APPENDIX H: PRINCIPLES OF CPTED (CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN)



Similar documents
Guide for Non-Profit Housing Societies Security Guide Table of Contents

Best Practices for Safer School Facilities

Keeping Schools Safe: Vulnerability Assessments and Crime Prevention Through Environmental Design. Peter Pochowski Executive Director of WSSCA

Questions related to specific materials, methods, and services will be addressed at the conclusion of each presentation.

28.0 Development Permit Area #2 (Neighbourhood District)

Managing Conflict and Change

Florida Safe School Design Guidelines. Strategies to Enhance Security and Reduce Vandalism

CCTV Cameras Policy. Policy Guidelines

Physical Security Policy Template

Surveillance Equipment

Parliamentary Security Camera Policy

Appendix "B" - Development Checklist

Policy on Public and School Bus Closed Circuit Television Systems (CCTV)

Self-determination Theory: A Guide for Coaches

Republika e Kosovës Republika Kosovo-Republic of Kosovo Kuvendi - Skupština - Assembly

Whinney Banks Primary School Disability Equality Scheme And Accessibility Plan April 2010 updated

Business Financial Crime: Theories of Motivation

Designing Out Crime Planning Guidelines

The Usage of Electronic Security Equipment (Electronic Security Surveillance)

Stanford University Video Surveillance System Guidelines

What Are the Advantages of a Developmental Disability Home Improvement Program?

Community Policing. Defined

A Guide to Apprehended Domestic Violence Orders (ADVO) and Apprehended Violence Orders (AVO) in New South Wales

Queensland Taxi Security Camera Program Changes

The social rights of victims of crime

UK SBS Physical Security Policy

Purdue University Writing Lab Indiana Department of Transportation Workshop Series Dr. David Blakesley, Allen Brizee

Information-gathering instrument on United Nations standards and norms related primarily to the prevention of crime

Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?

Crime Prevention Through Environmental Design Guidebook 3

FUNDAMENTALS OF FAMILY THEORY 9. SIBLING POSITION

School Security Assessment Programme in Australia

OMNI TECHNICAL SOLUTIONS. Business Ethics, Compliance, Anti-Corruption and Anti-Money Laundering Policy

Research Topics in the National Cyber Security Research Agenda

Intrusion Detection Systems

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

School Safety and Physical Design

CCTV CODE OF PRACTICE

Policing requirements for Closed Circuit Television

National Approach to Information Assurance

Business Protection Online Activity Store Self Assessment

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Before The State Of Wisconsin DIVISION OF HEARINGS AND APPEALS FINDINGS OF FACT, CONCLUSIONS OF LAW AND ORDER

Business Ethics Policy

Civil Justice Council response to Insurance Task Force interim report. May 2015

MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0

Home Security Inspection

Chapter 3. The Nursing Assistant. Elsevier items and derived items 2014, 2010 by Mosby, an imprint of Elsevier Inc. All rights reserved.

Journeys through the Criminal Justice System for Suspects, Accused and Offenders with Learning Disabilities. A Graphic Representation

Inspection report for children's home. Unique reference number. Type of Inspection

Policy Statement. Employee privacy, data protection and human resources. Prepared by the Commission on E-Business, IT and Telecoms. I.

Multi-Modal Corridor Degree of Complexity: High Cost/Benefit: High

Planning should achieve high quality urban design and architecture that: Contributes positively to local urban character and sense of place.

FACING YOUR FEARS: HOW TO SUCCESSFULLY PERFORM EXPOSURE THERAPY

Internal Investigations, Data Analytics and Employee Privacy in Online/Computer Activity

Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila

The second section of the HIPAA Security Rule is related to physical safeguards. Physical safeguards are physical measures, policies and procedures

Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268

Develop your Job Interview Skills

Information Protection

Security Master Plan: Physical Security Design Criteria

OPTIONAL PROTOCOL TO THE CONVENTION ON THE RIGHTS OF THE CHILD ON THE SALE OF CHILDREN, CHILD PROSTITUTION AND CHILD PORNOGRAPHY

Thinking about using a hidden camera or other equipment to monitor someone s care?

Life Saving Rules SAFETY BY CHOICE, NOT BY CHANCE

ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE. Measures toward enhancing maritime cybersecurity. Submitted by Canada SUMMARY

F36D 04 (LMC B1) Lead and manage provision of care services that respects, protects and

May The Right Direction. The Mayor s Strategy for improving transport safety, security and reliability in London Executive Summary

Crime Prevention Through Environmental Design

Code of Ethics for Pharmacists and Pharmacy Technicians

Control and Freedom at the Same Time

Obligations and expectations of Family Day Care educators

Annex 1: Assesing risk: threats, vulnerabilities and capacities

INTRODUCTION TO CRIMINAL PSYCHOLOGY

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

8. EXTERIOR SITE LIGHTING

Thank you for the opportunity to provide comment on the consultation on the new offence of ill-treatment or wilful neglect.

EMERGENCY MANAGEMENT IN SCHOOLS

Guidelines for Appropriate Physical Contact with Children and

CPNI VIEWPOINT 02/2010 PROTECTION OF DATA CENTRES

Network Security Landscape

Read about the steps that may gradually help you to return to work. Learn about looking for and keeping a job.

Best Practice Guide for Managing Litter and Illegal Dumping at Clothing Bins

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

ENGINEERING SOLUTIONS FOR DESIGNING YOUR SAFE ROUTES

Position Description

Contra Costa Community College District Business Procedure SECURITY CAMERA OPERATING PROCEDURE

TAUONDI COLLEGE Code of Conduct. Web: Version 2 10 th November 2011 E.

