Campus Safety Magazine September 2011

Page 1

The State of Campus Security 10 Years After 9/11 Radio Interoperability & Information Sharing Show Progress

ALSO IN THIS ISSUE:

Selecting a Security Consultant References, RFPs & Specialization Make the Difference ff

Stopping ID Theft Managing Vendors & Databases Can Help

www.campussafetymagazine.com/freeinfo/19123

WWW.CAMPUSSAFETYMAGAZINE.COM SEPTEMBER 2011 • VOL. 19 • NO. 6

bellyband_CS_0911.indd 1

$10

New Uses for Emergency Notification Systems • Contract Security Operating Procedures • IP Video Cheat Sheet • Bomb Threats • Flash Mobs SPECIAL ASIS ISSUE 8/26/11 9:04:00 AM


CS0911myforcebellyband.indd 1

backpage.indd 1 bellyband_CS_0911.indd 2

7/29/11 8:42:57 AM

8/26/11 4/4/11 3:42:54 9:04:03 PM AM


NATIONAL CAMPUS SAFETY AWARENESS MONTH

New Students, Same Problems How Colleges Can

Address Alcohol Abuse, Hazing & Sexual Assault The State of Campus Security 10 Years After 9/11 Radio Interoperability & Information Sharing Show Progress

ALSO IN THIS ISSUE:

Selecting a Security Consultant References, RFPs & Specialization Make the Difference

Stopping ID Theft Managing Vendors & Databases Can Help

New Uses for Emergency Notification Systems • Contract Security Operating Procedures • IP Video Cheat Sheet • Bomb Threats • Flash Mobs WWW.CAMPUSSAFETYMAGAZINE.COM SEPTEMBER 2011 • VOL. 19 • NO. 6

CSJ_0911front cover.indd 991

$10

SPECIAL ASIS ISSUE

>

8/23/11 4:52:50 PM


UH 0LID'(6)LUH

N`i\c\jj

Â

See Us at ASIS Booth #2921 www.campussafetymagazine.com/freeinfo/19122

CSJ_0911_C2-1.indd 992

8/23/11 3:15:31 PM


www.campussafetymagazine.com/freeinfo/19001

CSJ_0911_C2-1.indd 1

8/23/11 3:15:45 PM


T A B L E O F C O N T E N T S I S E P T E M B E R 2 0 11 I V O L . 1 9 N O. 6

BOBIT BUSINESS MEDIA 3520 Challenger St. Torrance, CA 90503 (310) 533-2400

Publisher

226

PEGGY ONSTAD (310) 533-2477 fax: (310) 533-2502 peggy.onstad@bobit.com Executive Editor

ROBIN HATTERSLEY GRAY (310) 533-2534 fax: (310) 533-2502 robin.gray@bobit.com Assistant Editor

BRITTANY-MARIE SWANSON (310) 533-2588 fax: (310) 533-2502 brittany.swanson@bobit.com Art Director

14

30

FEATURES

RON RENNELLS (310) 533-2593 fax: (310) 533-2514 ron.rennells@bobit.com Sr. Production Manager

14 National Campus Safety t A Awareness M Month th S Special i lS Section ti

With the start of the new school year, here’s how college campuses can renew their efforts to protecting students, faculty and staff. By Melissa Lucchesi

15 Preventing and Responding to Campus Sexual Assaults 18 How to Address Alcohol Abuse 24 Put an End to Hazing at Your College 26 10 Years After 9/11: Is Campus Security Better?

Hospitals, schools and universities have made significant upgrades to their two-way radio systems and information sharing efforts. Active shooter and bomber response, however, remain a challenge. By Robin Hattersley Gray

30 Selecting a Security Consultant: 10 Things You Should Know

To find the right person or organization for your project, check references, create a good request for proposal and learn whether or not they will be contracting out some of the work. By Jim L. Grayson

38 Building a College and University Safety and Security Structure

Support for public safety by senior campus leadership, as well as the creation of emergency plans and appropriate communications systems are critical components of UT Austin’s successful campus protection program. By Bob Harkins

46 How to Create Effective Contract Security Operating Procedures

Campuses and their contract security providers must work together to develop appropriate post orders and manuals so security operations run smoothly. By George Okaty and Yan Byalik

50 Stemming the Tide of ID Theft at Institutions of Higher Education

Limiting the types of vendors allowed on campus and appropriate database management can help to keep student, faculty and staff data secure. By Denis G. Kelly

56 Football Tickets, ID Cards and Mass Notification: There Is a Connection

The University of Alabama has leveraged the functionality of its voice, text and E-mail emergency alerting program and student ID card program to more efficiently sell and distribute football game tickets to students. By Travis Sowders and Gina Kilker

DEPARTMENTS 4 From the Editor’s Desk

Is Your Campus Prepared for Flash Mobs?

8 News Watch

Common K-12 Emergency Preparedness Mistakes

68 As I See It

Should You Revise Your Bomb Threat Emergency Instructions?

SARAH PAREDES (310) 533-2497 fax: (310) 533-2501 sarah.paredes@bobit.com Audience Manager

KATIE FILLINGAME A D V E R T I S I N G C O N TA C T S Western Sales Manager

DYNISE PLAISANCE (760) 519-5541 fax: (310) 533-2502 dynise.plaisance@bobit.com Eastern Sales Manager

TARA SCHELLING (215) 794-7015 fax: (215) 794-7756 tara.schelling@bobit.com HOW TO GET YOUR NEWS TO US

E-mail: campussafetymagazine@bobit.com Mail: 3520 Challenger St., Torrance, CA 90503 fax: (310) 533-2502 FOR SUBSCRIPTION INQUIRIES

(310) 533-2400 fax: (310) 533-2510 www.campussafetymagazine.com EDITORIAL ADVISORY COUNCIL Shad U. Ahmed Chief of Emergency Medical Services, University of Rhode Island S. Daniel Carter Director of Public Policy, Security On Campus Inc. Michael Dorn Safe Havens Int’l Osborne Frazier NYPD Div. of School Safety Linda Glasson Security Manager/Consultant, Obici Hospital William Lassiter Center for Prevention of School Violence Joseph Moscaritolo Madison Park Vocational HS, Boston K. Gary Somerville Senior Campus Supervisor, Natrona County School District, Casper, Wyo. Philip Mullendore Institute for Campus Safety

Member of:

68 As I See It

Can You Testify With Your Smart Phone?

60 Safety Zone

Avoiding Copyright Problems

62 Emergency Management Matters Emergency Managers Earn Their Keep

64 Tech Boot Camp

Personal Safety Apps: The Next Generation of Blue Light Phones

70 Technology at Work 72 Tools of the Trade 77 Ad Index 84 Recess

Winner 2007, Finalist 2006, 2008, 2009

COVER PHOTO: ©ISTOCKPHOTO.COM/123FOTO

VISIT OUR WEBSITE AT WWW.CAMPUSSAFETYMAGAZINE.COM 2

CAMPUS SAFETY

CSJ_0911toc.indd 2

PRINTED IN U.S.A

SEPTEMBER 2011

8/23/11 3:18:09 PM


ideas for life

WV-NW964

We’ve got it all covered. Panasonic offers surveillance system solutions with superior performance and cost-efficiency for virtually any application. Configure the system that best meets your specific needs from the most comprehensive line of IP, analog and hybrid products available. Our latest innovations include i-PRO SmartHD cameras and recorders with automatic real-time face detection, and UniPhier® see more large-scale integrated chips to assure the highest levels of integration. with your They’re advancements that will make any system smarter and more smartphone cost-efficient. Any way you view it, Panasonic has got you covered.

Panasonic System Networks Company of America

Surveillance, Monitoring & Video Imaging panasonic.com/security

CSJ_0911toc.indd 3

8/23/11 3:18:28 PM


FROM THE EDITOR’S DESK

Are You Prepared to Deal With Flash Mobs? Community policing, tip lines and video surveillance can help, but how much?

U Robin Hattersley Gray is executive editor of Campus Safety. She can be reached at robin.gray@bobit.com or (310) 533-2534

ntil recently, “flash mob” was a rather benign term. It referred to a group of individuals who would suddenly assemble in a public place (like a mall) to perform a silly dance or some other goofy act (such as a pillow fight) and then disperse. All of this would be done for the purpose of having fun. Sounds rather cute, right? Not anymore. The riots that occurred this summer in London demonstrate how this seemingly harmless activity could turn into a big, deadly problem. As I write this, nearly 1,200 people — some as young as 11 years old — have been arrested in connection with the U.K.’s recent civil unrest. The United States has also experienced the dark side of flash mobs. This summer, a family-oriented July 4 fireworks show in a Cleveland suburb, for example, devolved into chaos when as many as 1,000 teenagers showed up to the event and started fighting. Philadelphia, too, has experienced more than its fair share of flash mob violence — so much so that in August it implemented a 9 p.m. curfew on Fridays and Saturdays for minors. So far at least, it appears that the curfews have worked in curbing flash mob activity in the city.

U.K. RIOTS COULD PROMPT ESCALATION OF U.S. FLASH MOB ACTIVITY As bad as the U.S. flash mob activity has been so far, some believe that the civil unrest in England could inspire even more criminal activity here on the other side of the pond. “American kids are watching what happened in the U.K. and they are saying, ‘We can do that and we can do it better,’” retired Cleveland SWAT Sergeant Bob O’Brien tells me. Usually, organizers of flash mobs mobilize teenagers and young adults through social media sites. Via Twitter and Facebook, they designate a time and place (such as a store or festival) where the flash mob will congregate and either steal merchandise, attack innocent civilians, vandalize property or all three. Right now, the participants in these incidents are young and without much direction. Many get involved because they are swept up in the excitement of it all. I’d hate to think of what could happen if more sophisticated criminal organizations used the flash mob tactic to achieve more sinister objectives. To a certain extent, college campuses have been dealing with this phenomenon for quite some time. For example, it’s not uncommon

AMERICAN KIDS ARE WATCHING WHAT HAPPENED IN THE U.K. AND THEY ARE SAYING, ‘WE CAN DO THAT AND WE CAN DO IT BETTER.’

4

CAMPUS SAFETY

CSJ_0911edit.indd 4

SEPTEMBER 2011

for a student party near campus that is supposed to have 50 people attending to suddenly have 500 people show up. The 450 uninvited guests find out about the event through Facebook or Twitter, and the party organizers don’t know who they are and have no way of managing them. Concerts, postgame celebrations and outdoor festivals can be even more challenging.

SOME TRADITIONAL POLICING SOLUTIONS CAN BE EFFECTIVE For the most part, college and university law enforcement has been using the community policing approach and alcohol enforcement to keep these events orderly. Knowing about and planning for upcoming events, public outreach and working with event organizers and students helps public safety officials prepare for these festivities. They use the information they receive to determine the appropriate level of protection, such as the number of security officers that must be deployed. This approach is still somewhat effective, even in the age of social media. Anonymous tips lines (phone, text and Internet) are other excellent ways law enforcement can enlist the public’s help in keeping track of planned criminal activity. Fixed and mobile video surveillance can also be deployed to monitor events while they are happening. If crimes are committed, the images can be used to investigate incidents and prosecute suspects. Still, the potential for flash mobs to disrupt on-campus and off-campus events, as well as the community in general appears to be greater than ever. It’s extremely difficult for campus public safety officials to manage 30 or 100 or 500 or 1,000 people who show up uninvited and are determined to cause trouble (or, at the very least, are willing to join in when prompted by others). From what I’ve seen in London, Chicago, Philadelphia and Cleveland, it’s obvious that law enforcement is unprepared to handle these situations.

CAMPUS PROTECTION PROFESSIONALS ARE ON THE FRONT LINES Since most of the individuals who participate in flash mobs are teens or young adults, Campus Safety readers like you who are responsible for K-12 and college security are on the front lines of this developing criminal trend. K-12 campuses have a little more control of the communication/social media pipeline, according to Safe Havens International Executive Director and CS www.campussafetymagazine.com

8/23/11 3:22:14 PM


VIDEO SURVEILLANCE

Made Ea sy

Installed and used on thousands of U.S. school campuses Easy to use - designed for non-technology users School officials can monitor from the web or monitoring station, viewing all schools and buildings in a single display Retrieve and record stored video to a CD or DVD with the click of a mouse Can be used in conjunction with access control and other systems Use on one or thousands of campuses Works efficiently making maximum use of bandwidth and network systems Supports both analog and IP cameras Supports 960 IP camera models from 60 major manufacturers Map and floor-plan-based navigation Scalable US-based Technical Support NO HIDDEN FEES

CSJ_0911edit.indd 5

Campus-wide Security for the Next Generation for more information visit

www.video-insight.com or call

713-621-9779

www.campussafetymagazine.com/freeinfo/19042

8/23/11 3:22:17 PM


FROM THE EDITOR’S DESK

contributor Michael Dorn. “Schools with entry point or random surprise metal detection do have a mechanism to keep the number of phones down during the academic day if they are willing to broach the subject,” he says. “Even if they allow cell phones on a normal basis, they could institute a temporary ban on them if they begin to experience significant problems. Metal detectors will alert on portable phones.” That being said, outdoor events that take place after normal school hours where there isn’t much access control could be as problematic for K-12 schools as they are for college campuses. Curfews like the one enacted on weekends in Philadelphia could help, as could offering after-school activities that keep youths busy. Monitoring Twitter and Facebook activity is an option currently used by campus public safety that could be expanded, assuming that these efforts don’t abrogate privacy and free speech rights. The British government is considering preventing communication via social media when they know these sites are being used to plot violence or criminal conduct, according to Yahoo News. As this issues goes to print, U.K.

SCHOOLS WITH ENTRY POINT OR RANDOM SURPRISE METAL DETECTION DO HAVE A MECHANISM TO KEEP THE NUMBER OF PHONES DOWN DURING THE ACADEMIC DAY IF THEY ARE WILLING TO BROACH THE SUBJECT.

officials are planning to meet with executives from Facebook, Twitter and Research in Motion to try to develop some solution. These developments concern me, however. Although I’m all in favor of law and order, I don’t want to live in a police state. Heaven forbid our government behaves like the former Egyptian dictatorship, which blocked access to Facebook and other mobile Internet services in an unsuccessful attempt to quell the legitimate protests in Cairo this spring. Whatever the outcome of these negotiations, I expect the solutions will be limited in effectiveness because they are reactions to problems that have been caused by a lack of parental oversight of children’s lives, limited resources for education and police, and poverty. Once again, schools, campus public safety and law enforcement in general will be tasked with trying to fix the ills that have been created by others.

FLASH MOBS AREN’T JUST A PASSING FAD Mob riots mobilized by social media seem to be a phenomenon that will be with us for quite some time. Your campus and district (and this might even apply to our hospital readers) must be prepared should this type of criminal activity affect your institution. I’d love to hear from those of you who have had success in this area.

www.campussafetymagazine.com/freeinfo/19079 6

CAMPUS SAFETY

CSJ_0911edit.indd 6

SEPTEMBER 2011

www.campussafetymagazine.com

8/23/11 3:22:18 PM


It’s not just a VoIP phone It’s Talk-A-Phone At Talk-A-Phone, we pride ourselves on being the industry leader in engineering and manufacturing reliable, state-ofthe-art security communications devices. Our VOIP-500 Series phone is part of our longstanding tradition of bringing you the most dependable products in the market. Our knowledgeable sales staff, system specialists, and customer support can help you transition from your current VOIP-500 SERIES PHONE

analog security phone system to Voice over IP, or to design a new VoIP implementation.

support team “Talk-A-Phone’s was amazing to work with. These

are the things that make customers like us come back to companies like Talk-A-Phone. Again, thanks for your help.” Carolyn Trail Telecommunications ManagerRoanoke College

Proudly manufactured in the United States for over 75 years

So whether you’re in Security or IT, you’ll have peace of mind knowing you’re getting both the best support and products. For more information about our VOIP-500 Series Emergency Phone, please visit www.talkaphone.com or scan the QR code.

®

www.campussafetymagazine.com/freeinfo/19043

www.talkaphone.com t 773.539.1100 CSJ_0911edit.indd 7

8/23/11 3:22:19 PM


newswatch

WWW.CAMPUSSAFETYMAGAZINE.COM

Expert: Schools & 1st Responders Must Start Talking Sharing information on shut-off valve, alarm system and command center locations can help police and fire respond more effectively to critical incidents on K-12 campuses. By Robin Hattersley Gray

6 More Ways to Improve K-12 School Emergency Preparedness

VERY OFTEN, schools, first responders, coun-

ty emergency management and cities don’t work together to maximize K-12 school security and emergency preparedness. The failure to communicate and properly train school officials, as well as police and fire department personnel can leave campuses unnecessarily vulnerable to active shooters, gang violence and other security incidents. Campus Safety spoke with Randy Braverman, senior consultant with Chicago-based RETA Security, about solutions to some of the common mistakes school districts make with their emergency preparedness programs.

PROVIDE POLICE, FIRE DEPARTMENTS WITH MAPS “Police don’t have maps of the schools, so they don’t know the locations of certain things in the buildings,” he says. “They don’t know where the shut off valves are, in case they have to shut off the gas, water or electricity.” Braverman says it is important for law enforcement (and not just the fire department) to have this information in the event there is an active shooter incident. “A lot of times, someone will pull the fire alarm, but the police don’t know how to shut it off,” he adds. “You can’t get [non-law enforcement personnel] in there because the school is on lockdown.”

SCHOOLS, 1ST RESPONDERS MUST TRAIN TOGETHER Police and fire personnel should train with school officials so they know how to operate all of the equipment on campus, including public address systems. Additionally, law enforcement and fire should work with school personnel to determine where to put a command post during an incident. They should also have keys so they can enter each classroom during a lockdown. In return, district officials and teachers can learn a lot from first responders. For example, during an incident, teachers might not be able to identify the police officers who aren’t in uniform. Law enforcement 8

CAMPUS SAFETY

CSJ_0911News.indd 8

SEPTEMBER 2011

RETA Security Senior Consultant Randy Braverman recommends school districts give local first responders sets of keys to each campus.

personnel responding to crime on campus could be wearing vests with street clothes. They also could be from several different law enforcement agencies. Braverman recommends teachers be trained how to identify who will be coming to their classroom doors (in a lockdown situation) and letting them out. Police and fire can also help schools develop off-campus evacuation sites. “Where’s the safest place to go?” Braverman asks. “Are they far away enough from the building? The police and fire departments know the town, so they can help pick those sites.”

DON’T FORGET TO COORDINATE WITH OTHER DISTRICTS Planning and coordination among districts within a geographical region is also important. According to Braverman, all of the schools in a community should be on the same plan. Otherwise, confusion ensues, and police and fire personnel have greater difficulty responding to an emergency. “Hopefully, if you have a whole town, you have the same plan and not 10 different plans for 10 different districts.” ■

1 Invite police to do rapid deployment training at the school on the weekend so they are familiar with the campus. 2 Give photos of shut-off valves to first responders, in addition to giving them maps that tell them where they are located. 3 Develop emergency kits for first responders that include campus photos (see No. 2), plans, keys, phone numbers of school personnel, photos of students and staff, etc. There should be two kits (or more): one should be located on campus, and one should be located off campus. Be sure the kits are updated with current information. 4 Work with the health department. “A lot of times the health department will take over a gym [for something like H1N1] because it is a big location,” says Braverman. “If you plan with them ahead of time and document it, you’ll get money back from the county.” A school should document the space and human resources needed for a significant health event. That way, school officials will know how much money they should recoup. 5 Don’t use codes. Use terms that are commonly understood, such as “evacuation” and “lockdown.” 6 Train everyone, including bus drivers and cafeteria workers, on the part of the plan that is their responsibility.

www.campussafetymagazine.com

8/23/11 3:26:50 PM


ACLU Demands Cell Phone Data from LE Agencies In 31 States

Calif. School Safety Bill Signed Into Law

Thirty-four American Civil Liberties Union (ACLU) affiliates in 31 states filed 379 public records requests in 31 states around the nation on August 3, demanding information about how law enforcement agencies use mobile-phone location information. Claiming to “lift the veil on this secrecy,” the ACLU says it wants data about when the location information is sought and under what standards. “While we believe that law enforcement should always be required to obtain a warrant based on probable cause to access cell-phone location information, the scary truth is that they don’t always obtain said warrant, and courts don’t always insist that they do,” according to a statement from the group. Mobile devices continuously send out signals searching for the nearest cell tower to ensure calls go through, and cellular providers can estimate a user’s location with ever-improving accuracy based on their proximity to nearby towers. Each cellular provider determines the amount of time they store this information, and in how much detail. The data can be used by law enforcement agencies to track people’s movements. FBI agents investigating a series of bank robberies collected the records of every cell phone that was near each bank when it was robbed in 2008, reports CNET. The public-records requests seek information about whether law enforcement agents demonstrate probable cause and obtain a warrant to access cell phone location data; statistics on how frequently law enforcement agencies obtain cell phone location data; how much money law enforcement agencies spend tracking cell phones; and other policies and procedures used for acquiring location data. ■ The American Civil Liberties Union has filed public records requests in all of the state shaded in blue. MA VT

MA RI CT NJ DE MD DC

NORWALK, Calif. — Assemblymember Tony Mendoza’s school safety bill, AB 123, was signed into law by Governor Jerry Brown on Aug. 3. The law will take effect on Jan. 1, 2012. It will add language to Penal Code 626.8 addressing disruptive messages where the disturbance threatens the physical safety of school children in preschool, elementary school or middle school while they are coming to, leaving from or attending school. In March 2003, the Center for Bio-Ethical Reform held a demonstration outside a Los Angeles County middle school, which included billboard-sized graphic photographs of aborted fetuses. Students, who were walking to and being dropped off for classes, became agitated because of the disturbing nature of the photographs. Some became angry, some began to cry, and others stared while standing in the street and on the sidewalk, creating a traffic safety hazard. The school’s administrators notified the L.A. County Sheriff’s Department and the sheriffs detained the demonstrators, based on the determination that Penal Code section 626.8 had been violated. The Center for Bio-Ethical Reform filed a subsequent lawsuit and eventually won on appeal in the Ninth Circuit Court of Appeals. The court stated that if the California Legislature adopted statutory language to address this situation, the outcome might be different for future instances. AB 123 creates such statutory language. “School administrators and local law enforcement must have a legal recourse to deal with disruptions that may result in physical harm to students,” Assemblymember Tony Mendoza says. “This bill will give school administrators the tools they need to ensure student safety without overly burdening the right of free expression.” This bill is identical to AB 2478, which Assemblymember Mendoza authored in 2010. That bill was approved by the Legislature but was vetoed by Governor Schwarzenegger. ■

WHAT’S ON THE WEB NOW

The New CampusSafetyMagazine.com

WEB EXCLUSIVE CONTENT:

Why Aren’t We Interoperable Already? • CampusSafetyMagazine.com/Blog

Photo Highlights From California IAHSS Symposium • CampusSafetyMagazine.com/CalifSymposium2011 NEW FEATURES: Videos: CampusSafetyMagazine.com/Videos Blogs: CampusSafetyMagazine.com/Blog Photo Galleries: CampusSafetyMagazine.com/PhotoGallery Podcasts: CampusSafetyMagazine.com/Podcast

Webinar: See How Other Campuses Manage Emergency Notification • CampusSafetyMagazine.com/Webinar

Webinar: Unclouding the Clery Act: Failure to Comply Can Be Costly • CampusSafetyMagazine.com/Webinar

SEPTEMBER 2011

CSJ_0911News.indd 11

CAMPUS SAFETY

11

8/23/11 3:26:50 PM


NEWS WATCH

EVENTCALENDAR SEPT. 13-14

BusCon

Chicago www.busconexpo.com SEPT. 19-22

ASIS International 2011 Orlando, Fla. www.asis2011.org

Submit Your Nomination for Director of the Year!

SEPT. 29

There is still time for hospital, school and university protection professionals to submit nominations for the 2011 Campus Safety Director of the Year program. If you know a university, hospital or school campus police chief, director of public safety and security, or emergency manager who goes above and beyond the call of duty, demonstrating outstanding leadership skills, ingenuity, selflessness and overall achievement, we encourage you to submit his or her (or your) nomination. The award winner will receive special editorial coverage and photos in a future issue of Campus Safety magazine as well as on CampusSafetyMagazine.com; recognition in the campus protection community; a $100 gift card and a custom plaque. The entry form can be found on page 79. Additional information that will help you prepare your 2011 nomination can be found at CampusSafetyMagazine.com/DirectorOfTheYear. â–

Proceeding in Partnership: The Future of Campus Safety Bethlehem, Pa. www.securityoncampus.org OCT. 3-4

Green Fleet Conference

Grapevine, Texas www.greenfleetconference.com OCT. 12-14

Safety & Security Asia (SSA) 2011

Suntec, Singapore www.safetysecurityasia.com.sg OCT. 22-26

IACP/International Association of Chiefs of Police 118th Annual Conference Chicago www.theiacp.org

The 2011 Green Fleet Conference offers two full days of keynote presentations, workshops, seminars and panel discussions personalized for fleet professionals that integrate an environmentally-friendly component into their operations. For more information, visit www.greenfleetconference.com.

www.campussafetymagazine.com/freeinfo/19062 12

CAMPUS SAFETY

CSJ_0911News.indd 12

SEPTEMBER 2011

www.campussafetymagazine.com

8/23/11 3:26:51 PM


Parents Can Leave Newborns With Ill. College Police ILLINOIS — A piece of Illinois legislation that was signed into law in August designated college and university police stations as safe havens for infants. The law expands the Safe Haven law, which allows parents to leave an unharmed newborn, 30 days old or younger, with personnel at a hospital, emergency medical care facility, police or fire station, WJBC reports. Now, the definition of police station is expanded to include any district headquarters of the Illinois State Police and any campus police department where employees of the police department are present. Since the Abandoned Newborn Infant Protection Act was adopted in 2001, 69 newborns have been left at safe haven facilities. ■

Budget Cuts Bring Nighttime Van Service to an End ATHENS, Ga. — Due to budget cuts, the University of Georgia’s (UGA) police department has ended its nighttime van service for students looking to get home safely. The governor and legislature have reduced funding to the university and other state colleges by

more than 23 percent since 2009, the Athens Banner-Herald reports. UGA Police Chief Jimmy Williamson says the department is now only providing basic police services. The service was launched at a time when the campus was dimly lit. Williamson says the campus is now better lit and there are a lot more people on it, even at night, so the service is no longer as necessary. ■

Hospital Employee Text Messaging Could Violate HIPAA The increasing use of cell phones and texting instead of voice conversations or E-mail by hospital employees can put healthcare facility security at risk, leading to HIPAA violations. Some hospital systems use E-mails to notify physicians to contact the hospital about a patient, Becker’s Hospital Review reports. Those E-mails are converted into a text message and sent to a physician’s cell phone. This system is often not encrypted, but physicians will ask that more patient data is included in the message, such as his or her name and room number. In this scenario — unless the text messages are protected by a hospital’s

security system — HIPAA rules have been violated, as a patient’s name is used. Mobile devices present special risks to hospitals, because they are often lost or stolen, according to the National Institute of Standards and Technology.

RECEIVE BREAKING NEWS WHEN IT HAPPENS! Sign up for Campus Safety’s free eNewsletters • Timely updates on university, school and hospital security issues • Research and trends pertaining to all facets of campus protection • Current and archived CS articles and features • Industry event listings and contacts

SUBSCRIBE TODAY:

www.CampusSafetyMagazine. com/eNewsSignUp

V

Bo isit D ot SI at h A #3 SIS 49 For 30 years, DSI has been making quality security products you can depend on right here in the U.S.A. Our commitment to security includes our fullycustomizable optical turnstiles, which we support with superior customer service and excellent warranties. That’s security worth talking about.

The DSI Invisigate™ glass barrier optical turnstile with IOM Glance™ System

To learn more, visit dsigo.com or call 1-800-272-3555. www.campussafetymagazine.com/freeinfo/19076 SEPTEMBER 2011

CSJ_0911News.indd 13

CAMPUS SAFETY

13

8/23/11 3:26:53 PM


N AT I O N A L C A M P U S SA F E T Y AWA R E N E S S M O N T H S P E C I A L S E CT I O N

SPOTLIGHT ON NATIONAL CAMPUS SAFETY AWARENESS MONTH

A

s a brand new batch of students start college this fall, new friends, new surroundings, new experiences and a whole new life await them. For most 17- and 18-year-olds, this is a time of excitement and growth – both inside the classroom and outside the classroom. With all of these changes, however, comes some vulnerability. College freshmen – and to a lesser their older classmates – can fall victim to the dark side of university life, especially sexual assault, drug and alcohol abuse, and hazing. College students must have the resources they need to stay safe, get help should they become victims or help their friends who have been victimized. Unfortunately, most U.S. institutions of higher learning have had a difficult time addressing these troubling issues. That’s why Campus Safety magazine has asked for help from Melissa Lucchesi, the outreach education coordinator and lead victim advocate for Security On Campus. Additionally, Campus Safety Assistant Editor Brittany Marie Swanson has interviewed representatives from colleges and organizations with programs that appropriately address these ongoing problems. It is our sincere desire that this special section will help your institution empower your students, faculty and staff so they will have a rewarding academic and employment experience. We would also like to thank Melissa and the Security On Campus team for their input on these immensely important topics. Robin Hattersley Gray Executive Editor Campus Safety magazine

CAMPUS SAFETY

CSJ_0911NatlCampSafeMonth.indd 14

SEPTEMBER 2011

www.campussafetymagazine.com

©iStockphoto.com/ericsphotography

14

8/23/11 3:43:53 PM


©iStockphoto.com/MrPants

PREVENTING AND RESPONDING TO CAMPUS SEXUAL ASSAULTS

SUCCESSFUL EFFORTS INCLUDE MANDATORY PRIMARY PREVENTION PROGRAMS, EDUCATING STUDENTS ABOUT VICTIMS’ RIGHTS AND RESOURCES, AND TRAINING CAMPUS PERSONNEL WHO MAY RECEIVE INCIDENT REPORTS.

T

ake a look at your campus. How many students are enrolled? How many of those students are women? Now, cut that number by 75 percent. That is how many women will be sexually assaulted during their time at your college, according to the Department of Justice’s (DOJ) Sexual Victimization of College Women. Despite this, sexual assault is a crime that is rarely talked about and even more rarely reported (only about 5 percent are reported, according to the DOJ.) Outrageous? Yes. So how can you intervene and respond to victims of campus sexual assault and create a safer, more supportive campus?

VICTIMS ARE AFRAID TO REPORT ASSAULTS Sexual assault is a crime against the whole person. A victim may feel a sense of shame, embarrassment and fear. She may be frightened that her perpetrator will hurt her again or that his friends will harass her. She may fear social ramifications, especially if the perpetrator is well liked on campus, and rightfully so. Many victims have less than supportive responses

©iStockphoto com/ericsphotography

SOC Launches National Campaign Against Sexual Violence

from friends, classmates and teammates after disclosing their sexual assaults. Some victims are unaware that what happened to them was against the law. Some are afraid to report it because they had been drinking or were on drugs at the time of the incident. No matter how large the school may be, the campus community is small. Word may travel fast, and reports of sexual assault may even hit the school newspaper. Additionally, according to I Never Called It Rape by Robin Warshaw, the vast majority of campus assaults (about 90 percent) are committed by someone the victim knows. Taking all of that into consideration, it is no wonder that most women do not talk about it, let alone report it.

SEXUAL VIOLENCE EXITS ON A CONTINUUM Creating a community that does not tolerate sexual violence of any kind is key. While it may seem like an overwhelming task, small steps can help create a campus that is more aware and less tolerant of these crimes. Sexual violence exists on a continuum. On that continuum are cat calls, derogatory or sexist remarks,

THIS YEAR, SECURITY ON CAMPUS INC. has partnered with Promoting Awareness, Victim Empowerment (PAVE) to launch a national campaign against sexual violence beginning in September for National Campus Safety Awareness Month and continuing throughout the year. The campaign offers colleges tangible tools to raise awareness of sexual violence and to create a safer, more supportive campus for survivors. Survivors will be educated on how to make informed choices to report and speak out about the crimes against them. Visit www.strongvoicescampaign.org for more information. Additional educational materials on campus sexual violence can be found at SOC’s www.securityoncampus.org.

SEPTEMBER 2011

CSJ_0911NatlCampSafeMonth.indd 15

CAMPUS SAFETY

15

8/23/11 3:43:55 PM


N AT I O N A L C A M P U S SA F E T Y AWA R E N E S S M O N T H S P E C I A L S E CT I O N The 3 Ds of Sexual Assault Prevention IN THE PAST, SEXUAL ASSAULT PREVENTION

has focused on the victim or the perpetrator. According to Dorothy Edwards who is executive director of Green Dot, which provides training on preventing sexual violence, training must also focus on the bystander. Students, faculty and staff can intervene in potentially harmful situations using one of the three Ds: • Direct: “In some situations, people feel comfortable directly approaching it,” she claims. “So for example, if I see someone leaving with a young woman who looks drunk, a direct approach might be to go up to her and say, ‘Hey, I’m a little bit concerned. Do you need a ride?’” • Delegate: Edwards says that some bystanders are too wary or shy to approach a potentially violent situation directly, but can diffuse a situation by locating the friends of the person who might be in danger or contacting the police. • Distract: “A favorite story I tell a lot is about a guy who saw one of his buddies taking a girl upstairs at a party,” Edwards says. “[The girl] seemed too drunk to be going upstairs, and so the guy called after his buddy and said ‘Hey, your car is getting towed.’” When the man went to check on his car, the woman’s friends intervened and took her home. Administrators can reduce the likelihood of violence by: • Making prevention a priority: “If a university president makes it clear violence prevention is a priority, people will comply,” Edwards adds. • Talking about sexual violence: “One of the important areas of influence [a college president has] is they’re often a public mouthpiece and can use their platform to talk about the importance of this issue.” • Ensuring adequate funding: “Finding adequate funding to support enforcement…will ensure enforcement can happen quickly and effectively.” • Implementing good policies: “The leadership on a campus has to make it clear that victims will be supported, you will get support services and your reports will be taken seriously.” For more information on Green Dot, visit www.livethegreendot.com.

16

CAMPUS SAFETY

CSJ_0911NatlCampSafeMonth.indd 16

SEPTEMBER 2011

and rape-supportive jokes. While commonly heard at college, these comments can foster a sexually hostile environment on your campus. Make sure everyone on your campus knows that sexual violence is not tolerated on any point of the continuum. Mandatory primary prevention programs that happen throughout the year and not just at orientation, can be helpful in reducing sexual assault. They also raise awareness of the options students

outcome of the hearing. These rights are intended to help a victim of sexual assault be able to deal with the assault while continuing her education. Many students are unaware of these rights, and some colleges do not make it clear that these exist. Make sure students are educated at least yearly on their rights, and that victims’ rights are listed along with your campus’ sexual assault policy. The list should be located in a place that is eas-

Ensure that students know about their options for reporting sexual assault and seeking help, and what would happen if she or he reported an incident.Victims also have rights. have if they are assaulted. If education is optional, campuses may not be reaching the students who need this information most. Focus in recent years has been on engaging the campus community as active bystanders, encouraging them to recognize when something is potentially wrong and step in. The benefits here are many — students learn about sexual violence and are encouraged to make it their issue. It can also create a sense that they are part of something larger and discourage tolerance of sexual violence around them. Raising awareness about sexual violence throughout the year keeps the issue on each student’s radar. Consider having open discussions about sexual violence, campaigns (such as the Green Dot Campaign discussed in the side bar on this page), and events such as Take Back the Night (TBtN). TBtN is an international initiative to raise awareness of sexual violence and to give survivors a place where their voices can be heard. Be sure that you are talking about your college’s stance on sexual violence at every opportunity.

CLERY ACT INCLUDES BILL OF RIGHTS Ensure that students know about their options for reporting sexual assault and seeking help, and what would happen if she or he reported an incident. Victims also have rights. The Campus Sexual Assault Victims’ Bill of Rights, which is part of the Jeanne Clery Act, affords victims of campus sexual assault reasonable academic and living accommodations, having the same opportunity as the accused to have others present during the disciplinary hearing and being notified of the

ily accessible to students, like the student handbook or prominently placed on the campus Web site.

VICTIMS MIGHT SEEK OFF-CAMPUS HELP Students must have resources available to help themselves or their friends who might be assaulted. These resources help victims find avenues for healing and options for justice. Women’s centers, student health services and campus sexual assault services can be helpful for students who have been victimized. However, it is also important to have a solid connection with your county’s rape crisis and domestic violence centers should students feel uncomfortable seeking help on campus. There are centers affiliated with every county across the country, and each typically provides a 24-hour hotline and free counseling and hospital, police and legal accompaniment. Each person who might deal with sexual assault survivors on your campus — including everyone in law enforcement, public safety and student affairs, as well as academic and resident advisors — should all have training on how to support survivors and to assist in reporting and seeking help. Educate campus personnel on victim behavior and on the resources available to survivors. A survivor who is met with a positive, supportive response when she discloses sexual violence is far more likely to find healing than those met with a negative response. Each person the survivor comes into contact with on your campus as she works through the aftermath of sexual violence has the potential to greatly affect her healing journey. ■ www.campussafetymagazine.com

8/23/11 3:43:57 PM


Gamewell-FCI – American Trusted Gamewell-FCI invented the first commercial fire alarm system over 150 years ago. Today, we continue to develop the most innovative technologies to protect lives and property. Our mission? To provide you with the best fire alarm and mass notification solutions for today’s ever-changing world. The E3 Series® from Gamewell-FCI is the most sophisticated and customizable combination fire safety and emergency communication system available. Using a combination system is not only recommended but also offers a cost effective advantage. Built around innovative, proven technology, the E3 System® represents the future of fire alarm control, assisted voice evacuation and mass notification. Buy with confidence - Buy Gamewell-FCI. Cutting edge technology backed by a 150-year tradition of excellence.

Visit www.gamewell-fci.com for more information on our Mass Notification Solutions. Gamewell-FCI - Assembled in the U.S.A.

Contract # GS-07F-0087X

Gamewell-FCI • 12 Clintonville Road, Northford, CT 06472 • 203-484-7161 • www.gamewell-fci.com www.campussafetymagazine.com/freeinfo/19162

CSJ_0911NatlCampSafeMonth.indd 17

8/23/11 3:43:58 PM


N AT I O N A L C A M P U S SA F E T Y AWA R E N E S S M O N T H S P E C I A L S E CT I O N

©iStockphoto.com/LauriPatterson

ALCOHOL ABUSE PREVENTION BASICS APPROPRIATE POLICIES AND DISCIPLINE, EDUCATION AND ALCOHOL-FREE ALTERNATIVE EVENTS WILL HELP REDUCE THE CHANCES THAT THE STUDENTS ON YOUR CAMPUS WILL ENGAGE IN UNSAFE DRINKING.

A

ll too often, drinking is accepted almost as a right of passage once students get to college. However, alcohol use and abuse have serious consequences. The first few weeks on campus increase a student’s chances that he or she will engage in high-risk drinking. Other areas of concern might be large campus festivities, sporting events, tailgating activities, alumni engagement events and house parties. Students who participate in these events significantly raise their risk of injury and death. They are also more prone to becoming victims of or committing acts of violence. Schools should adopt policies and appropriate disciplinary sanctions for students and employees who violate those policies. Consistent enforcement of sanctions sends a message that your institution means business when it comes to alcohol and substance abuse. All students and employees should be made aware of the university’s policies and what will happen should they violate those policies. There are many programs that raise awareness of high-risk drinking among college students. Talking about the risks of alcohol use and abuse is important throughout the year. Some schools find that mandatory online education helps. For others, peerto-peer education is effective. Find out what might work on your campus by engaging students in the process of cre18

CAMPUS SAFETY

CSJ_0911NatlCampSafeMonth.indd 18

SEPTEMBER 2011

ating the best program for the individual needs of your school. Plan alternative campus events that do not center on drinking, and encourage students to attend these functions. Alumni events that include alcohol should be held at off campus facilities. Finally, ensure that students understand the connection between alcohol consumption and crime. While under the influence of alcohol and other drugs, students are not only much more likely to commit crimes and to violate school policies, they are also more likely to be victimized. That said, stress to students that even if they have been using alcohol or drugs and they are victimized, they are encouraged to report the incident. Be clear that they will not face sanctions if they are reporting a violent crime. Avoid indirectly blaming victims who had been drinking by watching how you speak about the connection between crime and alcohol. Make sure that your campus has services available for students in recovery as well. Students should know where they can turn if they are struggling with drugs and alcohol during their time at school. Additionally, students should know how to recognize the signs of alcohol poisoning and how to help a friend who might be in danger. As with most things, your school can affect change on campus surrounding high-risk drinking and drug use by creating a community that is aware of the seriousness as well as resources available. ■

U. of Tennessee, Knoxville’s Alcohol Abuse Prevention Program DAN REILLY, director of the University of Tennessee (UT), Knoxville’s safety, environment and education (SEE) center, has an integral role in preventing alcohol abuse on campus. The university has increased the consistency of its alcohol policy enforcement in residence halls and conducted a campaign to change students’ views on what constitutes normal alcohol use. Reilly says that the key to reducing binge drinking and other harmful alcohol-related activities on campus is to alter the campus culture so it does not support excessive alcohol consumption. To effectively prevent high-risk drinking on your campus: • Collect data on student behavior. “You need to do some good data collection to find out where the issues are on your campus,” Reilly explains. “You can design or emulate really powerful programs, but they might not meet the needs of your campus.” • Create policies or programs to address the problems demonstrated by your data. “We did a high dose, multiple outlet social norming campaign to correct misperceptions of high risk drinking or correct misperceptions of how many people are partaking in it,” Reilly says. The campaign resulted in a notable reduction of high risk drinking on campus. • Uniformly enforce your policies. UT Knoxville officials found that alcohol policies were not being regularly enforced in residence halls, so resident advisers (RAs) received training on how to do so. “Our students’ perceptions of enforcement went from about 50 percent up to about 75 percent since implementing that training,” Reilly notes. • Provide alcohol education for violators. UT Knoxville’s diversion program utilizes motivational interviewing and alcohol skills training, as opposed to traditional “scared straight” tactics. “We look at the behavior through the students’ perspective rather than scaring them,” Reilly explains. “While the [information that binge drinking is] bad, dangerous or wrong may be 100 percent accurate, it’s not useful in that the students don’t respond to it.” It’s also important for campus administrators and staff to identify students who may be suffering from alcohol or drug addiction and help them find a relevant recovery program.

CONTINUED ON PAGE 24 www.campussafetymagazine.com

8/23/11 3:43:58 PM

CS0811yearbook201


CS_CodeBlue_insert.indd 1

8/26/11 10:18:47 AM


he Code Blue Product Sche

®

®

TOOLVOX COMMUNICATIONS MANAGER

CODE BLUE PHONES

UNIT PROGRAMMING & DIAGN

y Advanced emergency call capabilities y Stand-alone mass notification devices y IA4100 and IP5000 PAS unit control and fault

rface y Web-based GUI interface y Unit Programming Admi

66/110 Block Analog Cross Connect

25 Pair Telco Cable

Network Switch IP/VoIP Connectivity

PRI/T1/FXO

Secure Mesh or 802.11g IP Wireless

Third Party Systems

Service Provider

PSTN WAN

Network Switch IP/VoIP Connectivity

y Complete IP and analog device support y Code Blue software host

· EMS · Blue Alert® · Area of Rescue · UPD y Advanced VoIP PBX feature set for enhanced emergency call routing and business applications y Seamless integration and interoperability with third party technology utilizing telephony standards y Networking and clustering capabilities y Remote site survivability y Redundancy available for guaranteed uptime and stability y Remote support and upgrade options y VoIP Protocols · SCCP · H.323 · SIP · IAX · MGCP y PRI Protocols · Lucent 4ESS/5ESS · BRI · National ISDN2 · DMS100 · EuroISDN · NFAS y Traditional telephone interoperability · FXO/FXS · Loopstart/Kewlstart/Groundstart · E&M/E&M Wink · MF and DTMF support · MFC-R2 · Robbed-bit Signaling (RBS) Types · GR-303 · Feature Group D

CS0911codeblueasisinst.indd 4-5 CS_CodeBlue_insert.indd 2

reporting y VoIP phones | IP5000 · 2 Additional Ethernet ports · PoE · SIP/IAX2 · 2 Auxiliary outputs and 1 input · VLAN · Security · Built-in button scripting · Complete self-diagnostics: Buttons, keypad, speaker and microphone · 600 Ohm audio output | 2/4/6 Line IP business set · 12 line expansion module for the 6 line IP business set y Analog phones | IA4100 · 9 Number and message storage · 3 Auxiliary outputs and 2 inputs · 504 Hour standby time · 40 Hour talk time · Complete self-monitoring · Flexible programming | IA500 · Line powered y 2 Line analog business set

ings · Complete unit settings · Message creation and s · Easily upgrade or chang mouse le Ad y Unit Testing Schedule | IA4100/3100/3000/500 00/500 · Hourly · Daily · Weekly | IP5000 · SNMP managed | Unlimited schedule le cre | Email testing log files tion y Unit Failure Notification dress · Email as many address vice fo · Email to SMS service peake · Buttons/Keypad/Speake tion/PAS Faults y Advanced Log File · Per Unit verbo · Verbose and non-verbo · Log created every 24 h

8/26/11 10:18:47 AM


hema he DIAGNOSTICS (UPD) SOFTWARE DIAGN

rface Administration Admi ings configuration and sstorage change with a click of the chang Administration le Ad 00/500

creation le cre files tion dress as needed for text message vice fo peaker/Mic/Communicapeake

verbose viewing verbo 24 hhours

CS_CodeBlue_insert.indd 3

EVENT MANAGEMENT SYSTEMS (EMS) SOFTWARE

y Caller ID-based system

· Handles any incoming call from any type of device and identifies non-system extensions with Caller ID name and number y Advanced mapping · Longitude/Latitude Bing™ map · Customer uploaded map with indicator y Advanced video · Up to 2 streaming sources (IP camera must multicast) y Unit control via mouse click y In call indicator y Location specific information y Event Detail Records · Audio recorded · Video recorded · Notes typed · Time/Date stamp · Caller and callee information

®

BLUE ALERT MASS NOTIFICATION SYSTEM

y NFPA 72® 2010, Chapter 24 ECS-compliant y 3600 Sound dispersion y 400 Watt amplification y 400 Hz to 20 kHz frequency response y Unlimited pre-recorded announcements/

warning tone uploads limited to 500GB hard drive y Windows .NET GUI client-based control y Web-based administration y Individual PAS unit/Code Blue phone announcements y Unlimited grouping of PAS units/Code Blue phones for area announcements y Simple voice call third party integration y No additional infrastructure needed y Remotely access any PAS unit/Code Blue phone or page group via: · System extension · Offsite phone · Cell phone y IP5000 and IA4100 amplifier control and monitoring · Amplifiers only on during announcement saving power and the life of the amp · Fault monitoring of the entire system · Email and phone call notification of an fault y Complete indoor and outdoor coverage

8/9/11 10:38:59 AM 8/26/11 10:18:47 AM


CS_CodeBlue_insert.indd 4

8/26/11 10:18:48 AM

PSTN or WAN

s VoIP - SIP / H.323 / IAX2 trunking s Analog - PRI / T1 / E1 / FXO trunking

ToolVox Integration to Third Party Systems and Service Provider Connectivity

ToolVox速 Communications Manager

PAS 2-e w/ IP5000

Cisco 802.11g Wireless IP

Fluidmesh Secure Wireless IP

66/110 Block Cross Connect

& Diagnostics software, respectively

* Event Management Systems and Unit Programming

s EMS* agent s UPD* admin s Blue Alert速 admin s Blue Alert client

Network Switch

25 Pair Amphenol Cable

PAS WM-180 w/ IP Control

2,000 Feet Line of Site

PAS 1-s w/IP5000

Overhead Camera Mount

4 Pair Station Cable

TURNKEY INTERACTIVE VOICE & MASS NOTIFICATON SYSTEM

www.codeblue.com | 800.205.7186

help at the touch of a button

PAS 1-d w/IA4100

PAS WM-180 w/ Analog Control

CB 4-r w/IA4100

PAS WM-180 w/ no control


The Yearbook Buyer’s Guide Arrives with the December 2011 Campus Safety issue TAKE A LOOK AT OUR YEARBOOK! DON’T MISS THE ONLY 2012 CAMPUS SAFETY BUYERS GUIDE IN THE INDUSTRY!

