School security: back to basics

June 2007 Integrated Solutions

It is easy to say there is an optimal security strategy for all schools and education facilities. Common sense tells us that it is not possible.

Risks can range from gang-related violence in one school, to armed students in another, to computer theft by students in another.

Schools need to identify what it is they want to protect. Is it teachers and students or is it the high-tech equipment? Usually, it is all three. They then need to identify who or what is the threat. This needs to be done carefully as few schools can afford a security solution that protects against all likely or possible incidents.

The potential security plan must incorporate the limitations of the school or university so that strengths, weaknesses and environmental conditions are provided for. Is it an old or new building? Are the windows barred? Is there an alarm? How many key holders are there? Are there gangs in the area? Is there a problem with students carrying guns or knives? Is the local crime rate high? What type of access control is required? Should it include the status of fees etc?

So where do we start? It is back to basics to design the security requirements for a school, or for that matter, any business head office or factory complex. An accurate base line security audit needs to be done. This must include a complete list of assets that are listed by room, area, department, classroom, media centres, laboratories, etc. This register must include serial numbers, photographs of items and proper descriptions. Every building on a campus should be listed. This can be an arduous task.

Morris Maram, MD of Emergency Reaction Services set out to find a working solution for this. He commissioned the writing of a computer asset register management program that could be used as part of the base line security audit for both businesses and educational facilities. After consultations with the doyens of the insurance industry, the program would ensure that the software contained all the requirements required by insurance companies to speedily complete any claims they might receive.

The program lists both the existing security elements in place such as alarms, burglar bars etc. as well as all assets. The assets are listed together with pictures, serial numbers, descriptions, values and copies of purchase invoices and locations. The program also includes listing motor vehicles, lawn mowers, tractors, etc. The program could speedily print out the information required for a claim form in the event of a robbery or vandalism.

The program includes a separate database section to store student names, addresses, photos, exam reports, qualifications, etc. It also includes students' guardian's names and next of kin, their contact numbers and who is allowed to collect children from school. This will prevent the tragedies that have occurred in the past. Morris Maram says: "The program can be customised for each school with the database requirements set up to include the schools individual needs."

For more information contact Emergency Reaction Services, +27 (0)11 234 6000, [email protected], www.emergencyreaction.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
Using advanced surveillance technology as a smart city enabler
Duxbury Networking Integrated Solutions Surveillance
Smart cities are increasingly becoming a focus area for African governments and companies. However, the transition to these environments does not come without challenges, especially when it comes to security and resource management.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Technologies Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Dynamic Dashboard enhances security and operational efficiency
Suprema neaMetrics Products & Solutions Integrated Solutions Residential Estate (Industry)
In today’s data-driven world, security systems are overwhelmed by an unprecedented volume of data, from video surveillance and access control logs to intrusion alerts and a variety of IoT sensor data.

Read more...