School Security Booklet



Similar documents
SCHOOL SECURITY SELECTING THE MEASURES

Lincoln Minster School. Security

Guide for Non-Profit Housing Societies Security Guide Table of Contents

SECURITY SURVEY AND RISK ASSESSMENT. any trends or patterns in the incidents occurring at the school; the efficiency of the chosen security measures.

Car Security Begins at Home

Designing Out Crime Assessment

NSW POLICE FORCE. Home Safe

SCHOOL SECURITY SURVEY

Protection of unoccupied or void properties

Policing requirements for Closed Circuit Television

Why home security is important. Contents

Crime Prevention through Environmental Design (CPTED) - Checklist

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

BUSINESS SECURITY AUDIT

Home Security Inspection

Closed Circuit Television (CCTV) code of practice. Based on the publication A Code of Practice for CCTV

Secured By Design (SBD) New Schools 2014 Application & Checklist

Garden Security. Redbridge Borough Police Shed, Garage and Garden Security Guide

Remote Monitoring offers a comprehensive range of services, which are continually

Preventing arson in buildings

Business security audit

Appendix G. Security management plan

Effective Solutions for Increased Security in NH Public Schools. State of New Hampshire Division of Homeland Security and Emergency Management

Check Your Home Security

CCTV User Group GUIDE FOR SMALL USERS. PRIVATE and COMMERCIAL

RAVENSCOTE JUNIOR SCHOOL. Security POLICY. Headteacher

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

PersonalSafety. in and around the home

Security Systems Surveillance Policy

POLICY FOR USE OF CCTV SYSTEM AT BOW SCHOOL OF MATHS AND COMPUTING SCHOOL

Security Services Policy and Procedures

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business

Commercial Burglary Prevention

Court Security Guidelines

PROOF ONLY. Police and Fire Service Home Security & Fire Safety Checklist. Student Accommodation Security Checklist

PREVENTING HOME SECURITY

A GUIDE TO HOME SECURITY

ISO IEC ( ) INFORMATION SECURITY AUDIT TOOL

Policy Document. IT Infrastructure Security Policy

A practical guide to IT security

Does a fence or other type physical barrier define the perimeter of the facility?

Home Security Assessment

Watching Your Business Fire & Security Solutions

Residential House and. Residential House and FOR POLICE, HOME OWNERS, RENTERS, BODY CORPORATES AND DEVELOPERS

Crime Prevention: A Guide for Small Businesses

All YOU need to know to secure YOUR HOME

CHAPTER REVIEW OF SECURITY IN SCHOOL DESIGN IN IRELAND

HOME SECURITY A BASIC GUIDE

EMERGENCY MANAGEMENT IN SCHOOLS

This guide sets out what forms of shop front security will and will not be acceptable to the Council.

Conwy Deposit Local Development Plan (Revised edition 2011)

Restaurant & café guide

The definitive guide to consumer perceptions on home security in Australia. Secure Homes Report. ADT Always There

The remote CCTV monitoring specialists CCTV Monitoring

UK SBS Physical Security Policy

Think Remote Monitoring Think Concept Pro Think VXM4B

INSURANCE ADVICE ON HOME SECURITY

Physical Security Policy


Security Policy and Procedures

CABINET. 24 April Title: Term Contract for Maintenance, Repair and Minor Works on Security and Protection Systems

Secure Homes Report Master Licences: VIC No P WA No. SA42314 SA No. ISL NSW No ACT No QLD No.

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/ Officer: Case No:

MONROE POLICE DEPARTMENT

Physical Security Policy

BRANCH SECURITY REVIEW CHECKLIST

Title NSW Police Business Security Assessment. Subject Assessment of business security. Command responsible Operations Support Command

INTRUSION ALARM SYSTEM

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

GENERAL GUIDE FOR MANAGING CASH-IN-TRANSIT SECURITY RISKS

RISKSTOP CONTROLLING RISKS IN UNOCCUPIED COMMERCIAL PROPERTIES

Home Security Assessment Checklist DATE

Business Protection Online Activity Store Self Assessment

Allianz Insurance plc. Home Security. Home

How To Protect Decd Information From Harm

University of Birmingham. Closed Circuit Television (CCTV) Code of Practice

Emergency Planning Guideline

GUIDE TO SPECIFYING A CCTV SYSTEM

Palm Beach County Sheriff s Office

Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template

We advance safety and security by finding smarter ways to save lives, improve businesses and protect where people live and work.

Health & Safety Policy For Locations Hosting Film Production Companies

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Security Service de Services sécurité. Security Alarm Monitoring Protocol

How To Protect A Water System

Cyber Security Response to Physical Security Breaches

GUIDE TO HOME SECURITY

Security Alarm Monitoring Protocol

A Self-Audit of Your Current Campus Security Systems

SECURITY OF BUILDINGS, GROUNDS AND OTHER ASSETS

Keeping your identity safe. Keeping you safe. Your home, shed and outbuildings. Bogus callers. Keeping your things safe. Internet safety.

