SlideShare a Scribd company logo
1 of 13
Disclaimer: The recommendations listed
in this brochure are made for the purpose
of reducing the likelihood of criminal activity
and providing for a safer environment.
While no guarantee can be stated or
implied, the concepts of CPTED have been
proven internationally. The City of Tacoma
recommends these measures as a public
service, with the understanding that there is
no way to predict or prevent all crime risks.
Local building and fi re/life safety codes
must be considered when implementing
CPTED strategies.
Document Content: This document was prepared
using various sources from the internet, jurisdictional
and industry materials, and CPTED training
information and is considered general knowledge
of the Basic Crime Prevention Through
Environmental Design principles.
City of Tacoma-Public Works Department
Building and Land Use Services
In support of the City of Tacoma
Safe and Clean Initiative
For more information,
please call CPTED Coordination
at (253) 591-5634
*Crime Prevention Through Environmental Design
Basic CPTED*strategies
for building
a safer Tacoma
Crime Prevention Through
Environmental Design (CPTED)
We constantly respond to our environment,
whether we are aware of it or not.
Effective design of our environment helps
us to feel safer and reduces opportunities
for criminal acts to occur.
CPTED, (pronounced sep-ted), is an
initiative that helps us create healthy, safe
communities through well-planned design.
• CPTED is based on the premise that the
design of our environment directly affects
our behavior. It infl uences both the
opportunities for crime to take place and
our fear of crime. This has an important
impact on our quality of life.
• CPTED enhances safety by altering
physical design and encouraging positive
social interaction.
• CPTED offers an alternative to creating
fortress-like communities where we
have to lock ourselves away to feel
safe and also complements police and
security strategies.
How CPTED works
• CPTED promotes design strategies in
planned environments that encourage
safe behavior and reduce the
opportunities for crime to occur through
three inter-related basic principles:
- natural access control
- natural surveillance
- territoriality
• Once you know about CPTED strategies,
you will see the environment in a
different way.
Natural access control
(limits access)
Guides people entering and leaving a
space through the placement of entrances,
exits, fences, landscaping and lighting.
Access control can decrease opportunities
for criminal activity by denying criminals
access to potential targets and creating a
perception of risk for would-be offenders.
Natural surveillance
(increases visibility)
The placement of physical features,
activities and people in a way that
maximizes visibility. A potential criminal
is less likely to attempt a crime if he or she
is at risk of being observed. Avoid
landscaping that creates “blind spots”
or hiding places and make sure there is
effective lighting for pedestrians.
Territoriality
(promotes a sense of ownership)
The use of physical attributes that express
ownership such as fences, signage,
landscaping, pavement designs, defi ned
property lines and clear distinctions
between private and public spaces are
examples of the application of territoriality.
Territoriality can be seen in entrances into a
community or development, and in the use
of borders and texture.
In addition to the three main principles
described, two other elements support
CPTED; Activity Support and Maintenance.
Activity support
(fosters community interaction)
Encouraging activities, such as art/
community events, in public spaces that
are intended for use by residents and other
legitimate users discourages criminal acts.
Maintenance
(deters offenders)
A well maintained home, building or
community creates a sense of pride.
A well kept area tends to make someone
feel like they will be observed by neighbors
or business owners who care about the area.
Without proper care, “grime leads
to crime”.
Using CPTED
CPTED can be applied in both existing
communities and during the planning stages
of new development. CPTED principles work
best when applied during the design phase to
avoid potential costly changes later.
CPTED is an effective method to help reduce
premise liability and give a project “value
added” market appeal.
In existing development
• CPTED can be applied creatively by fi nding
solutions to make those spaces safe
and help it better meet the
requirements of users.
• A CPTED security assessment can be done
for an existing home, building, school,
playground, park, business, etc. to identify
problems and needs.
In new development
• Costly safety problems can be avoided if the
principles of CPTED are applied during the
design and planning process.
• CPTED reviews are becoming standard
practice in the planning process across the
country. Ask for a CPTED design review for
new developments and projects.
• Design professionals can increase the
quality of life for users of a space by
incorporating CPTED into the development.For more
information or assistance, please call
CPTED Coordination at (253) 591-5634
�
�
�
Fostering a sense of pride in an area
• maintenance
• landscaping
• use of art/community events
� Natural surveillance - increases visibility
Basic CPTED principles at work
• Multi-family
• Ensure hallways are well lit.
