Review Notes On Law Enforcement Administration Sjit Criminology Cl-Mabikas 2014

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 42

REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION

SJIT CRIMINOLOGY CL-MABIKAS 2014

INDUSTRIAL SECURITY MANAGEMENT

Concept of Security

Security – It is a state or condition of being secured; there is a freedom from fear,


harm, danger, loss, destruction or damages.
- Basically, it was the action of man against man that led to many
unsecured and unsafe conditions. Reasons could be economic, revenge, or just plain
greed and avarice. Whatever the motives, the civilized man needs adequate protection.

Three major areas of Security

1. Physical Security – This concern with the physical measures adopted to prevent
unauthorized access to equipment, facilities, material and document and to
safeguard them against espionage, sabotage, damage, loss and theft.
2. Personnel Security – This is as important as physical security. Personnel security
starts even before the hiring of an employee and remains to be maintained for a s
long as the person is employed. Its purpose is to ensure that a firm hires those best
suited to assist the firm in achieving its goals and objectives and once hired assist
in providing necessary security to the work force while carrying out their
functions.
3. Document and Information Security – This involves the protection of
documents and classified papers from loss, access by unauthorized persons,
damage, theft and compromise through disclosure. Classified documents need
special handling. lack of indoctrination and orientation among the personnel
handling them can result in the leakage, loss, theft and unauthorized disclosure of
the documents.

1. Physical Security

Physical security measures – are being used to define, protect and monitor
property rights and assets. These measures consists of barriers and devices that would
detect, impede and prevent unauthorized access to equipment, facilities, material and
documents and to safeguard them against espionage, sabotage, damage and theft.

Physical Security – it can also may be defined as the safeguarding by physical


means, such as guards, fire protection measures, making of plans, policies, programs,
safeguarding of personnel property, utilities, information and installation against
compromise, trespass, sabotage, pilferage, embezzlement, fraud or other dishonest
criminal act.

Barriers – Any structure or physical device capable of restricting, deterring, delaying


illegal access to an installation.
- A structure such as a fence that is intended to prevent access or keep one
place separate from another, something considered to be a limit, standard, or boundary.

Purpose of barriers

1. Define the physical limits of an area.


2. Create a physical and psychological deterrent to unauthorized entry.
3. Prevent penetration therein or delay intrusion, thus, facilitating apprehension of
intruders.
4. Assist in more efficient and economical employment of guards.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

5. Facilitate and improve the control and vehicular traffic.

Types of Barriers

1. Natural Barriers – It includes bodies of waters, mountains, marshes, ravines,


deserts or other terrain that are difficult to traverse.

2. Structural Barriers – These are features constructed by man regardless of their


original intent that tend to delay the intruder.

Ex. walls, doors, windows, locks, fences, safe, cabinets or containers.

3. Human Barriers – Persons being used in partially providing a guarding system


or by the nature of their employment and location, fulfill security functions.

Ex. guards, office personnel, shop workers, etc.

4. Animal Barriers – Animals are used in partially providing a guarding system.


Dogs are usually trained and utilized to serve as guard dogs. German shepherds
are best suited for security functions. Goosed and turkeys could also be included.

5. Energy Barriers – It is the employment of mechanical, electrical, electronic


energy imposes a deterrent to entry by the potential intruder or to provide
warming to guard personnel. These are protective lighting, alarm system and any
electronic devices used as barriers.

Three line of Physical Defense

1. First line of defense – perimeter fences/barriers


2. Second line of defense – doors, floors, windows, walls, roofs and grills and other
entries to the building.
3. Third line of defense – storage system like steel cabinets, safes, vaults and interior
files.

Principles of Physical Security

1. The type of access necessary will depend upon a number of variable factors and
therefore may be achieved in a number of ways.
2. There are no impenetrable barriers.
3. Defense – in depth is barriers after barriers.
4. Delay is provided against surreptitious and non – surreptitious entry.
5. Each installation is different.

Restricted Area

Restricted Area – it is any area in which personnel or vehicles are controlled for reasons
of security. It is established to provide security for installation or facilities and to promote
efficiency of security operations and economy in the use of security personnel.

Types of Restricted Areas

Two types of restricted areas may establish to permit different degrees of security
within the same installation or facility and to provide efficient bases for the application of
different degrees of access, circulation and protection.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

1. Exclusion Area – an exclusion area is a restricted area which contains a security


interest to TOP SECRET importance, and which requires the highest degree of
protection.

2. Limited Area – a limited area is a restricted area in which requires lesser degree
of control than in an exclusion area but which the security interest would be
compromised by uncontrolled movement.

Limited Area Control includes the following:

A. Interior Area Control – Interior area control is generally affected in two


ways.
1st method – the system which is initiated and terminated at the outer
limits of the are to determine the movements of a visitor within the area.

2nd method – the second somewhat less means of accomplishing the same
thing is time travel. This system provides for checking the actual time
used by the visitor against known time requirements for what the visitor is
to accomplish.

B. Visitor Identification and Movement Control – Processing and control


of movements of visitors shall be included in the PASS SYTEM. The
control of movements of visitors will depend on the installation. A visitor
register shall be maintained to include the name of the visitor, date of visit,
purpose of visit, which may be filed for the nature reference.

C. Key Control – A system of controlling keys shall be advised and


regulations covering disposal, storage or withdrawals, shall be issued and
imposed.

D. Fire Prevention – Fire is so potentially destructive without human


assistance, with assistance it can be caused to devastate those things you
are attempting to secure and, professionally accomplished, often in a way
that does not leave recognized evidence of sabotage.

Perimeter Security

Perimeter Security – it is the protection of the installation’s inner and the


immediate vicinity. The main purpose of perimeter is to deny or impede access or exit of
unauthorized person. Basically, it is the first line of defense of an installation. This is
maybe in the form of fences, building walls or even bodies of water.

– The function and location of the facility itself usually determine the perimeter
of the installation. If the facility is located in a city whereby the building or
enterprise occupies all the area where it is located, the perimeter may be the
walls of the building itself. Most of the Industrial companies, however, are
required to have a wide for warehouse, manufacturing etc.

– Perimeter barriers include fences, walls, and bodies of water.

Types of Fences
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

1. Solid Fence – Constructed in such a way that visual access through the fence is
denied.
Advantage:
- It denies the opportunity for the intruder to become familiar with the
personnel, activities and the time scheduled of the movements of the
guards in the installation.

Disadvantage:
- It prevents the guards from observing the area around the installation and
it creates shadow that may be used by the intruder for cover and
concealment.

2. Full – View Fence – It is constructed in such a way that visual access is permitted
through the fence.

Advantage:
- It allows the roving patrols and stationary guard to keep the surrounding of
the installation under observation.

Disadvantage:
- It allows the intruder to become familiar with the movements and time
schedule of the guard patrols thereby allowing him to pick the time that is
advantageous on his part.

Types of Full – View Fence

1. Chain link fence


 It must be constructed of 7 feet material excluding the top guard
 It must be of 9 gauges or heavier
 The mesh opening are not to be larger than 2 inches per side
 It should be twisted and barbed selvage at top and bottom
 It must be securely fastened to rigid metal or reinforced concrete.
 It must reached within 2 inches of hard ground or paving
 On soft ground, it must reach below surface deep enough to compensate for
shifting soil or sand

2. Barbed wire fence


 Standard barbed wire is twisted, double – strand, 12 – gauge wire with 4 point
barbs spaces in an equal distance apart.
 Barbed wire fencing should not be less than 7 feet high excluding the top
guard
 Barbed wire fencing must be firmly affixed to posts not more than 6 feet apart

3. Concertina wire fence


 Standard concertina barbed wire is commercially manufactured wire coil of
high strength steel barbed wire clipped together art intervals to form a
cylinder.
 Opened concertina wire is 50 feet long and 3 feet in diameter

Perimeter Barrier Opening

What are Perimeter Barrier Opening

1. Gates and Doors – when not in use and controlled by guards, gates and doors
in the perimeter should be locked and frequently inspected by guards. Locks
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

should be changed from time to time and should be covered under protective
locks and key control.

2. Side – Walk – Elevators – these provide access to areas within the perimeter
barrier and should be locked and guarded.

3. Utilities Opening – sewers, air intakes, exhaust tunnels and other utility
openings which penetrate the barrier and which have cross sectional areas of
96 square inches or more should be protected by bars, grills, water filled traps
or other structural means to a person seeking unauthorized entry.

4. Clear Zone – an obstructed area or a “clear zone” should be maintained on


both sides of the perimeter barrier. A clear zone of 20 feet or more is desirable
between the barriers and exterior structures and natural covers that may
provide concealment for assistance to a person seeking unauthorized entry.

Additional Protective Meausres

1. Top Guard – additional overhang of barbed wire placed on vertical perimeter


fences upward and outward with 45 degrees angle with 3 to 4 strands of barbed
wires spaced 6 inches apart. This increases the protective height and prevents easy
access.

2. Guard Control Station – This is normally provided at main perimeter entrances


to secure areas located out-of-doors, and manned by guards on full time basis.
Sentry station should be near a perimeter for surveillance at the entrance.

3. Tower Guard – this is a house – like structure above the perimeter barriers. The
higher the tower, the more visibility it provides. It gives a psychological
unswerving effect to violators by and large guard towers, whether permanent or
temporary, must have a corresponding support force in the event of need. Towers
as well as guard control stations should have telephone, intercoms, and if possible
two – way radios connected to security headquarters or office to call for reserves
in the event or need.

4. Barrier Maintenance – fencing barriers and protective walls should always be


regularly inspected by security, any sign or attempts to break in should be
reported for investigation. Destruction or fence or sections thereof should be
repaired immediately and guard vigilance should be increased.

5. Protection in Depth – in large open areas or ground where fencing or walling is


impractical and expensive, warning signs should be conspicuously placed. The
depth itself is protection reduction of access roads, and sufficient notices to warn
intruders should be done. Use of animals, as guards and intrusion device, can also
be good as barriers.

6. Signs and Notices - “Control signs” should be erected where necessary in the
management of unauthorized ingress to preclude accidental entry. Signs should be
plainly visible and legible from any approach and in an understood language or
dialect.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

PROTECTIVE LIGHTING

The idea that lighting can provide improve protection for people and facilities is
as old as civilization. Protective lighting is the single most cost-effective deterrent to
crime because it creates a psychological deterrent to the intruders.

Purpose of Protective Lighting

1. It provides sufficient illumination to the areas during hours of darkness.


2. Lightning can help improve visibility so that intruder can be seen and identified
and, if possible, apprehend.
3. It serves as deterrent to would-be thieves.

Types of Protective Lighting

1. Continuous lighting – the most familiar type of outdoor security lighting, this is
designed to provide two specific results: 1. glare projection or 2. Controlled
lighting. It consists of a series of fixed luminaries at range to flood a given area
continuously during the hours of darkness.

1. Glare Projection – it is being used in prisons and correctional institutions to


illuminate walls and outside barriers.
2. Controlled Lighting – it is generally employed where, due to surrounding
property owners, nearby highway or other limitations, it is necessary for the light
to be more precisely focused.

2. Standby Lighting – it is designed for reserve or standby use or to supplement


continuous systems. A standby system can be most useful to selectively light a
particular area in an occasional basis.

3. Movable or Portable – this system is manually operated and is usually made up


of movable search or floodlights that can be located in selected or special
locations which will require lighting only for short period of time.

4. Emergency Lighting – this system is used in times of power failure or other


emergencies when other systems are inoperative.

General Type of Lighting Sources

Listed below are the lighting sources most frequently used in providing indoor
and outdoor lighting.

1. Incandescent Light – it is least expensive in terms of energy consumed and has


the advantage of providing instant illumination when the switch is on.
2. Mercury vapor lamp – it is considered more efficient that the incandescent and
used widespread in exterior lighting. This emits a purplish – white color, caused
by an electric current passing through a tube of conducting and luminous gas.
3. Metal Halide – it has similar physical appearance to mercury vapor but provides
a light source of higher luminous efficiency and better color rendition.
4. Fluorescent – this provides good color rendition, high lamp efficiency as well as
long life. However, it cannot project light over long distance and thus, are not
desirable as flood type of lights.
5. High – pressure sodium vapor – this has gained acceptance for exterior lighting
of parking areas, roadways, buildings and commercial interior installations.
Constructed on the same principle as mercury vapor lamps, they emit a golden
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

white to light pink color and this provide high lumen efficiency and relatively
good color rendition.

Types of Lighting Equipment

1. Floodlights – these can be used to accommodate most outdoor security lighting


needs, including the illumination of boundaries, fences and buildings and for the
emphasis of vital areas or particular building.
2. Street lights – this lighting equipment received the most widespread notoriety for
its value in reducing crime.
3. Search lights – these are highly focused incandescent lamp and are designed to
pinpoint potential trouble spots.
4. Fresnel ights – these are wide beam units, primary used to extend the
illumination in long, horizontal strips to protect the approaches to the perimeter
barrier. Fresnel projects a narrow, horizontal beam that is approximately 180
degrees in the horizontal and from 15 to 30 degrees in the vertical plane.

Areas to be lighted

1. Perimeter fence
2. Building face perimeter
3. Pedestrian and vehicle entrance
4. Parking area
5. Storage, large opened working areas, piers, docks, and other sensitive areas.

PROTECTIVE ALARMS

This is one of the important barriers in security. It assists the security in detecting
or deterring potential security threat in the installation. Basically, its function is to alert
the security personnel for any attempt of intrusion into a protected area, building or
compound. Once an intruder tampers the circuitry, the beam or radiated waves of the
alarm system, it will activate an alarm signal.

Three Basic Parts of Alarm System

1. Sensor or trigger device – it emits the aural or visual signals or both


2. Transmission line – a circuit which transmit the message to the signaling
apparatus.
3. Enunciator/annunciator – it is the signaling system that activates the alarm.

Types of Protective Alarm System

1. Central Station System – a type of alarm where the control station is located
outside the plant or installation. When the alarm is sounded or actuated by
subscriber, the central station notifies the police and other public safety agencies.

2. Propriety System – centralized monitor of the proprietary alarm system is


located in the industrial firm itself with a duty operator. In case of alarm, the duty
operator calls whatever is the primary need; firefighters, police, an ambulance or a
bomb disposal unit.

3. Local alarm – this system of ringing up a visual pr audible alarm near the object
to be protected. When an intruder tries tp pry a window, the alarm thereat goes
off.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

4. Auxiliary alarm – company – owned alarm systems with a unit in the nearest
police station so that in case of need, direct call is possible. The company
maintains the equipment and lines both for the company and those in the police,
fire and other emergency agencies by special arrangement. Radio, landline, or cell
phones can avail of the auxiliary system.

Kinds of Alarms

1. Audio Detection Device – it will detect any sound caused by attempted force
entry. A supersonic microphone speaker sensor is installed in walls, ceilings and
floors of the protected area.

2. Vibration Detection Device – it will detect any vibration caused by attempted


force entry. A vibration sensitive sensor is attached to walls, ceilings or floors of
the protected area.

3. Metallic foil or wire – it will detect any action that moves the foil or wire. An
electrically charge strips of tinfoil or wore is used in the doors, windows or glass
of the protected area.

4. Laser Beam Alarm – a laser emitter floods a wall or fencing with a beam so that
when this beam is distributed by a physical object, an alarm is activated.

5. Photoelectric or Electric Eye Device – an invisible/visible beam is emitted and


when this is disturbed or when an intruder breaks contact with the beam, it will
activate the alarm.

Protective Lock and Key Control

Lock is one of the most widely used physical security devices in the asset
protection program of an installation. It complements other physical safeguards of the
installation against any possible surreptitious entry. However, the owner of the
installation or his security officer needs to understand the weakness and strength of each
type of lock including the door, window or walls to be used to achieve maximum benefit
from its application. This is because highly skilled burglars more often concentrate on the
lock and its surrounding mechanism in order to make a forcible entry. It is for this
obvious reasons that locks are considered as delaying devices which can not really stop a
determine intruder that loc just to launch an attack. Hence, knowledge of the basic
principles of locking systems will enable the installation owner or the security officer to
evaluate any lock and determine its quality and effectiveness in a particular application.

Lock – It is a mechanical, electrical, hydraulic or electronic device designed to prevent


entry into a building, room, and container or hiding place.

Types of Lock

1. Key – operated lock – it uses some sort of arrangement or internal physical


barriers (wards tumblers) which prevent the lock from operating unless they are
properly aligned. The key is the device used to align these internal barriers so that
the lock may be operated.

Three (3) types of key-operated lock


REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

a. Disc or wafer tumbler mechanism


b. Pin tumbler mechanism
c. Lever tumbler mechanism

2. Padlock – a portable and detachable lock having a sliding hasp which passes
through a staple ring and is then made fasten or secured.

3. Combination lock – instead of using the key to align the tumblers, the
combination mechanism uses numbers, letters or other symbols as reference point
which enables an operator to align them manually.

4. Code – operated lock – a type of lock that can be opened by pressing a series of
numbered button in the proper sequence.

5. Electrical lock – a type of lock that can be opened and closed remotely by
electrical means.

6. Card operated lock – a type of lock operated by a coded card.

Type of Keys

1. Change key – a specific key, which operates the lock and has a particular
combination of cuts which match the arrangement of the tumblers in the lock.

2. Sub – master key –a key that will open all the lock within a particular area or
grouping in a given facility.

3. Master key – a special key capable of opening a series of lock.

4. Grand Master key – a key that will open everything in a system involving two or
more master key groups.

Key Control

Once an effective key control has been installed, positive control of all keys must
be gained and maintained. This can be accomplish only if it is established in conjunction
with the installation of new locking devices. The following methods can be used to
maintain effective key control.

1. Key cabinet - a well – constructed cabinet will have to be procured. The cabinet
will have to be of sufficient size to hold the original key to every lock in the
system. It should be secured at all times.

2. Key record – some administrative means must be set up to record code numbers
and indicates to whom keys to specific locks have been issued.

3. Inventories – periodic inventories will have to be made of all duplicate and


original keys in the hands of the employees whom they have been issued.

4. Audits – in addition to periodic inventory, an unannounced audit should be made


of all key control records and procedures by a member of management.

5. Daily report – a daily reports should be made to the person responsible for key
control from the personnel department indicating all persons who have left or will
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

be leaving the company. In the event that a key has been issued, steps should be
initiated to insure that the key is recovered.

Security Cabinet

The final line of defense at any facility is in the high security storage where
papers, records, plans or cashable instrument, precious metals or other especially valuable
assets are protected. These security containers will be of a size and quantity, which the
nature of the business dictates.

In protecting property, it is essential to recognized that protective containers are


designed to secure against burglary or fire. Each type of equipment has a specialized
function and it will depend on the owner of the facility which types are going to use.

Three Types of Security Cabinet

1. Safe – a metallic container used for the safekeeping of documents or small items
in an office or installation. Safe can be classified as either robbery or burglary
resistance depending upon the use and need.

a. Its weight must be at least 750 lbs. and should be anchored to a building
structure.
b. Its body should at least once inch thick steel
2. Vault – heavily constructed fire and burglar resistance container usually a part of
the building structure used to keep and protect cash, documents and negotiable
instrument. Vaults are bigger than the safe but smaller than a file room.

a. The vault door should be made of steel at least 6 inches in thickness


b. The vault walls, ceiling, floor reinforce concrete at least 12 inches in
thickness.
c. The vault must be resistive up to 6 hours.

3. File room – a cubicle in a building constructed a little lighter than a vault but of
bigger size to accommodate limited people to work on the records inside.

a. The file room should at most be 12 feet high


b. It must have a watertight door and at least fire proof for one hour.

Control of Personnel in the Physical facility

In every installation, the use of protective barriers, securing lighting,


communication and electronic hardware provides physical safeguards but these are
insufficient to maximize the effort of the guard force. A control point must be established
for positive personnel identification and check system. This is to insure that only those
persons who have the right and authority will be given the necessary access to the area.

The most practical and generally accepted system of personnel identification is


the use of identification cards, badges or passes. Generally speaking, this system
designates when and where and how identification cards should be displayed, and to
whom. This helps security personnel eliminate the risk of allowing the access of
unauthorized personnel within the establishments.

Two Types of Personnel Identification


REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

1. Personal Recognition
2. Artificial recognition – identification cards, passes, passwords, etc.

Use of Pass System

1. Single pass system – the badge or pass coded for authorization to enter specific
area is issued to an employee who keeps it in his possession until his authorization
is terminates.

2. Pass exchange system – an exchange takes place at the entrance of each


controlled area. Upon leaving, the personnel surrender his badge or passes and
retrieve back his basic identification card.

3. Multiple pass system – this provides an extra measure of security by requiring


that an exchange take place at the entrance of each restricted area

Badge and Pass Control

1. The system should have a complete record of all bandages identification cards
issued, return, mutilated or lost by serial number and cross-indexed
alphabetically.
2. The supervisor from time for its accuracy and authenticity should check the
lists.
3. Passes and badges reported lost should be validated and security at entrance be
informed through conspicuous posting.

Visitors Movement Control

Security should establish proper methods of establishing the authority for


admission of visitors as well as the limitation thereat. This security measure would
depend on the sensibility of the installation, but could include the following:

1. Visitor’s logbook – All visitors to any facility should be required to identify


them selves and should be given a visitor’s ID by the security. Visitors logbook
should be filled up with the named of visitors, nature and duration of visit.
2. Photograph – taking of photographs should also be considered. Extreme caution
must be exercised in areas where classified information is displayed to preclude
unauthorized taking of pictures of the installation. If a visitor has camera and it is
prohibited to take picture, said camera should be left in the care of security with
corresponding receipt.
3. Escort – If possible visitors should be escorted by the security to monitor their
activity within the establishment and guide them where to go.
4. Visitors entrances – separate access for visitors and employees of the employees
establishment should be provided.
5. Time- traveled – If there is a long delay or time lapse between the departure and
arrival, the visitors maybe required to show cause for the delay.

Package Movement Control

Every facility must establish a system for the control of package entering or
leaving the premises. How-ever, desirable it might seem it is simply unrealistic to
suppose that a blanket rule forbidding packages either in or out would be workable. Such
a rule would be damaging to the employee morale and, in many case, would actually
work against the efficient operation in the facility. Therefore, since the transporting of
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

packages through the portals is a fact of life, they must be dealt with in order to prevent
theft and misappropriation of company properties. Thus;

1. No packages shall be authorized to be brought inside the industrial installation,


offices and work area without proper authority. This basic precept help reduce if
not eliminate pilferage, industrial espionage or sabotage.
2. Outgoing packages carried by personnel should be closely inspected and those in
vehicles should also be checked as many pilfered items are hidden in the surface
of the vehicles leaving the compound.
3. Any personnel/visitor entering the installation with a package should deposit the
same to the security and in return receives a number tag, which he/she will use in
claiming his/her packages upon departing.