Security guidance for all existing or prospective Home Office Controlled Drug Licensees and/or Precursor Chemical Licensees or Registrants

Commercial or Business Security Survey

CCTV Cameras Policy. Policy Guidelines

Integrated Physical Security and Incident Management

Barrington Hills Police Department

UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012

Major Risks and Recommended Solutions

Palm Beach State College Security Plan

Transcription:

Community Safety Bureau School Security Booklet Selecting the Measures

1 Introduction: - 1.1 The Local Education Authority and the Leicestershire Constabulary Community Safety Bureau are working together looking at security and personal safety in educational premises. As part of this partnership, security surveys have been undertaken in a large number of schools throughout Leicester, Leicestershire & Rutland. 1.2 This booklet has now been completed as a result of this work. Whilst it is acknowledged that no two schools are identical and that the design of the buildings and the lay out of the site will differ from school to school, many of the issues revolving around security are generic. 1.3 Criminals have nearly always seen schools as a soft target. Most schools were built many years ago at a time when security would not have been seen as a briefing issue. Indeed a number of schools were originally built in the thirties and fifties as temporary schools with a ten-year life span. Some are still in use today, but because of the design and the materials used in their construction, they incorporate additional areas of vulnerability. All these features coupled with frequent and long holidays add to the vulnerability of schools to criminal attack. 1.4 Good security management is about being proactive rather than reactive and prevention rather than detection. This must be borne in mind when planning your school's security. Crime against schools falls mainly into the following categories : Theft by insiders (pupils, staff); Vandalism by insiders (mainly pupils); Theft & vandalism by outsiders connected to the school (pupils relatives, old pupils); Theft & vandalism by other outsiders (local gangs); Arson;

2 Contents; 1. Introduction.. 1 2. Outline 3 3. School Security Risk Assessment The Approach. 4 4. Health & Safety Risk Management Policy 4 5. Perimeter fencing considerations.. 5 6. Car parking and cycle security 6 7. Landscaping / Defensible Planting. 6 8. Directional and Warning Signs 7 9. Security Lighting 7 10. Closed Circuit Television Systems ( CCTV ) 8 11. Protecting the school roof.... 10 12. Windows and External Doors.. 11 13. Intruder Alarm 12 14. School Office / Reception Access Control. 13 15. Daytime security of vulnerable offices / rooms 13 16. Secure Store / IT Suite. 14 17. Computer Security 15 18. Computer Projectors... 16 19. Property Marking.. 17 20. Good Neighbour Scheme.. 18 21. Conclusion & Bibliography. 19 Appendix A = CCTV Good Practice Guidelines... 20 Appendix B = CCTV & Video Evidence. 23 Appendix C = Intruder Alarm Advice.. 28 Appendix D = Section 547 Education Act 1996.... 29 Appendix E = Occupiers Liability Act 1984 and Section 164 Highways Act 1980. 30 Appendix F = Security / Assessment Questionnaire. 31

3 Outline: - 2.1 This booklet is intended only as a guide to school security and to compliment the documents issued by the Department for Education and Skills on School Security and the Management of School Premises. Further information can be found on the Internet at www.dfes.gov.uk/schoolsecurity. The recommendations are made in good faith. The suggestions contained in this booklet are proven deterrents. They do not in themselves form any part of a guarantee that you will not become the victim of crime in the future or that further offences will not take place, but they reduce the laws of probability by enhancing your security and thus also reducing the fear of crime. 2.2 School security is ever changing and needs to be kept under constant review, with vulnerable areas identified and remedial actions implemented to address them, Neglect is infectious. 2.3 One of the main objectives of this booklet is to bring the issue of security within the school environment to the forefront and offer you advice which is cost commensurate to the risks, realistically achievable and suitable for purpose having taking account of local conditions. A well-managed and maintained school will convey a sense of security.

4 School Security Risk Assessment The Approach; 3.1 In looking at the security of your school you should start at the perimeter (site boundary) and work your way in (internal security) recognising areas of concern and identifying potential measures which could be implemented to address these. This is known as the onion peeling approach. The layout of this booklet follows this line. 3.2 Good access control measures should be prioritised for daytime security of the school and the personal safety of all users. Such control displays that of a wellmanaged and maintained environment in which security is a significant consideration in the day to day running of the school. 3.3 Designing out Crime and other anti social behaviour from the school environment out of hours, will require a much more holistic approach, combining both physical and electronic measures with passive, natural or formal surveillance methods and other fundamental and intrinsic crime prevention techniques. 3.4 Please see Appendix A for a copy of a Security / Risk Assessment Questionnaire which you could fill out as a precursor to the drafting of a school security policy. Health & Safety Risk Management Policy: - 4.1 All schools should have appropriate security measures in place. Security is not just about choosing the right control measures, it is an attitude of mind. Security measures are tools and should be treated as such. To ensure the support of staff, it is helpful if they are involved in the planning of security measures. All school staff, teaching and non-teaching should be familiar with security procedures. 4.2 Security and personal safety should be dealt with from a Risk Management point of view, i.e. taking steps to reduce the likelihood of loss or damage to the school or injury to staff and pupils. It could be included within a combined Health and Safety plan/policy for the school and be an agenda item for School Governors and P.T.A. meetings, even if it is not intended to discuss specific security issues. 4.3 The risks to schools are dynamic and need to be kept under constant review. A Risk Management Team should meet, at least on a monthly basis to discuss issues of security and safety and take the necessary steps to implement remedial actions to address any concerns. Its membership should include representatives from all levels of the school, including teaching and non teaching plus the site supervisor. 4.4 This would provide for a balanced view from all those responsible for the secure well being of the school. Limited funding from within school budgets should be allocated, whilst at the same time members of the R.M.T. would be tasked with identifying and applying where appropriate for funding from outside agencies