• Install good quality deadbolts, locks and 180
degree or larger eye viewers on unit doors.
• Provide common space in central locations
to encourage resident interaction.
• Encourage a Resident Association Watch
program.
• Place play areas within view so children can
be observed by residents.
• Use deadbolts on exterior doors. Be sure
that the throw bar goes at least 1” in to
the door frame and that the strike plate
is installed with at least 3” screws.
• Install 180 degree eyeviewers and use solid
core doors.
• Post addresses and unit numbers in large
contrasting colors to the building.
• Design in visibility to laundry and community
rooms by using windows.
Businesses
• Locate checkout counters near the front
of the store, clearly visible from outside.
• Window signs should cover no more than
15 percent of the windows to provide clear
visibility into and out of the store.
• Use shelving displays no higher than 4’
to help see who is in the store.
• Avoid creating outdoor spaces that
encourage loitering.
• Ensure lighting is consistent throughout the
parking lot and the store.
• Remove any graffi ti immediately to deter
future occurrences and reduce fear of crime
for customers.
• Communicate with other businesses on
your block; look out for each other.
Tips on crime prevention design
Landscaping defi nes parking lot of business
from roadway
• identifi es public and private space
• allows for natural surveillance
Deck at front of multi-family units
• creates natural surveillance opportunities
of the walkway, street, and bus stop
• supports territoriality
Parking garage
• reduces areas of solid walls
• incorporates an open stairwell that allows
opportunity for surveillance
� Territoriality - promotes a sense of ownership
Decorative fencing and signage
• helps control access
• celebrates the entrance
• creates “a sense of place”
Layout offers surveillance opportunities
• low shelving
• centralized platform near front doors
• operational camera and blindspot mirror
Parks and common areas
• Use walkways and landscaping to direct visitors to the
main entrance; use thorny plants along fence lines and
under windows to deter access to private areas.
• Place play areas and picnic shelters within view of trails,
roads and parking areas to increase opportunity for
surveillance.
• Keep shrubs trimmed below 3’ and limb up trees at least 7’
from the ground around facilities to improve visibility.
• Use lighting over entrances, parking areas, and pedestrian
scale lighting along walks.
• Schedule activities in passive areas to draw legitimate
users to the space.
• Locate restrooms near staffed or active areas or as to be
seen from the road.
• Trim back landscaping at least 10’ back from trails to avoid
blind spots or ambush points.
• When fencing is needed use transparent or semi-
transparent materials to increase visibility into an area.
• Clearly mark hours of operation, rules, and use directional
signage to establish acceptable behaviors and guide users
through the space.
NOTE: CPTED principles are site specifi c.
Please be aware of the need to consider
the type of use, the area, demographics, etc.
Fencing and landscaping material
• designates public and semi-public space
• fenced-off areas can be accessed when gate is open
Use of transparent materials
• allows for natural surveillance
• easy to maintain and is effective
Maintained landscape material
• limits access to parking under a building
• reinforces territoriality
• natural surveillance from the sidewalk
� �
� Natural access control - limits access
CHEM-Assignment: week one
1. Do these statements describe chemical or physical
properties?
(a) Oxygen gas supports combustion. Answer:
____________
(b) Fertilizers help to increase agricultural production.
Answer: ____________
(c) Water boils below 100 C on top of a moun-tain. Answer:
____________
(d) Lead is denser than aluminum. Answer:
____________
(e) Uraniumis a radioactive element. Answer:
____________
2.Does each of these describe a physical change or a chemical
change?
(a) The helium gas inside a balloon tends to leak out after a
few hours.
Answer:________________________
(b) A flashlight beam slowly gets dimmer and finally goes
out.
Answer:________________________
(c) Frozen orange juice is reconstituted by adding water to
it.
Answer:________________________
(d) The growth of plants depends on the sun’s energy in a
process called
photosynthesis.
Answer:________________________
(e) A spoonful of table salt dissolves in a bowl of soup.
Answer:________________________
3. Write the molecular formula of ethanol. The color codes
are: black
(carbon), red (oxygen), and gray (hydrogen).
Answer:_______________________
CHEM-Assignment: week one
4. Write the formulas for these compounds:
(a) rubidium nitrite, (b) potassium sulfide, (c) perbromic acid,
(d) magnesium phosphate, (e) calcium hydrogen phosphate,
(f) boron
trichloride, (g) iodine heptafluoride, (h) ammonium sulfate,
(i) silver
perchlorate, (j) iron (III) chromate, (k) calcium sulfate
dihydrate.
5. Calculate the mass of 50.0 m L of ethanol (thedensity of
ethanol 0.798 g/m L).
6. Mercury is the only metal that is a liquid at room
temperature. Its density is 13.6 g/m L. How many grams of
mercury will
occupy a volume of 95.8 m L?
7. What is the periodic table, and what is its significance
in the
study of chemistry? What are groups and periods in the
periodic table?