The Technology Trilogy:

Remote Monitoring offers a comprehensive range of services, which are continually

COMITÉ EUROPÉEN DES ASSURANCES

Community Safety and Crime Prevention Plan

Restaurant and Café Risk Management Guide. Don t Risk It!

Security 101 For School Safety. Intertech Associates, Inc. Lunch & Learn

Applying GIS Analysis to Archaeological Research in Canada

Fiskars Code of Conduct

A Risk Assessment Methodology (RAM) for Physical Security

PREVENTION OF CRIMINAL USE OF THE BANKING SYSTEM

Court Security Guidelines

Development Layout Design

Justice denied. A summary of our investigation into the care and treatment of Ms A

Transcription:

1.0 APPLICABILITY CPTED Principles are a requirement in the design of Parks and Open Space within the City of Hamilton, and therefore must be given due consideration during the design process, whether undertaken during Option I or Option II. 2.0 BACKGROUND The acronym CPTED stands for Crime Prevention through Environmental Design. Since the 1970s, CPTED has been attributed to the concept that is based on: The proper design and effective use of a built environment can lead to a reduction in the fear and incidence of crime, as well as an improvement in the quality of life; and Its successes and popularity can be measured in part by its global acceptance and world-wide institutionalization. The conceptual basis of CPTED is that the physical environment can be modified to produce or induce behavioural effects that will reduce the fear and incidence of crime, and improve the quality of life. There are three overlapping CPTED design strategies: i) Natural Surveillance ii) Natural Access Control iii) Territorial Reinforcement The conceptual foundation of the CPTED program is towards the exploitation of natural forms of surveillance and access control. The term natural, in reference to natural surveillance and natural access control refers to deriving surveillance and access control as a result of the routine use and enjoyment of the property. - H1 -

3.1 Natural Surveillance Natural Surveillance is a design strategy that is directed at keeping intruders under observation. Does the design allow observation? Design space to facilitate observation by increasing visual permeability, i.e. the ability to see what is ahead and around. Measure the need for privacy and / or limited sightlines against the need for personal safety. Is this level responsive to the needs for observation? Place vulnerable activities, such as cash handling or child care in places that can be naturally wellmonitored. Develop potential for eyes on the street by strategically aligning windows, work stations, and other activity generators towards these areas of vulnerable activity. Has the need for observation been carried consistently throughout the project? Take special care to ensure that each phase of the project enhances and complements the natural surveillance opportunities created in the design phase. This is particularly critical with respect to the landscaping and lighting phases. Examples of Natural Surveillance include the strategic use and placement of park benches, windows, and building lobbies. - H2 -

3.2 Natural Access Control Natural Access Control is a design strategy that is directed at decreasing crime opportunity. The primary concept of an access control strategy is to deny access to a crime target and to create a perception of risk in offenders. Does the design decrease criminal opportunity by effectively guiding and influencing movement? Provide for eyes on the street through the strategic placement of entrances, windows, etc. Direct normal access to observable areas, and prevent access to unobservable areas. Design space to provide people with a sense of direction, while giving them some natural indication as to where they are and are not allowed. Will safety be compromised by limiting access? Provide a limited number of access routes while allowing users some flexibility in movement. Does the design develop natural access control opportunities without considering their impact on natural surveillance? Take special care to ensure that natural access control opportunities enhance and complement natural surveillance objectives. Examples of Natural Access Control include the strategic use of distance (e.g. lawns, flooring) and / or topographical features (e.g. creeks, sidewalks) to direct activity or to create a buffer between potentially conflicting activities. - H3 -

3.3 Territorial Reinforcement Territorial Reinforcement is an umbrella design strategy that realizes that physical design can create or extend a sphere of influence so that users of a property develop a sense of proprietorship over it. Territorial strategies will often embody natural surveillance and natural access control strategies. Does the design act as a catalyst for natural surveillance and access control opportunities? Does the design create ambiguous spaces? Will the design create heavy or unreasonable maintenance demands? Enhance the feeling of legitimate ownership by reinforcing existing natural surveillance and natural access control strategies with symbolic or psychological barriers. Accomplish this by demonstrating the transition between public, semi-public, and private space so that unwanted intrusion elicits a protective response for offenders. This is often easily accomplished with the strategic use of bollards and signs. Minimize the creation of ambiguous spaces, which are spaces that lack any sort of clue as to what and who they are for. Accomplish this by identifying potential leftover spaces, for instance the area between the aboveground portion of a building s underground parking lot and its property line. Then take some positive action to develop this space so that users of the property take responsibility for it. Design space to allow for its continued use and intended purpose. Create durable environments that limit the need for maintenance, especially where it affects natural surveillance and access control. - H4 -

3.3 Territorial Reinforcement (cont d.) Territorial Reinforcement is an expression of proprietorship. For example, a clean, welllit, attractive store will present behavioural and environmental cues that tell the normal user that they are safe and only accepted behaviours will be tolerated. The same cues have an adverse effect on abnormal users. The design of space and the way in which people are behaving will give the impression that the abnormal user will be observed, stopped, or apprehended. Territorial Reinforcement, together with Natural Surveillance and Access Control, promotes more responsiveness by users in protecting their territory. Reference: 2006 - Crime Prevention through Environmental Design Principles. Prepared by the Peel CPTED Advisory Committee (2006). - H5 -