i.e. sponsorship, extra money from government or local authority for school security. 5 A) External Environment recommendations Perimeter fencing considerations; 5.1 The main vehicular and pedestrian approaches should ideally be overlooked by the school office/reception. Separate secondary entrances around the perimeter for pedestrians are commonplace, but to increase security they should be opened only at peak arrival and departure times. Appropriately worded signs should be displayed indicating opening times and directing callers to the school office at all other times. It is important that the public knows the extent of the school grounds. The following is an extract from the 1996 DFEE publication "Improving Security in Schools." Security fencing:- The purpose of security fencing is to prevent intrusion. A 1.8-2m high fence usually deters the casual intruder and dog walkers. To deny access to determined intruders the fence must present a formidable obstacle, at least 2.5m high and be able to withstand a high level of physical attack. In very high-risk schools, 3-3.5m may be needed. Fencing of this type is typically palisade or weld-mesh and usually requires planning permission. To be effective it must be continuous and all gates must offer the same protection as the main fence line. The long perimeters of many schools make it a very expensive option. Fencing inner area:- A cheaper alternative is its use to enclose an inner perimeter, or to close off recesses, altogether with an increase in the security of the building envelope, whilst maintaining means of escape in the event of fire. This can be just as effective as completely encircling the school boundary. Fencing needs to be inspected to check for breaching, e.g. by digging underneath or other damage. Additional comments and recommendations: - 5.1.1 In addition to the above, it is recommended that you should consider the following points before commissioning the erection of any fencing. 5.1.2 Grey galvanised palisade fencing is not recommended as it exudes an oppressive atmosphere and is not in keeping with the ambience of a school. This type of fencing also has a number of inherent weaknesses and needs to be properly and professionally installed.

6 You will frequently find gaps at the bottom of gates large enough for a person to crawl under. Additionally unless the aperture allowing access to the locking bolt is properly protected this can act as a step enabling person to easily scale the gates. These are some of the issues that you need to consider. 5.1.3 There are many different styles of metal fencing available that are more sympathetic to a school environment whilst at the same time providing the requisite degree of security. Robust weld mesh or paladin panels, powder coated (coloured) palisade or a vertical bar style (i.e. Heracles) to an appropriate height commensurate with the risks, should be considered. Chain link is no more than a boundary marker and is unsuitable for security. 5.1.4 Fencing needs to be regularly inspected to check for breaching, e.g. by digging underneath or other damage. 5.2 Should you require further advice on the issue of fencing or details of at least three companies who would be able to complete such work, please do not hesitate to contact your Local Crime Reduction Officer. There is no financial implication in obtaining quotes from such companies. Car parking and cycle security: - 6.1 It is only recently that schools have been designed with realistic levels of car parking facilities. Most have had to adapt existing space. Everyone parking in the school grounds should clearly understand that they are responsible for the security of their vehicle and its contents. However, it is good practice to provide some vehicle security. This is better located away from play areas, but with good surveillance opportunities from the school office and/or occupied classrooms. Lighting for evening and winter use may be necessary. 6.2 Cycle Storage: A secure area with good surveillance opportunities should be provided for the storage of bicycles. Landscaping / Defensible Planting; 7.1 The prudent use of hostile/defensible shrubs, bushes or thorny hedgerows such as berberis, pyracantha or hawthorn can help prevent graffiti and loitering and can be used to reinforce perimeter fencing as appropriate. Landscaping should not impede the opportunity for natural surveillance and must avoid the creation of potential hiding places. It has a less forbidding appearance and can be very effective.

7.2 Attention should be given to the location of walls and hedges so that they do not obscure doors or windows, and the position of trees that may become climbing aids into property or obscure lights/cctv cameras. 7 Directional and Warning Signs: - 8.1 The effectiveness of your School Security Strategy can be enhanced with the prominent display of; A) Directional signs indicating the location of and the route visitors should follow to the school reception /office. B) Appropriately worded warning signs regarding the presence of an alarm system, monitored CCTV, trespassing and the fact that all property of value on the school premises is property marked.. 8.2 The implementation of such measures will have a deterrent value far outweighing the expenditure involved. The best results can be achieved by first considering the size, layout, warning message, and colouring. 8.3 Section 547 Education Act 1996 (Appendix F ) Nuisance or Disturbance on school premises: - Any person who without lawful authority is present on school premises and who causes or permits nuisance or disturbance to the annoyance of persons who lawfully use those premises (whether or not such persons are present at the time) is guilty of an offence and liable on summary conviction to a fine not exceeding 500. Rider: - Dogs fouling the school grounds is a health hazard. 8.3.1 A person exercising the power confirmed by section 547 shall be a police constable or a person authorised by the local authority or, in the case of aided or special agreement schools, the school governors. 8.3.2 Optimum colouring for such signs would be red and white or similar contrasting colours. 8.3.3 Trespass signs are available from the LEA. Security Lighting: - 9.1 All lighting needs should be appraised having consideration not just for security but also for the Health and Safety of staff, pupils and other users of the school buildings throughout the year. 9.2 To be successful, security lighting must be reliable and provide adequate levels of illumination. In addition those areas lit, must be under regular