More Related Content

Similar to Disclaimer The recommendations listedin this brochure are m.docx

Community Project2_Nunzir
Community Project2_NunzirCommunity Project2_Nunzir
Community Project2_NunzirRene Nunzir
 
CMAD Group Workbook 2 Sustainable Development
CMAD Group Workbook 2 Sustainable DevelopmentCMAD Group Workbook 2 Sustainable Development
CMAD Group Workbook 2 Sustainable DevelopmentAlexander Doré
 
ACCESSIBILITY RIGHTS AUDIT-1.ppt
ACCESSIBILITY RIGHTS AUDIT-1.pptACCESSIBILITY RIGHTS AUDIT-1.ppt
ACCESSIBILITY RIGHTS AUDIT-1.pptssuseraa80fc
 
Est's assessment owes 14122017
Est's assessment   owes 14122017Est's assessment   owes 14122017
Est's assessment owes 14122017Steve Halls
 
CPTED in educational institutions designing crime out
CPTED in educational institutions designing crime outCPTED in educational institutions designing crime out
CPTED in educational institutions designing crime outGAURAV. H .TANDON
 
Creating accessibility policy
Creating accessibility policyCreating accessibility policy
Creating accessibility policyDavid Banes
 
ICT4D Seminar Uni Köln 20.02.16
ICT4D Seminar Uni Köln 20.02.16ICT4D Seminar Uni Köln 20.02.16
ICT4D Seminar Uni Köln 20.02.16Benita Rowe
 
RV 2015: Equitable TOD 101 by John Hersey
RV 2015: Equitable TOD 101 by John HerseyRV 2015: Equitable TOD 101 by John Hersey
RV 2015: Equitable TOD 101 by John HerseyRail~Volution
 
Crime prevention through environmental design I
Crime prevention through environmental design ICrime prevention through environmental design I
Crime prevention through environmental design IGAURAV. H .TANDON
 
Using Permaculture to Cultivate a Sustainable Security Program
Using Permaculture to Cultivate a Sustainable Security ProgramUsing Permaculture to Cultivate a Sustainable Security Program
Using Permaculture to Cultivate a Sustainable Security ProgramDistil Networks
 
Taking the public with you when restructuring services: overcoming opposition...
Taking the public with you when restructuring services: overcoming opposition...Taking the public with you when restructuring services: overcoming opposition...
Taking the public with you when restructuring services: overcoming opposition...Ricardo Energy & Environment
 
Practical Approaches to ADA Compliance
Practical Approaches to ADA CompliancePractical Approaches to ADA Compliance
Practical Approaches to ADA ComplianceKate Varner
 
1Assignment 1 Vulnerability AssessmentAssignment 1
1Assignment 1 Vulnerability AssessmentAssignment 1 1Assignment 1 Vulnerability AssessmentAssignment 1
1Assignment 1 Vulnerability AssessmentAssignment 1 EttaBenton28
 
Equity workshop: Safeguards and standards for equity in redd+
Equity workshop: Safeguards and standards for equity in redd+Equity workshop: Safeguards and standards for equity in redd+
Equity workshop: Safeguards and standards for equity in redd+IIED
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationHafiza Abas
 

