SAFEVISITOR BLOG
Are Your After-School Events Safe Places?
You’ve done an impressive job of putting safety practices in place during the school day. After the school day starts, visitor access is limited to a single door, and all visitors must be buzzed in and check in at the front desk. You’ve been using a visitor management system that verifies people haven’t been banned by your district or aren’t on sex offender registries. An off-duty police officer walks the halls and verifies that all exterior doors are closed and locked several times throughout the day.
Then the final bell sounds and the students and staff leave. But that doesn’t mean your building is empty. In the late afternoon and into the evening, clubs are meeting and teachers are tutoring students who are struggling to catch up. The basketball team is running layup drills in the gym, while the band director is leading one more practice before Thursday night’s concert. The evening custodians are preparing the building for the next day.
So where are your safeguards? How many people are in the school? Are you sure they all belong there? Are you sure they’re all going to leave when it’s time to go? What parts of the building are they able to access? Could a pair of students with non-educational activities in mind find a hiding place? Could someone with evil intent hide a weapon in a locker?
The same questions could apply to churches and other organizations. The flaw in many security plans is that they’re designed solely for the facility’s primary use -- during class time, around worship services, or in the business day. Those are the busiest times of day, so they get the lion’s share of attention and protection.
But most schools, churches, and organizations see activity outside of normal hours, often with relaxed access controls. The basketball players drift in through the locker room door. The custodians prop open the door near the dumpster so they can sneak a smoke break. While the Bible study facilitator is enlightening his group, his preteen kids are running amok in the hallways. Add in after-hours events, from athletic contests, to choral concerts, to Scout meetings.
The simple fact is that if your safety plan fails to address the other times of day, it’s inadequate. Your safety plan needs to incorporate all times in which people are in your facilities, whether that involves visitors or employees. The concern behind that approach isn’t only that someone who intends to do harm to others can access your facilities. Allowing people to roam your buildings unsupervised could create a liability issue if they were to injure themselves. In addition, what would happen if there were a fire or severe weather? Would occupants know what to do? Would first responders know where to check?
First, take some time to do some planning. Focus on how your facilities are used and occupied during “off” hours. Look at activities and event schedules so you have a clear understanding of what’s happening and who is involved. Second, determine how people get in and out of the building after hours. Ideally, access and egress should be limited to a single entrance. Third, look for ways you can block off access to other parts of the building, such as by installing security gates. Fourth, consider how you can provide supervision of activities. If you’re expecting a big crowd for a band concert or a volleyball tournament, you may want to have security staff on hand. At the very list, administrators should be at the front doors to monitor who is entering. For activities such as after-school practices, make sure coaches know they are responsible for supervising the entire team while they’re in the building.
Finally conduct spot checks of your facilities after hours. See if the activities match what’s supposed to be happening. Make sure the occupants belong, and that they aren’t in places where you don’t want them. Walk through empty hallways and look for unlocked rooms. Conducting such checks will not only reassure about the safety of your facilities, but they’ll also give you ideas for additional steps you can take to ensure everyone’s safety.
What Is the Best School Visitor Management System?
Selecting the best school visitor management system is not a simple matter. Over the years I have worked with schools that have a wide variety of needs and concerns when implementing a visitor management system:
· Saving time for front office personnel
· Finding an integrated solution that allows electronic student check in/out
· Kiosk models so the visitor does all the work
If you are looking for a visitor management system (VMS) to simply improve the efficiency of the front office, then you really don’t need to read any further because I am going to focus on the core components of a VMS from a risk-management perspective. I have spent the past 25 years in risk management. I started as a Violent Crime Detective with a large metropolitan police department. I also served as a Violence Prevention Consultant for organizations such as the U.S. Department of Homeland Security, the U.S. Department of Defense, and the U.S. Department of Justice. For the past 13 years, I’ve worked as the Founder and CEO of Safe Hiring Solutions and SafeVisitor. I have witnessed violence up close and personal and it has shaped my perspective and priorities for keeping people and organizations safe.
Now this does not mean that a visitor management system cannot have integrations with student information systems or other applications for that much needed efficiency. We do that with our SafeVisitor system. However, SHS never loses its focus of the foundation of what we are doing i.e. keeping you and your students safe.
I have a unique perspective as a former detective, and I strongly feel that what I offer that is most valuable to school administrators, is my depth of understanding concerning violent criminals and their methods. I know they can be expected to attempt to enter schools by any means possible e.g. applying for jobs, serving as volunteers, or becoming trusted frequent vendors.
At Safe Hiring Solutions, we have conducted more than 700,000 background checks for schools over the past 13 years.
Just recently, we flagged an existing school employee who was applying with a new school district. He had a case of sexual exploitation as well as a substantiated case with the Department of Child Services for child neglect. This man has been teaching for several years.
On a monthly basis, we flag sex offenders that are trying to access schools. Offenders who harm children are constantly seeking access to children. Schools are defenseless against these predators without comprehensive risk management solutions.
So when SHS talks about visitor management systems, we are always focused on keeping people who would harm children out of our schools and away from our children. Surprisingly, the majority of organizations I enter each week, schools and non-schools alike, do not have a single tool for managing their flow of visitors beyond a self-disclosing clip board.
The first step in protecting your school, students, and employees is to create a safe perimeter. Paul Dvorak, SafeVisitor Advisory Board Member and Secret Service Special Agent in Charge of Indianapolis Office, has helped us better understand how critical a safe perimeter is when protecting dignitaries such as the President of the United States.
A school needs to create a safe perimeter between entering the building and visitors. A clip board on the front office desk is not a safe perimeter. The safe perimeter has already been breached just by being at the front desk
A self-service kiosk in the lobby is no better than a clipboard. It does provide a false sense of security that comes with using technology, but there are still a couple of problems:
1. They are already in your lobby, and
2. How do you know they are who they register as?
How does SafeVisitor approach perimeter security?
- Reduce Unexpected/Unknown Visitors. We work closely with schools to classify their visitors. Who are they? Most visitors fall into a category of parent volunteers, partner volunteers, vendors/ contractors, student teachers, and business associates of administrators. When you work through this list, it becomes apparent that the vast majority of visitors to a school are neither unclassified nor unexpected.
- Comprehensive Background Checks. Frequent visitors such as volunteers, vendors, student teachers, and substitutes should submit to a comprehensive background check before receiving clearance to enter the school. The background check can also be set on a renewal interval of every 2, 3, or 4 years.
- Business Meetings. Most business meetings are scheduled in advance. The VMS should accommodate pre-registration for business meetings or low-risk visitors that are not having direct or ongoing contact with students. Pre-registration allows the visitor to be pre-vetted against an “excluded parties list” and the National Sex Offender Database.
- GeoFence. SafeVisitor can create a perimeter around each school building, so that all approved visitors can download a mobile app and activate their ID. As they cross the geofence, it sends their information to the front office computers for review and verification before buzzing them into the building.
- Excluded Parties. Each school can create a list of excluded parties based on their own policies. Anybody on the list attempting to enter the building or grounds will trigger and alert law enforcement, administers, or designated security.
- National Sex Offender Search. Schools have the option of running a National Sex Offender Search every time a visitor enters one of their buildings. Even previously approved visitors who have passed a comprehensive background check can have things happen between visits. This process will flag them.
- Kiosk with Scanner. Self-service kiosks do little to improve security. Used appropriately, a kiosk is best deployed in a vestibule between the doors and requires the visitor to scan in with their SafeVisitor ID or government issued ID.
If you would like a deeper discussion and demonstration on how to use a visitor management system, join us for one of our SafeVisitor weekly demos or setup a personal demo.
Articles
-
Active Shooter
5
- Dec 3, 2018 Wait -- is Code Yellow a shooter or a bus problem? Dec 3, 2018
- Jul 2, 2018 Is your security toolkit complete? Jul 2, 2018
- Jun 1, 2018 Active Shooter: Facility Security Starts Far From Your Front Door Jun 1, 2018
- May 23, 2018 School Active Shooters: Getting "Left of Bang" May 23, 2018
- May 7, 2018 Active Shooters: Stop Reacting, Start Preventing May 7, 2018
-
Background Checks
4
- Oct 25, 2017 How Do We Comply With Indiana HEA 1079? Oct 25, 2017
- Oct 3, 2017 Top 5 Problems with Vendor Background Checks Oct 3, 2017
- Aug 25, 2017 Can I manage employee background checks in a visitor management system? Aug 25, 2017
- Aug 17, 2017 Do Visitor Management Systems Integrate with Comprehensive Background Checks? Aug 17, 2017
-
Building Security
3
- Jun 3, 2019 Preventing “road rage” in your parking lot Jun 3, 2019
- Sep 4, 2018 Metal Detectors Aren't a Magical Safety Solution Sep 4, 2018
- Feb 27, 2018 Making Sure Your Building is Safe No Matter Who is There Feb 27, 2018
-
Cloud Hosting
1
- Nov 7, 2017 Visitor Management System: Cloud Hosting vs Local Server Nov 7, 2017
-
Concealed Carry
1
- Feb 1, 2019 How should you deal with concealed carry? Feb 1, 2019
-
Corporate Security
2
- Aug 1, 2018 How a Warrior Views Your Facility Aug 1, 2018
- Dec 7, 2017 How to Protect Yourself at Work Dec 7, 2017
-
Emergency Alerts
2
- Nov 1, 2018 When an Excluded Visitor Creates a Disruption Nov 1, 2018
- Jan 9, 2018 How Our Emergency Button Helps Put the 'Safe' in SafeVisitor How Our Emergency Button Helps Put the 'Safe' in SafeVisitor Jan 9, 2018
-
Excluded Parties
1
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
-
Facial Recognition
1
- Aug 26, 2019 Use and Misuse of Facial Recognition Software Aug 26, 2019
-
Geofence
2
- Oct 6, 2017 How Does Geo-Fence Expand Your Security Perimeter? Oct 6, 2017
- Aug 22, 2017 Visitor Management: How Can A Geofence Protect My Organization? Aug 22, 2017
-
Pricing
1
- Sep 13, 2017 What is the Cost of a Visitor Management System? Sep 13, 2017
-
Reunification
2
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- May 1, 2019 Developing a plan for reunification after emergencies May 1, 2019
-
School Visitor Management
13
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- Oct 18, 2019 How to Make Schools Safer With A School Visitor Check-In System Oct 18, 2019
- Oct 4, 2019 What is Best Visitor Management System for Schools? Oct 4, 2019
- Sep 24, 2019 School Visitor Management Systems Are The Foundation for Security Sep 24, 2019
- Aug 30, 2019 What Should a Visitor Management System for Schools Do? Aug 30, 2019
- Aug 8, 2019 Visitor Management System for Schools Aug 8, 2019
- Apr 1, 2019 Anonymous reporting systems enhance safety Apr 1, 2019
- Mar 1, 2019 Someone phoned in a bomb threat. Now what? Mar 1, 2019
- Jan 2, 2019 Are Your After-School Events Safe Places? Jan 2, 2019
- Nov 14, 2017 What’s the Purpose of a Visitor Management System? Nov 14, 2017
- Sep 22, 2017 Are You Keeping Students Safe with a Quality Visitor Management System? Sep 22, 2017
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
- Aug 29, 2017 What Is the Best School Visitor Management System? Aug 29, 2017
-
Sex Offender Search
2
- Nov 1, 2017 Is the Visitor Management System Sex Offender Data Up To Date? Nov 1, 2017
- Aug 31, 2017 Visitor Management System: Do You Really Know All of Your Visitors? Aug 31, 2017
-
Vendor Management
1
- Oct 1, 2018 Visitor Management: How Well Do You Trust Vendors in Your Facilities? Oct 1, 2018
-
Visitor Management
2
- Sep 15, 2019 Visitor Management Software: Security Technology Removes Stress Sep 15, 2019
- Sep 9, 2019 What is Visitor Management System? Sep 9, 2019
-
Volunteer Management
2
- Nov 21, 2017 How do I Conduct a Kiwanis Background Check? Nov 21, 2017
- Sep 25, 2017 Creating a Volunteer Background Screening Consortium Sep 25, 2017
-
WA WATCH Background Check
1
- Jan 15, 2018 WA State Police WATCH Volunteer Background Checks Jan 15, 2018
-
visitor kiosk
1
- Aug 15, 2019 Visitor Management Kiosk Aug 15, 2019