Keeping Control of Who

Keeping Control of Who's on Campus

Virtually every school faces the challenge of unknown visitors

keeping control of who's on campusA typical school has dozens of adults—parents, vendors, volunteers and others—visiting the campus each day. The overwhelming majority of these people are honest about their names and intentions as they sign the registration book. But some lie and others may just skip the process, walking unchallenged through an open gate. Having unknown people on campus while children are present can quickly become an administrator’s nightmare.

Visitor management is a problem that faces virtually every school, but is particularly troublesome when more trusting children are present. Creating a safe and secure place for children starts with proper planning and procedures. Administrators are no longer in a position to assume that “bad” things happen only at other schools.

Whether it is an urban, suburban or rural school, many share the same security challenges. For example, enter just about any zip code into the Department of Justice’s national sex offender registry and don’t be surprised to find multiple registered sex offenders living a short distance from a school. According to the National Center for Missing and Exploited Children, there are about 750,000 registered sex offenders in the United States.

So, what should a school administrator do? Every school needs written, reviewed and practiced visitor management policies. One of the first steps is making sure there is only one visitor entrance onto a campus. Once classes begin in the morning, all but one gate should be locked and remain so as long as children are on site. That one unlocked gate or door must lead visitors directly into the main office.

Once there, visitors must produce government-issued identification, such as a driver’s license, to run through an electronic visitor management system that provides high-speed, level-one checks against local, state and national sexual offender databases and level-two checks against FBI and state and local law enforcement databases. A system also should allow districts and individual campuses to set up their own “deny entry” list and be used to confirm authorization for student pick-ups.

A picture from the ID card or one taken by a networked camera should be stored in the system for future reference, making it more difficult for a person to enter the campus using another person’s ID. Once the approval process is complete, the system should print a wearable photo ID badge, designed to help prevent passing the badge to an unauthorized person. The printed badge should include an expiration date and a bar code that can be swiped over a reader as the visitor leaves to provide a record that he or she has left the campus.

A major goal of visitor management software is to move visitors through the process as accurately and quickly as possible. First-time visitors should be cleared and badged in about 15 seconds. It should take only about five seconds to badge returning visitors.

The system must be easy to use and require little training. Volunteers often are tasked with maintaining a school’s visitor management efforts. A system also must be scalable to conform to changes in a campus’ needs.

Here are a few other related benefits that an electronic visitor management system can provide.

Liability. By checking each visitor entering the school, campus administrators are showing diligence and continued commitment to keeping unwanted persons away from students.

Compliance. More than 40 states have some version of the Lundsford Act, first enacted in Florida in 2005. The law has many requirements intended to keep sex offenders away from children, including at school. Also known as Jessica’s Law, the act was passed soon after a Florida girl was sexually battered and murdered by a previously convicted sex offender.

Safety. If a critical event—such as a bomb threat, active shooter or severe weather condition—were to impact a campus, administrators need a full inventory of who is on school grounds; visitor management systems can likewise assist first responders in accounting for everyone on campus.

Forensic management. System-generated reports can help investigators see who was on campus when thefts, vandalism and other criminal activities occurred.

Volunteer recognition. Many schools provide awards for top volunteers. A visitor management system can keep records of the type of visitor and how much time he or she has spent on campus throughout the school year.

A visitor management system can function as a stand-alone solution for a single campus or be networked with others in that district to provide more benefits. More than 300 facilities—schools, education centers and charter schools—are linked via the district’s virtual public network (VPN).

Networking the systems provides two additional major benefits. Administrators can use available real-time reports to spot and investigate suspicious patterns, such as a person moving from campus to campus seeking entry. The system also can work as a district-wide messaging center. For example, an Amber Alert, severe- weather warning or other emergency can be communicated instantly to every workstation on the network.

There are two more important steps, both of which should be part of a school’s written plan, that can increase the effectiveness of an electronic visitor management system.

  • Teachers and staff must wear photo ID badges while on campus. With all approved adults—including visitors—clearly badged, students will be able to spot someone they can trust during an emergency.
  • Teachers and staff need to immediately challenge any adult on campus not wearing a permanent or temporary ID badge. If the challenged person fails to immediately head to the office for a temporary badge, he or she should be asked to immediately leave the campus. Failure to do so should result in a call to local law enforcement.

There also are some additional low-tech security measures that should be part of the plan. Fencing can close off areas and help lead visitors to the correct entry. Also, signage can help direct people to the office and provide valuable information, such as the hours a school is open and the proper credentials required to gain campus access.

Too many schools still allow people to enter unchallenged. But with so many potential dangers to people and property, administrators can no longer tolerate an open campus. An electronic visitor management system, along with well-written policies and procedures, provides a quick and simple solution to enable appropriate people to enter while preventing visitors with no legitimate business on campus from entering the building. While students are the biggest security concern in a school, the system also helps protect faculty, staff, volunteers and vendors.

This article originally appeared in the February 2013 issue of Security Today.

Featured

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.