SlideShare a Scribd company logo
50 Term 4, 2019 | school-news.com.auHEALTH & SAFETY
By Rosie Clarke, Editor
Theft and vandalism
plagues schools
around the country.
Just last month, $16,000 of
damage was caused during a
break-in at Wahroonga Adventist
School. Meanwhile, Port Hacking
High School in New South
Wales has been dealing with the
fallout after vandals graffitied
obscenities across the school
oval during the holidays. Geelong
police even took measures
to warn schools that they are
more susceptible to break-ins
during the holidays as vandals
look to steal computers
and other devices.
Preventing a break-
in comes down to
security procedure and
protocol. Particularly
as schools invest in
digital technologies,
outdoor learning aids
and furniture designs,
security needs should be
reassessed regularly.
The first step is risk
assessment: some state
departments and many
security suppliers can provide
a security assessment that
is tailored to your school. If
your school meets certain
risk requirements, it will
qualify for more government
funding to install intruder alert
systems and more. Alternatively,
if your school has suffered
property damage in the past,
the government may pay for a
formal security audit. For schools
that don’t meet the criteria for
additional funding, you can
undertake your own audit by
following the risk management
tools provided online by your
state department or use a
licensed security consultant.
Once risk areas have been
identified, there are a multitude
of ways to strengthen security:
clearly signposting alarm
systems, CCTV and security
patrols is a great way to help
deter vandals and thieves.
Experts suggest placing
your signs behind a see-
through fence, or somewhere
clearly visible but difficult
to deface or hide behind.
Security lighting is also
important as it will prevent blind
spots or dark shadows in CCTV
footage and strong visibility
will act as a deterrent if
would-be vandals know
they could easily be seen.
Security lighting and
infra-red lights have
the added benefit
of surprising
trespassers,
discouraging them
from entering.
The sudden bright lights
may also trigger neighbours
to keep an eye out or call
police. Professionals should
be brought in to install the
lights in places that will be
most impactful and most
difficult to deface or disarm.
One of the most effective
ways to secure a school is to
establish a strong perimeter.
With a solid boundary fence,
onlookers will note that the
school is secure and students,
parents and teachers can feel
safe during term time. Fencing is
popular, as trees or landscaping
can be scaled and walls feel too
imposing. There are a variety of
available fence materials and
even anti-climb designs
ideal for preventing
school break-ins.
Customisable high
security fencing
designs are also
available to schools
concerned about
appearance.
Securingyourschool
perimeter against vandals
Term 4, 2019 | school-news.com.au 51HEALTH & SAFETY
Access control systems
offer a high level of security
and can integrate well
with secure fencing.
Security systems combine
electric locks with CCTV control,
alarms and boundary fences,
plus additional functions like
automated door locking, pin
code access, keycards and fobs.
Before you install a new system,
check out what works for other
schools and plan on-site visits.
It’s a good idea to plan an alarm
response strategy that alerts
a designated security guard
about a possible break-in. If a
staff member is scheduled to
respond they could be put at-
risk, or may not respond quickly
enough to head-off vandals.
Industry take:
Eclipse Security expert, Greg
Flood explained how access
control systems help schools.
“They dispense with the need
for conventional keys and
instead use the latest RFID
contactless key cards. These
can be programmed to allow
or restrict access to different
parts of the school. Access
can be restricted to different
times of the day or even days of
the year, i.e. no access during
school holidays. Teachers, for
example, have cards that double
as photo ID cards allowing them
to pass freely about the school,
whereas others such as visitors
or cleaners for example may have
access only to certain parts of
the school and at certain times.
“The latest addition to access
control systems is the advent of
mobile keys using smart phones
to access areas. Mobile keys can
be sent and revoked without
the end-user having to pick up
a card from site, they simply
open the app on the phone and
present it to the door for access.”
Greg offered some tips for
schools looking to install CCTV:
“Identify key areas of activity and
risk. Focus on the functionality
and limitations of CCTV systems,
privacy regulations, signage,
and the impact on schools’
existing network infrastructure.”
API Access and Security expert,
Nick Flinos advised us on
reducing risk on school grounds.
“Within a school environment,
CCTV supports security audit
trails and allows schools to
review incidents. It comes
down to reducing risk and
increasing safety awareness.
From an installation perspective,
CCTV needs to be easy to use
and access the footage.
Schools using access control
systems can manage their
entire building or campus from
one location by receiving alerts
when certain doors are opened.
You can view and respond to
door alarms, lock down facilities
and classrooms in the event
of a security threat, and get
alerts if a door is left open.”
He added: “Not only can you
limit access to a building but
to rooms within the building
too, including storage closets,
server rooms, staff rooms and
classrooms. Control who needs
to go where and at what time.
From letting visitors through
your access points to allowing
students to access sports
rooms at selected times. Switch
from having multiple keys or
security guards to controlled
swipe cards that one person can
monitor for your entire school.
Finally, “If a key gets lost, you
will have peace of mind that
your premises will not require
a complete new key system
installed because access
control technology allows you
to remove that card from the
program as no additional cost.”
Are Your
Students Safe
At School?
CCTV & Access Control
Systems ensure your
students safety
Image: © aerogondo, stock.adobe.com

