Preview

Basic Building Security Procedures

Good Essays
Open Document
Open Document
3262 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Basic Building Security Procedures
Basic Building Security Procedures

By Arnold Anderson, eHow Contributor updated: April 30, 2010

Read more: Basic Building Security Procedures | eHow.com http://www.ehow.com/list_6403429_basic-building-security-procedures.html#ixzz1DEzqjBYl

• Making a commercial building secure means protecting the employees that work in the building as well as any visitors. There are some basic building security procedures that should be followed to help keep traffic in and out of the building organized, and to make sure that the building is secure when no one is supposed to be in it. By following security procedures and limiting off-hours access, a building can be made safer and more secure.

Schedule of Hours

• Security is not just locks and security guards, it is also a set of procedures designed to keep the building safe. Develop a schedule for deliveries that is strictly adhered to, and work with delivery companies to develop a schedule that will allow your company to receive shipments. Delivery companies can put your location at a specific point in their daily delivery schedule to make sure that they arrive during your posted hours. Do not accept deliveries outside of the posted hours. Create a schedule of hours for visitors as well, and do not allow visitors outside those scheduled times. Work with the managers in your company to develop an office-hours schedule to cover the times when a majority of the employees will be in and out of the building. Employees working outside of the scheduled office hours will need permission from management.

Secure all Doors and Windows

• Have delivery doors locked when not in use. Only allow certain people to have the key. Install a badge-entry system that only allows employees with a badge to enter the building during office hours. Employees working off hours should only be allowed to enter and leave the building through the security guard station. First-floor windows should be closed and locked. If first-floor

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    | Metal detectors at all entrances, have armed guards and unarmed guards, security cameras and CCTV installed.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Limit unauthorized use of network resources by allowing access during businiess hours only. Do not allow remote access permitions to anyone, except those that…

    • 563 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cjs 250 Appendix G

    • 288 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    All internal doors can only be opened by staff with an access badge and in some places also a key.…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Upon entry the door was locked and a key card was required for this single point of entry. There were security cameras outside of the building. There was a dumpster outside that was not secured, which could allow anyone access to sensitive information. Locking the dumpster or placing it in a secured location would mitigate this risk. The receptionist did not ask me to verify my identity. The receptionist should be required to verify the identity of everyone entering building to prevent a person from entering the building that isn’t authorized. There was a security room with security personnel viewing the monitors. Office 1-1 had a post it note taped to computer monitor with names that could be passwords. Increased password security should be implemented to reduce the risk of someone hacking into a system. Both office 1-1 and 1-2 had fingerprint scanners, which increases access control. In office 1-2 there was an unattended paper shredder, which should be secured due to sensitive information. In the hallway there was a security camera and a utility box but the wire cabinet was not locked. As such, anyone can access the hardware inside. A lock should be installed to prevent unauthorized access to the hardware. Also in the hallway there was an Ethernet jack which allowed access to the internet. Controls should be put in place to require security access to logon to the network.…

    • 698 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The premises complies with health and safety and that there is suitable security in place…

    • 1213 Words
    • 5 Pages
    Better Essays
  • Better Essays

    There are five vital security features that must be followed in order to provide adequate refuge for places of worship and churches. It is very important for each congregation to be educated, work together and be protected in order to run efficiently without being in fear. Each person should have the right to worship in comfort. There are many steps that can be taken that will protect staff as well as attendants of the church.…

    • 1090 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Miss

    • 2737 Words
    • 11 Pages

    Security and theft- You can improve the physical security of your organisation or service by installing electronic security systems such as cctv, intruder alarms and security lights. Improving perimeter security installing barriers, screens, using security personnel and contractors will also minimise risks of security breaches and theft.…

    • 2737 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    * Accurate but concise, containing only facts not assumptions, of the person making an entry.…

    • 604 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 4 1.2 and 1.4

    • 2237 Words
    • 9 Pages

    We have a secure entry system which prevents unauthorised access into the nursery and a signing in book for staff and visitors so that the purpose of visitors within the building is monitored and known.…

    • 2237 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    School Shootings

    • 669 Words
    • 3 Pages

    Next, after gathering the best security personnel you can find, focus on the duties of each officer. There should be one police officer for each exit and entrance in order to make sure that no dangerous figure can sneak into the building in any way. Then, give each officer a handheld transceiver so that they may communicate properly with each other to either call for backup or to evoke any kind of awareness. In addition, schools should incorporate two officers near the main entrance of the building in order to have an exponentially improved security system due to the increased risk of shooters entering through the front.…

    • 669 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    - Security: By law I must only use internet connections that are DSL; and not wireless. I must have all offices locked with access ability controlled to those in positions of authority; a paper shredder & all files with client confident materials such as bank account numbers stowed with lock and key.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays