Introduction To Industrial Security Concepts Word Docs
Introduction To Industrial Security Concepts Word Docs
Introduction To Industrial Security Concepts Word Docs
Introduction Security concerns everyone. All ages must be aware of what and how to make
herself secured because we don’t know when, where and how we could possibly meet danger.
In this course, we will be able to identify possible hazards or danger and learn on how we are
going to combat them and we will be enlightened with the laws governing security.
A. Early Civilization
Security has a long history dating back to the origin of human being.
Cave dwellers devised various forms of security to protect themselves and their
property from other tribe and wild animals.
The Law of Hammurabi- (King of Babylon 1900 B.C.). The Law of Hammurabi is the
earliest record of laws to protect people and property.
The ancient Greek City-States (about 600B.C.) This was consisted of the municipality
and the surrounding territory with a centrally located fortress built on a hill. -These city-
states created what is considered the first Police Force.
B. Middle Ages
1066 England- King William assumed ownership of the land when he conquered
England.
King William- Duke of Norwandy (France)
He divided England into fifty-five military district and given the title REEVES.
REEVE- during this time, another position created to assist the reeves, which were
Constabuli.
CONSTABULI- means that keeper of the stable.
Constable- it denotes to someone with special power
King John- he was forced to sign the Magna Charta (1215)- this document guaranteed
basic civil and political liberties to both people and nobles.
King Edward I- issued the stature of Westminster in 1285- established a systematic
police and justice system.
The Watch and Ward- organized town watchmen to patrol at night and to assist the
constables who worked during the day.
Curfew- this act also established the position of bailiff who was required to check on all
strangers every fifteen days. Today bailiffs are officers of the court.
The hue and Cry- this was an integral part of the watch and cry.
Assize of Arms- this requires all males between fifteen to sixty years to maintain a
weapon in their home. The Statute of Westminster established this and they played a
significant role in promoting law and order.
C. The Eighteen Century
In 1749, Henry Fielding published the first great social novel entitled Tom Jones.
The bow Street Runners- this referred to as the first detective unit, since they quickly
moved to the scene of crimes for immediate investigation.
D. Nineteen Century
Sir Robert Peel was introduced into parliament the Metropolitan Police Act in 1829. He
argued for a single police system in London composed of professionals that would be
carefully selected and thoroughly trained. At the same time, he realized that the police
could never be effective if the law were wide in scope and harsh in penalty.
Today police officers in England are called Bobbies and named after Sir Robert Peel.
Allan Pinkerton was a maker of barrels to trade, he settled in Chicago from Scotland
and became interested in law enforcement and made a career change by becoming a
deputy sheriff.
In 1984, Pinkerton was appointed Chicago’s first detective. After seven years, he
formed his own private security agency company, the Pinkerton National Detective
Agency that provides security to various business clients.
During the Civil War, US president Abraham Lincoln summoned Allan Pinkerton to
Washington t established an intelligence network for union forces.
William J. Burns (USA)- he was a former secret service investigator who headed the
bureau of investigation.
In 1850s, Henry Wells joined William Fargo and they established American Express
which operates east of the Missouri River.
In 1859, Washington Perry Brink established da freight and package delivery service in
Chicago and he concentrated on the protection of valuables in transit.
In 1910, William J Burns, the foremost American Investigator of his day and the first
director of the government agency that later became the FBI.
In 1917, the armored truck was born.
This was the era of the Robber Barons. It is when the massive corporate organizations
formed secret agreements to eliminate competition. Although Congress passed the
Sherman Anti-Trust Act in 1890 to curb monopolies, railroads became one of the most
hated industries because violence was involved.
Several States enacted legislation permitting rail roads to organized security force with
full police power.
In 1914, there were about fourteen thousand railroad police in America. They were
deputized by the federal government to help prevent sabotage.
I. The growth of security after world war II
In 1950, the department of defense formulized security requirements for defense
contractors to protect classified information and materials and to prevent espionage.
Terrorist attack with hijacked airline killed about 5,000 people by leveling the World
Trade Center and destroying part of the Pentagon these bolts surprise attracts, subsequent
bio-terrorism, and the war in Afghanistan show difficult and guard are yielding to
professional security officer who is more educated, better trained, knowledgeable of
humorous security and loss prevention strategies.
