School Security Booklet

Size: px
Start display at page:

Download "School Security Booklet"

Transcription

1 Community Safety Bureau School Security Booklet Selecting the Measures

2 1 Introduction: The Local Education Authority and the Leicestershire Constabulary Community Safety Bureau are working together looking at security and personal safety in educational premises. As part of this partnership, security surveys have been undertaken in a large number of schools throughout Leicester, Leicestershire & Rutland. 1.2 This booklet has now been completed as a result of this work. Whilst it is acknowledged that no two schools are identical and that the design of the buildings and the lay out of the site will differ from school to school, many of the issues revolving around security are generic. 1.3 Criminals have nearly always seen schools as a soft target. Most schools were built many years ago at a time when security would not have been seen as a briefing issue. Indeed a number of schools were originally built in the thirties and fifties as temporary schools with a ten-year life span. Some are still in use today, but because of the design and the materials used in their construction, they incorporate additional areas of vulnerability. All these features coupled with frequent and long holidays add to the vulnerability of schools to criminal attack. 1.4 Good security management is about being proactive rather than reactive and prevention rather than detection. This must be borne in mind when planning your school's security. Crime against schools falls mainly into the following categories : Theft by insiders (pupils, staff); Vandalism by insiders (mainly pupils); Theft & vandalism by outsiders connected to the school (pupils relatives, old pupils); Theft & vandalism by other outsiders (local gangs); Arson;

3 2 Contents; 1. Introduction Outline 3 3. School Security Risk Assessment The Approach Health & Safety Risk Management Policy 4 5. Perimeter fencing considerations Car parking and cycle security 6 7. Landscaping / Defensible Planting Directional and Warning Signs 7 9. Security Lighting Closed Circuit Television Systems ( CCTV ) Protecting the school roof Windows and External Doors Intruder Alarm School Office / Reception Access Control Daytime security of vulnerable offices / rooms Secure Store / IT Suite Computer Security Computer Projectors Property Marking Good Neighbour Scheme Conclusion & Bibliography. 19 Appendix A = CCTV Good Practice Guidelines Appendix B = CCTV & Video Evidence. 23 Appendix C = Intruder Alarm Advice.. 28 Appendix D = Section 547 Education Act Appendix E = Occupiers Liability Act 1984 and Section 164 Highways Act Appendix F = Security / Assessment Questionnaire. 31

4 3 Outline: This booklet is intended only as a guide to school security and to compliment the documents issued by the Department for Education and Skills on School Security and the Management of School Premises. Further information can be found on the Internet at The recommendations are made in good faith. The suggestions contained in this booklet are proven deterrents. They do not in themselves form any part of a guarantee that you will not become the victim of crime in the future or that further offences will not take place, but they reduce the laws of probability by enhancing your security and thus also reducing the fear of crime. 2.2 School security is ever changing and needs to be kept under constant review, with vulnerable areas identified and remedial actions implemented to address them, Neglect is infectious. 2.3 One of the main objectives of this booklet is to bring the issue of security within the school environment to the forefront and offer you advice which is cost commensurate to the risks, realistically achievable and suitable for purpose having taking account of local conditions. A well-managed and maintained school will convey a sense of security.

5 4 School Security Risk Assessment The Approach; 3.1 In looking at the security of your school you should start at the perimeter (site boundary) and work your way in (internal security) recognising areas of concern and identifying potential measures which could be implemented to address these. This is known as the onion peeling approach. The layout of this booklet follows this line. 3.2 Good access control measures should be prioritised for daytime security of the school and the personal safety of all users. Such control displays that of a wellmanaged and maintained environment in which security is a significant consideration in the day to day running of the school. 3.3 Designing out Crime and other anti social behaviour from the school environment out of hours, will require a much more holistic approach, combining both physical and electronic measures with passive, natural or formal surveillance methods and other fundamental and intrinsic crime prevention techniques. 3.4 Please see Appendix A for a copy of a Security / Risk Assessment Questionnaire which you could fill out as a precursor to the drafting of a school security policy. Health & Safety Risk Management Policy: All schools should have appropriate security measures in place. Security is not just about choosing the right control measures, it is an attitude of mind. Security measures are tools and should be treated as such. To ensure the support of staff, it is helpful if they are involved in the planning of security measures. All school staff, teaching and non-teaching should be familiar with security procedures. 4.2 Security and personal safety should be dealt with from a Risk Management point of view, i.e. taking steps to reduce the likelihood of loss or damage to the school or injury to staff and pupils. It could be included within a combined Health and Safety plan/policy for the school and be an agenda item for School Governors and P.T.A. meetings, even if it is not intended to discuss specific security issues. 4.3 The risks to schools are dynamic and need to be kept under constant review. A Risk Management Team should meet, at least on a monthly basis to discuss issues of security and safety and take the necessary steps to implement remedial actions to address any concerns. Its membership should include representatives from all levels of the school, including teaching and non teaching plus the site supervisor. 4.4 This would provide for a balanced view from all those responsible for the secure well being of the school. Limited funding from within school budgets should be allocated, whilst at the same time members of the R.M.T. would be tasked with identifying and applying where appropriate for funding from outside agencies

6 i.e. sponsorship, extra money from government or local authority for school security. 5 A) External Environment recommendations Perimeter fencing considerations; 5.1 The main vehicular and pedestrian approaches should ideally be overlooked by the school office/reception. Separate secondary entrances around the perimeter for pedestrians are commonplace, but to increase security they should be opened only at peak arrival and departure times. Appropriately worded signs should be displayed indicating opening times and directing callers to the school office at all other times. It is important that the public knows the extent of the school grounds. The following is an extract from the 1996 DFEE publication "Improving Security in Schools." Security fencing:- The purpose of security fencing is to prevent intrusion. A 1.8-2m high fence usually deters the casual intruder and dog walkers. To deny access to determined intruders the fence must present a formidable obstacle, at least 2.5m high and be able to withstand a high level of physical attack. In very high-risk schools, 3-3.5m may be needed. Fencing of this type is typically palisade or weld-mesh and usually requires planning permission. To be effective it must be continuous and all gates must offer the same protection as the main fence line. The long perimeters of many schools make it a very expensive option. Fencing inner area:- A cheaper alternative is its use to enclose an inner perimeter, or to close off recesses, altogether with an increase in the security of the building envelope, whilst maintaining means of escape in the event of fire. This can be just as effective as completely encircling the school boundary. Fencing needs to be inspected to check for breaching, e.g. by digging underneath or other damage. Additional comments and recommendations: In addition to the above, it is recommended that you should consider the following points before commissioning the erection of any fencing Grey galvanised palisade fencing is not recommended as it exudes an oppressive atmosphere and is not in keeping with the ambience of a school. This type of fencing also has a number of inherent weaknesses and needs to be properly and professionally installed.

7 6 You will frequently find gaps at the bottom of gates large enough for a person to crawl under. Additionally unless the aperture allowing access to the locking bolt is properly protected this can act as a step enabling person to easily scale the gates. These are some of the issues that you need to consider There are many different styles of metal fencing available that are more sympathetic to a school environment whilst at the same time providing the requisite degree of security. Robust weld mesh or paladin panels, powder coated (coloured) palisade or a vertical bar style (i.e. Heracles) to an appropriate height commensurate with the risks, should be considered. Chain link is no more than a boundary marker and is unsuitable for security Fencing needs to be regularly inspected to check for breaching, e.g. by digging underneath or other damage. 5.2 Should you require further advice on the issue of fencing or details of at least three companies who would be able to complete such work, please do not hesitate to contact your Local Crime Reduction Officer. There is no financial implication in obtaining quotes from such companies. Car parking and cycle security: It is only recently that schools have been designed with realistic levels of car parking facilities. Most have had to adapt existing space. Everyone parking in the school grounds should clearly understand that they are responsible for the security of their vehicle and its contents. However, it is good practice to provide some vehicle security. This is better located away from play areas, but with good surveillance opportunities from the school office and/or occupied classrooms. Lighting for evening and winter use may be necessary. 6.2 Cycle Storage: A secure area with good surveillance opportunities should be provided for the storage of bicycles. Landscaping / Defensible Planting; 7.1 The prudent use of hostile/defensible shrubs, bushes or thorny hedgerows such as berberis, pyracantha or hawthorn can help prevent graffiti and loitering and can be used to reinforce perimeter fencing as appropriate. Landscaping should not impede the opportunity for natural surveillance and must avoid the creation of potential hiding places. It has a less forbidding appearance and can be very effective.