Control of Vehicle in the Installation

Vehicular traffic within the boundaries of any facility must be carefully controlled
for safety as well as to control the transporting of pilfered goods from the premises. Thus

1. Privately owned vehicle of personnel/visitor should be registered and are subject


to the identification and admittance procedure.
2. Vehicles should be subjected for search at the entrance and exit of the installation.
3. All visitors with vehicle should provide the security as to the complete details of
their duration of stay, person to be visited and other information.
4. All vehicles of visitors should be given a sign/sticker to be placed on the
windshield.
5. Traffic warning signs should be installed in all entrances in order to guide the
visitors in their destination as well to provide them with the necessary safety
precautions while they are inside the installation.
6. Security personnel must constantly supervise parking areas and make frequent
spots searches of vehicles found there.

Building Access Control

At any physical barrier, a security system must posses the ability to distinguish
among authorized persons, unauthorized visitors, and other unauthorized persons. This is
to assist the security personnel protects sensitive are and information within the
installation. Appropriate warning signs should be posted at the building perimeter.
Special restricted entry facilities to public access should be provided. This will be
dependent on the degree of security needed for the protection of property, activity and
other processes within the building. A clear – cut policy on the access control should be
disseminated to all personnel of the installation.

2. PERSONNEL SECURITY

- It includes all the security measures designed to prevent unsuitable individuals


or persons of doubtful loyalty to the government, from gaining access to classified matter
or to any security facility, and to prevent appointment, or retention as employees of such
individuals.

Scope and Purpose

- Personnel security generally embraces such security measures as personnel


security investigation, security orientation and indoctrination and security education as
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

will ensure the prevention of unsuitable individuals or persons of doubtful loyalty to the
government, from gaining access to classified matter or being appointed, employed or
retained as employees.

Principle

- Just any other control technique, security must start from a given foundation or
basis and this basis shall be referred to as the principles of security. Security principles
are normally disseminated by regulations or directives to insure uniformity of purpose,
logical and similar methods of operation and appropriate and continuous placement of
responsibility.

The Security “Chain”

- Personnel security is the “weakest link” in the security “chain”. This weakness
can best be minimized or eliminated by making init personnel security conscious through
good training program. Security depends upon the action of what security measures to
take in every instance, a safe will not lock itself. An individual must be properly
instructed and must do the locking.

Control of Personnel

Access to “restricted areas” can be partially controlled by fences, gates and


other physical means, but the individual working in the area is the key to the bringing out
of classified matter to unauthorized personnel. Written information does not have the
power of speech. Only the individual has knowledge of this written information can pass
it to an unauthorized personnel if he unguardedly talks about information.

It is the individual responsibility to insure that he knows security procedures and


safeguards, and it is the commander’s responsibility to motivate each individual to insure
that he complied with this procedures and safeguards. Instructions on security
procedures, principles and concepts are valueless unless one impresses upon each
individual having access to classified information the necessity of practicing the “need-
to-know” concept.

“No personnel is entitled to knowledge or possession of classified information


solely by his rank, office, or possession. Such matter is entrusted only to individuals
whose official duties require knowledge or possession.” Responsibility for determining
whether a person’s official duties requires access to item to classified information rests
upon each individual who has knowledge, possession, or command control of the
information involved and not upon the prospective recipient.

Objectives of Personnel Security

a. To provide the standards and procedures necessary to insure the


appointment, employment of retention of suitable and loyal individuals in
government service.
b. To develop the necessary and proper security discipline among the
applicants and employee in the government service as well as protect and
preserve the security interest of the Philippines government.
c. Inculcate the desirable security attitudes and habits among the applicants
and employees of the government as promote the efficiency of the service.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

Basic Policies in Personnel Security

1. No person is entitled solely by virtue of his grade or possession to knowledge or


possession of classified matter. Classified matter shall be entrusted only to those
individuals whose official duties require such knowledge or possession, and who
have been granted the proper clearance.
2. All personnel whose duties require access to classified matter shall be subject to a
security investigation to determine eligibility to the required security clearance.
3. All personnel shall undergo security orientation, indoctrination and security
education.

Personnel Security Investigation

- It is an inquiry into the character, reputation, discretion and loyalty of individual


in order to determine a person’s suitability to be given security clearance.

Types of Personnel Security Investigation

1. National Agency Check (NAC) – This is an investigation of an individual made


upon the basis of written information supplied by him in response to official
inquiry, and by reference to appropriate national agencies. It is simply a check pf
the files and record of national agencies. The national agencies checked under this
type of investigation are the following:

a. National Intelligence Coordinating Agency (NICA)


b. National Bureau of Investigation (NBI)
c. ISAAFP or J2 Division, GHQ AFP
d. CIDG PNP Camp Crame., etc.

2. Local Agency Check (LAC) – This type of investigation consist of the first type
plus written inquiries sent to appropriate local government agencies, former
employees, references and schools listed by the person under investigation. The
local agencies normally check besides the past employment, schools and
references are the following:

1. Place of the locality where the individual is a resident


2. Mayor, Police, Fiscal, Judge of the locality where the individual is a resident

3. Background Investigation – This is more comprehensive investigation than the


NAC or the NAC and LAC. A through and complete investigation of all or some
of the circumstances or aspects of a persons life is conducted.

This type of personnel security investigation may either be complete (CBI)


or a partial background investigation (PBI).

1. Complete Background Investigation – consist of the investigation


of the background of a person, particularly all the circumstances of
his personal life.
2. Partial Background Investigation – Consist of the investigation of
the background of an individual but limited only to some of the
circumstances of his personal life which are deemed pertinent to the
investigation. Normally, the request for the investigation will
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

indicate the specific personal circumstances to be covered. This type


of BI is also used to further develop questionable information
contained in another investigation report.

Factors considered in background Investigation.

1. Loyalty – faithful allegiance to the country, government and its duly constituted
authority.
2. Integrity – uprightness in character, soundness of moral principles, freedom from
moral delinquencies, ore more simply state-honesty.
3. Discretion – the ability of tendency to act or decide with prudence; the habit of
wise judgment or simple stated- good judgment
4. Moral – distinctive identifying quality which serve as an index to the essential or
intrinsic nature of a person; his outward manifestation, personal traits or moral
habits.
5. Character – the sum of traits that serves as an index of the essential intrinsic
nature of a person. It is the aggregate of distinctive mental and moral qualities that
have been impressed by nature, education and habit upon the individual.
6. Reputation – opinion or estimation in which one is generally held. It is what one
reported to be, whereas character is what a person is.

Motives that cause to be disloyal

1. Revenge – a real or fancied wrong can create a hatred which will stop at nothing
to obtain revenge of the offender. Hatred wraps the sense of moral values until the
hater will go to any lengths, even betrayal of his country, to avenge himself on the
person or class of people hated.
2. Material Gain – some people are so avid for material gain that they will stop at
nothing to achieve this end.
3. Personal Prestige – this motivation applies to those whose main desire is for
power – power over others-to prove to the world what leaders they are. However,
their desire for power makes them especially vulnerable to subversion.
4. Friendship – through close attachment to another person, many people, otherwise
of high integrity, will do things inimical to their country’s interest.
5. Ideological Belief – if a person holds inimical to their country, they are of course
vulnerable to approach by subversive groups of agents.

Weaknesses that makes people susceptible to pressure

1. Close relative in foreign land – threat of mistreatment of loved ones under the
control of the threatening power has been used since time immemorial.
2. Gullibility – people, who accept every story at face value and can see no wrong
in anyone, fall in to this category. Such people are usually idealists and can
sometimes be utilized by unscrupulous persons.
3. Jealousy – one of the most powerful motivations, jealousy can be utilized by alert
agents.
4. Weakness of Character – a weak character who can easily be dominated is fair
prey for subversive agents looking for a “stooge” to aid them.
5. Serious Indebtedness – the person who is heavily indebted is always looking for
a fast and easy way to recoup his looses, and get out of debt. Such a person
approached with the lure of a large sum of money, is very vulnerable and definite
security risk.
6. Addiction to drugs – this requires no explanation – it is widely known that drugs
addicts will commit a crime to obtain their dope.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

7. Serious guilty episodes in the past – being human, many of us have episodes in
our past of which we are ashamed. Threats to expose such episodes have always
been powerful level for blackmailing a person into committing.

The Guard Force and Guard System

The security guard force is the key element in the overall security system of a
plant or installation. Its basic mission is to protect all the property within the limits of the
facility boundaries and protect employees and other persons on the installation.

The security guard who will become a pert of the guard force must be required to
meet minimum criteria to assure that they will effectively perform their assigned security
related duties. It is the responsibility of the security director of the installation to insure
that its guard force is of a high caliber to make a judgment that could save multi – million
pesos facility from total destruction.

The security guard force must ready to meet the new challenge with new
concepts, bold innovations, and unrelenting insistence on high standards.

Security Guard

- It is sometimes defined/called private security guard or watchman shall include


any person who offers or renders personal service to watch or secure either a residence or
business establishments or both for hire or compensation, and with a license to exercise
profession.

Security Guard Force

- It is a group of force selected men, trained or grouped into functional unit


for the purpose of protecting operational processes from those disruption
which would impeded efficiency or halt operation at a particular plant,
facility, installation or special activity.

Type of Security Guard Forces

1. Private Security Agency – any person, association, partnership, firm or


Private Corporation, who contacts, recruits, trains, furnishes or post any
security guard, to so its functions or solicit individuals, business firms, or
private, public or government – owned or controlled corporations to
engage its service or those of its security guards, for hire commission or
compensation.
2. Company Security Force – A security force maintained and operated by
any private company/corporation for its own security requirements only.
3. Government Security Unit – A security unit maintained and operated by
any government entity other that military and/a police, which is
established and maintained for the purpose of securing the office or
compound and/or extension such government entity.

Document and Information Security

In every installation, documents and information are indispensable for their daily
operations and activities, be it in the form of a paper, film, and magnetic media or in the
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

computer system. Once there is a leakage in the contents of a company’s document and
information, the business operational stability is at stake. It may be a start of bankruptcy
that would lead to its total disclosure.

The leakage of documents and information cost government, business and


industry alike, billion of pesos. A rival company or an enemy agent might use illegally
obtain document and information for their own advantage. For this reason, a
comprehensive and information security program is very essential to the installation in
order to focus freely on the attainment of its goals and objectives.

Document Security System

Documents Security System is that aspect of security which involves the


application of security measures for the proper and safeguarding of classified
information.

Classification of Documents

Classification Categories – Official matter which requires protection in the


interest of national security shall be limited to four categories of classification which in
descending order of importance shall carry one of the following designations:

1. Top Secret
2. Secret
3. Confidential
4. Restricted

1. Top Secret

These are information and material, the unauthorized disclosure of which would
cause exceptionally grave damage to the nation, politically, economically or from a
security aspect. This category is reserve for the nation’s closest secrets and is to be used
with great reserve.

Classification Authority

The original classification authority for assignment of TOP SECRET


classification rests exclusively with the head of the department. This power may
however, be delegated to authorized offices in instances when the necessity for
such arises. Derivative classification authority for TOP SECRET classification
may be granted those officers who are required to give comments or responses tp
a communication that necessitates TOP SECRETS response.