More Related Content

Similar to Securing your school - School News, Australia - Term 4, 2019

Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Future Education Magazine
 
Daosafe turnstile gate solution for university(school) access control project
Daosafe turnstile gate solution for university(school) access control projectDaosafe turnstile gate solution for university(school) access control project
Daosafe turnstile gate solution for university(school) access control project
Turnstile Gate Maker-DAOSAFE
 
Dive into anything.pdf
Dive into anything.pdfDive into anything.pdf
Dive into anything.pdf
DigitalMarketing166846
 
Avaya Safe School Solution AlturaCS
Avaya Safe School Solution AlturaCSAvaya Safe School Solution AlturaCS
Avaya Safe School Solution AlturaCS
Altura Communication Solutions
 
Securly Product Brief
Securly Product BriefSecurly Product Brief
Securly Product Brief
Securly
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
meetsolanki44
 
Physical Facility Physical Facilities Ev.docx
Physical Facility     Physical Facilities Ev.docxPhysical Facility     Physical Facilities Ev.docx
Physical Facility Physical Facilities Ev.docx
randymartin91030
 
Implementing a Crisis Alert System for Schools: Enhancing Safety and Response...
Implementing a Crisis Alert System for Schools: Enhancing Safety and Response...Implementing a Crisis Alert System for Schools: Enhancing Safety and Response...
Implementing a Crisis Alert System for Schools: Enhancing Safety and Response...
simulalert
 
CAPE Information Technology Unit 1 - Sample SBA
CAPE Information Technology Unit 1 - Sample SBACAPE Information Technology Unit 1 - Sample SBA
CAPE Information Technology Unit 1 - Sample SBA
Raheme Matthie
 
Enhancing Safety and Security: The Implementation of School Emergency Alert S...
Enhancing Safety and Security: The Implementation of School Emergency Alert S...Enhancing Safety and Security: The Implementation of School Emergency Alert S...
Enhancing Safety and Security: The Implementation of School Emergency Alert S...
simulalert
 
Case Study: Matthew Arnold School enhances network security with iboss
Case Study: Matthew Arnold School enhances network security with ibossCase Study: Matthew Arnold School enhances network security with iboss
Case Study: Matthew Arnold School enhances network security with iboss
Purdicom
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
bwcelearning
 
Education: Industries we Serve
Education: Industries we ServeEducation: Industries we Serve
Education: Industries we Serve
The TNS Group
 
Current provision for e safety in falkirk schools february 2010
Current provision for e safety in falkirk schools february 2010Current provision for e safety in falkirk schools february 2010
Current provision for e safety in falkirk schools february 2010
shirleyclubb
 
