Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
R.A. 5487
“AN ACT TO REGULATE THE
ORGANIZATION AND OPERATION OF
PRIVATE DETECTIVE, WATCHMAN OR
SECURITY AGENCIES”
Creation of Supervisory Unit
WDC
NECESSITY OF SECURITY
1. Human hazards
2. Natural hazards
WDC
Human hazards
The act or condition affecting the safe
operation of the facility caused by
human action, accidental or
intentional. It includes sabotage,
espionage, pilferage and theft,
disloyalty, disaffection and subversive
activities.
Natural Hazards
Those caused by natural
phenomena like flood, typhoon,
earthquake, etc. that caused
damage, disturbance and problems
of the normal functioning activities
including security.
WHAT ARE HAZARDS?
It is the protection
resulting from the
application of various
measures that prevent
or delay the enemy or
unauthorized persons
in gaining information
through the
communication
system. This includes:
Communication Security
1. Transmission Security – A
component of communication
security that results from all
measures designed to protect
transmission from the
interception, traffic analysis, and
imitative deception.
Communication Security
1. Physical Security
➢ measures taken to prevent physical access or
entry to an installation or area by unauthorized
personnel.
2. Personnel Security
➢ measures applied to ensure suitability for
appointment or access to classified matter as
well as the protection of company personnel
against potential harmful acts or conditions.
3. Document and Information Security
➢ measures designed to safeguard company
documents from unauthorized disclosure of the
information
“The Physical Security”
COMPONENTS OF PHYSICAL
SECURITY
1. Perimeter Barriers
2. Protective Lightings
3. Protective Alarms
4. Protective Locks and Key Control and
5. Protective Cabinets
6. Guard Force and Guard Systems
7. Personnel Identification & Movement
Control
Principles of Physical Security
Enemy Agents Must Access –
Acquisition of information is the ultimate
results, and the means and form in
which the information is obtained.
There is No Impenetrable Barrier –
For the unfriendly government or
organization, they are willing to devote
enough time, money, personnel,
material, and imagination in passing
barriers. So physical security attempts
to build defense by using a certain
barrier.
Defense in depth means barrier
after barrier - In order that barrier
could prevent unauthorized access
and serve its purpose very well,
there should be an integration of all
barriers adopted in the installation.
Surreptitious vs. Non-
Surreptitious – Surreptitious
entry means not observable while
non-surreptitious entry is
observable. Observable or not,
intruders usually find the right
place and right opportunity to gain
access. Physical security then
needed to detect or deny
unauthorized entries.
Each Installation is Different –
Since each installation is different,
each will have different problems
overcome. The security procedures
will not adequate for all
installations.
PRINCIPLES OF PHYSICAL
SECURITY Defense in depth
means barrier
after barrier
Surreptitious
versus Non-
Surreptitious Entry
Each Installation is
Different
There is No
Impenetrable
Barrier
Enemy Agents
Must Access
WHAT ARE BARRIERS?
❑ any physical
structure
whether natural
or man made.
❑ capable of
restricting,
delaying or
preventing
unauthorized
access
2 General Types of Physical
Security
Natural Barriers - These are
offered by nature which could
obstruct or delay the passage way of
potential intruders . These also refer
to natural structures that serve as
deterrents or obstructions to
intruders such as high cliff, canyon,
desert, or bodies of water.
2 General Types of Physical
Security
Man-made Barriers – These are
structural constructions like
fences, walls, floors, roofs, grills,
bars, roadblocks, other physical
means to deter or impede
penetration.
LINE OF PHYSICAL DEFENSE
helps
delay or • First Line - perimeter barriers;
stop
intruders
1. Top Guard
➢ additional overhang of barbed wire placed on vertical
perimeter fences facing upward and outward with a 45-
degree angle with three to four strands of barbed wires
spaced 6-inches apart.
2. Guard Control Stations
➢ provided at main perimeter entrance to secure areas
located out of doors,
3. Towers or “Guard towers”
➢ are house-like structures above the perimeter barriers.
ADDITIONAL PROTECTIVE
MEASURES…
4. Barrier Maintenance
➢ Fencing barriers and protective walls should always be
regularly inspected by security.
5. Protection in Depth
➢ In large open areas or ground where fencing or walling is
impractical and expensive, warning signs should be
conspicuously placed.
6. Signs and Notices or “Control signs”
➢ controls unauthorized ingress, and preclude accidental
entry.
Perimeter Guards
Fixed Post – Security Guard are
assigned in a particular place of the
compound to guard and watch the
area and surrounding; and
Patrol (Roving) – In this system,
the security guard is required to
walk and go around regularly
around the company premises.
PROTECTIVE LIGHTINGS
a. Glare–projection type
➢ focused to the intruder while the guard remains in
the dark.
b. Controlled lighting
➢ focused on a pile of items rather than on the
background.
TYPES OF SECURITY
LIGHTINGS…
2. Stand-by Lighting
➢ similar to continuous lighting but
turned on manually or by other
automatic means.
TYPES OF SECURITY
LIGHTINGS…
3. Movable Lighting
➢ stationary or manually operated search
lights
4. Emergency Lighting
➢ used in the event of electrical failure
GENERAL TYPES OF
LIGHTING SOURCES
1. Incandescent Lamp
2. Mercury Vapour Lamp
3. Metal Halide
4. Fluorescent Lamp
5. High-Sodium Vapour Lamp
INCANDESCENT LIGHTS
104
Kinds of Alarms
❑ What is a Key?
