Guarding Congresswoman Giffords Memorial Hermann & U. of Arizona Medical Center Manage Security, Media & Privacy
Joe Bellino & Marshall Heins of Memorial Hermann
Your Guide to Student & School Internet Safety Education & Clear Policies Protect Kids, Campus Network
ALSO IN THIS ISSUE:
Prisoner Escapes from Hospitals Campus Security Goes Green Emergency Notification Checklist WWW.CAMPUSSAFETYMAGAZINE.COM OCTOBER 2011 • VOL. 19 • NO. 7
CSJ-1011frontcover.indd 991
$10
COMING NEXT MONTH CAMPUS SAFETY YEARBOOK 2012 SEE PAGE 39 FOR DETAILS
>
10/6/11 12:13:46 PM
Total Life Safety Solutions Protect What Matters Most
Emergency Communications
Advanced Detection
NOTIFIER has innovative life safety solutions that exceed building and fire code requirements. Our intelligent fire systems with advanced detection capabilities, gas and flame detection and fully integrated city or campus-wide emergency communications systems bring the maximum protection possible to your facility and its occupants. When lives are at risk, trust NOTIFIER total life safety solutions to protect what matters most.
Gas and Flame Detection
Scan this QR Code to access more information about NOTIFIER’s Total Life Safety Solutions.
www.notifier.com www.campussafetymagazine.com/freeinfo/20125
992-1.indd 992
10/6/11 9:01:08 AM
www.campussafetymagazine.com/freeinfo/20001
992-1.indd 1
10/6/11 9:01:13 AM
T A B L E O F C O N T E N T S I O C T O B E R 2 0 11 I V O L . 1 9 N O. 7
BOBIT BUSINESS MEDIA 3520 Challenger St. Torrance, CA 90503 (310) 533-2400
Publisher & Eastern Sales Manager
PEGGY ONSTAD (310) 533-2477 fax: (310) 533-2502 peggy.onstad@bobit.com Executive Editor
ROBIN HATTERSLEY GRAY (310) 533-2534 fax: (310) 533-2502 robin.gray@bobit.com Assistant Editor Cover photo: John Lynch
16
BRITTANY-MARIE SWANSON (310) 533-2588 fax: (310) 533-2502 brittany.swanson@bobit.com Art Director
RON RENNELLS (310) 533-2593 fax: (310) 533-2514 ron.rennells@bobit.com Sr. Production Manager
SARAH PAREDES (310) 533-2497 fax: (310) 533-2501 sarah.paredes@bobit.com
J Bellino (left) and Marshall Heins of Cover Joe M Memorial Hermann Healthcare System were instrumental in providing security for Congresswoman Gabrielle Giffords while she received medical treatment at the Texas Medical Center and TIRR Rehabilitation and Research facility.
Audience Manager
KATIE FILLINGAME A D V E R T I S I N G C O N TA C T S Western Sales Manager
30
FEATURES 12 Guarding Gabrielle
Here’s how the University of Arizona Medical Center and Memorial Hermann Healthcare System effectively managed the care, security, privacy and press coverage of Arizona Congresswoman Gabrielle Giffords while she was being treated at their facilities. By Robin Hattersley Gray
DYNISE PLAISANCE (760) 519-5541 fax: (310) 533-2502 dynise.plaisance@bobit.com HOW TO GET YOUR NEWS TO US
E-mail: campussafetymagazine@bobit.com Mail: 3520 Challenger St., Torrance, CA 90503 fax: (310) 533-2502 FOR SUBSCRIPTION INQUIRIES
16 Your Ultimate Guide to Student and School Internet Safety Education, clear policies, content filters and network visibility will keep your students and your campus network safe. By Brittany-Marie Swanson
22 A Green Perspective on Campus Security
Security can play a positive role in making your institution more environmentally friendly. By Bill Taylor
28 Your Campus Emergency Notification Check List
Be sure to carry out these tasks to ensure your mass alert systems reach everyone on campus during a crisis. By Robin Hattersley Gray
30 Fancy Footwear
New features in today’s law enforcement boots provide enhanced fit, comfort and performance. By Melanie Basich
(310) 533-2400 fax: (310) 533-2510 www.campussafetymagazine.com EDITORIAL ADVISORY COUNCIL Shad U. Ahmed Chief of Emergency Medical Services, University of Rhode Island S. Daniel Carter Director of Public Policy, Security On Campus Inc. Michael Dorn Safe Havens Int’l Osborne Frazier NYPD Div. of School Safety Linda Glasson Security Manager/Consultant, Obici Hospital William Lassiter Center for Prevention of School Violence Joseph Moscaritolo Madison Park Vocational HS, Boston K. Gary Somerville Senior Campus Supervisor, Natrona County School District, Casper, Wyo. Philip Mullendore Institute for Campus Safety
Member of:
DEPARTMENTS 4 From the Editor’s Desk A Clery Act-Type Law for Hospitals?
6 News Watch Healthcare Facilities, Police Grapple With Prisoner Escapes
34 Ad Index 38 Tools of the Trade 44 Recess
VISIT OUR WEBSITE AT WWW.CAMPUSSAFETYMAGAZINE.COM 2
CAMPUS SAFETY
CSJ_0111toc.indd 2
Winner 2007, Finalist 2006, 2008, 2009
PRINTED IN U.S.A
OCTOBER 2011
10/6/11 11:23:46 AM
www.campussafetymagazine.com/freeinfo/20047
CSJ_0111toc.indd 3
10/6/11 11:23:52 AM
FROM THE EDITOR’S DESK
A Clery Act-Type Law for Hospitals?
University and college protection professionals can thank the Jeanne Clery Act for putting higher ed security issues on the map. Hospital protection professionals might want to introduce a similar law for their campuses.
Robin Hattersley Gray is executive editor of Campus Safety. She can be reached at robin.gray@bobit.com or (310) 533-2534
S
ome members of the university public safety community aren’t exactly fans of the Jeanne Clery Act. It is the Clery Act, after all, that requires their departments to provide detailed statistics on the crimes that occur on and around their campuses. This requires lots of paperwork – probably not the reason most protection professionals decided to dedicate their lives to campus public safety when they started their careers. Despite the fact that regulations of any kind – including the Clery Act – can be a pain in the neck, university security, law enforcement and emergency management
personnel should recognize just how instrumental this law has been in improving higher ed campus security throughout the nation. Because of the Clery Act, there is now much greater awareness among college students and their parents of the security and safety issues at U.S. institutions of higher education. This has resulted in more college executives realizing that they can no longer afford to view public safety staffing, security technology and emergency management as burdensome cost centers that can be cut when budgets are tight. Top university administrators can no longer afford to sweep under the rug inconvenient campus crime stats or be in denial about the fact that they might not have appropriate disaster plans or emergency communications systems in place. If they don’t pay attention to these issues, they run the risk of being fined by the U.S. Department of Education for not being in compliance with the Clery Act. Even more of a threat is the liability exposure they create. Let’s also remember the public relations
nightmare that could result. The Clery Act has been so effective at increasing awareness of college security issues that some hospital security experts are considering introducing a similar law. Although healthcare institutions may be ahead of many universities on the security technology side of things, they are a good 20 years behind higher ed when it comes to incident reporting. For example, a study completed this summer by the International Healthcare Security & Safety Foundation found that about 8.4 healthcare facility prisoner escapes occur each month (see Healthcare Facilities, Police Grapple with Prisoner Escapes on page 6). The author of the report recommends a law, much like the Clery Act, be enacted to mandate reporting of these incidents. Reporting only forensic patient escapes, however, doesn’t go far enough. A survey conducted by the Emergency Nurses Association in 2009 revealed that more than half of emergency nurses report experiencing physical violence on the job, including being “spit on,” “hit,” “pushed
or shoved,” “scratched,” and “kicked.” One in four has experienced such violence more than 20 times in the past three years. ER nurses, not to mention other hospital staff and medical professionals working with psychiatric patients and other high-risk individuals, also deserve to have an accurate tally of the assaults they experience. Additionally, let’s not forget the results from the CS 9/11 survey that were released last month. More than 20 percent of hospital respondents indicated their institutions would “respond ineffectively” or “be completely unprepared to respond” to an active shooter incident. There must be a way that a Clery-type law could be enacted to mandate the accurate reporting of incidents in hospitals while protecting the privacy rights of patients. I look forward to seeing how hospital protection professionals will tackle this challenge. I certainly hope the healthcare industry doesn’t have to experience a brutal murder like that of Jeanne Clery or tragedy like Virginia Tech or Columbine before it gets its act together.
WHAT’S ON THE WEB NOW
CampusSafetyMagazine.com
NEW FEATURES: Videos: CampusSafetyMagazine.com/Videos Blogs: CampusSafetyMagazine.com/Blog Photo Galleries: CampusSafetyMagazine.com/PhotoGallery Podcasts: CampusSafetyMagazine.com/Podcast WEB EXCLUSIVE CONTENT: Medical Records Privacy & Logical Access Control CampusSafetyMagazine.com/MemorialHermannHIPAA Hospital Media Management & Patient Privacy CampusSafetyMagazine.com/MemorialHermannMedia Webinar: See How Other Campuses Manage Emergency Notification CampusSafetyMagazine.com/Webinar Webinar: Unclouding the Clery Act CampusSafetyMagazine.com/Webinar
4
CAMPUS SAFETY
CSJ_0111edit.indd 4
OCTOBER 2011
www.campussafetymagazine.com
10/6/11 12:25:17 PM
VIDEO SURVEILLANCE
Made Ea sy
Installed and used on thousands of U.S. school campuses Easy to use - designed for non-technology users School officials can monitor from the web or monitoring station, viewing all schools and buildings in a single display Retrieve and record stored video to a CD or DVD with the click of a mouse Can be used in conjunction with access control and other systems Use on one or thousands of campuses Works efficiently making maximum use of bandwidth and network systems Supports both analog and IP cameras Supports 960 IP camera models from 60 major manufacturers Map and floor-plan-based navigation Scalable US-based Technical Support NO HIDDEN FEES
CSJ_0111edit.indd 5
Campus-wide Security for the Next Generation for more information visit
www.video-insight.com or call
713-621-9779 www.campussafetymagazine.com/freeinfo/20042
10/6/11 12:25:20 PM
newswatch
WWW.CAMPUSSAFETYMAGAZINE.COM
Healthcare Facilities, Police Grapple With Prisoner Escapes Study highlights incident frequency and reporting shortcomings. Report calls for Clery-type law to be enacted for hospitals. WHEN DR. VICTORIA MIKOW-PORTO undertook her study of the frequency of prisoner escapes from healthcare facilities at the behest of the International Healthcare Security & Safety Foundation (IHSSF), even this veteran researcher was surprised by what she found. In a white paper commissioned by the foundation and presented at the recent International Association for Healthcare Security & Safety (IAHSS) Annual General Meeting in Toronto, she shines a spotlight on a problem that seems all too common in some ways, yet taboo. She points out this issue has been lurking for decades. When the Supreme Court agreed with prisoner petitioners in 1976 (Estelle v. Gamble) that depriving prisoners of medical care in correctional facilities constituted “cruel and unusual punishment,” it did not anticipate a plethora of unintended consequences when it ruled that correctional facilities “must provide necessary medical care to incarcerated individuals” and “the deliberate indifference to serious medical needs is prohibited.” This resulted in vastly increasing amount of medical services provided to prisoners in correctional facilities. But as state economies stalled in the decades that followed, correctional systems downsized or eliminated altogether onsite medical care. This meant that correctional facilities had to turn to public or private hospitals and other healthcare facilities to provide medical care to prisoners. With the prison population burgeoning from 1.1 million in 1990 to over 2.3 million today, medical treatment of prisoners outside prisons has become an everyday experience. “The Supreme Court decision opened a floodgate that healthcare facilities today are struggling with more than ever,” she says, citing the disproportionately high levels of acute and chronic medical and mental disorders among the prison population, along with the additional burdens associated with aging prisoners. She adds that the public at large has little or no idea of how the increase in numbers of forensic prisoners at healthcare treatment facilities — with corresponding increase in potential for escape — can affect them. “There’s a whole world out there that peo-
6
CAMPUS SAFETY
CSJ_1011News.indd 6
OCTOBER 2011
Injuries and deaths related to forensic patient escapes Healthcare security staff Law enforcement/corrections Healthcare staff Patients Visitors Others not on site
DEATHS • • • • • 2
INJURIES 11 26 3 1 3 5
Location of prisoner escape incidents LOCATION Emergency room Outside the hospital (e.g., hospital entrance, parking lot, etc.) Clinical treatment areas Restrooms Total
NO. OF INCIDENTS 14 (14.1%) 17 39 29 99
(17.2%) (39.4%) (29.3%) (100%)
ple don’t see or understand.” Mikow-Porto identified 99 attempted and completed healthcare facility prisoner escapes, from reports in the media between Apr. 1, 2010, and Apr. 1, 2011. This translates to about 8.4 incidents per month, or 2.1 weekly. Given that there are no baseline data on prisoner escapes from hospitals, the researcher does not know whether this is a high or low frequency. She admits she was surprised by the number of escapes. Mikow-Porto is also convinced that the escape statistics could be much higher since she relied on Internet articles, which have a short shelf life and hospitals, fearing liability, are not required to report such incidents. The researcher finds the situation frustrating: “If you don’t know what’s going on, it’s hard to generate the kind of attention and interventions that will deal with these issues.” As she states in her study, since the numbers of prisoners who will need medical treatment in the future is escalating, it is critical for the healthcare industry to understand the conditions under which prisoner escapes occur and what can be done to prevent them. Her research reveals that about half the escapes result in injuries, and the majority of these instances include assault on the correctional or hos-
pital security officers accompanying the prisoner. Also reported were rare cases of injury to hospital staff or other patients, kidnapping of visitors, and car thefts from visitors and third parties living in the vicinity. Two fatalities were documented.