Accessing Your Student Information in an Emergency
Accessing Your Student Information in an EmergencyAccessing Your Student Information in an Emergency
Accessing Your Student Information in an Emergency
Discovery Software
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
Kabul Education University
 
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
Deepak Solanki
 

Similar to Securing your school - School News, Australia - Term 4, 2019 (20)

Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
 
Daosafe turnstile gate solution for university(school) access control project
Daosafe turnstile gate solution for university(school) access control projectDaosafe turnstile gate solution for university(school) access control project
Daosafe turnstile gate solution for university(school) access control project
 
CampusBeat - Jan 2005
CampusBeat - Jan 2005CampusBeat - Jan 2005
CampusBeat - Jan 2005
 
Dive into anything.pdf
Dive into anything.pdfDive into anything.pdf
Dive into anything.pdf
 
Avaya Safe School Solution AlturaCS
Avaya Safe School Solution AlturaCSAvaya Safe School Solution AlturaCS
Avaya Safe School Solution AlturaCS
 
Securly Product Brief
Securly Product BriefSecurly Product Brief
Securly Product Brief
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
Physical Facility Physical Facilities Ev.docx
Physical Facility     Physical Facilities Ev.docxPhysical Facility     Physical Facilities Ev.docx
Physical Facility Physical Facilities Ev.docx
 
Case Study ScholarChip
Case Study ScholarChipCase Study ScholarChip
Case Study ScholarChip
 
Implementing a Crisis Alert System for Schools: Enhancing Safety and Response...
Implementing a Crisis Alert System for Schools: Enhancing Safety and Response...Implementing a Crisis Alert System for Schools: Enhancing Safety and Response...
Implementing a Crisis Alert System for Schools: Enhancing Safety and Response...
 
CAPE Information Technology Unit 1 - Sample SBA
CAPE Information Technology Unit 1 - Sample SBACAPE Information Technology Unit 1 - Sample SBA
CAPE Information Technology Unit 1 - Sample SBA
 
Enhancing Safety and Security: The Implementation of School Emergency Alert S...
Enhancing Safety and Security: The Implementation of School Emergency Alert S...Enhancing Safety and Security: The Implementation of School Emergency Alert S...
Enhancing Safety and Security: The Implementation of School Emergency Alert S...
 
Case Study: Matthew Arnold School enhances network security with iboss
Case Study: Matthew Arnold School enhances network security with ibossCase Study: Matthew Arnold School enhances network security with iboss
Case Study: Matthew Arnold School enhances network security with iboss
 
eSafety policy
eSafety policyeSafety policy
eSafety policy
 
Education: Industries we Serve
Education: Industries we ServeEducation: Industries we Serve
Education: Industries we Serve
 
Current provision for e safety in falkirk schools february 2010
Current provision for e safety in falkirk schools february 2010Current provision for e safety in falkirk schools february 2010
Current provision for e safety in falkirk schools february 2010
 
Accessing Your Student Information in an Emergency
Accessing Your Student Information in an EmergencyAccessing Your Student Information in an Emergency
Accessing Your Student Information in an Emergency
 
Classroom Barricade Devices
Classroom Barricade DevicesClassroom Barricade Devices
Classroom Barricade Devices
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
LEVERAGING BIG DATA TO IMPROVE CAMPUS SAFETY AND SECURITY
 

Recently uploaded

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Securing your school - School News, Australia - Term 4, 2019

