Skyscraper Security Mgt.Skyscraper Security Mgt. Part IPart I
By, Richard GarrityBy, Richard Garrity
2
Skyscraper Security Mgt.Skyscraper Security Mgt.
Access Control Procedures-Access Control Procedures- Part IPart I
3
High Rise Access ControlHigh Rise Access Control
This presentation is
proprietary information and
can’t be copied or rep...
4
How High Can We Reach?How High Can We Reach?
5
The past reflects on the new…The past reflects on the new…
6
Los Angeles night skylineLos Angeles night skyline
7
Pershing Square, Los Angeles, CA.Pershing Square, Los Angeles, CA.
8
New York City SkylineNew York City Skyline
9
International Place, Boston, MA.International Place, Boston, MA.
10
Atlantic Ave, Boston, MA.Atlantic Ave, Boston, MA.
11
Seattle, Washington skylineSeattle, Washington skyline
12
100 Summer St, Boston, MA.100 Summer St, Boston, MA.
13
TheThe “Superman”“Superman” buildingbuilding
Providence, R.I.Providence, R.I.
14
Hong Kong skyline at nightHong Kong skyline at night
15
High Rise Lobby Operations:High Rise Lobby Operations:
Definitions and Purpose:Definitions and Purpose:
16
High Rise Access ControlHigh Rise Access Control
The purpose of this slide presentationThe purpose of this slide presen...
17
High Rise Access ControlHigh Rise Access Control
This presentation looks at theThis presentation looks at the
various m...
18
This presentation will focus on 7This presentation will focus on 7
primaryprimary operational objectives:operational ob...
19
Corporate Security:Corporate Security:
A valued industry earningA valued industry earning
more respect everydaymore res...
20
100 Summer Street, Boston:100 Summer Street, Boston:
Your building lobby reflects your commitmentYour building lobby re...
21
Brief History of theBrief History of the
American Office Tower:American Office Tower:
 The Park Street Church in Bosto...
22
Building Class Definitions:Building Class Definitions:
23
Building Class Definitions:Building Class Definitions:
For the purposes of comparison,For the purposes of comparison,
o...
24
Building Class Definitions:Building Class Definitions:
Class AClass A
Most prestigious buildingsMost prestigious buildi...
25
Building Class Definitions:Building Class Definitions:
Class BClass B
Buildings competing for a wideBuildings competing...
26
Building Class Definitions:Building Class Definitions:
Class CClass C
Building owners competing forBuilding owners comp...
27
High Rise VS. Mid RiseHigh Rise VS. Mid Rise
Low Rise-Low Rise- is a building that is only ais a building that is only ...
28
The origin ofThe origin of “Skyscraper”“Skyscraper”
The wordThe word "skyscraper""skyscraper" originallyoriginally
was ...
29
Different Levels of Access Control:Different Levels of Access Control:
30
Different Levels of Access Control:Different Levels of Access Control:
Open Access-Open Access- this is an environmentt...
31
Different Levels of Access Control:Different Levels of Access Control:
Limited Access:Limited Access: this is an enviro...
32
Different Levels of Access Control:Different Levels of Access Control:
Security personnel are prettySecurity personnel ...
33
Different Levels of Access Control:Different Levels of Access Control:
Restricted Access:Restricted Access: this is ant...
34
Different Levels of Access Control:Different Levels of Access Control:
Restricted Access:Restricted Access:
Employees w...
35
Restricted Access Continued:Restricted Access Continued:
Visitors to the building maybeVisitors to the building maybe
s...
36
Restricted Access Continued:Restricted Access Continued:
AA Visitors badgeVisitors badge should always beshould always ...
37
Worker replaces light bulb on top ofWorker replaces light bulb on top of
the eagle-the eagle- Chrysler Building, NYChry...
38
Notre Dame- GargoylesNotre Dame- Gargoyles
watching overwatching over Paris, FranceParis, France
39
Definition: Physical Security:Definition: Physical Security:
40
Definition: Physical Security:Definition: Physical Security:
Physical security describes both
measures that are designe...
41
Definition: Physical Security:Definition: Physical Security:
It can be as simple as a locked door
or as elaborate as mu...
42
Policies and Procedures:Policies and Procedures:
43
Policies and Procedures:Policies and Procedures:
It's really easy toIt's really easy to overlookoverlook lobbieslobbies...
44
Policies and Procedures:Policies and Procedures:
Balancing the rightBalancing the right
environment with the rightenvir...
45
Policies and Procedures:Policies and Procedures:
As new threats present themselves andAs new threats present themselves...
46
Policies and Procedures:Policies and Procedures:
We are in a whole new age, aWe are in a whole new age, a
new world, wh...
47
Policies and Procedures:Policies and Procedures:
Defining and implementingDefining and implementing policiespolicies
an...
48
General Strategies:General Strategies:
49
Developing a comprehensive security trainingDeveloping a comprehensive security training
program for all employees is o...
50
High Rise Access ControlHigh Rise Access Control
Restrict the flow ofRestrict the flow of
pedestrian traffic into a fac...
51
General Strategies:General Strategies:
But, a hands on proactiveBut, a hands on proactive securitysecurity
managermanag...
52
General Strategies:General Strategies:
Enforce that visitorsEnforce that visitors
wear Visitor badges:wear Visitor badg...
53
General Strategies:General Strategies:
Ensure visitors are not left alone:Ensure visitors are not left alone:
It may no...
54
Access Control PrioritiesAccess Control Priorities
55
Access Control Priority 1Access Control Priority 1
Priority number 1Priority number 1 in any restrictedin any restricte...
56
Access Control Priority 2Access Control Priority 2
Priority number 2Priority number 2 in any restricted orin any restri...
57
Incident- Case Spotlight:Incident- Case Spotlight:
On December 14On December 14thth
, 2008, 2008 in Britishin British
C...
58
Incident- Case Spotlight:Incident- Case Spotlight:
The Banky- Kirpatrick IncidentThe Banky- Kirpatrick Incident
This ac...
59
Incident- Case Spotlight:Incident- Case Spotlight:
The Banky- Kirpatrick IncidentThe Banky- Kirpatrick Incident
Regardl...
60
Incident- Case Spotlight:Incident- Case Spotlight:
The Banky- Kirpatrick IncidentThe Banky- Kirpatrick Incident
That ma...
61
Employee Identification:Employee Identification:
62
Properly checkingProperly checking employeeemployee
ID’sID’s and processing otherand processing other
identification fr...
63
““Rejected Access”Rejected Access” Card Alerts:Card Alerts:
64
If a building access card isIf a building access card is
coming up ascoming up as “rejected”“rejected” onon
youryour fa...
65
Are there after-hoursAre there after-hours weakweak entry pointsentry points
that could compromise yourthat could compr...
66
High Rise Access Control-High Rise Access Control-
Monitoring yourMonitoring your Lobby / VisitorsLobby / Visitors
67
Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
The primary concern is the securityThe primary concern...
68
Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
In the grand scheme of things,In the grand scheme of t...
69
Your eyes should not be taken off theYour eyes should not be taken off the
general view of the lobby perimeter, notgene...
70
These access control protocols are fairlyThese access control protocols are fairly
standard throughout the building sec...
71
There are several methods of employeesThere are several methods of employees
entering a building and gaining access.ent...
72
3. Swiping your employee ID into a3. Swiping your employee ID into a
scanner or reader that activatesscanner or reader ...
73
5. Gaining access into a facility5. Gaining access into a facility
usingusing bio-metrics-bio-metrics- the eye-the eye-...
74
ToTo re-cap,re-cap, we should stress thatwe should stress that
lobby security personnel shouldlobby security personnel ...
75
Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
Individuals,Individuals, who fail towho fail to
comply...
76
Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
““If several attempts to have theIf several attempts t...
77
Those access control moments:Those access control moments:
78
Those access control moments:Those access control moments:
If during the course of your accessIf during the course of y...
79
Those access control moments:Those access control moments:
What do I do if an anxiousWhat do I do if an anxious
employe...
80
Those access control moments:Those access control moments:
Absolutely not.Absolutely not. Although we are supposeAlthou...
81
Those access control moments:Those access control moments:
Examples to remedy the situation:Examples to remedy the situ...
82
Those access control moments:Those access control moments:
Examples to remedy the situation:Examples to remedy the situ...
83
Those access control moments:Those access control moments:
3. If both of these measures have3. If both of these measure...
84
Just who is in your lobby?Just who is in your lobby?
85
Just who is in your lobby?Just who is in your lobby?
The very essence ofThe very essence of access controlaccess contro...
86
The Access Control Motto:The Access Control Motto:
“NO ID…No Entrance”“NO ID…No Entrance”
87
Your client buildingYour client building
Management Team:Management Team:
88
Your client building Mgt. Team:Your client building Mgt. Team:
Site Critical Directive:Site Critical Directive:
Never h...
89
Unauthorized building entries:Unauthorized building entries:
90
High Rise Access ControlHigh Rise Access Control
Priority number 3Priority number 3--
In the event that anIn the event ...