Similar to Disclaimer The recommendations listedin this brochure are m.docx (20)

Community Project2_Nunzir
Community Project2_NunzirCommunity Project2_Nunzir
Community Project2_Nunzir
 
CMAD Group Workbook 2 Sustainable Development
CMAD Group Workbook 2 Sustainable DevelopmentCMAD Group Workbook 2 Sustainable Development
CMAD Group Workbook 2 Sustainable Development
 
ACCESSIBILITY RIGHTS AUDIT-1.ppt
ACCESSIBILITY RIGHTS AUDIT-1.pptACCESSIBILITY RIGHTS AUDIT-1.ppt
ACCESSIBILITY RIGHTS AUDIT-1.ppt
 
Est's assessment owes 14122017
Est's assessment   owes 14122017Est's assessment   owes 14122017
Est's assessment owes 14122017
 
CPTED in educational institutions designing crime out
CPTED in educational institutions designing crime outCPTED in educational institutions designing crime out
CPTED in educational institutions designing crime out
 
Creating accessibility policy
Creating accessibility policyCreating accessibility policy
Creating accessibility policy
 
ICT4D Seminar Uni Köln 20.02.16
ICT4D Seminar Uni Köln 20.02.16ICT4D Seminar Uni Köln 20.02.16
ICT4D Seminar Uni Köln 20.02.16
 
RV 2015: Equitable TOD 101 by John Hersey
RV 2015: Equitable TOD 101 by John HerseyRV 2015: Equitable TOD 101 by John Hersey
RV 2015: Equitable TOD 101 by John Hersey
 
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSIONBLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
 
Sustainability and engineering
Sustainability and engineeringSustainability and engineering
Sustainability and engineering
 
Crime prevention through environmental design I
Crime prevention through environmental design ICrime prevention through environmental design I
Crime prevention through environmental design I
 
CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN
CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGNCRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN
CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN
 
Using Permaculture to Cultivate a Sustainable Security Program
Using Permaculture to Cultivate a Sustainable Security ProgramUsing Permaculture to Cultivate a Sustainable Security Program
Using Permaculture to Cultivate a Sustainable Security Program
 
AWWAWCEnv1102.009
AWWAWCEnv1102.009AWWAWCEnv1102.009
AWWAWCEnv1102.009
 
Taking the public with you when restructuring services: overcoming opposition...
Taking the public with you when restructuring services: overcoming opposition...Taking the public with you when restructuring services: overcoming opposition...
Taking the public with you when restructuring services: overcoming opposition...
 
Practical Approaches to ADA Compliance
Practical Approaches to ADA CompliancePractical Approaches to ADA Compliance
Practical Approaches to ADA Compliance
 
1Assignment 1 Vulnerability AssessmentAssignment 1
1Assignment 1 Vulnerability AssessmentAssignment 1 1Assignment 1 Vulnerability AssessmentAssignment 1
1Assignment 1 Vulnerability AssessmentAssignment 1
 
Equity workshop: Safeguards and standards for equity in redd+
Equity workshop: Safeguards and standards for equity in redd+Equity workshop: Safeguards and standards for equity in redd+
Equity workshop: Safeguards and standards for equity in redd+
 
Designing Safety on Higher Ed Campuses: A CPTED Primer
Designing Safety on Higher Ed Campuses: A CPTED PrimerDesigning Safety on Higher Ed Campuses: A CPTED Primer
Designing Safety on Higher Ed Campuses: A CPTED Primer
 
The Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and OperationThe Perimeter Protection Issues, Technique and Operation
The Perimeter Protection Issues, Technique and Operation
 

More from salmonpybus

Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Discuss how portrayals of violence in different media may affect hum.docx
Discuss how portrayals of violence in different media may affect hum.docxDiscuss how portrayals of violence in different media may affect hum.docx
Discuss how portrayals of violence in different media may affect hum.docxsalmonpybus
 
Discuss how culture affects health physical and psychological healt.docx
Discuss how culture affects health physical and psychological healt.docxDiscuss how culture affects health physical and psychological healt.docx
Discuss how culture affects health physical and psychological healt.docxsalmonpybus
 