8 7.2 Attention should be given to the location of walls and hedges so that they do not obscure doors or windows, and the position of trees that may become climbing aids into property or obscure lights/cctv cameras. 7 Directional and Warning Signs: The effectiveness of your School Security Strategy can be enhanced with the prominent display of; A) Directional signs indicating the location of and the route visitors should follow to the school reception /office. B) Appropriately worded warning signs regarding the presence of an alarm system, monitored CCTV, trespassing and the fact that all property of value on the school premises is property marked The implementation of such measures will have a deterrent value far outweighing the expenditure involved. The best results can be achieved by first considering the size, layout, warning message, and colouring. 8.3 Section 547 Education Act 1996 (Appendix F ) Nuisance or Disturbance on school premises: - Any person who without lawful authority is present on school premises and who causes or permits nuisance or disturbance to the annoyance of persons who lawfully use those premises (whether or not such persons are present at the time) is guilty of an offence and liable on summary conviction to a fine not exceeding 500. Rider: - Dogs fouling the school grounds is a health hazard A person exercising the power confirmed by section 547 shall be a police constable or a person authorised by the local authority or, in the case of aided or special agreement schools, the school governors Optimum colouring for such signs would be red and white or similar contrasting colours Trespass signs are available from the LEA. Security Lighting: All lighting needs should be appraised having consideration not just for security but also for the Health and Safety of staff, pupils and other users of the school buildings throughout the year. 9.2 To be successful, security lighting must be reliable and provide adequate levels of illumination. In addition those areas lit, must be under regular

9 surveillance from one or more of the following, otherwise any benefits provided could be compromised. 8 Neighbouring property or passing traffic; CCTV, in which case infra red (black or non visible light) can be used; Random/regular Security patrols. 9.3 Lighting units are prone to vandalism and will need to be suitably protected. Experience has shown that illuminated areas that do not benefit from additional perimeter protection or surveillance can and do become informal, floodlit play areas. The DFEE Building Bulletin 78 gives more details on security lighting. Closed Circuit Television Systems ( CCTV ): In schools where a quality CCTV system has being installed, it has had a dramatic impact. This is not just restricted to out of hours security but also in dealing with daytime security and issues of personal safety of pupils, staff and users of the site. An effective CCTV system is a combination of people, procedures and equipment All such strategies should be compliant with The Data Protection Act Under this act the Data Protection Commissioner should be notified of all CCTV scheme covering areas to which the public have access, whether by payment or otherwise. System should be suitable for their stated purpose and operate to a code of practice In considering CCTV, it is first important to have an Operational Requirement and be able to specify exactly what it is you want the system to do. There are different types of CCTV systems on the market, colour or monochrome, incorporating digital or analogue recording facilities. Outlined below is a summary of available CCTV. This is by no way definitive as the array of equipment and its applications can at times even be confusing for those involved in the industry. Monitor only, with visual camera usage only i.e. no recording capacity. 24 hour recording facility. Fully monitored system with recording and response personnel i.e. security staff or police. Local monitoring in-house (with or with out PA facility). Central Monitoring in an in-house control room (with or without PA facility). Remote monitoring by a security company i.e. Service Provider (with or with out PA facility).

10 10.4 When looking at the cost implication and the feasibility, it will also be necessary to consider the quality of the surrounding lighting The evidential value of a system will depend to a large extent on the attributes of the equipment initially purchased, providing that it is managed and operated in a proper manner i.e. the lens, recording facility, monitoring, maintenance and operating practices. If used in the right place, in the right way, with the right equipment it can be very effective People will budget for the initial outlay and installation, often forgetting who is going to be responsible for the day-to-day management, maintenance and monitoring of the system. The annual maintenance and running costs involved in maintaining the integrity of the system and the value of recorded data for evidential purposes can soon exceed the initial outlay for the equipment In addition to fixed cameras covering identified vulnerable areas and approaches to the school, properly positioned and programmed, colour, pan, tilt and zoom dome style cameras, housed within vandal resistant casing should also be considered It is acknowledged that this type of equipment is very expensive and you would have to install your CCTV in stages, as funding became available over the coming years. One colour PTZ camera will give you more flexibility and better coverage than could be achieved using six fixed cameras. 9 Such cameras fit neatly into a school environment. They are discreet, unobtrusive and aesthetically pleasing, providing you with the requisite level of formal surveillance, security and safety without increasing the perception or fear of crime amongst visitors or users of the school premises Out of school hours this system could be linked to a remote monitoring station. The cameras whilst having a programmed patrol are also linked to external sensors. Once one of these sensors is triggered, the camera will pan around to that point and the activation alerts the monitoring station. The operator calls up your site and takes control of the relevant camera. They can then scan the area and interrogate the system, to see what caused the activation and if appropriate issue a verbal warning to those on site. A small number of schools already have such a system and are extremely pleased with the results An important deterrent feature of whichever system you adopt is its visibility. The prominent display of appropriately worded signs is strongly recommended. It is also a requirement under the Data Protection Act The optimum colouring for such signs would be red lettering on a white background or black lettering on an amber/yellow background. The Data Protection Act 1998 Summary of implications for CCTV;

11 10 The 1998 Data Protection Act became law on 1 st March The definition of data now covers CCTV pictures. There must be a legitimate basis for installing CCTV. Clear visible signs should be placed in the proximity of cameras so that the public are aware they are being monitored, and who is responsible for the monitoring scheme. The Data Protection Commissioner must be notified of a system and its purpose. All equipment must be fit for purpose. Information must be processed fairly and lawfully, documented, and retained no longer than necessary. Images may only be disclosed if compatible with the purpose of installing cameras e.g. to police for the prevention or detection of crime and the offender. Individuals who are the subject of stored data images must be allowed access to them, subject to certain restriction. Please see Appendix B for additional information on good practice for CCTV. Should you be considering CCTV and require further information, please contact your local Crime Reduction Officer on B). Building Shell - recommendations Protecting the school roof & the use of anti-scaling devices 11.1 Nearly all schools are vulnerable in some degree or other to youths climbing. Much damage is caused to the fabric of the roof by this unauthorised access. The damage frequently goes unnoticed until it rains and the roof starts to leak or other ancillary damage is caused to pipes or wiring A number of measures can be adopted by schools, reducing their vulnerability to this type of negative attention. Good perimeter fencing can assist with restricting access to the school site out of hours. For further information please see paragraphs Depending on the risk you may wish to consider suitable topping in areas of greatest vulnerability. Please see paragraphs 8. Suitable worded warning signs regarding trespass, the danger of climbing on roofs and the application of anti-climb paint in vulnerable areas.