91
High Rise Access ControlHigh Rise Access Control
NEVERNEVER place your hands on the subject to stopplace your hands on ...
92
High Rise Access ControlHigh Rise Access Control
This general interdiction policy if anThis general interdiction policy...
93
High Rise Access ControlHigh Rise Access Control
Maintain constantMaintain constant radioradio
contact, follow from aco...
94
High Rise Access ControlHigh Rise Access Control
More in depth instructions onMore in depth instructions on
how to deal...
95
Is your lobby area well observed?Is your lobby area well observed?
What is wrong with this lobby?What is wrong with thi...
96
1. There is an individual shooting or filming1. There is an individual shooting or filming
the lobby- far left.the lobb...
97
Image Reproduction:Image Reproduction:
98
Absolutely noAbsolutely no image reproductionimage reproduction either byeither by
devices like cameras, cell phones, o...
99
Legal Restraining Orders:Legal Restraining Orders:
100
Security personnel must beSecurity personnel must be
cognizant of employees that havecognizant of employees that have
...
101
They also must be kept well within theThey also must be kept well within the
scope of your eyes only and not thescope ...
102
Chain of Command section:Chain of Command section:
103
A command hierarchy (chain of
command) is a group of people
dedicated to carrying out orders
"from the top", that is, ...
104
In general,In general, security supervisorssecurity supervisors andand securitysecurity
managersmanagers give orders o...
105
Security personnel who have a direct
supervisor should report only to that
individual and only that individual on all
...
106
Although there is an established chain of
command just about anywhere you go in the
working world, that does not mean ...
107
It is disagreements and the complaint
process that becomes the problem when
subordinates do not adhere to the chain
of...
108
-have the right to start going to all kinds
of people above that supervisor and
making waves about something you
have ...
109
Chain of CommandChain of Command
The “Client”The “Client”
110
“If I don’t get my way, I will just run to the
client and complain to them. They like
me, I have been here for years. ...
111
Certain select management team
members in contract security
communicate directly with the client
team at your facility...
112
Do we in management expect you to
effectively communicate with your client
team members and maintain a healthy
working...
113
If you choose to continually ignore the
chain of command or you have a habit of
running to the client on matters that ...
114
Access control perspective from theAccess control perspective from the
Sears Tower Security Director:Sears Tower Secur...
115
Excerpts from the May 2007Excerpts from the May 2007
edition ofedition of Security ManagementSecurity Management
116
Excerpts from theExcerpts from the May 2007May 2007
edition ofedition of Security ManagementSecurity Management
Chicag...
117
Excerpts from theExcerpts from the May 2007May 2007
edition ofedition of Security ManagementSecurity Management
Howeve...
118
Excerpts from theExcerpts from the May 2007May 2007
edition ofedition of Security ManagementSecurity Management
““When...
119
Excerpts from theExcerpts from the May 2007May 2007
edition ofedition of Security ManagementSecurity Management
When K...
120
““Striking the balance”Striking the balance”
Now, however, security’s approach isNow, however, security’s approach is
...
121
““Striking the balance”Striking the balance”
Training.Training. The state of Illinois requires thatThe state of Illino...
122
Customer Service aspects:Customer Service aspects:
One module of the officer training is aOne module of the officer tr...
123
Customer Service aspects:Customer Service aspects:
The new look for officers includes navy-The new look for officers i...
124
Customer Service aspects:Customer Service aspects:
Previously, says Kambic, officers rarelyPreviously, says Kambic, of...
125
ADA Act of 1990- 2010 UpdateADA Act of 1990- 2010 Update
126
2010 Update- Service Animals2010 Update- Service Animals
127
2010 Update- Service Animals2010 Update- Service Animals
As professional and corporate securityAs professional and cor...
128
2010 Update- Service Animals2010 Update- Service Animals
Federal ADA (Americans w/ DisabilitiesFederal ADA (Americans ...
129
2010 Update- Service Animals2010 Update- Service Animals
TheThe Department of JusticeDepartment of Justice publishedpu...
130
2010 Update- Service Animals2010 Update- Service Animals
1. Beginning on March 15, 2011, only
dogs are recognized as s...
131
Service Animals Defined:Service Animals Defined:
Service animals are defined as dogs that are
individually trained to ...
132
Service Animals Defined:Service Animals Defined:
This definition does not affect or limit the
broader definition of “a...
133
Service Animals Defined:Service Animals Defined:
Under the ADA, State and local
governments, businesses, and
nonprofit...
134
Service Animals Defined:Service Animals Defined:
For example, in a hospital it would
be inappropriate to exclude a
ser...
135
Service Animals- Control:Service Animals- Control:
Under the ADA, service animals must be
harnessed, leashed, or tethe...
136
Asking Questions. Be careful.Asking Questions. Be careful.
137
Service Animals- Questions:Service Animals- Questions:
When it is not obvious what
service an animal provides,
only li...
138
Service Animals- Questions:Service Animals- Questions:
(2) what work or task has the dog
been trained to perform. Staf...
139
Service Animals- Questions:Service Animals- Questions:
Allergies and fear of dogs are not valid
reasons for denying ac...
140
Service Animals- Questions:Service Animals- Questions:
A person with a disability cannot be asked
to remove his servic...
141
Service Animals- Questions:Service Animals- Questions:
Establishments that sell or prepare
food within your building f...
142
Service Animals- Questions:Service Animals- Questions:
 People with disabilities who use
service animals cannot be is...
143
~The Sears Tower Lobby~~The Sears Tower Lobby~
(What do you notice in this picture?)(What do you notice in this pictur...
144
YourYour main lobby.main lobby. The nerve centerThe nerve center
of your entire security programof your entire securit...
145
Always takeAlways take PridePride in your buildingin your building
lobbies and keep them clean!lobbies and keep them c...
146
Access Control measures will alwaysAccess Control measures will always
includeinclude “Tenant”“Tenant” door checks.doo...
147
That includesThat includes exteriorexterior entrances &entrances &
common areas of your facilitycommon areas of your f...
148
Effective access control starts with greatEffective access control starts with great
Customer Service…Customer Service…
149
……and not treating visitors or employees likeand not treating visitors or employees like
they are at an armed checkpoi...
150
Protecting your client’s building &Protecting your client’s building &
employees is one of youremployees is one of you...
151
Personnel should maintain a neat,Personnel should maintain a neat,
clean, and visually attractive front desk.clean, an...
152
Building exteriors:Building exteriors:
153
Security staff personnel should on aSecurity staff personnel should on a
periodic basis make visualperiodic basis make...
154
““Secondary”Secondary” entrances are just asentrances are just as
important as yourimportant as your primaryprimary en...
155
If your building has a standard practice of flying theIf your building has a standard practice of flying the
American ...
156
Take Pride in your uniform and yourselfTake Pride in your uniform and yourself
157
All members of the building Mgt. TeamAll members of the building Mgt. Team
are responsible forare responsible for safe...
158
~Striving to be the~Striving to be the “Best”“Best” starts with beingstarts with being
Well Trained, Alert, & Knowledg...
159
The beginning of this presentation askedThe beginning of this presentation asked “How“How
high can we reach?”high can ...
160
As high as we want~As high as we want~
161
Recommended Reading:Recommended Reading:
162
Thank you for attending today’sThank you for attending today’s
presentation on access controlpresentation on access co...
163
Upcoming SlideShare
Loading in …5
×

Skyscraper Security Mgt.-Access Control Policies, By- Richard Garrity

1,840 views

Published on

Published in: Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,840
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Skyscraper Security Mgt.-Access Control Policies, By- Richard Garrity

  1. 1. Skyscraper Security Mgt.Skyscraper Security Mgt. Part IPart I By, Richard GarrityBy, Richard Garrity
  2. 2. 2 Skyscraper Security Mgt.Skyscraper Security Mgt. Access Control Procedures-Access Control Procedures- Part IPart I
  3. 3. 3 High Rise Access ControlHigh Rise Access Control This presentation is proprietary information and can’t be copied or reproduced in any fashion without consent from the publisher owner, Richard Garrity
  4. 4. 4 How High Can We Reach?How High Can We Reach?
  5. 5. 5 The past reflects on the new…The past reflects on the new…
  6. 6. 6 Los Angeles night skylineLos Angeles night skyline
  7. 7. 7 Pershing Square, Los Angeles, CA.Pershing Square, Los Angeles, CA.
  8. 8. 8 New York City SkylineNew York City Skyline
  9. 9. 9 International Place, Boston, MA.International Place, Boston, MA.
  10. 10. 10 Atlantic Ave, Boston, MA.Atlantic Ave, Boston, MA.
  11. 11. 11 Seattle, Washington skylineSeattle, Washington skyline
  12. 12. 12 100 Summer St, Boston, MA.100 Summer St, Boston, MA.
  13. 13. 13 TheThe “Superman”“Superman” buildingbuilding Providence, R.I.Providence, R.I.
  14. 14. 14 Hong Kong skyline at nightHong Kong skyline at night
  15. 15. 15 High Rise Lobby Operations:High Rise Lobby Operations: Definitions and Purpose:Definitions and Purpose:
  16. 16. 16 High Rise Access ControlHigh Rise Access Control The purpose of this slide presentationThe purpose of this slide presentation is to give security professionals a moreis to give security professionals a more profound meaning and understandingprofound meaning and understanding to the specifics of high and mid riseto the specifics of high and mid rise office tower access control.office tower access control. The information contained herein isThe information contained herein is proprietary and not to be copy-writtenproprietary and not to be copy-written in any manor or fashion.in any manor or fashion.
  17. 17. 17 High Rise Access ControlHigh Rise Access Control This presentation looks at theThis presentation looks at the various measures and bestvarious measures and best practices for lobby and receptionpractices for lobby and reception area security, including differentarea security, including different types of technology and systemstypes of technology and systems that can aid in access control.that can aid in access control. However, the core element toHowever, the core element to access control is the securityaccess control is the security personnel assigned to protect ourpersonnel assigned to protect our office buildings.office buildings.
  18. 18. 18 This presentation will focus on 7This presentation will focus on 7 primaryprimary operational objectives:operational objectives: 1. Building Class Definitions1. Building Class Definitions 2. Physical Security/ Procedures2. Physical Security/ Procedures 3. General Strategies3. General Strategies 4. Monitoring your lobby & visitors4. Monitoring your lobby & visitors 5. Chain of command5. Chain of command 6.6. Segment from the Sears tower directorSegment from the Sears tower director 7.7. ADA Act-ADA Act- Service Animals GuidelinesService Animals Guidelines
  19. 19. 19 Corporate Security:Corporate Security: A valued industry earningA valued industry earning more respect everydaymore respect everyday
  20. 20. 20 100 Summer Street, Boston:100 Summer Street, Boston: Your building lobby reflects your commitmentYour building lobby reflects your commitment to excellence & qualityto excellence & quality
  21. 21. 21 Brief History of theBrief History of the American Office Tower:American Office Tower:  The Park Street Church in Boston was theThe Park Street Church in Boston was the tallest building in America from the yearstallest building in America from the years 1810-1846 @ 217 feet.1810-1846 @ 217 feet.  The first steel framed skyscraper in theThe first steel framed skyscraper in the United States was the 10 story HomeUnited States was the 10 story Home Insurance Building- Chicago in 1885.Insurance Building- Chicago in 1885.  The Twin Towers in New York were builtThe Twin Towers in New York were built to last 500 years. They lasted just 29 years~to last 500 years. They lasted just 29 years~
  22. 22. 22 Building Class Definitions:Building Class Definitions:
  23. 23. 23 Building Class Definitions:Building Class Definitions: For the purposes of comparison,For the purposes of comparison, office space is grouped intooffice space is grouped into threethree classesclasses in accordance with one of twoin accordance with one of two alternative bases:alternative bases: metropolitanmetropolitan andand international. These classes representinternational. These classes represent a subjective quality rating of buildingsa subjective quality rating of buildings which indicates the competitive abilitywhich indicates the competitive ability of each building to attract similarof each building to attract similar types of tenants.types of tenants.
  24. 24. 24 Building Class Definitions:Building Class Definitions: Class AClass A Most prestigious buildingsMost prestigious buildings competing for premier office userscompeting for premier office users with rents above average for thewith rents above average for the area. Buildings have high qualityarea. Buildings have high quality standard finishes, state of the artstandard finishes, state of the art systems, exceptional accessibilitysystems, exceptional accessibility and a definite market presence.and a definite market presence.
  25. 25. 25 Building Class Definitions:Building Class Definitions: Class BClass B Buildings competing for a wideBuildings competing for a wide range of users with rents in therange of users with rents in the average range for the area. Buildingaverage range for the area. Building finishes are fair to good for the areafinishes are fair to good for the area and systems are adequate, but theand systems are adequate, but the building does not compete withbuilding does not compete with Class A at the same price.Class A at the same price.
  26. 26. 26 Building Class Definitions:Building Class Definitions: Class CClass C Building owners competing forBuilding owners competing for tenants requiring functionaltenants requiring functional office space at rents below theoffice space at rents below the average for the market area.average for the market area. *Cite: Data provided by BOMA
  27. 27. 27 High Rise VS. Mid RiseHigh Rise VS. Mid Rise Low Rise-Low Rise- is a building that is only ais a building that is only a few stories tall.few stories tall. Mid Rise-Mid Rise- is any building that isis any building that is generally 8-10 stories tall.generally 8-10 stories tall. High Rise-High Rise- is any building that isis any building that is generally 10-14 stories or tallergenerally 10-14 stories or taller depending on the urban skyline.depending on the urban skyline.
  28. 28. 28 The origin ofThe origin of “Skyscraper”“Skyscraper” The wordThe word "skyscraper""skyscraper" originallyoriginally was a nautical term referring to awas a nautical term referring to a small triangular sail set abovesmall triangular sail set above the skysail on a sailing ship. Thethe skysail on a sailing ship. The term was first applied toterm was first applied to buildings of steel framedbuildings of steel framed construction of at leastconstruction of at least 10 stories10 stories in the late 19th centuryin the late 19th century
  29. 29. 29 Different Levels of Access Control:Different Levels of Access Control:
  30. 30. 30 Different Levels of Access Control:Different Levels of Access Control: Open Access-Open Access- this is an environmentthis is an environment where employees and visitors can enterwhere employees and visitors can enter the building without restriction orthe building without restriction or limitations during normal businesslimitations during normal business hours. They are free to proceed to theirhours. They are free to proceed to their destination withoutdestination without challenge or signingchallenge or signing in nor are they subject to any bagin nor are they subject to any bag inspections. Although generally, peopleinspections. Although generally, people entering should always beentering should always be monitored andmonitored and eye contacteye contact made, even by a simplemade, even by a simple Hello.Hello.
  31. 31. 31 Different Levels of Access Control:Different Levels of Access Control: Limited Access:Limited Access: this is an environmentthis is an environment where employees, visitors, etc. can enter awhere employees, visitors, etc. can enter a building lobby with little restriction duringbuilding lobby with little restriction during normal business hours. They are free tonormal business hours. They are free to proceed to their destination, however, theyproceed to their destination, however, they are first screened by uniformed securityare first screened by uniformed security personnel as to where they are going.personnel as to where they are going. Employees/ Visitors are not announced orEmployees/ Visitors are not announced or required to sign in, or show an ID.required to sign in, or show an ID.
  32. 32. 32 Different Levels of Access Control:Different Levels of Access Control: Security personnel are prettySecurity personnel are pretty much making a visual screen ofmuch making a visual screen of the person or persons, thenthe person or persons, then directing them to theirdirecting them to their destination. Examples of suchdestination. Examples of such access procedures are:access procedures are: The Empire State Building in New YorkThe Empire State Building in New York and Union Trust Co. in Providence, RIand Union Trust Co. in Providence, RI
  33. 33. 33 Different Levels of Access Control:Different Levels of Access Control: Restricted Access:Restricted Access: this is anthis is an environment where all employees,environment where all employees, visitors, vendors, etc must check in withvisitors, vendors, etc must check in with front desk security/ company personnelfront desk security/ company personnel to be screened. No one without a validto be screened. No one without a valid building issued ID will be allowed tobuilding issued ID will be allowed to proceed past the front desk. Allproceed past the front desk. All employees who have a valid company IDemployees who have a valid company ID can either display the badge to an Officercan either display the badge to an Officer or some lobbies provide some type ofor some lobbies provide some type of electronic swipe or scan to allow them toelectronic swipe or scan to allow them to their intended destination.their intended destination.
  34. 34. 34 Different Levels of Access Control:Different Levels of Access Control: Restricted Access:Restricted Access: Employees who do not have aEmployees who do not have a valid company ID badge or havevalid company ID badge or have forgotten such badge, must sign inforgotten such badge, must sign in with security personnel bywith security personnel by showing some form of ashowing some form of a government ID. They may eithergovernment ID. They may either proceed from there, or they mayproceed from there, or they may have to be announced & escorted.have to be announced & escorted.
  35. 35. 35 Restricted Access Continued:Restricted Access Continued: Visitors to the building maybeVisitors to the building maybe subjected to the following: Theysubjected to the following: They will have to sign in, show a validwill have to sign in, show a valid state issued ID and be announcedstate issued ID and be announced to the perspective tenant they areto the perspective tenant they are visiting. There are various signingvisiting. There are various signing in procedures, within procedures, with EZ LobbyEZ Lobby being the most desirable.being the most desirable.
  36. 36. 36 Restricted Access Continued:Restricted Access Continued: AA Visitors badgeVisitors badge should always beshould always be issued with an expiration date. Someissued with an expiration date. Some lobby operations may require thatlobby operations may require that bag inspectionsbag inspections are made but that isare made but that is extremely rare in the private sector.extremely rare in the private sector. Usually bag inspections and wandingUsually bag inspections and wanding are done when entering aare done when entering a local, state,local, state, or federal building.or federal building.