PRISONERS MOST OFTEN ESCAPE FROM CLINICAL TREATMENT AREAS To mitigate the risk, it’s important to be aware of the vulnerabilities of the facility. Mikow-Porto’s study indicates the locations of escape attempts vary. Of the 99 incidents reported in the media during the research period, 32 prisoners escaped from the emergency room, 21 from rest rooms, 41 from clinical treatment areas and five from the hospital entrance or parking lot. “There are incidents of prisoners escaping through very public areas, though you usually don’t think about prisoners being treated there or that they might escape,” she points out.
INFORMATION MUST BE SHARED BETWEEN CORRECTIONS, HOSPITAL Hospital security professionals are responsible for the general safety and security of the hospital, staff, visitors and patients, but prisoners are primarily the responsibility of correctional officers, who unlike most hospital security personnel are armed. Sometimes escapes from custody are the result of breakdowns between the agencies involved if information is not shared or procedures are not followed. “I just read a recent story where someone at a hospital signed off that they were taking custody of a prisoner, who just walked out when his guard left; they couldn’t do this by law,” explains MikowPorto. She also points out that if a prisoner escapes, most security personnel are unarmed, so in most cases hospital security can’t really go after them. In her view, this demonstrates how important it is that forensic protocols be in place and followed — just like for disasters or fire drills — and that better interagency cooperation is needed. President of the IHSSF Board Ed Stedman echoes Mikow-Porto’s observation. “Each healthcare institution deals with www.campussafetymagazine.com
10/6/11 9:06:02 AM
It’s not just a VoIP phone It’s Talk-A-Phone At Talk-A-Phone, we pride ourselves on being the industry leader in engineering and manufacturing reliable, state-ofthe-art security communications devices. Our VOIP-500 Series phone is part of our longstanding tradition of bringing you the most dependable products in the market. Our knowledgeable sales staff, system specialists, and customer support can help you transition from your current VOIP-500 SERIES PHONE
analog security phone system to Voice over IP, or to design a new VoIP implementation.
support team “Talk-A-Phone’s was amazing to work with. These
are the things that make customers like us come back to companies like Talk-A-Phone. Again, thanks for your help.” Carolyn Trail Telecommunications ManagerRoanoke College
Proudly manufactured in the United States for over 75 years
So whether you’re in Security or IT, you’ll have peace of mind knowing you’re getting both the best support and products. For more information about our VOIP-500 Series Emergency Phone, please visit www.talkaphone.com or scan the QR code.
®
www.campussafetymagazine.com/freeinfo/20043
www.talkaphone.com t 773.539.1100 CSJ_1011News.indd 7
10/6/11 9:06:03 AM
NEWS WATCH
having armed law enforcement officers within their faculties, and each one has their own procedures,” he says. “In the meantime, law enforcement authorities are in charge of the patient and have their procedures. It’s important to try to mitigate issues between the two.” He points out that there are municipal, state and federal policy issues that apply to safeguarding staff, patients and visitors while they are within the facility and when the prisoner is transported.
ESCAPES OFTEN INVOLVE THE REMOVAL OF RESTRAINTS The public might well wonder how prisoners who are in shackles and handcuffs can escape. Sometimes they have accomplices; sometimes they get restraints removed for a medical procedure like an MRI, or to visit the restroom, and then escape. In 62 percent of the cases, the restraints had been completely or partially removed. There was the instance where a handcuffed prisoner stole his guard’s SUV; another where the handcuffed prisoner just walked out of the hospital naked. (He was apprehended outside the entryway by a suspicious security guard.) The scariest one, though, to Mikow-Porto was the recent case of a prisoner overwhelming his police escort, using her Taser on her and stealing her gun, which he fired at a person who tried to intervene, and then
entered a preschool across the street and took a teacher and 40 children hostage before releasing them and escaping into a nearby neighborhood.
REPORT RECOMMENDS VIDEO, PANIC BUTTONS, PROCEDURES Mikow-Porto’s study includes a number of recommendations to reduce or eliminate prisoner escape incidents from healthcare facilities. Some address improvements to physical plant and equipment, such as installing video cameras and panic buttons. Others point to the need for funding to increase numbers of security personnel as well as the number of hospital professionals with sworn police powers. The most important suggestion, in her view, is formalizing standard policies and procedures to be followed by hospital security staff and outside corrections officers to ensure the right procedures are in place and followed by all the agencies concerned. Personnel working in emergency rooms and in prisoner treatment areas should be trained in these protocols and procedures. The IAHSS has an excellent guideline covering prisoner patient security on its Web site. She also believes that accurate reporting of the number of escape incidents is crucial to heightening awareness of this issue among those who control the purse strings, including the public. She cites the
OSHA Issues Guidelines for Investigating Workplace Violence WASHINGTON — The Occupational Safety and Health Administration has issued a directive on Enforcement Procedures for Investigating or Inspecting Incidents of Workplace Violence. The directive establishes uniform procedures for OSHA field staff for responding to incidents and complaints of workplace violence and conducting inspections in industries considered vulnerable to workplace violence. These include healthcare and social service settings, and late-night retail establishments. Workplace violence is a serious recognized occupational hazard, ranking among the top four causes of death in workplaces during the past 15 years. More than 3,000 people died from workplace homicide between 2006 and 2010, according to the Bureau of Labor Statistics (BLS). Additional BLS data indicate that an average of more than 15,000 nonfatal workplace injury cases was reported annually during this time. A recent OSHA inspection of a Maine psychiatric hospital found more than 90 instances in which workers were assaulted on the job by patients from 2008 through 2010. The hospital was cited for not providing its workers with adequate safeguards against workplace violence, and a fine of more than $6,000 was proposed. OSHA has also recently cited facilities in New York and Massachusetts where employees have been killed as a result of assaults. “These incidents and others like them can be avoided or decreased if employers take appropriate precautions to protect their workers,” says Assistant Secretary of Labor for Occupational Safety and Health Dr. David Michaels. “We have accompanied this directive with a new Web page on preventing workplace violence to help employers address workplace violence issues.” Studies by the National Institute for Occupational Safety and Health and other organizations show that employers who implement effective safety measures can reduce the incidence of workplace violence. These measures include training employees on workplace violence, encouraging employees to report assaults or threats, and conducting workplace violence hazard analyses. Other methods, such as using entrance door detectors or buzzer systems in retail establishments, and providing adequately trained staff, alarms and employee “safe rooms” for use during emergencies in healthcare settings can help minimize risk. For more information, visit www.osha.gov/SLTC/workplaceviolence/index.html. 8
CAMPUS SAFETY
CSJ_1011News.indd 8
OCTOBER 2011
Clery Act, passed by Congress in 1990, which requires that colleges and universities disclose crime statistics as part of a campus security report published annually. Mikow-Porto advocates a similar approach to mandate reporting by hospitals of all criminal incidents, including escape, possibly with certain liability protections. “We can’t do our best without knowing what’s going on and who’s being treated,” she says. “We need to ask what happens, why, what are the likely outcomes, and how escapes can be prevented in the future. I have great respect for the people who work in hospital security and corrections. They do a great job and these are relatively rare instances — but they do occur with greater frequency than we’d like to see.” “If we are more transparent in reporting, if the general public is more aware these incidents occur, then,” she continues, “we can ensure action is taken to address this topic in a more open manner, with agencies cooperating with one another, and with procedures that are clear, well understood and used.” Mikow-Porto’s study, “Frequency of and Conditions under which Forensic Prisoners Escape from Healthcare Facilities,” will be published later this year in IAHSS’s Journal of Healthcare Protection Management. It can also be found at www.CampusSafetyMagazine.com. ■
Workplace and non-workplace nonfatal violence against employed and persons not employed age 16 or older, 1993-2009 Rate per 1,000 persons age 16 or older 50 40 30 20 10 0 1993
1995
2000
2005
2009
Nonworkplace violence Violence against persons not employed Workplace violence
Workplace homicides, by incident type, 2005-2009 INCIDENT TYPE
TOTAL Hitting, kicking, beating Shooting Stabbing Unknown
PERCENTAGE OF WORKPLACE HOMICIDE VICTIMS AGE 16 OR OLDER 100% 6.1 80.0 8.1 5.8
Source: U.S. Dept. of Labor
www.campussafetymagazine.com
10/6/11 9:06:03 AM
Extra security at no extra cost.
What stops someone from copying your ID card? With most printers absolutely nothing, with Magicard printers it’s HoloKote.® HoloKote is a watermark printed on to the card surface during the normal print cycle, so it costs you no more in consumables. When printed with the highly reflective HoloPatch,® it becomes clearly visible. For added visual security, you can opt to customize the watermark to your own secure design or logo.
www.magicard.com
Call toll free for more info: 877 236 0933 Email: americas@magicard.com Follow ultramagicard on: www.campussafetymagazine.com/freeinfo/20156 CSJ_1011News.indd 11
10/6/11 9:06:04 AM
COVER STORY
V. I . P. P R O T E C T I O N
SOME LESSONS LEARNED Talk more with federal officials and make sure they’ve vetted the desires of the family and how they want [the hospital] to react. – Marshall Heins, chief facility services officer, Memorial Hermann
Photo by P.K. Weis/SouthwestPhotobank.com
By Robin Hattersley Gray
HERE’S HOW THE UNIVERSITY OF ARIZONA MEDICAL CENTER AND MEMORIAL HERMANN HEALTHCARE CENTER EFFECTIVELY MANAGED THE CARE, SECURITY, PRIVACY AND PRESS COVERAGE OF ARIZONA CONGRESSWOMAN GIFFORDS, WHILE SHE WAS BEING TREATED AT THEIR FACILITIES.
O
n Saturday, Jan. 8, 2011 Congresswoman Gabrielle Giffords (D – Ariz.) was meeting with her constituents at a Safeway supermarket in Casas Adobes, Ariz., when 22-year-old Jared Lee Loughner shot her in the head, gravely wounding her. He then opened fire on the crowd, killing six people, including a federal judge and nine-year-old girl. Thirteen other individuals were also injured. Although the attack was over quickly, it was clear that the healing and recovery process for Giffords and many of the other victims who survived the attack was going to be long and difficult. What wasn’t clear at the time, however, was the nature of the threat to Giffords and the other survivors. Did the gunman act alone, or was he part of a larger conspiracy? Would someone attempt to finish what Loughner had started? For several weeks after the assassination attempt, no one knew for sure, and the University of Arizona Medical Center and Memorial 12
CAMPUS SAFETY
CSJ_1011GabrielGiffords.indd 12
OCTOBER 2011
Hermann Healthcare System in Texas —the healthcare institutions that treated Giffords — weren’t going to take any chances.
ARIZONA MEDICAL CENTER RECEIVES 20 MINUTES NOTICE The University of Arizona Medical Center, southern Arizona’s only level 1 trauma center, was the first institution to treat Giffords, as well as the majority of the victims of the attack. Officials at the hospital were notified about 20 minutes before the first victim of the shooting was admitted. At the time, all hospital officials knew about the scope of the tragedy was that there had been a shooting with several casualties. “Normally, we do a lockdown of the facility, which means we limit access to only those who need to be here until we have a better handle on the situation and who was involved,” says University of Arizona Medical Center Director of Security Harry Kirlin. “That was done immediately as far as the emergency room was concerned. When we became aware of the extent of the number of patients and their identities,
With a protracted event like this (over five months), I’d be very careful not to burn your [campus public safety] team out. We pulled from where we could from our nine campuses and medical office complexes. In a situation like this, you need consistency of operations, but you’ve also got people working 10-, maybe 12-hour shifts over a long period of time. You’ve got to figure out how to rotate your people out. We were constantly in the background making sure we had the right people on post at the right time, all the time, so there weren’t failures, which we didn’t have, thankfully. We are going to a model now of supplemental [officers], which are on-call people. We make them work a specific amount of time so that they stay fresh. We’ve also hired some pretty good contract agencies, and we’re writing a training manual so that when, if we have to call in reserves, those reserves will be trained to our standards. –Joe Bellino, system executive for security, Memorial Hermann Security professionals need to be fully integrated with the clinical administrative team at the facility. Security at a hospital can’t be run independently of the folks who are in charge of clinical care. There may be things that are best practices if you provide security in a public place like a restaurant that could jeopardize the medical care of a patient in a hospital environment. If the security guard violates an infection control protocol for some reason and steps into a sterile field, that can cause harm to the patient. – Carl Josehart, CEO, TIRR Memorial Hermann
www.campussafetymagazine.com
10/6/11 12:10:19 PM
we extended that lockdown to the entire facility until we had an idea of what was going on.” That meant everyone coming into the hospital had to go through the main entrance. Initially, there were three workstations to check in patients, but that number was soon increased to six so that waiting times would be reduced. Individuals wanting to enter the facility were searched and required to show their IDs, and their appointments were verified before they could enter. K9s checked for explosives. Special badges were created for individuals (law enforcement, medical staff and visitors) requiring access to Giffords’ location.
SECRET SERVICE SURVEY HELPS PREPARE HOSPITAL While access control was being ramped up, the hospital also experienced an immediate influx of law enforcement personnel from the local sheriff’s department, police department, FBI and Capitol Police Department. Seven or eight Capitol Police officers guarded Gifford’s room 24/7. The Secret Service was also involved and was very visible when President Barrack Obama and his wife visited the congresswoman only a week after the tragedy. The Secret Service conducts an annual survey of the hospital, just in case one of its protected parties comes to the campus. This survey, which takes into account things like the number of hospital beds and helicopter pads, helped the medical center prepare for Giffords and the other patients, as well as the president’s visit. Despite all of the law enforcement personnel involved, Kirlin says there weren’t any petty turf battles. “I’m an ex-cop, and usually in situations like these, you have a certain amount of jurisdictional jealousies, but we didn’t have them here,” he says. “Everybody worked very well together. I think it was because everyone was so shocked by the incident that everyone’s focus was on making sure everything went well.”