12 11 CCTV as detailed in paragraph Defensible hostile planting at ground level. Please see paragraphs Designing out of climbing feature. Application of anti-climbing paint, or other anti-scaling device i.e. rotating vane or cacti spikes, crown of thorns or other suitably customised barrier restricting access Before implementation a risk assessment should be undertaken to ensure the health and safety of the pupils and other users of the school premises Please see Appendix E for additional information regarding the law in relation to the use of anti scaling devices. Windows and External Doors; 12.1 The main entrance door to the school should incorporate some degree of access control such as a remote electronic lock release device incorporating an intercom and visual verification if this entrance is not overlooked from the office / reception All windows and doors should be checked and assessed to ensure that the locking mechanism are in working order, providing you with the appropriate level of security commensurate to all prevailing risks i.e. they are suitable for purpose All doors should be of a sufficiently solid nature and adequately secured against potential break-in Remedial actions should be implemented to address any identified weaknesses All fire exits doors should be devoid of external door furniture All ground floor or other easily accessible windows above ground floor level should have suitable key operable locks fitted for additional security Have you considered security bars or grilles particularly for the most vulnerable windows? 12.8 Consideration should be given to permanently securing windows not required for ventilation or other health and safety reasons Windows that are frequently the target of malicious acts of vandalism can be a major drain upon building maintenance budgets. Options to reduce the incidence of broken windows include:

13 Keeping yards and grounds free from any material that could be used as ammunition. Reducing the amount of glazing. Sometimes windowpanes can be replaced by solid panels without noticeably reducing natural lighting levels. This will also result in significant energy savings; Use of laminated glass in vulnerable areas. Use of polycarbonate glazing if suitable, in vulnerable areas. Polycarbonate glazing is not suitable for use as safety glass. Use of adhesive security film. Use of shutters or grills to protect the glazing. 12 Intruder Alarm: It is accepted that at the time these systems were initially installed, they were suitable for their intended purpose. However due to numerous ongoing changes in policy, procedures and equipment over the years the majority of these systems no longer offer the essential high standard of security now demanded by schools The deterrent value of the intruder alarm is reduced due to the lacking of visible external intruder alarm boxes. These are generic issues common to most schools It is recommended that visible intruder alarm boxes with a company logo and an LED light are erected on all buildings front and rear. Reason: - Within the school environment a visible alarm system is preferred. The prominent display on external elevations of alarm boxes incorporating LED (Light Emitting Diodes) lights, with a visible company logo provides for a better degree of prevention The alarm system needs to be regularly maintained by a suitably qualified intruder alarm installer. It should have at least one service visit per year The system should cover all areas of the buildings If the alarm system were to be modernised or extended at anytime in the future, I would strongly recommend that it be connected to the police via a remote monitoring station as opposed to the council. This would give you a guaranteed police response to activation s subject to compliance with the Association of Chief Police Officers security Systems Policy Please see Appendix C for further advice and details of compliant intruder alarm companies. Please note that under normal circumstances these companies will carry out a survey and offer you a quote free of charge.

14 13 C). Internal Security School Office / Reception Access Control; 14.1 Good access control is the matrix to the security for any school during the school day. Procedures should be in place to ensure as far as is reasonably practicable, that no one is able to access the school buildings unacknowledged and that once in the building, systems are in place to protect or help pupils and staff, should support become necessary You should have one entrance to the school building via the office / reception, with clear directional signs indicating its location to visitors. In turn this door should incorporate suitable access control with a remote electronic lock release, intercom and visual verification (CCTV) It is recommended that all visitors including school governors etc. should initially report to the school office / reception, where the purpose of their visit can be established prior to them signing in and being issued with a visitor s badge, valid only on the day of issue In many secondary schools, pupils man a reception desk in the foyer as the first point of call for visitors. These pupils may be put at unnecessary additional risks, as they could potentially have to deal with a volatile parent or other member of the public. Schools should consider the health and safety implications and ensure that appropriate measures are implemented, taking all reasonable practicable steps to reduce identified areas of risk Visitors to the school should not be allowed to wonder about the school unaccompanied Identification provided by local authorities, utilities or other organisations should not be accepted as an alternative to the school s own system To further enhance the measure outlined above it is strongly recommended that all staff wear ID badges. This will increase the effectiveness of the visitors book and badge system and make it easier to challenge those not wearing the appropriate badge Persons not displaying the proper identification would be more obvious to all legitimate users of the school building and could be politely challenged and escorted back to reception to sign in and obtain a visitors badge. Daytime security of vulnerable offices / rooms: Offices, staff rooms, IT Suites and store rooms etc. within a school will require additional security measures to protect against the casual walk in thief whether the offender is a stranger to the school or otherwise.

15 15.2 Examples of vulnerable items would include Laptop computers, mobile phones, computer peripherals, software, CDs or DVDs, wallets, purses, bags, information and any other items that can be easily carried and concealed Doors to these rooms should be fitted with self-closure devices and suitable access control locks i.e. numeric keypads or electromagnetic locks with proximity or swipe card facility. These would enable a school to have greater control over who accesses a particular room or area. Use could be limited to authorised personnel only. 14 Secure Store / IT Suite: Intruders are unconcerned about damage and are willing to destroy several items of equipment to steal one. A secure store area should always be considered for the storage of those items most at risk i.e. computer projectors, laptops, digital cameras, musical instruments, money, etc Whilst it is accepted because of the very nature of materials used in and the construction of some schools there will be circumstances where schools may be unable to achieve the standards set out below. To compensate for this fact, all efforts must be made to identify the most secure area and incorporate security features suitable for purpose A secure store should resist attack by any means up to, but excluding power tools and flame cutters for at least fifteen minutes. A locked door or any locked metal lockers, desk drawers and filling cabinets contained within, does not make it a secure area. Locate centrally within the school and above ground floor where possible. Ensure the approach and the room itself is included in the coverage provided by the school intruder alarm system. Existing classrooms and storerooms will require considerable adaptation before they can meet the fifteen-minute rule. Decide on the necessary security hardware i.e. Roller shutters, grills/bars locks etc. Security of all access and egress doors designed to withstand attack. Windows suitably protected to fit in with the school environment, using roller shutters or collapsible grills. Ensure walls offer the same resistance as doors and windows e.g. attack with sledgehammers. Prevent access through ceiling voids or from roofs If required your local Police Crime Reduction Officer can offer further advice on identifying a suitable room within your school. Please ring to make an appointment.

16 15 Computer Security; 17.1 Information Technology plays an ever increasing role in the education of the young and the administration of schools. Computer projectors, laptops, flat screen monitors are target items for burglars and are, in everyday use in schools across the country. The security of these needs to appropriately considered Whilst all computers, including those used for administrative purposes require additional security features, to prevent their theft or someone from tampering with them, the equipment mentioned above also needs to be considered taking account of all risks. These items or parts of, such as memory chips, computer projector bulbs, keyboards, optical mice, printers or scanners etc. can be target items for both the professional and opportunist thief Having any computer stolen or damaged would have an impact for any school and not just with the money you spent buying it or the money to replace it. There's the inconvenience to the school and the disruption to the education of pupils with the loss of records and schoolwork and the possible negative impact such an incident would have on a schools good name I recommend that all rooms containing such equipment should be secured with a solid door incorporating a substantial locking device. Additionally these devices may also include a form of push button combination lock and self closer, which could be used during the day, so that persons authorised, would not be restricted from using these rooms or the equipment within. Out of hours these locks should not be used to protect these areas and the main locking devices would also have to be engaged To protect the computer hard drives you will require a total enclosure device. The retaining base plates of such units should be secured to a table or raw bolted to the floor. They are designed to frustrate dismantling and will combat theft and removal of components Cable-restraint products should be used for ancillary equipment such as keyboards and display screens, which require minor position changes during use Suitable anti-virus and firewall software should be installed to protect the systems from malicious attack from hackers etc Outlined below are some additional things you can do now to protect your computer equipment and your school. You can: Use cable restraints and anchoring devices to protect work stations. The linking of all units in an IT suite is recommended. Kensington chains or similar devices to protect laptop computers. Establish measures to control use and movement of equipment.