surveillance from one or more of the following, otherwise any benefits provided could be compromised. 8 Neighbouring property or passing traffic; CCTV, in which case infra red (black or non visible light) can be used; Random/regular Security patrols. 9.3 Lighting units are prone to vandalism and will need to be suitably protected. Experience has shown that illuminated areas that do not benefit from additional perimeter protection or surveillance can and do become informal, floodlit play areas. The DFEE Building Bulletin 78 gives more details on security lighting. Closed Circuit Television Systems ( CCTV ): - 10.1 In schools where a quality CCTV system has being installed, it has had a dramatic impact. This is not just restricted to out of hours security but also in dealing with daytime security and issues of personal safety of pupils, staff and users of the site. An effective CCTV system is a combination of people, procedures and equipment. 10.2 All such strategies should be compliant with The Data Protection Act 1998. Under this act the Data Protection Commissioner should be notified of all CCTV scheme covering areas to which the public have access, whether by payment or otherwise. System should be suitable for their stated purpose and operate to a code of practice. 10.3 In considering CCTV, it is first important to have an Operational Requirement and be able to specify exactly what it is you want the system to do. There are different types of CCTV systems on the market, colour or monochrome, incorporating digital or analogue recording facilities. Outlined below is a summary of available CCTV. This is by no way definitive as the array of equipment and its applications can at times even be confusing for those involved in the industry. Monitor only, with visual camera usage only i.e. no recording capacity. 24 hour recording facility. Fully monitored system with recording and response personnel i.e. security staff or police. Local monitoring in-house (with or with out PA facility). Central Monitoring in an in-house control room (with or without PA facility). Remote monitoring by a security company i.e. Service Provider (with or with out PA facility).

10.4 When looking at the cost implication and the feasibility, it will also be necessary to consider the quality of the surrounding lighting. 10.5 The evidential value of a system will depend to a large extent on the attributes of the equipment initially purchased, providing that it is managed and operated in a proper manner i.e. the lens, recording facility, monitoring, maintenance and operating practices. If used in the right place, in the right way, with the right equipment it can be very effective. 10.6 People will budget for the initial outlay and installation, often forgetting who is going to be responsible for the day-to-day management, maintenance and monitoring of the system. The annual maintenance and running costs involved in maintaining the integrity of the system and the value of recorded data for evidential purposes can soon exceed the initial outlay for the equipment. 10.7 In addition to fixed cameras covering identified vulnerable areas and approaches to the school, properly positioned and programmed, colour, pan, tilt and zoom dome style cameras, housed within vandal resistant casing should also be considered. 10.8 It is acknowledged that this type of equipment is very expensive and you would have to install your CCTV in stages, as funding became available over the coming years. One colour PTZ camera will give you more flexibility and better coverage than could be achieved using six fixed cameras. 9 Such cameras fit neatly into a school environment. They are discreet, unobtrusive and aesthetically pleasing, providing you with the requisite level of formal surveillance, security and safety without increasing the perception or fear of crime amongst visitors or users of the school premises. 10.9 Out of school hours this system could be linked to a remote monitoring station. The cameras whilst having a programmed patrol are also linked to external sensors. Once one of these sensors is triggered, the camera will pan around to that point and the activation alerts the monitoring station. The operator calls up your site and takes control of the relevant camera. They can then scan the area and interrogate the system, to see what caused the activation and if appropriate issue a verbal warning to those on site. A small number of schools already have such a system and are extremely pleased with the results. 10.10 An important deterrent feature of whichever system you adopt is its visibility. The prominent display of appropriately worded signs is strongly recommended. It is also a requirement under the Data Protection Act 1998. The optimum colouring for such signs would be red lettering on a white background or black lettering on an amber/yellow background. The Data Protection Act 1998 Summary of implications for CCTV;

10 The 1998 Data Protection Act became law on 1 st March 2000. The definition of data now covers CCTV pictures. There must be a legitimate basis for installing CCTV. Clear visible signs should be placed in the proximity of cameras so that the public are aware they are being monitored, and who is responsible for the monitoring scheme. The Data Protection Commissioner must be notified of a system and its purpose. All equipment must be fit for purpose. Information must be processed fairly and lawfully, documented, and retained no longer than necessary. Images may only be disclosed if compatible with the purpose of installing cameras e.g. to police for the prevention or detection of crime and the offender. Individuals who are the subject of stored data images must be allowed access to them, subject to certain restriction. Please see Appendix B for additional information on good practice for CCTV. Should you be considering CCTV and require further information, please contact your local Crime Reduction Officer on 0116 2222222. B). Building Shell - recommendations Protecting the school roof & the use of anti-scaling devices 11.1 Nearly all schools are vulnerable in some degree or other to youths climbing. Much damage is caused to the fabric of the roof by this unauthorised access. The damage frequently goes unnoticed until it rains and the roof starts to leak or other ancillary damage is caused to pipes or wiring. 11.2 A number of measures can be adopted by schools, reducing their vulnerability to this type of negative attention. Good perimeter fencing can assist with restricting access to the school site out of hours. For further information please see paragraphs 5.1-5.3. Depending on the risk you may wish to consider suitable topping in areas of greatest vulnerability. Please see paragraphs 8. Suitable worded warning signs regarding trespass, the danger of climbing on roofs and the application of anti-climb paint in vulnerable areas.

11 CCTV as detailed in paragraph 10.1-10.10. Defensible hostile planting at ground level. Please see paragraphs 7.1-7.2. Designing out of climbing feature. Application of anti-climbing paint, or other anti-scaling device i.e. rotating vane or cacti spikes, crown of thorns or other suitably customised barrier restricting access. 11.3 Before implementation a risk assessment should be undertaken to ensure the health and safety of the pupils and other users of the school premises. 11.4 Please see Appendix E for additional information regarding the law in relation to the use of anti scaling devices. Windows and External Doors; 12.1 The main entrance door to the school should incorporate some degree of access control such as a remote electronic lock release device incorporating an intercom and visual verification if this entrance is not overlooked from the office / reception. 12.2 All windows and doors should be checked and assessed to ensure that the locking mechanism are in working order, providing you with the appropriate level of security commensurate to all prevailing risks i.e. they are suitable for purpose. 12.3 All doors should be of a sufficiently solid nature and adequately secured against potential break-in. 12.4 Remedial actions should be implemented to address any identified weaknesses. 12.5 All fire exits doors should be devoid of external door furniture. 12.6 All ground floor or other easily accessible windows above ground floor level should have suitable key operable locks fitted for additional security. 12.7 Have you considered security bars or grilles particularly for the most vulnerable windows? 12.8 Consideration should be given to permanently securing windows not required for ventilation or other health and safety reasons. 12.9 Windows that are frequently the target of malicious acts of vandalism can be a major drain upon building maintenance budgets. Options to reduce the incidence of broken windows include:

