Review Notes On Law Enforcement Administration Sjit Criminology Cl-Mabikas 2014
Review Notes On Law Enforcement Administration Sjit Criminology Cl-Mabikas 2014
Review Notes On Law Enforcement Administration Sjit Criminology Cl-Mabikas 2014
Concept of Security
1. Physical Security – This concern with the physical measures adopted to prevent
unauthorized access to equipment, facilities, material and document and to
safeguard them against espionage, sabotage, damage, loss and theft.
2. Personnel Security – This is as important as physical security. Personnel security
starts even before the hiring of an employee and remains to be maintained for a s
long as the person is employed. Its purpose is to ensure that a firm hires those best
suited to assist the firm in achieving its goals and objectives and once hired assist
in providing necessary security to the work force while carrying out their
functions.
3. Document and Information Security – This involves the protection of
documents and classified papers from loss, access by unauthorized persons,
damage, theft and compromise through disclosure. Classified documents need
special handling. lack of indoctrination and orientation among the personnel
handling them can result in the leakage, loss, theft and unauthorized disclosure of
the documents.
1. Physical Security
Physical security measures – are being used to define, protect and monitor
property rights and assets. These measures consists of barriers and devices that would
detect, impede and prevent unauthorized access to equipment, facilities, material and
documents and to safeguard them against espionage, sabotage, damage and theft.
Purpose of barriers
Types of Barriers
1. The type of access necessary will depend upon a number of variable factors and
therefore may be achieved in a number of ways.
2. There are no impenetrable barriers.
3. Defense – in depth is barriers after barriers.
4. Delay is provided against surreptitious and non – surreptitious entry.
5. Each installation is different.
Restricted Area
Restricted Area – it is any area in which personnel or vehicles are controlled for reasons
of security. It is established to provide security for installation or facilities and to promote
efficiency of security operations and economy in the use of security personnel.
Two types of restricted areas may establish to permit different degrees of security
within the same installation or facility and to provide efficient bases for the application of
different degrees of access, circulation and protection.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
2. Limited Area – a limited area is a restricted area in which requires lesser degree
of control than in an exclusion area but which the security interest would be
compromised by uncontrolled movement.
2nd method – the second somewhat less means of accomplishing the same
thing is time travel. This system provides for checking the actual time
used by the visitor against known time requirements for what the visitor is
to accomplish.
Perimeter Security
– The function and location of the facility itself usually determine the perimeter
of the installation. If the facility is located in a city whereby the building or
enterprise occupies all the area where it is located, the perimeter may be the
walls of the building itself. Most of the Industrial companies, however, are
required to have a wide for warehouse, manufacturing etc.
Types of Fences
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
1. Solid Fence – Constructed in such a way that visual access through the fence is
denied.
Advantage:
- It denies the opportunity for the intruder to become familiar with the
personnel, activities and the time scheduled of the movements of the
guards in the installation.
Disadvantage:
- It prevents the guards from observing the area around the installation and
it creates shadow that may be used by the intruder for cover and
concealment.
2. Full – View Fence – It is constructed in such a way that visual access is permitted
through the fence.
Advantage:
- It allows the roving patrols and stationary guard to keep the surrounding of
the installation under observation.
Disadvantage:
- It allows the intruder to become familiar with the movements and time
schedule of the guard patrols thereby allowing him to pick the time that is
advantageous on his part.
1. Gates and Doors – when not in use and controlled by guards, gates and doors
in the perimeter should be locked and frequently inspected by guards. Locks
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
should be changed from time to time and should be covered under protective
locks and key control.
2. Side – Walk – Elevators – these provide access to areas within the perimeter
barrier and should be locked and guarded.
3. Utilities Opening – sewers, air intakes, exhaust tunnels and other utility
openings which penetrate the barrier and which have cross sectional areas of
96 square inches or more should be protected by bars, grills, water filled traps
or other structural means to a person seeking unauthorized entry.
3. Tower Guard – this is a house – like structure above the perimeter barriers. The
higher the tower, the more visibility it provides. It gives a psychological
unswerving effect to violators by and large guard towers, whether permanent or
temporary, must have a corresponding support force in the event of need. Towers
as well as guard control stations should have telephone, intercoms, and if possible
two – way radios connected to security headquarters or office to call for reserves
in the event or need.
6. Signs and Notices - “Control signs” should be erected where necessary in the
management of unauthorized ingress to preclude accidental entry. Signs should be
plainly visible and legible from any approach and in an understood language or
dialect.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
PROTECTIVE LIGHTING
The idea that lighting can provide improve protection for people and facilities is
as old as civilization. Protective lighting is the single most cost-effective deterrent to
crime because it creates a psychological deterrent to the intruders.
1. Continuous lighting – the most familiar type of outdoor security lighting, this is
designed to provide two specific results: 1. glare projection or 2. Controlled
lighting. It consists of a series of fixed luminaries at range to flood a given area
continuously during the hours of darkness.
Listed below are the lighting sources most frequently used in providing indoor
and outdoor lighting.
white to light pink color and this provide high lumen efficiency and relatively
good color rendition.
Areas to be lighted
1. Perimeter fence
2. Building face perimeter
3. Pedestrian and vehicle entrance
4. Parking area
5. Storage, large opened working areas, piers, docks, and other sensitive areas.
PROTECTIVE ALARMS
This is one of the important barriers in security. It assists the security in detecting
or deterring potential security threat in the installation. Basically, its function is to alert
the security personnel for any attempt of intrusion into a protected area, building or
compound. Once an intruder tampers the circuitry, the beam or radiated waves of the
alarm system, it will activate an alarm signal.
1. Central Station System – a type of alarm where the control station is located
outside the plant or installation. When the alarm is sounded or actuated by
subscriber, the central station notifies the police and other public safety agencies.
3. Local alarm – this system of ringing up a visual pr audible alarm near the object
to be protected. When an intruder tries tp pry a window, the alarm thereat goes
off.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
4. Auxiliary alarm – company – owned alarm systems with a unit in the nearest
police station so that in case of need, direct call is possible. The company
maintains the equipment and lines both for the company and those in the police,
fire and other emergency agencies by special arrangement. Radio, landline, or cell
phones can avail of the auxiliary system.