  • 1. 50 Term 4, 2019 | school-news.com.auHEALTH & SAFETY By Rosie Clarke, Editor Theft and vandalism plagues schools around the country. Just last month, $16,000 of damage was caused during a break-in at Wahroonga Adventist School. Meanwhile, Port Hacking High School in New South Wales has been dealing with the fallout after vandals graffitied obscenities across the school oval during the holidays. Geelong police even took measures to warn schools that they are more susceptible to break-ins during the holidays as vandals look to steal computers and other devices. Preventing a break- in comes down to security procedure and protocol. Particularly as schools invest in digital technologies, outdoor learning aids and furniture designs, security needs should be reassessed regularly. The first step is risk assessment: some state departments and many security suppliers can provide a security assessment that is tailored to your school. If your school meets certain risk requirements, it will qualify for more government funding to install intruder alert systems and more. Alternatively, if your school has suffered property damage in the past, the government may pay for a formal security audit. For schools that don’t meet the criteria for additional funding, you can undertake your own audit by following the risk management tools provided online by your state department or use a licensed security consultant. Once risk areas have been identified, there are a multitude of ways to strengthen security: clearly signposting alarm systems, CCTV and security patrols is a great way to help deter vandals and thieves. Experts suggest placing your signs behind a see- through fence, or somewhere clearly visible but difficult to deface or hide behind. Security lighting is also important as it will prevent blind spots or dark shadows in CCTV footage and strong visibility will act as a deterrent if would-be vandals know they could easily be seen. Security lighting and infra-red lights have the added benefit of surprising trespassers, discouraging them from entering. The sudden bright lights may also trigger neighbours to keep an eye out or call police. Professionals should be brought in to install the lights in places that will be most impactful and most difficult to deface or disarm. One of the most effective ways to secure a school is to establish a strong perimeter. With a solid boundary fence, onlookers will note that the school is secure and students, parents and teachers can feel safe during term time. Fencing is popular, as trees or landscaping can be scaled and walls feel too imposing. There are a variety of available fence materials and even anti-climb designs ideal for preventing school break-ins. Customisable high security fencing designs are also available to schools concerned about appearance. Securingyourschool perimeter against vandals
  • 2. Term 4, 2019 | school-news.com.au 51HEALTH & SAFETY Access control systems offer a high level of security and can integrate well with secure fencing. Security systems combine electric locks with CCTV control, alarms and boundary fences, plus additional functions like automated door locking, pin code access, keycards and fobs. Before you install a new system, check out what works for other schools and plan on-site visits. It’s a good idea to plan an alarm response strategy that alerts a designated security guard about a possible break-in. If a staff member is scheduled to respond they could be put at- risk, or may not respond quickly enough to head-off vandals. Industry take: Eclipse Security expert, Greg Flood explained how access control systems help schools. “They dispense with the need for conventional keys and instead use the latest RFID contactless key cards. These can be programmed to allow or restrict access to different parts of the school. Access can be restricted to different times of the day or even days of the year, i.e. no access during school holidays. Teachers, for example, have cards that double as photo ID cards allowing them to pass freely about the school, whereas others such as visitors or cleaners for example may have access only to certain parts of the school and at certain times. “The latest addition to access control systems is the advent of mobile keys using smart phones to access areas. Mobile keys can be sent and revoked without the end-user having to pick up a card from site, they simply open the app on the phone and present it to the door for access.” Greg offered some tips for schools looking to install CCTV: “Identify key areas of activity and risk. Focus on the functionality and limitations of CCTV systems, privacy regulations, signage, and the impact on schools’ existing network infrastructure.” API Access and Security expert, Nick Flinos advised us on reducing risk on school grounds. “Within a school environment, CCTV supports security audit trails and allows schools to review incidents. It comes down to reducing risk and increasing safety awareness. From an installation perspective, CCTV needs to be easy to use and access the footage. Schools using access control systems can manage their entire building or campus from one location by receiving alerts when certain doors are opened. You can view and respond to door alarms, lock down facilities and classrooms in the event of a security threat, and get alerts if a door is left open.” He added: “Not only can you limit access to a building but to rooms within the building too, including storage closets, server rooms, staff rooms and classrooms. Control who needs to go where and at what time. From letting visitors through your access points to allowing students to access sports rooms at selected times. Switch from having multiple keys or security guards to controlled swipe cards that one person can monitor for your entire school. Finally, “If a key gets lost, you will have peace of mind that your premises will not require a complete new key system installed because access control technology allows you to remove that card from the program as no additional cost.” Are Your Students Safe At School? CCTV & Access Control Systems ensure your students safety Image: © aerogondo, stock.adobe.com