top of page

􏰁JLBC Signing-in􏰂 visitors. Log-in procedures provide:


􏰁JLBC Signing-in􏰂 visitors. Log-in procedures provide:

Accountability of staff and visitors.

In an emergency, security is aware of all occupied work areas.

Compliance with employer and security guidelines.

Discourages unauthorized personnel.

Encourages security/employee interaction.

Electronic Access Control (Alarms)

Electronic access and control equipment can protect and cover a larger area than a security Guard. Alarm systems typically are set up to receive or report signals in four different ways:

Local alarm. Signals an 􏰁alert􏰂 at a specific place (e.g., point of entry) only.

Proprietary termination: Internal alarm only.

Direct termination. It is connected directly with appropriate responding authorities, such as the police.

Central station. Alarm signals are automatically routed to a monitoring station, which investigates the movement and contacts the police or other authorities to respond as appropriate.

Threat Potential: Identification and assessment of possible risks and hazards to determine the level of access control necessary. Differing threat potentials imply different levels of security.

Determining threat potentials:

Demographics

Type of industry

Occupants􏰀 function

Available resources

Types of Threats

Sabotage: Espionage: Terrorism:

Treachery and subversive tactics to damage or disable equipment or property. Surveillance, infiltration, and spying to steal secret materials. Acts that cause apprehension, panic, and fear.

Generally, sabotage, espionage, and terrorism are thought of in global and political terms. However, these are common threats to many 􏰁local􏰂 businesses or government institutions. In each case, they disrupt normal operations, reduce efficiency, and may result in other security risks.

0 views0 comments