MEMORIAL HERMANN PLANS HELP SMOOTH TRANSITION Cooperation was also critical when Giffords was transferred approximately two weeks later to the Memorial Hermann Texas Medical Center (TMC) in Houston. Although Memorial Hermann officials only received about 24 hours notice that their institution would be taking over the medical care of the congresswoman, they quickly worked out a transition plan for her. It included how she would be transported from Memorial Hermann’s Life
Flight helicopter pad through the facility, security details, the clinical aspect of her arrival, as well as communications for the public and Memorial Hermann employees. According to TMC CEO Craig Cordola, his institution’s plan and its adaptability were two important keys to Giffords’ successful transition. He recommends that other hospitals treating high-profile patients identify beforehand appropriate entrances and routes that are secure and not accessible to the media or other visitors. Outside vendors should also be vetted by security. That being said, a campus should also be prepared for a quick change in strategy. “You could lay out a game plan and it could be good, but somebody’s going to call an audible along the way,” he says. “You need to be confident so you can adjust to that effectively without impacting the patient or their family, and be able to go on to the next destination. The medical team decided they wanted to go to imaging, so we had to prepare pretty quickly to secure imaging and make sure we could get there appropriately on the least visible route possible. We were able to modify that well because we had people with the patient who knew the facility. We had security with us that could call ahead and secure everything in advance.”
FAMILY OPTS FOR TRANSPARENCY WITH MEDIA, PUBLIC Drastic changes in plans might not only be due to medical necessity, but also according to the wishes of the patients and their families. With Giffords, the Capitol Police initially provided Memorial Hermann with a plan that called for maximum secrecy. “We were going to have three helicopters that would land, but only one would be carrying her,” says Memorial Hermann Chief Facility Services Officer Marshall Heins. “Just before we were ready to implement all of those plans and she was
(TOP LEFT) Memorial Hermann Chief Facility Services Officer Marshall Heins says that when a hospital has a high-profile patient, the institution must make sure that the care of other patients is not interrupted. (TOP) Two weeks after the attack, Congresswoman Gabrielle Giffords (D-Ariz.) was transferred to the Memorial Hermann Texas Medical Center (TMC). After her stay at TMC, she had physical therapy at TIRR Memorial Hermann. The healthcare center is located in Houston, has 11 locations, including TMC and TIRR, and more than 3,000 beds. Its campus public safety department has approximately 240 sworn and nonsworn officers, 45 of whom are armed. (BOTTOM) Congresswomen Gabrielle Giffords was transported to the Texas Medical Center via helicopter.
scheduled to arrive, the family made a decision that they wanted the media to be more involved and they wanted to be more open with the general public about what was going on. That is really atypical in our experience for these types of situations, and so within a very short period of time, we had to completely change all of the plans.” For example, Memorial Hermann and law enforcement officials allowed the public and media to know the route Giffords was taking. They allowed helicopters to fly over and follow the ambulances. The openness and transparency to the media and public that Giffords’ family wanted was something very new for Memorial Hermann and posed a challenge for security. “As a security professional, the less people know, the easier it is for us to manage OCTOBER 2011
CSJ_1011GabrielGiffords.indd 13
CAMPUS SAFETY
13
10/6/11 12:10:20 PM
COVER STORY
V. I . P. P R O T E C T I O N
To achieve the appropriate communications between Memorial Hermann public safety personnel and outside law enforcement, the campus set up a police command center that operated 24/7 while Giffords was on site. the situation,” says Memorial Herman System Executive for Security Joe Bellino. Additionally, with the bounty for a photo of Giffords running well into six figures, the temptation for the media, visitors and employees to violate her privacy was significant. To guard against this possibility, employees were prohibited from carrying cameras. Security also had to look closely at the hospital surroundings, such as rooftops and windows. To protect against unsanctioned photography, security used decoy rooms and obscured the windows where Giffords was being treated.
ACCESS CONTROL SAFETY COMPONENT APPLIED TO SECURITY Visitor management and access control technologies were used at both Memorial TMC and TIRR Memorial Hermann, where Giffords was rehabilitated. The hospital was able to provide these security measures with little disruption to the other patients or their families. “TIRR is more like a family environment, so we had to tweak things,” says Bellino. “We closed the perimeter down to two doors for the public. There is also a lot of access control because brain injury patients can wander. We don’t want them to get lost or go down a stairwell when they’re not ready for it. We were able to take the safety component of access control and apply it to security. It was a matter of reprogramming the system.”
Visitor passes were also needed. “We didn’t have to go out and spend a whole lot of money,” claims Bellino. “We kept it simple. We had a sign-in log, visitor pass book and all the passes were color coded with magic markers.” Even something as simple as handling a package or piece of equipment had to be done carefully. “We had some additional procedures for handling any mail or deliveries that were for her; any equipment or something that was made especially for her,” says TIRR Memorial Hermann CEO Carl Josehart. “It had to be handled in a special way to make sure that knowledge that it was going to get close to her didn’t create a security risk for her or the staff that was treating her.”
HOSPITAL SECURITY, LAW ENFORCEMENT PARTNER SUCCESSFULLY Like the University of Arizona Medical Center, TMC and TIRR Memorial Hermann campuses had a significant law enforcement presence during Giffords’ rehabilitation. In addition to the hospital’s sworn and nonsworn public safety staff, the Houston Police Department, the FBI, Capitol Police and even NASA security personnel were involved with the congresswoman’s security. “They were very conscious that we had a medical operation here, and they didn’t want to impact it,” Bellino says. Indeed, an important point that Memorial Hermann officials conveyed to employees and law enforcement was that although Giffords was an important dignitary, the treatment of the institution’s other 699 patients should not be compromised. To achieve the appropriate communications between Memorial Hermann public safety personnel and outside law enforcement, the campus set up a police command center that operated 24/7 while David LaRose (left), who is Memorial Hermann’s manager of training and education for security, and Joe Bellino (right), who is Memorial Hermann’s system executive for security, led the efforts to keep the congresswoman secure while she received medical treatment and physical therapy. (BOTTOM) The University of Arizona Medical Center was the first hospital to provide medical treatment to Congresswoman Gabrielle Giffords (D-Ariz.) after the attempt on her life in January. The hospital is located in Tucson, Ariz., has 460 beds and is the only level 1 trauma center in southern Arizona. Its security department has 44 nonsworn officers. Want to see more photos? Visit our photo gallery at www.CampusSafetyMagazine.com/ GabrielleGiffords. (TOP)
14
CAMPUS SAFETY
CSJ_1011GabrielGiffords.indd 14
OCTOBER 2011
Giffords was on site. “That was a big win for us,” adds Bellino. “Not only did the agencies communicate with us, they weren’t afraid to communicate with the officers on post. And we told our people that ‘it’s OK if a federal agent or Capitol Police officer asks you something; cooperate fully.’”
EMPLOYEES, MEDICAL STAFF ENCOURAGED TO BE VIGILANT Although technology and strong relationships between security and police are extremely important, Memorial Hermann officials know that no security program can really be effective without the full cooperation and support of its staff and medical personnel. That’s why when they discovered that Giffords would be receiving medical care at TMC and TIRR, they made a concerted effort to keep all employees apprised of the institution’s mission, privacy requirements and customer service requirements. “The constant vigilance of our staff in recognizing people who maybe look out of place on a day-to-day basis, whether or not it occurs with respect to Congresswoman Giffords or others, that ability to intervene and not walk by without making sure the environment is safe is probably the most critical success factor for security,” Josehart says. This heightened awareness was achieved via what Cordala calls “town hall meetings,” which were held as often as every three to four hours during the first 48 hours. “We worked very, very hard to make sure that our employees and leadership knew what was going on,” he says. “They may not have known all of the specifics of the care, but they knew what the expectations were, the time of arrival and generally the route this patient was going to take. If we weren’t communicating and working effectively as a team, so many areas in between could have broken down, which would have potentially put her at risk.” For information on how Memorial Hermann handles medical records privacy and HIPAA issues, visit www.CampusSafetyMagazine.com/MemorialHermannHIPAA. For information on how Memorial Herman managed the media during Giffords’ stay, visit www.CampusSafetyMagazine.com/ MemorialHermannMedia. For additional coverage of this and other healthcare and educational safety and security topics, visit
CampusSafetyMagazine.com www.campussafetymagazine.com
10/6/11 12:10:23 PM
A. B. C. D.
COMPETITOR PARTNER FIRED EMPLOYEE CONTRACTOR
With our Visitor Management System you’ll know who is in your building. And why. • Enterprise-class visitor registration, tracking, reporting and badge printing • Web-based pre-registration by employees • Tight integration with over 30 major access control systems • Employee and contractor time and attendance • Scalable from a single system to hundreds, with centralized administration • Affordable, easy to install and easy to use
Scan each visitor’s ID automatically and print a customized badge in 20 seconds or less. Thousands of customers worldwide have replaced their paper guest log with EasyLobby to improve their security and manage visitors more professionally.
Contact us today for a FREE Web Demo Phone: 781-455-8558 Email: sales@easylobby.com Online: www.easylobby.com
The Global Leader in Secure Visitor Management Systems
www.campussafetymagazine.com/freeinfo/20005
CSJ_1011GabrielGiffords.indd 15
10/6/11 12:10:25 PM
feature
cyber security
YOUR ULTIMATE GUIDE TO STUDENT AND SCHOOL INTERNET SAFETY EDUCATION, CLEAR POLICIES, CONTENT FILTERS AND NETWORK VISIBILITY WILL KEEP YOUR STUDENTS – AND YOUR CAMPUS NETWORK – SAFE. By Brittany-Marie Swanson ©iStockphoto.com/milosluz Photo/Illustration: Ron Rennells
16
CAMPUS SAFETY
CSJ_1011InernetSafety.indd 16
OCTOBER 2011
www.campussafetymagazine.com
10/6/11 9:09:59 AM
tudents can be the victims — or perpetrators — of cyberbullying, oversharing, identity theft and more while using the Internet. If such activity happens on campus, or affects the school environment, school administrators must be ready to intervene. Internet education and comprehensive policies will help your students navigate the Internet appropriately. In addition, safeguards such as network solutions and content filters will allow your school to comply with federal or state regulations, as well as prevent unwanted online activity.
S
STUDENTS DON’T SEPARATE ONLINE AND OFFLINE LIVES Many of today’s students don’t remember a time when the Internet was not readily available to them. Social networking, E-mail, instant messaging and search engines have become an integral part of doing homework and interacting with classmates. However, this often helpful and seemingly innocuous technology can be dangerous to students who do not know how to practice safe surfing and “netiquette” — online etiquette. “In many cases, students have never really gotten training on how to conduct their lives online,” says Erin Weed, CEO and Founder of Girls Fight Back! “[The Internet] is just kind of an extension of their life offline, so it is important to teach them about forming boundaries between the two.”
HELP STUDENTS THINK CRITICALLY Weed founded Girls Fight Back! in 2001 after her best friend was murdered on the campus of Eastern Illinois University. The organization has since reached out to almost a million women on topics such as self-defense, sexual assault prevention and Internet safety. Weed says Girls Fight Back! uses a lot of humor in its safety presentations, as students are more likely to absorb the important information if they enjoy the way it is delivered. “We try to help young people come to their own conclusions about what is a reasonable boundary,” she explains. When it comes to posting online, she adds, “I’m not saying there is a right or wrong, but I am saying students should stop and make a conscious decision.” Bobbie Eisenstock, Ph.D., a media education consultant, says that teaching media literacy is integral to keeping students safe online.
“Simply put, media literacy is the ability to think critically about what we see, hear, read and interact with in the digital media culture,” Eisenstock explains. “Media literate strategies can help students gain the competencies and social skills they need to navigate the Internet safely, responsibly and ethically.” Once students understand what constitutes appropriate Internet use, they are less likely to misuse or abuse the technology. “Being media literate is really an essential life skill for the digital generation,” Eisenstock adds.
‘YOU ARE WHAT YOU POST’ Social networking sites such as Twitter and Facebook have created endless opportunities for students to overshare personal information and photos with large groups of people — including some they may not know personally. “Whatever you post online or someone tags in your name [on Facebook] becomes part of your virtual identity,” Eisenstock says. “Make sure to opt-in to privacy settings to reduce your online visibility, but remember that nothing is really ‘private’ in cyberspace, and there are no take-backs. What you share at age 15 is probably not how you want to represent yourself at age 30.” Eisenstock says it is important for students to realize that the Internet is a public space — despite the feeling of anonymity it gives users. “Whatever you post can be searched, copied, pasted, altered, forwarded and viewed by not only ‘friends’ but people you may not realize can see it — friends of friends and family members, acquaintances and strangers, teachers and school administrators, college admissions and future employers, law enforcement and government officials,” she explains.
‘SEXTING’ PHOTOS CAN SPREAD ONLINE Girls Fight Back! also emphasizes the danger of posting too much information online.
Erin Weed founded Girls Fight Back! to teach selfdefense to women. Her book, Girls Fight Back!: The College Girl’s Guide to Protecting Herself, includes tatics for staying safe on campus.
“We try to present that the h id ideas that maybe you shouldn’t put all sorts of crazy stuff out there, but in a way where [students] come to the conclusion themselves — as opposed to us saying, ‘don’t do this, don’t do that,’” Weed explains. The Internet, Weed says, is just another tool of communication. However, increasingly, students have been using communication technology — such as cellphones — to spread inappropriate images of themselves or classmates (a practice called “sexting”). According to a 2009 study conducted by MTV and the Associated Press, 30 percent of 14- to 24-year-olds had either sent or received nude photos on their cell phones or online. Students who spread inappropriate images can be held legally responsible. It’s illegal under both federal and state child-porn laws to create explicit images of a minor; in addition, it is illegal to possess and distribute them. Although such laws were created to protect minors from adults, minors can also be held responsible — including the minor who is in the photo.