17 Mark your equipment - Brand the exterior shell of equipment and mark exterior and interior where safe and possible with postal codes. Keep an audit and record all details of equipment serial numbers/identification marks. Details need to be readily available in the event of theft. Anchor equipment to solid furniture, floors or nearby walls using appropriate means. IT suites and offices containing computers and peripherals should be protected by the intruder alarm system. Store computer equipment within secure rooms/cabinets when buildings or departments are unoccupied. Introduce appropriate access control as outlined previously (page 14 paragraph ). Ensure mobile and laptop computers are properly secured when used away from the school. Review existing security precautions, regularly. If you need more advice then contact your local Crime Reduction Officer who will be pleased to help. 16 Computer Projectors: 18.1 Currently, within the school environment the theft of Data Projectors is causing great concern. The security of these needs to be appropriately assessed. It should also be noted that sometimes these projectors are stolen for parts. Bulbs are very expensive to replace costing in excess 0f 100. Would you leave a Laptop computer on full view in an insecure and unoccupied classroom? A Data projector costs as much if not more. Overt property marking using a highly visible method should be undertaken and signs prominently displayed saying that this has been undertaken. Consider painting the exterior with a suitable paint. Check with supplier as to how this can best be done with minimal effect on warranty (invalidating). Balance the cost of replacing a broken projector with that of replacing a stolen one and all other costs associated with being the victim of a burglary. Remove projectors at the end of each school day and place in a secure cabinet and lock the classroom or alternatively place in a secure store-room. Classroom doors should be secured as in D below. As a minimum the projectors should be stored away at weekends and school holidays. A proper set of steps, an electric screwdriver and two people will be required as a minimum. A secure room/store is defined as a room with brick concrete block walls, PIR, no roof lights, and a solid timber door secured with the minimum of a 5

18 lever mortise lock kite marked BS A metal roller shutter could also be considered. A secure cabinet is a proprietary security cabinet anchored to the fabric of the building. Projectors fixed to a ceiling mounted pole should be secured using a proprietary entrapment device. It is important to ensure that the pole is adequately secured to the ceiling or unbolt it. All rooms containing projectors should be alarm protected as should the approach. It should be configured so a confirmed alarm is achieved when intruders enter the room. Additional security of windows and fire exit doors also needs to be considered. Prevent walk-in thefts by always locking classrooms when unattended. Always confirm the identity of contractors and always escort visitors whilst on the premises. As with all items of value, do not leave them insecure and/or unattended whilst transporting. Fully record all details and where mark for auditing purposes and to aid identification if stolen/lost Security companies supplying equipment. These details are offered to allow you the opportunity of making a reasonable and realistic informed decision on appropriate, cost commensurate security Property Marking: By clearly marking your property, particularly your I.T. equipment, it makes it less attractive to a potential thief. They find identifiable property dangerous to handle and difficult to dispose of. There is an increased likelihood of your property been returned, if stolen. I accept that it is always possible for the markings to be defaced or removed, but this reduces the resale value and also extends the time the thief is at risk In a school environment I would recommend the use of visible marking as I feel they have a far more effective deterrent value. In you circumstances this can be best achieved by using a stencil solution marking system which cannot be erased. This is a visible, professional, cost effective and aesthetically pleasing way of marking your property A cheaper alternative would be to scratch, engrave, stencil or stamp the post code and school name on to equipment. The standard, quality and aesthetic

19 features of this type of marking will rely on the person nominated to carry out such work The use of property marking within the school needs to be clearly displayed and should be clearly indicated on school literature by incorporating company logos where permissible along with suitable wording i.e. School Property is protected by ACME Property Marking Systems. 18 Good Neighbour Scheme: This would work along the lines of an active Neighbourhood Watch scheme which encourages members of the community to take an interest in protecting each others property as well as their own. The effect this has is to develop community spirit, reduce crime, enhance personal safety and lessen the public perception and Fear of Crime The object of the scheme would be cut down on burglaries, theft and vandalism by reducing the number of trespassers on the school grounds out of hours Trespass on school premises is a serious problem. It takes many forms. The school grounds may provide a convenient shortcut and playing fields used for unauthorised organised football games, dog walking, golfers or informal association areas in which local youths just hang around Historically schools are seen as belonging to the local authority and at worst, belonging to everyone and no one s responsibility. Such a scheme would involve encouraging those persons who overlook your school to use a set procedure for reporting intruders and trespassers on your school In launching such a scheme, local residents would need to be circulated with a letter outlining the problems your school is suffering and the effect, this has on the school budget and how this in turn affects all users of the school and properties abutting. If persons trespassing on school grounds are not perceived to be a problem and are allowed to access the school grounds unchallenged this also leaves neighbouring properties vulnerable. In most residential burglaries the perpetrator gains access via the rear of the property. Such a scheme stands to benefit all. If a local Neighbourhood Watch scheme exists, perhaps a Good Neighbour scheme for your school could link into this The scheme involves people who live handy to your school, volunteering to watch the school and report any suspicious activity to an identified school contact. The neighbours remain completely anonymous. As a result, prompt detection of vandalism and trespass occurs. Reporting any activation of the school alarm. Noting the time of any suspicious incident.

20 19 Describing the people involved. Noting the presence of any vehicle, which appears to be involved in an incident together with its registration number and description. Reporting the incident as fully as possible to any one of the people whose names and telephone numbers are supplied in a circular that is distributed to the neighbours. In most cases the people to be contacted will be members of the school staff or governing body. Conclusion and Bibliography: 21.1 There is no single answer to improving your security and this booklet is not intended, as the definitive answer to your needs. In compiling and researching it, the following sources of information are some of those considered; DFES Publication Improving Security in Schools. ACPO (Association of Chief Police Officers) Security Systems Policy Further information and advice can be obtained by contacting either your local Crime Reduction Officer or Education Department. The Metropolitan Police & London Borough of Havering are thanked & acknowledged for their assistance in the production of this booklet.

21 1 Appendix A GOOD PRACTICE GUIDELINES FOR ANALOGUE & DIGITAL CCTV 1.1 A Closed Circuit Television System is a set of equipment and procedures designed to collect and process data. Images are recorded using videotapes (analogue) or digital formats. 1.2 These guidelines are intended as a brief introduction to good practice for all persons using or considering the use of CCTV surveillance equipment to collect and process data for the prevention of crime, collection of evidence and personal safety. The implications that the Data Protection Act 1998 has for CCTV are summarised below in paragraphs 2.0 to The guidance outlined in this document applies equally to Digital and Analogue CCTV Recording Systems. One of the fundamental requirements of either is the need to safeguard the integrity of images and for an audit trail to be started at the earliest stage. 1.4 The use of Digital CCTV is becoming more common as the technology evolves. The key is the creation of a master reference copy on, write once read many times (WORM) media i.e. CD-R or DVD-R. Licence free software, enabling the sequences to be viewed and copied as appropriate should be included In February 2005 the Home office issued the following guidance, UK Police requirements for Digital CCTV Systems The day to day running of the CCTV System should be the responsibility of an identified manager. It is accepted that this role may form part of the work responsibility of a manager with other duties. 1.6 Daily activities and incidents will need to be recorded to assist with subsequent enquiries on an Incident Report Record Sheet. 1.7 Movement or usage of the tape should be recorded on a Videotape Control Sheet. 1.8 It is important that the images produced by a system are as clear as possible to ensure that they are suitable for the purpose(s) for which they are intended. An initial check should be undertaken to ensure that the system performs properly.