Keeping yards and grounds free from any material that could be used as ammunition. Reducing the amount of glazing. Sometimes windowpanes can be replaced by solid panels without noticeably reducing natural lighting levels. This will also result in significant energy savings; Use of laminated glass in vulnerable areas. Use of polycarbonate glazing if suitable, in vulnerable areas. Polycarbonate glazing is not suitable for use as safety glass. Use of adhesive security film. Use of shutters or grills to protect the glazing. 12 Intruder Alarm: - 13.1 It is accepted that at the time these systems were initially installed, they were suitable for their intended purpose. However due to numerous ongoing changes in policy, procedures and equipment over the years the majority of these systems no longer offer the essential high standard of security now demanded by schools. 13.2 The deterrent value of the intruder alarm is reduced due to the lacking of visible external intruder alarm boxes. These are generic issues common to most schools. 13.3 It is recommended that visible intruder alarm boxes with a company logo and an LED light are erected on all buildings front and rear. Reason: - Within the school environment a visible alarm system is preferred. The prominent display on external elevations of alarm boxes incorporating LED (Light Emitting Diodes) lights, with a visible company logo provides for a better degree of prevention. 13.4 The alarm system needs to be regularly maintained by a suitably qualified intruder alarm installer. It should have at least one service visit per year. 13.5 The system should cover all areas of the buildings. 13.6 If the alarm system were to be modernised or extended at anytime in the future, I would strongly recommend that it be connected to the police via a remote monitoring station as opposed to the council. This would give you a guaranteed police response to activation s subject to compliance with the Association of Chief Police Officers security Systems Policy 2000. 13.7 Please see Appendix C for further advice and details of compliant intruder alarm companies. Please note that under normal circumstances these companies will carry out a survey and offer you a quote free of charge.

13 C). Internal Security School Office / Reception Access Control; 14.1 Good access control is the matrix to the security for any school during the school day. Procedures should be in place to ensure as far as is reasonably practicable, that no one is able to access the school buildings unacknowledged and that once in the building, systems are in place to protect or help pupils and staff, should support become necessary. 14.2 You should have one entrance to the school building via the office / reception, with clear directional signs indicating its location to visitors. In turn this door should incorporate suitable access control with a remote electronic lock release, intercom and visual verification (CCTV). 14.3 It is recommended that all visitors including school governors etc. should initially report to the school office / reception, where the purpose of their visit can be established prior to them signing in and being issued with a visitor s badge, valid only on the day of issue. 14.4 In many secondary schools, pupils man a reception desk in the foyer as the first point of call for visitors. These pupils may be put at unnecessary additional risks, as they could potentially have to deal with a volatile parent or other member of the public. Schools should consider the health and safety implications and ensure that appropriate measures are implemented, taking all reasonable practicable steps to reduce identified areas of risk. 14.5 Visitors to the school should not be allowed to wonder about the school unaccompanied. 14.6 Identification provided by local authorities, utilities or other organisations should not be accepted as an alternative to the school s own system. 14.7 To further enhance the measure outlined above it is strongly recommended that all staff wear ID badges. This will increase the effectiveness of the visitors book and badge system and make it easier to challenge those not wearing the appropriate badge. 14.8 Persons not displaying the proper identification would be more obvious to all legitimate users of the school building and could be politely challenged and escorted back to reception to sign in and obtain a visitors badge. Daytime security of vulnerable offices / rooms: - 15.1 Offices, staff rooms, IT Suites and store rooms etc. within a school will require additional security measures to protect against the casual walk in thief whether the offender is a stranger to the school or otherwise.

15.2 Examples of vulnerable items would include Laptop computers, mobile phones, computer peripherals, software, CDs or DVDs, wallets, purses, bags, information and any other items that can be easily carried and concealed. 15.3 Doors to these rooms should be fitted with self-closure devices and suitable access control locks i.e. numeric keypads or electromagnetic locks with proximity or swipe card facility. These would enable a school to have greater control over who accesses a particular room or area. Use could be limited to authorised personnel only. 14 Secure Store / IT Suite: - 16.1 Intruders are unconcerned about damage and are willing to destroy several items of equipment to steal one. A secure store area should always be considered for the storage of those items most at risk i.e. computer projectors, laptops, digital cameras, musical instruments, money, etc. 16.2 Whilst it is accepted because of the very nature of materials used in and the construction of some schools there will be circumstances where schools may be unable to achieve the standards set out below. To compensate for this fact, all efforts must be made to identify the most secure area and incorporate security features suitable for purpose. 16.3 A secure store should resist attack by any means up to, but excluding power tools and flame cutters for at least fifteen minutes. A locked door or any locked metal lockers, desk drawers and filling cabinets contained within, does not make it a secure area. Locate centrally within the school and above ground floor where possible. Ensure the approach and the room itself is included in the coverage provided by the school intruder alarm system. Existing classrooms and storerooms will require considerable adaptation before they can meet the fifteen-minute rule. Decide on the necessary security hardware i.e. Roller shutters, grills/bars locks etc. Security of all access and egress doors designed to withstand attack. Windows suitably protected to fit in with the school environment, using roller shutters or collapsible grills. Ensure walls offer the same resistance as doors and windows e.g. attack with sledgehammers. Prevent access through ceiling voids or from roofs. 16.4 If required your local Police Crime Reduction Officer can offer further advice on identifying a suitable room within your school. Please ring 0116 2222222 to make an appointment.

