University of Maryland Eastern Shore

Assessment at University of Maryland Eastern Shore

Protus3 News, Security Assessment, Security Survey, Security Threat Assessment

Risk Management Associates, Inc. completed its assessment of the University of Maryland Eastern Shore security program. The assessment began with the review of security-related policies and procedures and other related documents. Members of the RMA team visited the UMES campus to conduct independent observations and interviews with approximately 100 individual stakeholders. Local law enforcement was contacted, and both police calls …

Jeanne Clery

The Clery Act – Costs of Noncompliance

Christine L. Peterson, CPP, ISP Civil Rights, Clery Act, Compliance, Corporate Compliance, Ethics, Security Survey

The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, 20 U.S.C. § 1092(f)(2011), is a federal statute requiring colleges and universities participating in federal financial aid programs to maintain and disclose campus crime statistics and security information. The U.S. Department of Education conducts reviews to evaluate an institution’s compliance with Clery Act requirements. A review may …

Research Triangle Park

RMA Completes Security Assessment of RTP

Protus3 News, Security Assessment, Security Program Development, Security Survey, Security Threat Assessment

Risk Management Associates, Inc. has completed a security assessment of Research Triangle Park. The Research Triangle Foundation has developed and is in the process of implementing a new master development plan for the Research Triangle Park (RTP) community. As a critical component of that plan, the foundation decided to conduct a security assessment to provide stakeholders with the current security …

Security Consulting

University of Maryland Eastern Shore Project Awarded

Protus3 Clery Act, News, Security Assessment, Security Survey

Risk Management Associates, Inc. has been selected by University of Maryland Eastern Shore to conduct a comprehensive assessment of the Department of Public Safety and the residence hall security program. RMA will make recommendations for improvement to ensure a safe campus community. The University of Maryland Eastern Shore (UMES) is a land-grant, historically black college founded in 1886 as the …

A parking lot at night with cars and lightposts

Security Areas and Lighting!

William F. Booth, CPP Security Assessment, Security Survey, Security Threat Assessment

I have been the security expert in over 400 lawsuits alleging inadequate or negligent security. Many of those cases happened at night and, in most, the plaintiff alleged that the light was not adequate. Since lighting is one of the few security areas in which written standards exist, it is absolutely essential that your building entrances, pedestrian areas, or parking …

gold key in a gold lock

Key Control

William F. Booth, CPP Security Assessment, Security Master Planning, Security Policy and Procedure Development, Security Program Development, Security Survey, Security Threat Assessment

So often in our modern technical world, we overlook the basic means of securing most assets: the lock and key. Good key control is imperative for excellent security. At this point, many of you may be saying to yourselves, “I cannot possibly get control of my facility’s keys when no one has had control of them for years.” This is …

probability-criticality

Probability and Criticality

William F. Booth, CPP Security Assessment, Security Master Planning, Security Planning, Security Program Development, Security Survey, Security Threat Assessment

When evaluating what security concern to address first, where do you begin? Consider the probability and criticality of an event, and assign values based on standard criteria. Probability 5 Almost certain. Barring major changes in circumstances, this event will occur or will occur frequently compared to other events. Or, historically, an event of this type has already occurred. 4 Very …

key

Hotel Locks

Emily Schack Security Assessment, Security Survey, Security Threat Assessment

Most hotel locks use a card rather than a key, and in recent months this is presenting a big problem. A low-cost piece of hardware called a microcontroller can make for a simple hack and easy burglary with no signs of forced door or picked lock. See the story here. The up side for hotels to use keycards instead of …

apple bmw

Security Threat – Consider the Extremes

Russell W. Gilmore, CISSP, CISM, EnCE Crisis Management Planning, Product Diversion and Counterfeiting, Product Theft, Security Assessment, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Survey, Security Threat Assessment, Theft

When we assess the security of our customers, employees, facilities and products, we usually look at the obvious problems. Depending on the environment, we expect what is considered the “normal” security threat. In a retail store environment, we may consider security measures that will keep the customers and employees safe, such as taking measures to keep someone from getting hurt …