Kinds of Alarms
1. Audio Detection Device – it will detect any sound caused by attempted force
entry. A supersonic microphone speaker sensor is installed in walls, ceilings and
floors of the protected area.
3. Metallic foil or wire – it will detect any action that moves the foil or wire. An
electrically charge strips of tinfoil or wore is used in the doors, windows or glass
of the protected area.
4. Laser Beam Alarm – a laser emitter floods a wall or fencing with a beam so that
when this beam is distributed by a physical object, an alarm is activated.
Lock is one of the most widely used physical security devices in the asset
protection program of an installation. It complements other physical safeguards of the
installation against any possible surreptitious entry. However, the owner of the
installation or his security officer needs to understand the weakness and strength of each
type of lock including the door, window or walls to be used to achieve maximum benefit
from its application. This is because highly skilled burglars more often concentrate on the
lock and its surrounding mechanism in order to make a forcible entry. It is for this
obvious reasons that locks are considered as delaying devices which can not really stop a
determine intruder that loc just to launch an attack. Hence, knowledge of the basic
principles of locking systems will enable the installation owner or the security officer to
evaluate any lock and determine its quality and effectiveness in a particular application.
Types of Lock
2. Padlock – a portable and detachable lock having a sliding hasp which passes
through a staple ring and is then made fasten or secured.
3. Combination lock – instead of using the key to align the tumblers, the
combination mechanism uses numbers, letters or other symbols as reference point
which enables an operator to align them manually.
4. Code – operated lock – a type of lock that can be opened by pressing a series of
numbered button in the proper sequence.
5. Electrical lock – a type of lock that can be opened and closed remotely by
electrical means.
Type of Keys
1. Change key – a specific key, which operates the lock and has a particular
combination of cuts which match the arrangement of the tumblers in the lock.
2. Sub – master key –a key that will open all the lock within a particular area or
grouping in a given facility.
4. Grand Master key – a key that will open everything in a system involving two or
more master key groups.
Key Control
Once an effective key control has been installed, positive control of all keys must
be gained and maintained. This can be accomplish only if it is established in conjunction
with the installation of new locking devices. The following methods can be used to
maintain effective key control.
1. Key cabinet - a well – constructed cabinet will have to be procured. The cabinet
will have to be of sufficient size to hold the original key to every lock in the
system. It should be secured at all times.
2. Key record – some administrative means must be set up to record code numbers
and indicates to whom keys to specific locks have been issued.
5. Daily report – a daily reports should be made to the person responsible for key
control from the personnel department indicating all persons who have left or will
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
be leaving the company. In the event that a key has been issued, steps should be
initiated to insure that the key is recovered.
Security Cabinet
The final line of defense at any facility is in the high security storage where
papers, records, plans or cashable instrument, precious metals or other especially valuable
assets are protected. These security containers will be of a size and quantity, which the
nature of the business dictates.
1. Safe – a metallic container used for the safekeeping of documents or small items
in an office or installation. Safe can be classified as either robbery or burglary
resistance depending upon the use and need.
a. Its weight must be at least 750 lbs. and should be anchored to a building
structure.
b. Its body should at least once inch thick steel
2. Vault – heavily constructed fire and burglar resistance container usually a part of
the building structure used to keep and protect cash, documents and negotiable
instrument. Vaults are bigger than the safe but smaller than a file room.
3. File room – a cubicle in a building constructed a little lighter than a vault but of
bigger size to accommodate limited people to work on the records inside.
1. Personal Recognition
2. Artificial recognition – identification cards, passes, passwords, etc.
1. Single pass system – the badge or pass coded for authorization to enter specific
area is issued to an employee who keeps it in his possession until his authorization
is terminates.
1. The system should have a complete record of all bandages identification cards
issued, return, mutilated or lost by serial number and cross-indexed
alphabetically.
2. The supervisor from time for its accuracy and authenticity should check the
lists.
3. Passes and badges reported lost should be validated and security at entrance be
informed through conspicuous posting.
Every facility must establish a system for the control of package entering or
leaving the premises. How-ever, desirable it might seem it is simply unrealistic to
suppose that a blanket rule forbidding packages either in or out would be workable. Such
a rule would be damaging to the employee morale and, in many case, would actually
work against the efficient operation in the facility. Therefore, since the transporting of
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
packages through the portals is a fact of life, they must be dealt with in order to prevent
theft and misappropriation of company properties. Thus;
Vehicular traffic within the boundaries of any facility must be carefully controlled
for safety as well as to control the transporting of pilfered goods from the premises. Thus
At any physical barrier, a security system must posses the ability to distinguish
among authorized persons, unauthorized visitors, and other unauthorized persons. This is
to assist the security personnel protects sensitive are and information within the
installation. Appropriate warning signs should be posted at the building perimeter.
Special restricted entry facilities to public access should be provided. This will be
dependent on the degree of security needed for the protection of property, activity and
other processes within the building. A clear – cut policy on the access control should be
disseminated to all personnel of the installation.
2. PERSONNEL SECURITY
will ensure the prevention of unsuitable individuals or persons of doubtful loyalty to the
government, from gaining access to classified matter or being appointed, employed or
retained as employees.
Principle
- Just any other control technique, security must start from a given foundation or
basis and this basis shall be referred to as the principles of security. Security principles
are normally disseminated by regulations or directives to insure uniformity of purpose,
logical and similar methods of operation and appropriate and continuous placement of
responsibility.
- Personnel security is the “weakest link” in the security “chain”. This weakness
can best be minimized or eliminated by making init personnel security conscious through
good training program. Security depends upon the action of what security measures to
take in every instance, a safe will not lock itself. An individual must be properly
instructed and must do the locking.
Control of Personnel
2. Local Agency Check (LAC) – This type of investigation consist of the first type
plus written inquiries sent to appropriate local government agencies, former
employees, references and schools listed by the person under investigation. The
local agencies normally check besides the past employment, schools and
references are the following:
1. Loyalty – faithful allegiance to the country, government and its duly constituted
authority.