15 Computer Security; 17.1 Information Technology plays an ever increasing role in the education of the young and the administration of schools. Computer projectors, laptops, flat screen monitors are target items for burglars and are, in everyday use in schools across the country. The security of these needs to appropriately considered. 17.2 Whilst all computers, including those used for administrative purposes require additional security features, to prevent their theft or someone from tampering with them, the equipment mentioned above also needs to be considered taking account of all risks. These items or parts of, such as memory chips, computer projector bulbs, keyboards, optical mice, printers or scanners etc. can be target items for both the professional and opportunist thief. 17.3 Having any computer stolen or damaged would have an impact for any school and not just with the money you spent buying it or the money to replace it. There's the inconvenience to the school and the disruption to the education of pupils with the loss of records and schoolwork and the possible negative impact such an incident would have on a schools good name. 17.4 I recommend that all rooms containing such equipment should be secured with a solid door incorporating a substantial locking device. Additionally these devices may also include a form of push button combination lock and self closer, which could be used during the day, so that persons authorised, would not be restricted from using these rooms or the equipment within. Out of hours these locks should not be used to protect these areas and the main locking devices would also have to be engaged. 17.5 To protect the computer hard drives you will require a total enclosure device. The retaining base plates of such units should be secured to a table or raw bolted to the floor. They are designed to frustrate dismantling and will combat theft and removal of components. 17.6 Cable-restraint products should be used for ancillary equipment such as keyboards and display screens, which require minor position changes during use. 17.7 Suitable anti-virus and firewall software should be installed to protect the systems from malicious attack from hackers etc. 17.8 Outlined below are some additional things you can do now to protect your computer equipment and your school. You can: Use cable restraints and anchoring devices to protect work stations. The linking of all units in an IT suite is recommended. Kensington chains or similar devices to protect laptop computers. Establish measures to control use and movement of equipment.

Mark your equipment - Brand the exterior shell of equipment and mark exterior and interior where safe and possible with postal codes. Keep an audit and record all details of equipment serial numbers/identification marks. Details need to be readily available in the event of theft. Anchor equipment to solid furniture, floors or nearby walls using appropriate means. IT suites and offices containing computers and peripherals should be protected by the intruder alarm system. Store computer equipment within secure rooms/cabinets when buildings or departments are unoccupied. Introduce appropriate access control as outlined previously (page 14 paragraph 14.1 14.7). Ensure mobile and laptop computers are properly secured when used away from the school. Review existing security precautions, regularly. If you need more advice then contact your local Crime Reduction Officer who will be pleased to help. 16 Computer Projectors: 18.1 Currently, within the school environment the theft of Data Projectors is causing great concern. The security of these needs to be appropriately assessed. It should also be noted that sometimes these projectors are stolen for parts. Bulbs are very expensive to replace costing in excess 0f 100. Would you leave a Laptop computer on full view in an insecure and unoccupied classroom? A Data projector costs as much if not more. Overt property marking using a highly visible method should be undertaken and signs prominently displayed saying that this has been undertaken. Consider painting the exterior with a suitable paint. Check with supplier as to how this can best be done with minimal effect on warranty (invalidating). Balance the cost of replacing a broken projector with that of replacing a stolen one and all other costs associated with being the victim of a burglary. Remove projectors at the end of each school day and place in a secure cabinet and lock the classroom or alternatively place in a secure store-room. Classroom doors should be secured as in D below. As a minimum the projectors should be stored away at weekends and school holidays. A proper set of steps, an electric screwdriver and two people will be required as a minimum. A secure room/store is defined as a room with brick concrete block walls, PIR, no roof lights, and a solid timber door secured with the minimum of a 5

lever mortise lock kite marked BS 3621. A metal roller shutter could also be considered. A secure cabinet is a proprietary security cabinet anchored to the fabric of the building. Projectors fixed to a ceiling mounted pole should be secured using a proprietary entrapment device. It is important to ensure that the pole is adequately secured to the ceiling or unbolt it. All rooms containing projectors should be alarm protected as should the approach. It should be configured so a confirmed alarm is achieved when intruders enter the room. Additional security of windows and fire exit doors also needs to be considered. Prevent walk-in thefts by always locking classrooms when unattended. Always confirm the identity of contractors and always escort visitors whilst on the premises. As with all items of value, do not leave them insecure and/or unattended whilst transporting. Fully record all details and where mark for auditing purposes and to aid identification if stolen/lost. 18.2 Security companies supplying equipment. These details are offered to allow you the opportunity of making a reasonable and realistic informed decision on appropriate, cost commensurate security. www.top-tec.co.uk www.bossuk.com www.integrex.co.uk www.interactive-whiteboards.co.uk 17 Property Marking: - 19.1 By clearly marking your property, particularly your I.T. equipment, it makes it less attractive to a potential thief. They find identifiable property dangerous to handle and difficult to dispose of. There is an increased likelihood of your property been returned, if stolen. I accept that it is always possible for the markings to be defaced or removed, but this reduces the resale value and also extends the time the thief is at risk. 19.2 In a school environment I would recommend the use of visible marking as I feel they have a far more effective deterrent value. In you circumstances this can be best achieved by using a stencil solution marking system which cannot be erased. This is a visible, professional, cost effective and aesthetically pleasing way of marking your property. 19.3 A cheaper alternative would be to scratch, engrave, stencil or stamp the post code and school name on to equipment. The standard, quality and aesthetic