Discuss how business use Access Control to protect their informa.docx
Discuss how business use Access Control to protect their informa.docxDiscuss how business use Access Control to protect their informa.docx
Discuss how business use Access Control to protect their informa.docxsalmonpybus
 
Discuss how or if post-Civil War America was truly a period of r.docx
Discuss how or if post-Civil War America was truly a period of r.docxDiscuss how or if post-Civil War America was truly a period of r.docx
Discuss how or if post-Civil War America was truly a period of r.docxsalmonpybus
 
Discuss how partnerships are created through team development..docx
Discuss how partnerships are created through team development..docxDiscuss how partnerships are created through team development..docx
Discuss how partnerships are created through team development..docxsalmonpybus
 
discuss how health and illness beliefs can influence the assessment .docx
discuss how health and illness beliefs can influence the assessment .docxdiscuss how health and illness beliefs can influence the assessment .docx
discuss how health and illness beliefs can influence the assessment .docxsalmonpybus
 
Discuss how geopolitical and phenomenological place influence the .docx
Discuss how geopolitical and phenomenological place influence the .docxDiscuss how geopolitical and phenomenological place influence the .docx
Discuss how geopolitical and phenomenological place influence the .docxsalmonpybus
 
Discuss how each of these factors (inflation, changing population de.docx
Discuss how each of these factors (inflation, changing population de.docxDiscuss how each of these factors (inflation, changing population de.docx
Discuss how each of these factors (inflation, changing population de.docxsalmonpybus
 
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docxDiscuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docxsalmonpybus
 
Discuss how business use Access Control to protect their information.docx
Discuss how business use Access Control to protect their information.docxDiscuss how business use Access Control to protect their information.docx
Discuss how business use Access Control to protect their information.docxsalmonpybus
 
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docx
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docxDiscuss how and why companies use cryptography.Length, 2 – 3 pag.docx
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docxsalmonpybus
 
Discuss how and why companies use cryptography.Length, 2 pages..docx
Discuss how and why companies use cryptography.Length, 2 pages..docxDiscuss how and why companies use cryptography.Length, 2 pages..docx
Discuss how and why companies use cryptography.Length, 2 pages..docxsalmonpybus
 
Discuss how an object must be an expert on certain sets of informati.docx
Discuss how an object must be an expert on certain sets of informati.docxDiscuss how an object must be an expert on certain sets of informati.docx
Discuss how an object must be an expert on certain sets of informati.docxsalmonpybus
 
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docxDiscuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docxsalmonpybus
 
Discuss how Biblical worldview provides guidance to the Christian he.docx
Discuss how Biblical worldview provides guidance to the Christian he.docxDiscuss how Biblical worldview provides guidance to the Christian he.docx
Discuss how Biblical worldview provides guidance to the Christian he.docxsalmonpybus
 
Discuss how an IPSIDS can protect user information on a Windows sys.docx
Discuss how an IPSIDS can protect user information on a Windows sys.docxDiscuss how an IPSIDS can protect user information on a Windows sys.docx
Discuss how an IPSIDS can protect user information on a Windows sys.docxsalmonpybus
 
discuss how a particular human-computer interface might impact a per.docx
discuss how a particular human-computer interface might impact a per.docxdiscuss how a particular human-computer interface might impact a per.docx
discuss how a particular human-computer interface might impact a per.docxsalmonpybus
 
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docxDiscuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docxsalmonpybus
 
Discuss emerging trends in the use of Internet currency such as Bitc.docx
Discuss emerging trends in the use of Internet currency such as Bitc.docxDiscuss emerging trends in the use of Internet currency such as Bitc.docx
Discuss emerging trends in the use of Internet currency such as Bitc.docxsalmonpybus
 

More from salmonpybus (20)

Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how portrayals of violence in different media may affect hum.docx
Discuss how portrayals of violence in different media may affect hum.docxDiscuss how portrayals of violence in different media may affect hum.docx
Discuss how portrayals of violence in different media may affect hum.docx
 