Campus Safety Magazine, the leading source for information on campus and hospital security, is nearing publication of the 2012 Yearbook. Your company NEEDS to be included in this annual edition, which is referenced all year-long by 18,100+ security product decision-makers. The Yearbook contains market data, a full directory of leading manufacturers of security products and services, our exclusive “101 Big Ideas,” How-to Advertorials (where YOU byline the expert articles), and a website showcase.

WE HAVE AN ADVERTISING PROGRAM FOR ANY BUDGET:

Publisher 310-533-2477 peggy.onstad@bobit.com

Tara Schelling Eastern Sales Manager 215-794-7015 tara.schelling@bobit.com

Website showcase...

$550

Highlighted print listing...

$150

Highlighted online listing...

$150

“Get Noticed” package...

$725

DEADLINES FOR 2012 CAMPUS SAFETY YEARBOOK

Dynise Plaisance

Publishes...

Nov/Dec 2011

Western Sales Manager 760-519-5541 dynise.plaisance@bobit.com

AD/Edit Closing date...

October 11, 2011

Materials due...

October 11, 2011

CSJ_0911NatlCampSafeMonth.indd 23 CS0811yearbook2012.indd 1

CSM07-10.11

CONTACT: Peggy Onstad

Display/Advertorial combo includes 2 full page color ads + highlighted print & online directory listings + web showcase... $3620

8/23/11 3:43:59 PM 7/12/11 8:24:06 AM


N AT I O N A L C A M P U S SA F E T Y AWA R E N E S S M O N T H S P E C I A L S E CT I O N

HOW TO PREVENT HAZING

Expert: Colleges Must Get Tough on Hazing MOST SCHOOLS have policies in place to

24

CAMPUS SAFETY

CSJ_0911NatlCampSafeMonth.indd 24

SEPTEMBER 2011

ALTERNATIVES TO HAZING ARE AVAILABLE THAT PROMOTE GROUP COHESIVENESS WHILE NOT HARMING OR HUMILIATING NEW MEMBERS.

©iStockphoto.com/jophil

address hazing incidents, but administrators often fail to act unless hazing ends in death or serious injury, according to Hank Nuwer, an associate professor at the Franklin College Pulliam School of Journalism. “People need to look at this as a human rights issue,” he says. “Any time you have a violence and safety issue like this, a lot of things go wrong. A lot of things need to go right before the problem is solved.” Nuwer suggests that campus officials start enforcing their policies and “expelling students or closing Greek houses to send a clear message.” He also believes that bystanders to incidents of hazing need to be held accountable if they don’t report the incidents. To address hazing on your campus, it is important to: • Get your administrators on board. “I would say a lot more [general campus administrators] are on board than [college or university] presidents,” Nuwar says. In order for your campus to effectively address hazing, it is vital for your top decision-makers to be dedicated to enforcing your campus’s policies. • Uniformly enforce your anti-hazing policies. Waiting until a student is killed or injured and a media firestorm is underway is not the time to think about punishing those responsible for hazing on your campus. Nuwar says campus police should be given the authority to properly address hazing. • Allow only “dry” Greek organizations. “The last time I checked, 82 percent of all hazing deaths were alcohol-related,” Nuwar explains. It is generally up to a fraternity’s national organization whether the fraternity will be wet or dry. However, “alcohol and hazing are causing deaths and are a campus health and safety issue,” Nuwar explains. • Hold bystanders and participants responsible. Texas recently revised a law so that witnesses to hazing incidents will be held responsible if they don’t notify authorities. “Bystanders have to learn that – No. 1 − they’re in violation of their fraternity or their athletic team’s values [if they participate in hazing] – No. 2 − that they could be culpable and – No. 3 − if they’re an officer [who didn’t properly enforce campus policy], they could suffer in a civil suit,” Nuwar says. “Hazing occurs all over the world, including the Philippines, England and Japan − this is an international problem, not just a U.S. problem,” Nuwar says. “I think in the future we will see a federal law [to address hazing].”

W

here once it was perhaps thought of as an innocent bonding ritual within fraternities or sports teams, hazing is now recognized as a serious issue that can potentially harm or even kill. On college campuses, hazing can happen in fraternities, sororities, clubs and sports teams, and well as military ROTC programs. Hank Nuwer, a leading researcher on hazing, works with a concise definition of hazing in his book Wrongs of Passage: “Hazing is an activity that a highstatus member orders other members to engage in or suggests that they engage in that in some way humbles a newcomer who lacks the power to resist because he or she wants to gain admission to a group. Hazing can be noncriminal, but it is nearly always against the rules of an institution, team or Greek group. It can be criminal, which means that a state statute has been violated. This usually occurs when a pledging-related activity results in gross physical injury or death.” Currently, 44 states have hazing laws. Colleges and universities can play a critical role in ending hazing on campus. Just as with other crimes, engaging bystanders and assuring that they know how to recognize the problem and adequately respond can help reduce hazing. Many students believe that haz-

ing is the only way for the group to bond and for new members to “achieve” membership in the organization. Understanding this, it is important for universities to educate students and pledges on alternatives to hazing that help promote group cohesiveness while not harming or humiliating new members. Some organizations have outdoor activities like a high-rope course, which encourages members to work together while challenging them physically and mentally. Others might have camping or rafting trips or historical trivia of the organization or school. Connecting with alumni and other networking events, along with community services activities can also foster healthy bonding within the group. Schools need to have a clearly stated policy against hazing, including consequences for failing to abide by policy. Students should be able to access this information easily and be educated on it from their start at the school. Groups or teams should be sufficiently monitored, and the group advisors or coaches should go through training on recognizing and responding to hazing.

MELISSA LUCCHESI is the outreach education coordinator and lead victim advocate at Security On Campus Inc. (SOC). She can be reached at mlucchesi@securityoncampus.org. For additional coverage of this and other healthcare and educational safety and security topics, visit

CampusSafetyMagazine.com www.campussafetymagazine.com

8/23/11 3:43:59 PM


www.campussafetymagazine.com/freeinfo/19172

CSJ_0911NatlCampSafeMonth.indd 25

8/23/11 3:44:04 PM


feature

9/11 anniversary survey results

10 YEARS AFTER 9/11: IS CAMPUS SECURITY BETTER? Hospitals, schools and universities have made significant upgrades to their two-way radio systems and information sharing efforts. Active shooter and bomber response, however, remain a challenge. By Robin Hattersley Gray

26

CAMPUS SAFETY

CSJ_0911_9-11Survey.indd 26

SEPTEMBER 2011

www.campussafetymagazine.com

8/23/11 3:49:09 PM


I

n response to the Sept. 11, 2001 attacks on the World Trade Center and Pentagon, the United States spent billions of dollars upgrading security. Some of that funding, be it from federal, state or local sources, trickled down to the nation’s schools, universities and hospitals. Additionally, in the past decade campuses have developed much greater awareness about campus security vulnerabilities. So has all of this investment and attention to public safety been worth it to campuses? According to Campus Safety’s 9/11 anniversary survey, to a certain extent, yes.

RADIO INTEROPERABILITY HAS IMPROVED

A terrorist attack has now become a major planning and training consideration in all that we do. ©iStockphoto.com/aquaspects

Two-way radio interoperability problems received a lot of attention immediately after the attacks. Before 9/11, very often traditional police department radios didn’t “talk” with firefighter radios or with other police department communication systems. This lack of interoperability directly resulted in 120 New York City firefighters losing their lives on 9/11. They didn’t receive warnings from law enforcement that the World Trade Center’s south tower had collapsed, which would have prompted them to evacuate the north tower before it collapsed 29 minutes later. Schools, universities and hospitals experienced similar interoperability challenges before 2001, although they did not experience any loss of life associated with these issues. That said, the risks related to the lack of two-way radio interoperability were obvious, so campus public safety departments took some action. Of the 352 survey campus protection SEPTEMBER 2011

CSJ_0911_9-11Survey.indd 27

CAMPUS SAFETY

27

8/23/11 3:49:20 PM


feature

9/11 anniversary survey results

professionals who participated in the CS 9/11 anniversary survey, 60 percent say their radio interoperability has greatly improved or improved somewhat in the past decade. Nearly a third (32 percent), however, say the ability of their campus’ two-way radio systems to interoperate and communicate with outside agencies has remained the same. The sharing of information by traditional law enforcement agencies with campuses was another issue that appears to have been somewhat corrected in the

past decade. More than three out of four (76 percent) respondents say that the amount and quality of information they receive from the police, FBI and other agencies has greatly improved or improved somewhat since 9/11.

HOSPITALS VULNERABLE TO ACTIVE SHOOTERS, BOMBERS There appears to be a lack of confidence, however, in healthcare and educational insttutions’ abilities to respond to an active shooter or bomber incident. Overall,

Since Sept. 11, 2001, the ability of your campus’ two-way radio system(s) to interoperate and communicate with outside agencies has: Greatly improved Improved somewhat Remained the same Deteriorated somewhat Deteriorated significantly Not applicable: Our campus does not have two-way radios Don’t know

29% 29 9% 31% 32% 32 2% 2% 1% 1% 3% 2% 2%

Three out of five respondents (60%) say their radio interoperability has greatly improved or improved somewhat in the past e two-way two way decade. Most survey takers say their campuses have ikely to radios. K-12 and higher ed institutions are the least likely ng their have this type of equipment, with more than 4% saying campuses do not have two-way radios.

10 percent say their institutions would respond ineffectively or be completely unprepared to respond to a bomber. That percentage rises to 12 when respondents are asked about their institution’s ability to respond to active shooters. Hospital survey takers are particularly insecure about these issues. Thirteen percent say their institutions would respond ineffectively or be completely unprepared to respond to a bomber, and that percentage rises to more than 20 for active shooter incidents.

Since Sept. 11, 2001, the amount and quality of information that other law enforcement agencies (police, FBI, etc.) share with your campus public safety department about potential terrorist threats has: Greatly improved Improved somewhat Remained the same sam me Deteriorated somewhat Deteriorated significantly canntly Don’t know

3 34% 4% 42% 19% 19% 2% 1% 1% 2%

More than three out of four (76%) respondents say that the amount and quality of information they receive from other law enforcement agencies has greatly improved or improved somewhat over the past 10 years. e.” “HSIN.gov has been a font of information for me.” — Hospital Respondent

“We will have interoperability with local law enforcement an nd and fire departments by the end of this year.”

“Information about terrorist threats has not increased, but other information has increased.” ed.”

—Hospital Respondent

— University Respondent

“It has improved only because we have two police officers assigned to campus who carry our radios.” —University Respondent

If an active shooter incident were to occur on your campus, you believe your institution would: If an active bomber incident were to occur on your campus, you believe your institution would: Respond vvery ery effe effectively ectiveelyy Respond somewhat effectively ineffectively Respond neither neither eeffectively ffecttivvely nor noor in nefffectivelyy Respond ineffectively unprepared Be completely compleetely unprepa ared to rrespond espponnd

3 30% 0% 54% 6% 6 % 8% 2% 2%

Ten percent of survey respondents say their institution would respond ineffectively or be completely unprepared to respond to an active bomber, and another 6% say their campus would respond neither effectively nor ineffectively. Hospital survey takers express the most concern with this matter. Thirteen percent indicate “respond ineffectively” or “be completely unprepared to p respond.” “We have had two incidents involving multiple hoax devices plan planted on campus, and response from FBI, state patrol and city PD was fantastic.” —University Respondent —

“Anyone who answers ‘very effectively’ doesn’t understand the realities of such an event.” —School Respondent

28

CAMPUS SAFETY

CSJ_0911_9-11Survey.indd 28

SEPTEMBER 2011

Respond very effectively effectiively Respond somewhat effectively ineffectively Respond neither effectively effeectively nor in neffectivelly Respond ineffectively unprepared Be completely unpre eparedd to respond

32% 32 2% 47% 9% 9 % 9% 3% 3%

Twelve percent of survey respondents say their institution would respond ineffectively or be completely unprepared to respond to an active shooter, and another 9% say their campus would respond neither effectively nor ineffectively. Hospital survey takers, once again, express the most concern with this issue. More than 20% indicate “respond ineffectively” or “be completely unprepared to respond,” and another 14% indicate “respond neither effectively nor ineffectively.” K-12 respondents were the most confident that their institutions would handle these situations well. Eighty-six percent say their campuses would respond very or somewhat effectively. effective “Policy developed this year! Staff becoming aarmed this year also!” —Hospital Respondent —

“I cannott get the current administration as well as the baa us up for training, stating it’s too risky and city leaders to back they don’t want the thh liability.” —School School Respon Respondent

www.campussafetymagazine.com

8/23/11 3:49:23 PM


Please tell us how the Sept. 11, 2001 attacks have affected public safety on your campus.

What were you doing when you first heard about the Sept. 11, 2001 attacks? I was in my office, received a call after the first plane hit the World Trade Center (WTC). Called the director’s office and recommended increasing security measures just as the second plane hit the WTC. Getting a haircut. Looking at a callbox system for our employee parking garage. I was in Manhattan. After ensuring that my family was safe, I checked in at one of the NYPD command posts and volunteered. I was watching it on the news as a junior in high school. First day at a new job as a medical center security director. Having a conversation over a cup of coffee with my supervisor. Doing my morning ritual of shaving. I cut myself when I saw the news on TV. I was on a hunting trip in North Dakota. The rancher’s words still ring in my ears today.

The attacks of 9/11 and the Columbine massacre have prompted us to install video surveillance cameras at all of our school sites as well as Columbine locks and perimeter fencing around each school.

our emergency response team is more active, we do more training to prepare for critical incidents, and the administration is more supportive and understanding of the need to be prepared for any type of emergency.

Initially, security changes were significant. However, while most changes remain in place, it is the staff’s attitude that leaves a lot to be desired! There seems to be this mindset, across the country, because there has not been a repeat of 9/11, we are in the clear.

There is a greater awareness towards individuals and activity on and around campuses. Students or adults who make statements or behave in a manner that is perceived to be threatening or suspicious are quickly reported to law enforcement and investigated.

Not much. Active shooters have been a greater influence on campus safety.

The public safety department has made great efforts to improve but constantly bumps into the ‘It won’t happen here’ syndrome.

It has increased our situational awareness. All maintenance and boiler areas are kept locked at all times.

It has made employees outside our department take a more active role in their own security at work.

“ “

Not at all ... Virginia Tech had more of an influence. We revised our emergency response plan,

A terrorist attack has now become a major planning and training consideration in all that we do.

I think finally emergency preparedness on the hospital campus was taken seriously. Since 9/11, we have established a full time emergency management position in the office of the director. Hospital police are now armed and have a dedicated training officer. Badgeactivated access controls were implemented, and a one-swipe badge lockdown system and protocol are now in place. There is still room for improvement, but these are significant positive developments.

A lot of time and effort has been spent improving campus safety on many fronts. As a faculty member, though, I have never received specific training on how to handle either an active bomb or live shooting event.

There is more emphasis on infrastructure security, and much of our infrastructure has been upgraded. We have a patrol rifle program and two armored peace keeper vehicles. We also have a very nice EOP for the campus that was a

Unfortunately, administration has become complacent with no further attacks.

Sept. 11 has dictated numerous safety and security changes within the school community: Closer collaboration with our local law enforcement and tightening of school security, including better staff training; applying for and receiving federal grants to assist with educating the whole community about the importance of school security.

Now, no one enters the building during the school day without a key or permission to enter.

They made more people aware but at the same time made them more anxious about things that really are not serious. Our staff is now putting out more fires and quashing rumors. This has caused us to be more active in training to keep everyone more informed of the facts.

I am more security conscious about our buildings and cars parked nearby or with any type of package or bookbag left unattended. I carry my handgun, have a ‘go bag’ with extra mags and stuff, along with my vest, ready to be thrown on and go. Since the FBI considers colleges and universities as soft targets, I have these items in place everyday. I also sign up for any training or classes.”

For additional coverage of this and other healthcare and educational safety and security topics, visit

CampusSafetyMagazine.com SEPTEMBER 2011

CSJ_0911_9-11Survey.indd 29

direct result of 9/11 and a tornado that struck our campus weeks later.

CAMPUS SAFETY

29

8/23/11 3:49:27 PM


feature

hiring consultants & contractors

Illustration: Ron Rennells

SELECTING A SECURITY CONSULTANT:

10 THINGS YOU SHOULD KNOW To find the right person or organization for your project, check references, create a good request for proposal and learn whether or not they will be contracting out some of the work. By Jim L. Grayson If you have ever considered using a security consultant and found yourself a bit confused by the topic, don’t feel alone. Finding the right consultant, one who will save you money and benefit your campus requires a little understanding. Here are some tips that should help clear up some of the confusion.

2 30

HOW DO SECURITY CONSULTANTS LEARN THEIR TRADE?

CAMPUS SAFETY

CSJ_0911SecurityConsultant.indd 30

SEPTEMBER 2011

SECURITY CONSULTANTS usually begin their career in one of the many disciplines in the security industry. They may start their careers as police officers, electronic engineers, installers, integrators or manufacturers. The list can be extensive. Knowing how and from where they developed their consulting career can be helpful in judging their compatibility with your project. The area where they began will often indicate the area(s) where they are most knowledgeable.

WHAT IS A SECURITY CONSULTANT? A security consultant is an individual or group of individuals who have specialized knowledge in some facet of the security industry. A consultant should serve only the interest of his or her client. Persons who work with, for or receive compensation from a vendor, integrator or anyone else who may directly benefit from your project fall into a separate category. Some vendors may offer to provide security planning free of charge. They may even do a competent and ethical job. The problem remains that in-house experts will always have conflicting priorities: 1. to maximize company profit, and 2. to save money and work solely in the interest of their client (the vendor or integrator). A true consultant works only in the interest of their client (the hospital, school or university) with no potential conflicts.

CONTINUED ON PAGE 35

www.campussafetymagazine.com

8/23/11 3:53:12 PM


Your IP Video Surveillance Cheat Sheet

Considering implementing IP video on your campus? Here’s a primer on some of the most common technologies currently deployed. By Robin Hattersley Gray and Margie Gurwin What Is IP Video? Internet protocol (IP) video uses the computer network infrastructure to transmit security video to recording and viewing stations and dispatch centers. In IP video systems, network cameras output a digitally encoded signal that can be transmitted over the network as data for viewing, storage and integration with other security solutions. Video management systems or software (VMS) allows the user to view the live video, call up recorded video, control the cameras connected to the network and many other functions. Currently, the majority of video surveillance systems installed in the United States remain analog, with digital video recorders (DVRs) storing video from cameras and providing video playback. This technology has been available for years and is very reliable. That said, many new video surveillance installations are incorporating IP because of its advantages, such as: 1. FUNCTIONALITY: Users can view the video from any location in the world, as long as there is a computer network available. 2. BACKWARD COMPATIBILITY: Because new technologies like megapixel cameras are not backward compatible with analog systems, in order to take advantage of these new systems, campuses must upgrade to IP. 3. SCALABILITY: Depending on the equipment and system installed, there is no limit to the number of devices that can be placed on the network. 4. COSTS: While IP cameras are more expensive to purchase than analog cameras, the operation and in-

CS_vicon_insert.indd 1

stallation costs can be lower, especially for facilities that have more than 32 cameras. This results in a reduced overall cost of ownership. Often a campus will already have a network that can support IP video, so installation costs are less. The expense of running coaxial cable (which is used in analog systems) is also avoided by using the network, which runs Category-5e or Cat-6 cable. Solutions allowing power to run over the same network cable (PoE) also save the expense of additional cabling and equipment. Many facilities that currently have analog systems are choosing a hybrid approach that uses both analog and IP solutions simultaneously. As the analog cameras reach the end of their life cycles, often they are replaced with IP cameras, thus maximizing the return on investment from both old and new equipment. For campuses wanting to transition to IP, it is advisable to develop a migration plan. For example, some product lines can use existing analog cameras along with new IP cameras, allowing both to interoperate (communicate with each other and work on the same system). Using a DVR, video server or encoder, analog video can be converted to a digital signal that transmits over the same network as the IP cameras. For campuses installing video surveillance solutions in new construction or completely replacing a legacy analog system in a pre-existing building, IP might be the wise choice. This is particularly true if the institution has plans to greatly expand its video surveillance program or has a large number of cameras being installed. The next two pages provide a basic overview of some of the technologies and equipment commonly used in today’s IP video systems.

8/26/11 11:14:40 AM


Video Management Systems (VMS): Provide a unified user interface so campuses can more easily manage video, access control and intrusion systems. The latest generation of VMS software takes advantage of the open or nonproprietary platforms that facilitate interoperability between different solutions. It offers operational efficiencies beyond traditional security. For example, using VMS, video can help with process control, personnel management, inventory tracking, quality control and SOLUTION Video Management Software: Open platform VMS software may be installed on any commercial, off-the-shelf (COTS) server and storage equipment, provided the hardware meets the requirements established by the software manufacturer.

Network Video Recorder (NVR): An NVR is simply a hardware device in which the VMS software is already installed. Some VMS manufacturers offer their solution pre-installed on an NVR. If the VMS software is open platform, the advantages include all those listed above.

STRENGTHS • Server and storage can be selected to obtain the best performance of a specific system • Allows for integration with other security software solutions • Supports network cameras and hardware from many manufacturers • Fully scalable • Easy to integrate with other systems, such as biometrics, fire, access control and building management

• Usually easier to install than a PC server-based system • Single source for technical support of software and hardware

Digital Video Recorders (DVRs): These devices connect directly to analog cameras and convert video to a digital format for viewing and storage. Hybrid DVRs have the added ability to view and control network cameras, much like an NVR.

customer service in the healthcare and college campus environments. All VMS applications provide the ability to add and configure basic camera settings, resolution, frame rate and compression format. The more user-friendly ones provide built-in training tools or wizards that assist the operator with common tasks, such as archiving video, automating recording procedures and installation. Most VMS solutions support analytics and multiple types of video compression. WEAKNESSES • More difficult to install than preconfigured NVRs or DVRs from the manufacturer • Feature-rich solutions may be more difficult for users to master • Software licensing fees can be expensive and complex • Trouble shooting may require support from multiple manufacturers

• If the software is not open-platform, there are limitations as to the use of cameras and other hardware from other manufacturers • Often doesn’t allow other applications to reside physically within the unit

• Have been on the market for more than 10 years and are prevalent • Are reliable and have a life span of 7-8 years • Easy to use

APPLICATION COMMENTS • Appropriate for larger facilities or ones that have plans to expand significantly

• Appropriate for larger facilities or ones that have plans to expand significantly • NVR manufacturers often offer other hardware. Purchasing components from a single manufacturer eliminates certain compatibility issues that arise in open-platform systems. • Some manufacturers offer pre-configuration and software registration of NVRs, further reducing installation and set-up time

• Depending on the model, scalability may be limited • Hardware is often proprietary and specifically designed for video management

• When purchasing a replacement unit, be certain it will support IP cameras • Appropriate for smaller applications • Many DVRs are reaching the end of their life cycle

IP Cameras: Internet protocol (IP) cameras output a digitally encoded video signal that can be transmitted across an IP network. These cameras may provide images in either standard definition or high definition (megapixel models). SOLUTION Megapixel Cameras: These are IP cameras that produce high definition (HD) video. Common HD cameras offer resolutions of 720P (1.3 MP) and 1080P (2 MP), but models are available that go much higher than this.

