Prison Security. Modernisation of security systems and improved protection for staff are key issues facing prisons

Size: px
Start display at page:

Download "Prison Security. Modernisation of security systems and improved protection for staff are key issues facing prisons"

Transcription

1 Prison Security Thales Security Solutions & Services Division Security Systems rue Grange Dame Rose CS Vélizy Cedex - France Tel: +33 (0) February Photos: Thales, GettyImages Modernisation of security systems and improved protection for staff are key issues facing prisons

2 The Fleury Mérogis project at a glance: 46,000 field sensors (2,000 access points, 500 cameras, 3,300 intercoms), giving a total of 138,000 potential alarm conditions, Over 100 operator stations distributed among five supervision sub-servers and one central hypervision server, 4,000 inmates, 1,000 prison officers, total area: 25 hectares. Architecture of a multi-building hypervision system 11

3 Prison Security Project in the spotlight Fleury Mérogis, Europe s largest prison Thales was selected to design, supply, install and commission a new safety and security system over an eight-year period as part a comprehensive upgrade programme at the prison. The system ties together seven subsystems via a secure IP network controlled via the SATHI hypervision system: access control, door locking, intrusion detection (with information from perimeter detection system alarms, door contacts, wall-mounted alarm buttons, hidden alarms, lone worker alarms, etc. ), videosurveillance (digital system incorporating image analysis capability), intercom, radio communications, public address. Efforts to improve prison conditions, ever-increasing prison populations, spectacular escape attempts and repeated strike action by staff demanding better protection have kept prison security firmly in the media spotlight over the past ten years, with some countries more affected by individual issues than others. Guy Autran is the architect behind many of the prisons built in France in the last 20 years. He believes that government is becoming increasingly paranoid about security. In the early 1980 s, the specification for the first prison project for which I submitted a bid was just 20 pages long. Nowadays, the functional specification is around 150 pages, and the technical specification runs to more than 400. Prisons have to maintain high levels of security to prevent escapes, riots, suicides, attacks on inmates and staff, and other forms of violence. A prison is by definition a complex environment, which has to house people from a wide variety of backgrounds, some of them dangerous, all of them unhappy to be incarcerated there, while striking the correct balance between punishment and rehabilitation. In addition to meeting these challenges, prisons also have to be capable of reacting rapidly to internal emergency situations, and restoring order within a short timeframe once incidents have been brought under control. On the basis of a detailed analysis of the customer s operational needs, Thales has developed an offering specially tailored to the needs of prisons: carefully-sited sensors and other state-of-the-art solutions adapted to meeting key prison security needs, open, modular architecture based on a secure information network, deployment of supervision and hypervision software to automate and simplify the majority of security tasks carried out by staff, and use of data processing software for prison management. 10 3

4 Prison Security - Specific security requirements Basic principles of prison security It must be borne in mind in any discussion of prison security that the number one priority for prison operators is to prevent incidents of any kind. Prison management must ensure that staff, visitors and inmates are provided with the highest possible level of security. A raft of rules and procedures provides the framework for meeting this requirement, enabling the majority of credible security threats to be anticipated and prevented. In light of their critical role within the national security infrastructure responsibility for prisons rests with the State (usually the Justice Ministry or its equivalent) or with a state agency upgraded and, in particular, new-build prisons in many countries meet these basic security requirements. In addition, the fact that the media spotlight regularly falls on prison security (following strikes by prison staff or escapes, for example) means that politicians and national prison services are constantly looking to modify applicable security standards and monitor their implementation. In France, for example, the Minister of Justice tasked a working group with reviewing prison security in 2001, leading to a report containing proposed security standards for prisons. from evading surveillance and escaping, and to ensure that third parties cannot enter the prison without authorisation. Perimeter fences, by definition the primary security barrier for a prison facility, are usually built to a generic design that features two walls enclosing a no man s land area accessible via the single entrance to the facility. The exterior perimeter comprises a concrete wall. The lower interior perimeter can either be another concrete wall, or a conventional fence structure. Given their key function of providing a barrier against intrusion, perimeter fences have to meet specific security requirements. However, the prison buildings themselves also play a vital security role as the first barrier against an escape attempt. The main buildings in a prison are designed for the purpose of detaining inmates. They include prisoner accommodation blocks, workshops, exercise yards and gyms. In addition, separate administrative buildings mainly house offices and meeting rooms. The different parts of the prison are placed within clearly defined zones with different levels of security depending on their function and location. Inmate, staff and visitor control Architecture and security principles A key constraint on prison security is the design of the facility itself, which varies widely depending on age and country. In Europe, the numbers and categories of prisoners that can be incarcerated in a given facility are defined by standards, which provide specifications for different types and numbers of prisoner accommodation units designed to achieve specific security goals (through appropriate levels of monitoring, etc.). Prisons can often extend over large areas (for example, the Fleury Mérogis facility in the Paris Region occupies 25 hectares). Given the problems associated with securing such an extensive footprint, the required security levels, and the associated costs, need to be taken into account via a comprehensive needs analysis. Prison security has to be as tight as possible, to prevent detainees 4 In order to maintain safety and security, prisons have to know the whereabouts of all inmates, visitors, external contractors and prison staff at any given time. The gatehouse is a vital checkpoint which allows all individuals entering or leaving a facility to be monitored at a single location. As prisons become more and more open to the outside world, bringing increasing numbers of individuals and vehicles to the prison gates, gatehouse security and organisation are paramount. As a first step, details of all individuals entering and leaving the facility (date, time, purpose of visit) must be meticulously recorded in a log, with incoming and outgoing visitor flows documented separately. Computerised tools are increasingly being used for this purpose. In addition, security barriers at the boundaries of different zones within the prison allow staff to check individuals identities and movement authorisations. The system of secure access points between different zones also prevents individuals (including prison management) from moving freely around the facility without security checks, thereby enhancing safety and security. Conclusion Thales s experience of the highly specific prison environment, and its excellent understanding of the operational needs of customers (both procurement agencies and users), make it a smart integrator capable of designing and implementing security systems that enable prisons to perform their key function. Thales is also acutely aware that threats to prisons encompass areas other than physical security. Such threats concern two key areas: theft or forgery of administrative documents: in May 2001, three inmates escaped from a prison in Corsica using false release orders that had been printed using headed paper from the court in Ajaccio, and faxed to the prison by an accomplice who had changed the sender s number. This case illustrates the need to take account of information security by deploying authentication, integrity checking, electronic signature and time/date stamping measures. Thales can meet these needs thanks to its expertise in critical information systems and certified secure infrastructure for the government and banking sectors, escape while away from prison (for example while attending court hearings): security systems for buildings operated by the Ministry of Justice are required to incorporate access and movement control measures for different groups (members of the public, lawyers, magistrates, journalists and prisoners). Thales can also offer expertise in this area. Thanks to its ability to take account of operational issues, specific technical requirements, installation and prime contracting constraints, as well as the management of information flows, within current and future prison environments, Thales is consolidating its position as an integrator specialising in prison safety and security. Méliné Eolmézian Security Systems Thales - Security Solutions & Services Division 9

5 - Concrete, innovative information management solutions to meet prisons vital needs - Real power in a prison resides in information. To manage prisons effectively, operators need to control information at all levels. This means knowing what is happening at all times, despite the difficulties associated with a prison environment in which, by definition, information is frequently withheld or concealed. Operators need to know a great many things, such as for example the whereabouts of staff, what was said in the prison workshops at a given time, or the subject of a dispute among inmates. entire facility (showing maps, location of actuated alarms, video images from alarm locations as well as from areas subject to special monitoring, location of resources, etc.) on a wall of images that can be automatically configured according to predefined emergency scenarios, or controlled via the hypervision terminals in the Control and Supervision Centre. Three key issues facing prison governors and safety/security managers illustrate the vital importance of information management: The infrastructure deployed to handle multimedia (voice, data, image) flows transiting via a prison s safety information system must be designed to meet high standards in terms of security and availability. In general, prisons operate two communications infrastructures side by side: an analogue or digital radio network Real-time data retrieval/display In order to get access to the information they need when they need it, prisons require a communications architecture that lets them merge data on a single platform, organise it according to specific criteria, and supply it to users (staff, supervisors, safety manager, prison governor) in an appropriate format. Smart use of data Information on events and alarms, or in the form of recorded data, can appear insignificant when considered on its own. Once correlated, however, such information can be highly revealing, and may be a precursor of a more significant event. It may also be relevant not in real time, but for the purpose of post-event analysis or reconstruction. Thales delivers the following advanced functionalities by integrating data processing modules into security systems as required: Solutions qualified for use in a prison environment Prison operators need continuous, real-time monitoring capabilities to allow them to track inmates and external contractors on arrival and departure, and as they move around inside the facility. In the majority of prisons, the key features of access control systems are as follows: Monitoring is carried out by prison staff; inmates do not carry personal ID passes. Gates and security barriers are equipped with electromechanical locks that are remote-controlled via a central system, with no provision for inmate database consultation. Prison staff and external contractors can be provided with a card that allows them to enter areas where inmate access is prohibited. The card is used for identification purposes, and doors are not opened automatically. Instead, when an individual s card is read, their personal data (including photograph) and location details are displayed on a screen in the control centre, where staff can then verify the individual s identity via the local surveillance camera, and open the door as appropriate. This type of biometric system is known as swipe and show. Automation of tasks like locking and unlocking doors raises staff skill levels by enabling them to focus on more people-oriented tasks, with the aim of anticipating and preventing incidents. of predefined operational scenarios in specially designed 3-D environments, via automatic software tools, In this way, access to information is optimised, as well as being managed on a right-to-know basis thanks to man-machine interface (MMI) authentication and customisation mechanisms. by modules designed to extract vital information from huge databases, produce relevant reports, and track specified indicators, At the highest level the prison s Control and Supervision Centre prison management can obtain a safety and security overview of the using automated tools to search video recordings from the entire prison. 8 The advent of the state-of-the-art technical capabilities (such as smart door control, image analysis, mobile communications solutions, geolocation, biometrics, etc.) and innovative operations solutions (supervision, hypervision, command and control, etc.). have transformed prison security in a few short decades. Thales is supporting prisons in their efforts to upgrade security features and systems by choosing the most appropriate solutions, integrating them into an open, high-availability architecture, and proposing management and administration tools that meet operators emerging needs. Communication and data transmission networks an Ethernet/IP network, used for interlinking subsystems as well as different operation and supervision platforms, and designed with a redundant architecture to ensure maximum availability. - Integrating state-of-the-art technologies and automated solutions into the prison environment while taking account of the needs of prison staff presents Thales with a complex challenge - Traditional manned watchtowers have been superseded by electronic perimeter surveillance systems that feature a combination of detection solutions (microwave radar and buried detection systems between the inner and outer perimeters, fence-mounted detection and image analysis on the inner perimeter, 360-degree laser sensors on roofs, etc.). Videosurveillance cameras are also used for the purpose of eliminating doubt. 5

6 New technological solutions to meet new threats In 2002, an inmate at La Santé prison in Paris escaped after swapping places with his brother. The affair caused a media uproar, and highlighted the shortcomings of security measures introduced by the French government, such as marking of inmates with UV-detectable ink (which can be neutralised by wetting the skin), at a time when prisons were starting to use biometric technologies. However, biometric techniques are not widely used for access control at prison entrances, or to track movements in prison corridors, but remain largely confined to visiting areas. One of the first successful technologies to emerge was fingerprint matching, which has the advantage of being traceless, and is capable of distinguishing between twins. More sophisticated technologies have since become available, however, such as palm vein authentication and 3-D face recognition. Thales s dedicated biometrics R&D department can support prisons in choosing and implementing biometric solutions. Software tools to support staff Prison managers and staff use professional mobile radio (PMR) systems to meet their secure communications needs. PMR solutions offer useful additional functionalities such as group management and priority management. In addition, the deployment of smart terminals allows radio communications infrastructure to be used for transmitting alarm information. Prison staff equipped with PMR terminals have access to the following functionalities: radio communications, hidden alarm button for alarm and emergency backup calls (gradually replacing wall-mounted alarm buttons), tamper detector, lone worker protection (terminals are worn in the vertical position, and an alarm is generated if they are tilted to the horizontal, i.e. in the event of a member of prison staff falling ill or being attacked), integrated GPS, patrol management (optional). Image analysis, although not yet in widespread use in prisons, can provide staff with additional capabilities for detecting intruders in prohibited zones (for example between the inner and outer perimeters, and in interior courtyards at night), and determining responses to abnormal conditions (for example man down ) in locations not heavily frequented by inmates. Thales s dedicated image processing R&D department can support prisons in choosing and implementing image analysis solutions. Smuggling of items into prison in particular mobile telephones is a major security headache for prison operators. Mobile phones have become a vital tool for escape attempts involving contact with accomplices outside the prison walls. As phones become increasingly smaller and contain fewer metal components, they become harder to detect using conventional metal-detection technology. Carefully targeted jamming of mobile phone frequencies has emerged as the most effective means of combating this kind of threat. 6 Prison staff traditionally work on a faceto-face basis, or on paper, with only a small number of security functions handled via IT systems. Now, however, Thales can offer dedicated, fully integrated security software tools that provide staff with the information they need, and enable them to react faster, irrespective of the circumstances, while performing their full range of tasks. Transmission of voice, data and alarms to PMR terminals allows staff to rapidly and effectively locate, characterise and verify emergency situations. Appropriate resources can then be dispatched to manage the incident. Thales s SATHI hypervision solution provides the ideal information and communications platform for all incidents and events occurring inside a prison. The SATHI hypervision system ties together all the different areas of security, allowing real-time management of a wide range of subsystems (including access control, video surveillance, intrusion detection, intercom, radio communications, and public address). This enables: historical data from different subsystems to be merged, automated responses between different subsystems to be predefined (for example video recording in response to an alarm, real-time video display on receipt of an intercom call, siren in response to actuation of an alarm button, etc.), key subsystem functions to be controlled (remote door opening, control of PTZ cameras, isolation of zones, etc.). SATHI screenshots I The SATHI hypervision system offers a number of efficiency benefits for prison staff: doors and security barriers have traditionally been equipped with an intercom, a camera, and an electromechanical locking system. SATHI notifies operators when an intercom call is made, identifies the caller s location, automatically displays the correct real-time video view, and allows the door to be opened by remote control following an identity check all this via a single screen. Thales can thus deliver significant time savings, supporting staff in the performance of simple, repetitive tasks, and allowing them to focus on higher added-value missions such as surveillance, incident prevention and inmate supervision. when an incident occurs, a large number of alarms are generated, procedures have to be followed, and reaction times are limited. SATHI allows operators to respond faster and more effectively to lone worker alarms, for example, providing genuine added value in terms of incident data (type, individual involved, date, time, etc.), location, verification (cameras used to eliminate doubt via real-time display or via images recorded during the incident) and handling (procedures, incident log, and dispatch of appropriate resources). 7

