SAFEVISITOR BLOG
Anonymous reporting systems enhance safety
Nearly every violent incident at a school, a workplace, or a public setting is followed by media coverage in which people point to obvious warning signs that had been ignored. It may have been a student shooter’s obsession with weaponry, a co-worker’s muttered threats, a mass killer’s propensity for harming animals … in each case, there’s something the after-the-fact experts tell us we should have noticed that maybe, just maybe would have prevented the violence.
Assume we had taken note of the behavior in question. What were we supposed to do with our observations and suspicions?
For a long time, society has trained us to keep our mouths shut. As children, we’re told not to be “tattletales,” and as adolescents, “telling on someone” can result in our incurring the wrath of a bully. In the adult world, the idea of sharing information is often considered to be “ratting” on someone and “whistleblowers” are typically isolated by others around them.
After 9/11 and incidents such as the Columbine and Sandy Hook school shootings, that attitude started to shift. Law enforcement and other authorities have shared the message that when we see something that makes us uneasy, we need to say something about it. If a student is making violent threats on social media, we need to alert the school’s principal. If a co-worker makes angry comments about the manager and audibly fantasizes about shooting her, we need to tell someone who can investigate.
It makes sense, but again we go back to the question: what are we supposed to do with our observations and suspicions? We don’t want to be perceived as a tattletale or rat, nor do we want to become the target of someone who’s unstable just because we shared our concerns about that individual and his or her behavior.
That’s where the value of some type of reporting system that allows people to make reports either anonymously or with the confidence that their names will be kept secret. People are far more likely to call attention to dangerous situations if they don’t fear any personal backlash.
Such a system doesn’t have to be limited to threats or criminal activities, and one of the most successful examples exists in the aviation industry. Some years back, industry and government leaders collaborated to create the Aviation Safety Reporting System (ASRS), which provides a way for pilots, service technicians, air traffic controllers, and others to self-report near-misses, mistakes, and other problems without fear of penalty or retribution. The goal of systems like ASRS is to gather information that can identify underlying problems and educate others, so they don’t make the same mistakes. Reporting systems can also be put into place for issues such as fraud, sexual harassment, and compliance issues.
Many school districts are now using the Say Something Anonymous Reporting System that was developed by the violence prevention organization known as Sandy Hook Promise. The system gives students and adults a way to alert school administrators to potentially dangerous situations, so they can investigate and intervene as necessary.
Creating an effecting voluntary reporting program includes several considerations. First, you need a clear scope and straightforward process. How will reporting take place? Who will receive those reports? Ideally, the person or people you select to play that role should be well-known and respected leaders who have demonstrated professional maturity.
Your process should also spell out exactly what that person is expected to do with the information and how quickly they should take action. That’s especially important when you receive a report of something such as suicidal ideation, in which delays are unacceptable. How will reports and follow-up be documented? You also don’t want to establish a process that circumvents or undermines established authorities such as law enforcement or school administrators, or that puts your organization at risk for violating laws. As an example, some states require immediate reporting of suspected child abuse, so your process can’t sidestep that.
Most of all, you must protect the confidentiality of people making reports. There’s no room for error -- a single breach of that confidentiality will destroy any trust people have placed in the system and ensure that nobody will make any reports.
Articles
-
Active Shooter
5
- Dec 3, 2018 Wait -- is Code Yellow a shooter or a bus problem? Dec 3, 2018
- Jul 2, 2018 Is your security toolkit complete? Jul 2, 2018
- Jun 1, 2018 Active Shooter: Facility Security Starts Far From Your Front Door Jun 1, 2018
- May 23, 2018 School Active Shooters: Getting "Left of Bang" May 23, 2018
- May 7, 2018 Active Shooters: Stop Reacting, Start Preventing May 7, 2018
-
Background Checks
4
- Oct 25, 2017 How Do We Comply With Indiana HEA 1079? Oct 25, 2017
- Oct 3, 2017 Top 5 Problems with Vendor Background Checks Oct 3, 2017
- Aug 25, 2017 Can I manage employee background checks in a visitor management system? Aug 25, 2017
- Aug 17, 2017 Do Visitor Management Systems Integrate with Comprehensive Background Checks? Aug 17, 2017
-
Building Security
3
- Jun 3, 2019 Preventing “road rage” in your parking lot Jun 3, 2019
- Sep 4, 2018 Metal Detectors Aren't a Magical Safety Solution Sep 4, 2018
- Feb 27, 2018 Making Sure Your Building is Safe No Matter Who is There Feb 27, 2018
-
Cloud Hosting
1
- Nov 7, 2017 Visitor Management System: Cloud Hosting vs Local Server Nov 7, 2017
-
Concealed Carry
1
- Feb 1, 2019 How should you deal with concealed carry? Feb 1, 2019
-
Corporate Security
2
- Aug 1, 2018 How a Warrior Views Your Facility Aug 1, 2018
- Dec 7, 2017 How to Protect Yourself at Work Dec 7, 2017
-
Emergency Alerts
2
- Nov 1, 2018 When an Excluded Visitor Creates a Disruption Nov 1, 2018
- Jan 9, 2018 How Our Emergency Button Helps Put the 'Safe' in SafeVisitor How Our Emergency Button Helps Put the 'Safe' in SafeVisitor Jan 9, 2018
-
Excluded Parties
1
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
-
Facial Recognition
1
- Aug 26, 2019 Use and Misuse of Facial Recognition Software Aug 26, 2019
-
Geofence
2
- Oct 6, 2017 How Does Geo-Fence Expand Your Security Perimeter? Oct 6, 2017
- Aug 22, 2017 Visitor Management: How Can A Geofence Protect My Organization? Aug 22, 2017
-
Pricing
1
- Sep 13, 2017 What is the Cost of a Visitor Management System? Sep 13, 2017
-
Reunification
2
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- May 1, 2019 Developing a plan for reunification after emergencies May 1, 2019
-
School Visitor Management
13
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- Oct 18, 2019 How to Make Schools Safer With A School Visitor Check-In System Oct 18, 2019
- Oct 4, 2019 What is Best Visitor Management System for Schools? Oct 4, 2019
- Sep 24, 2019 School Visitor Management Systems Are The Foundation for Security Sep 24, 2019
- Aug 30, 2019 What Should a Visitor Management System for Schools Do? Aug 30, 2019
- Aug 8, 2019 Visitor Management System for Schools Aug 8, 2019
- Apr 1, 2019 Anonymous reporting systems enhance safety Apr 1, 2019
- Mar 1, 2019 Someone phoned in a bomb threat. Now what? Mar 1, 2019
- Jan 2, 2019 Are Your After-School Events Safe Places? Jan 2, 2019
- Nov 14, 2017 What’s the Purpose of a Visitor Management System? Nov 14, 2017
- Sep 22, 2017 Are You Keeping Students Safe with a Quality Visitor Management System? Sep 22, 2017
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
- Aug 29, 2017 What Is the Best School Visitor Management System? Aug 29, 2017
-
Sex Offender Search
2
- Nov 1, 2017 Is the Visitor Management System Sex Offender Data Up To Date? Nov 1, 2017
- Aug 31, 2017 Visitor Management System: Do You Really Know All of Your Visitors? Aug 31, 2017
-
Vendor Management
1
- Oct 1, 2018 Visitor Management: How Well Do You Trust Vendors in Your Facilities? Oct 1, 2018
-
Visitor Management
2
- Sep 15, 2019 Visitor Management Software: Security Technology Removes Stress Sep 15, 2019
- Sep 9, 2019 What is Visitor Management System? Sep 9, 2019
-
Volunteer Management
2
- Nov 21, 2017 How do I Conduct a Kiwanis Background Check? Nov 21, 2017
- Sep 25, 2017 Creating a Volunteer Background Screening Consortium Sep 25, 2017
-
WA WATCH Background Check
1
- Jan 15, 2018 WA State Police WATCH Volunteer Background Checks Jan 15, 2018
-
visitor kiosk
1
- Aug 15, 2019 Visitor Management Kiosk Aug 15, 2019