2. Integrity – uprightness in character, soundness of moral principles, freedom from
moral delinquencies, ore more simply state-honesty.
3. Discretion – the ability of tendency to act or decide with prudence; the habit of
wise judgment or simple stated- good judgment
4. Moral – distinctive identifying quality which serve as an index to the essential or
intrinsic nature of a person; his outward manifestation, personal traits or moral
habits.
5. Character – the sum of traits that serves as an index of the essential intrinsic
nature of a person. It is the aggregate of distinctive mental and moral qualities that
have been impressed by nature, education and habit upon the individual.
6. Reputation – opinion or estimation in which one is generally held. It is what one
reported to be, whereas character is what a person is.
1. Revenge – a real or fancied wrong can create a hatred which will stop at nothing
to obtain revenge of the offender. Hatred wraps the sense of moral values until the
hater will go to any lengths, even betrayal of his country, to avenge himself on the
person or class of people hated.
2. Material Gain – some people are so avid for material gain that they will stop at
nothing to achieve this end.
3. Personal Prestige – this motivation applies to those whose main desire is for
power – power over others-to prove to the world what leaders they are. However,
their desire for power makes them especially vulnerable to subversion.
4. Friendship – through close attachment to another person, many people, otherwise
of high integrity, will do things inimical to their country’s interest.
5. Ideological Belief – if a person holds inimical to their country, they are of course
vulnerable to approach by subversive groups of agents.
1. Close relative in foreign land – threat of mistreatment of loved ones under the
control of the threatening power has been used since time immemorial.
2. Gullibility – people, who accept every story at face value and can see no wrong
in anyone, fall in to this category. Such people are usually idealists and can
sometimes be utilized by unscrupulous persons.
3. Jealousy – one of the most powerful motivations, jealousy can be utilized by alert
agents.
4. Weakness of Character – a weak character who can easily be dominated is fair
prey for subversive agents looking for a “stooge” to aid them.
5. Serious Indebtedness – the person who is heavily indebted is always looking for
a fast and easy way to recoup his looses, and get out of debt. Such a person
approached with the lure of a large sum of money, is very vulnerable and definite
security risk.
6. Addiction to drugs – this requires no explanation – it is widely known that drugs
addicts will commit a crime to obtain their dope.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
7. Serious guilty episodes in the past – being human, many of us have episodes in
our past of which we are ashamed. Threats to expose such episodes have always
been powerful level for blackmailing a person into committing.
The security guard force is the key element in the overall security system of a
plant or installation. Its basic mission is to protect all the property within the limits of the
facility boundaries and protect employees and other persons on the installation.
The security guard who will become a pert of the guard force must be required to
meet minimum criteria to assure that they will effectively perform their assigned security
related duties. It is the responsibility of the security director of the installation to insure
that its guard force is of a high caliber to make a judgment that could save multi – million
pesos facility from total destruction.
The security guard force must ready to meet the new challenge with new
concepts, bold innovations, and unrelenting insistence on high standards.
Security Guard
In every installation, documents and information are indispensable for their daily
operations and activities, be it in the form of a paper, film, and magnetic media or in the
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
computer system. Once there is a leakage in the contents of a company’s document and
information, the business operational stability is at stake. It may be a start of bankruptcy
that would lead to its total disclosure.
Classification of Documents
1. Top Secret
2. Secret
3. Confidential
4. Restricted
1. Top Secret
These are information and material, the unauthorized disclosure of which would
cause exceptionally grave damage to the nation, politically, economically or from a
security aspect. This category is reserve for the nation’s closest secrets and is to be used
with great reserve.
Classification Authority
2. Secret Matters
3. Confidential Matters
These are information and material which the unauthorized disclosure of which,
while not endangering the national security, would be prejudicial to the interest or
prestige of the nation or nay government activity, or would cause administrative
embarrassment or unwarranted injury to an individual or ould be of advantage to a
foreign nation.
Restricted Matters
These are information and material, which requires special protection other than
that determined to be TOP SECRET, SECRET, of CONFEDINTIAL.
Risk – it is the potential damage or loss of an asset. The level of risk is a combination of
two factors: The value placed on that assts by its owner and the consequence, impact
adverse effect of the loss or damage to that asset and; the like hood that a specific
vulnerability will be exploited by a particular threat.
Asset – Any information, facility, material, information, or activity which has a positive
value to its owner whether it is an individual, private or government entity.
Probability – It is the chance or like hood that a loss will take place. Indicated by a
mathematical statement concerning the possibility if an event occurring.
Security Hazards
– Any act or condition which may result in the compromise of information, loss
of life, loss or destruction of property or disruption of the objective of the
installation.
Types of Hazards
1. Natural Hazards – these are hazards which arise from natural phenomena. The
following are types of natural hazards or disasters:
2. Human/man made hazards – these are hazards which are the result of a state of
mind, attitude, weaknesses or character traits of one or more persons. They can be
acts of commission or omission, both overt and covert, which can disrupt
operational of a plant or installation. The following are types of human/man made
hazards:
– Vandalism, etc.
Security System – The information pertaining to one of the most important security
services offered to a head of offices is the conduct of security surveys and security
inspections. Every unit chief desires a security system that will reduce to an absolute
minimum the possibility of espionage, sabotage and compromise of classified
information on his office or unit.
RULE I
DECLARATION OF POLICY
a. No person shall engage in the business of or act as a private detective agency or engage
in the occupation, calling or employment of security personnel or in the business of
private security/training agency without first having obtained the permit from the Chief
of the Philippine National Police which permit as approved is prerequisite in obtaining a
license certificate.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
SECTION 3. Training Required. All applicants for license certificate shall have
received the appropriate training from any public or private training institution/system
duly recognized by the government to conduct private security or police training.
