and
never ending activity.
2.Formal or Informal
◼Formal Inspection-preceded by an
announcement
◼Informal Inspection-understood by all and
accepted as part of the organizational life.
3.Structured or Unstructured Inspection
◼Structured Inspectionis one that moves
systematically from one area to the next and so
on.
◼Unstructured inspectionis conducted in a
random manner.
Tags