Examples of TOP SECRET Documents

1. Very important political documents regarding negotiation for major alliances.


2. Major governmental projects such as proposal to adjust the nation’s economy.
3. Military – police defense class/plans.
4. Capabilities of major successes of intelligence services.
5. Compilations of data individually classified as secret or lower but which
collectively should be in a higher grade.
6. Strategies plan documenting overall conduct of war.
7. Intel documents revealing major Intel production effort permitting an
evaluation by recipients of the success and capabilities of Intel agencies.
8. Major government project like drastic proposals.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

2. Secret Matters

These information and material, the unauthorized disclosure of which would


endanger national security, cause serious injury to the interest or prestige of the nation or
of any governmental activity or would be of great advantage to a foreign nation.

Justification of Secret Matters

1. It materially influences a major aspect of military tactics.


2. It involves a novel principle applicable to existing important projects.
3. It is sufficiently revolutionary to result in a major advance in existing
techniques or in the performance of existing secret weapons.
4. It is liable to compromise some other projects so already graded.

Classification Authority – Same as TOP SECRET matter

Examples of Secret Documents

1. Those that jeopardize or endanger Intel relationship of a nation


2. Those that compromise defense plans, scientific or technological development
3. Those that reveal important Intelligence Operations
4. Documents showing disposition of forces.
5. New design of aircraft projects, tanks, radar and other vehicle
6. Troop movement to operational area
7. Hotel plans and estimates
8. Order of battle info

3. Confidential Matters

These are information and material which the unauthorized disclosure of which,
while not endangering the national security, would be prejudicial to the interest or
prestige of the nation or nay government activity, or would cause administrative
embarrassment or unwarranted injury to an individual or ould be of advantage to a
foreign nation.

Classification Authority – Any officer is authorized to assign confidential


classification to any matter in the performance of his duties.

Examples of Confidential Documents

1. Plans of government projects such as roads, bridges, building, etc.


2. Routine service reports like operational and exercise of foreign power.
3. Routine intelligence reports
4. Certain personal records, staff matters.

Restricted Matters

These are information and material, which requires special protection other than
that determined to be TOP SECRET, SECRET, of CONFEDINTIAL.

Authority to classify shall be the same as for CONFIDENTIAL matter.


Reproduction is authorized; transmission shall be through the normal dissemination
system.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

RISK ANALYSIS AND SECURITY HAZARD

Risk – it is the potential damage or loss of an asset. The level of risk is a combination of
two factors: The value placed on that assts by its owner and the consequence, impact
adverse effect of the loss or damage to that asset and; the like hood that a specific
vulnerability will be exploited by a particular threat.

Risk Management – It is a process of selecting and implementing security counter


measures to achieve an acceptable level of risk at an acceptable cost.

Risk Analysis – it is the analysis of risk include examinations of the vulnerability,


probability and criticality of potential threats and include natural and man made hazard.

Adversary – an individual, group, organization or government that conducts activities or


has the intention and capability to conduct activities detrimental to the individual, private
or government entity.

Asset – Any information, facility, material, information, or activity which has a positive
value to its owner whether it is an individual, private or government entity.

Countermeasures – an action taken or a physical entity used to reduce or eliminate one


or more vulnerable.

Probability – It is the chance or like hood that a loss will take place. Indicated by a
mathematical statement concerning the possibility if an event occurring.

Criticality – It is the impact of a loss as measured in financial terms. How important it is


in terms of the survival or existence of the organization.

Security Hazards
– Any act or condition which may result in the compromise of information, loss
of life, loss or destruction of property or disruption of the objective of the
installation.

Types of Hazards

1. Natural Hazards – these are hazards which arise from natural phenomena. The
following are types of natural hazards or disasters:

– floods caused by typhoons


– earthquakes
– fire (not caused by human action)
– storms (typhoons, cyclones, tornado and hurricane)
– lighting storms
– extreme temperature and humidity

2. Human/man made hazards – these are hazards which are the result of a state of
mind, attitude, weaknesses or character traits of one or more persons. They can be
acts of commission or omission, both overt and covert, which can disrupt
operational of a plant or installation. The following are types of human/man made
hazards:

– Carelessness – accidents and dissatisfaction


– Disloyalty – subversion and sabotage
– Espionage, pilferage, and theft
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

– Vandalism, etc.

Security Survey and Inspection

Security System – The information pertaining to one of the most important security
services offered to a head of offices is the conduct of security surveys and security
inspections. Every unit chief desires a security system that will reduce to an absolute
minimum the possibility of espionage, sabotage and compromise of classified
information on his office or unit.

Security Survey – It is an estimate of the security standards of a unit, and is conducted to


enable the responsible officer to recognize and evaluate security hazards and determine
protective measures necessary to the prevention of sabotage, espionage and subversive
activities and other criminal acts inimical towards the interest and/or mission of the unit
and/or command.

Security Inspection – It is a check of how well existing security measures and


regulations are being carried out within a command. A security inspection may also
include an investigation of alleged or suspected security violations. Physical security is
concerned with forces, entrances and exits, guards, traffic control, lighting, fire control,
and such other physical measures, which, if properly established and maintained, will
deny access to, unauthorized persons.

Distinction Between Security Survey and Security Inspection

- The terms “Security Survey” and “Security Inspection” to accentuate the


particular differences between the two types of services, are defined as follows:

Security surveys is a counterintelligence service to assist heads of office in


determining the security measures required to protect key installation from possible
sabotage, espionage, subversion, and unauthorized disclosure of, or access to, classified
information or material contained therein.

Security inspection is a counterintelligence service performed to determine


compliance with established security policies and procedures.

REPUBLIC ACT 5487, AS AMENDED

RULE I
DECLARATION OF POLICY

SECTION 1. Scope. The organization, operation, business and activities of private


watchman/security or detective agencies, security training institutions/systems as well as
private security and training personnel shall be governed by these Rules and Regulations
implementing Republic Act 5487, as amended.

SECTION 2. License Necessary.

a. No person shall engage in the business of or act as a private detective agency or engage
in the occupation, calling or employment of security personnel or in the business of
private security/training agency without first having obtained the permit from the Chief
of the Philippine National Police which permit as approved is prerequisite in obtaining a
license certificate.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

b. License is likewise necessary for any person operating, managing, directing or


conducting a licensed private security/detective/training agency. Any person having any
participation in the management or operation thereof except those employed solely for
clerical or manual work, shall also secure a license.

SECTION 3. Training Required. All applicants for license certificate shall have
received the appropriate training from any public or private training institution/system
duly recognized by the government to conduct private security or police training.

SECTION 4. Prohibitions. No License certificate shall be granted to any applicant for


license to operate or license to exercise security profession with the following
disqualifications:
a. having previous record of any conviction of any crime
b. having previous record of any conviction of any offense involving moral turpitude
c. having been dishonorably discharged or separated from employment or service
d. being a mental incompetent
e. being a user/addicted to the use of prohibited drugs or narcotics
f. being a habitual drunkard
g. dummy of a foreigner

RULE II
PENAL PROVISION

SECTION 1. Without prejudice to the imposition of criminal sanctions, any violation of


Republic Act 5487, as amended or its rule or regulation, by license grantees likewise
pursuant thereof, shall be punished by suspension, or fine, or cancellation of his or its
license to operate, conduct, direct or manage a private detective, watchman or security
guard agency and all its members, or penalized pursuant to provisions herein under,
and/or with the forfeiture of its bond filed with the Philippine National Police, at the
discretion of the Chief. PNP.

SECTION 2.

a. Any person not covered by Section 1, Rule II above who commits any act in violation
of Republic Act 5487 as amended and its implementing rules and regulations shall, on
conviction thereof, suffer imprisonment of from ten to fifteen years, and a fine of not less
than ten thousand pesos nor more than fifteen thousand pesos as the Court may direct.

b. If the violation is committed by those persons mentioned in Section 3b, Rule IV herein
under, the penalty shall be imprisonment ranging from one to four years and a fine
ranging from one to four thousand pesos at the discretion of the Court.

SECTION 3. Expired License. For purposes of enforcing sanctions, any private security,
watchman or company guard force agency or private security or training personnel upon
expiration of their respective license to operate or license to exercise security profession
are considered as not possessing license and shall be held criminally and administratively
liable.

RULE III
DEFINITION OF TERMS

SECTION 1. Definition – For purposes of and when used in these rules and regulations,
the following terms shall be construed in the sense indicated herein unless the context of
a particular section clearly indicates that a different sense is intended:
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

a. Person – shall include not only natural but also juridical persons such as single
proprietorships, partnerships, corporations, companies or associations, duly organized
and registered with the Securities and Exchange Commission and/or the Department of
Trade and Industry.

b. Private Security Services – shall include the act of providing or rendering services to
watch an establishment whether public or private, building, compound/area or property,
to conduct access control/denial in any form whether physically, manually or
scientifically by electronic monitoring systems, for the purpose of securing such
area/property and at the same time ensuring safety and protection of persons within such
areas, to maintain peace and order within such areas, to conduct private security training,
and/or to conduct investigation. It shall also include the act of contracting, recruiting,
training, furnishing or posting any security guard, to do its functions or solicit
individuals, businesses, firms, or private, public or government-owned or controlled
corporations to engage his/its service or those of his/its security guards, for hire,
commission or compensation thru subscription or as a consultant/trainer to any private or
public corporation.

c. Private Detective Services – shall include among others the act of providing personal
security protection, inquiry and information gathering, pre-employment verification and
individual background profiling, providing assistance in civil liability and personal injury
cases, insurance claims and fraud, child custody and protection cases, for the purpose of
assisting in gathering information leading to determination and/or prevention of criminal
acts and/or resolution of legal, financial and personal problems.

d. Private Security Industry – shall cover those in the legitimate business of providing
private security and detective services.

e. Private Security Guard (SG) – sometimes called private security guard or watchman
shall include any person who offers or renders personal service to watch or secure either
a residence, business establishment, or buildings, compounds, areas, or property,
inspects/monitors bodily checks/searches individuals and/or baggage and other forms of
security inspection, physically/ manually or scientifically electronic, including but not
limited to, logging concessions and agricultural, mining or pasture lands, transportation,
for hire or compensation , or as an employee thereof, including any employee of the
national or local governments or agencies or instrumentality’s thereof and or government
owned or controlled firm or corporations who is employed to watch or secure
government buildings, compounds, premises and other properties, other than members of
the Armed Forces of the Philippines, guards of the Bureau of Jail management and
Penology, Municipal or City jail guards, and members of the Philippine National Police
or of any other law enforcement agency of the Government.

f. Private Detective (PD) – shall mean any person who does detective work for hire,
reward or commission, other than members of the Armed Forces of the Philippines,
guards of the Bureau of Jail Management and Penology, municipal or city jail guards, and
members of the Philippine National Police or of any other law enforcement agency of the
government.

g. Private Security Personnel – shall be natural persons which include private security
guards, private detectives, security consultants, security officers and others that may be
classified later, rendering/performing security and/or detective services as employed by
private security agencies and/or private firms.

h. Government Security Personnel – shall be natural persons which include government


security guards, detectives, security consultants, security officers and others that may be
classified later, except those of the Armed Forces of the Philippines, Philippine National
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

Police, Bureau of Jail Management and Penology, Municipal or City Jail guards
rendering/performing security and/or detective services as employed by government
entities.