  37. 37. 37 Worker replaces light bulb on top ofWorker replaces light bulb on top of the eagle-the eagle- Chrysler Building, NYChrysler Building, NY
  38. 38. 38 Notre Dame- GargoylesNotre Dame- Gargoyles watching overwatching over Paris, FranceParis, France
  39. 39. 39 Definition: Physical Security:Definition: Physical Security:
  40. 40. 40 Definition: Physical Security:Definition: Physical Security: Physical security describes both measures that are designed to deny access to individuals from physically accessing a facility, resource, or information stored on physical media, and guidance on how to design structures to resist various hostile acts.
  41. 41. 41 Definition: Physical Security:Definition: Physical Security: It can be as simple as a locked door or as elaborate as multiple layers of barriers, armed or unarmed security officers, and guardhouse placement. Physical security is not a modern phenomenon. Physical security exists in order to deter persons from entering a facility.
  42. 42. 42 Policies and Procedures:Policies and Procedures:
  43. 43. 43 Policies and Procedures:Policies and Procedures: It's really easy toIt's really easy to overlookoverlook lobbieslobbies andand reception areas when it comes toreception areas when it comes to designing and implementing andesigning and implementing an overall security strategy. After all,overall security strategy. After all, security officials have become sosecurity officials have become so focused on protecting what's insidefocused on protecting what's inside and at the core of their facilities, thatand at the core of their facilities, that they often neglect what's in front ofthey often neglect what's in front of them..thethem..the entryways.entryways.
  44. 44. 44 Policies and Procedures:Policies and Procedures: Balancing the rightBalancing the right environment with the rightenvironment with the right mix ofmix of securitysecurity is definitelyis definitely not an easy task, but onenot an easy task, but one that can be mastered.that can be mastered.
  45. 45. 45 Policies and Procedures:Policies and Procedures: As new threats present themselves andAs new threats present themselves and intruders become craftier, moreintruders become craftier, more proactiveproactive security measuressecurity measures are necessary to protectare necessary to protect the front lines of business. It can no longer bethe front lines of business. It can no longer be assumed that security is somethingassumed that security is something implemented once and then forgotten — orimplemented once and then forgotten — or that it is solely the responsibility of onethat it is solely the responsibility of one department. Building personnel and the highdepartment. Building personnel and the high rise office towers we protect, are dependentrise office towers we protect, are dependent on ouron our competencecompetence,, trainingtraining,, diligencediligence,, alertnessalertness,, and most importantly, ourand most importantly, our dedicateddedicated commitment to insure we cancommitment to insure we can safeguard the lobby and premises the bestsafeguard the lobby and premises the best that we can.that we can.
  46. 46. 46 Policies and Procedures:Policies and Procedures: We are in a whole new age, aWe are in a whole new age, a new world, where thenew world, where the corporatecorporate security officersecurity officer is expected tois expected to know building systems, complexknow building systems, complex procedures, and knowledge ofprocedures, and knowledge of certain operating procedurescertain operating procedures thatthat 20 years ago20 years ago were un-were un- applicable and unimaginable.applicable and unimaginable.
  47. 47. 47 Policies and Procedures:Policies and Procedures: Defining and implementingDefining and implementing policiespolicies and proceduresand procedures that are tailoredthat are tailored specifically to your securityspecifically to your security environment can go a long way inenvironment can go a long way in keeping lobbies and reception areaskeeping lobbies and reception areas secure. Here are somesecure. Here are some generalgeneral strategiesstrategies that can help shape thethat can help shape the future and effectiveness of yourfuture and effectiveness of your building security program.building security program.
  48. 48. 48 General Strategies:General Strategies:
  49. 49. 49 Developing a comprehensive security trainingDeveloping a comprehensive security training program for all employees is one of the mostprogram for all employees is one of the most important security measures an organizationimportant security measures an organization can deploy. The training is especially critical forcan deploy. The training is especially critical for front-line staff, such asfront-line staff, such as security officerssecurity officers andand receptionistsreceptionists,, so they have a sophisticatedso they have a sophisticated understanding of the potential risks andunderstanding of the potential risks and vulnerabilities associated with their work areas,vulnerabilities associated with their work areas, and know properand know proper emergency procedures.emergency procedures. * General strategies segment extracted from South Station “JAM”* General strategies segment extracted from South Station “JAM” presentation on March 15presentation on March 15thth , 2006- by Richard Garrity, 2006- by Richard Garrity Provide proper Training:Provide proper Training:
  50. 50. 50 High Rise Access ControlHigh Rise Access Control Restrict the flow ofRestrict the flow of pedestrian traffic into a facility:pedestrian traffic into a facility: Even something as simple as a turnstile, aEven something as simple as a turnstile, a type of gate that allows only one person totype of gate that allows only one person to pass per rotation — can help significantly topass per rotation — can help significantly to manage the flowmanage the flow of traffic into a facility.of traffic into a facility. Another way to restrict the flow of traffic is toAnother way to restrict the flow of traffic is to limit access to the facility with only one or twolimit access to the facility with only one or two entry points that can be closely monitored.entry points that can be closely monitored. However, keep in mind obviously, that theseHowever, keep in mind obviously, that these options may not be financially or aestheticallyoptions may not be financially or aesthetically feasible in any one given environment or anyfeasible in any one given environment or any particular buildingparticular building..
  51. 51. 51 General Strategies:General Strategies: But, a hands on proactiveBut, a hands on proactive securitysecurity managermanager should always introduce, asshould always introduce, as suggestions and alternatives, thesesuggestions and alternatives, these devices during quarterly and or yearlydevices during quarterly and or yearly security operation reviews. In addition, thesecurity operation reviews. In addition, the proactive front line security officer canproactive front line security officer can always provide some of the best accessalways provide some of the best access control suggestions and or updatescontrol suggestions and or updates because they are there everyday andbecause they are there everyday and observe what areobserve what are strengthsstrengths andand weaknessesweaknesses in the building lobby accessin the building lobby access procedures.procedures.
  52. 52. 52 General Strategies:General Strategies: Enforce that visitorsEnforce that visitors wear Visitor badges:wear Visitor badges: A badge offers temporary identification andA badge offers temporary identification and may include, for example, the visitor's name,may include, for example, the visitor's name, date, time and the person they are seeing. Theydate, time and the person they are seeing. They can either be low-tech (handwritten stickycan either be low-tech (handwritten sticky badges) or high-tech (a professional print-outbadges) or high-tech (a professional print-out with color photo). The most effective thus farwith color photo). The most effective thus far has been devices likehas been devices like EZ LobbyEZ Lobby that canthat can document and track a Visitor’s arrival,document and track a Visitor’s arrival, destination, and departure.destination, and departure.
  53. 53. 53 General Strategies:General Strategies: Ensure visitors are not left alone:Ensure visitors are not left alone: It may not be possible to be at a visitor'sIt may not be possible to be at a visitor's side at all times, but, when possible,side at all times, but, when possible, guests should not be left alone unless theyguests should not be left alone unless they have beenhave been properly clearedproperly cleared by the tenantby the tenant contact or have been greeted by the tenantcontact or have been greeted by the tenant contact andcontact and escortedescorted to the confirmedto the confirmed floor, space, and destination. Not only isfloor, space, and destination. Not only is this a polite gesture, it is also a proactivethis a polite gesture, it is also a proactive security measure.security measure.
  54. 54. 54 Access Control PrioritiesAccess Control Priorities
  55. 55. 55 Access Control Priority 1Access Control Priority 1 Priority number 1Priority number 1 in any restrictedin any restricted or even limited access controlor even limited access control environment is thatenvironment is that no oneno one …… no oneno one enters the facility without showing aenters the facility without showing a valid activated company / tenant ID.valid activated company / tenant ID. No visitor or contractor shall ever beNo visitor or contractor shall ever be able to circumvent your access controlable to circumvent your access control procedures, ever!procedures, ever!
  56. 56. 56 Access Control Priority 2Access Control Priority 2 Priority number 2Priority number 2 in any restricted orin any restricted or even limited access control environment is thateven limited access control environment is that any employee who forgets or has lost their IDany employee who forgets or has lost their ID shall not be permitted access orshall not be permitted access or “waived”“waived” in.in. They must sign-in and be approved by saidThey must sign-in and be approved by said Supervisor. No matter how well you maybeSupervisor. No matter how well you maybe acquainted with any given employee, they veryacquainted with any given employee, they very well could have beenwell could have been terminatedterminated the previousthe previous day or even the present day without yourday or even the present day without your knowledge.knowledge.
  57. 57. 57 Incident- Case Spotlight:Incident- Case Spotlight: On December 14On December 14thth , 2008, 2008 in Britishin British Columbia, a man named Eric AllenColumbia, a man named Eric Allen Kirkpatrick shot and killed his former BossKirkpatrick shot and killed his former Boss CEO David BankyCEO David Banky of Tallgrass Distribution at their annual Christmas Party. Kirkpatrick was fired the day before and un-invited. Kirkpatrick was able to gain access as lobby security was used to seeing him everyday and let him thru without an ID verification. (Waved thru).
