Keeping Control of Who

Keeping Control of Who's on Campus

Virtually every school faces the challenge of unknown visitors

keeping control of who's on campusA typical school has dozens of adults—parents, vendors, volunteers and others—visiting the campus each day. The overwhelming majority of these people are honest about their names and intentions as they sign the registration book. But some lie and others may just skip the process, walking unchallenged through an open gate. Having unknown people on campus while children are present can quickly become an administrator’s nightmare.

Visitor management is a problem that faces virtually every school, but is particularly troublesome when more trusting children are present. Creating a safe and secure place for children starts with proper planning and procedures. Administrators are no longer in a position to assume that “bad” things happen only at other schools.

Whether it is an urban, suburban or rural school, many share the same security challenges. For example, enter just about any zip code into the Department of Justice’s national sex offender registry and don’t be surprised to find multiple registered sex offenders living a short distance from a school. According to the National Center for Missing and Exploited Children, there are about 750,000 registered sex offenders in the United States.

So, what should a school administrator do? Every school needs written, reviewed and practiced visitor management policies. One of the first steps is making sure there is only one visitor entrance onto a campus. Once classes begin in the morning, all but one gate should be locked and remain so as long as children are on site. That one unlocked gate or door must lead visitors directly into the main office.

Once there, visitors must produce government-issued identification, such as a driver’s license, to run through an electronic visitor management system that provides high-speed, level-one checks against local, state and national sexual offender databases and level-two checks against FBI and state and local law enforcement databases. A system also should allow districts and individual campuses to set up their own “deny entry” list and be used to confirm authorization for student pick-ups.

A picture from the ID card or one taken by a networked camera should be stored in the system for future reference, making it more difficult for a person to enter the campus using another person’s ID. Once the approval process is complete, the system should print a wearable photo ID badge, designed to help prevent passing the badge to an unauthorized person. The printed badge should include an expiration date and a bar code that can be swiped over a reader as the visitor leaves to provide a record that he or she has left the campus.

A major goal of visitor management software is to move visitors through the process as accurately and quickly as possible. First-time visitors should be cleared and badged in about 15 seconds. It should take only about five seconds to badge returning visitors.

The system must be easy to use and require little training. Volunteers often are tasked with maintaining a school’s visitor management efforts. A system also must be scalable to conform to changes in a campus’ needs.

Here are a few other related benefits that an electronic visitor management system can provide.

Liability. By checking each visitor entering the school, campus administrators are showing diligence and continued commitment to keeping unwanted persons away from students.

Compliance. More than 40 states have some version of the Lundsford Act, first enacted in Florida in 2005. The law has many requirements intended to keep sex offenders away from children, including at school. Also known as Jessica’s Law, the act was passed soon after a Florida girl was sexually battered and murdered by a previously convicted sex offender.

Safety. If a critical event—such as a bomb threat, active shooter or severe weather condition—were to impact a campus, administrators need a full inventory of who is on school grounds; visitor management systems can likewise assist first responders in accounting for everyone on campus.

Forensic management. System-generated reports can help investigators see who was on campus when thefts, vandalism and other criminal activities occurred.

Volunteer recognition. Many schools provide awards for top volunteers. A visitor management system can keep records of the type of visitor and how much time he or she has spent on campus throughout the school year.

A visitor management system can function as a stand-alone solution for a single campus or be networked with others in that district to provide more benefits. More than 300 facilities—schools, education centers and charter schools—are linked via the district’s virtual public network (VPN).

Networking the systems provides two additional major benefits. Administrators can use available real-time reports to spot and investigate suspicious patterns, such as a person moving from campus to campus seeking entry. The system also can work as a district-wide messaging center. For example, an Amber Alert, severe- weather warning or other emergency can be communicated instantly to every workstation on the network.

There are two more important steps, both of which should be part of a school’s written plan, that can increase the effectiveness of an electronic visitor management system.

  • Teachers and staff must wear photo ID badges while on campus. With all approved adults—including visitors—clearly badged, students will be able to spot someone they can trust during an emergency.
  • Teachers and staff need to immediately challenge any adult on campus not wearing a permanent or temporary ID badge. If the challenged person fails to immediately head to the office for a temporary badge, he or she should be asked to immediately leave the campus. Failure to do so should result in a call to local law enforcement.

There also are some additional low-tech security measures that should be part of the plan. Fencing can close off areas and help lead visitors to the correct entry. Also, signage can help direct people to the office and provide valuable information, such as the hours a school is open and the proper credentials required to gain campus access.

Too many schools still allow people to enter unchallenged. But with so many potential dangers to people and property, administrators can no longer tolerate an open campus. An electronic visitor management system, along with well-written policies and procedures, provides a quick and simple solution to enable appropriate people to enter while preventing visitors with no legitimate business on campus from entering the building. While students are the biggest security concern in a school, the system also helps protect faculty, staff, volunteers and vendors.

This article originally appeared in the February 2013 issue of Security Today.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

Featured Cybersecurity

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3