features of this type of marking will rely on the person nominated to carry out such work. 19.4 The use of property marking within the school needs to be clearly displayed and should be clearly indicated on school literature by incorporating company logos where permissible along with suitable wording i.e. School Property is protected by ACME Property Marking Systems. 18 Good Neighbour Scheme: - 20.1 This would work along the lines of an active Neighbourhood Watch scheme which encourages members of the community to take an interest in protecting each others property as well as their own. The effect this has is to develop community spirit, reduce crime, enhance personal safety and lessen the public perception and Fear of Crime. 20.2 The object of the scheme would be cut down on burglaries, theft and vandalism by reducing the number of trespassers on the school grounds out of hours. 20.3 Trespass on school premises is a serious problem. It takes many forms. The school grounds may provide a convenient shortcut and playing fields used for unauthorised organised football games, dog walking, golfers or informal association areas in which local youths just hang around. 20.4 Historically schools are seen as belonging to the local authority and at worst, belonging to everyone and no one s responsibility. Such a scheme would involve encouraging those persons who overlook your school to use a set procedure for reporting intruders and trespassers on your school. 20.5 In launching such a scheme, local residents would need to be circulated with a letter outlining the problems your school is suffering and the effect, this has on the school budget and how this in turn affects all users of the school and properties abutting. If persons trespassing on school grounds are not perceived to be a problem and are allowed to access the school grounds unchallenged this also leaves neighbouring properties vulnerable. In most residential burglaries the perpetrator gains access via the rear of the property. Such a scheme stands to benefit all. If a local Neighbourhood Watch scheme exists, perhaps a Good Neighbour scheme for your school could link into this. 20.6 The scheme involves people who live handy to your school, volunteering to watch the school and report any suspicious activity to an identified school contact. The neighbours remain completely anonymous. As a result, prompt detection of vandalism and trespass occurs. Reporting any activation of the school alarm. Noting the time of any suspicious incident.

19 Describing the people involved. Noting the presence of any vehicle, which appears to be involved in an incident together with its registration number and description. Reporting the incident as fully as possible to any one of the people whose names and telephone numbers are supplied in a circular that is distributed to the neighbours. In most cases the people to be contacted will be members of the school staff or governing body. Conclusion and Bibliography: 21.1 There is no single answer to improving your security and this booklet is not intended, as the definitive answer to your needs. In compiling and researching it, the following sources of information are some of those considered; www.dfes.gov.uk/schoolsecurity/ www.securedbydesign.com/pdfs/schools.pdf DFES Publication Improving Security in Schools. ACPO (Association of Chief Police Officers) Security Systems Policy 2000. 21.2 Further information and advice can be obtained by contacting either your local Crime Reduction Officer or Education Department. The Metropolitan Police & London Borough of Havering are thanked & acknowledged for their assistance in the production of this booklet.

1 Appendix A GOOD PRACTICE GUIDELINES FOR ANALOGUE & DIGITAL CCTV 1.1 A Closed Circuit Television System is a set of equipment and procedures designed to collect and process data. Images are recorded using videotapes (analogue) or digital formats. 1.2 These guidelines are intended as a brief introduction to good practice for all persons using or considering the use of CCTV surveillance equipment to collect and process data for the prevention of crime, collection of evidence and personal safety. The implications that the Data Protection Act 1998 has for CCTV are summarised below in paragraphs 2.0 to 3.0. 1.3 The guidance outlined in this document applies equally to Digital and Analogue CCTV Recording Systems. One of the fundamental requirements of either is the need to safeguard the integrity of images and for an audit trail to be started at the earliest stage. 1.4 The use of Digital CCTV is becoming more common as the technology evolves. The key is the creation of a master reference copy on, write once read many times (WORM) media i.e. CD-R or DVD-R. Licence free software, enabling the sequences to be viewed and copied as appropriate should be included. 1.4.1 In February 2005 the Home office issued the following guidance, UK Police requirements for Digital CCTV Systems. www.crimereduction.gov.uk/digitalcctvleaflet.pdf 1.5 The day to day running of the CCTV System should be the responsibility of an identified manager. It is accepted that this role may form part of the work responsibility of a manager with other duties. 1.6 Daily activities and incidents will need to be recorded to assist with subsequent enquiries on an Incident Report Record Sheet. 1.7 Movement or usage of the tape should be recorded on a Videotape Control Sheet. 1.8 It is important that the images produced by a system are as clear as possible to ensure that they are suitable for the purpose(s) for which they are intended. An initial check should be undertaken to ensure that the system performs properly.