i. Private Security Agency (PSA) – shall mean any person association, partnership, firm
or private corporation, who contracts, recruits, trains, furnishes or posts any security
guard, to perform its functions or solicit individuals, businesses, firms, or private, public
or government-owned or controlled corporations to engage his/its service or those of
his/its security guards, for hire, commission or compensation thru subscription or as a
consultant/trainer to any private or public corporation whose business or transactions
involve national security or interest like the operation and/or management of domestic or
ocean vessels, airplanes, helicopters, seaports, airports heliports, landing strips etc., or as
consultant on any security related matter, or to provide highly specialized security,
detective and investigation services like gangway security, catering security, passenger
profiling, baggage examination, providing security on board vessels or aircraft, or other
security needs that PNP SAGSD may approve.

j. Private Detective Agency (PDA) – shall mean any person association, partnership, firm
or private corporation, who contracts, recruits, trains, furnishes or posts any private
detective, to perform its functions or solicit individuals, businesses, firms, or private,
public or government-owned or controlled corporations to engage his/its service or those
of his/its detectives, for hire, commission or compensation thru subscription or as a
consultant/trainer to any private or public corporation or as consultant on any detective
related matter, or to provide highly specialized detective and investigation services, or
other detective needs that SAGSD-CSG may approve.

k. License to Exercise Profession – shall mean any document issued by the Chief,
Philippine National Police or his duly authorized representative recognizing a person to
be qualified to perform his duties as private security or training personnel.

l. License to Operate (LTO) – is a License Certificate document, issued by the Chief,


Philippine National Police or his duly authorized representative, authorizing a person to
engage in employing security guard or detective, or a juridical person to establish,
engage, direct, manage or operate an individual or a private detective agency or private
security agency/company security force after payment of the prescribed dues or fees as
provided in these Rules and Regulations.

m. Company Guard Force (CGF) – a security force maintained and operated by any
private company/corporation utilizing any of its employees to watch, secure or guard its
business establishment premises, compound or properties.

n. Government Guard Unit (GGU) – a security unit maintained and operated by any
government entity other than military or police, which is established and maintained for
the purpose of securing the office or compound and/or extension of such government
entity.

o. PNP as used herein shall mean the Philippine National Police, which was organized
pursuant to the provision of RA 6975 otherwise known as the National Police Act of
1991.

p. SAGSD as used herein shall refer to the current PNP Civil Security Group Security
Agency and Guard Supervision Division or any other PNP Office that may be designated
later as the primary office for supervision of the implementation of these rules and
regulations.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

q. PADPAO refers to the Philippines Association of Detective and Protective Agency


Operators, Inc., which is an association of all licensed security agencies and company
security forces.

r. Duty Detail Order is a written order/schedule issued by a superior officer usually the
private security agency/branch manager or operations officer assigning the performance
of private security/detective services duties.

RULE IV LICENSE TO OPERATE

PART 1

SECTION 1. Who may organize and maintain a Private Security Agency and Private
Detective Agency. - Any Filipino citizen or corporation, association, partnership, one
hundred percent (100%) of which is owned and controlled by Filipino citizens, may
organize and maintain a Private Security Agency or Private Detective Agency.

SECTION 2. Basic requirement of an operator or manager of agency –


A. The operator or manager of an agency including, managers of branch offices, must be:
1. Filipino citizen;
2. Not be less than twenty five (25) years of age;
3. College graduate and/or a commissioned officer in the inactive service or retired from
the Armed Forces of the Philippines or the Philippine National police;
4. Has taken a course/seminar on industrial Security Management and/or must have
adequate training or experience in security business; and,
5. Good moral character

B. New applicants for license to operate shall be required to obtain a minimum


capitalization of one million pesos (P1, 000,000.00) with a minimum bank deposit of five
hundred thousand (P500, 000.00) pesos in order to start its business operation.

SECTION 3. Limitations, Disqualifications and Prohibitions.

a. No person shall organize or have an interest in more than one agency.

b. Elective or appointive government employees who may be called upon on account of


the functions of their respective offices in the implementation and enforcement of the
provisions of Republic Act 5487 as amended and its implementing rules and regulations,
and any person related to such government employee by affinity or consanguinity in the
third civil degree, shall not hold an interest, directly or indirectly, in any security or
watchman agency.

c. No agency shall offer, render or accept services in gambling dens or other illegal
business establishments or enterprises.

d. The extent of the security guard service being furnished by the security agency shall
not go beyond the compound and/or property of the person or establishment contracting
the security service except when the security guards is escorting big amount of money or
valuables.

e. Main/branch offices. - All agencies shall maintain a main office in their registered
addresses. Branch offices may be established and maintained in other provinces/ cities
where the security agency has deployed security guards.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

f. Authority to operate outside principal offices. The following measures are promulgated
to promote the healthy growth of the private security industry in general, as well as to
minimize proliferation of marginal agencies in particular.

1. No new or moribund but previously licensed private security agency shall be granted
license to operate unless its business viability is supported by evidence of assured
clientele, adequate capitalization and the like.
2. Private Security Agency operating at regions outside its main office shall be required
to register with the nearest Police Provincial Office and shall submit an authenticated
machine copy of the following documents:
a) License to Operate
b) License of the FA’s to be issued
c) List of the officers and security guards
d) Appointment Order of Branch/Detachment Manager (if any)
g. All applicants for license to operate shall, in addition to the requirements imposed
pursuant to RA 5487 as amended and these rules and regulations, be required to attend a
private security agency/company guard force operators’ and management
seminar/workshop.
h. Prohibition on “KABIT SYSTEM” operators.

1. No licensed security agency shall operate, promote and enter into an agreement of
“merger“ (kabit system) with any person or a group of persons for the purpose of
organizing a branch unit or subsidiary under separate control and ownership. Merger of
security and detective agencies shall not be recognized without prior approval from the
Securities and Exchange Commission with respect to their Articles of Incorporation and
the Department of Trade and Industry, with regards their business name.

2. Any of the following circumstances or a combination thereof shall be considered


prima-facie evidence of the existence of “Kabit System”.

a) Maintaining a separate branch, unit or subsidiary office aside from the main office of
the agency situated within the same locality;

b) Receiving direct payments from the agency’s clientele and issuing officials receipt of
their own distinct from that issued by the agency concerned;

c) Remitting directly Social Security System premiums, Medicare contributions and other
premium for other policy insurance benefits by the aforementioned branch, unit or
subsidiary office;

d) Existence of an agreement between the licensee and a branch manager thereof,


whereby the latter obligates himself to pay a certain percentage of his income to the
former on the condition that the control and supervision of the guards posted by said
branch shall course on the manager thereof and that the licensee shall be exempt from
liabilities/ obligations attendant to the operation of said branch.

e) Keeping/maintaining separate payrolls for the branch employees signed and/or


approved by the branch manager only;

f) Absence of record of monthly income remittances to the main office when said branch
is authorized to make collections from the clients of the licensee; and

g) All other similar acts tending to show separate and distinct relationship/ personality/
ownership/ management.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

SECTION 4. Organizational structure of private security agencies/company security


services/ government security units.

a. Private security agencies shall conform to the organizational structure, personnel,


equipment, training and clothing as provided for hereinafter.
b. Company security forces shall be organized to conform substantially with the
organizational structure prescribed for private security agencies.

c. Government Guard Unit shall be organized to conform with the organizational


structure of the said government firm but not contrary to the organizational structure as
prescribed for government security units.

SECTION 5. On Membership.

a. No regular license shall be granted to any private security agency unless it has a
minimum of two hundred (200) licensed private security personnel under its employ.

b. No regular license shall be granted to any company guard force or private detective
agency unless it has a minimum of thirty (30) licensed private security personnel under
its employ.

c. The maximum number of private security personnel that a PSA/CGF/PDA may


employ shall be one thousand (1000).

PART 2

SECTION 6. Application for License to Operate (LTO).

a. The application shall be made in writing by the owner (for single proprietorships) or
authorized person duly designated by the corporation or partnership (through a board
resolution or joint affidavit, respectively) and shall be filed with the Chief of the
Philippine National Police (CPNP) through the PNP Security Agency and Guard
Supervision Division, Civil security Group (SAGSD-CSG). Using license application
form PNPSF1, the application shall contain the full name of the applicant, his age, civil
status, his residence and location of business.

b. Applications of corporations, associations, partnerships shall furthermore include a


copy of the certificate of registration together with its by-laws and articles of
incorporation.

c. All applications shall be accompanied by a bond issued by any competent or reputable


surety or fidelity or insurance company duly accredited by the Office of the Insurance
Commissioner, which bond shall answer for any valid and legal claim against the agency
by its clients or employees.

SECTION 7. License to Operate (LTO). License to Operate (LTO) shall be issued


corresponding to the purpose of the organized Private Security Agency:

a. Private Security/Detective Agency LTO. License certificate issued to persons,


corporations, associations, partnerships whose primary purpose is to provide/offer
commercial private security and/or detective services for hire, commission or
compensation.

b. Company Guard Force LTO. License certificate issued to persons, corporations,


associations, partnerships not doing business nor organized purposely or principally as a
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

private security guard or detective agency who/which is utilizing for its security purpose
any of his/its employees to render private security or detective services.

c. Government Guard Unit Certificate of Registration (CR). License certificate issued to


national or local government or any agency or instrumentality thereof, or of government-
owned or controlled corporation not doing business nor organized purposely or
principally as a private security guard or detective agency who/which is utilizing for its
purpose any of his/its employees to render private security or detective services.

SECTION 8. Status and Validity of License to Operate. The status of license certificate
in Section 7 above shall be issued in conformity with the following:

a. Regular LTO – issued, after complying with licensing requirements, to private


security agencies having obtained and maintained in its employ at least two hundred
(200) security personnel, and to company guard forces and private detective agencies
having obtained and maintained in its employ at least thirty (30) security personnel and
private detectives respectively. Such license may be renewed following conformity with
renewal requirements prescribed in a Standard Operating Procedure (SOP).

b. Temporary LTO – initial and conditional issuance to new private security agencies
and to PSAs holding regular LTO not able to maintain the minimum number of security
personnel or conform to standards, for them to be able to attain the 200 minimum number
of security personnel or comply with licensing standards, prior to issuance/re-issuance of
regular LTO. Such issuance shall not be renewable nor be extendible.

c. Unless sooner cancelled or revoked and provisions hereof modified, all licenses to
operate shall have a validity of two (2) years. Temporary LTOs upon expiration are
automatically cancelled.

d. The expiry date of Regular Licenses to Operate shall be on the last day of the month of
the second year corresponding to the last number before the year series number of the
assigned number/LTO number of the License. (i.e. hereto in bold numbers PSA-00001-
02 and PSA-00050-03 representing expiry on January 31, 2004 and October 31, 2005
respectively). For this purpose the appropriate transition period shall be provided after the
effectivity of these Rules and Regulations.

SECTION 9. LTO Processing.

a. All applications for Licenses to Operate filed shall be processed by SAGSDCSG for
approval and subsequent issuance of the appropriate LTO, and/or for disapproval.
b. When all requisites for the issuance of License to Operate have been complied with,
corresponding license certificate shall be issued upon payment by the applicant of
applicable fees and bond, prescribed/to be prescribed following existing administrative
laws:
1. National License Fee
2. Security Personnel Registration Fee
3. Annual Internal Revenue tax
4. Local Government Business tax
5. Bond issued by any competent or reputable surety or fidelity or insurance
company duly accredited by the Insurance Commission in the sum of ten
thousand pesos in the discretion of the CPNP which bond shall answer for any
valid and legal claim against the agency by its clients or employees

c. Applications with lacking requirements shall not be accepted for processing.


REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

d. All accepted applications for license to operate shall be processed for completeness of
documentary requirements and conformity to standards.

RULE V
LICENSE TO EXERCISE PRIVATE SECURITY PROFESSION

SECTION 1. Who may apply for a License to Exercise Private Security Profession.

Any Filipino citizen may apply for License to Exercise Private Security Profession to
engage in the occupation, calling or employment either as a Private Security Guard,
Private Security Officer, Private Detective and/or Private Security Consultant, after
complying with both academic/scholastic and skills/training requirements subject to other
requirements prescribed herein under provisions.

SECTION 2. Basic requirements of private security personnel -


a. Filipino citizen;
b. Not be less than eighteen (18) years of age.
c. Must have taken a private security course/seminar and/or must have adequate training
or experience in security business or rendering security/detective services;
d. Of good moral character and must not have been convicted of any crime or violation of
these rules and regulations carrying a penalty of prohibition to be licensed; and
e. Must be physically and mentally fit.

SECTION 3. Qualifications a Private Security Guard. No person shall be licensed as


security guard unless he possesses the following qualifications:
a. Filipino citizen;
b. High school graduate;
c. Physically and mentally fit;
d. Not less than eighteen (18) years of age nor more than fifty (50) years of age
(For new applicants and SGs in non-supervisory position); and
e. Has undergone a pre-licensing training course or its equivalent.

SECTION 4. Qualifications for Security Officer. - No person shall be licensed as


Security Officer unless he has the following qualifications:

a. Filipino citizen;
b. Holder of a Baccalaureate Degree;
c. Physically and mentally fit; and
d. Has graduated from a Security Officer Training Course or its equivalent.

SECTION 5. Qualifications of Security Consultants. - No person shall be licensed as a


Security Consultant unless he possesses the following qualifications:

a. Filipino citizen;
b. Physically and mentally fit;
c. Holder of a Masters degree in either Criminology, Public Administration, MNSA,
Industrial Security Administration, or Law;
d. Must have at least ten (10) years experience in the operation and management of
security business.

SECTION 6. Qualifications of a private detective.- No person shall be licensed as a


private detective unless possesses the following qualifications:

a. Filipino citizen;
b. Physical and mentally fit;
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

c. Holder of a baccalaureate degree preferably Bachelor of laws or Bachelor of Science in


Criminology;
d. Graduate of a Criminal Investigation Course offered by the Philippine National Police
or the National Bureau of Investigation or any police training school, or a detective
training in any authorized/recognized training center;
e. Advance ROTC/CMT graduate or its equivalent.

SECTION 7. Exemptions from Basic Pre-Licensing Training. -

a. Veterans and retired military/police personnel or those honorably discharged


military/police personnel possessing all the qualifications mentioned in the preceding
Section shall be exempted from pre-licensing training/seminar and academic/scholastic
attainment which is a requirement for the initial issuance of License to exercise private
security profession but shall not however be exempted from taking the refresher training
courses or its equivalent.
b. Likewise, graduates of ROTC advance/CHDF (or its equivalent in the PNP) Training
graduates shall be exempted from the required Basic-licensing Training/Seminar.

SECTION 8. Processing SOP. License to exercise profession processing, standards and


documentary requirements shall be prescribed in a Standard Operating Procedure (SOP)
issued by the Director, CSG.

SECTION 9. Types of License.

a. Temporary License – initial and conditional issuance while awaiting issuance of


regular license identification cards or in the interim for purposes not covered by Rule V.
b. Regular License – generated Private Security Personnel License Card, duration or
validity of which shall be for two (2) years.

SECTION 10. Government Security Personnel – no person shall be licensed as


Government Security Personnel unless he possesses the qualifications as prescribed in
Section 3, 4, 5 of this rule, provided he submits an appointment order coming from the
Civil Service Commission.

SECTION 11. Processing.

a. All applications for Licenses to Exercise Profession filed shall be processed by


SAGSD-CSG for approval and subsequent issuance of the appropriate License to
Exercise Profession, and/or for disapproval.
b. When all requisites for the issuance of License to Exercise Profession have been
complied with, corresponding license certificate shall be issued upon payment by the
applicant of applicable fees.

RULE VII
USE OF FIREARMS

SECTION 1. Possession of Firearms by Private Security Agency /Private Detective


Agency/ Company Security Force/ Government Security Unit. – Private Security
Agency /Private Detective Agency/ Company Security Force/ Government Security Unit
shall be entitled to possess firearms after satisfactorily complying with the requirements
prescribed by the Chief, Philippine National Police pertinent to the possession of
firearms, provided that the number of firearms shall not exceed one (1) firearm for every
two (2) security guard in its employ. No private security agency/private detective
agency/company security force/government security unit shall be allowed to possess
firearms in excess of 500 units.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

SECTION 2. Restriction to possess high-powered firearms. – A private detective


agency/private security agency/ company security services/ government security unit is
not allowed to possess high caliber firearms considered as military-type weapons such as
M16, M14, cal .30 carbine, M1 Garand, and other rifles and special weapons with bores
bigger than cal .22, to include pistols and revolvers with bores bigger than cal .38 such as
cal .40, cal .41, cal .44, cal .45, cal .50, except cal .22 centerfire magnum and cal .357 and
other pistols with bores smaller than cal .38 but with firing characteristics of full
automatic burst and three-round burst. However, when such entities are operating in areas
where there is an upsurge of lawlessness and criminality as determined by the Chief,
PNP, Police Regional Office Regional Director or their authorized representative, they
may be allowed to acquire, possess and use high-powered firearms under the following
conditions:

a. The acquisition of the high-powered firearms shall be at the expense of the private
security agency/private detective agency/company security force/government security
unit concerned;
b. The firearms should first be registered with the Firearms and Explosives Division
before issuance and shall not be used or transferred in places other than those specially
authorized by the Director, CSG;
c. The total number of high-powered firearms that an agency or security force/unit is
authorized to possess shall not exceed ten percent (10%) of the total number of security
guards of watchmen in its employ; and
d. The duly licensed security guards or watchmen who will use the firearm shall first be
given adequate training in the care and use thereof and will be under the supervision of
qualified officers and men of the Philippine National Police.

SECTION 3. Limitations in the carrying of firearms.

a. Unless specified and/or exempted pursuant to provisions of these rules and regulations
and/or firearms laws, no firearm shall be borne nor be in the possession of any private
security personnel except when in the actual performance of duty, in the prescribed
uniform, in the place and time so specified in the DDO.
b. The firearm issued to security personnel of private security agency/private detective
agency/company security services/government security unit shall be carried by the
security personnel only within the compound of the establishment where he is assigned to
guard, except when the security personnel is escorting big amount of money or valuables
on conduction duties outside its jurisdiction or area of operation, upon prior coordination
with the nearest PNP units/stations, or when in hot pursuit of criminal offenders.

SECTION 4. Duty Detail Order (DDO) - Private security agency/private detective


agency / company security services/ government guard unit detailing their security
personnel on duty under the circumstances mentioned in the preceding section or while
escorting big amount of cash or valuable outside its jurisdiction or area of operation, shall
issue an appropriate duty detail order to the security personnel concerned using SAGSD
Form No. 12-94 under the following conditions:

a. DDOs for the purpose of transporting agency licensed firearms from agency
vault/office to post and back for posting, for routine rotation, replacement of firearms or
for conduction service duties, shall be issued for not more than a duration of twenty-four
(24) hours;
b. DDOs for the purpose of post duties not requiring transport of firearms outside of the
physical compound or property of a client or client establishment/firm shall be issued for
not more than a thirty (30) day duration;
c. Transport of firearm other than those covered in paragraph a and b, Section 4, Rule VII
above, shall require the appropriate transport permit issued by the Firearms and
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

Explosives Division or Police Regional, Provincial or City Office nearest the place of
origin;
d. The issuance of DDOs for private detective personal protection service duties shall be
prescribed in an SOP to be issued by NHPNP in consideration of Rule XII of these rules
and regulations; and
e. All DDOs shall indicate the following:
1. Name, address and telephone number of agency
2. Issue serial number and date of DDO
3. Complete name and designation of grantee
4. Purpose
5. Inclusive dates of detail
6. Firearms description and license number
7. Authorized uniform to be used
8. Other specific instructions/remarks
9. Signature and designation of issuing officer

SECTION 7. Filing of application for firearms license. Application for licensing of


firearms by any private security agency, private detective agency, or company security
force, shall be filed with the Firearms and Explosives Division through the SAGSD and
Police Regional Offices for other Regions outside NCR in accordance with the usual
procedure prescribed by the firearms laws and implementing executive orders and
regulations. In addition, the following shall be submitted:

a. License to Operate a private security agency, private detective agency or company


security force duly approved by the Chief, Philippine National Police;
b. Certification that such agency has provided a safety vault as prescribed by the Chief of
the Firearms and Explosives Division;
c. Required surety bond per firearm pursuant to Sec. 887 of the Revised Administrative
Code;
d. Sworn Statement of the manager or operator of the agency that its security personnel
shall be required by the management to undertake the following in case of impending or
actual strike:
1. To report to the Chief, Philippine National Police or to the nearest police agency such
impending strike;
2. To exercise necessary diligence in the collection and safekeeping of firearms of the
agency to include firearm safely vaults provided thereof to prevent the use of the firearm
thereon in the furtherance of the strike;
3. To insure that all firearms and ammunition in the possession of all striking security
personnel of the agency are immediately collected and secured in the safety vaults under
control of the agency; and
4. To assume responsibility in the proper handling of firearms in order to prevent misuse
of same or that no non-members shall be allowed to hold said firearms issued or licensed
in favor of the agency.

RULE VIII
UNIFORM, EQUIPMENT AND PARAPHERNALIA

PART 1

Uniform And Paraphernalia

SECTION 1. Uniform (male). The uniform of private security guard/either from the
private security agency/company security force/ government security unit shall consist of
headgear, service shirt, service trousers service belt and footwear as herein prescribed.
The uniform shall be made of fast navy blue thick fabric for the trouser for daily security
officers wear and for service shirts of field or perimeter guards while a choice of light
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

blue and/or white service shirts for internal guards for a private security agency; light
gray for company security force and white for government security unit.

a. Headgear
Pershing cap - Fast navy blue cap with gold strap, black visor, and octagonal
nylon net top and prescribed SAGSD metal cap device. It shall be the headgear
for daily wear by security guards. It may be used by the security guard for
ceremonial purposes with the black strap. (See illustration, Fig.1).

b. Service Bush jacket


Service jacket shall be worn only by the Directorial and Staff Officers of agency,
color of trousers and shirt shall conform with the color prescribed in Section 1 in
the above rule.

(1) Private Security Agency. - Trousers and shirt short sleeves with shoulder
straps, two each breast and front pockets with cover flaps and fixed cloth belt
fastened by brass metal buckle. (See illustration, Fig. 2).

(2) Company Security Force. - It shall be sewn in the same manner as in Para. b,
Section 1, this rule.

