While schools are thriving to meet the educational needs of the pupils and of the community as a whole, they themselves, as open systems, are open to every kind of security threads coming from inside and outside of the school environment. Due to the social, economic, and cultural conditions of our time, various individual or group threats may be consciously or unconsciously exerted on schools. Schools may also be exposed to pandemic diseases, fires, and many natural disasters such as earthquakes, floods, landslides, and so on. And the school management, together with the school community, has to be prepared for all of these kinds of threads, and have to develop strategies to deal adequately deal with them.
School & College Security Solutions
A safe and healthy school environment is seen critical to education. However, various studies in recent years have shown that the schools are not so safe for the students and for the school personnel any more due to some problems threatening school security. Montee (2008), receiving attention to the responsibility of schools for providing a safe environment so that students and teachers maximize the education experience, states that schools are faced with numerous issues involving school safety. From preparing for natural disasters to preventing school violence and protecting students from illnesses, school administrators are seen responsible for ensuring that students are safe at schools. Related to assurance of security at schools lots of researchers emphasize the uniqueness of each school in dealing with the security problems. Each school has its own characteristics and security problems and specific handling strategies.
Creating school wide prevention and intervention strategies
- School policies and legal issues supporting safe schools
- Fostering school, family and community involvement
Creating cultures and climates of safety is seen essential for preventing violence in schools. Major components of creating a culture of safety are states as following (Fein, et al. May 2002):
- Assess the school’s emotional climate
- Emphasize the importance of listening the persons
- Take a strong, but caring stance against the code of silence
- Work actively to change the perception that talking to an adult about a student contemplating violence is considered “snitching.”
- Find ways to stop bullying.
- Empower students by involving them in planning, creating, and sustaining a school culture of safety and respect.
- Ensure that every student feels that he or she has a trusting relationship with at least one adult at school.
- Create mechanisms for developing and sustaining safe school climates.
- Be aware of physical environments and their effects on creating comfort zones.
- Emphasize an integrated systems model (pp. 69-70).
Scope of Work
THREATS AND SECURITY MEASURES Once the risk level and impact to the construction site is assessed, mitigation measures can be devised. The next sections detail various threats and mitigation measures highlighted in the following topics
- Security related threats to construction sites
- Main steps to develop a site security plan
- Practical suggestions for addressing the overall security risks
- Various site mitigation methods for typical threat or loss source types
- Cyber security considerations for the construction site
- Emerging technologies and security requirements
MAIN STEPS TO DEVELOP A SITE SECURITY PLAN
- Carry out the security assessment of the school and consider the utilization of a third party security company if the expertise is not available “in house”.
- Based on assessment, set the requirements for site security.
- Design the security system with consideration given to the inclusion of the following components, as warranted by the conditions:
Identify the locations where risks are concentrated and determine the camera types and quantity required.
Alarms and provide verbal warning to intruders
Motion actuated lighting (white and infrared light)
–– Physical barriers
Delay the intruder’s site access using multiple fences and making the access indirect for places of intruder interest.
–– Response Mechanisms
Devise an effective means to deter, delay and deal with the risks as soon as detected / identified / realized, such as, sirens, alarms, high beam lights, physical security on site to address as per local laws. If the residual risks are still too high, hire guards to carry out security duties.
- Periodic review of the security plan as the site changes (necessary to identify gaps in the security plan).
- Consider independent or third party security audits, especially for sensitive facilities.
PRACTICAL SUGGESTIONS FOR ADDRESSING OVERALL SECURITY RISKS
- Before the project commences create a site specific security plan based on the assessment of the security risks. Record and document this plan and have a written security policy.
- Liaise with local law enforcement agencies to assess the risks as envisaged by local municipal administration. If available, obtain advice from your own company’s experts.
- Assign supervisory security responsibilities within the site/project management team, and encourage security awareness among all workers. Contact the local police and fire departments before starting a project to establish coordinated efforts. Establish contact with management of neighbouring properties, and encourage them to report suspicious activities.
- Maintain a Security Risk register and periodically review the security plan and update registers as needed.
- Secure the site perimeter with appropriate fencing (as per risk assessment) as a first line of defense. Maintain a clear zone adjacent to fencing wherever practicable. Note that this clear zone may also benefit as a fire break.
- Illuminate the job site perimeter fence, high value storage areas, building entrances and the site offices to effectively deter trespass, theft and vandalism.
- Identify key assets and property onsite and then produce an inventory to track them regularly. Consider for high value items possible use of asset tagging and tracking systems.