CYBERBULLYING VICTIMS DON’T SEEK HELP A 2010 study conducted by the Cyberbullying Research Center found that 20 percent of all 10- to 18-year-olds surveyed from 37 different schools in the United States had been the victims of cyberbullying. Yet many victims do not seek help. OCTOBER 2011
CSJ_1011InernetSafety.indd 17
CAMPUS SAFETY
17
10/6/11 9:10:00 AM
feature
cyber security
How to Create an Anti-Cyberbullying Policy While legislation about cyberbullying is pending in several states, school districts should be aware that they are within their legal rights to intervene in cyberbullying incidents (including those that occur off-campus) if the cyberbullying disrupts the educational environment. The Cyberbullying Research Center suggests that anti-bullying policies include the following: • Specific definitions for harassment, intimidation and bullying (including the electronic variants) • Graduated consequences and remedial actions • Procedures for reporting • Procedures for investigating • Specific language explaining that if a student’s off-campus speech or behavior results in “substantial disruption of the learning environment,” the student can be disciplined • Procedures for preventing bullying (workshops, staff training, curriculum enhancements) For more information, www.cyberbullying.us.
What to Do if You Are Being Cyberbullied Students who are cyberbullied — according to Bobbie Eisenstock, a media education consultant — should not respond directly to the harassment. Instead, they should: • Block communication with the bully • Document the attacks (take screenshots of abusive comments, print out copies of E-mails) • If the bullying persists, it should be reported to the Internet Service Provider or Web moderator • The student should also alert a parent, teacher or school official
18
CAMPUS SAFETY
CSJ_1011InernetSafety.indd 18
OCTOBER 2011
“Telling an adult about any electronic aggression is one of the most important steps to take, but unfortunately, only one in 10 kids get help from a parent or other adult,” Eisenstock says. Students who are v victims of cyberbullying fear retaliation from the bully or the loss of their Internet privileges. “Parents need to reassure kids who are victims that they will not be punished by having their tech devices taken away. This is a teachable moment for parents to promote digital citizenship and to reinforce the values that they want their kids to use when they go online,” Eisenstock continues. “In fact, using any media as reward and punishment is not really an effective way to help kids learn to use media wisely.”
VICTIMS SHOULD DOCUMENT ONLINE ABUSE Both Eisenstock and Weed suggest that any student who is cyberbullied should not respond to the bully directly. Instead, the victim should — if possible — block the bully’s access to their social media profile. On Facebook, users can ‘unfriend’ the person or block them completely. They can also report abusive online behavior to Facebook; if the behavior violates Facebook’s terms of use, the bully runs the risk of having their profile terminated. “I use a strategy called ‘detach and watch’,” Weed says. “I completely disengage [from the bullying], but I still monitor it because when people are saying crazy stuff, you don’t know if that’s going to escalate to offline violence.” Cyberbullying victims should document the abuse — screenshots will be helpful in the event the bully deletes his or her comments — and report it to their Internet Service Provider or Web moderator.
DISTRICTS RESPONSIBLE FOR ENFORCEMENT Many states have enacted laws to address cyberharassment, cyberbullying or cyberstalking; recent legislation in particular has made school districts the policy enforcers in these types of crimes. Because of this, cyberbullying has been included in most schools’ antibullying policies. The majority of states have laws that establish sanctions for cyberbullying on school property, in buses and at official school functions. However, it is important to note that some states have extended district enforcement to cyberbullying that occurs off-campus, because it can disrupt the learning environment. State laws that
have placed off-campus cyberbullying under the authority of districts call for school interventions, suspension or expulsion. Bullies can also be charged with misdemeanors or felonies. Some state cyberbullying laws also promote Internet safety education. Eisenstock says districts should consider social norming as an intervention for cyberbullying. “Media reports give the impression that ‘everybody’s doing it’ — which tends to normalize bullying behaviors. In reality, this isn’t true. But if students believe that most kids their age cyberbully, then they are more inclined to engage in some form of bullying behavior,” she explains.
IDENTITY THEFT IS A THREAT Students who overshare on the Internet also run the risk of having their identities stolen. Personal information from Twitter and Facebook can be used by cyber criminals if it is not protected properly. Criminals “can harness the information they need to steal your identity from [social media sites],” according to Denis Kelly, an expert on identity theft prevention and chairman of the Identity Ambassador Commission. “The main defense is, avoid posting personal information,” Kelly adds. “Don’t accept friend requests from people that you don’t know personally. When you accept a friend on Facebook, it gives them more access to information than the general public has. If you don’t know somebody personally, why would you trust them with your personal information?” Eisenstock agrees: “My best advice is basic: Keep your personal information private. That means don’t share full name, age, address, telephone or cell number, school name, password information [or] photos with identifying information such as school team or home residence,” she says. Students can also protect this information by regularly monitoring their security settings. “A lot of people don’t realize there are security settings on their Facebook account,” Kelly explains. “You want to verify that your security settings are adequate.” This is different for Twitter users, whose posts can be “followed” by other users — or the general public — without their consent (on Facebook, users receive friend requests, which can be denied). On Twitter, students must either block individual users or set their entire profile to private. www.campussafetymagazine.com
10/6/11 9:10:02 AM
ONLINE FRIENDS SHOULDN’T FIND YOU OFFLINE Kelly also points out that Facebook status updates or tweets about a user’s location can let other users know how to find them. It can lead to home invasions. “In cases where there is cyberstalking, robberies can happen because people know that you’re not home,” he says. “If there’s a post on your Facebook account that says you’re at a restaurant, potential criminals know you won’t be at your house.” Facebook also includes a functionality called “Facebook Places,” which allows users to “check in” at locations using the GPS on their mobile phones. The security default for the feature is automatically set so that the information is shared with friends only; however, if a student is in the habit of accepting friend requests from people they don’t know, the feature could open them up to potentially dangerous situations. In her book, Weed writes: “According to the National Center for Victims of Crime, the definition of cyberstalking is threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications. Research has
found that 80 percent of cyberstalking victims are female and most offenders are male. Clearly this is an issue that not only affects college girls today but will most likely increase in severity as technology advances.” Social networking sites have made it easier to locate people using data found online. “The whole idea is you don’t want people who are online to find you offline,” Weed says. However, Eisenstock points out that Internet predators are not the most pressing threat to students: “The two most spotlighted risks are cyberbullying and predators. Of the two, studies indicate that young people are much more likely to encounter a bully than a predator online.”
STUDENT-OWNED DEVICES CAN AFFECT YOUR NETWORK Students aren’t the only one who are vulnerable. School and university networks can be victims too, especially when student-owned devices are allowed on the network. “Due to budget cuts, we’re seeing more and more that districts can’t supply enough devices for students and faculty,” says Frank Andrus, co-founder and CTO
Bobbie Eisenstock, Ph.D., is a media education consultant specializing in the social and psychological effects of media technology on children, teens and families.
of Bradford Networks. “They are allowing students and faculty to bring in their own devices, and once they do that [the school network] really becomes a huge guest network.”
Media Literacy for Students MEDIA LITERACY EDUCATION teaches students to critically analyze what they see, hear and read in advertising, news and entertainment media. Now that youth are media creators in the digital world, they need to think critically about the content they create. Teach students to get into the habit of asking five key questions before they send, share or post in cyberspace.
1. What is the purpose of my message? • Why did I create, post or send the message? • Who did I want to reach? Do I expect a response? • What kind of attention might my message attract? Is it the kind of attention I want? 2. Why did I use this technology to express myself? • Why did I choose this form of communication — IM, e-mail, text message, twitter, blog, social networking, chat, webcam, podcast, video or photo sharing — and is it the best way to express what I wanted to say? • What creative techniques did I use — photos, images, icons, emoticoms, lingo, animation, avatar, music, sounds, colors, fonts, camera angles, interactivity, photoshop? If I use popular songs, video clips, clip art, cartoons, logos, artwork or other cultural artifacts, do I need to obtain copyright permission? • What terms or conditions do I agree to when I use this technology tool? 3. What does the message say about my values, beliefs and behavior? • What type of person does it suggest I am? Is this what I intended? • Does the message tell things about me that I should keep private? • What did I include or leave out and why? What could I communicate differently?
4. How might different people interpret my message? • Does the person or group I sent the message to understand it the way I meant? • Do I show respect for people’s privacy? Do I hurt anyone’s feelings? • How might someone I did not intend to see my message interpret it, including my parents and other family members, friends and classmates, teachers and coaches, college recruiters, future employers, strangers or law enforcement? How do I feel about what they think? 5. How do the choices I make affect me? • What is my Net reputation? Is this how I want to represent my cyber identity? • How might what I post affect me or my family and friends now and in the future? Who might benefit and who might be harmed? • How much control do I have over my online content? If I delete something, is it gone forever? Who owns what I create? Who might profit from it? • Did I break any laws creating, posting, or sending content? What are the consequences of my actions?
The original version of this guide was published in “You Are What You Post,” Cable in the Classroom, July/August 2008. For more information, visit www.BobbieEisenstock.com
OCTOBER 2011
CSJ_1011InernetSafety.indd 19
CAMPUS SAFETY
19
10/6/11 9:10:05 AM
feature
cyber security
The district already allows faculty to log into the network using personal devices, and Greenwood believes it is only a matter of time before students can too. “I think there will be increasing pressure on the technology staff to make sure that the school district’s infrastructure can facilitate those devices,” he concludes.
DEVICES MUST BE SCREENED PRIOR TO ACCESS
Denis Kelly is an identity theft prevention expert and the author of The Official Identity Theft Prevention Handbook.
Anaheim Union High School District in Anaheim, Calif., recently received requests from some of its parent councils asking that students be able to log into the district’s network using their own laptops, cell phones and other devices. “Students want to have more opportunity to use the tools that their parents have given them to do research and homework during passing periods, during lunch and after hours if the student is engaged in extracurricular activities,” explains Erik Greenwood, the director of education and information technology for Anaheim Union.
If a district allows students to access its network on personal devices, it is vital that those devices are screened accordingly. “The issue with personal devices is that the settings are not maintained in a manner consistent with best practices,” Kelly says. “Generally, you can use an airlock type approach. When a device connects to the network, it’s placed in a holding area where [the student] doesn’t have any access to resources. Then a security scan can be performed to verify the…readiness of the device.” Bradford Network’s Network Sentry products allow districts to ensure that the devices connecting to the network are equipped with up-to-date anti-virus and anti-spyware software. They can also be used to “look for prohibited or acceptable applications,” Andrus explains. “If a district doesn’t want peer-to-peer applications on their end stations, we can look for the peerto-peer applications themselves. If a station has those, we can tell the student that they have to remove them in order to gain access to the network.”
Block Inappropriate Content at Your School TWENTY-FIVE STATES HAVE LAWS requiring Internet filtering in publicly funded schools or libraries. Most of these laws only require that school boards adopt Internet use policies that prevent minors from accessing sexually explicit or obscene material. On the other hand, some states do require that schools install filtering software on school computers. Anaheim Union High School District in Anaheim, Calif., has had a content filter and firewall in place for quite some time. “We also have a content monitoring product that doesn’t prevent students from doing anything, but it gives us visibility into the network if students are finding a way around the barriers that we’ve put up to comply with CIPA (the federal Children’s Internet Protection Act),” says Erik Greenwood, the director of education and information technology for Anaheim Union. CIPA requires schools that receive funding for Internet access or internal connection from the federal E-rate program to block access to pictures that are obscene or harmful to minors. In addition, under CIPA, schools must adopt an Internet safety policy that addresses the following: • Access by minors to inappropriate matter on the Internet • The safety and security of minors when using electronic mail, chat rooms and other forms of direct electronic communications • Unauthorized access, including so-called “hacking,” and other unlawful activities by minors online • Unauthorized disclosure, use, and dissemination of personal information regarding minors • Measures restricting minors’ access to materials harmful to them.
20
CAMPUS SAFETY
CSJ_1011InernetSafety.indd 20
OCTOBER 2011
NETWORK VISIBILITY IS KEY Having the ability to monitor student Internet activity is important for districts looking to ensure that students are not bypassing content filters. Earlier this year, the New York Department of Education was forced to install new Internet filters in the city’s schools after a group of third graders from Public School 85 were able to view inappropriate photos by searching the phrase “hot girls” on Google. Using a network solution, devices can be registered to specific students or faculty members. In addition, students are given their own log in credentials. Under this system, school officials will be able to tell whose device is being used to access inappropriate content, as well as who is using the device — even if that person is not the owner. “[Districts] can actually use the information not only to have a secure environment, but also to see what the behavior of their student population is,” Andrus says. “Typically, students aren’t doing something bad; they just may be connecting something to the network that’s bad [such as a computer with a virus].”
GET YOUR SCHOOL POPULATION INVOLVED In addition to putting technology safeguards in place, “it is important to make certain that you are always educating students and faculty about best practices,” Kelly says. “[The education] should be regular, consistent and easy to understand.” At Anaheim Union, students receive information about the district’s Internet use policy each year as part of their school registration packet. “Because technology evolves every year, there always seems to be something new we need to address,” Greenwood says. The district’s Internet policy is available on its Web site and includes a list of prohibitions, as well as tips on “netiquette.” “You want to get the whole population involved. If your district is going to allow student-owned or faculty-owned assets onto the network, then you should provide training and education for those students and faculty about your policy and what the acceptable use should be for those devices,” Andrus explains. “If you let the population understand what you expect, you typically end up with a better result.” For additional coverage of this and other healthcare and educational safety and security topics, visit
CampusSafetyMagazine.com
www.campussafetymagazine.com
10/6/11 9:10:06 AM
know how to
train your staī
Produce timely, accurate Clery reports... Access live video & current information...
Anytime from anywhere... And always know who is qualified...
⇒nd the Emergency response plan and call lists... Latest hate crime statistics for your campus...
NaviGate™ – One web-based system, so many rewards for a variety of users: • Robust reporƟng tools, including Clery Act Reports • Emergency planning, preparaƟon, and response
manage and apply their essenƟal informaƟon through integrated document, incident and learning management. Through secure controlled authorizaƟon, NaviGate opƟmizes daily operaƟons and emergency
• Incident trending and data tracking
response, providing access to informaƟon–anyƟme,
• InteracƟve ⇓oor plans
anywhere.
• Online learning tools • Comprehensive document management with version and access control
L auren I nn ovat i ons
NaviGate enables any organizaƟon to collect,
|
Schedule your NaviGate demonstraƟon today.
w w w.l aure ni nnovati ons.com
|
866.86 1.7400
www.campussafetymagazine.com/freeinfo/20115 CSJ_1011InernetSafety.indd 21
10/6/11 9:10:07 AM
feature
security technology
A Green Perspective on Campus Security
ŠiStockphoto.com/sshepard
SECURITY CAN PLAY A POSITIVE ROLE IN MAKING YOUR INSTITUTION MORE ENVIRONMENTALLY FRIENDLY. By Bill Taylor
C
ampuses are ideal environments to embrace sustainability and environmental strategies. From the use of building materials that contain recycled content to water-efficient landscaping, to maximizing the use of daylight to installing fixtures that reduce water use, the opportunities are rich to incorporate various green strategies throughout the K-12, university and hospital campus environment. The U.S. Green Building Council and other organizations promote the greening of America’s campuses through programs targeted at schools, colleges, hospitals and other environments. It also promotes environ22
CAMPUS SAFETY
CSJ_1011GoingGreen.indd 22
OCTOBER 2011
mentally friendly building methods via the Leadership in Energy and Environmental Design (LEED) program. LEED recognizes construction projects that implement strategies for better environmental and health performance through a suite of rating systems. But green buildings are only part of the story. Green issues in the campus environment also might include waste minimization and recycling, using greener products and even providing bike racks or preferred parking for van pools. Campus police and security departments are also critical players in the greening of the campus environment. Here are some places to start. www.campussafetymagazine.com
10/6/11 9:28:43 AM
www.campussafetymagazine.com/freeinfo/20020
CSJ_1011GoingGreen.indd 23
10/6/11 9:28:46 AM
feature
security technology
MINIMIZE ENVIRONMENTAL IMPACT OF SECURITY OPERATIONS
When choosing technology elements for a security system in the campus environment, look at the environmental record of suppliers. Suppliers should have a goal of reducing CO2 emissions and optimizing productivity across all manufacturing processes, from planning through production. They should use manufacturing practices that produce low material waste and use material recycling. — BILL TAYLOR
24
CAMPUS SAFETY
CSJ_1011GoingGreen.indd 24
OCTOBER 2011
The U.S. Green Building Council defines a green campus as a “community that is improving energy efficiency, conserving resources and enhancing environmental quality by education for sustainability and creating healthy living and learning environments.” Campus police and security departments should take each element of that definition and consider any and all aspects of their operations that could have an impact. If you really think about it, there are plenty of ways campus security can be more environmentally conscious. It’s important to note that implementing green practices should never compromise the ability of campus police and security to fulfill their primary duties. Embracing green technologies and strategies should occur as part of effective and optimal campus security operations. As important as it is to “think green,” the mission is secondary to security’s primary functions. Remembering that caveat, let’s look at how campus police and security can embrace green strategies. Petroleum-powered vehicles pollute the air, and many campuses have embraced the use of bicycles, hybrid or electric vehicles and Segways as alternative modes of transportation. Conserving resources might also relate to security officers doing more electronic reporting rather than creating reams of paperwork. An electronic approach not only saves trees but also can have operational advantages. Additionally, the security department can work to minimize the environmental impact when it is installing new systems. This effort might include reusing system components and/or ensuring that older equipment (e-waste) is properly disposed of or recycled.
CHOOSE SECURITY SYSTEMS WITH GREEN BENEFITS IN MIND How security systems operate can have an impact on environmental issues, and keeping green concerns in mind when designing a system can reap rewards, as well as help to cost-justify new equipment. An example is remote video surveillance, which has multiple operational advantages for the campus environment as well as green benefits. Remote video enables security officers to view distant parts of the campus without having to travel there. A remote video image can help an officer dismiss a false alarm without having to investigate. It could also enable him or her to view a situa-
tion that might waste energy, such as a door left open. Integration of centralized access control systems with HVAC systems or lighting can automate energy-saving policies, whether by turning off the lights in an empty building or adjusting heating and cooling based on building occupancy. Technology can also be used to help facilitate the success of other campus green efforts. One example might be to install video cameras to keep commuters safe when waiting for a rideshare van. Another might be to use video cameras that can operate effectively in unpredictable and changing light, such as when natural light is being used to save energy. Smarter cameras and additional image processing can now provide clear images, even in extreme or complex lighting, without missing any details, whether they are in the shadows or the brightest sunlight. Night vision cameras can perform well even in the (energy-saving) complete absence of light.
SELECT SUPPLIERS WHO ARE ENVIRONMENTALLY CONCIOUS When choosing technology elements for a security system in the campus environment, look at the environmental record of suppliers. Suppliers should have a goal of reducing CO2 emissions and optimizing productivity across all manufacturing processes, from planning through production. They should use manufacturing practices that produce less material waste and use material recycling. Seek out products that are made using renewable energy or by a supplier that emits fewer greenhouse gases in the manufacturing process. Look for products that are made using fewer toxins that can harm human health or the environment. Look for products that contain the highest possible percentage of post-consumer recycled content. A measure of a supplier company’s environmental impact is conformity to ISO 14000 environmental management standards. These are aimed at minimizing how the manufacturing processes negatively impact the environment, at ensuring compliance with applicable laws and regulations, and at continuous improvement related to green practices. Manufacturers are certified by third-party organizations to document adherence to the standards. Related to electronic products, the European Union has issued a directive on the use of certain hazardous substances in electrical and electronic equipment, commonly referred to as the Restriction www.campussafetymagazine.com
10/6/11 9:28:47 AM
TM
Safety Whistles Designed by Search & Rescue Professionals
TM
Made In
USA Sound is the #1 Factor in Finding Lost Victims and Preventing Crime. Based on decades of extensive Search & Rescue experience this whistle utilizes a patented 3-chambered design to produce multiple frequency blasts of up to 120 Decibels, giving victims the best chance of being HEARD and RESCUED. 7KH 2IÀFLDO :KLVWOH RI OLIH VDYLQJ RUJDQL]DWLRQV VXFK DV WKH National Association For Search & Rescue, National Safe Boating Council and US Life Saving Association, trust the ZKLVWOH WKDW ÀUVW UHVSRQGHUV XVH IRU WKHLU RZQ HTXLSPHQW Made in the USA for quality and performance, your whistles will be customized with any full-color logo and security or contact information in a self-healing, UV resistant dome label. Preferred supplier of campus safety organizations.
Split Ring and Clip for Easy Fastening to Gear
UV Resistant Custom Jewel with Your Logo
Third Chamber With Pea Creates A Loud 120 Decibel Staccato Sound >HMÅLK :\YL .YPW MVY >L[ Cold or Gloved Hands Two Outer Pea-less Chambers Create Separate Omni Directional Sounds
Hands Free Mouth Grip Will Not Freeze To Lips www.campussafetymagazine.com/freeinfo/20010
www.whistlesforlife.com CSJ_1011GoingGreen.indd 25
Toll-Free: 800-454-5706 10/6/11 9:28:50 AM
feature
security technology
of Hazardous Substances (RoHS) directive. RoHS compliance reflects a significant reduction in the use of lead and five other hazardous materials in manufacturing: mercury, cadmium, hexavalent chromium, polybrominated biphenyl and polybrominated diphenyl ether.
CONSIDER THE ENVIRONMENT WHEN SPECIFYING PRODUCTS
3 WAYS
You Can Help Security Go Green 1. Volunteer For Committees Green concerns cut across every department and every stakeholder in the campus environment. Greening the campus is not one person’s job; it is everyone’s job. Working with colleagues in other departments, on campus-wide committees or related to special projects, is a great way for campus security to jump into environmentally friendly waters. Getting involved, however, takes time and commitment. No one really has the time, but we can all make the time if the need is important enough. 2. Benchmark With Other Departments A campus-wide green edict affects every department, and there may well be other departments on the campus that have identified best practices that can be adapted to a security department’s operation, whether it involves paperwork minimization, two-sided printing or recycling waste. Don’t hesitate to pick the brains of the “green champions” on your campus and work toward becoming one yourself. 3. Work With Procurement and Suppliers Those involved in procuring goods and services in the campus environment are more than likely well-versed in the idea of buying green. There is information in the marketplace about various suppliers and their green records. Procurement can evaluate that information and specify green elements as part of a purchase contract.
26
CAMPUS SAFETY
CSJ_1011GoingGreen.indd 26
OCTOBER 2011
Some security and video surveillance system components are greener than others. The design of a product can suggest a greater or lesser environmental impact during its manufacture. Smaller-sized products require less material processing when they are manufactured, conserve natural resources and ultimately produce
er than rip out the old system completely and start from scratch? Using a hybrid approach with video encoders enables this strategy, and reusing hardware helps to reduce waste (because the old hardware doesn’t have to be disposed of). Using “less” can also extend to technologies such as Power over Ethernet (PoE), which enables camera signals and power to the camera to be carried along a single cable.
POLICE, SECURITY MUST DO THEIR PART Green awareness should permeate every part of our campus culture, including the security department. Security professionals, like all good citizens of the world,
Green awareness should permeate every part of our campus culture, including the security urity department. Security professionals, like all good citizens of the world, should developp akeen environmental consciousness, and look for ways every day to translate that consciousness into deed and action. less material to recycle or discard, while maintaining established performance and reliability standards. In the field of video surveillance, cameras are getting smaller while their functionality is expanding. Smaller form factors enable use in a wider variety of applications, and their manufacture also has less of an impact on the environment. The use of more energy-efficient equipment options can also make a real difference, even related to low-voltage systems. For example, choosing a video camera that lowers power usage by 30 percent may equate to only several dollars worth of energy savings in a year, but the amount can start to add up in a campus-wide video system with scores of cameras.
DESIGN SYSTEMS WITH FEWER COMPONENTS Every component in a security system had an impact on the environment when it was manufactured and will also likely have an impact at the end of its useful life. Creating systems with fewer components helps to minimize that impact. For example, is it possible to minimize the number of servers a system needs? Can you use a network video recorder (NVR) that doesn’t require a separate PC? Could you reuse existing legacy video equipment, such as analog cameras, rath-
should develop a keen environmental consciousness, and look for ways every day to translate that consciousness into deed and action. Among other things, the security department should consider the environmental impact of technology choices and evaluate each supplier’s green record. These ideas are just the beginning of how a security department can contribute to campus environmental efforts. Any progress in the greening of the security department must begin with a heightened consciousness of environmental concerns and attention to green issues. From that awareness might emanate a series of small, but real, changes that can contribute to an overall campus effort. More importantly, it can also contribute to a global-wide effort to change the world for the better. System dependability and security integrity should never be compromised for the sake of the environment. Even so, there is ample room for security on any campus to work toward sustainability and toward the greater environmental good. BILL TAYLOR is president of Panasonic System Networks Company of America. For additional coverage of this and other healthcare and educational safety and security topics, visit
CampusSafetyMagazine.com www.campussafetymagazine.com
10/6/11 9:28:51 AM
Want to...
Lock, unlock and lockout doors, acknowledge alarms, run reports, manage cardholders, and much more remotely from your Smartphone?
IDenticard has an App that can do just that, and much more! Access Management · Lock, unlock, or lock-out any individual or group of doors · Run history reports on system events · Acknowledge and clear system alarms
Cardholder Management · Take and upload cardholder pictures · Add a new cardholder record and print · Instantly de-activate a cardholder record
0811-73ID
40 Citation Lane t Lititz, PA 17543 TEL 800.233.0298 t 717.569.5797 www.IDenticard.com www.campussafetymagazine.com/freeinfo/20083
CSJ_1011GoingGreen.indd 27
10/6/11 9:28:57 AM
feature
mass noitifcation
YOUR CAMPUS EMERGENCY NOTIFICATION CHECK-LIST
Be sure to carry out these tasks to ensure your mass alert systems reach everyone on campus during a crisis. ByRobin Hattersley Gray 1
CONDUCT SITE ASSESSMENTS
for each technology being deployed. For example, with 28
CAMPUS SAFETY
CSJ_1011MassNotif.indd 28
giant voice, test the technology to see how intelligible it is when it is used on campus. Consider the campus’ geography. Will trees, buildings or hills block the sound? For SMS text solutions, does your campus have cell phone dead zones? Test the signal strength, and if it is weak, work with the cell carriers to see if they can improve it. 6 DETERMINE AHEAD OF TIME who has the authority to issue emergency alerts. Also develop the standard operating procedures concurrently with the purchase of the system. 7 CREATE CLEAR, concise audible and written emergency messages ahead of time that can be edited on the fly. The messages should originate from a campus or district authority and should be vetted by the campus communications department. 8 USE AND TEST the system often (but not too often). A reasonable amount of system usage, especially for campus-wide closures related to severe weather, encourages employees and students to sign up for the campus emergency alert SMS text system. It also helps educate them regarding campus emergency preparedness. 9 DEVELOP VARIOUS GROUPS of first responders and decision makers (police, residence life, emergency management, facilities, etc.) who are designated to receive messages more
OCTOBER 2011
frequently. That way, during an actual emergency when the system must reach everyone in the community, campus emergency notification system administrators have actually practiced deploying the solutions. “This helps to avoid what I like to call the ‘big read button with dust on it’ syndrome,” says Rick Tiene, who is Cooper Notification’s vice president of homeland security solutions. “It’s generally the same people who also have to send out the tornado or active shooter alerts. They are just sending the messages to different [more] people.” 10 AUTOMATE YOUR SMS text alert database so that the system automatically adds and deletes cell numbers and E-mails appropriately. It is best to tie in student enrollment and human resource databases for this task. 11 INCORPORATE ADEQUATE logical security measures so that your campus’ SMS text message database won’t be hacked. Maintaining the database onsite and only providing a vendor with as much information as it needs could also help prevent a data breach.