Discuss how culture affects health physical and psychological healt.docx
Discuss how culture affects health physical and psychological healt.docxDiscuss how culture affects health physical and psychological healt.docx
Discuss how culture affects health physical and psychological healt.docx
 
Discuss how business use Access Control to protect their informa.docx
Discuss how business use Access Control to protect their informa.docxDiscuss how business use Access Control to protect their informa.docx
Discuss how business use Access Control to protect their informa.docx
 
Discuss how or if post-Civil War America was truly a period of r.docx
Discuss how or if post-Civil War America was truly a period of r.docxDiscuss how or if post-Civil War America was truly a period of r.docx
Discuss how or if post-Civil War America was truly a period of r.docx
 
Discuss how partnerships are created through team development..docx
Discuss how partnerships are created through team development..docxDiscuss how partnerships are created through team development..docx
Discuss how partnerships are created through team development..docx
 
discuss how health and illness beliefs can influence the assessment .docx
discuss how health and illness beliefs can influence the assessment .docxdiscuss how health and illness beliefs can influence the assessment .docx
discuss how health and illness beliefs can influence the assessment .docx
 
Discuss how geopolitical and phenomenological place influence the .docx
Discuss how geopolitical and phenomenological place influence the .docxDiscuss how geopolitical and phenomenological place influence the .docx
Discuss how geopolitical and phenomenological place influence the .docx
 
Discuss how each of these factors (inflation, changing population de.docx
Discuss how each of these factors (inflation, changing population de.docxDiscuss how each of these factors (inflation, changing population de.docx
Discuss how each of these factors (inflation, changing population de.docx
 
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docxDiscuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
 
Discuss how business use Access Control to protect their information.docx
Discuss how business use Access Control to protect their information.docxDiscuss how business use Access Control to protect their information.docx
Discuss how business use Access Control to protect their information.docx
 
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docx
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docxDiscuss how and why companies use cryptography.Length, 2 – 3 pag.docx
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docx
 
Discuss how and why companies use cryptography.Length, 2 pages..docx
Discuss how and why companies use cryptography.Length, 2 pages..docxDiscuss how and why companies use cryptography.Length, 2 pages..docx
Discuss how and why companies use cryptography.Length, 2 pages..docx
 
Discuss how an object must be an expert on certain sets of informati.docx
Discuss how an object must be an expert on certain sets of informati.docxDiscuss how an object must be an expert on certain sets of informati.docx
Discuss how an object must be an expert on certain sets of informati.docx
 
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docxDiscuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
 
Discuss how Biblical worldview provides guidance to the Christian he.docx
Discuss how Biblical worldview provides guidance to the Christian he.docxDiscuss how Biblical worldview provides guidance to the Christian he.docx
Discuss how Biblical worldview provides guidance to the Christian he.docx
 
Discuss how an IPSIDS can protect user information on a Windows sys.docx
Discuss how an IPSIDS can protect user information on a Windows sys.docxDiscuss how an IPSIDS can protect user information on a Windows sys.docx
Discuss how an IPSIDS can protect user information on a Windows sys.docx
 
discuss how a particular human-computer interface might impact a per.docx
discuss how a particular human-computer interface might impact a per.docxdiscuss how a particular human-computer interface might impact a per.docx
discuss how a particular human-computer interface might impact a per.docx
 
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docxDiscuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
 
Discuss emerging trends in the use of Internet currency such as Bitc.docx
Discuss emerging trends in the use of Internet currency such as Bitc.docxDiscuss emerging trends in the use of Internet currency such as Bitc.docx
Discuss emerging trends in the use of Internet currency such as Bitc.docx
 

Recently uploaded

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Disclaimer The recommendations listedin this brochure are m.docx