22 The tapes should be used no more then 12 times, erased and then disposed of confidentially i.e. 31 high quality video tapes, allowing one videotape per recorder per day. A library maintained under these terms would have a life span of a year. (Third Data Protection Principle). Tapes should be erased immediately prior to re-use or disposal, using a purpose made Videotape Eraser. Each Tape should be given a Unique Reference Number marked on an appropriate label attached to the tape. Movement or usage of the tape should be recorded on a Videotape Control sheet. Used Videotape Control sheets should be securely stored. Cameras should be situated where they will capture images relevant to the purpose for which the scheme has been established. For example, if the purpose of the scheme is the prevention and detection of crime, the cameras should be sited so that facial images are captured. When installing cameras, account must be taken of the light conditions in which the cameras are expected to operate. Maintenance of the cameras should be undertaken on a regular basis in order to ensure that clear images are recorded. Cameras should be protected from vandalism in order to ensure that they remain in working order. Where tapes holding incidents are identified they should be securely stored until required. A secure unused stock of spare tapes should be maintained to replace any withdrawn from the videotape library for any reason. The secure cabinet should be kept locked and access should be authorised only by the CCTV system manager or deputy in their absence Signage: - Signs should be placed in the proximity of the cameras so that the public are aware that they are entering a zone that is covered by surveillance equipment. The signs should be clearly visible to members of the public. It is recommended that such signs should be at least A3 size. The signs should contain the following information. Identity of the person or organisation responsible for the scheme.

23 22 The purpose of the scheme. Details of who to contact regarding the scheme. Conclusions: - The information contained in the above handout is a brief outline of good practice and the requirements of the Data Protection Act Additional information and free impartial advice on CCTV and all other aspects of security can be obtained from your local Crime Reduction Officer. Useful web sites: PSDB Digital CCTV Guide. Operational Requirement. Appendix A2 Good Practice Aide Memoir 1. The camera(s) lens is clean. 2. Glassing on the camera(s) housing is clean. 3. All moving parts are functioning correctly. 4. Nothing is obstructing the camera view. 5. The video recording equipment is functioning correctly. 6. Date and time generator is operating correctly. 7. Videotapes are checked for suitability of use. 8. A fresh videotape is properly fitted into the recording equipment. 9. A replacement videotape is available for immediate use. 10. Following use, videotapes are safely and securely stored and tape use has been fully recorded according to procedures.

24 23 Appendix B The following guidelines were produced by the Crime Prevention Office of the Metropolitan Police Service, Robbery Squad. CCTV and Video Evidence Introduction Understanding CCTV Quality Purchase, usage and Storage Cataloguing Making Recordings Tape re-usage The Video as Evidence INTRODUCTION Security monitoring of premises and the movement of people by the use of CCTV systems can provide aid to the security of premises and the safety of staff and visitors. In combination with access control and fire and intruder alarm systems it can prove to be a formidable tool in the fight against crime. But no matter how good the system is, its effectiveness will be diminished unless cameras are monitored, pictures recorded and a means by which its use can be documented and its integrity proved, is established from the outset. The following are suggestions for the way of ensuring best practice in relation to the gathering and presentation of video evidence. If these general guidelines concerning the handling of evidential videotapes and equipment are followed it will greatly assist prosecution cases. This may lead to an increase in 'Guilty Pleas' at court and a decrease in the amount of staff time wasted in attending court to give evidence. The Police and Criminal Evidence Act 1984 requires that the gathering of Police evidence be procedurally correct and as far as possible, technically verifiable. It therefore puts the emphasis on improving the standard of evidence required, to catch suspects "in the act" of committing a crime.

25 24 UNDERSTANDING CCTV If you are considering the purchase of a CCTV system here are a few points that you may wish to consider before making the decision to installing a system. This will ensure that it meets all your expectations. WHAT USE IS CCTV Countering fraud Public Area monitoring Health and safety monitoring Providing evidential material Alarm confirmation CCTV CAN Help control crowds etc Help deter crime Reassure staff Monitor opening and closing hours Aid in the identification of criminals Assist in Health and Safety issues Assist in the rapid, effective, and appropriate response to an incident QUALITY It should be established at the outset whether the purpose of the system is intended to identify an incident or to provide identification evidence of suspects suitable for presentation to the courts. The quality of any recording depends on the standard and condition of both the videotape and the system used to make the recording. Equipment used must be in good order and regularly, professionally maintained and serviced, details of which should be recorded from the date of purchase and commissioning of the system.

26 25 Unless the camera is set to record a fixed point, i.e. a particular door or piece of equipment, a preference should tend towards pan tilt and zoom cameras or 360 degree speed dome cameras with zoom lens in order to focus on the subject and give as clear as possible picture of events. Adequate lighting or infrared assisted recording should be employed for night-times. A member of staff should be in a position to explain to any court, procedures relating to the systems, its installations and use. PURCHASE, USAGE and STORAGE Much criticism is levelled by the Police and others that the standard of video reproduction is of poor quality. There may be many reasons for this but the most common is the over usage of the recording tape. In an ideal world tapes would only be used once. It is appreciated that cost effectiveness is a necessity, therefore it is suggested that a library of 31 tapes is established, one for each day of the month period. Thus giving the maximum usage of twelve times per tape. Tapes tend to show signs of wear and deterioration after this amount of usage. Good quality recording tapes must be used for this purpose. Obviously the more recording machines used, the more 'libraries' will be required. It should be borne in mind that although this may appear to be excessive, the cost of the tapes is only a small percentage of the overall cost of the complete video security system. Tapes should be stored in a secure cupboard or cabinet so that their integrity can be maintained also avoiding the possibility of accidental damage or use. This should also apply to the video recording equipment. Once purchased it is important that the life of the tapes is fully recorded. CATALOGUING It is of the utmost importance, when presenting a video recording as evidence, that the tapes have not been interfered with and that their integrity can be proved. The best manner to prove this is to establish strict procedures for usage, these being fully documented in a prepared register that can be subsequently produced at court if required. Each tape should be given a unique reference number and be labelled accordingly. The principles of the register should be able to prove the life of the tape its movements and usage.

SCHOOL SECURITY SELECTING THE MEASURES

SCHOOL SECURITY SELECTING THE MEASURES SCHOOL SECURITY SELECTING THE MEASURES 1 Contents: Introduction... 2 Outline... 3 School Security Risk Assessment The Approach... 4 Health and Safety Risk Management Policy... 5 External Environment Perimeter

More information

Lincoln Minster School. Security

Lincoln Minster School. Security Lincoln Minster School Security Policy Statement Security plays a vital role in ensuring the effective management of Lincoln Minster School, which is committed to providing a safe and secure environment

More information

Guide for Non-Profit Housing Societies Security Guide Table of Contents

Guide for Non-Profit Housing Societies Security Guide Table of Contents Guide for Non-Profit Housing Societies Security Guide Table of Contents Chapter 1 - General Security Guidelines Chapter 2 - Target hardening Chapter 3 - Security window bars Chapter 4 - Anti-Graffiti solutions

More information

SECURITY SURVEY AND RISK ASSESSMENT. any trends or patterns in the incidents occurring at the school; the efficiency of the chosen security measures.

SECURITY SURVEY AND RISK ASSESSMENT. any trends or patterns in the incidents occurring at the school; the efficiency of the chosen security measures. SECURITY SURVEY AND RISK ASSESSMENT A security survey gives a rounded picture of the risks that your school faces and the security measures in existence. Without this information it is difficult to assess:-

More information

Car Security Begins at Home

Car Security Begins at Home Please print out and complete this form to reduce the risk of car theft happening to you. In Australia, seven in 10 late model vehicles are stolen by the thief gaining access to the vehicles keys or transponder.