Personnel- are the backbone of protection efforts, various security devices and systems
that provides additional safeguards like;
a. Dogs- with their keen sense and smell; they are a very old form of alarm notification.
b. The ancient civilization in China and Egypt equipped doors with primitive keyed
locks.
c. Early Egyptians constructed locked vaults deep inside huge pyramids that illustrated
the concept of “protection in depth”, a modern strategy used in banks.
d. The ancients of Israel used bright light and loud noise to scare intruders.
e. Gideon- he is a Jewish warrior king who instilled fear in a large invading force by
blowing three hundred trumpets and waving three hundred torches.
f. The Romans used the sensitive hearing and squawking of geese to warn of an
approaching army.
g. During the 1700s, British investors assembled the first mechanical burglar alarm
system to protect doors. It was set of chimes linked to a door lock. Therefore, burglars
defeated the system by cutting the cord between the lock and the chimes.
h. In 1852, Augustus R Pope- filed a patent for an electromagnetic alarm consisting of an
electric bell activated by falling weight or uncoiling of a spring when a door or window
opened.
i. Edwin Holmes- after six years he bought Pope patent and formed the first private
company that provides alarm protection. Holmes protection Group Inc. was acquired by
AT Security Century Service Inc. at the end of the twentieth.
Theories, Concepts, Philosophy of Security
In the 1950s, the private security agencies/guards were under the supervision and
control of the municipal and city mayors. Any civilian could be employed as a security
guard without undergoing any training at all, especially in handling firearms. The only
requirement then was a permit secured from the office of the city mayor where he was
posted. In fact, even foreigners or any person, regardless of age or educational
background were allowed owning and operate a security agency.
The Philippine Association of Detective and Protective Agency Operators
(PADPAO) was established way back 1958 with the aim of making itself as freely self-
governing, self-regulating and self-policing.
On June 13, 1969, RA 5487, otherwise known as “Private Security Agency Law
was enacted.
They provided that the Philippine Constabulary would be the sole authority to
supervise all private security agencies, co-guard forces, government guard forces and
their security guards.
Later, the control of government forces as transferred to the National Intelligence
and Security Agency. Likewise, during the succeeding years, various presidential decrees
were issued amending certain provisions of RA 5487.
On August 4, 1969, the Philippine Constabulary issued Staff Memorandum
organizing the PC Security and Investigations Supervisor Office(PCSIASO) with the
authorized strength of eight (8) officers and eight (8) enlisted personnel under the
functional grouping of C3 Division and it was later named as Constabulary Supervisory
Office for Security and Investigations Agencies (CSOSIA). Pursuant to General Order
No. 404 date June 29, 1970, the office was designated as the PC Supervisory Unit
Security and Investigation Agencies (PC SUSIA) and later as PC/INPSUSIA.
With the creation of the Philippine National Police on January 01, 1991,
PCSUSIA was again renamed as PNP Supervisory Office for Security and Investigation
Agency (PNPSOSIA), charged with the mission to provide administrative services and
general supervision over the organization, operation, business and activities of all
operating private detective, watchmen, security guards/agencies and company guards’
forces and all government guards throughout the country.
At present, SOSIA operates under a new PNP Security Agency Guard Supervisory
Division (PPSAGSD)
Security
It is the state or condition of being safe or free from fear, harm, danger, loss, destruction or
damages.
There is a need for adequate protection because of the prevailing action of man against man
that leads to unsecure or unsafe conditions due to economic reasons, revenge or just plain greed.
The security is bound to respond on calls of violence against women and children in their
AOR that is the reason why it is important for the security to be acquainted with this law.
A. National Authority 1. The highest law is the law of self-preservation. Man naturally
reacts to protect himself, his family, his honor, freedom, liberty and property from danger,
threat or hazard. It became an unwritten law of the early Filipinos to protect themselves and
their property against the natural and man-made hazard.
B. Constitutional Authority
1. The prime duty of the Government is to serve and protect the people (Art. II Sec 4)
The government may call upon the people to defend the State and in the
fulfillment thereof, all citizens may be required, under conditions provided by law,
or to render personal military service.
