SAFEVISITOR BLOG
Visitor Management System for Schools
It is unfortunate that our schools are on such high alert that they have to monitor and enhance their security to keep students, teachers, and administrators safe.
School security has become a top concern for all given the prevalence of violence and threats of violence in schools of all grades.
As more tragedies occur, the demand for the most comprehensive and robust school security technology is rising.
Thankfully, technology provides the best solution to manage this challenge effectively through a visitor management system for schools.
Why Technology is the Best Visitor Management System
Though hiring the right, permanent staff is key, visitor management systems also empower accuracy by ensuring the timeliest responsiveness possible and seamless integration with law enforcement.
It is critical to understand the evaluation criteria for school visitor management systems and identify the best ones that fit within your school and district’s culture, as well as within your state’s laws.
A solid school visitor management system ensures thorough and timely assessment of incoming visitors, guests, volunteers, vendors, and temporary employees.
Visitor Management Systems Should Start at the Front Door
The school visitor management system may begin at the front door but permeates the entire building, providing a seamless dashboard that creates full and restricted access levels only to certain areas, while also alerting security and even law enforcement, of who may not be a welcome visitor on the premises.
In order to evaluate the best visitor management system possible, it is paramount that basic components exist including a
video surveillance system,
the ability to produce temporary ID badges, and
perhaps even metal detectors.
A more sophisticated school visitor management system starts at the sign-in process, where registrations should be integrated with national criminal databases and with a background screening system that is preferably a police level background check.
Visitor identity checks should not only include government issued identifications that are scanned, but also
biometric technology for additional authentication that includes fingerprinting,
recognition of palms and faces,
scanners for concealed and exposed weapons, and
reporting.
Visitor Management Systems Should Always Evolve
The most innovative school visitor management technology is always evolving.
Additional elements that include real-time arrest alerts, geofencing, and the ability to alert internal security and law enforcement within seconds, are also key factors to determine how advanced the visitor management system is.
Training staff is also a priority.
Click here for more on visitor management systems for schools
The best visitor management systems for schools are not only software based, but also leverage proprietary hardware that has been created by only a few of the best in the industry.
Finally, working with the right visitor management technology system run by the best, most seasoned and experienced professionals with direct experience in law enforcement, government, security, and the military is also a pivotal differentiator.
Safe Hiring Solutions is founded by a former violent crime detective.
Challenges with Visitor Management Systems
Despite advances in technology, there remain challenges that include:
A lack of awareness that these systems even exist for schools
Varying state laws
Differing challenges and priorities among stakeholders
Budget constraints
School, district & government agency bureaucracy
A lack of infrastructure to support new technology, e.g. legacy systems, processes and procedures that need to be streamlined and even replaced by technology
Visitor Management Systems for Schools
Parents and communities are demanding that school administrators do everything they can to prevent future shootings like the ones in Parkland, Florida, Santa Fe, Texas, and Newtown, CT.
School districts and government agencies often have severe budget constraints prohibiting them from using the most state-of-the-art technology.
In the end, it’s ultimately up to the schools themselves to weigh the pros and cons and intricacy of a visitor management system implementation that will screen visitors and keep people safe.
While visitor management technology is still evolving and is not 100% preventative, it is the best preventative measure available today to keep our schools safe
If there is anything we have learned from these terrible tragedies, it’s that every second counts and visitor management systems are the one solution we have at our fingertips to ensure school safety.
For more on how you can implement visitor management systems for schools, click here.
How to Make Schools Safer With A School Visitor Check-In System
It was a call that no parent wants to get – even a parent who is a seasoned retired policeman who also happens to lead a national safety company. But the call came through.
There was an intruder alert at my son’s school – just two weeks into the new school year. However, much to my relief, it ended up being a “safe” person after-all.
Yet, the alert jarred me. And, to be completely honest, it upset me.
I was mad that my child, as well as all the other students and teachers, had to be frightened and go through lockdown procedures (not knowing immediately that it would end up being a “safe” person).
I was mad about something else too – my son’s school had an old “buzzer” entry system that didn’t even have a camera!
The Lack Of School Visitor Check-In Systems
Out of curiosity, I investigated if any other schools had an intruder alert in this, the beginning of the school year.
I was shocked to see that ALL but five states in our country had either an intruder alert or a threat of school violence in the first two weeks of the new school year!
And, just as troubling, I found out that the majority of public schools in our nation have nothing more than an antiquated “buzzer” entry system – some with a camera and some without.
This is unacceptable in a nation that has the most technologically advanced security systems available in the world.
The Importance Of A School Visitor Check-In System
The fact that a school visitor check-in system is missing in most schools today in our nation is profoundly alarming.
The right visitor management system (VMS) and school visitor check-in system serve as a preventative tool to identify threats of potential danger and violence and to help ensure school security.
In fact, a full-service school visitor check-in system can integrate with student information systems for a primary goal of safety while also streamlining and improving front-office efficiency.
Click here to join us for one of our SafeVisitor weekly demos.
As a 25-year veteran policeman and specialist in violent crime prevention, I started Safe Visitor Solutions to create SAFE PUBLIC SPACES – especially ensuring that our schools would have the best security systems that technology and experience could provide.
How School Visitor Check-In Systems Work
While our political parties argue about how to keep our schools safe, my company continues to encourage school administrations to make sure they have prioritized the safety of their students, teachers, and staff by replacing antiquated entry systems to school check-in kiosks that are:
Reducing unexpected/unknown visitors
Providing a comprehensive background check/screening process and system.
Initiating pre-registration for low-risk visitors for conducting business meetings.
Instituting geofencing
Excluding parties
Conducting national sex offender searches
Deploying school check-in kiosks with a scanner
We must all work together to keep our schools, our children, our teachers, and our very system of education safe and secure.
If you would like to learn more about how to use a visitor management system, like a school visitor check-in system, join us for one of our SafeVisitor weekly demos or set up a personal demo.
What is Best Visitor Management System for Schools?
Are you looking for the best visitor management system for schools? These days, there are no shortages of school security vendors and navigating the marketing can be time consuming and frustrating. So it is important to understand what you are looking for in a visitor management system because not all of them are the same.
The first question you must answer is if the visitor management system is a simple tool to replace the notepad and pen at the front desk or the foundation of your school security plan?
If it is the former, there are numerous simple visitor software programs that will log your visitors, print a temporary badge and convert your process to an electronic process. That is not what we are discussing here. We are focused on schools who are looking for a comprehensive school visitor management system to serve as the foundation or hub of your school security plan.
You will notice that being the first visitor management system in the market is not on the list. I spent 10 years in law enforcement and the model was to promote people who had the most seniority. That was a dysfunctional leadership model.
I was part of a team that created the largest law enforcement-based domestic violence unit in the U.S. in 1994. And the average seniority of the 33 detectives was 5 years. We recruited young, hungry, investigators that were not caught up in we-have-always-done-it-this-way but thought outside the box and were solutions driven.
Results: we dropped the domestic murder rate in Nashville by more than 50%!
What do you need in a complex visitor management system?
Security-Focused Leadership. Almost daily, we are vetting security companies and products for our 7,000+ clients. The first page I ALWAYS go to is the About Us. Who is the leadership team? If I do not find anyone who has security or law enforcement experience I never look at another page. You need technologists but understanding how to develop software is not security.
Cloud-Based. The cloud is important because it integrates your locations or campuses, allows data to be shared like approved visitors, volunteers and vendors or excluded parties. It also makes the management of the system simple for your IT department.
Configurable. Is the visitor management system a one-size-fits-all or customizable? The VMS should allow you to make the system work according to your policies and business rules.
Integrations.
Background Checks. If this is the foundation of your security program, then you need access to more than a low level sex offender search. Understand that background screening is complex and there are federal, state and local laws that regulated how background screening is conducted. Yes, even for volunteers. A complex VMS will have integrations to:
National, state and local criminal record systems.