(3) Government Security Unit. - It shall be sewn in the same manner as


prescribed in para. b (1) section 1 of this rule.

c. Service Shirt for Security Officer

(1) Service uniform. –

(a) Private Security Guard - Fast navy blue, short sleeves, shoulder straps, two breast
pockets with cover flaps and navy blue front buttons, tucked in (Fig. 3)
(b) Company Security Force. - It shall be sewn in the same manner as prescribed for
private security agency except that the color is light gray and the fabric for shirt.
(c) Government Security Unit. - It shall be sewn in the same manner as prescribed for
private security agency except that the color is white and the shirt shall be fabric “white”.
(2) Field Uniform. - (Optional for cold weather areas only);

(a) Private Security Agency. - Fast navy blue, long sleeves with buttoned cuffs,
shoulder straps, two breast pockets with cover flaps, navy blue front buttons and
shirt-jacket style with overlap waist strap. Detachable hoods shall be adopted for
cold weather area use.
(b) Company Security Force. - It shall be sewn in the same manner as
prescribed for private security agency except that the color is light gray and the
fabric materials for the shirt.
(c) Government Security Unit. - It shall be sewn in the same manner as
prescribed for private security agency except that the color is white and the
shirting materials shall be fabric. (Note: A single strand yellow lanyard may be
used to secure sidearm to the shoulder).

(3) Gala Uniform. - It shall be worn for ceremonial purposes only and at the expense of
the establishment conducting the ceremonies.

(a) Pershing cap. - This shall be same specifications and distinctions as provided
for under Sec. 1a of this Rule.
(b) Blouse. - The material shall be of fabric with colors as prescribed for
private/company/government security officers. It shall be tailored as an open coat,
long sleeves with a center flap at the back of the unsewed part of which shall be
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

the same level with the waistline. It shall have shoulder straps as the service Bush
Jacket; Security guard officers shall wear shoulder boards with the authorized
rank design.
(c) Buttons. - There shall be four (4) big brass buttons to close dress and four (4)
small buttons for the pockets. The buttons shall be plain brass.
(d) Shirt. - The shirt shall be white long sleeves.
(e) Necktie. - It shall conform to the color of the blouse five (5) centimeters wide.
(f) Trousers. - It shall be of the same design, style and materials as the service
trousers.

(4) Service Trouser. - Fast Navy blue color, straight cut, slanted pockets and two back
pockets without over flaps.

(5) Service Belt. – Of leather material which shall be used as pistol belt measuring four
and a half (4-1/2 centimeters in with.

(6) Footwear. –

(a) Service shoes. - Black leather shoes with rubber heels and soles, plain top
low-cut and black shoelace to be worn with plain black socks. (Fig 6).
(b) Rubber rain boots. - Optional as the nature of the post requires.
(Fig.7)

SECTION 2. Uniform (Female). - The uniform of the lady security guard shall be made
of a thick fabric. It shall consist of a modified overseas cap two (2) ply similar to the 23
women police service, service skirts (palda) and blouse, service belt and black leather
shoes as herein described and/or illustrated.

A. Headgear. - Fast navy blue (2 ply) cap without piping but with regulation cap device.

a. Service shirt –

(1) Private Security Agency. - Fast navy blue, light blue or white, thick fabric, short
sleeves, shoulder straps, two breast pockets with cover flaps and navy blue front buttons,
tucked in.
(2) Company Security Force. - It shall be sewn in the same manner as prescribed for
private security agency except that the shirting materials shall be fabric “Light Gray” in
color.
(3) Government Security Unit. - It shall be sewn in the same manner as the
private/company agency except that the shirting materials shall be white fabric.
b. Service trousers. - Fast navy blue thick fabric trousers, straight cut with
slanted side pocket and two back pockets without cover flaps. It may be worn
during night duty/inclement weather.
c. Service skirt. - (Optional) Navy blue A-line skirt with two front slide pockets.
It may be worn when posted indoors.
d. Service belt. - Of leather material which shall be used as pistol belt measuring
four and one half (4-1/2 centimeters in width)
e. Footwear. -
(1) Service shoes - Plain black shoes, low-cut rubber soles and heel (maximum of five
cms.) and black shoes laces.
(2) Rubber rain boots black - Optional as the nature of post so requires.

SECTION 3. Ornaments and patches. -

a. National badge. - as approved by C, PNP


REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

b. Cap device. - The brass cap device as approved by the Chief of Philippine National
Police shall be attached on the Pershing cap of officers
c. Regulation Buckle - as approved by C, PNP without agency name
d. Collar device -
e. Name cloth - shall consist of embroidered navy blue black-lettered surname and
initials of first and middle names on yellow background with blue borderline, his names
on yellow background with blue borderline, his name shall be preceded by the word:
Security Guard” or “SG”. The letter shall be one and one half (1-1/2) centimeters in
height and the name cloth shall be sewn on the right top pocket.
f. Agency/unit name cloth. - A similarly embroidered agency/unit cloth shall be sewn on
the top of the left breast pocket, navy blue block-lettered on yellow background.

g. Equipment and paraphernalia. –

(1) Security Director/Inspector


(a) Leather pistol belt with regulation buckle; and
(b) Holster, black leather.

(2) Security Guard (male or female):


(a) Black leather belt for pistol and nightstick with regulation buckle;
(b) Holster, black leather for pistol, night stick and handheld radio;
(c) Nightstick (Baton) with horizontal handle.
(d) Whistle with lanyard;
(e) Pocket notebook with writing pen.

SECTION 4. Design and Use of White Uniform. – A special set of security personnel
uniform shall be prescribed for security personnel posted at hotels, resorts, cultural and
entertainment areas and other sites noted as tourist-heavy areas. A special set of security
personnel uniform shall be prescribed for security personnel posted at department stores
noted as tourist-heavy areas, banks and other foreign clientele.

a. Uniform (male)- The special set of uniform for security agencies officer/guard and
lady guard shall consist of pershing cap, ball cap, service bush, jacket, service shirt,
service trousers, service belt, necktie, lanyard and footwear.
(1) Pershing cap – same as defined in Section 1 a (2), Rule VI. It shall be fast
navy blue with gold strap, black visor, octagonal nylon net top and prescribed
metal cap device. It shall be worn by security agency officers and guards while
wearing a complete special type of uniform.

(2) Service Bush Jacket - It shall be white ramie polyester fabric and shall be
sewn short sleeves with shoulder straps, two each breast and front pockets with
cover flaps and fixed cloth belt fastened with metal buckle. It shall be worn by
security agency officer while on duty at indoor places with complete prescribed
paraphernalia and agency/client patches.

(3) Service Shirt - It shall be white cotton/cotton polyester fabric and shall be
sewn short sleeves as the case maybe, shoulder straps, two breast pockets with
cover flaps and white front buttons. It shall be worn by security guards while on
duty as designated indoor places with complete prescribed paraphernalia and
agency/client patches. Tuck-in.

(4) Service Trousers - Fast navy blue color, straight cut, slanted pockets and two
back pockets with cover flaps. It shall be worn by security agency officer and
security guards.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

(5) Service Belt - It shall be black in color, leather, to be used as pistol belt
measuring four and one-half centimeters in width. It shall be worn by both
security officers and security guards while in complete special type of uniform.

(6) Necktie - Plain fast navy blue and five centimeters wide. It shall be worn by
security guards while in complete special type of uniform.

(7) Lanyard - Navy blue in color, same style as used by AFP or PNP Personnel. It
shall be worn by security agency officers and security guards while in complete
special type of uniform.

(8) Footwear - Black leather shoes with rubber heels and soles, plain top low-cut
and black shoelace to be worn with plain black socks.

(9) Ball cap - It shall be fast navy blue round nylon net top with visor and
prescribed embroidered cloth cap device. It shall be optional in lieu of the
perishing cap.

b. Uniform (Female) - The uniform for a lady security guard shall consist of an oversea
cap two (2) ply service bush jacket, service belt, lanyard and black leather shoes.

(1) Bush cap - Fast navy blue (2 ply) without piping but with regulation cap
device.

(2) Service Bush Jacket - It shall be white in color and shall be sewn in same
style as that of security agency officer. It shall be worn by security lady officer
with complete prescribed paraphernalia, name cloths and agency/ client patches.

(3) Service Shirt - White ramie polyester fabric and shall be sewn short sleeves or
long sleeves as the case maybe, shoulder straps, two breast pockets with cover
flaps and navy blue front buttons. It shall be worn by private security lady guard
with complete prescribed paraphernalia, name cloth agency/client patches, service
belt, lanyard. Tuck in. This type of uniform shall be worn only at indoor places.

(4) Service Belt

(5) Lanyard

(6) Service Skirt - A line skirt with two front slide pockets,. It shall be worn when
posted indoors

(7) Footwear - Plain black leather shoes, low-cut rubber sole and heel (maximum
of five cm) and black shoelaces.

c. Paraphernalia - As prescribed under Sec.3 Rule VI, IRR, RA 5487, as amended. (See
illustrations in Fig.13, 14,15,16,17).

PART 2
BASIC EQUIPMENT

SECTION 8. Basic Equipment.

a. The following shall comprise of the Basic Equipment of a security guard which shall
be made mandatory and ready for his/her use while performing post, conduction, armored
service duties and the like:
1. Prescribed Basic Uniform
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

2. Nightstick/baton
3. Whistle
4. Timepiece (synchronized)
5. Writing pen
6. Notebook and duty checklist (electronic or not)
7. Flashlight
8. First Aid Kit
9. Service Firearms (as required)

b. The security agency shall have the responsibility of ensuring the availability and
issuance of the basic equipment to its posted guards.

c. Security Guards shall be responsible for inspecting operability of basic equipment


issued to him, and be responsible for keeping himself acquainted with the proper use of
these.

SECTION 9. Other Equipment.

a. Apart from the mandatory basic equipment, other equipment may be issued to the
security guard as determined necessary following client contract requirement, provided
that the security guard shall have acquired the prior training/knowledge on the proper use
of the same but not limited to the following:
1. Handcuffs
2. Metal detectors
3. Communications Radio
4. Stun devices
5. Armor vests
6. canine (k-9) units

b. Electronic and/or communication devices requiring registration under the jurisdiction


of other government agencies shall be complied with prior to issuance for use of the
security guard.

c. Live units such as canine (dogs), shall require prior training confirmation and
registration with the PNP before utilization by any security agency purposely to ensure
truthful deployment versus client requirement or purpose of operation

RULE IX
RANKS, POSITIONS, STAFFING PATTERN AND JOB DESCRIPTION

SECTION 1. Ranks and Position - The security agency operator/owner must observe
the required major ranks and positions in the organization of the agency.

a. Security Management Staff


1. Security Director (SD) – Agency Manager/Chief Security Officer.
2. Security Executive Director (SED) – Assistant Agency Manager
/Assistant Chief Security Officer;
3. Security Staff Director (SSD) – Staff Director for Operation and Staff
Director for Administration.
4. Security Staff Director for Training – Staff in-Charge for Training

b. Line Leadership Staff


1. Security Supervisor 3 – Detachment Commanders
2. Security Supervisor 2 – Chief Inspector
3. Security Supervisor 1 – Inspector
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

c. Security Guard
1. Security Guard 1 – Watchman/guard
2. Security Guard 2 – Shift in-charge
3. Security Guard 3 – Post in-charge

d. Security Consultant – (optional)

SECTION 2. Staffing Pattern. – Security agency owner/manager shall follow the


required staffing pattern as follows:

a. The agency manager is automatically the Security Director who shall be


responsible for the entire operation and administration/management of the
security agency. He shall be the authorized signatory to all Duty Detail Orders,
and all other documents and communications pertinent to the operation and
management of a security agency. He may delegate certain functions to a
subordinate, provided the subordinate is qualified to discharge the given function
in accordance with law.

b. The Security Agency shall appoint a staff officer as Security Training Officer,
who shall be responsible for the training of the Agency’s security personnel in
accordance with the requirements of RA 5487 and the IRR. The Training Officer
shall be licensed as a Security Officer and likewise accredited as such by the
Training and Education Branch, SAGSD.

c. The Staff Director for Operation is the staff assistant of the security manager
for the efficient operation of the agency. This position includes the responsibility
to canvass clientele and the implementation of contract and agreement. He is also
responsible for the conduct of investigation and the conduct of training.
d. The Staff Director for Administration is the staff assistant of the agency
manager for the effective and efficient administration and management of the
agency. He is responsible for the professionalization of the personal,
procurement/recruitment, confirming of awards, mobility and issuance of FA’s.

e. The Detachment Commander is the field or area commander of the agency. The
Detachment shall consist of several posts.

f. The Chief Inspector shall be responsible for inspecting the entire area covered
by the detachment.

g. Security Inspector is responsible for the area assigned by the Chief Inspector of
the Detachment Commander.

h. Post-in-Charge is responsible for the entire detailed security office within a


certain establishment.

i. Shift in-Charge is responsible for the security officers who are scheduled in a
certain shift for a particular period.

j. Security Guard is the one actually posted as watchman and or guard.