Although the defense of the State is the one contemplated here, people being one
of the elements of the State is directly affected in whatever protection the state
will receive from the government and the people. All citizen who are qualified,
including the security guards, may be required by law to render personal, military
or civil services.
2. No person shall be depriving of life, liberty or property without due process of law, nor shall
any person be denied the equal protection of the laws. (Art. III, Sec. 1)
This means the life, liberty, freedom and property can only be taken from a
person after the observance of due process of law. Due process of law is of two
aspects; substantive and procedural. Webster, in brief, defines procedural due
process as “one which hears before it condemns, which proceed upon inquiry, and
render judgment only after trial”. But if the taking of life, liberty, freedom or
property does not fall within the framework of due process of law, available
remedies under the law should be resorted to.
3. Private Property shall not be taken for public use without just compensation. (Art. III, Sec. 9)
The Constitution protects not only ownership but also possession, enjoyment,
use and disposition of private property by their rightful owner’s subject to such
limitations imposed by the law. In this regards, private property to be taken by the
government in its exercise of power of the eminent domain must satisfy two
important conditions namely; public use and just compensation.
4. The right of the people to be secure in their persons, houses, papers and effects against
unreasonable searches and seizures of whatever nature and for any purposes shall be inviolable,
and no search warrant or warrant of arrest shall be issued except upon examination under oath
or affirmation of the complainant and the witnesses he may produce, and particularly describing
the place to be searched and the persons or things to be seized. (Art. III, Sec. 2.
C. Statutory Authority
1. DILG Act of 1990 and later recognized as the PNP Law of 1991
The law that created the public safety agencies. Thus, the creation of Civil Security Group
under the PNP Operational Support Units which has general supervision over the organization,
business operation and activities of all organized private detectives, watchmen, security guard
agencies, and company guard forces.
This is an act defining violence against women and their Children, providing for protective
measures for victims, prescribing penalties therefore, and for other purposes. "Violence against
women and their children" refers to any act or a series of acts committed by any person against
a woman who is his wife, former wife, or against a woman with whom the person has or had a
sexual or dating relationship, or with whom he has a common child, or against her child
whether legitimate or illegitimate, within or without the family abode, which result in or is
likely to result in physical, sexual, psychological harm or suffering, or economic abuse
including threats of such acts, battery, assault, coercion, harassment or arbitrary deprivation of
liberty.
a. Respond immediately to a call for help or request for assistance or protection of the victim
by entering the necessary whether or not a protection order has been issued and ensure the
safety of the victim/s;
b. Confiscate any deadly weapon in the possession of the perpetrator or within plain view;
c. Transport or escort the victim/s to a safe place of their choice or to a clinic or hospital;
d. Assist the victim in removing personal belongs from the house;
e. Assist the barangay officials and other government officers and employees who respond to a
call for help;
f. Ensure the enforcement of the Protection Orders issued by the Punong Barangay or the
courts;
g. Arrest the suspected perpetrator without a warrant when any of the acts of violence defined
by this Act is occurring, or when he/she has personal knowledge that any act of abuse has just
been committed, and there is imminent danger to the life or limb of the victim as defined in this
Act; and
h. Immediately report the call for assessment or assistance of the DSWD, social Welfare
Department of LGUs or accredited non-government organizations (NGOs).
This is an Act providing for a comprehensive law on firearms and ammunition and providing
penalties thereof.
This is an Act Instituting the Comprehensive Dangerous Drugs Act Of 2002, Repealing
Republic Act No. 6425, otherwise known as the Dangerous Drugs Act of 1972, as Amended.
The security should be familiar with the prohibited drugs for them to positively identify it
while in the performance of their duty.
This law governs the operation, administration of security agency, and activities,
qualification, duties and licensing of security guards, watchmen and private detectives. In short,
it is the intention of this law to professionalize the security services in order to upgrade the level
of security protection.
-The applicable provisions for the Code on Crime Against Persons, personal liberty,
security and property have bearing on the security and protection of one’s life, liberty and
property.