RULE II
PENAL PROVISION
SECTION 2.
a. Any person not covered by Section 1, Rule II above who commits any act in violation
of Republic Act 5487 as amended and its implementing rules and regulations shall, on
conviction thereof, suffer imprisonment of from ten to fifteen years, and a fine of not less
than ten thousand pesos nor more than fifteen thousand pesos as the Court may direct.
b. If the violation is committed by those persons mentioned in Section 3b, Rule IV herein
under, the penalty shall be imprisonment ranging from one to four years and a fine
ranging from one to four thousand pesos at the discretion of the Court.
SECTION 3. Expired License. For purposes of enforcing sanctions, any private security,
watchman or company guard force agency or private security or training personnel upon
expiration of their respective license to operate or license to exercise security profession
are considered as not possessing license and shall be held criminally and administratively
liable.
RULE III
DEFINITION OF TERMS
SECTION 1. Definition – For purposes of and when used in these rules and regulations,
the following terms shall be construed in the sense indicated herein unless the context of
a particular section clearly indicates that a different sense is intended:
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
a. Person – shall include not only natural but also juridical persons such as single
proprietorships, partnerships, corporations, companies or associations, duly organized
and registered with the Securities and Exchange Commission and/or the Department of
Trade and Industry.
b. Private Security Services – shall include the act of providing or rendering services to
watch an establishment whether public or private, building, compound/area or property,
to conduct access control/denial in any form whether physically, manually or
scientifically by electronic monitoring systems, for the purpose of securing such
area/property and at the same time ensuring safety and protection of persons within such
areas, to maintain peace and order within such areas, to conduct private security training,
and/or to conduct investigation. It shall also include the act of contracting, recruiting,
training, furnishing or posting any security guard, to do its functions or solicit
individuals, businesses, firms, or private, public or government-owned or controlled
corporations to engage his/its service or those of his/its security guards, for hire,
commission or compensation thru subscription or as a consultant/trainer to any private or
public corporation.
c. Private Detective Services – shall include among others the act of providing personal
security protection, inquiry and information gathering, pre-employment verification and
individual background profiling, providing assistance in civil liability and personal injury
cases, insurance claims and fraud, child custody and protection cases, for the purpose of
assisting in gathering information leading to determination and/or prevention of criminal
acts and/or resolution of legal, financial and personal problems.
d. Private Security Industry – shall cover those in the legitimate business of providing
private security and detective services.
e. Private Security Guard (SG) – sometimes called private security guard or watchman
shall include any person who offers or renders personal service to watch or secure either
a residence, business establishment, or buildings, compounds, areas, or property,
inspects/monitors bodily checks/searches individuals and/or baggage and other forms of
security inspection, physically/ manually or scientifically electronic, including but not
limited to, logging concessions and agricultural, mining or pasture lands, transportation,
for hire or compensation , or as an employee thereof, including any employee of the
national or local governments or agencies or instrumentality’s thereof and or government
owned or controlled firm or corporations who is employed to watch or secure
government buildings, compounds, premises and other properties, other than members of
the Armed Forces of the Philippines, guards of the Bureau of Jail management and
Penology, Municipal or City jail guards, and members of the Philippine National Police
or of any other law enforcement agency of the Government.
f. Private Detective (PD) – shall mean any person who does detective work for hire,
reward or commission, other than members of the Armed Forces of the Philippines,
guards of the Bureau of Jail Management and Penology, municipal or city jail guards, and
members of the Philippine National Police or of any other law enforcement agency of the
government.
g. Private Security Personnel – shall be natural persons which include private security
guards, private detectives, security consultants, security officers and others that may be
classified later, rendering/performing security and/or detective services as employed by
private security agencies and/or private firms.
Police, Bureau of Jail Management and Penology, Municipal or City Jail guards
rendering/performing security and/or detective services as employed by government
entities.
i. Private Security Agency (PSA) – shall mean any person association, partnership, firm
or private corporation, who contracts, recruits, trains, furnishes or posts any security
guard, to perform its functions or solicit individuals, businesses, firms, or private, public
or government-owned or controlled corporations to engage his/its service or those of
his/its security guards, for hire, commission or compensation thru subscription or as a
consultant/trainer to any private or public corporation whose business or transactions
involve national security or interest like the operation and/or management of domestic or
ocean vessels, airplanes, helicopters, seaports, airports heliports, landing strips etc., or as
consultant on any security related matter, or to provide highly specialized security,
detective and investigation services like gangway security, catering security, passenger
profiling, baggage examination, providing security on board vessels or aircraft, or other
security needs that PNP SAGSD may approve.
j. Private Detective Agency (PDA) – shall mean any person association, partnership, firm
or private corporation, who contracts, recruits, trains, furnishes or posts any private
detective, to perform its functions or solicit individuals, businesses, firms, or private,
public or government-owned or controlled corporations to engage his/its service or those
of his/its detectives, for hire, commission or compensation thru subscription or as a
consultant/trainer to any private or public corporation or as consultant on any detective
related matter, or to provide highly specialized detective and investigation services, or
other detective needs that SAGSD-CSG may approve.
k. License to Exercise Profession – shall mean any document issued by the Chief,
Philippine National Police or his duly authorized representative recognizing a person to
be qualified to perform his duties as private security or training personnel.
m. Company Guard Force (CGF) – a security force maintained and operated by any
private company/corporation utilizing any of its employees to watch, secure or guard its
business establishment premises, compound or properties.
n. Government Guard Unit (GGU) – a security unit maintained and operated by any
government entity other than military or police, which is established and maintained for
the purpose of securing the office or compound and/or extension of such government
entity.
o. PNP as used herein shall mean the Philippine National Police, which was organized
pursuant to the provision of RA 6975 otherwise known as the National Police Act of
1991.
p. SAGSD as used herein shall refer to the current PNP Civil Security Group Security
Agency and Guard Supervision Division or any other PNP Office that may be designated
later as the primary office for supervision of the implementation of these rules and
regulations.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
r. Duty Detail Order is a written order/schedule issued by a superior officer usually the
private security agency/branch manager or operations officer assigning the performance
of private security/detective services duties.