  • 1. Disclaimer: The recommendations listed in this brochure are made for the purpose of reducing the likelihood of criminal activity and providing for a safer environment. While no guarantee can be stated or implied, the concepts of CPTED have been proven internationally. The City of Tacoma recommends these measures as a public service, with the understanding that there is no way to predict or prevent all crime risks. Local building and fi re/life safety codes must be considered when implementing CPTED strategies. Document Content: This document was prepared using various sources from the internet, jurisdictional and industry materials, and CPTED training information and is considered general knowledge of the Basic Crime Prevention Through Environmental Design principles. City of Tacoma-Public Works Department Building and Land Use Services In support of the City of Tacoma
  • 2. Safe and Clean Initiative For more information, please call CPTED Coordination at (253) 591-5634 *Crime Prevention Through Environmental Design Basic CPTED*strategies for building a safer Tacoma Crime Prevention Through Environmental Design (CPTED) We constantly respond to our environment, whether we are aware of it or not. Effective design of our environment helps us to feel safer and reduces opportunities for criminal acts to occur. CPTED, (pronounced sep-ted), is an initiative that helps us create healthy, safe communities through well-planned design. • CPTED is based on the premise that the design of our environment directly affects our behavior. It infl uences both the opportunities for crime to take place and our fear of crime. This has an important impact on our quality of life. • CPTED enhances safety by altering physical design and encouraging positive social interaction. • CPTED offers an alternative to creating
  • 3. fortress-like communities where we have to lock ourselves away to feel safe and also complements police and security strategies. How CPTED works • CPTED promotes design strategies in planned environments that encourage safe behavior and reduce the opportunities for crime to occur through three inter-related basic principles: - natural access control - natural surveillance - territoriality • Once you know about CPTED strategies, you will see the environment in a different way. Natural access control (limits access) Guides people entering and leaving a space through the placement of entrances, exits, fences, landscaping and lighting. Access control can decrease opportunities for criminal activity by denying criminals access to potential targets and creating a perception of risk for would-be offenders. Natural surveillance (increases visibility) The placement of physical features, activities and people in a way that maximizes visibility. A potential criminal is less likely to attempt a crime if he or she
  • 4. is at risk of being observed. Avoid landscaping that creates “blind spots” or hiding places and make sure there is effective lighting for pedestrians. Territoriality (promotes a sense of ownership) The use of physical attributes that express ownership such as fences, signage, landscaping, pavement designs, defi ned property lines and clear distinctions between private and public spaces are examples of the application of territoriality. Territoriality can be seen in entrances into a community or development, and in the use of borders and texture. In addition to the three main principles described, two other elements support CPTED; Activity Support and Maintenance. Activity support (fosters community interaction) Encouraging activities, such as art/ community events, in public spaces that are intended for use by residents and other legitimate users discourages criminal acts. Maintenance (deters offenders) A well maintained home, building or community creates a sense of pride. A well kept area tends to make someone feel like they will be observed by neighbors or business owners who care about the area. Without proper care, “grime leads
  • 5. to crime”. Using CPTED CPTED can be applied in both existing communities and during the planning stages of new development. CPTED principles work best when applied during the design phase to avoid potential costly changes later. CPTED is an effective method to help reduce premise liability and give a project “value added” market appeal. In existing development • CPTED can be applied creatively by fi nding solutions to make those spaces safe and help it better meet the requirements of users. • A CPTED security assessment can be done for an existing home, building, school, playground, park, business, etc. to identify problems and needs. In new development • Costly safety problems can be avoided if the principles of CPTED are applied during the design and planning process. • CPTED reviews are becoming standard practice in the planning process across the country. Ask for a CPTED design review for new developments and projects.
  • 6. • Design professionals can increase the quality of life for users of a space by incorporating CPTED into the development.For more information or assistance, please call CPTED Coordination at (253) 591-5634 � � � Fostering a sense of pride in an area • maintenance • landscaping • use of art/community events � Natural surveillance - increases visibility Basic CPTED principles at work • Multi-family • Ensure hallways are well lit. • Install good quality deadbolts, locks and 180 degree or larger eye viewers on unit doors. • Provide common space in central locations to encourage resident interaction. • Encourage a Resident Association Watch