  58. 58. 58 Incident- Case Spotlight:Incident- Case Spotlight: The Banky- Kirpatrick IncidentThe Banky- Kirpatrick Incident This access oversight very well may have cost Mr. Banky his life. However, several critical notations to this episode must be addressed. Human Resources for this company had failed to properly notify Security officials of Kirkpatrick’s termination in a timely manor. There was no “Pass On” memo.
  59. 59. 59 Incident- Case Spotlight:Incident- Case Spotlight: The Banky- Kirpatrick IncidentThe Banky- Kirpatrick Incident Regardless, if the desk officer had followed procedure and contacted Kirpatrick’s supervisor for access approval, then Security would have been advised that said individual was terminated the day before.
  60. 60. 60 Incident- Case Spotlight:Incident- Case Spotlight: The Banky- Kirpatrick IncidentThe Banky- Kirpatrick Incident That may have not have prevented direct violence by Kirpatrick either there at the lobby area (after denial was communicated) or somewhere else within the building, but it would have given security personnel critical time to call 911 and to significantly reduce the potential casualties to employees. It is also possible that after said denial was given, that he could have left the premises without incident.
  61. 61. 61 Employee Identification:Employee Identification:
  62. 62. 62 Properly checkingProperly checking employeeemployee ID’sID’s and processing otherand processing other identification fromidentification from visitorsvisitors isis one of the mostone of the most criticalcritical dutiesduties a corporate security officera corporate security officer engages in everyday.engages in everyday. Employee Identification:Employee Identification:
  63. 63. 63 ““Rejected Access”Rejected Access” Card Alerts:Card Alerts:
  64. 64. 64 If a building access card isIf a building access card is coming up ascoming up as “rejected”“rejected” onon youryour facility access controlfacility access control screen (C-Cure 800, Spectrumscreen (C-Cure 800, Spectrum software, etc.)software, etc.) DO NOT ignoreDO NOT ignore it,it, investigate it.investigate it. ““Rejected Access”Rejected Access” Card Alerts:Card Alerts:
  65. 65. 65 Are there after-hoursAre there after-hours weakweak entry pointsentry points that could compromise yourthat could compromise your building?building? Your tenants?Your tenants?
  66. 66. 66 High Rise Access Control-High Rise Access Control- Monitoring yourMonitoring your Lobby / VisitorsLobby / Visitors
  67. 67. 67 Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors The primary concern is the securityThe primary concern is the security personnel who take their eyes off thepersonnel who take their eyes off the visitor orvisitor or non clearednon cleared entrants, andentrants, and loose trackloose track of them. This is whereof them. This is where safety, liability, and service qualitysafety, liability, and service quality concerns originate. When all is saidconcerns originate. When all is said and done, professional sharp accessand done, professional sharp access control team members are one of thecontrol team members are one of the top priorities we focus on.top priorities we focus on.
  68. 68. 68 Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors In the grand scheme of things,In the grand scheme of things, when we are taking legitimatewhen we are taking legitimate business calls or assisting a personbusiness calls or assisting a person with directions, or transmitting onwith directions, or transmitting on the Nextel to Engineering, nothingthe Nextel to Engineering, nothing should have yourshould have your attentionattention more,more, than the flow of traffic into yourthan the flow of traffic into your building. Equally vital is the diligentbuilding. Equally vital is the diligent tracking of alltracking of all visitors and vendorsvisitors and vendors who are awaiting processing at anywho are awaiting processing at any givengiven security checkpoint.security checkpoint.
  69. 69. 69 Your eyes should not be taken off theYour eyes should not be taken off the general view of the lobby perimeter, notgeneral view of the lobby perimeter, not for evenfor even 1 second1 second.. Whatever you areWhatever you are doing, whoever you are with, you shoulddoing, whoever you are with, you should be at ALL times, tracking your lobbybe at ALL times, tracking your lobby perimeter and the individuals enteringperimeter and the individuals entering them. This of course also pertains to thethem. This of course also pertains to the scanning or displaying of employeescanning or displaying of employee work ID’s and any other acceptablework ID’s and any other acceptable Identification currently cleared by yourIdentification currently cleared by your Property Management Team.Property Management Team. Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
  70. 70. 70 These access control protocols are fairlyThese access control protocols are fairly standard throughout the building securitystandard throughout the building security industry. However, we must also address theindustry. However, we must also address the current state of physical electronic accesscurrent state of physical electronic access control security measures introduced to highcontrol security measures introduced to high rise buildings in the last 10 years or so. Withrise buildings in the last 10 years or so. With the introduction of fast lane type glassthe introduction of fast lane type glass barriers and turn-styles, lobby securitybarriers and turn-styles, lobby security personnel are not required to be as acutelypersonnel are not required to be as acutely alert as they would normally be with thealert as they would normally be with the traditionaltraditional “show and pass”“show and pass” identificationidentification methods of the past.methods of the past. Let me explain…Let me explain… Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
  71. 71. 71 There are several methods of employeesThere are several methods of employees entering a building and gaining access.entering a building and gaining access. They are:They are: 1.1. Displaying an ID to the desk officer andDisplaying an ID to the desk officer and proceeding to their floor destination.proceeding to their floor destination. 2. Displaying an ID and or scanning it in a2. Displaying an ID and or scanning it in a stationary reader, waiting for a beepstationary reader, waiting for a beep approval (usually aapproval (usually a green lightgreen light) and) and proceeding to their floor destination. Aproceeding to their floor destination. A red lightred light usually means a rejected card,usually means a rejected card, where upon the lobby personnel willwhere upon the lobby personnel will motion the person to stop so the cardmotion the person to stop so the card and or status can be examined.and or status can be examined. Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
  72. 72. 72 3. Swiping your employee ID into a3. Swiping your employee ID into a scanner or reader that activatesscanner or reader that activates access approval from the fast laneaccess approval from the fast lane typetype glass barriers,glass barriers, thus pretty muchthus pretty much by-passing security lobby personnelby-passing security lobby personnel or interaction to achieve saidor interaction to achieve said approval.approval. 4. Executing the same access procedure4. Executing the same access procedure except for the use of theexcept for the use of the turn-styleturn-style type access barriers.type access barriers. Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
  73. 73. 73 5. Gaining access into a facility5. Gaining access into a facility usingusing bio-metrics-bio-metrics- the eye-the eye- retinal scan or pressing yourretinal scan or pressing your thumb into a reader to verifythumb into a reader to verify your on-file fingerprint. This isyour on-file fingerprint. This is especially rare in the privateespecially rare in the private sector and more common insector and more common in federal type facilities.federal type facilities. Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
  74. 74. 74 ToTo re-cap,re-cap, we should stress thatwe should stress that lobby security personnel shouldlobby security personnel should be keenly alert of their lobbybe keenly alert of their lobby perimeter and flow of people atperimeter and flow of people at all times. However, with the useall times. However, with the use of the glass barriers & turn-of the glass barriers & turn- styles, it makes the job a wholestyles, it makes the job a whole lot morelot more manageablemanageable and betterand better toto control.control. Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors
  75. 75. 75 Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors Individuals,Individuals, who fail towho fail to comply with your accesscomply with your access control policies, should becontrol policies, should be asked to leave the premisesasked to leave the premises politely. Do not engage inpolitely. Do not engage in heatedheated disagreementdisagreement oror argumentargument. That approach is. That approach is not recommended, and isnot recommended, and is prohibited.prohibited.
  76. 76. 76 Monitoring your Lobby / VisitorsMonitoring your Lobby / Visitors ““If several attempts to have theIf several attempts to have the individual leave are not realized,individual leave are not realized, you should contact youryou should contact your shiftshift supervisorsupervisor and orand or security managersecurity manager for assistance. They will thenfor assistance. They will then determine if thedetermine if the PolicePolice should beshould be summoned to remove such personsummoned to remove such person who has no clear, legitimatewho has no clear, legitimate business in the facility.”business in the facility.”
  77. 77. 77 Those access control moments:Those access control moments:
  78. 78. 78 Those access control moments:Those access control moments: If during the course of your accessIf during the course of your access control duties, you come across ancontrol duties, you come across an individual who does not have theirindividual who does not have their employee ID but starts with theemployee ID but starts with the “Do you“Do you know who I am”know who I am” salty routine, then firmly,salty routine, then firmly, but politely explain that yes they maybebut politely explain that yes they maybe someone important, but the buildingsomeone important, but the building access control policies apply to ALLaccess control policies apply to ALL building occupants. If they demand tobuilding occupants. If they demand to “speak”“speak” with your supervisor, absolutely,with your supervisor, absolutely, let them.let them.
  79. 79. 79 Those access control moments:Those access control moments: What do I do if an anxiousWhat do I do if an anxious employee states they have lost oremployee states they have lost or forgotten their company ID andforgotten their company ID and we can’twe can’t contactcontact their directtheir direct supervisor for approval? Do wesupervisor for approval? Do we tell them to wait? Come backtell them to wait? Come back some other time?some other time?