PART 1
SECTION 1. Who may organize and maintain a Private Security Agency and Private
Detective Agency. - Any Filipino citizen or corporation, association, partnership, one
hundred percent (100%) of which is owned and controlled by Filipino citizens, may
organize and maintain a Private Security Agency or Private Detective Agency.
c. No agency shall offer, render or accept services in gambling dens or other illegal
business establishments or enterprises.
d. The extent of the security guard service being furnished by the security agency shall
not go beyond the compound and/or property of the person or establishment contracting
the security service except when the security guards is escorting big amount of money or
valuables.
e. Main/branch offices. - All agencies shall maintain a main office in their registered
addresses. Branch offices may be established and maintained in other provinces/ cities
where the security agency has deployed security guards.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
f. Authority to operate outside principal offices. The following measures are promulgated
to promote the healthy growth of the private security industry in general, as well as to
minimize proliferation of marginal agencies in particular.
1. No new or moribund but previously licensed private security agency shall be granted
license to operate unless its business viability is supported by evidence of assured
clientele, adequate capitalization and the like.
2. Private Security Agency operating at regions outside its main office shall be required
to register with the nearest Police Provincial Office and shall submit an authenticated
machine copy of the following documents:
a) License to Operate
b) License of the FA’s to be issued
c) List of the officers and security guards
d) Appointment Order of Branch/Detachment Manager (if any)
g. All applicants for license to operate shall, in addition to the requirements imposed
pursuant to RA 5487 as amended and these rules and regulations, be required to attend a
private security agency/company guard force operators’ and management
seminar/workshop.
h. Prohibition on “KABIT SYSTEM” operators.
1. No licensed security agency shall operate, promote and enter into an agreement of
“merger“ (kabit system) with any person or a group of persons for the purpose of
organizing a branch unit or subsidiary under separate control and ownership. Merger of
security and detective agencies shall not be recognized without prior approval from the
Securities and Exchange Commission with respect to their Articles of Incorporation and
the Department of Trade and Industry, with regards their business name.
a) Maintaining a separate branch, unit or subsidiary office aside from the main office of
the agency situated within the same locality;
b) Receiving direct payments from the agency’s clientele and issuing officials receipt of
their own distinct from that issued by the agency concerned;
c) Remitting directly Social Security System premiums, Medicare contributions and other
premium for other policy insurance benefits by the aforementioned branch, unit or
subsidiary office;
f) Absence of record of monthly income remittances to the main office when said branch
is authorized to make collections from the clients of the licensee; and
g) All other similar acts tending to show separate and distinct relationship/ personality/
ownership/ management.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
SECTION 5. On Membership.
a. No regular license shall be granted to any private security agency unless it has a
minimum of two hundred (200) licensed private security personnel under its employ.
b. No regular license shall be granted to any company guard force or private detective
agency unless it has a minimum of thirty (30) licensed private security personnel under
its employ.
PART 2
a. The application shall be made in writing by the owner (for single proprietorships) or
authorized person duly designated by the corporation or partnership (through a board
resolution or joint affidavit, respectively) and shall be filed with the Chief of the
Philippine National Police (CPNP) through the PNP Security Agency and Guard
Supervision Division, Civil security Group (SAGSD-CSG). Using license application
form PNPSF1, the application shall contain the full name of the applicant, his age, civil
status, his residence and location of business.
private security guard or detective agency who/which is utilizing for its security purpose
any of his/its employees to render private security or detective services.
SECTION 8. Status and Validity of License to Operate. The status of license certificate
in Section 7 above shall be issued in conformity with the following:
b. Temporary LTO – initial and conditional issuance to new private security agencies
and to PSAs holding regular LTO not able to maintain the minimum number of security
personnel or conform to standards, for them to be able to attain the 200 minimum number
of security personnel or comply with licensing standards, prior to issuance/re-issuance of
regular LTO. Such issuance shall not be renewable nor be extendible.
c. Unless sooner cancelled or revoked and provisions hereof modified, all licenses to
operate shall have a validity of two (2) years. Temporary LTOs upon expiration are
automatically cancelled.
d. The expiry date of Regular Licenses to Operate shall be on the last day of the month of
the second year corresponding to the last number before the year series number of the
assigned number/LTO number of the License. (i.e. hereto in bold numbers PSA-00001-
02 and PSA-00050-03 representing expiry on January 31, 2004 and October 31, 2005
respectively). For this purpose the appropriate transition period shall be provided after the
effectivity of these Rules and Regulations.
a. All applications for Licenses to Operate filed shall be processed by SAGSDCSG for
approval and subsequent issuance of the appropriate LTO, and/or for disapproval.
b. When all requisites for the issuance of License to Operate have been complied with,
corresponding license certificate shall be issued upon payment by the applicant of
applicable fees and bond, prescribed/to be prescribed following existing administrative
laws:
1. National License Fee
2. Security Personnel Registration Fee
3. Annual Internal Revenue tax
4. Local Government Business tax
5. Bond issued by any competent or reputable surety or fidelity or insurance
company duly accredited by the Insurance Commission in the sum of ten
thousand pesos in the discretion of the CPNP which bond shall answer for any
valid and legal claim against the agency by its clients or employees
d. All accepted applications for license to operate shall be processed for completeness of
documentary requirements and conformity to standards.
RULE V
LICENSE TO EXERCISE PRIVATE SECURITY PROFESSION
SECTION 1. Who may apply for a License to Exercise Private Security Profession.
