SAFEVISITOR BLOG
How to Protect Yourself at Work
Since the most recent church shooting in Texas my inbox has been flooded with emails from friends, prospects, clients, and even casual acquaintances all asking the same question: how do I protect myself at work?
This year alone we have seen several high profile workplace or church shootings related to domestic violence. So what is happening?
Sadly, this is not a new phenomena.
In 1994, Congress passed the Violence Against Women Act. I was a young police officer in Nashville, TN, and we used the funding to start the largest law enforcement-based Domestic Violence Prevention Unit in the U.S. It became an entire detective division of our police department.
I learned very quickly that domestic violence was a huge workplace problem. Think about it, domestic violence had always been a hush, hush problem that was to be kept behind closed doors.
In the early 1990s, there were very few states that had even criminalized domestic violence. Seriously. Of course if it was a felony assault, then law enforcement could intervene and prosecute on behalf of the victim. But since more than 70% of domestic violence is reported as a misdemeanor, this provides few options for law enforcement intervention if the victim does not want to prosecute.
As Nashville shouldered the responsibility for prosecuting domestic violence offenders and providing safe options for victims like shelters, we were also flooded with cases of stalking that were disrupting the workplace.
Why should we be shocked? If communities do a better job of protecting victims, then those that harm them have to work a little harder to find them. But where is the one place they almost always will be able to find them?
Work!
However, most of our workplaces are no match for these sophisticated manipulators.
After September 11, 2001, our organizations spent money to beef up security to protect ourselves from foreign terrorists when it was the domestic terrorist that posed the greatest risk to us.
Paul Dvorak, SafeVisitor Advisory Board Member & a U.S. Secret Service Special Agent, has spent his entire career creating safe perimeters for dignitaries like President Bush and United Nations Representatives.
Once a person of danger gets inside the perimeter, it is very difficult to protect yourself or others. Paul talks of controlling how close people can get to high value targets like the President, and how anybody that gets within arms reach has gone through an extensive background check and security screening process.
How does this apply to my workplace? Well, there are 5 things that every employer should focus on. Listed in order of importance they are:
- Controlling the Flow of Visitors. Many of your employers think they are doing this with a clip board at the front desk or a security guard at the door. This does not work. You need a visitor management system that can ensure your different levels of visitors have received proper vetting before they are allowed into your facility. If an employee discloses they are going through a divorce or has taken out a protective order on a spouse or partner, then that person who represents a perceived threat could be placed on an Excluded Parties List to keep them out of the workplace and away from you and your peers. What are the key components of a quality visitor management system? It is one that:
- Scans Government Issued ID. Validates and confirms identity.
- Mobile ID’s for Frequent Visitors. Requires volunteers, vendors, or more frequent visitors to undergo comprehensive background checks before they are issued an ID.
- GeoFencing. Uses geofencing to ID approved visitors before they are allowed inside the building.
- Background Checks. Ranges from checking Excluded Parties Lists to conducting comprehensive national background checks.
- Accurate Visitor Logs. Accesses a prior visitor’s information.
2. Training. This is not a one-and-done training module but an ongoing process. How do we handle domestic violence? What happens during an active shooter event?
3. Active Shooters. We are starting to see more workplaces implement training and policies related to active shooters. How do we prevent, contain, and protect employees?
4. Communications. During an active shooter event or security incident, it is critical to have communication options that instantly inform your employees and moves them away from danger as quickly as possible.
5. Culture of Confidence. Organizations lose hundreds of thousands of dollars each year to low productivity related to security issues. Implementing a comprehensive security program raises productivity and can be a great recruiting tool in an economy with low unemployment where prospects have multiple employment options.
I wanted to write this article directly to you employees to say that you need to make your voice heard. Work with your employers to educate them on options for creating a safe work environment.
If you would like to learn more about how SafeVisitor can protect your place of employment, click here or request more information on a security assessment.
Articles
-
Active Shooter
5
- Dec 3, 2018 Wait -- is Code Yellow a shooter or a bus problem? Dec 3, 2018
- Jul 2, 2018 Is your security toolkit complete? Jul 2, 2018
- Jun 1, 2018 Active Shooter: Facility Security Starts Far From Your Front Door Jun 1, 2018
- May 23, 2018 School Active Shooters: Getting "Left of Bang" May 23, 2018
- May 7, 2018 Active Shooters: Stop Reacting, Start Preventing May 7, 2018
-
Background Checks
4
- Oct 25, 2017 How Do We Comply With Indiana HEA 1079? Oct 25, 2017
- Oct 3, 2017 Top 5 Problems with Vendor Background Checks Oct 3, 2017
- Aug 25, 2017 Can I manage employee background checks in a visitor management system? Aug 25, 2017
- Aug 17, 2017 Do Visitor Management Systems Integrate with Comprehensive Background Checks? Aug 17, 2017
-
Building Security
3
- Jun 3, 2019 Preventing “road rage” in your parking lot Jun 3, 2019
- Sep 4, 2018 Metal Detectors Aren't a Magical Safety Solution Sep 4, 2018
- Feb 27, 2018 Making Sure Your Building is Safe No Matter Who is There Feb 27, 2018
-
Cloud Hosting
1
- Nov 7, 2017 Visitor Management System: Cloud Hosting vs Local Server Nov 7, 2017
-
Concealed Carry
1
- Feb 1, 2019 How should you deal with concealed carry? Feb 1, 2019
-
Corporate Security
2
- Aug 1, 2018 How a Warrior Views Your Facility Aug 1, 2018
- Dec 7, 2017 How to Protect Yourself at Work Dec 7, 2017
-
Emergency Alerts
2
- Nov 1, 2018 When an Excluded Visitor Creates a Disruption Nov 1, 2018
- Jan 9, 2018 How Our Emergency Button Helps Put the 'Safe' in SafeVisitor How Our Emergency Button Helps Put the 'Safe' in SafeVisitor Jan 9, 2018
-
Excluded Parties
1
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
-
Facial Recognition
1
- Aug 26, 2019 Use and Misuse of Facial Recognition Software Aug 26, 2019
-
Geofence
2
- Oct 6, 2017 How Does Geo-Fence Expand Your Security Perimeter? Oct 6, 2017
- Aug 22, 2017 Visitor Management: How Can A Geofence Protect My Organization? Aug 22, 2017
-
Pricing
1
- Sep 13, 2017 What is the Cost of a Visitor Management System? Sep 13, 2017
-
Reunification
2
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- May 1, 2019 Developing a plan for reunification after emergencies May 1, 2019
-
School Visitor Management
13
- Mar 9, 2021 Visitor Management System for Schools Mar 9, 2021
- Oct 18, 2019 How to Make Schools Safer With A School Visitor Check-In System Oct 18, 2019
- Oct 4, 2019 What is Best Visitor Management System for Schools? Oct 4, 2019
- Sep 24, 2019 School Visitor Management Systems Are The Foundation for Security Sep 24, 2019
- Aug 30, 2019 What Should a Visitor Management System for Schools Do? Aug 30, 2019
- Aug 8, 2019 Visitor Management System for Schools Aug 8, 2019
- Apr 1, 2019 Anonymous reporting systems enhance safety Apr 1, 2019
- Mar 1, 2019 Someone phoned in a bomb threat. Now what? Mar 1, 2019
- Jan 2, 2019 Are Your After-School Events Safe Places? Jan 2, 2019
- Nov 14, 2017 What’s the Purpose of a Visitor Management System? Nov 14, 2017
- Sep 22, 2017 Are You Keeping Students Safe with a Quality Visitor Management System? Sep 22, 2017
- Sep 11, 2017 How to Create Visitor Management Excluded Parties Lists Sep 11, 2017
- Aug 29, 2017 What Is the Best School Visitor Management System? Aug 29, 2017
-
Sex Offender Search
2
- Nov 1, 2017 Is the Visitor Management System Sex Offender Data Up To Date? Nov 1, 2017
- Aug 31, 2017 Visitor Management System: Do You Really Know All of Your Visitors? Aug 31, 2017
-
Vendor Management
1
- Oct 1, 2018 Visitor Management: How Well Do You Trust Vendors in Your Facilities? Oct 1, 2018
-
Visitor Management
2
- Sep 15, 2019 Visitor Management Software: Security Technology Removes Stress Sep 15, 2019
- Sep 9, 2019 What is Visitor Management System? Sep 9, 2019
-
Volunteer Management
2
- Nov 21, 2017 How do I Conduct a Kiwanis Background Check? Nov 21, 2017
- Sep 25, 2017 Creating a Volunteer Background Screening Consortium Sep 25, 2017
-
WA WATCH Background Check
1
- Jan 15, 2018 WA State Police WATCH Volunteer Background Checks Jan 15, 2018
-
visitor kiosk
1
- Aug 15, 2019 Visitor Management Kiosk Aug 15, 2019