The tapes should be used no more then 12 times, erased and then disposed of confidentially i.e. 31 high quality video tapes, allowing one videotape per recorder per day. A library maintained under these terms would have a life span of a year. (Third Data Protection Principle). Tapes should be erased immediately prior to re-use or disposal, using a purpose made Videotape Eraser. Each Tape should be given a Unique Reference Number marked on an appropriate label attached to the tape. Movement or usage of the tape should be recorded on a Videotape Control sheet. Used Videotape Control sheets should be securely stored. Cameras should be situated where they will capture images relevant to the purpose for which the scheme has been established. For example, if the purpose of the scheme is the prevention and detection of crime, the cameras should be sited so that facial images are captured. When installing cameras, account must be taken of the light conditions in which the cameras are expected to operate. Maintenance of the cameras should be undertaken on a regular basis in order to ensure that clear images are recorded. Cameras should be protected from vandalism in order to ensure that they remain in working order. Where tapes holding incidents are identified they should be securely stored until required. A secure unused stock of spare tapes should be maintained to replace any withdrawn from the videotape library for any reason. The secure cabinet should be kept locked and access should be authorised only by the CCTV system manager or deputy in their absence. 21 2.0 Signage: - Signs should be placed in the proximity of the cameras so that the public are aware that they are entering a zone that is covered by surveillance equipment. The signs should be clearly visible to members of the public. It is recommended that such signs should be at least A3 size. The signs should contain the following information. Identity of the person or organisation responsible for the scheme.

22 The purpose of the scheme. Details of who to contact regarding the scheme. Conclusions: - The information contained in the above handout is a brief outline of good practice and the requirements of the Data Protection Act 1998. Additional information and free impartial advice on CCTV and all other aspects of security can be obtained from your local Crime Reduction Officer. Useful web sites: - www.homeoffice.gov.uk/docs/digimpro.pdf www.homeoffice.gov.uk/docs/or_manual.pdf PSDB Digital CCTV Guide. Operational Requirement. Appendix A2 Good Practice Aide Memoir 1. The camera(s) lens is clean. 2. Glassing on the camera(s) housing is clean. 3. All moving parts are functioning correctly. 4. Nothing is obstructing the camera view. 5. The video recording equipment is functioning correctly. 6. Date and time generator is operating correctly. 7. Videotapes are checked for suitability of use. 8. A fresh videotape is properly fitted into the recording equipment. 9. A replacement videotape is available for immediate use. 10. Following use, videotapes are safely and securely stored and tape use has been fully recorded according to procedures.

23 Appendix B The following guidelines were produced by the Crime Prevention Office of the Metropolitan Police Service, Robbery Squad. CCTV and Video Evidence Introduction Understanding CCTV Quality Purchase, usage and Storage Cataloguing Making Recordings Tape re-usage The Video as Evidence INTRODUCTION Security monitoring of premises and the movement of people by the use of CCTV systems can provide aid to the security of premises and the safety of staff and visitors. In combination with access control and fire and intruder alarm systems it can prove to be a formidable tool in the fight against crime. But no matter how good the system is, its effectiveness will be diminished unless cameras are monitored, pictures recorded and a means by which its use can be documented and its integrity proved, is established from the outset. The following are suggestions for the way of ensuring best practice in relation to the gathering and presentation of video evidence. If these general guidelines concerning the handling of evidential videotapes and equipment are followed it will greatly assist prosecution cases. This may lead to an increase in 'Guilty Pleas' at court and a decrease in the amount of staff time wasted in attending court to give evidence. The Police and Criminal Evidence Act 1984 requires that the gathering of Police evidence be procedurally correct and as far as possible, technically verifiable. It therefore puts the emphasis on improving the standard of evidence required, to catch suspects "in the act" of committing a crime.

24 UNDERSTANDING CCTV If you are considering the purchase of a CCTV system here are a few points that you may wish to consider before making the decision to installing a system. This will ensure that it meets all your expectations. WHAT USE IS CCTV Countering fraud Public Area monitoring Health and safety monitoring Providing evidential material Alarm confirmation CCTV CAN Help control crowds etc Help deter crime Reassure staff Monitor opening and closing hours Aid in the identification of criminals Assist in Health and Safety issues Assist in the rapid, effective, and appropriate response to an incident QUALITY It should be established at the outset whether the purpose of the system is intended to identify an incident or to provide identification evidence of suspects suitable for presentation to the courts. The quality of any recording depends on the standard and condition of both the videotape and the system used to make the recording. Equipment used must be in good order and regularly, professionally maintained and serviced, details of which should be recorded from the date of purchase and commissioning of the system.

25 Unless the camera is set to record a fixed point, i.e. a particular door or piece of equipment, a preference should tend towards pan tilt and zoom cameras or 360 degree speed dome cameras with zoom lens in order to focus on the subject and give as clear as possible picture of events. Adequate lighting or infrared assisted recording should be employed for night-times. A member of staff should be in a position to explain to any court, procedures relating to the systems, its installations and use. PURCHASE, USAGE and STORAGE Much criticism is levelled by the Police and others that the standard of video reproduction is of poor quality. There may be many reasons for this but the most common is the over usage of the recording tape. In an ideal world tapes would only be used once. It is appreciated that cost effectiveness is a necessity, therefore it is suggested that a library of 31 tapes is established, one for each day of the month period. Thus giving the maximum usage of twelve times per tape. Tapes tend to show signs of wear and deterioration after this amount of usage. Good quality recording tapes must be used for this purpose. Obviously the more recording machines used, the more 'libraries' will be required. It should be borne in mind that although this may appear to be excessive, the cost of the tapes is only a small percentage of the overall cost of the complete video security system. Tapes should be stored in a secure cupboard or cabinet so that their integrity can be maintained also avoiding the possibility of accidental damage or use. This should also apply to the video recording equipment. Once purchased it is important that the life of the tapes is fully recorded. CATALOGUING It is of the utmost importance, when presenting a video recording as evidence, that the tapes have not been interfered with and that their integrity can be proved. The best manner to prove this is to establish strict procedures for usage, these being fully documented in a prepared register that can be subsequently produced at court if required. Each tape should be given a unique reference number and be labelled accordingly. The principles of the register should be able to prove the life of the tape its movements and usage.