Jeanne Clery

The Clery Act – Costs of Noncompliance

Christine L. Peterson, CPP, ISPCompliance, Security Assessment

The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, 20 U.S.C. § 1092(f)(2011), is a federal statute requiring colleges and universities participating in federal financial aid programs to maintain and disclose campus crime statistics and security information. The U.S. Department of Education conducts reviews to evaluate an institution’s compliance with Clery Act requirements. A review may …

WRAL: Security Measures Not Foolproof, Consultant Says

Amanda StricklandBackground Investigation, Crisis Management Planning, News, Security Program Development, Workplace Violence

 Plan. Protect. Prosper. Protus3 specializes in security system design, security consulting, corporate investigations and other investigative services. Partner with Protus3 and we will examine each situation to identify threats and develop solutions for your best outcome. 919-834-8584 or 800-775-8584

security officer standing next to bike

Proprietary versus Contract Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHSSecurity Program Development

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Basically, there are only two organizational relationships for the security officer. A proprietary officer …

guard with no uniform talking into a device

Uniformed versus Non-Uniformed Officers

Billy Gordon Green, Jr. M.Ed., CPP, CHSSecurity Program Development, Training

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Whether or not to put security personnel in a distinctive uniform is one of …

Security Consulting

Security in the Office – A Checklist

Christine L. Peterson, CPP, ISPSecurity Program Development, Theft, Embezzlement, and Fraud, Training

How is your security? The following checklist illustrates the necessary aspects of security that must be addressed for a secure environment. Comply with and support your company’s safety and security program and regulations, and insist that others do the same. Protect wallets, keys, purses, and other personal valuables on the job. This especially includes smartphones and tablets. Challenge strangers in …

A parking lot at night with cars and lightposts

Security Areas and Lighting!

William F. Booth, CPPSecurity Assessment

I have been the security expert in over 400 lawsuits alleging inadequate or negligent security. Many of those cases happened at night and, in most, the plaintiff alleged that the light was not adequate. Since lighting is one of the few security areas in which written standards exist, it is absolutely essential that your building entrances, pedestrian areas, or parking …

bricks

Records Checks – House of Cards or Bricks?

Tasha Dyson, CFEBackground Investigation

For companies that advertise nationwide records checks, are you getting a house of bricks or a house of cards? Do you remember that scene from My Cousin Vinny when Vinny talks about the prosecution’s case, bricks, and playing cards? “The DA’s going to build a case. Building a case is like building a house. Each piece of evidence is just …

physical security lock

Key Control

William F. Booth, CPPSecurity Assessment, Security Master Planning, Security Program Development

So often in our modern technical world, we overlook the basic means of securing most assets: the lock and key. Good key control is imperative for excellent security. At this point, many of you may be saying to yourselves, “I cannot possibly get control of my facility’s keys when no one has had control of them for years.” This is …

On Strike

Hidden Costs of Security Problems

Tasha Dyson, CFECrisis Management Planning, Security Program Development

What are the hidden costs of security problems? On Wednesday, April 10, 2013, staff members at the Louvre in Paris staged a protest, and the museum did not open. (Read the full story from the BBC here.) They were not protesting about wages, benefits, or hours. They were protesting about a security problem. Pickpockets are apparently a huge problem at …

Lone Star College

Lessons from Lone Star College System

Tasha Dyson, CFENews, Security Program Development, Workplace Violence

On January 22, 2013, gunshots were heard on the North Harris campus of Lone Star College System. It was later learned that an altercation between two individuals (one of whom may have been a student) had escalated to gun violence. The shooters were injured along with an innocent bystander. Incidents such as this immediately bring to mind topics such as …