  80. 80. 80 Those access control moments:Those access control moments: Absolutely not.Absolutely not. Although we are supposeAlthough we are suppose to engage in strict access controlto engage in strict access control protocols, we are also expected to deliverprotocols, we are also expected to deliver exemplary customer service to all. Theexemplary customer service to all. The remedy to this particular dilemma wouldremedy to this particular dilemma would be if you can’t contact an appropriatebe if you can’t contact an appropriate representative from the employee’srepresentative from the employee’s company to approve access, then takecompany to approve access, then take other alternative measures so that theother alternative measures so that the employee can be processed efficiently.employee can be processed efficiently.
  81. 81. 81 Those access control moments:Those access control moments: Examples to remedy the situation:Examples to remedy the situation: 1. Contact another security officer or1. Contact another security officer or supervisor andsupervisor and escortescort the employeethe employee to their floor, then find an authorizedto their floor, then find an authorized individual who willindividual who will grantgrant access andaccess and take over from there. During thistake over from there. During this escort phase, the employee can’tescort phase, the employee can’t leave your presence until saidleave your presence until said access has been granted.access has been granted.
  82. 82. 82 Those access control moments:Those access control moments: Examples to remedy the situation:Examples to remedy the situation: 2. If you can’t contact the employee’s2. If you can’t contact the employee’s direct supervisor or manager, and andirect supervisor or manager, and an escort is not available at thatescort is not available at that moment, then contact the companymoment, then contact the company receptionist, explain the situationreceptionist, explain the situation and request if someone who isand request if someone who is authorized within the company canauthorized within the company can come down and escort the employee.come down and escort the employee.
  83. 83. 83 Those access control moments:Those access control moments: 3. If both of these measures have3. If both of these measures have not producednot produced the desired result,the desired result, then simply contact your security orthen simply contact your security or property manager and explain theproperty manager and explain the circumstances, this is especiallycircumstances, this is especially important if the employee is late forimportant if the employee is late for work, late for a meeting, orwork, late for a meeting, or extremelyextremely agitated & verbal.agitated & verbal.
  84. 84. 84 Just who is in your lobby?Just who is in your lobby?
  85. 85. 85 Just who is in your lobby?Just who is in your lobby? The very essence ofThe very essence of access controlaccess control starts the moment someone, anyone,starts the moment someone, anyone, entersenters your building. Enters youryour building. Enters your lobby. Even if they do not attempt tolobby. Even if they do not attempt to gain access, who are they? What isgain access, who are they? What is their purpose? Never jump totheir purpose? Never jump to conclusions or assume, but alwaysconclusions or assume, but always watch and learnwatch and learn your surroundings.your surroundings.
  86. 86. 86 The Access Control Motto:The Access Control Motto: “NO ID…No Entrance”“NO ID…No Entrance”
  87. 87. 87 Your client buildingYour client building Management Team:Management Team:
  88. 88. 88 Your client building Mgt. Team:Your client building Mgt. Team: Site Critical Directive:Site Critical Directive: Never hesitate to reach out to anyNever hesitate to reach out to any member of yourmember of your Property Mgt.Property Mgt. TeamTeam for questions you don’t have thefor questions you don’t have the answer to. They know the buildinganswer to. They know the building operations better than anyone andoperations better than anyone and can give you proper guidance whencan give you proper guidance when your immediate supervisor may notyour immediate supervisor may not be available.be available.
  89. 89. 89 Unauthorized building entries:Unauthorized building entries:
  90. 90. 90 High Rise Access ControlHigh Rise Access Control Priority number 3Priority number 3-- In the event that anIn the event that an unauthorizedunauthorized person shouldperson should slip by your post, refuses toslip by your post, refuses to show an ID, or ignores yourshow an ID, or ignores your demands todemands to STOPSTOP, do the, do the following actions & maintainfollowing actions & maintain radio contact:radio contact:
  91. 91. 91 High Rise Access ControlHigh Rise Access Control NEVERNEVER place your hands on the subject to stopplace your hands on the subject to stop them. Make loud and consistent verbalthem. Make loud and consistent verbal commands for the subject tocommands for the subject to STOPSTOP while at thewhile at the same time repeatedly stating the access policy.same time repeatedly stating the access policy. Always try to step in front of the trespasser andAlways try to step in front of the trespasser and block further access, but do not make anyblock further access, but do not make any physical contact. During this time calls forphysical contact. During this time calls for backback upup should be made and ifshould be made and if Police notificationPolice notification isis necessary, dialnecessary, dial 911911 and report the situation.and report the situation. Never lose sight of subject or his/her location.Never lose sight of subject or his/her location.
  92. 92. 92 High Rise Access ControlHigh Rise Access Control This general interdiction policy if anThis general interdiction policy if an intruder breaches your lobby perimeterintruder breaches your lobby perimeter applies also in the event that you catchapplies also in the event that you catch someonesomeone breaking intobreaking into your building oryour building or is in the process of attempting to breakis in the process of attempting to break into your facility.into your facility. “Confront”“Confront” from afrom a distance when it is clear to you that thedistance when it is clear to you that the person you have encountered clearly isperson you have encountered clearly is not authorized to be there.not authorized to be there.
  93. 93. 93 High Rise Access ControlHigh Rise Access Control Maintain constantMaintain constant radioradio contact, follow from acontact, follow from a distance, and try and get asdistance, and try and get as much of a physicalmuch of a physical description of the perpetrator.description of the perpetrator. Safety Safety SafetySafety Safety Safety is youris your foremost concern.foremost concern.
  94. 94. 94 High Rise Access ControlHigh Rise Access Control More in depth instructions onMore in depth instructions on how to deal withhow to deal with unauthorizedunauthorized building intrusions and use ofbuilding intrusions and use of force procedures will be coveredforce procedures will be covered in the Legal Authority/ Uniformin the Legal Authority/ Uniform Protocol training module.Protocol training module.
  95. 95. 95 Is your lobby area well observed?Is your lobby area well observed? What is wrong with this lobby?What is wrong with this lobby?
  96. 96. 96 1. There is an individual shooting or filming1. There is an individual shooting or filming the lobby- far left.the lobby- far left. 2.2. There is an individual clearly takenThere is an individual clearly taken photographs- next to the down escalatorsphotographs- next to the down escalators 3. There is no Mgt. presence in the lobby to3. There is no Mgt. presence in the lobby to question or cease such activity.question or cease such activity. 4.4. There is no Security personnel at the frontThere is no Security personnel at the front desk or visible in the lobby.desk or visible in the lobby. Is your lobby area well observed?Is your lobby area well observed?