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

How To Ensure Security At A Site Security Site

How To Ensure Security At A Site Security Site Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers

More information

www.thalesgroup.com / transport Supervision at The Heart of Transport Network Security

www.thalesgroup.com / transport Supervision at The Heart of Transport Network Security www.thalesgroup.com / transport Supervision at The Heart of Transport Network Security TECHNOLOGY Thales : Supervision at The Heart of Transport Network Security Supervision plays a key role in any type

More information

GMS GRAPHICAL MANAGEMENT SYSTEM

GMS GRAPHICAL MANAGEMENT SYSTEM GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates

More information

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include:

Alarm Systems. The purpose of an intruder alarm system is: Commonly utilised detection devices include: Alarm Systems An intruder alarm system is designed to detect intruder presence at your premises. When detected, a siren will activate and communicate an alarm signal to one of our highly sophisticated

More information

Building Integration System Selection Guide for V4.0

Building Integration System Selection Guide for V4.0 Building Integration System Selection Guide for V.0 Building Integration System Contents Contents System overview... Typical applications... Connection types and licensing basics... 6 Selection Guide

More information

Introduction. Industry Changes

Introduction. Industry Changes Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise

More information

integrated fire and security solutions Maximum protection for buildings

integrated fire and security solutions Maximum protection for buildings integrated fire and security solutions Maximum protection for buildings integrated fire and security solutions Johnson Controls: expert qualified in building protection Johnson Controls is the recognised

More information

A guide to access control for manufacturing sites

A guide to access control for manufacturing sites A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round

More information

C-TPAT Self-Assessment - Manufacturing & Warehousing

C-TPAT Self-Assessment - Manufacturing & Warehousing Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management A Tradition of Quality and Innovation For 12 years, the Bosch name stands for quality and reliability. Bosch is the global supplier of choice for innovative technology, backed by the highest standards

More information

Physical Security for Companies that Maintain Social Infrastructure

Physical Security for Companies that Maintain Social Infrastructure 249 Hitachi Review Vol. 63 (2014), No. 5 Featured Articles Physical Security for Companies that Maintain Social Infrastructure Shinsuke Kanai Kenji Nakamoto Akio Takemoto Masatoshi Furuya OVERVIEW: While

More information

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure. MM8000 safety and security with smart danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive safety Safety

More information

SMART CITY. The interconnected city: improving the quality of life of citizens

SMART CITY. The interconnected city: improving the quality of life of citizens w w w. t h a l e s g r o u p. c o m The interconnected city: improving the quality of life of citizens transport Security 2 The smart city concept is a vision shared by major cities as they chart their

More information

Building Integration System (BIS)

Building Integration System (BIS) Building Integration System (BIS) The Bosch Building Integration System (BIS) is an open PC-based system that applies the best elements of security system technology with the advantages of the latest information