CS_vicon_insert.indd 2

STRENGTHS • Provide much clearer images than regular IP cameras or analog cameras • Now allow for better identification of subjects • Require fewer cameras to cover a given area

WEAKNESSES • Are more expensive to purchase, although prices have been dropping substantially in the past few years • Can have challenges capturing images in low-light or backlight situations (this is true for most IP cameras) • The size of the files transmitted can be large, which can cause network bandwidth and storage issues

APPLICATION COMMENTS • Deploy HD cameras to cover a wide area. This allows a campus to avoid installing multiple IP or analog cameras, resulting in cost savings. • For locations with lighting challenges, analog cameras or thermal imaging might be appropriate • Flexible frame rate and industry standard compression technologies can help address storage challenges

8/26/11 11:14:41 AM


Data & Video Storage: Because many campuses continue to increase the number of cameras deployed, they will most certainly need more storage as their systems expand. This is particularly true for facilities installing IP video because IP cameras (especially megapixel cameras) create such large files. Fortunately, over the years, the capacity of hard drives has expanded greatly while their prices have fallen dramatically. One key development has been the introduction of solutions specifically designed for video surveillance. It should be noted that some cameras have built-in storage, so when the network goes down, these “edge” devices can record locally. SOLUTION Redundant Array of Independent Disks (RAID) provides increased storage functions and reliability through redundancy. This is achieved by combining multiple hard disk drive (HDD) components into a logical unit where data is distributed across the drives in one of several ways. Solid State Drives (SSD) use microchips that retain data in nonvolatile memory chips and contain no moving parts.

STRENGTHS • Less expensive than SSD • Better capacity than SSD • Longer life span than SSD

• Less susceptible to physical shock compared to RAID • Quieter, faster and have less latency than RAID

WEAKNESSES • More susceptible to physical shock compared to SSD

• More expensive per gigabyte than RAID • Have a limited capacity • Short life span

APPLICATION COMMENTS • Remember to backup your storage devices

• Remember to backup your storage devices

Compression: IP cameras (especially megapixel cameras) create file sizes that are very large and cause bandwidth challenges. Compression technology, however, makes large video and data files smaller so they won’t slow down a network. Some type of compression is a required component of most IP video systems. Note that the advantages and disadvantages listed below are generalizations and do not hold true in all conditions. Seek the advice of a professional system engineer to determine the best compression choice for your specific installation. SOLUTION Motion JPEG (MJPEG) Compression

STRENGTHS • This method can produce any of its frames as a single image for identification purposes • Minimum latency • Consistent file size • Lower CPU requirements • Lower cost for software and hardware • No standards

WEAKNESSES • The storage requirement for cameras incorporating MJPEG is nearly five times more than cameras using H.264

H.264 Compression

• More flexible than MPEG-4, which makes it suitable for applications ranging from low bit rate, low delay mobile transmission through HD security megapixel cameras • Better compression efficiency than MJPEG • Appropriate for megapixel cameras

• H.264 is not more expensive. You may pay more for a more powerful CPU to display it, but you’ll conversely save on storage in many cases. It’s a wash. • More powerful CPU required for display

APPLICATION COMMENTS • A survey of 12 leading networked camera manufacturers showed that about 85% of them incorporate MJPEG as one of their video streams

Note: Some material courtesy of Security Sales & Integration magazine and Bob Wimmer OTHER IP VIDEO TERMS YOU SHOULD KNOW: Client Software: This is licensed software that must be installed on user’s PCs in order to view and access the VMS system. It is sometimes the same as the one installed on NVRs, hybrid DVRs and workstations (non-recording network viewing stations).

CS_vicon_insert.indd 3

Embedded Software: This is a dedicated purpose software operating system, such as that running on some standalone DVRs.

Browser-Based Interface: A feature that allows security personnel and administrators to access the video management system using a standard Web browser, such as Internet Explorer, Mozilla Firefox or Chrome. It eliminates the need for special client software to be installed on the computer in order to view video from the security system. As with other viewing options, browser interfaces are secure, requiring a username and password. Almost all video management systems today offer this option, including the most basic, DVR-only systems.

Local Viewing: This is viewing that is limited to the physical location where the local system is installed. Traditional DVRs provide local viewing and control via front panel controls on the unit or from an onscreen interface. Client software installed on hybrid DVRs, NVRs and workstations can be configured by the network administrator to limit viewing to local cameras.

Remote Viewing: This type of viewing allows security personnel to monitor video from anywhere in the world via a Web browser or client software. For example, in a campus-wide IP VMS system, security personnel at the central office, as well as the local police station, might have access to live and recorded video from all cameras across all campus properties. On a smaller scale, the owner of a small child-care center with a DVR-only system might use a browser interface to remotely view video of the facility from his or her home computer.

8/26/11 11:14:41 AM


www.campussafetymagazine.com/freeinfo/19117 J_

_

CS_vicon_insert.indd 4

.

/

:

8/26/11 11:14:41 AM


3

WHAT ACTIVITIES ARE COVERED BY SECURITY CONSULTANTS?

One of the many difficulties in choosing the right consultant is that the field is incredibly broad. Security is made up of hundreds of individual disciplines, all of which must fit carefully together like pieces of a large jigsaw puzzle. Unfortunately, no one can be an expert in all of the related topics. Here is just a partial list of specialties: perimeter fences, exterior access control, workplace violence, emergency planning, security force management, security policy and procedure, training, video surveillance, logical access control, intrusion detection, systems integration, key management, door and window hardware, building design issues, crime prevention through environmental design. The list could keep right on going. Some projects can be handled by an individual, while others may require a team to ensure the proper depth of knowledge in each critical subject area.

5

HOW CAN SECURITY CONSULTANTS BENEFIT MY CAMPUS?

SECURITY CONSULTANTS can provide a

variety of services that can be quite valuable. They can: ● Provide an unbiased view of your security needs ● Bring knowledge from solving problems in different environments ● Save money by resolving problems with cost effective solutions ● Bring a fresh pair of eyes to review campus problems ● Provide recommendations that may have more credibility than experts from the campus security department offering the same thoughts and ideas ● Assist in negotiating lower bids by knowing what the labor time and charges should be for individual tasks ● Write comprehensive specifications that make it difficult for unscrupulous vendors to add charges during the construction period ● Provide post construction services to ensure that all aspects of the job have been completed properly as detailed in the specifications ● Help recruit and select a truly qualified vendor ● Provide other assistance Not all consultants offer these advantages, but they are all possible when the right consultant is selected.

4

SHOULD I LOOK FOR DEPTH OR BREADTH OF KNOWLEDGE IN A CONSULTANT? Some security consultants know a little about everything, others may know a great deal about a few things. Your needs will help you determine which is

most important. Consultants with great breadth of knowledge are valuable in seeing the overall picture, identifying all of the puzzle pieces and figuring the best way to fit them together. Consultants with depth of knowledge may be better at providing specifications for specific electronic hardware that will best fit campus requirements and compatibility needs. Finding a specialist with relatively good general security knowledge can be a real plus. The ASIS International management credential (CPP) was designed to help specialists gain a broad understanding of the other security disciplines that must fit with their specialty. Having a CPP is not a guarantee of competence, but it is a means for a specialist to broaden his or her understanding of overall security.

6

SHOULD A CONSULTANT SPECIALIZE IN ONE TYPE OF CAMPUS?

If, for example, you currently manage security for a hospital, should your consultant specialize only in hospitals? Too much emphasis on specificity is reasonable but may also serve to eliminate the strongest contenders. Hospitals, high rise buildings, university campuses and K-12 schools all have unique security requirements. It is beneficial to choose consultants who have worked with and understand these requirements. On the other hand, consultants who also have experience outside that specific client type of institution may bring a greater breadth of ideas and experience.

7

WHAT SHOULD I KNOW ABOUT MY CONSULTANT? There are many things you will need to know about your consultant before signing the contract, including:

Their reputation by talking directly to their clients The types of projects they work on, particularly those with similar complexity to yours The strengths of all team members who will be assigned to your project That the team will be committed to your project. If they have the breadth to understand your overall security needs, and where and how a specific countermeasure must fit within the overall security program If they have the depth of knowledge to write detailed specifications that will avoid extra construction period charges Whether or not they have the capacity to handle your project without unreasonable delays. Companies with too many existing projects can result in delays or shortcuts that result in cost overruns. Whether the contractor has any direct relationship with or receives compensation from any product or service that might relate to your project SEPTEMBER 2011

CSJ_0911SecurityConsultant.indd 35

CAMPUS SAFETY

35

8/23/11 3:53:13 PM


feature

Cellular, Two-Way Radio, Analog & SIP Telephony Call Box Solutions

8

hiring consultants & contractors

WHAT SHOULD I KNOW ABOUT OUTSOURCING AND PARTNERSHIPS?

Some consulting organizations rely on partnerships to complete their tasks. This can be normal and beneficial to your project. Consultants who lack the required depth of knowledge in some area of your project can reach out to another consulting organization that has the requisite skill set. It is critical that all partnerships and outsourced work be given the same scrutiny as the primary contractor. You will need to know their reputation, talk to their clients and have all team members listed along with their background and expertise.

9 HOW CAN I LEARN ABOUT

A CONSULTANT’S REPUTATION?

IPCallCo’s solutions incorporate the latest in unified communication design to allow integration of campus-wide mass notification and multi-party answering points; regardless of communication device, network or service provider! IPCallCo offers a full-range of colors and call box designs from flush mount to stand alone solar-powered models. Lease Purchase Options Dealer Inquires Welcome

sales@ipcallco.com • 954-938-1968 www.ipcallco.com

There are several things that can help in selecting the right consulting firm: ✖ Develop in-house security knowledge. The broader your understanding of security, security countermeasures and how they fit together, the better you will be at selecting the right consultant. ✖ Talk directly to former clients. Determine how close their project is to the one you anticipate. Ask about problems with their overall performance, including unanticipated cost overruns and delays in their service delivery. Ask how satisfied they are with the final result. ✖ Get detailed information on all individuals who will be assigned to your project ✖ Check the Better Business Bureau for complaints regarding the consultant ✖ Check the company on the Internet for potential problems or conflicts

10

HOW DO I IMPROVE MY CHANCES IN FINDING THE RIGHT CONSULTANT?

● Construct a well written request for proposal (RFP) ● Take all prospective members on a job walk at least two weeks prior to the submittal due date ● Give them a good feel for your needs, areas of concern and project details ● Allow a period for them to submit questions prior to the proposal due date. The questions they ask may hint at their expertise. Share questions and answers with all potential vendors. ● Have all competing vendors give a presentation on their approach and areas of emphasis that they would use in handling your project. Ensure that all evaluators fully understand the details of the RFP. ● The RFP should include mandatory disclosure of any monetary or other link between the consultant and any vendor that may be considered for the proposed work ● Look beyond the low bid to your confidence in the organization and its ability to deliver what you need.

JAMES L. GRAYSON, CPP is a senior security consultant for Summers Associates LLC, and he can be reached at jimgrayson@mindspring.com.

www.campussafetymagazine.com/freeinfo/19058 36

CAMPUS SAFETY

CSJ_0911SecurityConsultant.indd 36 CS0311ipcallcellular.indd 1

SEPTEMBER 2011

www.campussafetymagazine.com

8/23/11 3:53:13 PM 2/22/11 2:05:13 PM


Why You Should Consider Hiring a Certified Integrator to Install Your Video Surveillance System

Worldwide Trust

Although it is important to avoid conflicts of interest when selecting a consultant or contractor, certified integrator programs have their merits. Here, Infinova Vice President of Marketing Mark Wilson describes the benefits of such certification. Imagine this scenario: An organization that is installing its new video system finds out that the electrical contractors have installed smaller wall boxes than needed for the surveillance system’s fiber optic transmitters. There are thousands of these boxes, and it will cost several hundred thousand dollars to replace them. Additionally, the transmitter (TX) and receiver (RX) modules only came in one standard size. The campus has two choices: replace the wall boxes with the correct size for standard fiber optic transmitters or go into litigation. Lucky for them, after calling in the manufacturer, it turns out that there is a third option. If just the TX module were reduced in size, the RX module could remain the same and both would fit in the “too small” wall box. In this situation, which just recently occurred, that customization by the vendor saved the project, the budget and nights of sleeplessness for many people.

Beware of ‘Joe Trunk Slammer’ Not everyone has been so lucky. Such situations are not infrequent. All too often, consultants and project managers wanting to reduce costs will subcontract the installation of the surveillance system to low-cost cable installers. Called “Joe Trunk Slammers” by the trade, too many of them are lowcompetence as well. The quality of the job is typically rushed and substandard. The installation is riddled with errors. Since Joe forgot – or didn’t know how – to terminate a cable properly, the system produces poor quality video. There are reliability issues because the cable bend radius is too tight, among many other errors. As a result, the campus customer has to bring in a professional certified integrator to make the solution work. All of a sudden, the money saved with Joe is gone as are additional dollars to verify the proper installation of the system. What was supposed to cost less just cost more. The certified integrator would have been the best investment after all.

Certified Integrators Receive Training A certified integrator has been trained by the manufacturer on how to install

in Warning Systems

its equipment. For instance, some provide hands-on technical product certification classes for integrators and dealers on how to install and optimize IP surveillance cameras to deliver the best evidence. By actually working with the products, the dealers, integrators and installers gain an increased understanding of IP technology, obtain confidence in installing and configuring IP video products and receive verification of their knowledge through certification testing. One way to discern the value of the classes your integrator has undertaken is to find out if the integrator gains credits from professional organizations like the National Burglar and Fire Alarm Association (NBFAA) for taking the class. There are other benefits of working with a certified integrator. Oftentimes, manufacturers provide certified integrators with hands-on, in-field engineering and phone support during pre-sales, design and negotiation, and post-sales stages of the project. They might also get an enhanced warranty. Continuing solution and product training is provided through conferences, newsletters, regional meetings and Webinars that help certified integrators better educate their own staff.

Unqualified Contractors Can Hurt You Don’t let Joe sabotage your system before it is even up and running. Look for a certified integrator. The easiest thing to do is to ask your contractor or project manager if the installer is certified by the brands that they are selling you. You can oftentimes verify this on the manufacturers’ Web sites, although a quick call to the local manufacturer’s sales representative is just as easy. He/she can tell you who is certified in your area. Ask what kind of training they received and if it was blessed by one of the professional organizations. Lastly, don’t forget to ask your peers. They’ve already gone through the installation process and can alert you to who helped them enjoy or detest the project. For additional coverage of this and other healthcare and educational safety and security topics, visit

CampusSafetyMagazine.com

ASC has installations in 50 states and more than 60 countries

I Force 3200 HPSA

ASC Campus Warning Systems provide peace-of-mind for students, parents, faculty, and staff with their ability to alert the campus instantly of an emergency. I-Force high-powered speaker arrays (HPSAs) produce: • Superior voice intelligibility • Incident-specific pre-recorded messages and live public address. ASC can coordinate HPSAs with voice, text, and e-mail alerts to stakeholders. Contact ASC for professional consultation to address your campus' emergency notification needs.

(800) 243-2911 Or visit us at: www.americansignal.com www.campussafetymagazine.com/freeinfo/19100 SEPTEMBER 2011

CSJ_0911SecurityConsultant.indd 37

CAMPUS SAFETY

CS0811amersigwldwide.indd 1

37

8/23/11 3:53:14 PM


feature

public safety administration

Building a College and University Safety and Security Structure Support for public safety by senior campus leadership, as well as the creation of emergency plans and appropriate communications systems are critical components of UT Austin’s successful campus protection program. By Bob Harkins

I

am often asked “Where do I start to put together a safety and security structure for my organization?” For all of us, it is a fair question. In today’s world with all of its the demands, expectations and requirements, this task can seem overwhelming. This is true whether you are starting from scratch or trying to piece together elements from an existing organization. Here’s what we have created at the University of Texas at Austin (UT Austin).

CORRECT STRUCTURE ENSURES EVERYONE WORKS TOGETHER On a campus, regardless of size, campus safety and security is housed in many silos. To keep a campus protected, it is im38

CAMPUS SAFETY

CSJ_0911BuildCampusSec.indd 38

SEPTEMBER 2011

portant to understand how things work on your campus and to gain support. First and foremost, there’s a need for support from your senior leadership. In today’s world, the last thing any campus wants is to be caught short in this area. The results can be devastating to the institution, so determine who the stakeholders are and how you interoperate with them. In 2005, Dr. Pat Clubb, UT Austin’s vice president for university operations, defined the structure under which campus safety and security programs would operate. The major shift was to establish a campus safety and security office that would oversee all aspects of campus protection. The associate vice president

(AVP) for campus safety and security would oversee these organizations. (See diagram on page 40.) Other campuses have housed campus safety and security responsibilities in the university police department or combined the responsibilities with other areas. For UT Austin, it worked best to establish the campus safety and security office. With the support of senior leadership and the organizational structure in place, the next key was to establish a structure that could slice across the campus to address campus protection issues. In 2003, Clubb established a campus safety and security committee within university operations. The role and membership of that committee was expanded in 2005. That committee now consists of these members: • Deputy to the President • Provost Office • VP University Operations • AVP Campus Safety and Security • AVP Facilities Services • AVP Legal Affairs • AVP Human Resources • AVP Equal Opportunity Services • Chief UTPD • Dir. Emergency Preparedness • Dir. EHS • Dir. Public Affairs • Dir. University Counseling & Mental Health Ctr. • DOS • Dir. Parking and Transportation • Department of Athletics • Fire Marshal • Dir. Utilities • Dir. UHS • Dir. Travel • Student Affairs • Office of ITS • Dir. Housing & Food Service • Office of Accounting • Office of Compliance This committee is chaired by the AVP for campus safety and security, and meets monthly. The committee works to address safety and security issues across all areas of campus. This group communicates across organizational lines and informs the various departments and agencies across campus.

DEVELOP YOUR CAMPUS EMERGENCY PLANS To continue with establishing structure, it was important to develop plans that would define how the campus would function during an emergency (at www. utexas.edu/safety/plans you will see the plans developed for UT Austin). The www.campussafetymagazine.com

8/23/11 3:58:17 PM


Extra security at no extra cost.

What stops someone from copying your ID card? With most printers absolutely nothing, with Magicard printers it’s HoloKote.® HoloKote is a watermark printed on to the card surface during the normal print cycle, so it costs you no more in consumables. When printed with the highly reflective HoloPatch,® it becomes clearly visible. For added visual security, you can opt to customize the watermark to your own secure design or logo.

www.campussafetymagazine.com/freeinfo/19156

www.magicard.com

Call toll free for more info: 877 236 0933 Email: americas@magicard.com Follow ultramagicard on:

CSJ_0911BuildCampusSec.indd 39

8/23/11 3:58:19 PM


feature

public safety administration

UT Austin’s Office of AVP for Campus Safety and Security Bob Harkens Assoc. Vice President Campus Safety and Security

Beth Woods Executive Assistant Campus Safety and Security

David Cronk

Robert Dahlstrom

Director Emergency Preparedness

Chief of Police

Bobby Stone

Garland Waldrop

Director Parking and Transportation Services

Fire Marshall Fire Prevention Services

overall emergency plan is often referred to as the burnt orange book or plan. This emergency management plan is an all hazards plan that addresses assumptions, phases of emergency management, levels of response, readiness con-

Peter Schneider Director Environmental Health and Services

and also the facilities that will be used during emergencies. The plan and the campus also have established several support organizations that are critical to a smooth functioning campus. These groups include the core

The campus must address how emergency situations are transmitted to the campus and the public. As was learned from previous emergencies across the nation, law enforcement response can be very well executed, but if communication is not rapid and accurate, the institution can suffer considerable criticism. ditions, types of events, command and control, support teams, organizational responsibilities and functions, continuity of governance, emergency facilities, communications, and administration and support. This plan was developed and vetted through the campus safety and security committee. It is complemented by the severe and inclement weather response annex, building emergency plan annex, infectious disease plan annex and business continuity plan annex. The critical purpose of these plans is to put a structure in place for the campus. These plans identify the critical incidents for which the campus must have a response. For UT, we identified 42 incidents. For each incident, the campus conducted a critical risk analysis as to the probability of occurrence and impact on the campus. This provides the framework for the campus to develop action plans for their response to these events. Additionally, the burnt orange book lays out the command structure 40

CAMPUS SAFETY

CSJ_0911BuildCampusSec.indd 40

SEPTEMBER 2011

crisis management team, behavior assessment team and threat assessment team. (See sidebar on right.)

HOW WILL YOUR CAMPUS COMMUNICATE DURING A CRISIS? The campus must address how emergency situations are transmitted to the campus and the public. As was learned from previous emergencies across the nation, law enforcement response can be very well executed, but if communication is not rapid and accurate, the institution can suffer considerable criticism. There is no one means of communication that will guarantee that the campus is properly notified. At UT Austin we use multiple means of communications. (see sidebar on page 42.) Another aspect of communications is the public media. It is no surprise that they will respond to an emergency on your campus. Plan for it. You must feed the media with information or they will seek it out from others. Follow the tenants of the ICS and NIMS system.

A joint information center ( JIC) is critical for the consistent and accurate flow of information. Survey your campus, and pre-designate places where you can accommodate the media with press conferences. Identify the rooms, the parking and support you need. It will save time and heart burn during the event. Anything you can do before an emergency will pay great benefits.

ACCESS CONTROL, RADIO INTEROPERABILITY ARE KEY If your campus has electronic locking, figure out the capabilities and how to use the system to your advantage during an emergency. We have the capability to lock 23 buildings from one location and are working hard to increase that number each month. If your institution has this capability, you must ensure that there is a common understanding of the terms that your campus will use, like “shelter in place” and “lockdown.” What is everyone’s role and

Core Crisis Management Team (CCMT) Members • President—Chair • Deputy to the President • Executive Assistant to the President • VP for University Operations • Executive VP and Provost • VP for Student Affairs

Behavior Assessment Team (BAT) Members • Office of the President • Counseling and Mental Health Center • University Health Services • Office of the Provost • UTPD • Dean of Students • Graduate School/Dean’s Office • International Students Office • Student Judicial Services • Housing and Food Services • Student Services with Disabilities • Legal Affairs (when needed) • Campus Safety and Security (when needed)

Threat Assessment Team (TAT) Members • Office of the President • CMH Center • University Health Services • UTPD • Legal Affairs • Office of the Provost • Graduate/Dean’s Office • Campus Safety & Security • Concerned Departments

www.campussafetymagazine.com

8/23/11 3:58:19 PM


SECURITY crusher Portable unit for the destruction of sensitive materials

Secure disposal of sensitive materials 5IF .4 ; $SVTIFS JT B EFWJDF GPS UIF TFDVSF EJTQPTBM PG TFOTJUJWF NBUFSJBMT TVDI BT )BSE %JTL %SJWFST $FMM 1IPOFT 'MBTI %SJWFT 4UPSBHF .FEJB 1$# T DPNQPOFOUT BOZUIJOH UIBU JT OP MPOHFS OFFEFE UIBU NBZ DBVTF B TFDVSJUZ CSFBDI JG MFGU BDDFTTJCMF .4 ; XJMM FOTVSF JU OFWFS HFUT JOUP UIF XSPOH IBOET PS JT TFFO CZ VOBVUIPSJ[FE QFS TPOT *UFNT UP CF EFTUSPZFE BSF TJNQMZ JOTFSUFE JO B TMPU PO UPQ PG UIF $SVTIFS *UFNT BSF DSVTIFE UP VOSFDPHOJ[BCMF BOE OPO SFTUPSBCMF CJUT "QQMJDBUJPOT BSF XJEF SBOHJOH 0VS $SVTIFS IBT CFFO VTFE XJEFMZ OPU POMZ GPS TFDVSF EJT QPTBM PG QFSTPOBM รถMFT BOE PUIFS TFOTJUJWF EBUB CVU BMTP GPS QSPUPZUQF BOE EFGFDUJWF QSPEVDUT such as Cell Phones, PCBโ s/components, etc.