Motor vehicle records
Reference checks
Student Information Systems. Sync data like students arriving late or leaving early with your SIS. Make sure approved or excluded party information is synced. Removes labor from your front office team.
Access Control Systems. Manage current employees and share data with your access control system utilizing your Excluded Parties List and leveraging your security cameras, etc.
Crisis Alert Systems. Ensure that your emergencies are managed by your crisis alert system by a simple integration that allows your VMS to pass this communication over and manage escalated events.
Reunification. In a crisis event, make sure you can match students with approved guardians or parents and account for all visitors on premise.
Customer Service. I have yet to speak to a company who does not claim to have great customer service. However, these days, customer service is a dying service. Technology can certainly help answer questions. However, great customer service starts with a senior member of the leadership team who leads a customer service team and offers multiple avenues of communicating:
Direct dial numbers
Direct email
Support ticket systems
Live chat
Monthly online meetings/ webinars that provide tips and tricks to expand the use of the VMS.
If you would like to learn more about how a visitor management system can work, join a weekly SafeVisitor demo or schedule a 1:1 demo.
School Visitor Management Systems Are The Foundation for Security
There are no shortages of security products and services being peddled to schools. And more security experts popping up every day.
We spend an enormous amount of time and energy vetting the best security solutions on the market. We do this to help our thousands of school clients. They need trusted partners to help them navigate a less than transparent market.
But that is an article for a different today.
Last week, we witnessed numerous incidents across the U.S., and one in my backyard where my kids go to school, of individuals breaching security. And quite honestly, the solution was not spending hundreds of thousands of dollars to fortify the building.
No matter how fortified you make the school, which I would argue, is not and should not be your one and only solutions for school security, you still have to open the door throughout the day to allow in students, staff, visitors, volunteers and contractors.
A comprehensive school visitor management system is the foundation for security. You cannot purchase bullet resistant glass or film, metal detectors, or secured vestibules if you have no access control system in place.
Schools are not the mall. Not everybody that wants to come in should be allowed in.
Until you manage the flow of visitors, contractors, volunteers or community partners walking through your doors, all of the other hardening solutions are irrelevant.
If you build a secure vestibule, but have no line of sight and only an aiphone and a buzzer, then you are going to lose. How do I know? Because it happened at a school my kids attend last week.
A student came to the front doors, which were locked, and used the buzzer system to alert the front office and get cleared to enter because the office is not near the entry-way. Unknown to the front office team, who does not have cameras at this time, a 22 year old was behind the student and was able to gain entry into the school.
The trespasser was in the building for several periods, with a backpack, and was found in a bathroom by a school resource officer. Intent is yet unknown.
The lesson is that people do want into our schools. And some of those that want access should not have access. Sex offenders, especially predatory sex offenders, will stop at nothing to gain access to our kids.
What if that had been an estranged spouse, coming to school because he knew his estranged partner would be there. Because they have to work, they need to make money. Sounds like the school murder in San Bernardino several years ago where the teacher, estranged partner, was killed in her classroom along with another student.
Controlling access is critical. The school visitor management system is the foundation for a security program. The visitor management system should:
Require government issued ID for temporary visitors and scan their barcode
Check of national sex offender and Excluded Parties
Integrated background checks for high frequency visitors such as volunteers and/or contractors.
Integration with a student information system to sync who is approved to pick up a student.
Sophisticated ID validation process to confirm who every visitor is.
If schools are not managing the flow of people in and out of their buildings then everything else is for naught.
Visitor Management Software: Security Technology Removes Stress
Students have always faced stress in school.
Making friends, trying to fit in, coming to terms with who they are, taking tests, all of this is creating significant stress to students.
And now we add the fear violence at school.
Yes, as a former violent crime detective and father of five children in K-12 and college, I balance having realistic conversations with my kids and at the same time providing comfort. Situational awareness and preparedness can reduce stress.
However, much of the public discussion about school violence running non-stop on TV or online news feeds is full of doom and despair. Fear sells products and there is no shortage of shark security vendors peddling fear to parents and schools all in the name of earning a dollar.
Many of our political leaders, both sides of the aisles, do not understand violence prevention any more than most parents. Yet they parade in front of microphones daily, espousing theories, many to grab headlines but will do little to move the safety needle in the right direction.
The added stress of feeling safe
Just two weeks into the new school year, most students across the nation have already practiced a “lockdown” drill which includes turning off the lights, locking the classroom door, covering the windows, and crouching down near the windows or under desks.
This week, I have seen communication with parents to let them know about upcoming active shooter drills and reunification. Asking for their help in the reunification drill, to have a live simulation. All good.
However, I quickly learned in the communication where the schools reunification site was located. Understanding that most school shootings involved students, are we playing our cards? Should our reunification site be another school location? Yes or no. Not easy questions to answer. Some would say yes, that it creates smoother reunification process. Some on our team who have served on presidential security details would say no.
Why? What if it is a coordinate attack? Can you envision students acting in concert to pull off an active shooter event? Columbine?
We need to be cautious about how much information we share. Should we use a “practice” reunification site that does not give away our strategy? At a minimum, we should have a primary and secondary location for reunification.
There is no doubt that school safety is a prominent concern – and it should be. Though it is good to prepare students for what to do in an emergency, it is also imperative that schools utilize the latest safety technology to help secure their buildings and bring some peace of mind to their staff, educators, and students.
Make no mistake, security technology in schools is a key factor for our nation’s schools in helping to prevent tragedies like Newtown, Parkland, Santa Fe, and so many others from happening at all – or at least reducing the number of tragedies and threats of violence from occurring on a daily basis.
Click here to learn more about how technology can mitigate risk at school.
Too many of our nation’s schools are still vulnerable to intruders due to easy access to the building.
School safety is much more complex than active shooter. I get headlines multiple times a day with school volunteers or employees that have molested, seduced or sexually abused a student.
Knowing who you are allowing in your buildings is the foundation of a security program.
Security Technology in Schools
Every school in our nation should have security technology in schools, like a Visitor Management System (VMS) which can:
Having defined access controls based on the type of visitor.
Integrated background checks that can be defined by the type of visitor.
Have the capability to manage excluded parties and flag them if they try to enter.
Must be cloud-based, as well as work on cellular or separate WiFi networks (school networks are often blocked during an event).
Integrate with student information systems and check-in kiosk for scan-in/scan-out and authentication verification for government ID’s
Offer continuous background checks and arrest-alerts in real-time for Volunteers and Employees so if they are arrested for a prohibitive crime you will be notified in real time..
Offer geofencing capabilities to set parameters that control access.
Expedite getting students to parents/guardians quickly and ensure their release to no one other than parents/guardians.
Emergency/Denial notification buttons
Integrations with crisis management systems to create a 360 security solution.
What is Visitor Management System?
Have you asked yourself what visitor management system should we adopt? There are numerous companies who have developed visitor software systems and some are very simplistic and some are very complex. So making an informed decision takes a bit more than perusing their websites.
Let’s start with asking a simple question: Will the visitor management system be the foundation of your security program? Or will it be a tool to relieve pressure off of the front desk and let visitors checking themselves? Like at a doctor’s office?
That is two distinctly different use cases. The former is risk mitigation and the latter is efficiency.
If you are looking for a security system then keep reading. Here are a list of features you should require of a visitor management system:
Cloud-based. Critical for organizations that have multiple points of entry or locations and need to integrate their campuses. Cloud-based systems also make it easier to deploy and maintain. Your IT team does not need to do anything when new updates are rolled out. And administrators can access data from anywhere in the world they have internet access.
Background Checks. Most visitor systems have some type of background check. Keep in mind there is no standard definition of a background check and very few visitor management companies understand the complexity of comprehensive background checks and the federal, state and local regulations that dictate disclosures, authorizations, reporting restrictions and handling of adverse information. Background screening and FCRA violations are a growing field of litigation.
Real-Time Background Checks. Background checks are historical documents the minute they are completed. Yes, they are critical to your onboarding process but they have limitations. Would it be important to know that an approved vendor had an employee arrested for rape? Or that one of your drivers was arrested for DUI on Saturday night? Real-time ArrestAlerts are critical.
ID Validation. This is the foundation of a security-focused visitor management system. How do you identify your visitors, volunteers, contractors etc.? Self reporting is not ID validation. Properly identifying frequent visitors is complex and involves parsing government issued ID’s, using biometrics and other investigative integrations to validate.
Regulations. Do you have industry specific regulations and the need to check against international watch-lists or healthcare sanctions lists? Are certain parties excluded from your campuses?
Applications. There is a distinction between a simple data form and a configurable online application that can trigger specific business requirements such as notifying a team member to sponsor and approve an application. Do you need different applications for different classifications of visitors like vendors, volunteers, temporary workers, etc? Not all visitors are the same and you should be able to create different levels of applications, screening and access control.
GeoFencing. Approved, high frequency visitors can use a mobile app that will request entry to approved buildings as they approach the facility and cross the geofence.
Integrations. Is the visitor system trying to be everything for everybody. A complex visitor system understands their expertise and stays with in their lanes. They look to partners who are best in their lanes to integrate with:
Access Control
Crisis Alert Systems
Emergency Communication
Student Information Systems
Reunification Systems
Leaders That Understand Security. Software companies need developers who understand how to code and develop products and services. But it takes visionary leaders who have decades of real-world security experience to develop the road map.
Would you like to learn more about a visitor management system with no strings attached?
Register for a weekly SafeVisitor Demo
Or
What Should a Visitor Management System for Schools Do?
How to define what a good visitor management system for schools should do is much like defining what a good volunteer background check should be. For fifteen years, I have owned Safe Hiring Solutions and we conduct hundreds of thousands of background checks annually.
And for 15 years I have heard from volunteer organizations that we are conducting a “national background check.” Please define that, I always say. Invariably, the answer will be all over the board from a cheap, instant database search (that is not a background check- there is no such thing as an instant, single source background check) to comprehensive multi-level searches that include multiple checks and balances.
A visitor management system for schools is no different. There are many visitor management systems on the market today. And I guess the most important question is what do you want it to do for your schools?
There are really two distinct camps that schools fall into when deciding on a visitor management system:
Convenience; or
Security
That seems odd but over and over we see schools evaluating SafeVisitor include front office personnel. Almost always there is an immediate fear of how the visitor system will complicate their already busy job.
That is why we have seen an uptick in the number of visitor management software systems that built for speed but have nothing in the process to ensure the visitor is who they say they are and safe.
Security is inconvenient. And successful schools are focused on security.
However, a visitor management system for schools can be both a great security system and provide efficiencies and convenience for schools.
What should you be looking for?
Who are the leaders of the company? There are so many security vendors popping up these days that it serves your well to do your due diligence. That is the former detective in me coming out. As well as the CEO of one of the fastest growing background screening companies in the U.S. Do you entrust the security of your school to a company of software developers or former security professionals?
Cloud-based. Cloud-based systems are the norm these days. But it is not about being the “new” thing that makes this important for a visitor management system. The cloud allows you to connect campuses, share information including high frequency visitors like volunteers AND excluded parties that are not allowed on the campus. Plus, the cloud allows for software updates that require no labor on your part.
Integrated partners. Many visitor management systems for schools are trying to do all things security. Vision and long term thinking and development are critical. However, a great VMS will know there lane and stay in it and find the best of the best security partners to integrate with.
Limit exposing PII of visitors. A comprehensive VMS will not require the use of your government ID every time you enter a building as a frequent visitor and expose your personal information to security or front office employees. ID validation should be a core feature of the onboarding process which allows for the use of a VMS ID or biometrics.
Push visitors further from the front door. A company led by security experts understands that security does not start at the front desk. The best visitor management systems will have this as a core foundation and use a myriad of solutions from geofencing, kiosks, access control integrations and pre-registration.
Background checks. Every visitor management system purports to do some level of background check. Most are doing a low level sex offender search. Some are doing a cheap national database search. Background checks are more complex than a cheap database. There are compliance issues. And you need to understand that in many states a sex offender is not required to register for life. Some levels of sex offenders are not required to register at all. And the cheap database searches are not a background screening program. Many states limit the data they provide.
These are just a few of the musts when selecting a visitor management system for schools.
To learn more:
Or
https://calendly.com/safevisitor-demo
Use and Misuse of Facial Recognition Software
There is a growing tide of public discussion on the use and misuse of facial recognition software. Much of the negative perception is driven by countries like China using the technology to surveil and monitor their citizens at all times.
There is a big distinction between using facial recognition on citizens to know where they are and what they are doing without their permission and with permission to validate and expedite access.
Recently, facial recognition software has taken a beating for mis-identifying people as criminals who in fact were not. And this surveillance approach has uncovered a higher failure rate with minorities which is troubling.
What are the causes of misidentification? There are a myriad of things that can cause misidentification. First, it is critical that the software have a good baseline photo from which to compare. But this alone does not always equate to a high percentage match.
Where are you gathering the comparison photo? From a camera system? Can it convert the video to still images at a high quality? Does the individual have anything, intentionally or unintentionally, to avoid detection like sunglasses, facial hair, hats or simply a poor angle that can diminish the comparison photo.
We could spend forever debating facial recognition software and its use for law enforcement and intelligence agencies. However, facial recognition has a great applicability to creating a safe workplace. This is a much different application for facial recognition.
SafeVisitor will use facial recognition after a person has been ID validated to allow them quicker access to an organization. Some of our larger schools have as many as 50,000 volunteers. Knowing with 100% accuracy who is entering your facility is critical
The days of having visitors, volunteers, contractors or visiting employees sign a guest book and receive access to your building should be over. Even visitor management systems that do not include ID validation, background checks, but issue an ID card run the risk of allowing someone in the building that should not be allowed in. How do I know the person scanning the card is who they say they are?
Using ID validation, background checks and then adding a biometric such as facial recognition allows us to create a Safevisitor fast pass. This is not surveillance. This is stepping up to a kiosk, scanning my SafeVisitor ID, standing in front of the camera and doing a quick comparison to verify identity. Two factor identification. Print your ID, door opens and off you go.
Facial recognition software provides convenience. Just like TSA is looking to deploy in airports.
Facial recognition software is not new. Many of you use it on your phone to recognize you and unlock it.
Any new technology can be used in a positive or negative way.
If you would like to learn how facial recognition could be used as part of a visitor management system, we offer a couple opportunities for a demo:
SafeVisitor Weekly Demo Thursdays, 2PM EST
Or
Register Your Team for a 1:1 Demo
Visitor Management Kiosk
A visitor management system is the first step for an organization when implementing a security program. If you do not know who is entering through your doors then all other security systems are ineffective.
Many schools and organizations are looking for a visitor management kiosk. What better way to manage the flow of lots of visitors?
However, it is not so simple as to do a quick internet search and find a company that has a kiosk option. There are a few security foundations that must be understood:
Not everyone views security through the same lens. Often front office personnel are multi-taskers and they view a kiosk as taking something off of their plate. This is absolutely true. But it must done correctly. Removing eyes from the check-in process without having an ID Validation in place is risky.
Security is not convenient. Have you flown recently? Have you gone to a concert or professional sporting event? Need I say more?
Not all visitor management systems are security focused. A lot of the visitor systems are more about convenience and allowing visitors to self-provision and check themselves in. That may be great if you are an eye doctor. However, in a controlled environment like a school, I need to know you are who you say you are.
A security kiosk will be placed in a vestibule or in a secured area. A great security program will always be moving the identification further and further from your front doors. If the first interaction you have with a visitor is a human at a desk then that can be:
Dangerous. If the person is there with intent on harming someone.
Awkward. If the person checking in is on an Excluded Parties List or Sex Offender.
What should I be looking for in a visitor management kiosk?
ADA compliance. You should first make sure you understand ADA compliance.
How does the visitor management kiosk validate visitors?
Does it scan government issued ID? At a minimum a quality visitor system will scan government issued ID’s.
How do you handle frequent visitors? If you are an organization that utilizes vendors or volunteers there should be a validation process that begins long before they reach your front door.
Background checks. A comprehensive background check is the foundation of a quality background check. There is no such thing as an instant background check.
ID Validation. Do you allow vendors or volunteers to self report who they are? We can use the government issued ID, require a scan of the front and back, parse the 2d barcode and can even pull the photo, require a selfie and do a comparison.
2 Factor ID. Allowing a visitor to manually enter their information defeats the purpose of a visitor management system. Even scanning a government issued ID or an issued ID card is not fool proof if you don’t verify the ID scanned is the person in front of the kiosk. To completely authenticate the visitor, the use of facial recog
nition or a palm vein reader at the kiosk the matches against the face or pam print on file is the best method of ensuring the person entering is the approved person.
So, not all visitor management kiosks are the same. Determine if you are looking to enhance your security or if you are looking for a convenient way of getting people in and out of your organization.
If you would like a demo of SafeVisitor, one of the most comprehensive visitor management systems with multiple kiosk options, please select one of the following to register:
Or
Visitor Management System for Schools
There is no shortage of security vendors coming out of the woods these days, peddling products that range from bullet-proof back packs to multi-million dollar school building hardware upgrades to be designated the safest school in America. Of course the designation was made by the security company installing the system.
We hear daily from schools all across the U.S. that they have vendor fatigue. Most of what they are been peppered with are products that do not move the safety needle and will do little to keep schools safe.
Many times we can bring a team of experts together for a simple school walk through with your administration, SRO’s, school safety specialists and principals and pinpoint dozens of items that cost nothing or very little to fix. I told a school this week that until they had locks on doors, controll who had access to their schools and address the side and rear doors that are either unlocked or propped open that it made no sense to spend tens of thousands of dollars on sophisticated security systems.
The first step is to start with a visitor management system for schools that manages the flow of all visitors. Until you know who is entering your schools, all other security systems are rendered useless.
It is also to keep a broad definition of school safety. Too often these days school safety has become synonymous with active shooter response. Truthfully, even after a week where we had active shooter events at the Southaven Walmart, El Paso Walmart and Dayton, OH, active shooter events in schools are still statistically very low. That does NOT mean we should not be developing security plans and procedures.
However, it is statistically more likely that a child will be sexually exploited at school. So knowing who walks through your doors is critical.
What should you look for in a visitor management system for schools?
Is it cloud-based so it connects the entire campus?
Can it flag excluded parties who have posed a danger to the school?
Does it integrate with other security systems to create an integrated solution?
Does it allow you to create comprehensive and specific screening packages for your different visitors (volunteers, contractors, community partners, etc)?
Does it integrate with your student information system like Skyward, PowerSchool, Infinite Campus?
Do you have real-time arrest monitoring?
If your answer was no to any or these questions or you don’t know and would like a demo, please click here to setup a 1:1 demo or register for our weekly group SafeVisitor demo.
Preventing “road rage” in your parking lot
It was an unusually busy day at a crowded New Jersey mall when a woman spotted an open parking space after circling the lot for the better part of a half-hour. As she stepped out of her car, another woman assaulted her, accusing the first woman of stealing her space. In the ensuing melee, the second woman nearly bit through the first woman’s finger.
We may chuckle at outrageous stories like this and laugh at social media videos that capture what happens when parking lot disputes escalate into battles. But is it funny when those things take place in one of your parking lots?
Have you ever stood near the exit of a church parking lot as a packed Sunday service lets out? The attendees may have been bathed with goodwill minutes earlier, but in the scramble to get to lunch, soccer practice, or in front of the TV before kickoff, they transform into combatants in a winner-takes-all contest to be the first out of the lot. The same people who were wishing each other peace moments ago snarl, snap, and yell.
The same thing happens in workplaces when everyone leaves, and in the parent pick-up lanes at schools. Beyond the impact of escalating tempers, there’s also the potential for vehicle accidents, damage to the lot itself, and worst of all, pedestrians who are injured when they go unnoticed by drivers focused on making an escape. It’s also a problem when everyone competes for prime parking spaces at the start of the day or at crowded events.
Psychologists who have studied parking lot road rage liken it to territorial disputes that are compounded by the anonymity many people feel while they’re behind the wheel. They’re centered on achieving an objective -- whether that’s finding a space or getting out quickly -- and when another driver interferes or delays them, they respond as though they’ve been threatened. If they misbehave, nobody will hold them accountable.
Studies suggest those territorial disputes result in power struggles. Ever feel pressured to get out of a parking space so an impatient driver can move in? Penn State researchers discovered that when someone else was waiting for their space, drivers actually took more time to leave the space -- eleven seconds more, on average. And if the impatient driver honked? The departing drivers took even longer to leave. It’s a kind of “I’ll show you” mentality that often leads to yelling, obscene gestures, scratched paint and other vandalism, and the occasional bitten finger.
Fortunately, there are steps you can take to reduce the level of anger in your parking lots. It begins with how your lot is designed and marked. Creating clear paths for entering, exiting, and moving around the lot can help. Placing highly visible signs, such as Stop, Yield, and One Way signs, can minimize the potential for simple misunderstandings that all too easily escalate into pitched battles. If your facility is located on a busy street and drivers waiting to make left turns create delays, you may even want to reconfigure the exits so drivers can only turn right.
It’s also important to protect pedestrian traffic in your lot, because the more vehicles and pedestrians interact, the greater the potential for injury. Clearly marked walkways and crossways with signage giving pedestrians the right of way can help, as can strategically placed refuge areas or islands where pedestrians can wait safely for a break in the traffic flow.
You can also designate employees or volunteers to stand in key locations and direct traffic to ensure everyone has a fair shot at heading out as quickly as reasonably possible. Be sure to give them reflective safety vests, and encourage them to smile and be friendly, because their attitude can create an example for the drivers and defuse short tempers caused by impatience. A little bit of extra attention to your parking lots can go a long way to ensuring the safety of those who visit your facilities … and might just make them be a little nicer to one another.
Developing a plan for reunification after emergencies
Most companies, schools, and religious facilities have developed plans for evacuation in the event of a fire or other type of emergency. But getting people out of a building is only part of the plan. You also need to give serious thought to where all those people are going to go, as well as what their next steps will be.
First, you need to make sure everyone is in a safe location and that their presence won’t interfere with the response. As first responders arrive at the scene, they shouldn’t have to fight their way through a crowd of evacuees. The best strategy is to designate a reunification site for each emergency exit. The site should be close enough for evacuees to reach it quickly, but far enough so they’re not blocking responders and are safe from additional hazards. It should be large enough to house the largest potential group of people who would use that exit. Don’t forget to consider the needs of people who have limited mobility.
You also need to have alternate reunification sites in case the normal site becomes unsafe. For example, if everyone is fleeing an active shooter, they should not be brought to a site which would be within the shooter’s range. If those alternate sites are at a distance, you may need to consider how occupants would be transported. Again, people with limited mobility may require additional planning.
Some facilities create what’s often called a “go” kit that’s placed near the emergency exits. Items in the kit may include diagrams of evacuation sites, signage to help evacuees find their way, flashlights and extra batteries, basic first aid kits, paper and pencils, as well as other material that may be needed.
As you develop your plan, be careful about depending too heavily on electronics for storing information or communicating. If the power fails during your incident, computer apps and cloud-based documents may be inaccessible.
Although you may prefer that the incident not be publicized until you have regained complete control of the scene, in an era of cell phones and social media, you probably won’t have that luxury. It’s likely that parents and other family members may panic and rush to the scene, particularly if your facility is a school or other organization occupied by young people.
If your site is likely to be visited by parents or family members who intend to pick people up, your plan should also address that process. You’re responsible for maintaining custody of children and others during the incident, and for verifying that they leave with the right people. One effective approach is to have parents and legal guardians arrive at designated locations that are away from where the evacuees are waiting. Once your personnel review their identification and verify that they are authorized to pick up evacuees, a runner heads to the reunification area to bring those evacuees to the pick-up site, at which point their parent or guardian can leave with them. Keep clear and accurate records of this process in case questions arise, such as if one parent arrives after the other has picked up the children.
If there might be a delay in reuniting evacuees with their family members, you may also need to consider whether you’ll need to arrange for temporary restroom facilities for both groups.
It’s important to maintain up-to-date contact information for parents and guardians, and to have an effective process for notifying them in emergency situations, whether that’s a phone call, a text message, or some other channel. Keep your notifications brief, with only the most important information. An example would be, “We have evacuated the school and students may be picked up at LOCATION starting at TIME. Be sure to bring your identification.”
Finally, while nobody likes to think about tragedies, your plan should include a protocol for informing family members about injuries or deaths. Ideally, those conversations should take place in a separate and quiet area.
Anonymous reporting systems enhance safety
Nearly every violent incident at a school, a workplace, or a public setting is followed by media coverage in which people point to obvious warning signs that had been ignored. It may have been a student shooter’s obsession with weaponry, a co-worker’s muttered threats, a mass killer’s propensity for harming animals … in each case, there’s something the after-the-fact experts tell us we should have noticed that maybe, just maybe would have prevented the violence.
Assume we had taken note of the behavior in question. What were we supposed to do with our observations and suspicions?
For a long time, society has trained us to keep our mouths shut. As children, we’re told not to be “tattletales,” and as adolescents, “telling on someone” can result in our incurring the wrath of a bully. In the adult world, the idea of sharing information is often considered to be “ratting” on someone and “whistleblowers” are typically isolated by others around them.
After 9/11 and incidents such as the Columbine and Sandy Hook school shootings, that attitude started to shift. Law enforcement and other authorities have shared the message that when we see something that makes us uneasy, we need to say something about it. If a student is making violent threats on social media, we need to alert the school’s principal. If a co-worker makes angry comments about the manager and audibly fantasizes about shooting her, we need to tell someone who can investigate.
It makes sense, but again we go back to the question: what are we supposed to do with our observations and suspicions? We don’t want to be perceived as a tattletale or rat, nor do we want to become the target of someone who’s unstable just because we shared our concerns about that individual and his or her behavior.
That’s where the value of some type of reporting system that allows people to make reports either anonymously or with the confidence that their names will be kept secret. People are far more likely to call attention to dangerous situations if they don’t fear any personal backlash.
Such a system doesn’t have to be limited to threats or criminal activities, and one of the most successful examples exists in the aviation industry. Some years back, industry and government leaders collaborated to create the Aviation Safety Reporting System (ASRS), which provides a way for pilots, service technicians, air traffic controllers, and others to self-report near-misses, mistakes, and other problems without fear of penalty or retribution. The goal of systems like ASRS is to gather information that can identify underlying problems and educate others, so they don’t make the same mistakes. Reporting systems can also be put into place for issues such as fraud, sexual harassment, and compliance issues.
Many school districts are now using the Say Something Anonymous Reporting System that was developed by the violence prevention organization known as Sandy Hook Promise. The system gives students and adults a way to alert school administrators to potentially dangerous situations, so they can investigate and intervene as necessary.
Creating an effecting voluntary reporting program includes several considerations. First, you need a clear scope and straightforward process. How will reporting take place? Who will receive those reports? Ideally, the person or people you select to play that role should be well-known and respected leaders who have demonstrated professional maturity.
Your process should also spell out exactly what that person is expected to do with the information and how quickly they should take action. That’s especially important when you receive a report of something such as suicidal ideation, in which delays are unacceptable. How will reports and follow-up be documented? You also don’t want to establish a process that circumvents or undermines established authorities such as law enforcement or school administrators, or that puts your organization at risk for violating laws. As an example, some states require immediate reporting of suspected child abuse, so your process can’t sidestep that.
Most of all, you must protect the confidentiality of people making reports. There’s no room for error -- a single breach of that confidentiality will destroy any trust people have placed in the system and ensure that nobody will make any reports.
Someone phoned in a bomb threat. Now what?
It’s an ordinary day, and the person at your front desk smiles as she chats with a co-worker. The phone rings, and her smile remains as she greets the caller, only to hear a nervous voice tell her there is a bomb in your building and everyone had better get out before it explodes.
What’s the next step? If you’ve been proactive, you’ve already developed a plan for this situation and trained the people who answer your phones about what they should do. If you don’t have a plan, the response is likely to be a panicked evacuation.
Bomb threats are some of the most disruptive situations a school, church, business, or other facility is likely to encounter. While the overwhelming majority of such threats turns out to be pranks, the potential damage from an actual explosive device is so significant that experts recommend the threats be taken seriously.
According to the U.S. Bomb Data Center, the federal agency responsible for tracking bomb- and arson-related incidents, there were 1,536 bomb threats reported in 2016. Of those, 529 were made to schools and 254 to businesses. The agency reported that there’s been a 33 percent increase in bomb threats to schools since 2014. Students know a bomb threat will be taken seriously and bring classes to a temporary halt, so whether someone has a gripe with the administration or really isn’t ready for that Algebra test, a threat -- whether it’s phoned in or takes the form of a note in a restroom or a comment on social media -- seems to be an effective way to cause trouble.
The Department of Homeland Security (DHS) cautions that every bomb threat is unique and has to be considered in light of the nature of the facility and who uses it. They note that law enforcement officials and facility managers are usually in the best position to determine whether the threat is credible and how to act.
If your facilities don’t have a plan for dealing with this type of threat, it’s a good idea to develop one and share it with those who are most likely to receive the threat and those who will have to make decisions. It’s also wise to obtain the advice of local law enforcement agencies so your plan is consistent with their procedures. You can find information about developing a plan at the DHS website, and many organizations have posted their plans online. A quick Google search can provide a great starting point.
Generally, the first step in a response is to remain calm and notify the authorities immediately. With phoned threats, DHS encourages people to stay on the line with the caller as long as possible while someone else makes the notification. Be polite and engage the caller by asking questions about the specific location of the device, when it is supposed to detonate, how it looks, and what type of explosive it contains. If the caller is willing to talk, ask whether he or she placed the bomb and why he or she did it. More information makes it easier for law enforcement to make the right response. The person taking the information should not hang up the phone even if the caller does, because it may be possible to determine where the call came from.
If the people responsible for decisions about evacuation determine that’s the right course of action, evacuate calmly and carefully. If your facility conducts regular fire drills, sounding a fire alarm is an effective way to get everyone out of the building.
A similar issue is what to do if someone discovers a suspicious item in your facility, such as an unusual bag or package that appears to be out of place. Here again, you should have a policy that spells out procedures to follow. Not every item is suspicious -- for example, people accidentally walk away from backpacks and purses all the time. On the other hand, if it appears someone tried to hide the object, if it has a strange smell or odd sounds coming from it, or if it’s in an unusual place, there may be reason to be concerned. People who leave bombs or other hazardous materials tend to put them in locations where they can do damage to people and important assets.
If you do find a suspicious item, DHS recommends that you remain calm and refrain from touching or moving it. Follow your organization’s procedure, whether that involves contacting a facility manager or placing a call to law enforcement, and follow their instructions. If you can’t reach someone and are convinced that there’s an immediate danger, calmly evacuate the area. Moving farther away from an explosive device generally is the safest course of action.
How should you deal with concealed carry?
Few topics have created more discussion in recent months than gun violence. A couple decades ago, few school administrators, church leaders, and business managers gave thought to the possibility of a violent incident occurring in their facilities. While it’s not entirely clear whether the number of incidents has increased, the media (and social media) attention given to those incidents has stoked a great deal of fear.
Many gun owners have reacted to this perception of a growing threat by choosing to keep their weapons with them when they’re away from home. They believe carrying a concealed handgun gives them an opportunity to protect themselves and those around them; that a “good guy” with a gun is the best protection against a “bad guy” with a gun. That’s a politically charged discussion we won’t explore here.
What is important to address is how you and the facilities you oversee deal with the growing number of people who carry concealed weapons. The Crime Prevention Research Center recently estimated that more than 17 million concealed handgun permits have been issued in the U.S., which represents a 273 percent increase since 2007. That means just over 7 percent of American adults now have concealed carry permits -- and that doesn’t include gun owners in the 14 states that don’t require such permits. Roughly a third of Americans have at least one firearm in their home.
If the adults who use your facilities are representative of those statistics, that means roughly one in thirteen visitors walks in with a concealed weapon. That number doesn’t include those who carry for other reasons, such as off-duty law enforcement officers. So if you have 500 adults at a basketball game, a Sunday morning service, or the second shift, you may have about 38 people who are armed without your knowledge.
Knowing there are attendees who have taken it upon themselves to be ready to protect others if the unthinkable happens may give you some comfort. Or it may cause you heartburn, wondering if a poorly trained gun owner could escalate a dangerous situation and create a legal liability.
Some states allow property owners to designate “gun-free” zones and deny admittance to those carrying weapons. Other states take different approaches. For example, in our home state of Indiana, property owners can ask those carrying a concealed weapon to leave. Those who fail to do so may be charged with criminal trespass.
Whether you wish to encourage concealed carry in your facility, discourage gun owners from packing, or take some neutral stance, the best approach is to start by developing a thoughtful policy. Your first step should be conversations with your liability insurer and your attorney so that you fully understand your responsibilities, potential liabilities, and options under your state’s laws.
Next, conduct a discussion with your leadership team to determine everyone’s comfort level with concealed carry. Think through potential situations and responses. If you know gun owners in your group, involve them in the conversation. Sit down with your local police chief or county sheriff to get their thoughts and recommendations about the issue, because they’ll end up responding to any incident.
Proceed carefully, because this is a delicate, divisive, emotionally charged issue. Some gun owners will respond angrily if they perceive that you’re trying to limit their legal rights, while some non-owners will be terrified at the thought that someone in the next pew or cubicle is armed with a deadly weapon. Keep the discussion focused on the issues and realities, trying to keep emotions on both sides calm.
Once you’ve developed and adopted your policy, and had it reviewed by the experts (if your policy governs employees, that should include an attorney who specializes in employment law), share it with everyone who is affected. Explain the reason you created a policy and the process you used to ensure that all viewpoints were heard and considered. You’ll probably never need to use your policy, but should an incident occur, you’ll be glad you had it in place.
Are Your After-School Events Safe Places?
You’ve done an impressive job of putting safety practices in place during the school day. After the school day starts, visitor access is limited to a single door, and all visitors must be buzzed in and check in at the front desk. You’ve been using a visitor management system that verifies people haven’t been banned by your district or aren’t on sex offender registries. An off-duty police officer walks the halls and verifies that all exterior doors are closed and locked several times throughout the day.
Then the final bell sounds and the students and staff leave. But that doesn’t mean your building is empty. In the late afternoon and into the evening, clubs are meeting and teachers are tutoring students who are struggling to catch up. The basketball team is running layup drills in the gym, while the band director is leading one more practice before Thursday night’s concert. The evening custodians are preparing the building for the next day.
So where are your safeguards? How many people are in the school? Are you sure they all belong there? Are you sure they’re all going to leave when it’s time to go? What parts of the building are they able to access? Could a pair of students with non-educational activities in mind find a hiding place? Could someone with evil intent hide a weapon in a locker?
The same questions could apply to churches and other organizations. The flaw in many security plans is that they’re designed solely for the facility’s primary use -- during class time, around worship services, or in the business day. Those are the busiest times of day, so they get the lion’s share of attention and protection.
But most schools, churches, and organizations see activity outside of normal hours, often with relaxed access controls. The basketball players drift in through the locker room door. The custodians prop open the door near the dumpster so they can sneak a smoke break. While the Bible study facilitator is enlightening his group, his preteen kids are running amok in the hallways. Add in after-hours events, from athletic contests, to choral concerts, to Scout meetings.
The simple fact is that if your safety plan fails to address the other times of day, it’s inadequate. Your safety plan needs to incorporate all times in which people are in your facilities, whether that involves visitors or employees. The concern behind that approach isn’t only that someone who intends to do harm to others can access your facilities. Allowing people to roam your buildings unsupervised could create a liability issue if they were to injure themselves. In addition, what would happen if there were a fire or severe weather? Would occupants know what to do? Would first responders know where to check?
First, take some time to do some planning. Focus on how your facilities are used and occupied during “off” hours. Look at activities and event schedules so you have a clear understanding of what’s happening and who is involved. Second, determine how people get in and out of the building after hours. Ideally, access and egress should be limited to a single entrance. Third, look for ways you can block off access to other parts of the building, such as by installing security gates. Fourth, consider how you can provide supervision of activities. If you’re expecting a big crowd for a band concert or a volleyball tournament, you may want to have security staff on hand. At the very list, administrators should be at the front doors to monitor who is entering. For activities such as after-school practices, make sure coaches know they are responsible for supervising the entire team while they’re in the building.
Finally conduct spot checks of your facilities after hours. See if the activities match what’s supposed to be happening. Make sure the occupants belong, and that they aren’t in places where you don’t want them. Walk through empty hallways and look for unlocked rooms. Conducting such checks will not only reassure about the safety of your facilities, but they’ll also give you ideas for additional steps you can take to ensure everyone’s safety.
Wait -- is Code Yellow a shooter or a bus problem?
“Attention, Code Yellow.” The voice crackles over the intercom, stopping everyone in their tracks. Can’t quite remember -- isn’t Code Yellow a problem in the bus drop-off area? Or is that when we summon the imaginary “Ms. Smithers” to the office? Or isn’t that a Signal Three?
Anyone who’s watched a spy movie or one of those films showing the behind-the-scenes operations in the Pentagon has heard all sorts of interesting code words. “The President has ordered everyone to Defcon-Two, so we need to implement Code Green.” It’s pretty cool to know all those secret codes are in use, making sure people who shouldn’t have access to information won’t know what’s happening.
Schools and other facilities often adopt similar secret codes. The justification is usually that only the people who are required to take action (such as teachers or department managers) will know what’s happening, so other occupants of the facility (such as students or employees) won’t panic.
The intent may seem reasonable, but there’s an inherent problem with codes: people forget them. When they hear the code words, they may not remember what they’re supposed to mean. And if they’re the person in a crisis situation, they might not have the presence of mind to call for a Code Yellow, a Code Red, or a Code Fuchsia. Instead, they’ll panic or freeze.
We live in a different world than we did 10 or 20 years ago. Media coverage of mass shootings, school violence, and terrorist acts have sharpened awareness. That’s true even among young students. Even if they haven’t seen the news stories, they’ve heard their parents and classmates discuss shootings and other acts. Today’s students are every bit as uneasy about the potential for an incident as their grandparents were when they were practicing duck-and-cover drills.
Preparing to deal with dangerous incidents is serious business. Playing around with code words and similar strategies can compound the danger by creating confusion. It’s far better to use plain English and state exactly what you want people to do. If your school needs to be locked down because of a potential threat, saying “Lockdown now” over the intercom will stir people into action far more effectively than asking “Ms. Smithers” to visit the office.
There’s a part of our brains that’s sometimes derided as “reptilian.” It’s the area of the brain that makes instinctive responses to situations. If we see an object flying toward our heads, we duck. If our feet slip, we automatically reach out for something that will allow us to steady ourselves. As intelligent, rational animals, we’re a bit ashamed of our reptilian reactions, but they’re what keep us alive. When we see a shooter entering a building, we don’t have the luxury of carefully analyzing the situation and considering alternatives. We need to get to safety immediately.
“Code Yellow” doesn’t kick the reptilian brain into action, but “Shooter! Take cover!” will. If we want people to evacuate a burning building, we yell “Fire! Get out!” for a reason. Everyone knows what that means and what they’re supposed to do.
In addition to using plain English, it’s important to make sure that everyone who can call an alert uses the same words. If one administrator says “Lockdown now!” and another says something about taking cover, they may not get the same response. That’s why many schools use common language such as the Standard Response Protocol [http://iloveuguys.org/srp.html] to notify occupants about emergencies. They also regularly practice the actions occupants are supposed to take when they hear those words. For example, lockdowns are triggered by the phrase “Lockdown! Locks, Lights, Out of Sight.” Even the youngest students can easily memorize that phrase, so they know exactly what to do to protect themselves.
If you’re responsible for occupants in multiple buildings, such as a school district with multiple schools, it’s a good idea to use the same protocol in every building. That way, if staff members are working in a different building, or if students move from an elementary to a middle school, they’ll automatically know how to react.
Standard protocols may not be as much fun as code words, but in a real-life emergency, they make a tremendous difference in protecting everyone’s safety.
When an Excluded Visitor Creates a Disruption
If you’ve established a visitor control process for your business, school, or church, good for you. Being aware of who is entering your premises and making sure you keep people who don’t belong there from getting in is one of the best ways you can ensure the security and well-being of the people you want to protect.
Whether you use technology like SafeVisitor or have some kind of manual system or list that identifies people who should be denied access, eventually you’re going to encounter a situation in which someone who’s on that list will demand entry. How you and your front desk staff react will make a significant difference in how the situation will play out -- whether the unwanted visitor leaves on his or her own, or whether things escalate to the point of violence or arrest.
The most important thing you can do is plan and train before the situation occurs. If you haven’t prepared for the inevitable moment when you need to inform someone that he or she can’t come in, you or your staff won’t know how to act effectively. The wrong actions can quickly turn a simple disagreement into a traumatic event.
Part of that training will be strategies for staying calm and dealing with the individual in a polite manner. Someone who is being refused access to your premises is likely to become angry, highly emotional, and even agitated. If they’re met with anger and yelling from your staff, that response will quickly escalate. It’s also a wise idea to have a backup person nearby who can respond right away if it’s clear the unwanted visitor is becoming agitated.
The visitor may not be aware that he or she isn’t allowed in your facility, so the first step is to gently and politely explain that they cannot come in because of your policies. Your employees shouldn’t make it seem as though they’ve made that decision on their own. Instead, they can say (for example), “The school district has a policy that people who have been placed on the no-visit list cannot come into our school, and your name is on that list.” They can also explain who the visitor can contact with questions or to obtain more information.
Some unwelcome visitors may be on such a list because of domestic violence or custody issues, such as a noncustodial parent illegally trying to contact his or her child at school. They may be aware that such contact is prohibited, but in their anger and frustration, they’re willing to take a chance. It’s also possible that their name is on the list as the result of human error. It’s important that the person at your front desk not try to resolve the issue on his or her own, because that can create a distraction and shift the visitor’s anger to that person. Give the individual the contact information, ask them to leave, and allow them to take care of it.
Visitors who are angry may begin to raise their voices or yell at your front desk staff in an effort to intimidate or frighten them. Often, they’ll create a disruption to gain sympathy from onlookers or in the hope that your staff will let them in to avoid an embarrassing situation. Train your staff to hold their ground and contact security or law enforcement if the level of anger increases. The same is true of an unwanted visitor simply refuses to leave.
If the individual appears to have a serious mental health issue, is incoherent, or appears likely to become violent, your best strategy is an immediate call to law enforcement as a precaution. While police officers and paramedics will tell you that dealing with individuals who have mental health issues is one of the more unpleasant parts of their jobs, they do have training and experience that you and your staff probably lack. First responders would rather you err on the side of safety than risk having a situation become more dangerous.
Finally, teach your front desk staff to trust their gut. When a visitor’s presence or actions make them feel uneasy, there’s probably a good reason for it. It’s better to call for assistance early in the process than to find themselves in a situation that quickly worsens.
Visitor Management: How Well Do You Trust Vendors in Your Facilities?
You take pride in the way you control access to your building. Your employees wear badges that double as access cards. When salespeople show up, they’re required to sign in and have to be escorted back to an office. Your receptionist is a tiger when it comes to enforcing those rules.
So who just walked past your office? Oh, it’s the fire extinguisher guy, doing his monthly inspection. Takes him a couple hours to work his way through the entire building. Or maybe it was the Bobby the plumber, who’s here to fix the leaky valve on that urinal. Could have been the guy who restocks the vending machines -- you’re always amazed at how much candy and how many soft drinks your team goes through in a week.
You make sure employees are identified and you keep an eye on those occasional visitors. But to me, it looks like maintenance and other service people wander anywhere they want without a second thought on your part. Oh sure, your receptionist would never let them past her desk without getting a signature and clipping on a visitor’s pass, but once they’re in the building, nobody pays much attention.
Does that make you nervous? Not really? You’re giving these people who you may not know all that well unlimited access to your entire building. They stroll into important areas, past tables and desks loaded with proprietary and confidential information, and around cubicles where employees leave purses and expensive technology. They’re free to interact with any of your employees. They have access to restrooms, stairwells, and other out-of-sight places.
You’ve known Bobby for better than a decade. He’s the most reliable plumber you’ve found, and you hope they guy never retires. Bobby brought a helper today. You don’t know his helper, but Bobby would never hire anyone unreliable. If you knew more, you’d learn that the helper attends Bobby’s church and was hired at the pastor’s request because he needed some guidance and support. He’s 23 and has already done four stints at the county jail. Handful of thefts, narcotics … stuff like that.
The fire extinguisher guy is pretty quiet, but very diligent and efficient. You haven’t noticed that he has an eye for the ladies, particularly the young, friendly pair in customer service. You trust that the fire safety vendor has vetted him thoroughly, but their bargain background check missed that arrest for a sex offense that his attorney pleaded down to a lesser charge.
If you looked in the empty cases the vending machine guy wheeled back to his truck, you’d notice they’re not always empty. He hasn’t taken anything really valuable … well, not yet … but he thinks it’s okay to help himself to things. What your employees assume they’ve misplaced has actually been stolen, and it’s been happening for years.
What kind of screening do your vendors perform when hiring someone? How often do they take a closer look at their existing employees? If you can’t answer those questions, you have no idea whether your business and your employees are safe from those friendly service people. You’re simply assuming that your vendors are as careful about hiring as you are, and I think that’s a pretty dangerous assumption.
So what can you do to protect yourself? First, find out exactly what your vendors and service providers are doing to ensure their employees deserve your trust. If their vetting process does not make you completely comfortable, perhaps it’s time to initiate a process of your own. One possible approach is to use our SafeVendor visitor system, which requires vendors to register before they enter your facility and allows us to perform a background check so you know if there’s a reason to be wary. It also issues badges and tracks who’s in your facilities (which is handy if an emergency occurs).
Second, give serious thought to limiting access for those vendors or service people. That may involve assigning an escort to bring them to the area where work is being performed and possibly even remaining with them while they handle their tasks. Or it may be that you allow them to occupy specified areas for specified time periods. If the plumber is making a repair in the first-floor men’s room, he shouldn’t have any reason to be upstairs.
Letting vendors and maintenance people wander freely through your building is like creating a big safety net and cutting large holes in it. You and your employees deserve better.
Metal Detectors Aren't a Magical Safety Solution
There are no two ways about it: school shootings are terrifying. Students, parents, teachers, and communities are horrified by the thought of someone violating what we’ve always thought of as one of our safest spaces by firing a weapon with the intent to kill.
Criminologists point to statistics confirming that the number of such shootings really isn’t on the rise, noting that schools continue to be among the safest places for young people. Still, given the explosion of media and social media coverage, the average person can’t be faulted for thinking America faces some kind of violent new epidemic.
After this spring’s highly publicized incidents in Parkland, Florida and Santa Fe, Texas, and another in Noblesville, Indiana -- not far from our company’s offices -- there’s been an outcry calling for “hardening” school buildings to thwart potential shooters. In particular, many well-meaning people have insisted that the best solution is to place metal detectors at the doors of all schools. Indiana’s Governor recently made hand-held metal detectors available to all of the state’s schools at no cost to the districts.
Metal detectors have their place in security, but they’re not the foolproof or magical solution many advocates believe them to be. First, metal detectors are personnel-intensive devices. To provide adequate protection, they have to be staffed any time anyone enters the building. That not only includes the times when large groups of students are arriving for school, but throughout the day, and for high schools, into the evening and weekends.
If the swim team arrives for practice at 5:30 a.m., somebody has to be there to scan the members and their gym bags. If practice for the spring musical runs all evening, someone has to be there to scan all the participants. The same goes for sporting events. If there’s any gap in scanning, it creates an opportunity for someone to smuggle a weapon into the building and place it in a locker or other location for later access.
Not only do trained people have to be on hand to perform the scans, there has to be an established process when the detector identifies a suspicious person or object. Who will be responsible for frisking students or searching their bags? Will that interfere with the flow of students coming into the school?
Nor are all weapons made of metal. Even with every door protected by a metal detector, students could bring weapons made of wood, plastic, or other materials without detection. That creates a false sense of security.
Finally, if metal detectors placed at building entrances create a crowd of students who are waiting outside to get into the building to be scanned, that crowd becomes what’s known as a “soft” target. It would be easy for someone on the school grounds or in a nearby vehicle to open fire into that crowd with a weapon and inflict mass casualties. That individual wouldn’t even need a gun -- choosing instead to mimic the actions of terrorists in Europe and elsewhere who have simply driven vehicles into crowds.
It isn’t that metal detectors are inherently bad. But they’re not a panacea that will eliminate school shootings. Parents and others want a simple, easy-to-implement strategy to secure their children’s schools, and such an option just doesn’t exist. If it did, law enforcement officials would be leading the movement to use it. The fact that you don’t see police departments and law enforcement experts pushing for simple solutions like metal detectors is that they know better.
Effective school security encompasses several components, many of which can’t be purchased from suppliers. One of the most important is awareness of the hazards and having systems for alerting the authorities to potential threats. In nearly every major school shooting, we’ve later learned that the shooter had made threats or shared plans in advance, yet that information was never passed along to those responsible for security. Schools need a means through which people can safely report concerns about individuals.
In addition, it’s important to address visitor access. In the Parkland incident, the shooter was a former student who had no reason to be in the school, yet he easily gained access to commit his violent act. Would the outcome have been different if he had to obtain access to the building through the office and obtain a pass? Any answer is just speculation, but it’s worth thinking about.
Students and teachers need to be protected, but demanding simple solutions isn’t going to provide safety for everyone. The real answer is replacing rhetoric and social media chatter with thoughtful planning by professionals.
Learn more about school safety best practices. Contact us.
Articles
-
Active Shooter
5
- Dec 3, 2018 Wait -- is Code Yellow a shooter or a bus problem? Dec 3, 2018
- Jul 2, 2018 Is your security toolkit complete? Jul 2, 2018
- Jun 1, 2018 Active Shooter: Facility Security Starts Far From Your Front Door Jun 1, 2018
- May 23, 2018 School Active Shooters: Getting "Left of Bang" May 23, 2018
- May 7, 2018 Active Shooters: Stop Reacting, Start Preventing May 7, 2018
-
Background Checks
4
- Oct 25, 2017 How Do We Comply With Indiana HEA 1079? Oct 25, 2017
- Oct 3, 2017 Top 5 Problems with Vendor Background Checks Oct 3, 2017
- Aug 25, 2017 Can I manage employee background checks in a visitor management system? Aug 25, 2017
- Aug 17, 2017 Do Visitor Management Systems Integrate with Comprehensive Background Checks? Aug 17, 2017
-
Building Security
3
- Jun 3, 2019 Preventing “road rage” in your parking lot Jun 3, 2019
- Sep 4, 2018 Metal Detectors Aren't a Magical Safety Solution Sep 4, 2018
- Feb 27, 2018 Making Sure Your Building is Safe No Matter Who is There Feb 27, 2018
-
Cloud Hosting
1
- Nov 7, 2017 Visitor Management System: Cloud Hosting vs Local Server Nov 7, 2017
-
Concealed Carry
1
- Feb 1, 2019 How should you deal with concealed carry? Feb 1, 2019
-
Corporate Security
2
- Aug 1, 2018 How a Warrior Views Your Facility Aug 1, 2018
- Dec 7, 2017 How to Protect Yourself at Work Dec 7, 2017
-
Emergency Alerts
2
- Nov 1, 2018 When an Excluded Visitor Creates a Disruption Nov 1, 2018
- Jan 9, 2018 How Our Emergency Button Helps Put the 'Safe' in SafeVisitor How Our Emergency Button Helps Put the 'Safe' in SafeVisitor Jan 9, 2018
-
Excluded Parties
1
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
-
Facial Recognition
1
- Aug 26, 2019 Use and Misuse of Facial Recognition Software Aug 26, 2019
-
Geofence
2
- Oct 6, 2017 How Does Geo-Fence Expand Your Security Perimeter? Oct 6, 2017
- Aug 22, 2017 Visitor Management: How Can A Geofence Protect My Organization? Aug 22, 2017
-
Pricing
1
- Sep 13, 2017 What is the Cost of a Visitor Management System? Sep 13, 2017
-
Reunification
2
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- May 1, 2019 Developing a plan for reunification after emergencies May 1, 2019
-
School Visitor Management
13
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- Oct 18, 2019 How to Make Schools Safer With A School Visitor Check-In System Oct 18, 2019
- Oct 4, 2019 What is Best Visitor Management System for Schools? Oct 4, 2019
- Sep 24, 2019 School Visitor Management Systems Are The Foundation for Security Sep 24, 2019
- Aug 30, 2019 What Should a Visitor Management System for Schools Do? Aug 30, 2019
- Aug 8, 2019 Visitor Management System for Schools Aug 8, 2019
- Apr 1, 2019 Anonymous reporting systems enhance safety Apr 1, 2019
- Mar 1, 2019 Someone phoned in a bomb threat. Now what? Mar 1, 2019
- Jan 2, 2019 Are Your After-School Events Safe Places? Jan 2, 2019
- Nov 14, 2017 What’s the Purpose of a Visitor Management System? Nov 14, 2017
- Sep 22, 2017 Are You Keeping Students Safe with a Quality Visitor Management System? Sep 22, 2017
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
- Aug 29, 2017 What Is the Best School Visitor Management System? Aug 29, 2017
-
Sex Offender Search
2
- Nov 1, 2017 Is the Visitor Management System Sex Offender Data Up To Date? Nov 1, 2017
- Aug 31, 2017 Visitor Management System: Do You Really Know All of Your Visitors? Aug 31, 2017
-
Vendor Management
1
- Oct 1, 2018 Visitor Management: How Well Do You Trust Vendors in Your Facilities? Oct 1, 2018
-
Visitor Management
2
- Sep 15, 2019 Visitor Management Software: Security Technology Removes Stress Sep 15, 2019
- Sep 9, 2019 What is Visitor Management System? Sep 9, 2019
-
Volunteer Management
2
- Nov 21, 2017 How do I Conduct a Kiwanis Background Check? Nov 21, 2017
- Sep 25, 2017 Creating a Volunteer Background Screening Consortium Sep 25, 2017
-
WA WATCH Background Check
1
- Jan 15, 2018 WA State Police WATCH Volunteer Background Checks Jan 15, 2018
-
visitor kiosk
1
- Aug 15, 2019 Visitor Management Kiosk Aug 15, 2019