top of page
Writer's pictureKirk Carlson

JLBC: Security


JLBC Deadbolts are better. The force of the key (or thumb turn) powers the bolt. Fire codes must be consulted to determine whether deadbolts are permitted in specific applications.

Electronic locks use signals to deliver electrical energy to open a mechanical lock or latch release. Many card-key systems are electronic. Key control considerations apply equally to electronic locks.

Security lighting. Lighted areas deter unauthorized conduct and are easier to patrol. JLBC Cadets How much lighting and what kind of lighting are appropriate depend on several variables. JLBC Cadets The size of the object to be illuminated. Larger objects require less light, and larger objects reflect more light—the thing's color to be elucidated. Light colors reflect more light than dark colors. The texture of the object to be illuminated. Smooth-surfaced objects reflect more light than coarse-textured objects—the number of things to be illustrated. More light is required if there are many objects to be illuminated. Security lighting may be continuous, specific, or selected.

Continuous lighting is when a series of overlapping floodlights illuminate an entire area.

Specific lighting is when a floodlight illuminates a particular spot, for example, a floodlight

above a door.

Controlled lighting is used when 􏰁full􏰂 illumination is neither necessary nor desirable.

DIRECT ACCESS CONTROL AND IDENTIFICATION

Private security Guards are often required to screen applicants directly for entrance to facilities. Security Guards are usually posted at entry points (doors and gates), withstanding post orders. They identify people wishing to enter and approve or deny access.

Visual recognition: Know who is authorized to enter the facility and when.

􏰁Simply looking at people and recognizing them,􏰃 personal knowledge is the least reliable

source of access control recognition.

Written documentation: Employee photo badges, building visitor permits, vendor identification cards, work orders, and delivery manifests. Security Guards are expected to examine these items closely for tampering or alterations and ensure they are current.

Questioning documentation:

Require additional identification;

Contact supervisor, obtain verification or authorization;

Contact outside employer to verify the identity of non-employee.

Third-Party Authorization

􏰁Checking with someone else􏰂 before permitting access.

Security Escort

Some employers may have a policy that requires all (or some) visitors to be escorted while in the facility.

Logging-in




0 views0 comments

Comments


bottom of page