More information

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management Building Integration System Your platform for customized security and safety management 2 One platform for everything Efficient building management is becoming not only more important, but also a more

More information

Reliable Security Solutions

Reliable Security Solutions Reliable Security Solutions Challenger10 The proven solution for access control, intrusion detection and video integration. An integrated security solution for your most challenging environments The Tecom

More information

Remote Monitoring offers a comprehensive range of services, which are continually

Remote Monitoring offers a comprehensive range of services, which are continually Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have

More information

How To Protect A Water System

How To Protect A Water System SECURITY OFFICER & PATROL OFFICER PROTOCOL SECURITY OFFICER LOCATIONS AND SHIFTS La Entrada Main Security Center 24 hour coverage 7 days per week Plant 1 Main Gate Monday Friday, 5:00 AM 6:00 PM Patrol

More information

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

White paper. Axis Video Analytics. Enhancing video surveillance efficiency White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network

More information

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry

IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry IMS [Integrated Management System] Surveillance Solution Segment Focus: Gaming Industry Needs analysis Reduce disputes over payouts Eliminate theft Detect misconduct and record it for use as evidence in

More information

Cyber Security Response to Physical Security Breaches

Cyber Security Response to Physical Security Breaches Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically

More information

How can we prevent security breaches?

How can we prevent security breaches? How can we prevent security breaches? Unify your security management with Siveillance Vantage to enhance the emergency and routine procedures of your critical infrastructure. Answers for infrastructure.

More information

Questions related to specific materials, methods, and services will be addressed at the conclusion of each presentation.

Questions related to specific materials, methods, and services will be addressed at the conclusion of each presentation. CEFPI is a Registered Provider with The American Institute of Architects Continuing Education Systems (AIA/CES). Credit(s) earned on completion of this program will be reported to AIA/CES for AIA members.

More information

Why secure PV fields. Why choose a fence-mounted intrusion detection system

Why secure PV fields. Why choose a fence-mounted intrusion detection system SECURE YOUR ENERGY Why secure PV fields To safeguard the investments made for the construction of a PV field, a security solution to protect the site against the theft of the panels and the acts of sabotage

More information

Middleborough Police Electronic Security Narrative

Middleborough Police Electronic Security Narrative Middleborough Police Electronic Security Narrative 1. PURPOSE The purpose of this document is to define specific security, access control and surveillance requirements for the exterior and interior of

More information

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade

More information

SECURITY SOLUTIONS BANKING AND FINANCE

SECURITY SOLUTIONS BANKING AND FINANCE SECURITY SOLUTIONS BANKING AND FINANCE Pacom has developed a distinguished reputation as a global leader in the field of remote security management for the banking and financial market. Over 25 years of

More information

Security Systems Surveillance Policy

Security Systems Surveillance Policy Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy

More information

Understanding Sage CRM Cloud

Understanding Sage CRM Cloud Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4

More information

Remote Guarding. The traditional guarding functions that you depend on can now be performed remotely.

Remote Guarding. The traditional guarding functions that you depend on can now be performed remotely. Remote Guarding Remote Guarding The traditional guarding functions that you depend on can now be performed remotely. When you have Remote Guarding managed by Securitas USA, we act on incidents in real-time

More information

Physical Security Assessment Form

Physical Security Assessment Form Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...

More information

Vindicator Security Solutions. Security for Mission-Critical Applications

Vindicator Security Solutions. Security for Mission-Critical Applications Vindicator Security Solutions Security for Mission-Critical Applications About Vindicator Security Solutions Photo courtesy of U.S. Department of Defense. Military, Federal and State Governments Ports

More information

Innovative approach to security solutions

Innovative approach to security solutions > > > > > Innovative approach to security solutions www.tehnomobil.eu/solutions This is why we in Tehnomobil believe that security starts long before the first smoke detector, card reader or camera is

More information

Security and Data Center Overview

Security and Data Center Overview Security and Data Center Overview September, 2012 For more information, please contact: Matt McKinney mattm@canadianwebhosting.com 888-821-7888 x 7201 Canadian Web Hosting (www.canadianwebhosting.com)

More information

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN Submitted pursuant to SF 439, Section 14 Iowa Department of Public Safety Senate File 439 of the 80 th General Assembly, Section 14(1) directed the Department

More information

Security Alarm Monitoring Protocol

Security Alarm Monitoring Protocol Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or

More information

Seventh Avenue Inc. 1

Seventh Avenue Inc. 1 Seventh Avenue Inc. Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supplier Questionnaire Seventh Avenue is a member of the Customs-Trade Partnership against Terrorism (C-TPAT).