SECURITY CENTRAL

Contact:

Joe Pult joep@amistarautomation.com 5FM

Amistar Automation, IOD t -JOEB VJTUB %SJWF t 4BO .BSDPT $" t TFM t FaY t www.amistarautomation.com

www.campussafetymagazine.com/freeinfo/19195

CSJ_0911BuildCampusSec.indd 41

8/23/11 3:58:20 PM


feature

public safety administration

You do not have to reinvent the wheel. There are best practices out there that can be adapted to your organization. Use anything that we at UT Austin have if it helps you improve your situation and better protect your organization. —Bob Harkins responsibility when these commands are given? Write down and post the expected actions and responses in classrooms. One of the most important actions a campus can take is to work with your local law enforcement agencies and make certain that everyone has the ability to talk on interoperable radios. This is no easy task, but every campus must work out this issue to a successful conclusion. Of course, adopting the right technologies and policies can only go so far. Institutions must also practice how internal and external staff and agencies will

respond to a crisis. At UT Austin, we use every opportunity to rehearse emergency response. For most special events we activate our joint emergency operations center with UT staff and a full complement of local and area emergency responders. This includes Austin Police, fire, emergency medical, Travis County Sherriff, FBI, Homeland Security and Austin/Travis County EOC. For example, we’ve had buildings scheduled for demolition that were used by our campus police department to con-

duct joint training with other responders and law enforcement agencies. Members of the campus safety and security committee also conducted a table top drill involving an active shooter scenario. They were asked to report their agencies’ first five responses. This is where many details were highlighted and resolved.

LOTS OF RESOURCES ARE AVAILABLE, SO USE THEM You do not have to reinvent the wheel. There are best practices out there that can be adapted to your organization. Use anything that we at UT Austin have if it helps you improve your situation and better protect your organization. Much of what I have mentioned is online at www. utexas.edu/safety/preparedness.html, and you can help yourself. If you have a better way to do something, I would love to hear from you. I will adopt best practices that will better protect our students, staff, faculty and visitors.

UT Austin’s Mass Notification Methods FIRST RESPONDER NOTIFICATION: selected members of the campus community who should be notified whenever there is an emergency. Those notified at UT Austin include the campus safety and security leadership, chief of police, president, vice presidents, communications or public affairs principals and proper response personnel. This notification is completed through multiple means (text, page, E-mail, landline and home phone). Contact is initiated by the police dispatch. Therefore, predetermined notification groups have been established and are readily available to dispatchers. THIS SYSTEM INCLUDES

TEXT MESSAGING: excellent ways of communicating with the campus, but they are not perfect. The first thing we had to do was establish a data base. For several years, UT Austin struggled with getting enough numbers to cover the campus. This past year, the university used the Higher Education Opportunity Act (HEOA) of 2008 to develop a policy that requires students to provide an emergency contact, including a telephone number (preferably a mobile phone). In the past, we have struggled to get to 10,000 numbers in our data base. We now have more than 50,000. On September 28, 2010, we had a shooter on campus firing an AK47. Within seven minutes we had notified almost 54,000 members of the campus community. However, the text systems are limited to about 132 characters. Therefore, message content is limited. They should

UT AUSTIN HAS

42

CAMPUS SAFETY

CSJ_0911BuildCampusSec.indd 42

SEPTEMBER 2011

be used for alerts and to tell the campus to take cover or some simple instructions. Because of the need for rapid communications, templates should be developed to quickly fill in the blank information and transmit. The text messaging system must be backed up by other systems.

PAGERS: at UT Austin to have a great working relationship with the local community authorities. We share a common satellite paging system with Austin/Travis County. On campus, we have designated three classes of pager carriers. Category “A” carriers are our first responders. They carry 24/7. These are very easy to identify. Category “B” carriers are building managers and others who have the pager at their work place. One of our responsibilities is to get the word into buildings when there is an emergency. The pagers do this quite well. Because of the satellite basis of these devices, they are very reliable means of communications. Category “C” pager carriers are those who are in leadership positions. They may or may not be carrying the pager 24/7. However, during an emergency, they will have their pager. Like the text messaging system, there are limits on the amount of information that can be transmitted over this system.

WE ARE FORTUNATE

SIRENS: outdoor warning system was purchased to alert the campus dur-

THE UT AUSTIN’S

ing severe weather situations. The sounding of the siren at any time other than our monthly test (first Wednesday of each month at 11:50) indicates that there is an emergency and that everyone who is outside should seek cover in the nearest building. There is only one sound, and that sound indicates that all should seek cover. We also have the ability to follow the siren sound with a vocal description of the emergency. On September 28, 2010, we sounded the siren every 10 minutes to make certain that everyone on campus knew that there remained a danger. Again, like all systems, this system has some limits. These must be understood so that compensated actions can be taken. For example, the sound of our system is not designed to penetrate all buildings. The intent is to get the word to those outside so they can seek cover. Additionally, because the sound is bouncing between buildings, any vocal announcement must be read slowly, and care must be taken not to give complicated instructions.

E-MAIL: college and university campuses have an E-mail system, and most have designated this as an official means of communication. The E-mail system is good for providing information and instructions, but it takes time to craft a message. The distribution can also take a long time. At UT Austin, it can take us 45 minutes to get messages out to 70,000 E-mail addresses. We understand that fact and compen-

MOST, IF NOT ALL,

www.campussafetymagazine.com

8/23/11 3:58:21 PM


KNOW WHO IS WALKING YOUR HALLS.

VALID

Two time frames available:

>Wb\#:Wo * ^ekhi <kbb#:Wo . ^ekhi

Stock designs for: “VISITOR” ÇIJK:;DJÈ ÇIK8IJ?JKJ;È ÇLEBKDJ;;HÈ

.... or create your own custom badge(s)!

Perfect for visitors, contractors, temporary employees & others. For over 25 years we have been providing self-expiring badges to thousands of schools. Let us show you why we are the only trusted brand for visitor control. 0811-19ID

EXPIRED

Order Now! 800.628.0022 www.campussafetymagazine.com/freeinfo/19083

CSJ_0911BuildCampusSec.indd 43

8/23/11 3:58:26 PM


feature

public safety administration

sate, but E-mail is a valid means of communications.

SOCIAL MEDIA: animal in the jungle. At UT Austin, we had been discussing the potential for use of this media during an emergency. I was not convinced that there was great potential in its contribution. However, our September 2010 emergency proved me wrong. Social media sites like Facebook, Twitter and such were invaluable in keeping the campus updated on what was happening. We had designated individuals update various pages that we had established. This was a very important avenue for the campus to receive information. For example, UTPD had 468 friends on their Facebook page at 8 a.m. on September 28, 2010. After the event, the number of friends grew to 10,000 by the 29thand to more than 14,000 by the 30th. Social media was where the UT Austin students went to follow this emergency on this campus. THIS IS THE NEW

1-800 PHONE LINE: “How do we handle phone calls from parents during an emergency?” was discussed before the September 2010, emergency. We established a 1-800 phone line that would be activated

THE QUESTION,

during a crisis. We knew parents would call the university to find out what is going on during an emergency. The question has always been who answers the calls. At UT Austin, we have designated the ITS help line personnel to be the responders. We developed a recording on the morning of September 28, 2010. Between 8:30 a.m. and 3:30 p.m. we received nearly 1,500 calls. All but 150 dropped off the line and followed the instructions of the recording. Our operators only talked to 150 callers. This save a tremendous amount of time and personnel. Plan ahead and help your campus.

WEB SITE POSTINGS: of communication is critical to provide detailed information. There has to be consistent updates to these pages and links from the main page to other pages that provide additional information. For example, from the emergency preparedness page at www.utexas.edu/ emergency we have links to the registrar, housing and food services and other offices that will provide detailed information to members of the community.

THIS MEANS

CABLE TVS/FLAT SCREENS: AT UT AUSTIN,

we have two campus TV

cables. We have a system that enables the office of emergency preparedness to place emergency announcements on these cable systems. During the September 28 event, we did not scroll the announcement across the bottom of the page, and that proved to be a problem. When we posted the emergency announcement, we blocked out access to news and public media information. We are fixing this so that an emergency announcement will scroll at the bottom of the picture.

COMPUTER “POP UPS”: a system that permits our emergency offices to send out messages that “pop up” on selected computers. This is a good system to get information to key people. It is not necessary that every computer on campus has this feature. Select key computers that will have someone there who can forward the information.

WE ARE USING

BOB HARKINS is associate vice president of campus safety and security at UT Austin. He can be reached at bharkins@austin.utexas.edu. For additional coverage of this and other healthcare and educational safety and security topics, visit

CampusSafetyMagazine.com

W the Avigilon system, we eliminate the cost With and time of running more cable and adding new servers to support additional cameras t D substantial savings. s Bryan Kinnamon Network Administrator Coffeyville United School District

The Worldps First Open HD Surveillance Platform www.avigilon.com

www.campussafetymagazine.com/freeinfo/19155 44

CAMPUS SAFETY

CSJ_0911BuildCampusSec.indd 44

SEPTEMBER 2011

www.campussafetymagazine.com

8/23/11 3:58:27 PM


Securing Your World

manpower. technology. innovation.

G4S WACKENHUT IS NOW G4S Only G4S integrates manpower and the latest security technologies into a truly comprehensive and cohesive security solution. And that’s not just any manpower – it’s industry-proven core expertise from our Wackenhut lineage. Now seamlessly combined with analysis and design capabilities, the latest security technologies and business intelligence that traditional guard services simply don’t offer and technology companies alone can’t provide. That’s G4S innovation. 800.275.8305 • 561.622.5656 www.g4s.us • solutions@usa.g4s.com www.campussafetymagazine.com/freeinfo/19088

CSJ_0911BuildCampusSec.indd 45

8/23/11 3:58:29 PM


feature

contract security

HOW TO CREATE

EFFECTIVE CONTRACT SECURITY OPERATING PROCEDURES

Illustration: Ron Rennells

Campuses and their contract security providers must work together to develop appropriate post orders and manuals so security operations run smoothly. By George Okaty and Yan Byalik

C

ampuses demand and contract security firms promise to provide detailed post orders and operating procedures throughout the bidding and contract negotiation process. This is an important task given that the formal contract between the security provider and a campus is operationally defined through the use of post orders and standard operating procedures. Written procedures are the template for how security staff will respond in day-to-day operations and during critical events. Campuses who place too much of the burden for writing procedures on their contract security firm and security firms that do not adequately engage their clients in the process will find not only that their security program suffers as a result, but that the relationship itself between the campus and the contractor may become unnecessarily strained. The joint development of effective client centered operating procedures and post orders should be the goal of both the client and the security firm.

46

CAMPUS SAFETY

CSJ_0911ContractSecurity.indd 46

SEPTEMBER 2011

CAMPUSES MUST DEFINE THEIR SECURITY MANAGEMENT PROGRAMS In a well-integrated program, the campus client and the contract service have overlapping and distinct responsibilities in developing and maintaining post orders. The campus security decision makers are responsible for defining the security management program for their organization. They can do this by conducting in-house security surveys and risk assessments or engaging a security consultant to do a review and basing their security priorities on their institution’s mission. The campus client’s security management program establishes the framework in which the post orders and operating procedures will be built. For example, post orders for security officers to check company employee IDs will be ineffective if the campus does not have a policy that requires employees to carry and display IDs at all times while on company property. A contract security firm cannot unilaterally create a security program for its campus client. The contractor can offer observations and suggestions, but the security firm is ultimately tasked with carrying out

the staffing portion of an organization’s program. The contractor is responsible for screening, hiring, training, scheduling and evaluating security staff. The challenge for the contractor is to integrate the client’s policies and procedures with the contractor’s policies and procedures. Initially, it is the responsibility of the contractor to interpret a client’s security policies and detail how security staff will carry them out. Once the post orders and procedures are developed by the contract security firm, it is the responsibility of the campus client to review and approve them.

SECURITY MANAGEMENT PROGRAM MUST OUTLINE POLICIES The campus client’s security management program should establish legal policies as well as policies for physical security, personnel security and emergency response. These should be provided by the campus to the contract security provider for its use to develop appropriate post orders and standard operating procedures to carry out the client’s policies. For example, the campus establishes access control policies by identifying buildwww.campussafetymagazine.com

8/23/11 4:04:00 PM


The Best Choice for On-Site Communications Call today for the special ProTalk® education package Kenwood ProTalk® walkie-talkie radios are the cost efficient way to communicate on campus • Increase safety and efficiency • Mil-spec quality for maximum durability • No monthly fees • Affordable enough for every staff member

Demo Radios Available... Call Today

TWO YEAR

WARRANTY

1-800-950-5005 www.campussafetymagazine.com/freeinfo/19101

CSJ_0911ContractSecurity.indd 47

8/23/11 4:04:02 PM


feature

contract security

How to Write Post Orders and Standard Operating Procedures Writing the post orders and standard operating procedures is a technical skill. Contract security firms that are able to use a technical writer to support this work will have an advantage over those companies that do not. A security manual is a compilation of post orders and standard operating procedures. Outlines for security manuals are fairly standard and contract firms can develop a bank of templates for various types of clients: healthcare facilities, educational institutions, government, industry and manufacturing, etc. This is a benefit for organizations, such as hospitals, schools and universities, working with a contract security firm. Contract security firms with technical writers coupled with knowledge about client policies should be able to develop a security manual that implements the campus security management program. The following is a sample outline for a security manual; 1. Introduction/mission statement 2. Summary information about client 3. Code of conduct/ethics 4. Staffing information/position descriptions 5. Customer service policies 6. Specific post assignments 7. Building security/access control A. Building hours B. Restricted areas 8. Personnel security A. Identification card policies B. Visitor policies C. Drug/alcohol policies D. Sexual harassment E. Workplace violence F. Privacy/HIPAA 9. Emergency response A. Fire/evacuation B. Weather/shelter in place C. Hostile intruder D. Utility/power outages E. Emergency notification 10. Legal/criminal information A. Contacting police for assistance/report crime B. Use of force C. Criminal trespass D. Search and detention 11. Safety A. Hazard communication B. Bloodborne pathogens 12. Reports/record keeping A. Incident reports B. Accident reports C. Daily logs D. Inspection reports E. Lost and found 13. Appendix A. Client policies B. Training checklists 48

CAMPUS SAFETY

CSJ_0911ContractSecurity.indd 48

SEPTEMBER 2011

ing hours of operation and who can be admitted after hours. The contract service creates post orders for the times to lock and unlock buildings and the procedure to follow when verifying the identity of an employee asking for after-hours access. Personnel policies will regulate how the security staff interacts with the client’s employees and includes the confidential use of information. The campus client’s policies will establish whether security staff are identified as official representatives of the organization who are able to request identification and to order people from areas when necessary. The post orders and procedures should refer to that policy and establish the steps the officers are to take to enforce organizational policies and to whom to report violations. In regard to the confidential use of information, HIPAA regulations and the non-disclosure of personal and proprietary information should be addressed in the operating procedures.

RISK ASSESSMENTS HELP IDENTIFY HIGH-IMPACT INCIDENTS When developing emergency procedures, the campus should conduct a risk assessment to identify those incidents that would have a critical impact on the organization and provide that information to the security provider. Fire emergencies are an example and would require training and post orders on what to do when a fire alarm sounds, what are the evacuation procedures, what notifications should be made, how to work with emergency responders and the location of critical equipment. This information serves to better center the post orders to the campus client by creating a list of appropriate responses to the client’s most probable risks. Legal issues that the client must address include the use of force, arrest authority, criminal trespass and records-keeping documentation. Contract security officers may have the legal right to make a citizen’s arrest, but the client’s policy may forbid any form of detention. This is an example of a situation where a contract security company’s general policies and the campus’ policies must be integrated into a procedure that complies with the client’s requirements and the contract officer’s legal authority.

CAMPUS SHOULD REVIEW POST ORDERS, OPERATING PROCEDURES Once a draft of a post order or operating procedure is developed by the contract security provider (see How to Write Post Orders and Standard Operating Procedures on this page), it should be submitted

The campus client’s security management program should establish legal policies as well as policies for physical security, personnel security and emergency response. and reviewed by the campus client. Revisions are a collaborative process. Once approved, it is the campus client’s responsibility to notify its employees of changes in procedures and practices, and it is the contract service’s responsibility to train the security staff. Feedback from staff implementing the policy should be reviewed and procedures adjusted as required. Operating procedures should be reviewed at regular intervals and formally reviewed on a schedule. Using a standard template for operating procedures, noting who wrote and approved the procedure, the date it was approved and providing a review date will aid in the updating process. Training to the post orders and operating procedures is also a joint responsibility for the client and the contract security provider. For example, the campus client’s training should include joint programs with security and employees for emergency procedures during evacuations or sheltering in place. The contract security provider should be using the security manual as a template for a security officer training checklist.

CAMPUSES, CONTRACT SECURITY SHOULD PARTNER Contract security companies that engage clients in the process of developing post order and operating procedures will benefit by creating client centered security manuals. This will lead to an integrated set of security protocols that implement the campus’ security management program. The end result will be a smoothly run daily security operation focused on current operational policies and adapting to change in real time. In a crisis, when time lost is a jeopardy to life, property and revenue, contracted security staff will respond within the parameters of a campus client’s standard operating policies as extensions of the client’s own personnel. GEORGE OKATY is the director of safety and security at Tidewater Community College, and he can be reached at gokaty@tcc.edu. YAN BYALIK is a security manager at Top Guard Security Inc, and he can be reached at YByalik@topguardinc.com. For additional coverage of this and other healthcare and educational safety and security topics, visit

CampusSafetyMagazine.com www.campussafetymagazine.com

8/23/11 4:04:02 PM


choose IP

Ready Electric chooses IP for integrated security solutions that work 24/7. When Norton Healthcare, Metro Louisville’s largest health care system, approached Ready Electric for a security system to protect its facilities, Ready chose an IP solution from Honeywell. Our ®

®

industry-leading MAXPRO VMS integrated with the Pro-Watch security management system provides a layer of coverage that helped Norton Healthcare transition to IP with confidence and ease. Ready Electric has the peace of mind that comes from knowing they’ve got Honeywell security at work for them. “We chose Honeywell’s IP solutions because they’re a trusted technology leader, with strong customer support and service.” Ready Electric and Norton Healthcare choose IP – won’t you?

Scan to Watch Video Case Study

Pictured: Dan Kloenne, Security Sales Manager, Ready Electric, Louisville, KY. To learn more about Honeywell’s end-to-end IP solutions, including cameras, recording devices and video management systems, download your FREE copy of our IP Selection Guide at www.honeywellipsolutions.com or call 1-800-796-2288 for more information. © 2011 Honeywell International Inc. All rights reserved.

www.campussafetymagazine.com/freeinfo/19069

CSJ_0911ContractSecurity.indd 49

8/23/11 4:04:03 PM


feature

network security & data privacy

Illustration: Ron Rennells

STEMMING THE TIDE OF

ID Theft at Institutions of Higher Education LIMITING THE TYPES OF VENDORS ALLOWED TO OPERATE ON CAMPUS AND APPROPRIATE DATABASE MANAGEMENT CAN HELP TO KEEP STUDENT, FACULTY AND STAFF DATA SECURE. By Denis G. Kelly

A

ttending college is a personal milestone and an intellectual achievement, but it can also be an unexpected lesson in the harsh reality of identity theft. The nation’s higher education campuses are an inviting target for thieves. The easy availability of crucial information — from Social Security numbers to credit card data to private mailing addresses — leaves students and faculty vulnerable. Include E-mail correspondence and non-secure wireless Internet connections, and the risk increases. ID theft can erase a person’s very existence — he or she is now the property of a thief — leaving the victim as the accused wrongdoer with every creditor or employer for years to come. The special nature of campus life makes this issue a public safety priority, requiring greater civic awareness and practical steps to avoid this crisis. 50

CAMPUS SAFETY

CSJ_0911IDTheft.indd 50

SEPTEMBER 2011

www.campussafetymagazine.com

8/23/11 4:07:24 PM


An important exam is going on right now. This lecture hall is being examined for an odorless, tasteless, and invisible killer: carbon monoxide (CO) gas. In fact, using CO detection is the only way to know if toxic levels of CO are present. To provide your students, staff, and guests with the highest levels of protection available, the award-winning CO1224T and the new CO1224TR (round) carbon monoxide detectors provide RealTest™ — the first and only functional CO test that enables you to quickly verify that the CO detectors you install are actually sensing deadly CO gas.

For more information, visit systemsensor.com/co www.campussafetymagazine.com/freeinfo/19025

CSJ_0911IDTheft.indd 51

8/23/11 4:07:26 PM


feature

network security & data privacy

3RD PARTIES ENCOURAGE DISCLOSURE OF SENSITIVE DATA

Fixing this problem starts by acknowledging the way third-party companies “invade” most college and university campuses. A variety of actors — including banks, booksellers, building owners and retailers — establish makeshift kiosks, where they bombard students with promotions for loans or off-campus housing or other too-good-to-be-true deals.

Fixing this problem starts by acknowledging the way third-party companies “invade” most college and university campuses. A variety of actors — including banks, booksellers, building owners and retailers — establish makeshift kiosks, where they bombard students with promotions for loans or off-campus housing or other too-good-to-be-true deals. The problem with this situation, aside from the way it commercializes an academic setting, is the potential security breach that accompanies the disclosure of sensitive personal information. For example, a simple application for a credit card includes an individual’s driver’s license, Social Security number, mother’s maiden name, home mailing address and private telephone number.

KEEP AN EYE ON YOUR CAMPUS DATABASES University databases are also a prime target of cybercriminals. According to a recent report by Application Security Inc., there have been 158 data breaches that have compromised more than 2.3 million records at America’s colleges and universities. These databases are a veritable goldmine for criminals, containing valuable personally identifying information (PII) of students, faculty, alumni and staff. Information on these databases includes credit card and Social Security numbers, dates of birth, addresses and healthcare records. The lack of a comprehensive plan to prevent or repair data breaches of this magnitude is unacceptable. Even the Educational Credit Management Corp., a company that guarantees federal student loans, is a victim in this fight. In 2010, thieves stole the names, addresses, Social Security numbers and dates of births of 3.3 million students. In response to these thefts, Justin Hamilton, a spokesman for the U.S. Department

of Education, argues that protecting student privacy is a top priority. But managing student privacy is a difficult goal, particular when assigned to different agencies with conflicting agendas.

