Protect ourself and others

Little Oddities Often Aggregate Into Larger Anomalies

Protus3Crisis Management Planning, Security Master Planning, Security Program Development

Details continue to emerge from the October 1 shooting at the Route 91 Harvest County Music Festival in Las Vegas. There are ample opportunities for emergency responders and security and hospitality professionals to examine and redefine security protocols.  The greatest gains in response to the unthinkable come out of this kind scrutiny and “lessons learned” exercises. It’s a sad truth. …

pink slip

Termination Guidelines

Julius Stanley Carroll, CPP, CFESecurity Program Development, Workplace Violence

Terminations are often a stressful situation, both for the terminated employee and for the individual responsible for conducting the termination. Listed below are some guidelines that could help diffuse volatile situations and make the process run more smoothly. Always plan the termination. Think it through. Always have two supervisors/managers present during the termination. The meeting should be cordial and professional …

Jeanne Clery

The Clery Act – Costs of Noncompliance

Christine L. Peterson, CPP, ISPCompliance, Security Assessment

The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, 20 U.S.C. § 1092(f)(2011), is a federal statute requiring colleges and universities participating in federal financial aid programs to maintain and disclose campus crime statistics and security information. The U.S. Department of Education conducts reviews to evaluate an institution’s compliance with Clery Act requirements. A review may …

Security Consulting

Security in the Office – A Checklist

Christine L. Peterson, CPP, ISPSecurity Program Development, Theft, Embezzlement, and Fraud, Training

How is your security? The following checklist illustrates the necessary aspects of security that must be addressed for a secure environment. Comply with and support your company’s safety and security program and regulations, and insist that others do the same. Protect wallets, keys, purses, and other personal valuables on the job. This especially includes smartphones and tablets. Challenge strangers in …

Lone Star College

Lessons from Lone Star College System

Tasha Dyson, CFENews, Security Program Development, Workplace Violence

On January 22, 2013, gunshots were heard on the North Harris campus of Lone Star College System. It was later learned that an altercation between two individuals (one of whom may have been a student) had escalated to gun violence. The shooters were injured along with an innocent bystander. Incidents such as this immediately bring to mind topics such as …

college students

Security Threat Assessments for Education

Protus3Security Program Development

In an ideal world, our schools, colleges, and universities would be immune from the threats and challenges that affect other businesses and institutions. Unfortunately, we do not live in an ideal world. Academic institutions are cross-sections of society and bear the same responsibilities for the safety and security of their populations and infrastructure. This cross-section brings with it all the …

probability-criticality

Probability and Criticality

William F. Booth, CPPSecurity Assessment, Security Master Planning, Security Program Development

When evaluating what security concern to address first, where do you begin? Consider the probability and criticality of an event, and assign values based on standard criteria. Probability 5 Almost certain. Barring major changes in circumstances, this event will occur or will occur frequently compared to other events. Or, historically, an event of this type has already occurred. 4 Very …

fire exit

Be Aware

Protus3News, Workplace Violence

Without knowing the complete picture about the incident at Clackamas Shopping Center in Oregon, what can we learn? It’s a reminder of the importance of being aware of your surroundings. People shouldn’t live in fear but instead think in terms of being prepared. Two things we should all consider anywhere we visit are: “where can I take shelter?” and “how …