More information

Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT

Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT Write up on PSIM PHYSICAL SECURITY INFORMATION MANAGEMENT Physical security information management (PSIM) is a technology solution that provides a platform and applications created to integrate multiple

More information

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Security Service de Services sécurité. Security Alarm Monitoring Protocol Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings

More information

Think Remote Monitoring Think Concept Pro Think VXM4B

Think Remote Monitoring Think Concept Pro Think VXM4B The VXM4B Range Digital Video Recorder and Remote Monitoring System Think Remote Monitoring Think Concept Pro Think VXM4B Not much more left to Think about Who watches over your business when you re not

More information

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION

ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION Reliable protection of facilities and intellectual property Intrusion prevention Workplace time and attendance Streamlining of staff needs

More information

Surveillance and Security Systems

Surveillance and Security Systems Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems

More information

Security Criteria for C-TPAT Foreign Manufacturers in English

Security Criteria for C-TPAT Foreign Manufacturers in English Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities. 2. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Where applicable, there must

More information

Home Security Assessment Checklist DATE

Home Security Assessment Checklist DATE Home Security Assessment Checklist DATE PREFACE The Home Security Assessment Checklist is designed to assist justices, judges, and other court officials in determining their level of security at home.

More information

Protecting your Home Business Future

Protecting your Home Business Future Eurotech Security Systems plc Protecting your Home Business Future Eurotech has been providing quality security systems and high levels of service for more than 25 years Our business customers vary from

More information

Site Security and Access Policy and Procedures. Written By. Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By

Site Security and Access Policy and Procedures. Written By. Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By Site Security and Access Policy and Procedures Written By Kent Walmsley Creation date Summer 2010 Adopted by Governors 7 December 2010 Reviewed By David Neild Last Reviewed date Autumn 2014 (VERSION 4)

More information

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1 TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1 Table of Contents 1. Operational Security 2. Physical Security 3. Network

More information

Intermec Security Letter of Agreement

Intermec Security Letter of Agreement Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism

More information

What s Best. for You? Protecting What s Important to You

What s Best. for You? Protecting What s Important to You c o m p r e h e n s i v e a c c e s s c o n t r o l What s Best for You? Protecting What s Important to You 1Locally Managed Access Access control is more than just keeping the bad guys out it s about

More information

... ... Why All Data Centers are Not Created Equal

... ... Why All Data Centers are Not Created Equal ... Las Vegas SuperNAP INFOSHEET... Why All Data Centers are Not Created Equal The Las Vegas SuperNap Auto-Graphics Data Center of Choice Auto-Graphics (A-G) offers its customers absolute flexibility when

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction Chapter 1 provides background information on electronic safety and secuirty (ESS), including the definition and areas of knowledge required for an ESS designer. Information contained

More information

Advanced Fencing and Security Technologies Ltd

Advanced Fencing and Security Technologies Ltd G.M. Advanced Fencing and Security Technologies Ltd P.O. Box 2327 Kfar Sava Industrial Area 44425, Israel Tel +972-9-7662965 Fax + 972-9-7662964 E-mail: info@gmsecurity.com Website: www.gmsecurity.com

More information

Conducting Security System Site Surveys

Conducting Security System Site Surveys Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM

More information

Security Technology. Virtual

Security Technology. Virtual Virtual Security Technology Complete Security Solutions for Communities Secure your Entire Community with an Envera Integrated System We were concerned residents would feel they weren t receiving the same

More information

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors. Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

APEC Private Sector. Supply Chain Security Guidelines

APEC Private Sector. Supply Chain Security Guidelines APEC Private Sector Supply Chain Security Guidelines 1 Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation

More information

Frankfurt Data Centre Overview

Frankfurt Data Centre Overview Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use

More information

AXS Biometric Security System

AXS Biometric Security System AXS Biometric Security System The SECU-AXS biometric security system components may be customized and used in numerous configurations to provide a full scale security and access control system to both

More information

Appropriate response: A guide to security system integration, monitoring and verification

Appropriate response: A guide to security system integration, monitoring and verification Appropriate response: A guide to security system integration, monitoring and verification The benefits of integrating intruder, fire, access control and audio systems with CCTV for verification of alarm

More information

Implanting Large Security Systems in Seaports

Implanting Large Security Systems in Seaports Implanting Large Security Systems in Seaports The Role of the Security Consultant Presented by Yuval Alon Senior Maritime Security Expert 1 Company s History 37 YEARS International Activity in Homeland