Any Filipino citizen may apply for License to Exercise Private Security Profession to
engage in the occupation, calling or employment either as a Private Security Guard,
Private Security Officer, Private Detective and/or Private Security Consultant, after
complying with both academic/scholastic and skills/training requirements subject to other
requirements prescribed herein under provisions.
a. Filipino citizen;
b. Holder of a Baccalaureate Degree;
c. Physically and mentally fit; and
d. Has graduated from a Security Officer Training Course or its equivalent.
a. Filipino citizen;
b. Physically and mentally fit;
c. Holder of a Masters degree in either Criminology, Public Administration, MNSA,
Industrial Security Administration, or Law;
d. Must have at least ten (10) years experience in the operation and management of
security business.
a. Filipino citizen;
b. Physical and mentally fit;
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
RULE VII
USE OF FIREARMS
a. The acquisition of the high-powered firearms shall be at the expense of the private
security agency/private detective agency/company security force/government security
unit concerned;
b. The firearms should first be registered with the Firearms and Explosives Division
before issuance and shall not be used or transferred in places other than those specially
authorized by the Director, CSG;
c. The total number of high-powered firearms that an agency or security force/unit is
authorized to possess shall not exceed ten percent (10%) of the total number of security
guards of watchmen in its employ; and
d. The duly licensed security guards or watchmen who will use the firearm shall first be
given adequate training in the care and use thereof and will be under the supervision of
qualified officers and men of the Philippine National Police.
a. Unless specified and/or exempted pursuant to provisions of these rules and regulations
and/or firearms laws, no firearm shall be borne nor be in the possession of any private
security personnel except when in the actual performance of duty, in the prescribed
uniform, in the place and time so specified in the DDO.
b. The firearm issued to security personnel of private security agency/private detective
agency/company security services/government security unit shall be carried by the
security personnel only within the compound of the establishment where he is assigned to
guard, except when the security personnel is escorting big amount of money or valuables
on conduction duties outside its jurisdiction or area of operation, upon prior coordination
with the nearest PNP units/stations, or when in hot pursuit of criminal offenders.
a. DDOs for the purpose of transporting agency licensed firearms from agency
vault/office to post and back for posting, for routine rotation, replacement of firearms or
for conduction service duties, shall be issued for not more than a duration of twenty-four
(24) hours;
b. DDOs for the purpose of post duties not requiring transport of firearms outside of the
physical compound or property of a client or client establishment/firm shall be issued for
not more than a thirty (30) day duration;
c. Transport of firearm other than those covered in paragraph a and b, Section 4, Rule VII
above, shall require the appropriate transport permit issued by the Firearms and
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
Explosives Division or Police Regional, Provincial or City Office nearest the place of
origin;
d. The issuance of DDOs for private detective personal protection service duties shall be
prescribed in an SOP to be issued by NHPNP in consideration of Rule XII of these rules
and regulations; and
e. All DDOs shall indicate the following:
1. Name, address and telephone number of agency
2. Issue serial number and date of DDO
3. Complete name and designation of grantee
4. Purpose
5. Inclusive dates of detail
6. Firearms description and license number
7. Authorized uniform to be used
8. Other specific instructions/remarks
9. Signature and designation of issuing officer
RULE VIII
UNIFORM, EQUIPMENT AND PARAPHERNALIA
PART 1
SECTION 1. Uniform (male). The uniform of private security guard/either from the
private security agency/company security force/ government security unit shall consist of
headgear, service shirt, service trousers service belt and footwear as herein prescribed.
The uniform shall be made of fast navy blue thick fabric for the trouser for daily security
officers wear and for service shirts of field or perimeter guards while a choice of light
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
blue and/or white service shirts for internal guards for a private security agency; light
gray for company security force and white for government security unit.
a. Headgear
Pershing cap - Fast navy blue cap with gold strap, black visor, and octagonal
nylon net top and prescribed SAGSD metal cap device. It shall be the headgear
for daily wear by security guards. It may be used by the security guard for
ceremonial purposes with the black strap. (See illustration, Fig.1).
(1) Private Security Agency. - Trousers and shirt short sleeves with shoulder
straps, two each breast and front pockets with cover flaps and fixed cloth belt
fastened by brass metal buckle. (See illustration, Fig. 2).
(2) Company Security Force. - It shall be sewn in the same manner as in Para. b,
Section 1, this rule.
(a) Private Security Guard - Fast navy blue, short sleeves, shoulder straps, two breast
pockets with cover flaps and navy blue front buttons, tucked in (Fig. 3)
(b) Company Security Force. - It shall be sewn in the same manner as prescribed for
private security agency except that the color is light gray and the fabric for shirt.
(c) Government Security Unit. - It shall be sewn in the same manner as prescribed for
private security agency except that the color is white and the shirt shall be fabric “white”.
(2) Field Uniform. - (Optional for cold weather areas only);
(a) Private Security Agency. - Fast navy blue, long sleeves with buttoned cuffs,
shoulder straps, two breast pockets with cover flaps, navy blue front buttons and
shirt-jacket style with overlap waist strap. Detachable hoods shall be adopted for
cold weather area use.
(b) Company Security Force. - It shall be sewn in the same manner as
prescribed for private security agency except that the color is light gray and the
fabric materials for the shirt.
(c) Government Security Unit. - It shall be sewn in the same manner as
prescribed for private security agency except that the color is white and the
shirting materials shall be fabric. (Note: A single strand yellow lanyard may be
used to secure sidearm to the shoulder).
(3) Gala Uniform. - It shall be worn for ceremonial purposes only and at the expense of
the establishment conducting the ceremonies.
(a) Pershing cap. - This shall be same specifications and distinctions as provided
for under Sec. 1a of this Rule.
(b) Blouse. - The material shall be of fabric with colors as prescribed for
private/company/government security officers. It shall be tailored as an open coat,
long sleeves with a center flap at the back of the unsewed part of which shall be
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
the same level with the waistline. It shall have shoulder straps as the service Bush
Jacket; Security guard officers shall wear shoulder boards with the authorized
rank design.
(c) Buttons. - There shall be four (4) big brass buttons to close dress and four (4)
small buttons for the pockets. The buttons shall be plain brass.
(d) Shirt. - The shirt shall be white long sleeves.
(e) Necktie. - It shall conform to the color of the blouse five (5) centimeters wide.
(f) Trousers. - It shall be of the same design, style and materials as the service
trousers.
(4) Service Trouser. - Fast Navy blue color, straight cut, slanted pockets and two back
pockets without over flaps.
(5) Service Belt. – Of leather material which shall be used as pistol belt measuring four
and a half (4-1/2 centimeters in with.