◼ a metal bar with notches or grooves that,
when inserted into a lock and turned,
operates the lock’s mechanism; or
◼ door or lock opener: a device such as a
plastic card with an encoded magnetic
strip that operates a door or lock
TYPES OF LOCKS
1. Key-operated Lock
2. Padlock
3. Combination lock
4. Code Operated Lock
5. Card-coded Lock
6. Electrical Lock
7. Electromagnetic Lock
Key-operated mechanical lock
it uses some sort of arrangement of internal
physical barriers (wards tumblers) which
prevent the lock from operating unless they
are properly aligned.
The key is the device used to align these
internal barriers so that the lock may be
operated.
Types of
Key-operated Lock
1. Warded Lock
2. Disc or wafer tumbler mechanism
3. Pin tumbler mechanism
4. Lever tumbler mechanism
Warded lock
Disc tumbler (wafer) lock
Lever Tumbler Lock
Pin Tumbler Lock
Padlock
a portable and
detachable lock
having a sliding hasp
which passes through
a staple ring and is
then made fasten or
secured.
Combination Locks
it uses numbers,
letters or other
symbols as
reference point
which enable an
operator to align
them manually.
Code Operated Locks
❑ can be opened by
pressing the series
of numbered
button in the
proper sequence.
Electrical lock
a type of lock
that can be
opened and
closed remotely
by electrical
means.
Electromagnetic Locks
❑ devices holding a
door by
magnetism.
❑ when the power is
secured on the
door, it will resist
pressure of up to
1000 pounds.
TYPES OF KEYS
❑ Where to file?
✓ To the Office of the C/PNP thru the C/PNP-SOSIA
(SAGSD) using the SAGSD Form 01-94 and
SAGSD Form 02-94.
REQUIREMENTS FOR NEW PSA
❑ Application Form for license to operate
shall contain the following:
◼ full name of the applicant;
◼ his age, civil status; and
◼ residence and location of his business.
REQUIREMENTS FOR NEW PSA
❑ In case of corporation, association
or partnership copies of the
following shall be appended:
◼ Certificate of Registration with the
SEC; and
◼ BY-Laws and Articles of
incorporation.
REQUIREMENTS FOR NEW PSA
➢ Graduated Scale of License to
Operate
▪ PSAs with temporary LTO having 200
or more but not exceeding 1000 shall
be issued a regular LTO good for 2
years.
▪ New PSA shall be issued a temporary
LTO good for 1 year.
REQUIREMENTS FOR NEW PSA
➢ Graduated Scale of License to Operate
▪ PSAs with temporary LTO having posted
100 guards or more but less than 200
shall upon expiration of such LTO shall be
issued an extension period of 6 mos.
However, upon expiration of the extension
period, no extension shall be granted unless
the PSA shall submit a certification for
additional 50 guards posted for a 150
guards total.
REQUIREMENTS FOR NEW PSA
➢ Graduated Scale of License to Operate
▪ PSAs with temporary LTO having posted
100 guards or more but less than 200
shall upon expiration of such LTO shall be
issued an extension period of 6 mos.
However, upon expiration of the extension
period, no extension shall be granted unless
the PSA shall submit a certification for
additional 50 guards posted for a 150
guards total.
REQUIREMENTS FOR NEW PSA
➢ Graduated Scale of License to
Operate
▪ LTO of PSA with less than 100 guards
after 1 year shall not be renewed.
REQUIREMENTS FOR NEW PSA
➢ Graduated Scale of License to
Operate
▪ PSAs with temporary LTOs, upon
expiration still fail to comply with 200
guards requirement shall be granted
another 6 mos. period. However, failure
to comply shall serve a basis for the
issuance of cease to operate order.
Graduated Scale of License to
Operate
✓ Filipino citizen
✓ At least 25 years old
✓ College graduate and/or
✓ A commissioned officer in the inactive service or
✓ Retired from AFP or PNP or
Graduated/taken course in concepts and methods in
industrial Security and Security Management and/or
✓ Must have and adequate training or experience in
security business
✓ Good moral character - not having been convicted of any
crime involving moral turpitude; and
Disqualifications
◼ dishonorably discharged from AFP/PNP or separated
for cause from any government entity or government
owned or controlled corporation;
◼ Being mentally incompetent;
◼ Being physically unfit;
◼ Addicted to the use of narcotic and/or prohibited drugs
and/or substances;
◼ Habitual drunkard and alcoholic;
◼ Dummy of any foreigner; and
◼ Elective or appointive government officials and
employees
Basic requisites for security
guards
✓ Filipino citizen;
✓ High school graduate;
✓ Physically and mentally fit;
✓ At least 18 years old but not more
than 50 years old;
✓ Has undergone pre-licensing
training course; and
✓ Must not possess any of the
disqualifications.
Who are exempted from Pre-
Licensing
❑ develop security
awareness among
employees of the
company.
❑ should cover all
regardless of rank
or position.
Phases of Security
Education Program
1. Creation
2. Classification
3. Storage
4. Retrieval
5. Retention/Purging
6. Transfer
7. Disposition
PERTINENT DEFINITON OF
TERMS
Classified Information- this includes all
information concerning document,
cryptographic devices developed projects and
materials following on the categories of Top
Secret, Confidential or Restricted.