K-12 School Security Checklist April 2013



Similar documents
Personal Data Security Breach Management Policy

GUIDANCE FOR BUSINESS ASSOCIATES

Key Steps for Organizations in Responding to Privacy Breaches

HIPAA HITECH ACT Compliance, Review and Training Services

VALLEY COLLEGE MARTINSBURG CAMPUS

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Sources of Federal Government and Employee Information

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

CMS Eligibility Requirements Checklist for MSSP ACO Participation

IT Help Desk Service Level Expectations Revised: 01/09/2012

Chapter 7 Business Continuity and Risk Management

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

PHYSICAL SECURITY & ENVIRONMENTAL SECURITY

Fire Safety, Procedures and Risk Assessment

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER

PADUA COLLEGE LIMITED ACN ABN

Health and Safety Training and Supervision

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students

Accident Investigation

Information Security Policy

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

First Global Data Corp.

WASHINGTON STATE UNIVERSITY EXTENSION NEW EMPLOYEE CHECKLIST

7/25/14 FAIRFAX COUNTY PUBLIC SCHOOLS SUPPORT EMPLOYEE PERFORMANCE ASSESSMENT HANDBOOK

ICD-10 Frequently Asked Questions: (resource CMS website)

Creating an Ethical Culture and Protecting Your Bottom Line:

All Harvard University schools, tubs, local units, Affiliate Institutions, Allied Institutions and University-wide Initiatives.

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

Process for Responding to Privacy Breaches

Audit Committee Charter

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company,

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

How To Ensure Your Health Care Is Safe

Systems Support - Extended

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Change Management Process

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS for STUDY ABROAD PROGRAMS

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

Nebraska Parenting Act Divorce and Separation Parenting Education Provider Information 2015 Application

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

Developing Expertise as Coaches of Teachers

VCU Payment Card Policy

Connecticut State Department of Education School Health Services Information Survey

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

Internet and Policy User s Guide

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Licensed Practical Nurse (LPN) Role and Scope Course

Data Protection Policy & Procedure

Newborn Blood Spot Failsafe Solution (NBSFS) Operational Level Agreements. Part B: Child Health Record Department (CHRD) Users

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES

DISASTER RECOVERY PLAN TEMPLATE

Avaya Business Continuity Plan Overview

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

COUNSELING DEFINITIONS

Malpractice and Maladministration Policy

OBJECTIVE 10: ALERT AND NOTIFICATION OBJECTIVE 10: ALERT AND NOTIFICATION OBJECTIVE

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

DATA REQUEST GUIDELINES

Army DCIPS Employee Self-Report of Accomplishments Overview Revised July 2012

Strategic Plan

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Remote Working (Policy & Procedure)

Privacy Breach and Complaint Protocol

Enrollee Health Assessment Program Implementation Guide and Best Practices

CSUSB Containment Guidelines CSUSB, Information Security Office

Purpose Statement. Objectives

Transcription:

K-12 Schl Security Checklist April 2013

Appendix 1 This baseline security practices checklist is intended nly as a guide; it is nt a requirement under any regulatin r legislatin. Please nte: the belw checklists may r may nt directly crrespnd t sectins specifically discussed in the K-12 Schls Security Practices Guide; thse items withut specific reference t the dcument d nt have a crrespnding sectin number listed in the left-mst clumn.. ACCESS CONTROL The facility perimeter and areas within the facility that require access cntrl are well defined. The facility limits building access pints. Designated access pints are mnitred t cntrl facility access. Psitive entry cntrl systems are established (e.g., telephne entry cntrl, bimetric access cntrl). Signs direct visitrs t designated building entrances and exits. Exterir drs t gyms, maintenance areas, kitchen, and delivery areas are secured when nt in use. Visitrs are required t check in with the frnt ffice upn arrival and departure. Visitrs are prvided with schl issued identificatin badges when n schl grunds. Plicies are in place fr thse with and withut appintments r fficial schl business. Vendrs and cntractr persnnel are escrted thrughut the facility. Backgrund checks are cnducted n all schl emplyees, vendrs, and cntractrs. 2.2.3 A key cntrl prgram is established that mnitrs keys, entry cards, and duplicates. 2.2.3 Key cntrl prgram is audited annually. BUILDING EXTERIOR Plicies are in place that restrict access t bus-lading znes. Bus-lading, unlading, drp ff znes and fire znes are clearly marked. Schl designates areas fr use f parking lts (e.g., staff lt, student lt, visitr spaces). Parking system incrprates an identificatin system (e.g., placards in windshields). Apprpriate perimeter barriers r gates are installed and secured when nt in use.

