Campus Gun Laws Create Need for More Security Measures

Campus Gun Laws Create Need for More Security Measures

For Kansas, a new gun law will allow for concealed carry almost anywhere in the state besides hospitals and college campuses when they go into effect. However, this law differs from others states’ as they require the sanctuary areas to increase security to prohibit firearms.

Starting July 1, anyone over the age of 21 will be allowed to carry a firearm onto university grounds in Kansas. It is set to be the first state where both campus carry and so-called “permitless” carry are legal. Gun owners will be able to bring guns onto campus even if they have not obtained a concealed-carry license.

For schools that want to keep firearms out of school stadiums or other facilities on campus, they must install “adequate security measures to ensure that no weapons are permitted to be carried into such building.” The law spells out “adequate” to include both metal sensors and the personnel to staff them.

Officials at three Kansas universities estimate the cost of updating their primary athletic venues at more than $2 million. The updates will include security measures such as metal detectors and barricades. That estimate does not include the cost to staff the new security checkpoints.

In Arkansas, a similar law was passed on April 4 that will go into effect on January 1, 2018. The campus-carry law sparked turmoil after an earlier version opened all campus areas — including stadiums — to concealed guns. Facing outrage from constituents and officials worried about the prospect of sanctions from the Southeastern Conference and National Collegiate Athletic Association against the University of Arkansas’s sports teams, legislators quickly passed an amended version of the law that allowed public colleges to have “firearms sensitive” areas but they’d have to pay for security features and have a safety plan approved by the State Police.

While public universities in Arkansas have not published their estimated costs of securing their athletic stadiums, security officials estimate that it will cost at least $500,000 to secure the University of Arkansas’ flagship Razorback Stadium.


Featured

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

  • Impact on Digital Transformation

    A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries. Read Now

  • Optimizing Security and Business Performance with Clarity and Control

    In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3