  97. 97. 97 Image Reproduction:Image Reproduction:
  98. 98. 98 Absolutely noAbsolutely no image reproductionimage reproduction either byeither by devices like cameras, cell phones, or videodevices like cameras, cell phones, or video cameras are made of your lobby/interiorcameras are made of your lobby/interior premises unless approved bypremises unless approved by PropertyProperty Management.Management. Image reproduction of yourImage reproduction of your exteriorexterior building and grounds should bebuilding and grounds should be strongly discouraged, but legally we can notstrongly discouraged, but legally we can not STOPSTOP someone from photographing thesomeone from photographing the exterior premises.exterior premises. High Rise Access Control-High Rise Access Control-
  99. 99. 99 Legal Restraining Orders:Legal Restraining Orders:
  100. 100. 100 Security personnel must beSecurity personnel must be cognizant of employees that havecognizant of employees that have activeactive “restraining orders”.“restraining orders”. AlwaysAlways check for updates, status, and thecheck for updates, status, and the picture of the person who has thepicture of the person who has the restraining order taken out againstrestraining order taken out against them. These critical updates must bethem. These critical updates must be easily accessible so that staff caneasily accessible so that staff can review such documents.review such documents. Restraining Orders:Restraining Orders:
  101. 101. 101 They also must be kept well within theThey also must be kept well within the scope of your eyes only and not thescope of your eyes only and not the public’s. These types of sensitive legalpublic’s. These types of sensitive legal orders areorders are private and confidentialprivate and confidential,, therefore they should never betherefore they should never be POSTEDPOSTED in an area that could be viewed by nonin an area that could be viewed by non security or non management personnel.security or non management personnel. It is equally vital that these legalIt is equally vital that these legal notices arenotices are destroyeddestroyed once it isonce it is conveyed to you that the action hasconveyed to you that the action has closed.closed. Restraining Orders:Restraining Orders:
  102. 102. 102 Chain of Command section:Chain of Command section:
  103. 103. 103 A command hierarchy (chain of command) is a group of people dedicated to carrying out orders "from the top", that is, of authority. It is part of a power structure. A chain of command is vital to maintaining communication and discipline within the ranks. Chain of CommandChain of Command
  104. 104. 104 In general,In general, security supervisorssecurity supervisors andand securitysecurity managersmanagers give orders only to those directlygive orders only to those directly below them in the chain of command andbelow them in the chain of command and receive orders only from those directly abovereceive orders only from those directly above them. A security officer who has difficultythem. A security officer who has difficulty executing a duty or order and appeals forexecuting a duty or order and appeals for relief directly above his immediaterelief directly above his immediate supervisor/ manager in the chain ofsupervisor/ manager in the chain of command is likely to be disciplined and orcommand is likely to be disciplined and or written up for not observing the chain ofwritten up for not observing the chain of command structure.command structure. Chain of CommandChain of Command
  105. 105. 105 Security personnel who have a direct supervisor should report only to that individual and only that individual on all matters relevantrelevant to the operational objectives of your security program. Staff personnel who feel they are have been wronged and see no immediate remedy to the problem are welcome to then go further up the chain to solve the issue. Chain of CommandChain of Command
  106. 106. 106 Although there is an established chain of command just about anywhere you go in the working world, that does not mean that front line personnel can’t have some type of reasonable communication with upper management that is above your direct supervisor. Communication with all levels of the power structure are actually strongly encouraged. Chain of CommandChain of Command
  107. 107. 107 It is disagreements and the complaint process that becomes the problem when subordinates do not adhere to the chain of command and respect their supervisors. The key word here being, respect. If a supervisor has made what appears to be a correct decision or is reasonably enforcing any particular rule or procedure, then you do not- Chain of CommandChain of Command
  108. 108. 108 -have the right to start going to all kinds of people above that supervisor and making waves about something you have no clear standing on. Basically, if you “don’t get your way” on any given issue and you think going way above your supervisor or manager is the solution, then your sorely mistaken and you will be disciplined for your conduct. Chain of CommandChain of Command
  109. 109. 109 Chain of CommandChain of Command The “Client”The “Client”
  110. 110. 110 “If I don’t get my way, I will just run to the client and complain to them. They like me, I have been here for years. I will show them!”….That method may work temporarily, but in the long term your setting yourself up for termination. Absolutely under no circumstances will any security personnel circumvent the chain of command and go to the client. Chain of CommandChain of Command
  111. 111. 111 Certain select management team members in contract security communicate directly with the client team at your facility regarding operational issues, objectives, planning, procedures, and staff concerns. Those officials consist of the account manager, assistant account manager, the district manager, and or branch mgr. Chain of CommandChain of Command
  112. 112. 112 Do we in management expect you to effectively communicate with your client team members and maintain a healthy working relationship? Yes of course we do!! It is matters of disagreement or tension among the ranks that can not be exposed to any client team member. They do not get involved in internal matters. Chain of CommandChain of Command
  113. 113. 113 If you choose to continually ignore the chain of command or you have a habit of running to the client on matters that are meant to be handled by your direct supervisors, then you will be purged from the employee roster. Put simply, you will be terminated and we always want to avoid that scenario~
  114. 114. 114 Access control perspective from theAccess control perspective from the Sears Tower Security Director:Sears Tower Security Director:
  115. 115. 115 Excerpts from the May 2007Excerpts from the May 2007 edition ofedition of Security ManagementSecurity Management
  116. 116. 116 Excerpts from theExcerpts from the May 2007May 2007 edition ofedition of Security ManagementSecurity Management Chicago’s Sears Tower,Chicago’s Sears Tower, at a height ofat a height of 1,454 feet1,454 feet to its architectural top, is theto its architectural top, is the tallest building in the United States and atallest building in the United States and a leading symbol of U.S. commerce. Afterleading symbol of U.S. commerce. After the collapse of the World Trade Center,the collapse of the World Trade Center, the former management was concernedthe former management was concerned about the Sears Tower’s prominence as aabout the Sears Tower’s prominence as a terrorist target andterrorist target and hardenedhardened securitysecurity accordingly.accordingly.
  117. 117. 117 Excerpts from theExcerpts from the May 2007May 2007 edition ofedition of Security ManagementSecurity Management However, tenants were unhappy. SixHowever, tenants were unhappy. Six years out fromyears out from 9-119-11, the building, which, the building, which is under new ownership, hasis under new ownership, has considerably revamped the securityconsiderably revamped the security program it inherited to create a robustlyprogram it inherited to create a robustly secure but subtlesecure but subtle environment thatenvironment that does not make tenants feel like theydoes not make tenants feel like they work in a fortress.work in a fortress.
  118. 118. 118 Excerpts from theExcerpts from the May 2007May 2007 edition ofedition of Security ManagementSecurity Management ““When Sears Tower Management Group tookWhen Sears Tower Management Group took over…[the goal was to] strike the balanceover…[the goal was to] strike the balance between goodbetween good customer servicecustomer service andand greatgreat securitysecurity,”,” says Sears Tower Managementsays Sears Tower Management Director of Security and Life SafetyDirector of Security and Life Safety Keith L.Keith L. KambicKambic, CPP., CPP. Kambic elaborates : “A high rise is a businessKambic elaborates : “A high rise is a business entity, and we can protect it all we want, but if weentity, and we can protect it all we want, but if we don’t get new tenants in here, then it’s an emptydon’t get new tenants in here, then it’s an empty building. It really does us no good.”building. It really does us no good.”
  119. 119. 119 Excerpts from theExcerpts from the May 2007May 2007 edition ofedition of Security ManagementSecurity Management When Kambic joined the Sears Tower securityWhen Kambic joined the Sears Tower security team in 2004, he says, it was still responding toteam in 2004, he says, it was still responding to the 2001 attacks withthe 2001 attacks with “the hard approach”,“the hard approach”, thethe approach that occurred for most buildings rightapproach that occurred for most buildings right after 9-11. The security officers were in hardafter 9-11. The security officers were in hard uniforms that mimicked Chicago police;uniforms that mimicked Chicago police; customer servicecustomer service was not a priority; and thewas not a priority; and the fronts of our lobbies were filled with x-ray andfronts of our lobbies were filled with x-ray and metal detection machines. So as soon as youmetal detection machines. So as soon as you walked in, that was the first thing that you saw.”walked in, that was the first thing that you saw.”
  120. 120. 120 ““Striking the balance”Striking the balance” Now, however, security’s approach isNow, however, security’s approach is moremore subtlesubtle.. There’s a package-screeningThere’s a package-screening machine off to one side of the lobby, butmachine off to one side of the lobby, but there is no lengthy queue behind it.there is no lengthy queue behind it. Employees flow in unimpeded; visitorsEmployees flow in unimpeded; visitors pass quickly through a metal detectorpass quickly through a metal detector before using access control cards at abefore using access control cards at a series of decorative turnstiles to reach theseries of decorative turnstiles to reach the elevators.elevators. VisitorsVisitors are able to check in at aare able to check in at a reception desk staffed by customerreception desk staffed by customer service agents inservice agents in business-style uniforms.business-style uniforms.
  121. 121. 121 ““Striking the balance”Striking the balance” Training.Training. The state of Illinois requires thatThe state of Illinois requires that security officers have 20 hours of training beforesecurity officers have 20 hours of training before coming on site; Kambic requires an additional 16coming on site; Kambic requires an additional 16 hours. Once on the job, security staff participatehours. Once on the job, security staff participate in a formalized and documentedin a formalized and documented trainingtraining programprogram tailored by Kambic and the securitytailored by Kambic and the security contractor specifically for the Sears Tower site.contractor specifically for the Sears Tower site. In addition, they receive training from severalIn addition, they receive training from several agencies, including the FBI; the Secret Service;agencies, including the FBI; the Secret Service; the Bureau of Alcohol, Tobacco, Firearms, andthe Bureau of Alcohol, Tobacco, Firearms, and Explosives; and the Chicago Police and FireExplosives; and the Chicago Police and Fire Departments.Departments.
  122. 122. 122 Customer Service aspects:Customer Service aspects: One module of the officer training is aOne module of the officer training is a thorough grounding inthorough grounding in customer servicecustomer service.. “In high rises, service is your biggest“In high rises, service is your biggest amenity. That’s one of the reasons thatamenity. That’s one of the reasons that they choose your building.”they choose your building.” This idea is reflected in the change fromThis idea is reflected in the change from police-type uniforms to morepolice-type uniforms to more corporatecorporate uniform attireuniform attire..
  123. 123. 123 Customer Service aspects:Customer Service aspects: The new look for officers includes navy-The new look for officers includes navy- blue suits, shirts, and silk ties. On the firstblue suits, shirts, and silk ties. On the first day the officers wore their new uniforms,day the officers wore their new uniforms, KambicKambic recalls, favorable tenantrecalls, favorable tenant comments rolled in. “It’s more than just acomments rolled in. “It’s more than just a look. And I think the officerslook. And I think the officers felt betterfelt better about themselves; they feltabout themselves; they felt moremore professionalprofessional.”.”