More information

COMITÉ EUROPÉEN DES ASSURANCES

COMITÉ EUROPÉEN DES ASSURANCES COMITÉ EUROPÉEN DES ASSURANCES SECRETARIAT GENERAL 3bis, rue de la Chaussée d'antin F 75009 Paris Tél. : +33 1 44 83 11 73 Fax : +33 1 44 83 11 85 Web : cea.assur.org DELEGATION A BRUXELLES Square de Meeûs,

More information

Global Supply Chain Security Recommendations

Global Supply Chain Security Recommendations Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed

More information

Professional Mobile radio. NEXIUM Wireless Mission-Critical LTE

Professional Mobile radio. NEXIUM Wireless Mission-Critical LTE w w w. t h a l e s g r o u p. c o m Professional Mobile radio NEXIUM Wireless Mission-Critical LTE DEFENCE SECURITY Delivering Defence & Security Mission-Critical LTE Resiliency, availability and security

More information

ASTRO 25 SYSTEM FOR MISSION CRITICAL DATA LEVERAGE YOUR ASTRO 25 SYSTEM INVESTMENT FOR MISSION CRITICAL DATA

ASTRO 25 SYSTEM FOR MISSION CRITICAL DATA LEVERAGE YOUR ASTRO 25 SYSTEM INVESTMENT FOR MISSION CRITICAL DATA ASTRO 25 SYSTEM FOR MISSION CRITICAL DATA LEVERAGE YOUR ASTRO 25 SYSTEM INVESTMENT FOR MISSION CRITICAL DATA Today s public safety agencies need more than just voice communications to get the job done.

More information

Coordinated Implementation of Facilities and Information Security Systems

Coordinated Implementation of Facilities and Information Security Systems Coordinated Implementation of Facilities and Information Security Systems HAYANO Shin-ichiro, TANIKAWA Tadashi, KITAKAZE Jiro Abstract In response to the increasing risk of information leakage, this paper

More information

Physical Security Information Management Software - Concepts - Solutions

Physical Security Information Management Software - Concepts - Solutions Physical Security Information Management Software - Concepts - Solutions A system is only as secure as its weakest link Technical Management Security Information Management ViPRO.solutions Communications

More information

Data Security Concerns for the Electric Grid

Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical

More information

A Self-Audit of Your Current Campus Security Systems

A Self-Audit of Your Current Campus Security Systems A Self-Audit of Your Current Campus Security Systems Security Solutions for Education, Business & Public Safety Free Consultations on ID Card Systems, Access Control, Call Recording, Video Surveillance,

More information

Protexial io WIRELESS AL ARM SYSTEM. O f fe r yo ur exp e r ti s e in h om e se c uri ty.

Protexial io WIRELESS AL ARM SYSTEM. O f fe r yo ur exp e r ti s e in h om e se c uri ty. Protexial io WIRELESS AL ARM SYSTEM O f fe r yo ur exp e r ti s e in h om e se c uri ty. Protexial io The Somfy W ireless somfy: A major AlArm BrAnd as a player on the alarm market for the past ten years,

More information

Court Security Guidelines

Court Security Guidelines July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative

More information

Tyco Integrated Fire & Security Advanced Integration Solutions

Tyco Integrated Fire & Security Advanced Integration Solutions MONITORING ACCESS CONTROL VIDEO SURVEILLANCE IP SOLUTIONS INTRUSION DETECTION INTEGRATED SOLUTIONS Tyco Integrated Fire & Security Advanced Integration Solutions For large-scale security system integration,

More information

Security Systems. Scenarios

Security Systems. Scenarios Security Systems While the basic functionality of a home security system is to alert the appropriate person of an unauthorized entry to your home, there are many other features which should be considered.

More information

MARULENG LOCAL MUNICIPALITY

MARULENG LOCAL MUNICIPALITY MARULENG LOCAL MUNICIPALITY Data Centre Physical Access and Environmental Control Policy Draft: Data Centre Access Control and Environmental Policy Page 1 Version Control Version Date Author(s) Details

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Generic RFID Software Platform for Any Application

Generic RFID Software Platform for Any Application FALKEN Secure Networks Inc. (FSN) has introduced a new paradigm to the RFID industry with its generic software platform to simplify System Integration, drive custom development costs out of system acquisition

More information

The remote CCTV monitoring specialists CCTV Monitoring

The remote CCTV monitoring specialists CCTV Monitoring The remote CCTV monitoring specialists CCTV Monitoring Providing security and total peace of mind 24 hours a day, 365 days a year! Welcome to Valleywatch Valleywatch is a specialist CCTV monitoring station

