Balancing Public Safety and Convenience

Security might best be achieved by considering employee needs.
Published: October 18, 2010

What causes a solid security program to break down? It may be easy to think that security is compromised by criminal minds who observe our facilities from the darkness in an effort to uncover their underlying vulnerabilities. The reality is often quite different. Good, honest, well meaning employees often create unintended breaches in our security plans out of convenience.  Often these acts of convenience are seen as improving work efficiency.    

Opening a safe door for each individual transaction is time consuming. Work can be faster and more efficient by leaving the safe door open – out of convenience.

Smoking is often confined to areas located outside a secure perimeter door. Entering the access code is time consuming so employees may prop the door open – out of convenience. The list of examples is endless.

So here’s the theory: Well intentioned and honorable employees can create small breaches in security, which are later exploited by persons who have or develop criminal intent. Our job as security professionals is often seen as identifying those breaches and finding ways to stop their continuance.

——Article Continues Below——

Get the latest industry news and research delivered directly to your inbox.

If a safe door is left open, we install an electronic device that triggers an annoying noise maker that will buzz until the safe is properly secured. The propped door can be handled by installing a door-ajar alarm that reports to an internal monitoring station. An intercom and a video camera can be added to rapidly observe and correct transgressions.

Organizations can toughen policy and create dazzling security awareness programs, but, we may be missing a vital piece of the puzzle. Security may best be achieved by considering employee needs.

Employee needs for convenience and operational efficiency should be identified and accommodated as an integral part of any security program. Two-way communication that involves employees directly in the security planning process can help eliminate the efficiency robbing annoyances that often compromise campus security. 

This process will have the added advantage of increased security awareness among employees. Thus, if the chains and padlocks used to secure perimeter gates are routinely left unlocked on weekends, it might make sense to create a single designated, well lit, self closing, proximity card access controlled gate. This change might resolve the issue without compromising security, unless there is some other need, yet to be identified.

Ongoing communication is the key. 

ADVERTISEMENT
ADVERTISEMENT
Strategy & Planning Series
Strategy & Planning Series
Strategy & Planning Series
Strategy & Planning Series
Strategy & Planning Series