ID THEFT VICTIMS HAVE A HARD TIME RECOVERING The loss or misuse of personal information can ruin a person’s life. For the victim, the financial consequences of these crimes are, while undeniably stressful, secondary to the time and effort required to correct every misconception that may forever scar a person’s record. An arrest or conviction stops the perpetrator, yes, but it does little to convince a prospective employer that this newly minted college graduate is not, in fact, unreliable or a credit risk. College professors and administrators are not immune to this challenge, either. In fact, professors may be especially vulnerable to an attack since so much of their personal information is open to the public. For example, a professor’s entire work history — everything from his contact information to curriculum vitae to references — is often part of the public domain. All of this material, including the names of spouses and children, is easy to uncover. A quick review of the faculty page at one of the nation’s top law schools proves this point. The assistant dean’s CV, which is available online, reveals the ages and occupations of his son and daughter, his wife’s place of employment and the family’s home address. An enterprising thief could quickly use this data to commit a series of crimes, while this professor, who also happens to be a former partner at a major law firm, continues to lecture about privacy and the Constitution.

WIRELESS NETWORKS, CELL PHONES ALSO POSE CHALLENGES These challenges are phenomena within our analog lives. Things get worse when

5 WiFi Precautions You Should Consider According to Sumeet Malik, managing director of NetGains (netgains.org), computer users on campus must practice responsible WiFi protocol, including: 1 Using anti-virus software that is up-to-date 2 Adopting a personal firewall that offers both inbound and outbound permissionbased monitoring 3 Applying updates for all vendor software [Microsoft releases patches the second Tuesday of every month (http://update.microsoft.com/)] 4 Not accessing secure portals with sensitive information such as financial institution accounts even if the Web site starts with “https” 5 Disabling file and printer sharing

52

CAMPUS SAFETY

CSJ_0911IDTheft.indd 52

SEPTEMBER 2011

www.campussafetymagazine.com

8/23/11 4:07:26 PM

NF_2011_TotalLifeSafety CS0811honeynotiftotal.ind


Total Life Safety Solutions Protect What Matters Most

Emergency Communications

Advanced Detection

NOTIFIER has innovative life safety solutions that exceed building and fire code requirements. Our intelligent fire systems with advanced detection capabilities, gas and flame detection and fully integrated city or campus-wide emergency communications systems bring the maximum protection possible to your facility and its occupants. When lives are at risk, trust NOTIFIER total life safety solutions to protect what matters most.

Gas and Flame Detection

Scan this QR Code to access more information about NOTIFIER’s Total Life Safety Solutions.

www.notifier.com www.campussafetymagazine.com/freeinfo/19125

CSJ_0911IDTheft.indd 53 NF_2011_TotalLifeSafety_college_CampusSafety.indd 1 CS0811honeynotiftotal.indd 1

8/23/11 4:07:28 PM 7/11/2011 9:30:43 AM AM 7/11/11 9:25:30


feature

network security & data privacy

we enter the digital world. There is some measure of control within the physical limits of a college or university campus. Administrators and police can regulate which (if any) vendors solicit business, or the manner in which officials collect information from students. But those rules dissolve when undergraduates freely access wireless Internet networks, send text messages, run their own Web sites and circulate personal data with abandon. These unsecure wireless networks — and the equally vulnerable areas at nearby coffee shops and bookstores where students socialize and use the Internet — are a thief’s stomping grounds. Colleges and universities have a duty to better police these networks, making them more safe from attack by outside predators, but more responsibility rests with students and other users who go online (see “5WiFi Precautions You Should Consider” on page 52).

CRIMINALS USE SOCIAL ENGINEERING TO ACCESS DATA The irony of this situation is that in the very same places where the federal government and defense contractors conduct classified work, the nation’s top colleges and universities have easily penetrable troves of student and faculty data. Even a top technical university, which does work for agencies like NASA or the Pentagon, has wireless networks that a suspect could access by just walking on campus. The problem only magnifies when students simultaneously use sites like Facebook and Twitter, where security is (at best) an afterthought. Too often, students do not properly protect themselves from predators who use these sites to obtain personal information like cell phone numbers, dormitory addresses, private E-mails and intelligence about a member’s friends or immediate family. In other instances, ambitious thieves can exploit a student’s postings — the comments and references a member may publish on Facebook or Twitter — to gain the confidence of others, all in an attempt to extract additionally sensitive details. This form of identity theft, which the FBI classifies as “social engineering,” allows criminals to exploit content that is open and free.

ADMINISTRATORS, STUDENTS MUST ADDRESS ID THEFT

www.campussafetymagazine.com/freeinfo/19146 54

CAMPUS SAFETY

CSJ_0911IDTheft.indd 54

SEPTEMBER 2011

The lesson governing all of these issues is simple: know thy self. Avoid situations, in both the real and virtual world where compromised security empowers predators. The entire academic community must be part of this conversation, including administrators, alumni, campus housing, parents, faculty and students. Unfortunately, except for a few perfunctory workshops during college orientation, most schools do not offer a comprehensive primer about the risks of — and ways to avoid the consequences of — identity theft. This dialogue must happen. On a practical level, students can start by eliminating paper copies of valuable financial data, like bank records, credit card statements, phone bills, medical correspondence and any other material that forms a paper trail. Shredding these papers is a smart move, but scrutiny is the companion of safety. In other words, review credit reports to look for erroneous addresses, inaccurate charges, wrongful purchases and anything that suggests a breach of security. Concerning the digital realm, the same rule applies. Do not leave a (virtual) paper trail of E-mails, instant messages, Facebook postings and comments that can cause harm. Hackers look for this information — and there is, sadly, a surplus of this content — so they can commit everything from identity theft to wholesale financial mayhem. In such a volatile environment, colleges and universities www.campussafetymagazine.com

8/23/11 4:07:28 PM


Protect Our Future need to more aggressively educate students and faculty about identity theft. These programs should encourage the intelligent use of wireless Internet networks, safe social media practices and off-campus tactics to further avoid identity theft. We owe it to ourselves to make personal protection a priority. On a college or university campus, this summons to safety is an acknowledgment of the seriousness of identity theft. By recognizing the gravity of this threat, we can reduce the frequency and severity of this crime. We must accept this responsibility.

ID Security Fast Facts Incidents of identity theft increased by

There are

5 million Facebook users

11% from 2008 to 2009, altering the lives of more than 11 million Americans.

in the United States who are under the age of 10.

(Source: Javelin Strategies)

(Source: Consumer Reports)

More than

80 percent of college faculty are using social media.

One in three teens sends more than 100 text messages a day or

3,000 texts a month.

(Source: Babson Survey Research Group)

Protect Your Campus With The Global Leader of Walk-Through, Hand-Held and Ground Search Metal Detection Products

(Source: Pew Internet & American Life Project)

43% of IT executives

67% of employees

reported cloud service breaches last year.

access sensitive data outside of their offices.

(Source: Trend Micro)

(Source: People Security)

The average identity theft victim spends

21 hours and $373 out of pocket resolving the crime.

13% of identity fraud crimes are committed by someone the victim knows. (Source: Javelin Strategies)

(Source: Javelin Strategies)

NEW!

Ä´ Metal Detectors Visit us at ASIS Booth No. 2333

t 972-494-6151 Email: security@garrett.com

DENIS G. KELLY is an identity theft prevention expert. His book, The Official Identity Theft Prevention Handbook, analyzes identity theft in its proper context and provides takeaways to minimize the likelihood of victimization. He is the chairman of the Identity Ambassador Commission, IdentityAmbassador. org, an identity theft education and training organization. For additional coverage of this and other healthcare and educational safety and security topics, visit

Made in USA

CampusSafetyMagazine.com

www.campussafetymagazine.com/freeinfo/19028 SEPTEMBER 2011

CSJ_0911IDTheft.indd 55

CAMPUS SAFETY

55

8/23/11 4:07:29 PM


feature

administrative effeciencies

Illustration: Ron Rennells

Football Tickets, ID Cards and Mass Notification: There Is a Connection The University of Alabama has leveraged the functionality of its voice, text and E-mail emergency alerting program and student ID card program to more efficiently sell and distribute football game tickets to students. By Travis Sowders and Gina Kilker

A

dmission to the football games at the University of Alabama (UA) is the hottest ticket on campus. With more than 30,000 students vying for 17,000 reserved seats in the student section at Bryant-Denny Stadium, scoring tickets to any home game is competitive. Because of the high demand and limited student seating, the university wants to ensure that as many students as possible have the opportunity to attend games. Minimizing lines and wait times at the stadium on game day is another goal of UA officials. To accomplish this, in 2008 UA designed a program and turned to Blackboard Transact, its existing provider of student ID card and e-commerce technology, to leverage a set of assets already in place to build My Football Ticket, a self-service e-ticket account manage-

56

CAMPUS SAFETY

CSJ_0911Blackboard.indd 56

SEPTEMBER 2011

ment program for students. During the 2009 season, UA officials built on the program’s success, using the Blackboard Connect mass notification service to facilitate communication for game day exchanges of student tickets. This creative combination of platforms has resulted in higher game day attendance and improved the overall student experience.

PAPER TICKET SYSTEM LED TO LONG LINES AT STADIUM Prior to the 2008 football season, UA’s athletic department distributed paper tickets to students for all of its home games. In addition to the logistical challenges of printing and distributing 15,000 season ticket packages, the university found that expediting student traffic into the stadium was difficult. Students had to present a paper ticket and swipe their Action Cards (student IDs) to enter. In

addition, some students regularly resold their game tickets to nonstudents. “Football is a strong element of our student experience, and we wanted to provide the chance for every student to experience an Alabama football game day at the stadium,” says Jeanine Brooks, director of the Action Card office at UA. “We realized we needed to provide a student-friendly system that encouraged usage and filled the student section for each game.” Alabama’s robust academic and athletic offerings have led to record enrollment — 30,232 students in 2010 — which has also intensified competition for student football tickets. “With increased enrollment, we now had more students vying for 17,000 student tickets,” Brooks notes. High demand also meant that tickets were sometimes sold online to nonstudents. “The value of tickets on the open market was high, and students sometimes purchased tickets with the intent to sell, not to attend,” explains Brooks. “And that’s not what UA wanted to see when there are thousands of eligible students who want to attend a game.” Complicating matters was the existing paper ticket system, which made tracking sales and student attendance challenging. It also made the stadium entrance process cumbersome and slow.

COMBINING PLATFORMS PROVES TO BE EFFECTIVE, USER FRIENDLY Before the launch of My Football Ticket, the university wanted to create a program that could be easily adopted by students. UA officials knew the Blackboard Transact system was stable, reliable and already familiar to the students. This is why UA’s student government association, which had envisioned the My Football Ticket program, sought out the Action Card office to implement and

THE VALUE OF TICKETS ON THE OPEN MARKET WAS HIGH, AND STUDENTS SOMETIMES PURCHASED TICKETS WITH THE INTENT TO SELL, NOT TO ATTEND, AND THAT’S NOT WHAT UA WANTED TO SEE WHEN THERE ARE THOUSANDS OF ELIGIBLE STUDENTS WHO WANT TO ATTEND A GAME. Jeanine Brooks, director of the Action Card office at UA www.campussafetymagazine.com

8/23/11 4:12:19 PM


www.campussafetymagazine.com/freeinfo/19020

CSJ_0911Blackboard.indd 57

8/23/11 4:12:20 PM


feature

administrative effeciencies

Campus at a Glance: Founded in 1831, the University of Alabama is a public institution located in Tuscaloosa, Ala. More than 30,000 students attend the school. While certainly known for the caliber of its athletics program — the Crimson Tide team won the 2009 national football championship — the university also has a strong academic tradition. For 10 years in a row, UA has been ranked among the nation’s top 50 public universities by U.S. News and World Report. In addition, the university ranks among the top 10 public universities in the nation in the enrollment of National Merit Scholars.

manage the program. They worked with the Blackboard Transact team to customize the ticketing application using Blackboard’s commerce management capabilities, which were already in use on campus. Through Blackboard Transact, students use their Action Cards to gain access to events and recreational facilities. They can also preload funds to an online account so they can complete secure transactions with a swipe of their Action Cards at both on- and off-campus locations. Once the My Football Ticket system

was in place, students had secure, online, self-service access to verify ticket balances, transfer tickets, donate to a ticket pool or, for those without tickets, request from the ticket pool all on a game-by-game basis with E-mailed transaction receipts and streamlined stadium entrance. To further promote the My Football Ticket program on campus, UA produced and uploaded multiple training videos on the Blackboard system to demonstrate how the program works, which has helped increase student adoption. “Blackboard was essential in helping

us launch the My Football Ticket program,” Brooks says. “They helped us customize the system so it could easily handle large volumes of transactions online. Students’ familiarity with the Action Card program was beneficial for our training purposes. They knew how the system worked, which made the program’s adoption across campus much easier. It was a team effort from multiple university departments including Action Card, student government association, student affairs, athletics and information technology, combined with the expertise of multiple Blackboard product lines.”

EMERGENCY ALERT SYSTEM COMMUNICATES WITH WAITLISTED STUDENTS My Football Ticket was a success from the outset of the 2008 season, but it became clear UA still needed an efficient, timely way to reach students who had received a donated ticket on game day. Tickets were often donated right before a game, and reaching waitlisted students was difficult. “People make last-minute decisions not to attend, so a lot of students do not know until the morning of the game

Giving you more reasons to choose Fike Alarm Systems. Integrated Voice Evacuation

Smoke Control

Intelligent Fire Alarm Panels

Graphic Event Management

Video Flame, Smoke and Intrusion Detection

We listen and deliver. For years, Fike has provided reliable fire alarm systems and excellent customer service. But customers told us they wanted a broader Fike system to meet the needs of different applications. We listened, and we’ve responded. We now offer a more complete line of advanced fire alarm products including Integrated Voice Evacuation and Video Smoke Detection. W W W.F IKE .COM

Take a new look at Fike technology. There’s a lot to see.

1-866-758-6004

www.campussafetymagazine.com/freeinfo/19193 58

CAMPUS SAFETY

CSJ_0911Blackboard.indd 58

SEPTEMBER 2011

www.campussafetymagazine.com

8/23/11 4:12:20 PM


they’ve received a ticket,” says Brooks. “We were sending E-mails to notify them, but students weren’t always near a computer.” To notify students in urgent situations, such as the tornado that struck near the Tuscaloosa campus in April 2011, the university uses the Blackboard Connect service to send critical information through voice, text and E-mail messages. Administrators decided to integrate use of their existing Blackboard Connect service to help facilitate outreach regarding available tickets. “We were looking to identify other ways to use the Connect system because it’s such a wonderful product,” Brooks says. “We now use the Connect system to quickly reach waitlisted students before a game. If you received a donated ticket, you still receive an E-mail but you also get a phone call.”

STUDENTS THANK UA FOR NEW TICKET SYSTEM UA’s creative integration of the Blackboard Transact and Blackboard Connect platforms to improve the game day process has enhanced student attendance

and students satisfaction. Since 2008, there have been more than 500,000 hits to the system with 31,388 tickets donated to other students electronically. After the Blackboard Connect platform was added, Brooks notes that “Students have actually called, thanking us. We get calls saying, ‘I just got this call about a ticket. Is it true? Is it real?’ Students are excited. Without the phone call, they might not have known they had received a ticket.” Taking the ticket process online, then adding real-time notification, also conformed to how students use technology today. “Students actually view E-mail as an older form of communication,” Brooks explains. “They consider a phone call or text more instantaneous than E-mail. As far as students are concerned, E-mail is not their primary mode of communication. Phone calls and texts are. With My Football Ticket — and the Blackboard platforms — we’ve met student expectations, streamlined processes, enhanced self-service options, and the Connect product allows us to reach so many more people.”

University of Alabama’s Action Card Functionalities • • • • • • • • • • • • •

Student Identification Debit Library Residence Hall Access Control My Football Ticket (and other athletic events) Dining Hall Privileges Gym Parking Printing and Copies Bookstore Gas Laundry Restaurants

TRAVIS SOWDERS is the senior manager for product marketing and public relations for Blackboard Connect. GINA KILKER is the marketing communications manager for Blackboard Transact. For additional coverage of this and other healthcare and educational safety and security topics, visit

CampusSafetyMagazine.com

Beauty & Safety for Your Campus... Powered By Pelco

320 W. 18th Street Edmond, OK 73013 405.340.3434 www.pelcoinc.com www.campussafetymagazine.com/freeinfo/19097 SEPTEMBER 2011

CSJ_0911Blackboard.indd 59

CAMPUS SAFETY

59

8/23/11 4:12:22 PM


SAFETY ZONE

Avoiding Copyright Problems Is your campus using training videos, checklists or crisis plans that have been plagiarized?

“W By Michael Dorn An internationally recognized authority on campus safety and author of 19 books on the topic, Michael Dorn is the senior public safety and emergency management analyst for Jane’s Consultancy. Dorn, a member of the Campus Safety Advisory Council, works with a team of campus safety experts to make campuses safer around the globe through Jane’s offices in nine countries. He can be reached at schoolsafety@janes.com. Check out Dorn’s podcast on the topic at www.CampusSafetyMagazine.com/Dorn1.

hy re-create the wheel?” This oft repeated refrain can become problematic if the intellectual property rights of others are not respected. Though it is sadly not uncommon for people to intentionally plagiarize the works of others, it is probably even more common for people to inadvertently violate copyright laws by using information they incorrectly think they have permission to use. It can be highly embarrassing for a campus safety official to be accused of plagiarism. It can be more embarrassing for them to be named in a federal copyright violation proceeding. It can be far worse to have to settle such a case. These types of situations can put a real damper on one’s career, particularly in a field where reputation is so critical. This trap is now even easier to fall into because of how common it is for copyrighted and often registered works to be passed around virally.

LITIGATION CAN BE COSTLY FOR BOTH SIDES Violation of copyrights can be prosecuted in federal courts by an attorney who is has passed the bar in any state. If the copyright for the misused information has been registered, the plaintiff can seek and often recover not only damages but attorney’s fees from the defendant. These cases can drag on for years, and the legal fees can become rather high. This often results in a hefty settlement by the defendant after a couple of years of the attorneys slugging it out. Plaintiff’s counsel can also file a complaint with a state regulatory agency, which can result in large fines and a stronger position for their civil action. Another potentially adverse situation is for the issue to crop up during litigation following a safety incident. For example, having a plaintiff’s counsel prove that the educational organization illegally used the intellectual property of others during a civil action involving death or serious injury of victims would not be a very positive experience. Copyright problems can arise from the misuse of videos. One large school district learned this at considerable expense when they were taken to court because a school principal showed a training video to school staff in violation of the terms of use. The company that produced the video requires a per-person fee be paid for use of the videos for training. Apparently, an em-

Cases can drag on for years, and the legal fees can become rather high. This often results in a hefty settlement by the defendant after a couple of years of the attorneys slugging it out.

60

CAMPUS SAFETY

CSJ_0911SafetyZone.indd 60

SEPTEMBER 2011

ployee who had a beef with the administrator notified the company that the video had been used without paying the appropriate fees, and the company sought legal redress. The district now requires that a permission letter be obtained by the video copyright holder before any training videos are shown to staff. More commonly, videos or segments of videos are unlawfully copied, shown and posted on Web sites resulting in a legal transgression.

CRISIS PLANS CAN HAVE COPYRIGHT ISSUES Another common type of copyright problem involves the use of checklists and assessment tools. A common scenario is for someone to knowingly copy the content and claim that they have developed it to impress others in their organization. Another member of the organization, not knowing that the information has been stolen, shares it with a colleague from other organizations and the wider viral dissemination of the property begins. The organizations that spend considerable time and money developing these types of tools can often be fiercely protective of their investment and are quite prone to “lawyer up” to prevent the significant loss of revenue that can occur when their intellectual property is being given away for free. One of the most common types of campus safety copyright violations involves the use of copyright protected materials for crisis plan development. Often following the same types of patterns listed above, copyrighted information ends up in an organization’s crisis plan without proper authorization from the copyright holder. We see this in about 25 percent of the crisis plans we evaluate for clients as well in our school safety malpractice litigation work.

MATERIAL ON THE WEB CAN BE PROBLEMATIC Campus safety professionals should be alert to the possibility that information they find posted on a Web site or that is passed on by a colleague may be copyright protected. Keeping in mind that the person who transmits the information to you may not be aware that the information was passed to them illegally, careful consideration should be given before content is incorporated into official documents for your organization. Due diligence and proper documentation can help reduce the risk of an unpleasant court encounter and the resulting hard questions by the top brass. For additional coverage of this and other healthcare and educational safety and security topics, visit

CampusSafetyMagazine.com

www.campussafetymagazine.com

8/23/11 4:14:30 PM


Conservation. Protecting the wildlife of South Africa’s Kruger National Park from poachers was once an impossible challenge. But today the park uses Milestone XProtect® Enterprise and integrates license plate recognition to track poachers’ vehicles from one central location. Proving again that Milestone can solve problems that are more than security.

Milestone XProtect® is the world’s leading IP video surveillance management software and is reliable, future proof and easy to use. It supports the widest choice in cameras and seamlessly integrates with business and security solutions such as license plate recognition. Which means your possibilities are unlimited and you can keep your security options open. Discover more with Milestone and try our software for free at: www.milestonesys.com www.campussafetymagazine.com/freeinfo/19093

CSJ_0911SafetyZone.indd 61

8/23/11 4:14:32 PM


EMERGENCY MANAGEMENT MATTERS

Emergency Managers Earn Their Keep The cost benefit has been estimated to be $4-$11 for every dollar spent, but what price can you put on saving human lives?

T

here is an idiom called “earning your keep.” In general, it means “to earn one’s pay” or “work well enough to deserve what one is paid.” By David Burns Recently, I participated in a David Burns has more than discussion with my higher edu30 years experience in public cation colleagues on the issue safety and is the director of UCLA’s of justifying emergency manEmergency Management Office. agement programs. We have He is also a higher education consultant who is a subject matter all heard that for every dollar expert in mass casualty incident spent, “x” amount of dollars is management, emergency notificasaved in recovery. It isn’t an tion systems, comprehensive plan urban legend. I have heard development, emergency organization, EOC design, operation, the cost-benefit figures were crisis communications, threat and somewhere between $4 and vulnerability assessment, disaster $11, but I had difficulty trackrecovery, grant administration and ing down the studies. I wanted auditing. David can be reached at burns.gsmblog@gmail.com. hard proof. We know emergency management programs cost money. In this time of economic challenges, emergency management programs are on the chopping block. We are being consolidated into other departments, being asked to conduct a cost justification analyses to prove the program’s worthiness, or looking to hire an inexperienced novice who can do the job on the cheap. In this profession, you really do get what you pay for.

DON’T LOOK AT DIRECT COSTS, LOOK AT SAVINGS If you are a university administrator, instead of looking at the direct costs for administering an emergency management program, perhaps you ought to be looking at the bigger picture of what the emergency management program can save by the global effect our jobs have on preparedness, mitigation and prevention. Having an experienced emergency management professional in place saves money in the long run — reducing casualties and recovery through readiness, training, education and planning. This may answer the question, “What is your emergency management program really worth?” One other factor brought into this discussion by a colleague was the fact that credit rating agencies now include the implementation and maturity of emergency and continuity planning programs in their calculations. Well-managed programs now contribute to lower borrowing costs. That means something to a university administration. Some costs can be measured, some cannot. The real value lies in the fact that emergency management programs save lives. Cost justification for emergency managers or what I refer to as “non-structural hazard program mitigation” has been well docu-

‘‘

The real value lies in the fact that emergency management programs save lives.