(6) Footwear. –
(a) Service shoes. - Black leather shoes with rubber heels and soles, plain top
low-cut and black shoelace to be worn with plain black socks. (Fig 6).
(b) Rubber rain boots. - Optional as the nature of the post requires.
(Fig.7)
SECTION 2. Uniform (Female). - The uniform of the lady security guard shall be made
of a thick fabric. It shall consist of a modified overseas cap two (2) ply similar to the 23
women police service, service skirts (palda) and blouse, service belt and black leather
shoes as herein described and/or illustrated.
A. Headgear. - Fast navy blue (2 ply) cap without piping but with regulation cap device.
a. Service shirt –
(1) Private Security Agency. - Fast navy blue, light blue or white, thick fabric, short
sleeves, shoulder straps, two breast pockets with cover flaps and navy blue front buttons,
tucked in.
(2) Company Security Force. - It shall be sewn in the same manner as prescribed for
private security agency except that the shirting materials shall be fabric “Light Gray” in
color.
(3) Government Security Unit. - It shall be sewn in the same manner as the
private/company agency except that the shirting materials shall be white fabric.
b. Service trousers. - Fast navy blue thick fabric trousers, straight cut with
slanted side pocket and two back pockets without cover flaps. It may be worn
during night duty/inclement weather.
c. Service skirt. - (Optional) Navy blue A-line skirt with two front slide pockets.
It may be worn when posted indoors.
d. Service belt. - Of leather material which shall be used as pistol belt measuring
four and one half (4-1/2 centimeters in width)
e. Footwear. -
(1) Service shoes - Plain black shoes, low-cut rubber soles and heel (maximum of five
cms.) and black shoes laces.
(2) Rubber rain boots black - Optional as the nature of post so requires.
b. Cap device. - The brass cap device as approved by the Chief of Philippine National
Police shall be attached on the Pershing cap of officers
c. Regulation Buckle - as approved by C, PNP without agency name
d. Collar device -
e. Name cloth - shall consist of embroidered navy blue black-lettered surname and
initials of first and middle names on yellow background with blue borderline, his names
on yellow background with blue borderline, his name shall be preceded by the word:
Security Guard” or “SG”. The letter shall be one and one half (1-1/2) centimeters in
height and the name cloth shall be sewn on the right top pocket.
f. Agency/unit name cloth. - A similarly embroidered agency/unit cloth shall be sewn on
the top of the left breast pocket, navy blue block-lettered on yellow background.
SECTION 4. Design and Use of White Uniform. – A special set of security personnel
uniform shall be prescribed for security personnel posted at hotels, resorts, cultural and
entertainment areas and other sites noted as tourist-heavy areas. A special set of security
personnel uniform shall be prescribed for security personnel posted at department stores
noted as tourist-heavy areas, banks and other foreign clientele.
a. Uniform (male)- The special set of uniform for security agencies officer/guard and
lady guard shall consist of pershing cap, ball cap, service bush, jacket, service shirt,
service trousers, service belt, necktie, lanyard and footwear.
(1) Pershing cap – same as defined in Section 1 a (2), Rule VI. It shall be fast
navy blue with gold strap, black visor, octagonal nylon net top and prescribed
metal cap device. It shall be worn by security agency officers and guards while
wearing a complete special type of uniform.
(2) Service Bush Jacket - It shall be white ramie polyester fabric and shall be
sewn short sleeves with shoulder straps, two each breast and front pockets with
cover flaps and fixed cloth belt fastened with metal buckle. It shall be worn by
security agency officer while on duty at indoor places with complete prescribed
paraphernalia and agency/client patches.
(3) Service Shirt - It shall be white cotton/cotton polyester fabric and shall be
sewn short sleeves as the case maybe, shoulder straps, two breast pockets with
cover flaps and white front buttons. It shall be worn by security guards while on
duty as designated indoor places with complete prescribed paraphernalia and
agency/client patches. Tuck-in.
(4) Service Trousers - Fast navy blue color, straight cut, slanted pockets and two
back pockets with cover flaps. It shall be worn by security agency officer and
security guards.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
(5) Service Belt - It shall be black in color, leather, to be used as pistol belt
measuring four and one-half centimeters in width. It shall be worn by both
security officers and security guards while in complete special type of uniform.
(6) Necktie - Plain fast navy blue and five centimeters wide. It shall be worn by
security guards while in complete special type of uniform.
(7) Lanyard - Navy blue in color, same style as used by AFP or PNP Personnel. It
shall be worn by security agency officers and security guards while in complete
special type of uniform.
(8) Footwear - Black leather shoes with rubber heels and soles, plain top low-cut
and black shoelace to be worn with plain black socks.
(9) Ball cap - It shall be fast navy blue round nylon net top with visor and
prescribed embroidered cloth cap device. It shall be optional in lieu of the
perishing cap.
b. Uniform (Female) - The uniform for a lady security guard shall consist of an oversea
cap two (2) ply service bush jacket, service belt, lanyard and black leather shoes.
(1) Bush cap - Fast navy blue (2 ply) without piping but with regulation cap
device.
(2) Service Bush Jacket - It shall be white in color and shall be sewn in same
style as that of security agency officer. It shall be worn by security lady officer
with complete prescribed paraphernalia, name cloths and agency/ client patches.
(3) Service Shirt - White ramie polyester fabric and shall be sewn short sleeves or
long sleeves as the case maybe, shoulder straps, two breast pockets with cover
flaps and navy blue front buttons. It shall be worn by private security lady guard
with complete prescribed paraphernalia, name cloth agency/client patches, service
belt, lanyard. Tuck in. This type of uniform shall be worn only at indoor places.
(5) Lanyard
(6) Service Skirt - A line skirt with two front slide pockets,. It shall be worn when
posted indoors
(7) Footwear - Plain black leather shoes, low-cut rubber sole and heel (maximum
of five cm) and black shoelaces.
c. Paraphernalia - As prescribed under Sec.3 Rule VI, IRR, RA 5487, as amended. (See
illustrations in Fig.13, 14,15,16,17).