SECTION 3. License Requirement. No person shall be designated nor be allowed to fill-


up the positions enumerated and described in the preceding sections unless he is licensed
security personnel as follows:
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

a. must at least be a licensed Private Security Officer to occupy Security


Management Staff position as Security Director, Security Executive Director, or
Security Staff Director;

b. must at least be a licensed Private Security Training Officer to occupy Security


Management Staff position as Security Staff Director for Training; and

c. must at least be a licensed Private Security Guard with Supervisory Training to


occupy any positions in the Line Leadership Staff.

RULE XI
PRIVATE SECURITY TRAINING

PART 1

General Provisions

SECTION 1. Policy. The following provisions encompass all persons, natural or


juridical, who conduct and/or provide private security training and/or training services.

SECTION 2. Private Security Training. It shall refer to training and academic programs
and courses duly approved or prescribed by the Philippine National Police and adopted
by the Technical Education and Skills Development Authority. It includes the
prelicensing requirements of individual security guards and other security personnel
approved by RA 5487, the periodic and non-periodic in-service skill refreshers for such
security personnel, and other specialized, individual or group, private security personnel
skills development.

SECTION 3. Private Security Training Services. These shall refer to the conduct of
Private Security Training, provision of the physical facilities and installation necessary in
the conduct thereof, and the provision of the appropriate management, administrative,
and instructor/training staffs therefore, the actual performance and/or exercise of which
requires the appropriate permit and/or authority as herein provided.

SECTION 4. Private Security Training Institutions. These shall refer to all persons,
natural and/or juridical, who/that provide and/or conduct private security training, and/or
services.

SECTION 5. Categories of Private Security Training. The following are the general
categories of Private Security Training:

a. Pre-Licensing Training Programs. As a matter of licensing prerequisite, Pre-


Licensing Training Programs include all training and/or academic programs and
courses whose objective is to indoctrinate the individual with the basic skills and
educational backgrounds necessary in the effective exercise and performance of
his/her elected/ would-be security/detective profession. It includes but is not
limited to the Basic Security Guard Course, the Security Officers Training
Course, Private Security Agency Operators Training/Seminar, Private Security
Training Trainors’ Course.

b. Refresher Training Programs. This shall refer to periodic and non-periodic


training programs and courses designed with the objective of reinvigorating
and/or developing basic skills and knowledge gained previously or gained while
in the exercise of his/her profession as a matter of experience, to enhance current
in-service and future individual and/or collective exercise of profession. This
includes mandated periodic inservice training to be initiated by employer-security
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

agencies which is further a prerequisite for the renewal of individual professional


security licenses. It includes but is not limited to the periodic Re- Training
Course, Basic Security Supervisory Course, and Security Supervisor
Development Course.

c. Specialized Training Programs. This shall refer to training program and


courses other than those described in the preceding categories designed at
developing previously-gained skills and knowledge, designed at augmenting or
expanding current skills and knowledge, and/or designed at developing current
skills and knowledge to suit identified future applications. It includes but is not
limited to such courses as the Intelligence/Investigator Training Course, Basic
Crises Management Course, Personal/VIP Security Training Course, Armoured
Car Crew Training Course, Bomb Disposal Training Course, Bank Security
Training Course, and Basic Aviation Security Specialist Course.

SECTION 6. Categories of Private Security Training Institutions.

a) Private Security Training Systems. Government or duly registered private training


establishments, associations, firms, partnerships, corporations and the like, which provide
the physical facilities and installations, and the appropriate management, administrative,
and instruction/training staff necessary and for the purpose of conducting Private Security
Training:

1) Private Security Training Centers – Private Security Training Systems


whose primary purpose is to provide private security training and training
services, may be qualified to offer and conduct Private Security Training
Programs in all categories provided that, it has secured Regular Accreditation
from the SAGSD upon compliance and conformity with the latter’s application
and approval requirements, and prior TESDA registration/accreditation.

2) Other Juridical Entities - Private Security Training Systems whose primary


purpose is not to provide private security training and training services, may be
qualified, on interim basis, to offer and conduct Private Security Training for a
specific course/class and duration under Refresher and Specialized programs only,
provided that, it has secured prior Interim Accreditation from the SAGSD upon
compliance and conformity the latter’s application and approval requirements.
Such Interim Accreditation is also issued to those with Regular Accreditation but
which cannot comply with the renewal requirements.

3) Watchman/Security and/or Detective Agencies defined under RA 5487 as


amended, which shall not be required prior accreditation to operate, by virtue of
their License to Operate as Private Security Agency, Company Security Force or
Government Security Force, may be authorized to conduct only in-house refresher
or specialized training for its own security personnel, upon compliance and
conformity with application and approval requirements of SAGSD.
4) Police Offices/Units assigned/designated to conduct Private Security
Training, which shall not be required TESDA registration but shall require prior
official authority of SAGSD, may conduct training in all categories but subject to
requirements of Rule XI of these rules and regulations or as may be prescribed by
SAGSD.

5) Police Supervisory Office (presently the SAGSD) as having the primary


responsibility of the conduct, supervision, and control of all private security
training and training services.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

b) Training Instructor. Any person who renders personal and/or professional trainor,
instructor, and/or teacher services relative to private security training by virtue of his
profession, expertise, knowledge, and/or experience in a particular field of knowledge.
Training Instructor includes but is not limited to currently or retired licensed or
accredited private security training instructors, professional educators, and/or
field/practicing experts.

SECTION 8. Organization for Private Security Training. The following are the
minimum staff/personnel requirements for the conduct of a particular Private Security
Training Program or Course conducted by Regular and Interim Accredited Training
Centers:

Administration Staff:
a. Center or School Superintendent/Director/Administrator.
b. Course/Training Director.

Training Staff:
a. Training Officer, Regular/Special Accreditation
b. Training Instructors, Regular/Special Accreditation
c. Guest Instructors. Persons other than accredited private security training
instructors, who render personal or professional instructor, trainor, or teacher
services in a particular field of knowledge, subject, or training in a private
security training program/course as a resource because of his profession,
expertise, education, and/or experience.

PART 2
Conduct of Private Security Training

SECTION 10. Preparations before the Conduct of Training

a. A request for Letter Authority to Conduct Training shall be submitted to Chief,


SAGSD with the following attachments:

1. A photocopy of TESDA Recognition Certificate


2. Appointment of accredited Training Director
3. Photocopies of SAGSD accreditation of the teaching staff
4. Training Schedule
5. SSS Employment History Certificate of trainees/participants
6. Clearances (NP, Drug Test, PNP DI, Court & NBI)
7. Subsequently on the second request for LA, the SBR (Training Fee) of the previously
conducted course/class shall be attached.

b. All Region based applicants requests shall be endorsed by respective PNP Police
Regional Office.

SECTION 11. Conduct of Training

a. The School Director/Guest shall formally open each class.


b. One (1) day after its opening, a report containing the following data (name of student,
age, sex, height, status educational attainment, agency, address and remarks) shall be
submitted to Chief, SAGSD
c. Participants shall be graded thru written, oral and practical examinations.
d. Participants who accumulate absences exceeding twenty (20%) percent of the total
number of training shall be dropped.
e. School/Center policies shall be enforced at all times.
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

f. The School, Center or, PSA shall also ensure the maintenance of orderliness,
presentability, discipline and security of its training facilities and all persons therein.
g. A General Knowledge Examination (GKE) shall be administered by SAGSD (Private
Security Training Management Branch) one (1) day before the closing of each class
provided a photocopy of the proof of payment (SBR) for the ongoing class is submitted.
h. Any student who fails the GKE may be given three (3) chances to retake, after which if
he fails, he shall repeat the course.

SECTION 12. General Knowledge Examination

a. A General Knowledge Examination (GKE) shall be administered by the PNP and shall
be given each graduate after completion of each training course as a matter of evaluating
the graduate’s assimilation of the course in relation to his qualification for license to
exercise private security profession. The GKE shall also be used among others, to
evaluate the quality of training of or transmission of the course by the accredited training
systems.
b. For region-based Training Centers/Schools, FESAGS, ROPD will administer the GKE
and submit. After GKE Result to SAGSD five (5) days after the closing of each class for
reference and disposition.

SECTION 13. After Training


a. Each course must be formally closed by the Training Director or by an invited Guest.
b. A Closing report in a prescribed format, shall be submitted five (5) days after
graduation of each class to Chief, SAGSD.
c. Upon completion of the course, the School shall furnish all students the following
documents:
1. Declaration of Graduates
2. Order of Merit
3. Certificate of Completion (Diploma)
4. GKE Certificate
5. Opening Report/Closing Report (indicating therein name of student, age,
height, weight, status, sex, educational attainment, grade and remarks)
6. School Accreditation Number
7. Name of School, telephone number/address
8. Course title, Class Number, Letter Authority Number and Control Number and
Inclusive dates of training.

SECTION 14. Processing of Students. Accredited Training Schools, Centers or PSAs


shall have the responsibility of and be accountable for the initial processing for the
qualification and fitness of all applicants/registrants for enrollment to the corresponding
class/course being applied for with their respective schools, centers or PSAs.

SECTION 15. Duration of Courses. Duration of courses shall conform with the
corresponding Program of Instructions (POI) for each type of course/training/seminar,
prescribed by the PNP and adopted by the TESDA.

SECTION 16. Basic Guarding Subjects. The following shall at least be the basic
knowledge and/or subject requirements on guarding or providing security that private
security personnel trainees should be imparted with:

a. Principles, definitions, aspects and risks of guarding and security


b. General Orders and Functions of a Guard
c. Patrolling, observation and description, recording and reporting, investigation
d. Visitor, material and vehicle movement/access control/denial
e. Inspection and key control procedures
f. Public relations, regulation/law enforcement and arrests
REVIEW NOTES ON LAW ENFORCEMENT ADMINISTRATION
SJIT CRIMINOLOGY CL-MABIKAS 2014

g. Communications and other equipment


h. Reaction to emergencies (bomb threat, disaster, fire, injury or sickness etc)

You might also like