More information

Designing Out Crime Assessment

Designing Out Crime Assessment Designing Out Crime Assessment New Flats (Affordable Housing) Yew Tree Road Moreton Wirral CH46 8UA Construction of flats complex. For Bernard Taylor Partnership Ltd o.iu@bernardtaylor.co.uk Tel 0161 443

More information

NSW POLICE FORCE. Home Safe

NSW POLICE FORCE. Home Safe NSW POLICE FORCE Home Safe IS YOUR HOME SECURE? This brochure is intended to provide your household with the latest information regarding home security and break-in prevention. You will learn how to evaluate

More information

SCHOOL SECURITY SURVEY

SCHOOL SECURITY SURVEY School Name: Survey Date: Address: Postcode: Telephone: Fax: e-mail: Contact Name: Role: Survey Compiled By: School Type: Pupil Numbers: PAN: Approx No. of Pupils: Community Use / Out of hour use: Regular

More information

Protection of unoccupied or void properties

Protection of unoccupied or void properties Real Estate Issue one Protection of unoccupied or void properties Introduction The current economic downturn has lead to a greatly increased number of vacant properties. In some countries rates of unoccupancy

More information

Policing requirements for Closed Circuit Television

Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 1 Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 2 Closed circuit television (CCTV) systems

More information

Why home security is important. Contents

Why home security is important. Contents Why home security is important Although property crime is falling it still accounted for 70% of all police recorded crimes in England and Wales in 2013/14, so it s important to do all you can to keep your

More information

Crime Prevention through Environmental Design (CPTED) - Checklist

Crime Prevention through Environmental Design (CPTED) - Checklist Crime Prevention through Environmental Design (CPTED) - Checklist * Where relevant, each item is to be shown on the architectural plans. A description of how the development complies, together with the

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

BUSINESS SECURITY AUDIT

BUSINESS SECURITY AUDIT BUSINESS SECURITY AUDIT CRIME PREVENTION TIPS FOR YOU AND YOUR BUSINESS COMMUNITY ENGAGEMENT DIVISION WA POLICE The Community Engagement Division WA Police would like to acknowledge South Australia Police

More information

Home Security Inspection

Home Security Inspection Home Security Inspection This document sets forth conclusions and recommendations following a Crime Prevention Through Environmental Design inspection performed by the Thunderbolt Police Department. The

More information

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV www.ico.gov.uk Closed Circuit Television (CCTV) code of practice Based on the publication A Code of Practice for CCTV www.ico.gov.uk Owner: Ian Heywood Last reviewed: July 2011 Contents 1.0 Introduction... 4 2.0 CCTV

More information

Secured By Design (SBD) New Schools 2014 Application & Checklist

Secured By Design (SBD) New Schools 2014 Application & Checklist Secured By Design (SBD) New Schools 2014 Application & Checklist Secured by Design (SBD) is a minimum standard for security. Applicants should make themselves familiar with the relevant sections of the

More information

Garden Security. Redbridge Borough Police Shed, Garage and Garden Security Guide

Garden Security. Redbridge Borough Police Shed, Garage and Garden Security Guide 2 Redbridge Borough Police Shed, Garage and Garden Security Guide Burglary is a crime which causes us all great concern. Recent crime figures show that Redbridge has one of the lowest residential burglary

More information

Remote Monitoring offers a comprehensive range of services, which are continually

Remote Monitoring offers a comprehensive range of services, which are continually Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have

More information

Preventing arson in buildings

Preventing arson in buildings Preventing arson in buildings More than half of fires in commercial buildings are started deliberately. These maliciously started fires can be particularly dangerous because they often develop quickly,

More information

Business security audit

Business security audit N A U S T R ALIA WES T E R Office of Crime Prevention SECURITY TIPS FOR YOUR BUSINESS Business security audit CRIME PREVENTION TIPS FOR YOU AND YOUR BUSINESS The Office of Crime Prevention would like to

More information

Appendix G. Security management plan

Appendix G. Security management plan Appendix G Security management plan Security Management Plan Prepared by: Kann Finch Group Project Energy Australia Belmore Park Zone 1- Sub-station component General Design Requirements The perimeter

More information

Effective Solutions for Increased Security in NH Public Schools. State of New Hampshire Division of Homeland Security and Emergency Management

Effective Solutions for Increased Security in NH Public Schools. State of New Hampshire Division of Homeland Security and Emergency Management State of New Hampshire Division of Homeland Security and Emergency Management Effective Solutions for Increased Security in NH Public Schools 33 Hazen Drive Concord, NH 03305 Effective Date: June 25, 2014

More information

Check Your Home Security

Check Your Home Security Check Your Home Security The following guidelines are for you to check your own home security. To complete the exercise properly should take about 30 minutes. You may want to make notes as you go along

More information

CCTV User Group GUIDE FOR SMALL USERS. PRIVATE and COMMERCIAL

CCTV User Group GUIDE FOR SMALL USERS. PRIVATE and COMMERCIAL CCTV User Group GUIDE FOR SMALL USERS PRIVATE and COMMERCIAL 1 CONTENTS Section Number Description Page number 1. Introduction 3 2. Human Rights Act and its implications for you 3 3. Data Protection and

More information

RAVENSCOTE JUNIOR SCHOOL. Security POLICY. Headteacher

RAVENSCOTE JUNIOR SCHOOL. Security POLICY. Headteacher RAVENSCOTE JUNIOR SCHOOL Security POLICY 2015 Date of Approval Date of Review Signed Mr D Harris Signed Mrs J. Brill Headteacher Chair of Governors Ravenscote Junior School Security Policy At Ravenscote

More information

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities. 2. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Where applicable, there must

More information

PersonalSafety. in and around the home

PersonalSafety. in and around the home PersonalSafety in and around the home Index Home Security 4 Outside Security 5 Outside Your Home 6 Going Away 7 What to do if you think there is an intruder in your home 8 Callers at the Door 9 Answering

More information

Security Systems Surveillance Policy

Security Systems Surveillance Policy Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy

More information

POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL

POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL CCTV cameras are now a familiar sight throughout the country. They are one of the many measures being introduced to help prevent

More information

Security Services Policy and Procedures

Security Services Policy and Procedures and Procedures January 2011 Contents Heading Page Policy Policy Statement: 3 Procedures Aims and objectives: 3 Responsibilities: 4 Introduction: 6 Security Service management remit: 6 Overall aims of the

More information

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business Business Name: Owner Name: Business Address: Officer: Survey No.: WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business "Being There When Needed" DOORS 1. Is the exterior doors solid core

More information

Commercial Burglary Prevention

Commercial Burglary Prevention Commercial Burglary Prevention Montgomery County Police 2 nd District Officer Dana Stroman Community Services Officer Officer Oliver Janney Community Services Officer 240-773-6700 Message from the commander

More information

Court Security Guidelines

Court Security Guidelines July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative

More information

PROOF ONLY. Police and Fire Service Home Security & Fire Safety Checklist. Student Accommodation Security Checklist

PROOF ONLY. Police and Fire Service Home Security & Fire Safety Checklist. Student Accommodation Security Checklist Police and Fire Service Home Security & Fire Safety Checklist Student Accommodation Security Checklist A Self Assessment Guide for Landlords This checklist contains all the standards needed to make sure

More information

PREVENTING HOME SECURITY

PREVENTING HOME SECURITY PREVENTING HOME SECURITY Index Home security 3 Garages and sheds 3 Going on holiday? 3 Protect your valuables 4 Identity theft 7 Uninvited callers 7 SAPOL Home Assist Program 8 Reporting a crime 11 Victim

More information

A GUIDE TO HOME SECURITY

A GUIDE TO HOME SECURITY A GUIDE TO HOME SECURITY E s t. 1 9 2 6 Compiled in association with South East Region Police Crime Reduction Advisors sponsored by IS YOUR HOME SECURE? Statistics prove that by taking simple and relatively

More information

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL

ISO IEC 27002 2005 (17799 2005) INFORMATION SECURITY AUDIT TOOL 9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent

More information

Policy Document. IT Infrastructure Security Policy

Policy Document. IT Infrastructure Security Policy Policy Document IT Infrastructure Security Policy [23/08/2011] Page 1 of 10 Document Control Organisation Redditch Borough Council Title IT Infrastructure Security Policy Author Mark Hanwell Filename IT

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Does a fence or other type physical barrier define the perimeter of the facility?