Illustration: Ron Rennells
“Understand what you are trying to solve or the risk you must mitigate,” says Cooper Notification Vice President of Marketing Ted Millburn. “Based on the study, figure out, ‘Do I solve the problem with a process or a technology?’ Unless you do that, you are throwing either a technology solution or process solution at the last emergency that occurred on your campus.” 2 INVOLVE THE IT DEPARTMENT in your planning process, and develop buy-in with other oncampus stakeholders, including parking, facilities, athletics and administrators. 3 SHARE RESOURCES (funds, technology and personnel) with other departments on campus as well as off-campus agencies, such as county emergency management and local police. Will the systems you are considering work with outside agencies? Also consider less traditional sources of funding, such as endowments, financing and vendor price structuring. 4 USE A LAYERED APPROACH that incorporates several different technologies so that the strengths of each solution compensate for the weaknesses of the others. Be certain to account for the hearing and sight impaired. 5 CONDUCT A RISK ANALYSIS.
12
by whitelisting. Campuses or their vendors can work with cell carriers and aggregators so their emergency messages aren’t blocked. 13 AVOID SPAM FILTERS
CONSOLIDATE THE ACTIVATION
process of all of your systems. Although it is a best practice to adopt several modes of mass notification, activating each separately can be time consuming. Many emergency alert vendors now offer solutions that can notify campus communities via text, E-mail, digital signage, Web site announcements, computer popups and more simultaneously. 14 EDUCATE THE CAMPUS community on how the system is used and what to expect and do during an emergency. Campuses often do this via E-mail announcements, new student and staff orientation, Web site announcements, teacher/parent meetings, parent association meetings and more. For additional coverage of this and other healthcare and educational safety and security topics, visit
CampusSafetyMagazine.com
www.campussafetymagazine.com
10/6/11 11:08:36 AM
SECURITY QUESTIONS?
SOLVED. AT ISC SOLUTIONS. SEE HOW ALL THE PIECES FIT TOGETHER. t explore product interoperability t become more proďŹ table t interview new customers
N OV E M B E R 2 -3 . 2 01 1 J AV I T S C E N T E R N Y C register now at iscsolutions.com/CS
NOW PART OF SECURITY WEEK. 3 days, 4 events. For all security professionals.
NOVEMBER 1-3.2011 scan for more information
www.campussafetymagazine.com/freeinfo/20086
CSJ_1011MassNotif.indd 29
10/6/11 11:08:38 AM
feature
apparel
ADJUSTABLE COMFORT Every foot is different. Two people who generally wear the same shoe size might still prefer different styles of shoes because of how they fit specific parts of the foot. Now companies are finding better ways to make their mass-produced footwear feel like they were made for the individual. The secret is allowing customers to make their own adjustments to fit their feet. Three years ago, Bates debuted its Individual Comfort System (ICS), which allows the wearer to turn a disk in the shoe to make adjustments that customize the fit by controlling firmness, cushion, and inward and outward stability. What’s new is that it’s now easier to access the disk to make the adjustments, even selecting different settings on different days, if desired. “Instead of the disk being on the bottom of the midsole internally, it now sits on top,” says Bates’ Director of Marketing Andrew Fowler. “All you have to remove is the sock liner or footbed and lift out the disk itself.”
Original S.W.A.T.’s Metro Traction outsole features strategically placed ladder tread to facilitate fast roping.
FANCY FOOTWEAR New features in today’s law enforcement boots provide enhanced fit, comfort and performance. Melanie Basich
I 30
CAMPUS SAFETY
CSJ_1011Footware.indd 30
AS YOU EXIT THE AIRCRAFT AND FAST ROPE DOWN, THE INSIDE OF YOUR INSTEP ON YOUR BOOT CAN GENERATE UP TO 800 DEGREES FAHRENHEIT OF HEAT. AND WITH THAT, MOST NYLON, LEATHER, OR RUBBER WOULD DISINTEGRATE. — Bob Kaiser, Magnum CEO A comfort trend seen in several companies’ footwear is adjustable lacing, not the typical “lace to toe.” Both 5.11 Tactical and Danner provide this type of construction. This allows you to adjust the tension of individual sections of your boot to best fit each part of your foot’s unique shape. This feature is currently only available on 5.11 Tactical’s new Taclite boot, but it will be available on the entire series, including eight- and six-inch models in black leather and tan suede. Danner’s “variable lacing system,” found on the company’s DFA boot, consists of nylon ghillies placed in between the eyelets. According to Ryan Cade, product line manager for Danner, the multi-part system is “climbing inspired.”
FAST ROPING
t’s not enough to make a black boot and call it a law enforcement model anymore. Police and security officers are sophisticated consumers, and they know what they like. They also know there are many new features out there that can take their footwear to the next level of performance to meet their needs on the job. Manufacturers realize this, and they’re up to the challenge. OCTOBER 2011
manager for Haix North America. “The sole is constructed in such a way as to have fast breaking properties, too. It has a sharper edge so you can stop quickly when going down the rope.” To hold up to speedy descents, Danner’s DFA boot features the company’s patent pending V.I. outsole with Vertical Insertion Arrestor (VIA) technology, which utilizes the very hard Vibram V-4 ultra abrasion rubber compound that Cade says is “the highest abrasion-resistant compound they make.” This material built into the medial side-arch of the outsole won’t fall apart like EVA, says Cade. Danner also constructs its DFA boot with low oil-content nubuc leather. “Full-grain leather would foul the rope after multiple descents,” Cade explains. Magnum’s biggest concern for operators fast roping is the heat created by friction between the boot and the rope, so its boots intended for this use feature a combination of a hard rubber compound underneath and a Superfabric upper to withstand the abuse.
When it comes to climbing, for law enforcement that usually means walls or ropes, and features such as distinctive tread on the instep of a boot can aid in fast roping, especially important for tactical units and other teams that might need to rappel. The GSG9S boot from Haix is intended for use by SRT or SWAT teams, so it’s built with fast roping in mind. “It has a slimmer, more compact design and minimal seaming on the inside so you don’t tear up the seams on the inside of your boots,” says Sandy Longarzo, marketing administration
“As you exit the aircraft and fast rope down, the inside of your instep on your boot can generate up to 800 degrees Fahrenheit of heat. And with that, most nylon, leather or rubber would disintegrate,” says Magnum CEO Bob Kaiser. “With our system, the Superfabric material can withstand up to 1,500 degrees before it starts to melt.”
COOLING OFF Whether you’re sliding down a rope, walking or running, it’s easy for your feet to feel hot after sitting in boots for a while. Especially in warmer climes, innovations to alleviate such discomfort are welcome. This is why the uppers on 5.11 Tactical’s new Taclite boot feature a more progressive design incorporating less traditional materials. “Panels of breathable air mesh instead of Cordura Nylon give us windows of breathabililty,” says Joel Alarcon, director of strategic business unit footwear for 5.11 Tactical. “And behind the airmesh we use a high-quality backing foam. None will absorb water.” Also focusing on materials used to lower foot temperatures, Haix boots feature Sun Reflect leather. “It’s a specially treated leather that reflects sunlight so it keeps the leather, and in turn your feet, cooler,” Longarzo says. Depending on where you live and work, one such simple feature can www.campussafetymagazine.com
10/6/11 11:12:19 AM
make a big difference in overall comfort throughout the day. Danner’s DFA boot comes in a waterproof version, but the company also sells a “hot version” that is unlined and features spacer mesh lining. “It’s not waterproof, but in hot weather environments, it’s significantly more useful for an operator to promote foot health and allow for additional breathability,” Cade says. Instead of relying on materials to cool feet, other companies have developed systems that literally push air through and out of a boot. Bates developed its crosschannel circulation, or C3, technology.
5.11 Tactical’s Taclite collection features zonal lacing for a custom fit.
“It’s quite a challenge to make a boot extremely breathable and still retain the rigidity you need and the level of water repellency a customer needs,” says Fowler. “But we built a system of channels through the sidewall of the midsole of the shoe, so the wearers as they walk and move can almost pump air into and out of the foot cavity.” To make room for this “portal system,” designers had to use less lining materials behind the boot’s nylon panels, which also significantly increased breathability. In fact, breathability can be measured in the lab with what is called the moisture
Bates’ Individual Comfort System is now easily accessible and allows officers to adjust for firmness and inward and outward stability
vapor transfer rate, and a boot with C3 technology has twice the MVTR of the industry qualification standard of a “breathable” shoe. Along the same lines, Magnum’s Vent Guard is a one-way valve at the front of the boot near the little toe on the outside and on the back of the big toe on the inside. This allows air heated inside the boot by friction where the boot bends to leave through the vent as the wearer walks, creating what Kaiser jokingly refers to as “whooshing.” Haix boots have a similar feature in the company’s Climate System.
Danner’s new DFA boot is designed for vertical insertion, with its patent pending V.I. outsole and low-oil nubuc for effective fast roping.
Magnum’s C3 system promotes air circulation throughout the boot to keep feet cool and dry.
For 30 years, DSI has been making quality security products you can depend on right here in the U.S.A. Our commitment to security includes our fullycustomizable optical turnstiles, which we support with superior customer service and excellent warranties. That’s security worth talking about.
The DSI Invisigate™ glass barrier optical turnstile
To learn more, visit dsigo.com or call 1-800-272-3555. www.campussafetymagazine.com/freeinfo/20076 OCTOBER 2011
CSJ_1011Footware.indd 31
CAMPUS SAFETY
31
10/6/11 11:12:20 AM
feature
apparel
NOT GETTING WET Breathability is a concern for waterproof boots, as well. Many companies use breathable linings such as Gore-tex to create waterproof boots, which is popular and very effective. But Magnum’s ion-mask technology takes the idea of waterproofing one step further, by impregnating the leather itself with hydrophobic ions. The boot is put in a chamber, where air is removed and the ion-mask material is injected into the space, where it adheres to the leather, nylon and rubber at the molecular level and remains there. These ions repel water, keeping the boot lighter. “Even with the old waterproof boot that keeps your foot dry, it doesn’t do anything about keeping water from being soaked up by the fabric on the outside of the product, which makes it heavier and harder to walk,” Kaiser says. “The ion-mask technology keeps a boot hydrophobic, and so lightweight.” Another advantage of this technology is that it prevents spilled oil, chemicals or blood-borne pathogens from adhering to treated boots “to a large extent.” Kaiser says Magnum will soon also offer ion-mask in other product categories.
NOTABLE ADDITIONS With all of the improvements footwear manufacturers make to their product lines, the common goal is user satisfaction. Listening to law enforcement officers and considering their concerns and requests helps drive innovation in the industry, and might lead to developing a feature so popular it will please loyal customers and garner new fans. Alarcon says a key feature of 5.11 Tactical’s new Tactical Trainer 2.0 launching in July is a pull tab on the back of the boot engineered to stay flat. It’s a detail specific to law enforcement that the company felt was important to include. “Often people want to yank on the heel to get shoe on or off quickly. The challenge is if you don’t have some sort of mechanism to keep that tab flat, your pants catch on it, and that’s a big problem with uniform professionalism,” Alarcon says. “This tab will stay flat after you use it to pull on our boots.” Original S.W.A.T. actually puts customization in the hands of tactical officers with its “SWAT id” Web site. “This way you can create the boot and design it exactly to the specs you want,” says Cynthia Hartwig, marketing assistant for Original S.W.A.T. “You can also have your department logo and name on the tongue.” In addition to individual purchases from officers, Hartwig says an agency in Florida is currently looking to place an order for its team of six people. Danner also listened to its users and developed a “lace garage” in the top of the tongue of its DFA boot. “In the past, you had to tuck laces in your boot, which would create hot spots [of friction] around the ankle, but now you can tuck them into the tongue,” says Cade. It can be difficult to make law enforcement boots new while still meeting agencies’ requirements. But companies are finding ways, and will continue to make adjustments to better meet officers’ needs. “There’s a challenge for the manufacturer to continually bring innovation to the market,” says Fowler of Bates Boots. “That’s why it’s invigorating to bring out patented technology like ICS and C3, measurable comfort stories within the constraints of eight- or six-inch black boots.” MELANIE BASICH is the managing editor of POLICE Magazine. An awardwinning journalist, she has covered such topics as agency budgets, officer suicide, emerging law enforcement technologies and active shooter tactics. For additional coverage of this and other healthcare and educational safety and security topics, visit
CampusSafetyMagazine.com www.campussafetymagazine.com/freeinfo/20146 32
CAMPUS SAFETY
CSJ_1011Footware.indd 32
OCTOBER 2011
www.campussafetymagazine.com
10/6/11 11:12:22 AM
u o y o d w Ho r u o y f i w o kn campus is
SAFE?
dents annel has the questions stu The new student safety ch us. ensure their safety on camp and parents need to ask to zine.com Go to www.CampusSafetyMaga nnel Cha and click on the Student Safety
>>>>>>>>>>>>>>
>
NEW
STUDENT & PARENT SAFETY CHANNEL
CSM08-42-11
nually updated with b channel will be conti We y fet Sa t ren Pa d an ty measures ne.com, the Student lines and what securi CampusSafetyMagazi e, notification guide ns po res d cy As a new addition to en erg ts hold campuses an s, campus em ion, it will help paren dent safety, new law dit stu t ad In ou ab ty. rsi on ati ive un orm d inf their school district an should expect from students and parents children. for the safety of their districts accountable
tion contact: For more informa
AD, PEGGY K. ONST
CSJ_1011Footware.indd 33
PUBLISHER
3-2477 phone: (310) 53
bobit.com
nstad@ e-mail: peggy.o
10/6/11 11:12:24 AM
ADVERTISER’S INDEX
ADVERTISER’S INDEX Company listings are provided as a courtesy — publisher assumes no responsibility for errors or omissions.