More information

Access Control, Integrated

Access Control, Integrated Access Control, Integrated An essential guide to integration of your security systems and the benefits that can bring Duncan Gooch Product Manager Copyright 2011 Time and Data Systems International Limited

More information

SECURITY AND GUARDING SERVICES ORDINANCE (Chapter 460) (Notice under section 6(1)(b)(iii))

SECURITY AND GUARDING SERVICES ORDINANCE (Chapter 460) (Notice under section 6(1)(b)(iii)) SECURITY AND GUARDING SERVICES ORDINANCE (Chapter 460) (Notice under section 6(1)(b)(iii)) MATTERS TO WHICH THE SECURITY AND GUARDING SERVICES INDUSTRY AUTHORITY SHALL HAVE REGARD WHEN DETERMINING AN APPLICATION

More information

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you

Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you Smile Security and Surveillance Pvt. Ltd. (SSSPL) Brings to you Building Management System Total Security & Surveillance Solutions for Building Complexes Intelligent Building Management System Solution

More information

Site Security Standards and Strategy

Site Security Standards and Strategy Site Security Standards and Strategy I. Background and Overview A. The City s Program Standards and Procedures (PSP) are intended to be used in conjunction with the data contained in related standards

More information

Increasing the city s attractiveness

Increasing the city s attractiveness www.thalesgroup.com URBAN SECURITY Increasing the city s attractiveness Thales Communications & Security 20-22 rue Grange Dame Rose - 78141 Vélizy-Villacoublay - France - Tel: +33(0)1 73 32 00 00 10/2013

More information

www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS)

www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) Certified Foundation Watchkeeper X is built to the same standards as a manned aircraft, and conforms to CAA/MAA standards. It

More information

SYRACUSE CITY SCHOOL DISTRICT

SYRACUSE CITY SCHOOL DISTRICT SYRACUSE CITY SCHOOL DISTRICT EMERGENCY OPERATIONS PLAN Sharon L. Contreras, Superintendent of Schools Effective Date: September 2014 1 Table of Contents Contents Section I. Introduction:... 4 1.1 Purpose...

More information

Best Practices for Safer School Facilities

Best Practices for Safer School Facilities Panelists: Laura Santos-Farry Director of School Safety and Risk Management, Eanes ISD Brian K. Combs Vice-President, COMBS Consulting Group, LP Shevis Moore Asst. Director of Loss Prevention Services,

More information

C-TPAT Importer Security Criteria

C-TPAT Importer Security Criteria C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources

More information

Temaline Solutions. Raising the benchmark in security and people management

Temaline Solutions. Raising the benchmark in security and people management Temaline Solutions Raising the benchmark in security and people management Honeywell Temaline solutions The standard in integrated enterprise-wide access control, time & attendance management and intruder

More information

THE RIGHT FOUNDATION FOR IMPROVING YOUR CUSTOMER INTERACTION

THE RIGHT FOUNDATION FOR IMPROVING YOUR CUSTOMER INTERACTION DISCOVER THE POWER OF ALCATEL CONTACT CENTERS THE RIGHT FOUNDATION FOR IMPROVING YOUR CUSTOMER INTERACTION An unhappy customer is rarely a customer for long! Securing customer loyalty is vital to developing

More information

How to Solve the Most Persistent Problem in Perimeter Security Systems

How to Solve the Most Persistent Problem in Perimeter Security Systems How to Solve the Most Persistent Problem in Perimeter Security Systems Duane Thompson General Manager of Fiber SenSys Carrondo, Antonio Commercial Manager, Teleprinta Perimeter Security Challenging!! More

More information

ABSOLUTE SECURITY. IVRI Group. Corporate Profile December 2012

ABSOLUTE SECURITY. IVRI Group. Corporate Profile December 2012 ABSOLUTE SECURITY IVRI Group Corporate Profile December 2012 About us Chi siamo For over 60 years IVRI GROUPhas been the market leader in Italy for surveillance and the private security sector with a nationwide

More information

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7 Page 1 of 7 1.0 GENERAL 1.1 Related UBC Guidelines.1 Section 17910, 17920 and 17930.2 Section 17100 Cable Infrastructure Overview, sub sections 1.4.9 and 1.5.3 Section 17110 Communication Rooms, sub section

More information

Electronic Security. For Financial Institutions

Electronic Security. For Financial Institutions A partner you can bank on Our bank was growing. New branches. New card processing center. We wanted to tie access control, alarm monitoring and video surveillance into one system we could monitor from

More information