Does a fence or other type physical barrier define the perimeter of the facility? PHYSCIAL SECURITY SURVEY CHECKLIST PERIMETER BARRIERS TRANSIT FACILITIES Does a fence or other type physical barrier define the perimeter of the facility? (1) Specify type and height of physical barrier

More information

Home Security Assessment

Home Security Assessment Home Security Assessment Brought to you by Community Organisations, sports clubs, churches, youth groups and Businesses, get your free webpage HERE. No ifs or buts.its free. 1. Introduction 2. Purpose.

More information

Watching Your Business Fire & Security Solutions

Watching Your Business Fire & Security Solutions Watchdog Business Security Access Control CCTV Security Intruder Alarms Fire detection & Extinguishing Watching Your Business Fire & Security Solutions Watchdog Business Security Watching Your Business

More information

Residential House and. Residential House and FOR POLICE, HOME OWNERS, RENTERS, BODY CORPORATES AND DEVELOPERS

Residential House and. Residential House and FOR POLICE, HOME OWNERS, RENTERS, BODY CORPORATES AND DEVELOPERS Residential House and Residential House and Unit Complex Assessment Unit Complex Assessment FOR POLICE, HOME OWNERS, RENTERS, BODY CORPORATES AND DEVELOPERS FOR POLICE, HOME OWNERS, RENTERS, BODY CORPORATES

More information

Crime Prevention: A Guide for Small Businesses

Crime Prevention: A Guide for Small Businesses Crime Prevention: A Guide for Small Businesses Text File Slide 1 Crime Prevention: A Guide for Small Businesses Welcome to SBA s online training program, Crime Prevention: A Guide for Small Businesses.

More information

All YOU need to know to secure YOUR HOME

All YOU need to know to secure YOUR HOME YOUR FREE POCKET GUIDE All YOU need to know to secure YOUR HOME brought to you by Town & Country Security Systems Ltd Congratulations on receiving this FREE Pocket Guide to help spot the weaknesses in

More information

CHAPTER REVIEW OF SECURITY IN SCHOOL DESIGN IN IRELAND

CHAPTER REVIEW OF SECURITY IN SCHOOL DESIGN IN IRELAND CHAPTER 6 REVIEW OF SECURITY IN SCHOOL DESIGN IN IRELAND John Dolan Planning and Building Unit, Department of Education and Science, Republic of Ireland Lessons in danger Abstract: This paper presents

More information

HOME SECURITY A BASIC GUIDE

HOME SECURITY A BASIC GUIDE HOME SECURITY A BASIC GUIDE BANHAM Compiled in association with South East Region Police Crime Reduction Advisors supported by IS YOUR HOME SECURE? Statistics prove that by taking simple and relatively

More information

EMERGENCY MANAGEMENT IN SCHOOLS

EMERGENCY MANAGEMENT IN SCHOOLS EMERGENCY MANAGEMENT IN SCHOOLS Michelle Roberts and Mark Stephens Emergency and Security Management Branch Department of Education and Training Victoria Paper presented at the The Role of Schools in Crime

More information

This guide sets out what forms of shop front security will and will not be acceptable to the Council.

This guide sets out what forms of shop front security will and will not be acceptable to the Council. January 2009 INTRODUCTION Shop fronts are critical in establishing the character and appearance of shopping frontages. Conwy County Borough Council attaches considerable importance to suitably designed

More information

Conwy Deposit Local Development Plan 2007 2022 (Revised edition 2011)

Conwy Deposit Local Development Plan 2007 2022 (Revised edition 2011) Conwy Deposit Local Development Plan 2007 2022 (Revised edition 2011) SUPPLEMENTARY PLANNING GUIDANCE LDP3: Shop Front Security March 2011 This document is available to view and download on the Council

More information

Restaurant & café guide

Restaurant & café guide 'Helping our customers stay in business by reducing risk' NZI Risk Solutions TM About NZI Risk Solutions NZI has extensive experience in providing expert risk management advice to help our commercial customers

More information

The definitive guide to consumer perceptions on home security in Australia. Secure Homes Report. ADT Always There

The definitive guide to consumer perceptions on home security in Australia. Secure Homes Report. ADT Always There The definitive guide to consumer perceptions on home security in Australia Secure Homes Report 2012 ADT Always There KEY FINDINGS AT A GLANCE 30% of surveyed residents have been a victim of a break-in

More information

The remote CCTV monitoring specialists CCTV Monitoring

The remote CCTV monitoring specialists CCTV Monitoring The remote CCTV monitoring specialists CCTV Monitoring Providing security and total peace of mind 24 hours a day, 365 days a year! Welcome to Valleywatch Valleywatch is a specialist CCTV monitoring station

More information

UK SBS Physical Security Policy

UK SBS Physical Security Policy UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following

More information

Think Remote Monitoring Think Concept Pro Think VXM4B

Think Remote Monitoring Think Concept Pro Think VXM4B The VXM4B Range Digital Video Recorder and Remote Monitoring System Think Remote Monitoring Think Concept Pro Think VXM4B Not much more left to Think about Who watches over your business when you re not

More information

INSURANCE ADVICE ON HOME SECURITY

INSURANCE ADVICE ON HOME SECURITY INSURANCE ADVICE ON HOME SECURITY Prepared by the Association of British Insurers (ABI) and the Home Office Association of British Insurers 51 Gresham Street London EC2V 7HQ 020 7600 3333 www.abi.org.uk

More information

Physical Security Policy

Physical Security Policy London School of Economics & Political Science Physical Security Policy Final Draft: 06/11/12 Approved by Estates Strategy Committee: 22/05/13 Next Review Date: 22/05/14 London School of Economics Physical

More information

http://homedefensesecurity.com

http://homedefensesecurity.com The Basics of Home Security Topics Covered: Home Security Basics Home Security Guides Home Security Products and Services The Value of Insurance in Home Protection Top Ten Tips for Your Home Security Essentials

More information

Security Policy and Procedures

Security Policy and Procedures The British Section SHAPE International School Aims Security Policy and Procedures The aim of this policy is to ensure that the school can operate on a day-to-day basis in an environment that is safe and

More information

CABINET. 24 April 2012. Title: Term Contract for Maintenance, Repair and Minor Works on Security and Protection Systems

CABINET. 24 April 2012. Title: Term Contract for Maintenance, Repair and Minor Works on Security and Protection Systems CABINET 24 April 2012 Title: Term Contract for Maintenance, Repair and Minor Works on Security and Protection Systems Report of the Cabinet Member for Finance and Education Open Report Wards Affected:

More information

Secure Homes Report 2013. Master Licences: VIC No. 65201491P WA No. SA42314 SA No. ISL152299 NSW No. 405187443 ACT No. 17501009 QLD No.

Secure Homes Report 2013. Master Licences: VIC No. 65201491P WA No. SA42314 SA No. ISL152299 NSW No. 405187443 ACT No. 17501009 QLD No. Secure Homes Report 2013 Master Licences: VIC No. 65201491P WA No. SA42314 SA No. ISL152299 NSW No. 405187443 ACT No. 17501009 QLD No. 3258669 ANDY ELLIS President Tyco Fire and Security It is important

More information

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/Email: Officer: Case No:

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/Email: Officer: Case No: ISLE OF PALMS POLICE DEPARTMENT Thomas E. Buckhannon, III, Chief of Police 30 J. C. Long Boulevard Isle of Palms, South Carolina 29451 (843) 886-6522 BUSINESS SECURITY SURVEY Date: Business Name: Business

More information

MONROE POLICE DEPARTMENT

MONROE POLICE DEPARTMENT MONROE POLICE DEPARTMENT 104 Stage Road Monroe, NY 10950 Main: (845) 782-8644 - Fax: (845) 782-2227 A. Alex Melchiorre Website: www.monroepd.org Chief of Police BUSINESS BURGLARY PREVENTION TIPS Is your

More information

Physical Security Policy

Physical Security Policy Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security

More information

BRANCH SECURITY REVIEW CHECKLIST

BRANCH SECURITY REVIEW CHECKLIST BRANCH: Date: Section 1 Physical Vulnerability 1. Do all office windows permit an unobstructed view of the bank s interior? 2. Are all exterior doors and windows equipped with tamper-resistant locks? 3.