ADVERTISER
PAGE#
American Signal
40
20100
IPCallCo
41
20058
CALEA
32
20146
ISC Solutions
29
20086
Campus Safety — 2012 YearBook
39
•
Lauren Innovations
21
20115
Campus Safety — Director of the Year
37
•
People ID -IDenticard Systems
27
20083
Campus Safety — Student/Parent Channel
33
•
SALSBURY INDUSTRIES
42
20016
Campus Safety — Ownership Statement
42
•
Siemens Industry, Inc.
C3
20134
Cooper Notification
C4
20187
T3 Motion, Inc.
3
20047
Designed Security, Inc.
31
20076
Talk-A-Phone
7
20043
1
20001
TimeKeeping Systems, Inc.
34
•
EasyLobby, Inc.
15
20005
Ultra Electronics -MAGICARD
11
20156
Gai-Tronics
23
20020
Video Insight
5
20042
Global Safe Corporation
34
20033
Whistles For Life
25
20010
Honeywell Notifier
C2
20125
DSX Access Systems, Inc.
RS#
H O S P I TA L R O O M DORM SAFES
ADVERTISER
PAGE#
RS#
Bar Code In... ...Wiegand Out
• Yale New Haven • Cleveland Clinic • St. Luke’s • Baptist Medical Center • Children’s National • Hospitals...USE OUR SAFES
OVER 100,000 SAFES INSTALLED!
GLOBAL SAFE CORPORATION 1-800-545-4947 • www.hotelsafes.com
The EZBarcode Access Control Module reads all standard bar codes, even through security laminates. It provides 26-bit Wiegand or mag stripe output. Its rugged shell is completely sealed against moisture. Call today to learn how easy it is to add bar code to your access control system!
1-800-843-7473 %DLQEULGJH 5RDG 6RORQ 2+ 3KRQH )D[ VDOHV#H]EDUFRGH FRP ZZZ H]EDUFRGH FRP
www.campussafetymagazine.com/freeinfo/20033 34
CAMPUS SAFETY
CSJ_1011Footware.indd 34
OCTOBER 2011
www.campussafetymagazine.com
10/6/11 11:12:24 AM
D I R E C T O R
O F
T H E
Y E A R
call for entries Do you know a hospital, university or school campus police chief or director of public safety and security who goes above and beyond the call of duty, demonstrating outstanding leadership skills, ingenuity, selflessness and overall achievement? If so, we invite you to submit his or her nomination for the 2011 Campus Safety Director of the Year award. The award winner will receive: • Special editorial coverage and photos in a future issue of Campus Safety magazine • Recognition in the campus safety and security community • A $100 American Express® gift certificate • A custom plaque
ENTRY FORM — 2011 CAMPUS SAFETY DIRECTOR OF THE YEAR Nominee Name:
Nominee Title:
If you are nominating someone else, your name and phone number: Hospital, University or School Campus/District Name: Address: City:
State:
Zip:
Country:
E-mail: Phone:
Fax:
Total Number of Officers:
Sworn:
Non-sworn:
Total Number of Beds (if Hospital):
Size of Campus(es): Number of Students, Faculty & Employees:
Number of Campus Locations: JUDGING: For complete 2011 judging criteria and entry rules, please visit www.CampusSafetyMagazine.com/DirectorOfTheYear NOMINATION SUBMISSION: On a separate sheet of paper, tell us why you or your nominee should be chosen for this award. Please explain how your entry meets or exceeds the judging criteria. Include examples showing why you or the person you are nominating is worthy of this award. ENTRY DEADLINE: Nov. 1, 2011. There is no entry fee. All submissions
become the property of Campus Safety magazine and cannot be returned. Additional entry forms can be downloaded online at www. CampusSafetyMagazine.com/DirectorOfTheYear. ELIGIBILITY: Nominee must have the title of “Campus Police Chief” or “Director of Public Safety & Security”, “Director of Emergency Management” or the equivalent. The campus he or she oversees must be located and operated in the United States or Canada and must be a hospital, university, college, K-12 school or school district.
CSM06-03.11
HOW TO ENTER Complete this entry form and send it with your submitted materials and applicable photos to: 2011 Campus Safety Director of the Year Campus Safety Magazine 3520 Challenger St., Torrance, CA 90503 or, campussafetymagazine@bobit.com or, Fax: (310) 533-2502
Visit www.CampusSafetyMagazine.com/DirectorOfTheYear for complete eligibility rules. Entry deadline is Nov. 1, 2011 CSJ_1011Footware.indd 37
10/6/11 11:12:25 AM
TOOLS OF THE TRADE
Code Blue Achieves ETL Certification Code Blue Corporation is approved to apply the ETL mark for certification to the UL 2017 Standard for its low and high voltage products. “The UL 2017 Standard covers emergency signaling devices, a demanding standard and one that positions us well as we apply integrated system solutions using our IP communication devices and our Blue Alert Mass Notification software supported by ToolVox, our new communication manager,” said Mick Doran, Product Development Manager for Code Blue. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/20400
EasyLobby eKiosk EasyLobby has released EasyLobby eKiosk, software that turns any Apple iPad, tablet computer or smart phone into a self-registration kiosk for visitors. When used with EasyLobby’s eAdvance web pre-registration software, EasyLobby eKiosk makes it easy for visitors to register themselves upon arrival. The host employee can pre-register the visitor in eAdvance; the visitor receives a registration number via E-mail. Upon arrival, the visitor is handed an eKiosk-enabled device, and enters their name or registration number. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/20410
Lauren Innovations NaviGate 5.0 Lauren Innovations has released NaviGate™ 5 5.0. 0 The software includes a new user user-interinter face, document and incident management capabilities and enhancements to the existing emergency and learning management modules. The incident management system allows users to track incidents and all of the details surrounding the incident such as people, vehicles and locations. The existing emergency management module within NaviGate has also been retooled; the updated resource manager allows a facility to keep track of equipment. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/20430
WAVES High Power Speaker Array 7100 Series Cooper Notification has launched its latest wide-area mass notification system (MNS) solution. The WAVES high power speaker array (HPSA) 7100 Series, which provides highly intelligible voice and tone announcements, can be integrated with an organization’s voice-capable fire alarm control panel (FACP) as well as Cooper Notification’s SAFEPATH®4 (SP40S) voice evacuation systems and SAFEPATH mass notification systems (SPMNS), providing a simple upgrade path to expand emergency communications coverage to outdoor areas. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/20440
38
CAMPUS SAFETY
CSJ_0111tools.indd 38
OCTOBER 2011
Gamewell-FCI Local Operator Console Gamewell-FCI by Honeywell released the second version of its local operator console (LOC), which remotely controls emergency messaging and system operations. The product features a microphone for live announcements and 16 programmable switches, which enables authorized users to choose specific pre-recorded messages to broadcast to particular zones within a facility. A third LOC component is a network graphic annunciator (NGA), designed to provide remote access to information on an entire fire alarm and emergency communications systems network. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/20420
www.campussafetymagazine.com
10/6/11 11:14:52 AM
The Yearbook Buyer’s Guide Arrives with the December 2011 Campus Safety issue TAKE A LOOK AT OUR YEARBOOK! DON’T MISS THE ONLY 2012 CAMPUS SAFETY BUYERS GUIDE IN THE INDUSTRY!
Campus Safety Magazine, the leading source for information on campus and hospital security, is nearing publication of the 2012 Yearbook. Your company NEEDS to be included in this annual edition, which is referenced all year-long by 18,100+ security product decision-makers. The Yearbook contains market data, a full directory of leading manufacturers of security products and services, our exclusive “101 Big Ideas,” How-to Advertorials (where YOU byline the expert articles), and a website showcase.
WE HAVE AN ADVERTISING PROGRAM FOR ANY BUDGET:
Publisher 310-533-2477 peggy.onstad@bobit.com
Tara Schelling
Eastern Sales Manager 215-794-7015 tara.schelling@bobit.com
Dynise Plaisance
Western Sales Manager 760-519-5541 dynise.plaisance@bobit.com
CSJ_0111tools.indd 39
Website showcase...
$550
Highlighted print listing...
$150
Highlighted online listing...
$150
“Get Noticed” package...
$725
CSM07-10.11
CONTACT: Peggy Onstad
Display/Advertorial combo includes 2 full page color ads + highlighted print & online directory listings + web showcase... $3620
DEADLINES FOR 2012 CAMPUS SAFETY YEARBOOK Publishes...
Nov/Dec 2011
AD/Edit Closing date...
October 11, 2011
Materials due...
October 11, 2011
10/6/11 11:14:55 AM
TOOLS OF THE TRADE
Worldwide Trust
Vicon Surveyor HD P/T/Z Dome Camera
than 60
The Surveyor HD by Vicon Industries Inc. of Hauppauge, N.Y., is a 1.3-megapixel dome camera that is equipped with 18x optical zoom and 12x digital zoom. Available in indoor, outdoor, pressurized and maximum-security models, the ONVIFconformant camera offers 360˚ continuous rotation and a wide range of programmable features, including privacy masking. The camera provides a choice of H.264, MPEG-4 and M-JPEG encoding options, and features a 4.7-84.6mm varifocal lens. Digital noise reduction minimizes video interference and triggering of false alarms, the company says.
countries
Need FREEInfo? www.campussafetymagazine.com/FREEInfo/20510
in Warning Systems ASC has installations in 50 states and more
I Force 3200 HPSA
ASC Campus Warning Systems provide peace-of-mind for students, parents, faculty, and staff with their ability to alert the campus instantly of an emergency. I-Force high-powered speaker arrays (HPSAs) produce: • Superior voice intelligibility • Incident-specific pre-recorded messages and live public address. ASC can coordinate HPSAs with voice, text, and e-mail alerts to stakeholders. Contact ASC for professional consultation to address your campus' emergency notification needs.
GAI-Tronics Red Alert Emergency Telelphones GAI-Tronics’ new Red Alert emergency telephones are designed for maximum environmental sustainability, high audio quality, and unparalleled monitoring capability, according to the company. In addition to providing handsfree, two-way communications, the product can report its location, provide call activity reports, activate two peripheral devices (locally or remotely), and let you know when it is experiencing problems. The product’s TMA software application installs on a customer-provided PC and will automatically monitor push buttons, microphone integrity, speaker integrity, line integrity and call connection. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/20500
MyForce Campus Interface MyForce is a personal security service students and faculty can put on their smartphones. If they sense danger, they can send an alert with the touch of a button. Through the MyForce Campus Interface, MyForce personnel and campus officers hear what’s happening, track the student’s position and send emergency help — allowing campus law enforcement to find them. When students and faculty are outside the jurisdiction of campus law enforcement, the MyForce team notifies the appropriate authorities.
(800) 243-2911
Need FREEInfo? www.campussafetymagazine.com/FREEInfo/20490
Or visit us at: www.americansignal.com www.campussafetymagazine.com/freeinfo/20100 40
CAMPUS SAFETY
CSJ_0111tools.indd 40
OCTOBER 2011
www.campussafetymagazine.com
10/6/11 11:14:55 AM
Cellular, Two-Way Radio, Analog & SIP Telephony Call Box Solutions
UTC MASterMind EX Monitoring Software The MASterMind EX monitoring software platform by UTC Fire & Security of Bradenton, Fla., offers service-oriented architecture (SOA) to allow better control of data flow from the database to the end user. Its comprehensive suite of product offerings includes monitoring, billing and receivables, sales and service management as well as integrated Web solutions, video, access, telephony, GPS tracking and reporting. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/20450
IPCallCo’s solutions incorporate the latest in unified communication design to allow integration of campus-wide mass notification and multi-party answering points; regardless of communication device, network or service provider!
Detex ECL-230X-TDB Panic Device Detex introduces a maximum security, code compliant, alarmed, three point dead bolt, panic device. The ECL-230X-TDB has three large dead bolts designed for maximum holding force, a photo-luminescent sign, a 100 decibel alarm and a durable ramped end cap. The ECL-230X is simple to install, preventing problems and costly return visits. It is available with an optional Interchangeable Core Cylinder, pre-installed, as well as an optional hardwired kit that powers up to three locks.
IPCallCo offers a full-range of colors and call box designs from flush mount to stand alone solar-powered models. Lease Purchase Options Dealer Inquires Welcome
Need FREEInfo? www.campussafetymagazine.com/FREEInfo/20460
sales@ipcallco.com • 954-938-1968 www.ipcallco.com www.campussafetymagazine.com/freeinfo/20058 OCTOBER 2011
CSJ_0111tools.indd 41
CAMPUS SAFETY
41
10/6/11 11:14:57 AM
TOOLS OF THE TRADE
full rate CODEC voice digitization technology with improved FEC and noise reduction, the company says. The portables operate in P25 conventional, trunking and analog conventional modes.