PART 2
BASIC EQUIPMENT
a. The following shall comprise of the Basic Equipment of a security guard which shall
be made mandatory and ready for his/her use while performing post, conduction, armored
service duties and the like:
1. Prescribed Basic Uniform
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014
2. Nightstick/baton
3. Whistle
4. Timepiece (synchronized)
5. Writing pen
6. Notebook and duty checklist (electronic or not)
7. Flashlight
8. First Aid Kit
9. Service Firearms (as required)
b. The security agency shall have the responsibility of ensuring the availability and
issuance of the basic equipment to its posted guards.
a. Apart from the mandatory basic equipment, other equipment may be issued to the
security guard as determined necessary following client contract requirement, provided
that the security guard shall have acquired the prior training/knowledge on the proper use
of the same but not limited to the following:
1. Handcuffs
2. Metal detectors
3. Communications Radio
4. Stun devices
5. Armor vests
6. canine (k-9) units
c. Live units such as canine (dogs), shall require prior training confirmation and
registration with the PNP before utilization by any security agency purposely to ensure
truthful deployment versus client requirement or purpose of operation
RULE IX
RANKS, POSITIONS, STAFFING PATTERN AND JOB DESCRIPTION
SECTION 1. Ranks and Position - The security agency operator/owner must observe
the required major ranks and positions in the organization of the agency.
c. Security Guard
1. Security Guard 1 – Watchman/guard
2. Security Guard 2 – Shift in-charge
3. Security Guard 3 – Post in-charge
b. The Security Agency shall appoint a staff officer as Security Training Officer,
who shall be responsible for the training of the Agency’s security personnel in
accordance with the requirements of RA 5487 and the IRR. The Training Officer
shall be licensed as a Security Officer and likewise accredited as such by the
Training and Education Branch, SAGSD.
c. The Staff Director for Operation is the staff assistant of the security manager
for the efficient operation of the agency. This position includes the responsibility
to canvass clientele and the implementation of contract and agreement. He is also
responsible for the conduct of investigation and the conduct of training.
d. The Staff Director for Administration is the staff assistant of the agency
manager for the effective and efficient administration and management of the
agency. He is responsible for the professionalization of the personal,
procurement/recruitment, confirming of awards, mobility and issuance of FA’s.
e. The Detachment Commander is the field or area commander of the agency. The
Detachment shall consist of several posts.
f. The Chief Inspector shall be responsible for inspecting the entire area covered
by the detachment.
g. Security Inspector is responsible for the area assigned by the Chief Inspector of
the Detachment Commander.
i. Shift in-Charge is responsible for the security officers who are scheduled in a
certain shift for a particular period.
RULE XI
PRIVATE SECURITY TRAINING
PART 1
General Provisions
SECTION 2. Private Security Training. It shall refer to training and academic programs
and courses duly approved or prescribed by the Philippine National Police and adopted
by the Technical Education and Skills Development Authority. It includes the
prelicensing requirements of individual security guards and other security personnel
approved by RA 5487, the periodic and non-periodic in-service skill refreshers for such
security personnel, and other specialized, individual or group, private security personnel
skills development.
SECTION 3. Private Security Training Services. These shall refer to the conduct of
Private Security Training, provision of the physical facilities and installation necessary in
the conduct thereof, and the provision of the appropriate management, administrative,
and instructor/training staffs therefore, the actual performance and/or exercise of which
requires the appropriate permit and/or authority as herein provided.
SECTION 4. Private Security Training Institutions. These shall refer to all persons,
natural and/or juridical, who/that provide and/or conduct private security training, and/or
services.
SECTION 5. Categories of Private Security Training. The following are the general
categories of Private Security Training:
b) Training Instructor. Any person who renders personal and/or professional trainor,
instructor, and/or teacher services relative to private security training by virtue of his
profession, expertise, knowledge, and/or experience in a particular field of knowledge.
Training Instructor includes but is not limited to currently or retired licensed or
accredited private security training instructors, professional educators, and/or
field/practicing experts.
SECTION 8. Organization for Private Security Training. The following are the
minimum staff/personnel requirements for the conduct of a particular Private Security
Training Program or Course conducted by Regular and Interim Accredited Training
Centers:
Administration Staff:
a. Center or School Superintendent/Director/Administrator.
b. Course/Training Director.
Training Staff:
a. Training Officer, Regular/Special Accreditation
b. Training Instructors, Regular/Special Accreditation
c. Guest Instructors. Persons other than accredited private security training
instructors, who render personal or professional instructor, trainor, or teacher
services in a particular field of knowledge, subject, or training in a private
security training program/course as a resource because of his profession,
expertise, education, and/or experience.
PART 2
Conduct of Private Security Training
b. All Region based applicants requests shall be endorsed by respective PNP Police
Regional Office.
f. The School, Center or, PSA shall also ensure the maintenance of orderliness,
presentability, discipline and security of its training facilities and all persons therein.
g. A General Knowledge Examination (GKE) shall be administered by SAGSD (Private
Security Training Management Branch) one (1) day before the closing of each class
provided a photocopy of the proof of payment (SBR) for the ongoing class is submitted.
h. Any student who fails the GKE may be given three (3) chances to retake, after which if
he fails, he shall repeat the course.
a. A General Knowledge Examination (GKE) shall be administered by the PNP and shall
be given each graduate after completion of each training course as a matter of evaluating
the graduate’s assimilation of the course in relation to his qualification for license to
exercise private security profession. The GKE shall also be used among others, to
evaluate the quality of training of or transmission of the course by the accredited training
systems.
b. For region-based Training Centers/Schools, FESAGS, ROPD will administer the GKE
and submit. After GKE Result to SAGSD five (5) days after the closing of each class for
reference and disposition.
SECTION 15. Duration of Courses. Duration of courses shall conform with the
corresponding Program of Instructions (POI) for each type of course/training/seminar,
prescribed by the PNP and adopted by the TESDA.
SECTION 16. Basic Guarding Subjects. The following shall at least be the basic
knowledge and/or subject requirements on guarding or providing security that private
security personnel trainees should be imparted with: