Keeping Control of Who

Keeping Control of Who's on Campus

Virtually every school faces the challenge of unknown visitors

keeping control of who's on campusA typical school has dozens of adults—parents, vendors, volunteers and others—visiting the campus each day. The overwhelming majority of these people are honest about their names and intentions as they sign the registration book. But some lie and others may just skip the process, walking unchallenged through an open gate. Having unknown people on campus while children are present can quickly become an administrator’s nightmare.

Visitor management is a problem that faces virtually every school, but is particularly troublesome when more trusting children are present. Creating a safe and secure place for children starts with proper planning and procedures. Administrators are no longer in a position to assume that “bad” things happen only at other schools.

Whether it is an urban, suburban or rural school, many share the same security challenges. For example, enter just about any zip code into the Department of Justice’s national sex offender registry and don’t be surprised to find multiple registered sex offenders living a short distance from a school. According to the National Center for Missing and Exploited Children, there are about 750,000 registered sex offenders in the United States.

So, what should a school administrator do? Every school needs written, reviewed and practiced visitor management policies. One of the first steps is making sure there is only one visitor entrance onto a campus. Once classes begin in the morning, all but one gate should be locked and remain so as long as children are on site. That one unlocked gate or door must lead visitors directly into the main office.

Once there, visitors must produce government-issued identification, such as a driver’s license, to run through an electronic visitor management system that provides high-speed, level-one checks against local, state and national sexual offender databases and level-two checks against FBI and state and local law enforcement databases. A system also should allow districts and individual campuses to set up their own “deny entry” list and be used to confirm authorization for student pick-ups.

A picture from the ID card or one taken by a networked camera should be stored in the system for future reference, making it more difficult for a person to enter the campus using another person’s ID. Once the approval process is complete, the system should print a wearable photo ID badge, designed to help prevent passing the badge to an unauthorized person. The printed badge should include an expiration date and a bar code that can be swiped over a reader as the visitor leaves to provide a record that he or she has left the campus.

A major goal of visitor management software is to move visitors through the process as accurately and quickly as possible. First-time visitors should be cleared and badged in about 15 seconds. It should take only about five seconds to badge returning visitors.

The system must be easy to use and require little training. Volunteers often are tasked with maintaining a school’s visitor management efforts. A system also must be scalable to conform to changes in a campus’ needs.

Here are a few other related benefits that an electronic visitor management system can provide.

Liability. By checking each visitor entering the school, campus administrators are showing diligence and continued commitment to keeping unwanted persons away from students.

Compliance. More than 40 states have some version of the Lundsford Act, first enacted in Florida in 2005. The law has many requirements intended to keep sex offenders away from children, including at school. Also known as Jessica’s Law, the act was passed soon after a Florida girl was sexually battered and murdered by a previously convicted sex offender.

Safety. If a critical event—such as a bomb threat, active shooter or severe weather condition—were to impact a campus, administrators need a full inventory of who is on school grounds; visitor management systems can likewise assist first responders in accounting for everyone on campus.

Forensic management. System-generated reports can help investigators see who was on campus when thefts, vandalism and other criminal activities occurred.

Volunteer recognition. Many schools provide awards for top volunteers. A visitor management system can keep records of the type of visitor and how much time he or she has spent on campus throughout the school year.

A visitor management system can function as a stand-alone solution for a single campus or be networked with others in that district to provide more benefits. More than 300 facilities—schools, education centers and charter schools—are linked via the district’s virtual public network (VPN).

Networking the systems provides two additional major benefits. Administrators can use available real-time reports to spot and investigate suspicious patterns, such as a person moving from campus to campus seeking entry. The system also can work as a district-wide messaging center. For example, an Amber Alert, severe- weather warning or other emergency can be communicated instantly to every workstation on the network.

There are two more important steps, both of which should be part of a school’s written plan, that can increase the effectiveness of an electronic visitor management system.

  • Teachers and staff must wear photo ID badges while on campus. With all approved adults—including visitors—clearly badged, students will be able to spot someone they can trust during an emergency.
  • Teachers and staff need to immediately challenge any adult on campus not wearing a permanent or temporary ID badge. If the challenged person fails to immediately head to the office for a temporary badge, he or she should be asked to immediately leave the campus. Failure to do so should result in a call to local law enforcement.

There also are some additional low-tech security measures that should be part of the plan. Fencing can close off areas and help lead visitors to the correct entry. Also, signage can help direct people to the office and provide valuable information, such as the hours a school is open and the proper credentials required to gain campus access.

Too many schools still allow people to enter unchallenged. But with so many potential dangers to people and property, administrators can no longer tolerate an open campus. An electronic visitor management system, along with well-written policies and procedures, provides a quick and simple solution to enable appropriate people to enter while preventing visitors with no legitimate business on campus from entering the building. While students are the biggest security concern in a school, the system also helps protect faculty, staff, volunteers and vendors.

This article originally appeared in the February 2013 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3