As the end of the school year approaches, it’s not over for some children. While some choose to take classes for Advanced Placement courses, an increasing number of students across the country, reading and math are replacing swimming and video games as more children and teenagers are being told they have to go to summer school in order to pass to the next grade level
With increased interest in school safety, many K-12 administrators are more involved in the details of school security systems. While much discussion is on topics such as funding, lock-downs and other security and safety issues, access control is understandably also now a topic of keen interest.
Although no program can be 100% effective against a well-armed and determined attacker, there are some best practices that will help you secure your K-5 school entrances. The object of these strategies is to delay entry of an assailant long enough for police to respond and for school administrators to communicate with teachers and campus staff so they can lockdown their classrooms or evacuate, depending on the situation.
Here are some best practices you should consider:
- Conduct a site assessment to determine your campus’ risk and access control profile.
- Install fences that are difficult to cut or climb, such as welded wire with blunt top projections or tubular steel with top projections. Avoid chain link fences.
- Place doors in locations that can be seen and supervised.
- Install door hardware, handles, locks and thresholds that are institutional grade because of the wear and tear experienced in campus environments.
- Budget permitting, install sensors that alert campus staff when a door is left open.
- At the beginning of the school day when several doors are open so that students can get to class on time, all of the entrances should be monitored by teachers, security staff or administrators.
- When classes begin, the front office should be the only point of entry or exit from the campus. All of the other doors should be closed and locked.
- If possible, have a vestibule with two door entrances: one to the school and the other to the front office. The door that accesses the school should be locked. Visitors should be forced to go to the front office to check in.
- An intercom with a camera can be used by school staff to visually verify a guest’s identity and reason for entering campus before they are allowed access to the office. Budget permitting, ballistic plastic can be installed to provide greater protection to staff. When installed properly, this solution can maintain a welcoming and open appearance.
- Provide office staff with some form of emergency notification technology so they can let others on campus know when there is a threat.
- Provide office staff with a panic alarm they can activate during an emergency.
- Use a visitor management system to verify that guests are authorized to visit the campus. Sign-in guest logs are the least expensive but can be illegible and don’t guarantee privacy. Software solutions can check to determine if a guest is a registered sex offender and can integrate with card access systems.
- Be certain parents and staff inform school officials about individuals who might pose a threat (involving custody disputes, domestic violence, etc.).
- Train teachers, staff, custodians and administrators on the importance of access control and how to monitor access points. Also, train them on emergency preparedness and conduct drills with students. Be sure staff, teachers and administrators are trained in the National Incident Management System (NIMS) and Incident Command System (ICS).
- Develop relationships with first responders (police, fire and EMS) and conduct drills or exercises so campus staff can practice emergency preparedness skills. First responders should also have easy and immediate access to building plans and layouts so they can quickly shut off power, HVAC, etc., during an incident.
- Use radio frequency access control devices to allow rapid entry onto campus grounds by emergency responders.
via Campus Safety Magazine and Security Consultants Randy Atlas (www.cpted-security.com), Jim Grayson (firstname.lastname@example.org) and Stephan Hoban (email@example.com), Contributors to the article