Perimeter barriers are clear t enable cntinuus mnitring and t inhibit cncealment f peple r packages. Windws are lcked securely. Windw hardware and frames are regularly inspected fr security weaknesses. Facility has visual surveillance capability (e.g., designated surveillance pints, cleared lines f sight). Clear znes adjacent t buildings are free f vegetatin and ther bstructins. Barriers are installed t prtect drs and windws frm small arms fire and explsive blast effects. Schl grunds are adequately lit. Vandalism and graffiti is dcumented and remved. Mechanical, electrical, and ther equipment are surrunded by prtective enclsures t prevent unauthrized access. Access t the rf is restricted. Speed limits are psted. Cvered walkways are adequately lit t ensure visual surveillance. Fire hydrants are clearly visible. BUILDING INTERIOR Schl frnt ffice is clearly marked. First aid/schl nurse ffice lcatin is clearly marked. Critical utility systems and equipment are secured and lcked. Emplyees are familiar and trained with hw t shut ff utility services. A psitive inventry is kept n chemicals in use r used in science classes r labratry areas. Rf access drs are secured and lcked Custdial and strage clsets are secured and lcked. The number f cntainers and trashcans in hallways, atriums, and lbby areas are minimized. Unassigned lckers are secured.

Drs and stairwells are numbered. Stairwells, hallways, and restrms are adequately lit. Enclsed stairwells are mnitred, either electrnically r by security persnnel, Smke detectrs have vandal-resistant features (e.g., tamper alarms r prtective cages). Drs and lcks are in gd cnditin. Easy access t fire extinguishers. Adequate access t first aid supplies (e.g., autmated external defibrillatrs (AEDs)). Class III type fire drs with crash bar capabilities and autmatic activatin are installed. Blast fragment retentin film is n windws. CLASSROOM SECURITY Classrm safe znes r prtectin areas are established. 4.2.3 4.2.2 4.2.3 4.2.7 Classrm has access t tw-way cmmunicatin system. All areas f the classrm are visible frm the classrm dr. Classrm drs can be lcked frm the inside. Classrm drs with windws can be cvered. Classrms have adequate aisle space fr quick exits. Class rsters are reviewed and updated n a regular basis. Faculty and staff are assigned t check that all classrms and bathrms are lcked after the schl day. Valuable items are secured (e.g., instruments, cmputers, vide equipment). Chemicals, pisns, and flammable materials are prperly secured and stred. Fire extinguishers are inspected n an annual basis. Persnnel wrking with hazardus materials have received apprpriate training. SCHOOL CULTURE Faculty, students, and staff are all prvided with security 3 infrmatin and training.

3 3 3.5 3.5 Security infrmatin and training includes infrmatin n hw first respnders perate t avid hindering peratins. Security infrmatin and training includes training n hw t identify suspicius packages. Faculty and staff have been trained t apprpriately respnd t and reprt threatening/suspicius phne calls. Faculty and staff mnitr hallways, stairwells, and restrms during schl hurs. Students d nt have access t the schl withut direct staff supervisin. Curricula and prgrams aimed at preventing harmful behavirs are implemented (e.g., scial prblem-slving, life skills, anti-bullying, mentring prgrams, character educatin). Schl maintains, reviews, and updates a cde f cnduct/schl handbk. Cde f cnduct/schl handbk cntains standard definitins and prcedures that identify schl crime. Schl has a well-develped netwrk f service prviders that students can be referred t (e.g., mental health services) Pht identificatin badges are issued t all faculty, students, and staff. COMMUNICATION SYSTEM Systems are installed that prvide tw- way 4.2.2 cmmunicatin between faculty, staff, administratrs, and security persnnel. Cmmunicatin system is installed that prvides cmmunicatin with all peple at the schl, including 4.2.2 faculty, students, staff, emergency respnse teams, and visitrs. Regular cmmunicatin with lcal law enfrcement and 4 emergency respnders is established. Prcedures are develped fr cmmunicating with public 4 and the media regarding security issues. A ntificatin prtcl is develped that utlines wh 4 shuld be cntacted in emergencies and hw. REPORTING PROCEDURES Schl has a single pint f cntact fr reprting threats, 3.4 threatening behavir, r cncerning behavir. The identified pint f cntact fr reprting ptential 3.4 threats is available 24/7. There are multiple ways smene can reach the pint f 3.4 cntact fr reprting ptential threats (e.g., email, telephne, nline, in-persn).