DEFINITION OF TERMS
Industry
-the term denotes” earnest or constant application to work or business”, or A special branch of
productive work, or the capital or workers employed in it. - It is likewise defined as a large
scale production or organized economic activity connected with the production, manufacture or
construction of a particular product or range of products (Microsoft Encarta, 2001-2005)
Industrial
Management
- This term means the skillful use of means to accomplish a purpose. - This is the process of
property utilizing available resources to achieve organizational and objectives.
Industrial Security
- The term may mean: a) security measures applied to business industries (Manwong and Delizo
2006) or b) the business of providing security and protection to private individuals, business
and enterprise or government and non-government industries.
- It is the skillful handling of the security and safety measures of business enterprises and
industrial establishments.
Types of Security
2. Hotel Security-it is a type of security applied to hotels where its properties are protected
from pilferage, loss, damage and function in hotels, restaurants are not disturbed and troubled
by outsiders or the guest themselves. This type of security employs house detectives, uniform
guards and supervisors and to ensure that hotel guests and their personal effects are
safeguarded.
3. Bank Security- this type of security is concerned with bank operations. Its main
objectives are the protection of bank cash and assets, its personnel and clientele. Security
personnel are trained to safeguard bank assets while in storage, in transit and during
transactions.
4. VIP Security- a type of security applied for the protection of top-ranking officials of the
government or private entity, visiting person of illustrious and foreign dignitaries.
5. School Security- a type of security that is concern with the protection of students,
school personnel and other school properties. Security personnel are trained to protect the
school property from theft, vandals, handling campus riots and detecting the use of intoxicated
drugs and alcohol by the students.
6. Supermarket or Mall Security- a type of security which concerns with the protection of
the stores, warehouses, storage, its immediate premises and the properties as well as the
supermarket or mall personnel and customers. Security personnel are trained to detect
“shoplifter”, robbery and bomb detection and customer relation.
7. Physical Security- part of security concerned with the physical measures designed to
safeguard personnel and to prevent un authorized access to equipment, facilities, materials and
the documents and to protect them from espionage, sabotage, damages or theft. This is
considered as the broadest type of security.
8. Document Security- it is the protection of documents, classified papers and vital record
from loss, access, to unauthorized persons, damages, theft and compromise through proper
storage and procedures.
10. Communication Security- the protection resulting from the application of various
measures which prevents or delay the enemy or un authorized person in gaining information
through communication. This includes transmission, cryptographic and physical security.
1. Physical Security - this concern with the physical measures adopted to prevent un
authorized access to equipment, facilities, material and document and to safeguard them against
espionage, sabotage, damage, loss and theft.
3. Document and Information Security - this involves the protection of documents and
classified papers from loss, access by unauthorized persons, damages, theft and compromise
through disclosure. -Classified documents need special handling. Lack of indoctrination and
orientation among the personal handling them can result in the leakage, loss, theft, and un
authorized disclosure of the documents.
Physical Security
Physical measures are used to define, protect and monitor property rights and objects; they
consist of barriers and devices that are able to detect, impede, and deter potential security
threats. Physical security measures help to combat the crime related threats that both employees
and outsiders pose to the organization. (example; robbery, burglary, arson, assault, rape, theft
and vandalism). If measures are properly planned, most potential intruders, whether employees
or outsiders, should see that the risks of detection and punishment for attempting to penetrate a
protected area are significantly greater that whatever they may gain.
Security Hazard
-it is an act or condition affecting the safe operation of the facility caused by human action
accidental or intentional. It includes sabotage, espionage, pilferage and theft, disloyalty,
disaffection, and subversive activity.
2. Natural Hazards- those that are caused by natural phenomena that may cause damage,
disturbance, fear or problems to the humanity. This includes floods, typhoons, earthquakes,
storms, volcanic eruption, tidal waves, tsunami, lightning, etc.
Protective Barrier
Barrier
- any structure or physical device capable of restricting, deterring and delaying illegal access to
any installation.
Purpose of Barriers
1. Natural Barrier-Geographical features like rivers, cliffs, canyons or any other terrain
that is difficult to traverse.
2. Structural Barrier- these are features constructed by man regardless of their original
intent that tends to delay the intruders.