  124. 124. 124 Customer Service aspects:Customer Service aspects: Previously, says Kambic, officers rarelyPreviously, says Kambic, officers rarely greetedgreeted tenants and guests. “Now we want our officerstenants and guests. “Now we want our officers to make eye-contact, give a nod or a smile—to make eye-contact, give a nod or a smile— something so that thesomething so that the tenant feels recognizedtenant feels recognized.”.” Ideally, a tenant or visitor could have contactIdeally, a tenant or visitor could have contact with securitywith security three timesthree times before they reach thebefore they reach the elevator bank.elevator bank. ““The bottom line is that, in a high rise, securityThe bottom line is that, in a high rise, security staff provide thestaff provide the first impressionfirst impression when peoplewhen people walk in and thewalk in and the last impressionlast impression when peoplewhen people walk out,” Kambic states.walk out,” Kambic states.
  125. 125. 125 ADA Act of 1990- 2010 UpdateADA Act of 1990- 2010 Update
  126. 126. 126 2010 Update- Service Animals2010 Update- Service Animals
  127. 127. 127 2010 Update- Service Animals2010 Update- Service Animals As professional and corporate securityAs professional and corporate security personnel, it is prudent that your fullypersonnel, it is prudent that your fully knowledgeable on building regulationsknowledgeable on building regulations concerning the entry and denying entry ofconcerning the entry and denying entry of individuals who have service animals. It isindividuals who have service animals. It is equally important to know what questionsequally important to know what questions can be asked and what can not be askedcan be asked and what can not be asked of individuals when they enter your lobbyof individuals when they enter your lobby with a service animal.with a service animal.
  128. 128. 128 2010 Update- Service Animals2010 Update- Service Animals Federal ADA (Americans w/ DisabilitiesFederal ADA (Americans w/ Disabilities Act) Service Animals- The specifics:Act) Service Animals- The specifics:
  129. 129. 129 2010 Update- Service Animals2010 Update- Service Animals TheThe Department of JusticeDepartment of Justice publishedpublished revised final regulations implementing therevised final regulations implementing the Americans with Disabilities ActAmericans with Disabilities Act (ADA) for(ADA) for title II (State and local governmenttitle II (State and local government services) and title III (publicservices) and title III (public accommodations and commercialaccommodations and commercial facilities) on September 15, 2010, in thefacilities) on September 15, 2010, in the Federal Register. These requirements, orFederal Register. These requirements, or rules, clarify and refine issues that haverules, clarify and refine issues that have arisen over the pastarisen over the past 20 years20 years and containand contain new, and updated requirements.new, and updated requirements.
  130. 130. 130 2010 Update- Service Animals2010 Update- Service Animals 1. Beginning on March 15, 2011, only dogs are recognized as service animals under titles II and III of the ADA. 2. A service animal is a dog that is individually trained to do work or perform tasks for a person with a disability. 3. Generally speaking, title II and title III entities must permit service animals to accompany people with disabilities in all areas where members of the public are allowed to go.
  131. 131. 131 Service Animals Defined:Service Animals Defined: Service animals are defined as dogs that are individually trained to do work or perform tasks for people with disabilities. Examples of such work or tasks include guiding people who are blind, alerting people who are deaf, pulling a wheelchair, alerting and protecting a person who is having a seizure, reminding a person with mental illness to take prescribed medications, calming a person with Post Traumatic Stress Disorder (PTSD) during an anxiety attack, or performing other duties. Service animals are working animals, not pets. The work or task a dog has been trained to provide must be directly related to the person’s disability. Dogs whose sole function is to provide comfort or emotional support do not qualify as service animals under the ADA.
  132. 132. 132 Service Animals Defined:Service Animals Defined: This definition does not affect or limit the broader definition of “assistance animal” under the Fair Housing Act or the broader definition of “service animal” under the Air Carrier Access Act. Some State and local laws also define service animal more broadly than the ADA does. Information about such laws can be obtained from the origin State attorney general’s office.
  133. 133. 133 Service Animals Defined:Service Animals Defined: Under the ADA, State and local governments, businesses, and nonprofit organizations that serve the public generally must allow service animals to accompany people with disabilities in all areas of the facility where the public is normally allowed to go.
  134. 134. 134 Service Animals Defined:Service Animals Defined: For example, in a hospital it would be inappropriate to exclude a service animal from areas such as patient rooms, clinics, cafeterias, or examination rooms. However, it may be appropriate to exclude a service animal from operating rooms or burn units where the animal’s presence may compromise a sterile environment.
  135. 135. 135 Service Animals- Control:Service Animals- Control: Under the ADA, service animals must be harnessed, leashed, or tethered, unless these devices interfere with the service animal’s work or the individual’s disability prevents using these devices. In that case, the individual must maintain control of the animal through voice, signal, or other effective controls.
  136. 136. 136 Asking Questions. Be careful.Asking Questions. Be careful.
  137. 137. 137 Service Animals- Questions:Service Animals- Questions: When it is not obvious what service an animal provides, only limited inquiries are allowed. Staff may ask two questions: (1) is the dog a service animal required because of a disability.
  138. 138. 138 Service Animals- Questions:Service Animals- Questions: (2) what work or task has the dog been trained to perform. Staff cannot ask about the person’s disability, require medical documentation, require a special identification card or training documentation for the dog, or ask that the dog demonstrate its ability to perform the work or task.
  139. 139. 139 Service Animals- Questions:Service Animals- Questions: Allergies and fear of dogs are not valid reasons for denying access or refusing service to people using service animals. Affected parties both should be accommodated by assigning them, if possible, to different locations within the room or different rooms in the facility.
  140. 140. 140 Service Animals- Questions:Service Animals- Questions: A person with a disability cannot be asked to remove his service animal from the premises unless: (1) the dog is out of control and the handler does not take effective action to control it or (2) the dog is not housebroken. When there is a legitimate reason to ask that a service animal be removed, staff must offer the person with the disability the opportunity to obtain goods or services without the animal’s presence.
  141. 141. 141 Service Animals- Questions:Service Animals- Questions: Establishments that sell or prepare food within your building facility, no matter how expansive or limited, must allow service animals in public areas even if state or local health codes prohibit animals on the premises.
  142. 142. 142 Service Animals- Questions:Service Animals- Questions:  People with disabilities who use service animals cannot be isolated from other people or treated less favorably than other people.  Staff are not required to provide care or food for a service animal.
  143. 143. 143 ~The Sears Tower Lobby~~The Sears Tower Lobby~ (What do you notice in this picture?)(What do you notice in this picture?)
  144. 144. 144 YourYour main lobby.main lobby. The nerve centerThe nerve center of your entire security programof your entire security program
  145. 145. 145 Always takeAlways take PridePride in your buildingin your building lobbies and keep them clean!lobbies and keep them clean!
  146. 146. 146 Access Control measures will alwaysAccess Control measures will always includeinclude “Tenant”“Tenant” door checks.door checks. Make sure tenant space isMake sure tenant space is secured.secured.
  147. 147. 147 That includesThat includes exteriorexterior entrances &entrances & common areas of your facilitycommon areas of your facility
  148. 148. 148 Effective access control starts with greatEffective access control starts with great Customer Service…Customer Service…
  149. 149. 149 ……and not treating visitors or employees likeand not treating visitors or employees like they are at an armed checkpoint.they are at an armed checkpoint.
  150. 150. 150 Protecting your client’s building &Protecting your client’s building & employees is one of youremployees is one of your primaryprimary priorities.priorities. Providing exceptionalProviding exceptional customer servicecustomer service to those sameto those same employees and visitors is equally asemployees and visitors is equally as important.important.
  151. 151. 151 Personnel should maintain a neat,Personnel should maintain a neat, clean, and visually attractive front desk.clean, and visually attractive front desk.
  152. 152. 152 Building exteriors:Building exteriors:
  153. 153. 153 Security staff personnel should on aSecurity staff personnel should on a periodic basis make visualperiodic basis make visual inspections of theinspections of the building exteriorbuilding exterior toto note any evident damage, crackednote any evident damage, cracked glass, vandalism, or windowglass, vandalism, or window obstructions.obstructions.
  154. 154. 154 ““Secondary”Secondary” entrances are just asentrances are just as important as yourimportant as your primaryprimary entrance.entrance. All entrances deserve equal scrutiny and careAll entrances deserve equal scrutiny and care
  155. 155. 155 If your building has a standard practice of flying theIf your building has a standard practice of flying the American flag, then the proper protocols should beAmerican flag, then the proper protocols should be followed with respect to when you lower & raise it.followed with respect to when you lower & raise it.
  156. 156. 156 Take Pride in your uniform and yourselfTake Pride in your uniform and yourself
  157. 157. 157 All members of the building Mgt. TeamAll members of the building Mgt. Team are responsible forare responsible for safety & qualitysafety & quality..
  158. 158. 158 ~Striving to be the~Striving to be the “Best”“Best” starts with beingstarts with being Well Trained, Alert, & KnowledgeableWell Trained, Alert, & Knowledgeable
  159. 159. 159 The beginning of this presentation askedThe beginning of this presentation asked “How“How high can we reach?”high can we reach?” The answer is simple.The answer is simple.
  160. 160. 160 As high as we want~As high as we want~
  161. 161. 161 Recommended Reading:Recommended Reading:
  162. 162. 162 Thank you for attending today’sThank you for attending today’s presentation on access controlpresentation on access control
  163. 163. 163

×