  • 7. program. • Place play areas within view so children can be observed by residents. • Use deadbolts on exterior doors. Be sure that the throw bar goes at least 1” in to the door frame and that the strike plate is installed with at least 3” screws. • Install 180 degree eyeviewers and use solid core doors. • Post addresses and unit numbers in large contrasting colors to the building. • Design in visibility to laundry and community rooms by using windows. Businesses • Locate checkout counters near the front of the store, clearly visible from outside. • Window signs should cover no more than 15 percent of the windows to provide clear visibility into and out of the store. • Use shelving displays no higher than 4’ to help see who is in the store. • Avoid creating outdoor spaces that encourage loitering. • Ensure lighting is consistent throughout the parking lot and the store.
  • 8. • Remove any graffi ti immediately to deter future occurrences and reduce fear of crime for customers. • Communicate with other businesses on your block; look out for each other. Tips on crime prevention design Landscaping defi nes parking lot of business from roadway • identifi es public and private space • allows for natural surveillance Deck at front of multi-family units • creates natural surveillance opportunities of the walkway, street, and bus stop • supports territoriality Parking garage • reduces areas of solid walls • incorporates an open stairwell that allows opportunity for surveillance � Territoriality - promotes a sense of ownership Decorative fencing and signage • helps control access • celebrates the entrance • creates “a sense of place”
  • 9. Layout offers surveillance opportunities • low shelving • centralized platform near front doors • operational camera and blindspot mirror Parks and common areas • Use walkways and landscaping to direct visitors to the main entrance; use thorny plants along fence lines and under windows to deter access to private areas. • Place play areas and picnic shelters within view of trails, roads and parking areas to increase opportunity for surveillance. • Keep shrubs trimmed below 3’ and limb up trees at least 7’ from the ground around facilities to improve visibility. • Use lighting over entrances, parking areas, and pedestrian scale lighting along walks. • Schedule activities in passive areas to draw legitimate users to the space. • Locate restrooms near staffed or active areas or as to be seen from the road. • Trim back landscaping at least 10’ back from trails to avoid blind spots or ambush points. • When fencing is needed use transparent or semi- transparent materials to increase visibility into an area.
  • 10. • Clearly mark hours of operation, rules, and use directional signage to establish acceptable behaviors and guide users through the space. NOTE: CPTED principles are site specifi c. Please be aware of the need to consider the type of use, the area, demographics, etc. Fencing and landscaping material • designates public and semi-public space • fenced-off areas can be accessed when gate is open Use of transparent materials • allows for natural surveillance • easy to maintain and is effective Maintained landscape material • limits access to parking under a building • reinforces territoriality • natural surveillance from the sidewalk � � � Natural access control - limits access CHEM-Assignment: week one 1. Do these statements describe chemical or physical properties?
  • 11. (a) Oxygen gas supports combustion. Answer: ____________ (b) Fertilizers help to increase agricultural production. Answer: ____________ (c) Water boils below 100 C on top of a moun-tain. Answer: ____________ (d) Lead is denser than aluminum. Answer: ____________ (e) Uraniumis a radioactive element. Answer: ____________ 2.Does each of these describe a physical change or a chemical change? (a) The helium gas inside a balloon tends to leak out after a few hours. Answer:________________________ (b) A flashlight beam slowly gets dimmer and finally goes out. Answer:________________________ (c) Frozen orange juice is reconstituted by adding water to it. Answer:________________________ (d) The growth of plants depends on the sun’s energy in a process called
  • 12. photosynthesis. Answer:________________________ (e) A spoonful of table salt dissolves in a bowl of soup. Answer:________________________ 3. Write the molecular formula of ethanol. The color codes are: black (carbon), red (oxygen), and gray (hydrogen). Answer:_______________________ CHEM-Assignment: week one 4. Write the formulas for these compounds: (a) rubidium nitrite, (b) potassium sulfide, (c) perbromic acid, (d) magnesium phosphate, (e) calcium hydrogen phosphate, (f) boron trichloride, (g) iodine heptafluoride, (h) ammonium sulfate, (i) silver perchlorate, (j) iron (III) chromate, (k) calcium sulfate dihydrate.
  • 13. 5. Calculate the mass of 50.0 m L of ethanol (thedensity of ethanol 0.798 g/m L). 6. Mercury is the only metal that is a liquid at room temperature. Its density is 13.6 g/m L. How many grams of mercury will occupy a volume of 95.8 m L? 7. What is the periodic table, and what is its significance in the study of chemistry? What are groups and periods in the periodic table?