3.4 3.4 3.4 Reprting can be annymus. There are clear plicies in place fr cllecting and acting n infrmatin abut a threatening r ptentially threatening situatin. Plicies explain hw infrmatin will be handled cnfidentially and apprpriately. SECURITY EQUIPMENT Facility has security system installed (e.g., CCTV, IP cameras, digital camera integratin and intrusin detectin and alarm system). Vide security systems are cnnected t the building s emergency pwer supply. Alarm system is cnnected t lcal law enfrcement. Security camera tapes r recrdings are retained fr an alltted time perid. All emergency respnse equipment and supplies are checked n a regular basis. Schl has adequate utility service capability t meet nrmal and emergency needs. Magnetmeters (metal detectrs) and x-ray equipment are installed. SECURITY PERSONNEL A schl security directr is designated t develp, implement, and crdinate all security-related activities. Schl security persnnel include an armed trained plice fficer r schl resurce fficer. Schl security persnnel are statined at a single schl. Schl security persnnel are a visible and regular presence during schl hurs f peratin. Schl security persnnel are deplyed during nrmal schl hurs f peratin and special events. Security persnnel check fr unauthrized vehicles in parking lts r n schl grunds. Halls, cmmn areas, and gyms are mnitred fr suspicius items (e.g., backpacks, briefcases, bxes). Security persnnel are deplyed t assigned areas t regularly inspect sensitive r critical areas (e.g., auditriums r under stages where items such as weapns r explsive materials can be hidden). Faculty and staff mnitr hallways, stairwells, and restrms during schl hurs. Security persnnel regularly inspect and secure drs.

If the building is used after schl hurs, security persnnel are present. Schl safety audits are cnducted n a regular r cntinuing basis. CYBERSECURITY Schl maintains a well-trained cmputer security staff. Schl faculty and staff are required t use passwrds and unique lgin infrmatin t access electrnic files. Students are required t use passwrds and unique lgin infrmatin t access electrnic files. Security plans fr cmputer and infrmatin systems are established. These cmputer and infrmatin system security systems include bth hardware and sftware. Faculty and staff are trained in safe and secure cmputer use. Students are trained in safe and secure cmputer use. Cybersafety and cyberbullying prgrams are prvided fr students. Cmputers include filters t mnitr internet activity n schl cmputers. Vide security system is adequately prtected against hackers. EMERGENCY OPERATIONS PLAN A cmprehensive schl emergency peratins plan has 4.2 been develped. Plan has been develped in crdinatin with cmmunity 4 partners (e.g., lcal law enfrcement, emergency medical persnnel, and fire department persnnel) Plan takes int cnsideratin numerus circumstances 4.2.3 and criteria fr respnse (e.g., lckdwn, evacuatin, shelter-in-place). Plan cntains an updated map f the schl s flr plan 4.2 that includes rm numbers, evacuatin rutes, and utility shut ffs. Plan defines rles and respnsibilities that is, creates an rganizatinal system (e.g., schl security cmmander, 4.2.1 public infrmatin fficer, etc.) *Cnsider fllwing Incident Cmmand System (ICS) structure 1 Plan cntains a methd fr reprting incidents internally 4.2.2 t faculty, students, and staff (e.g., mass ntificatin system). 1 http://www.fema.gv/incident-cmmand-system

4.2.8 4.2.4 4.2.5 4.2.6 4.2.7 4.2.7 5 6 4.2 4.2.9 Plan cntains a methd fr reprting incidents externally t media, families, neighbrs, and the cmmunity. Plan cntains directins that prvide fr the needs f students, staff, and visitrs with disabilities and ther functinal and access needs. Plan cnsiders necessary equipment and supplies t respnd t a crisis. Plan cntains cmmn vcabulary. Plan includes an accuntability system that accunts fr all faculty, students, staff, and visitrs. Plan cntains a parent reunificatin system that ensures students are nly released t authrized individuals after an incident. Plain cntains actin checklists fr teachers, administrative staff, and ther staff lcated thrughut the schl t fllw during incident respnse. Plan includes cmpnents fr pst-incident respnse/recvery (e.g., stress management, mental health services, infrastructure restratin, pst-incident evaluatin, business cntinuity plans etc.) Plan is reviewed and updated n an annual basis. Schl cnducts regular exercises/drills f emergency plans. THREAT ASSESSMENT TEAM 1. Des yur schl have a threat assessment team? (If n, please skip the questins in this sectin) 2. Wh is n the threat assessment team? (Check all that apply) Member(s) f the faculty Member(s) f the staff Member(s) f the administratin Investigatr(s) (e.g., schl resurce fficer, ther plice fficer assigned t the schl) Mental health prfessinal(s) (e.g., schl psychlgist, clinical psychlgist, frensic psychlgist) Guidance cunselr(s) Teachers Caches Ad hc members selected t sit n the team n a case-by-case basis because they knew the student in questin Other(s) (please specify)