Kenwood TK-5410 & TK-5910 Portable Radios The TK-5410 and TK-5910 are the newest P25 compatible radios introduced by Kenwood of Suwanee, Ga., specifically for public safety agencies operating in the 700/800 MHz bands. Both incorporate increased memory for future software upgrades and AMBE+2 enhanced
Need FREEInfo? www.campussafetymagazine.com/ FREEInfo/20470
Honeywell HD Indoor/Outdoor Mini Dome Camera Honeywell of Melville, N.Y., releases the HD4MDIP, a rugged, high-definition indoor/outdoor mini-dome IP camera that provides three times the image resolution of standard analog cameras, according to the company. The true day/night, vandal-resistant, fixed mini-dome provides 720p resolution at full frame rate. It features an externally accessible Web-based menu that lets operators view and control cameras from virtually anywhere. Additionally, the camera is equipped with builtin motion detection capabilities and camera tamper detection features that notify users when the camera’s field-of-view is altered, obstructed or blurred. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/20480
STATEMENT OF OWNERSHIP, MANAGEMENT AND CIRCULATION (Required by 39 U.S.C. 3685) PUBLICATION TITLE Campus Safety Magazine
PUBLICATION NO. 1066-7039
FILING DATE 10/1/2011
ISSUE FREQUENCY BI-MONTHLY with extra November Issue
NO. OF ISSUES PUBLISHED ANNUALLY 9
ANNUAL SUBSCRIPTION PRICE $60.00 per year
COMPLETE MAILING ADDRESS OF KNOWN OFFICE OF PUBLICATION Bobit Business Media, 3520 Challenger Street, Torrance, CA 90503-1640, Los Angeles County COMPLETE MAILING ADDRESS OF PUBLISHER’S HEADQUARTER’S Bobit Business Media, 3520 Challenger Street, Torrance, CA 90503-1640, Los Angeles County FULL NAMES AND COMPLETE MAILING ADDRESSES OF PUBLISHER, EDITOR, AND MANAGING EDITOR PUBLISHER: PEGGY ONSTAD, Bobit Business Media, 3520 Challenger Street, Torrance, CA 90503-1640, Los Angeles County EDITOR: ROBIN GRAY, Bobit Business Media, 3520 Challenger Street, Torrance, CA 90503-1640, Los Angeles County MANAGING EDITOR: ROBIN GRAY, Bobit Business Media, 3520 Challenger Street, Torrance, CA 90503-1640, Los Angeles County OWNER Ty F. Bobit, CEO
COMPLETE MAILING ADDRESS Bobit Business Media, 3520 Challenger Street, Torrance, CA 90503-1640, Los Angeles County
KNOWN BONDHOLDERS, MORTGAGEES, AND OTHER SECURITY HOLDERS OWNING OR HOLDING 1 PERCENT OR MORE OF TOTAL AMOUNT OF BONDS, MORTGAGES, OR OTHER SECURITIES None ISSUE DATE FOR CIRCULATION DATA BELOW August 2011
Products Include: &OXVWHU %R[ 8QLWV £ &%8¨V 9HUWLFDO 0DLOER[HV +RUL]RQWDO 0DLOER[HV $OXPLQXP 0DLOER[HV %UDVV 0DLOER[HV )UHH 6WDQGLQJ 0DLO &HQWHUV &ROOHFWLRQ 0DLOER[HV
AVERAGE NO. COPIES EACH ISSUE DURING LAST 12 MONTHS
EXTENT AND NATURE OF CIRCULATION
ACTUAL NO. COPIES OF RECENT SINGLE ISSUE
15a TOTAL NO. COPIES (NET PRESS RUN)
19,530
19,139
15b PAID/REQUESTED CIRCULATION 15b.1 OUTSIDE COUNTY PAID/REQUESTED MAIL SUBSCRIPTIONS 15b.2 IN-COUNTY PAID/REQUESTED MAIL SUBSCRIPTION 15b.3 SALES THROUGH DEALERS/CARRIERS 15b.4 REQUESTED COPIES USPS OTHER MAIL CLASSES 15c TOTAL PAID/REQUESTED CIRCULATION
11,868 4 11,872
15,336 4 15,340
15d NONREQUESTED CIRCULATION 15d.1 OUTSIDE COUNTY NONREQUESTED COPIES 15d.2 IN-COUNTY NONREQUESTED COPIES 15d.3 NONREQUESTED DISTRIBUTED BY OTHER CLASS OF MAIL 15d.4 NONREQUESTED OUTSIDE USPS 15e TOTAL NONREQUESTED DISTRIBUTION
6,766 400 7,166
3,308 0 3,308
19,038 492 19,530 62.4%
18,648 491 19,139 82.3%
15f TOTAL DISTRIBUTION 15g COPIES NOT DISTRIBUTED 15h TOTAL 15i PERCENT PAID/REQUESTED CIRCULATION This Statement of Ownership will be printed in the October 2011 issue of this publication.
I CERTIFY THAT ALL INFORMATION FURNISHED ON THIS FORM IS TRUE AND COMPLETE. I UNDERSTAND THAT ANYONE WHO FURNISHES FALSE OR MISLEADING INFORMATION ON THIS FORM OR WHO OMITS MATERIAL OR INFORMATION REQUESTED ON THE FORM MAY BE SUBJECT TO CRIMINAL SANCTIONS (INCLUDING FINES AND IMPRISONMENT) AND/OR CIVIL SANCTIONS (INCLUDING MULTIPLE DAMAGES AND CIVIL PENALITES).
x
Publisher
Filed on 10/1/2011
www.campussafetymagazine.com/freeinfo/20016 42
CAMPUS SAFETY
CSJ_0111tools.indd 42
OCTOBER 2011
www.campussafetymagazine.com
10/6/11 11:14:58 AM
MARKETPLACE
Advertise Your Products in the “MARKETPLACE”
The MARKETPLACE offers:
Northern Virginia Community College Virginia’s largest (NOVA) is institution of of America’s largest higher education and one community colleges.
Chief of College (00155)
Salary: $68,640
Police
- $104,176 + benefits
Serves as the Chief Law multi-campus communit Enforcement Officer at a large, y college with superviso sibility for a staff ry responof 45 a Citizen of the officers. Qualified candidate must be U.S. with Certificat Department of ion by Virginia Criminal Justice Services (DCJS) Bachelor’s degree and or equivalent work science and administra experience tion, criminal justice, or in police (Master’s preferred related field ). enforcement administra Considerable experience in law tion or supervisio of the principles n and knowledge and techniques of law enforcement, rity, crime detection, secuprevention and investigat Work experience ion required. in a college/university preferred
MARKETPLACE
• Refined layout and graphics • Targeted market impact • Organized placement • Increased visibility • Diverse product advertising • Employment opportunities
For more informa tion and to apply, our website at visit www.nv the link for “Jobs cc.edu and choose at NOVA.” Position will remain open until filled. The Virginia Communit y College System Equal Opportun is an ity/Affirmative Action Employer and actively seeks applications from women and minority candidates.
Reserve your space Today!
CFATS
If you’ve got
it, you know
what it is!
Expert security consulting suppo rt for developing implementing the Site Secu and rity Plan requir the Chemical ed by Facility Anti-T errorism Stand ards Don Greenwood Associates has & supported over 180 facilities with DHS CFATS subm issions.
Call:
310-533-2477
Our mission is to help clients comp with Homeland ly Security regula tion with a minim um impact on their operations and at reasonable cost.
Risk Assessmen t & Security Management Consultants Houston TX 832-717-4404 www.greenwood security.com
JANUARY/FEBRUA RY 2010 CAMPU S SAFETY
51
www.campussafetymagazine.com/freeinfo/20200
REPORTING FOR DUTY You work hard to keep your campus safe and secure.
Here at Campus Safety Magazine, we take our mission to report on school, university and hospital protection issues as seriously as you take your mission to protect our nation’s students, faculty, staff, patients and visitors. Find the latest news and information on security and public safety solutions and trends in Campus Safety Magazine’s newly redesigned print, online and eNewsletter products! In Print: Now published nine times per year, have the magazine sent directly to your office or home. Online: CampusSafetyMagazine.com has a new look and easier navigation that provides you with up-to-the-minute news, trends and technology tips. Features include blogs, video, photo galleries and more. 2 eNewsletters! Campus Safety eNews: This free eNewsletter is delivered to your E-mail inbox each week with the late-breaking current events you need to keep on top of the everchanging campus public safety issues. Hospital Security Update: This brand new eNewsletter focuses on security and public safety issues in the healthcare setting, covering hot topics like Joint Commission accreditation, officer training, infant abduction prevention and more.
Sign-up today at CampusSafetyMagazine.com
OCTOBER 2011
CSJ_0111tools.indd 43
CAMPUS SAFETY
43
10/6/11 11:15:00 AM
RECESS
WHAT’S WRONG WITH THIS PICTURE?
THEY SAID IT Now we have to police the community 24 hours a day. Where are the people and the resources to do this?
Photo courtesy Safe Havens International
ANSWER:
This emergency eye wash cannot be used quickly because the handles of two tools have been carelessly left in a position which blocks the movement of the operating handle. The tag also indicates that the eye wash has not been inspected in several years.
Richard G. Bozza, executive director of the New Jersey Association of School Administrators, on antibullying legislation that just went into effect in New Jersey. The law requires districts to appoint a safety team at each school to review complaints. Principals must begin an investigation within one school day of a bullying episode, and superintendents must provide reports to Trenton twice a year detailing all cases. Source: The New York Times
DID YOU KNOW? Grand Rapids, Mich., was the 1st U.S. city to
FLUORIDATE ITS WATER in 1945.
Source: www.corsinet.com
The average e K-12 build building in the United States is
40 YEARS OLD
Depictions of explicit and graphic
SUICIDES IN MOVIES
tripled from 1950 to 2006. Source: Annenberg Public Policy Center at the University of Pennsylvania
Source: 21st Century School Fund
60%
More than of health workers’ uniforms sampled by researchers tested positive for pathogens, including the germs that can cause pneumonia, bloodstream infections and drug-A. resistant infections such as MRSA. Source: American Journal of Infection Control
The makeup ban is about getting girls to focus on what’s important in school, which is learning and not being distracted with makeup and wanting to check it all the time. John McNally who is head teacher of a co-ed public school in northern England on its banning of makeup and removal of bathroom mirrors. NBC Today
42%
of 12- to 17-yearo olds know at least one ffriend or classmate who u uses illegal drugs, like acid, e ecstasy, methamphetamine, c cocaine or heroin a 24% iincrease since 2007. S Source: National Survey of American Attitudes on Substance Abuse XVI: Teens and Parents A
FOR ADDITIONAL COVERAGE OF HEALTHCARE, EDUCATIONAL SAFETY, AND SECURITY TOPICS, VISIT CampusSafetyMagazine.com
Bobit
CAMPUS SAFETY MAGAZINE (USPS 610) (ISSN 1066-7039) is published BI-Monthly with an extra issue in November, by Bobit Business Media, 3520 Challenger Street, Torrance, California 90503-1640. Periodicals Postage Paid at Torrance, CA 90503-9998 and Additional Mailing Offices. POSTMASTER: Send address changes to Campus Safety Magazine, P.O. Box 1068, Skokie,
Business Media IL 60076-8068. Please allow 8 to 16 weeks for address changes to take effect. Subscription Prices – United States and Canada $60 per year; Foreign $100 per year. Single copy price - $10. Please
alow 8 to 16 weeks to receive your first issue. Please address Editorial and Advertising correspondence to the Executive Offices at 3520 Challenger Street, Torrance, California 90503-1640. The contents of this publication may not be reproduced either in whole or in part without consent of Bobit Business Media. All statements made, although based on information believed to be reliable and accurate, cannot be guaranteed and no fault or liability can be accepted for error or omission.
44
CAMPUS SAFETY
CSJ_0111recess.indd 44
OCTOBER 2011
www.campussafetymagazine.com
10/6/11 11:16:32 AM
s
Sygnal™ mass notification keeps every student within reach. In the stacks or on the quad, ensure your students receive emergency communications no matter where they are. usa.siemens.com/sygnal
Communicating effectively and quickly in an emergency is one of the most critical responsibilities that colleges and universities face. And with students, faculty and staff spread over miles — and many unreachable through web-based alerting to personal devices — the challenge is much greater. To reach them all you need a plan, and the expertise and service necessary to execute it.
:LWK 6\JQDO PDVV QRWLƉFDWLRQ \RX FDQ OHYHUDJH QHZ DQG existing communication systems to reach people inside, RXWVLGH DQG DW WKHLU VLGH 6\JQDO PDVV QRWLƉFDWLRQ provides a single point of control by which you can launch several communications simultaneously. The result is maximum contactibility when it matters most. :LWK 6\JQDO PDVV QRWLƉFDWLRQ \RX UHDOO\ FDQ UHDFK WKHP DOO
Answers for infrastructure. www.campussafetymagazine.com/freeinfo/20134
CSJ_0111recess.indd 993
10/6/11 11:16:36 AM
Mass Notification Solutions Protect. Alert. Inform. When communications is critical, an integrated mass notification system is essential. That’s why Cooper Notification provides multiple means to inform your people. Utilize our Roam Secure Alert Network™ (RSAN) emergency text and voice alerting, WAVES outdoor High Power Speaker Arrays, SAFEPATH indoor voice evacuation systems and Wheelock appliances to alert your campus today. For additional information visit www.coopernotification.com
Cooper Notification is
All Cooper logos are valuable trademarks of Cooper Industries in the U.S. and other countries. You are not permitted to use Cooper trademarks without the prior written consent of Cooper Industries.
www.campussafetymagazine.com/freeinfo/20187 CSJ_0111recess.indd 994
10/6/11 11:16:36 AM