Examples: fence, walls, grills, doors, roadblocks, screens or any other construction
that will serve as a deterrent to unauthorized entry.
3. Human Barrier- persons being used in providing a guarding system or by the nature of
their employment and location, fulfill security functions.
Examples: Security guard and employees of the establishment.
4. Animal Barrier- animals that are used in partially providing a guarding system.
Examples: dogs, geese. turkey, parrots.
5. Energy- it is the employment of mechanical, electrical, electronic energy imposes a
deterrent to entry by the potential intruder or to provide warning to guard personnel.
Examples: protective lighting, alarm system and any electronic devices used as barriers
2. Second line of defense- doors, floors, windows, walls, roofs and grills and other entries to
the buildings.
3. Third line of defense- storage system like steel cabinets, safes, vaults and interior files.
1. Minimum Security- the system designed to impede unauthorized external activity such as
simple intrusion to armed attack.
2. Low level Security- system designed to impede and detect some unauthorized external
activity such as on small retail store, storage warehouse.
3. Medium Security- designed to impede, detect and assess most external activity and some
unauthorized internal activity that range from simple shoplifting to conspiracy to commit
sabotage.
4. High Level Security- designed to impede, detect and assess most unauthorized external and
internal activities.
1. The type of access necessary will depend upon the number of variable factors and therefore
may be achieved in a number of ways.
Perimeter Barrier
-A medium or structure, which defines the physical limits of an installation or area to restrict or
impede access thereto. It refers to any physical barrier used to supplement the protection of an
inside perimeter.
a. Inside perimeter- a line protection adjacent to protected area and passing through points of
possible entry into the area such as doors, windows, skylights or other points of access.
b. Outside perimeter-a line of protection surrounding but somewhat removed from a protected
area such as fence.
1. Fences- wire fencing can be barbed wire, chain link or concertina. Chain link are for
permanent structure, barbed wire is for semi –permanent, and concertina for the least permanent
and can also be used as temporary roadblock or impediment during strikes and crowd control.
Wire fences are attractive and low in maintenance cost; they offer fewer hazards to people
because of the absence of barbs, and the openings are small to prevent passage of pilfered.
2. Building Walls- walls, floors, roofs or their combination serve also as barriers and they
should be of such construction to provide uniform protection just like the wire fencing.
Masonry walls as perimeter barrier should have the same height as the chain link and
surmounted by the barbed wire as top guard; if the height of the masonry is less than the
prescribed, additional chain link should be placed as “topping”.
Walls can be made of stone slabs like adobe or hollow blocks bound by concrete with
post at regular intervals to prevent the walls from toppling due to wind or scouring
facilities, security must sit down with design engineers so that the area where sensitive
activity will be done should be given special emphasis in protective walls.
3. Bodies of water like river lakes, marsh cataract, sea pond or any other bodies of water
forming a part of the wall, building or fencing should never be considered adequate natural
perimeter barrier. Additional security measures like wire fence, concrete walling, security
patrolling and floodlighting at night may be necessary for the portions of the perimeter.
Types of Fences
1. Solid Fences
c. It prevents the guards from observing the area around the installation and it creates
shadow that may be used by the intruder for cover and concealment.
2. Full-view Fence
b. It allows the roving patrols and stationary guard to keep the surrounding area of the
installation under observation.
c. It allows intruder to become familiar with the movements and time schedule of the
guard patrols thereby allowing him to pick the time that is advantageous on his part.
1. Gate and doors- when not in active use and controlled by guard, gates and doors in the
perimeter should be locked and frequent inspected by guards. Locks should be changed from
time to time.
2. Sidewalk Elevator- these provide access to areas within the perimeter barrier and should be
locked or guarded.
4. Clear Zone- unobstructed area or a clear zone should be maintained on both side of the
perimeter barrier.
3. Tower- “Guard Tower”- are house-like structure above the perimeter barriers.
4. Signs and Notice- “Control Signs” should be erected where necessary in the
management of un authorized ingress and preclude accidental entry. Signs should plainly be
visible and legible from approach and in under standard language. Signs on entry should also
be posted at all principal entrance.