3. D members f the threat assessment team rtate? 3a. If yes, hw ften d they rtate? (Check all that apply) Weekly Mnthly Quarterly Yearly 4. Des the threat assessment team receive training? 4a. If yes, hw ften d they receive training? (Check ne) Weekly Mnthly Quarterly Yearly 4b. What tpics are cvered in threat assessment team trainings (Check all that apply) Public Awareness Threat Management Threat Investigatins Preventin Mental Health Cncerns Legal/Plicy Cncerns Privacy Cncerns 4c. Hw are threat assessment trainings cnducted? (Check all that apply) Presentatins Hands n experience/rle playing/scenaris 5. Des yur schl have a single pint f cntact (phne number, email address, etc.) fr reprting threats, threatening behavir, r cncerning behavir? 5a. If yes, is this pint f cntact fr reprting ptential threats available 24/7? 5b. What are the ways smene can reach the pint f cntact fr reprting ptential threats? (Check all that apply) Email Telephne In persn Online

6. If there is a central pint f cntact fr reprting ptential threats, des ne persn manage this pint f cntact r des a grup manage it? (Check ne) 6a. If ne persn manages the pint f cntact fr reprting ptential threats, des this persn rtate? 6b. If yes, hw ften des this persn rtate? (Check ne) One persn manages the pint f cntact A grup manages the pint f cntact (If a grup manages the pint f cntact, skip t questin 7.) There is n central pint f cntact (If there is n central pint f cntact, skip t questin 7.) Weekly Mnthly Quarterly Yearly 7. Des the threat assessment team have clear plicies in place fr cllecting and acting n infrmatin abut a threatening r ptentially threatening situatin (If n, skip t questin 10.) 8. Des the plicy abut threat assessment inquiries include infrmatin n the fllwing: (Check all that apply) 9. Des the plicy specify certain behavirs f cncern r prvide examples f behavirs that wuld merit a referral t the threat assessment team? Purpse and scpe f the plicy Rle f educatrs and threat assessment in relatin t the rle f law enfrcement fficials Identity f and delegatin f authrity t schl fficials cncerning determinatin that a threat assessment inquiry r investigatin shuld be pursued Definitin f the threshld f cncern fr initiating inquiry r investigatin Types f infrmatin that can/shuld be gathered during a threat assessment inquiry r investigatin Designatin f an individual r grup respnsible fr gathering and analyzing infrmatin n grups/individuals Steps r prcedures that shuld be fllwed frm initiatin t cmpletin f the threat assessment inquiry

9a. If yes, list thse behavirs that wuld merit a referral t the threat assessment team 10. What types f infrmatin are generally gathered during an inquiry: (Check all that apply) Facts that drew attentin t the student, situatin, r target Infrmatin abut the student Identifying infrmatin Backgrund infrmatin Current life infrmatin Infrmatin abut attack related behavirs in which the student has engaged The student s mtives The targets that are in danger f vilence Nne f the abve 11. Hw des the threat assessment team actively encurage schl cmmunity members (students, parents, faculty, staff, administratrs, etc.) t reprt knwledge f ptential threats? (Check all that apply) Public awareness campaigns (psters, annuncements) Student assemblies In-class lectures/presentatins Student-teacher cnferences Parent-teacher cnferences Newsletters 12. Hw des the threat assessment team make schl cmmunity members (students, parents, faculty, staff, administratrs, etc.) aware f the general steps and timeline f the inquiry prcess? (Check all that apply) Public awareness campaigns (psters, annuncements) Student assemblies In-class lectures/presentatins Student-teacher cnferences Parent-teacher cnferences Newsletters 13. Des the threat assessment team explain hw infrmatin will be handled cnfidentially and apprpriately?

Pht Surces Picture 1: Brach, Patricia, FEMA Phtgrapher. Hustn, Texas. March, 9, 2009. http://www.fema.gv/phtdata/riginal/40283.jpg. Picture 2: Risk Management Series: Design Guide fr Imprving Schl Safety in Earthquakes, Flds, and High Winds, FEMA P-424 / December 2012, Federal Emergency Management Agency, page 151. http://www.fema.gv/library/viewrecrd.d?id=1986 Picture 3: Safe Havens Internatinal http://www.safehavensinternatinal.rg/ Picture 4: Jun, Elissa, FEMA Phtgrapher. Jplin, Missuri. August 19, 2011. http://www.fema.gv/phtdata/riginal/50245.jpg. This dcument was develped by the Office f Infrastructure Prtectin, DHS, t prvide infrmatin t K-12 schl persnnel assigned with the respnsibility f assessing schl security practices t fster safer and mre secure schl cmmunities. The infrmatin herein is nt all inclusive. This guide presents an verview f K-12 schl security practices. Schl administratrs and legal cunsel shuld wrk tgether t ensure that these practices are emplyed in a manner cnsistent with legal requirements. Nte: Infrmatin presented here is subject t cpyright laws and ther terms f use as set frth in the respective references