More information

Title NSW Police Business Security Assessment. Subject Assessment of business security. Command responsible Operations Support Command

Title NSW Police Business Security Assessment. Subject Assessment of business security. Command responsible Operations Support Command Title NSW Police Business Security Assessment Subject Assessment of business security Command responsible Operations Support Command Available to Unrestricted Publication date April 2006 Version Two Review

More information

INTRUSION ALARM SYSTEM

INTRUSION ALARM SYSTEM INTRUSION ALARM SYSTEM Case studies reveal most burglars are deterred by the mere presence of an alarm system. Burglars attack unprotected premises considerably more often than ones protected by alarm

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

GENERAL GUIDE FOR MANAGING CASH-IN-TRANSIT SECURITY RISKS

GENERAL GUIDE FOR MANAGING CASH-IN-TRANSIT SECURITY RISKS 1 This General Guide provides information on how to manage cash-in-transit security risks. It is supported by an Information Sheet for small business. What is cash-in-transit? Cash-in-transit activities

More information

RISKSTOP CONTROLLING RISKS IN UNOCCUPIED COMMERCIAL PROPERTIES

RISKSTOP CONTROLLING RISKS IN UNOCCUPIED COMMERCIAL PROPERTIES RISKSTOP CONTROLLING RISKS IN UNOCCUPIED COMMERCIAL PROPERTIES April 2014 CONTROLLING RISKS IN UNOCCUPIED COMMERCIAL PROPERTIES Whenever a commercial property becomes unoccupied the risk of fire, theft,

More information

Home Security Assessment Checklist DATE

Home Security Assessment Checklist DATE Home Security Assessment Checklist DATE PREFACE The Home Security Assessment Checklist is designed to assist justices, judges, and other court officials in determining their level of security at home.

More information

Business Protection Online Activity Store Self Assessment

Business Protection Online Activity Store Self Assessment Business Protection Online Activity Store Self Assessment Complete each question in the Business Protection Online Activity Store Self Assessment. The selfassessment covers potential areas of vulnerability,

More information

Allianz Insurance plc. Home Security. Home

Allianz Insurance plc. Home Security. Home Allianz Insurance plc Home Security Home Home Security Protecting Your Home It can take very little time for a thief to gain entry into your home. The trauma of your home being ransacked and your possessions

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff

More information

Emergency Planning Guideline

Emergency Planning Guideline www.hh.net.nz Essential Emergency and Security Systems Supporting and Complimenting the Home s Fire Evacuation Scheme POLICY: To optimise emergency readiness REFERENCE: NZS 8143: 2002 NB: Management is

More information

GUIDE TO SPECIFYING A CCTV SYSTEM

GUIDE TO SPECIFYING A CCTV SYSTEM GUIDE TO SPECIFYING A CCTV SYSTEM Introduction This paper is aimed at the end user and is guidance on avoiding some of the pitfalls created by a poorly structured or ill thought-out specification. You

More information

Palm Beach County Sheriff s Office

Palm Beach County Sheriff s Office Palm Beach County Sheriff s Office Home Security Self Survey Since 1909, the deputies of Palm Beach County have provided a safe environment for thousands of people who live, work and visit Palm Beach County.

More information

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template Security Tools Forms Physical Security Assessment Security Plan Template Traffic Control Plan Template 1 Physical Security Assessment (PSA) Date: I. PHYSICAL SECURITY ASSESSMENT (PSA): EXTERIOR OF THE

More information

We advance safety and security by finding smarter ways to save lives, improve businesses and protect where people live and work.

We advance safety and security by finding smarter ways to save lives, improve businesses and protect where people live and work. Secure Homes Report 2014 We advance safety and security by finding smarter ways to save lives, improve businesses and protect where people live and work. At ADT Security we have made it our business to

More information

Health & Safety Policy For Locations Hosting Film Production Companies

Health & Safety Policy For Locations Hosting Film Production Companies Health & Safety Policy For Locations Hosting Film Production Companies Throughout this document, the location will be referred to as The Venue and the film production company as The Contractor. The following

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Security Service de Services sécurité. Security Alarm Monitoring Protocol Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings

More information

How To Protect A Water System

How To Protect A Water System SECURITY OFFICER & PATROL OFFICER PROTOCOL SECURITY OFFICER LOCATIONS AND SHIFTS La Entrada Main Security Center 24 hour coverage 7 days per week Plant 1 Main Gate Monday Friday, 5:00 AM 6:00 PM Patrol

More information

Cyber Security Response to Physical Security Breaches

Cyber Security Response to Physical Security Breaches Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically

More information

GUIDE TO HOME SECURITY

GUIDE TO HOME SECURITY GUIDE TO HOME SECURITY A burglar is typically on the lookout for an empty house - it need only be empty for a short amount of time perhaps while you are out shopping or visiting a neighbour. You might

More information

Security Alarm Monitoring Protocol

Security Alarm Monitoring Protocol Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or

More information

A Self-Audit of Your Current Campus Security Systems

A Self-Audit of Your Current Campus Security Systems A Self-Audit of Your Current Campus Security Systems Security Solutions for Education, Business & Public Safety Free Consultations on ID Card Systems, Access Control, Call Recording, Video Surveillance,

More information

SECURITY OF BUILDINGS, GROUNDS AND OTHER ASSETS

SECURITY OF BUILDINGS, GROUNDS AND OTHER ASSETS 500-54 Administrative Procedure 542 SECURITY OF BUILDINGS, GROUNDS AND OTHER ASSETS Background Recognizing the significant investment in buildings, grounds, supplies and equipment, the District has a responsibility

More information

Keeping your identity safe. Keeping you safe. Your home, shed and outbuildings. Bogus callers. Keeping your things safe. Internet safety.

Keeping your identity safe. Keeping you safe. Your home, shed and outbuildings. Bogus callers. Keeping your things safe. Internet safety. // CRIME IS LOW IN LANCASHIRE We want to work with you to keep it that way. This section contains tips on how you can help to prevent crime and avoid becoming a victim of crime. Click on the contents below

More information

Security guidance for all existing or prospective Home Office Controlled Drug Licensees and/or Precursor Chemical Licensees or Registrants

Security guidance for all existing or prospective Home Office Controlled Drug Licensees and/or Precursor Chemical Licensees or Registrants 2014 Security guidance for all existing or prospective Home Office Controlled Drug Licensees and/or Precursor Chemical Licensees or Registrants This document provides general advice and guidance on security

More information

Commercial or Business Security Survey

Commercial or Business Security Survey Exterior Grounds Commercial or Business Security Survey Is there a fence around the property or a clear definition of Territoriality? If there is a fence, is it tall enough and maintained in good repair?

More information

CCTV Cameras Policy. Policy Guidelines

CCTV Cameras Policy. Policy Guidelines CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

Barrington Hills Police Department

Barrington Hills Police Department Barrington Hills Police Department Home Security Checklist Use this as a guide as you check your home for safety measures. Boxes marked indicate areas where you could take action to improve your home s

More information

UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012

UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012 UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one

More information

Major Risks and Recommended Solutions

Major Risks and Recommended Solutions Major Risks and Recommended Solutions www.icdsecurity.com OVERVIEW Are you familiar with the main security risks that threaten data centers? This paper provides an overview of the most common and major

More information

Palm Beach State College Security Plan

Palm Beach State College Security Plan Palm Beach State Security Plan Prepared by: J.E. Smith Date: September 17, 2008 INTRODUCTION This Security Plan describes the organization, activities, methodology, and documentation by which Palm Beach

More information