- If appropriate, consider offsite storage and transit locations for mitigation against theft and vandalism.
- Where practical, secure all available high value materials and secure / immobilize vehicles and equipment. Consider installing hidden ignition disable switches to prevent theft.
- Control site access by establishing the minimum practical number of access points and monitor those entry points.
- Restrict site entry only to authorized personnel
- Provide guards at all entry points (personnel and vehicles)
- Consider limiting onsite vehicle access. Provide parking areas off site for employees and visitors.
- Ask employees and subcontractors to take personal responsibility for a secure site and engage them to immediately report any incidents of theft or vandalism.
- If appropriate, use a licensed and bonded security guard service to patrol the site both during and outside of working hours. It is suggested that guard rounds are digitally recorded to ensure they are actually being performed. Provide guards with an effective means of communication with local law enforcement agencies and project management 24 / 7.
- Periodically review the security plan with special attention to boundary changes and high risk areas as the project progress. Be aware of how changes to the project scope affect security.
- Consider installing a video monitoring system with advanced video analytics capability designed to detect and alert in the event of intrusion, vandalism, theft, fire and even water leak detection.
- Consider layered security to mitigate any gaps in the security system. Review the above steps vigorously before and during extended suspension or slowdown of work due to holidays, weekends or planned and non-planned events (i.e. accidents investigations or natural catastrophe events, etc.)
WHAT WE OFFER
VARIOUS SITE MITIGATION METHODS FOR TYPICAL THREAT OR LOSS SOURCE TYPES
|Site Risks||Risk Mitigation|
|Theft||Perimeter fencing suitable to project security risk
Suitable anti-climb barrier walls or fencing, barbed wire fence, electrified, armed guards, etc. Check local laws for
|Illumination of fenced boundary|
|CCTV / Night vision cameras|
|· Intruder detection system – Infrared motion detection and local alarm/ remote alarm
· Security guards / patrolling / guard posts / security control / guard dogs (if applicable) / access control system
· Warning signs installed – indicating that CCTV and guards used
· Vehicle movement radar / global positioning system (GPS) vehicle tracking
· Worker tag in and out gates / biometric / face recognition – if allowed by local laws
· Programmed drones for site monitoring at random intervals – particularly useful for large areas – such as pipeline / road / railway infrastructure projects
· Worker screening / background check as allowed by local laws
· Locking and securing of all portable and particularly small size high value items
· Labor / workforce tracker & monitoring
· Time lapse photography (also useful for progress monitoring)
· Programmed computerized cameras to video record certain areas at the time of movement or incident only.
· Equipment tagging – appropriate for specific item and resources
|· Adequate clearance maintained near site perimeter fence/boundary
· Entrance barriers and gates, including, where appropriate, high strength bollards to prevent unauthorized vehicle site entry
· Prohibition of storage of flammable & combustible materials near the project perimeter/boundary walls or fences
· Warning signs to discourage vandalism and arson (such as, No Trespassing – violators will be prosecuted to the full extent of the law.)
· Wireless fire detection systems
· IR and other types of motion sensors with remote CCTV monitoring & warning
· Security by design
· For example, avoid windows with ordinary glass panes. Consider using noncombustible, unbreakable / tougher
material for cladding, such as poly-carbonate sheets or wired glass as an alternative to plain glass.
· Disable / Lock Mobile Construction Equipment
· Ensure equipment is not easily started and operated by unauthorized personnel or trespassers.
|· Maintain a visitor register and ensure the safe departure of visitors
· Issue temporary passes to document and track the entry of temporary workers and visitors
· Provide appropriate briefing for visitors as per site security procedures and requirements
· Escort and track visitors (provide tracker devices to them if they are unescorted)
· Deploy informative signage for the correct guidance of unescorted visitors
· Provide physical means for exclusion of visitors from active work areas.
|Guard duties should include visual monitoring for a water release.
An emergency after hours call list should be provided to on-site security personnel indicating who to contact 24 / 7 in
the event of a water release. Security personal should be trained in water shutoff procedures in the event of a leak to
|Fire||Guard duties should include knowing how to respond in the event of a fire and who to contact (fire department,
project manager, etc.).
Guards should know the location of fire extinguishers and be trained how to respond in the event of an incipient
stage fire, including emergency notification of local authorities. Security personnel should be equipped with suitable
communication devices (radio, wireless telephone, etc.)
* Source : A ALLIANZ GLOBAL CORPORATE & SPECIALTY®