‘‘

62

CAMPUS SAFETY

SEPTEMBER 2011

CSJ_0911EmergencyManageMatters.indd 62

mented and researched over several decades. Cost benefit ratios that equal “1” mean that for every dollar spent, at least one dollar is saved in lower casualties, reduced property damage, or environmental/economic recovery. FEMA hazard mitigation studies in the National Institute of Building Sciences (NIBS) Study yielded an overall benefit-cost ratio of 4.0. The National Institute of Building Sciences (NIBS) Study (An Independent Study to Assess the Future Savings from Mitigation Activities) looked at how much FEMA’s investments in mitigation saved on recovery payments. According to the NIBS study, FEMA saved $4 in recovery for every dollar spent on mitigation. The Harvard School of Public Health Study (Human Initiative) found that in dealing with humanitarian responses was “...every dollar spent in disaster preparedness yields a savings of $4-$11 in disaster response, relief and recovery.”

PERSONAL AGENDAS, POLITICS CAN CAUSE PROBLEMS One of the challenges with doing benefit-cost and work justification studies is the personal agendas and politics of the people conducting the studies. Are they looking to justify (champion) an emergency management position or working to eliminate it? That is the real-world impact of the politics we face in our jobs. I am not sure if anyone has ever assessed how much money was saved because we hired emergency managers who trained the community in emergency readiness skills (the community knew what to do when danger struck). Cost feasibility and justifications can be tricky. Human life has no real monetary value, but property, research and other “products” do. That is how insurance actuaries determine or assess risk and cost. It’s odd because I don’t believe we take the time to measure the savings when people actually survive an emergency; we only really measure loss and recovery costs. If people avoid getting injured, there are true cost savings that equal hundreds of thousands to millions of dollars (per person) in surgical, intensive care, rehabilitation and long-term disability costs that were not incurred because an emergency management program took measures to warn and educate the community. This resulted in people surviving a crises. I would venture to say that if an emergency manager trains a community to take a proper course of action and hundreds of people are able to walk away from danger during an emergency (tornado, hurricane, earthquake, fire, flood, hazardous materials exposure or other major incident) because they evacuated, sheltered in place, etc., the cost savings are immeasurable (in the millions).

EMERGENCY MANAGEMENT PROGRAMS SAVE LIVES I think we can safely assume that having a full-time emergency manager on a college or university campus saves lives. Not having a full-time emergency manager on a college or university campus increases risk. Who wants to champion increased risk as cost saving measure? For additional coverage of this and other healthcare and educational safety and security topics, visit

CampusSafetyMagazine.com

www.campussafetymagazine.com

8/23/11 4:20:04 PM

CS0311easyvisitmgmt.ind


A. B. C. D.

COMPETITOR PARTNER FIRED EMPLOYEE CONTRACTOR

With our Visitor Management System you’ll know who is in your building. And why. • Enterprise-class visitor registration, tracking, reporting and badge printing • Web-based pre-registration by employees • Tight integration with over 30 major access control systems • Employee and contractor time and attendance • Scalable from a single system to hundreds, with centralized administration • Affordable, easy to install and easy to use

Scan each visitor’s ID automatically and print a customized badge in 20 seconds or less. Thousands of customers worldwide have replaced their paper guest log with EasyLobby to improve their security and manage visitors more professionally.

Contact us today for a FREE Web Demo Phone: 781-455-8558 Email: sales@easylobby.com Online: www.easylobby.com

The Global Leader in Secure Visitor Management Systems

www.campussafetymagazine.com/freeinfo/19005

CSJ_0911EmergencyManageMatters.indd 63 CS0311easyvisitmgmt.indd 1

8/23/11 4:20:06 PM 1/18/11 2:21:12 PM


TECH BOOT CAMP

Personal Safety Apps: The Next Generation of Blue Light Phones With some campuses removing their emergency call boxes, apps on smart phones offer a viable alternative for students (and their parents) who are concerned about safety.

F

Steve Foster is president of Business Controls. He is also a security consultant and technology entrepreneur, and formerly worked in law enforcement.

rom the blue light phones installed in the 1970s to today’s mobile phone apps, communications technology has come a long way in improving campus safety and security. Colleges and universities realize that students are rarely without their cell phones, most of which are smartphones and receive text messages, E-mail or other notifications. Because students are so cell-phone dependent, many universities and colleges use cell phone calling/text message systems for emergency notification. The increase in cell phone use over the past decades has even caused some schools, such as the University of California, Davis, to remove their blue light systems. With parents of college students becoming more tech savvy and educated in the areas of personal safety, most are asking campus law enforcement for additional details about specific safety protocols and want more assurance. Fortunately, there’s an app for that.

APPS ACT AS MOBILE EMERGENCY CALL BOXES Some universities and colleges are turning to services and applications that bring the blue light concept to a cell phone. For example, the University of Colorado-Denver uses the MyForce personal security application. The app is available via a smartphone and provides live, 24/7 assistance whenever a user activates the one-touch alert. The solution provides improved response time and assistance to students and staff in the case of an emergency.

It’s is not just for the users’ peace of mind, but participants can call for help if they witness something and when someone else needs help. Perhaps the biggest benefit to students is they’re not only safe when there are on the campus, but when they are off campus too. —TONY HACKETT Alerts sent via the app are received and processed by a live security monitoring team that tracks and processes the emergency signals and notifies the proper authorities with a user’s profile and GPS location. All alerts sent within the campus boundaries are sent directly to campus security, enabling them to respond to situations with increased 64

CAMPUS SAFETY

CSJ_0911TechBootCamp.indd 64

SEPTEMBER 2011

speed and precision. MyForce’s security monitoring team can relay any updates from the streaming audio of the application to campus authorities as well as emergency response teams. Not only does the service provide a huge selling point to campuses and sense of security to students and staff, it also enables campus security to respond to safety issues that occur on campus faster and with greater accuracy. “What we evaluated and appreciated was the secondary help aspect MyForce offers,” University of Colorado-Denver Chief of Police Doug Abraham says. “It’s is not just for the users’ peace of mind, but participants can call for help if they witness something and when someone else needs help. Perhaps the biggest benefit to students is they’re not only safe when they’re on campus, but when they are off campus too.”

SOLUTIONS OFFER MORE TOOLS FOR PUBLIC SAFETY DEPARTMENTS Not only do these personal safety services and applications help a campus safety team respond to calls quicker, they also provide additional resources to combat safety issues on any campus. Unlike a stationary blue light system, a personal safety application on a smartphone typically stays on the user’s person, which allows for additional safety features. For example, with some products, the service opens up live communication with the personal security team that is able to track the subscriber’s GPS location and any developments via the streaming audio and report the updates

to campus safety. This feature is ideal in the case of abductions or if a user has to flee from an attacker. An additional benefit of these online personal safety applications is that users are able to upload content to an online profile that the safety teams and officials can access in case of an emergency. Users upload a current photo, physical description, driver’s license number, and any personal safety history or medical aliments — all of which could be essential in an emergency. These personal details would be relayed to campus safety as soon as a valid alert is placed. With some solutions, users also include emergency contacts who are only notified in the case of an ongoing situation (user is attacked, hospitalized, abducted, etc.) or the user cannot be contacted or located. Many of the applications increase the speed at which emergency response teams are able to help. For example, when the application is armed, it keeps a smartphone screen from timing out so an alert can be sent with one touch versus five key strokes to dial emergency services. All of these qualities improve campus safety’s ability to respond to students, staff and campus visitors in distress. All colleges and universities wants to ensure students and their families that the institution is doing everything to make their campus as safe as possible. Cell phone applications and services are the next step. For additional coverage of this and other healthcare and educational safety and security topics, visit

CampusSafetyMagazine.com

www.campussafetymagazine.com

8/23/11 4:30:39 PM


train your staff

know how to

Anytime from anywhere... And always know who is qualified...

Turn on the backup generator... Access live video & current information...

find the

Emergency response plan and call lists... Hazardous material locations & MSDS forms...

NaviGate™ – One web-based system, so many rewards for a variety of users:

NaviGate enables any organization to collect, manage and apply their essential information through integrated document, incident and

• Interactive floor plans • Emergency planning, preparation and response • Incident trending and data tracking

learning management. Through secure controlled authorization, NaviGate optimizes daily operations and emergency response, providing access to

• Online learning tools • Comprehensive document management with version and access control

information–anytime, anywhere.

www.campussafetymagazine.com/freeinfo/19115

Lauren I nnovations

CSJ_0911TechBootCamp.indd 65

|

w w w.laureninnovations.com

|

866.861.7400

8/23/11 4:30:40 PM


AS I SEE IT

Should You Revise Your Bomb Threat Emergency Instructions? A little change can go a long way toward making your evacuations less troublesome.

Bernard L. Buckner MPA, CPP, CHMM is executive director for campus safety at Cleveland State University.

A

bomb threat targeting a university in the Midwest was E-mailed to the FBI in November 2010, prompting the school to evacuate four academic buildings including the main library. Although an initial search turned up nothing out of the ordinary, three streets were closed and all buildings named in the threat were evacuated and closed as investigators went through each of them with bomb-sniffing dogs. The community was notified of the evacuation via the activation of campus fire alarms.

This change of instructions would have eliminated the need to inspect the briefcases, backpacks, purses and other personal items left behind. It also would have eliminated the numerous requests of individuals who needed to return to their offices to retrieve cell phones, car keys and medications. In hindsight, a valuable lesson was learned from this situation. Had the building occupants been evacuated using a pre-recorded voice message instructing them to take all of their personal belongings, an enormous amount of time and money could have been saved. This change of instructions would have eliminated the need to

inspect the brief cases, backpacks, purses and other personal items left behind. It also would have eliminated the numerous requests of individuals who needed to return to their offices to retrieve cell phones, car keys and medications. As many campuses transition to voice emergency notifications systems, one of the standard “canned” messages is something to this effect: • “May I have your attention please. May I have your attention please. There is an emergency situation in the building and public safety personnel are responding. Remain calm and immediately leave the building in an orderly manner by way of the nearest exit.” With just a little tweaking (as illustrated below), this message could have a far more powerful effect, saving time and money for everyone involved: • “May I have your attention please. May I have your attention, please. An emergency situation has been reported in the building and public safety personnel are responding. Remain calm, collect all of your personal items that you brought with you today and immediately evacuate the building in an orderly manner by way of the nearest exit.” It may be time to review you scripted messages. For additional coverage of this and other healthcare and educational safety and security topics, visit

CampusSafetyMagazine.com

Anti-Technology Extremists Targeting Universities By the editors of Campus Safety An anti-technology group linked to bombings against academics in Europe is now apparently operating in the Western Hemisphere. Mexican authorities say the group is responsible for a letter bomb that injured two professors from the Monterrey Technological Institute in Monterrey, Mexico, on August 8. The explosives injured two professors — one of whom was involved in robotics research — but neither suffered life-threatening injuries, Fox News reports. Another suspicious envelope was sent to Mexico’s National Polytechnical Institute on August 9, but it didn’t detonate. The group “Individuals Tending to Savagery” (ITS), which is opposed to nanotechnology, was identified from a partially destroyed note found at the scene of the explosion, according to Mexico State Attorney General Alfredo Castillo. He warned universities to increase security and notify authorities of anything suspicious.

66

CAMPUS SAFETY

CSJ_0911AsISeeIt.indd 66

SEPTEMBER 2011

www.campussafetymagazine.com

8/23/11 4:36:02 PM


5XJJHG

6WXEE\ DQG 5XJJHG

The preferred choice of security managers for documenting guard tours, The PIPE is now in its second generation, with typical battery life of 15 to 20 years, and an industry-best 5-year warranty. Now we’ve added the Stubby PIPE, the newest low-cost member of our PIPE family. With the durability and reliability you’ve come to expect from TimeKeeping Systems. Whether you need to manage guard tours across your entire enterprise, or just need a simple and economical system, we have your solution. Why not get the best? Complete systems start at only $495.

7KH *XDUG 7RXU ([SHUWV

7Ă—PH.HHSĂ•QJ 6\VWHPV ,QFRUSRUDWHG

CSJ_0911AsISeeIt.indd 67

www.guard1.com • 1-800-THE-PIPE • sales@guard1.com

8/23/11 4:36:05 PM


AS I SEE IT

Can You Testify With Your Smart Phone? Yes, but be sure to promptly E-mail all of your notes, files and photos to your work E-mail By Paul Witten and Tim Meacham

I

n some respects, with the introduction of smart phones, policing has become easier. Apps developed for smart phones have allowed us to take statements, document crime scenes and type notes all with one device. The question has been asked, though, “How does this use of the smart phone work with the rules of evidence?” Good question. This leads to other good questions: “Can I use my smart phone on the stand, like my notebook? If I use my smart phone on the stand, like my notebook, is it open to inspection? If I use my smart phone on the stand, can the phone be entered into evidence and taken from me?” Let’s start with a basic scenario. You are on patrol; you have a smart phone and you have learned there are smart phone apps specifically designed for police officers. You have decided to download an app and start using it. At some point during your shift, you notice someone driving erratically and you stop them. During your conversation, you detect certain cues that lead you to believe you are dealing with an intoxicated driver. You did not bring your clipboard to the stopped car with you on the initial approach, but Both the prosecutor and defense never fear, you have your attorney agree, you may use your smart phone with your phone to refresh your memory from new police app. You start your notes. In today’s age of a field sobriety test and technology, the smart phone and other document findings with devices are replacing notebooks, just your smart phone. You arrest the driver and set the as the laptop has replaced the court date. A month later typewriter. Smart phones are so are in court, armed pervasive in today’s society, it is hard you with your notes in your not to use one when you have one. smart phone. To answer these questions, we spoke with a local prosecutor and a local defense attorney who also sits as a substitute judge. Before we get into a discussion about this, we must caution you; the answers we learned are not only specific to the Commonwealth of Virginia, but very specific to the Richmond metropolitan area. We will provide a generalization here, but you must check your own courts to learn your own answers. Check not only with your prosecutor and judges, but check with defense attorneys since they ultimately will be the ones to enter a motion to inspect the phone or enter the phone as evidence. Both the prosecutor and defense attorney agree, you may use your phone to refresh your memory from your notes. In today’s age of technology, the smart phone and other devices are 68

CAMPUS SAFETY

CSJ_0911AsISeeIt_App.indd 68

SEPTEMBER 2011

replacing notebooks, just as the laptop has replaced the typewriter. Smart phones are so pervasive in today’s society, it is hard not to use one when you have one. So, can the smart phone be inspected, just as a notebook, when it is used to refresh memory on the stand? Ultimately, yes it can. The degree of inspection, though, is up to the judge. The prosecutor admits that the smart phone may be inspected if it is used by the officer on the stand. The defense attorney said he would push for the inspection, but as a judge, he would not allow it or at least allow a very limited scope. Though most of society is at least familiar with smart phones, different phones have different operating systems, and the court does not have the time to allow a full inspection of the phone for each type of phone on each case. The defense attorney/substitute judge said he would allow inspection of only those items pertaining to the case at hand and nothing further. Will an officer’s phone be taken from him and entered into evidence? No, according to both the prosecutor and defense attorney. Both agree that the phone is used for notes, and it’s the content of the notes, not the “notebook,” that is important. Some apps allow for notes to be E-mailed. The hard copy of the notes may be entered into evidence, but not the phone itself. Courts do not have, at this time, the ability to maintain a charge on every type of smart device on the market. When the phone battery dies, so does the usefulness of the information contained on it. This is still a good reason, though, to E-mail all notes, photographs and sound files to your work E-mail as soon as practical after they are obtained. Both prosecutor and defense attorney agree on one final point. Just as with holding a clipboard, the officer should not get so focused on using the smart phone or an app on a smart phone that his or her focus on safety is compromised. No app is worth having to get out of a tight situation because the focus was on the phone and not the bad guy. Keep your eyes up and hands ready. There is no app for that. PAUL WITTEN and TIM MEACHAM are police officers for a private university in the Richmond, Va., area. Witten holds a BA in government and politics from the University of Maryland. Meacham holds a MS in criminal justice from the University of Cincinnati. For additional coverage of this and other healthcare and educational safety and security topics, visit

CampusSafetyMagazine.com

www.campussafetymagazine.com

8/23/11 4:38:43 PM


Secure their safety, even outdoors. Our weatherized delayed egress panic hardware stands guard in the gardens. Protecting your patients is a job that doesn’t stop at the door. While they’re enjoying a stroll in the courtyard, you must be sure that they can’t wander beyond the gate and are secure from outsiders who might try to get in. Exclusive to Detex, this weatherized hardware provides a 15-second delay when anyone tries to exit—sounding an alarm as well as alerting the inside monitoring station. In an emergency situation such as a fire, it allows immediate egress. Because it’s Advantex® quality, our architect-approved hardware is extra durable and has a safe, smooth surface that’s available in a variety of complementary finishes. It comes in a simple-to-install EasyKit,® or we can custom fit the hardware for your application. Ask us about our weatherized options when you’re planning your outdoor spaces.

800-729-3839 830-629-2900 www.detex.com

www.campussafetymagazine.com/freeinfo/19104

CSJ_0911AsISeeIt_App.indd 69

8/23/11 4:38:43 PM


TECHNOLOGY AT WORK

1 / Aultman Hospital Adopts Critical Information System Aultman Hospital, Stark County, Ohio’s first and largest hospital, has chosen NaviGate by Lauren Innovations as its primary source for emergency planning, preparation and training. Aultman hopes to boost compliance, enhance safety and security, and train its staff and patients using NaviGate’s secure Web-based system. By using this highly secure, controlled access Web-based platform, Aultman can create, access, track and manage all emergency planning and safety information. This will also provide the health system the availability to provide critical access to essential information to emergency responders during an incident. Site and floor plans, emergency response documents, hazardous material location and information will all be available by any Internet accessible device. The decision to implement NaviGate will make Aultman one of the first hospitals in the nation to adopt this form of emerging critical information technology.

2 / Upper Iowa U. to Install Path-Finding Technology Upper Iowa University (UIU) will be working with Lightstep Technologies to install a new intelligent system designed for both daytime and nighttime evacuations. The path-finding technology will include escape routes that will automatically be illuminated and rerouted as nec-

essary, depending on the type of emergency and location of the damage and/or fire. Not only will the safe escape route be illuminated clearly in green, the unsafe routes will be clearly crossed out with a red “X” so that occupants of the building can be evacuated more quickly without mistakes that cause injuries and risk lives. The lights remain clearly visible in smoke-filled environments. The three newest UIU buildings, which were completed in 2010-11, will be retrofitted with the technology — the new student residence hall, the liberal arts building, and the student center. According to Lightstep, this project is the first of its kind in the United States and the first installation on any university campus in the world. The technology is also being installed in non-academic facilities in India and the Middle East.

1

2

3 / West Texas A&M Implements Cell Phone Text Tip Program West Texas A&M University is the latest school to implement the “uTip” text-a-tip technology from e2Campus. uTip allows anyone in the school community to alert school public safety officials simply by sending an SMS text message from a standard cell phone. Anyone in the community can use the service to report illegal activities they see, such as theft, vandalism, drugs, cheating, bullying, fighting and domestic disputes. Tipsters can also alert the school about suspicious

3

packages, disorderly sports fans or questionable behavior from fraternities or sororities. The school plans to have the program in place by the start of the fall semester. Once in place, campus safety and security officials will get text message originated tips from students and others about crimes and emergencies in real time. Campus safety and security officials in the university police department (UPD) will receive the tips. UPD serves as the West Texas A&M’s public safety answering point and operates a 24-hour dispatch service. The new service will be advertised through the school’s digital signage system this fall and promoted at new student orientation. Posters will be created and placed in strategic locations around campus.

4 / Miles College Upgrades Its Fire Alarms Fire-Lite Alarms by Honeywell announces the fire protection systems on the Miles College campus in Fairfield, Ala., have been

4

70

CAMPUS SAFETY

CSJ_0911TechAtWork.indd 70

SEPTEMBER 2011

updated by fire alarm and security integrator Protection 1 using FireLite Alarms’ MS-9600UDLS addressable fire alarm systems. Founded in 1898, the school recently began a new construction project, which triggered the need for its older campus buildings to meet newer fire code requirements. Utilizing an existing IP network for fire alarm reporting to Protection 1’s central station, the school was able to boost the reliability and response time of fire alarm communications while eliminating the cost of two phones lines per system. Each MS-9600UDLS fire alarm control panel offers a capacity of 318 addressable devices on one signaling line circuit. If more points are desired, an optional second loop can be added for a total of 636 addressable points. Each of the buildings — Murchison Hall, a men’s dormitory; L.H. Pitts Hall, a women’s dormitory; Kirkendoll Learning Resource Center, housing the campus library, computer labs and student services; and KnoxWindham Gym — were fitted with standalone panels in each facility, along with the additional upgrades of 41 pull stations, 79 addressable smoke detectors, 22 addressable duct detectors and 67 strobe lights. The monitoring of fire alarm systems throughout the Miles College campus is performed by Protection 1’s 24-hour central station, which is backed up by four UL Listed, fully redundant monitoring centers.

www.campussafetymagazine.com

8/23/11 4:40:30 PM


System & Solutions Provider

Why EverFocus HDcctv? Cover

Megapixel

MORE AREA with Fewer Cameras

Over Coax

WITHOUT

Networking

EXTREME Detail

HD 1080/720 & 16x Zoom

HD DVRs & HD Cameras

In-Stock & SHIPPING!

'RHV <RXU &&79 (TXLSPHQW 2IIHU WKLV .LQG RI 'HWDLO" 2 Megapixel Quality Over Coax WITHOUT Networking 1x

1x Standard Def vs EverFocus HDcctv Actual Screen Shots View this LIVE HDcctv Demo at

www.everfocus.com

8x

8x

Zoom

Zoom

www.campussafetymagazine.com/freeinfo/19095

Visit EverFocus at ASIS: Booth # 1049

EverFocus will help you plan and design your systems

CA: 626-844-8888 | NY: 631-436-5070 | sales@everfocus.com | www.everfocus.com CSJ_0911TechAtWork.indd 71

8/23/11 4:40:35 PM


TOOLS OF THE TRADE

U.S. Armor Enforcer XP Lauren Innovations NaviGate 5.0 Lauren Innovations has released NaviGate™ 5.0. The software includes a new user-interface, document and incident management capabilities and enhancements to the existing emergency and learning management modules. The incident management system allows users to track incidents and all of the details surrounding the incident such as people, vehicles and locations. The existing emergency management module within NaviGate has also been retooled; the updated resource manager allows a facility to keep track of equipment. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/19500

U.S. Armor, celebrating its 25th anniversary, has developed the Enforcer XP. This concealable vest is designed with removable and washable panel covers in both male and female sizes. With DuPont Kevlar XP ballistic material, this vest uses anti-microbial, closed-hole mesh fabric, making it waterproof while giving it breathability. This vest also uses Comfort Curve, a padded shoulder strap system for even weight distribution. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/19501

Honeywell HD Indoor/Outdoor Mini Dome Camera Honeywell of Melville, N.Y., releases the HD4MDIP, a rugged, high-definition indoor/ outdoor mini-dome IP camera that provides three times the image resolution of standard analog cameras, according to the company. The true day/night, vandal-resistant, fixed mini-dome provides 720p resolution at full frame rate. It features an externally accessible Web-based menu that lets operators view and control cameras from virtually anywhere. Additionally, the camera is equipped with built-in motion detection capabilities and camera tamper detection features that notify users when the camera’s field-of-view is altered, obstructed or blurred.

UTC MASterMind EX Monitoring Software The MASterMind EX monitoring software platform by UTC Fire & Security of Bradenton, Fla., offers service-oriented architecture (SOA) to allow better control of data flow from the database to the end user. Its comprehensive suite of product offerings includes monitoring, billing and receivables, sales and service management as well as integrated Web solutions, video, access, telephony, GPS tracking and reporting. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/19503

Need FREEInfo? www.campussafetymagazine.com/FREEInfo/19502

72

CAMPUS SAFETY

CSJ_0911tools.indd 72

SEPTEMBER 2011

www.campussafetymagazine.com

8/23/11 4:43:46 PM

CS0911stuparchannel.ind


u o y o d w o H r u o y f i w o n k campus is

SAFE?

dents annel has the questions stu The new student safety ch us. ensure their safety on camp and parents need to ask to

COMING SEPTEMBER 2011

gazine.com Go to www.CampusSafetyMa Channel ety Saf t den and click on the Stu

NEW

STUDENT & PARENT SAFETY CHANNEL

CSM08-42-11

ted with ll be continually upda fety Web channel wi Sa t ren Pa d an nt asures de me ne.com, the Stu what security tion guidelines and CampusSafetyMagazi ca to tifi ion no dit e, ad ns w po ne res a As mpuses and us emergency ll help parents hold ca ety, new laws, camp wi saf it , nt ion de dit stu t ad In ou ab ty. d universi information their school district an should expect from ts ren pa d an nts de stu children. for the safety of their districts accountable

tion contact: For more informa

AD, PEGGY K. ONST

CSJ_0911tools.indd 73 CS0911stuparchannel.indd 1

PUBLISHER

3-2477 phone: (310) 53

bobit.com

nstad@ e-mail: peggy.o

8/23/11 4:43:50 PM 8/17/11 1:45:23 PM


TOOLS OF THE TRADE

ESSENTIAL LIFE SAVING SUPPLIES Panasonic i-Pro SmartHD WV-SC384 1.3M PTZ Panasonic’s new i-PRO network dome camera combines 1.3 megapixel image resolution with extended zoom operation and full-featured pan/tilt/zoom (PTZ) operation. The new i-PRO SmartHD WV-SC384 1.3MP PTZ captures highly detailed images with 720p HD resolution and 288x digital zoom operation along with the ability to multi-stream full-frame 1280x960-pixel images at up to 30 frames per second. In addition, the unit incorporates a host of performance features including on-board face detection. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/19504

5.11 Tactical NFO2 Glove www.campussafetymagazine.com/freeinfo/17161

FREE SHIPPING!* * Some exceptions apply.

Request a catalog today! www.buyEMP.com www.SKHC.com

The 5.11 Tac NFO2 tactical glove provides comfort, dexterity, durability, and protection from flash hazards whether you're writing a ticket or cuffing a bad guy. Features include US-made Nomex flash protection on the wrist and back of hand and fingers, goatskin leather, knuckle reinforcement, patented Tactical Touch precision fit fingertips, and seamless palm construction. Available in black or coyote. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/19505

www.campussafetymagazine.com/freeinfo/19168 74

CAMPUS SAFETY

CSJ_0911tools.indd 74

SEPTEMBER 2011

www.campussafetymagazine.com

8/23/11 4:43:51 PM


ADVERTISER’S INDEX

ADVERTISER’S INDEX Company listings are provided as a courtesy — publisher assumes no responsibility for errors or omissions.

ADVERTISER

PAGE#

American Signal Amistar Automation AVIGILON Blackboard Transact CALEA Campus Safety Campus Safety - 2012 YearBook Campus Safety - Director of the Year Campus Safety - Student/Parent Channel Code Blue Corporation Cooper Notification Designed Security, Inc. DETEX Digital Identification Solutions DSX Access Systems, Inc. EasyLobby, Inc. EMP - School Kids Healthcare EverFocus Electronics Corp. Fike Alarm Systems G4S Gai-Tronics Gamewell -FCI Garrett Metal Detectors

37 41 44 12 54 77,81 23 79 73 19-22 C4 13 69 6 1 63 74 71 58 45 57 17 55

RS#

ADVERTISER

PAGE#

Global Safe Corporation Honeywell Notifier Honeywell Systems Group IPCallCo KABA Access Control Kenwood Communications Lauren Innovations Milestone Systems MYFORCE Panasonic Security Systems Pelco Products, Inc. People ID -IDenticard Systems SALSBURY INDUSTRIES Siemens Industry, Inc. System Sensor Talk-A-Phone Tele-Lite TimeKeeping Systems, Inc. Ultra Electronics -MAGICARD UTC Fire & Security Vicon Industries Video Insight

19100 19195 19155 19062 19146 19024 19187 19076 19104 19079 19001 19005 19168 19095 19193 19088 19020 19162 19028

RS#

78 53 49 36 C2 47 65 61 Bellyband 3 59 43 77 C3 51 7 78 67 39 25 31-34 5

19033 19125 19069 19058 19122 19101 19115 19093 19123 19097 19083 19016 19134 19025 19043 19006 19156 19172 19117 19042

Get Connected to PRODUCTS INCLUDE: UÊ iÌ> UÊ7 ` UÊ* >ÃÌ V UÊ6i Ìi` UÊ ÝÊ-ÌÞ i UÊ ÝÌÀ>Ê7 `i UÊ"«i Ê VViÃÃÊ CSM06-60.11

UÊ `Õ >À UÊ i Ê* iÊ V iÀÃ UÊ-Ì À>}iÊ V iÀÃ

You’ve used them for fun, now let’s get down to business.

UÊ-Ì À>}iÊ- ÕÌ Ã UÊ V iÀÊ i V iÃ

Network with colleagues. Get news as it happens. Find new talent. Reach new buyers.

twitter.com/campussafetymag

facebook.com/campussafetymagazine

campussafetymagazine.com/Linkedin

www.campussafetymagazine.com/freeinfo/19016 SEPTEMBER 2011 CS0911connectqtr.indd 1

CSJ_0911tools.indd 77

CAMPUS SAFETY

77

8/3/11 11:05:14 AM

8/23/11 4:43:52 PM


TOOLS OF THE TRADE

Vicon Surveyor HD P/T/Z Dome Camera

MyForce Campus Interface MyForce is a personal security service students and faculty put on their smartphones. If they sense danger, they can send an alert with the touch of a button. Through the MyForce Campus Interface, MyForce personnel and campus officers hear what’s happening, track the student’s position and send emergency help — allowing campus law enforcement to find them. When students and faculty are outside the jurisdiction of campus law enforcement, the MyForce team notifies the appropriate authorities.

The Surveyor HD by Vicon Industries Inc. of Hauppauge, N.Y., is a 1.3-megapixel dome camera that is equipped with 18x optical zoom and 12x digital zoom. Available in indoor, outdoor, pressurized and maximum-security models, the ONVIF-conformant camera offers 360˚ continuous rotation, a wide range of programmable features, including privacy masking. The camera provides a choice of H.264, MPEG-4 and M-JPEG encoding options, and features a 4.7-84.6mm varifocal lens. Digital noise reduction minimizes video interference and triggering of false alarms, the company says. Need FREEInfo? www.campussafetymagazine.com/ FREEInfo/19507

Need FREEInfo? www.campussafetymagazine.com/FREEInfo/19506

H O S P I TA L R O O M DORM SAFES

• Yale New Haven • Cleveland Clinic • St. Luke’s • Baptist Medical Center • Children’s National • Hospitals...USE OUR SAFES

OVER 100,000 SAFES INSTALLED!

GLOBAL SAFE CORPORATION 1-800-545-4947 • www.hotelsafes.com www.campussafetymagazine.com/freeinfo/19033 78

CAMPUS SAFETY

CSJ_0911tools.indd 78

SEPTEMBER 2011

www.campussafetymagazine.com/freeinfo/19006 www.campussafetymagazine.com

8/23/11 4:43:52 PM

CS0811doy2011.indd 1


D I R E C T O R

O F

T H E

Y E A R

call for entries Do you know a hospital, university or school campus police chief or director of public safety and security who goes above and beyond the call of duty, demonstrating outstanding leadership skills, ingenuity, selflessness and overall achievement? If so, we invite you to submit his or her nomination for the 2011 Campus Safety Director of the Year award. The award winner will receive: • Special editorial coverage and photos in a future issue of Campus Safety magazine • Recognition in the campus safety and security community • A $100 American Express® gift certificate • A custom plaque

ENTRY FORM — 2011 CAMPUS SAFETY DIRECTOR OF THE YEAR Nominee Name:

Nominee Title:

If you are nominating someone else, your name and phone number: Hospital, University or School Campus/District Name: Address: City:

State:

Zip:

Country:

E-mail: Phone:

Fax:

Total Number of Officers:

Sworn:

Non-sworn:

Total Number of Beds (if Hospital):

Size of Campus(es): Number of Students, Faculty & Employees:

Number of Campus Locations: JUDGING: For complete 2011 judging criteria and entry rules, please visit www.CampusSafetyMagazine.com/DirectorOfTheYear NOMINATION SUBMISSION: On a separate sheet of paper, tell us why you or your nominee should be chosen for this award. Please explain how your entry meets or exceeds the judging criteria. Include examples showing why you or the person you are nominating is worthy of this award. ENTRY DEADLINE: Nov. 1, 2011. There is no entry fee. All submissions

become the property of Campus Safety magazine and cannot be returned. Additional entry forms can be downloaded online at www. CampusSafetyMagazine.com/DirectorOfTheYear. ELIGIBILITY: Nominee must have the title of “Campus Police Chief” or “Director of Public Safety & Security”, “Director of Emergency Management” or the equivalent. The campus he or she oversees must be located and operated in the United States or Canada and must be a hospital, university, college, K-12 school or school district.

CSM06-03.11

HOW TO ENTER Complete this entry form and send it with your submitted materials and applicable photos to: 2011 Campus Safety Director of the Year Campus Safety Magazine 3520 Challenger St., Torrance, CA 90503 or, campussafetymagazine@bobit.com or, Fax: (310) 533-2502

Visit www.CampusSafetyMagazine.com/DirectorOfTheYear for complete eligibility rules. Entry deadline is Nov. 1, 2011 CSJ_0911tools.indd 79 CS0811doy2011.indd 1

8/23/11 4:43:55 PM 6/29/11 10:07:05 AM


TOOLS OF THE TRADE

Code Blue IP5000 Full Duplex Emergency Speakerphone The IP5000 full duplex emergency speakerphone technology from Code Blue includes user programming capabilities, reliability, vandal resistance, auxiliary functions, fault monitoring and reporting, and a public address system. It is designed to be compatible with Code Blue’s Blue Alert mass notification system over the wired or wireless network, simplifying installation and existing system retrofitting. Blue Alert allows flexibility in announcement delivery by providing text-tospeech, live broadcast, pre-recorded messages and warning tone options, as well as announcement repeat and scheduling features. Need FREEInfo? www.campussafetymagazine.com/ FREEInfo/19508

System Sensor CO1224TR CO Detector with RealTest System Sensor’s new CO1224TR carbon monoxide (CO) detector with RealTest is available for immediate purchase. The CO1224TR is a round version of the awardwinning System Sensor CO1224T CO detector. The CO1224TR includes RealTest − the first field functional CO test fully compliant with NFPA 720-2009. It also provides multiple mounting options and is quick and easy to install, test and maintain. It has a low current draw, the latest electrochemical sensing cell and a six-year, end-of-life timer. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/19509

IMLCORP and Metis Secure Solutions Indoor/Outdoor Emergency Notification Solution Detex introduces a maximum security, code compliant, alarmed, 3 point dead bolt, panic device. The ECL-230X-TDB has 3 large dead bolts designed for maximum holding force, a photo-luminescent sign, a 100 decibel alarm and a durable ramped end cap. The ECL-230X is simple to install, preventing problems and costly return visits. It is available with an optional Interchangeable Core Cylinder, pre-installed, as well as an optional hardwired kit that powers up to 3 locks.

IMLCORP and Metis Secure Solutions, LLC have integrated their technologies to create a comprehensive emergency notification solution. This solution will enable universities to send and receive warnings with clear voice instructions both indoors and outdoors. With this integrated solution, emergency managers will use the Metis Secure Command Center software to send an emergency warning to Metis Secure alerting devices and/or IMLCORP’s SoundCommander(R) loudspeaker systems. Voice messages can be sent in three ways: pre-recorded messages, text-to-speech and live-voice.

Need FREEInfo? www.campussafetymagazine.com/FREEInfo/19510

Need FREEInfo? www.campussafetymagazine.com/FREEInfo/19511

Detex ECL-230X-TDB Panic Device

80

CAMPUS SAFETY

CSJ_0911tools.indd 80

SEPTEMBER 2011

www.campussafetymagazine.com

8/23/11 4:43:55 PM

CS0411webreportdutyfp.i


REPORTING FOR DUTY You work hard to keep your campus safe and secure.

Here at Campus Safety Magazine, we take our mission to report on school, university and hospital protection issues as seriously as you take your mission to protect our nation’s students, faculty, staff, patients and visitors. Find the latest news and information on security and public safety solutions and trends in Campus Safety Magazine’s newly redesigned print, online and eNewsletter products! In Print: Now published nine times per year, have the magazine sent directly to your office or home. Online: CampusSafetyMagazine.com has a new look and easier navigation that provides you with up-to-the-minute news, trends and technology tips. Features include blogs, video, photo galleries and more.

Sign-up today at CampusSafetyMagazine.com

CSJ_0911tools.indd 81 CS0411webreportdutyfp.indd 2

CSM02-29.11

2 eNewsletters! Campus Safety eNews: This free eNewsletter is delivered to your E-mail inbox each week with the late-breaking current events you need to keep on top of the everchanging campus public safety issues. Hospital Security Update: This brand new eNewsletter focuses on security and public safety issues in the healthcare setting, covering hot topics like Joint Commission accreditation, officer training, infant abduction prevention and more.

8/23/11 4:43:58 PM 3/17/11 1:46:14 PM


TOOLS OF THE TRADE

GAI-Tronics Red Alert Emergency Telelphones GAI-Tronics’ new Red Alert emergency telephones are designed for maximum environmental sustainability, high audio quality, and unparalleled monitoring capability, according to the company. In addition to providing handsfree, two-way communications, the product can report its location, provide call activity reports, activate two peripheral devices (locally or remotely), and let you know when it is experiencing problems. The product’s TMA software application installs on a customer-provided PC and will automatically monitor push buttons, microphone integrity, speaker integrity, line integrity and call connection. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/19512

EasyLobby Visitor Management Integration With Gallagher Access Control Systems EasyLobby has announced a visitor management and access control integration module with Gallagher’s access control systems. The integration module allows customers using Gallagher’s access control systems and EasyLobby’s visitor management solutions to be able to issue different levels of access to visitors, contractors and employees directly from the EasyLobby Secure Visitor Management visitor station. An access control proximity card can be activated from the station for that visitor. When the visitor checks out, the credential is automatically deactivated. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/19513

Kenwood TK-5410 & TK-5910 Portable Radios The TK-5410 and TK-5910 are the newest P25 compatible radios introduced by Kenwood of Suwanee, Ga., specifically for public safety agencies operating in the 700/800 MHz bands. Both incorporate increased memory for future software upgrades and

BlackHawk Taser X-26 Holster The Taser X-26 holster from BlackHawk features a detachable belt loop for easy removal and a multi-position design with a rock-outward draw. The holster is designed to automatically engage the safety when re-holstering while the configuration on the bottom works to block the probes in the event of an accidental activation. The Taser X-26 holster is available in matte, basket weave, or plain finish and can be equipped with a variety of accessories including a cartridge carrier and optional camera unit. Need FREEInfo? www.campussafetymagazine.com/freeinfo/19514

AMBE+2 enhanced full rate CODEC voice digitization technology with improved FEC and noise reduction, the company says. The portables operate in P25 conventional, trunking and analog conventional modes. Need FREEInfo? Use #13409 www.campussafetymagazine. com/FREEInfo/19515

WAVES High Power Speaker Array 7100 Series Cooper Notification has launched its latest wide-area mass notification system (MNS) solution. The WAVES high power speaker array (HPSA) 7100 Series, which provides highly intelligible voice and tone announcements, can be integrated with an organization’s voice-capable fire alarm control panel (FACP) as well as Cooper Notification’s SAFEPATH®4 (SP40S) voice evacuation systems and SAFEPATH mass notification systems (SPMNS), providing a simple upgrade path to expand emergency communications coverage to outdoor areas. Need FREEInfo? www.campussafetymagazine.com/FREEInfo/19516

82

CAMPUS SAFETY

CSJ_0911tools.indd 82

SEPTEMBER 2011

www.campussafetymagazine.com

8/23/11 4:43:59 PM

CS0911classifiedlayout.in


MARKETPLACE

www.campussafetymagazine.com/freeinfo/19200

www.campussafetymagazine.com/freeinfo/19201

REPORTING FOR DUTY You work hard to keep your campus safe and secure.

Here at Campus Safety Magazine, we take our mission to report on school, university and hospital protection issues as seriously as you take your mission to protect our nation’s students, faculty, staff, patients and visitors. Find the latest news and information on security and public safety solutions and trends in Campus Safety Magazine’s newly redesigned print, online and eNewsletter products! In Print: Now published nine times per year, have the magazine sent directly to your office or home. Online: CampusSafetyMagazine.com has a new look and easier navigation that provides you with up-to-the-minute news, trends and technology tips. Features include blogs, video, photo galleries and more. 2 eNewsletters! Campus Safety eNews: This free eNewsletter is delivered to your E-mail inbox each week with the late-breaking current events you need to keep on top of the everchanging campus public safety issues. Hospital Security Update: This brand new eNewsletter focuses on security and public safety issues in the healthcare setting, covering hot topics like Joint Commission accreditation, officer training, infant abduction prevention and more.

Sign-up today at CampusSafetyMagazine.com CS0909steamboat_cls.indd

1 CS0510_plcpro_cls.indd 1

CS0411webhlfhorcls.indd 1

CSJ_0911tools.indd 83 CS0911classifiedlayout.indd 83

4/21/10 10:41:53

4/21/10 11:00:18 AM

SEPTEMBER 2011

4:22:35 PM CAMPUS3/15/11 SAFETY 83

8/23/11 4:44:01 PM 8/11/11 1:18:06 PM


RECESS

WHAT’S RIGHT WITH THIS PICTURE?

THEY SAID IT We should not have to wait until a nurse, doctor, EMT or patient is seriously injured or killed before something is done.

Photo courtesy Safe Havens International

ANSWER:

The principal of this high school in Kokomo, Ind., has selected a variety of thoughtful positions for teachers assigned to supervision duties during class times. This teacher’s position affords him a clear view of three hallways at one time, and the doors behind him are kept locked during the school day. This provides him with line-of-sight supervision of every major hallway in the school for every class period during the school day. The positioning resulted in a significant decrease in student discipline problems.

DID YOU KNOW? About

1 in 12

U.S. children have food allergies.

9.3%

Source: Food Allergy Initiative

of tobacco sold in the United States is sold to minors. That rate is an all-time low.

THE WORLD’S FIRST WEB SITE

was published 20 years ago in Switzerland. Source: CERN, the European Organization for Nuclear Research

Source: Los Angeles Times

I have a friend who grew up in Hawaii who went to school almost every day with tuna fish with gobs of mayonnaise. She never had an ice-pack or a cooler, and she never got sick. A 36-year-old mother in San Jose on a study by the University of Texas finding that the temperatures of 90 percent of the 705 preschooler sack lunches tested had risen to levels considered too high to prevent the growth of bacteria. Source: MSNBC

Source: Substance Abuse and Mental Health S Services Administration

In the summer and fall of 2007,

23% OF WOMEN AND ABOUT 10% OF MEN

Ventura County Medical Center nurse Lorraine Sandoval on the level of violence in hospital emergency rooms. After she was assaulted, she started counting the number of times a colleague was attacked or threatened by patients. Usually, it was once or twice per day.

95%

at Virginia Tech reported experiencing major posttraumatic stress symptoms as a result of the April 2007 mass shooting that took place at the school.

of university housing fires occur in dormitories or dormitory-type residences.

Source: Psychological Trauma: Theory, Research, Practice and Policy

Source: United States Fire Administration

FOR ADDITIONAL COVERAGE OF HEALTHCARE, EDUCATIONAL SAFETY, AND SECURITY TOPICS, VISIT CampusSafetyMagazine.com

Bobit

CAMPUS SAFETY MAGAZINE (ISSN 1066-7039) (CDN IPM#40013413) is published BI-Monthly with an extra issue in November, by Bobit Business Media, 3520 Challenger Street, Torrance, California 90503-1640. Pending Periodicals Postage Paid at Torrance, CA 90503-9998 and Additional Mailing Offices. POSTMASTER: Send address changes to Campus Safety Magazine, P.O.

Business Media Box 1068, Skokie, IL 60076-8068. Please allow 8 to 16 weeks for address changes to take effect. Subscription Prices – United States and Canada $60 per year; Foreign $100 per year. Single copy

price - $10. Please alow 8 to 16 weeks to receive your first issue. Please address Editorial and Advertising correspondence to the Executive Offices at 3520 Challenger Street, Torrance, California 90503-1640. The contents of this publication may not be reproduced either in whole or in part without consent of Bobit Business Media. All statements made, although based on information believed to be reliable and accurate, cannot be guaranteed and no fault or liability can be accepted for error or omission.

84

CAMPUS SAFETY

CSJ_0911recess.indd 84

SEPTEMBER 2011

www.campussafetymagazine.com

8/23/11 4:47:23 PM


s

Sygnal™ mass notification keeps every student within reach. In the stacks or on the quad, ensure your students receive emergency communications no matter where they are. usa.siemens.com/sygnal

Communicating effectively and quickly in an emergency is one of the most critical responsibilities that colleges and universities face. And with students, faculty and staff spread over miles — and many unreachable through web-based alerting to personal devices — the challenge is much greater. To reach them all you need a plan, and the expertise and service necessary to execute it.

:LWK 6\JQDO PDVV QRWLƉ FDWLRQ \RX FDQ OHYHUDJH QHZ DQG existing communication systems to reach people inside, RXWVLGH DQG DW WKHLU VLGH 6\JQDO PDVV QRWLƉ FDWLRQ provides a single point of control by which you can launch several communications simultaneously. The result is maximum contactibility when it matters most. :LWK 6\JQDO PDVV QRWLƉ FDWLRQ \RX UHDOO\ FDQ UHDFK WKHP DOO

Answers for infrastructure. www.campussafetymagazine.com/freeinfo/19134

CSJ_0911recess.indd 993

8/23/11 4:47:26 PM


3RZHU RI 7KUHH 3URYLGLQJ 0XOWL 7LHUHG 0DVV 1RWLĆ‚FDWLRQ Ĺ˜ ,Q EXLOGLQJ 6$)(3$7+ 0DVV 1RWLĆ‚FDWLRQ 6\VWHP 016 8/ FRPSOLDQW Ĺ˜ :LGH $UHD :$9(6 2XWGRRU *LDQW 9RLFH 6\VWHP Ĺ˜ 'LVWULEXWHG 5HFLSLHQW 56$1 7H[W DQG ( PDLO 0HVVDJHV 9RLFH &DOOV 'HVNWRS 1RWLĆ‚FDWLRQ ,Q D FULVLV \RX FDQ GHSHQG RQ &RRSHU 1RWLĆ‚FDWLRQĹ‘V WKUHH SRZHUIXO PXOWL WLHUHG 016 6ROXWLRQV WKDW HQDEOH \RX WR VHQG WKH ULJKW PHVVDJH WR WKH ULJKW SHUVRQ DW H[DFWO\ WKH ULJKW WLPH &DOO \RXU ORFDO VDOHV UHSUHVHQWDWLYH LQ \RXU DUHD RU ORJ RQWR RXU ZHEVLWH IRU PRUH LQIRUPDWLRQ

Cooper NotiďŹ cation is

www.coopernotification.com

www.campussafetymagazine.com/freeinfo/19187

All Cooper logos are valuable trademarks of Cooper Industries in the U.S. and other countries. You are not permitted to use Cooper trademarks without the prior written consent of Cooper Industries.

CSJ_0911recess.indd 994

8/23/11 4:47:26 PM


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.